Tuesday, December 31, 2019

Comparison of High School and College - 995 Words

English 111 9/25/12 Compare and Contrast I could go on and on about how many similarities high school and college have, but I’d rather interest you in their differences. The three main differences between these two educations are homework, tests, and rules of attendance. I would personally prefer college over high school any day. In high school, homework is pretty ridiculous. Teachers would assign homework every day and not only that, but they would check it every day as well. If it wasn’t perfect we would get points taken off and we would have to re-do the problems we got wrong. Teachers are also unreasonably lenient in high school too. For example, the â€Å"I left my paper at home, can I turn it in next class?† excuse is okay†¦show more content†¦I just never realized the importance of being forced to do them and how much it would help me learn the information. So when a professor tells me I don’t have to do homework and it won’t be checked I listen ed to him and now I don’t know how to do the chapter we are learning in math. Now that I’ve realized the importance of doing the homework instead of waiting to be asked to do it and checked I just do it so that I won’t suffer on the test or quiz due to my own ignorance. I’ll be okay in college as long as I remember what’s important to me which am getting a job when finally getting my engineering degree. You always have to remember what’s important to you because if you don’t then you will fall behind in life and you don’t want to fall behind in anything you do. It’s pretty unnecessary and unneeded but either way you won’t be successful. High school and college are very different in a couple senses but they are different for a reason. If you don’t take advantage of these reasons then they will take advantage of you. Homework, test and attendance policies are the 3 main differences between high school and college. There is more homework, more tests and stricter attendance policy in highShow MoreRelatedEssay on Comparison Between High School and College859 Words   |  4 PagesSchool plays an important role in our life. Many of us will spend more than fifteen years at school in order to get the qualifications that are required to work in a specific field. Of course, those years are broken down into several levels, some of them being more liked than others. Two important steps that we go through are high school and college. Even though some people would think they are almost similar, yet there are significant differences between them. The cost of high school education isRead MoreComparison and Contrast of High School Teachers vs College Professors1293 Words   |  6 PagesComparison and Contrast of High School Teachers vs College Professors There are some similarities between high school teachers and college professors but there are many more contrasts. Academically speaking, both teachers and professors have grading styles and policies, deadlines and due dates for papers and projects, and a sense of compassion. If only I would have had someone explain the differences between the two levels of teaching, I probably wouldn*t have given up in high schoolRead MoreEarly College High School : Foundations Of Successful Career1273 Words   |  6 PagesEarly College High School Foundations of successful career considerably rely on the early college life successes. It is a commonly believed and supported that, for a successful career, strong academic records are highly pivotal as they provide a solid and impeccable foundation to the career. And this can only be achieved through engaging oneself in all academic courses which are taught in every class of high school and college life. For this objective, undivided attention, effective time managementRead MoreSummary Of We Send Too Many Students College 923 Words   |  4 PagesStudents To College,† acknowledges that colleges have become obscenely expensive and that it is possible to be successful without going to college. Arguing that too many students are sent to college without realizing that it is not imperative, Nemko targets parents in his claims that colleges focus on educating in the cheapest way possible and most importantly, that the advantage of past college graduates in the job market is de clining. One of his main reasons is that even though the average college graduateRead More Standardized Test Scores and Their Use in College Admissions Decisions1560 Words   |  7 PagesTest Scores and their use in College Admissions Decisions PURPOSE The purpose of this proposal is to examine current and future Iowa State University admissions decisions processes. At the present time most colleges, including Iowa State use a combination of standardized test scores, high school class rank, high school grade point average, and essays to make decisions on admissions. All of the above are good determinants of a student’s possible success in college, except standardized test scoresRead MoreEvaluation Of A Non Experimental Design993 Words   |  4 Pagesexperimental group and a comparison group. Participants will be selected from three high schools within the Long Beach school district. Two high schools will receive the full program while the third will serve as a comparison school. The students in the comparison group will not receive the program whatsoever and will strictly be used to compare their result to the results of the experimental group. Pre-tests will be administered to both the experimental group and comparison gro up at the beginningRead MoreSAT Essay1314 Words   |  6 Pagesyellow, and red hues. The fall has begun, but this means so has the college application season. Thousands of high school seniors are racing to testing centers last minute to gain extra points on their ACT and SAT scores. American College Testing (ACT) and Scholastic Assessment Test (SAT) are college entrance tests giving ways for high school students to gain acceptance into college and earn merit scholarships. Typically Ivy League colleges require their students to score in the top 0.1% which means earningRead MoreThe Country Of The South923 Words   |  4 PagesLiving in the South A twelve year old teenager is sitting in a car, and he is travelling from Washington State to Georgia. When he arrives, he finds the temperature warmer, and he finds that his new middle school is a blue ribbon school. I am that teenager, and I am living here in Alpharetta, Georgia. Living in Seattle for many years, I can say that the South is a huge contrast from the North, but there are still many things I like about the South. The climate is very warm, and the weather is reallyRead MoreDuring the latter portion of the 19th Century, educational reform became a battle of power and900 Words   |  4 Pagesa people...Something was seriously remiss in our educational system (pps.1-7).† In fact, these fears herald an overall in the assessment structure, the quality of teaching and learning in our nation’s public and private schools. It further compared American schools and college with those of advanced nations, and purported the belief that subsequent generations could maintain and left intact the once unchallenged preeminence of the United States in commerce, industry, science and technological innovationRead MoreWriting and Compare-and-contrast Essays1384 Words   |  5 Pagesor more subjects is a compare-and-contrast essay, which also is called a comparison-and-contrast essay. Not only will a compare-and-contrast essay focus on two or more subjects, it also will include details that support the comparisons. An effective compare-and-contrast essay will contain transitions to make connections between the subjects of the essay clear. You may have written a compare-and-contrast essay for a school assignment. Topics vary widely and might be based on: significant events

Sunday, December 22, 2019

Cyber Security And Cyber Attacks Essay - 1246 Words

Introduction: Cyber security is a major concern for every department, business, and citizen of the United States because technology impacts every aspect of our daily lives. The more we use technology the more complacent, we get with the information that is stored within our cyber networks. The more complacent, we get, the more vulnerable we become to cyber-attacks because we fail to update the mechanisms that safeguard our information. Breaches to security networks are detrimental to personal, economic, and national security information. Many countries, like Russia, China, Israel, France, and the United Kingdom, now have the abilities and technology to launch cyber-attacks on the United States. In the last five years there have been several attacks on cyber systems to gain access to information maintained by major businesses and the United States Government. Cyber-attacks cause serious harm to the United States’ economy, community, and the safety, so we need to build stronger cyber security mechanisms. Based on my theoretical analysis, I recommend the following: 1. The United States government needs to focus less on physical warfare and more on cyber warfare. 2. The United States government needs to demonstrate power, and that it is capable and willing to attack back. 3. The government needs to take greater steps to protect and secure government information from foreign cyber-attacks. Background: Protecting this countries national security is becoming more of anShow MoreRelatedCyber Security And Cyber Attacks1503 Words   |  7 Pageshave could negatively impact organizations information security. A vast majority of organizations rely on computers and the internet to store its data. Cyber attacks can take place in a variety of industries that might the general population does not realize such as cellular communication services, airplane navigation systems, and medical record security. All of these organizations are in highly diverse industries but need to be aware of cyber threats that could affect their specific industry. TheRead MoreCyber Security : A New Cyber Attack Essay1588 Words   |  7 PagesIn the newfound age of Cyber Security there is much that still needs to be done before the industry can function without all of the difficulties currently faced. Every day it seems like a new cyber attack has overtaken another victim. This cyber threat is so big tha t President Barak Obama passed the Cybersecurity Act of 2015 . Among other things, this act calls for increases in information sharing between businesses and the federal government. It also has a hefty dollar amount behind it. In the 2017Read MoreThe Effects Of Cyber Attacks On Cyber Security1972 Words   |  8 Pagesappallingly is in the cyber realm. As pointed out in the â€Å"10-year anniversary commentary,† the amount of cyber-attacks being launched against American government, military, and civilian companies has increased since 9/11 (Bipartisan Policy Center, 2014). With increasing cyber-attacks and the weak state of America’s cyber security, as evident by the successful attacks on our military and government infrastructures, it is most important that we make every effort to prevent further attacks and strengthenRead MoreInformation Security And An Cyber Attack1320 Words   |  6 PagesExperts say in the next 11 years we will have a Major cyber-attack that w ill result in the loss of life or property in the tens of billings of dollars. Governments, militaries, corporations, financial institutions, hospitals and private businesses will combat these cyber threats with good cyber security or information security practices. Information security refers to the protection of information and information systems from unauthorized access, use, disclosure, disruptions, modification, orRead MoreCyber Security Attacks On Financial Institutions1666 Words   |  7 PagesFor an extended period extending towards the end of 2014 until now, incidences of cyber security attacks on financial institutions have not only grown in number but also become sophisticated (Global banking and payment systems Practice, 2015). Lately, the criminals try to match the new security control measures with advanced security breach mechanisms and software. These criminals are known to introduce hybrid systems or devices like the variant DDOS (Distributed Denial of Service), which rendersRead MoreCyber Attack on RSA Security LLC712 Words   |  3 Pages CYBER ATTACK ON RSA 1. BREACH: RSA Security LLC, is an American computer and network security company, and is a division of EMC Corporation. RSA is an independent company named after its co-founders Ron Rivest, Adi Shamir, and Len Adleman. The company’s headquarters is located in Bedford, Masachusetts, United States of America. Encryption and network SecurID Authentication tokens are its major products. In mid March 2011, spear phishing attack exploited anRead MoreThe Security Agency Surveillance And Cyber Attacks3323 Words   |  14 Pages Communications Security April M. Walker American Military University â€Æ' Communications Security Communications Security is critical to preventing adversaries from obtaining information traversing the internet. With today’s technology just about all information is being transmitted via the internet or phone lines or mobile radios. This can be anything from credit card payments for online purchases to classified secret level or above information for military operations. The technology involvedRead MoreCyber Security Attacks And Intrusion Detection System2014 Words   |  9 Pagestypes of targets and attacks change, classifications of attacks remain the same; exploiting user errors, hardware resources malfunction, and software weaknesses/glitches. Government and corporate agency have developed analysis of a variety of cyber-attacks and how it affects certain environments or individuals in a real world situation. The main goal is for these agencies to focus on how network simulation model have been developed for generating representative cyber-attacks and intrusion detecti onRead MoreManaging Information Security Risk Of A Cyber Attack804 Words   |  4 PagesNext, AAE will use the NIST SP 800-39: Managing Information Security Risk to generate a response for each risk. Note that three of the risks are global risks; the data breach, terrorist, and rising fuel prices risks all stem from AAE’s global marketplace activities. According to the SP 800-39, AAE could utilize one of five strategies to respond to risk. It could choose to: 1) accept risks, 2) avoid risks, 3) transfer/share the risks, 4) mitigate the risks, or 5) avoid the risks. Following are theRead MoreCyber Security Operations Centre ( Csoc ) Investigates And Analysis Cyber Attacks On Uk Networks1212 Words   |  5 PagesCyber Security Operations Centre (CSOC) investigates and analysis cyber-attacks on UK Networks and provide solutions and means to mitigate future attack. Its job is in cyber forensics and incident response while the Government Computer Emergency Response Team (GovCERT) deals with the public sector organisations on issues relating to computer security incidents, warnings, alerts, assistance and advice to prevent, reduce expose and mitigate attacks. The National Crime Agency formed in Oct 2013 to

Saturday, December 14, 2019

Truth in Sentencing Free Essays

Truth-in-sentencing debate Learning Team B CJA/204 November 26, 2012 Deana Bohenek Truth-In-Sentencing Debate Opening Argument Truth-in-sentencing laws do not deter crime. The federal truth-in-sentencing law guarantees that certain violent offenders will serve at least 85% of their sentence  (Schmalleger, 2012). However, if the offender acts accordingly in prison, he or she can attain parole for good behavior. We will write a custom essay sample on Truth in Sentencing or any similar topic only for you Order Now What about the victims? Victims do not want to hear this. If an offender is sentenced for 30 years, the victim wants justice and wants to see the full 30 years served. They do not want to see the offender getting released after 25 years. The truth-in-sentencing laws are the judges’ guideline when choosing the sentence of the offender. The law is a structured guideline for sentencing the offenders. However, the judge can deviate from the guidelines if there are mitigating and aggravating circumstances. Look at plea bargaining,  this is still a possibility even though there are truth-in-sentencing laws in place. The offender knows that if they get caught, they can plea bargain for a lesser sentence and be back out on the streets sooner. Let me say it again, truth-in-sentencing laws do not deter crime. The offenders know they will get out of prison soon through a plea bargain or parole. They know they can avoid serving the full sentence that the judge imposed on him or her. The only way to deter crime and reduce recidivism is to abolish the possibility of parole and ensure that the sentence the judge renders is carried out to full-term. Obviously, to take away the option for parole would mean that the prison populations would increase. Well, we should take the funds left over from overhead to run the parole division and build more prisons to house these offenders. The longer we keep them off the streets, the safer society will be. Rebuttal Argument Each state has to look at the amount of money being spent to house each inmate they have in custody. Because the Truth-In Sentencing Law wants to keep the offender behind bars until they complete their entire sentence/term in prison no matter what the costs are to the public. Meaning, everyone’s hard earned income  (taxes) are used to keep them in their present place of occupancy. This law depletes the services we receive from our state revenues. We don’t have much say in the budget spending but we do see the increase in taxes used for each state program. I have to disagree with the statement made â€Å"The offenders know they will get out of prison sooner through a plea bargain or parole. †Ã‚   Not all offenders before or during their trial will know the outcome of sentencing. Many do not have the option for plea bargaining because plea bargaining depends on the severity of the crime committed. Instead, if the case went directly to trial, (this includes judge and jury) the accused might have a chance of plea bargaining. No plea bargaining makes the offender eligible for a parole based on his or her behavior during incarceration and no plea bargaining being offered. But if society had no parole system, then the correctional system will have to face overcrowding in the institutions. The lack of Rehabilitation for said prisoner would be non-effective because there would be no programs such as work-time credit or good-time credit, which is the main reason why early release would benefit them. With those programs the time served by offenders would be less and would allow the offenders to enter back into society. The fear of re-entry of said offenders are the defense for keeping them locked up. These programs should be used for offenders that have this as a first offense on their record and have shown they can be productive in today’s society. Not all inmates are repeat offenders some are just non-violent offenses but carry a great penalty. When I was younger it was a big deal to go to jail because it showed most people that they were a â€Å"badass†, a badge of honor, and should be feared. In my eyes it was a waste of mind, body, and productive individual. Those same individuals found when they came out ithout a trade they were worthless and the only way to survive was crime and more time in jail. In Illinois, Governor Pat Quinn on October 2, 2012 has reinstated the program for â€Å"Good-time† releases,  a way to bring down the overcrowding in his state and federal prison system. Opening Argument Truth-in-Sentencing laws deter crime because they ensure that offenders are in prison for at least 85% of their sentence. Therefore, the convicted offenders stay in prison for longer periods and not able to commit additional crimes and endanger the member of society. TIS laws are the assurance of longer prison terms as punishment and serve as an effective deterrent from criminal actions to the serving offender and others who may be considering criminal acts. The laws provide the ability for the criminal justice system to operate more effectively by lowering violent crimes as well punishing violent criminals. According  to the publication from  University  of Alabama at Birmingham (2005) citing data from Bureau of Justice Statistics, in the decade following the passage and implementation of the truth-in-sentencing laws in 1994, the arrests for violent crimes were reduced by 16% by the year of 2005. The TIS laws also limit some of the discretion of the judges and parole boards with regard to release of the offenders prematurely and being â€Å"too soft† on crime, thus eliminating the many possibilities for the offenders getting away without receiving the well-deserved punishment. The Bureau of Justice Statistics Special Report from January 1999 indicates that prior to the TIS laws violent offenders barely served half the length of their sentences. What kind of message did that send to the convicted or potential criminals? With the availability of TIS laws, criminal justice administrators can build public confidence by ensuring that the just punishment is served to anyone breaking the law. In the article written by Joanna Shepherd published in the Journal of Law and Economics, she makes this statement: â€Å"Using a country-level data set, empirical results confirm that TIS laws deter violent offenders, increase the probability of arrest, and increase maximum imposed prison sentences. TIS laws decrease murders by 16%, aggravated assaults by 12%, robberies by 24%, rapes by 12%, and larcenies by 3%† (Shepherd,  2002,  p. 09). Today, more states are implementing the TIS laws and abolishing parole and indeterminate sentencing, demonstrating that the state legislature believes in this uniform application of justice processes and effectiveness of these laws in crime prevention. This information clearly shows that TIS laws are very effective in deterring crime by ensuring the stern and just punishm ent for offenders and sending the clear message to potential criminals that criminal behavior will be punished by lengthy imprisonment. Rebuttal Argument What about crime being committed in prisons around the world? Are we just going to ignore that fact because victimization is still happening across the boards of federal and state prisons? According to  a writer of The  New Yorker, Adam Gopnik, darkly described America prisons as â€Å"the moral scandal of America life. Prison rape is so endemic- more than seventy thousand prisoners are raped each year. † That is routinely held out as a threat, part of punishment to be expected. † (Gopnik, 2012). The National inmate survey reported that â€Å"An estimated 4. 4% of prison inmates and 3. % of jail inmates reported experiencing one or more incidents of victimization by another inmate or facility staff since admission to the facility  (Beck Harrison, 2010). The total federal and state population in 2010 was 1,605,127, while the total jail population in 2009 was 767,620. This implies that there were over 94,000 victims subject to multiple violations (Beck Harrison, 2 010). No I don’t agree with the fact that offenders being incapacitated for longer periods of time don’t commit another crime. For people who want to do so, they will commit crimes anyway, and largely at that. Especially, the incentive behind good time credit is to have offenders behave in prison. If you lock them up in less than ideal conditions with no incentive to behave appropriately while incarcerated, they will be a population difficulty to control because they have nothing to lose. Earning good time credit gives them an insight to behave well inside. As for truth-in sentencing laws, I don’t know if I  would actually say it is a deterrent or at least how much of a deterrent it  is, but I think it is  important nonetheless. Prior to 2003, legislation allowed for automatic emission of every sentence imposed to be reduced by one third (Chong, 2008). If the offender was made eligible for parole, a portion of that sentence is served under supervision in the community to enable their reintegration  into the community when released (Chong, 2008). Legislation introduced in 2003 abolished the automatic remission provision, so the sentence  imposed would more truly reflect the time to be served. In its place, legislation required courts to adjust the sentence actually imposed by one third, to reflect the abolition of automatic remission (Chong, 2008). What the government has done is  replace  automatic remission with reduction of sentence (Chong, 2008). The more things change, the more they remain the same. Sentences are more or less duration  for the same type of offenses (Chong, 2008). Some say the money being used for these criminals sitting in  jail should be more valuable of utilizing for work  time credits and more programs  for educational, substance abuse, psychiatric help programs for these offenders before being released out into the world again. I think it will better prepare themselves rather than not knowing what to do and all they are use to is the  jail’s way of life in which they will end up back  in having that kind of mind set. References Beck, A. J. , Harrison, P. M. (2010, August). Sexual Victimization in Prisons and Jails Reported by Inmates, 2008-09. Bureau of Justice Statistics, Retrieved from http://bjs. ojp. usdoj. gov/content/pub/press/svpjri0809pr. cfm Chong, P. (2008, June 19). The Truth about ‘Truth in Sentencing’. WAtoday. Retrieved from http://blogs. watoday. com. u/theverdict/2008/06/the_truth_about. html Ditton, P. M. , Wilson, D. J. (1999, January). Truth in Sentencing in State Prisons. Bureau of Justice Statistics Special Report,  (NCJ 170032). Retrieved  from  http://bjsdata. ojp. usdoj. gov/content/pub/pdf/tssp. pdf Gopnik, A. (2012, January 30). The Caging of America. The New Yorker. Retrieved from http://www. newyorker. com/arts/critics/atlarge/2012/01/30/12030crat_ atlarge_gopnik Schmalleger, F. (2012). Criminal Justice Today: An Introductory Text for the 21st Century, 11th ed. Upper Saddle River: NJ. Shepherd, J. M. (2002, How to cite Truth in Sentencing, Essay examples

Friday, December 6, 2019

Automation Has Become an Integral Part of the Business Activities

Question: How Automation Has Become An Integral Part Of The Business Activities? Answer: Introduction Automation has become an integral part of the business activities and functions all across the globe. Manual activities and processes are now being converted to their automated counterparts to make sure that the processing of the operations is accurate and fast. There are several advantages that come along with the implementation of automated information systems in an organizational structure. GC University has also decided to go with the flow of technology and has taken a step forward to convert their manual registration systems with automated online registration systems. It has become a necessity for the institutions such as GC University to make sure that a strong web presence is provided to the users and the same will be fulfilled by the online registration system for the university. The online system will prove to be advantageous for the students along with the administration and management of the university. It will become easy and convenient for the students to register for th eir desired courses and view the associated details on the online portal without the need to visit the university campus regarding the same. There will also be a lot many benefits to the registration and administrative department in terms of handling and management of the student applications. The document covers the details of the project in terms of its objectives along with the highlights on the design, layout, web hosting services and functionalities that will be implemented in the online registration system. Statement of the Problem There are several problems that are associated with the manual registration system that is followed at the GC University. Manual processing leads to the emergence of a number of manual errors and also the processing of the student application for registration takes a lot of time. There are also occurrences of data loss that are observed due to involvement of the manual handling. Also, the problems associated with data duplication and data replication leads to unnecessary ambiguities. Because of all of these issues, it has become essential to move towards an advanced online registration system for the university (Lin, 2011). Purpose and Objectives The purpose of the project is to overcome the problems and issues that are associated with the current registration system that is followed at the university and to come up with an online registration system for the end users. The purpose of the document is to highlight the objectives along with the design details and methodologies involved with the project. The objectives of the project are as listed below. An online registration system shall be set up for the students and the employees of the GC University with all the functional and non-functional specifications implemented in the same. The project shall be completed in the estimated period of time and shall also not exceed the budget that is estimated. The project shall offer high levels of performance and usability to the end users and it shall be made sure that there is no security incidents involved during the usage of the system. Benefits of the System The online registration system will benefit the students as they will be able to register for their desired course in the university from any location. Also, the details about the university, the courses offered along with fee and academic calendar can also be easily accessed by the students providing them with high degree of usability (Yu, 2004). The system will also be beneficial for the employees of the GC University as the online registration system will involve automated information systems for handling student applications and providing them with the response and acknowledgement. The student data will also be automatically stored and updated in the database which will ensure that there are no incidents around data duplication and repetition (Harsh, 2017). The society as a whole will benefit from the system as the families of the students will also be able to view the course details and the system will always remain available to be accessed by the users. Front-end and Back-end Requirements The front-end of the online registration system for GC University shall be developed in the web language as PHP and the styling shall be done with the use of Cascading Style Sheets (CSS). PHP will offer a lot many advantages in terms of the flexibility and scalability of the system (Dahse and Holz, 2014). It will allow the system to be adaptable with the requirements and specifications and will make it easy for the system engineers to make the system scaled up or down accordingly (Hills, 2015). HTM editors shall be used by the developers for web editing. The back-end of the online registration system shall be designed with the database engine as MySQL database. It will provide the system engineers, web developers and experts with the ability to easily sync the database with the front end of the system (Datamation, 2017). My SQL will also offer many advantages to the administration of the university as it will allow the users to extract customized report of the system data and will also allow easy execution of the data operations. There will also be security mechanisms in-built in the database which will make sure that any of the security risks and attacks is also avoided (Petri, 2005). The admin account of the system shall be responsible to set up the user privileges and roles and there shall be a unique id assigned to every user along with a One Time Password (OTP) for authentication of the users in order to provide them with the access to the system. Recommendation on Setting up the Portal The layout of the portal shall be kept simple to allow the users to understand the flow themselves. The flow of sections should be kept consistent on all the pages with a title on the top followed by header, menu, body and footer. The design of the system shall include the smooth navigation, consistent and simple color scheme, basic theme along with avoidance of unnecessary whitespaces (Bruckner, Sivilai and Namahoot, 2014). The major functionalities that shall be implemented in the system shall include login functionality, ability to view course details, search functionality, apply for a course, make payments, view academic calendar, contact registration department and logout functionality. Social media integration shall also be enabled in the registration system for the university (Molanphy, 2009). Cloud based web hosting service shall be used in case of the online registration system for GC University to allow the easy hosting along with the involvement of cloud components in to the registration system for the university (Swack, 2010). References Bruckner, M., Sivilai, S. and Namahoot, C. (2014). Evidence-Based Design Principles for Web Sites Advancing eHealth Literacy. Advanced Materials Research, 931-932, pp.1447-1451. Dahse, J. and Holz, T. (2014). Simulation of Built-in PHP Features for Precise Static Code Analysis. [online] Available at: https://www.internetsociety.org/sites/default/files/04_5_slides.pdf [Accessed 3 May 2017]. Datamation (2017). 8 Major Advantages of Using MySQL - Datamation. [online] Datamation.com. Available at: https://www.datamation.com/storage/8-major-advantages-of-using-mysql.html [Accessed 3 May 2017]. Harsh, S. (2017). Management Information Systems. [online] Available at: https://departments.agri.huji.ac.il/economics/gelb-manag-4.pdf [Accessed 3 May 2017]. Hills, M. (2015). Evolution of Dynamic Feature Usage in PHP. [online] Available at: https://www.cs.ecu.edu/hillsma/publications/php-dynamic-evolution.pdf [Accessed 3 May 2017]. Lin, J. (2011). Universal School Online Registration Management System Research and Design. Energy Procedia, 13, pp.9190-9197. Molanphy, E. (2009). A Review of The Design of Sites: Patterns for Creating Winning Web Sites . Journal of Web Librarianship, 3(2), pp.158-159. Petri, G. (2005). A Comparison of Oracle and MySQL. [online] Available at: https://www.ltn.lv/~apsitis/java-eim/pdfs/003_OracleMySQL.pdf [Accessed 3 May 2017]. Swack, T. (2010). Web Design Analysis: Creating Intentional User Experiences. Design Management Journal (Former Series), 8(3), pp.71-76. Yu, E. (2004). Information Systems (in the Internet Age). [online] Available at: https://www.cs.toronto.edu/pub/eric/PHIC04.pdf [Accessed 3 May 2017].