Thursday, December 26, 2019

Peer Review Draft Of Literature - 1485 Words

Peer Review: Draft of Literature Research shows that students are lacking critical writing skills that are fundamental for the 21st century. This may be due to technology, some may be due to the lack of laziness or both. This failure in learner’s writing is one of the main reasons for implementing the Common Core standards. It is obvious that student’s writing skills are important in this day and time. Standardized test scores provide much evidence that students do not have acceptable writing skills. Today, curriculum changes has helped improve math and reading skills, writing is still an area that needs immediate attention. This review will focus on the importance of writing skills among students and provide strategies as to how†¦show more content†¦Changes in technology and society have changed and will continue to transform the ways in which we think and communicate. Students must be ready for the new demands (Dixon, Cassady, Cross Williams, 2005). In society, English forms the foun dation for effective communication. Academic success requires writing skills (Castek et al, 2007). Writing is hard work; individuals think it is better to talk than write. Social and psychological factors such as social status, background, and age affect writing skills (Reeves Stanford, 2009). Edwards-Groves (2011) rants that students must be taught the writing process. This will help students write in any situation. Writing should not be confined to just English classes but across all disciplines. Anecdotal evidence suggest students and faculty believe that learners improve their writing skills and subject area knowledge in writing across the disciplines (Hartley, Howe McKeachie, 2001). All disciplines have their own form and conventions. If students are going to become better writers, they must write on a regular basis. With that said, students do not want to write. Motivation is the heart of this challenge (Jacobs, 2008). Students do not see the importance of writing beyond their school years. Motivation is hard to break within our students. Also, many of the students continue to make the same mistakes with their writing. Learners do not refer back to the given

Wednesday, December 18, 2019

Personal Dilemma Experince - 754 Words

Recently, within the past year, I was faced with a moral and ethical dilemma, which forced me to choose between honesty and loyalty (punc.) and the result of that choice will hopefully guide me in future decisions.(Good opening sentence) At the time of the incident I was working as a pharmacy technician in ________. The dilemma I was faced with involved a fellow technician who was hired at the same time as me and the two of us had become close friends during the course of our employment. Now this friend of mine was obsessed with bodybuilding to the extent that he was willing to steal intravenous steroids from the pharmacy. As a friend I tried to warn and convince him to stop stealing but because he was consistently successful in doing so,†¦show more content†¦The next time I am confronted by a decision of this magnitude I will be cautious in my choice and that choice will reflect my values and needs(punc.: ,) not that of my employer, my friend, my parents or anyone else. At the end of the day we all have to sleep with our own conscience and no oneShow MoreRelatedHow Pastoral Care Policy Has Contributed to the Management of Junior Secondary Schools In Botswana23474 Words   |  94 Pagesschool pastoral care policy (SPCP) is designed to inculcate the spirit of excellence in schools (Power, 1996). School pastoral care (SPC) programs and plans are key tools with which management, teachers and learners are supported to demonstrate their personal best in a favourable environment. Pastoral Care Policy (PCP) also provides an opportunity for integrating newly surfacing child related school programs and policies such as the Child Friendly School Model (CFS) and the Inclusive Education PolicyRead MoreStarbucks Business Plan31663 Words   |  127 Pagesfor segmenting the market 41 4.3.2.2.3 How to segment the Danish coffee shop chain industry market 41 4.3.2.3 Consumer markets 42 4.3.2.3.1 Consumer behavior 43 4.3.2.3.1.1 Cultural factors 43 4.3.2.3.1.2 Social factors 44 4.3.2.3.1.3 Personal factor 44 4.3.2.3.2 The Five-Stages Model 45 4.3.2.3.2.1 Problem recognition 46 4.3.2.3.2.2 Information search 46 4.3.2.3.2.3 Evaluation of alternatives 47 4.3.2.3.2.4 Purchase decision 47 4.3.2.3.2.5 Postpurchase behavior 47 4

Tuesday, December 10, 2019

I know the assignment was to deal with a certain a Essay Example For Students

I know the assignment was to deal with a certain a Essay spect of terrorism, but I cant seem to keep my opinions based on one kind without comparing it to other acts of terrorism. Terrorism is defined in Websters New World Dictionary as, to use force or threats to intimidate, etc., especially as a political policy. Intimidate is similarly defined as, to make afraid, as with threats. Threats is a common word used in both definitions and when people are threatened, they feel terror therefore they are terrorized. Terrorism doesnt always come with the stereotypical Russians or Middle Eastern rebels that want to attack the US. Terror can come from all ages, races, political beliefs, and countries. An example of each can be: ages-school shootings, races- KKK, political beliefs-Oklahoma City Federal Building bombing or (anti) abortionist supporters, and countries-Iraq. Terrorism can come in all shapes and sizes of bombs, people, and verbal threats. I will try to touch on each of these subjects throughout the paper. A survey of politically motivated crimes since April 1995 reveals a dramatic increase in terroristic activities. At least thirty-nine cases have been documented. Many have not been as sever as the federal building bombing, but they have been in the forms of pipe bombs, police stand-offs, bank robberies, attacks on abortion providers and many others. (Terror from Within-MSNBC) However, some terrorist attacks are not preformed by Americans. An example of one of two documented cases of outside terrorism attacks on the United States is the World Trade Center bombing in February 1993. (The Centre for National Security Studies, April 26, 1995) The US is now a big target for outside terrorism and we always will be as long as we are a powerful nation with a large amount of pull. People in other countries see what America has to offer and want us to be eliminated to make their country the most powerful. The people that do plan and act out on these terrorist acts usually have a psychiatric pro blem. We watch the movies that glorify the hero going into a foreign land and fighting the bad guy. James Bond is a perfect example of glorifying terrorists lives. He travels all over the world to stop the villains from blowing up England. He makes it all look fun and exciting while doing his job. Austin Powers is another example of terrorists. Austin Powers is a totally different view of the subject, but the idea is still fun. We sometimes glorify terrorists lives in movies by making them rich and highly respected by their employees and contacts with other powerful people. We, the audience, see these movies and fantasize about being the hero or villain. Cops and Robbers is a perfect example of good against evil, but foreign terrorists have an aura or certain mystique quality. We want to have the power and wealth they do and we also want to have the cunning actions of the hero. International terrorism, to me, is very mysterious and full of wonder. It is very frightening but it makes me won der of the life behind the ringleader of the terrorist groups and his entourage. The part I dont understand is how important national security is to the US. I take the military and government for granted and thank them very much for doing their job. School shooting are another form of terrorism. We send our kids to school thinking that they are in a safe environment. We send them there to learn and grow up to be responsible adults. We try to teach our kids to the best of our abilities, but sometimes there are some that fall through the cracks and become the bad apple. Just like the old adage, one bad apple spoils the whole bunch, it can become so very true and real. Columbine High School recently commemorated the first year after the shooting. I remember watching CNN Headline New and MSNBC while the students were being rushed out of the school. A few other shooting occurred recently and I was worried about if any students were hurt I the events unfolding before my eyes. In the beginning, I assumed nothing happened but soon found out otherwise. I think why this story touched me a little bit more is because I watched all the events unfold that day and the media hype to follow. We grieve for the victims and some even learn to forgi ve Eric Harris and Dylan Klebold. The shooters parents also feel remorse for what their terrorist sons did to the school, the community, the state, and the country. The parents of the terrorists seem to be caring and are struggling with the loss of a child like the victims parents. We have not heard much about these families and with good reason. The parents didnt see it coming and most likely would have stopped it if they knew. (Rocky Mountain News.com, Lynn Bartels, April 15, 2000)Attacks on schools arent happening just recently. A bombing on a school in Bath, Michigan happened in 1927 and forty plus students and teachers were killed. Most of the students in the wing were of kindergarten age. A demented farmer and electrician with access to dynamite decided to blow up the west wing of Bath Consolidated grade school. His motives were not clear. A. E. Kehoe killed his wife, the treasurer of the school district, outside their home before going to the school. Kehoe apparently had been planning this scheme for months and could have leveled the whole school if all the dynamite fuses were timed together. Kehoe was seen running to his car parked on the curb moments before the blast. He also ended up dying along with the schools principal, the village postmaster, and an unidentified man in an explosion that wrecked Kehoes automobile. After the explosion had hurled helpless, young victims through the air, another explosion rocked the school and sent the walls and ceiling into the air and on top of the already injured children. The dust most likely muffled the sparks of the dynamite for the west wing, and as a result, the spark never reached the dynamite to cause it to explode. The west wing was saved due to rubble and faulty technology. If his plan had been carried out correctly, he would have killed two hundred sixty students. Police found a note on his barn door that stated, Criminals are made, not born. (Boulder News.com, collection of stories compiled on April 25, 1999)School attacks are not new. As long as we have those crazies out there, terrorism in the schools will be there. We dont know where or when it will happen, but it will. Just a few months ago in Champaign, a guy that was irritated with his parents chased his mother into a school. Thankfully no one in the school was hurt and his motives were not to kill any children. That example is precisely my point. We dont know who will be the next target and whose school it will be. Judging by what I hear from experts, they say it is hard to tell which students are the ones most susceptible to being influenced by others or lashing out on people at any time. Certain characteristics of the probable school terrorists go along with people that are just loners or shy. We cant pick out certain students that are going to attack the school and lock him/her up before anything happens. Banning guns is not the answer to solving school violence. Large inner city schools have metal detectors at the doors but sometimes that doesnt stop all the potentially harmful objects from entering the school. It is a step in the right direction but not all schools need them so desperately or cant afford them. For now, we need to try to deal with it as it comes and maybe educate the teachers on what to do in different types of terrorist attacks. Through A Narrow Chink: An Ethical Dilemma EssayTerrorism is not just an international man of mystery traveling to foreign lands to fight off the bad guys and get the girl. It is also not just about Americans bombing a federal building because they think the government is wrong or an abortion clinic because they dont approve of the views carried out. Terrorism is not solely about people frightening an ethnic group or cultural group. Terrorism is the use of threats to cause fear. America is threatened everyday by outside countries and I am very grateful for those who fight to keep those threats from affecting the rest of the nation and us. I am also thankful to those like the police who fight the smaller scale terrorism threats everyday. Thank you. BibliographyBaker, Donald P. Blast at Alabama Abortion Clinic Kills Policeman, Injures Nurse Washington Post.com 30 January, 1998 http://www.washingtonpost.com/wp-srv/national/longterm/abortviolence/stories/atlanta2.htmAssociated Press. 1927 school bombing killed nearly 40 children 25 April, 1999 http://www.bouldernews.com/shooting/4251927.htmlBartels, Lynn. Harris, Klebold families grieve privately Rock Mountain News.com 15 April, 2000 http://www.insidedenver.com/shooting/0415kleb1.shtmlThe Centre for National Security Studies. Recent Trends in Domestic and International Terrorism 26 April, 1995 http://www.interlog.com/vabiro/pubs/NCSS_trends.htmNeiwert, David. Threat From Within. MSNBC. http://www.msnbc.com/news/257143.aspSouthern Poverty Law Center. A Hundred Years of Terror. 5 March, 1997 http://osprey.unf.edu/dept/equalop/oeop11.htm

Monday, December 2, 2019

New To The Media Essays - Tim Crouch, , Term Papers

New To The Media I have never been to a live play performance before, but I have seen one on video. I loved it as though I was reading a great storybook; being able to stop at anytime and pick up where I left off, but I never thought about the relationship between the performers and the audience. Nor did I think of the impact of all of the aspects that deal with creating a play and giving a great performance. For my first live play I went to go see Polaroid Stories; a play I thought would not be so shocking to a first time audience member. I was wrong; this play almost literally looked me in the face and slapped me. The play had the look of a run down playhouse that had little funding and little direction, but I later pieced it together that they made it part of the play, and obviously you are not supposed to see those who are back stage directing. Additionally, I over looked the performers' costumes, the stage lighting, and set design; everything I took for granted. I thought I could see the props and everything that was strategically placed or used, but I missed them all. I was surprised at how these people in charge took the look of a run down playhouse and made it their stage. This was life on life's canvas and it was totally different from watching television. Everything became so tangible and real. For a moment I lost my self and really got into the play. I didn't think I was watching a group of people on a set acting for my entertainment, I felt I was actually watching life. As if I stepped out of my body for a moment and walked the streets seeing the life of these street kids. You can't exactly get that from television; your mind is constantly running when you watch this play. The fact that the stage was right in front of me does not compare to television. If I took one step forward I would have been on stage, if I wasn 't already. One of the actors I felt breeze by me, and I could smell the smoke of another actor's cigarette. I kept having the feeling I was there, that the whole stage was really outside. The stage was the one aspect that kept me believing. The way everything was setup, the closeness it brought between the performers and the audience, and the sounds it created when the actors walked across it or banged on it. I felt apart of the stage and I guess that is why I felt so close to the action of the stories, and how I got lost in them. Going to this play was a new experience, but watching this play was a crash course in the emotion you can actually get from the way everything is setup. This new media had an impact on me that you can not get from television. And I've come to the assumption that you can save lots of money by going to good theatres like this, than by purchasing surround sound for television. You can hear the closeness with all the speakers you need, but you'll never get that tangible feeling as if the performers or the stage are really there. Theater

Wednesday, November 27, 2019

And now for a number of points - Emphasis

And now for a number of points And now for a number of points If you watched the recent Horizon programme on BBC Two 31 March at 9pm to be precise you cant have failed to have been moved by the power of maths and how we are literally surrounded by myriad aspects of it in our daily lives. Professor Marcus du Santoy, an Oxford mathematician led Alan Davies, comedian, through a series of interesting exercises to help him conceptualise how we assess probability, angles, and one, two, three and four spatial dimensions. Professor du Santoys enthusiasm for his subject was infectious. Maths is fundamental. We use it constantly whether we are aware of it or not. It helps us make good, rational decisions. And yet, how many of us are confident about expressing numbers in print? At first sight this may look amazingly straightforward but recent courses have revealed that lots of delegates are unsure when to use figures or words to express numbers. And many fudge a perfectly good point by using a number of rather than the exact amount. Why not see which of the following you think are correct and why? Then send us in your answers. 1. The Bank of Englands interest rate is now half of one percent. 2. Rates remain exceptionally low after 6 cuts since October last year. 3. The government looks set to inject around 30 billion into the economy through quantitative easing. 4. The government looks set to inject around 30 bn into the economy through quantitative easing. 5. Three sheep stood up to their necks in 3 feet of water. 6. 1,000 curses on your head. 7. His office is on the 1st floor. 8. Lets meet on Friday the 10th of May.

Saturday, November 23, 2019

A Double Negative Is Not Always UnOK

A Double Negative Is Not Always UnOK A Double Negative Is Not Always UnOK A Double Negative Is Not Always UnOK By Maeve Maddox The grammatical rule against double negatives applies to sentences that combine not with no or with other negatives such as hardly, nobody, nothing, never, and nowhere: I can’t hardly see through these glasses. He didn’t meet nobody on the mountain. They never lied about nothing. On the other hand, double negatives formed with not followed by a word that begins with a negative prefix like un- or ir- are permissible in formal English. This type of double negative is a stylistic device of understatement, a type of litotes: a figure of speech in which an affirmative is expressed by the negative of the contrary. Its use can convey a subtle difference in meaning that saying the same thing without not wouldn’t. Some speakers who object to the â€Å"not un-† construction seem to believe that there’s a rule against it. This belief is bolstered by the often quoted example made up by George Orwell: The not unblack dog chased the not unbrown cow across the not ungreen field. Orwell’s sentence is amusing, but simplistic. No English speaker is going to try to plant an un- on adjectives like black and green. Many English speakers, however, will use the â€Å"not un-† construction to achieve a nuanced meaning with adjectives like justifiable, intelligent, and convinced. The following statements are not identical in meaning: I am convinced by his argument. I am not unconvinced by his argument. A note at the online Oxford Dictionaries site points out the difference: The use of  not  together with unconvinced suggests that the speaker has a few mental reservations about the argument. Writing in 1926, H. W. Fowler (Modern English Usage) regarded the â€Å"not un-† usage as â€Å"a faded or jaded elegance.† He condemns the unnecessary use of the construction, but recognizes that this form of litotes is â€Å"congenial to the English temperament† and that there are contexts in which its use is suitable. He concludes, â€Å"The right principle is to acknowledge that the idiom is allowable, and then to avoid it except when it is more than allowable.† The construction is often used unnecessarily, but sometimes it expresses a thought in a way that the positive form would not. The following examples are probably â€Å"allowable† uses: Arthur Ransome’s book is a  not unsuccessful  attempt to provide an introduction to the criticism of types of fiction.   - The reviewer does not like the book, but acknowledges that some readers may learn something from it. Sabina Franklyn is a sweet, pretty Jane,  not unintelligent but  less of a presence than her lively sister. - The character Jane is not a stupid person, but her intelligence is not a key feature of her personality the way it is for her sister. A  musty but not unpleasant  odor came from inside, together with a blast of pent-up heat. - The odor cannot be described as pleasant, but it is not repugnant either. However, the â€Å"not un† construction is frequently used without justification, as in the following examples: Surprises will come to be outnumbered by cringes, as the not unappealing Patton finds herself sold short by a director. - In the context of the review, there’s nothing to suggest that Patton is anything but appealing. While not unentertaining, there is very little of this film that is astounding.   - In the context of the article, the reviewer seems to feel that the film is entertaining. Some reviewers, perhaps not quite understanding the device, go all to pieces in their attempts to make use of it: Jessica Biel is  not unconvincing  as a love interest,  but  shes  not  entirely convincing.   But theres something uniquely dis-appealing about Don Jon. Not unappealing, not immediately repulsive. More like simply not-appealing. The â€Å"not un-† construction has a long history in English and remains a valid stylistic choice for writers who understand how and when to use it. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Style category, check our popular posts, or choose a related post below:Yours faithfully or Yours sincerely?Select vs. SelectedHow Do You Fare?

Thursday, November 21, 2019

Marketing Essay Example | Topics and Well Written Essays - 250 words - 62

Marketing - Essay Example I believe that the leap from use of synthetic drugs to natural supplements among many customers will make the product highly sellable. Since the drug is made from natural products, it can be taken by children and adolescents or those who have no osteoporosis for the prevention of bone problems. The product is safe for all ages and genders as well as patients with other ailments so that a large number of customers is promising. The forecast for the product is positive with people largely embracing alternative medicine because of the side-effects of many synthetic drugs. The product guarantees no similar side-effects except for allergic reactions to a limited number of products. Since some of the ingredients are from animal products, the possibility of allergic reactions should be considered but not seriously because the drug has more benefits than disadvantages. Therefore, some customers may not buy the product for this reason. However, the number is minimal so that there would still be more than ninety percent success for the

Wednesday, November 20, 2019

Design Essay Example | Topics and Well Written Essays - 1000 words

Design - Essay Example Additionally, many in sales management trust that if one has not been in the channels selling, they cannot possibly scheme an operative sales training program. It is worth noting that while there is some certainty to both of these sentiments, non-selling HR experts can design actual sales training programs. Designing sales training program entails more than inquiring using standard questions about flaws in the sales team. The role of â€Å"internal advisor† will have to be assumed by the HR manager. Furthermore, coordination with the sales management team will be essential to cultivate a relevant and nourishing sales training program. Finally, any training program should present the skills required to be fruitful in a particular job occupation. The difficulty of the sales job, however, can make the skills characterisation more problematic. Accurately and plainly outlining which sales skills should be the attention of the training takes cautious assessment using the steps prese nted here (Chapman 45). Instructional Goals 1. Ensure proper functioning of the sales team. 2. Give a backbone for new sales recruit to know how the sales department functions and their expectations. 3. Encourage proper use of time while in the sales team since time is money. 4. Encourage the adoption of this department in the companies that have not adopted it yet. 5. Assess the skills obtained by the sales representatives. Testing Strategies The primary instructional methods to be used will be lectures. These lectures will compose appropriate videos that mimic a sales situation. The instructors will then provide a method of how to counter such situations when and if they occur. Deliberations between the sales agents will be highly fortified because in a sales job, the exchange of ideas is vibrant. Moreover, questions will be invited to the instructors in areas that the representatives will not have understood. With this, it will go a long way to ensure that the training was unders tood comprehensively hence successful. As a final task, a test will be given to the representatives to gauge their level of understanding. Sample Test: While given a certain situation, the sales representatives participating in this training will be required to give their thought of it. Moreover, how one can circumvent such a situation in the future will be required to be stated. Learning Units of Instructions Modules – The training will occur as a seminar. It will last for eight hours and will be divided into parts for better comprehension by the sales representatives. FIRST SESSION: 1. Identification – 5 minutes a) Each sales representatives will be handed a questionnaire. This questionnaire will capture personal information regarding each representative. b) A game that will ease the participants’ tension will also be played. Objective: questionnaire will capture personal information and the game will pass time to make sure information from all the participant s has been clearly captured. 2. Introduction of the instructors and the modes of teaching to be used – 15 minutes. a) Each instructor will fully introduce themselves and module they are to teach. Objective: To familiarize with the instructors. SECOND SESSION: 3. First lecture commences – One and Half hours. It will encompass a) Definition of sales, goals of sales and roles. b) Know the direction of the sales role. c) Know the focus of the selling, whether direct or

Sunday, November 17, 2019

Shagri La Advertisement Analysis Essay Example for Free

Shagri La Advertisement Analysis Essay One of the hallmarks of modern capitalism is advertising, helping fuel the economy by motivating buyers and supporting sellers. A prime promotional tool includes television commercials. It has become apparent over the years that television ads heighten peoples interest in products. Taking this into consideration, television advertising today has overwhelming influence on consumer purchases and   attraction to services. The consumer mind frame is largely weighted by what advertisements encourage and coerce people to buy, do and even believe. A television ad concept is not difficult to actualise, but creating an affective one that will excite audiences is. Television is firstly a visual medium and secondly auditory, allowing short stories to be told by advertisers. This medium allows for maximisation of the creative potential. Brand History Shangri-La is a premier hospitality provider founded in 1971 in Singapore. Its name was inspired by James Hiltons legendary novel Lost Horizon, which encapsulates a placid haven in the Himalayas mountains, called Shangri-La, which cast a spell on its residents. Today, Shangri-La composes of over 70 deluxe hotels and resorts in key cities in Asia Pacific, Canada and the Middle East. Apart from providing hotels and resorts, it has also established spas and luxury serviced apartments. Based in Hong Kong, Shangri-La has plans to expand globally with advancements under way throughout Asia, Europe and North America. The vision of Shangri-La is to be the first choice for their guests, colleagues, shareholders and business partners, with its mission to delight their guests every time by creating engaging experiences straight from their hearts. Target Audiences Instead of highlighting the usual comforts and amenities of the hotel, the ad tries to work on the subconscious level of the consumers. The man is neither familiar with nature of wolves nor with the terrain. This means that ad is not designed for regular loyal customer and Shangri-La is confident of retaining them with its service. Furthermore the ad characterizes a man fighting alone in an adverse condition rules out family as target. Its primary aim is to attract new customer especially working class who are rich enough to spend but are skeptical of service provided. This tactic used is to convey quality   which uses a very fine experience from human life. It is safe to consider this ad to be reaching out to the niche market of business men of middle to upper class stature. However, also not to mention anyone who is willing to pay the price for comfort as well. Objectives Of Commercial The advertisement is excellently scripted and shot to keep viewers glued to the screen when watching it   for the first time. Creatively crafted with such brilliant cinematography and accompanied by an empowering original music piece composed by Bruno Coulais. Audiences would not figure out that this would be a commercial for a hotel until the ending of it. The symbolism used in this ad creates a lasting impression on the viewer’s mind. The ad is designed keeping in view the consumer’s perspective and expectation away from the hotel. Depicted in the commercial is a   man with backpack and equipment that symbolizes a career oriented customer. This person is in an unknown place for work related affairs. He is tired in his endeavors and looking for a place to rest and rejuvenate, namely a hotel or a resort. Wolves are generally associated with sinister and wicked activities and here they depict hotels and resort. It is common perception that hotels and resort charge expensively   and have lot of hidden charges but most of them fail to deliver the value for money spent. The customer doesn’t trust the wolves (hotel) and when he finally gives in to his fatigue, he gets unexpected, friendly and customized treatment from the stranger who are the wolves; Shangri-La staffs. Cultural Impacts In recent years, change and adaptation seem to be the norm for society all around the world. Adaptation to sub-cultures is not always the easiest. Habits and culture change are more often than not the hardest to accept. In this case,   the advertisement emcompasses that entirely. With the man lost in a foreign environment, looking desperately for a place to rest. Unable to familiarize himself to his surroundings, he succumbs to settling down in the cold winter snow. Unexpectedly, Shangri-La, depict as the wolves, show up to comfort the stranger. After which, the tagline, â€Å"To embrace a stranger as one’s own, it’s in our nature† is shown. Hence, audiences are able to gather that no matter where you are across the globe, in a foreign environment, Shangri-La will take you in not as a guest but a kin. Creating a ‘home away from home’. Mass Media Theories There are four main theories that are formulated into the advertisement, namely the cumulative effects theory, attitude effects theory, behavioural effects theory. Cumulative Effects Theory It is necessary for an ad to be repeated several times before an individual consumer attends to and processes the message. This need for repetition is the cumulative effect of actual exposure to the message. Message quality is a critical factor in determining whether communication has any effect. The placing of the Shangri-La ad in cinemas before movie screenings and on YouTube allows for this necessary repetitive exposure. The cognitive and affective responses to the ad (e. g, attention, recall, attitude) initially hikes with increasing repetition over time. By placing it in cinemas over a stretched period of time, movie-goers are more exposed to the ads as it is highly unlikely for them to intentionally avoid it. The placement of it on YouTube before certain videos also ensures that viewers are unable to avert the intrusiveness of the ad. With the behavior attitude effects that derive from the Shangri-La ad, the cumulative effects are elevated. Behavior Effects As Shangri-La has already been established as mature in its industry, one of this commercials purpose is to influence its viewers with social appeal. The motivation that leads a consumer towards selecting Shangri-La usually involves actively seeking to satisfy the need of luxurious accommodation. In relation to Maslow’s hierarchy of needs, the ad satisfies the psychological, safety and self-esteem needs of consumers. By reminding travelers that Shangri-La will care for travelers as their own, this ad keeps the consumer feeling a sense of safety, which is an important concern in every traveler’s mind. At the same time, while actively motivating them to pursue luxury accommodation, the ad is feeding their self-esteem need of knowing they are capable of affording premium accommodations while traveling, setting them apart from markets that cannot afford so. It is vital for a ad to communicate possible benefits to a consumer as by doing so, they appear more credible and are more able to influence the consumer’s behaviour and choices. Another factor that affects the consumer behaviour in this ad is the subliminal messages it sends. The subliminal message of this ad was intended to cause viewers to think of Shangri-La as the ideal choice while traveling. After a mind picks up a subliminal message, the subconscious mind will tell a person to obey the message the next time he sees something that relates to it. A consumer that has watched the ad will tend to be reminded of Shangri-La when he travels, creating a lasting retention in their minds. Attitude Effects Attitude is a central focus in the fields of advertising and consumer behaviour. Much of research has shown that consumers brand-related beliefs affect brand attitude formation (e. g. , Mitchell Olson 1981) and change. In addition, recent evidence suggests that consumers brand attitudes may be affected by consumers attitudes towards the advertisement themselves. For ad-evoked feelings to become directly associated with a brand, associative mechanisms have to be present. This result could be an effect on the brand attitude or brand choice or both. The Shangri-La ad is an emotional commercial without much information content but evokes thinking and cognitive activity. The feelings of fear, being taken care of and eventually safety that the audience experiences while being exposed to the Shangri-La ad, over time and with multiple exposures, become associated with the Shangri-La hotel. These associated feelings can also change the symbolic meaning that consumers associate with Shangri-La, as it is now seen as not just a hospitality provider but also a part of travelers’ warm experiences. The association of such feelings with the brand leads to Shangri-Las brand imagery and personality, which leads to consumers developing a more positive attitude towards it. This association also directly affects the attitude and buying behaviour that travelers have toward the brand. Conclusion In a nutshell, the advertisement has proven to be a huge success. Having incorporated the use of mass media theories seamlessly into the ad itself was tantamount to having half the battle won. The final pieces of the jigsaw was fitted when Shangri-La went spot on with their intended target audience as well as excellent placement for their ads. Suffice to say, the burgeoning reputation of Shangri-La has allowed the versatility in their advertisements. It is noticeable that throughout the ad, there is not any one time that Shangri-La had to showcase their facilities or services they provide simply because the masses have already instilled in their minds that the company is in a distinguished class of its own. This unconventional way of driving a particular message across to viewers instead of the typical flaunting and showcasing of products and services brings about something fresh to the advertising scene enables them to take a bigger leap forward in drilling the intended message across to the audience.

Friday, November 15, 2019

HIV and AIDS - We are Close to a Cure :: STD, HIV, AIDS

HIV and AIDS - We are Close to a Cure AIDS is a major disease that has threatened the world's population but many scientists believe that a cure is in sight. These scientists say they have developed a vaccine that will cure a dying AIDS patient. They also believe that have created a vaccine that will prevent a person from contracting the virus. AIDS stands for Acquired Immunodeficiency Syndrome. Acquired stands for that the disease is not hereditary but develops after birth from contact with a disease causing agent in this case, HIV. Immunodeficiency means that the disease is characterized by a weakening of the immune system. Syndrome means a group of symptoms that collectively indicate or characterize a disease. In AIDS this can include the development of certain infections and cancers, as well as a decrease in the number of certain cells in a person?s immune system (What is AIDS). HIV is transmitted in many different ways. It can be spread by sexual contact with an infected person, or by sharing needles. It is less common now because blood is now screened for the virus through blood transfusion. Babies that are born to HIV infected women may become infected before or during birth or through breast-feeding. Doctors and nurses have also been infected at the work place. They can be infected by being stuck with a needle containing HIV-infected blood. Sometimes workers can get infected through open wounds. There is only one case in the U.S. in which a patient has been infected by the worker (HIV and Its Transmission). This involved one infected dentist infecting six of his patients. Some people fear that HIV might be transmitted in other ways, but there is no proof to support it. If HIV was being transmitted through other common ways such as through the air, water, or insects the cases of HIV and AIDS cases would be much higher than they already are (HIV and Its Transmission). Many people are ashamed to admit to family and, loved ones that they are infected or may be infected. For example, Monica was fifteen years old when she became infected. She wrote about how she became infected ?My best friend who is a male has AIDS and we were really close so one night we experimented and after the fact that we did it he told me he had AIDS. I was so angry at him and scared.

Tuesday, November 12, 2019

9 Tips for Public Speaking

I remember the very first time I have to give a public speech. That was an amazing experience because I’ve never have that feeling before in my entire life, it’s the feeling of fear, stress, worry, nervous all mixed up together. Especially the 10 minutes before the presentation, it was absolute heart irritating. Public speaking is a common source of stress for everyone. Many of us would like to avoid this problem entirely, but this is hard to do. Whether we work alone or with large numbers of people, eventually we will need to speak in public to get certain tasks accomplished. And if we want to be leaders or achieve anything meaningful in our lives, we will often need to speak to groups, large and small, to be successful. The truth about public speaking, however, is IT DOES NOT HAVE TO BE STRESSFUL! If you correctly understand the hidden causes of public speaking stress, and if you keep just a few key principles in mind, speaking in public will soon become an invigorating and satisfying experience for you. Here’s My 9 Tips For Public Speaking : 1. Be organized and be prepared – When someone are giving a presentation about crap, you’ll know how much effort he put into the preparation of the presentation. This is the crucial step for a successful public speaking, organize and prepare all your material. For first timer you might want to write every single word out or you can highlight the important to helps remind you of the content. 2. Keep it simple – You do not want to create confusion in you presentation, so clarify everything by speaking straight to the point. 3.Practice your talk – Practice your speech in front of a full body size mirror. Take extra attention on your voice tone, body language and expression of your face. Make sure it is comfortable, natural and interesting. 4. Relax – Never, never, never get too nervous about public speaking. Try to think positive instead of worrying. Getting nervous may cause you to forget about your speech or making some mistakes on your presentation. 5. Arrive earlier – Make it early to the place where you are going to give the speech, clam down yourself, feel and get used to the atmosphere. . Never apologize for being nervous – This is the dumbest thing you can say in your presentation. The reason you are up there to give a speech is to have the audience listen to you, and to achieve that you must first gain their trust with your confidence. Saying that will only terminate all the attention because nobody wants to listen to newbie. 7. Be aware of your audiences – How do your audience respond to your presentation? Are they smiling when listening to you? Or maybe laughing? Or are they yawning?. You must be aware of this, if they are yawning or starting to lose the attention already, you might need a 5 minute break to awake them and then continue after that. 8. Answering Question – People might have some question about the topic of your presentation, ask questions at the end of your speech. Answer what is questioned, do not get off-topic. This is the time to gain more trust of your audience by showing your expertise.

Sunday, November 10, 2019

Apartment – title

CHAPTER 1 INTRODUCTION Rationale Every individual has the desire to live in a peaceful manner and in a secured way. Apartment is one of the most profitable establishments here in Cebu City for the number of people came from provinces keeps on increasing. Living in an uncertain world, apartment’s owners want to maintain safety measures in their firms and occupants might as well want to be secured. Encroachment is an issue nowadays. It is an act of illegal entry without any permission from the owners/occupants to a specified area.Furthermore, it often resulted to theft, burglary and intrusion. To get rid of this issue, the group proposes this system which is to maintain the security of the apartments via biometrics. With this system, encroachment issue will be avoided for without the presence of the occupants, no one can enter the apartment. Theoretical Background According to Harbron (1988), one way of attaining security of a certain area is by means of biometrics. Jain et. al. (1999) identified that biometric system can operate verification and identification mode.It is very important to make our place secured in many aspects to prevent from encroachment issues. According to statistics, more than 30% of the burglars have gained access into apartments, through an open door or window. (http://www. buzzle. com/articles/security-alarm-systems-for-apartments. html). Flordelis, Timothy Jake B. et. al. (2005) confirmed that there are problems that occupants and owners experienced these are theft, intrusion, and burglary, which considered being encroachment. Lao, Excio Erving Jr. A. et. al. 2003) explained that by using home automation system, one can make several or all of the systems and devices in home work automatically to provide more security, safety, and convenience. It inspires the group to make this Apartment Security System via Biometrics that will enhance the existing one in securing the Apartments. In Apartment Security System via Biometrics, all roo ms should be networked to the server. According to Clark et. al. (1985), a network is a collection of processors and terminals that serves more than one user at a time by communication.Biometrics Theory Biometric identification technologies (the automatic recognition of individuals based on physical and/or behavioral characteristics) date back over 50 years to the earliest digital computers. Over the last two decades, biometric identification devices have become faster, cheaper, and more reliable, allowing for a variety of applications. This course looks at the history, theory, algorithms, applications, and standards of biometric recognition, including voice, iris, face, hand, and fingerprint identification.Test protocols, system design, and error rate prediction are discussed, along with the implications of the technology for personal privacy. 1. Abstract One of the most critical issues to solve when building multi-accessible systems, such as computer applications, cars or physical buildings, is to determine the identity of a person. A system protecting confidential information, or items of value, puts strong security demands on the identification. Biometry provides us with a user-friendly method for this identification and is becoming a competitor for current identification mechanisms, especially for electronic transactions.However, there are ways to compromise a system based on biometric verification. This article focuses on the drawbacks and risks of biometric verification, specifically verification based on fingerprints. It shows how all currently available fingerprint scanners can be fooled by dummies that are created with very limited means and skills. This article should be read as a warning to those thinking of using new methods of identification without first examining the technical opportunities for compromising the identification mechanism and the associated legal consequences.This is especially true for people working with smart cards since it is quite common to store fingerprints on smart cards and due to the developments in solid state fingerprint scanners, integration of a fingerprint scanner on a smart card is possible. 2. Information Identification systems based on biometrics are capable of identifying persons on the basis either physical or behavioural characteristics. Currently, there are over ten different techniques available to identify a person based on biometrics.The following techniques are applied within the main categories physical and behavioural characteristics: |Behavioral characteristics                      |Physical characteristics | |keystrokes dynamics |iris recognition | |voice recognition |retina recognition | |signature dynamics |vein pattern recognition | | |face recognition | | |recognition of hand or finger geometry | | |fingerprint recognition | Before a system is able to verify the specific biometrics of a person, it of course requires something to compare it with. Therefore, a p rofile or template containing the biometrical properties is stored in the system. Recording the characteristics of a person is called enrolment. In order to get a profile that corresponds most with reality, the biometrical. characteristics are scanned several times. In case of fingerprint recognition the finger is scanned three to four times to get a profile that is independent of variations that occur in practice, such as the angle of placement of the finger on the scanner.Since storage capacity for the profiles in these systems is usually limited (for example if used in combination with smart cards), it is common to use data compression before storing the profile. Storing profiles in tokens requires a combination of token and biometry for verification and therefore gives a higher level of security. When a biometrical verification is to occur, a scan of the biometrics of a person is made and compared with the characteristics that are stored in the profile. In general, a certain mar gin of error is allowed between the observed and stored characteristics. If this margin is too small, the system will reject a righteous person more often while if this margin is too large, malicious persons will be accepted by the system.The probabilities that a righteous person will be rejected and that a malicious person will be accepted, are called False Reject Rate (FRR) and False Accept Rate (FAR) respectively. When using a biometric system, one would of course want to minimise both rates, but unfortunately these are not independent. An optimum trade-off between FRR and FAR has to be found with respect to the application. 3. Biometric Identification In this chapter the techniques for fingerprint identification will be explored. After explaining the theory of fingerprint verification, all current scanning technologies are described in more detail. Once it is known how these scanners identify a person by means of a fingerprint, two methods to counterfeit fingerprints are shown.A ll additional methods implemented by scanner manufacturers to prevent counterfeits from being successful are also described together with proposed methods how these systems could also be fooled into accepting dummy fingerprints. The consequences for systems using fingerprint verification are discussed at the end of the chapter. First, an example for fingerprint verification from practice will be given. This example also illustrates how difficult it can be to find an optimum trade-off between FAR and FRR. From a security point of view, one would want to have the FAR as small as possible. However, for acceptance of a biometry system, a large FRR is worse. Case: Within the car industry a biometric verification system is under evaluation.Manufacturers of expensive cars are considering using fingerprint recognition as a requirement for ignition of the engine. To arm against car theft, the FAR should be as small as possible. On the other hand, suppose that the righteous owner of a car can not use his car because his fingerprint is rejected (i. e. FRR is too high). He will consider this to be a much more serious flaw in the system than a technical failure which prevents the car from being started. This is especially true if he compares the advantages of this system with this rejection: the advantages are that the driver does not (necessarily) have to have a key to his car and a perception of higher security with respect to theft of his car. Whether indeed the security improves is questionable.Right now, we do not see car thieves trying to copy the key of your car, instead they try to by-pass the ignition mechanism where the car key is involved. Furthermore, as this article will show, it might decrease security since it is fairly easy and cheap to copy a fingerprint from a person, even without the person knowing this. 3. 1 Theory of Fingerprint Verification The skin on the inside of a finger is covered with a pattern of ridges and valleys. Already centuries ago it was studied whether these patterns were different for every individual, and indeed every person is believed to have unique fingerprints. This makes fingerprints suitable for verification of the identity of their owner.Although some fingerprint recognition systems do the comparison on the basis of actual recognition of the pattern, most systems use only specific characteristics in the pattern of ridges. These characteristics are a consequence from the fact that the papillary ridges in the fingerprint pattern are not continuous lines but lines that end, split into forks (called bifurcation), or form an island. These special points are called minutiae and, although in general a fingerprint contains about a hundred minutiae, the fingerprint area that is scanned by a sensor usually contains about 30 to 40 minutiae. For over hundred years law enforcement agencies all over the world use minutiae to accurately identify persons .For a positive identification that stands in European courts at lea st 12 minutiae have to be identified in the fingerprint. The choice of 12 minutiae is often referred to as â€Å"the 12 point rule†. This 12 point rule is not based on statistical calculations but is empirically defined based on the assumption that, even when a population of tens of millions of persons are considered, no two persons will have 12 coinciding minutiae in their fingerprints. Most commercially available fingerprint scanners give a positive match when 8 minutiae are found. Manufacturers claim a FAR of one in a million based on these 8 minutiae, which seems reasonable. 3. 2 Fingerprint Scanning Technologies Technologies for scanning fingerprints have evolved over the past years.The traditional method which is used by law enforcement agencies for over a hundred years now is making a copy of the print that is found at a crime scene or any other location and manually examining it to find minutiae. These minutiae are compared with prints from a database or specific ink prints, which could be taken at a later time. This method is of course based on the fact that the person who left the fingerprints is not co-operating by placing his finger on a fingerprint scanner. For systems that are commercially available (and deployed) people are required to co-operate in order to gain access to whatever is protected by the verification system. The first generation fingerprint scanners appeared on the market in the mid eighties, so the technology is about fifteen years old.Over the past few years the technology for scanning fingerprints for commercial purposes has evolved a lot. While the first generation sensors used optical techniques to scan the finger, current generation sensors are based on a variety of techniques. The following techniques are deployed in commercial products that are currently available: †¢ Optical sensors with CCD or CMOS cameras †¢ Ultrasonic sensors †¢ Solid state electric field sensors †¢ Solid state capacitive sens ors †¢ Solid state temperature sensors The techniques will be described in greater detail in this section. The solid state sensors are so small that they can be built into virtually any machine.Currently a sensor is in development that will be built in a plastic card the size of a credit card, not only with respect to length and width but also with respect to thickness! It is clear that this type of sensor will give a boost to the number of applications using fingerprint technology. (http://cryptome. org/fake-prints. htm) THE PROBLEM Statement of the Problem Encroachment has been an issue in our industry. It could not be resolved unless there are security systems. This study aims to secure every room in any apartment eliminating strangers to get into one’s room without the presence of any occupant. This study is further concerned with the following issues: 1.What are the existing systems used to maintain security of the apartments? 2. What are the problems encountered by the occupants of the apartments? 3. What are the advantages of this Apartment Security System among the existing systems? 4. What are the technological features in this Apartment Security System? Statistics The number of residential burglaries recorded increased 0. 7% from 27,347 in 2009/2010 to 27,531 in 2010/2011. Burglary (residential) had a clearance rate of 12. 4% during 2010/2011, 1. 6 percentage points lower than that of 2009/2010. Reported Residential Burglary in the Philippines as of 2007 [pic]Figure 1. 1 Burglary (residential) Graph Significance of the StudyTrespassing has been a concern in our society, to put an end this issue, this Apartment Security System must be realized. Apartment is the most profitable business establishment businessmen could ever have. Hence, such establishments must be secured all the time. Security systems are not just luxury in an Apartment, it is a necessity to maintain security and to be able to prevent from encroachment issues such as burgla ry, intrusion, theft, etc. If there is security system in the apartment, then both owners and boarders will benefit the system. The boarders will feel comfortable living in the apartment with such system, and will not encounter encroachment issues, hence the boarders will live peacefully and live longer in that certain apartment.A boarder who stays in the apartment long enough is an indication that he trusted the system that runs in the apartment. So, it is an advantage on the owner’s side because, aside from the fact that no intruder can get access to his establishment, it is a big income if the boarders stayed longer in his apartment. Scope and Limitation The project focuses more on the security systems. The project identified the occupants of the apartment by means of fingerprint identification through biometrics. This project already exists, the only difference is that the group applied the system in every room which makes the system expensive enough for it requires every apartment a single biometrics. The group pilots only two rooms for demonstration purposes.The system is capable of identifying occupants to the extent that it alarms whenever an intruder reached the maximum tries of fingerprint identifying. The project could not cater occupants who are disabled (do not have fingers). RESEARCH METHODOLOGY Methodology is generally a guideline for solving a problem, with specific components such as phases, tasks, methods, techniques and tools. The group uses applied research and makes use of various techniques and tools in conducting this research. Research Environment The group will conduct the survey in the apartment where there are tenants and an owner. The purpose of our survey is to determine what are their concerned about the security of their apartment. Number of apartments and dormitories surveyed: 21Number of owners interviewed: 3 Number of workers interviewed: 18 Number of boarders interviewed: 100 Example of apartment’s and dormitori es surveyed: Kim Kathleen’s House for ladies – Brgy. Cabancalan, Mandaue City Engr. Bing Momo Europa Apartelle and Dormitory- Brgy. Cabancalan, Mandaue City â€Å"Patoy† Saint Joseph Dormitory – Lopez Jaena St. , Mandaue City â€Å"Ma’am Earl Joy† Pink Dormitory- Brgy. Pitogo Consolacion â€Å"Dioscor Jamisola† Research Respondents The people to be conducted by the group are the apartment tenants and the owner for they are the stakeholder of the system. The group will use the simple random sampling technique in getting the number of respondents.Research Instruments The data gathering is employed through the use of the questionnaire and supplemented with some data analysis of published, unpublished thesis and some article Research Procedure Gathering Data The team gathered the data through the formulated questionnaire which was distributed in the apartments, hotel, boarding house and school to identify the views of the respondents. Tre atment of Data Based on the questionnaire, the team construct, analyze, and interpret. The team will use the following formula. n = N 1 + N e Where: n = sample size N = population size e = desire margin of error DEFINITION OF TERMS Project Design A project that is being put into reality by a group of designer. Designers – A group of individuals that is tasked to develop the project design. Hardware – The physical components of a computer system, including any peripheral equipment such as printers, modem and mouse. Software – Computer programs are referred to as software. Feature – Is a unique, attractive, or desirable property of a program or of a computer or other hardware. Microcontroller – A highly integrated chip contains all the components comprising a controller. Server – A computer system that consist of database and other information of it a device that manages network resource. Circuit A combination of electrical or electronics comp onents, interconnected to perform one or more specific functions. Breadboard – A fiberboard used by electronic circuit designers to build experimental circuits and prototypes. Relay – Is an electrical switch that opens and closes under the control of another electrical circuit. Transistor – Is a semiconductor device, commonly used to amplify or switch electronic signals. Serial Communication – Is the process of sending data one bit at one time, sequentially, over a communication channel or computer bus. This is in contrast to parallel communication, where all the bits of each symbols are sent together. Flowchart A diagram representing the logical sequence in which a combination of steps or operation is to be perform. Program Flowchart – Describes graphically in detail the logical operation and steps with in a program and the sequence in which these steps are to be executed to the transformation of data to produce the needed output. System Flowchart – Graphic representation of the procedure involved in converting data or media to data in output form. CHAPTER 2 PRESENTATION, ANALYSIS AND INTERPRETATION OF DATA This chapter focuses more on the data gathered in order for the proponents to further understand the importance of the project. The gathered data is being analyzed so that the group will be aware of the standards or the expectations of the mass.It is then interpreted by making graphs such as pie graph and bar graph to easily visualize the results of the conducted survey. The Figure 2. 1 shows that most of the group’s research respondents are the Occupant of the Apartment with fifty – eight percent (58%). The group conducted this research in the apartment’s occupant because they are the ones who will be benefiting the project aside from the Apartment owners. Their opinions and suggestions are very significant in making our project a successful one. The Figure 2. 2 shows that sixty four percent ( 64%) of the respondents has security systems in their respective apartments. But there are thirty six percent (36%) of the respondents who are living in an apartment with no security. CHAPTER 3Technical Aspects of the Systems This chapter contains the summary of the software and components used in the project in order for the readers to examine how the project was made. System Flowchart is the interpretation of how the project runs from start to end. The Program Flowchart is the interpretation of how the user interfaces with the users. The Block Diagram is how the project composed of. And the Source Code it is the program used of how the project runs with. [pic] Figure 3. 1 – System Flowchart [pic] Figure 3. 2 – System Flowchart [pic] Figure 3. 3 – Program Flowchart [pic] Figure 3. 4 – Program Flowchart [pic] Figure 3. 5 – Program Flowchart [pic] Figure 3. – Program Flowchart [pic] Figure 3. 7 – Program Flowchart System Block Diagram †¢ For Fingerprint Scanner [pic] Figure 3. 8 – System Block Diagram For Fingerprint Scanner †¢ For the whole system [pic] Figure 3. 9 – System Block Diagram For the whole System Schematic Diagram The schematic diagram is the design which shows how the desired components are being connected to each other. Figure shows the schematic diagram of our design. [pic] Figure 3. 10 – Schematic Diagram Design Components Software Design Proteus 7 ISIS Professional The Proteus Professional demonstration is intended for prospective customers who wish to evaluate our professional level products.It differs from Proteus Lite in that it does not allow you to save, print or design your own microcontroller based designs (you can however write your own software programs to run on the existing sample design suite for evaluation), but does include all features offered by the professional system including netlist based PCB design with auto-placement, auto-routing and graph b ased simulation .[pic] Figure 3. 11 – Proteus 7 ISIS Professional MikroC The group decided to use MicroC Compiler because it is a C complier for PIC. It is designed to provide the customer with the easiest possible solution for developing applications for embedded system without compromising performance or control. MikroC allows quickly develop and deploy complex applications. [pic] Figure 3. 12 – MikroC VB6. 0 [pic] Figure 3. 3 – VB6. 0 Visual Basic (VB) is a third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its COM programming model first released in 1991. Visual Basic is designed to be relatively easy to learn and use. Visual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects. Script ing languages such as VBA and VBScript are syntactically similar to Visual Basic, but perform differently.A programmer can put together an application using the components provided with Visual Basic itself. Programs written in Visual Basic can also use the Windows API, but doing so requires external function declarations. Though the program has received criticism for its perceived faults, from version 3 Visual Basic was a runaway commercial success,and many companies offered third party controls greatly extending its functionality. The final release was version 6 in 1998. Microsoft's extended support ended in March 2008 and the designated successor was Visual Basic . NET (now known simply as Visual Basic). Hardware Components PIC 16F877A Microcontroller [pic] Figure 3. 14 – PIC 16F877AA PIC (Peripheral Interface Controller) microcontroller is an IC manufactured by Microchip. These ICs are complete computers in a single package. The only external components necessary are whate ver is required by the I/O devices that are connected to the PIC. A microcontroller is a small computer and it can only perform simple task. Microcontroller consists of: †¢ Processor that executes the program †¢ Program memory to store the program that has been compiled successfully by the programmer. †¢ Ram (random-access memory) to store â€Å"variables. † †¢ IO Port to connect sensor, keypad, LED and so on. Crystal Oscillator [pic] Figure 3. 15 – Crystal OscillatorA  crystal oscillator  is an  electronic oscillator  circuit that uses the mechanical  resonance  of a vibrating  crystal  of  piezoelectric material  to create an electrical signal with a very precise  frequency. This frequency is commonly used to keep track of time (as in  quartz wristwatches), to provide a stable  clock signal  for digital  integrated circuits, and to stabilize frequencies for  radio transmitters  and  receivers. The most common ty pe of piezoelectric resonator used is the quartz crystal, so oscillator circuits designed around them became known as â€Å"crystal oscillators. † Relay [pic] Figure 3. 16 – Relay A  relay  is an  electrically  operated  switch. Many relays use an  electromagnet  to operate a switching mechanism mechanically, but other operating principles are also used.Relays are used where it is necessary to control a circuit by a low-power signal (with complete electrical isolation between control and controlled circuits), or where several circuits must be controlled by one signal. The first relays were used in long distance telegraph circuits, repeating the signal coming in from one circuit and re-transmitting it to another. Relays were used extensively in telephone exchanges and early computers to perform logical operations. Resistor [pic] Figure 3. 17 – Resistor Typical 10K ohm, 1/4 watt resistor that can be used with various circuits. The color band on the r esistor is Brown, Black, Orange, Gold. Diode [pic] Figure 3. 18 – DiodeDiodes allow electricity to flow in only one direction. The arrow of the circuit symbol shows the direction in which the current can flow. Diodes are the electrical version of a valve and early diodes were actually called valves. Regulator [pic] Figure 3. 19 – Regulator Encapsulated in a single chip/package (IC), the  7805  is a positive voltage DC  regulator  that has only 3 terminals. They are: Input voltage, Ground, Output Voltage. Transistor [pic] Figure 3. 20 – Transistor Transistor is a â€Å"CURRENT† operated device which has a very large amount of current (Ic) which flows without restraint through the device between the  collector  and emitter terminals.But this is only possible if a small amount of biasing current (Ib) is  present  in the base terminal of the transistor making the base to act as a current control input. LED (Light Emitting Diode) [pic] Figure 3 . 21 – LED A light-emitting diode (LED) is a semiconductor light source. LEDs are used as indicator lamps in many devices, and are increasingly used for lighting. Introduced as a practical electronic component in 1962,[2] early LEDs emitted low-intensity red light, but modern versions are available across the visible, ultraviolet and infrared wavelengths, with very high brightness. DCU 11 [pic] Figure 3. 22 – DCU 11 The cable incorporates a charger port to charge the phone while the cable is in use, and your phone’s built-in modem brings the Web and email to your PC.The widely accepted USB standard and high-speed data transfer make this cable the ideal link from your phone to your PC. †¢ USB connector Fingerprint Scanner [pic] Figure 3. 23 – Fingerprint Scanner Fingerprint recognition  or  fingerprint authentication  refers to the  automated  method of verifying a match between two human  fingerprints. Fingerprints are one of many forms o f  biometrics  used to  identify  individuals and  verify  their  identity. This article touches on two major classes of  algorithms  (minutia and pattern) and four  sensor  designs (optical, ultrasonic, passive capacitance, and active capacitance). Power Supply [pic] Figure 3. 24 – Power Supply A  power supply  is a device that supplies  electrical  energy  to one or more  electric loads.The term is most commonly applied to devices that convert one form of electrical energy to another, though it may also refer to devices that convert another form of energy (e. g. , mechanical, chemical, solar) to electrical energy. A  regulated power supply  is one that controls the output voltage or current to a specific value; the controlled value is held nearly constant despite variations in either load current or the voltage supplied by the power supply's energy source. Program Source Code MikroC char ch; void main() { PORTB = 0x00; TRISB = 0x00; TRI SC = 0x80; PORTC = 0; Usart_Init(9600); delay_ms(100); while(1) { if(Usart_Data_Ready()) { ch = Usart_Read(); if(ch == ‘1') { PORTC. F0 = 1; elay_ms(5000); PORTC. F0 = 0; ch=''; } if(ch == ‘2') { PORTC. F1 = 1; delay_ms(8000); PORTC. F1 = 0; ch=''; } } PORTB = 0x00; } VB6. 0 â€Å"Enrollment† Dim WithEvents Capture As DPFPCapture Dim CreateFtrs As DPFPFeatureExtraction Dim CreateTempl As DPFPEnrollment Dim ConvertSample As DPFPSampleConversion Private Sub DrawPicture(ByVal Pict As IPictureDisp) ‘ Must use hidden PictureBox to easily resize picture. Set HiddenPict. Picture = Pict Picture1. PaintPicture HiddenPict. Picture, _ 0, 0, Picture1. ScaleWidth, _ Picture1. ScaleHeight, _ 0, 0, HiddenPict. ScaleWidth, _ HiddenPict. ScaleHeight, vbSrcCopy Picture1. Picture = Picture1. Image End SubPrivate Sub ReportStatus(ByVal str As String) Status. AddItem (str) ‘ Add string to list box. Status. ListIndex = Status. NewIndex ‘ Move list box selection down. End Sub Private Sub Close_Click() Capture. StopCapture ‘ Stop capture operation. Unload Me End Sub Private Sub Form_Load() Set Capture = New DPFPCapture ‘ Create capture operation. Capture. StartCapture ‘ Start capture operation. Set CreateFtrs = New DPFPFeatureExtraction ‘ Create DPFPFeatureExtraction object. Set CreateTempl = New DPFPEnrollment ‘ Create DPFPEnrollment object. Samples. Caption = CreateTempl.FeaturesNeeded ‘ Show number of samples needed. Set ConvertSample = New DPFPSampleConversion ‘ Create DPFPSampleConversion object. End Sub Private Sub Capture_OnReaderConnect(ByVal ReaderSerNum As String) ReportStatus (â€Å"The fingerprint reader was connected. â€Å") End Sub Private Sub Capture_OnReaderDisconnect(ByVal ReaderSerNum As String) ReportStatus (â€Å"The fingerprint reader was disconnected. â€Å") End Sub Private Sub Capture_OnFingerTouch(ByVal ReaderSerNum As String) ReportStatus (â€Å"The fingerprint reader was to uched. â€Å") End Sub Private Sub Capture_OnFingerGone(ByVal ReaderSerNum As String) ReportStatus (â€Å"The finger was removed from the fingerprint reader. â€Å") End SubPrivate Sub Capture_OnSampleQuality(ByVal ReaderSerNum As String, ByVal Feedback As DPFPCaptureFeedbackEnum) If Feedback = CaptureFeedbackGood Then ReportStatus (â€Å"The quality of the fingerprint sample is good. â€Å") Else ReportStatus (â€Å"The quality of the fingerprint sample is poor. â€Å") End If End Sub Private Sub Capture_OnComplete(ByVal ReaderSerNum As String, ByVal Sample As Object) Dim Feedback As DPFPCaptureFeedbackEnum ReportStatus (â€Å"The fingerprint sample was captured. â€Å") ‘ Draw fingerprint image. DrawPicture ConvertSample. ConvertToPicture(Sample) ‘ Process sample and create feature set for purpose of enrollment. Feedback = CreateFtrs.CreateFeatureSet(Sample, DataPurposeEnrollment) ‘ Quality of sample is not good enough to produce feature set. If Feedback = CaptureFeedbackGood Then ReportStatus (â€Å"The fingerprint feature set was created. â€Å") Prompt. Caption = â€Å"Touch the fingerprint reader again with the same finger. † ‘ Add feature set to template. CreateTempl. AddFeatures CreateFtrs. FeatureSet ‘ Show number of samples needed to complete template. Samples. Caption = CreateTempl. FeaturesNeeded If Val(Samples. Caption) = 0 Then MainFrame. Picture1. Visible = True Else MainFrame. Picture1. Visible = False End If ‘ Check if template has been created. If CreateTempl.TemplateStatus = TemplateStatusTemplateReady Then MainFrame. SetTemplete CreateTempl. Template ‘ Template has been created, so stop capturing samples. Capture. StopCapture Prompt. Caption = â€Å"Click Close, and then click Fingerprint Verification. † MsgBox â€Å"The fingerprint template was created. † End If End If End Sub Private Sub Form_Unload(Cancel As Integer) Capture. StopCapture ‘ Stop capture operat ion End Sub â€Å"frmFlash† Option Explicit Dim i As Integer Private Declare Sub Sleep Lib â€Å"kernel32† (ByVal dwMilliseconds As Long) Private Sub Form_Activate() For i = 0 To 10 i = i + 1 Sleep (500) Me. Refresh Next Unload Me frmStandbyMode. Show End Sub â€Å"frmInventory†Private Function ConnectDB() As String ConnectDB = â€Å"DRIVER={MySQL ODBC 5. 1 Driver}; SERVER = localhost; DATABASE = db_AMASS; USER = root; PASSWORD = †;† End Function Private Sub cmdPayDue_Click() Set rsPay = New ADODB. Recordset rsPay. CursorLocation = adUseClient rsPay. CursorType = adOpenDynamic rsPay. LockType = adLockOptimistic ‘rsPay. Open â€Å"SELECT * FROM tbl_registration†, ConnectDB rsPay. Open â€Å"select * from tbl_registration where FullName = ‘† & txtPay. Text & â€Å"‘†, ConnectDB If rsPay. EOF = False Then ‘With rsPay ‘rsPay. MoveFirst ‘ While rsPay. EOF = False ‘ If txtPay. Text = rsPay! Fu llName Then If MsgBox(â€Å"Continue paying his due? , vbInformation + vbYesNo, â€Å"Apartment Monitoring and Security System – Paying Due†) = vbYes Then rsPay! ToPay = rsPay! ToPay + rsPay! Payment rsPay. Update List_Unpaid. Clear Call query_list ‘ rsPay. MoveNext ‘ Else: rsPay. MoveNext End If ‘ Else: rsPay. MoveNext ‘ End If ‘ Wend ‘End With End If End Sub Private Sub cmdPrint_Click() Set rst = New ADODB. Recordset rst. CursorLocation = adUseClient rst. CursorType = adOpenDynamic rst. LockType = adLockOptimistic rst. Open â€Å"select * from tbl_registration†, ConnectDB Set GuestReport. DataSource = rst. DataSource GuestReport. ReportWidth = 6000 GuestReport. Show End SubPrivate Sub cmdPrintLogs_Click() Set rst = New ADODB. Recordset rst. CursorLocation = adUseClient rst. CursorType = adOpenDynamic rst. LockType = adLockOptimistic rst. Open â€Å"select * from tbl_logs where FullName = ‘† & txtPay. Text & â⠂¬Å"‘†, ConnectDB If rst. EOF = False Then Set GuestLogs. DataSource = rst. DataSource GuestLogs. ReportWidth = 5000 GuestLogs. Show End If End Sub Private Sub Command1_Click() Unload Me Load MainFrame End Sub Private Sub Form_Load() txtPay. Text = â€Å"† Set rsViewInventory = New ADODB. Recordset rsViewInventory. CursorLocation = adUseClient rsViewInventory. CursorType = adOpenDynamic rsViewInventory. LockType = adLockOptimistic rsViewInventory.Open â€Å"SELECT * FROM tbl_registration ORDER BY RoomNumber ASC†, ConnectDB Set dgGuestInventory. DataSource = rsViewInventory frmInventory. dgGuestInventory. Columns(0). Visible = False frmInventory. dgGuestInventory. Columns(2). Visible = False frmInventory. dgGuestInventory. Columns(5). Visible = False frmInventory. dgGuestInventory. Columns(7). Visible = False frmInventory. dgGuestInventory. Columns(8). Visible = False frmInventory. dgGuestInventory. Columns(1). Width = 2200 frmInventory. dgGuestInventory. Co lumns(3). Width = 1900 frmInventory. dgGuestInventory. Columns(4). Width = 1600 frmInventory. dgGuestInventory. Columns(6). Width = 1200 If rsViewInventory.EOF = False Then With rsViewInventory rsViewInventory. MoveFirst While rsViewInventory. EOF = False If rsViewInventory. EOF = False Then txtBayadHolder. Text = rsViewInventory! ToPay txtBayadUtang. Text = Val(txtBayadUtang. Text) + Val(txtBayadHolder. Text) ‘rsViewInventory! ToPay rsViewInventory. MoveNext End If Wend End With Dim rsUpdateNah As New ADODB. Recordset rsUpdateNah. CursorLocation = adUseClient rsUpdateNah. CursorType = adOpenDynamic rsUpdateNah. LockType = adLockOptimistic rsUpdateNah. Open â€Å"SELECT * FROM tbl_inventory†, ConnectDB If txtBayadUtang. Text = rsUpdateNah! Total Then txtBayadUtang.Text = â€Å"Php † & FormatNumber(rsUpdateNah! Total) Else Dim rsUpdateNahh As New ADODB. Recordset rsUpdateNahh. CursorLocation = adUseClient rsUpdateNahh. CursorType = adOpenDynamic rsUpdateNahh. Lock Type = adLockOptimistic rsUpdateNahh. Open â€Å"SELECT * FROM tbl_inventory†, ConnectDB rsUpdateNahh! Total = txtBayadUtang. Text rsUpdateNahh. Update rsUpdateNahh. Close txtBayadUtang. Text = â€Å"Php † & FormatNumber(txtBayadUtang. Text) End If End If Call query_list End Sub Private Sub txtPay_Change() If txtPay. Text â€Å"† Then cmdPayDue. Enabled = True cmdPrintLogs. Enabled = True End If End Sub Public Function query_list() Dim rsViewUnpaid As New ADODB. Recordset rsViewUnpaid.CursorLocation = adUseClient rsViewUnpaid. CursorType = adOpenDynamic rsViewUnpaid. LockType = adLockOptimistic rsViewUnpaid. Open â€Å"SELECT * FROM tbl_registration†, ConnectDB If rsViewUnpaid. EOF = False Then With rsViewUnpaid List_Unpaid. AddItem â€Å"Name's† & vbTab & vbTab & vbTab & â€Å"To Pay† List_Unpaid. AddItem â€Å"† rsViewUnpaid. MoveFirst While rsViewUnpaid. EOF = False If rsViewUnpaid! ToPay = 0 Then txtBayadHolder. Text = rsViewUnpai d! FirstName & † † & rsViewUnpaid! LastName & vbTab & vbTab & â€Å"Php † & FormatNumber(rsViewUnpaid! Payment) List_Unpaid. AddItem txtBayadHolder. Text rsViewUnpaid. MoveNext Else: rsViewUnpaid.MoveNext End If Wend End With End If End Function â€Å"frmLogin† Private Declare Function sndPlaySound Lib â€Å"winmm. dll† Alias â€Å"sndPlaySoundA† _ (ByVal lpszSoundName As String, ByVal uFlags As Long) As Long Const SND_SYNC = &H0 Const SND_NODEFAULT = &H2 Private Function ConnectDB() As String ConnectDB = â€Å"DRIVER={MySQL ODBC 5. 1 Driver}; SERVER = localhost; DATABASE = db_AMASS; USER = root; PASSWORD = †;† End Function Private Sub cmdCancel_Click() Unload Me frmStandbyMode. Enabled = True frmStandbyMode. Show End Sub Private Sub Form_Load() frmStandbyMode. Enabled = False End Sub Private Sub cmdOK_Click() Set recordSetAccount = New ADODB. Recordset ecordSetAccount. CursorLocation = adUseClient recordSetAccount. CursorType = a dOpenDynamic recordSetAccount. LockType = adLockOptimistic recordSetAccount. Open â€Å"tbl_account†, ConnectDB If (frmLogin. txtUserName. Text = â€Å"† And frmLogin. txtPassword. Text = â€Å"†) Then Unload frmLogin Unload frmStandbyMode MainFrame. mnuSearchGuest. Enabled = False MainFrame. mnuAddGuest. Enabled = False MainFrame. Show ElseIf recordSetAccount. EOF = False Then If frmLogin. txtPassword. Text = â€Å"† Then soundfile$ = â€Å"C:Program FilesTitaniumTimekeepersoundsaccess_denied. wav† wFlags% = SND_ASYNC Or SND_NODEFAULT sound = sndPlaySound(soundfile$, wFlags%)MsgBox â€Å"Please input your password. Try again! â€Å", , â€Å"Login† frmLogin. txtPassword. SetFocus ElseIf Not frmLogin. txtPassword. Text = recordSetAccount! Password Then soundfile$ = â€Å"C:Program FilesTitaniumTimekeepersoundsaccess_denied. wav† wFlags% = SND_ASYNC Or SND_NODEFAULT sound = sndPlaySound(soundfile$, wFlags%) MsgBox â€Å"Incorrect pa ssword. Try again! â€Å", , â€Å"Login† frmLogin. txtPassword. SetFocus frmLogin. txtPassword. SelStart = 0 frmLogin. txtPassword. SelLength = Len(frmLogin. txtPassword. Text) ElseIf (frmLogin. txtUserName. Text = recordSetAccount! UserName And frmLogin. txtPassword. Text = recordSetAccount!Password) Then Unload frmLogin Unload frmStandbyMode MainFrame. Show End If Else soundfile$ = â€Å"C:Program FilesTitaniumTimekeepersoundsaccess_denied. wav† wFlags% = SND_ASYNC Or SND_NODEFAULT sound = sndPlaySound(soundfile$, wFlags%) MsgBox â€Å"Not a valid account. Try again! â€Å", , â€Å"Login† frmLogin. txtUserName. SetFocus frmLogin. txtUserName. SelStart = 0 frmLogin. txtUserName. SelLength = Len(frmLogin. txtUserName. Text) End If End Sub â€Å"frmStanbyMode† Private Sub mnuExit_Click() If MsgBox(â€Å"Are you sure you want to exit program? â€Å", vbYesNo + vbInformation, â€Å"Apartment Monitoring and Security System†) = vbYes Then Timer1. Enabled = True End IfEnd Sub Private Sub mnuLogin_Click() frmLogin. Show End Sub Private Sub Timer1_Timer() Label1. Visible = True ProgressBar1. Visible = True If ProgressBar1. Value >= ProgressBar1. Max Then End End If ProgressBar1. Value = ProgressBar1. Value + 1 End Sub â€Å"MainFrame† Dim Templ As DPFPTemplate Private Function ConnectDB() As String ConnectDB = â€Å"DRIVER={MySQL ODBC 5. 1 Driver}; SERVER = localhost; DATABASE = db_AMASS; USER = root; PASSWORD = †;† End Function Private Sub cboRoomChoice_Click() If cboRoomChoice. Text = â€Å"Economy† Then txtIdHolder. Text = 1500 ElseIf cboRoomChoice. Text = â€Å"Standard† Then txtIdHolder. Text = 2000 ElseIf cboRoomChoice.Text = â€Å"Family† Then txtIdHolder. Text = 2500 End If End Sub Private Sub cboRoomNumberDel_Click() dgGuestDelete. Visible = True Set recordSetDelete = New ADODB. Recordset recordSetDelete. CursorLocation = adUseClient recordSetDelete. CursorType = adOpenDynamic recordSetDelete. LockType = adLockOptimistic recordSetDelete. Open â€Å"SELECT * FROM tbl_registration WHERE RoomNumber = ‘† & cboRoomNumberDel. Text & â€Å"‘†, ConnectDB Set dgGuestDelete. DataSource = recordSetDelete MainFrame. dgGuestDelete. Columns(0). Visible = False MainFrame. dgGuestDelete. Columns(2). Visible = False MainFrame. dgGuestDelete. Columns(7). Visible = False MainFrame. dgGuestDelete.Columns(8). Visible = False MainFrame. dgGuestDelete. Columns(1). Width = 2200 MainFrame. dgGuestDelete. Columns(3). Width = 1800 MainFrame. dgGuestDelete. Columns(4). Width = 1800 MainFrame. dgGuestDelete. Columns(6). Width = 1600 MainFrame. dgGuestDelete. Columns(8). Width = 3200 If recordSetDelete. EOF True Then img_box_del. Visible = True img_box_del. Picture = LoadPicture(recordSetDelete! Picture) cmdDeletee. Visible = True cmdEditt. Visible = True cmdOpenSesame. Visible = True Else MsgBox â€Å"This room has no guest yet. â€Å", vbInformation, â₠¬Å"Apartment Monitoring and Security System† img_box_del. Visible = False cmdOpenSesame.Visible = False End If If recordSetDelete. EOF True Then MainFrame. txtIdHolder. Text = recordSetDelete! RoomNumber End If End Sub Private Sub cmdBrowse_Click() CommonDialog1. ShowOpen txtFilePathPic. Text = CommonDialog1. FileName imgbox. Picture = LoadPicture(txtFilePathPic. Text) imgbox. Visible = True End Sub Private Sub cmdClear_Click() Call Clear End Sub Private Sub cmdDeletee_Click() Set rsDelete = New ADODB. Recordset rsDelete. CursorLocation = adUseClient rsDelete. CursorType = adOpenDynamic rsDelete. LockType = adLockOptimistic rsDelete. Open â€Å"SELECT * FROM tbl_registration WHERE FullName = ‘† & MainFrame. txtSearch. Text & â€Å"‘†, ConnectDBIf MsgBox(â€Å"Are you sure you want to delete this Guest?. â€Å", vbYesNo + vbInformation, â€Å"Delete Verification†) = vbYes Then rsDelete. Delete MsgBox â€Å"Guest has been successfully deleted. â€Å", vbInformation, â€Å"Apartment Monitoring and Security System† Set dgGuestDelete. DataSource = Nothing Call Clear End If End Sub Private Sub cmdEditt_Click() Call Clear frameSearchGuest. Visible = False frameRegisterGuest. Visible = True frameRegisterGuest. Caption = â€Å"Edit here†¦ † save. Visible = False Dim rsEditGuestt As New ADODB. Recordset rsEditGuestt. CursorLocation = adUseClient rsEditGuestt. CursorType = adOpenDynamic rsEditGuestt. LockType = adLockOptimistic rsEditGuestt.Open â€Å"SELECT * FROM tbl_registration WHERE FullName = ‘† & MainFrame. txtSearch. Text & â€Å"‘†, ConnectDB txtFirstName. Text = rsEditGuestt! FirstName txtLastName. Text = rsEditGuestt! LastName cboGender. Text = rsEditGuestt! Gender cboRoomChoice. Text = rsEditGuestt! RoomChoice cboRoomNumber. Text = rsEditGuestt! RoomNumber txtFilePathPic. Text = rsEditGuestt! Picture cmdUpdateNah. Visible = True End Sub Private Sub cmdOpenSesame_Click() Se t rsOpen = New ADODB. Recordset rsOpen. CursorLocation = adUseClient rsOpen. CursorType = adOpenDynamic rsOpen. LockType = adLockOptimistic rsOpen. Open â€Å"SELECT * FROM tbl_registration WHERE RoomNumber = ‘† & MainFrame. txtIdHolder. Text & â€Å"‘†, ConnectDB ritePort rsOpen! RoomNumber End Sub Private Sub cmdUpdateNah_Click() Dim rsUpdateNah As New ADODB. Recordset rsUpdateNah. CursorLocation = adUseClient rsUpdateNah. CursorType = adOpenDynamic rsUpdateNah. LockType = adLockOptimistic rsUpdateNah. Open â€Å"tbl_registration WHERE FullName = ‘† & MainFrame. txtSearch. Text & â€Å"‘†, ConnectDB If MsgBox(â€Å"Are you sure you want to update this Guest?. â€Å", vbYesNo + vbInformation, â€Å"Update Verification†) = vbYes Then rsUpdateNah! templates = Templ. Serialize rsUpdateNah! FirstName = txtFirstName. Text rsUpdateNah! LastName = txtLastName. Text rsUpdateNah! Fullname = txtFirstName. Text & † † & t xtLastName.Text rsUpdateNah! Gender = cboGender. Text rsUpdateNah! RoomChoice = cboRoomChoice. Text rsUpdateNah! RoomNumber = cboRoomNumber. Text rsUpdateNah! Picture = txtFilePathPic. Text rsUpdateNah! CompleteDateStarted = Format(cboMonthStarted. Text & â€Å"/† & cboDateStarted & â€Å"/† & cboYearStarted. Text, â€Å"mm/dd/yyyy†) rsUpdateNah! CompleteDueDate = Format(cboDueMonth. Text & â€Å"/† & cboDueDate. Text & â€Å"/† & cboDueYear. Text, â€Å"mm/dd/yyyy†) rsUpdateNah. Update rsUpdateNah. Close MsgBox â€Å"Guest has successfully Updated. â€Å", vbOnly, â€Å"Apartment Monitoring and Security System† Call Clear End If End Sub Private Sub cmeExitAdd_Click() frameRegisterGuest.Visible = False End Sub Private Sub Command2_Click() Dim rsguestview As New ADODB. Recordset If mskDateStarted. Text â€Å"† Then Set rsguestview = New ADODB. Recordset rsguestview. CursorLocation = adUseClient rsguestview. LockType = adLockOp timistic rsguestview. CursorType = adOpenDynamic rsguestview. Open â€Å"Select * from tbl_logs where Date= ‘† & mskDateStarted & â€Å"‘†, ConnectDB Set DataGrid1. DataSource = rsguestview MainFrame. DataGrid1. Columns(0). Width = 2200 Set rsguestview = Nothing End If End Sub Private Sub Enroll_Click() Enrollment. Show vbModal, Me End Sub Public Function GetTemplate() As Object ‘ Template can be empty. If so, then returns Nothing.If Templ Is Nothing Then Else: Set GetTemplate = Templ End If End Function Public Sub SetTemplete(ByVal Template As Object) Set Templ = Template End Sub Private Sub Form_Load() Call Clear Call View Dim blob() As Byte Dim rs As New ADODB. Recordset rs. CursorLocation = adUseClient rs. CursorType = adOpenDynamic rs. LockType = adLockOptimistic rs. Open â€Å"Select * from tbl_registration†, ConnectDB blob = rs! templates ‘set raw image from MySQL database If Templ Is Nothing Then ‘convert raw image to pictur e Set Templ = New DPFPTemplate Templ. Deserialize blob End If End SubPrivate Sub mnuAddGuest_Click() Call Clear flag = 1 save. Visible = True frameRegisterGuest. Caption = â€Å"Register here†¦ † frameRegisterGuest. Visible = True frameSearchGuest. Visible = False frameViewGuest. Visible = False cmdUpdateNah. Visible = False End Sub Private Sub mnuChangeUser_Click() If MsgBox(â€Å"Are you sure you want to logout and change user? â€Å", vbYesNo + vbInformation, â€Å"Apartment Monitoring and Security System†) = vbYes Then Unload Me frmStandbyMode. Show frmLogin. Show End If End Sub Private Sub mnuEditGuest_Click() frameEditGuest. Show End Sub Private Sub mnuInventory_Click() frmInventory. Show End Sub Private Sub mnuLogout_Click()If MsgBox(â€Å"Are you sure you want to exit program? â€Å", vbYesNo + vbInformation, â€Å"Apartment Monitoring and Security System†) = vbYes Then closePort Unload Me frmStandbyMode. Show End If End Sub Private Sub mnuSearc hGuest_Click() frameSearchGuest. Visible = True frameRegisterGuest. Visible = False frameViewGuest. Visible = False txtSearch. Text = â€Å"† cboRoomNumberDel. Text = â€Å"† cmdEditt. Visible = False cmdDeletee. Visible = False cmdOpenSesame. Visible = False img_box_del. Visible = False dgGuestDelete. Visible = False End Sub Private Sub mnuViewGuest_Click() Call View End Sub Private Sub ReadTemplate_Click() Dim blob() As Byte CommonDialog1.Filter = â€Å"Fingerprint Template File|*. fpt† ‘ Set dialog box so an error occurs if dialog box is cancelled. CommonDialog1. CancelError = True On Error Resume Next ‘ Show Open dialog box. CommonDialog1. ShowOpen If Err Then ‘ This code runs if dialog box was cancelled. Exit Sub End If ‘ Read binary data from file. Open CommonDialog1. FileName For Binary As #1 ReDim blob(LOF(1)) Get #1, , blob() Close #1 ‘ Template can be empty, it must be created first. If Templ Is Nothing Then Set Templ = Ne w DPFPTemplate ‘ Import binary data to template. Templ. Deserialize blob End Sub Private Sub save_Click() Dim rsAddGuest As New ADODB. Recordset rsAddGuest.CursorLocation = adUseClient rsAddGuest. CursorType = adOpenDynamic rsAddGuest. LockType = adLockOptimistic rsAddGuest. Open â€Å"tbl_registration†, ConnectDB If txtFirstName. Text = â€Å"† Or txtLastName. Text = â€Å"† Or cboGender. Text = â€Å"† Or cboRoomChoice. Text = â€Å"† Or cboRoomNumber. Text = â€Å"† Or txtFilePathPic. Text = â€Å"† Or cboMonthStarted. Text = â€Å"† Or cboDateStarted. Text = â€Å"† Or cboYearStarted. Text = â€Å"† Or cboDueMonth. Text = â€Å"† Or cboDueDate. Text = â€Å"† Or cboDueYear. Text = â€Å"† Then MsgBox â€Å"Missing Fields. â€Å", vbCritical + vbInformation, â€Å"Apartment Monitoring and Security System† Else If MsgBox(â€Å"Are you sure you want to add this Guest?. , vbYes No + vbInformation, â€Å"Delete Verification†) = vbYes Then rsAddGuest. AddNew rsAddGuest! templates = Templ. Serialize rsAddGuest! FirstName = txtFirstName. Text rsAddGuest! LastName = txtLastName. Text rsAddGuest! Fullname = txtFirstName. Text & † † & txtLastName. Text rsAddGuest! Gender = cboGender. Text rsAddGuest! RoomChoice = cboRoomChoice. Text rsAddGuest! RoomNumber = cboRoomNumber. Text rsAddGuest! Picture = txtFilePathPic. Text rsAddGuest! CompleteDateStarted = Format(cboMonthStarted. Text & â€Å"/† & cboDateStarted. Text & â€Å"/† & cboYearStarted. Text, â€Å"mm/dd/yyyy†) rsAddGuest! CompleteDueDate = Format(cboDueMonth. Text & â€Å"/† & cboDueDate. Text & â€Å"/† & cboDueYear.Text, â€Å"mm/dd/yyyy†) rsAddGuest! Payment = txtIdHolder. Text rsAddGuest. Update rsAddGuest. Close Call Clear MsgBox â€Å"Guest has successfully Added. â€Å", vbOnly, â€Å"Apartment Monitoring and Security System† End If End If End Sub Private Sub SaveTemplate_Click() Dim blob() As Byte ‘ First verify that template is not empty. If Templ Is Nothing Then MsgBox â€Å"You must create a fingerprint template before you can save it. † Exit Sub End If CommonDialog1. Filter = â€Å"Fingerprint Template File|*. fpt† ‘ Set dialog box so an error occurs if dialog box is cancelled. CommonDialog1. CancelError = True On Error Resume Next ‘ Show Save As dialog box. CommonDialog1. ShowSaveIf Err Then ‘ This code runs if the dialog box was cancelled. Exit Sub End If ‘ Export template to binary data. blob = Templ. Serialize ‘ Save binary data to file. Open CommonDialog1. FileName For Binary As #1 Put #1, , blob Close #1 End Sub Private Sub Timer1_Timer() lblDate. Caption = Format(Date, â€Å"Long Date†) lblTime. Caption = Format(Time, â€Å"Long Time†) End Sub Private Sub Verify_Click() ‘ First verify that template is not empty. If Templ Is Not hing Then MsgBox â€Å"You must create fingerprint template before you can perform verification. † Exit Sub End If ‘ Show Fingerprint Verification dialog box. Verification. Show vbModal, Me End SubPublic Function Clear() txtFirstName. Text = â€Å"† txtLastName. Text = â€Å"† txtFilePathPic. Text = â€Å"† cboGender. Text = â€Å"† cboRoomChoice. Text = â€Å"† cboRoomNumber. Text = â€Å"† cboMonthStarted. Text = â€Å"† cboDateStarted. Text = â€Å"† cboYearStarted. Text = â€Å"† cboDueMonth. Text = â€Å"† cboDueDate. Text = â€Å"† cboDueYear. Text = â€Å"† cboRoomNumberDel. Text = â€Å"† imgbox. Visible = False img_box_del. Visible = False frameRegisterGuest. Visible = False frameSearchGuest. Visible = False End Function Public Function View() frameRegisterGuest. Visible = False frameSearchGuest. Visible = False frameViewGuest. Visible = True Set rsViewGuest = New ADODB. Recordset rsViewGuest.CursorLocation = adUseClient rsViewGuest. CursorType = adOpenDynamic rsViewGuest. LockType = adLockOptimistic rsViewGuest. Open â€Å"SELECT * FROM tbl_registration ORDER BY RoomNumber ASC†, ConnectDB Set dgGuestView. DataSource = rsViewGuest MainFrame. dgGuestView. Columns(0). Visible = False MainFrame. dgGuestView. Columns(2). Visible = False MainFrame. dgGuestView. Columns(5). Visible = False MainFrame. dgGuestView. Columns(7). Visible = False MainFrame. dgGuestView. Columns(8). Visible = False MainFrame. dgGuestView. Columns(1). Width = 2200 MainFrame. dgGuestView. Columns(3). Width = 1900 MainFrame. dgGuestView. Columns(4). Width = 1600 MainFrame. dgGuestView.Columns(6). Width = 1200 Set rsViewGuest = Nothing End Function â€Å"Verification† Dim Templ As DPFPTemplate Private Function ConnectDB() As String ConnectDB = â€Å"DRIVER={MySQL ODBC 5. 1 Driver}; SERVER = localhost; DATABASE = db_AMASS; USER = root; PASSWORD = †;† End Fu nction Private Sub cboRoomChoice_Click() If cboRoomChoice. Text = â€Å"Economy† Then txtIdHolder. Text = 1500 ElseIf cboRoomChoice. Text = â€Å"Standard† Then txtIdHolder. Text = 2000 ElseIf cboRoomChoice. Text = â€Å"Family† Then txtIdHolder. Text = 2500 End If End Sub Private Sub cboRoomNumberDel_Click() dgGuestDelete. Visible = True Set recordSetDelete = New ADODB. Recordset recordSetDelete.CursorLocation = adUseClient recordSetDelete. CursorType = adOpenDynamic recordSetDelete. LockType = adLockOptimistic recordSetDelete. Open â€Å"SELECT * FROM tbl_registration WHERE RoomNumber = ‘† & cboRoomNumberDel. Text & â€Å"‘†, ConnectDB Set dgGuestDelete. DataSource = recordSetDelete MainFrame. dgGuestDelete. Columns(0). Visible = False MainFrame. dgGuestDelete. Columns(2). Visible = False MainFrame. dgGuestDelete. Columns(7). Visible = False MainFrame. dgGuestDelete. Columns(8). Visible = False MainFrame. dgGuestDelete. Columns(1). Wi dth = 2200 MainFrame. dgGuestDelete. Columns(3). Width = 1800 MainFrame. dgGuestDelete. Columns(4). Width = 1800MainFrame. dgGuestDelete. Columns(6). Width = 1600 MainFrame. dgGuestDelete. Columns(8). Width = 3200 If recordSetDelete. EOF True Then img_box_del. Visible = True img_box_del. Picture = LoadPicture(recordSetDelete! Picture) cmdDeletee. Visible = True cmdEditt. Visible = True cmdOpenSesame. Visible = True Else MsgBox â€Å"This room has no guest yet. â€Å", vbInformation, â€Å"Apartment Monitoring and Security System† img_box_del. Visible = False cmdOpenSesame. Visible = False End If If recordSetDelete. EOF True Then MainFrame. txtIdHolder. Text = recordSetDelete! RoomNumber End If End Sub Private Sub cmdBrowse_Click() CommonDialog1. ShowOpen xtFilePathPic. Text = CommonDialog1. FileName imgbox. Picture = LoadPicture(txtFilePathPic. Text) imgbox. Visible = True End Sub Private Sub cmdClear_Click() Call Clear End Sub Private Sub cmdDeletee_Click() Set rsDelete = New ADODB. Recordset rsDelete. CursorLocation = adUseClient rsDelete. CursorType = adOpenDynamic rsDelete. LockType = adLockOptimistic rsDelete. Open â€Å"SELECT * FROM tbl_registration WHERE FullName = ‘† & MainFrame. txtSearch. Text & â€Å"‘†, ConnectDB If MsgBox(â€Å"Are you sure you want to delete this Guest?. â€Å", vbYesNo + vbInformation, â€Å"Delete Verification†) = vbYes Then rsDelete. Delete MsgBox â€Å"Guest has been successfully deleted. , vbInformation, â€Å"Apartment Monitoring and Security System† Set dgGuestDelete. DataSource = Nothing Call Clear End If End Sub Private Sub cmdEditt_Click() Call Clear frameSearchGuest. Visible = False frameRegisterGuest. Visible = True frameRegisterGuest. Caption = â€Å"Edit here†¦ † save. Visible = False Dim rsEditGuestt As New ADODB. Recordset rsEditGuestt. CursorLocation = adUseClient rsEditGuestt. CursorType = adOpenDynamic rsEditGuestt. LockType = adLockOptimistic rsE ditGuestt. Open â€Å"SELECT * FROM tbl_registration WHERE FullName = ‘† & MainFrame. txtSearch. Text & â€Å"‘†, ConnectDB txtFirstName. Text = rsEditGuestt! FirstName txtLastName. Text = rsEditGuestt! LastName cboGender.Text = rsEditGuestt! Gender cboRoomChoice. Text = rsEditGuestt! RoomChoice cboRoomNumber. Text = rsEditGuestt! RoomNumber txtFilePathPic. Text = rsEditGuestt! Picture cmdUpdateNah. Visible = True End Sub Private Sub cmdOpenSesame_Click() Set rsOpen = New ADODB. Recordset rsOpen. CursorLocation = adUseClient rsOpen. CursorType = adOpenDynamic rsOpen. LockType = adLockOptimistic rsOpen. Open â€Å"SELECT * FROM tbl_registration WHERE RoomNumber = ‘† & MainFrame. txtIdHolder. Text & â€Å"‘†, ConnectDB writePort rsOpen! RoomNumber End Sub Private Sub cmdUpdateNah_Click() Dim rsUpdateNah As New ADODB. Recordset rsUpdateNah. CursorLocation = adUseClient rsUpdateNah.CursorType = adOpenDynamic rsUpdateNah. LockType = adL ockOptimistic rsUpdateNah. Open â€Å"tbl_registration WHERE FullName = ‘† & MainFrame. txtSearch. Text & â€Å"‘†, ConnectDB If MsgBox(â€Å"Are you sure you want to update this Guest?. â€Å", vbYesNo + vbInformation, â€Å"Update Verification†) = vbYes Then rsUpdateNah! templates = Templ. Serialize rsUpdateNah! FirstName = txtFirstName. Text rsUpdateNah! LastName = txtLastName. Text rsUpdateNah! Fullname = txtFirstName. Text & † † & txtLastName. Text rsUpdateNah! Gender = cboGender. Text rsUpdateNah! RoomChoice = cboRoomChoice. Text rsUpdateNah! RoomNumber = cboRoomNumber. Text rsUpdateNah! Picture = txtFilePathPic. Text sUpdateNah! CompleteDateStarted = Format(cboMonthStarted. Text & â€Å"/† & cboDateStarted & â€Å"/† & cboYearStarted. Text, â€Å"mm/dd/yyyy†) rsUpdateNah! CompleteDueDate = Format(cboDueMonth. Text & â€Å"/† & cboDueDate. Text & â€Å"/† & cboDueYear. Text, â€Å"mm/dd/yyyyâ₠¬ ) rsUpdateNah. Update rsUpdateNah. Close MsgBox â€Å"Guest has successfully Updated. â€Å", vbOnly, â€Å"Apartment Monitoring and Security System† Call Clear End If End Sub Private Sub cmeExitAdd_Click() frameRegisterGuest. Visible = False End Sub Private Sub Command2_Click() Dim rsguestview As New ADODB. Recordset If mskDateStarted. Text â€Å"† Then Set rsguestview = New ADODB. Recordset sguestview. CursorLocation = adUseClient rsguestview. LockType = adLockOptimistic rsguestview. CursorType = adOpenDynamic rsguestview. Open â€Å"Select * from tbl_logs where Date= ‘† & mskDateStarted & â€Å"‘†, ConnectDB Set DataGrid1. DataSource = rsguestview MainFrame. DataGrid1. Columns(0). Width = 2200 Set rsguestview = Nothing End If End Sub Private Sub Enroll_Click() Enrollment. Show vbModal, Me End Sub Public Function GetTemplate() As Object ‘ Template can be empty. If so, then returns Nothing. If Templ Is Nothing Then Else: Set GetTem plate = Templ End If End Function Public Sub SetTemplete(ByVal Template As Object) Set Templ = Template End SubPrivate Sub Form_Load() Call Clear Call View Dim blob() As Byte Dim rs As New ADODB. Recordset rs. CursorLocation = adUseClient rs. CursorType = adOpenDynamic rs. LockType = adLockOptimistic rs. Open â€Å"Select * from tbl_registration†, ConnectDB blob = rs! templates ‘set raw image from MySQL database If Templ Is Nothing Then ‘convert raw image to picture Set Templ = New DPFPTemplate Templ. Deserialize blob End If End Sub Private Sub mnuAddGuest_Click() Call Clear flag = 1 save. Visible = True frameRegisterGuest. Caption = â€Å"Register here†¦ † frameRegisterGuest. Visible = True rameSearchGuest. Visible = False frameViewGuest. Visible = False cmdUpdateNah. Visible = False End Sub Private Sub mnuChangeUser_Click() If MsgBox(â€Å"Are you sure you want to logout and change user? â€Å", vbYesNo + vbInformation, â€Å"Apartment Monitoring and Security System†) = vbYes Then Unload Me frmStandbyMode. Show frmLogin. Show End If End Sub Private Sub mnuEditGuest_Click() frameEditGuest. Show End Sub Private Sub mnuInventory_Click() frmInventory. Show End Sub Private Sub mnuLogout_Click() If MsgBox(â€Å"Are you sure you want to exit program? â€Å", vbYesNo + vbInformation, â€Å"Apartment Monitoring and Security System†) = vbYes Then closePort Unload Me rmStandbyMode. Show End If End Sub Private Sub mnuSearchGuest_Click() frameSearchGuest. Visible = True frameRegisterGuest. Visible = False frameViewGuest. Visible = False txtSearch. Text = â€Å"† cboRoomNumberDel. Text = â€Å"† cmdEditt. Visible = False cmdDeletee. Visible = False cmdOpenSesame. Visible = False img_box_del. Visible = False dgGuestDelete. Visible = False End Sub Private Sub mnuViewGuest_Click() Call View End Sub Private Sub ReadTemplate_Click() Dim blob() As Byte CommonDialog1. Filter = â€Å"Fingerprint Template File|*. fptà ¢â‚¬  ‘ Set dialog box so an error occurs if dialog box is cancelled. CommonDialog1. CancelError = True On Error Resume Next Show Open dialog box. CommonDialog1. ShowOpen If Err Then ‘ This code runs if dialog box was cancelled. Exit Sub End If ‘ Read binary data from file. Open CommonDialog1. FileName For Binary As #1 ReDim blob(LOF(1)) Get #1, , blob() Close #1 ‘ Template can be empty, it must be created first. If Templ Is Nothing Then Set Templ = New DPFPTemplate ‘ Import binary data to template. Templ. Deserialize blob End Sub Private Sub save_Click() Dim rsAddGuest As New ADODB. Recordset rsAddGuest. CursorLocation = adUseClient rsAddGuest. CursorType = adOpenDynamic rsAddGuest. LockType = adLockOptimistic rsAddGuest. Open â€Å"tbl_registration†, ConnectDB If txtFirstName.Text = â€Å"† Or txtLastName. Text = â€Å"† Or cboGender. Text = â€Å"† Or cboRoomChoice. Text = â€Å"† Or cboRoomNumber. Text = â€Å"â €  Or txtFilePathPic. Text = â€Å"† Or cboMonthStarted. Text = â€Å"† Or cboDateStarted. Text = â€Å"† Or cboYearStarted. Text = â€Å"† Or cboDueMonth. Text = â€Å"† Or cboDueDate. Text = â€Å"† Or cboDueYear. Text = â€Å"† Then MsgBox â€Å"Missing Fields. â€Å", vbCritical + vbInformation, â€Å"Apartment Monitoring and Security System† Else If MsgBox(â€Å"Are you sure you want to add this Guest?. â€Å", vbYesNo + vbInformation, â€Å"Delete Verification†) = vbYes Then rsAddGuest. AddNew rsAddGuest! templates = Templ. Serialize rsAddGuest! FirstName = txtFirstName. Text