Tuesday, December 31, 2019

Biography of Sarah Good Salem Witch Trial Victim

Sarah Good is most known for being among the first to be executed in the 1692 Salem witch trials; her newborn died during her confinement and her 4- or 5-year-old daughter, Dorcas, was also among the accused and imprisoned. Sarah Good Facts Age at time of Salem witch trials: about 31Birth: Exact date unknownDeath: July 19, 1692Also known as: Sarah Goode, Goody Good, Sary Good, Sarah Solart, Sarah Poole, Sarah Solart Good Before the Salem Witch Trials Sarahs father was John Solart, an innkeeper who committed suicide in 1672 by drowning himself. His estate was divided among his widow and children, but his daughters shares were to be in his widows control until the daughters were of age. When Sarahs mother remarried, Sarahs stepfather had control of Sarahs inheritance. Sarahs first husband was Daniel Poole, a former indentured servant. When he died in 1682, Sarah remarried, this time to William Good, a weaver. Sarahs stepfather testified later that he gave Sarah and William her inheritance in 1686; Sarah and William sold the property to settle debts that year; they were held responsible for the debts Daniel Poole had left. Homeless and destitute, the Good family relied on charity for housing and food and begged for food and work. When Sarah begged among her neighbors, she sometimes cursed those who did not respond; these curses were to be used against her in 1692. Sarah Good and the Salem Witch Trials On February 25, 1692, Sarah Good—along with Tituba and Sarah Osborne—was named by Abigail Williams and Elizabeth Parris as causing their strange fits and convulsions. A warrant was filed on February 29 by Thomas Putnam, Edward Putnam, and Thomas Preston of Salem Village against Sarah Good. She was accused of injuring Elizabeth Parris, Abigail Williams, Ann Putnam Jr. and Elizabeth Hubbard over two months time. The warrant was signed by John Hathorne and Jonathan Corwin. The constable was George Locker. The warrant demanded that Sarah Good appear at the house of Lt Nathaniell Ingersalls in Salem Village by the next day at ten. In the examination, Joseph Hutchison was also mentioned as a complainant. Brought to the hearing on March 1 by Constable George Locker, Sarah was examined that day by John Hathorne and Jonathan Corwin. She maintained her innocence. Ezekiel Cheevers was the clerk who recorded the examination. The accusing girls responded to her presence physically (they were all tormented according to the transcript), including more fits. One of the afflicted girls accused Sarah Goods specter of stabbing her with a knife. She produced a broken knife. But a man among the spectators said that it was his broken knife he had thrown away the day before within sight of the girls. Tituba confessed to being a witch, and implicated Sarah Good and Sarah Osborne, saying they had forced her to sign the devils book. Good declared that Tituba and Sarah Osborne were the true witches, and continued to assert her own innocence. An examination showed no witchs marks on any of the three. Sarah Good was sent to Ipswich to be confined by a local constable who was her relative, where she escaped briefly and then voluntarily returned. Elizabeth Hubbard reported that during that time, Sarah Goods specter had visited her and tormented her. Sarah was taken to Ipswich jail, and by March 3 was in Salems jail with Sarah Osborne and Tituba. All three were questioned again by Corwin and Hathorne. On March 5, William Allen, John Hughes, William Good, and Samuel Braybrook testified against Sarah Good, Sarah Osborne, and Tituba. William testified to a mole on his wifes back, which was interpreted as a witchs mark.  On March 11, Sarah Good was again examined. Sarah Good and Tituba were ordered to be sent to the Boston jail on March 24.  Dorcas Good, Sarahs 4- or 5-year-old daughter, was arrested on March 24, on complaints that she had bitten Mary Walcott and Ann Putnam Jr. Dorcas was examined by John Hathorne and Jonathan Corwin on March 24, 25, and 26. Her confession implicated her mother as a witch. She identified a small bite, likely from a flea, on her finger as being caused by a snake her mother had given her.   Sarah Good was examined again in court on March 29, maintaining her innocence, and the girls again were in fits. When she was asked who, if not her, had hurt the girls, she accused Sarah Osborne. In jail, Sarah Good gave birth to Mercy Good, but the baby did not survive. The conditions at the jail and the lack of food for mother and child likely contributed to the death. In June, with the Court of Oyer and Terminer charged with disposing of the cases of accused witches, Sarah Good was indicted and tried. One indictment lists witnesses Sarah Vibber (Bibber) and John Vibber (Bibber), Abigail Williams, Elizabeth Hubbard, and Ann Putnam Jr. A second indictment lists Elizabeth Hubbard, Ann Putnam (Jr.?), Mary Walcott, and Abigail Williams. A third lists Ann Putnam (Jr.?), Elizabeth Hubbard, and Abigail Williams. Johanna Childin, Susannah Sheldon, Samuel and Mary Abbey, Sarah and Thomas Gadge, Joseph and Mary Herrick, Henry Herrick, Jonathan Batchelor, William Batten, and William Shaw all gave testimony against Sarah Good. Her own husband, William Good, testified that he had seen the devils mark on her. On June 29, Sarah Good—along with Elizabeth How, Susannah Martin, and Sarah Wildes—was tried and convicted by the jury. Rebecca Nurse was found not guilty by the jury; spectators hearing the verdict protested loudly and the court asked the jury to reconsider the evidence, and Rebecca Nurse was convicted on that second attempt. All five were thus condemned to hanging. On July 19, 1692, Sarah Good was hanged near Gallows Hill in Salem. Also hanged that day were Elizabeth How, Susannah Martin, Rebecca Nurse, and Sarah Wildes who had also been condemned in June. At her  execution, when urged by Salems Rev. Nicholas Noyes to confess, Sarah Good responded with the words I am no more a witch than you are a wizard, and if you take away my life, God will give you blood to drink. Her statement was remembered widely when he collapsed and died later of a brain hemorrhage. After the Trials In September of 1710, William Good petitioned for compensation for his wifes execution and his daughters imprisonment. He blamed the trials for the destruction of my poor family and described the situation with their daughter, Dorcas, this way: a child of 4 or 5 years old was in prison 7 or 8 months and being chaind in the dungeon was so hardly used and terrifyed that she hath ever since been very chargeable haveing little or no reason to govern herself. Sarah Good was among those named by the Massachusetts Legislature in a 1711 act restoring all rights to those who had been convicted of witchcraft in 1692. William Good received one of the largest settlements for his wife and his daughter. Sarah Good in The Crucible In Arthur Millers drama, The Crucible, Sarah Good is an easy target of the early accusations, as she is a homeless woman who behaves strangely.

Monday, December 23, 2019

Forensic Anthropology An Examination Of Human Skeletal...

Physical Forensic Anthropology ForensicOrensic anthropology is the examination of human skeletal remains for law enforcement agencies to determine the identity of unidentified bones. That is the definition of forensic anthropology. This paper will discuss the study of forensic anthropology: the education needed, how to study the remains, and work activities. To become a forensic anthropologist you have to reach many education requirements. If you want to be a very successful forensic anthropologist, you have to have a master’s degree and a bachelor’s degree. You will have to know how to read dental records and learn about ethnobotany. In order to be a forensic anthropologist, you will have to know everything about osteology;. tThat is one of the very important teachings. You will also have to know about chemistry, anatomy, archaeology and genetics. The last two education requirements are a type of anthropology;, physical anthropology, and cultural anthropology. There are also undergraduates. They stu dy the occupation and they have to be educated in osteology also. To get an internship to help the forensic anthropologist you have to be very academic (Forensic Anthropologist). You might have to travel to a college that you do not want to go to because there are not very many colleges that have this major. When the forensic anthropologist is called to work, he/she will be recovering human remains. They find out how they died, how long ago they died, and who diedShow MoreRelatedAnthropology : Anthropology And Anthropology1550 Words   |  7 Pagesimagined the endless careers that are available to anthropology majors, before taking Professor Sharratt’s Intro to Anthropology course. The things that I have learned in anthropology have opened my mind to a variety of different career paths that is possible with a degree in anthropology. Anthropology majors go off to a plethora of careers with their degrees in anthropology. Anthropology is â€Å"the study of humankind in all ti mes and place†. Anthropology has four different subfields which include: Physical/BiologicalRead More_x000C_Introduction to Statistics and Data Analysis355457 Words   |  1422 Pagessources. Most examples and exercises in the book are of this nature; they cover a very wide range of disciplines and subject areas. These include, but are not limited to, health and ï ¬ tness, consumer research, psychology and aging, environmental research, law and criminal justice, and entertainment. A Focus on Interpretation and Communication Most chapters include a section titled â€Å"Interpreting and Communicating the Results of Statistical Analyses.† These sections include advice on how to best communicate

Sunday, December 15, 2019

Sample of Document Free Essays

Entity:| Vietcombank| | Period ended:| 31/12/2012| Significant class of transactions/significant disclosure process name:| Credit origination – Transaction processing| | Significant class of transactions/ significant disclosure process owner:| Credit Policty at HODebt management division Client Division | | We obtain an understanding of the significant classes of transactions (SCOTs) and significant disclosure processes to identify and understand the risks of material misstatement at the assertion level (i. e. , what can go wrongs (WCGWs)) and, when applicable, to identify and understand the controls over the WCGWs. We will write a custom essay sample on Sample of Document or any similar topic only for you Order Now This template assists with completing S03 Understand significant classes of transactions and significant disclosure processes. Significant accounts affected and key business and financial statement risks related to these accounts: * Loan Acc * Interest Acc * Provision Acc * Expense Acc * Receivable Acc| Relevant assertions: * Valuation * Completeness * Right and Obligation * Presentation and Disclosure * Existence | Nature of the SCOT (routine, non-routine, estimation): * Routine| Starting point (initiation) and timing of initiation and recording of the SCOT or significant disclosure process: * Customer’s application| Specific circumstances affecting the form and extent of the documentation: * None| Name of the IT application that supports the SCOT * | Inputs/outputs of the critical path of significant class of transactions/significant disclosure process| Inputs/outputs of the supporting IT application| Inputs: * | Inputs: * | Outputs: * | Outputs: * | Critical path (initiating, recording, processing, reporting, correcting incorrect information) We obtain an understanding of the SCOTs and the significant disclosure processes by obtaining an understanding of their critical path. The critical path includes: * Initiation: the point where the transaction first enters the entity’s process and is prepared and submitted for recording * Recording: the point where the transaction is first recorded in the books and records of the entity * Processing: any changes, manipulation or transfers of the data in the books and records of the entity * Reporting: the point where the transaction is reported (i. e. posted) in the general ledger. When we obtain an understanding of the critical path, we obtain an understanding of how incorrectly processed information is detected and corrected on a timely basis. We also obtain an understanding of how transactions are accumulated and posted from the sub ledger to the general ledger, including controls over associated journal entries. We obtain an understanding of the policies and procedures in place that management uses to determine that directives are carried out and applied, including: * Authorization * Segregation of incompatible duties * Safeguarding of assets * Information processing * Performance reviews We use our understanding of the critical path and the policies and procedures to identify WCGWs and, when applicable, relevant controls. In the course of acquiring an understanding of the processing procedures, we frequently learn of many of the controls in use. Thus, while the emphasis at this point is not to identify the presence or absence of controls, we are alert to the possible absence of controls, and to the points at which errors could occur and controls are needed. We consider the effect IT has on the SCOTs and the significant disclosure processes. The manner in which we document our understanding of the SCOT or significant disclosure process is left to professional judgment of the engagement executives. However, for critical paths related to routine transactions, a graphical depiction of the flow (e. g. , flowchart), supported with narrative notes (e. g. , use of this template) normally provides for easier identification of the types of errors that can occur. No. | Describe the critical path for the significant class of transactions/significant disclosure process| Describe the automated aspects of the significant class of transactions/significant disclosure process, including: * Manual aspects that depend upon computer functionality or computer generated data * IT applications/infrastructure| 1 | Credit appraisal and granting proposal 1. 1. Loan application:For both HO and Branches, Credit Dept. s organised into 3 divisions:- Client and Project Investment (optional): responsible for receiving and appraising loan request, monitoring and finalizing/ liquidating the loan. – Debt Management: mainly responsible for storing credit contract and other supporting documents as well as updating required information into system; work with Client Division in monitoring the loan. And two Risk Management division : involved in credit approving process in terms of risk assessment. One is under HO and one is based on Ho Chi Minh CityFirstly, Client/ Project Investment officer receives client’s Loan Application and supporting documents – which are clearly stated in Article 14 – Decision 228/NHNT. HTQT: Lending Regulations1. 2. Loan appraisal: * Secondly, Based on documents obtained and the present credit regulations, Client/ Project Investment officer appraises client’s application under the following aspects: * Suitability (in relation to approved Credit limit, related regulations and current risk management policies of the bank) * Feasibility, efficiency and level of risk (if exist) related to client’s business plan * Solvency * Collaterals: Client officer who receives and appraises loan request also responsible for monitoring and appraising collateral. Deliverable of the officer at this stage is Collateral Appraisal Report (Form BD 1. 1. v002), including signature of client officer-in-charge and Head of Client Division. Regarding valuation, branches except for compulsory circumstances, are encouraged to cooperate with Independent Appraisal Firms (selected within the list of allowable firms, attached with Document 946/VCB. CSTD – Appendix 01). In case collateral is valued by VCB, Valuation Memo (Form 2. 2: Bien Ban Dinh Gia) must be prepared with signature of client and bank representative, under Decision 30/ VCB. CSTD. For collateral of over 20 billion VND, branch must send to HO the appraisal documents by Appraisal firm and Appraisal/ Periodic Revelation Report (Form BD 1. 2. v002), within 2 days since the reports are given their approving authority. | Manual | | * Next, Client/ Project Investment officer prepares and signs Report of Credit appraisal and granting proposal (Bao cao th? m d? h va D? xu? t c? p TD), following Form 1. 4A, 1. 4B and 1. 5. * The Report is then submitted to Head of Client/ Project Investment Division (TP KH) for revising and signing in case the deliverables of Clie nt/ Project Investment officer are accepted. Otherwise, he/she needs to document reasons as well as additional opinions * Credit/ Project Investment officer then prepares submission documents. a) For clients granted Credit limit, Client officer submits to Branch’s Director/ Vice Director or Client Director (GD KH) for HO clients. b) For clients granted Credit limit but required by Credit limit approving authority (C? p th? m quy? n phe duy? ) to seek for higher authority’s approval when granting the loan, Client officer submits to both Branch’s Director/ Vice Director and the authority which is stated in Announcement of Credit limit Approval (Thong bao phe duy? t GHTD). If the higher authority is Local Credit Committee (HDTD co s? ), there is no need to submit to Branch’s Director/ Vice Director. c) For clients not yet granted or beyond Credit limit, Project Investment loan is issued. – Branch-based client: Client/ Project Investment officer submit s to Local Credit Committee’s Director to organise meeting based on its Regulation on Operations. – HO-based client: Client/ Project Investment officer submits to authorised Client Director. For the credit limits beyond authority of Client Director, submission is sent directly to HO’s Credit Risk Management Division for subsequent steps. Submission documents include: * Client’s Loan Request (original) * Report on Credit/ Project investment appraisal and granting proposal (original) * Credit Scoring and Rating Table (original) * Legal documents for new customers * Financial statements * Other relevant documents (if available)| | 2. | Loan approvalBased on Report of Credit appraisal and granting proposal, signed by Client officer and Head of Client Division together with supporting documents, the following parties in accordance with their specific authority will start the approving process:2. 1. Branch’s Director/ Vice Director * In case credit grant ed within Credit limit, Branch’s Director/ Vice Director approves the credit grant based on Report of Credit appraisal and granting proposal signed by Client/ Project Investment officer and Branch’s Director/ Vice Director, as well as accompanying submission documents. In case credit is granted within Credit limit but required by Credit limit approving authority to seek for higher authority’s approval when granting the loan, Client officer submits to both Branch’s Director/ Vice Director and the required authority (If the higher authority is Local Credit Committee (HDTD co s? ), there is no need to submit to Branch’s Director/ Vice Director). 2. 2. Local Credit Committee * Following its Regulations on Organisation and Operations, Local Credit Committee’s Director organises meeting based on submission documents prepared by Client/ Project investment officer. This Committee includes Branch’s director, Vice director and head of Client, I nvestment project and Debt management division. Local Credit Committee approves credit grants which fall within its authority. Otherwise, based on acceptance opinion of Local Credit Committee, submission documents are then sent to Risk Management Division by client officer for subsequent steps. * For branches under the processing range of HCM-based Risk Management Division, Client officer submits set of Loan Proposal documents directly to HO’s Risk Management Division and 1 copy of Loan Proposal Form (Form 3. 2) to HCM-based Division in case of beyond its authority. * Branch’s set of documents include: * The original Request for Loan approval Form 3. 2 (T? trinh d? ngh? phe duy? t tin d? ng/DTDA) signed by Local Credit Committee’s Director. A copy of Local Credit Committee’s Meeting minutes * Submission documents to Local Credit Committee| Manual| | 2. 3. Risk Management Division * Based on set of Loan Proposal documents from the Branch, Risk officer eval uates credit risks and prepare Credit Risk Assessment Report (Bao cao ra soat r? i ro c? p tin d? ng) using Form 2. 3A/2. 3B/2. 4 * The report is then signed by Risk officer before being submitted to at least 2 controllers of Risk Management Division, who later provides their approval plus signature. * Afterwards, Risk officer prepares and signs off every page of Announcement of Credit/ Project Investment Approval( Thong bao phe duy? t c? p tin d? ng/DTDA) Form 4. , before: * submitting to Head of Risk Management Division and Risk Management Director for signature; * sending an original to the proposing Branch; a copy to General Director as well as relevant Branches. 2. 5. HO-based clients/ projects within Client Director’s approving authorityCredit proposals under this case are only considered ‘approved’ when the Report of Credit appraisal and granting proposal is signed and given acceptance opinion by Client Director. Accordingly, Client/ Project investment off icer prepares (Thong bao tac nghi? p) and transfers documents to HO Debt Management Division for storage, system entering and other subsequent steps. 2. 6. Risk Management Director and Client DirectorUnder this circumstance, Risk officer duplicates the steps within the approving authority of Risk Management Director as stated above. The proposal is only considered ‘approved’ when obtaining signature of both, except for either of them is absent. | | | 2. 7. Central Credit Committee * Central Credit Committee bases on Credit Risk Assessment Report (signed by at least 2 controllers of Risk Management Division) and Branch’s document set (original) prepared by Risk officer to call a meeting. * According to Meeting minutes, Risk Management Division prepares and signs off every page of Announcement of Credit/ Project Investment Approval (Form 4. 2) before submitting Director Central Credit Committee for signature. Then submit to: * Client Division at HO an original for subsequent steps * relevant Branches 01 copy * HCM-based Division a copy in case of approving the proposal of branches under its authority. 2. 8. Board of Di rectors * Under this circumstance, after being approved by Central Credit Committee, Risk Management Division prepares submission documents in accordance with Regulation of Loan grants under approving authority of BOD. * Risk Management Division then prepares Approval Announcement and sends documents in such a way as cases under Central Credit Committee’s authority; in which, documents to Debt Management Division must include Loan Approval Form by BOD. | | 3. | Making loan contract and collateral contractBased on approving results, Client officer continues to seek signature for loan and collateral contract. 3. 1. Loan contract/Collateral contract * Client/ Project Investment Division signs off (ky t? t) every page of loan contract/collateral contract and send to client for confirmation. After signing off by Client and Bank ‘s representer, Loan contract was sent to Accounting division and Debt management Division. collateral contract was sent to Storage division * If any disagreement arises, Client/ Project Investment officer must report to Head of Division. If necessary to amend content or approval conditions, Client/ Project Investment Division issues Form 1. 6: Report on Appraising and Proposing Credit Adjustment, submit to authorised bank representatives for approval. After obtaining client’s signature and original of collateral contracts, Client/ Project Investment Division register collateral transactions. * Client/ Project Investment officer prepares 02 (Thong bao tac nghi? p m? HDTD), sign off and submit to Head of Division for signature, before sending to Debt Management Division (relevant documents included) for storage and entering into system. * In case clients do not have CIF yet, Client Division prepares Thong bao tac nghiep mo so CIF (Form 5. 8) then sends to Transaction Accounting dept. to open new CIF. | Manual| 4. | Putting data into system and managing credit file * After signing loan contract, Client officer prepare and sign on â€Å"Thong bao tac nghiep m? h? p d? ng tin d? g† containing all information needed to put into system, conditions to disburse, a list of documents needed to store and special conditions needed to manage the loan. After that, debt management officer recheck and sign on â€Å"Thong bao tac nghiep†. * Basing on â€Å"Thong bao tac nghiep†, Debt Management officer is responsible for putting data into system. However, only when it is approved online by head/vice of debt management Division, will client data be disclosed on system. Debt Management officer stores all the documents listed on â€Å"t hong bao tac nghiep†| IT Dependent| 5. | Disbursement of loanThe disbursement of loan involves the following steps which depend on the appointed approving authority. However, all of the appointed divisions are held responsible for checking the conformity of client’s withdrawal documents with credit contract. 5. 1. Client/ Project Investment DivisionIf withdrawal request is valid, Client officer prepares â€Å"Thong bao tac nghiep du dieu kien rut von† (Form 5. 4), signs off and submits to Division Head for signature before transferring documents to Debt Management officer for disbursement. 5. 2. Debt Management DivisionThe division directly receives withdrawal request from client and perform checking procedures. Client is required to amend information if found unsuitable. Otherwise, Debt Management officer starts disbursing the loan. 5. 3. Client/ Project Investment Division receiving request, Debt Management Division performing checking proceduresWithdrawal documents after being received and checked by Client officer, Debt Management officer takes over for disbursement, based on Credit Approval Announcement and Credit contract. If documents are found invalid, they are sent back to Client Division for completion. 5. 4. Higher authorityClient officer prepares â€Å"Thong bao tac nghiep du dieu kien rut von† (signed by him/her and Head of division). Afterwards, based on credit approval results, Client officer submits the above document and other supporting ones to higher authority. If approved, the documents are transferred to Debt Management for disbursement. The details of disbursement process are briefed as follows: * Debt Management officer opens loan account, fills in CIF, signs off Loan Receipt Note before updating into system for online approval of Division’s Head. * Next, the officer sends: * 01 Loan Receipt Note to client * 01 Loan Receipt Note and supporting documents to relevant departments for disbursement * The last Loan Receipt Note stored in the division. | IT Dependent| 6. | Post-disbursement Monitoring of Loan * At least every 6 months, Client/ Project Investment Division must recheck the loan usage status (usage purpose, collateral status, the balance between assets resulting from the loan and the outstanding balance). This is implemented in accordance with the predetermined plan (monitoring schedule and methodology), which is proposed by Client officer when preparing Report of Credit appraisal and granting proposal or when â€Å"Thong bao tac nghiep† at the latest. * For collateral monitoring, the following aspects must be assured: * Status compared to previous visit * Forecasted revaluations * Client’s conformity in preserving collateral * Proposal to modify collateral management methods (optional) * Proposal to add/ replace collateral (optional) * Debt Management Division is held responsible for reminding Client/ Project Investment Division about loan monitoring schedule. The result must be documented on Loan Monitoring Records (Bien b? n Ki? m tra), which is signed by Borrower’s representative and submitted to Head of Client/ Project Investment Division for revision and comment. * In case Client/ Project Investment Division detects any signals of risk, officer takes the ini tiative to propose the corresponding solution (included in Loan Monitoring Records) before submitting to Head of Division, Director of Client Division (for HO-based clients) or Branch’s Director/ Deputy Director. * After finalizing the Record, officer sends 01 original to Debt Management, 01 copy to Risk Management Division for co-monitoring. | Manual | 7. Credit Adjustment * Depending on the real situation and client’s demand after credit approval, credit adjustment can be made correspondingly. * Procedures of Credit Adjustment are conducted in the same manner as that of Credit Proposal and Approval (only those who are authorised to approve credit are able to approve credit adjustment). Client / investment project officer prepares Report of credit appraisal and credit adjustment- bao cao th? m d? nh va d? xu? t di? u ch? nh tin d? ng. At risk management division prepares Credit risk assessment for adjustment report – Bao cao ra soat r? i ro di? u ch? nh c? p ti n d? ng. * Client/ Project Investment Division prepare Thong bao tac nghi? p di? ch? nh HDTD. | Manual| 8. | Loan and interest collection * At least 10 days before due date, Debt Management officer prints out the list of loans and transfer to Client/ Project Investment Division whose officer prepares a document to inform clients and in charge of pushing clients to pay principal and interest * System automatic calculate interest income for loan group 1 * At the due date of loan, Debt Management officer prints out the report of principle and interest up to due date and checking. Then this report is submitted to Head of Debt management for approving. This report is then transferred to Accounting Division for collecting. If collected in cash, Client has to pay at first at Cash Division. ; after collecting enough and checking, Cash Division. will sign on â€Å"Deposit slip† (Cash receipt) then transfers Cash Receipt Note to Accounting Division for booking entry. * Accountant makes the following entries: * With principal collection:Dr. : Cash/ BankCr. : Loan to Customer * With interest collection:Dr. : Cash/ BankCr. : Interest Income * Accounting voucher printed out and signed by controller and chief accountant. | Application A*N*t Interest = ————- 360*100 A: Outstanding balance N:Days (From the last payment day to the next payment day). t:interest rate | 9. Overdue Debt Management * When the loan turns into overdue, debt management officer sends a Reminding Letter to the customer (at least once a month), approved by the Head/Vice of Debt Management Division. This letter is transferred to clients and a copy is also to deliver to the credit officer. * If the customers still don’t make payment after more than 3 times received the Reminding Letter, credit officer proposes to the Head of Client/ Project Investment Division to work directly with the customer’s representative to cover the debt. * Client/ Project Investment Division combines with Risk Management Division and Legal Division if necessary to protect all the interests of VCB. | 10. | Contract liquidation and Collateral Release Collateral * After the client pays all principle and interest, Debt Management officer prepares and signs on Loan Closing Announcement (Thong bao dong h? so vay). * Client officer informs client of Loan Contract Liquidation (Form 7. 2). * Debt Management officer hands over all relevant documents to Client/ Project Investment Division before the former Division transfers to clients and sends the original of Handover Record (signed by both handover and takeover) to Debt Management for storage purpose. * Finally, Client/ Project Investment Division cancel Collateral Transaction Registry. | | How to cite Sample of Document, Papers

Saturday, December 7, 2019

Introduction to Computing Visits Actor–Network Theory

Question: Collect, analyse, present and comment upon business data. Identify the relationship between computer hardware and software. Describe the most common types of software programmes and explain how they may be used to enhance management functions. Answer: Introduction Various actants, including both non-technical and technical, comprises the theory of computing. In a computing network, changes occur in a network when any actants connect to or act upon another actant. This specific statement reveals the significant role and relationship between the different actants in modern computing. The applications the Actor Network Theory in computing helps in understanding the interconnection and relationship between the human and non-human actants acting within a network. The approach of actor-network theory helps in appreciating the complexity existing in an organization or reality (Liebenberg, 2012). Furthermore, the application of the Actor Network Theory helps in understanding the social effects that are promoted as the result of the association of different actants in the network. This particular assignment focuses on evaluating the two modern computing stories IBM is one step closer to mimicking the human brain and Google wants to stop you entering passwords with the application of Actor Network Theory. Two contemporary stories related to modern computing Relevancy of Actor Network Theory for understanding computing Actor-Network Theory is one of the most influential theories in the theory of modern computing. Michel Callon, Bruno Latour, and John Law first developed the Actor Network Theory in the early 1980s for exploring the structure and growth of information. Bajde, (2013) has defied ANT as a computing approach for practicing sociology. The actor-network theory does not only limit to the social science but comprises the science and criteria of association between the actants. The relevant reasons for applying the Actor Network Theory for studying computing are as follows: The ANT allows identifying the interconnection between the human and non-human actants acting upon a network; ATN analyzing the relationship between the actants while hiding the individual characteristics of the connected actants; iii. ATN reveals the technological influence on society and human actants that possess the potential for changing the social interactions and interconnections between the actants; Computing Story 1: IBM is one step closer to mimicking the human brain, 3 August 2016 Story Description Imitation of the human brain is the focus of research for the last decades. Recently, the scientists of IBM were successful in mirroring the biological function of human brain. The creation of randomly spiking artificial neurons can thoroughly process a huge amount of data and store them (Bell, 2016). The artificial neurons have made a breakthrough in cognitive computing and development of neuromorphic, energy efficient and ultra dense technologies. The artificially developed neural brain has shown influential phase-change characteristics and computations primitives while using very less energy similar to the human brain. In addition to that, the artificial brain has been able to react to the external stimulation (electrical pulse) causing a phase- change material to crystallize. Categorizing the actants For categorizing, the various actants in the story the theory of ANT has been applied. In this particular story, the artificial neural brain, Internet of Things, neuromorphic technologies and neuron are the digital actants. While on the other hand, the computers and Blue-ray are defined as the hardware actants that acts on the network. The technology and algorithms used in developing the artificial neural brain are considered as the software actants and the scientist, and IMB team is defined as the human actants in the current story. The software actants pull on the software actants in this story that has brought significant changes in the artificially designed neural network. Enhancing the Management Functions In this contemporary computing story, the application of the Actor Network Theory reveals the relationship and interconnection between the identified actants in the network. The development of the artificial neural brain network has provided the scientist with the imitation of the human brain that also shows computation problems like data correlations (Horowitz, 2012. Mimicking the activities of the human brain is one of the critical tasks that have resulted in hundreds of research and theoretical study previously. The practical application of the artificial neural networks still required more demonstration. The result in of experiment has provided sustainable switching cycles and complex signals. There remains an area of management functionalities to improve the computation performance of the artificial neural brain that can be used for high volume and velocity of information processing. Linking the Story to larger issues and contemporary debate With the interconnection of thousands of devices on the internet, a high volume of data is being generated at high velocity. It is difficult to control and process the huge volume of information. Pollack, Costello, and Sankaran, (2013) cited that the time and power required for processing the huge volume of information are much higher that affordable. The use of artificial neural network was able to compute multiple easy of data processing with the frequency of mere 100Hz. The high processing speed and less power consumption significantly impact the human actants and neuromorphic technologies in this story. Computing Story 2: Google wants to stop you entering passwords, 5 August 2016 Story Description With the recent trends, Goggle is currently supporting its users to use YOLO attitude for managing password. The YOLO (You Only Login Once) allows the users to online to devices only once. Google has teamed up with the Dashlane and Android developers to allow access using third party software. The open source YOLO API stores all the user id and password for all the applications for easy management (Reynolds, 2016). Currently, the application is developed only for the Android Operating System. The use of password management system allows the users for easy access and managing password of different applications at the same time. Categorizing the actants The application of the Actor-Network Theory has revealed the different actants and network in the current story. Android Operation systems, YOLO software, Dashlane, YOLO API are identified as the software actants in the computing story. The tangible mobile devices like mobile phones and tablets are considered as the hardware actants. On the other hand, the people using the Android devices are the human actants in the current contemporary story. The software and hardware actants in the story significantly impact the human actants with its interconnections. Enhancing the Management Functions Google and Android system has together connected millions of people together with different applications and services. Every application uses its specialized user id and password for login. Its become very difficult for the users to remember all the password of the different applications and log-in every time to use the applications (Bueger, 2013). The open source YOLO API allows the users to store and manage the password for all the applications. The linking of the different applications and websites through the YOLO third party software only needs the users to log in once with the password and user-id. Currently, the YOLO application is only developed for the Android devices. There remains a scope of management functionalities of developing the YOLO system independent of the operating system. Linking the Story to larger issues and contemporary debate In linking to the second contemporary story about the Googles encouragement of password management system using YOLO, there lay significant issues (Wissink, 2013). The YOLO application stores the user id and password for a variety of applications and websites. Being an open source application on the android system, the YOLO has faced various password leaks and hacks currently. Although the system provides an easy login to the different applications with one click fails to ensure safety and security of the user data (Vezyridis, and Timmons, 2014). The larger issue is to ensure the data integrity and security of the users of Android devices. Moreover, since a massive number of data is being generated nowadays, is required to control the security of the information. Limitation of Knowledge Long Term Effect of Computing: The use of computing for a long time results in the generation of the huge volume of structured and unstructured data (Durepos, and Mills, 2012). Understanding the impact of the data to the human actants is much required for analyzing the relation between the human and non-human actants in any network. Problems of ANT: The utilization of the Actor Network Theory is not possible in every case. The use of ANT in research study causes more time and financial resource (Fioravanti, and Velho, 2016). In the research study, if there is efficient time, the number of cases to analyze ANT is not sufficient. Dwiartama, and Rosin, (2014) have stated that ANT is useful in providing social interconnections between the actants but fails to produce any statistical data to the applications. Conclusion The application of the Actor Network Theory in the two modern computing theories has identification of the actants and network in the computing stories successfully. The selected stories have provided in-depth analyzing of the modern computing with the application of ANT. In the first story IBM is one step closer to mimicking the human brain the analyzing with the Actor-Network Theory has revealed the impact of artificial neural network in big data and data processing. In the second story "Google wants to stop you entering passwords", the ANT has revealed the different underlying relations between the human actants and security of data. Therefore, the applications of the ANT in the computing stories have provided connections between the actants and its impact on the social environment. References Bajde, D., (2013). Consumer culture theory (re) visits actornetwork theory Flattening consumption studies. Marketing Theory, 13(2), pp.227-242. Bell, L. (2016).IBM is one step closer to mimicking the human brain. [online] WIRED UK. Available at: https://www.wired.co.uk/article/cientists-mimicking-human-brain-computation [Accessed 7 Aug. 2016]. Bueger, C., (2013). Actor Network Theory, Methodology, and International Organization. International Political Sociology, 7(3), pp.338-342. Durepos, G. and Mills, A.J., (2012). Actor-network theory, ANTi-history and critical organizational historiography. Organization, 19(6), pp.703-721. Dwiartama, A. and Rosin, C., (2014). Exploring agency beyond humans: the compatibility of actor-network theory (ANT) and resilience thinking. Ecology and Society, 19(3), p.28. Fioravanti, C. and Velho, L., (2016). Let's follow the actors! Does Actor-Network Theory have anything to contribute to science journalism?. Transcultural, 6, p.04. Horowitz, L.S., (2012). Translation Alignment: Actor Network Theory, Resistance, and the Power Dynamics of Alliance in New Caledonia. Antipode, 44(3), pp.806-827. Liebenberg, J., (2012), October. Unravelling the Text Book as Embodied Curriculum: An Actor-Network Theory View of an Android-based eBook Implementation in a South African Secondary School. In M. Specht, M. Sharples and J. Multisilta eds.,, mLearn (pp. 302-307). Pollack, J., Costello, K. and Sankaran, S., 2013. Applying ActorNetwork Theory as a sensemaking framework for complex organisational change programs. International Journal of Project Management, 31(8), pp.1118-1128. Reynolds, M. (2016).Google wants to stop you entering passwords. [online] WIRED UK. Available at: https://www.wired.co.uk/article/google-dashlane-password-manager-openyolo [Accessed 5 Aug. 2016]. Vezyridis, P. and Timmons, S., (2014). Implementing an Emergency Department Information System: An Actor-Network Theory Case Study. International Journal of Actor-Network Theory and Technological Innovation (IJANTTI), 6(1), pp.17-30. Wissink, B., (2013). Enclave urbanism in Mumbai: An actor-network-theory analysis of urban (dis) connection. Geoforum, 47, pp.1-11.