Saturday, January 25, 2020

Automation Process in Online Shopping

Automation Process in Online Shopping 1. INTRODUCTION Online Shopping 1.1 About The Project This project is developed for the automation process of shopping throw online i.e through web. In marchant module adding the catogories,products,itemSales, giving orders, stock maintenace, creating invoice (bill) for orders, shipping of items order given by customer. creation, details, and other transactions like automatic increment,decrement of stock, paid invoice(amount),shipping invoice And all other transactions for large scale whole sale or retail sales, very big shops, or organizations. This project mainly contains 3 modules like Marchant module, Customer module, and invoice module. In customer module customers will give orders for items which are being available in that shop. In our project that order is processed and details are stored in data base. In invoice module total bill for ordered items will be created. In case if the ordered items are not being shipped at a time then the pending order details will be processed and the bill for the pending order will be created. In Marchant Module products are being maintained in category wise and product wise, item wise and up to date stock will be maintained in computerized manner. And up to date order given by the customer through online web status will be shown with help of dynamic web pages by getting data from database. EXISTING SYSTEM In existing system every thing is manual like customer will go to shop manually and he/she selects items which are available in shop and the marchant will calculate the bill for products selected by the customer and then shipping process will take place. Existing System is manual, every thing we have to do manually displaying items Selecting items Billing process Shipping Problems in present system Could not synchronize the Outward information to shopping order details. No track of the complaints and replaced goods after ordering Order status is updated manually using Order Confirmation. Very high levels of effort for preparing invoices and dispatch related documents and routing them to relevant departments or locations and high levels of clerical activity on account of applicability of different customers and products. Increased levels of expectation from customers with respect to prompt delivery of items. Inability to accurately judge changing patterns of fast and slow moving items on account of large volumes of data, and inability to track goods in transit. Difficulties in handling customer queries pertaining to consignments in-transit and partial dispatches. Important orders not discriminated from others since all orders since all orders were processed on a FIFO basis-hence need to be able to prioritize and process orders on a preferential basis (for high value orders or important customers), if required. Increase in frequency of goods returned on account of damage leading to high stock levels of damaged goods in the factory. Discrepancy between ordered and invoiced quantities on account of either partial availability of stocks or clerical oversights. Insufficient checks in the current system for ensuring customer credit limits are not exceeded. Sales data not analyzed properly to streamline production volumes. This is primarily on account of varying sales patterns across the year and high volumes of transaction. Customers could communicate to the Sales people but no information is kept in track for future references. Marchant or Management couldnt not have any information regarding latest sales reports unless requested and taken it for Spreadsheet applications. Marchant or Management requires the Quality information updates against the complaints and quality measures and metrics, which the current system couldnt provide such facilities. The end user of this product is a departmental store where the application is hosted on the web and administrator maintains database.This application which is deployed at the departmental store will automate the following process. the customer details are appended to the customer database. The details of the items are brought forward from the database for customers view based on the selection through the menu. Database of all the products are products are updated at the end of the each transaction. 1. MODULE Marchant Module Marchant will enter into the next form by entering username,password in this login page,after entering into next page marchant will add new products, categories, different different items what are all the items available in that store,and if he wants he will modify the things,he will delete things And maintains everything by date wise. Enhancing stores update stores delete from stores Software and Hardware Requirements The following software and hardware are recommended for the company. Hardware Requirements: Processor : Pentium Speed : 233 MHz Monitor : samtron HardDisk : 4.2 GB RAM : 128 MB Software Requirements: Operating : SystemWindows NT Language : JAVA (JSP, JDBC).JDK 1.4 Backend : ORACLE 2.0 SYSTEM SPECIFICATION 2.1 Introduction 2.4 Advantages of the Proposed System Inter-Department Communication using Intranet Mailing Services (emails)Tracking the mails received from the customers as complaints and using them for appraisal and audit purpose purposes. Customized and adhoc reports for the MIS for decision-making. Order indent-automation from the direct sales dept. Shop Inventory Database updates. Stock in shop information Communication with the customers regarding the orders and complaints and tracking them for the future purposes. Application Portfolio It is recommended that the organization takes up the following four functional areas for automation Marchant department customer department Stores department Billing, shipping Information System The reasons for selecting the above are that firstly they directly address the problems enumerated. Secondly, together they forma cohesive set of well-integrated application with one system acting as the feeder system for the other. System Architecture DATA FLOW DIAGRAMS: A data flow diagram is a logical model of a system. The model does not depend on hardware, software and data structures of the organization. There is no physical implication in a data flow diagram. Because the diagram is a graphic picture of the logical system, it tends to be easy for every non-technical user to understand and thus serves as an excellent communication tool. Finally a data flow diagram is a good starting point for system design. To construct a data flow diagram it uses four basic symbols. They are given below. Rectangle: The above symbol is used to define source or destination of data. Circle or Rounded Corners Rectangle: The above symbols are defined to represent a process that transforms or modifies the data. 3.21 INTRODUCTION UML is a notation that resulted from the unification Of Object Modeling Technique and Object Oriented Software Technology .UML has been designed for broad range of application. Hence, it provides constructs for a broad range of systems and activities. An Overview of UML in five notations 1. use case diagrams Use cases are used during requirements elicitation and analysis To represent the functionality of the system.Use cases focus on the behaviour of the system from the external point of view.The actor are Outside the boundary of the system,whereas the use cases are inside the boundary of the system. 2. class diagrams Class diagrams to describe the structure of the system. Classes Are abstraction that specify the common structure and behaviour of a set Of objects. Class diagrams describe the system in terms of objects, classes, attributes, operations and their associations. 3. Sequence diagrams Sequence diagrams are used to formalize the behaviour of the system and to visualize the communication among objects. They are useful for identifying additional objects that participate in the use cases. A Sequence diagram represents the interaction that take place among these objects. 4. Statechart diagrams State chart diagrams describe the behaviour of an individual object as a number of states and transitions between these states. A state represents a particular set of values for an object. The sequence diagram focuses on the messages exchanged between objects, the state chart diagrams focuses on the transition between states. 5.Activity diagrams An activity diagram describes a system in terms of activities. Activities are states that represents the execution of a set of operations. Activity diagrams are similar to flowchart diagram and data flow. Screens of online shopping 3. REQUIREMENTS SPECIFICATION PURPOSE The purpose of â€Å"Online Shopping† is to evaluate the performance of the various products, maintain stock details, product details, and customer details of â€Å"very big shops†. SCOPE This document is meant for the use of the organization and also will be the basis for clarifications. Alterations will not be made without the permission of the organization. PRODUCT FUNCTIONS OVERVIEW Online Shopping is mainly designed for the big shops to automate the maintenance of stock, maintaining customer details, manipulating product details and maintaining the payment details. It also promotes in monitoring the marketing strategy to be implemented depending on the performance of the various products. 3.1 Requirements In system analysis the developer interacts with the customer/client and works with him in order to find out what he specifically needs. Later he sees the past system, which is in use, and tries to find out what is lacking in that system. This examination of past system is not mandatory. That helps the developer to dig in the problem of the client or the customer. System Analysis is the study of gathering and interpreting facts, diagnosing problems, and using the recommended improvements to the system. Analysis specifies what the system should do whereas design states how to accomplish the objective. System Analysis is comprised of following things. Identify the customers need. Feasibility study. Analyzing the system technically and economically. Resource allocation. Cost Estimations and Work schedule preparation. Defining the system, which forms the base of the following activities. The success of a system depends largely on how accurately a problem is defined, thoroughly investigated and properly carried out through the choice of solution. User need identification and analysis are concerned with the user needs rather than what the customer wants. This step is intended to help the user and the analyst understand the real problem rather than its symptoms. This package has been developed in order to overcome the difficulties encountered while using the manual system. Faster and timely generation of reports is another motivating factor for the development of this package. The following requirements are identified. 3.1.1 Functional Requirements Customer Order Processing New order (Order no auto generated). View Products in category Status. Log User Complaints. Order Search and Processing Status. Internal Mail. Merchants Inventory Processing Category wise prod Details. Department Orders. Internal Mails. Management Information System Processing Adhoc Report. Internal Mails. Inter office Memos. 3.1.2 User Interfaces: A LOGIN form is presented with three fields to be entered. When the Login button is pressed, based on the empid, department values in the login form, database the respective form gets displayed. After that the user can perform the required activities. 3.2.2 Analysis Objects 1. Interface Objects: The interface object (also known as Boundary Object) is responsible for controlling access to the Enterprise Java Beans tier from any client. This includes other server-side components, such as Servlets and Jsp pages.An excellent example of interface object is the controller servlets for the web applications MVC architecture. 2. Control Objects: Control objects provide services to the application. They model functionality that is not naturally associated with a particular entity or interface. Often, this is because more than one entity needs to be operated on at one time; an example might be determining if there is sufficient inventory to manufacture a product. Other times, it may be because a relevant entity was not identified in the model; an example might be charging someones credit card. 3. Entity Objects: Entity objects model those business objects that should maintain their state after the use case completes. Typically, this means that they represent data from the database. Some examples are Customer, product, and an order. Entity objects should be represented by entity beans in the implementation model. The Entity Objects: Customer Invoice Order Stock Product 3.3 INPUTS The following inputs are collected for proposed system during the requirements specification from the Industries. 1. Goods Inward Note (GIN) The factory receives this document from the factory along with the finished goods. It consists of the details of items received .The warehouse in charge is supposed to physically verify the stock received against this document. Discrepancies are to be noted on the GIN and send back to the factory. It is use to enter details into the Goods inward register. It is also used to update stock book on weekly basis. 2. Goods received Confirmation On receiving the goods the customer is supposed to send a letter or telephonically in form the receipt of the consignment. Having got this information, the relevant invoice from the in transit file is to be removed and destroyed is fixed format for this document. 3. Goods Returned Note This is prepared based on the information send by the direct customer or dealer on goods that have been damaged in transit. It contains the details of the damaged goods. A copy of this is sent to the order-processing department, anther copy to the quality control department and third is field in the GRN file. The GRN details are entered into the damaged goods ledger. 4. Order Company receives order from their direct customer and detailers. The dealers fill in the details on Flowells order form itself. The orders from the direct customers are transcribed on the regular format. Orders can be sent by one warehouse to another. They are used for checking the availability of the stock. They are serialized and then filled. In is used to check the availability of the required stock in stock book and the goods inward register. The order could be serviced completely, partially or pending as the case may be. 3.5 Outputs The following outputs are collected for proposed system during the requirements specification from the Shops. 1. Invoice Once an order (either direct customer order or the dealer order) gets serviced partially or fully, an invoice for the same needs to be prepared. Most of the details are picked up from the order itself .An order may have multiple invoices. The discount for special customers is worked out. The rate is got form the product rate file. A copy of the invoice is sent to the direct customer, dealer, in-transit file, invoice file. The invoice details are entered into the issue register. Once supplementary gets service partially or fully nil valued supplementary invoice for the same needs to be prepared. Most of the details are picked up from the supplementary order itself. A copy of the supplementary invoice is sent to the direct customer, dealer, in-tansit file, and supplementary invoice file. The supplementary invoice details are entered into the issue register. 2. Dispatch Instructions The invoice department picks up dispatch instructions for the invoices that are prepared from the order form. This they send to the dispatch department. They prepare a packing slip. This is a regular report being prepared, consisting of order that are pending as of a particular date. The details for this report are taken from the pending orders. 3. Weekly Stock Status Report This is another weekly report prepared giving the details of the stock of each product. The details are obtained from the stock book. This report is prepared on adhoc basis. Whenever the actual stock is compared with book stock, and discrepancies found, they are entered product wise in this report. 4. DESIGN SPECIFICATION 4.1 DATA DESIGN Data objects A data object is a thing about which you want to store information. It has independent existence and can be uniquely identified. The following data objects are derived for the system. Customer Order Product Invoice category Relationships A relationship is a named association between agent and customer entity or more than entities we say that relationship exists between clerk and customer entity type. Similarly a relation between a clerk entity type and a manager entity type. The following relationships are identified for the system. For instance let us take the objects CUSTOMER, CATEGORY,PRODUCT, ORDER ,BILL the following relationships are identified. Customer â€Å"places† an Order. Order â€Å"contains† Product. Product â€Å"dispatched to† Customer. The relationships between the remaining entities are as follows : Customer â€Å"receives† Invoice. Invoice â€Å"has† Product. E-R Diagram E-R Diagram as a method to represent a Data model and was developed by Chen (1976). The main focus of a Data Model is to identify the required data and show it diagrammatically, which is called Entity Relationship Diagram. Its popularly is attributed to its simplicity. It has a top-down design approach to decide the minimum data that we would like to store for a given information system. 4.2 Screens ONLINE SHOPPING SCREENS TESTING It is a process of establishing confidence that a program or system does what it is proposed of. Testing is the only way to assure the quality of software and it is an umbrella activity rather than a separate phase. This is an activity to be performed in parallel with the software effort and one that consists of its own phases of analysis, design, implementation, execution and maintenance. 5.1 Testing strategy 5.1.1 Unit Testing: This testing method considers a module as single unit and checks the unit at interfaces and communicates with other modules rather than getting into details at statement level. Here the module will be treated as a black box, which will take some inputs and generate output. Outputs for a given set of input combination are pre-calculated and are generated by the module. 5.1.2 Integration testing: Here all the pre-tested individual modules will be assembled to create the larger system and tests are carried out at system level to make sure that all modules are working in synchronous with each other. This testing methodology helps in making sure that all modules which are running perfectly when checked individually and are also running cohesion with other modules. For this testing we create test cases to check all modules once and then generated test combinations of test paths through out the system to make sure that no path is making its way into chaos. 5.1.3 Validation testing: Testing is a major quality control measure employed during software development. Its basic function is to detect errors. Sub functions when combined may not produce than it is desired. Global data structures can represent the problems. Integrated testing is a systematic technique for constructing the program structure while conducting the tests. To uncover errors that are associated with interfacing the objective is to make test modules and built a program structure that has been detected by design. In a non-incremental integration all the modules are combined in advance and the program is tested as a whole. Here errors will appear in an endless loop function. In incremental testing the program is constructed and tested in small segments where the errors are isolated and corrected. Different incremental integration strategies are top-down integration, bottom-up integration, regression testing. 5.1.4 High-order testing (a.k.a. System Testing) Modules are integrated by moving downwards through the control hierarchy beginning with main program. The subordinate modules are incorporated into structure in either a Breadth First manner or in a Depth First manner. This process is done in five steps: Main control module is used as a test driver and steps are submitted are all modules directly to main program. Depending on the integration approach selected subordinate is replaced at a time with actual modules. Tests are conducted. On completion of each set of tests another stub is replaced with the real module. Regression testing may be conducted to ensure that new errors have not been introduced. This process continues from step 2 until entire program structure is reached. In top down integration strategy decision making occurs at upper levels in the hierarchy and is encountered first. If major control problems do exists early recognitions is essential. If Depth First integration is selected a complete function of the software may be implemented and demonstrated. Some problems occur when processing at low levels in hierarchy is required to adequately test upper level steps to replace low-level modules at the beginning of the top-down testing. So no data flows upwards in the program structure. BOTTOM-UP INTEGRATION TESTING Begins construction and testing with automatic modules. As modules are integrated from the bottom-up, processing requirement for modules subordinate to a given level is always available and need for stubs is eliminated. The following steps implement this strategy: Low-level modules are combined in to clusters that perform a specific software sub function. A driver is written to coordinate test case input and output. Cluster is tested. Drivers are removed and moving upward in program structure combines clusters. Integration moves upward, the need for separate test drovers lesions. If the top-levels of the program are integrated top-down, the number of drivers can be reduced substantially and integration of clusters is greatly simplified. REGRESSION TESTING Each time a new module is added as a part of integration as the software changes. Regression testing is an actually that helps to ensure changes that do not introduce unintended behavior as additional errors. Regression testing may be conducted manually by executing a subset of all test cases and results for subsequent playback tools enables the software engineer to capture the test case and results for subsequent playback and compression. The regression suit contains different classes of test cases. 6. CONFIGURATION 7. FEATURES USED 7.1 About J2EE (Javaâ„ ¢ 2 Platform Enterprise Edition, v1.3) Today, more and more developers want to write distributed transactional applications for the enterprise and leverage the speed, security, and reliability of server-side technology. If you are already working in this area, you know that in todays fast-moving and demanding world of e-commerce and information technology, enterprise applications have to be designed, built, and produced for less money, with greater speed, and with fewer resources than ever before. To reduce costs and fast-track enterprise application design and development, the Javaâ„ ¢2 Platform, Enterprise Edition (J2EEâ„ ¢) technology provides a component-based approach to the design, development, assembly, and deployment of enterprise applications. The J2EE platform offers a multitiered distributed application model, the ability to reuse components, integrated Extensible Markup Language (XML)-based data interchange, a unified security model, and flexible transaction control. Not only can you deliver innovative customer solutions to market faster than ever, but your platform-independent J2EE component-based solutions are not tied to the products and application programming interfaces (APIs) of any one vendor. Vendors and customers enjoy the freedom to choose the products and components that best meet their business and technological requirements. Distributed Multitier Applications The J2EE platform uses a multitier distributed application model for both enterprise applications. Application logic is divided into components according to function, and the various application components that make up a J2EE application are installed on different machines depending on the tier in the multitier J2EE environment to which the application component belongs. The following Figure shows two multitier J2EE applications divided into the tiers described in the following list. The J2EE application parts shown in the Figure are presented in J2EE Components. Client-tier components run on the client machine. Web-tier components run on the J2EE server. Business-tier components run on the J2EE server. Enterprise information system (EIS)-tier software runs on the EIS server. Although a J2EE application can consist of the three or four tiers shown in Figure, J2EE multitiered applications are generally considered to be threetiered applications because they are distributed over three different locations: client machines, the J2EE server machine, and the database or legacy machines at the back end. Three-tiered applications that run in this way extend the standard two-tiered client and server model by placing a multithreaded application server between the client application and back-end storage. J2EE Architecture The required relationships of architectural elements of the J2EE platform are shown in Figure. Note that this figure shows the logical relationships of the elements; it is not meant to imply a physical partitioning of the elements into separate machines, processes, address spaces, or virtual machines.The Containers, denoted by the separate rectangles,are J2EE runtime environments that provide required services to the application components represented in the upper half of the rectangle. The services provided are denoted by the boxes in the lower half of the rectangle. For example, the Application Client Container provides Java Messaging Service (JMS) APIs to Application Clients, as well as the other services represented. All these services are explained below. The arrows represent required access to other parts of the J2EE platform. The Application Client Container provides Application Clients with direct access to the J2EE required Database through the Java API for connectivity with database systems, the JDBCTM API. Similar access to databases is provided to JSP pages and servlets by the Web Container, and to enterprise beans by the EJB Container. As indicated the APIs of the JavaTM 2 Platform, Standard Edition (J2SETM), are supported by J2SE runtime environments for each type of application component. J2EE Architecture Diagram J2EE Components J2EE applications are made up of components. A J2EE component is a self-contained functional software unit that is assembled into a J2EE application with its related classes and files and that communicates with other components. The J2EE specification defines the following J2EE components: Application clients and applets are components that run on the client. Java Servlet and JavaServer Pagesâ„ ¢ (JSPâ„ ¢) technology components are Web components that run on the server. Enterprise JavaBeansâ„ ¢ (EJBâ„ ¢) components (enterprise beans) are business Components that run on the server. J2EE components are written in the Java programming language and are compiled in the same way as any program in the language. The difference between J2EE components and â€Å"standard† Java classes is that J2EE components are assembled into a J2EE application, verified to be well formed and in compliance with the J2EE specification, and deployed to production, where they are run and managed by the J2EE server. J2EE Clients A J2EE client can be a Web client or an application client. Web Clients A Web client consists of two parts: dynamic Web pages containing various types of markup language (HTML, XML, and so on), which are generated by Web components running in the Web tier, and a Web browser, which renders the pages received from the server. A Web client is sometimes called a thin client. Thin clients usually do not do things like query databases, execute complex business rules, or connect to legacy applications. When you use a thin client, heavyweight operations like these are off-loaded to enterprise beans executing on the J2EE server where they can leverage the security, speed, services, and reliability of J2EE server-side technologies. Applets A Web page received from the Web tier can include an embedded applet. An applet is a small client application written in the Java programming language that executes in the Java virtual machine installed in the Web browser. However, client systems will likely need the Java Plug-in and possibly a security policy file in order for the applet to successfully execute in the Web browser. Web components are the preferred API for creating a Web client program because no plug-ins or security policy files are needed on the client systems. Also, Web components enable cleaner and more modular application design because they provide a way to separate applications programming from Web page design. Personnel involved in Web page design thus do not need to understand Java programming language syntax to do their jobs. Application Clients A J2EE application client runs on a client machine and provides a way for users to handle tasks that require a richer user interface than can be provided by a markup language. It typically has a graphical user interface (GUI) created from Swing or Abstract Window Toolkit (AWT) APIs, but a command-line interface is certainly possible. Application clients directly access enterprise beans running in the Automation Process in Online Shopping Automation Process in Online Shopping 1. INTRODUCTION Online Shopping 1.1 About The Project This project is developed for the automation process of shopping throw online i.e through web. In marchant module adding the catogories,products,itemSales, giving orders, stock maintenace, creating invoice (bill) for orders, shipping of items order given by customer. creation, details, and other transactions like automatic increment,decrement of stock, paid invoice(amount),shipping invoice And all other transactions for large scale whole sale or retail sales, very big shops, or organizations. This project mainly contains 3 modules like Marchant module, Customer module, and invoice module. In customer module customers will give orders for items which are being available in that shop. In our project that order is processed and details are stored in data base. In invoice module total bill for ordered items will be created. In case if the ordered items are not being shipped at a time then the pending order details will be processed and the bill for the pending order will be created. In Marchant Module products are being maintained in category wise and product wise, item wise and up to date stock will be maintained in computerized manner. And up to date order given by the customer through online web status will be shown with help of dynamic web pages by getting data from database. EXISTING SYSTEM In existing system every thing is manual like customer will go to shop manually and he/she selects items which are available in shop and the marchant will calculate the bill for products selected by the customer and then shipping process will take place. Existing System is manual, every thing we have to do manually displaying items Selecting items Billing process Shipping Problems in present system Could not synchronize the Outward information to shopping order details. No track of the complaints and replaced goods after ordering Order status is updated manually using Order Confirmation. Very high levels of effort for preparing invoices and dispatch related documents and routing them to relevant departments or locations and high levels of clerical activity on account of applicability of different customers and products. Increased levels of expectation from customers with respect to prompt delivery of items. Inability to accurately judge changing patterns of fast and slow moving items on account of large volumes of data, and inability to track goods in transit. Difficulties in handling customer queries pertaining to consignments in-transit and partial dispatches. Important orders not discriminated from others since all orders since all orders were processed on a FIFO basis-hence need to be able to prioritize and process orders on a preferential basis (for high value orders or important customers), if required. Increase in frequency of goods returned on account of damage leading to high stock levels of damaged goods in the factory. Discrepancy between ordered and invoiced quantities on account of either partial availability of stocks or clerical oversights. Insufficient checks in the current system for ensuring customer credit limits are not exceeded. Sales data not analyzed properly to streamline production volumes. This is primarily on account of varying sales patterns across the year and high volumes of transaction. Customers could communicate to the Sales people but no information is kept in track for future references. Marchant or Management couldnt not have any information regarding latest sales reports unless requested and taken it for Spreadsheet applications. Marchant or Management requires the Quality information updates against the complaints and quality measures and metrics, which the current system couldnt provide such facilities. The end user of this product is a departmental store where the application is hosted on the web and administrator maintains database.This application which is deployed at the departmental store will automate the following process. the customer details are appended to the customer database. The details of the items are brought forward from the database for customers view based on the selection through the menu. Database of all the products are products are updated at the end of the each transaction. 1. MODULE Marchant Module Marchant will enter into the next form by entering username,password in this login page,after entering into next page marchant will add new products, categories, different different items what are all the items available in that store,and if he wants he will modify the things,he will delete things And maintains everything by date wise. Enhancing stores update stores delete from stores Software and Hardware Requirements The following software and hardware are recommended for the company. Hardware Requirements: Processor : Pentium Speed : 233 MHz Monitor : samtron HardDisk : 4.2 GB RAM : 128 MB Software Requirements: Operating : SystemWindows NT Language : JAVA (JSP, JDBC).JDK 1.4 Backend : ORACLE 2.0 SYSTEM SPECIFICATION 2.1 Introduction 2.4 Advantages of the Proposed System Inter-Department Communication using Intranet Mailing Services (emails)Tracking the mails received from the customers as complaints and using them for appraisal and audit purpose purposes. Customized and adhoc reports for the MIS for decision-making. Order indent-automation from the direct sales dept. Shop Inventory Database updates. Stock in shop information Communication with the customers regarding the orders and complaints and tracking them for the future purposes. Application Portfolio It is recommended that the organization takes up the following four functional areas for automation Marchant department customer department Stores department Billing, shipping Information System The reasons for selecting the above are that firstly they directly address the problems enumerated. Secondly, together they forma cohesive set of well-integrated application with one system acting as the feeder system for the other. System Architecture DATA FLOW DIAGRAMS: A data flow diagram is a logical model of a system. The model does not depend on hardware, software and data structures of the organization. There is no physical implication in a data flow diagram. Because the diagram is a graphic picture of the logical system, it tends to be easy for every non-technical user to understand and thus serves as an excellent communication tool. Finally a data flow diagram is a good starting point for system design. To construct a data flow diagram it uses four basic symbols. They are given below. Rectangle: The above symbol is used to define source or destination of data. Circle or Rounded Corners Rectangle: The above symbols are defined to represent a process that transforms or modifies the data. 3.21 INTRODUCTION UML is a notation that resulted from the unification Of Object Modeling Technique and Object Oriented Software Technology .UML has been designed for broad range of application. Hence, it provides constructs for a broad range of systems and activities. An Overview of UML in five notations 1. use case diagrams Use cases are used during requirements elicitation and analysis To represent the functionality of the system.Use cases focus on the behaviour of the system from the external point of view.The actor are Outside the boundary of the system,whereas the use cases are inside the boundary of the system. 2. class diagrams Class diagrams to describe the structure of the system. Classes Are abstraction that specify the common structure and behaviour of a set Of objects. Class diagrams describe the system in terms of objects, classes, attributes, operations and their associations. 3. Sequence diagrams Sequence diagrams are used to formalize the behaviour of the system and to visualize the communication among objects. They are useful for identifying additional objects that participate in the use cases. A Sequence diagram represents the interaction that take place among these objects. 4. Statechart diagrams State chart diagrams describe the behaviour of an individual object as a number of states and transitions between these states. A state represents a particular set of values for an object. The sequence diagram focuses on the messages exchanged between objects, the state chart diagrams focuses on the transition between states. 5.Activity diagrams An activity diagram describes a system in terms of activities. Activities are states that represents the execution of a set of operations. Activity diagrams are similar to flowchart diagram and data flow. Screens of online shopping 3. REQUIREMENTS SPECIFICATION PURPOSE The purpose of â€Å"Online Shopping† is to evaluate the performance of the various products, maintain stock details, product details, and customer details of â€Å"very big shops†. SCOPE This document is meant for the use of the organization and also will be the basis for clarifications. Alterations will not be made without the permission of the organization. PRODUCT FUNCTIONS OVERVIEW Online Shopping is mainly designed for the big shops to automate the maintenance of stock, maintaining customer details, manipulating product details and maintaining the payment details. It also promotes in monitoring the marketing strategy to be implemented depending on the performance of the various products. 3.1 Requirements In system analysis the developer interacts with the customer/client and works with him in order to find out what he specifically needs. Later he sees the past system, which is in use, and tries to find out what is lacking in that system. This examination of past system is not mandatory. That helps the developer to dig in the problem of the client or the customer. System Analysis is the study of gathering and interpreting facts, diagnosing problems, and using the recommended improvements to the system. Analysis specifies what the system should do whereas design states how to accomplish the objective. System Analysis is comprised of following things. Identify the customers need. Feasibility study. Analyzing the system technically and economically. Resource allocation. Cost Estimations and Work schedule preparation. Defining the system, which forms the base of the following activities. The success of a system depends largely on how accurately a problem is defined, thoroughly investigated and properly carried out through the choice of solution. User need identification and analysis are concerned with the user needs rather than what the customer wants. This step is intended to help the user and the analyst understand the real problem rather than its symptoms. This package has been developed in order to overcome the difficulties encountered while using the manual system. Faster and timely generation of reports is another motivating factor for the development of this package. The following requirements are identified. 3.1.1 Functional Requirements Customer Order Processing New order (Order no auto generated). View Products in category Status. Log User Complaints. Order Search and Processing Status. Internal Mail. Merchants Inventory Processing Category wise prod Details. Department Orders. Internal Mails. Management Information System Processing Adhoc Report. Internal Mails. Inter office Memos. 3.1.2 User Interfaces: A LOGIN form is presented with three fields to be entered. When the Login button is pressed, based on the empid, department values in the login form, database the respective form gets displayed. After that the user can perform the required activities. 3.2.2 Analysis Objects 1. Interface Objects: The interface object (also known as Boundary Object) is responsible for controlling access to the Enterprise Java Beans tier from any client. This includes other server-side components, such as Servlets and Jsp pages.An excellent example of interface object is the controller servlets for the web applications MVC architecture. 2. Control Objects: Control objects provide services to the application. They model functionality that is not naturally associated with a particular entity or interface. Often, this is because more than one entity needs to be operated on at one time; an example might be determining if there is sufficient inventory to manufacture a product. Other times, it may be because a relevant entity was not identified in the model; an example might be charging someones credit card. 3. Entity Objects: Entity objects model those business objects that should maintain their state after the use case completes. Typically, this means that they represent data from the database. Some examples are Customer, product, and an order. Entity objects should be represented by entity beans in the implementation model. The Entity Objects: Customer Invoice Order Stock Product 3.3 INPUTS The following inputs are collected for proposed system during the requirements specification from the Industries. 1. Goods Inward Note (GIN) The factory receives this document from the factory along with the finished goods. It consists of the details of items received .The warehouse in charge is supposed to physically verify the stock received against this document. Discrepancies are to be noted on the GIN and send back to the factory. It is use to enter details into the Goods inward register. It is also used to update stock book on weekly basis. 2. Goods received Confirmation On receiving the goods the customer is supposed to send a letter or telephonically in form the receipt of the consignment. Having got this information, the relevant invoice from the in transit file is to be removed and destroyed is fixed format for this document. 3. Goods Returned Note This is prepared based on the information send by the direct customer or dealer on goods that have been damaged in transit. It contains the details of the damaged goods. A copy of this is sent to the order-processing department, anther copy to the quality control department and third is field in the GRN file. The GRN details are entered into the damaged goods ledger. 4. Order Company receives order from their direct customer and detailers. The dealers fill in the details on Flowells order form itself. The orders from the direct customers are transcribed on the regular format. Orders can be sent by one warehouse to another. They are used for checking the availability of the stock. They are serialized and then filled. In is used to check the availability of the required stock in stock book and the goods inward register. The order could be serviced completely, partially or pending as the case may be. 3.5 Outputs The following outputs are collected for proposed system during the requirements specification from the Shops. 1. Invoice Once an order (either direct customer order or the dealer order) gets serviced partially or fully, an invoice for the same needs to be prepared. Most of the details are picked up from the order itself .An order may have multiple invoices. The discount for special customers is worked out. The rate is got form the product rate file. A copy of the invoice is sent to the direct customer, dealer, in-transit file, invoice file. The invoice details are entered into the issue register. Once supplementary gets service partially or fully nil valued supplementary invoice for the same needs to be prepared. Most of the details are picked up from the supplementary order itself. A copy of the supplementary invoice is sent to the direct customer, dealer, in-tansit file, and supplementary invoice file. The supplementary invoice details are entered into the issue register. 2. Dispatch Instructions The invoice department picks up dispatch instructions for the invoices that are prepared from the order form. This they send to the dispatch department. They prepare a packing slip. This is a regular report being prepared, consisting of order that are pending as of a particular date. The details for this report are taken from the pending orders. 3. Weekly Stock Status Report This is another weekly report prepared giving the details of the stock of each product. The details are obtained from the stock book. This report is prepared on adhoc basis. Whenever the actual stock is compared with book stock, and discrepancies found, they are entered product wise in this report. 4. DESIGN SPECIFICATION 4.1 DATA DESIGN Data objects A data object is a thing about which you want to store information. It has independent existence and can be uniquely identified. The following data objects are derived for the system. Customer Order Product Invoice category Relationships A relationship is a named association between agent and customer entity or more than entities we say that relationship exists between clerk and customer entity type. Similarly a relation between a clerk entity type and a manager entity type. The following relationships are identified for the system. For instance let us take the objects CUSTOMER, CATEGORY,PRODUCT, ORDER ,BILL the following relationships are identified. Customer â€Å"places† an Order. Order â€Å"contains† Product. Product â€Å"dispatched to† Customer. The relationships between the remaining entities are as follows : Customer â€Å"receives† Invoice. Invoice â€Å"has† Product. E-R Diagram E-R Diagram as a method to represent a Data model and was developed by Chen (1976). The main focus of a Data Model is to identify the required data and show it diagrammatically, which is called Entity Relationship Diagram. Its popularly is attributed to its simplicity. It has a top-down design approach to decide the minimum data that we would like to store for a given information system. 4.2 Screens ONLINE SHOPPING SCREENS TESTING It is a process of establishing confidence that a program or system does what it is proposed of. Testing is the only way to assure the quality of software and it is an umbrella activity rather than a separate phase. This is an activity to be performed in parallel with the software effort and one that consists of its own phases of analysis, design, implementation, execution and maintenance. 5.1 Testing strategy 5.1.1 Unit Testing: This testing method considers a module as single unit and checks the unit at interfaces and communicates with other modules rather than getting into details at statement level. Here the module will be treated as a black box, which will take some inputs and generate output. Outputs for a given set of input combination are pre-calculated and are generated by the module. 5.1.2 Integration testing: Here all the pre-tested individual modules will be assembled to create the larger system and tests are carried out at system level to make sure that all modules are working in synchronous with each other. This testing methodology helps in making sure that all modules which are running perfectly when checked individually and are also running cohesion with other modules. For this testing we create test cases to check all modules once and then generated test combinations of test paths through out the system to make sure that no path is making its way into chaos. 5.1.3 Validation testing: Testing is a major quality control measure employed during software development. Its basic function is to detect errors. Sub functions when combined may not produce than it is desired. Global data structures can represent the problems. Integrated testing is a systematic technique for constructing the program structure while conducting the tests. To uncover errors that are associated with interfacing the objective is to make test modules and built a program structure that has been detected by design. In a non-incremental integration all the modules are combined in advance and the program is tested as a whole. Here errors will appear in an endless loop function. In incremental testing the program is constructed and tested in small segments where the errors are isolated and corrected. Different incremental integration strategies are top-down integration, bottom-up integration, regression testing. 5.1.4 High-order testing (a.k.a. System Testing) Modules are integrated by moving downwards through the control hierarchy beginning with main program. The subordinate modules are incorporated into structure in either a Breadth First manner or in a Depth First manner. This process is done in five steps: Main control module is used as a test driver and steps are submitted are all modules directly to main program. Depending on the integration approach selected subordinate is replaced at a time with actual modules. Tests are conducted. On completion of each set of tests another stub is replaced with the real module. Regression testing may be conducted to ensure that new errors have not been introduced. This process continues from step 2 until entire program structure is reached. In top down integration strategy decision making occurs at upper levels in the hierarchy and is encountered first. If major control problems do exists early recognitions is essential. If Depth First integration is selected a complete function of the software may be implemented and demonstrated. Some problems occur when processing at low levels in hierarchy is required to adequately test upper level steps to replace low-level modules at the beginning of the top-down testing. So no data flows upwards in the program structure. BOTTOM-UP INTEGRATION TESTING Begins construction and testing with automatic modules. As modules are integrated from the bottom-up, processing requirement for modules subordinate to a given level is always available and need for stubs is eliminated. The following steps implement this strategy: Low-level modules are combined in to clusters that perform a specific software sub function. A driver is written to coordinate test case input and output. Cluster is tested. Drivers are removed and moving upward in program structure combines clusters. Integration moves upward, the need for separate test drovers lesions. If the top-levels of the program are integrated top-down, the number of drivers can be reduced substantially and integration of clusters is greatly simplified. REGRESSION TESTING Each time a new module is added as a part of integration as the software changes. Regression testing is an actually that helps to ensure changes that do not introduce unintended behavior as additional errors. Regression testing may be conducted manually by executing a subset of all test cases and results for subsequent playback tools enables the software engineer to capture the test case and results for subsequent playback and compression. The regression suit contains different classes of test cases. 6. CONFIGURATION 7. FEATURES USED 7.1 About J2EE (Javaâ„ ¢ 2 Platform Enterprise Edition, v1.3) Today, more and more developers want to write distributed transactional applications for the enterprise and leverage the speed, security, and reliability of server-side technology. If you are already working in this area, you know that in todays fast-moving and demanding world of e-commerce and information technology, enterprise applications have to be designed, built, and produced for less money, with greater speed, and with fewer resources than ever before. To reduce costs and fast-track enterprise application design and development, the Javaâ„ ¢2 Platform, Enterprise Edition (J2EEâ„ ¢) technology provides a component-based approach to the design, development, assembly, and deployment of enterprise applications. The J2EE platform offers a multitiered distributed application model, the ability to reuse components, integrated Extensible Markup Language (XML)-based data interchange, a unified security model, and flexible transaction control. Not only can you deliver innovative customer solutions to market faster than ever, but your platform-independent J2EE component-based solutions are not tied to the products and application programming interfaces (APIs) of any one vendor. Vendors and customers enjoy the freedom to choose the products and components that best meet their business and technological requirements. Distributed Multitier Applications The J2EE platform uses a multitier distributed application model for both enterprise applications. Application logic is divided into components according to function, and the various application components that make up a J2EE application are installed on different machines depending on the tier in the multitier J2EE environment to which the application component belongs. The following Figure shows two multitier J2EE applications divided into the tiers described in the following list. The J2EE application parts shown in the Figure are presented in J2EE Components. Client-tier components run on the client machine. Web-tier components run on the J2EE server. Business-tier components run on the J2EE server. Enterprise information system (EIS)-tier software runs on the EIS server. Although a J2EE application can consist of the three or four tiers shown in Figure, J2EE multitiered applications are generally considered to be threetiered applications because they are distributed over three different locations: client machines, the J2EE server machine, and the database or legacy machines at the back end. Three-tiered applications that run in this way extend the standard two-tiered client and server model by placing a multithreaded application server between the client application and back-end storage. J2EE Architecture The required relationships of architectural elements of the J2EE platform are shown in Figure. Note that this figure shows the logical relationships of the elements; it is not meant to imply a physical partitioning of the elements into separate machines, processes, address spaces, or virtual machines.The Containers, denoted by the separate rectangles,are J2EE runtime environments that provide required services to the application components represented in the upper half of the rectangle. The services provided are denoted by the boxes in the lower half of the rectangle. For example, the Application Client Container provides Java Messaging Service (JMS) APIs to Application Clients, as well as the other services represented. All these services are explained below. The arrows represent required access to other parts of the J2EE platform. The Application Client Container provides Application Clients with direct access to the J2EE required Database through the Java API for connectivity with database systems, the JDBCTM API. Similar access to databases is provided to JSP pages and servlets by the Web Container, and to enterprise beans by the EJB Container. As indicated the APIs of the JavaTM 2 Platform, Standard Edition (J2SETM), are supported by J2SE runtime environments for each type of application component. J2EE Architecture Diagram J2EE Components J2EE applications are made up of components. A J2EE component is a self-contained functional software unit that is assembled into a J2EE application with its related classes and files and that communicates with other components. The J2EE specification defines the following J2EE components: Application clients and applets are components that run on the client. Java Servlet and JavaServer Pagesâ„ ¢ (JSPâ„ ¢) technology components are Web components that run on the server. Enterprise JavaBeansâ„ ¢ (EJBâ„ ¢) components (enterprise beans) are business Components that run on the server. J2EE components are written in the Java programming language and are compiled in the same way as any program in the language. The difference between J2EE components and â€Å"standard† Java classes is that J2EE components are assembled into a J2EE application, verified to be well formed and in compliance with the J2EE specification, and deployed to production, where they are run and managed by the J2EE server. J2EE Clients A J2EE client can be a Web client or an application client. Web Clients A Web client consists of two parts: dynamic Web pages containing various types of markup language (HTML, XML, and so on), which are generated by Web components running in the Web tier, and a Web browser, which renders the pages received from the server. A Web client is sometimes called a thin client. Thin clients usually do not do things like query databases, execute complex business rules, or connect to legacy applications. When you use a thin client, heavyweight operations like these are off-loaded to enterprise beans executing on the J2EE server where they can leverage the security, speed, services, and reliability of J2EE server-side technologies. Applets A Web page received from the Web tier can include an embedded applet. An applet is a small client application written in the Java programming language that executes in the Java virtual machine installed in the Web browser. However, client systems will likely need the Java Plug-in and possibly a security policy file in order for the applet to successfully execute in the Web browser. Web components are the preferred API for creating a Web client program because no plug-ins or security policy files are needed on the client systems. Also, Web components enable cleaner and more modular application design because they provide a way to separate applications programming from Web page design. Personnel involved in Web page design thus do not need to understand Java programming language syntax to do their jobs. Application Clients A J2EE application client runs on a client machine and provides a way for users to handle tasks that require a richer user interface than can be provided by a markup language. It typically has a graphical user interface (GUI) created from Swing or Abstract Window Toolkit (AWT) APIs, but a command-line interface is certainly possible. Application clients directly access enterprise beans running in the

Friday, January 17, 2020

Legal Drama Movies

Erin Brokovich is a true story of an unemployed single mother of the title name who is desperate to find a job in order to support her three young children. Without any real skills and work experience, borderline inappropriate wardrobe, but armed with charm, wit and beauty, she manages to accomplish what she needs. She finds an unlikely job as a file clerk in a law firm without any qualifications.She talks herself into a job as a compensation for the loss of her personal injury case handled by the owner of the small California firm, Ed Masry. Doing her work, she comes across a file regarding a suspicious real estate case against Pacific Gas and Electric Company (PG&E). Fueled by curiosity and passion, she does her own investigation and learned the particulars of the case. She persuades her boss to allow her to research the case further.She fervently pursues the case and discovers the systemic cover-up and that the company is trying to quietly buy the land that was contaminated by hex avalent chromium, a deadly toxic waste that the company is irresponsibly, improperly and illegally dumping in the area thereby poisoning the residents in the town of Hinkley giving them serious health problems. The pursuit of the case against PG&E seemed beyond the capabilities of the small law firm Erin works for, but her infectious passion and established bond with the victims propelled her and her boss to follow through.The case proved very challenging to both Erin and her boss as she finds little time to take care of her children and her boss has to carry the burden of the legal costs. In the end, Erin’s emotional connection with the victims and their families, her dedication and perseverance helped in winning one of the biggest class action lawsuits against a multi-billion dollar company in American history. 12 Angry Men (1957) 12 Angry Men is a story about twelve white, mostly middle-aged and generally of middle-class status men who were chosen jurors to determine the f ate of a Latino teenager who was accused of stabbing his father to death.The movie shows what happens in the deliberation of the jurors behind the closed doors of the jury room. The hot, summer day in New York adds to the tense setting and the irritability of the jury. It shows that jurors are influenced by their personal experiences, situations and biases. They are to decide about the life and death of another human being but the gravity of the situation only becomes apparent when one of the jurors cause a holdout, voting not guilty while everyone is eager for a verdict. The film points to the flaws of the justice system.One of which is having a disinterested appointed court defendant whose meager efforts could very well personally strap the defendant to the electric chair. The importance of reasonable doubt is also highlighted as some tend to take it lightly ignoring the fact that they are making a life and death decision. It also portrays how the unreliability of witnesses and ci rcumstantial evidence can give rise to reasonable doubt. Through the deliberation, the back stories of the jurors were revealed explaining their prejudices and predispositions that lead to disagreements and squabbles among the jurors because of their personal differences.The discussion continued with the built up tension among the jurors but because they carried on, other jurors changed their vote in light of the arguments. The votes kept changing as they made the effort to dissect the case until the tally is reversed to an eleven to one in favor of not guilty from the swift and unscrutinized decision of eleven to one for a guilty verdict during the first vote. The lone juror for the guilty verdict sees that he is the only one with that vote and changed his vote, leading to a unanimous verdict for an acquittal. Civil Action (1998)Based on the real-life water contamination case in Woburn, Massachusetts, Civil Action is about Jan Schlichtmann, a money-driven personal injury lawyer pla yed by John Travolta and the case that changed his life. He pursues an environmental case thinking it would earn him millions of dollars and enhance his and his firm’s reputation. The case was against the two major conglomerates Beatrice Foods and W. R. Grace & Co. as they were suspected of pollution crimes. The drinking wells supplying water to the town were found to be contaminated by industrial solvents caused by the companies’ local factories.There was a high rate of leukemia that led to the deaths of some of the children in the town as a direct result of the pollution and the families, represented by Schlichtmann, filed a class action lawsuit. It was a great challenge in Schlichtmann’s career as the case was against someone with resources enough to impede the case. Later, he finds out that more than the case, a lot more is at stake. He pursues the case against the industrial giants at a great personal and professional expense. A judge rules against him thus not achieving his goal of earning millions and worse, setting his firm back because of the magnitude of the case.He becomes deeply invested in the case and his original goal of monetary gain takes a back seat to pride and stubbornness. He declines some settlement offers deciding that he must win at all cost. After all these, the case is dismissed in favor of one of the defendants and he is forced to accept a settlement from the other defendant that was barely enough for him to break even with his expenses. Because of what transpired, his partners decided to break up the firm and no longer practice with him. On his own, he comes up with an idea to win a settlement for the families while his life remains a mess.He later ends up alone and files for bankruptcy. The Insider (1999) The Insider is a true story of tobacco executive Jeffrey Wigand, played by Russell Crowe, and 60 Minutes producer Lowell Bergman, played by Al Pacino. Their lives converge when Bergman wanted to produce an exp ose against the tobacco industry and Wigand has the inside information that made him perfect for the interview. Wigand is a terminated employee from a tobacco firm, Brown and Williamson, who knew that the CEOs of the seven major tobacco companies perjured themselves to the US Congress about their knowledge of nicotine's addictiveness.He says that Brown and Williamson manipulated nicotine so that it could be more rapidly absorbed in the lungs, thus affecting the brain and central nervous system through impact boosting and that they consciously ignored public health in favor of profit. The interview became a source of grief and personal problems for both Wigand and Bergman. Bergman suggested court deposition to Wigand to protect himself from his former employer’s counterattack on the interview especially with his signed confidentiality agreement.Soon his problems begin with restraining orders and death threats to prevent him from testifying, as well as character assassination t o discredit him and his statements. Bergman on the other hand battles with censorship and with constant fights with the management, he was ordered to go on vacation. After all the turmoil, the Wall Street Journal clears Wigand’s name, reveals his deposition and condemns his employer’s smear campaign against him. The New York Times releases an article about the scandal in 60 Minutes, wherein Wigand’s full interview was finally broadcasted.The movie ends with the title cards showing the $246 billion settlement the tobacco companies made with Mississippi and other states to reimburse Medicaid funds used to treat people with smoking-related illnesses: a result of Wigand’s interview. Runaway Jury (2003) Runaway Jury, based on John Grisham’s novel The Runaway Jury, is a movie about circumventing justice through manipulation of the jury. The story revolves on the case filed by Celeste Wood who sues a gun company who manufactured the gun that killed her hu sband. Representing her is an idealistic lawyer named Wendell Rohr played by Dustin Hoffman.On the defense’s side is jury selection expert Rankin Fitch, played by Gene Hackman, who unlike Rohr, is ruthless and willing to bend the rules to get the results he wants. The conflict intensifies when Nick Easter, played by John Cusack becomes part of the jury who has the same ability to sway and manipulate the other jurors like Fitch. He is helped by his girlfriend Marlee, played by Rachel Weisz in the efforts to outsmart Fitch. With Nick and Marlee’s access to the jurors and their influence on them, they have the power to manipulate the verdict to whichever they wish.They offered to sell this influence for a hefty price to both Rohr and Fitch. As the trial progresses and both the plaintiff and defense become desperate, the two opposing parties agreed to Nick and Marlee’s terms but bothered by his conscience, Rohr backs out. Fitch deposits the millions to Nick and Marl ee’s account only to regret it when the twist of the movie is revealed. Fitch had worked on the case about the death of Marlee’s sister in a school shooting years ago. The town sued the company that manufactured the gun that killed Marlee’s sister but lost and went bankrupt.Nick and Marlee particularly picked the Celeste Wood case to exact their revenge on Fitch. They used the money Fitch deposited as a leverage to force him to retire as the IRS would be interested with the amount of the transfer. As for the money, Nick and Marlee plan to give it to the town that went bankrupt after losing the case with the gun company. Wall Street (1987) Wall Street is a film about the seedy underbelly of the world of stock market as some stockbrokers resort to bending the rules and breaking the law with insider information to get ahead.Bud Fox, played by Charlie Sheen, is a discontented mediocre stockbroker eager to get to the top like Gordon Gekko, played by Michael Douglas. Gekko, whose philosophy in life is â€Å"Greed is Good,† is ruthless, devoid of ethics, and would do anything to earn his millions — a polar opposite to Bud’s father Carl, played by Martin Sheen. Fox, desperate to be mentored by Gekko, tries to impress him and inadvertently reveals insider information about his father’s company Bluestar Airlines. Gekko becomes interested and takes Fox under his wing.Gekko shows Fox the fast and the good life of a successful and rich stockbroker but in exchange for more information about Bluestar. Fox suggests to buy Bluestar and to expand the company’s assets. Even with Carl’s dislike of Gekko, he was convinced by his son to use his influence in the company’s union to push the deal forward. Gekko, however, had a different plan and sells Bluestar’s assets leaving Carl and the other employees of the airline unemployed. Wracked by guilt, Fox finds a way to ruin Gekko’s plans.He manages to a lter Bluestar’s stock value and as Gekko realizes that his stock is plummeting, decides to relinquish his remaining interest in the company. Fox feels triumphant but not for long because Gekko learned his involvement in the scheme and had him arrested by the Securities and Exchange Commission. Towards the end of the film, a heated confrontation ensues between Fox and Gekko, which was Fox’s ploy to record Gekko’s confession of his crimes. Fox hands over the recordings to federal authorities helping them build a case against Gekko, which would help lighten Fox’s sentence.Their fates are left unambiguous but the film delivers a message that crime does not pay and greed is indeed not good. The Firm (1993) The Firm, based on a John Grisham novel, is about a young lawyer’s budding career and the troubles that he encounters when he associates with the wrong people in pursuit of early success. Mitch McDeer, played by Tom Cruise, is one of the top graduates of his class in Harvard Law School despite his poor economic status. He receives many offers from different firms but coming from an unprivileged upbringing, he was enticed by the most lucrative offer from Bendini, Lambert, & Locke law firm in Memphis.Everything is great until the reason for the too-good-to-be-true offer gets revealed. Mitch learns that no one in BL&L ever quits and those who do end up dead shortly after. The firm also takes a very keen interest in its employees’ personal lives. Things become suspicious and he later learns about the firm’s strong ties to the Mafia and that the firm was being used to launder money for organized crime. With the FBI’s interest on the case, they contact Mitch and coerce him into cooperating with their investigation of the firm.The firm suspects of Mitch’s knowledge on their illegal activities and soon, Mitch is blackmailed from both sides and is torn between doing the right thing and his personal and profess ional wellbeing. Doubting the FBI, Mitch gets the help of those he trusts to collect the necessary evidence against the firm at great personal risk, even coming face to face with the mob boss. With their resourcefulness despite the great difficulties of acquiring the important client files and documents, they gathered what they needed and Mitch provides the FBI enough evidence to indict the firm.In the end, everyone gets what they deserve and everything is resolved. Mitch gets a modest job in a small but promising law firm in Boston. Fracture (2007) Fracture is a film about a talented structural engineer Ted Crawford, played by Anthony Hopkins, who manages to escape justice with his skill in finding the fracture or flaw in arguments. He however is hindered by an equally intelligent prosecutor Willy Beachum, played by Ryan Gosling. Ted carefully plans the murder of his unfaithful wife. He executes it but his wife manages to survive but is dependent on life support.Ted confesses to th e crime but retracts it and demands to represent himself in the trial, relying on his skills of spotting the weakness in structures, in this case, the prosecutor’s arguments. Willy, who has a young and successful career and in transition to a more lucrative corporate position, takes Ted’s case thinking it would be an easy victory only to be humiliated by someone untrained for litigation. It was discovered that Ted’s gun acquired at the crime scene was not the gun used to shoot his wife. Baffled and lacking further evidence, the prosecution lost and Ted was acquitted.Engrossed by the case and his career in disarray, Willy visits the only eye witness, Ted’s wife, who Ted later orders to be pulled from life support. With his efforts, Willy uncovers that Ted and the arresting officer’s guns were identical. Ted learns that the police officer was his wife’s lover, switches out the guns and shoots his wife. The officer arrived at his house, surpris ed to see his lover’s predicament, became distracted and Ted was able to switch back the guns. Ted’s gun was admitted into evidence and the officer unknowingly takes the murder weapon.Willy confronts Ted with this new evidence and thinking he is protected by the double jeopardy clause, Ted confesses. Willy reveals that because he took his wife off life support, they can now try him for murder and double jeopardy does not apply as he was previously tried for attempted murder. Ted was arrested and a new trial begins, this time with Ted defended by actual lawyers. Michael Clayton (2007) Michael Clayton, played by George Clooney, is a story about a man who makes a living by cleaning up other people’s messes.He is a former District Attorney who uses his contacts to get the clients of his high-priced law firm out of trouble. Other than his ethically dubious job, he is also troubled by his personal problems of a failed marriage and gambling debt and later finds the add ition of threat to his very life when he encounters the new problem his firm will send him to fix. One of the firm’s partners Arthur Edens, played by Tom Wilkinson, had an outburst in the middle of a deposition involving an agricultural products conglomerate U-North and Michael is sent to remedy the situation.U-North’s general counsel Karen Crowder, played by Tilda Swinton, learns that Edens have evidence about the company’s involvement in manufacturing a cancer-causing product. Learning that Edens is not likely to cooperate, she orders to permanently incapacitate him in a way that will look like a suicide. Michael is saddened by Edens’ death and later becomes suspicious about its connection with U-North. He was able to sneak in to Edens’ apartment and learns about the U-North documents.This puts his life in danger as two men are tailing him informing Crowder of the situation. They later detonate a remote bomb in Michael’s car which luckily exploded when he was out of the vehicle. Later, Michael waits for Crowder to finish a U-North board meeting. He tells her that he is in possession of Edens’ U-North evidence, he knows about her involvement in Edens’ death and that he will keep his silence for a hefty price. When she agrees, he reveals that their conversation is being monitored.He walks away and Crowder and the chairman of U-North get arrested by the police. The Star Chamber (1983) The Star Chamber is a film about the flaws in the judicial system and the boundaries that some people are willing to cross in order to take justice into their own hands to address these flaws. Judge Stephen Hardin, played by Michael Douglas, is a California judge frustrated about being forced to set free suspects that are obviously guilty based on technicalities in paperwork and processing of evidence.He reaches his breaking point when two men accused of raping and killing a ten-year-old boy had to walk free because of the sm all detail in dates of paperwork processing. This is when his friend Judge Ben Caufield, played by Hal Holbrook, introduces him to the secret organization of radical magistrates called the Star Chamber. These judges take the law into their own hands by identifying and assassinating guilty criminals who got away with their crimes. The two men in Hardin’s case become the next target of the Star Chamber.A predicament arises when a detective shows Hardin conclusive evidence that someone else raped and killed the boy. He then appeals the case to the group but it was too late. An assassin has already been ordered and cannot be called off. Also, the group justified that what they do is still for society’s greater good and that those two men are guilty of other crimes, if not for the murder of the boy. Hardin goes on a quest to ironically save the two men he wanted killed. He warns them but they do not believe him, especially because he finds out about the other illegal things that they are involved in.Hardin was attacked by the two men but the Star Chamber’s assassin kills them before they kill him. However, the assassin was also there to kill Hardin since the group ordered his murder as well. In the nick of time, the detective comes to his rescue and he survives. The Star Chamber continues with their work without Hardin, who is merely outside in a car with the detective, recording their meeting. Reference All Media Guide LLC. (n. d). All Movie Guide. Retrieved April 21, 2009, from http://www. starpulse. com/

Thursday, January 9, 2020

Teen Pregnancy Problems and Prevention Strategies

Teen Pregnancy problems and prevention strategies While many people are inclined to express indifference regarding this concept, teen pregnancy is one of the most controversial topics in the contemporary society. This experience can be devastating for some individuals, as the fact that they are raw makes it difficult for them to effectively deal with the problem. Society becomes more stressing and most teens who become pregnant come to express feelings related to shame and fear. The fact that these individuals are hesitant about letting their parents know that they are pregnant contributes to their problems and finding help sometimes becomes an impossible mission. Lack of life experience materializes into a more severe type of stress, endangering both the mother and the child. It is generally accepted that the majority of teen births are a result of accidental pregnancies. Even with the fact that this subject received much attention in the recent years, it is very difficult for society to understand what influences some teenagers in taking an important step in such matters. The environment that an individual lives in is apparently essential when considering the strategy that the respective person is going to employ with the purpose of resolving the problem. Embarrassment is typically one of the first sentiments that a teenager undergoes when she is pregnant. Such an individual is probable to acknowledge her condition and consider that it would be pointless for her toShow MoreRelatedTeenage Moms That Are Still In High School Get Pregnant1391 Words   |  6 Pagesare still in high school get pregnant at a young age, and are not able to support themselves or their child. There were just under a quarter million pregnancies in women ages fifteen to nineteen in 2014. About eighty-five percent of these pregnancies are unplanned, which in any population can increase the risk for problems. The biggest risk for teen mothers is delaying prenatal care or worse, about seven percent received no care at all. According to CDC, In 2014, almost 250,000 babies were bornRead MoreResearch on Teen Pregnancy in Los Angeles County1223 Words   |  5 PagesTeen Pregnancy in Los Angeles There is presently much controversy regarding teen pregnancy, considering that many countries in the developed world experience a rise in adolescent pregnancies in spite of the fact that effective programs are installed in these areas. Teen pregnancy has been a major issue in Los Angeles in the recent years, but the fact that state authorities have been actively involved in combating the problem has generated positive results. It is probable that the struggle for abstinenceRead MoreTeen Pregnancy : Teenage Pregnancy1404 Words   |  6 PagesLauryn Jones Block 5 4/27/16 What is Teen Pregnancy? Teenage pregnancy is pregnancy in human females under the age of 20. A girl can become pregnant from sexual intercourse after she has begun to ovulate which can be before her first menstrual period, but usually occurs after the onset of her periods. In well-nourished girls, menarche usually takes place around the age of 12 or 13. Most teenage girls don t plan to get pregnant, but many do. Teen pregnancies carry extra health risks to both the motherRead MoreThe Problem with Teenage Childbearing in the United States1039 Words   |  4 Pagesserious social problem in the United States. The rates of teen parenting are at is lowest, but the numbers still remain an issue. Teen parenting has been associated with negative outcomes for the parents and their children. Many teenage parents and their families are unaware of the disparities when becoming a teen parent. With outcomes of teen childbearing being identified, teen pregnancy prevention needs to be further ad dressed. Addressing teen pregnancy and methods of prevention will help strengthenRead MoreControlling the Issue of Teen Pregnancy635 Words   |  3 PagesTeen pregnancy is a problem that is plaguing the U.S., as well as other countries. This social problem affects teens of every ethnic and economic background. Before we discuss what some organizations are doing to help, let’s look at some of statistics surrounding teen pregnancy. Even though this is a serious problem, the good news is that teen birth rates in the United States have dropped almost continuously since the early 1990s — including a six percent drop from 2011 to 2012 — further decreasingRead MoreEssay about The Underlying Causes of Teen Pregnancy1363 Words   |  6 Pages Before successfully preventing teen pregnancies among teenage girls, there are many underlying causes and facts about the dilemma that must be first exposed. Children from homes run by teenage mothers have to face almost insurmoun table obstacles in life. The incidents of depression and mental health problems, the lack of father figures, and the high rate of poverty often connected to children in homes run by teenage mothers put them at serious disadvantages when compared to children raised in nuclearRead MoreTeen Pregnancy Essay1667 Words   |  7 PagesTeenage pregnancy has long been acknowledged as an important health, social and economic problem in the United States, one that creates hardships for women and families and threatens the health and well-being of women and their infants. Unintended pregnancies span across age, race and religion, with a specific negative impact among the teenage population. According to the Center for Disease Control (CDC, 2016) In 2015, a total of 229,715 babies were born to women aged 15–19 years, for a birth rateRead MoreEssay on Is Teen Pregnancy a Problem?1044 Words   |  5 PagesHow many pregnant teens have there been? Over the years more girls are becoming teen moms. In Oklahoma teen pregnancy has become a problem. Recently Oklahoma has had a pregnancy rate of 47.5% (Tulsa World). Not only is it an issue in Oklahoma but an issue in the United States as a whole. The lack of awareness and how to prevent pregnancy is a reason to blame for the increasing numbers. The more we don’t make people aware of the increasing teen pregnancy rate and how to prevent then the numbers willRead MoreUnwanted and Unplanned Teen Pregnancy and Sexually Transmitted Illness1544 Words   |  7 PagesUnwanted and Unplanned Teen Pregnancy and Sexually Transmitted Illness (STI) Teen Pregnancy The birth rate among teens in the United States has declined 9% from 2009 to 2010, a historic low among all racial and ethnic groups, with the least being born in 2010; and in 2011 the number of babies born to adolescents aged 15-19 years of age was 329,797 (â€Å"Birth Rates for U.S.†, 2012). Although the decline in unwanted and unplanned teen births is on the rise the United States continues to be among theRead MoreEssay About Teen Pregnancy1347 Words   |  6 Pages21 November 2017 Teen Pregnancy There is a big problem that is going on in the United States and it is teen pregnancy. The United States have the highest teen birth rates than any other western industrialized nations. Teen pregnancy does not only affect the teen and the baby, it affects everyone around them including their family and the society around them. There are solutions to teen pregnancy that does not only include the teen and their family, it includes the community. Teens need to know the

Wednesday, January 1, 2020

How to Use the French Preposition Dans

The French preposition dans usually means in, but,  depending on the context, it also has other English equivalents, such as from, through, on, during and off. Dans cannot be followed directly by a noun but rather must be followed by an article or some other determiner. It can indicate a physical location, a figurative location and time. Dans is also required after certain French verbs  that  take  an  indirect object. Physical Location   Ã‚  Ã‚  dans la boà ®te   in the box  Ã‚  Ã‚  dans la rue   in the street  Ã‚  Ã‚  boire dans une tasse   to drink from a cup  Ã‚  Ã‚  prendre quelque chose dans une boà ®te  Ã‚  to take something from a box  Ã‚  Ã‚  copier quelque chose dans un livre   to copy something from a book  Ã‚  Ã‚  dans lavion   on the plane  Ã‚  Ã‚  mettre quelque chose dans le tiroir   to put something in the drawer  Ã‚  Ã‚  monter dans le train   to get on the train  Ã‚  Ã‚  voir quelquun dans lescalier   to see someone on the stairs Figurative Location   Ã‚  Ã‚  dans la situation actuelle   in the current situation  Ã‚  Ã‚  dans ces conditions in / under these conditions Period of  Time   Ã‚  Ã‚  dans la journà ©e during the day  Ã‚  Ã‚  dans la semaine during the week  Ã‚  Ã‚  dans une semaine in one week Verbs with Dans The French preposition  dans  is required after certain French verbs that take an  indirect object. boire qqchose dans  (une tasse) to drink something out of (a cup)chercher  dans  (la boà ®te)  Ã‚  to look in (the box)courir dans  (lherbe)  Ã‚  to run through (the grass)coà »ter dans  (les dix euros)  Ã‚  to cost about (10 euros)entrer dans  (une salle, un bà ¢timent)  Ã‚  to enter (a room, building)fouiller dans  (les poches)  Ã‚  to look through (the pockets)lire dans  (le journal)  Ã‚  to read in (the paper)manger dans la main à   qqun  Ã‚  to eat out of ones handmanger dans lassiette  Ã‚  to eat off a platemettre  son espoir dans  Ã‚  to pin ones hopes onpartir  dans  (10 minutes)  Ã‚  to leave in (10 minutes)partir dans  (les montagnes)  Ã‚  to leave for (the mountains)pleuvoir dans  (la France)  Ã‚  to rain in (France)prendre quelque chose dans  (une boà ®te, un tiroir)  Ã‚  to take something from (a box, drawer)regarder dans  (la boà ®te, le frigo)  Ã‚  to look in (the box, the fridge)vivre dans  (la misà ¨ re, la peur)  Ã‚  to live in (poverty, fear)