Wednesday, November 27, 2019

Herobuilders.com Essay Example

Herobuilders.com Paper Which of the four types of studies are presented In this case? Answer 1: According to the passage of the case the research done by the Emil Vale- President of BBC Design Group has performed a descriptive study. He has performed a research for potential action-figure doll business. Descriptive study attempts to answer to questions like who, what, when, where and how. It is clear that while doing research for the potential action-figures business Vehicle had to search for the answers Who are the potential clients which would be interested to buy these dolls? Which action-figures are the most popular among different ages? Where do the action-figure dolls mostly sell. In toy stores, or as souvenirs In specialized shops? In what quantities possibly the production should be in order to cover demand and not to overproduce? And other questions. Vehicle also has done explanatory research to find the answer why there was sudden interest in action-figure dolls spread. The answer for the question was that it was connected to the 9/1 1 event which led to the launch of business to sell action-figure dolls based on modern day heroes of the event. Question 2: Evaluate the research conducted. Answer 2: a) Is the purpose clearly defined? Vales research involved defining the potential for the production and sale of action- figure modern day hero dolls and profitability of the sales, sales volume through retail stores as well as if the production of prototype real-life peoples dolls would have any legal consequences. B) Research process detailed? The research process In the passage Is not detailed and covers short answers to only several questions. Vehicle did only internet search, and some retail market research. High ethical standards applied? The passage does not offer any information about the existence of ethical safeguards to protect the involved persons and/or organizations, however Vehicle did contact lawyer for the legal and possible ethical safeguards consultation. D) Limitations frankly revealed? The passage does not detail any information about the limitations that have occurred during the research, which could impact on findings. E) Adequate analysis for decision makers needs? Goal of the research was not set by a decision-maker. We will write a custom essay sample on Herobuilders.com specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Herobuilders.com specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Herobuilders.com specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Since this business idea came only after the increasing interest by people for the dolls that were made for Vesicles own personal needs/interest. F) Findings presented unambiguously? The passage does not contain detailed research. G) Conclusions Justified? The research is poorly tied to the decision-based conclusions, nor does the detailed findings are matched with conclusions. H) Researchers experience reflected? Vehicle provided his own experience by stating that he has been making dolls on his personal time and he decided to do a research for potential of business when individual requests increased. Question 3: What issues other than those Vehicle chose to evaluate would you have included in your research plan for Herbicides. Com? I would conduct some customer survey to see the magnitude of the interest in action- dolls, which would include the price range (how much people are ready to pay for custom-made doll), age range (who is mostly interested), purpose of the purchase of the dolls (for which occasions do people buy these dolls, as personal souvenirs, for present for birthdays, etc ), etc.

Sunday, November 24, 2019

Cell Cycle essays

Cell Cycle essays Cell reproduction is the leading cause of growth and developement in our bodies. This reproduction is caused by the cell cycle, which is defined as the life of a cell from its origin in the division of its parent cell until its own division into two. Genetic continuity, cytokinesis regulation, and tumor formation are three parts of the cell cycle. Mitosis and Meiosis are main events of the cell cycle that assure reproduction of cells. The process of meiosis affirms genetic continuity from a parent to a child, while mitosis affirms a genetic clone from one cell to the next. Meiosis takes place in order for sexual reproduction to occur, while mitosis regulates growth and repair among cells and tissue. Both processes incude: interphase, prophase, metaphase, anaphase, and telophase as their main steps during divisions. During interphase, the cell prepares itself for division. In this stage, the chromosomes and centromeres are replicated. Chromosomes are still undistinguishable due to loosly packed chromatin fibers. The nucleus is well-defined and bounded by a nuclear envelope, containing one or more nucleoli. When prophase occurs, changes take place in the nucleus and cytoplasm. The nucleus and nuclioli disappear, and the chromatin becomes visable to the naked eye, forming chromosomes. The cytoplasm begins to form microfibrils radiating from the two centromeres that move to opposite sides of the cell membrane/wall. Metaphase, the next phase in cell division, involves the lining up of chromosomes at the metaphase plate of the cell. The chromatid are attatched to the microfibrils. The cell is now prepared for anaphase, the following step, which is where the chromatid detach from one another and travel to opposite poles of the cell. During the last phase, telophase, daughter cells arise from the single parent cell. The chromosomes once again become chromatin, and the nuclei become distinct. In addition, cytokinesis takes place, ...

Thursday, November 21, 2019

Protecting Personal Information Essay Example | Topics and Well Written Essays - 750 words

Protecting Personal Information - Essay Example But there are many concerns which consumers must consider if they want to enter into protected and secure transactions with the seller companies without any security risks involved. They must watch what PII they are going to share with the companies online. Companies might ask them to give their PII like name, address, phone number, e-mail address, spouse’s name, name of parents and children, social insurance number, bank account number or credit card number. Consumers should make sure that the seller companies have a privacy policy mentioned on their websites and that the security of their credit cards or any other mode of payment is also guaranteed. If the credit card number has been given, then the statement must be checked regularly so as to make sure that there are no unknown charges that are not in the consumer’s knowledge. It is also a sensible idea to keep a copy of all agreements, transactions, and communications that have been carried out with the online vendo rs so that a proof is always there in case of complaints- minor or severe.Two of the many laws regarding identity theft are discussed below:Computer Fraud and Abuse Act (CFAA)CFAA was designed in 1984 and deals with penalties for the intruders who gain access to sensitive information stored in a computer without authorized access. Computers have to be protected when the consumers carry out commercial activities, engage in cross-border e-commerce, and make online business transactions and email communications with online traders.... It is also a sensible idea to keep a copy of all agreements, transactions and communications that have been carried out with the online vendors so that a proof is always there in case of complaints- minor or severe. Laws and Legislation Two of the many laws2 regarding identity theft are discussed below: Computer Fraud and Abuse Act (CFAA) CFAA was designed in 1984 and deals with penalties for the intruders who gain access to sensitive information stored in a computer without authorized access. Computers have to be protected when the consumers carry out commercial activities, engage in cross-border e-commerce, and make online business transactions and email communications with online traders. The Act applies penalties upon the identity thieves starting from 10 years to 20 years of imprisonment. Health Insurance Portability and Accountability Act (HIPAA) This law was passed in order to eliminate the menace of identity theft. The need for secure online networks initially arose when issu es like computer viruses and internet fraud posed a threat to the security and privacy of data stored on online servers and health records. HIPAA was passed by U.S. Congress on August 21, 1996. It deals with the privacy issue of the consumer’s data and presents Privacy Rule which ensures fines and punishments for fraud and violation of the rule. Ethical, Moral and Social Issues It is important to educate the users of internet and computer systems about â€Å"intellectual property rights issues, privacy/ surveillance issues, access to data issues and issues of human-computer interaction† (Stahl, Carroll-Mayer and Norris, 2006, p.298). They should know that