Thursday, November 28, 2019

E-Transaction free essay sample

Thus the aspect of electronic-Transaction which has being given to the 21st century as a result of hard work and ingenuity on the part of computer programmers and engineers, is the process of exchanging goods for services or vice versa, with interested clients within or outside the immediate environment over the web. The aspect of E-Transaction is a relatively small aspect of the larger body called Electronic-Commerce, which is commonly known as e-commerce or e-comm, which refers to the buying and selling of products or services over electronic systems such as the Internet and other computer networks. Looking at the current case in the country, where most of the transactions handled are still done manually it would help to bring the innovative idea of a web based transactional environment where individuals can see and make certain of the financial status which their accounts possess. With careful consideration of our case study of Benson Idahosa University’s Bursary Department, it would prove both beneficial to students and staff alike, as well as help to save considerable effort. We will write a custom essay sample on E-Transaction or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page 1. 2 STATEMENT OF THE PROBLEM The E-Transact System is an example of the form of web based applications under Ecommerce which is created to better help individuals maintain a safe, efficient, and quick way to make transactions. The project attempts to address the following issues: * Help put an end to the claims of missing fees, tellers or receipts by students. * Make the long process of verification of payment a lot less difficult. * Give parents and guardians relief when payments are made as opposed to not knowing if the child has actually paid the fees or not. . 3 AIM AND OBJECTIVE OF THE STUDY The aim and objective of the study include the following: * Encourage the development of online business/commerce based management applications in Nigeria. * Increase the awareness of the web based Electronic Transaction application to the general public. * Development of a new and better means of handling transactions. * Outline the benefits of adopting this system in Nigeria. * Help people to understand the need and i mportance for an Electronic-Transaction software. 1. 4 RESEARCH METHODOLOGY When taking into consideration the nature of the project a number of possible ways will be employed in the effort to gather the necessary information which will help in the considerable awareness for this project. These means include Resource Material, Observation and Research and Site Visit. 1. 4. 1RESOURCE MATERIAL This is a process that involves the gathering of information from books, magazines, journals and other materials that are related to the subject of the study. This will involve getting definitions and meanings of some terms used in the business. Definitions and meanings can also be obtained from the dictionary. These books can either be purchased or found in the library. 1. 4. 2OBSERVATION This process involves the physically monitoring and watching the various processes or tasks involved in handling transactions. Observation can be conducted in a formal or informal way. Apart from monitoring the various tasks involved, participation can also be adopted as an observation technique. By participating in these activities It would become easier to understand and appreciate the effort that are required in transaction management as well as determine how the new system will work. . 4. 3RESEARCH AND SITE VISIT The internet can be considered as a vast collection of resources and materials that relate to any area or field of knowledge. Research and site visit involves searching through the internet for materials and information that relate to the project. During the project many sites will be visited that will supply the relevant information, some of these sites also provide the opportunity to downlo ad these materials for free without incurring any cost whatsoever. 1. 5 SCOPE OF STUDY This project aims at the bursary department of the Benson Idahosa University. This department already has the necessary items/Equipment for this project such as an internet connection, a network, computers, and stock pile of student’s information. All this items/equipment is essential for this project to function properly. 1. 6 LIMITATIONS During the course of this study factors may be encountered that may affect the pace at which the research is conducted, these factors include: * Availability of internet connections to obtain materials. Lack of material on the internet, in libraries and from individuals to sufficiently and adequately explain the concept of the E-Transaction to the general public. * Writing of the project while still carrying on with school work. 1. 7 SIGNIFICANCE OF THE STUDY The importance of this project to the general public likewise the staff and students of the university of Benson Idahosa University can be seen as a rapid means of reducing the stress o f entering data manually, having bulky paper work, reducing long hours of unnecessary waiting just for the paper work to be proceed and subsequently waiting for receipts. CHAPTER TWO LITERATURE REVIEW 2. 1HISTORY OF ELECTRONIC-TRANSACTION 2. 1. 1Early development The growth of automated information services in Nigerian universities began to accelerate as from about 1990, when the World Bank intervened with a loan to improve the institutional capacities of the Nigerian Universities, and with specific focus on automating the universities. Before then, a 1987 conference jointly organized by the National Universities Commission and the British Council had recommended that management information systems be introduced into the Nigerian university system (Abdulkadir, 1995). The MIS project commenced with a workshop in 1989 for Academic Planners and Bursars of Nigerian universities, followed in 1990 by the setting up of a technical committee to design hardware and software prototypes for the project. These initiatives, along with the World Bank intervention, eventually led to the introduction and development of university databases through the Nigerian Universities Management Information System (NUMIS), electronic connectivity through the Nigerian Universities Network (NUNet), automation of university libraries through the TINLIB library software, and the computerization of accounting processes through the computerized accounting system (CAS) for Bursary departments of the universities. NUMIS strives to increase control, access and updating of information, production of regular reports, and effectiveness in management decision making, whereas NUNet aims at setting the pace and direction for networking computer and information resources in the universities through intra-campus, inter-university and global electronic connectivity. While CAS has been transforming the data operations of the Bursary departments of Nigerian universities, much does not appear to have been achieved in the bibliographic automation of university libraries through the implementation of the TINLIB software. However, there is an emerging hope to rejuvenate the libraries through the on-going National Virtual Library Project, approved by the Federal Executive Council in January 2002 (National Interest, 3 January, 2002). Despite these laudable initiatives however, the anticipated technological transformation of the universities appears to be have been very slow. Thus considering the part of the computerized accounting system (CAS) for Bursary departments of the universities, it would then prove most effective to look into the areas of E-commerce and Transaction before looking at the aspect of E-Transaction Transaction can be seen as a means of communication between two individuals, companies, organization, etc. where goods and services are exchange or vice versa. Transaction is a discrete activity within a computer system, such as an entry of a customer order or an update of an inventory item. Transactions are usually associated with database management, order entry, and other online systems. (According to the Microsoft Computer Dictionary, Fifth Edition) Thus to put Transaction in the much more Simpler definition it would be an instance of doing business or an act of negotiation as a means of communication between individuals, companies, countries, etc. Electronic commerce, commonly known as  e-commerce  or  e-comm, refers to the buying and selling of  products  or  services  over electronic systems such as the  Internet  and other  computer networks (â€Å"According to Wikipedia†). Short for electronic commerce. Commercial activity that takes place by means of computers connected through a network. Electronic commerce can occur between a user and a vendor through the Internet, an online information service, or a bulletin board system (BBS), or between vendor and customer computers through electronic data interchange (â€Å"according to Microsoft Computer Dictionary†) . Electronic commerce is generally considered to be the sales aspect of  e-business. It also consists of the exchange of data to facilitate the financing and payment aspects of business transactions. Originally, electronic commerce was identified as the facilitation of commercial transactions electronically, using technology such as  Electronic Data Interchange (EDI)  and  Electronic Funds Transfer (EFT). These were both introduced in the late 1970s, allowing businesses to send commercial documents like purchase orders or invoices electronically. The growth and acceptance of credit cards, automated teller machines (ATM) and telephone banking in the 1980s were also forms of electronic commerce. Another form of e-commerce was the airline reservation system typified by Sabre in the USA and Travicom in the UK. Beginning in the 1990s, electronic commerce would include  enterprise resource planning  systems (ERP),  data mining  and  data warehousing E-commerce has grown in importance as companies have adopted Pure-Click and  Brick and Click  channel systems. We can distinguish between pure-click and brick and click channel system adopted by companies. * Pure-Click companies are those that have launched a website without any previous existence as a firm. It is imperative that such companies must set up and operate their e-commerce websites very carefully. Customer service is of paramount importance. * Brick and Click companies are those existing companies that have added an online site for e-commerce. Initially, Brick and Click companies were skeptical whether or not to add an online e-commerce channel for fear that selling their products might produce channel conflict with their off-line retailers, agents, or their own stores. However, they eventually added internet to their distribution channel portfolio after seeing how much business their online competitors were generating. In their summary of the findings from the eighth survey, the Researchers report that â€Å"e-commerce is taking off both in terms of the number of users Shopping as well as the total amount of people who are spending via Internet based transactions† E-commerce can be divided into: i. E-tailing or virtual storefronts on Web sites with online catalogs, sometimes gathered into a virtual mall ii. The gathering and use of demographic data through Web contacts iii. Electronic Data Interchange (EDI), the business-to-business exchange of data iv. E-mail and fax and their use as media for reaching prospects and established customers (for example, with newsletters) v. Business-to-business buying and selling vi. The security of business transactions Business models across the world also continue to change drastically with the advent of Ecommerce and this change is not just restricted to USA. Other countries are also contributing to the growth of Ecommerce. For example, the United Kingdom has the biggest e-commerce market in the world when measured by the amount spent per capita, even higher than the USA. The  internet economy  in UK is likely to grow by 10% within the years 2010 to 2015. This has led to changing dynamics for the advertising industry. Amongst emerging economies, Chinas Ecommerce presence continues to expand. With 384 million internet users, China’s online shopping sales rose to $36. 6 billion in 2009 and one of the reasons behind the huge growth has been the improved trust level for shoppers. The Chinese retailers have been able to help consumers feel more comfortable shopping online. Ecommerce is also expanding across the Middle East. Having recorded the world’s fastest growth in internet usage between 2000 and 2009, the region is now home to more than 60 million internet users. Research by four economists at the University of Chicago has found that the growth of online shopping has also affected industry structure in two areas that have seen significant growth in e-commerce,  bookshops  and travel agencies. Now considering the aspect of Electronic-Transaction it is technically defined as the processing and transmission of digitized information related to products and services. Or as a discrete packet of data transmitted in the course of conducting business activities online, whether in the form of a message, automated transaction or other types of digital communication (History of E-commerce, E-transaction n. d. ). 2. 2 E-TRANSACT SYSTEM An Electronic Transaction software is a web based application which deals with the sale or purchase of goods or services whether between business, households, individuals, governments and other public or private organizations conducted over computer mediated networks. The goods and services are ordered over those networks, but the payment and the ultimate delivery of goods or service may be conducted on or off-line. E-Transaction system should have i. Trustworthiness of the transaction – parties must have faith that records are authentic and unaltered. ii. Authentication of electronic signatures- person signing is the same who has identified himself. Depending on the type of electronic signatures used and the level of security inherent in that signature it is possible that the electronic signatures may be subject to greater risk of repudiation than handwritten ink signatures. iii. Data integrity – accuracy and completeness of information – ensuring that no alteration has been made intentionally or accidentally iv. Integrity – must ensure non-repudiation and authenticity. Document must be the same as that sent by the sender. Document must not be altered either in storage or transmission v. Retention of records –for a minimum period and in manner which would make it admissible in court of law as evidence – in case of a dispute Electronic transactions, and in particular electronic commerce, are dependent upon a supportive and responsive payment infrastructure in which both buyer and seller have confidence. This must be supported by a financial sector that fully participates in and embraces electronic commerce solutions. The financial sector will be encouraged to facilitate small and medium size enterprises as they seek to access the global market place through web sites and internet portals so taking advantage of lower costs and niche marketing. Electronic Transaction with specially provided E-Transact cards and the provision of online banking services must become standard characteristics of ife in this new Millennium. Wider international access within the existing card system has resulted in the imposition of a risk premium for non – secure transactions. In the financial sector, the dematerialization of cheque by electronic facility reduces the cost of passing these through the clearing system. The commercial banks estimate the savings in this regard as being in the billions of dollars while, the Central Bank, which presides over clearing house activities, will also benefit fro m lower costs. The Government will work closely with the financial sector to foster the safety and soundness of electronic payments, ensure adequate levels of consumer protection and remove legislative, regulatory and administrative hurdles that limit the digital transfer of payments. * CONSUMER PROTECTION The growth of electronic transaction has the potential to offer substantial benefits to consumers. These benefits include: i. Greater convenience. ii. Increased choice (leading to greater competition). iii. Lower prices (through the removal of intermediaries between the producer and the consumer). iv. More information on products. v. Ability to personalize products. vi. Improved after sales services. Electronic transaction will particularly benefit members of society who are unable to participate in the traditional marketplace. For example, those who live in rural areas will have access to a range of goods and services normally only available in urban areas. In addition, people who have an illness or a disability will also benefit from the convenience of online transacts. However, electronic transaction will not realize its full potential until consumers have confidence in its efficacy. For electronic transaction to flourish consumer confidence is imperative and this will be supported through public education and public and private sector cooperation, buttressed by a clear, consistent legal framework. A number of key issues need to be addressed to ensure that there is a safe and efficient online environment that consumers will trust. These key issues are: a. Information the provision of adequate information to consumers b. Payment establishing secure methods for paying online c. Jurisdiction – nternational agreement on the appropriate jurisdiction for consumer contracts d. Privacy – protection of personal information in the online environment The Government will encourage the private sector to adopt self-regulatory mechanisms and codes of practice in electronic commerce so that regulatory intervention by Government in the Electronic Market is minimal. Further, the Government will seek to promote alternative dispute resolution mechanisms, which will a llow consumer’s fast, effective and fair redress for fraudulent, deceptive or unfair business practices online. Transaction based application retrieved march 17th 2012) 2. 3SECURE E-TRANSACT PROTOCOL SET Protocol Secure Electronic Transactions (SET) is an open protocol which has the potential to emerge as a dominant force in the securing of electronic transactions. Jointly developed by Visa and MasterCard, in conjunction with leading computer vendors such as IBM, SET is an open standard for protecting the privacy, and ensuring the authenticity, of electronic transactions. This is critical to the success of electronic commerce over the Internet; without privacy, consumer protection cannot be guaranteed, and without authentication, neither the merchant nor the consumer can be sure that valid transactions are being made. The SET protocol relies on two different encryption mechanisms, as well as an authentication mechanism. SET uses symmetric encryption, in the form of the aging Data Encryption Standard (DES), as well as asymmetric, or public-key, encryption to transmit session keys for DES transactions (IBM, 1998). Rather than offer the security and protection afforded by public-key cryptography, SET simply uses session keys (56 bits) which are transmitted asymmetrically – the remainder of the transaction uses symmetric encryption in the form of DES. This has disturbing connotations for a secure electronic transaction protocol – because public key cryptography is only used only to encrypt DES keys and for authentication, and not for the main body of the transaction. 2. 3. 1SYMMETRIC AND ASYMMETRIC ENCRYPTION IN SET In the SET protocol, two different encryption algorithms are used –Data Encryption Standard (DES) and RSA. The DES algorithm has been used since the 1970’s. It is believed by some that the National Security Agency (NSA) of America played an invisible hand in the development of the algorithm (Schneier, 1996), and that they were responsible for reducing its key size from the original 128-bits to 56. DES quickly became a federal standard in 1976, and has been used ever since. In the SET protocol, a DES 56-bit key is used to encrypt transactions. This level of encryption, using DES, can be easily cracked using modern hardware. In 1993, a brute-force DES cracking machine was designed by Michael Wiener – one which was massively parallel. For less than a million dollars (well within the budget of many large companies), a 56-bit DES key could be cracked in average time of 3. 5 hours. For a billion dollars, which might be considered small change for a military or security organization such as the NSA or a foreign power, a parallel machine can be constructed that cracks 56-bit DES in a second (Schneier, 1996). Clearly, this is of great concern, since DES encrypts the majority of a SET transaction. As the power of computers grows, and the cost diminishes, such code-crackers may become more and more common. 2. 3. 2TRANSACTION AUTHENTICITY Authentication is an important issue for users of electronic commerce. Consumers must have faith in the authenticity of the merchant, and merchants must have faith in the authenticity of the consumer. Without authentication, any individual could pose as a merchant, and besmirch a merchant’s good name by failing to deliver goods and billing up credit card bills. Without authentication, any individual could pose as a consumer, ordering costly goods to an abandoned house or apartment, and defrauding the merchant. Without authentication, an individual could pose as a willing buyer, accept the goods, and then repudiate the transaction. Authentication is critical to achieving trust in electronic commerce. Authentication is achieved through the use of digital signatures. Using a hashing algorithm, SET can sign a transaction using the sender’s private key. This produces a small message digest, which is a series of values that sign a message. By comparing the transaction message and the message digest, along with the sender’s public key, the authenticity of the transaction can be verified. Digital signatures are aimed at achieving the same level of trust as a written signature has in real life. This helps achieve non-repudiation, as the consumer cannot later establish that the message wasnt sent using his private key. IMPORTANCE OF SECURE E-TRANSACTIONS Secure electronic transactions will be an important part of electronic commerce in the future. Without such security, the interests of the merchant, the consumer, and the credit or economic institution cannot be served. Privacy of transactions, and authentication of all parties, is important for achieving the level of trust that will allow such transactions to flourish. However, it is important that the encryption algorithms and key-sizes used will be robust enough to prevent observation by hostile entities (either criminal or foreign powers). The ideal of the secure electronic transactions protocol (SET) is important for the success of electronic commerce. However, it remains to be seen whether the protocol will be widely used because of the weakness of the encryption that it uses. Secure E-Transact Protocols Retrieved April 2nd 2012) 2. 4ESSENTIAL FEATURES OF AN E-TRANSACT SYSTEM Enabling technologies refer to the web-based platforms and programs upon which Business-to-business (B2B) and Business-to-consumer (B2C) web sites are constructed. While many business people may want to focus strictly on online selling and buying and leave the technical aspects to IT specialists, they still need to have a sound understanding of these key under-the hood enabling technologies to better appreciate their full e-business potential and limitations. The technologies are encryption, Secure Sockets Layer (SSL), SET, and Smart Cards. 2. 4. 1ENCRYPTION Encryption is the process of making data unreadable to everyone except the receiver. The process has four key elements: a. Authentication This allows customers to be sure that the merchant they are sending their credit card details to be who they say they are. It can also allow merchants to verify that the customer is the real owner of the credit card. b. Integrity This ensures that a third party has not tampered with the messages during the transmission. c. Non-repudiation This prevents customers or merchants from denying they received or sent a particular message. d. Privacy This prevents third parties from reading intercepted messages. The main elements of an encryption system are the plaintext, the cryptographic algorithm, the key, and the cipher text. The plaintext is the raw message or data that are to be encrypted. A cryptographic algorithm, or cipher, is a mathematical set of rules that defines how the plain text is to be combined with a key. The key is a string of digits. The cipher text is the encrypted message. Types of encryption in common use are: SECRET-KEY Secret-key encryption involves the use of a single key that is shared by both the sender and the receiver of the message. After creating the message, the sender encrypts it with their key and passes it to the recipient who then decrypts it by using a copy of the same key used to encrypt it. Secret-key encryption does have some limitations, particularly with regard to key distribution. For privacy to be maintained, every transmitter of messages would need to provide a different key to everyone they intend to communicate with; otherwise, every potential recipient would be able to read all messages whether it was intended for them or not. PUBLIC-KEY Public-key encryption involves the use of two keys: one that can be used to encrypt messages (the public key); and one that can be used to either encrypt them or decrypt them (the private key). These key pairs can be used in two different ways to provide privacy or authentication. Privacy is ensured by encoding a message with the public key, because it can only be decoded by the holder of the private key. Authentication is achieved by encoding a message with the private key. Once the recipient has successfully decrypted it with the public key, she can be assured it was sent by the holder of the private key. Since the public key can be made widely available for example, from a server or third party public-key cryptography does not suffer from the same key distribution and management problems as the secret-key system. One disadvantage of the public-key system is that it is relatively slow. Therefore, when it is being used only for authentication, it is not desirable to encrypt the whole message, particularly if it is a long one. To get around this, a digital signature is used. Digital signatures are implemented through public-key encryption and are used to verify the origin and contents of a message. 2. 4. SECURE SOCKETS LAYER (SSL) Netscapes Secure Sockets Layer (SSL) protocol is currently the most widely used method for performing secure transactions on the web and is supported by most web servers and clients, including Netscape Navigator and Microsoft Internet Explorer. The Secure Sockets Layer (SSL) protocol provides several features that make it particularly suitable for use in e-c ommerce transactions. Privacy is guaranteed through encryption. Although information en route can still be intercepted by a third party, they will be unable to read them because they wouldn’t have access to the encryption key. Integrity is also ensured through encryption. If information is received that will not decrypt properly, then the recipient knows that the information has been tampered with during transmission. Authentication is provided through digital certificates. Digital certificates provide the basis for secure electronic transactions as they enable all participants in a transaction to quickly and easily verify the identity of other participants. Essentially, SSL is secret-key encryption, nested within public-key encryption that is authenticated through the use of certificates. The reason that both secret key and public-key encryption methods are used is because of the relatively slow speed of public-key encryption compared to secret-key encryption. Initially, the client and server exchange public keys, and then the client generate a private encryption key that is used only for this transaction. This is referred to as a session key. The client then encrypts the session key with the servers public key and sends it to the server. Then for the rest of the transaction, the client and the server can use the session key for private-key encryption. 2. 4. 3SECURE ELCTRONIC-TRANSFER (SET) PROTOCOL SET is the Secure Electronic Transactions protocol developed by Visa and MasterCard, specifically for enabling secure credit card transactions on the Internet. It uses digital certificates to ensure the identities of all parties involved in a purchase and encrypts credit card information before sending it across the Internet. Like SSL, SET allows for the merchants identity to be authenticated via digital certificates; however, SET also allows for the merchant to request user authentication through digital certificates. This makes it much more difficult for someone to use a stolen credit card. A further advantage of SET is that the merchant has no access to credit card numbers, and thus another source of fraud is eliminated. There are many pilot schemes that use the SET protocol, but mainstream adoption has been slower than predicted. The main reasons behind this are the growing acceptance of SSL for secure credit card transactions and the complexity and cost of the SET system. In a typical SET transaction, there is private information between the customer and the merchant (such as the items being ordered) and other private information between the customer and the bank (such as the customers credit card number). SET allows both kinds of private information to be included in a single, digitally signed transaction. Information intended for the bank is encrypted using the banks public key while information for the merchant is encrypted with the merchants public 2. 4. 4SMART CARDS Although similar in appearance to a normal credit or debit card, smart cards differ in at least three key ways they store much more data, are password protected, and incorporate a microprocessor that can perform processes such as encryption. Although relatively unknown in North America, smart cards are by no means a new invention. Their use in Europe is widespread for applications such as credit cards, telephone payment cards and the payment of road tolls. France is the leading adopter, having started issuing cards in 1967, and now has some 25 million cards in circulation. However, their use is predicted to grow rapidly worldwide over the next few years on the back of the Internet, e-commerce explosion. i. STORAGE OF ENCRYPTION KEYS Smart cards can provide a very secure way of generating, storing, and using private keys. In its most basic implementation, smart cards can be used to store private keys and digital certificates protected by a password. Security can be further enhanced by using a microprocessor within the card to generate the public and private key pairs and to perform the actual encryption. Data to be decrypted or digitally signed are passed to the card where the microprocessor performs the operation and then passes the data back to the computer. That way the key never leaves the card and is therefore not vulnerable to attack by rogue programs scanning the computers memory for keys. ii. ELECTRONIC PURSES Many applications in place today use a smart card as a replacement for cash because of the higher security they offer over standard credit cards. Although most of these systems (for example, Mondex, Visa Cash, CLIP and Proton) were developed for point-of-sale applications, their use is likely to extend to web commerce, because they provide an easy and secure way to handle cash transactions. iii. USER PROFILE PORTABILITY One factor that could potentially restrain the growth of web commerce is restricted access to the Internet. Although the number of home and office computers with Internet access is continually growing; it is still not universally available and even the introduction of low-cost access devices (for example, Web TV) will not solve this completely. Also, even those with individuals with Internet enabled computers are unable to access them when away from their office or desk. (Essentials of a Secure E-Transaction System) 2. 5BENEFITS AND LIMITATIONS OF AN E-TRANSACT SYSTEM With software developed certain benefits the user can derive from its use are carefully put into consideration, thus making it needed and relevant for utilization. Below we take look at some of the benefits/advantages that E-Transact system has to offer, as well as certain limitations that leaves room for further improvement in terms of future development of better, faster and safer systems. . 5. 1Benefits of the E-Transact system * Reduction of Cost and Wasted Time: Cost and Time are both examples of transaction objectives which aid in the progress of business. By making use of the online E-Transact system many cost can be reduced thus enabling the proper utilization of resources. Since the information can be shared across a long range or short range network, users no longer have to print documents and print them to the recipients, rather the document or file is uploaded and sent directly to the recipient hat requires its immediate use, thus printing and postage cost are reduced. * Reduction of Risk and Potential Errors: One important element that affects a transaction is information. Without information from the consumer or merchant, no work or task can be performed. Information is an element in E-Transaction that is never constant. New and current information is required for a proper system to function effectively, the latest information is always available as soon as it is published, minimizing the risk of working on old information, aiding in the business. * Access to Information: Better access to information and reduction of the response time for RFI (Requests for Information), CO (Change Orders) and specifications clarification. Information no longer has to be passed on from one person to another before getting to the desired destination, instead that information can be accessed easily from anywhere in the world just by gaining an access point to the server where the information is being stored. * Authentication of Information The struggles of information in the global modernisation of the world will not loss its major role seeing as information is the very reason for the system. Individuals have often said there is a misrepresentation of information during payment, receiving of goods or vice versa. With this system no room is given for such lapse seeing as not just any individual except the administrator and the owner of the specific E-Transact card is permitted access to the information of such a profile. 2. 5. 2Limitations of the E-Transact system With every system comes their benefit as well as its limitations, and amongst a few these drawbacks include: * Security: The word security describes the assurance that something of value will not be taken away. In an online-Transact system, security is an aspect that should certainly not be overlooked. Many actions and task performed online are usually open to security risk. The possibility of sharing information in an online-Transact system demands security measures. The issue of trust is a major issue in the setting up of such an on online-Transact system some clients would be completely trustworthy whilst others would need to be checked all the time. There is definitely a need to ensure that people are encouraged to see this technology as a benefit rather than a threat. | * Infrastructure and difficult Internet Access: An online-Transact system requires infrastructure to be put in place to function properly and effectively, companies and organizations need to have the infrastructure necessary to support them (i. e. network systems, hardware, etc. ). Most companies don’t have this infrastructure and don’t want to, or have any intentions to change their organizations. The internet is a technological concept that is fast growing across the world. It is a global network of computers across the world through the use of a satellite or telephone system, for sharing information and access data from anywhere in the world. As popular and wide spread as the internet is, most companies do not have any internet connections, which may be as a result of the cost of purchasing one. Without the acquisition of an internet service, the online-Transact system cannot function at all. * Need for Training: Every year, new and better technological tools are developed for solving one problem or another. Each new application developed comes with a form of documentation or manual to help the user to understand how the system works. But apart from understanding the new system they have to be familiar with the workings of the systems. Employees must be familiar with technological solutions; otherwise they need to be trained, which slows down the advancement of the project. Training is a factor that affects two important project objectives, which include: Time and Cost. Some employees are not keen on using new technologies and think they will need too much time to learn and understand it. . 6SUMMARY In summary we have been able to see the history of Transactions, E-Commerce as well as a little on E-Transaction, what an E-Transaction system is all about, secure e-transact protocol as it helps make E-Transactions better and safer, the benefits and limitations of the system (which could be considered as the advantages and disadvantages), essential features that are looked at to prove and pr ovide essential safety, make business transactions flow easily as well as put both clients and service providers at easy when a transaction is being, or has already being conducted. Thus far it has shown that the involvement of an E-Transact system not only to the university system but the world at large would be of tremendous help in the mobilization of the financial department to a better and safer atmosphere for conducting transactions. CHAPTER THREE SYSTEM ANALYSIS AND DESIGN 3. 1SYSTEM ANALYSIS System Analysis is one example of the many phases that form the System Development Life Circle, (SDLC) which is a step-by-step approach to the development of a complex system. System Analysis has to do with the gathering and use of important information pertaining to a certain system. In a more plain definition, system analysis has to do with the collection of data, understanding of the processes involved, and identification of problems and recommendations that wholly affects the performance of the system or is the process of analysing a system with a view of bringing out the problems in the existing system and consequently proffering an alternative method usually a computerized system to curb the problems in the system. System analysis helps to provide a new efficient system which satisfies the need of the user or organization as well as giving room for future enhancements and improvements by providing answers to the following questions such as: What is being done, How is it being done, Who is doing it, When is he doing it, Why is it being done and How can it be improved? During the system analysis a thorough investigation of the old or existing system in use is carried out in order to properly understand the information flow, the limitations and weaknesses the current system possesses, providing of solutions to these limitations which may include the improvement of the existing system or development of a complete system from scratch. The existing system used in Benson Idahosa University and around most part of the country today enables the students or staff to be able to perform their daily duties only within the organization. For example, the administrative staffs in the school is only allowed to issue clearance to students who have paid within the school environment, that means the staff has to be present in the school during the time period when the clearance of students as well as the receiving of bank statements is meant to hold. Similarly, other responsibility that takes the administrative staff away from the school may arise; this eventually would have a negative effect on the students which means that the student might not cover the necessary clearance time for the semester or session. These responsibilities may be official or unofficial, but the fact still remains that the students will be affected either way. This E-Transact System provides a lime-light solution for both the administrative staff and the Student by giving them the opportunity to have payment as well as updating of their respective account details online without any of the regular hiccups. The system also provides an avenue for the administrative staff to leave messages pertaining existing debts or overpayments made by students, so as to avoid further accumulation of debts or excess money. All the operations of the existing system can be seen and done easily by the new system with new added features such as checking in advance for the amount of the next session or semester fees as well as other payment details such as accommodation, health, sports etc. nd leaving the students messages informing them of either change in payment details or outstanding debts, thus substituting or reducing the operations of the old system which simply involves the administrative staff going to work every morning in a defined location, carrying out his daily duties within the defined location (such as attending to students account details, attending staff meetings, submission of monthly report to head of department (C. F. O. ) etc. ). Categorically, the new system defines a new approach to Staff operation, with respect to accounts of students, the E-Transact system gives the administrative staff a new definition of accounting, where less stress is used, convenience is considered and for the students, it provides or gives them a new means of getting their clearance done as well as the extra and on time information from any part of the country. 3. 1. 1THE EXISTING SYSTEM The existing system is one which involves a lot of stress and paperwork which can eventually become cumbersome as time goes on. Students are force to work around with large sum of money from one bank to the designated banks of payment, where of course students would then have to take a long period of time before the funds can be processed, thus making the whole day a waste of time and energy. After which the student has to wait for the bank to send verification to the school showing the student has made such a payment of fees and sometime sending verification from the bank to the school might take a long time. Then there exists the issue of students not paying the fees thus using it for other ill relevant things and therefore missing the dead line for the registration exercise. Thus after careful examination of the existing system where a number of flaws exist such as the issue of missing funds, misplaced tellers/receipts and others, it would then be futile to continue to practice this method of transacting business. 3. 1. 2PROBLEM OF THE PRESENT SYSTEM Problems of the existing system can be viewed in the following perspectives The Administrator’s Perspective 1. Some administrator’s do not regularly show up for work due to reasons such as family crises, emergencies etc. 2. Official responsibilities such as seminar, conferences etc. , may tend to take the administrator away from the school environment thereby making them to miss the clearance of students. 3. They sometimes come late to the office thereby reducing the amount of work that would have achieved in that day. 4. Time allocated to the clearance process might be inconvenient for the administrator thereby causing lateness to the hall of registration or missing the clearance for that day completely. 5. Since every administrator for each department has to be present in school there is limited office space there by causing congestions in some offices. 6. Student account cards can be misplaced or stolen. The Student’s Perspectives 1. Clearance time might be too lengthy for some students who have a low tolerance for the congestion thereby making it difficult for them to patiently wait their turn. 2. Due to illness or certain emergencies students miss the clearance for the day. 3. All important points mentioned by the administrator during the clearance might not be taken down by the students exactly the way it was said. 4. There are no means of nowing exactly how much the student is meant to pay as some payments might be overlooked or not properly recorded. 5. Once there is an urgent call for the student, he is bound to miss the clearance for the time he is away from the school which means there is no room to make up for the lost time and have his/her registration done. 6. Studen t’s receipts or tellers can get missing or stolen. Poor dissemination of information Due to the fact that administration members usually do not attend meetings as earlier stated, information is not properly communicated to them, and in most cases the information is not communicated at all. When such a situation occurs it not only increases the clearance time, but affect how the accounts are handled, which if not handled properly will cause the to be distracted from his studies for no reason. Cost This will save the department a lot seeing as a lot of the normal paper, stamps, and ink to be bought would eventually reduce. No central back-up Each administrator is responsible for the information they are given to work with and handle. Most administrators go home with such information, and others can only access this information either pending the arrival of custodian of the needed information or the next meeting when the information is brought. Without a central back-up system were information can be stored and access by administrators, if the custodian who is responsible for the information happens to suffer an ill-fated situation, such information will be held down pending their recovery from such a fate. This then slows down progress for the students as well as the administrators. 3. 2SYSTEM DESIGN 3. 2. 1DEFINITION System design is the process of planning a new system based on the findings of a system analysis. The purpose of system design is to document exactly how the new system should work. In essence, this means preparing a detailed specification for the new system. This deals with the basic structure of the new system, its functionality, its specification, its user requirements and a complete breakdown of how this new system works. The completed design of the new system will provide satisfaction to the user’s needs and requirements. The design will also help for maintenance later in the life time of the system. Some design tools used include: functional diagrams, hierarchical-input-process-output (HIPO) Charts, input-process-output (IPO) charts and Flow Charts. These design tools are used to describe the process involved in the various segments of the new system. These design requirements are specified in line with the user requirements, goals and objective. Normally, the system design proceeds in two stages: * Preliminary or general design * Structure or detailed design Preliminary or general design In design, the features of the new system are specified. The costs of implementing these features and the benefits to be derived are estimated. If the project is still considered to be feasible, we move to the detailed design stage. Structure or detailed design In the detailed design stage, computer oriented work begins in earnest and also it is at this stage that design of the system becomes more structured. Structured design is a blue print of a computer system solution to a given problem having the same components as the original problem. Input, processing, and output specification are drawn up in detail. 3. 2. 2STEPS INVOLVED IN SYSTEM DESIGN The following steps are involved in system design * Input requirement * Output requirement * File and storage requirement Process * Control and backup * Personnel and procedures Input requirement Before data can be received as output, information first has to be fed to the system (which is called the input), processed and then displayed as the desired output. The system is an interactive one and the information is inputted into the system via keyboard. The system will be able to acc ommodate data entry in an interactive mode promptly with proper validation and access authorization. It will be able to accept the necessary data, view and record data. So the proposed system will have the facility to modify data where necessary. Output requirement One major thing that is of great interest to the administrators and the users (students and parents alike), is the output produced by the system (i. e. Online E-Transact software). It is very important to state the output that the system will produce at the early stages of system design. I. e. what must be produced? It dictates to a large extent how the input, processing and storage are to be handled. The output specifications of the system include: * Actual fees payment page: this page displays all payments made by the student and all outstanding payment not yet made. Information or data display page: this shows the user or admin any information which is entered into the system such as: registration information, new E-Transact card numbers, details of the fees to be paid, user information. File and storage requirement Here what the system needs to properly function is stated. These include the sizes, contents, organization, media devices, formats, access restricti ons, and locations for all files the system will use. The inputs which are keyed into the system will be stored and saved in a database. The analyst has to decide whether a new database needs to be established or if an existing one can be used. The database server used here is MySQL, the data would be called â€Å"etranzact_db†. The database would contain tables for different individual purposes with records that would be retrieved to serve their respective purposes. The storage device that is used is the hard disk drive. Processing Here a description of the various processing steps that are needed to convert input into output is given in detail. This involves the use of dataflow diagram and the program design aids to fully document the operation of the new system. The analyst should consider if there would be any new required hardware necessary for processing. The system authenticates details supplied by users comparing them with what is already available in the database. If there is a match between both data, then access to system will be granted otherwise such a user will be denied access and will be given an opportunity to retry entry into system by logging in again. This is done, in order to restrict access to the system by unauthorized users. Control and backup Apart from the output being considered to be one of the most important parts of the system, another aspect that should be taken very seriously is control and backup. System controls are put in place in order to make sure that data are input, processed and output correctly and to prevent data destruction, unauthorized program modification and access, fraud and any other tampering that might occur. System backups are copies of essential data and program files that are made periodically to protect against inadvertent loss or malicious damage. Personnel and procedures The last aspect that need to be considered are the people who will make use of the system and the procedures that they will have to follow in order to make use of it as well. The new system will be accessed by users and the companies of administrator who alone has access to the system database. He controls the actions that will occur from the back-end and monitor what the various users are doing and inputting as well. SYSTEM FLOW CHART A graphical map representation of the path of control or data through the operations in a program or an information-handling system. Symbols such as squares, diamonds, and ovals represent various operations. These symbols are connected by lines and arrows to indicate the flow of data or control from one point to another. Flowcharts are used both as aids in showing the way a proposed program will work and as a means of understanding the operations of an existing program. It is also a pictorial representation of an algorithm or program. It consists of a set of symbols. Each symbol represents a specific activity. A typical problem involves accepting input, processing the input, and displaying the output. The flowchart shown in fig 3. 1 shows a simple algorithm of the new system as thus; once the user accesses system and is sent to the index page (which is the first page displayed), he/she can login as a user or admin. If the user has an account and has being approved by the admin, they will have access to the system and be taken directly to the user main page, where they will be able to see and know about their fees both pending and paid, while the admin will be taken to the manage user page where he can activate new users who have just registered, or the manage account and fees page, where he can start a new account and add users to it and make any changes where necessary. IS USER USERNAME amp; PASSWORD CORRECT IS USER USERNAME amp; PASSWORD CORRECT IS ADMIN USERNAME amp; PASSWORD CORRECT IS ADMIN USERNAME amp; PASSWORD CORRECT LOGOUT LOGOUT USER MAIN PAGE USER MAIN PAGE START START STOP STOP LOGOUT LOGOUT USER LOGIN PAGE USER LOGIN PAGE ADMIN LOGIN PAGE ADMIN LOGIN PAGE NONO MANAGE FEES RECORD MANAGE FEES RECORD MANAGE STUDENT’S ACCOUNT MANAGE STUDENT’S ACCOUNT YESYES FIG 3. 1 FLOWCHART OF THE SYSTEM Actual fees payment Information amp; data display page Actual fees payment Information amp; data display page Login info Register student Create account Manage student records Manage fees records User management Login info Register student Create account Manage student records Manage fees records User management Login access Login access INPUTADMIN OUTPUT Actual fees paid Actual fees paid PROCESS USER OUTPUT FIG 3. 2 IPO Diagram DATA DICTIONARY A data dictionary defines each term encountered during the analysis and design of a new system. It is a feature of a database (or a tool) where the data to be used in the database are properly defined and linked as to their length, location etc. It helps the user to know the type of data in the database and the restrictions if any. Below are some examples of data dictionaries used for certain modules in the project. User Work module (front-end) * The user inputs their username and password * If they do not have an account, click on the ‘register’ link that displays another page were they will be able to fill out a form to register for an account * Once granted access to the system the user is to follow the respective instruction as to which faculty and subsequently department. * It then takes the user to the various fees allocation and subsequently asking which amount the user wishes to pay. 4. 6IMPLEMENTATION GUIDELINE User Training Requirement

Sunday, November 24, 2019

About the Roman Historian Livy

About the Roman Historian Livy Name: Titus Livius or Livy, in EnglishDates: 59 B.C. - A.D. 17Birthplace: Patavium (Padua), Cisalpine GaulFamily: Unknown, had at least one child, a sonOccupation: Historian The Roman annalistic [year-by-year] historian Titus Livius (Livy), from Patavium (Padua, as its called in English), the area of Italy in which Shakespeares Taming of the Shrew took place, lived about 76 years, from c. 59 B.C. to c. A.D. 17. That hardly seems long enough to have finished his magnum opus, Ab Urbe Condita From the Founding of the City, a feat that has been compared with publishing one 300-page book each year for 40 years. Most of Livys 142 books on the 770-year history of Rome have been lost, but 35 survive: i-x, xxi-xlv. Division of Ab Urbe Condita Contents of Ab Urbe Condita Libri I-XLV I-V: Origins to Gallic sack of RomeVI-XV: To beginning of Punic WarsXVI-XX: First Punic WarXXI-XXX: Second Punic WarXXXI-XLV: Macedonian and Syrian Wars After dispensing with 365 years of Roman history in only five books (averaging ~73 years/book), Livy covers the rest of the history at the rate of about five years per book. Livys Morality Although were missing the contemporary portion of his history, there seems little reason to believe that Livys Ab Urbe Condita was written as an official Augustan history, aside from the fact that he was a friend of Augustus, and that morality was important to both men. Although Livys status as the official Augustan historian is debated, Paul J. Burton (following T.J. Luce, The Dating of Livys First Decade, TAPA96 (1965)) dates the start of Livys historical writing to 33 B.C. before the Battle of Actium and the year (27 B.C.) Octavian conventionally qualifies as emperor.Livys role in the history of literature and the theater for which see Heroes and Heroines of Fiction, by William Shepard Walsh and the visual arts, especially Botticelli, comes at least in part from Livys moral stories of The Abduction of Virginia and The Rape of Lucretia. In his preface, Livy directs the reader to read his history as a storehouse of examples for imitation and avoidance: What chiefly makes the study of history beneficial and fruitful is this, that you behold the lessons of every kind of experience as upon a famous monument; from these you may choose for your own state what to imitate, and mark for avoidance what is shameful.... Livy directs his readers to examine the morals and policies of others so that they can see how important it is to maintain standards of morality: Here are the questions to which I should like every reader to give his close attention: what life and morals were like; through what men and what policies, in peace and in war, empire was established and enlarged. Then let him note how, with the gradual relaxation of discipline, morals first subsided, as it were, then sank lower and lower, and finally began the downward plunge which has brought us to our present time, when we can endure neither our vices nor their cure. From this moral perspective, Livy depicts all non-Roman races as embodying character flaws that correspond with central Roman virtues: the Gauls are factious and headstrong, and lack staying power; while the Greeks are better at talking than fighting, and immoderate in their emotional reactions [Usher, p. 176.] Numidians are also immoderate emotionally since they are too lustful: above all barbarians the Numidians are steeped in passionsunt ante omnes barbaros Numidae effusi in venerem. [Haley] Historical Evaluation of Livy With history as his vehicle, Livy displays his rhetorical flair and literary style. He engages the attention of the listening audience through speeches or emotive description. Occasionally Livy sacrifices chronology to variety. He rarely explores contradictory versions of an event but selects with an eye to championing Romes national virtues. Livy acknowledged a lack of contemporary written records from which to verify facts from Romes beginnings. Sometimes he mistranslated Greek literary sources. Without a background in practical military affairs or politics, his reliability in these areas is limited. However, Livy supplies myriad mundane details that are unavailable elsewhere, and, therefore, he is the most important source for Roman general history for the period to the end of the Republic. Sources Include: Stephen Usher, The Historians of Greece and Rome The Last Republican Historian: A New Date for the Composition of Livys First PentadPaul J. BurtonHistoria: Zeitschrift fà ¼r Alte Geschichte, Bd. 49, H. 4 (4th Qtr., 2000), pp. 429-446. ï » ¿Livy, Passion, and Cultural StereotypesS. P. HaleyHistoria: Zeitschrift fà ¼r Alte Geschichte, Bd. 39, H. 3 (1990), pp. 375-381

Thursday, November 21, 2019

GLobal Warming Research Paper Example | Topics and Well Written Essays - 1000 words

GLobal Warming - Research Paper Example That global warming has happened in the recent past is evident from the rise in the mean temperature of the earth’s atmosphere. Many ecosystems will be unable to adapt suitably to such rapid changes in climate and this will lead to extinction of some animal species. In addition to the impact on ecosystems, human agriculture, health and water resources are all being affected by global warming sparking wide spread apprehension across the globe. Scientists agree that human activities have led to release of green house gases that in turn are responsible for global warming during the last century. This has been especially marked during the last 50 years. As humans began to use petroleum and burn coal and oil to heat their cities and run their machines, levels of carbon dioxide have risen by almost 30%. The concentration of nitrous oxide and methane that are by products of farming, coming from rice fields and cattle have also risen by 10 – 15 %. In 2002 about 40% of U.S. carbon dioxide emissions were a result of the burning of fossil fuels for the purpose of electricity generation. Coal accounted for 93 percent of the emissions from the electric utility industry. Statistics show that of the total energy consumption in the US every year, almost 85 % comes from gas and petroleum products and coal. (American Gas Association) About 33% of U.S carbon dioxide emissions come from the burning of gasoline in engines of cars and light trucks. Hence the second biggest sources of these green house gases are road vehicles and industries. Emissions from airplanes and buildings add their own percentages of Carbon Dioxide to the atmosphere and aid global warming. It has been found that water vapor in the atmosphere - a powerful greenhouse gas, has been increasing, due to warming caused by carbon dioxide, methane and other green house gases. Deforestation is yet another major cause of

Wednesday, November 20, 2019

Annotated bibliograhphy Bibliography Example | Topics and Well Written Essays - 250 words

Bibliograhphy - Annotated Bibliography Example Although most human resource managers find implementing work-life programs challenging and expensive, Lockwood suggests that any organization that intends to attract the right talents and gain competitive advantage must consider implementing a work-life program since it offers a win-win solution. This article satisfies the study objectives since it discusses the challenges facing human resource in the present day society as regards increased need for work-life program. The world has witnessed rapid technological advancements in the recent past. In this journal article, Kamal and Ashish Kumar investigate the impact that technological advancements witnessed in the recent past has had on human resource performance. The authors note that the recent technological advancements such as computers have transformed human resource functions in a big way. The authors note that the integration of technologies, such as computers has changed how the human resource managers process payrolls and record information among others. Additionally, the authors reckon that the integration of technologies in human resource management has improved how HR keeps records and information in an organization. Therefore, the authors advise that HR managers should ensure that they keep up with new technologies to enhance the performance of their HR functions. This paper satisfies the study objectives since it explores the impact of technology on HR

Monday, November 18, 2019

Aviation Inspection and Maintenance System Research Paper

Aviation Inspection and Maintenance System - Research Paper Example 996), since the beginning of the FAA regulation scheme, FAA maintenance personnel have been required to be certificated in order to perform various tasks in keeping aircrafts under repair and airworthy. Moreover, there are other mechanics that are granted inspection authorization by FAA to perform required inspections on all aircrafts operating in the national airspace (Eichenberger, 1996). Furthermore, federal aviation regulations have been put in place to regulate maintenance and inspections and define operating limitations for aircrafts having different kinds of certifications (FAA, 2008). The federal aviation regulations provide five regulation options that should be adapted by all the aircrafts operating in US airspace. These are the continuous airworthiness inspection program, inspection program used by air taxi operator, inspection program used by air travel club, a manufacturer’s inspection program and any other inspection program developed by the owner and approved by the administrator (King, 1986). According to Patankar and Taylor (2004), to reduce the aviation risks, aviation maintenance strategy should optimize the contribution of people and information through technical support. However, Garland et al. (1999) indicate that human factors such as the individual differences of aviation inspectors have a very great influence on the process of inspection and maintenance of aviation facilities and equipment. Several factors resulted in occurrence of this accident. One of the key factors is the failure of an air traffic control system to facilitate the dissemination of key, available wind information to the air traffic controllers and the pilots due to poor maintenance. In this case, both the pilot and the traffic controllers were not aware of the presence and effect of the gusting wind that was being experienced at the airport. It is clear that if the two were aware they could have chosen to delay the flight or could have chosen another runway and the

Friday, November 15, 2019

Climate Change And Renewable Energy Options

Climate Change And Renewable Energy Options Climate change is the consequence of any kind of adjustments in the climate system. Change in climate is caused by fluctuations in the factors that influence climatic patterns. This phenomenon has become one of the greatest environmental threats and risks that the world is facing. Persistent human activities such as driving cars, farming, deforestation, and industrialization result into production of greenhouse gases. These gases gather in the atmospheric space, and trap the heat from the sun. This is what causes climate change manifested through global warming and other processes. The effects of disruptive changes have led to catastrophic events like storms, droughts, rise in the sea levels, and floods (Kammen Casillas 2010, p. 1181). Climate change is majorly caused by greenhouse gas emissions. Most of the intervention efforts meant to mitigate the impacts of climate change thus target human activities that contribute to additional emission of greenhouse gases into the atmosphere (Letcher ScienceDirect 2009, p. 67). Therefore, renewable energy has been considered as one of the leading solutions to climate change. Provision of carbon-neutral sources of power, heat, transport fuels and renewable energy options has been considered by environmental scientists as a great move in the right direction. The objective is to enact a transition from high to low carbon economy. Although the renewable energy sector is quickly changing, climate change crises dictate that the energy system be drastically transformed. This will help in combating the dangers that are associated with global warming that threatens to slump the global economy in the face of globalization and industrialization. Roggema (2009, p. 211) cited air pollution caused by transport and power sectors of the economy have been a great threat not only to the human health but have also shifted the climate systems. Prospective Interventions to Address Climate Change Crisis Climate change as an environmental problem is essentially a problem caused by the extreme utilization of fossil energy. Agriculture, changes in land use, cement production and use of chemicals all contribute to the emission of the greenhouse gases (Roggema 2009, p. 234). However, 70% of the global warming/climate change problems is caused by unsustainable use of fossil fuels. Therefore, in order to deal with the problems related to climate change, there has to be a shift from use of fossil fuels at home, in the industries, transport and generally the entire sectors of the economy (Roggema 2009, p. 203). In order to avert the challenges associated with climate change, saving of energy is essential. Electricity, automobiles and carbon emissions are the main causes of problems related to climate change. The regular incandescent light bulbs should thus be changed and replaced with the energy saving compact fluorescent bulbs which are more efficient and energy saving. The emissions that result from automobiles like motor vehicles, motorcycles should also be reduced (Letcher ScienceDirect 2009, p. 154). Climate change has been caused by human activities such as deforestation in search of more space for agricultural activities. Therefore carbon dioxide concentration in the atmosphere continues to rise. Being a greenhouse gas, carbon dioxide has contributed to the rise of global temperatures. Roggema (2009, p. 183) cited that human activities that encroach to the environment should thus be limited to prevent further crises associated with global warming. Traditional methods of conservation of forest ecosystems should be embraced to preserve the ecosystem and mitigate the effects of climate change (Tracy 2010, p.353). Therefore reforestation should be encouraged so that the greenhouse gases like carbon dioxide are reduced from the atmosphere. Farming activities that promote environmental hazards such as soil erosion should thus be limited and replaced with farming approaches that are environmentally custodial. Industrialization is the major contributor to climate change. This is because of the emission of the greenhouse gases like Nitrous Oxide and Carbon dioxide (Tracy 2010, p. 354). In order to avert climate change challenges there should be focus on change in the energy used in the industries from the dirty to clean energy. Climate change scientists have advocated for the use of renewable energy as the solution to the climate change problems that are caused by the use of environmentally hazardous fuels like coal and nuclear energy in the industries in the global economy (Tracy 2010, p. 355). Climate Change and the options for Renewable Energy Human activities and natural environmental processes are all responsible for climate change. Natural causes include volcanic eruptions, ocean currents, changes in the earths orbit and solar variations. An eruption of volcanoes throws out great volumes of sulphur dioxide, water vapor, dust, and ash into the atmosphere (Wengenmayr 2008, p. 141). The large volumes of gases and ash have the ability to influence climatic patterns by increasing the planetary reflectivity leading to atmospheric cooling. The aerosols are produced by volcanoes also affects the purity of air in the atmosphere. These contribute greatly to climate change. The oceans currents are considered a great threat to the climate stability. The currents release great amounts of heat across the planet. Besides, the interaction between the ocean and the atmosphere can produce El Nino. The oceans determine the atmospheric concentration of carbon dioxide. This implies that changes in the ocean circulation greatly affects climate and significantly contributes to the climate (Wengenmayr 2008, p. 231). Climate change has been caused by human activities. MacZulak (2010, p. 9) cited that this is majorly through the burning of fossil fuels, changes in the land use, and industrialization. With industrial revolution of the 19th century, fossil fuels have been used to support industrial processes. Fossil fuels such as oil, coal and natural gas have been great energy supplies for the industrialized economies. However, these sources of energy have contributed to great emissions of the greenhouse gases in the atmosphere. These are responsible for climate change (MacZulak 2010, p. 8). Carbon dioxide concentration in the atmosphere has increased because of human activities such as deforestation and agriculture. Methane is released through oil drilling, mining of coal, leaking gas pipelines, landfills and waste dumps (MacZulak 2010, p. 9). These greenhouse gases cause great increase in the climate change and are significantly responsible for global warming. The greatest cause of climate change and global warming however is the burning of the fossil fuels. These fuels cause emission of greenhouse gases into the earths atmosphere leading to depletion of the ozone layer and global warming (Twidell Weir 2006, p. 143). Options for Renewable Energy The term renewable energy is used in reference to the energy resources that occur naturally in the environment and can always be re-used after the initial function. Examples of this energy are the solar, wind, hydro, and geothermal energy. Rivers, biomass and garbage are also considered as renewable energies (Abid, Crawford Davoudi 2009, p.167). Renewable energy is the future of the earths energy needs. However, in order to effectively combat climate change-related challenges, the global mean temperatures have to be kept below two degrees Celsius. This calls for prior planning and transformation of the industrial sectors use of energy. Renewable energy has the potential decreasing the use of fossil fuels that are to blame for most of the problems associated with climate change (Abid et al 2009, p. 169). Renewable energy sources such as wind energy, solar energy, and the bio-fuels are increasingly being used as energy alternatives. With the climate change and its crises, such form of energy has the advantage of energy security since the fossil fuels will be depleted as a result of climate change. Climate change is largely a consequence of anthropogenic activities such as burning of the fossil fuels, industrial processes, deforestation and the release of greenhouse gases into the atmosphere. It is estimated that the power sector by itself contributes about 40% of the total carbon emissions (Abid et al 2009, p. 297). This can only be altered by shifting to the use of renewable energy. Climatic impacts such as tsunamis, droughts, wildfires, floods, storms, heat waves and tornados are consequences of climate change (MacZulak 2010, p. 8). However, according to the climate change specialists, clean air policy that includes use of renewable energy can substantially mitigate the negative impacts of climate change caused by fossil fuels. Renewable energy technologies are considered to be the most potential mitigation for greenhouse gases. In the steadily growing awareness on the importance of environmental protection priorities, renewable energy is considered appropriate in the mitigation of climate change effects (Chiras 2007, p. 67). Renewable energy is the alternative to the climate change crises since it does not produce greenhouse gas emissions and pollute the air as is the case with the fossil fuels. Chiras (2007, p. 17) indicated that biomass energy for example, has been used as an alternative for fossil fuels so as to conserve the environment. It is considered a greenhouse gas neutral since its combustion releases no more carbon dioxide than was absorbed during growth period of the organic material. Biomass fuel also contain little sulphur and low combustion temperatures. This limits the formation of nitrogen oxide which is a greenhouse gas dangerous to the environment (Abid et al 2009, p. 269). Responding to Climate Change The transport industry is driven mostly by petrol. This causes emission of carbon dioxide into the atmosphere. The carbon dioxide combines with other greenhouse gases in the atmosphere and cause global warming. In order to deal with this menace, there is need for countries to invest in energy efficient technologies like plug-in hybrid electric vehicles and new technologies such as hydrogen cars (Abid et al 2009, p. 297). This has the potential of reducing petroleum emissions of greenhouse gases into the air. Further, there is need to shift from air and truck transports to electric rail transport that reduces emissions significantly. Industries should shift from the fossil fuels to use of bio-fuels such as ethanol and biodiesel fuels should be used in the gasoline engines in the industrial economies. Abid et al (2009, p. 169) cited that electric vehicles can contribute into reduction of dangerous gases into the atmosphere especially if the energy is produced through the renewable energy sources. In order to deal with climate change and environmental crises associated with it, elimination of waste methane is required. Methane is considered to be one of the strongest greenhouse gases that are responsible for the climate change problems. Waste methane should thus be dealt with responsibly. This is through careful handling of oil wells, landfills, coal mines and the waste treatment plants (Chiras 2007, p. 17). This will provide a net greenhouse gas emission benefits. Biomass as a source of bio-energy can be used to capture carbon. Biomass traps carbon dioxide in the atmosphere through photosynthesis. When biomass is decomposed through combustion, carbon is released as carbon dioxide. This is the process involved in the carbon cycle. Biomass fuelled power plants result into a net-negative carbon dioxide emission. This implies that there will be less carbon in the atmosphere will be trapped through the technology and reduce greenhouse gases that are a threat to the environment (Abid et al 2009, p. 169). The adoption of renewable energy technologies is strategic in addressing the problems associated with climate change and global warming (Ehrfeld 2009, p. 113). From 1970s and 80s, development agencies have promoted small-scale renewable energy technologies. This includes the use of biogas, cooking stoves, the wind turbines and solar heaters in the industrializing countries. In the large scale developing countries have responded to climate change through the use of ethanol in the transport sector. This is especially the case in Brazil. In India, biogas is being used in households for lighting and cooking. Grid connected power in India and hydropower are being used in India and Nepal respectively as renewable sources of energy and safe energy for environmental conservation (Ehrfeld 2009, p. 119). Naturally Sustainable Renewable Energy As oil reservoirs and oil wells in the world run dry due to extensive exploitation and use in the energy sector, there is also an outcry in the environment that is caused by their consequences. Renewable energy sources include geothermal energy, solar, hydroelectric, biomass and wind energy (Chiras 2007, p. 233). These forms of energy have been considered to be the most environmental friendly because they dont produce high levels of greenhouse gases and other substances that are not environmentally friendly. The challenge that these forms of renewable energy have is sustainable use. Hydroelectric power uses the movement of falling water to run the turbines. Unlike other sources of energy, hydroelectricity does not depend on the fuels like natural gas or petrol to run the engines. This makes it more environmentally friendly. Besides, it is more sustainable with the sustainability of the environment so that water capacity of the dams is not interfered with. It uses the natural progression nature to generate electricity (Chiras 2007, p. 117). Hydroelectric power does not produce direct waste that pollutes the environment. It is thus considered to be environmentally sustainable (Ehrfeld 2009, p. 114). The carbon dioxide levels produced by hydroelectric power plants are considerably very low. This is however only produced during the construction stage of the plants and not in the operational phase of the plants making it environmentally friendly. As a renewable source of energy, hydroelectric power does not need the use of fuels to run the turbines. The use of petrol in the production of hydroelectric energy is not existent. This implies that when the price of the fossil fuels rises, the hydroelectric plants are often not affected. This makes it a sustainable and reliable source of energy when compared to other sources of energy (Ehrfeld 2009, p. 116). It also means that the consumer price of this form of renewable energy is fairly constant. In terms of sustainability, hydroelectric power stations last longer than the energy plant stations that are powered by fossil fuels. They are generally easy to maintain and pose no much threat to human life and property. Hydroelectric energy plants contribute to conservation of the environment. In the countries where great investments have been done in the hydropower such as Bhutan, environmental stewardship and custodianship is encouraged. Ehrfeld (2009, p. 119) cited that since it depends on water, a lot of forest conservation and reforestation is encouraged. This helps in the reduction of the carbon dioxide concentration in the atmosphere. The human activities that contribute environmental degradation are also reduced through investment in the hydroelectric power plants. Climate change is caused by human activities that tamper with the environment. However, when a country invests in the hydroelectric plants, environmental conservations efforts are boosted. With the conservation of the water catchment areas and the forests, hydroelectricity becomes a very sustainable and reliable source of renewable energy. As it produces clean energy through environmentally friendly approaches, it also helps in the protection of Mother Nature (Ehrfeld 2009, p.121). International Agreements and Government Interventions in Climate Change Various intervention efforts have been made at the community and individual levels to combat climate change and to reduce the negative effects of human activities on the environment. However, much is still needed to be done especially at the inter-state and governmental level. One of the efforts that the governments from the industrialized countries are making in the mitigating climate change is through the Kyoto Protocol. The focus of the protocol is in the reduction of greenhouse gas emissions especially from the industrialized countries by 2012. The developed countries have the responsibility to reduce their emission of greenhouse gases from their large industries. These gases contribute to global warming and climate change. The Kyoto Protocol intervention targets reduction of carbon in the atmosphere (Karlsson, Lund, Mathiesen 2010, p. 488). This is through emission trading, clean development mechanism and the joint implementation. These strategies target reductions of greenhouse gases in the atmosphere. The countries that are signatories are thus investing in renewable energy technology options in the industries. The UK government considers climate change as a priority. Its approaches include targeting households to help in energy saving and strengthen renewable energy adoption. Civil society, community and private organizations are also strengthened through grants to help in generation of renewable heat from the renewable sources (Ehrfeld 2009, p. 115). The industrialized countries are re-focusing investments towards generation of renewable energies that are environmentally friendly and are sustainable. There is thus need to encourage less use of fossil fuels and more investment in the bio-fuels. Improvement of energy efficiency is a good government strategy for dealing with the climate change problems. Reduced use of energy implies reduced production of carbon dioxide. Karlsson et al (2010 p. 501) cited that this calls for more efficient vehicles, motors, appliances and industrial processes. Besides, development of renewable energy sources such as solar, geothermal, hydroelectricity, and biomass should be encouraged to reduce the consequences of greenhouse gases in the atmosphere. The transport sector should reduce gasoline consumption. The trucks, cars and buses use almost half of the oil in the United States. There is therefore urgent need for investment in electric and fuel-celled vehicles so as to reduce the emission of carbon dioxide. Transport policies should also encourage less driving of single-passenger vehicles in order to reduce greenhouse emissions (Ehrfeld 2009, p. 115). Human activities that involve land use are largely to blame for destruction of the environment. Governments should focus on developing agricultural policies that discourage environmentally hazardous practices and activities such deforestation and other human activities that are dangerous to the environment. Climate change has negatively impacted on food security. In order to therefore fight poverty, climate change must be addressed through agricultural activities and policies that are environmentally friendly (Kammen Casillas 2010, p. 1181-1182). Conclusion Climate change is greatly caused by human activities more than the natural processes. Industrialization and agricultural activities are largely responsible for the production of greenhouse gases that promote global warming and other consequences. These threaten wildlife and human existence and as such should be addressed. Renewable energy is the potential rescue of the environment from the negative effects of human activities. Governments and countries thus need to use less of fossil fuels and invest more in renewable energy technology options. These include hydropower, geothermal, wind energy and other reliable sources of environmentally friendly renewable energy sources.

Wednesday, November 13, 2019

Prose and Style in Sons and Lovers :: Lawrence Sons and Lovers Essays

  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   [1]And after such an evening they both were very still, having known the immensity of passion.   [2]They felt small, half afraid, childish, and wondering, like Adam and Eve when they lost their innocence and realized the magnificence of the power which drove them out of Paradise and across the great night and the great day of humanity.   [3]It was for each of them an initiation and a satisfaction.   [4]To know their own nothingness, to know the tremendous living flood which carried them always, gave them rest within themselves.   [5]If so great a magnificent power could overwhelm them, identify them all together with itself, so that they knew they were only grains in the tremendous heave that lifted every grass-blade it's little height, and every tree, and living thing, then why fret about themselves?   [6]They could let themselves be carried by life, and they felt a sort of peace each in the other.   [7]There was a verification which they had had together.   [8]Nothing could nullify it, nothing could take it away; it was almost their belief in life.      Ã‚  Ã‚  Ã‚  Ã‚   [9]But Clara was not satisfied.   [10]Something great was there, she knew; something great enveloped her.   [11]But it did not keep her.   [12]In the morning it was not the same.   [13]They had known, but she could not keep the moment.   [14]She wanted it again; she wanted something permanent. [15]She had not realized fully.   [16]She thought it was he whom she wanted. [17]He was not safe to her.   [18]This that had been between them might never be again; he might leave her.   [19]She had not got him; she was not satisfied.   [20]She had been there, but she had not gripped the-the something-she knew not what-which she was mad to have. (336-337)      Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   This passage, from D.H. Lawrence's novel, Sons and Lovers, describes the thoughts of Paul Morel and Clara Dawes after they have spent an evening of passion together.   It is now that Paul and Clara realize that they are not able to fulfill each other's needs adequately.   Most of the sentences are complex, illustrating the complexity of the situation and the character's thoughts, yet the speech is simple and descriptive.   Lawrence's can be seen by   examining the diction, grammar, and the rhythm and sound devices.

Sunday, November 10, 2019

Scramble For Africa DBQ

European powers gave the illus. on of choice to the people and then backed them up with torture and bullets when they rises De. African Nations responded to colonization efforts by holding on to their religious bell fees and through militaristic resistance while other just remained to their destined faith that WA s set up to them by European Powers. In order to better analyze this issue, it would be helpful to have a document that is a response from African merchants that detailed the possible e economic consequences of European Colonization.Many Africans saw that that their fate had been made as soon as the European powers marched in and began occupying and colonizing their lands so they g eve in without a fight at all. The Royal Niger Company, commissioned by the British government NT to administer and develop the Niger River delta and surrounding areas and many African rue leers signed the form in 1886(Doc 1). Many African leaders just signed their lands away not eve en standing u p for their lands they just subsided with the British thinking things would be bet terror them if they just have in when in reality it didn't make anything better.Shanty leader Premier I turned down an offer that would protect him and his people. But he also said that â€Å"at the same time remain friendly with all White men†(Doc 2). Premier may have not agree De to the British logic of protection but he did want to remain friendly with the whites which t urine out to be a major flaw for the Chiantis. Next, Indians Kamala and African veteran of the Needle Rebellion tells how his people surrendered to the white people and tried to live e their lives as normal as they possibly could(Doc 4).Once again the Africans just submitted t o the their fate Mr. Sullivan and attempted to live their lives as normal Africans. They might as well as off get for their lives and freedom because they were treated as slaves and when an unrecognized r billion broke out against the Europeans, the Eu ropeans quickly overpowered them and ma y Africans died. This was described by Indians Kamala as † They-?the White men-?fought t us with big guns, machine guns, and rifles.Many Of our people were killed in this fight: I s away four of my cousins shot. We made many charges but each time we were defeated†(Doc 4 Lastly, Samuel Marcher a leader of the Hero people described in a letter to another African leader how â€Å"All our obedience and patience with the Germans is of little avail, for each h day they shoot someone dead for no reason at 7). Many people in Africa just b Egan giving in to all the changes that were taking place around them by European powers.

Friday, November 8, 2019

How to Apply for College in the US as an International Student

How to Apply for College in the US as an International Student SAT / ACT Prep Online Guides and Tips According to the Institute of International Education, almost 975,000 international students studied at colleges in the United States last year. If you’re hoping to be one of those students, then this guide is for you. To help you through the college application process, this guide will go over all the steps you need to take, from translating your transcript to taking the TOEFL. Before jumping into the process of international student admissions, let’s review how your application process is the same as a U.S. student's and how it’s different. Applying to College: International vs. Domestic Students As an international student, you'll largely take the same steps to apply to U.S. colleges as students from the U.S.You'll just need to add a few extra steps to account for differences in languages, school curriculum, andgrading systems. Below, you'll find an overview of the main similarities and differences between applying for college as an international student in the U.S. and applying as a domestic student. How Applying Is the Same Many of the steps you’ll take to apply to college in the U.S. are the same ones that domestic students take. You should apply to several schools to increase your chances of getting accepted. Eight to nine is a good number, but some students apply to even more. You’ll apply by an early deadline, usually in November of senior year, or a regular deadline, usually in January or February of senior. Some schools have even later deadlines that fall in the spring or summer. You might use the Common Application or Universal Application, both of which can just be filled out once and sent to several schools. If any of your prospective colleges don’t accept those applications, then you’ll fill out a separate one. Your application will contain your personal information, like your name and date of birth, as well as any extracurricular activities, jobs, or internships. You’ll also send a personal essay, one or more letters of recommendation, a transcript with your high school grades, and, for most colleges, SAT or ACT scores. A few colleges also ask you to answer supplemental essay questions, which call for shorter responses than your mainpersonal essay. The bulk of the application process is the same for international and domestic students, but international college students do have to take some additional steps. Read on to find out what these steps are. How Applying Is Different There are a few extra steps if you’re applying as an international student. First, you might have to take the TOEFL if you’re from a country where the official language is something other than English. The TOEFL (or its alternative, the IELTS) is a test that demonstrates your English language proficiency. Second, you may need to get your transcript and any other academic credentials evaluated by an approved organization. This evaluation puts your courses and grades into U.S. terms so that admissions officers can understand them. If financial aid is important to you, then you’ll have to figure out whether you can obtain aid directly from colleges. Federal financial aid is only available to U.S. citizens. You might also apply foroutside scholarships. Finally, you’ll need to sort out the legal requirements of living in the U.S. by applying for a student visa. Usually, you apply for your student visa after gaining admission to a college and accepting a place in the next class. Now that you have a sense of the unique requirements for international student admission, let’s dive into the application process, step by step. Read on to learn how each piece of the international student application fits together! How to Apply to College as an International Student Many colleges are seeking to make their campuses more globalizedand welcome international applicants. At the same time, there aren’t as many spots available for international students in the USA as there are for domestic applicants, so you shouldmake sure you understand the college process and can send off the strongest application possible. Colleges vary in their individual policies and requirements, but for the most part, they all ask for the same materials. Most collegesask forthe following: Application High school transcript SAT or ACT scores TOEFL scores Personal essay (and any supplemental essays) Letters of recommendation Many of these components take months or even years to prepare, so college planning should start early in high school. Let’s talk about each of these application components in detail, along with tips for preparing each. The Application You can think of your application - the actual forms that contain your personal information - as the umbrella that covers all the other documents you’ll send. Each school has its own application, but many accept the Common Application and/or the Universal Application. These are both free services that allow you to fill out just one application and send it to several schools. Colleges that don’t accept these applications, such asstate schools in California and Texas, have their own application systems. Regardless of whether you use the Common Application or a school-specific application, you’ll find that both look pretty similar. Applications will ask for your personal information, like your name, address, schools attended, and any extracurricular activities. If your school requires an essay, then you’ll usually paste your essay into your application. You may also invite recommenders via email to upload their reference letters. While creating an account and filling out your application is free, submitting it requires a fee. Some schools have no application fee while others cost as much as $80 or $90. The average application fee is around $35 to $40. If the fees are burdensome, you may be able to obtain a college application fee waiver from the colleges that you’re interested in. Below you’ll find a few more tips to help you prepare your college applications. Tips for Your College Application Preparing to apply to college is a process that can start at the beginning of high school. Colleges will look at all four years of your classes, grades, and extracurricular involvements, so it helps to consider your college goals as you make choices throughout 9th, 10th, th, and 12th grade. Most students apply to several colleges; typically, eight or nine is a good number. That way they can maximize their chances of getting accepted. Students usually apply to two to three safety schools, or ones where their credentials are well above that of the average accepted student. They also apply to schools to which getting accepted is more challenging - usually two to three match schools and two to three reach schools. The application forms themselves are not all that time-intensive. You should give yourself at least a month before your deadlines to fill them out and proofread for any errors. As an international student, you might be in a good positionto emphasize any language skills or unique multicultural experiences that you have. The aspects of your application that require months, if not years, of planning, are your SAT/ACT scores, TOEFL scores, essay, and letters of recommendation, as you’ll learn more about below. First, let’s consider another piece of your college application, your high school transcript. Depending on college policy, you might need to translate your transcript. High School Transcript To determine admission, colleges look closely at high school grades. To show schools this important information, you’ll send an official transcript. Usually, your school must send your transcript in a sealed envelope. For some schools, you can send your transcript directly. Others will ask you to get it translated and certified by an official credential service. If your school uses a different grading system than the 4.0 scale used in the U.S., then you may have to send off your transcript for evaluation. This transcript service may cost around $100. The company should be a member of NACES, the National Association of Credential Evaluation Services, like World Education Services, Inc. Some colleges will allow you to use unofficial translators. Tufts, for example, says â€Å"Acceptable translators include English teachers or other school officials, professional translators, or a local EducationUSA office. Students do not need to utilize credential evaluation companies of any sort.† Read on a few tips for sending your high school transcript to U.S. colleges. Tips for Your High School Transcript Colleges look at your grades throughout high school, as well as your course selection. They consideryour commitment to your academics, your progress in particular subjects, and the extent to which you challenged yourselfwithhigher level courses. Each college sets its own admissions policies, so make sure to research each school on your list about what it wants you to do with your transcript. You should be able to find this on the international admissions page on its website. If you can’t find this information online, you should email or call the admissions office directly. If you need to use an evaluation service, then you'll have toplan especially early. These services typically take about seven business days after receiving your documents. You might start the process about a month before your deadlines to make sure everything arrives in time. In addition to your grades, your SAT or ACT scores are another important part of your college application. Below we'll take a closer look at thestandardized testing partof your college applications. Schools may be very different from one another,so standardized tests, like the SAT and ACT, are usedto bridge the gap. SAT or ACT Scores For most four-year U.S. colleges, your SAT or ACT scores are an important part of your candidacy. Colleges consider both tests equally, so it’s up to you to decide which one you’d rather take. Some colleges additionally require SAT Subject Tests, though they usually waive this requirement if you send ACT scores. While you can self-report your scores on your application, you’ll need to send official score reports via your College Board (for the SAT) or ACT, Inc (for the ACT) accounts. If you send multiple score reports, many colleges will â€Å"superscore† your results, or take your highest scores by section and recombine them into the highest possible composite score. The SAT and ACT require lots of prep and planning, and we have tons of resources to help you achieve your target scores. For now, let’s go over a few of the most important tips for planning for these important tests. Tips for the SAT and ACT The SAT and ACT are challenging tests, and both require a lot of prep to do well. To start your planning, you first need to decide which test to take. Familiarize yourself with their similarities and differences, and choose the one on which you can gain the higher score. Then, you canset a goal for yourself. Determine your target scores based on personal goals and your colleges’ expectations. Most colleges publicize the average SAT or ACT scores of accepted students, and you can also find this information on PrepScholar’s database of schools by searching for "name of college + PrepScholar."Once you know the average, you can aim for an even stronger score to be a competitive candidate. You might start your prep with a timed practice test to gauge your current scoring level and diagnose your strengths and weaknesses. Depending on how much you seek to improve, you can figure out how long you need to study. A score improvement of only 30 points on the SAT may just call for about 20 hours of studying, for example, while a score improvement of a few hundred points could require over 150 hours. Lots of students take the SAT or ACTmore than once to achieve their target scores. As mentioned above, many colleges superscore your results,so you don’t have to worry about increasing your score in one section but decreasing in another. If retaking the SAT or ACT is in your plans, then you’ll need to leave yourself enough opportunities to retest. You might take the SAT or ACT for the first time in your sophomore year. That way, you can take it again as a junior, and even in the fall of senior year if you seek improvement. Your SAT and ACT scores show that you have the academic skills to succeed at the college level. If you’re a non-native English speaker, then you may also have to take the TOEFL to demonstrate that you have college-ready English language skills. Hope you're feeling chatty! The TOEFL will get you speaking in English. TOEFL Scores If your native language is something other than English, then you may have to take the TOEFL (or its counterpart, the IELTS) to demonstrate your English language proficiency. Unlike the SAT or ACT, the TOEFL is computer-based in most countries. Its scoring scale ranges from 0 to 120, and it tests your Reading, Listening, Speaking, and Writing skills. Many schools require a minimum TOEFL score. If you don’t have the requisite TOEFL scores, then the rest of your application doesn’t matter! The TOEFL is definitely a test to be taken seriously if you want to study at a U.S. college. Like the SAT or ACT, you could take the TOEFL more than once to achieve your target scores. Here are just a few examples of colleges with a TOEFL requirement. The TOEFL iBT is the internet-based test; the less common TOEFL PBT is the paper-based test, and its scoring scale ranges from 310 to 677. College TOEFL iBT TOEFL PBT American University 100 600 Boston University 95 550-600 Harvard 100 600 Northeastern 79-80 550 Penn State 90 550 UCLA 87 560 A few schools will waive the TOEFL requirement if you achieve a minimum score on the verbal sections of the SAT or ACT. Because these sections require strong English skills, they can sometimes act as a stand-in for the TOEFL. As with every other part of your application, you’ll need to research each college of interest to learn about its stance and plan accordingly. Below you’ll find a few more tips for planning for the TOEFL. Tips for the TOEFL As an international student, you may have the double challenge of prepping for the both the SAT or ACT and the TOEFL. You’ll have to set aside time to study for both tests and arrange a testing schedule that works for you. Like the SAT or ACT, you may want to start studying at least three months before your first test date. Set aside several hours each week to review with high-quality practice materials and take practice tests. The earlier you start, the more available test dates you’ll have to retake the TOEFL if need be. If you have strong language skills early in high school, then you might consider taking the TOEFL in 9th or 10th grade. Then you can devote even more timeto other tests and application components. If you wait until later in your high school career, then you should take the time to devise a study plan that balances your time between both the TOEFL and the SAT (or ACT). In addition to your grades and test scores, admissions officers are also interested in learning more about you as a person. One way that they accomplishthis is by reading your personal essay. Your college essay can be about whatever you want! This one about the megastore, Costco, got its writer into five Ivy League schools. College Essays Many 4-year colleges claim to use a holistic admissions process, in which they consider not just your grades and test scores, but also your personal qualities and motivations. One way that they get to know you as a person is through your personal essay. In your personal essay, you’ll typically be asked to reflect on a meaningful experience in your life and how it shaped your identity. What you choose to write about should reveal something significant about your values, and your essay as a whole will show your writing style and thought process. If you use the Common Application to apply to colleges, then you’ll choose one of five prompts for your essay. Here are just three examples of Common Application essay prompts: The lessons we take from failure can be fundamental to later success. Recount an incident or time when you experienced failure. How did it affect you, and what did you learn from the experience Reflect on a time when you challenged a belief or idea. What prompted you to act? Would you make the same decision again? Discuss an accomplishment or event, formal or informal, that marked your transition from childhood to adulthood within your culture, community, or family. As you can see, the essay prompts ask you to share something personal and meaningful. Schools that don’t use the Common Application will likely have their own essay prompt. They might look similar to the ones above or simply ask why you want to attend the college and to describe some of your future goals. Some colleges, especially the more selective ones, will ask additional supplemental essay questions. These are shorter in length, perhaps a few paragraphs or less, and vary by school. They might ask why you want to attend the school or to talk about a favorite book or artist. Some are abstract, like Tufts’ question, â€Å"What makes you happy?† Others are kind of random, like the University of Virginia’s recent prompt, â€Å"To tweet or not to tweet?† Whatever the supplemental questions, they vary by college and should not be overlooked. Below you’ll find a few tips for writing your college essays. Tips for Your College Essays The college essay is a unique piece of writing. It requires you to be introspective and to share something that’s meaningful to you on a personal level. The best essays tend to zero in on a particular experience that reveals something significant about the writer’s identity. The personal essay’s a challenging assignment, so you should give yourself several months to work on it. You might take several weeks to brainstorm the right topic. Once you come up with a draft, you might share with teachers, friends, and families for feedback. Ultimately, though, the essay should be in your voice and stay true to who you are. As an international student, you may be able to bring unique multicultural experiences or language skills to campus. Your essay’s a great opportunity to share your perspective and show admissions officers why it should be represented on campus. Supplemental essays, while not as lengthy as the personal essay, are also an important part of your application. Probably the most common mistake that students make with supplemental essays is rushing through them and producing generic answers. Your supplemental essays should be specific and customized to each school.They’re typically an opportunity for you to show what you know about the college and your particular reasons for wanting to attend. While admissions officers learn about you from your personal essays, they also get to know you through your recommendation letters. Rather than hearing your voice, they hear what your teachers and/or counselor have to say about you. Ask a teacher who's happy to paint a flattering picture of you in her letter of recommendation. Letters of Recommendation The final important piece of your college applications isyour letters of recommendation. Requirements for reference letters vary; some colleges don’t ask for any, while others ask for one, two, or even three. Usually, colleges want to see one or two recommendations from teachers and one from your school counselor. If you don’t have a counselor, then you might get one from a principal or other administrator. You’ll choose your recommenders and ask them if they’d be willing to provide you with a recommendation. Then you’ll invite them to submit their letters through your online application. Your recommendation letters should speak to both your academic and personal qualities. Like your essays and the rest of your application, they should give admissions officers insight into your strengths and skills as a student, as well as your personality and character. In addition to our in-depth guides on recommendation letters for college, you’ll find a few tips below. Tips for Your Letters of Recommendation Just as you should give yourself plenty of time to write your college essay, you should give your recommenders sufficienttime to write your letters. You should ask your recommenders at least one month before your deadlines. You might also ask at the end of junior year. It’s best to ask teachers who had you recently and for a whole year; junior year teachers tend to be a good bet. If your teachers write in another language, then you’ll have to get your letters translated. The best letters come from educators who know you well, so you should ask teachers with whom you have a strong connection. You might also share your own thoughts and ideas via conversation and a â€Å"brag sheet,† a document you can prepare to help your teachers. You couldtalk aboutyour favorite classes, significant experiences, and academic and personal goals for college. For many colleges, your recommendation letters are a very important part of your college application. Admissions officers are sifting through many strong applicants and trying to gain a clearer idea of who you are as a person. Your recommendation letters are a great opportunity to showcase your positive relationships with your teachers and successes in school. Now that we’ve gone over the main parts of your college application - the application itself, transcript, standardized testing scores, essays, and letters of recommendation - let’s consider some final tips for applying to college as an international student. Keep these final tips in mind as you make plans togrow academically and personally at a U.S. college. Applying to College as an International Student: 3 Final Tips Applying to college is a complex process, and it becomes even more complicated for international college students due to additional steps, like taking the TOEFL and having your materials translated and certified. By familiarizing yourself with the entire process, you can make sure that you have enough time to prepare all your materials by the deadline. With this knowledge, you can produce a competitive application that will secure you a spot at a U.S. college. As you work your way through the steps, remember these three key tips. 1. Don’t Underestimate the SAT/ACT or TOEFL Doing well on standardized tests is important for all college applicants, and it becomes even more significant for international students in the USA. The TOEFL shows admissions officers that you have the reading, writing, speaking, and listening skills to succeed in college-level classes. The SAT and ACT, furthermore, show your academic skills and college readiness. These tests are meant to measure students on a level playing field, regardless of differences in individual high schools and curriculum (though of course, how well they do this is a matter of debate). Admissions officers may be unfamiliar with your school abroad, so they especially rely on these test scores to make sure you have college-ready skills. As discussed above, you should set aside several months to prep for each test and leave yourself additional test dates if you want to retest and achieve your target scores. If your sights are set on a U.S. college, then make sure you have the SAT or ACT and TOEFL scores to compete with other applicants. 2. Remember that Many Colleges Use a Holistic Process While test scores are important, remember that they’re not the only part of your application. Many colleges use a holistic process to admit students, in which they consider your personal qualities and impact in your school community. Admissions officers want to learn about your interests and pursuits in and out of school. They’re interested in your extracurricular involvements and any leadership positions. They want to see if you’ve done community service, volunteered, or worked a part-time or summer job. They also gain a sense of your role in your school community through your letters of recommendation. Admissions officers tend to be more impressed by deep involvement in a few areas than scattered participation in many areas. You might keep this in mind as you move through high school and choose your activities, as well as when you describe your involvements on your application. Ultimately, applying to college requires a lot of self-reflection about your identity and goals for the future. Think about what’s important to you and what you hope to achieve. Then, reflect this self-awareness through your essays and application as a whole. 3. Plan Early! Finally, the importance of planning early cannot be emphasized enough! There are a lot of moving parts that go into a college application, and none of them can be completed in a short time frame. Admissions officers are interested in all four years of high school, so planning early willhelp you make informed choices about your courses and involvements. For instance, you should try to challenge yourself in one or more upper-level classes and stick with an activity or two throughout your time in high school. Follow your interests and you may have a sense of what subject you’d like to choose as your major once you arrive at college. In the end, you college application will tell a story to admissions officers about your high school experience and identity. By planning early, you can make the most of these years with a goal-oriented, proactive mindset. All of your hard work will pay off when you send off a great college application that gets you accepted into your dream school! What’s Next? Are you figuring out where to apply to college? This guide will help you research colleges and find the best ones for you. Will you be taking the TOEFL and the SAT? Check out this comprehensive guide to learn about the TOEFL and SAT and how to prepare for both. Are you getting ready for the SAT? To help you prepare, we’ve compiled our best articles in the Ultimate Study Guide for the SAT. Want to improve your SAT score by 160 points or your ACT score by 4 points?We've written a guide for each test about the top 5 strategies you must be using to have a shot at improving your score. Download it for free now: