Monday, December 30, 2019

Essay on “The Lottery” by Shirley Jackson A Brutal Tradition

The famous civil rights activist Martin Luther King Jr. once said: â€Å"The ultimate tragedy is not the oppression and cruelty by the bad people but the silence over that by the good people,† capturing the main message of the short story â€Å"The Lottery,† by Shirley Jackson, perfectly, because of the themes of peer pressure and tradition present throughout the story. In this story, the people of a small village gather for their annual tradition, a lottery, in which one person is picked at random out of a box containing each of the villagers’ names. The village, which is not specifically named, seems like any other historic village at first, with the women gossiping, the men talking, and the children playing, but soon takes a sinister turn when it†¦show more content†¦None of the villagers dare to question further until they are chosen, when, having nothing to lose, they hypocritically protest. â€Å"‘It isn’t fair, it isn’t right, ’ Mrs. Hutchinson, [the lottery â€Å"winner†], screamed† (Jackson, 58), just as she was about to die. This argument is further supported when Jackson states: â€Å"Mr. Summers, [the official of the lottery], spoke frequently to the villagers about making a new box, but no one liked to upset even as much tradition as was represented by the black box† (Jackson, 46). This shows how, even though the black box â€Å"grew shabbier each year† (Jackson, 46), the villagers refused to replace it because it represented tradition for them; it represented how much the lottery meant simply because it was a constant, something that did not change. They did not fear change, they feared the consequences of that change. It was easier for them to continue on with the lottery than defy the authority figures bent on maintaining it. As Old Man Warner states: â€Å"Used to be a saying about ‘Lottery in June, corn be heavy soon.’ First thing you know, weâ₠¬â„¢d all be eating stewed chickweed and acorns† (Jackson, 52). The villagers saw the lottery as a mark of their village, believing that removing it would bring doom. In conclusion, the lottery serves no purpose in the story â€Å"The Lottery,† and instead serves as a reminder of human hypocrisy and the dangers of blindly following tradition. It is noShow MoreRelatedThe Lottery by Shirley Jackson1764 Words   |  7 Pagesfilled with excitement and eeriness, leaving the reader speechless. The Lottery , a short story written by famous writer Shirley Jackson, created an uproar on June 26, 1948, when it was published in the magazine The New Yorker (Ball). The gothic thriller, set in an unknown time and place, shares the tradition of a small town, a little larger than three hundred people, in which a drawing is held once a year. In this â€Å"Lottery,† each family’s husband draws a slip of paper from a black box. The husbandRead MoreThe Lottery By Shirley Jackson. 1. Focus/Thesis For Your885 Words   |  4 Pages THE LOTTERY by Shirley Jackson 1. Focus/thesis for your essay on the story you are researching The traditions and the rituals of the lottery authored by Shirley Jackson seems to be just as old as the town itself, more so since most residents don’t actually recall any of the old rituals, ven the Old Man Warner, who celebrates his 77th lottery. This implies that they are archaic in some ways and they are rooted in the traditions and superstitions that seem to include the crops and the human sacrificeRead MoreThe Lottery Short Story Analysis1122 Words   |  5 Pagesâ€Å"The Lottery†, a short story by Shirley Jackson reflects humans deepest nature on tradition. Jackson uses routines as a way of illustrating the festival like qualities of the annual lottery. The setting of vibrant colors in the short story conveys a peaceful tone.The characters are portrayed as loving and caring. The ideas of a festival like a lottery, a homey setting and, the peoples actions all help develop the bigger idea. The people and tradition Shirley Jackson in her short story the â€Å"TheRead More Analysis of The Lottery by Shirley Jackson Essay693 Words   |  3 PagesAnalysis of The Lottery by Shirley Jackson â€Å"The Lottery† by Shirley Jackson was written in 1948. The story takes place in a village square of a town on June 27th. The author does not use much emotion in the writing to show how the barbaric act that is going on is look at as normal. This story is about a town that has a lottery once a year to choose who should be sacrificed, so that the town will have a plentiful year for growing crops. Jackson has many messages about human nature in this shortRead MoreThe Lottery by Shirley Jackson Essay987 Words   |  4 PagesThe Lottery By: Shirley Jackson Summary: The Lottery happens in June every year in a small village of about 300 people. Its a tradition held annually for well over 80 years and Mr. Summers who oversees several civic activities in the community like square dances, teenage club, and the Halloween program as well as the Lottery. The Lottery normally starts around ten oclock in the morning and is finished around noon, the townspeople gather at the center of the town. A small old blackRead More Shirley Jacksons The Lottery Essay1165 Words   |  5 Pagesjustify a traditional custom, the harder it is to get rid of it† (Twain). The Lottery begins during the summer. A small, seemingly normal, town is gathering to throw the annual â€Å"Lottery†. In the end, the townspeople—children included—gather around and stone the winner to death, simply because it was tradition. The story reveals how traditions can become outdated and ineffective. â€Å"I suppose, I hoped, by setting a particularly brut al ancient rite in the present and in my own village to shock the storys readersRead MoreEssay The Truth in the Lottery1338 Words   |  6 Pagesreally has an answer for it, we just do. Traditions are something that is passed from generation to generation, even if we have no backing for what we do, we just know its â€Å"good† and its â€Å"tradition† so its apart of us. Shirley Jackson mocks our way of blindly following certain traditions. Characteristics of Jackson’s story create a parallel with Catholicism, by harping on our fear of change but our ability to manipulate what we want from our traditions and the basis of Catholicism’s belief of theRead MoreCatholicism Exposed in The Lottery by Shirley Jackson Essay1303 Words   |  6 PagesTraditions are something that are passed from generation to generation. Tradition becomes a part of who we are as a scociety. Shirley Jackson mocks society’s way of blindly following certain traditions. Ch aracteristics of Jackson’s story create a parallel with Catholicism, by harping on our fear of change but our ability to manipulate what we want from our traditions and the basis of Catholicism’s belief of the innocence in children. Shirley Jacksons short story The Lottery has created a clearRead MoreAn Analysis of Shirley Jacksons The Lottery and Flannery OConnors A Good Man Is Hard to Find1360 Words   |  5 PagesShirley Jackson The Lottery Shirley Jacksons short story The Lottery depicts life in a provincial American town with rigid social norms. Mr. Summers symbolizes everything that is wrong with the town; he represents blind adherence to ritual, social rigidity, and resistance to change. His name corresponds with the seasonal setting of The Lottery, too, drawing attention to the importance of his character in shaping the theme of the story. Summers is in charge of the central motif of the storyRead MoreThe Lottery vs the Destructors Essay examples1046 Words   |  5 PagesThesis In Shirley Jackson’s, â€Å"The Lottery†, and Graham Greene’s â€Å"The Destructors†, the author creates a story filled with symbolism, irony, grim reality, and a ritualized tradition that masks evil, which ultimately showcases how people blindly follow tradition. Outline I. Introduction II. Setting B. Time Period III. Plot A. What messages are seen in

Sunday, December 22, 2019

A History of Western Society Chapter 20 Outline - 1694 Words

Chapter 20: The Changing Life of People Marriage and Family Extended and Nuclear Families Extended family was when one spouse of a new marriage goes to live with the other spouse’s family, opposed to living on their own. a. Provided security for adults and children in traditional agrarian peasant economies. Nuclear families were when married couples create their own households. Typically during this time people did not marry young because they could not yet economically support themselves. Work away from Home Many young people worked within their families until they could start their own households. Many boys would often go into apprenticeship in another town for 7 to 18 years. a. Not permitted to marry during this time b.†¦show more content†¦The eighteenth Century Enlightenment a. A general growth in humanitarianism and cautious optimism about human potential had occurred. b. â€Å"spare the rod and spoil the child† along with other quotes led to the idea of showing greater love and tenderness to your children. Schools and Popular Literature Schools and formal education was growing more important a. Schools did not become common until the seventeenth century b. These schools focused on children ages 7-12 who were there taught basic literacy and religion. The struggle between religions promoted literacy a. Both Protestant and Catholic religions saw reading as means of presenting their teachings more effectively. b. Border areas were pushed most to be literate because there was potential influence by other religions. Prussia was first to develop a universal education a. Made attendance in elementary school required by law. b. Other countries soon did the same by setting up religious buildings such as parish schools for children of all economic statuses. c. The Church of England established â€Å"charity schools† specifically for those children in poverty. More entertaining writings were created. a. Examples include humors, fairy tales, medieval romances, fictionalized history, and fantastic adventures. b. These writings acted as both an escape from reality and as lessons for readers. Food and Medical PracticeShow MoreRelatedExploring Ways of Conceptualizing ASD in Africa1439 Words   |  6 PagesDISSERTATION. Exploring ways of conceptualizing ASD in Africa. Questioning the cultural sensitivity of the DSM. Rodeen Beresford-Cole 27/05/14 Exploring research findings of ASD etiology and epidemiology in non-western cultures in developing countries. This will determine whether the DSM is culturally sensitive to other parts of the world. Does the DSM take into account different conceptual social constructs of mental health from diverse cultures? The manual mentions that professionals shouldRead MoreStudy Guide/Outline Chapter 11435 Words   |  6 PagesPART 1 PUTTING CORRECTIONS IN PERSPECTIVE Chapter 1 The History of Crime and Corrections CHAPTER OBJECTIVES After reading this chapter, students should be able to: 1. Define the term corrections, and know how correctional agencies fulfill their mission of protecting society. 2. Identify how corrections can impact the crime rate by understanding the concept of the correctional funnel. 3. Outline the growth of corrections over the past two decades, and describe why the scope of correctionalRead MoreDoes The Gender Pay Gap Actually Exist?1221 Words   |  5 PagesPay Gap Actually Exist? Lecture Outline: The concept of a pay gap between female and male workers has been around for decades, this is because countless studies seek to justify why women earn less than men, and in many disciplines women are more easily subjected to discrimination in comparison to their male counterparts. This unit exposes many underlining factors that ultimately determine whether the gender pay gap truly exists in the contemporary Western hemisphere. The scholarly field thatRead MoreAncient Egypt : A Dominant Empire1407 Words   |  6 Pages1 Running Head: ANCIENT EGYPT Ancient Egypt: A Dominant Empire Zack Horton Lincoln Charter School October 11th, 2015 Mr. Thomas Honors World History Ancient Egypt’s empire was one of the most dominant of the ancient world. Egypt had several periods of great success followed by a change in Egypt’s power. Along with Ancient Egypt’s culture, they also had an amazingly strong religious system and beliefs. The Egyptian Empire was constantly making advancements and mastering different fieldsRead MoreEssay about Winners and Losers in Consumer Society1820 Words   |  8 PagesEssay Plan for Shannon Mack TMA 02: Outline who the Winners and Losers are in Consumer Society Material needing to be referenced and read: * Learning Companion 2 * Chapters 1, 2 and 3 of ‘Making Social Lives’ * Assignment Booklet pages 18 to 20 * CD/DVD’s: * Preparing for Assignments – Developing Skills Audio CD * Evidence in the Social Sciences – Audio CD 1 * Rubbish Society – Audio CD 1 * Making connections: economics and politics – Making connectionsRead MoreThe Value Of Forensic Audit1472 Words   |  6 Pagesturn could mean that the economic crime is evolving into different ,higher impact type so fraud ,including cybercrime. The survey further shows that while some regions reported lower rates of economic crimes and the global trend was steady, Africa, Western Europe and the Middle East showed significant increases in the 2016 survey. The main drivers for the high/and or increased reported cases of economic crime in Africa were South Africa (69 % unchanged since 2014), followed by Kenya and other countriesRead MoreThe Master Of Fine Arts1831 Words   |  8 Pagesdocumentary film based on the production of Immigrant Stories. Therefore, the structure of the study will develop as follows: Chapter I - Literature review: The subject, documentary and participatory documentary. Chapter II - Production stages: Pre-production, Production and Post-Production. Chapter III - The Conflict. Chapter IV- Final Thoughts. CHAPTER I LITERATURE REVIEW The Subject To understand the conflicts that a filmmaker faces while making a documentary based on the productionRead MoreStrayer World History Chapter 112348 Words   |  10 PagesChapter 11: Chapter Outline The following annotated chapter outline will help you review the major topics covered in this chapter. Instructions: Review the outline to recall events and their relationships as presented in the chapter. Return to skim any sections that seem unfamiliar. I. Opening Vignette A. By the start of the twenty-first century, Islam had acquired a significant presence in the United States . 1. more than 1,200 mosques 2. about 8 million Muslims (some 2 millionRead MoreBlack Psychology2214 Words   |  9 Pagesessay where I briefly analyzes and interpret significant and impactful events that has transpired over my last 20 years in my life from school to my community in Portland, Oregon. The objective of this essay is to connect concepts and the course objectives related to Black Psychology which I enrolled in at Florida Agricultural and Mechanical University (FAMU) spring 2009 term. The outline for this essay is in a chronological age order starting from my birth in 1988 till my current experience at FAMURead MoreThe Man Behind The 9 / 11 Attacks Essay1525 Words   |  7 Pagesobjective is to compile and construct a detailed outline of Khalid’s life and draw a conclusion on motives for his attacking of the United States. This will help create a profile of behaviors and choices that will allow Counter-Terror to have information to look for in suspects. Thus, allowing the apprehension of new terrorists. The information that caused this paper to come into existence was reading the 9/11 Report A Graphic Adaptation, specifically in Chapter 5, Al Qaeda Aims at the American Homeland

Saturday, December 14, 2019

Hawaii’s Annexation to the US Free Essays

History is rife with instances of nations wielding power over independent states as a means to gain socio-political or economic ends. In the case of the US, numerous factors buoyed its resolve to acquire territories during the 1890s. Foremost of these is that resource-rich countries showed promise of fueling an industrial America. We will write a custom essay sample on Hawaii’s Annexation to the US or any similar topic only for you Order Now On the other hand, there was the influence of naval strategists. They succeeded in expounding the overall view to American political leaders that there are vast benefits in acquiring territories and ports of strategic naval importance. Under the guise of Manifest Destiny, which rationalized dominant nations’ imperialist expansion in the mid- to late 1800s, the US proceeded to aggressively expand and take control of nations, among them Hawaii. Hawaii’s Annexation to the US The annexation of Hawaii to the United States was preceded by a sequence of events that finally led to that crucial turning point in history. Still reeling from the ruins and desolation of the Civil War, America had rapidly marshalled efforts to promote its interests and embark on an overt colonization of countries that offered it distinct advantages. Before it plunged head-on into an aggressive territorial expansion, it kept a wary eye both on foreign territories that were ideal for its commercial interests, as well as on dominant European powers that were also expanding beyond their borders and establishing colonies. Political and business leaders put forth the idea that â€Å"the rapid industrial development of the United States required the acquisition of foreign territories to gain easier access to vital raw materials† (Tindall and Shi, 2006, p. 59). The desire for new markets to be exploited economically eventually turned to coveting nations and creating an American empire, at all expense. William H. Seward, the United States Secretary of State from 1861 to1869, believed that â€Å"the United States first had to remove all foreign interests from the northern Pacific coast and gain access to that region’s valuable ports† (Tindall Shi, 2006, p. 862) if it intends to successfully conquer Asian markets. A strategic imperialistic ploy adopted to indirectly take control over the economic life of a nation was to enter into trade agreements with them. Many years after the signing of a friendship treaty, came the sealing of the 1875 reciprocal trade agreement between Hawaii and the US, â€Å"under which Hawaiian sugar would enter the United States duty-free and Hawaii promised that none of its territory would be leased or granted to a third power† (Tindall Shi, 2006, p. 86 3). This precipitated the next events that would lead to Hawaii’s annexation. Decades earlier, economic treaties had been offered to Hawaii by Great Britain and France, but the US had asserted itself to uphold its interests in Hawaii. The latter had actually â€Å"signed trade and peace treaties with the United States, England and other foreign nations, each recognizing Hawaii’s independence† (Sforza, 1996, para. 5) and this is why on hindsight, it sees the broken agreement with the US as some sort of betrayal. In retrospect, back in 1820, American missionaries from Boston in 1820 stayed in Hawaii and soon turned out to be powerful sugar planters and politicians who served as advisers to the reigning monarchy (Sforza, 1996, para. 5). Queen Liliuokalani sought to shift power back to the monarchy, but the rapid succession of events eventually led to political turmoil â€Å"engineered mainly by the American planters hoping to take advantage of the subsidy for sugar grown in the United States† (Tindall ; Shi, 2006, p. 64). The imprisoned Queen Liliuokalani had issued a statement that pointed to the role of American diplomat, John L. Stevens in the conspiracy to overthrow the Kingdom of Hawaii. Amidst the commotion, a committee representative of the group that seized power from Hawaii’s reigning Queen Liliuokalani had shown up in the US seat of government in Washington with a treaty calling for Hawaii’s annexation to the US. President Grover Cleveland opposed the treaty and had attempted to restore the queen to power while seeking to provide amnesty to the coup instigators (Tindall ; Shi, 2006, p. 864). In December 1893, he expressed, â€Å"By an act of war, committed with the participation of a diplomatic representative of the United States and without authority of Congress, the government of a feeble but friendly and confiding people has been overthrown† (Sforza, 1996, para. 13). Party politics and other issues, however, eased Cleveland out of office. As fate and US maneuvering would have it, Hawaii was eventually annexed to the US in 1898 â€Å"at the urging of President William McKinley† (â€Å"Annexation of Hawaii,† n. d. , para. 3). The island state became a territory in 1900. Statehood was deferred â€Å"until a bipartisan compromise linked Hawaii’s status to Alaska, and both became states in 1959† (â€Å"Annexation of Hawaii,† n. d. , para. 3). References Sforza, Terry (1996). Hawaii’s annexation a story of betrayal.   Retrieved September 20, 2008, from http://www.hawaii-nation.org/betrayal.html Tindall, G., Shi, D. (2006). America – a narrative history (7th ed.). New York: W.W. Norton Co. How to cite Hawaii’s Annexation to the US, Papers

Friday, December 6, 2019

Phylogenetic Classification Systems †Free Samples for Students

Question: Discuss About the Phylogenetic Classification Systems? Answer: Introducation The earlier taxonomic and phylogenetic classification systems were based on morphology. As the science of microscopy developed and it became possible to study the cellular structure, classification of organisms was based on the differences in cell structure. With the advent of ability to sequence DNA and RNA, it became possible to compare the sequences. This led to the ability to distinguish between organisms on the basis of dissimilarities between the sequences. The three tax domains as per the current system of classification are eubacteria and archaeabacteria, both prokaryotic and the eukaryotes. Prokaryotes and eukaryotes were earlier differentiated on the basis of cellular morphology. The absence or presence of nucleus was the main structure that differentiated them. Carl Woese suggested that the classification should be based on the 16S rRNA or 18S rRNA sequences rather than on morphological differences (Woese, Kandler, Wheelis, 1990). The basis for earlier methods for classification was organism based, it was later based on cellular Management and is now based on differences at the molecular level. As a result phylogeny is now understood on a molecular basis rather than a phenotypic basis. The basis for description of eukaryotes appeared to be based on the shared complexity of cellular organisation. But the same was not true for prokaryotes, the differences amongst the organisms could not be phylogenetically described just because these cells did not contain a nucleus. This was revealed when it was discovered that the archaeabacteria are as different from bacteria as the y are different from the eukaryotes and thus three domains were proposed, namely, eubacteria, archaeabacteria and the eukaryotes. The archaeabacteria that were studied later are methanogenic, thermophilic and tolerant to high salt concentrations, conditions that were prevalent on earth in ancient times. All organisms have DNA and the genes are expressed through protein synthesis. Ribosomes are the sites for protein synthesis and rRNA molecules are components of ribosomes. The rRNA molecules are also encoded by DNA. Mutations have occurred in the rRNA genes during evolution. The reason why rRNA was suited to be the molecule of choice for molecular phylogeny was because it was present in all organisms and the mutations that occurred in the molecule were such that they allowed the formation of ribosomes. Any mutation that could have disrupted the formation of ribosomes was eliminated through natural selection. rRNA can be easily isolated in the laboratory and comparison of rRNA sequences from two organisms can help determine how closely (or distantly) they are related on an evolutionary time scale. The rRNA molecules fold into secondary and tertiary structures due to complementary base sequences. The tertiary structure of rRNA exhibits differences between eubacteria, archaebacteria and eukaryotes. The small subunit rRNA in the eubacteria is different from the archaebacteria and eukaryotes between bases 500 to 545 that form the bulge that protrudes from the stalk in the tertiary structure. It is 6 nucleotides long in the former while the bulge is made up of seven nucleotides in the latter, the compositions of the nucleotide stretches are also different in eubacteria. The region of small subunit rRNA in eukaryotes has a sequence between nucleotides 585 and 655 which is peculiar to the domain (Gutell, Weiser, Woese, Noller, 1985). The prokaryotes have a different but common structure in the corresponding region. The archaebacteria have a unique domain in their 16S rRNA between 180-197 positions and between 405 and 498 positions (Woese, Gutell, Gupta, Noller, 1983). A comparison of the three domains yields similarities between the eubacteria and the archaeabacteria but more similarities occur between the archaeans and the eukaryotes. The nuclear membrane and unit-membrane enclosed organelles are present in the eukaryotes but re absent among the two prokaryotic domains. The eubacteria have a peptidoglycan cell wall that is absent in the other two domains. Eubacteria have only one kind of RNA polymerase while archaebacteria and eukaryotes have several kinds of RNA polymerases that share structural homology (Huet, Schnabel, Sentenac, Zillig, 1983). During protein synthesis the initiator amino acid among the eubacteria is formyl-methionine, but methionine is the initiator amino acid in the other two domains. Both archaebacteria and eukaryotes have genes with introns but eubacteria have genes without introns. Antibiotics like streptomycin and chloramphenicol can only inhibit the eubacteria. DNA is packaged with the help of histone proteins in the eu karyotes, some archaeabacterial species but none of the eubacteria. The prokaryotes have circular chromosomes. Some species of archaeabacteria are thermophilic and can grow beyond the temperature of 100oC. Thus there are several similarities between the archaebacteria and eukaryotes (Reece, et al., 2014). In conclusion, the new system of taxonomic classification is based the differences between the rRNA and some gene sequences. The position of the archaeabacteria as a separate domain has been established based on their similarities with eukaryotes and the eubacteria. The similarities and mutations in the small subunit of rRNA have been extensively studied to establish the domains and form the basis for molecular phylog References Gutell, R. R., Weiser, B., Woese, C. R., Noller, H. F. (1985). Comparative anatomy of 16-S-like ribosomal RNA. Progress in Nucleic Acid Research and Molecular Biology, 32, 155-216. Huet, J., Schnabel, R., Sentenac, A., Zillig, W. (1983). Archaebacteria Accounting eukaryotes possess DNA-dependent RNA polymerases of a common type. EMBO, 2(8): 12911294. Reece, J., Urry, L., Cain, M., Wasserman, S., Minorsky, P., Jackson, R. (2014). Campbell Biology. Pearson. Woese, C., Gutell, R., Gupta, R., Noller, H. (1983). Detailed analysis of the higher-order structure of 16S-like ribosomal ribonucleic acids. Microbiological Reviews, 47(4): 621669. Woese, C., Kandler, O., Wheelis, M. (1990). Towards a natural system of organisms: Proposal for the domains. PNAS, USA, 87: 4576-4579, .

Friday, November 29, 2019

Battered Womens Syndrome A Survey Of Contemporary Theories Essays

Battered Women's Syndrome: A Survey of Contemporary Theories Domestic Violence In 1991, Governor William Weld modified parole regulations and permitted women to seek commutation if they could present evidence indicating they suffered from battered women's syndrome. A short while later, the Governor, citing spousal abuse as his impetus, released seven women convicted of killing their husbands, and the Great and General Court of Massachusetts enacted Mass. Gen. L. ch. 233, 23E (1993), which permits the introduction of evidence of abuse in criminal trials. These decisive acts brought the issue of domestic abuse to the public's attention and left many Massachusetts residents, lawyers and judges struggling to define battered women's syndrome. In order to help these individuals define battered women's syndrome, the origins and development of the three primary theories of the syndrome and recommended treatments are outlined below. I. The Classical Theory of Battered Women's Syndrome and its Origins The Diagnostic and Statistical Manual of Mental Disorders (DSM-IV), known in the mental health field as the clinician's bible, does not recognize battered women's syndrome as a distinct mental disorder. In fact, Dr. Lenore Walker, the architect of the classical battered women's syndrome theory, notes the syndrome is not an illness, but a theory that draws upon the principles of learned helplessness to explain why some women are unable to leave their abusers. Therefore, the classical battered women's syndrome theory is best regarded as an offshoot of the theory of learned helplessness and not a mental illness that afflicts abused women. The theory of learned helplessness sought to account for the passive behavior subjects exhibited when placed in an uncontrollable environment. In the late 60's and early 70's, Martin Seligman, a famous researcher in the field of psychology, conducted a series of experiments in which dogs were placed in one of two types of cages. In the former cage, henceforth referred to as the shock cage, a bell would sound and the experimenters would electrify the entire floor seconds later, shocking the dog regardless of location. The latter cage, however, although similar in every other respect to the shock cage, contained a small area where the experimenters could administer no shock. Seligman observed that while the dogs in the latter cage learned to run to the nonelectrified area after a series of shocks, the dogs in the shock cage gave up trying to escape, even when placed in the latter cage and shown that escape was possible. Seligman theorized that the dogs' initial experience in the uncont rollable shock cage led them to believe that they could not control future events and was responsible for the observed disruptions in behavior and learning. Thus, according to the theory of learned helplessness, a subject placed in an uncontrollable environment will become passive and accept painful stimuli, even though escape is possible and apparent. In the late 1970's, Dr. Walker drew upon Seligman's research and incorporated it into her own theory, the battered women's syndrome, in an attempt to explain why battered women remain with their abusers. According to Dr. Walker, battered women's syndrome contains two distinct elements: a cycle of violence and symptoms of learned helplessness. The cycle of violence is composed of three phases: the tension building phase, active battering phase and calm loving respite phase. During the tension building phase, the victim is subjected to verbal abuse and minor battering incidents, such as slaps, pinches and psychological abuse. In this phase, the woman tries to pacify her batterer by using techniques that have worked previously. Typically, the woman showers her abuser with kindness or attempts to avoid him. However, the victim's attempts to pacify her batter are often fruitless and only work to delay the inevitable acute battering incident. The tension building phase ends and the active battering phase begins when the verbal abuse and minor battering evolve into an acute battering incident. A release of the tensions built during phase one characterizes the active battering phase, which usually last for a period of two to twenty-four hours. The violence during this phase is unpredictable and inevitable, and statistics indicate that the risk of the batterer murdering his victim is at its greatest. The batterer places his victim in a constant state of fear, and she is unable to control

Monday, November 25, 2019

James Finney Boylan essays

James Finney Boylan essays James Finney Boylans glasses look ordinary enough. But the world he sees through them is something else,(Stanley-Sanborn). The way Boylan sees and writes is what makes him a popular writer. He is a comical writer, yet his books still have heart. Many say that his books are weird, but they always seem to read the next one. James Finney Boylan was born in 1958, in Valley Forge Pennsylvania. He graduated from Wesleyan University in 1980, and soon became the managing editor of American Bystander magazine. After working there he worked for "American Punch"; which the first cast of "Saturday Night Live" founded. When the American Bystander went under, Boylan became an editorial assistant with Viking/Penguin. He then taught at Johns Hopkins, soon realizing that Maine was the best place, he became a professor at Colby College. Where he still remains today. The Planets was Boylans first novel, and for writing it he got a grant from the Pennsylvania State Council for the Arts. His different style of writing created national attention in 1991. When he wrote, he tried to base the writing on the classical music by Gustav Holst. The Planets was about the lives of several fictional characters in the real town of Centralia, Pennsylvania, which has had an underground coal fire for several decades, and houses a few remaining residents. The town Centralia Pennsylvania no longer exists on some maps. The fire started in 1961 along the outskirts of town when trash was burned in an old open pit mine. The fire in the open pit caught some coal on fire. The coal then began to burn underground. That was in 1961; 40 years and 40 million dollars later the fire still burns through old coalmines and veins following the coal under the town and the surrounding hillsides. The fire, smoke, fumes and toxic gases that came up though the back yards, basements and streets of Centralia practically ripped the ...

Thursday, November 21, 2019

Answer the questions Essay Example | Topics and Well Written Essays - 1250 words - 1

Answer the questions - Essay Example Private sector norms on the other hand imply that the ethical standards existing in the government sector originated from the private sector, as the former does not have complex bureaucracies therefore upholds high ethical standards than their counterpart2. I particularly find the two ideas interesting because they reflect on the reality that most people tend to disregard. Conflict of interest is prevalent especially in highly politicized working environments while private sector norms have a tendency to infiltrate government agencies and in the process creating more conflicts of authority. Therefore, it would be appropriate to insinuate that the two ethical issues have a strong correlation in that one precedes the other thereby creating a vicious cycle of ethical dilemma. This is because conflicts of authority normally erode the private sector norms that have infiltrated the government and in the process leading to more crisis3. Certainly, conflict of authority and private sector no rms are fundamental concepts that have a wide variety of application in my professional work. During my everyday undertaking of my professional work, I may find myself in a conflict of authority situation and the best method to get out of this ethical dilemma is to act in accordance with the private sector norms that highly regard the incorporation of ethical codes of conduct in resolving ethical dilemmas4. Question Two Although the book ‘Ethics, The Ethics Edge’ presents several strong ethical concepts and arguments, I find two ideas namely, ethical leaders respect others and corruption as the major interesting factors. Ethical leaders ought to show respect to their peers as well as their subordinates as this motivates people in addition to promoting the inherent dignity of other persons. Corruption on the other hand, may have several meanings ranging from the moral sense of corruption to the technical aspects of the same5. In my view, the two aspects are interesting i n the sense that each presents a unique perspective of ethical conducts. For example, the suggestion that ethical leaders normally respect others appears as a hypothetical phrase as more often than not, I find people in leadership positions blatantly disregarding their juniors. This could mean that ethical leadership and leaders for that matter is a rare asset in the contemporary organization settings. Corruption in contrast takes a different ethical route in that it may imply the moral sense of corruption whereby individuals have the mindset of non-accountability deeply rooted in them. The technical sense of corruption is surprisingly the most mundane one because it is the database type of corruption consisting mainly of the physical aspect. These two ideas are curiously opposite because lack of ethical respect by leaders may erode the ethical values within the organization and corruption may ensue6. Both ideas are applicable in my professional work in that as a professional who is honing my leadership skills I have an obligation to respect others irrespective of the positions they hold in society or within the organization. This will include believing in them and their personal values and in the process enhancing my skills as an ethical leader. I also learn that the vice of corruption has many facets ranging from moral to physical aspects and that only ethical leadership

Wednesday, November 20, 2019

Health and Wellness Essay Example | Topics and Well Written Essays - 750 words - 1

Health and Wellness - Essay Example In explaining the sources of important nutrients, I used the PowerPoint presentations to make the learning process easier. It is said that a person can forget verbal discussion after a span of time but the visual impact of PowerPoint presentations can last for a longer time period. To make the process better next time, I will give a chart of the different sources of essential vitamins and proteins. Nowadays, an individual has a busy lifestyle, so there are chances that he or she may follow the health routine initially, but with time may become unenthusiastic and forget. But, if chart is ready at hand he or she can instruct someone else to make the food as per the chart. My friend’s relative was very keen to know the details of good nutrition and my friend had told me about her persistent health problems. She was very enthusiastic about the learning process. During the course of our discussion I came to know that she had Nutrition at the Secondary school level so it was easier for her to understand things. This activity taught me to simplify the technical things and using words that a lay man can be comfortable with. This experience helped me to brush up my knowledge. It also taught me how to communicate the technical things in an easy and clear way to others. Basically, it gave me a practical exposure to the problems that a person with nutrition deficiency faces. The assignment provides an insight into the health and wellness related issues and does not require any changes.

Monday, November 18, 2019

Discussion-MODULE 11 Essay Example | Topics and Well Written Essays - 250 words

Discussion-MODULE 11 - Essay Example The Mongolian World system lasted between 1206 and 1405. Genghis Khan expanded the Mongolian empire to the Pacific Ocean while his grandson expanded the empire into China. The Ming world system defeated the Mongolian system under the leadership of Zheng He. This system lasted between 1368 and 1644. The Ming world system led to the spread of Confucianism, great artistry, and economic growth. From lecture, the video "Chinese Treasure Fleets,† and the primary source reading, we derive that Zheng He was a fleet admiral who led the Ming Dynasty. He went for seven voyages to over 30 countries in Africa, South Asia, Persian Gulf, and the Pacific. Zheng He travelled between 1405 and 1433 to expand the Chinese maritime in Asia and establishing commercial networks across the pacific and Indian oceans. He led a fleet of high-tech and large trading vessels for expedition. Zheng He prioritized diplomacy but also adopted military tactics to assert Chinese influence. Zheng He’s ships were high-tech since they were long, fashionable, and could carry all the other ships by renowned explorers like Columbus. According to lecture and the article by Alfred Crosby, the â€Å"Columbian Exchange† related to the exchange of livestock, traditions, plants, knowledge, technology, and people between the Americas and Afro-Eurasia. Maize and potatoes were important plants in the â€Å"Columbian Exchange† since they were staple foods, dominated bilateral trade, and enhanced population growth in the two

Saturday, November 16, 2019

Cache Memory: Definition and Function

Cache Memory: Definition and Function CACHE MEMORY Cache memory is random access memory (RAM) that a pc micro chip will access a lot of quickly than it will access regular RAM. because the micro chip processes knowledge, its initial within the cache memory and if it finds the information there (from a previous reading of data), it doesnt got to do the a lot of long reading of knowledge from larger memory. Cache memory is usually delineate in levels of closeness and accessibility to the micro chip. associate L1 cache is on identical chip because the micro chip. L2 is typically a separate static RAM (SRAM) chip. the most RAM is typically a dynamic RAM (DRAM) chip. In addition to cache memory, one will think about RAM itself as a cache of memory for disc storage since all of RAMs contents return from the disc at the start. once the processor has to scan from or write to a location in main memory, it initial checks whether or not a duplicate of that knowledge is within the cache. If so, the processor straightaway reads from or writes to the cache, that is far quicker than reading from or writing to main memory. a translation look aside buffer (TLB) wont to speed up virtual-to-physical address translation for each practicable directions and knowledge. Knowledge is transferred between memory and cache in blocks of mounted size, known as cache lines. once a cache line is derived from memory into the cache, a cache entry is made. The cache entry can embody the derived knowledge in addition because the requested memory location currently known as a tag. once the processor has to scan or write a location in main memory, it initial checks for a corresponding entry within the cache. The cache checks for the contents of the requested memory location in any cache lines that may contain that address. If the processor finds that the memory location is within the cache, a cache hit has occurred. WRITE POLICY: If knowledge is written to the cache, at some purpose it should even be written to main memory. A write policy determines however the cache deals with a write cycle. The 2 common write  policies area unit Write-Back and Write-Through. WRITE BACK POLICY In Write-Back policy, the cache acts sort of a buffer. That is, once the processor starts a write cycle the cache receives the information and terminates the cycle. The cache then writes the information back to main memory once the system bus is offered. This technique provides the best  performance by permitting the processor to continue its tasks whereas main memory is updated at a  later time. However, dominant writes to main memory increase the cache’s quality and  cost. WRITE THROUGH POLICY The second technique is that the Write-Through policy. because the name implies, the processor writes through the cache to main memory. The cache could update its contents, but the write cycle doesnt finish till the information is keep into main memory. This technique is a smaller amount advanced. The primary drawback with write-through caches is their higher write traffic as compared to write-back caches. a method to scale back this traffic is to use a coalescing write buffer, wherever writes to addresses already within the write buffer area unit combined. once a write misses within the write cache, the LRU entry is transferred to the write buffer to create area for the present write. In actual implementation, the write cache may be integrated with a coalescing write buffer. Write through policy is most prefererable in memory application than write back policy as a result of it embody the property of automatic update once any changes occur in cache block itll replicate into main memory. CONVENTIONAL 2 LEVEL CACHE Fig. 3illustrates the design of the two-level cache. solely the L1 knowledge cache and L2 unified cache area unit shown because the L1 instruction cache solely reads from the L2 cache. below the write through policy, the L2 cache continuously maintains the foremost recent copy of the information. Thus, whenever a knowledge is updated within the L1 cache, the L2 cache is updated with identical knowledge in addition. This ends up in a rise within the write accesses to the L2 cache and consequently a lot of energy consumption. The locations (i. e. , approach tags) of L1 knowledge copies within the L2 cache wont modification till the information area unit evicted from the L2 cache. The planned way-tagged cache exploits this reality to scale back the quantity of the way accessed throughout L2 cache accesses. once the L1 knowledge cache masses a knowledge from the L2 cache, the approach tag of the information within the L2 cache is additionally sent  to the L1 cache and keep during a new set of approach-tag arrays These way tags give the key data for the following write accesses to the L2 cache. In general, each write and browse accesses within the L1 cache may have to access the L2 cache. These accesses result in totally different operations within the planned way-tagged cache, as summarized in Table I. below the write-through policy, all write operations of the L1 cache got to access the L2 cache. within the case of a write hit within the L1 cache, only 1 approach within the L2 cache are going to be activated as a result of the approach tag data of the L2 cache is offered, i. e. , from the approach-tag arrays we are able to acquire the L2 way of the accessed knowledge. whereas for a write miss within the L1 cache, the requested knowledge isnt keep within the L1 cache. As a result, its corresponding L2 approach data isnt offered within the way-tag arrays. Therefore, all ways that within the L2 cache got to be activated at the same time. Since write hit/miss isnt proverbial a priori, the way-tag arrays got to be accessed at the same time with all L1 write operations so as to avoid performance degradation. Note that the way-tag arrays area unit terribly little and also the concerned energy overhead may be simply salaried for (see section). For L1 scan operations, neither scan hits nor misses got to access the way-tag arrays. this is often as a result of scan hits dont got to access the L2 cache; whereas for scan misses, the corresponding approach tag data isnt offered within the way-tag arrays. As a result, all ways that within the L2 cache area unit activated at the same time below scan misses. PROPOSED approach TAG CACHE we tend to introduce many new components: way-tag arrays, way-tag buffer, approach decoder, and approach register, all shown within the line. The approach tags of every cache line within the L2 cache area unit maintained within the way-tag arrays, set with the L1 knowledge cache. Note that write buffers area unit normally used in write through caches (and even in several write-back caches) to boost the performance. With a write buffer, the information to be written into the L1 cache is additionally sent to the write buffer. The operations keep within the write buffer area unit then sent to the L2 cache in sequence. This avoids write stalls once the processor waits for write operations to be completed within the L2 cache. within the planned technique, we tend to conjointly got to send the approach tags keep within the way-tag arrays to the L2 cache at the side of the operations within the write buffer. Thus, alittle approach-tag buffer is introduced to buffer the way tags scan from th e way-tag arrays. {a approach|how|some way|the way|the simplest way} rewriter is used to decode way tags and generate the alter signals for the L2 cache, that activate solely the specified ways that within the L2 cache. every approach within the L2 cache is encoded into the simplest way tag. {a approach|how|some way|the way|the simplest way} register stores way tags and provides this data to the way-tag arrays. IMPLEMENTATION OF WAY-TAGGED CACHE WAY-TAG ARRAYS Way tag arrays have approach tags of a knowledge is loaded from the L2 cache to the L1 cache, shown in Fig three. Note that {the knowledge|the info|the information} arrays within the L1 data cache and also the way-tag arrays share identical address from hardware. The WRITEH_W signal of way-tag arrays is generated from the write/read signal of {the knowledge|the info|the information} arrays within the L1 data cache as shown in Fig. 8. A UPDATE is management signal, obtained from the cache controller. once a L1 write miss, UPDATE are going to be declared and permit WRITEH_W to alter the write operation to the way-tag arrays (UPDATE=1 and WRITEH_W, See Table II). UPDATE keeps invalid and WRITEH_W =1, a scan operation to the way-tag arrays. During the scan operations of the L1 cache, the way-tag arrays dont got to be accessed and so, scale back energy overhead. to attenuate the overhead of approach tag arrays, the scale of a way-tag array may be expressed as Where SL1, Sline,L1 and Nway,L1 area unit the scale of the L1 knowledge cache, cache line size and variety of the ways that within the L1data cache severally. Bway,L2= may be a code. The way-tag arrays area unit operated in parallel with the L1 knowledge cache for avoiding the performance degradation. as a result of their little size, the access delay is far smaller than that of the L1 cache. WAY-TAG BUFFER Way-tag buffer is quickly stores the approach tags from the way-tag arrays within the L1 cache. its identical variety of entries because the write buffer of the L2 cache and shares the management signals with it. Note that write buffers area unit normally used, the information to be written into the L1 cache is additionally sent to the write buffer to boost the performance. This avoids write stalls once the processor waits for write operations to be completed within the L2 cache. When a write miss happens in L1 cache, all the ways that within the L2 cache got to be activated because the approach data isnt offered. Otherwise, solely the specified approach is activated. approach tag buffer is little in to avoid space overhead. Approach DECODER The operate of the approach rewriter is used to decode approach tags and generate the alter signal, that activate solely desired ways that in L2 cache. This avoids the extra wires and also the chip space is negligible. A write hit within the L1 cache, the approach decoder works as associate n -to- N decoder that selects one way-enable signal. For a write miss or a scan miss within the L1 cache, the approach decoder assert all way-enable signals, in order that all ways that within the L2 cache area unit activated. Approach REGISTER The approach tags for the way-tag arrays is Provided by approach register. A 4-way L2 cache is take into account, that labels â€Å"00†, â€Å"01†, â€Å"10†, andâ€Å"11†. This area unit keep within the approach register. once the L1 cache masses a knowledge from the L2 cache, the corresponding approach tag within the approach register is distributed to the approach-tag arrays by this way the corresponding way tags area unit keep in way-tag array. The planned approach-tagged caches way operates below totally different modes throughout scan and write operations. solely the approach containing the specified knowledge is activated within the L2 cache for a write hit within the L1 cache, operating the L2 cache equivalently a direct-mapping cache to scale back energy consumption while not performance overhead below the write-through policy. APPLICATION OF approach TAGGING IN PHASED ACCESS CACHES In this section, we are going to show that the thought of approach tagging may be extended to alternative low-power cache style techniques suchas the phased access cache [18]. Note that since the processor performance is a smaller amount sensitive to the latency of L2 caches, several processors use phased accesses of tag and knowledge arrays in L2 caches to scale back energy consumption. By applying the thought of approach tagging, any energy reduction may be achieved while not introducing performance degradation. In phased caches, all {ways|ways that|ways in that} within the cache tag arrays got to be activated to work out which approach within the knowledge arrays contains the specified knowledge (as shown within the solid-line a part of Fig. 8). within the past, the energy consumption of cache tag arrays has been unnoticed as a result of their comparatively little sizes As superior microprocessors begin to utilize longer addresses, cache tag arrays become larger. Also, high associativity is vital for L2 caches in bound applications. These factors result in the upper energy consumption in accessing cache tag arrays. Therefore, its become vital to scale back the energy consumption of cache tag arrays. the thought of approach tagging may be applied to the tag arrays of phased access cache used as a L2 cache. Note that the tag arrays dont got to be accessed for a write hit within the L1 cache (as shown within the dotted-line half in Fig. 9). {this is|this is often|this may be} as a result of the destination approach of knowledge arrays can be determined directly from the output of the approach decoder shown in Fig. 7. Thus, by accessing fewer ways that within the cache tag arrays, the energy consumption of phased access caches may be any reduced The operation of this cache is summarized in Fig. 9. Multiplexor M1 is used to get the alter signal for the tag arrays of the L2 cache. once the standing bit within the way-tag buffer indicates a write hit, M1 outputs â€Å"0† to disable all the ways that within the tag arrays. As mentioned before, the destination approach of the access may be obtained from the approach decoder and so no tag comparison is required during this case. Multiplexor money supply chooses the output from the approach decoder because the choice signal for the information arrays. If on the opposite hand the access is caused by a write miss or a scan miss from the L1 cache, all ways that area unit enabled by the tag array decoder, and also the results of tag comparison is chosen by money supply because the choice signal for the information arrays. Overall, fewer ways that within the tag arrays area unit activated, thereby reducing the energy consumption of the phased access cache. Note that the phased ac cess cache divides associate access into 2 phases; so, money supply isnt on the crucial path. Applying approach tagging doesnt introduce performance overhead as compared with the standard phased cache. Common or Shared LUT design A shared or common LUT design is planned to be applied in knowledge array management of this cache design. Since knowledge array in cache design is related to electronic device choice based mostly processor for knowledge accessing, we tend to area unit introducing associate shared LUT during which all knowledge data is loaded with table loader per is index and coefficients for knowledge finding and matching allocation throughout cache operations. thus knowledge array may be replaced by shared LUT design with effectively acts and reduces the whole power consumption of overall approach tag array cache design. From the fig. 7. the shared LUT design is divided in to four banks with several address related to it. If a processor has to access knowledge from bank three, itll directly access that data via its constant bit address by matching with table loader indexes. Hence a protracted looking method is proscribed to direct accessing technique through shared LUT design. Apart from banks it conjointly has SFU-Special practical Units in it. its connected to table loader. These SFU’s will access all the banks by having easy indexes like â€Å"000† the primary zero represents the quantity of SFU i. e SFU 0. thus the remainder 2 zero’s represents the bank constant. By bit matching, SFU simply connects with bank zero that contain relevant knowledge access in cache operations. If SFU0 and SFU one having values like â€Å"000† and â€Å"100† then confusion is cleared by higher priority portal. the upper priority is nothing however one that comes initial is allowed to access the information initial too. the remainder request signals accessed in  Ã‚  parallel at that time.

Wednesday, November 13, 2019

Brains before Beauty in Charlotte Brontes Jane Eyre Essay -- Jane Eyr

Brains before Beauty  in   Jane Erye    Beauty is generally classified into two main categories: physical and mental. In the Charlotte Bronte's Jane Erye, the protagonist rejects by choice and submission, her own physical beauty in favor of her mental intelligence and humility, and her choice becomes her greatest benefit by allowing her to win the hand of the man of her desires, a man who has the values Jane herself believes in. She values her knowledge and thinking before any of her physical appearances because of her desire as a child to read, the lessons she is taught and the reinforcements of the idea appearing in her adulthood. During the course of the novel she lives at five homes. In each of these places, the idea of inner beauty conquering exterior appearance becomes a lesson, and in her last home she gains her reward, a man who loves her solely for her mind. She reads against her cousins wishes as a child at Gateshead, learns to value her intelligence as a child at the Lowood Institution, her mind and humilit y win the heart of Mr. Rochester at Thornfield Manor, she earns St. John's marriage proposal at Marsh's End, and in the end she wins her prize of Mr. Rochester's hand in marriage at Ferndean Manor. Jane Erye spent the beginning of her childhood at her Aunt's house, where she struggles to become more intelligent by reading books. Jane wants to learn, even though her cousin insists: "You have no business to read our books; you are a dependent" (pg. 42). Shortly after being struck for reading, she lays in bed and requests: "Gulliver's Travels from the library. This book I had again and again perused with delight" (pg. 53). Her ambition to read and better herself meets opposition from her cousins, yet she continu... ...f Love in Jane Eyre and Wuthering Heights. David Lodge, Fire and Eyre: Charlotte Brontà «'s War of Earthly Elements Fraser, Rebecca. The Brontes. 1st ed. New York:   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Crown Publishers, 1988.    Bronte, Charlotte. Jane Eyre. 3rd ed. New York: The Modern Library. Bronte, Charlotte. "Charlotte Bronte's Letters". New York: W. W. Norton & Company, Inc., 1971. Diedrick, James.   Newman on the Gentleman.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   http://www.stg.brown.edu/projects/hypertext/landow/victorian/vn/victor10.html. Diedrick, James.   Jane Eyre and A Vindication   of the Rights of Woman.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   http://spider.albion.edu/fac/engl/diedrick/jeyre1.htm. Dickerson, Vanessa D. Victorian Ghosts in the Noontide.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   http://www.system.missouri.edu/upress/fall1996/dickerso.htm. Brownell, Eliza. Age Difference in Marriage: The Context for Jane Eyre   

Monday, November 11, 2019

Religious and Moral about Clowns

Clowns are generally considered that they exist for fun and entertainment, but when one who has clear knowledge about a clown and his job, one will understand how powerful clowns are. Barbara Tedlock has studied a lot about clown across the world and he wrote an essay called, ‘The Clown’s Way’. In fact main job of clowns is to entertain, give fun and make the people laugh. Clowns often remind us about circus, how they entertain the crowd with their funny words and deeds. They are professional clowns who are into the job for earning. There is also another kind of clowns who do such things for their religion and with a fear of religious beliefs. They are religious clowns. The best moral to learn from religious clowns are to make others laugh irrespective of one’s own worries and day to life tensions. Every clown is a human in fact, and they too have some worries of life. But once they wear clown mask, they forget all their personal worries and issues, and everything they do is laugh and let others laugh, which is very healthy to anyone. Different religious clowns entertain people in different ways. Heyoka clowns do things the other way like they read backwards, walk backwards, ride the horse in backward direction, moves counter-sunwise. His voice is a thunderclap. In few religions, during festivals, the clowns open the baggage of the guests, though such things are annoying, the guest burst up in laughs looking at the way the clowns behave. In some religion, clowns pour water on the guests and they also throw coal. This is always ends up with fun, but not into fights. In few religions, clowns go door to door to beg food and tobacco, if anyone refuses; they are allowed to do anything to fetch food from any house. The theft of food is a very common issue in California. The theft of food sometimes leads up to sexual show ups like they talk or sing about sex, or they perform sexual displays in the public at women. According to Tedlock, Jemez clowns â€Å"make advances toward women†; Ponca clowns â€Å"crawl up and touch a woman’s genitalia in full daylight†; and Kwakiutl clowns jest with chiefs’ daughters, often making pointed references to sex. In the Southeast, Creek clowns, while singing obscene songs during the Crazy Dance make sexual motions and even come into bodily contact with women. (p.6). Generally it is considered by many religious clowns that they believe they will die if they do not do their job properly. Though they show things in a funny way, many of their deeds share knowledge about the religion or they teach us a moral of life. One of the best examples said by Tedlock is about Pueblo Indian Clowns. On the occasion of feeding the katchina dancers, clowns substitute ashes or sweepings for corn meal as their own sacred offerings, and they make people laugh. But this deed has a hidden moral. It shows the religious deeds of Zuni woman, who deposit sweepings at the corn field and say, â€Å"I now deposit you as sweepings but in one year you will return to me as corn†. It is just like instead of wasting corn on the floor as sweepings, they will make it purpose for future food.

Friday, November 8, 2019

ADVERTISING STRATEGY OF BHARTI TELEVENTURES LTD

ADVERTISING STRATEGY OF BHARTI TELEVENTURES LTD Free Online Research Papers This report on Airtel not just give description about the company but it also talks about the various advertising strategy adopted by the company. SWOT analysis of Airtel helps to find out the weak points of the company and to find out the way to overcome this problem. We are in the era of entertainment through mobile handsets. Downloading a ring tone watching your favorite movie of tracking cricket score the list of activity that you can do using your cell phone is endless. To supplement stagnant voice revenues cellular operator are now turning to VAS to boost revenues in both data and value added voice service. Airtel has deep rooted presence in the Indian telecom sector through there wide product offerings and excellent distribution network In this report I have tried to analyze the present scenario of Indian telecom sector the real aim of the project is to study the effectiveness and response towards advertisement provided by Airtel but many sub objectives are also included under this project so as to make it comprehensive one. I complement this with the internal study of the companies – history , vision business areas etc to analyze how well poised the company are to complete or rather just exist in this market that is proving itself to be the most competitive in post liberalization Indian economy. CHAPTER-II INTRODUCTION INTRODUCTION Telecom giant Bharti Airtel is the flagship company of Bharti Enterprises. The Bharti Group, has a diverse business portfolio and has created global brands in the telecommunication sector. Bharti has recently forayed into retail business as Bharti Retail Pvt. Ltd. under a MoU with Wal-Mart for the cash carry business. It has successfully launched an international venture with EL Rothschild Group to export fresh agricultural products exclusively to markets in Europe and USA and has launched Bharti AXA Life Insurance Company Ltd under a joint venture with AXA, world leader in financial protection and wealth management. Airtel comes to you from Bharti Airtel Limited, India’s largest integrated and the first private telecom services provider with a footprint in all the 23 telecom circles. Bharti Airtel since its inception has been at the forefront of technology and has steered the course of the telecom sector in the country with its world class products and services. The businesses at Bharti Airtel have been structured into three individual strategic business units (SBU’s) Mobile Services, Airtel Telemedia Services Enterprise Services. The mobile business provides mobile fixed wireless services using GSM technology across 23 telecom circles while the Airtel Telemedia Services business offers broadband telephone services in 94 cities. The Enterprise services provide end-to-end telecom solutions to corporate customers and national international long distance services to carriers. All these services are provided under the Airtel brand. Business Divisions Mobile : Bharti Airtel offers GSM mobile services in all the 23-telecom circles of India and is the largest mobile service provider in the country, based on the number of customers. Internet: The group offers high speed broadband internet with a best in class network. With Landline services in 94 cities we help you stay in touch with your friends family and the world. Data connectivity : The group focuses on delivering telecommunications services as an integrated offering including mobile, broadband telephone, national and international long distance and data connectivity services to corporate, small and medium scale enterprises. Fiber cables : The Company compliments its mobile and broadband telephone services with national and international long distance services. It has over 35,016 route kilometers of optic fibre on its national long distance network. For international connectivity to east, it has a submarine cable landing station at. For international connectivity to the west, the Company is a member of the South East Asia-Middle East-Western Europe – 4 (SEA-ME-WE-4) consortium along with 15 other global telecom operators. Mobile Prepaid : Enter the world of limitless possibilities with Airtel Prepaid. The service that helps you give, words to every feeling, an expression to every emotion. Postpaid : Life becomes much simpler with your Airtel Postpaid. It gives you the unlimited freedom to reach out to people in your special way. HISTORY Bharti Airtel is one of Indias leading private sector providers of telecommunications services based on an aggregate of 71,777,448 customers as on June 30, 2008, consisting of 69,383,716 GSM mobile and 2,393,732 Bharti Telemedia subscribers. The businesses at Bharti Airtel have been structured into three individual strategic business units (SBU’s) mobile services, telemedia services (ATS) enterprise services. The mobile services group provides GSM mobile services across India in 23 telecom circles, while the ATS business group provides broadband telephone services in 94 cities. The enterprise services group has two sub-units carriers (long distance services) and services to corporates. All these services are provided under the Airtel brand. Company shares are listed on The Stock Exchange, Mumbai (BSE) and The National Stock Exchange of India Limited (NSE). CHAPTER-III COMPANY PROFILE Fact sheet Name Bharti Airtel Limited. Business Description Provides mobile, telemedia services (fixed line) and enterprise services (carriers services to corporates) Established July 07, 1995, as a Public Limited Company Proportionate Revenue Rs. 270,122 million (year ended March 31, 2008-Audited) Rs. 184,202 million (year ended March 31, 2007-Audited) As per Indian GAAP Accounts Proportionate EBITDA Rs. 114,018 million (year ended March 31, 2008 Audited) Rs. 74,407 million (year ended March 31, 2007 Audited) As per Indian GAAP Accounts Shares in Issue 1,898,020,804 as at June 30, 2008 Listings The Stock Exchange, Mumbai (BSE) The National Stock Exchange of India Limited (NSE) Market Capitalisation Market Capitalisation (as on September 18, 2008) Approx. Rs. 1,443 billion Closing BSE share price = Rs. 760.35 Customer Base 69,383,716 GSM mobile and 2,393,732 telemedia customers (Status as at month ended June 30, 2008) Operational Network Provides GSM mobile services in all the 23 telecom circles in India, and was the first private operator . Bharti Tele-Ventures Limited was incorporated on July 7, 1995 for promoting investments in telecommunications services. Its subsidiaries operate telecom services across India. Bharti Tele-Ventures is Indias leading private sector provider of telecommunications services based on a strong customer base consisting of approximately 9.03 million total customers which constitute, approximately 8.28 million mobile and approximately 750,000 fixed line customers, as of August 31, 2004. Investor Relations ?Creating value for our customers, employees, investors, partners, vendors and the society at large lies at the root of our fundamental business strategy. Our core principles of trust and transparency have come a long way in helping us develop and nurture long-term relationships with our key stakeholders. Our performance exudes from our belief in and commitment to the telecom sector; and translates into creating innovative exciting opportunities for one and all. Corporate Governance ?Bharti Tele-Ventures Limited firmly believes in the principles of Corporate Governance and is committed to conduct its business in a manner, which will ensure sustainable, capital-efficient and long-term growth thereby maximizing value for its shareholders, customers, employees and society at large. Companys policies are in line with Corporate Governance guidelines prescribed under Listing Agreement/s with Stock Exchanges and the Company ensures that various disclosures requirements are complied in letter and spirit for effective Corporate Governance. ?During the financial year 2003-04, your Company has been assigned highest Governance and Value Creation (GVC) rating viz. Level 1 rating by CRISIL, which indicates that the companys capability with respect to creating wealth for all its stakeholders is the highest, while adopting sound Corporate Governance practices Board of Directors ?The Board of Directors of the Company has an optimum mix of Executive and Non-Executive Directors, which consists of three Executive and eleven Non-Executive Directors. ?The Chairman and Managing Director, Mr. Sunil Bharti Mittal, is an Executive Director and the number of Independent Directors on the Board is more than 50% of the total Board strength. The independence of a Director is determined on the basis that such director does not have any material pecuniary relationship with the Company, its promoters or its management, which may affect the independence of the judgment of a Director. ?The Board members possess requisite skills, experience and expertise required to take decisions, which are in the best interest of the Company. Boards Members by Ranking Sunil Bharti Mittal Chairman and Managing Director Rajan Bharti Mittal Director Akhil Gupta Joint Managing Director Rakesh Bharti Mittal Director Chua Sock Koong Director Pulak Chandan Prasad Director Bashir Abdulla Currimjee Director Mauro Sentinelli Director Professor V.S Raju Director O’Sullivan Director Kurt Hellstrom Director N. Kumar Director Ajay Lal Director Francis Heng Director Arun Bharat Ram Director Audit Committee The Audit Committee of the Board deals with all matters relating to financial reporting, internal controls, risk management, related party transactions etc. and reports back to the Board on the matters, which among others, include ?Reviewing the Company’s financial reporting processes and systems. ?Recommending the appointment and removal of statutory auditors, fixation of audit fee and related expenses. ?Reviewing the Company’s financial and risk management policies. ?Reviewing with management the half-yearly and annual financial statements, before submission to the Board, focusing primarily on: ?Changes in accounting policies and practices; ?Major accounting entries, qualifications and accounting issues based on the managements discretion and judgment; ?Compliance with the accounting standards; ?Compliance with the stock exchange and legal requirements, concerning financial statements; ?Any related party transactions; and ?Adequacy and effectiveness of internal audit processes and systems. ?The un-audited/audited quarterly financial results of the Company are also specifically reviewed by the Audit Committee before these are submitted to the Board for approval. Minutes of each Audit Committee meeting are placed before the Board for information. Human Resource (HR)/ Remuneration Committee The Human Resource Committee of the Board discharges the functions of the remuneration committee, along with specifically looking into the following areas: ?Framing policies and compensation packages of top executives; including salary adjustments, incentives, bonuses, promotions, stock options and performance targets. ?Remuneration of Directors ?Strategies for attracting/retaining employees, and employee development programs ?Key issues referred by the Board ESOP Compensation Committee The Compensation Committee of the Board has been constituted in accordance with SEBI (Employee Stock Option Scheme and Employee Stock Purchase Scheme) Guidelines, 1999 for administration and superintendence of Employee Stock Option Plan (ESOP) of the Company. Scope of the Compensation Committee Formulating policies and procedures to ensure that there is no violation of SEBI (Insider Trading Regulations) and (Prohibition of Fraudulent and Unfair Trade Practices relating to Securities Market) Regulations by any employee. CHAIRMAN PROFILE Sunil Bharti Mittal Chairman Managing Director Since October 2001 Board director since: July 1995 Age: 49 years Sunil Bharti Mittal is the Chairman Managing Director of Bharti Airtel Ltd. head quartered at New Delhi, India. Sunil Bharti Mittal started his career at a young age of 18 after graduating from Punjab University in India and founded Bharti, with a modest capital, in the year 1976. Today, at 49 he heads a successful enterprise, amongst the top 5 in India, with a market capitalization of over US$ 40 billion and employing over 30,000 people. Sunil Bharti Mittal is an alumnus of Harvard Business School, MA, USA. Sunil Bharti Mittal has been conferred one of the highest civilian award – Padma Bhushan. Sunil Bharti Mittal has been conferred the degree of Doctor of Science (Honoris Causa) by the G B Pant University of Agriculture Technology. Sunil Bharti Mittal is an Honorary Fellow of â€Å"The Institution of Electronics and Telecommunication Engineers (IETE). OBJECTIVES As set out in the Memorandum of Association of Bharti Tele-Ventures, our main objects are as follows: 1. To promote and establish companies, funds, associations or partnerships for providing telecom networks and/or to run and maintain telecom services like basic/fixed-line services, cellular/mobile services, paging, videotext, voice mail and data systems, private switching network services, transmission network of all types; computer networks i.e. local area network, wide area network, electronic mail, intelligent network, multimedia communication systems or the combinations thereof and for execution of undertakings, works, projects or enterprises in the telecom industry whether of a private or public character or any joint venture with any government or other authority in India or elsewhere and to acquire and dispose of shares/securities in such companies, and funds and interest in such associations or partnerships. 2. To provide telecom networks and to run and maintain telecom services like basic/fixed-line services, cellular/mobile services, paging, videotext, voice mail and data systems, private switching network services, transmission networks of all types, computer networks like local area network, wide area network, electronic mail, intelligent network, multimedia communication systems or combinations thereof. 3. To carry on the business of manufacturers, merchants, dealers, distributors, importers, exporters, buyers, sellers, agents and stockists, and to market, hire, lease, rent out, assemble, alter, install, service, design, research and improve, develop, exchange, maintain, repair, refurnish, store and otherwise deal in any manner in all types of telephone exchanges, telephone instruments -whether corded, cordless, mobile or of any other kind; tele-terminals, fax machines, telegraphs, recording instruments and devices, telephone message/answering machines and devices; dialling machines, trunk dialling barring devices, wireless sets and other wireless communication devices like radio pagers, cellular phones, satellite phones etc; telecom switching equipments of all kinds; telecom transmission equipments of all kinds, test equipments. VISION BY 2010 AIRTEL WILL BE THE MOST ADMIRED BRAND IN INDIA: ?LOVED BY MORE CUSTOMERS. ?TARGETED BY TOP TALENT. ?BENCHMARKED BY MORE BUSINESS. BHARTI’S MISSION To be globally admired for telecom services that delight customers. We will meet global standards for telecom services that delight customers through: Customer Service Focus Empowered Employees Cost Efficiency Unified Messaging Solutions Innovative products and services .Error- free service delivery ACHIEVEMENTS First to launch Cellular service on November 1995. First operator to revolutionaries the concept of retailing with the inauguration of AirTel Connect (exclusive showrooms) in 1995. First to introduce push button phone in India. First to expand its network with the installation for second mobile switching center in April, 1997 and the first to introduce the Intelligent Network Platform First to provide Roaming to its subscribers by forming an association called World 1 Network. First to provide roaming facility in USA. Enjoy the mobile roaming across 38 partner networks above 700 cities Moreover roam across international destinations in 119 countries including USA, Canada, UK etc with 284 partner networks. BHARTI announces aggrement with VODAFONE marking the entry of the Worlds Largest Telecom Operator into India Bharti Enterprises and AXA Asia Pacific Holdings Limited announce Partnership for a life insurance joint venture in India Airtel Launches future factory Centres of Innovation to Incubate Pioneering Mobile Applications 16 states, 600 million people. Only Indias leading mobile service offers you the truly freedom-packed Prepaid! It is also the first company to export its products to the USA. BHARTI announces agreement with VODAFONE marking the entry of the Worlds Largest Telecom Operator into India Vodafone to invest approximately Rs. 6,700 crores (approx. USD 1.5 bn.) to acquire around 10% in Bharti Tele-Ventures Ltd. Bharti Enterprises, SingTel and Vodafone to take Bharti Tele-Ventures Ltd. to unassailable leadership position in India The largest single foreign investment ever in the history of India The largest investment in the Indian telecom sector Bharti establishes its supremacy in the Indian telecom market, having attracted Asia’s best – SingTel, and now world’s best – Vodafone. Bharti set to gain global leadership in the telecom sector Bharti Enterprises continues to hold shareholding and management control in Bharti Tele-Ventures. AirTel: Appropriating the value of expression Over the last couple of years, the market has grown considerably, with deeper penetration and wider usage of voice and data services, accompanied by much higher competitive intensity, Atul Bindal, chief marketing officer, Bharti TeleVentures, expands on this. In this context, differentiating merely on network, coverage and SMS is just not enough. You need to go beyond all the rational identifiers which are prerequisites in any case and connect at a deeper level. We needed a strong differentiator in an increasingly commoditized and crowded market. We found this differentiator in a core human truth that defines our category which is that there are moments when you need to make your point, when you need to be heard. Expressing and communicating are perhaps two of the most basic emotions. AirTel enables you to make your point in the most expressive way, anytime, anywhere. The campaign is towards owning this through Express yourself. We believe Express yourself allows us to connect at a deeper level and create a long-term platform for the brand. For AirTel, the challenge also lay in presenting a unified face to the consumer. This assumes significance when viewed in the light of the companys pre- and post-paid communication, which, in the past, had been treated very differently. Brand image, as a result, was being driven in two different dimensions. Brand AirTel is a category leader straddling completely different market segments such as consumer, business and corporate, as well as different voice, data and payment platforms, says Bindal. Express yourself enables the brand to unify and connect across the entire base of our existing and prospective customers. One of the most obvious benefits of owning a property such as candid expression (and Express yourself) is the expansive nature of the thought. The moment you have as broad a canvas as Express yourself, it becomes easy for anyone working on the brand to come up with new ideas and executions. Thats what makes a good campaign idea, observes Rediffs Prashant Godbole, who, along with creative partner Zarvan Patel, conceived the campaign. This is just the proverbial tip of the iceberg, Patel adds. We will be taking the idea forward in many different ways in the forthcoming work, he informs. Patel also credits his creative team for fleshing out the idea. Awards and Recognitions 2007-2008 ? Bharti Airtel has won the CNBC-TV18 India Business Leader Award for the Outstanding Company of the year, 2007 ? Bharti draws top honours at the NDTV Profit Business Leadership Awards 2007 ? Bharti Airtel Ranked 3rd on Shareholder Returns in BusinessWeek IT 100 List ? Sunil Bharti Mittal conferred Degree of Doctor of Science (Honoris Causa) by G. B. Pant University 2006-2007 ? Bharti draws top honours at the NDTV Profit Business Leadership Awards 2007 ? Bharti Airtel awarded the prestigious QCI-DL Shah Award on Economics of Quality ? Sunil B. Mittal chosen for this year’s Padma Bhushan Awards ? Bharti Airtel is once again chosen for India’s most Customer Responsive Telecom Company Award ? Triple success for Akhil Gupta at CFO Awards for India ? Bharti Airtel is amongst India’s Most Admired Knowledge Enterprises in 2006 ? Sunil Bharti Mittal receives ‘The Honorary Fellowship’ fromIETE ? Bharti Airtel draws Top Honors at the MIS Asia IT Excellence Awards 2006 ? Bharti Airtel among the top 10 best performing companies in the world according to Business Week IT 100 list Sunil Bharti Mittal is CEO of the Year at the Frost Sullivan Asia Pacific ICTAwards 2006 Bharti Airtel bags Wireless Service Provider of the Year andCompetitive Service Provider of the Year Organization Structure As an outcome of a restructuring exercise conducted within the company; a new integrated organizational structure has emerged; with realigned roles, responsibilities and reporting relationships of Bharti’s key team players. With effect from March 01, 2006, this unified management structure of One Airtel will enable continued improvement in the delivery of the Group’s strategic vision. Areas of Operations Delhi Our Delhi network covers a license area that includes the state of Delhi and the neighbouring towns of Faridabad and Gurgaon in the state of Haryana, and Ghaziabad and Noida in the state of Uttar Pradesh. We have a 20-year license to provide cellular services in our Delhi circle, valid until November 2014, and which is extendible by additional periods of 10 years. In addition to being India’s political capital, Delhi has the highest per capita income, the highest installed fixed-line penetration rate, and the highest population density among the 29 states of India. Delhi has a high concentration of service and manufacturing industries and houses the Central Government, the head offices for many major public sector enterprises, embassies and various government missions and development agencies. We believe that these factors create high roaming revenue potential from cellular subscribers who roam into our network from other circles. As of November 30, 2001, we had 465,278 custom ers in Delhi, giving us a market share of approximately 56% in this circle. Karnataka and Andhra Pradesh Located in southern India, Karnataka is a major business centre and several information technology companies are based in and around its capital, Bangalore. Andhra Pradesh is adjacent to Karnataka and several information technology companies are based in and around its capital, Hyderabad. Information technology companies are typically high-volume users of telecommunications services, particularly for data transmission. We offer cellular services in these circles pursuant to 20-year license, valid until 2016 for Karnataka and until 2015 for Andhra Pradesh, each of which is extendible by additional periods of 10 years. As of November 30, 2001, we had 177,810 and 195,054 customers in Karnataka and Andhra Pradesh, respectively, giving us a market share of approximately 57% and 48%, respectively, in these circles. Chennai We provide cellular services in Chennai (the capital city of the southern state of Tamil Nadu) and in the adjoining areas of Mahabalipuram, Minjur and Maraimalai Nagar. Chennai is a major centre for information technology companies and foreign multinational corporations. Our network is operated pursuant to a 20-year license, valid until November 2014, and which is extendible by additional periods of 10 years. As of November 30, 2001, we had 110,032 customers in Chennai, giving us a market share of approximately 51% in this circle. Himachal Pradesh Located in northern India, Himachal Pradesh is one of India’s most mountainous states and is a popular tourist destination, particularly for residents of Delhi and other north Indian states. Our network is operated pursuant to a 20-year license, valid until November 2015, and which is extendible by additional periods of 10 years. As of November 30, 2001, we had 12,462 customers in Himachal Pradesh, giving us a market share of approximately 64% in this circle. Kolkata Kolkata is the capital city for the eastern state of West Bengal. Several domestic and multinational companies are based in Kolkata and it is a major centre for trade and commerce in eastern India. Our network is operated pursuant to a 20-year license, valid until November 2014, and which is extendible by additional periods of 10 years. As of November 30, 2001, we had 87,570 customers in Kolkata, giving us a market share of approximately 41% in this circle. We have grown as a result of both organic growth and acquisitions of circles completed by us. The following table sets forth the growth in the number of our cellular customers over the last three years. In September 2001, we entered into license agreements with the DOT to provide cellular services in the eight circles of Mumbai, Maharashtra, Gujarat, Madhya Pradesh, Haryana, Uttar Pradesh (West), Tamil Nadu and Kerala. All these licenses are for a period of 20 years, valid until August 2021, and are extendible by additional period of 10 years. In September 2001, the DoT also restored the Punjab license in our favour. The Punjab license is for a period of 20 years, valid until 2015, and is extendible by additional periods of 10 years. We expect to commence providing cellular services in these nine proposed circles by the middle of this year. Mumbai Mumbai is the financial and commercial capital of India and one of the largest cities in the world in terms of population. Mumbai is among the highest per capita income cities in India. Several leading financial institutions, regulatory agencies, multinational corporations, service organizations and leading conglomerates are located in Mumbai. The concentration of commercial activity and service industry in Mumbai has led to a strong demand for telecommunications services, both voice and data. Maharashtra. Surrounded by Gujarat, Madhya Pradesh, Andhra Pradesh and Karnataka, Maharashtra is a prominent state in Western India. Maharashtra is one of the most industrialised states in India and several industries including sugar, pharmaceuticals, petrochemicals, heavy chemicals, electronics, automobiles, engineering, food processing and plastics are located in the state. Maharashtra has attracted high amount of investment from Indian and foreign companies in the past. Among states, Maharashtra has among the higher literacy rates and is a centre for learning and research in India. Gujarat Gujarat is located adjacent to Maharashtra and is also a prominent industrialised state in the country. Several companies in the chemicals and petrochemicals, pharmaceuticals and textiles sectors are based in Gujarat and the largest grass-root level petroleum refinery in India is located in the state. Gujarat also has one of the busiest ports in India and handled a high proportion of India’s exports for the year ended March 31, 2001. Haryana Haryana is adjacent to Delhi and is surrounded by the states of Himachal Pradesh, Uttar Pradesh, Rajasthan and Punjab. The city of Chandigarh, which is a union territory, is a joint capital city of the states of Haryana and Punjab. Haryana is also an emerging centre in north India for IT enabled services such as call centres, which are typically high-volume users of telecommunications services. Punjab Punjab is among the highest per capita income states in India. Punjab has emerged as a leading producer of agricultural products in India and several multinational corporations have invested in Punjab in agricultural-related businesses. Punjab is also emerging as a base for the production of engineering goods, pharmaceuticals, leather goods, food products, textiles, electronic goods, sugar, machine tools, hand tools, agricultural implements, sports goods, paper and paper packaging materials. Uttar Pradesh (West) Uttar Pradesh (West) is a circle carved out of the north Indian state of Uttar Pradesh by the DoT and has been classified as a Category B cellular license area. It is a popular tourist location in northern India with several holy shrines and pilgrimage locations. Madhya Pradesh Located in central India, Madhya Pradesh has a total area of approximately 443,000 square kilometers and has substantial mineral resources, making it a centre for the aluminum, chemical and iron and steel industries. Several industries in the electronics, telecommunications, petro-chemicals, food processing and automobiles sectors are also located in Madhya Pradesh. Kerala Located in south India, Kerala is rich in minerals, marine products and agricultural products. A large section of the former population of Kerala lives outside India as non-resident Indians and has contributed to a relatively high foreign exchange inflow in this state. The state has the highest density of science and technology personnel and the highest literacy rate in India. Tamil Nadu Located in southern India, Tamil Nadu is surrounded by Andhra Pradesh, Karnataka and Kerala. Tamil Nadu has several industrial undertakings engaged in cotton, sugar, leather, textiles, engineering and petrochemicals sector. The state has a large number of professionals and has witnessed a rapid growth in the software industry in the past few years. In addition to entering into licenses with the DOT for our eight additional circles and the restoration of our Punjab license, we have taken the following steps towards commencing operations in these circles and the integration of the proposed circles with our existing circles: completed network planning activities and implementing the same entered into rate contracts and, for some circles, placed purchase orders with vendors, including Siemens, Motorola and Ericsson, for the supply of telecommunications equipment and network design commenced recruitment activities and internal transfer of employees for new areas of operations entered into agreements with the Escorts group, a provider of cellular services in the Haryana, Kerala, Uttar Pradesh (West), Himachal Pradesh and Punjab circles, to share cellular infrastructure in order to reduce costs and speed the launch date for our services identified, and in some cases acquired, locations for the main switching centres and cell sites. selected a common billing system, customer relationship and enterprise resource planning packages and other office systems and controls for our existing and proposed cellular networks. Airtel has also reorganized the management structure of its cellular business on a regional basis in an effort to better capture revenue and cost synergies. PRODUCT LINE-UP Bharti Airtel offers GSM mobile services in all the 23-telecom circles of India and is the largest mobile service provider in the country, based on the number of customers. The group focuses on delivering telecommunications services as an integrated offering including mobile, broadband telephone, national and international long distance and data connectivity services to corporate, small and medium scale enterprises. The group offers high speed broadband internet with a best in class network. With Landline services in 94 cities we help you stay in touch with your friends family and the world. The Company compliments its mobile and broadband telephone services with national and international long distance services. It has over 35,016 route kilometers of optic fibre on its national long distance network. For international connectivity to east, it has a submarine cable landing station at. For international connectivity to the west, the Company is a member of the South East Asia-Middle East-Western Europe – 4 (SEA-ME-WE-4) consortium. Services Broadband and internet services Airtel brings you a host of exciting features ranging from facilities like Online tests, In touch and Video Surveillance Solutions to trouble shooting devices like, Net Expert and Web Jockey. Control your business, 247. Observe your office, warehouse, shop and staff from your PC, from anywhere and all the time Create and share your precious moments with your loved ones with In Touch. It’s a great way to reach out to your loved ones who are far away. Introducing NetXpert, India’s first ever automated Broadband care technology which provides immediate solutions for Internet connectivity related problems. Airtel Broadband Services and TCY Online offer you online competitive tests for GRE, GMAT, SAT and MBA, from the comfort of your home. Wifi is a wireless technology brand by the Wifi Alliance that gives you a host of fantastic advantages ranging from reliability to security. Calling cards Our calling card services connect you to your friends and friends in India a cost effective and reliable manner. Choose from the options below and stay connected. Calling Cards include Great savings on calling anywhere in India or across the world. Even if your phone is not STD/ISD enabled, go ahead and talk to your loved ones. Now call back India from USA at lowest cost of just 6c / min . Traveling abroad? Save precious foreign exchange and up to 94% over international roaming charges. Home Phones Home Phones include Airtel welcomes you to its world of telephony services, which offers you world class services with its cutting edge technology. Avail of the convenience of a mobile phone on a fixed line, without any cables disturbing the ambience of your living room! Mobile Footprint The map below depicts the location of, and provides certain information for, Bharti Tele-Ventures existing mobile circles in India: PROMOTIONAL STRATEGY After the liberalization of the Indian Telecom Sector in 1994, the Indian cellular market witnessed a surge in cellular services. By 2005, there were a total of 12 players in the market with the five major players being Bharti Tele-Ventures Limited (Bharti), Bharat Sanchar Nigam Limited (BSNL), Hutchinson-Essar limited (Hutch), Idea Cellular limited (Idea) and Reliance India Mobile (RIM). All the players except RIM offered services based on the Global System for Mobile (GSM) technology. RIM provided services based on Code Division Multiple Access (CDMA) technology as well as GSM. As competition in the telecom arena intensified, service providers took new initiatives to woo customers. Prominent among these were celebrity endorsements, loyalty rewards, discount coupons, business solutions and talk time schemes. The most important consumer segments in the cellular industry were the youth segment and the business class segment. The youth segment was the largest and fastest growing segment and was therefore targeted most heavily by cellular service providers. Bharti Tele-Ventures adopted celebrity endorsement as its chief promotional strategy. By 2004 it emerged the unprecedented leader commanding the largest market share in the cellular service market. (Refer Exhibit II). Hutch implemented the celebrity endorsement strategy partially, relying primarily on its creative advertising for the promotion of its brand. BSNL, on the other hand, attracted the consumer through its low cost schemes. Being a state owned player, BSNL could cover rural areas, and this helped it increase its subscriber base. Reliance was another player that cashed on its innovative promotional strategies, which included celebrity endorsements and attractive talk time schemes. Idea, relied heavily on its creative media advertising sans celebrities. SWOT ANALYSIS STRENGHTS 1. India has technically educated, motivated and intelligent workforce, who if given proper incentives like quality living and benefits, can be retained in India . 2. India possesses cheap labours to attract foreign investments. 3. Telecom software, telecom professionals, telecom infrastructure and telecom services are the key players in shaping today’s economy. 4. Revenue sharing strategies are leading to mergers and actuations, helping companies to enter new business opportunities, and generate employments, boosting the country’s economy. 5. Privatization of VSNL, along with its partnership with Tata has benefited not only the two companies but also the county at large. 6. Information technology growth can propel India into IT superpower. 7. Quality of life definitely improves when the infrastructure and economy improves. 8. India has huge project plans with foreign countries which can attract further mergers , investments etc. 9. Foreign companies that are facing problem in home market have already identified India as a potential markets for business and therefore they are heavily investing in India. 10. Government has already started relaxing rules for foreign participants. 11. Software exports from software technology parks are a huge potential business. 12. Though global telecom picture looks gloomy but India possesses the competitive advantage in terms of its huge market size and many undeveloped areas. WEAKNESSES 1. Bureaucracy and politics tremendously affects the business policies. 2. Slow reform process and slow liberalization affect the changes and makes the progress slow. 3. Foreign companies wanting to invest in India are put off due to continuously changing rules and lax policies. 4. Telco’s though united, provide some services that bring them in close competition and therefore lose not only profits but also consumer confidence. 5. Compared to the global structure, India is still concentrating on universal service in some parts of the country. 6. Since 1994 reform process, telecom density has only gone up to 3 as compared to the global average of 14. 7. Though cellular is the most attractive business today, but still the overall number of cellular subscribers is very low and this market really needs to be tapped. 8. Embracing change and understanding the technology takes a lot of time making the changes very slowly. OPPORTUNITIES 1. Lot of new entrants in telecom is bringing investment opportunities. 2. Economic liberalization is bringing a significant amount of progress. 3. Telecom educational institutes are coming up to keep the professionals at par with the changing technology. 4. New opportunities are generating more employment and creating a knowledge based economy 5. Privatization of services in telecom sector has led to keen competition, as a result of which prices are reduced and more business opportunities are created. 6. Increased availability of bandwidth has opened doors to new schemes making efficient usage /providing value added services and generating profits. 7. For cellular operators providing long distance is a lucrative business opportunity and they can also concentrate on providing many value added services. 8. Provision of not only basic services /but also, internet, cellular, medical transcription, call center. THREATS 1. Regulatory and tariff changes especially in the cellular operations are constant threats. 2. China’s early liberalization and the fast growing economy may prove to be a hindrance for India. 3. Economic protectionism and continuous political changes plays against plays against everybody’s favors and affects the good intentions of players even like reliance / Tatas etc. 4. Price regulations based on pre set rate of return hinder the growth. 5. Young hard working and intelligent work force want to leave the country due to poor economic conditions and exploitation. 6. Indian businesses take time or can’t survive due to the constantly changing technology and fast-paced nature of telecom business. CHAPTER-IIII RESEARCH OBJECTIVE RESEARCH OBJECTIVE The objective of my project report is to study the advertising strategy of AIRTEL Cellular service and its effect on mobile users existing and who are going to use mobile service in future. In other words, my aim is to study the Advertising Effectiveness of AIRTEL Cellular service. ? To learn the practical knowledge and how academic knowledge convertible in practical way. ? To find out the success rate of the airtel cellular. ? To find out how much organization is involved in the mind of consumer. ? To measure the customer’s satisfaction of airtel who are using airtel services and products. ? To develop a new strategy for the improvement of existing Airtel services and to find new ways of increasing Market share. CHAPTER-V RESEARCH METHODOLOGY RESEARCH METHODOLOGY Achieving accuracy in any research requires in depth study regarding the subject. As the prime objective of the project is to study advertising strategy of Airtel .The research methodology adopted is basically based on primary data via which the most recent and accurate piece of first hand information could be collected. Secondary data has been used to support primary data wherever needed. Primary data was collected using the following techniques Questionnaire Method Direct Interview Method and Observation Method The main tool used was, the questionnaire method. Further direct interview method, where a face to face formal interview was taken. Lastly observation method has been continuous with the questionnaire method, as one continuously observes the surrounding environment he works in. Procedure of research methodology # Target geographic area was East Delhi. # To these geographical area questionnaire was given, the questionnaire was a combination of both open ended and closed ended questions. # The date during which questionnaires were filled was between six week. # Some dealers were also interviewed to know their prospective. Interviews with the honour of retailer of Airtel were also conducted. # Finally the collected data and information was analyzed and compiled to arrive at the conclusion and recommendations given. Sources of secondary data Used to obtain information on, Airtel and its competitor history, current issues, policies, procedures etc, wherever required. # Internet # Magazines # Newspapers CHAPTER-VI LIMITATIONS OF STUDY LIMITATIONS OF STUDY The researcher has to face certain difficulties while he carries out the research work. He knows the limitations before hand. Some of them are uncontrollable and some others are controllable. Some important limitations, which were faced, are as follows: 1. Limitation of Time: I have completed the research in limited time. In spite of all the difficulties if the time is short it is quite possible that one cannot collect the sufficient data and have to depend upon other source of data. 2. Limitation of funds: Availability of funds was another limitation owning to shortage of money. 3. Limitation of skills: the research needs a lot of statistical work involving collection and tabulation of data, interpretation of data and drawing out the necessary results. It requires an able, efficient and experienced research works. 4. Limitation of human behaviors: (a) Some of the respondent was not honest and genuine in their approach. (b) Some of the respondents could not understand certain queries. CHAPTER-VII CONCLUSION CONCLUSION The conclusion of my study is that AIRTEL’s Advertising has a major impact on its users. People like its schemes very much .AIRTEL had created a very good image on the mind of the new users of cellular service. AIRTEL has adopted a very good strategy by providing a new connection with NOKIA who is market leader in mobile sets, many new users buy Nokia sets and they get a free connection of AIRTEL. AIRTEL is successful in capturing the highest market share by adopting Celebrity Endorsement Strategy. A.R. Rehmaan’s tune for AIRTEL worked as free advertising for AIRTEL as another service user uses it too. Other celebrities like Shahrukh Khan (Bollywood) and Sachin Tendulkar (Cricket) has also contributed very much in AIRTEL. AIRTEL has influenced mass customer by its wide network base in India and is popular among business man and professionals but in students it isn’t a popular one because there isn’t much attracting schemes and offers for the youth. CHAPTER-VIII RECOMMENDATIONS Research Papers on ADVERTISING STRATEGY OF BHARTI TELEVENTURES LTDPETSTEL analysis of IndiaAnalysis of Ebay Expanding into AsiaThe Project Managment Office SystemMarketing of Lifeboy Soap A Unilever ProductInfluences of Socio-Economic Status of Married MalesBionic Assembly System: A New Concept of SelfDefinition of Export QuotasOpen Architechture a white paperIncorporating Risk and Uncertainty Factor in CapitalNever Been Kicked Out of a Place This Nice