Monday, September 30, 2019

Strategic Management and Stakeholder Significance Grid

Business Strategy- ASSIGNMENT #1. Outcome| Evidence for the criteria| Detail criteria| Check| Understand the process of strategic planningLO1| 1. 1. Explain strategic contexts and terminology – missions, visions, objectives, goals, core competenciesChapter 1| Role of strategy | | | | Missions | | | | Visions | | | | Strategic intent | | | | Objectives goals | | | | Core competencies | | | | Strategic architecture | | | | Strategic control| | | 1. 2. Review the issues involved in strategic planningChapter 6| Impact on managers | | | | Targets | | | When to plan | | | | Who should be involved | | | | Role of planning| | | 1. 3. Explain different planning techniquesChapter 6| BCG growth-share matrix| | | | Directional policy matrices| | | | Space| | | | PIMS| | Be able to formulate a new strategyLO2| 2. 1. Produce an organisational audit for a given organisationChapter 3| Benchmarking | | | | Swot analysis | | | | Product positions | | | | Value-chain analysis | | | | Demographic influences | | | | Scenario planning | | | | Synergy culture and values. | | | 2. 2.Carry out an environmental audit for a given organisationChapter 2| PESTEL| | | Political | | | | Economic | | | | Socio-cultural | | | | Technological | | | | Environmental | | | | Legal | | | | Porter's 5 force| | | The threat of new entrants | | | | The power of buyers | | | | The power of suppliers | | | | The threat of substitutes | | | | Competitive rivalry | | | | Collaboration| | | 2. 3. Explain the significance of stakeholder analysisChapter 1| Stakeholder significance grid | | | | Stakeholder mapping| | Merit and Distinction: Criteria 1. : future direction of the competition, needs of customers, gaining and maintaining competitive advantage, Ansoffs growth-vector matrix, portfolio analysis. Criteria 1. 2: informal planning, top-down planning, bottom-up planning, behavioural approaches. Criteria 2. 1: the Ansoff matrix, growth, stability, profitability, efficiency, market leadership, surviv al, mergers and acquisitions, expansion into the global market place. Business Strategy- ASSIGNMENT #1 (S04) Outcome| Evidence for the criteria| Detail criteria| Check| Analyze how the business environment is considered in strategy formulationLO1| 1. . Define the context of business strategyChapter 1| Role of strategy | | | | Missions | | | | Visions | | | | Strategic intent | | | | Objectives goals | | | | Core competencies | | | | Strategic architecture | | | | Strategic control| | | 1. 2. Explain the significance of stakeholder analysisChapter 1| Stakeholder significance grid | | | | Stakeholder mapping | | | 1. 3. Conduct an environmental and organizational audit of a given organizationChapter 2Chapter 3+4+5| Political | | | | Economic | | | | Socio-cultural | | | | Technological | | | Environmental | | | | Legal | | | | The threat of new entrants | | | | The power of buyers | | | | The power of suppliers | | | | The threat of substitutes | | | | Competitive rivalry | | | | Coll aboration| | | | Benchmarking | | | | Swot analysis | | | | Product positions | | | | Value-chain analysis | | | | Demographic influences | | | | Scenario planning | | | | Synergy culture and values. | | | 1. 4. Apply strategic positioning techniques to the analysis of a given organizationChapter 4+5+6| BCG growth-share matrix| | | | Directional policy matrices| | | Space| | | | PIMS| | Understand the process of strategic planningLO2| 2. 1. Demonstrate an ability to think strategicallyChapter 6| Futuredirection of the competition| | | | Needs of customers| | | | Gaining ; maintaining competitive advantage| | | | Ansoffs growth-vector matrix| | | | Portfolio analysis| | | 2. 2. Prepare a strategic plan for a given organisation, based on previous analysisChapter 6+7| Impact on managers | | | | Targets | | | | When to plan | | | | Who should be involved | | | | Role of planning| | | | Planning systems| |

Crime and Ethical Standards

Crime and Ethical Standards Since you have demonstrated your knowledge about criminal Justice so well, the chief of police has another assignment for you. Chief Draper wants you to review a specific case and assess the arresting officer's conduct. To prepare your report, you consider certain factors, such as the societal factors that may have influenced the suspect's behavior, the role of the government in terms of protecting both society and an individual's rights, and the ethical standards that govern law enforcement. Here's What HappenedCentral police officer Lance Marion responded to a call for service from a high- end retailer, who reported that an unkempt woman wearing disheveled, dirty, and torn clothing left the store without paying for Items she selected while shopping In the Misses Clothing Department. The store manager reported that the woman failed to respond to any verbal prompts made to her by store associates. As Officer Marion drove toward the store, he noticed a woma n matching her description walking along the side of the road, carrying what appeared to be clothing.Once the officer reached the location of the woman, he recognized her?Mary Jones? s being an individual he had arrested several times before for public drunkenness, resisting arrest, possession of a controlled substance, felony larceny, and prostitution. Officer Marion anticipated that this could be a very challenging situation because Jones did not like law enforcement, tended to be aggressive, and had, In the past, run as soon as she saw a police cruiser. Marion called for backup and asked Jones to stop as he stepped out of his vehicle.She started to run, but he caught up with her very quickly. Jones struggled with Officer Marion on the ground, although he managed to humanely subdue her and place her in handcuffs. Officer Marion called the incident into Communications and placed the suspect in his cruiser. He then gathered the clothing items dropped by the suspect along the side of the road. He noticed the items had price tags displaying the name of the retailer who reported the initial incident to law enforcement. During transport, Jones yelled and became very agitated.When she arrived at the police department, Jones was very upset. She tried to hurt herself by banging her head on the desk as the officer tried to Interview her about the alleged larceny report, It was clear to Officer Marion that Jones was under the influence of drugs, so he discontinued the interview process. Marion requested Here's What You Need To Do †¦ After carefully reviewing the case details, prepare a 2- to 3-page report assessing whether the procedures (both legal and ethical) were followed appropriately.Use the Argosy University Online Library resources to find articles that support your assessment. You may also use your textbook. Your report should address the following: Select one of the crimes Jones has been previously charged with (e. G. , public drunkenness, resisting arre st, possession of a controlled substance, felony larceny, or prostitution). What type of crime is it (misdemeanors or felony)? O How is this crime defined in the state in which you live? O How might societal factors have influenced this suspect's crimes? Analyze how the purpose of government and the social contract might protect the rights (e. G. , safety and security) of the suspect in this case. Compare the various roles Officer Marion must play in this case. Consider that Marion must enforce the law and protect the suspect from harm at the same time. Analyze how a law enforcement officer's actions might be influenced if he or she is arresting an â€Å"unsympathetic suspect or victim,† specifically suspect or victim who the officer has arrested before or who engages in a high-risk lifestyle, such as substance abuse, drug dealing, or prostitution.Justify whether Officer Marion acted accordingly. How might the criminal Justice professional maintain ethical standards when work ing with diverse populations? Once charged, what rights does the defendant, Jones, have? Be sure to organize your paper into clear and concise paragraphs. You should read the grading rubric before starting your paper to ensure you cover all the material appropriately. Include an PAP-formatted reference page that links to your in-text citations.

Sunday, September 29, 2019

The Effects of Tourism in Menorca

1. Reasons why Menorca is a popular destination from the UK, Germany and Scandinavia: * With rising amounts of disposable income, tourists can afford to travel further on their holidays. This has also led to the demise of such British holiday resorts such as Brighton, Blackpool and Cornwall. * Also, the diminishing costs of flying due to budget airlines providing charter flights and the construction of a new airport with a longer runway coupled with the reduced time of flying to Menorca due to advances in Jet aircraft and the smoothness of arranging a holiday through Package holidays mean that flying to Menorca is less strenuous, more hassle-free and accessible than in the past. * The climate is more tropical because it is further south than the UK, Germany and Scandinavia. Also, due to the island's small size, no residency will be far from the beach. 2. The attractions for tourists as illustrated by figures 3.40 and 3.41: In Figure 3.40: * The white sand and clear blue sea- the coast. In combination with the climate, attractive for tourists that enjoy beach holidays. * The scenery – Menorca has a lot of forestry. It is much greener and lush than its Balearics. * Development one the sea front- means that there are hotels right on the seafront that allows excellent access for tourists that want a beach holiday. * A promenade along the coastline- means that tourists that wish to walk along the coast without walking along a beach full of people. By being on the edge of the forest, it encourages people to take an interest in the environment and allows people who want ‘quiet recreation' to pursue their desired activities. Figure 3.41 * The harbour is an attraction for tourists. * The open-air cafà ¯Ã‚ ¿Ã‚ ½ by the water provides a relaxing stop for the tourists. * The boats indicate that water ports are an appealing past time for holidaymakers. 3. The jobs that will have been created by the tourists will be: * Craft and retail industries will have increased custom due to increased population. * Services industries eg. Food production, builders, restaurants, cafà ¯Ã‚ ¿Ã‚ ½s, hotels, taxi drivers/car hire * Airports will produce jobs for local communities * Civic services will employ more people to sweep towns etc. 4. When tourists bring money to Menorca, parts of the income proceed through taxes to the government, who spend some of the money on public services (eg. Better roads, hospitals, redeveloping downmarket areas etc.) This money then encourages more people to come to the country that brings even more money in through taxes that can be spent on public services. This is repeated over and over. 5. Menorca attracts few tourists during November-April due to two things: i. The climate. During the winter months, the temperature is rarely above 15OC. Also, the monthly rainfall for the 6 winter months averages at 5.5 mm. This is compares with an average temperature of 27OC during the peak summer season – June, July and August. In these three months, the average rainfall is 1.3 mm. The less attractive climate during the 6 winter months means that holidaymakers going for ‘sun and sand' will be more likely to go during the three summer months (June, July and August) than during the winter months. ii. The other reason is that most families go on holiday in summer due to school holidays and booked absences from work. This also ties in with part I). Holidays in the summer are more convenient from an organisation view, and provide the best weather. 6. The problems caused by the influx of tourists to the island are: iii. The lack of income during the winter due to the decrease in tourism. iv. The local environment. The tourists will leave more litter, lead to an increase of pollution due to the industrial expansion that is needed to provide a good service to the tourists. The tourists will also damage things such as the woodland, and the animals to which the woodland is their habitat by trekking through the greenery. Also, room is needed to expand the countries' infrastructure, which could well lead to deforestation. v. The cultures of the local Menorcans will be diluted by the import of foreign cultures. Eg. Cuisine, language, currency, music and manners. 7. The disadvantages and advantages of the use of the local language, Minorqui are: Advantages: The preservation of the local culture, and to make sure that the local population do not get too disillusioned with the measures taken concerning local tourism Disadvantages: Is not helpful to tourists, who could find it hard to understand the happenings in Menorca. This could a factor that prevents tourists going to Menorca repeatedly, lessening sustainable tourism. Also, they may collect less revenue from advertising due to the lessened interest from companies trying to influence a foreign audience, who will not understand them. 8. To protect the environment, the Menorcan officials are: * Prevent buildings 250m from the coast can be no more than two storeys high. * A bridle path around the coast to encourage quiet recreation has been set up. * The UN have designated Menorca a Biosphere Reserve to acknowledge the natural environment of Menorca.

African Americans and Politics Essay

For decades African Americans have faced struggles throughout history. Most notably, African Americans were involved in slavery, suffrage, and the civil rights movement. These struggles were very visible and everyone was aware of what was going on. However, now African Americans are involved in a struggle that it not visible and recognizable. This is a struggle that is used to capitalize on wealth and prevent African American families and individuals from living normal lives. They are involved in environmental racism. Environmental racism â€Å"refers to intentional or unintentional racial discrimination in the enforcement of environmental rules and regulations, the intentional or unintentional targeting of minority communities for the siting of polluting industries, or the exclusion of minority groups from public and private boards, commissions, and regulatory bodies. †[1] This form of racism has been plaguing African American communities for years and most people have not taken notice. There are many form of environmental racism; however, this paper will specifically address redlining, blockbusting, racial profiling, and housing segregation and how each has impacted the African American community. Redlining is the act of refusing or increasing the cost of services such as loans, insurance, banking, and access to healthcare to citizens based upon race. The practice involves taking a map and drawing a red line through neighborhoods where banks would not invest money. Redlining was used to segregate African Americans in the housing, workforce, and school market. Parents had to find work in other areas of the city because there were not any resources available in the community. Because of redlining, schools became over crowded with 50 students crammed into one classroom. With the schools overcrowded, teachers were not able to provide special attention to the needy students and other students became uncontrollable. Cathy Cohen would argue that African Americans were being marginalized in the school system. To be considered marginalized means, to have continuously been denied access to dominant resources, barred from full participation in dominant institutions, and defined as â€Å"others, â€Å" living outside the norm and values agreed upon by society (Cohen 1999). African American students were all forced to go to one school in the community to keep them out of the White schools. Along with marginalization, Blacks were, and still are, a part of a power struggle. Blacks were seen, and will always be seen, as an inferior race. Also, Blacks have been disempowered knowingly and unknowingly. African-Americans have been taken advantage of and used to make other races feel superior. Blockbusting was a practice used by real estate agents and developers in the United States to encourage white property owners to sell their homes by giving the impression that minority groups (such as African Americans) were moving into their previously racially segregated neighborhood. [2] When African Americans began to move into the inner city, fear arose that they were an economic threat. Blockbusting was also the cause of many White Americans moving into the suburbs. The practice of blockbusting involved an African American purchasing a home for very cheap in a predominately White neighborhood. The real estate broker would contact the White residents and offer to buy their houses for quick cash and resell the house to an African American family for much higher. Real estate agents claimed that African Americans moving into a predominately White neighborhood would cause property values to go down and urged White homeowners to sell as soon as possible. Real estate agents indicated that the property values would go down because African Americans would not keep up their property, avoid lawn care, and if would affect the entire neighborhood. This practice has caused major shifts in urban neighborhoods, especially Chicago, in recent decades. The Blockbusting methods were profitable and became common across the nation. For example, by 1962, when blockbusting had been in practice for fifteen years, Chicago had over 100 operators and the city had been changing an average of two to three blocks a week for several years. Blockbusting is the reason why cities such as Chicago are now predominately African American and the surrounding suburbs are predominately White. Blockbusting caused African Americans to be marginalized as well. They were denied fair participation in the housing market. Real estate agents inflated housing prices for African Americans to gain commission. White homeowners already had prejudices about African Americans and the real estate agents only made the situation worse. The stereotypes that Black families do not take care of their property was the main reason White homeowners sold their homes. Racial profiling is â€Å"the inclusion of racial or ethnic characteristics in determining whether a person is considered likely to commit a particular type of crime or an illegal act or to behave in a â€Å"predictable† manner. †[3] The practice of racial profiling is a huge problem in the United States. African Americans are usually the targeted victims in the act of racial profiling. It is believed that an African American driver will be more likely stopped than a White driver. Some police officers share the belief that Black drivers will most likely possess an illegal substance of committing an illegal act. However, policemen argue that they do not base their arrests on race but are greatening their probability of a successful search. Some policemen also argue that the probability of catching a Black offender is greater than catching a White offender. Whether the statement is true or not, it places a bias on African Americans and White Americans. The belief that African Americans men are more likely to commit crimes is unfair and not true. One cannot base the behavior of all African American men on the ones that have done wrong and been imprisoned. Another belief of racial profiling is it is the cause of the racial disparities in the American prison system. There are many more African American men in the jail system than there are White men. The previous statement is mostly likely to be true. Because some policemen hold biases and have prejudices against African Americans, it will cause more African Americans to be placed in the jail system. Another instance of racial profiling involved African Americans owning nice material possessions such as a car or a house and African Americans being in a predominately White neighborhood. For example, in an episode of Family Matters, Eddie was in his car travelling through a predominately White neighborhood and was pulled over by the police for â€Å"failure to signal. † However, the routine traffic stop turned into nothing more than a beating for young Eddie. The significance of the episode shows that racial profiling does exist in the United States and it takes place every day. The practice has impacted African Americans because hundreds of innocent people have been harassed and humiliated by police officers simply because of their race. The most recent national example of environmental racism occurred when Hurricane Katrina struck New Orleans in 2005. When New Orleans was flooded with tons of water, there were no relief efforts for days and almost a week. Many believed this was due to the fact that majority of the New Orleans population was African American. The population was basically ignored for days until the help decided to come. Citizens of New Orleans were faced with intentional racism and were denied help for several days. This has impacted African Americans because many people died because of the heat, starvation, and disease from the water. African-Americans have been marginalized for centuries. To be considered marginalized means, to have continuously been denied access to dominant resources, barred from full participation in dominant institutions, and defined as â€Å"others, â€Å" living outside the norm and values agreed upon by society (Cohen 1999). Most recently, African-Americans were marginalized in regards to the outbreak of HIV/AIDS. While HIV/AIDS was once considered to be the disease of white gay men, Blacks are now the center of the epidemic. With the turn of the new millennium, the outbreak of AIDS in the Black community has soared. Black men who consider themselves to be â€Å"down low† are the center of the rising epidemic. The men have intercourse with other men while continuing to have intercourse with their female partners thus spreading the AIDS virus. Even though the soaring rate is shocking, there has been limited response from the African-American community. One can argue that Blacks have been marginalized from the resources to treat the epidemic. However, the Black community seems to be ignoring the spreading AIDS virus and focusing more on electing a Black president and high blood pressure. While both electing a Black president and lowering high blood pressure are important issues, similar emphasis should be put on the rising AIDS epidemic. In a sense, African-Americans have marginalized themselves from dealing with AIDS. Continuing to turn a cold shoulder to the issue will not fix the problem. Although Blacks are being marginalized when it comes to AIDS, they are also marginalized when it comes to property and social relationships. For example, when it comes to receiving bank loans, African-Americans is marginalized heavily. Some bank loan officers practice redlining which causes Black residents, whether qualified or not, to be denied loans for property. By using the redlining technique, bank loan officers are marginalizing Blacks from being able to own their own property. Relating back to the AIDS epidemic, Black men were marginalized for having the virus. For instance, if a Black man was open about his homosexuality would be marginalized heavily. Homophobia could be a valid reason for the marginalization of Black men. With open homosexuality, an African-American could be left out from participating in activities and denied being recognized as a normal individual. Homophobia could damage an individual’s social life and leave him feeling disempowered. [4] Along with marginalization, Blacks were, and still are, a part of a power struggle. Blacks were seen, and will always be seen, as lower than Whites. Also, Blacks have been disempowered knowingly and unknowingly, which is the center of environmental racism. African-Americans have been taken advantage of and used to gain wealth and keep at the bottom of the ladder. In short, there are many types of power struggles. One does not have to see power to know that it is taking place. [5] For instance, being called an inferior race is a power struggle within itself. African-Americans that believe that they are actually inferior will begin to act that way. They will begin to doubt themselves and their abilities in life. Once they have it in their mindset that they are inferior, it will cause them to act that way. Housing Segregation is â€Å"the practice of denying African American or other minority groups equal access to housing through the process of misinformation, denial of realty and financing services, and racial steering. †[6] The act of housing discrimination involves real estate agents and landlords not providing African American families with an accurate account of available housing. Housing segregation happens when landlords and real estate agents lure White Americans to available housing only in white communities, and African Americans to Black or diverse and mixed communities. The realtor and landlord usually work together in the process and will agree not to tell the African Americans about the available units in the European American communities. This process goes back to the assumption that African Americans residents will bring down the property value of homes in the neighborhood because they will not take care of their own property. Housing segregation is intentional racism that excludes African Americans from participating fairly in the housing market. Black families should be able to live wherever they please without regardless of the demographics of the neighborhood. With all that African Americans have been through, environmental racism should not be ignored or taken lightly. People should take heed to the practice and fight for what is right. All of the above forms of environmental racism have plagued the African American community. It has caused a major shift in the urban cities such as Chicago. Real estate agents have inflated the costs of housing for Black families moving into predominantly White areas. African American families can fight the issues by becoming more aware of their surroundings and becoming familiar with the practices. They can hire good lawyers to defend them and fight for justice. With regards to the AIDS epidemic, African Americans have been marginalized when it comes to resources and thus leads to environmental racism. African American of the new generation, as a whole, should stand together and fight the justice that was promised to them in the United States Constitution. ———————– [1] Dictionary. com [2] Dictionary. com [3] Dictionary. com [4] Cathy J. Cohen, The Boundaries of Blackness (The University of Chicago Press) 47-48. [5] John Gaventa, Power and Powerlessness (The University of Illinois Press) 1-32. [6] Dictionary. com.

Saturday, September 28, 2019

Abap Data Dictionary

The ABAP Dictionary centrally describes and manages all the data definitions used in the system. The ABAP Dictionary is completely integrated in the ABAP Development Workbench. All the other components of the Workbench can actively access the definitions stored in the ABAP Dictionary. The ABAP Dictionary supports the definition of user-defined types (data elements, structures and table types). You can also define the structure of database objects (tables, indexes and views) in the ABAP Dictionary. These objects can then be automatically created in the database with this definition.The ABAP Dictionary also provides tools for editing screen fields, for example for assigning a field an input help (F4 help). Type definitions Structure Database objects Table DB table Data element Table type Tools Poss. values Screen F4 The most important object types in the ABAP Dictionary are tables, views, types (data elements, structures, table types), domains, search helps and lock objects. April 2001 9 BC – ABAP Dictionary ABAP Dictionary SAP AG ABAP Dictionary Purpose Data definitions (metadata) are created and managed in the ABAP Dictionary.The ABAP Dictionary permits a central description of all the data used in the system without redundancies. New or modified information is automatically provided for all the system components. This ensures data integrity, data consistency and data security. You can create the corresponding objects (tables or views) in the underlying relational database using these data definitions. The ABAP Dictionary therefore describes the logical structure of the objects used in application development and shows how they are mapped to the underlying relational database in tables or views.The ABAP Dictionary also provides standard functions for editing fields on the screen, for example for assigning a screen field an input help. What Information is Stored in the ABAP Dictionary? The most important object types in the ABAP Dictionary are tables, vie ws, types, domains, search helps and lock objects. Tables [Page 13] are defined in the ABAP Dictionary independently of the database. A table having the same structure is then created from this table definition in the underlying database. Views [Page 97] are logical views on more than one table. The structure of the view is defined in the ABAP Dictionary.A view on the database can then be created from this structure. Types [Page 136] are used in ABAP program. The structure of a type can be defined globally in ABAP programs. Changes to a type automatically take effect in all the programs using the type. Lock objects [Page 209] are used to synchronize access to the same data by more than one user. Function modules that can be used in application programs are generated from the definition of a lock object in the ABAP Dictionary. Different fields having the same technical type can be combined in domains [Page 161].A domain defines the value range of all table fields and structure compon ents that refer to this domain. The ABAP Dictionary also contains the information displayed with the F1 and F4 help for a field in an input template. The documentation about the field is created for a data element [Page 138] that describes the meaning of the contents of a table field. The list of possible input values that appears for the input help is created by a foreign key [Page 19] or a search help [Page 172]. Integration in the ABAP Development Workbench The ABAP Dictionary is completely integrated in the ABAP Development Workbench.The R/3 System works interpretatively, permitting the ABAP Dictionary to be actively integrated in the development environment. Instead of the original objects, the interpreters see only internal representations of these objects. These internal representations are adjusted automatically when the system finds that changes have been made in the ABAP Dictionary. This ensures that the screen and ABAP interpreters, input help, database interface, and dev elopment tools always access current data. 10 April 2001 SAP AG BC – ABAP Dictionary ABAP DictionaryThe following ABAP program lists the airline carriers (see Flight model [Page 302]) and carrier IDs contained in table SCARR. DATA: SCARR_TAB TYPE SCARR. SELECT * INTO SCARR_TAB FROM SCARR. WRITE: / SCARR_TAB-CARRID, SCARR_TAB-CARRNAME. ENDSELECT. Only structure SCARR_TAB is declared in the program. All the information about this structure, such as the field names, data types and field lengths, are copied from table SCARR, which is defined in the ABAP Dictionary. This information about table SCARR is called from the ABAP Dictionary when the program is generated.This means that the source text of the program need not be adjusted when a change is made to table SCARR, for example when the length of a table field is changed. The next time the program is called, the system automatically determines that the structure of table SCARR has changed. The program is simply regenerated, ther eby retrieving up-to-date information about table SCARR from the ABAP Dictionary. ?Development environment ? Development environment ABAP Tools Data Modeler Screen Painter ABAP Dictionary ABAP Interpreter Dialog Control Interfaces Screen InterpreterRuntime environment of the application Runtime environment of the application When you work on development projects, objects of the ABAP Dictionary can be changed any number of times before being activated [Page 237] and made available to the operative components of the system. Objects can have both an active and an inactive version in the ABAP Dictionary at the same time. Inactive ABAP Dictionary objects have no effect on the runtime system (ABAP processor, database interface). This permits greater changes to several objects without impairing the April 2001 11 BC – ABAP Dictionary ABAP DictionarySAP AG executability of the system. The objects can only be activated together when they have all been changed. 12 April 2001 SAP AG BC à ¢â‚¬â€œ ABAP Dictionary Tables Tables Tables can be defined independently of the database in the ABAP Dictionary. The fields of the table are defined with their (database-independent) data types and lengths. When the table is activated, a physical table definition is created in the database for the table definition stored in the ABAP Dictionary. The table definition is translated from the ABAP Dictionary to a definition of the particular database.Database-independent Definition of the Tables in the ABAP Dictionary T1 T2 T3 †¦ Tn Activation program and DB UTILITY DB Definition of the tables in the database T1 T2 T3 Tn A table definition in the ABAP Dictionary contains the following components:  ·  ·  ·  · Table fields [Page 14] define the field names and data types of the fields contained in the table Foreign keys [Page 19] define the relationships between the table and other tables. Technical settings [Page 30] control how the table should be created in the database. In dexes [Page 61]: To speed up data selection, secondary indexes can be created for the tableThe customer can modify SAP tables with append structures [Page 69] and customizing includes [Page 68]. This kind of modification ensures that the customer enhancements are automatically merged with the new versions of the SAP tables when there is a release upgrade. See also: Creating Tables [Page 72] Making Changes to Tables [Page 83] April 2001 13 BC – ABAP Dictionary Table Fields SAP AG Table Fields You must define the following for a table field in the ABAP Dictionary:  ·  ·  ·  ·  ·  · Field name: The field name can have a maximum of 16 places and may contain letters, digits and underscores.The field name must begin with a letter. Key flag: determines whether the field should belong to the table key. Field type: data type of the field in the ABAP Dictionary. Field length: number of valid places in the field. Decimal places: number of places after the decimal point, spec ifying numeric data types. Short text: short text describing the meaning of the field. You can also include [Page 16] the fields of a structure in the table. Assignment of the Data Type, Field Length and Short Text You can assign the data type [Page 242], length and short text in different ays:  ·  · You directly assign the field a data type, field length (and if necessary decimal places) and short text in the table definition. You can assign the field a data element [Page 138]. The data type, field length (and decimal places) are determined from the domain of the data element. The short description of the data element is assigned to the field as a short text. Other Assignment Options  ·  ·  · Check table: An input check for the field can be defined with a foreign key [Page 19]. This input check appears on all the screens in which the field is used. Search help assignment: A search help [Page 172] can be assigned to a field.This search help defines the input help flow on a ll the screens in which the field is used. Reference field and reference table [Page 15]: You must specify the table field in which the corresponding unit of measure or currency can be found for fields containing quantities (data type QUAN) or currency amounts (data type CURR). See also: Creating Tables [Page 72] 14 April 2001 SAP AG BC – ABAP Dictionary Reference Fields and Reference Tables Reference Fields and Reference Tables You must specify a reference table for fields containing quantities (data type QUAN) or currency amounts (data type CURR).This reference table must contain a field with the format for the currency key (data type CUKY) or unit of measure (data type UNIT). This field is called the reference field of the output field. The reference field can also reside in the table itself. A field is only assigned to the reference field at program runtime. For example, if a field is filled with currency amounts, the corresponding currency is determined from the assigned reference field, that is the value entered in this field at the moment defines the currency. Table Field 1 T1 Field 3 Field 2 (CURR)Reference table Field 4 Field 5 (CUKY) T2 Field 7 Field 6 Reference field Runtime T1-Field 2 1,500. 00 T2-Field 5 DEM Table SBOOK in the flight model [Page 302] contains all the flight bookings made by customers. Field FORCURAM contains the price of the booking in the customer’s currency. Field FORCURKEY of table SBOOK contains the corresponding currency key for this price. SBOOK is therefore the reference table for field FORCURAM and FORCURKEY is the reference field for field FORCURAM. April 2001 15 BC – ABAP Dictionary Reference Fields and Reference Tables SAP AGIncludes In addition to listing the individual fields, you can also include the fields of another structure in tables [Page 13] and structures [Page 144]. Individual fields and includes can be mixed as required. Structure includes Table F1 F2 F3 F4 F5 F3 F4 F1 F2 F3 F4 F5 Databa se When an include is changed, all the tables and structures that include it are automatically adjusted. Structure A was included in table B. A new field is inserted in structure A. When structure A is activated, table B is adjusted to this change, that is the new field is also inserted there.You can assign the include a group name [Page 148] with which the group of fields in the include can be addressed as a whole in ABAP programs. Includes can also be nested, that is structure A includes structure B which in turn includes another structure C, etc. The maximum nesting depth is limited to nine. The maximum length of a path of nested includes in a table or structure is therefore nine (the table/structure itself not included). 16 April 2001 SAP AG BC – ABAP Dictionary Reference Fields and Reference Tables Table/structure U1 Include U1 U2Include U2 U3 Maximum depth = 9 Include U8 U9 Include U9 Only flat structures [Page 144] can be included. In a flat structure, every field eith er refers to a data element or is directly assigned a data type, length and possibly decimal places. Only structures may be included in a table. Tables, structures and views may be included in a structure. The length of the field names is more restricted in tables than in structures. In a table, a field name may not have more than 16 places, but in a structure up to 30 places are allowed for the field name.A structure therefore can only be included in a table if none of the field names of the structure are longer than 16 places. The path of nested includes may only contain one table. Table TAB1 includes structure STRUCT1, which in turn includes structure STRUCT2. The path of the nested includes here only contains table TAB1. It is also possible to include TAB1 in a further structure STRUCT0, but no other table TAB2 may be included in TAB1 since in this case a path of nested includes would contain two tables (TAB1 and TAB2). See also: Inserting an Include [Page 85] April 2001 17 BC à ¢â‚¬â€œ ABAP Dictionary Named Includes SAP AGNamed Includes If an include [Page 16] is used to define a database table or structure, a name can be assigned to the included substructure. The group of fields in the include can be addressed as a whole in ABAP programs with this name. In ABAP programs, you can either access the fields directly with – or analogously with –. You can access the fields of the group as a whole with -. Structure PERSON includes structure ADDRESS with the name ADR. ADDRESS has a field CITY. With PERSON-ADR you can address all the fields in structure ADDRESS. The included field CITY can also be addressed with PERSON-CITY or PERSON-ADR-CITY.You can include a structure more than once (e. g. in a period group). Since direct access by field name should be permitted here, the included field names must be renamed to ensure that they are unique. A suffix can be assigned to each group, extending the names of the group fields. The fields can then be addres sed in ABAP programs with – or –. Structure PERSON includes structure ADDRESS twice. An address is the private address with suffix H and name ADRH. The other address is the business address with suffix W and name ADRW. You can access field CITY in the private address with PERSON-CITYH or PERSON-ADRH-CITY.The functionality of the named includes in the ABAP Dictionary corresponds to the ABAP construction INCLUDE TYPE †¦ AS †¦ RENAMING †¦ . 18 April 2001 SAP AG BC – ABAP Dictionary Foreign Keys Foreign Keys You can define the relationships between tables in the ABAP Dictionary by creating foreign keys. Using foreign keys, you can easily create value checks for input fields. Foreign keys can also be used to link several tables in a view [Page 97] or a lock object [Page 209]. Field Assignment in the Foreign Key A foreign key links two tables T1 and T2 by assigning fields of table T1 to the primary key fields of table T2.Foreign key fields Foreign key t able T1 Field 1 Field 2 Field 3 Field 4 Primary key Check table Field 5 Field 6 T2 Field 7 Primary key Table T1 is called the foreign key table (dependent table) and table T2 the check table (referenced table). The pair of fields for the two tables must have the same data type and length. One field of the foreign key table therefore corresponds to each key field of the check table. This field is called the foreign key field. A foreign key permits you to assign data records in the foreign key table and check table.One record of the foreign key table uniquely identifies one record of the check table using the entries in the foreign key fields. Check Field and Value Check One of the foreign key fields is marked as the check field. This means that the foreign key relationship is maintained for this field. April 2001 19 BC – ABAP Dictionary Foreign Keys SAP AG When an entry is made in the check field, there is a check whether the check table contains a record with the key defined by the values in the foreign key fields. If this is so, the entry is valid. Otherwise the system rejects the entry.Input template for foreign key table T1 Field1 Field2 Field3 Field4 1 3 Field5 1 1 2 3 3 3 4 4 Check table T2 Field6 1 3 1 1 2 3 1 2 Field7 Text 1 Text 2 Text 3 Text 4 Text 5 Text 6 Text 7 Text 8 Input is valid since there is a corresponding record in the check table In this example the entry Field2 = 2 and Field4 = 2 would be rejected since T2 does not contain a record with the key Field5 = 2 and Field6 = 2. If you do not want to check against all the key fields of the check table, you can exclude fields of the foreign key table from the assignment of the fields to the check table with generic and constant foreign keys [Page 22].How the Input Check Works A SELECT statement is generated from the definition of the foreign key. If an entry is made in the check field, this SELECT statement is submitted. If a suitable record of the check table is found, the entry is valid. Otherwise the entry is rejected. The corresponding SELECT statement has the following form for the foreign key table shown in the above graphic: SELECT * FROM T2 WHERE T2-FIELD5 = T1-FIELD2 AND T2-FIELD6 = T1-FIELD4. A screen entry for check field Field2 is therefore only valid if the check table contains a record with the entries made in the screen for Field2 and Field4 as key.Table SBOOK in the flight model [Page 302] contains the customer’s flight bookings for a carrier. The flight bookings can be made by a travel agency or directly at the carrier’s sales counter. If the booking was made at a counter, its number is stored together with the booking in field COUNTER in table SBOOK. 20 April 2001 SAP AG BC – ABAP Dictionary Foreign Keys You must make sure that only correct counter numbers can be entered. All the counters are entered in table SCOUNTER. The necessary value check can be defined by creating a foreign key for check field COUNTNUM. Foreign key fields Foreign key table SBOOKMANDT CARRID CONNID FLDATE CUSTOMID †¦ COUNTER †¦ CANCELED Check field Check table SCOUNTER MANDT CARRID COUNTNUM AIRPORT Key fields See also: Multi-Structured Foreign Keys [Page 29] Semantic Attributes of Foreign Keys [Page 24] Creating Foreign Keys [Page 75] April 2001 21 BC – ABAP Dictionary Generic and Constant Foreign Keys SAP AG Generic and Constant Foreign Keys It is not always advisable to check a foreign key against all the key fields of the check table. This is true for example for time-dependent check tables and for check tables whose version number is a component of the key.You can use generic foreign keys in these cases. Fields are excluded from the assignment to the key fields of the check table here. The check is only against the remaining key fields. You can also assign a constant value to a key field of the check table. In this case you only have to check against the specified constant. You can use this check if only records o f the check table which contain a constant value in this key field are valid. Foreign key table FTAB Field 6 Field 7 Field 8 Field 9 Generic * Constant K Check table PTAB Field 1 Field 2 Field 3 Field 4 Field 5Primary key The corresponding SELECT statement for the screen check has the following form for the foreign key definition in the graphic: SELECT * FROM PTAB WHERE PTAB-FIELD1 = FTAB-FIELD6 AND PTAB-FIELD3 = FTABFIELD8 AND PTAB-FIELD4 = ‘K’. An entry is only valid in check field Field6 if a record of check table PTAB exists containing the input value for Field6 in PTAB-Field1, the input value for Field8 in PTAB-Field3 and constant K in PTAB-Field4. 22 April 2001 SAP AG BC – ABAP Dictionary Generic and Constant Foreign KeysInput template for foreign key table FTAB Field 6 Field 7 Field 8 Field 9 3 30 1 B Check table PTAB Field 1 Field 2 Field 3 Field 4 Field 5 1 1 2 3 3 3 4 4 1 1 1 2 1 2 1 2 1 3 1 1 2 3 3 4 A B A K A A C C Text 1 Text 2 Text 3 Text 4 Text 5 T ext 6 Text 7 Text 8 Input is valid since Field 7 and Field 9 were removed from the assignment The values entered on the screen for Field7 and Field9 are meaningless when checking against the check table. An entry with Field6 = 1, Field8 = 3 and Field9 = B would not be valid in this case since there is no record with PTAB-Field1 = 1, PTAB-Field3 = 3 and PTAB-Field4 = K in the check table!April 2001 23 BC – ABAP Dictionary Semantic Attributes of Foreign Keys SAP AG Semantic Attributes of Foreign Keys A foreign key describes a relationship between two tables. You can define this relationship more precisely by specifying the cardinality [Page 25] and type of foreign key fields [Page 26]. This information is optional and is primarily for documentary purposes. In particular, the definitions of the cardinality and type of the foreign key fields are not used in the value check for the foreign key. The definition of the semantic attributes is only sed in the following cases:  · If K ey fields of a text table is selected as the type of the foreign key fields, the foreign key table is considered to be the text table [Page 27] for the check table. If a screen field is checked against a table, the key entries of the check table are normally displayed in the input help (F4 help) for this field. If there is a text table for the check table, each key entry displayed is enhanced with an explanatory text (contents of the first character-like field of the text table) in the user’s logon language.Tables can only be included in a help view [Page 115] or maintenance view [Page 117] if they are linked with a foreign key. It only makes sense to create such a help or maintenance view if for each record in the primary table of the view there is no more than one corresponding record in each secondary table of the view. The system therefore checks if the foreign key with which the tables were linked in the view have suitable cardinalities when it creates a maintenance or h elp view. See also Restrictions for Maintenance and Help Views [Page 119]. The foreign key between tables SBOOK and SCOUNTER ensures that only existing counters can be entered in field COUNTER (counter at which the flight was booked). See the example in Foreign Keys [Page 19] . A booking can be made at either a travel agency or at the carrier’s sales counter. If the booking is made at a travel agency, the field COUNTER of table SBOOK remains empty. The foreign key fields do not have to be filled, that is the left side of the cardinality is C. Any number of bookings may be made at each counter.There may therefore be any number of entries (bookings) in foreign key table SBOOK for each record of the check table SCOUNTER. The right side of the cardinality is therefore CN. Of course several bookings can be made for the same carrier at a counter. These bookings do not differ in their foreign key fields (MANDT, CARRID, COUNTER). The entries in the foreign key fields therefore do not uniquely identify an entry in the foreign key table SBOOK (a booking). The foreign key fields therefore have the type No key fields/candidates. 24 April 2001 SAP AG BC – ABAP Dictionary Cardinality CardinalityThe cardinality (n:m) describes the foreign key relationship with regard to the number of possible dependent records (records of the foreign key table) or referenced records (records of the check table). The left side (n) of the cardinality is defined as follows:  ·  · n=1: There is exactly one record assigned to the check table for each record of the foreign key table. n=C: The foreign key table may contain records which do not correspond to any record of the check table because the foreign key field is empty. This can occur for example if the field of the foreign key table is optional, in which case it does not have to be filled. =1: There is exactly one dependent record for each record of the check table. m=C: There is at most one dependent record for each record of the check table. m=N: There is at least one dependent record for each record of the check table. m=CN: There may be any number of dependent records for each record of the check table. The right side (m) of the cardinality is defined as follows:  ·  ·  ·  · April 2001 25 BC – ABAP Dictionary Type of Foreign Key Fields SAP AG Type of Foreign Key Fields The Type of foreign key fields describes what the foreign key fields in the foreign key table mean.The following types of foreign key field can be defined:  · No key fields/candidates: The foreign key fields are neither primary key fields of the foreign key table nor do they uniquely identify a record of the foreign key table (key candidates). For this reason, the foreign key fields do not (partially) identify the foreign key table. Key fields/candidates: The foreign key fields are either primary key fields of the foreign key table or they already uniquely identify a record of the foreign key table (key candidates). The foreign key fields therefore (partially) identify the foreign key table.Key fields of a text table: The foreign key table is a text table [Page 27] for the check table, that is the key of the foreign key table only differs from the key of the check table in that it has an additional language key field. This is a special case of the type Key fields/candidates.  ·  · 26 April 2001 SAP AG BC – ABAP Dictionary Text Tables Text Tables Table A is a text table of table B if the key of A comprises the key of B and an additional language key field (field of data type LANG). Table A may therefore contain explanatory text in several languages for each key entry of B.To link the key entries with the text, text table A must be linked with table B using a foreign key. Key fields of a text table must be selected here for the type of foreign key fields (see Semantic Attributes of Foreign Keys [Page 24]). Table B Key fields K1 and K2 K1 †¦ 1 1 †¦ K2 †¦ 1 2 †¦ F1 à ¢â‚¬ ¦ XX YY †¦ F2 †¦ YY XX †¦ Text table A for B Key fields K1, K2 and L (type LANG) K1 †¦ 1 1 1 1 †¦ K2 †¦ 1 1 2 2 †¦ L †¦ DE EN DE EN †¦ TEXT †¦ Text 1 (German) Text 1 (English) Text 2 (German) Text 2 (English) †¦ Text foreign keyIf table B is the check table of a field, the existing key entries of table B are displayed as possible input values when the input help (F4) is pressed. The explanatory text (contents of the first character-like non-key-field of text table A) is also displayed in the user's logon language for each key value in table B. April 2001 27 BC – ABAP Dictionary Text Tables SAP AG Hit list if user logs on in English K1 †¦ 1 1 K2 †¦ 1 2 †¦ Text †¦ Text1 (English) (English) Text2 (English) (English) †¦ Maintenance screen Field 1 Field 2 †¦ Call the input help Field is checked against table BOnly one text table can be created for table B! The system checks this when you atte mpt to activate a table with text foreign keys for B. 28 April 2001 SAP AG BC – ABAP Dictionary Multi-Structured Foreign Keys Multi-Structured Foreign Keys When you define a foreign key, a field of the work area that is not contained in the foreign key table can also be assigned to a check table (for example a field of another table). This is possible for all fields except for the check field. Table T2 is the check table of foreign key table T1. Field F of the work area is assigned to key field Field6 of check table T2.Foreign key table T1 Field 1 Field 2 Field 3 Field 4 Primary key Field F of work area Check table T2 Field 5 Field 6 Field 7 Primary key The corresponding SELECT statement for the input check is then: SELECT * FROM T2 WHERE T2-FIELD5 = T1-FIELD2 AND T2-FIELD6 = F. If an entry is made in field T1-Field2 (check field), this SELECT statement will be submitted. If a corresponding record is found, the entry is valid; otherwise it is rejected. If a field that is not contained in the foreign key table is assigned to a field of the check table, this field must be filled at the time of the input check.Otherwise the check always fails, and no values can be entered in the check field. April 2001 29 BC – ABAP Dictionary Technical Settings SAP AG Technical Settings The technical settings of a table define how the table will be handled when it is created in the database, that is whether the table will be buffered and whether changes to data records of the table will be logged. The most important parameters are:  ·  · Data class: The data class [Page 31] defines the physical area of the database (tablespace) in which the table should be created. Size category: The size category [Page 32] defines the size of the extents created for the table.When the table is created in the database, the required information about the memory area to be selected and the extent size is determined from the technical settings.  ·  · Buffering permission: The b uffering permission [Page 33] defines whether the table may be buffered. Buffering type: If the table may be buffered, you must define a buffering type (full, singlerecord, generic). The buffering type [Page 34] defines how many table records are loaded into the buffer when a table entry is accessed. Logging: This parameter defines whether changes to the table entries should be logged.If logging [Page 41] is switched on, each change to a table record is recorded in a log table.  · The Convert to transparent table flag (transparent flag [Page 42]) is also displayed for pooled tables or for tables which were converted into transparent tables earlier on with this flag. See also: Maintaining Technical Settings [Page 77] Buffering Database Tables [Page 43] 30 April 2001 SAP AG BC – ABAP Dictionary Data Class Data Class If you choose the data class correctly, your table is automatically assigned to the correct area (tablespace or DBspace) of the database when it is created.Each d ata class corresponds to a physical area in which all the tables assigned to this data class are stored. There are the following data classes:  ·  ·  · APPL0 (master data): Data which is seldomly changed. An example of master data is the data contained in an address file, such as the name, address and telephone number. APPL1 (transaction data): Data that is frequently changed. An example of transaction data is the goods in a warehouse, which change after each purchase order. APPL2 (organizational data): Customizing data that is defined when the system is installed and seldomly changed.An example is the table with country codes. Two further data classes, USR and USR1, are provided for the customer. These are for user developments. The tables assigned to these data classes are stored in a tablespace for user developments. Tables in the ABAP Dictionary Master data Table 1 Table 3 Organizational data Table 2 Transaction data Table 4 Table 7 System data Table 5 Table 6 Tablespace m aster data Table 1 Table 3 Tablespace Org. data Table 2 Tablespace Trans. data Table 4 Table 7 Tablespace System data Table 5 Table 6 Database April 2001 31 BC – ABAP Dictionary Size Category SAP AG Size CategoryThe size category defines the expected space required for the table in the database. You can choose a size category from 0 to 4 for your table. Each category is assigned a certain fixed memory size in the database, which depends on the database system used. When a table is created, initial space (an Initial Extent) is reserved in the database. If more space is required at a later time due to data entries, additional memory will be added depending on the selected size category. Technical settings Size category TABA 1 3 4 TABB TABC Initial First Second Extent Extent Extent TABA TABB TABC †¦ †¦ †¦Database Selecting the correct size category prevents a large number of very small extents from being created for a table. It also prevents space from being waste d if extents which are too large are created. 32 April 2001 SAP AG BC – ABAP Dictionary Buffering Permission Buffering Permission You must define whether and how a table is buffered in the technical settings for the table. There are three possibilities here:  · Buffering not permitted: Table buffering is not permitted, for example because application programs always need the most recent data from the table or the table is changed too frequently.Buffering permitted but not activated: Buffering is permitted from the business and technical points of view. Applications which access the table execute correctly with and without table buffering. Whether or not table buffering will result in a gain in performance depends on the table size and access profile of the table (frequency of the different types of table access). Table buffering is deactivated because it is not possible to know what these values will be in the customer system. If table buffering would be advantageous for th e table size and access profile of the table, you can activate it in the customer system at any time.Buffering activated: The table should be buffered. In this case you must specify a buffering type [Page 34].  ·  · See also: Buffering Database Tables [Page 43] Which Tables Should be Buffered? [Page 53] April 2001 33 BC – ABAP Dictionary Buffering Types SAP AG Buffering Types The buffering type defines which table records are loaded into the buffer of the application server when a table record is accessed. There are the following buffering types:  ·  · Full buffering [Page 35]: All the records of the table are loaded into the buffer when one record of the table is accessed.Generic buffering [Page 37]: When a record of the table is accessed, all the records having this record in the generic key fields (part of the table key that is left-justified, identified by specifying a number of key fields) are loaded into the buffer. Single-record buffering [Page 39]: Only the re cords of a table that are really accessed are loaded into the buffer.  · See also: Buffering Database Tables [Page 43] 34 April 2001 SAP AG BC – ABAP Dictionary Full Buffering Full Buffering With full buffering, either the entire table is in the buffer or the table is not in the buffer at all.All the records of the table are loaded into the buffer when one record of the table is read. In this example, a program reads the record highlighted in red from table SCOUNTER. If the table is fully buffered, all the records of the table are loaded into the buffer. Database table SCOUNTER MANDT CARRID COUNTNUM AIRPORT Buffer contents 001 001 001 001 001 001 001 001 001 001 001 001 001 001 AA BA BA BA BA LH LH LH LH LH LH LH LH UA 00000001 00000001 00000002 00000003 00000004 00000001 00000002 00000003 00000004 00000005 00000006 00000007 00000008 00000001 ACA ACE BER LCY LHR BER DEN FRA LCY LGW LHR MUC RTM HAM 01 001 001 001 001 001 001 001 001 001 001 001 001 001 AA BA BA BA BA LH LH L H LH LH LH LH LH UA 00000001 00000001 00000002 00000003 00000004 00000001 00000002 00000003 00000004 00000005 00000006 00000007 00000008 00000001 ACA ACE BER LCY LHR BER DEN FRA LCY LGW LHR MUC RTM HAM Application server SELECT * FROM SCOUNTER WHERE MANDT = ‘001’ AND CARRID = ‘LH’ AND COUNTNUM = ‘00000004'. The buffered data records are sorted in the buffer by table key. Accesses to the buffered data can therefore only analyze field contents up to the last specified key field for restricting the dataset to be searched.The left-justified part of the key should therefore be as large as possible in such accesses. For example, if you do not define the first key field, the system has to scan the full table. In this case direct access to the database can be more efficient if the database has suitable secondary indexes [Page 61]. When Should you Use Full Buffering? When deciding whether a table should be fully buffered, you should take into account the size of the table, the number of read accesses, and the number of write accesses. Tables best suited to full buffering are small, read frequently, and rarely written.Full buffering is recommended in the following cases: April 2001 35 BC – ABAP Dictionary Full Buffering  · SAP AG Tables up to 30 KB in size. If a table is accessed frequently, but all accesses are read accesses, this value can be exceeded. However, you should always pay attention to the buffer utilization. Larger tables where large numbers of records are frequently accessed. If these mass accesses can be formulated with a very selective WHERE condition using a database index [Page 61], it could be better to dispense with buffering.Tables for which accesses to non-existent records are frequently submitted. Since all the table records reside in the buffer, the system can determine directly in the buffer whether or not a record exists.  ·  · 36 April 2001 SAP AG BC – ABAP Dictionary Generic Buffering Generi c Buffering With generic buffering, all the records in the buffer whose generic key fields match this record are loaded when one record of the table is accessed. The generic key is a part of the primary key of the table that is left-justified. In this example, the record highlighted in red is read by a program from table SCOUNTER.If the table is generically buffered, all the records read whose generic key fields (MANDT and CARRID) agree are loaded into the buffer. Database table SCOUNTER MANDT CARRID COUNTNUM AIRPORT Buffer contents 001 001 001 001 001 001 001 001 LH LH LH LH LH LH LH LH 00000001 00000002 00000003 00000004 00000005 00000006 00000007 00000008 BER DEN FRA LCY LGW LHR MUC RTM 001 001 001 001 001 001 001 001 001 001 001 001 001 001 AA BA BA BA BA LH LH LH LH LH LH LH LH UA 00000001 00000001 00000002 00000003 00000004 00000001 00000002 00000003 00000004 00000005 00000006 00000007 00000008 00000001ACA ACE BER LCY LHR BER DEN FRA LCY LGW LHR MUC RTM HAM Application server Generic key SELECT * FROM SCOUNTER WHERE MANDT = ‘001’ AND CARRID = ‘LH’ AND COUNTNUM = ‘00000004'. When Should you Use Full Buffering? A table should be buffered generically if only certain generic areas of the table are normally needed for processing. Client-specific, fully-buffered tables are automatically generically buffered since normally it is not possible to work in all clients at the same time on an application server. The client field is the generic key. Language-specific tables are another example where generic buffering is recommended.In general, only records of one language will be needed on an application server. In this case, the generic key includes all the key fields up to and including the language field. How Should you Define the Generic Key? In generic buffering, it is crucial to define a suitable generic key. April 2001 37 BC – ABAP Dictionary Generic Buffering SAP AG If the generic key is too small, the buffer will contain a few very large areas. During access, too much data might be loaded in the buffer. If the generic key is too large, the buffer might contain too many small generic areas.These can reduce buffer performance since there is an administrative entry for every buffered generic area. It is also possible that too many accesses will bypass the buffer and go directly to the database, since they do not fully define the generic key of the table. If there are only a few records in each generic area, it is usually better to fully buffer the table. Only 64 bytes of the generic key are used. You can specify a longer generic key, but the part of the key exceeding 64 bytes is not used to create the generic areas. Access to Buffered DataIt only makes sense to generically buffer a table if the table is accessed with fully-specified generic key fields. If a field of the generic key is not assigned a value in a SELECT statement, it is read directly from the database, bypassing the buffer. If you access a generic area that is not in the buffer with a fully-specified generic key, you will access the database to load the area. If the table does not contain any records in the specified area (â€Å"No record found†), this area in the buffer is marked as non-existent. It is not necessary to access the database if this area is needed again. 8 April 2001 SAP AG BC – ABAP Dictionary Single-Record Buffering Single-Record Buffering With single-record buffering, only the records that are actually read are loaded into the buffer. Single-record buffering therefore requires less storage space in the buffer than generic and full buffering. The administrative costs in the buffer, however, are greater than for generic or full buffering. Considerably more database accesses are necessary to load the records than for the other buffering types. In this example, the record highlighted in red is read by a program from table SCOUNTER.If single-record buffering is selected for the table, onl y the record that was read is loaded into the buffer. Database table SCOUNTER MANDT CARRID COUNTNUM AIRPORT Buffer contents 001 LH 00000004 LCY 001 001 001 001 001 001 001 001 001 001 001 001 001 001 AA BA BA BA BA LH LH LH LH LH LH LH LH UA 00000001 00000001 00000002 00000003 00000004 00000001 00000002 00000003 00000004 00000005 00000006 00000007 00000008 00000001 ACA ACE BER LCY LHR BER DEN FRA LCY LGW LHR MUC RTM HAM Application server SELECT SINGLE FROM SCOUNTER WHERE MANDT = ‘001’ AND CARRID = ‘LH’ AND COUNTNUM = ‘00000004'.When Should you Use Single-Record Buffering? Single-record buffering should be used particularly for large tables where only a few records are accessed with SELECT SINGLE. The size of the records being accessed should be between 100 and 200 KB. Full buffering is usually more suitable for smaller tables that are accessed frequently. This is because only one database access is necessary to load such a table with full buffering, whereas several database accesses are necessary for single-record buffering. Access to Buffered Data All accesses that are not submitted with SELECT SINGLE go directly to the database, bypassing the buffer.This applies even if the complete key is specified in the SELECT statement. April 2001 39 BC – ABAP Dictionary Single-Record Buffering SAP AG If you access a record which is not yet buffered with SELECT SINGLE, there is a database access to load the record. This record is marked in the buffer as non-existent if the table does not contain a record with the specified key. This prevents another database access when accessing the table at a later time with the same key. 40 April 2001 SAP AG BC – ABAP Dictionary Logging Logging Using the logging flag you can define whether changes to the data records of a table should be logged.If logging is switched on, each change to an existing data record (with UPDATE, DELETE) by the user or application program is recorded in the data base in a log table (DBTABPRT). ABAP Dictionary Log TAB Application transaction TAB Change a record Field 1 Field 2 Field 3 System profile †¦ rec/client =ALL †¦ TAB Field 1 Field 2 Field 3 Log table Database To switch on logging, the R/3 System must be started with a profile containing parameter rec/client. This parameter defines whether all clients or only selected clients should be logged. The parameter can have the following values: rec/client = ALL Log all clients. ec/client = 000[,†¦ ] Log the specified clients. rec/client = OFF Do not log. Logging slows down accesses that change the table. First of all, a record must be written in the log table for each change. Secondly, a number of users access this log table in parallel. This can cause lock situations although the users are working with different application tables. Logging is independent of the update. The existing logs can be displayed with Transaction Table History (SCU3). April 2001 41 BC – ABAP Dic tionary Converting Pooled Tables to Transparent Tables SAP AG Converting Pooled Tables to Transparent Tables

The Drowling Ski Resort Case Study Example | Topics and Well Written Essays - 1250 words

The Drowling Ski Resort - Case Study Example Its financial trouble started in back in 2000 when it went into receivership and there seemed to be no buyer willing or able to finance the resort, after it remained closed for a year, it was reopened by Ian Mac-Arthur through an arrangement with the Syracuse development cooperation. The city was willing to fund the project since they believed that the resort represented and important economic entity and if it was left to collapse, it would harm the community especially owing unemployment of the hundreds of locals who worked there. After 5 years, MacArthur decided to discontinue his ownership of the resort because the capital investment required to repair and retransform the resort to its former glory was too much. Consequently, it was bought by a Peter Bass who assumed the debt and arranged with MacArthur to pay buy him off the debt in installments. The resort however continued to lose money and the visitors patronizing it went down considerably resulting in reduced revenue and depe ndence on government bailouts to remain in business (Huang & Leong 2). The management of the resort tried channeling back profits and even took on long term debt but the huge losses the firm had incurred in the course of the last two years had eaten too deeply into the cash reserves. Drowling Mountain is dependent primarily on the population of Syracuse since the customer base is predominantly local, for financial and practical reasons the firm did not market beyond the Syracuse area. The pricing is marginally higher than the neighboring resorts and this is justified by the variety of exclusive packages offered in the resort although admittedly clients sometimes found them too complex and therefore ignored them. Carter also says that the operations were far from smooth owing to the fact that they had cut down on the labor cost as much as they could and as result there was a perennial shortage of employees and the few ones were often overworked. After an incisive analysis of the situ ation, one the ground I came up with the following recommendations which if implemented successfully could reasonably be expected to curb the downward trend of the resort and gradually help it recover its prestige and profitability. For one, it is apparent that the resort justifies its higher prices by virtue of its exclusive package offering that are not available in other resorts, however, it has also emerged that these services are often viewed as too complex and the clients often ignore them. This leads to wastage since they require staff and maintenance they clearly do not justify the cost and complexity. Therefore instead of cutting down on costs by laying off staff, the management should carry out a thorough assessment on the redundant services, eliminate them or make drastic changes to simplify or make them more adaptable to customers. A strategic evaluation into the profitability of individual services and a comparison with their uptake in other resorts would give the manag ers a better understanding of what needs to be retained and what needs to be cut off. As a result, the services will be streamlined the staff will be more flexible and the costs or running the resort will marginally reduce, the surplus funds can then be used to service other facilities that can help resume profitability. The manager’s approach is based creating a culture of skiing and therefore he does not view the fact that other resorts are encouraging customers to engage in the sport as a threat since he felt they were promoting the uptake of skiing culture. Notwithstanding, this

Friday, September 27, 2019

Knife crime in uk Essay Example | Topics and Well Written Essays - 1750 words

Knife crime in uk - Essay Example The knife crimes happening through out UK has increased to alarming levels and a research done by British Crime Survey clearly illustrated that the number of knife crimes happening in the UK has reached the level of 130000 offences annually. Similarly to curb out these crimes different techniques are being applied by the government of Britain. This article would further revolve around the topic of knife crimes in the UK and would evolve with a detailed conclusion as to how much alarming the situation is and what is being done by the government accordingly. Different laws have been passed out by the UK legislation through out the 19th century to limit the use of knives. These laws have a basic aim of reducing the knife crimes happening through UK. They prohibit the sale, carrying, use and also production of these tools. The Prevention of Crime Act in 1953 clearly illustrates that any object which may cause harm to any individual if used is an offensive weapon. Similarly keeping this Act in mind new acts have been placed by the government which declares knife as an offensive weapon and its use on any individual should be widely prohibited. The current act of Violent Crime Reduction 2006 clearly states that knives should not be carried in public places or schools without any genuine excuse. However folding knives which have a blade of less than three inches are still allowed to be carried in the UK. Knives which are banned in UK include gravity, flick and samurai swords. The new act of 2006 has increased the sentence from two years, for carrying a knife in a public place, to a maximum of 4 years. The laws for the carrying and using of knives are eligible on the teenagers also. As recently a teenager was sentenced to life imprisonment was stabbing another teenager with a knife. Furthermore the buying of knives is prohibited to teenagers who are younger than 18 through this new act. The teachers and police have been granted the power to check any individual for the possession of knives. Cases of Knife Crimes There are many horrible and terrifying cases which are enough to threaten the whole society. In UK, knife crimes are increasing day by day. It is easier to carry a knife as people think it is not as harmful as a gun. However, the mentioned cases would provide clear evidence that holding a knife is equally harmful and dangerous as holding a gun or other weapon. These weapons should not be used to harm people but for the defense f the country. Those who were expected to hold books and pens and concentrate on their studies for the bright future of their country are instead holding weapons and destroying the image of UK. A 16 year old teenager murdered Martin Dinnegan in June 2007. Such a violent behavior from the youth is tragic and shows that the country is moving towards horrible future. The incident happened as a result of 'dirty looks' passed on by two groups on each other in Holloway. On such a minor issue Martin Dinnegan lost his life in the age of 14. As Dinnegan realized the i ntentions of Chin, he started to run away from them and screamed for help. Regardless of his continuous cry Chin stabbed him to death. The case of Martin Dinnegan was observed by the judge Brian Barker. According to him, the attack was planned and intentional as a revenge of rivalry. The attack showed an inhuman behavior and the selfish and severe attitude of a person

Report to business manager on blogging benefits Assignment

Report to business manager on blogging benefits - Assignment Example See the eBook/textbook example (p. 467-468), albeit, note that the book reference source citations/URL’s are missing! The executive summary is written last. It summarizes the purpose of the report, the methods used to create your report, and highlights the salient findings of your report, including your recommendation. Blogs are next to internet since its conception in terms of the pervasiveness of its use. 11.2% of online adults posts blogs once a month and of that number, a quarter of them (24.8%) reads a blog and half of it (13.7%) reads a blog. Business are beginning to capitalize on this as Burson-Marsteller survey showed that there were already 15% among the Fortune 500 companies who are now using blogs either to communicate or market (Wallace). The current use of corporate blogs are not that effective however. Experts agree that the current use of business of blogs are rather drab, dry and boring which go directly either to selling its products or promoting themselves. Of those companies who uses blogs, only two thirds gets any comments because of poor content. If harnessed properly, blogs can be a formidable communication and marketing tool. One of its outright benefits is that it costs almost nothing to set it up and requires minimal manpower to maintain. Businesswise, it does not cost much to have a blog presence. Blogs are global in reach. Companies using blogs can easily communicate to its customers, potential or existing, new products and information across continents at a very minimal cost. It can also help develop loyalty with its customers through the communication that is facilitated by the blog. One of the most common disadvantages of having a blog is the lack of utter creativity to maintain its visitor’s attention. This is becoming common as most companies employing blogs were found to be dry, boring and unattractive.

Thursday, September 26, 2019

Crowdscourcing Term Paper Example | Topics and Well Written Essays - 3750 words

Crowdscourcing - Term Paper Example Today through crowd sourcing, the company can use a huge number of less technical people to carry out complex and highly ingenious tasks at very low costs. As a result, the basic idea behind crowdsourcing is to increase productivity while at the same time reducing involved costs in the production process (Mau, 2004). This involves the use of internet where the company solicits feedback from a community of many active and passionate people, which will help the company in significantly reducing the time that it would take to collect data about the same information in the field through a research or other formal focus groups. Therefore, by having customers involved in the branding activities, marketing and the product design and development processes, the organization can greatly save on the staffing costs required and cater for the numerous risks and uncertainties in the market place (Mau, 2004). History The process of requiring customers to have an input in developing products is not new. However, open-source software has changed the approach by making it possible for many people to be involved in such a process. In today’s technology, it is possible to have numerous people undertake tasks that would seem too complex for their level of technical knowledge, mainly driven by factors such as the development of blogs social networks such as Facebook, twitter, MySpace and YouTube. This has made the traditional differences producers and consumers to vanish and leave a thin line that becomes hard to isolate, leading to a market that has a collective intelligence (Brabham, 2008). In other words, in the market today, it is possible to access people’s passion, knowledge, their creative ideas and insightful thinking. This translates to improved production and increased innovations numerous minds are brought together in an economy driven by intellectuals. Open source code, the invention of Stallman an MIT graduate that dates back to 1983 has made crowdsourcing in the IT a great success and has helped companies to reap big from crowdsourcing. This led to development of Unix operating system by 1991 where the developer Linus Torvalds, a computer scientists based in Finland requested ideas from people on how to develop a free operating system, which led to the current Linus operating system, which is the globally largest and world most successful open code software today (Howe, 2008). In interface design, users create socially adaptable interfaces that address interface complexity where users come up with customizations linked to specific tasks, which are then made available to an online community through an online repository. Once the users have created a collection of test sets, the users then customize the interfaces created with a keyword search in finding and installing specific task sets, resulting to a situation where users can issue direct commands to the interface. Therefore, crowdsourcing has its origin from academic researchers w ho designed digital resources that supported research and data interpretation methods, which involved visualization of data, computational analysis, data mining and simulations (Oomen & Aroyio, 2011). Consequently, in interface design, the result was that users were henceforth able to automate difficult tasks to compute,

M4M4 Monoculture Assignment Example | Topics and Well Written Essays - 750 words

M4M4 Monoculture - Assignment Example Today, many of small nations and communities living along the coast lines are highly threatened as beaches once locked in Arctic permafrost continue to be released by melting ice, shoreline erosion, rise in sea levels and increased storm activity. According to Pilkey, Pilkey and Fraser (2011), Miami has been listed as one of the most threatened cities based on the value of property that could be destroyed by floods caused by a three-foot sea level rise. It is estimated that sea levels in some cities located along the Atlantic and Gulf coasts could rise up to 55 inches. In a particular, the sea levels could rise by 20 inches in Miami Beach while in Boston city the levels could hit the 38 inches mark. The following table represents some of the urban centers likely to be affected by rising sea levels across the globe. The population likely to be affected by rising sea levels in Miami is estimated to be above 5.2 million and is expected to increase due to the growing number of tourism activities in the city (Pilkey, Pilkey & Fraser, 2011). This city is fourth largest and also United States’ lowest city. For this reason, sea levels are expected to increase by 20 inches by 2020. Floods resulting from the rising levels are expected to disrupt water supply systems in the city leading to emergence of waterborne disease including cholera and typhoid among other complications. Floods also form breeding areas for mosquitoes leading to high prevalence of malaria and other conditions whose mosquitoes are the vectors. Boston city is current listed among several U.S coastal areas where more than 4.5 million people living along the coastal line are to be adversely affected by expected rise in sea levels (Green Peace Campaign, n.d). Such populations are likely to be completely displaced leading to public health complications associated with displaced persons

Analysis of the American Cancer Society and General Motor Company Ltd Essay

Analysis of the American Cancer Society and General Motor Company Ltd - Essay Example   The American Cancer Society is mainly funded by donors, including the World Bank and various support groups. The World Bank is the society’s largest funder. The society also receives funds from the services that they offer to the cancer patients (Epstein, 2011). Other sources of funding for ACS include investment income, grants, and contributions from well-wishers. The operations of the organization are mainly run through volunteers drawn from all over the United States of America (American Cancer Society, 2011). The ACS is exempt from the taxpayer status, Form 990 of the year 2009 that the Society is a 501 (c) (3) organization which exempt from any tax obligations to the state. This status was granted in 2009 (American Cancer Society, 2011). Ethical issue The ACS, like all other organizations faces various challenges. One of the greatest challenges affecting ACS is self-interest. Investigations conducted on the ACS reveal that the Society has previously shown more interes t in profits than on cancer prevention. In 2005 the ACS estimated that at least 1.37 million new cases of cancer were diagnosed. However, it is alleged that instead of intensifying research on new methods for preventing and combating cancer, the Society focused more on profiting from cancer grants (Isaacs, 2010). For example, an Occupy Wall Street report alleges that the ACS has put a greater financial emphasis on radiation and chemotherapy research than on life-saving prevention methods. ACS faces allegations citing that has focused largely on conventional medication techniques for treating cancer instead of preventive techniques. The accusations also include discrediting physician research on cancer preventive techniques. As such the society is unethical for trying to make money out of the large numbers of cancer patients through chemotherapy and radiotherapy, which are considered unhealthy (Epstein, 2011). Causes One of the greatest causes of this situation stems from the ACSâ₠¬â„¢s culture of working with various stakeholders and particularly giving greater consideration to the views of the organization’s financial supporters (Epstein, 2011). The Society’s financial ties with the drug industry have skewed its policies regarding the environmental causes of cancer and the best approaches to managing it. This interest makes the fight against cancer difficult and has been linked to the increase in cancer deaths and incidences as sufficient preventive strategies have not been put in place because many drug companies discourage it (Isaacs, 2010). While the drug industry wants to make money selling therapeutic drugs and equipment, the ACS wishes to continue benefitting from the considerable financial support it gets from the organizations as well as profits from patient treatments. The other likely cause for the American Cancer Society’s preference for therapeutic methods is that cancer research is quite costly, especially research for prev entive techniques. The organization seems to endorse both chemotherapy and radiotherapy techniques because they are a cheaper alternative in terms of research costs. A lot of research findings justifying the methods have already been provided both by the ACS and many drug companies.  Ã‚  

Wednesday, September 25, 2019

Issue of our times Essay Example | Topics and Well Written Essays - 750 words

Issue of our times - Essay Example Additionally, most landmines are cheap to construct and deploy right on the ground. The victim might not have any information regarding the existence of mines on the ground and so he or she might trigger it. According to Chevrier (134), the number of deaths caused by landmines is more as compared to statistics of deaths by other arms. The author argues that the combinations of statistics of deaths caused by biological, nuclear and chemical weapons are less compared to deaths as a result of landmines. Additionally, a research by the U.S. department reveals that close to 110 million landmines are deployed in 64 countries. As pointed out above, landmines pose a great danger to the society, and it also affects the economy of the country. The risks associated such as deaths and mutilation of the victims causes a lot of fear to the society. In this senses, large tracks of lands that could have been exploited for agricultural proposes remains unused. In addition, development projects such as road and dam constructions are halted by lands mine. The results can be devastating to the economy because agricultural farms and accessible roads provide jobs to a significant number of people. For example, Matthew et al. (196) point out that close to 8.49% of the Libyan land has been rendered useless because of a large number of landmines deployed in the land. Furthermore, funds that could have been invested somewhere to improve the economy will have to be use for the humanitarian purpose. Matthew et al. (196) explains that the problem caused by landmines differ from one state to another. Some countries could be hav ing large number of landmines, but their problem could be small. The point is that, setback of landmines is based on the square kilometer of arable land that could have been used to grow crops. Landmines could also be fixed in locations reserved for social amenities such as hospitals, bridge, water towers, sewage treatment plants, schools and

Human Resource Assignment Example | Topics and Well Written Essays - 1250 words - 1

Human Resource - Assignment Example Human Resource The ground of Human Services is generally defined, exclusively approaching the goal of meeting human requirements via an interdisciplinary information base, centering on preclusion as well as remediation of tribulations, and upholding a promise to improving the general value of life of service people (Woodside & McClam 89). The Human Services work is one which encourages improved service relief systems by tackling not only the superiority of express services, but as well by seeking to develop accessibility, answerability, and organization among experts and groups in service delivery. "Human services experts" is a broad term for persons who hold skilled and paraprofessional careers in such assorted settings as collection homes and central houses; correctional, scholarly disability, and society mental health centers; family unit, child, and young people service agencies, and plans disturbed with alcoholism, drug mistreatment, family aggression, plus aging. Human services vocation fit into two classes: social services plus mental health services (Baker 579). Communal services specialists assist people develop their value of life. Psychological health specialists labor  Ã‚   directly with persons who are annoying to change performance or achieve an improved psychological outlook. Whether an individual is  triumphing over an addiction or curing after emotional shock, a trained psychological health expert can provide the right management.

Tuesday, September 24, 2019

Minutes Essay Example | Topics and Well Written Essays - 1000 words

Minutes - Essay Example Next, COL Haselden talked about the Garrison Leadership off site Conference that was held in Washington, DC on March 26 and 27, 2009. It was a very productive off site conference, which had around 60 employees who participated. During the conference, a professional Strategic Planner assisted our leaders in identifying the current critical issues and the actions that needed to improve. COL Haselden also talked about the mission statement that was slightly modified to include a safe and secure environment on the installation. He discussed the good and successful work accomplished over the past couple of years. Every Directorate and office had been successful in meeting their mission. However, the infrastructure on the installation is the most visible proof of our hard work, according to him. COL Haselden indicated that some issues in the focus area were customer service, Processional Development, Team Work, and Public Relation He talked about obtaining business cards of customer service representatives because he is a staunch advocate of good customer service. According to COL Hasleden, team work is very important. COL Hasleden was very impressed by the amount of team work that we exhibited at the Offsite and throughout the Garrison. Ms. Weatherington reported that the Civilian Development army is relying more heavily on its Civilian workforce to generate force and sustain our commitments. We are in competition for talented civilians with other government agencies and the private industry. Furthermore, she stated that we need to sustain the Civilian Corps contribution and the future depends upon the investment we make today. Ms. Moorash stated that the established assessment recognized by the industry is a solid predictor of occupational interests of the employees. It is beneficial to those starting to explore their education and career interests, but it is likewise used for confirmation that individuals are in the most appropriate career

International Financial Accounting Bosch 2006 annual report Essay

International Financial Accounting Bosch 2006 annual report - Essay Example Its spare parts are available for all vehicles. Under automative technology, Bosch engineers develop and test product innovations for motor vehicle manufacturers in research centers around the world. Bosch products go into serial production for new vehicles produced by many different manufacturers around the world once they have undergone extensive testing and meet its strict quality requirements. Bosch has contributed significantly towards making driving safer, cleaner and more economical being one of the largest manufacturers and suppliers of spare parts. (http://www.bosch.com/content/language2/html/3506.htm) Bosch is also a major producer and mahufacturer of home power tools, household appliances, garden tools and heating appliances. At the industry and trade Bosch provides communications services, power tools for professionals, sensors and foundry, security systems and packaging technology. The aim of this paper is analyse Bosch's 2005 annual report so as to assess the influence of institutional, cultural and external factors on the financial accounting and reporting system of Bosch. The rest of the paper is organised as follows: Section 2 provides an analysis of the the institutional, external and cultural influences on the financial reporting system, and a classification for the Accounting system, Section 3 looks at the extent to which Bosch is related to the international Accounting standards (IAS/IFRS) of the International Accounting Standards Board (IASB) and Generally Accepted Accounting Principles GAAP of the US Financial Accounting Standards Board (FASB). 2. ANALYSIS OF THE INSTITUTIONAL, EXTERNAL AND CULTURAL INFLUENCES ON THE FINANCIAL REPORTING 2.1 Institutional Influences 2.1.1 Management Structure The management structure has got an important role to play in the type of accounting system used. In the words of Hermann Scholl: "Responsible corporate management is partly about striking the right balance - a balance between result focus and values such as responsibility, openness and trust, fairness, credibility,and cultural diversity. This is fundamental to long-term success." (extracted from Bosch Group Annual Report, 2005). According to the 2005 Annual Report the supervisory council is kept informed by the board of management throughout the year and give close attention at its meetings to business developments, corporate strategy, the financial situation, and investment plans. It receives briefings on and appraises the business environment, new engineering developments, and the competitive position of the individual divisions, quality issues and cost cutting measures. This has an influence on the system on the financial reporting system. Bosch announced in its 2005 annual report that it is adapting an IFRS based internal control system as from 2006 onwards. A monthly business report will be prepared and they explain that the system gives the board management a survey of developments on corporate, business sector, and division levels. Comparison is done via an actual-target comparison, which is based on the annual business plan. The business plan has a

Monday, September 23, 2019

Precise Molded Products, Inc Case Study Example | Topics and Well Written Essays - 500 words

Precise Molded Products, Inc - Case Study Example This implies that, the staff might be concerned more with the technical part of production at the expense of the other parts such as the wrapping part that records the highest number of rejects. A critical analysis of both wrap and short suggests that wrapping does not require much expertise to do it, whereas measurement may require one to have knowledge of what they are doing. Sower (2003) asserts that the biggest cost of quality results from carelessness of the workers. Employees may become careless due to fatigue, lack of motivation as well as poor working conditions. It has been noted that, workers who are highly motivated when doing their work, make less mistakes (Sower, 2003). Moreover, if employees are overworked the probability of making many mistakes is very common. Consequently, managers should always ensure that all their employees are well kept in order to avoid small mistakes. By so doing the cost of quality will greatly be reduced. Mistakes that cause rejects cannot be avoided but can only be reduced because man is to error (Sower, 2003). Mistakes like discoloring and stains are caused as a result of simple human errors. Products may be handed by employees in a way that they are not supposed to be handled causing damage. Appearance of a product plays a very big role in the rejection of the product since a customer will dislike anything that is not appealing to the eye. Thus managers should ensure that products are presented in a way that is appealing to the customer. In addition, customer satisfaction also encompasses good delivery services, production of a variety of products and the product taste should be to the preference of a customer (Sower, 2003). The quality manager specifically complains of a rise and fall of rejects depending on the days. Sower (2003) explains that this is a clear reflection that the firm is experiencing accuracy as well as effectiveness problems. This can only be

Game scrabble Essay Example | Topics and Well Written Essays - 1000 words - 1

Game scrabble - Essay Example In this paper, we shall have a look into the lives of three characters and their relationship to scrabble (Petrillo & Chaikin, 2004). In the documentary video called Word Wars posted by Julian Petrillo and Eric Chaikin in You Tube, a detailed analysis is made about scrabble through looking into the lives of some of the characters who won the Scrabble prize money some years ago. One of the characters is Matt Graham, who at the moment was the 8th best player in the world (Petrillo & Chaikin, 2004). A close up into his personal and games life was made and the audience had a look at how a scrabble champion lives. In Matt’s case, he is obsessed with scrabble. First of all, Matt lives a simple life, he is neither rich nor poor, but he is constantly dreaming of becoming a champion another time so that he can take the prize money home. He is a down to earth person, and one could get a glimpse of what he does at his home (Petrillo & Chaikin, 2004). From the documentary, Matt does not have a regular job, though plays scrabble as a professional. In as much as he knows that becoming a professionally paid scrabble playe r entails a lot of hard work and dedication, he does not relent on this, but instead pushes himself to the limits. He has a library full of dictionaries to nourish him with new words (Petrillo & Chaikin, 2004). He has studied volumes of dictionaries and constantly yearns for more in order to build his word vocabulary. In order for Matt to boost his brain capacity to absorb the large quantities of information, he uses a number of drugs (Petrillo & Chaikin, 2004). From the documentary, you can clearly see he uses a number of brain boosters. One could think he is a psychiatric case with obsessiveness to the game through the kind of investments he has made for such a game. At his house, Matt is not an organized person based on the unarranged stuff in his house. In addition, he is not a