Monday, September 16, 2019
International Trade Simulation Essay
In jumping into international trade a country would ideally want to maximize profits and maximize the impact of opportunity costs associated with importing and exporting goods and services. The ideal situation for a country involved in international trade would be the exportation of specialized goods that can be efficiently produced and the importation of goods that are produced elsewhere that are produced under similar conditions. Doing so creates reasonably priced goods that are desirable to other countries. The contents of the paper will discuss the advantages and limitations of international trade as identified in the simulation and will indentify four key points from the reading assignments that were emphasized in the simulation. In addition there will be a discussion on the application of what was learned in the simulation to a familiar organization. Lastly there will be a summary of results from this assessment. Rodamia International Trade Advantages and LimitationsOne major advantage of international trade, as pointed out in the simulation, is that by importing certain goods that a country does not have an advantage over means that the country will be able to optimize the production of the products that they do have advantage over. In this type of situation a country exports an efficiently made, high quality product. For example in the first scenario Rodamia the best products for export were cheese and DVD players. Due certain choices along with availability of technology and resources those commodities were the best choices to produce and subsequently export. Importing corn from Uthania was another good choice because corn is produced at a lower opportunity cost which passes that savings along to Rodamia. In addition importing corn allows Rodamia to put a large amount of its resources into producing cheese. Suntize has a comparative advantage in electronics so importing watches from them was a good decision as well. In trading with Suntize and Uthania this made Rodamia in line with opportunity costs of production in each country. The limitation is that comparative advantage does not stay the same because over time as technology develops and skill level adapts the advantage changes as well. Scenario 2 & 3Another advantage is that in order to stabilize international conditions countries can decide to or not to impose tariffs to equalize theà market. In the second scenario Suntize exported watches to Rodamia at a lower price than the watches Suntize was selling domestically. Placing a different price otherwise called dumping, causes the international market to become unstable. Rodamia decided to place a tariff so that the price imported can equate to the market value of the watches. The dumping margin was calculated at 25% which would raise a tariff of $40 per unit or 25% of the export price. The tariff also proves to help protect the domestic producers. This is so because the number of imports starts to decrease and domestic production numbers raise because of it. In Rodamia the tariffs caused imports from Suntize to drop to 2.00 million units and increased domestic production to 6.00 million units. One of the limitations is that imposing tariffs means that consumers will no longer be able to reap the benefits of a cheaper imported product. High tariffs can mean that consumers may have to pay for higher priced domestically made goods. In scenario three not imposing a tariff proved to be an advantage because not imposing a tariff on Uthania and Suntize caused them not to impose tariffs on the cheese that is imported from Rodamia. A tariff would also harm goods producers in Uthania and Suntize. The limitations are that in Rodamia the corn industry is in its beginnings and imposing a tariff would protect the domestic industry from cheaper produced corn. A tariff would foster the potential for Rodamia to be a large corn producer. Scenario 4Free trade improves domestic market competition. What this means for the consumer is better quality goods and for producers an expanded market in which to export their goods. Countries involved in free trade benefit from all the other countries involved as once a country determines their competitive advantage other countries can reap the benefits of having quality goods. Rodamia has decided to negotiate free trade agreements with both Uthania and Suntize. In doing so free trade negotiation lowers trade barriers which allow countries to explore other markets. This can provide consumers with a larger variety of products. In addition opening the country to other markets increase production leads to an increase competition and consumers benefit from this. The limitations are that free trade negotiations do not affect countries that are not a part of the FTA. Countries outside of the FTA will have high trade barriers. Four Key PointsFour key points that were emphasized in the readings and in the simulation were comparative advantage, consumer surplus, opportunity costs, and trade restrictions. Comparative advantage is when a country possesses the technology and resources to produce at good at a lower cost compared to another good and another countries production. Since Rodamia could produce cheese efficiently their comparative advantage would lay in cheese production. The comparative advantages in the simulation determined Rodamiaââ¬â¢s exports and imports from the neighboring countries. Consumer surplus is when a country can produce goods at a lower price than another country. The country of Suntize may have had a consumer surplus with its production of electronics. The decision to choose Suntize to import watches was based upon the fact that Suntize had an advantage in producing electronic goods. Opportunity cost is the benefit foregone by producing a certain good (Colander, 2004). Opportunity costs were weighed heavily in Rodamia choosing goods to export. Rodamia was encouraged to export the commodity that had the lowest opportunity cost which turned out to be cheese. Giving away 2000 tons of corn cut cheese production in half where as if no corn was exported and imported instead, yields 8 million pounds of cheese. The last key point involves trade restrictions. Some types of trade restrictions include tariffs, quotas, embargos, and licenses. Tariffs were imposed upon Suntize for creating an unbalanced market. The tariff helped to equalize the imported price with the market value. Not imposing trade restrictions can also help not to harm foreign producers of goods and in return they may not decide to place tariffs on imports. Application of SimulationAs a frequent traveler to foreign Asian countries I now know why some countries produce the goods they produce. For example Jasmine rice is widely known as a Thai commodity but their number one export is computers and computer parts. This is so because Thailand has a comparative advantage in producing those goods and exporting them. Because of the lowered price of production Thailand will be able to export units at a reasonable price making those products desirable to countries that are in need of them. In addition I also see the major disadvantages of being a country that does not have any sort of comparative advantage. This wouldà make it difficult to trade with other countries that will look for products that can be produced efficiently and less costly. Summary of Results Scenario 1:Exports: Cheese and DVDsImports: Corn/UthaniaWatches/SuntizeScenario 2:Level of Tariff (%/unit): 40Imports from Suntize (million units): 2.00Domestic Product (million units): 6.00Scenario 3:Tariff level: 0%Imports from Uthania & Alfazia ($ in million): 37.29Exports from Uthania ($ in million): 32.48Exports to Alfazia ($ in millions): 8.86Rodamiaââ¬â¢s Balance of Trade ($ in millions): 4.04Scenario 4Weather to Negotiate FTAââ¬â¢s: YesCountry to Negotiate FTAââ¬â¢s with: Alfazia and Uthania Conclusion In summary international trade does not come without issues of creating optimal exports and importing the most cost efficient goods. International trade seems to expand the variety of goods that consumers want and for a country and its producer it seeks out new consumers and markets. The contents of this paper has discussed the advantages and limitations of international trade as identified in the simulation and indentified four key points from the reading assignments that were emphasized in the simulation. In addition there was a discussion on the application of what was learned in the simulation to a familiar organization. Lastly there was a summary of results from this assessment. References: Colander, D.C. (2004). Economics (5th ed.). Burr Ridge, IL: Irwin/McGraw-HillUniversity of Phoenix. (2007). Applying International Trade Concepts. Retrieved on October18, 2007 from, University of Phoenix, rEesource, Simulation,ECO360- Economics for Business I Web site.
Sunday, September 15, 2019
Disater Recovery Plan Essay
Appoint coordinator/project leader, if the leader is not the dean or chairperson. 1. Determine most appropriate plan organization for the unit 2. Identify and convene planning team and sub-teams as appropriate (for example, lead computer support personnel should be in the team if the plan will involve recovery of digital data and documents). 3. At the unit level a. scope ââ¬â the area covered by the disaster recovery plan, and objectives ââ¬â b. assumptions 4. Set project timetable 5. Obtain approval of scope, assumptions and project plan, if the leader is not the administrator. Step Two ââ¬â Conduct Business Impact Analysis In order to complete the business impact analysis, most units will perform the following steps: 1. Identify functions, processes and systems 2. Interview information systems support personnel 3. Interview business unit personnel 4. Analyze results to determine critical systems, applications and business processes 5. Prepare impact analysis of interruption on critical systems Step Three ââ¬â Conduct Risk Assessment 1. Review physical security (e.g. secure office, building access off hours, etc.) 2. Review backup systems 3. Review data security 4. Review policies on personnel termination and transfer 5. Identify systems supporting mission critical functions 6. (Such as flood, tornado, physical attacks, etc.) 7. Assess probability of system failure or disruption 8. Prepare risk and security analysis Step Four ââ¬â Develop Strategic Outline for Recovery 1. Assemble groups as appropriate for: Hardware and operating systems Communications Applications Facilities Other critical functions and business processes as identified in the Business Impact Analysis 1 For each system/process above quantify the following processing requirements: Light, normal and heavy processing days Transaction volumes Dollar volume (if any) Estimated processing time Allowable delay (days, hours, minutes, etc.) Detail all the steps in your workflow for each critical business function Identify systems and application Component name and technical id (if any) Type (online, batch process, script) Frequency Run time Allowable delay (days, hours, minutes, etc.) Identify vital records (e.g., libraries, processing schedules, procedures, research, advising records, etc.) Name and description Type (e.g., backup, original, master, history, etc.) Where are they stored Source of item or record Can the record be easily replaced from another source (e.g., reference materials) Backup Backup generation frequency Number of backup generations available onsite Number of backup generations available off-site Location of backups Media type Retention period Rotation cycle Who is authorized to retrieve the backups? 1 Identify if a severe disruption occurred what would be the minimum requirements/replacement needs to perform the critical function during the disruption. Type (e.g. server hardware, software, research materials, etc.) Item name and description Quantity required Location of inventory, alternative, or offsite storage Vendor/supplier 7. Identify if alternate methods of processing either exist or could be developed, quantifying where possible, impact on processing. (Include manual processes.) 8. Identify person(s) who supports the system or application 9. Identify primary person to contact if system or application cannot function as normal 10. Identify secondary person to contact if system or application cannot function as normal 11. Identify all vendors associated with the system or application 12. Document unit strategy during recovery (conceptually how will the unit function?) 13. Quantify resources required for recovery, by time frame (e.g., 1 pc per day, 3 people per hour, etc.) 14. Develop and document recovery strategy, including: Priorities for recovering system/function components Recovery schedule Step Five ââ¬â Review Onsite and Offsite Backup and Recovery Procedures 1. Review current records (OS, Code, System Instructions, documented processes, etc.) requiring protection 2. Review current offsite storage facility or arrange for one 3. Review backup and offsite storage policy or create one 4. Present to unit leader for approval Step Six ââ¬â Select Alternate Facility ALTERNATE SITE: A location, other than the normal facility, used to process data and/or conduct critical business functions in the event of a disaster. 1. Determine resource requirements 2. Assess platform uniqueness of unit systems 3. Identify alternative facilities 4. Review cost/benefit 5. Evaluate and make recommendation 6. Present to unit leader for approval 7. Make selection Step Seven ââ¬â Develop Recovery Plan The steps for developing the Recovery Plan are listed below in outline form to demonstrate how a unit may choose to organize their Disaster Recovery Plan. 1. Objective Establish unit information 2. Plan Assumptions 3. Criteria for invoking the plan Document emergency response procedures to occur during and a fter an emergency (i.e. ensure evacuation of all individuals, call the fire department, after the emergency check the building before allowing individuals to return) Document procedures for assessment and declaring a state of emergency Document notification procedures for alerting unit and university officials Document notification procedures for alerting vendors Document notification procedures for alerting unit staff and notifying of alternate work procedures or locations. 1 Roles Responsibilities and Authority Identify unit personnel Recovery team description and charge Recovery team staffing Transportation schedules for media and teams 1 Procedures for operating in contingency mode Process descriptions Minimum processing requirements Determine categories for vital records Identify location of vital records Identify forms requirements Document critical forms Establish equipment descriptions Document equipment ââ¬â in the recovery site Document equipment ââ¬â in the unit Software descriptions Software used in recovery Software used in production Produce logical drawings of communication and data networks in the unit Produce logical drawings of communication and data networks during recovery Vendor list Review vendor restrictions Miscellaneous inventory Communication needs ââ¬â production Communication needs ââ¬â in the recovery site 1 Resource plan for operating in contingency mode 2 Criteria for returning to normal operating mode 3 Procedures for returning to normal operating mode 4 Procedures for recovering lost or damaged data 5 Testing and Training Document Testing Dates Complete disaster/disruption scenarios Develop action plans for each scenario Plan Maintenance Document Maintenance Review Schedule (yearly, quarterly, etc.) Maintenance Review action plans Maintenance Review recovery teams Maintenance Review team activities Maintenance Review/revise tasks Maintenance Review/revise documentation Step Eight ââ¬â Test the Plan 1. Develop test strategy 2. Develop test plans 3. Conduct tests 4. Modify the plan as necessary Step Nine ââ¬â Maintain the Plan 1. Review changes in the environment, technology, and procedures 2. Develop maintenance triggers and procedures 3. Submit changes for systems development procedures 4. Modify unit change management procedures 5. Produce plan updates and distribute Step Ten ââ¬â Perform Periodic Audit 1. Establish periodic review and update procedures
Saturday, September 14, 2019
French Court System
The French court system is a double pyramid structure. There are two separate orders: administrative courts and judicial courts. Each order has a pyramid structure, with a single court at the top and various courts at the base. Litigants displeased with a court decision can seek a review before the next court up in the hierarchy. In each order, a single court of last instance ensures that the lower courts interpret the law in the same way. The administrative courts settle disputes between users and public authorities. The Conseil d'Etat hears cases in first and last instance. It is both adviser to the government and the supreme administrative court. â⬠¢The courts with general competence are the administrative courts, administrative appeal courts and the Conseil d'Etat (as a jurisdiction). â⬠¢Administrative courts with special competence are the financial courts (Court of Auditors, Regional Courts of Auditors, Court of Budget and Financial Discipline) and various other tribuna ls like the disciplinary bodies of professional orders.The judicial courts settle disputes between persons and sanction offences against persons, property and society. There are three categories of judicial court: â⬠¢the courts of first instance: ââ¬â the civil courts: district courts, regional courts, commercial courts, employment tribunals, agricultural land tribunals, social security tribunals; ââ¬â the criminal courts: . ordinary courts: police courts, regional criminal courts, assize courts; . specialised courts: juvenile courts, military courts, political courts and the maritime criminal court; local courts, created by Act 2002-1138 of 9 September 2002 to meet the need to make justice more accessible, swifter and capable of dealing more appropriately with small claims and minor offences. Local courts have lay judges; â⬠¢the courts of second instance: the appeal courts; â⬠¢the supreme court: the Court of Cassation, responsible for ensuring compliance with th e rules of law applied by lower courts. It judges the form and not the merits, unlike the courts of first and second instance, which judge the facts.
Friday, September 13, 2019
SQL Queries Essay Example | Topics and Well Written Essays - 750 words
SQL Queries - Essay Example Description I have added a sub query in WHERE clause to filter those students who have no placement. f. List the names and student ids for students who have gained employment with the company that they undertook a placement at. SELECT DISTINCT Student.stu_fname, Student.stu_no FROM Employment, Student, Placement WHERE Student.stu_no=Employment.stu_no And Student.stu_no=Placement.stu_no And Placement.co_id=Employment.co_id; Description: In this query I have selected Employment, Student, Placement tables and have joined them. In addition to that, I have also patched Company ID of Placement with Employment table as well. g. List the names and student ids for students that have undertaken precisely two (2) placements. SELECT DISTINCT Student.stu_fname, Student.stu_no FROM Student WHERE (( SELECT count(*) FROM Placement WHERE (Student.stu_no=Placement.stu_no) ) >= 2 ); Description: I have added a sub query in WHERE clause to filter those students who have at least two placements. h. List the names and student ids for all students and sort the list in reversed alphabetical order (Z to A). SELECT DISTINCT Student.stu_fname, Student.stu_no FROM Student ORDER BY Student.stu_fname DESC; Description: In this query I have added ORDER BY clause to sort data in Descending order. i. Show the average length for placements, where the placement is with Sony and the student goes on to gain employment (with any company). SELECT Company.co_name, avg(SELECT count(*) FROM Placement, Student, Employment WHERE Placement.co_id=Company.co_id and student.stu_no=Employment.stu_no And student.stu_no=Placement.stu_no ) FROM company GROUP BY Company.co_name, Company.co_id HAVING Company.co_name='Sony'; Description: First I have selected the Average number of placements... In a correctly implemented database a student may not be employed and on a placement at the same point in time. However in such a database it is still possible for a student to secure employment before they have completed their placement (i.e. having a starting date for employment while still on placement). Create a query that lists all such occurrences.
Thursday, September 12, 2019
Combined joint task force-horn of Africa Research Paper
Combined joint task force-horn of Africa - Research Paper Example Terrorism has been one of the key issues in countries such as Yemen, Djibouti, Sudan, Ethopia, Eriteria, Somolia, and Kenya, commonly known as Horn of Africa. Lot of efforts and key strategies have been formulated over a period of time to counter this menace One such effort to combat terrorism was the establishment of a Combined Joint Task Force which was formed to address the issues of terrorism in Horn of Africa.The paper understudy is aimed at giving an overview of this task force and its operations typically in Kenya The paper understudy is aimed at giving an overview of this task force and its operations typically in Kenya with a view to address the efforts launched in by this team in combating and reducing terrorist activities. Moreover, it also accentuates on the manner in which the contribution of Kenya with respect to war on terrorism has attracted the United Stateââ¬â¢s attentions and interest in the region. The establishment of Combined Joint Task Force - Horn of Africa took place on 19à October, 2002à (Combined Joint Task Force- Horn of Africa, 2011)à in North Carolina under the oversight of United State Central Command. CJTF - Horn of Africa conducts operations in East Africa, namely in Yemen, Djibouti, Sudan, Ethiopia, Criteria, Somalia and Kenya to build and foster an effective counterterrorism partnership. This was done to promote regional security, ensure stable conditions within the horn of Africa AOR, oversee conflict and dispute prevention, and safeguard and protect the interest of the United States and its allies. Prior to the creation of the CJTF ââ¬â Horn of Africa, Kenya was plagued by rampant, unchecked terrorism that had impacts within the local, regional and global theaters. Once established however, Kenyaââ¬â¢s ability to combat terrorism within the horn of Africa AOR bolstered dramatically.à à The discussion of CJTF - Horn of Africa would remain incomplete without its role in Kenya which holds a very substantial and significant place in the war against terrorism. Many experts have regarded Kenya as a harbor of increasing terrorist activities and branded it as a helpless state victimized by waves of terrorism throughout the country. In 2003 the Government of Kenya accepted that western countries had been targeted by a possible member of the Al Qaeda network, affirming the potential of Al Qaeda operating within national boundaries. Beginning with a bombing attack on the American Embassyà (Ploch, 2011), the countryââ¬â¢s capital showed signs of terrorist activities as far back as 1998.à à The acknowledgement from government however, came very late. Since then, Kenya has become a regular victim of groups having international terrorism expertise. Further investigation determined that poor immigration laws and security legislature have greatly contributed toà the terrorism flourishing in the region. The cells in Kenya were completely under control by foreign groups from within the Gul f States and Somalia.à à These groups eventually involved locals, helping them to establish their businesses and using these as fronts for their networks. The leaders of these Kenyan Cells were found to have connections with the Al Qaeda network and disappeared soon after the attacks on the US embassy. The government, in cooperation with FBI, then made endeavors to destroy these Al Qaeda controlled cells in various parts of country, including arrests in July and November of 2001 of Yemeni and Somali people.à à Despite of all these efforts, the situation in Kenya never fully regained control and an Israeli airliner was shot down in Mombasa inà 2002. The investigation led to another connection with Al Qaeda and revealed terrorist control over major elements of the national security system, as evident by their transportation of surface-to-air missile which was fired at an American military jet at the Prince Sultan Air Base in Saudi Arabiaà (Menkhaus, 2011). After this devel opment, the Kenyan government officially acknowledged the
Wednesday, September 11, 2019
Measuring Test Quality in Embedded Systems Research Paper
Measuring Test Quality in Embedded Systems - Research Paper Example This situation has called for the development of better testing methods that can be used to overcome the mentioned above setbacks experienced by the traditional embedded systems through offering the exact test quality information even in situations where the measuring and testing processes are carried out when the application under investigation is being run in an embedded target board (Conrad 78)Some malfunction software have been introduced as the quality problem culprit in the products of embedded systems. Software testing has therefore received more focus in the recent years and is commonly being used as a means adapted by companies to produce products that are of high quality within the desired time duration to their customers. The traditional systems that made use of manual methods for testing software have been unable to keep up with the rapid increasing code amounts in the contemporary implementation of products. Thus better systems to ensure that the tests conducted are effi ciently executed and the tests actions are reported, monitored and analyzed in better ways so as to keep up with the pace of modern requirements are needed (Grchtmann 27).Most of the programs used these days in embedded systems produce codes that are needlessly complex. While such released codes might still be functional, they are normally more complicated than they are required to be. Codes that are complicated tend to transform and become codes that are problem-riddled. Most technicians believe that in an event.
Maritime LAW Essay Example | Topics and Well Written Essays - 2000 words
Maritime LAW - Essay Example The notion behind arresting the ship rests in the notion of the ship itself as being the wrongdoer and thereby liable to arrest and offer the same for sale to settle the claims by a creditor. It normally involves securing the appearance of the defendant ship owner and corroborates the jurisdiction of the Court. If the Court permits the maritime creditorââ¬â¢s claim, the verdict is then enforceable against the detained res by judicial sale or security given to assume its place. (Force et al, 2006:262). An action in rem may be initiated against a ship in connection with which a claim arose or against a sister ship. As per the decision held in Gatoil Inc. v Arkwright ââ¬âBoston Co [1985] A.C. 255 at 265, under the Arrest Convention, there exists a right to initiate an action in rem against another ship of the owner. (Gault et al: 2003:31). An action in rem can be initiated in the High Court against the ship where there exists a maritime lien on the ship and in cases where there e xists a statutory right to proceed in rem. (Gault et al 2003:31). For many centuries, action in rem is the remedy most sought for and used to, and it is being the specialty of the Admiralty Court and for the Courts having parallel jurisdiction and it offers a chief benefit over the same. For initiating any action against a ship is the specialty to proceed in the Admiralty Court directly, and it has been regarded as the illustrious aspect of the Admiralty jurisdiction. Even from the Elizabethan era, the action in rem is being employed in the Admiralty court and however, during the middle of the nineteenth century, the modern theory of maritime liens, i.e. rights against the ship started to evolve. The starting of consideration of the action in rem is itself must lie in the onset of the theory of maritime liens as the two concepts have become interconnected. (Wiswall 1970:155) As per Jervis, maritime lines were the founding stones of actions in rem which was itself a maxim as laid dow n in ââ¬Å"The Bold Cuccleughâ⬠where a solid substantive verdict was given that the action in rem was a proceeding directly against a ship and not a procedural mechanism to enrich personal jurisdiction over owners. (Wiswall 1970:158). Thus, in the case of action in rem, action in personam cannot be claimed was vitiated by the verdict given by Sir Francis Jeune in ââ¬Å"The Dictoar ââ¬Å"in 1891 and when action being in rem, and if any bail that had been offered should stand as a substitute for the ship, and it should be treated as the limit of the liability and it was not proper to award a decree or a judgement in personam in an action in rem. Thus, separate legal proceedings should be initiated for an action to be brought in personam was needed mainly to obtain satisfaction of the balance of the savage award. (Wiswall 1970:158). Traditionally, an action in rem has been considered as an action against the ship itself and does not refer to any action against a ship owner unt il and at least the ship owner acknowledges services of the claim form. ââ¬Å"The House of Lords ââ¬Å"in ââ¬Å"The Indian Grace ââ¬Å"held that under the ââ¬Å"s.34 of the Civil Jurisdiction and Judgments Act, 1982 ââ¬Å", an ââ¬Å"
Subscribe to:
Comments (Atom)