Monday, July 22, 2019

Webform2 †wireless LAN, users and access points management Essay Example for Free

Webform2 – wireless LAN, users and access points management Essay Private void Page_Load(object sender, System. EventArgs e) { // intializing the sqlDataAdapter and dataSet sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT * FROM AP,sqlConnection1); sqlDataAdapter3. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT * FROM APusers,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1); sqlDataAdapter3. Fill(usersDataSet11); sqlDataAdapter2. AcceptChangesDuringFill = true; sqlDataAdapter3. AcceptChangesDuringFill = true; } private void Button9_Click(object sender, System. EventArgs e) //add button(users) { //saving the data the manager insert and adding it to the users table//goto each AP checked by the manager using SNMP protocol and add //them the user String user_name,user_id,user_MAC; String str2=,str3=; int i,j,tmp,k; user_name = TextBox1. Text. ToString(); user_id = TextBox2. Text. ToString(); user_MAC = TextBox5. Text. ToString(); int items = CheckBoxList1. Items. Count; // APs will hold the names of all the APs that the user // can access string[] APs = new string[items]; k=0; APs. Initialize(); try { apDataSet1. Clear(); sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT APname FROM AP,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1,AP); DataRow [] arr = apDataSet1. AP. Select(); i = arr. GetLength(0); // add this user to the table // str2 has the names of all the APs coulms // str3 has the values of all the coulms j=0; for(j=0;ji;j++) { str3= str3 + arr[j]. ItemArray. GetValue(0) .ToString()+, ; } str3 = str3. Remove(((str3. Length)-2),2); str2= +user_name +, + user_id +, +user_MAC + , ; tmp = CheckBoxList1. SelectedIndex; for(j=0;ji;j++) { if (tmp==j) { APs[k]=CheckBoxList2. SelectedItem. Text; k++; str2= str2 + 1, ; CheckBoxList1. SelectedItem. Selected = false; tmp = CheckBoxList1. SelectedIndex; } else str2= str2 + 0, ; } str2 = str2. Remove(((str2. Length)-2),2); SqlCommand insCommand = new SqlCommand( INSERT INTO APusers (userName, id_num, mac_adr, + str3 + ) VALUES ( + str2 + ),sqlConnection1); insCommand. Connection. Open(); insCommand. ExecuteNonQuery(); insCommand. Connection. Close(); sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT FROM AP,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1,AP); / the steps to update the access points:   1. for each AP in the APs array: *  Ã‚  Ã‚   1. 1 get the AP IP address from the AP database. 1. 2 get the add entry to table object ID *   1. 3 call snmpSET function */ /* String IPaddr,OID; * for(i=0;ik;i++)   {*     DataRow [] arr = apDataSet1. AP. Select(Apname ='+APs[i]+); *  Ã‚   IPaddr = arr[0]. ItemArray. GetValue(1). ToString(); *  Ã‚   OID = avaya. addEntry(); *  Ã‚   snmpexe. snmpSet(IPaddr,OID,user_MAC); * } */ } catch(Exception ev) { Label6. Text=ERROR ACSESSING THE DATABASE; } TextBox7. Text=; TextBox1. Text=; TextBox2. Text=; TextBox5. Text=; TextBox3. Text=; TextBox4. Text=; } private int GetIndexofelement(string [,] arr,string elem) { int j,i = arr. Length; for(j=0;ji;i++) { if (arr[0,j]. ToString() == elem) return j; } return -1; } private void Button3_Click(object sender, System. EventArgs e) //remove user button. { CheckBox1. Visible=false; Label12. Visible=false; TextBox7. Visible=false; DataGrid2. Visible=false; DataGrid1. Visible=false; Button9. Visible=false; TextBox1. Visible=false; TextBox2. Visible=false; Label3. Visible=false; TextBox5. Visible=false; Label10. Visible=false; Label4. Visible=false; Label5. Visible=false; CheckBoxList1. Visible=false; Label1. Visible=false; Label2. Visible=false; Button10. Visible=false; TextBox3. Visible=false; TextBox4. Visible=false; DropDownList2. Visible=false; Button8. Visible=false; DropDownList1. Visible=true; Button6. Visible=true; DropDownList3. Visible=false; Button12. Visible=false; Label13. Visible=false; Label14. Visible=false; Label15. Visible=false; Label16. Visible=false; TextBox6. Visible=false; TextBox8. Visible=false; TextBox9. Visible=false; CheckBoxList2. Visible=false; Button13. Visible=false; DropDownList4. Visible=false; Button16. Visible=false; Button15. Visible=false; Label11. Visible=false; Label17. Visible=false; Label18. Visible=false; TextBox11. Visible=false; TextBox12. Visible=false; TextBox10. Visible=false; CheckBox2. Visible=false; Label6. Text=Select the user you wish to remove and press remove; /////////////////// //bring the users list into the dropdown box DropDownList1. Items. Clear(); int i=0; try { usersDataSet11. Clear(); sqlDataAdapter3. SelectCommand. CommandText = SELECT userName FROM APusers; sqlDataAdapter3. Fill(usersDataSet11); DataRow [] arr = usersDataSet11. APusers. Select(); i = arr. GetLength(0); while (i! =0) { DropDownList1. Items. Add(arr[i-1]. ItemArray. GetValue(0). ToString()); i=i-1; } sqlDataAdapter3. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT * FROM APusers,sqlConnection1); sqlDataAdapter3. Fill(usersDataSet11,APusers); } catch(Exception ev) { Label6. Text=ERROR ACSESSING THE DATABASE; } } private void Button1_Click(object sender, System. EventArgs e)// add AP button { CheckBox1. Visible=true; Label12. Visible=true; TextBox7. Visible=true; DataGrid2. Visible=false; DataGrid1. Visible=false; Label1. Visible=true; Label2. Visible=true; Button10. Visible=true; TextBox3. Visible=true; TextBox4. Visible=true; TextBox5. Visible=false; Label10. Visible=false; Button9. Visible=false; TextBox1. Visible=false; TextBox2. Visible=false; Label3. Visible=false; Label4. Visible=false; Label5. Visible=false; CheckBoxList1. Visible=false; DropDownList1. Visible=false; Button6. Visible=false; DropDownList2. Visible=false; Button8. Visible=false; DropDownList3. Visible=false; Button12. Visible=false; Label13. Visible=false; Label14. Visible=false; Label15. Visible=false; Label16. Visible=false; TextBox6. Visible=false; TextBox8. Visible=false; TextBox9. Visible=false; CheckBoxList2. Visible=false; Button13. Visible=false; DropDownList4. Visible=false; Button16. Visible=false; Button15. Visible=false; Label11. Visible=false; Label17. Visible=false; Label18. Visible=false; TextBox11. Visible=false; TextBox12. Visible=false; TextBox10. Visible=false; CheckBox2. Visible=false; Label6. Text=Insert the AP detials and press add; } private void Button4_Click(object sender, System. EventArgs e) //remove AP button. { CheckBox1. Visible=false; Label12. Visible=false; TextBox7. Visible=false; DataGrid2. Visible=false; DataGrid1. Visible=false; DropDownList2. Visible=true; Button8. Visible=true; Button9. Visible=false; TextBox5. Visible=false; Label10. Visible=false; TextBox1. Visible=false; TextBox2. Visible=false; Label3. Visible=false; Label4. Visible=false; Label5. Visible=false; CheckBoxList1. Visible=false; DropDownList1. Visible=false; Button6. Visible=false; Label1. Visible=false; Label2. Visible=false; Button10. Visible=false; TextBox3. Visible=false; TextBox4. Visible=false; DropDownList3. Visible=false; Button12. Visible=false; Label13. Visible=false; Label14. Visible=false; Label15. Visible=false; Label16. Visible=false; TextBox6. Visible=false; TextBox8. Visible=false; TextBox9. Visible=false; CheckBoxList2. Visible=false; Button13. Visible=false; DropDownList4. Visible=false; Button16. Visible=false; Button15. Visible=false; Label11. Visible=false; Label17. Visible=false; Label18. Visible=false; TextBox11. Visible=false; TextBox12. Visible=false; TextBox10. Visible=false; CheckBox2. Visible=false; Label6. Text=Select the AP you wish to remove and press remove; //bring the APs list into the dropdown box try { DropDownList2. Items. Clear(); int i=0; apDataSet1. Clear(); sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT APname FROM AP,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1,AP); DataRow [] arr = apDataSet1. AP. Select(); i = arr. GetLength(0); while (i! =0) { DropDownList2. Items. Add(arr[i-1]. ItemArray. GetValue(0). ToString()); i=i-1; } sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT * FROM AP,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1,AP); } catch(Exception ev) { Label6. Text=ERROR ACSESSING THE DATABASE; } } private void Button5_Click(object sender, System. EventArgs e) //show all users button { CheckBox1. Visible=false; Label12. Visible=false; TextBox7. Visible=false; DataGrid2. Visible=false; DataGrid1. Visible=true; Button9. Visible=false; TextBox1. Visible=false; TextBox2. Visible=false; TextBox5. Visible=false; Label10. Visible=false; Label3. Visible=false; Label4. Visible=false; Label5. Visible=false; CheckBoxList1. Visible=false; DropDownList1. Visible=false; Button6. Visible=false; Label1. Visible=false; Label2. Visible=false; Button10. Visible=false; TextBox3. Visible=false; TextBox4. Visible=false; DropDownList2. Visible=false; Button8. Visible=false; DropDownList3. Visible=false; Button12. Visible=false; Label13. Visible=false; Label14. Visible=false; Label15. Visible=false; Label16. Visible=false; TextBox6. Visible=false; TextBox8. Visible=false; TextBox9. Visible=false; CheckBoxList2. Visible=false; Button13. Visible=false; DropDownList4. Visible=false; Button16. Visible=false; Button15. Visible=false; Label11. Visible=false; Label17. Visible=false; Label18. Visible=false; TextBox11. Visible=false; TextBox12. Visible=false; TextBox10. Visible=false; CheckBox2. Visible=false; try { sqlDataAdapter3. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT * FROM APusers,sqlConnection1); sqlDataAdapter3. Fill(usersDataSet11,APusers); DataGrid1. DataSource = usersDataSet11; DataGrid1. DataBind(); } catch(Exception ev) { Label6. Text=ERROR ACSESSING THE DATABASE; } Label6. Text=which operation would you like to perform? ; } private void Button6_Click(object sender, System. EventArgs e) // remove button(users) { //goto all APs listed for this user and remove the user from //ther table and then remove the user from the data base String user_name; try { user_name = DropDownList1. SelectedItem. Text. ToString(); Label6. Text=Remove user + user_name; /* * the steps to update the access points: * 0. create an array with the APs name * 1. for each AP in the APs array: *  Ã‚  Ã‚   1. 1 get the AP IP address from the AP database *  Ã‚  Ã‚   1. 2 get the remove entry to table object ID *  Ã‚  Ã‚   1. 3 call snmpSET function */ /* String IPaddr,OID; * for(i=0;ik;i++) * { *  Ã‚   DataRow [] arr = apDataSet1. AP. Select(APname ='+APs[i]+); *  Ã‚   IPaddr = arr[0]. ItemArray. GetValue(1). ToString(); *  Ã‚   OID = avaya. removeEntry(); *  Ã‚   snmpexe. snmpSet(IPaddr,OID,user_MAC); * } */ SqlCommand DelCommand = new SqlCommand(DELETE FROM APusers WHERE userName = + user_name + ,sqlConnection1); DelCommand. Connection. Open(); DelCommand. ExecuteNonQuery(); DelCommand. Connection. Close(); usersDataSet11. Clear(); sqlDataAdapter2. Fill(apDataSet1); sqlDataAdapter3. Fill(usersDataSet11); //todo: refrash list DropDownList1. Items. Clear(); int i=0; usersDataSet11. Clear(); sqlDataAdapter3. SelectCommand = new SqlCommand( SELECT userName FROM APusers,sqlConnection1); sqlDataAdapter3. Fill(usersDataSet11); DataRow [] arr = usersDataSet11. APusers. Select(); i = arr. GetLength(0); while (i! =0) { DropDownList1. Items. Add(arr[i-1]. ItemArray. GetValue(0). ToString()); i=i-1; } sqlDataAdapter3. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT * FROM APusers,sqlConnection1); sqlDataAdapter3. Fill(usersDataSet11,APusers); } catch(Exception ev). {Label6. Text=ERROR ACSESSING THE DATABASE; } } private void Button10_Click(object sender, System. EventArgs e) //add button(AP) {//updata the APs table and init the AP String AP_name,AP_ip,Location; bool active; try { AP_name = TextBox3. Text. ToString(); AP_ip = TextBox4. Text. ToString(); Location = TextBox7. Text. ToString(); active = CheckBox1. Checked; apDataSet1. AP. AddAPRow(AP_name,AP_ip,Location,active); sqlDataAdapter2. Update(apDataSet1); SqlCommand myCommand = new SqlCommand(ALTER TABLE APusers ADD +AP_name+ bit,sqlConnection1); myCommand. Connection. Open(); myCommand. ExecuteNonQuery(); myCommand. Connection. Close(); //todo: make all the users in the APusers table marked as not allowed to this AP myCommand = new SqlCommand( UPDATE APusers SET +AP_name+= 0,sqlConnection1); myCommand. Connection. Open(); myCommand. ExecuteNonQuery(); myCommand. Connection. Close(); /* the steps to update the access points: * 1. connect to the AP IP address from the AP database * 2. get the remove entry to table object ID *3. call snmpSET function */ /* String IPaddr,OID; * for(i=0;ik;i++) * { *  Ã‚   OID = avaya. setName(); *  Ã‚   snmpexe. snmpSet(AP_ip,OID,AP_name); *  Ã‚   OID = avaya. setLocation(); *  Ã‚   snmpexe. snmpSet(AP_ip,OID,Location); * }   */ }catch(Exception ev) { Label6. Text=ERROR ACSESSING THE DATABASE; } TextBox7. Text=; TextBox1. Text=; TextBox2. Text=; TextBox5. Text=; TextBox3. Text=; TextBox4. Text=; } private void Button8_Click(object sender, System. EventArgs e) //remove button(AP) {//remove the APs table String AP_name; try { AP_name = DropDownList2. SelectedItem. Text. ToString(); Label6. Text=Removing AP + AP_name; SqlCommand DelCommand = new SqlCommand(DELETE FROM AP WHERE APname = + AP_name + ,sqlConnection1); DelCommand. Connection. Open(); DelCommand. ExecuteNonQuery(); DelCommand. Connection. Close(); apDataSet1. Clear();sqlDataAdapter2. Fill(apDataSet1); sqlDataAdapter3. Fill(usersDataSet11); sqlDataAdapter2. AcceptChangesDuringFill = true; sqlDataAdapter3. AcceptChangesDuringFill = true; DataGrid1. DataSource = apDataSet1; DataGrid1. DataBind(); //todo: refrash list DropDownList2. Items. Clear(); int i=0; apDataSet1. Clear(); sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT APname FROM AP,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1,AP); DataRow [] arr = apDataSet1. AP. Select(); i = arr. GetLength(0); while (i! =0) { DropDownList2. Items. Add(arr[i-1]. ItemArray. GetValue(0). ToString()); i=i-1; } sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT * FROM AP,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1,AP); //todo: remove the AP_name culomn from the APusers table SqlCommand myCommand = new SqlCommand(ALTER TABLE APusers DROP COLUMN +AP_name,sqlConnection1); myCommand. Connection. Open(); myCommand. ExecuteNonQuery(); myCommand. Connection. Close(); } catch(Exception ev) { Label6. Text=ERROR ACSESSING THE DATABASE; } /*SNMP: * goto the selected AP * a. go to the data base and get the AP IP number * b. snmp. snmpSet(IP,DisableAllUsers) */ } private void Button2_Click(object sender, System. EventArgs e) // add user button. { int i=0; CheckBox1. Visible=false; Label12. Visible=false; TextBox7. Visible=false; DataGrid2. Visible=false; DataGrid1. Visible=false; Button9. Visible=true; TextBox1. Visible=true; TextBox2. Visible=true; TextBox5. Visible=true; Label10. Visible=true; Label3. Visible=true; Label4. Visible=true; Label5. Visible=true; CheckBoxList1. Visible=true; DropDownList1. Visible=false; Button6. Visible=false; Label1. Visible=false; Label2. Visible=false; Button10. Visible=false; TextBox3. Visible=false; TextBox4. Visible=false; DropDownList2. Visible=false; Button8. Visible=false; DropDownList3. Visible=false; Button12. Visible=false; Label13. Visible=false; Label14. Visible=false; Label15. Visible=false; Label16. Visible=false; TextBox6. Visible=false; TextBox8. Visible=false; TextBox9. Visible=false; CheckBoxList2. Visible=false; Button13. Visible=false; DropDownList4. Visible=false; Button16. Visible=false; Button15. Visible=false; Label11. Visible=false; Label17. Visible=false; Label18. Visible=false; TextBox11. Visible=false; TextBox12. Visible=false; TextBox10. Visible=false; CheckBox2. Visible=false; Label6. Text=Insert the user detials and press add; //bring to the checkbox list all the APs available CheckBoxList1. Items. Clear(); apDataSet1. Clear(); Try { sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT APname FROM AP,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1,AP); DataRow [] arr = apDataSet1. AP. Select(); i = arr. GetLength(0); int j =i; while (i! =0) { CheckBoxList1. Items. Add(arr[j-i]. ItemArray. GetValue(0). ToString()); i=i-1; } sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT * FROM AP,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1,AP); } catch(Exception ev) { Label6. Text=ERROR ACSESSING THE DATABASE; } } private void Button11_Click(object sender, System. EventArgs e) //show all APs button { CheckBox1. Visible=false; Label12. Visible=false; TextBox7. Visible=false; DataGrid2. Visible=true; DataGrid1. Visible=false; Button9. Visible=false; TextBox1. Visible=false; TextBox2. Visible=false; TextBox5. Visible=false; Label10. Visible=false; Label3. Visible=false; Label4. Visible=false; Label5. Visible=false; CheckBoxList1. Visible=false; DropDownList1. Visible=false; Button6. Visible=false; Label1. Visible=false; Label2. Visible=false; Button10. Visible=false; TextBox3. Visible=false; TextBox4. Visible=false; DropDownList2. Visible=false; Button8. Visible=false; DropDownList3. Visible=false; Button12. Visible=false; Label13. Visible=false; Label14. Visible=false; Label15. Visible=false; Label16. Visible=false; TextBox6. Visible=false; TextBox8. Visible=false; TextBox9. Visible=false; CheckBoxList2. Visible=false; Button13. Visible=false; DropDownList4. Visible=false; Button16. Visible=false; Button15. Visible=false; Label11. Visible=false; Label17. Visible=false; Label18. Visible=false; TextBox11. Visible=false; TextBox12. Visible=false; TextBox10. Visible=false; CheckBox2. Visible=false; try { DataGrid2. DataSource = apDataSet1; DataGrid2. DataBind(); } catch(Exception ev) { Label6. Text=ERROR ACSESSING THE DATABASE; } Label6. Text=which operation would you like to perform?; } private void Button7_Click(object sender, System. EventArgs e) { CheckBox1. Visible=false; Label12. Visible=false; TextBox7. Visible=false; DataGrid2. Visible=false; DataGrid1. Visible=false; Button9. Visible=false; TextBox1. Visible=false; TextBox2. Visible=false; Label3. Visible=false; TextBox5. Visible=false; Label10. Visible=false; Label4. Visible=false; Label5. Visible=false; CheckBoxList1. Visible=false; Label1. Visible=false; Label2. Visible=false; Button10. Visible=false; TextBox3. Visible=false; TextBox4. Visible=false; DropDownList2. Visible=false; Button8. Visible=false; DropDownList1. Visible=false; Button6. Visible=false; DropDownList3. Visible=true; Button12. Visible=true; Label13. Visible=false; Label14. Visible=false; Label15. Visible=false; Label16. Visible=false; TextBox6. Visible=false; TextBox8. Visible=false; TextBox9. Visible=false; CheckBoxList2. Visible=false; Button13. Visible=false; DropDownList4. Visible=false; Button16. Visible=false; Button15. Visible=false; Label11. Visible=false; Label17. Visible=false; Label18. Visible=false; TextBox11. Visible=false; TextBox12. Visible=false; TextBox10. Visible=false; CheckBox2. Visible=false; Label6. Text=Select the user whose details you wish to update; bring the users list into the dropdown box DropDownList3. Items. Clear(); int i=0; try { usersDataSet11. Clear(); sqlDataAdapter3. SelectCommand. CommandText = SELECT userName FROM APusers; sqlDataAdapter3. Fill(usersDataSet11); DataRow [] arr = usersDataSet11. APusers. Select(); i = arr. GetLength(0); while (i! =0) { DropDownList3. Items. Add(arr[i-1]. ItemArray. GetValue(0). ToString()); i=i-1; } sqlDataAdapter3. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT * FROM APusers,sqlConnection1); sqlDataAdapter3. Fill(usersDataSet11,APusers); } catch(Exception ev) { Label6. Text=ERROR ACSESSING THE DATABASE; } }private void Button12_Click(object sender, System. EventArgs e) { string user, id_num, mac_addr; int i=3, length; int APnum; user= DropDownList3. SelectedItem. Text. ToString(); original = user; Label6. Text=Update user + user; DropDownList3. Visible=false; Button12. Visible=false; Label13. Visible=true; Label14. Visible=true; Label15. Visible=true; Label16. Visible=true; TextBox6. Visible=true; TextBox8. Visible=true; TextBox9. Visible=true; CheckBoxList2. Visible=true; Button13. Visible=true; //filling the text boxs with the existing user data CheckBoxList2. Items. Clear(); sqlDataAdapter3. Fill(usersDataSet11); DataRow [] arr = usersDataSet11. APusers. Select(userName ='+user+); id_num = arr[0]. ItemArray. GetValue(1). ToString(); mac_addr = arr[0]. ItemArray. GetValue(2). ToString(); //displaying the current user data in text boxs TextBox6. Text=user; TextBox8. Text=id_num; TextBox9. Text=mac_addr; CheckBoxList2. Items. Clear(); apDataSet1. Clear(); try { sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT APname FROM AP,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1,AP); DataRow [] arr1 = apDataSet1. AP. Select(); APnum = arr1. GetLength(0); i = APnum; int j =i; while (i! =0) { CheckBoxList2. Items. Add(arr1[j-i]. ItemArray. GetValue(0). ToString()); i=i-1; } sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT * FROM AP,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1,AP); for(i=0;iAPnum;i++) { SqlCommand myCommand = new SqlCommand( SELECT + CheckBoxList2. Items[i]. Text + FROM APusers WHERE (userName = + user +),sqlConnection1); myCommand. Connection. Open(); SqlDataReader data = myCommand. ExecuteReader(); data. Read(); CheckBoxList2. Items[i]. Selected = data. GetBoolean(0); myCommand. Connection. Close(); } } catch(Exception ev) { Label6. Text=ERROR ACSESSING THE DATABASE; } } private void Button13_Click(object sender, System. EventArgs e) { String user_name,user_id,user_MAC; String str2=,str3=; int i,j,tmp; user_name = TextBox6. Text. ToString(); user_id = TextBox8. Text. ToString(); user_MAC = TextBox9. Text. ToString(); int items = CheckBoxList2. Items. Count; try { apDataSet1. Clear(); sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT APname FROM AP,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1,AP); DataRow [] arr = apDataSet1. AP. Select(); i = arr. GetLength(0); //todo: add this user to the table //todo: create str2 with the names of all the APs coulms //todo: create str3 with the values of all the coulms j=0; for(j=0;ji;j++) { str3= str3 + arr[j]. ItemArray. GetValue(0). ToString()+, ; } str3 = str3. Remove(((str3. Length)-2),2); Label6. Text =CheckBoxList2. SelectedIndex. ToString(); str2= +user_name +, + user_id +, +user_MAC + ,; tmp = CheckBoxList2. SelectedIndex; for(j=0;ji;j++) { if (tmp==j) { str2= str2 + 1, ; CheckBoxList2. SelectedItem. Selected = false; tmp = CheckBoxList2. SelectedIndex; } else str2= str2 + 0, ; } str2 = str2. Remove(((str2. Length)-2),2); Label6. Text =str2; SqlCommand delCommand = new SqlCommand(DELETE FROM APusers WHERE userName = + original + ,sqlConnection1); delCommand. Connection. Open(); delCommand. ExecuteNonQuery(); delCommand. Connection. Close(); SqlCommand insCommand = new SqlCommand(INSERT INTO APusers (userName, id_num, mac_adr, + str3 + ) VALUES ( + str2 + ),sqlConnection1); insCommand. Connection. Open(); insCommand. ExecuteNonQuery(); insCommand. Connection. Close(); sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT * FROM AP,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1,AP); } catch(Exception ev) { Label6. Text=ERROR ACSESSING THE DATABASE; } /*SNMP: * goto the selected user * a. get all the APs IP numbers * b. for each IP *  Ã‚  Ã‚      if checked. *  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   snmp. snmpSet(IP,addUsers) *  Ã‚  Ã‚      else *  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   snmp. snmpSet(IP,removeUsers) */ Label13. Visible=false; Label14. Visible=false; Label15. Visible=false; Label16. Visible=false; TextBox6. Visible=false; TextBox8. Visible=false; TextBox9. Visible=false; CheckBoxList2. Visible=false; Button13. Visible=false; } private void Button14_Click(object sender, System. EventArgs e) { CheckBox1. Visible=false; Label12. Visible=false; TextBox7. Visible=false; DataGrid2. Visible=false; DataGrid1. Visible=false; Button9. Visible=false; TextBox1. Visible=false; TextBox2. Visible=false; TextBox5. Visible=false; Label10. Visible=false; Label3. Visible=false; Label4. Visible=false; Label5. Visible=false; CheckBoxList1. Visible=false; DropDownList1. Visible=false; Button6. Visible=false; Label1. Visible=false; Label2. Visible=false; Button10. Visible=false; TextBox3. Visible=false; TextBox4. Visible=false; DropDownList2. Visible=false; Button8. Visible=false; DropDownList3. Visible=false; Button12. Visible=false; Label13. Visible=false; Label14. Visible=false; Label15. Visible=false; Label16. Visible=false; TextBox6. Visible=false; TextBox8. Visible=false; TextBox9. Visible=false; CheckBoxList2. Visible=false; Button13. Visible=false; DropDownList4. Visible=true; Button16. Visible=true; Button15. Visible=false; Label11. Visible=false; Label17. Visible=false; Label18. Visible=false; TextBox11. Visible=false; TextBox12. Visible=false; TextBox10. Visible=false; CheckBox2. Visible=false; Label6. Text=Select the AP you wish to update and press select; //bring the APs list into the dropdown box try { DropDownList4. Items. Clear(); int i=0; apDataSet1. Clear(); sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT APname FROM AP,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1,AP); DataRow [] arr = apDataSet1. AP. Select(); i = arr.

Sunday, July 21, 2019

Unethical Marketing Research Practices

Unethical Marketing Research Practices Practices in relation to proposals constitute a breach of professionalism, courtesy and ethics, research managers should understand that, Examples of common faults: Added consulting services prior to winning the assignment, expecting the research company to provide value Developing research instruments and special exercises and providing customized local market information. These may include project design, However, it is wrong to make this an expectation., the research company may wish to supply some of these services to place themselves in a better competitive position; In order to place the second in a better competitive position, disclosing details of one Research Companys proposal to another Company information and pricing structure the research companys approach should be treated as proprietary and confidential. Research managers should not use another company as a lever or check on a regular supplier, seeking comparison bids without charge Evaluating Research The process of vendor selection can sometimes become derailed by individual egos and political dynamics which are harmful to successful study execution and should be avoided, the research manager typically must review them with senior research, brand and marketing management. The consultants personal qualities including their level of enthusiasm, poise and professionalism as well as the skills and professional capabilities offered by the research company, primary criteria that should be applied in the selection process are the fit between the projects substantive requirements and the research manager should be certain that the proposals offered are equivalent in all respects, particularly in terms of specifications and possible hidden costs not apparent in the quotation Unethical Practices in Marketing RESEARCH SUPPLIERS Low-ball pricing Underpaying field services Lack of objectivity Abuse of respondents Selling unnecessary research Violating client confidentiality Research Clients Issuing bid requests when a supplier has been predetermined Obtaining free advice and methodology via bid requests Making false promises Unauthorized requests for proposals Field Services Law-ball Pricing What Is Low Balling the Price When Buying Car? Car dealers are often stereotyped as tricky and dishonest, and the car buying experience is viewed as an adversarial contest between the customer and salesperson. While its not always that way, there are some dishonest dealerships and salespeople who will use unethical practices to sell their cars. One of these practices is known as lowball. Not every dealer will use it, but you should be aware of it in case someone tries it. If they do, you should know how to handle it. Lowball the price of a car means offering to sell it at an unrealistically low price. For example, a car dealer might offer you a vehicle for $27,000 even though it normally sells for a minimum of $30,000. Unfortunately, the dealer has no intention of actually selling the car at that price. Its an underhanded tactic to get you through the door. There are two purposes for giving you a lowball offer. If you are shopping around, Roosevelt Gist of Auto Network says a salesperson will give a lowball price to ensure that you will come back. He knows that no other dealer will be able to meet the offer, so he wants to guarantee your return. He wont give you anything in writing, and when you return he wont honor the price. Youll get an excuse like you misunderstood or the sales manager wouldnt approve it or the car has been sold. Instead, youll find yourself back in negotiations. The second purpose is to get you into the dealership if you have not been there yet. If you are shopping via email or over the phone, the dealer may call you with a price that sounds too good to be true. When you arrive, he wont honor the price. It may seem that lowball would turn off buyers, but some dealers get good results with this tactic. If youre shopping over the phone or via email and he can get you through the door, he hopes that you wont want to be bothered shopping around at other dealers. If he can get you to do a test drive and engage you in negotiations, he hopes to make a sale. If youre already at the dealership after shopping around, he is counting on the fact that you are tired and will give in to the higher price. The best reaction when you have been lowballs to simply walk out the door. Once you see the dealer has no intention of honoring the price, youll also see that he is not above using dishonest tactics. Its better to spending more time shopping around than to deal with an unethical business. You can prevent lowball by asking the salesperson to put his offer in writing if it sounds unusually low. If he makes the offer over the phone, ask him to send you an email or fax you a written confirmation before you visit the dealership. If he refuses to do this, dont bother going to the dealership. Youve probably gotten a lowball offer that will not be honored when you arrive. Lake of Objectivity How to Avoid Unethical Behaviors and Dirty Tricks of Realtors Since the commissions of the Real Estate Agent are being paid by the seller of the house a buyer cannot relay on his objectivity or impartial conduct, like in many professions and occupations there are honest and ethical people and there are some who arent exactly as since without a buyer there is no deal, the seller can expect the agent to exert pressure to lower the selling price. Therefore he would do anything in his power to make the buyer pay more than he wanted and on the other hand (the good hand :-), push the seller to settle for less than he hoped to be paid for his property. In short, the agents main interest is to make sure that there would be a sale, so he would be able to get his commission , what we would concentrate here though, is the unethical dirty tricks and manipulations some of the Real Estate agents are using in order to achieve it. In general it make sense to bring both sides to agree on realistic price that can cut a deal Misconduct of Agents to Seller The sellers are the biggest losers from the real estate agents tricks Home owners are often duped into paying money to agents before their homes are sold. If their home does not sell, or it sells for less than the consumer was led to believe, this money, which often amounts to thousands of dollars, is lost. Purpose of advertising is NOT to sell homes, but to raise the profile of agents; this is at the direct expense of home sellers. Home sellers are being convinced by a rational that the price goes up at auctions but the reason the price goes up at auction is because it starts at a very low price. The truth is that auctions get lower prices more often than they get higher prices. Among agents, an auction is considered the fastest and best conditioning method. Home Owners lose millions through having their homes undersold at auctions.. It is a common deceit. At other times, home sellers are given totally fictitious offers in order to convince them to lower prices, many agents submit offers to sellers which are lower than the offer actually made by the buyers. This reckless disregard for the personal safety of home-owners is a serious ethical concern. Open Inspections, Almost anyone can walk through a family home without identification. Agents will say that there has been lots of activity and, if no one has bought, the price must be lowered. But agents do not say that the people who looked were not qualified Also, the more lookers who can be attracted to an open inspection the easier it is to persuade the owner to reduce the price. Abuse of Respondents Often, an association and its members will have already heard rumors or seen patterns of wrongdoing before a crisis becomes public. By choosing to do nothing then-or even after a scandal breaks-associations have failed their professions and industries. Leadership and quick action to shore up public trust is needed. I am convinced that many associations have failed their professions and industries in times of scandal and crisis. But what should an association do when one or more of its members is waist-deep in a public scandal? Here are a few suggestions: Condemn the sin, not the sinner. Public confidence in a profession or industry demands that the profession always be ready to draw clear lines between acceptable and unacceptable behavior. It is possible to make a strong and timely statement on the ethics of a specific behavior without judging whether the particular behavior has occurred in this case or whether a specific executive is guilty. The first response of an association must be to label the unethical behavior for what it is Ask the accused to step aside. It should be an unwritten law of associations and professional societies that accused individuals step aside temporarily until charges are resolved. The credibility of any association depends on the integrity of its leaders. This does not admit guilt, but simply respects the special role of the association. Pull the trigger if guilt is established. If the guilt of an individual or member firm is established, then the association must act to force the resignation or withdraw the membership of the guilty. Cases where guilt is never proven, but the stench of scandal is strong, present harder choices. Associations must be in the business of building public trust. Quiet action to force the resignation of an association board member may be called for. If an association today does not have a process for throwing out a member, it had better create one. Define and advocate best ethical practices, not just minimum behaviors. Association codes designed to define and advocate exemplary rather than minimal behaviors. In todays ethical climate, restoring trust will require a focus on best practices and exemplary behavior If only the lower boundary is established, those inclined to wrongdoing will always be probing how low is low, most association and industry codes of ethical conduct are least common denominators, a list of provisions that virtually every member can agree to because the standards are so low Keep your ethics current with the changing nature of your profession or industry. Ethical norms codified by the firms and their associations in the past addressed problems of a simpler time. Only through visionary action and timely debate on new ethical issues facing the profession or industry will public credibility and trust be sustained The ethical failures in the accounting, financial services, health care, and telecommunications industries can in part be attributed to the rapidly changing structure and altered characteristics of those industries Selling unnecessary Research Admittedly, people assume different approaches to managing their visibility. On the contrary, years of BSRP research finds that in our culture, if you want to get paid what youre worth, its essential. Doing whatever you can to direct attention to the competencies you have, and contributions you make, is not inherently wrong or evil. Some are narcissistic and vain but not necessarily unethical. However, there are some people who plainly do not subscribe to conventional rule of conduct. To them, for example, the rhetoric of principles, values and integrity only serves as an additional device which can be used to scam others. Their unrestrained behavior taints ethical self-projection for everyone. They may be tedious and boring, but they are not necessarily unethical. The result is a catalog of twenty-two behavioral tools unethical self-promoters tend to use. How many have you experienced? Well intended people are content to practice appropriate self-presentation, when they can, moderated by a sense of honor, respect for the truth and prudent regard for the feelings of others For 30 years we have been observing those devices in use, especially as they are used by salespeople, managers, executives, ex-clergy, consultants, psychologists, and others. Violating Client Confidentiality Temptation grows stronger when were tired, afraid, under pressure, or in conflict all of us face the human temptation to duck important ethical responsibilities. By making what we know or suspect is unethical seem perfectly ethical. Common cognitive strategies can fool us They can spin the most questionable behaviors into ethical ideals. The most common ethical fallacies rely on twisted judgment, appealing fallacies, and juggled language. To restate a major theme of this book: We believe that the overwhelming majority of psychologists are conscientious, caring individuals, committed to ethical behavior. We also believe that all of us are fallible, no one is perfect in all areas at all times, and we all share vulnerabilities at one time or another to at least a few of these ethical justifications. What sorts of cognitive maneuvers can transform unethical behavior into the ethical ideal? Many of the justifications below appeared in previous editions of this book, and some were added when the list appeared in Here are a few. We encourage readers to expand the list. Unethical not as long as a managed care administrator or insurance case reviewer required or suggested it. Unethical not what sorts of cognitive maneuvers can transform unethical behavior into the ethical ideal? if the American Psychological Association or similar organization allows it. Unethical not if an ethics code never mentions the concept, term, or act Unethical not as long as any law was broken. If someone discovers that our c.v. is full of degrees we never earned, positions we never held, and awards we never received, all we need do is non defensively acknowledge that mistakes were made and its time to move on Its not unethical as long as we can name others who do the same thing. unethical not if we can use the passive voice and look ahead. Its not unethical as long as we didnt mean to hurt anyone. unethical not even if our acts have caused harm as long as the person we harmed had it coming, provoked us, deserved it, was really asking for it, or practically forced us to do it or, failing that, has not behaved perfectly, is in some way unlikable, or is acting unreasonably. without any doubt whatsoever that exactly what we did was the necessary and sufficient proximate cause of harm to the client and that the client would otherwise be free of all physical and psychological problems. Its not unethical as long as there is no body of universally accepted, methodologically perfect (i.e., without any flaws, weaknesses, or limitations) studies showing -, difficulties, or challenges. Its not unethical if we could not (or did not) anticipate the unintended consequences of our acts. For example, it may seem as if a therapist who has submitted hundreds of thousands of dollars worth of bogus insurance claims for patients he never saw might have behaved unethically. Its not unethical if we acknowledge the importance of judgment, consistency, and context. : It was simply an error in judgment, completely inconsistent with the high ethics manifest in every other part of the persons life, and insignificant in the context of the unbelievable good that this person does. However, as attorneys and others representing such professionals often point out Use of professional Respondents Unethical Behavior Its Impact on Todays Workplace Such unethical behaviors include a wide variety of different activities. Among the most common unethical business behaviors of employees are making long-distance calls on business lines, duplicating software for use at home, falsifying the number of hours worked, or much more serious and illegal practices, such as embezzling money from the business, or falsifying business records. Though there is sometimes a difference between behaviors that are unethical and activities that are actually illegal, it is up to the business itself to decide how it deals with unethical behavior legal or not. It is a sad truth that the employees of just about every business, in every business, will occasionally encounter team members who are taking part in unethical behaviors. After all, unethical behavior that is not illegal frequently falls in a grey area between right and wrong that make it difficult to decide what to do when it is encountered. Many employees find that discovering unethical behavior among co-workers actually tests their own values and ethical behaviors. For example, some people feel that it is alright to tell a little white lie, or to make one long distance call on the companys nickel, as long as they can justify it in their mind. Furthermore, different people have different views regarding what is ethical and what is unethical. Employee needs to consider how s/he feels about that particular activity, as well as informing about that activity, or turning a blind eye. When employees discover other employees doing something that they know is wrong by the companys standards, their own sense of what is right and what is wrong instantly comes into question The first step is to create a company policy, in writing, that is read and signed by each employee. This erases most feelings of ambiguity when it comes to deciding what to do after witnessing an unethical behavior Should the employee speak to the individual directly, or should the employee head directly to a company supervisor? Even by deciding to do something about it, the employee who has discovered the unethical behavior is presented with a number of difficult choices. To make this decision a bit easier, many companies have adopted several techniques that allow for the management of unethical activities. With clear instructions, there will be less hesitation in reporting unethical activities, and then they can be dealt with quickly and relatively easily, before they develop into overwhelming issues the second is to give a clear outline of what is expected of the person who has discovered the unethical behavior. It should include the person who should be contacted, and how to go about doing it. Furthermore, the repercussions of unethical behaviors should be clearly stated. both the person doing the activity, and the witness to the activity will be well aware of the way that things will be dealt with, and there wont be any risk of someone not reporting unethical behavior because theyre afraid that the culprit will be unfairly treated. Communication is key in the proper management of unethical behavior in todays workplace. RESOURCES Hagan, F. (2000). Research Methods in Criminal Justice and Criminology. Boston: Allyn Bacon. Lasley, J. (1999). Essentials of Criminal Justice and Criminological Research. NJ: Prentice Hall Neuman, L. B. Wiegand. (2000). Criminal Justice Research Methods. Boston: Allyn Bacon. Reynolds, P. (1982). Ethics and Social Science Research. Englewood Cliffs, NJ: Prentice Hall. Senese, J. (1997). Applied Research Methods in Criminal Justice. Chicago: Nelson Hall. Not an official webpage of APSU, copyright restrictions apply, see Megalinks in Criminal Justice OConnor, T. (Date of Last Update at bottom of page). In Part of web cited (Windows name for file at top of browser), MegaLinks in Criminal Justice. Retrieved from http://www.apsu.edu/oconnort/rest of URL accessed on todays date.

Saturday, July 20, 2019

Live Flesh by Pedro Almodovar: Scene Analysis :: essays research papers

Pedro Almodovar’s 1997 film Live Flesh (Carne Tremula), is rich in both visual and story elements, making in the perfect candidate for a scene analysis. Upon writing this paper, however, this was almost to my disadvantage. I watched it through and whittled it down to about five scenes I considered analyzing. This self-challenge is a testament to not only this film, but Almodovar’s whole body of work; he has created so many thoughtful, intricate, and all together entertaining films in his career, I had to somehow forgive myself for just choosing one short scene out of only one of his movies for analysis. So, without further ado, here is an analysis of a scene from Live Flesh. The scene I chose to analyze is the one in which David (Javier Bardem) returns home from a basketball game, only to find out his wife, Elena (Francesca Neri) has slept with another man. It occurs at roughly an hour and 17 minutes into the film, and is relatively short, but extremely powerful. The opening shot to the scene of Elena returning home from her tryst early in the morning. She enters the shower and begins to smell her naked body, seemingly bringing back memories from the previous night. Every time she inhales, she lets out an orgasmic sigh, which makes it clear to the audience exactly what she is recalling. With each sigh it seems that she not only had an amazing sexual experience, but that she also doesn’t regret it at all. This is until her last deep breathe. After this, she pauses for a beat, and in this moment, a look of full realization about the events of the past night washes over her face. This moment is fleeting, however, because right when she turns the shower on, she closes her eyes, as if she is recalling not only the scents of the night before, but even the sights and sounds. As soon as she stops moving and cracks a smile, the shot quickly changes to David’s cab pulling up. The cab symbolizes David’s dependence, in that all he can do is sit in the back and tell the driver where to go, showing that his disability has forced him to become dependent on so many different people. The fact that David’s cab was shown right as Elena began to smile shows that David’s dependence is preventing Elena from truly being happy, which I’m sure is a struggle in any relationship involving a handicapped person.

Friday, July 19, 2019

Radio Frequency Identification (RFID) Essay -- Radio Frequency Identif

The innovation of the RFID chip or the Radio Frequency Identification has been a critical piece of technology that has been around since the early/mid 20th century (est 1938). Functions of a radio frequency identification (RFID) tagging system involves a tag and a reader. When scanned, the antenna within the tag picks up the radio wave and sends a response back to the reader. This technology is being used for both short range and also long range identification, in the short-range identification category, this innovation is used in practical applications like credit cards (pay wave, tap and go ect...), animal identification (domestic pets, farm animals). The long range applications of the RFID chip is used in aeroplanes to bounce back a signal to radio control signifying their plane identification, the long range application of the chip is used in many other systems for similar purposes. the RFID chip is used all around the would and has and is readily available for the past few decades. The RFID chip is used by many agencies including federal agencies and also used for municipal and state and also local agencies. E.G.. RFID for Federal Agencies * Border and Immigration Security * Cargo and Container Security * Food and Cold Chain Safety (Product Authentication and Temperature Tracking) * Livestock & AgricultureTracking * Military Personnel Relocation Services * Military Supply Chain (Supply chain Shipping, * Receiving and Logistics) * Pharmaceutical Track and Trace Trusted Traveler Control Systems aeroplane tracking/ID RFID for Municipal and State and Local Agencies * Asset & Inventory Control * Firefighter Locationing /Emergency Service Personnel Locationing * First Responder Evacuation Services * Lib... ...lter, 2001, pp. 445--456) Motorolasolutions.com. 2014. RFID Government Solutions - Motorola Solutions USA. [online] Available at: http://www.motorolasolutions.com/US-EN/Business+Solutions/Industry+Solutions/Government/Airports+and+Seaports/RFID_Government_Solutions_US-EN Wikipedia. 2014. Radio-frequency identification. [online] Available at: http://en.wikipedia.org/wiki/Radio-frequency_identification [Accessed: 11 Feb 2014]. Wikipedia. 2014. Digital Revolution. [online] Available at: http://en.wikipedia.org/wiki/Digital_Revolution Wikipedia. 2014. Near field communication. [online] Available at: http://en.wikipedia.org/wiki/Near_field_communication Idtechex.com. 2014. RFID Forecasts, Players and Opportunities 2012-2022: IDTechEx. [online] Available at: http://www.idtechex.com/research/reports/rfid-forecasts-players-and-opportunities-2012-2022-000322.asp

Enzymes in Brewing Industry :: essays papers

Enzymes in Brewing Industry Bioengineering Research Paper Enzymes are catalysts or proteins that are produced by a living cell, but in process are independent of the cell itself. There are two types of enzymes i.e 1) Cell Independent enzymes 2) Non-enzymic enzymes Enzymes are long chains of amino acids held together by peptide bonds. They exist in all living cells, usually controlling the metabolic process whereby nutrients are converted into energy. Enzymes are also catalyst, this mean that enzymes can speed up chemical processes that would normally move very slowly. Enzymes unfortunately don’t last forever they have limited stability or lifespan when they have completed their function in the chemical reaction. Science shows that enzymes work on raw material. Fruit, cereal, milk, beer or wood are some typical products for enzymatic conversion. Enzymes are specific, they usually break down or synthesize one particular compound, and in some cases enzymes limit their actions to specific bonds in the compound with in which they react. An example gluconases is one of the many enzymes used in beer brewing. This enzyme is used in industrial applications of brewing beer and is a very efficient catalyst. It breaks down the wheat and converts the carbohydrates into sugars that speed up the reaction in the aspect of the beer’s fermentation. Enzymes need certain types of conditions to operate, these conditions are usually mild in the areas of temperature and acidity. Many enzymes function around 30Â º- 70Â ºC and their acidity are usually around neutral(ph 7). Enzymes are very important to industrial processes, enzymes they are energy saving and also protect the lifespan of equipment used in processes and also having to buy special equipment resistant to heat, pressure or corrosion. Industrial enzymes can be produced in an ecological way, one of the main ways enzymes can be produced industrially is to culture enzymes in vats. Man has been exploiting enzymes in nature unknowingly for centuries. Also for thousands of years the beer brewing processes of many countries has relied heavily on barley malt. In this period of time barley was malted without brewers understanding what happen to the barley during the malting process. The idea back then was good beer couldn’t be made without malted barley. The unknown

Thursday, July 18, 2019

Police Corruption Essay Essay

Police Corruption can be defined as a form of police misconduct in which law enforcement officers break their social contract and abuse their power for personal or department gain. There are three forms of police corruption. These forms are Nonfeasance, which involves failure to perform legal duty, another form is Misfeasance, which is failure to perform legal duty in a proper manner, and the third form is Malfeasance, which is commission of an illegal act. The three explanations of corruption are the â€Å"rotten apples†, â€Å"departmental†, and the other focuses on factors external to the department. An example of these would be an officer might feel unappreciated for their good work and actions and it might make them corruptible. An example of departmental explanation would be if officers feel uncommitted and unsupported, their outlooks and values are reinforced by others in the group which may lead to lack of commitment in their job, thereby leading to corruption. Some police officers may abuse their power because they see themselves as not enforcers of the law, but them as the law itself. The â€Å"blue wall of silence† is a term used in the United States to denote the unwritten rule that exists among officers, where they should not report on a colleague’s misconduct, errors, or crimes. This may impact an officer’s loyalty to their profession because they are not doing their job if they are letting another officer get away with crimes, and if they did report it then they would be breaking their loyalty to fellow cops. It’s important for officers to have a good ethical foundation before they enter into this job because it would help prevent them from doing wrong and abusing their power. In the â€Å"Stopped for Being a Mutt† video, I realized how bad some officers can act sometimes. The teen was stopped and questioned multiple times for looking suspicious, when really they were just racist. They were trying to provoke the teenager to justify an arrest. I feel the form of police corruption they were doing was misfeasance. Stopping someone because of their race, when they weren’t committing any crimes is humiliating to that person and is wrong of any cop to abuse their power in this way. The â€Å"Blue wall of silence† comes up in this type of situation because some other cops  witness it and knows that this goes on when officers have low numbers of stops, and they don’t want to tell because they don’t want to seem disloyal to their fellow police officers. In the â€Å"Los Angeles Police Department† video, they talked about the Rampart and Crash scandal. When I watched this video I was in disbelief that, that many officers were implicated in some form of misconduct. I understand that they wanted to get gangs and crimes off the street but this was no way of going about it. They would shoot or beat people when they were unprovoked. They would steal narcotics and plant false evidence, and frame suspects and cover up all that these officers were doing because it was getting rid of the gangs and â€Å"hoodlums†. I can’t understand how these officers didn’t think what they were doing was wrong and immoral. This form of corruption in this particular situation was malfeasance. What they were doing was illegal, and they are here to protect and obey the law. In the â€Å"Behind the Blue Wall† video. I was extremely shocked to see the police brutality that occurred in these cases. I don’t understand how an officer could deliberately torment a victim because of their race and think they can get away with what they’re doing and that it isn’t wrong. Malfeasance is the form of corruption that comes up in these cases because what they are doing is illegal. The unlawful beatings and shootings of these victims, when they are not provoking the officers; is completely wrong and these cases need to stop. The Blue wall of silence also comes up in these cases because there were officers who knew about what happened and what the other officers were doing and instead of reporting it, they attempted to cover it up. Co-workers should treat those who inform authorities of illegal activity in the police agency the same as how they treated them before they reported corruption. In the virtue ethics perspective, the habit of right desire, he was making the right choice by reporting corruption because he knew that what was going on in the agency wasn’t right and needed to be stopped. Frank Serpico’s response to this case was â€Å"It’s always worth it to be at peace with yourself.† I think this does imply reasoning of ethical thought. I  think Serpico meant that, as long as you feel good with what you are doing, and you are doing what you think is right, then that is all the matters. I agree with this because no matter what happens in the end, it is all worth it if you are at peace and happy with what you did. There are conflicts presented in terms of loyalty and duty. Loyalty is a good to have, but it is not a virtue. If loyalty is treated as a virtue, it can be misguided. It will lead to protection of illegal conduct and can turn into corruption. Officers may want to be loyal to fellow officers and not report what is really going on, however they also want to do their duty, and want to report because it is their duty to not participate in the corruption. The blue wall of silence impacts conflicting loyalty because it is an unwritten rule amongst officers to not report a fellow officer’s mistakes, misconducts, or crimes. This affects them if they want to be loyal to those officers and be loyal to their civic duty as well. If I was an officer in this situation, I would definitely report these crimes. I don’t believe in the blue wall of silence. I think that if an officer is doing something illegal then it needs to be reported and dealt with. Just because they are officers doesn’t mean they should be able to get away with things that they are arresting other citizens for doing.

Wednesday, July 17, 2019

Administrative assistant

I am actively seeking an administrator assistant opportunity in a demanding, fast-paced multi-tasking office. I possess old age of executive experience, which have equipped me with a multitude of skills, and I would like to hap my growth at AB Volvos multitude Accounting Department.I am a college graduate and am serious in the use of the Microsoft Office suite of parcel (MS Word, MS Excel and MS PowerPoint).Throughout my locomote I have demonstrated for my employers an stupendous facility for come acrossing organizational objectives and demands. In addition to my secretarial skills, I am an adept event planner, and am proficient in administrative work regarding the Sarbanes Oxley Act. I am also well informal in financial related talk due to my having worked in accounting environments previously.Furthermore, my genuine and previous employers have regarded my secretarial skills in planning meetings, taking minutes, filing and funding as high quality.I am sure I would prov e to be an addition at AB Volvo as well.If my abilities meet the needs of AB Volvos Group Accounting Department, I would greatly regard the opportunity of speaking with you personally at your earliest convenience. Thank you for your time.Sincerely,Jane Smith