Wednesday, May 22, 2019

How Would You Like to Be Remembered?

As human beings, we should always act in a manner that people pull up stakes remember us for the good things we do and the legacy we live leave behind. When we die, our deeds live after us whether they are good or bad. Therefore, we should cook it at the back of our mind that we are making history by what we are doing presently.Consequently, I live my life, bearing it in mind that what I am doing someday will be used as a measure for judging me. Therefore, if asked how I would like to be remembered, what I will say is enumerated below.First of all(prenominal) I would like to be remembered as an individual with sound ethical values and principles and does not compromise them no matter what the circumstance may be. Also, impartiality is a characteristic that I would love to be recognized for.Personally, I have always strove to be fair with others and to recognize my mistakes while learning from them. In addition to this, I would like to be remembered as a person who respects others as much as respects himself. As a child, I have developed some values from my family to treat everybody with respect whether I agree with them or not.Furthermore, in my profession, I would love to be remembered to be a hardworking maestro who always strives and ensures that she maximises his potentials in order to bring the best outcomes in his work.I believe that a leader should be a visionary and so I would like to be remembered as a leader with a vision and passion for his personal and passe-partout life. Apart from these, I would like to be remembered as a team player and as someone with good organizational skills and critical thinking. This is because I consider these to be very important qualities that I would like to stigmatize my name.Summarily, I would love to be like to be remembered as person who is always keen and open to correction, always ready and calibre to learn. I compulsion to be remembered for the good that I have lived to do and to be remembered for the goo d and reput competent name which I have built.Why is the Cambridge MBA right for you?From my consideration, I submit that in any profession, people need to seek out additional knowledge in their field of study and broaden their horizon with the wealthiness of information available to diligent learners. Lifelong learning for me is a prerequisite of becoming a successful professional.In my quest for my professional development, I discovered my touch on and attraction to the field of business and finance, having come from a professional and academic Engineering background. At this stage in my life, I have decided to join on my knowledge in the field of business and finance.I strongly believe that this is the most appropriate time for me to devote myself to making the next step in my professional development. This has made me consider many universities and programmes and later deciding to apply to the Cambridge MBA. I highlight the reasons that informed my decision below.As an instit ution of learning, Cambridge MBA is one of the best so I will acquire a sound knowledge for the purpose achieving the best results for my future career goals. Apart from this, I made the decision because I want to enter dynamically into the financial and investment field.Also, I want to be part of success considering the fact that Judge Business School has built a respectable name in the world of commerce and I consider this to be a great success for the institution. I see this to be a great opportunity for my future career as a student of this programme to be a prospective recruit for top-tier companies.Cambridge MBA provides me with the opportunity to specialize in the real estate through the Electives and Consulting Projects. So far, I have learned that to attain greatness in ones personal and/or professional life, one must work hard. Needless to say, challenges are opportunities created to develop one personally and professionally.Experience has taught me the importance of makin g concise decisions and at the same time, being able to view issues from different perspectives in order to achieve the best result. I believe the Cambridge MBA can reinforce such qualities.In conclusion, I believe the competition and flashiness of the programme will serve as a great opportunity in improving my managerial and leadership skills, which are necessary for an advanced career. I consider that such knowledge, as the one that I will gain from this programme, is vital in pursuing my goals.

Tuesday, May 21, 2019

Hotel System

AMA COMPUTER LEARNING CENTER BSIT & BSCS DEPARTMENT In partial Fulfillment of the Requirement for the course Introduction to Software Submitted by Kim caper A. Hidalgo Jairus S. Echevarre Nikki Hanna P. Palanog Submitted to Karen Kate Seronay Date February 7, 2013 Chapter 1 Introduction A hotel is an establishment that provides paid lodging on a short-termbasis. The provision of basic accommodation, in times past, consisting onlyof a agency with a bed, a cupboard, a small table and a washstand has largely been replaced by rooms with modern facilities, including en-suitebathrooms and air conditioning or humour control.Today, most of the Hotels provide goods and services using computer governance. It helps to perform task in an easy way with less time consumed. Some companies are become richly automated while others strive for thesimilar setting. Computer programmers develop things like computer agreement that the rest of us could use. The computer programmers tell the users what todo. They make programs that users give the gate slowly used or understand. The advent of new technology gave rise to easy and hassle free interaction between and among humans.Whether it is in business, science or what perpetually task a person takes on the quality and speed of carrying it out are enhanced with automation at the core of this efficient Today, many carcasss form used an automation process like using computer trunk, due to the efficient and accuracy. Hotel Reservation System is a transaction processing establishment. In this establishment there are more advantages rather than a manual Hotel Reservation. 1. 1 Background of the Study The proponents want to know the reasons of hotel in using manual booking.The proponents pack a conduct towards the topic because they notice some of the hotel still use manual reservation. The education lead emphasize the effects of using manual reservation and how a computerized reservation will be substituted. Therefore, thep roponents purported to find out how to increase the number of customerusing computerized reservation Interaction and individual stimulation have always been joined tothe technological availableness of the time and place. With the transition toan information-based society, computers and transactions have evolvedfrom manual transaction.One of the solutions or alternatives to the problems that a hotel isfacing, a system was being developed which brush aside edit, delete, filter,monitor and monetary fund and secured the records of the customers. Hotel Reservation system is a transaction processing system that solves the problem encountered during the manual Hotel Reservation. The computerized Hotel Reservation System aims to simplify the manual Hotel Reservation fastest and holy. Database is divided thru World Wide Web (WWW).The proponents make use of some tools andtechniques to build the project. The system uses Graphical user Interface(GUI) to help the user give instruction to t he computer. The system once implemented it will solve the most common problems that the Hotel Reservation encounter. 1. 2 Target Client Dotties Place Hotel is a place for relaxation and fun. inhabit with overlooking the swimming pool and view of the hotel. Dotties Place Hotel is located at J. C Aquino Ave. Butuan City 8600, Philippines. 1. 3 Statement of the ProblemA number of travelers choose to book online instantly for the reason that it is comfortable and convenient. The level of convenience is simply unmatched because booking is just a click away. The advantages that come along with online booking cannot be ignored. This study will aid those hotels which are still using the manual way of hotel reservation and will facilitate travelers in booking in a hotel. It would excessively promote the hotel in a wider geographical range that is to advertise the hotel to acquire a competitive advantage over the other.Not all hotels are implementing an online reservation system which is the reason why some problems arise and that convenience is not achieved by the guidance and by the travelers. Through series of interviews, the researchers found the following problems * Important ain information of the leaf node are misspelled * Possible loss of important guests records who already made a reservation for a particular date * Inconvenient for the guest to reserve a room & Delayed report generation. 1. 4 Objective of the StudyThe main purpose of the study is to develop a generic online hotel reservation system to allow guests to reserve a room through the Internet. The development of this study specifically aims to * Provide the exact information of the guest * Provide a change record for the proper management of the information of the guest * Provide convenience for the guest to make a reservation, show the handiness of the room and give suggestions on the available rooms for the guest and * Generate generic reports to inform the management about the reservation . . 5 Significance of the Study This study is basically useful for the hotel management in the reservation in a way that it provides convenience both to the guest and the front desk officer. This study will be significant in the hotel proprietor as well as to hotel staff to gain more profit since it is online, the geographical reach will be widen thus making gross sales growth increased from time to time. Costumer convenience will also be emphasized because they can make any transaction anytime, anywhere. 1. 6. 0 scene AND LIMITATIONThe scope of the study is that the researchers will give a proper webiste that can be easily to use. Using computerized system that enables bussinesses to track services and aims to provide accurate and tested process on every transaction especially in a hotel reservation finding available rooms, the system tells you that this room is unavailable, deleting records, adding records, and to search records. This study is limited to other functions like pr inting the records. This study cannot have its own domain, due to lack of funds though this research is intended for educational purpose only. . 6. 1 Include The study focused mainly on the development of a generic online hotel reservation system. This allows the guest to inquire on the availability of every room in the hotel. The system is capable of registering the guest and a Captcha will also be provided to protect the system from web spiders. The system will accept online salary for hotels that require down payment through scanning and uploading of the bank receipt. Some hotels do not require down payment and the payment will be upon the arrival of the guest 1. 6. 2 ExlcludeThe system is limited to some areas wherein there will be two forms that the guest will fill-up. startle will be the Guest Registration Form containing the guest name, address, age, gender, status and the other one is the Guest way of life Inquiry and Reservation Form which contains the availability of th e room, arrival date, check-in date. 1. 6. 3 Dependency The system runs in a client-server environment. The hotel serves as the server-side and the guest is the client. The server is responsible for the confirmation and in prepareing the grace extent of the reservation.The system will automatically cancel the reservation if the guest exceeds in the grace period provided. Chapter 3 Software Analysis and Design 3. 2. 0 amaze System Planning Water Fall Model Systems Analysis Systems Design Systems Development System Testing System Implementation Systems planning Systems planning arrange is where the project initiation and needs gathering takes place. In this phase, the researchers performed brainstorming. It helped a lot in the data gathering of the researchers in order to list the requirements needed by the system as to its development.Systems analysis Systems analysis is the dissection of a system into its component pieces to study how those component pieces interact and work. Appropriate data were gathered by the researchers and were used for the systems requirement specification. The specified existing problems were given adequate solutions. Through series of interviews, the researchers have analyzed the given data to come up with concrete information and to specify the existing problems sequentially. Systems designSystems design is the process of defining the architecture, components, modules, interfaces, and data for a system to satisfy specified system requirements. In this phase also, the researchers used the gathered data in order to accomplish the logical design of the proposed system. System Development In the development of the system, the researchers considered the detailed users requirements to meet the desired requirements. These requirements are the guidelines in creating the reliable and better system.In this phase, the researchers also select the programming language to be used in the development of the system. The main task of the researc hers in this phase is to generate the rule of the system. System Testing In this phase, the system is tested against its performance and based on the requirements specified in the earlier phase using two divers(prenominal) ways. First was the Alpha Testing wherein the developers/researchers checked the system if it is capable of running in different operating systems.The researchers entered invalid inputs into the system to test if the system can handle such errors and give possible response. Second was the Beta testing, to test if the system is capable in making reservation through the internet. And the management can evaluate the developed system if it is user-friendly and if it meets the necessary requirements in the reservation process. System Implementation In this phase, the final product is the fully featured system with full functionality is then implemented. 3. 2. 1 Use Case Diagram New Entry for Check in Update Check InPerform Checkout View Room Status Search Customer In formation Staff Customer 3. 2. 2 Activity Diagram Stop User name and password do not match Start Log-inNO Staff Yes Check Availability Fill Check In Form Check In Update Reservation Checkout User name and password do not match Log-in Start Stop Adminn NO Yes Add room info Add room lawsuit info Change hotel profile Set room price Set floor info Generate Reports 3. 2. 3 Class DiagramCustomerCid integer Fname Varchar Mname Varchar Lname Varchar Gender Integer Contact No. Integer Emailadd Varchar(50) checkinDate DateTime Stay Integer CheckoutdateDateTime Prepaid Integer Room Info RoomId Integer Room No. Integer Roomava Integer report Varchar RoomType RoomType ID Integer RoomType Varchar Room No integer Login Usrname Varchar (50) Password Varchar(50) Permission varchar(50) Hotel Profile Name Varchar Address Vharchar Email Varchar Contact No. Integer AddHotelProfile() UpdaeHotelProfile()

Monday, May 20, 2019

Who is Beloved and what is her role or purpose in the novel Beloved?

The character of beloved in the novel by Toni Morrison in his book entitle beloved symbolizes a lot of important ideas which are crucial to a comprehensive understanding of the novel. victorious a look at the context of the story itself, dearest is seen as an apparition that came back to refuge the woman who was responsible for her death when she was a toddler.The event of her return caused lots of emotional reaction in other characters most especially Paul D and Sethe who as a result of trying to suspend their erstwhile(prenominal) were unable to truly know themselves, thus, this prevented them from forming a strong relationship with their infantren.To be more specific, the characters of good in the novel assisted two other characters namely Paul D and Sethe to resolve their past events. Moreover, to flash back, we can say that costly can be understood to be an epitome of the large-hearted of problems which arise between mothers and their daughters that occurs as a conseque nce of the extreme cruelty experienced via slavery. On an intense, subliminal level to the characters in the story, the character of Beloved may be considered to be a reminder of the past.The Beloved succeeded in forcing the characters in the novel, especially her mother to first of all understand the pains from her past ahead beginning to work through it. Her presence caused all of the characters to come to terms with themselves before her departure. Personally, not nevertheless do I bet this novel asserts the chance of reconciliation of the past or a better(p) understanding of it from a symbolic point of view, I think it also serves some other necessary function for the readers as sound.It also relates a dramatic, severe and ruthless picture of some of the worst terrors of slavery. Beloved, when viewed symbolically is more than merely a character in Beloved but holds a huge meaning as a symbol in the novel as well. All the stories enclosed within the miscellaneous character of Beloved in this novel by Toni Morrison, is made of many fragments which cannot be fully compass until the end of the novel, At the outset, the reader is made to be believe that Beloved is a ghostly being, who is an realise figure of Sethes slain daughter.But Later, a story was revealed by Stamp Paid of a girl locked up by a white man over by Deer Creek. Found him dead work summer and the girl g genius. Maybe thats her. Toni Morrison presented the text afterwards in such a way that both(prenominal) assumptions were well supported. The possibility that Beloved is the slain child is backed by the fact that she sings a poem which is known only to Sethe and her other children Somewhere else, she also speaks of Sethes earrings although she had not seen them.From my perspective, Beloved being Sethes reincarnated child would have helped the characters in the story and it would have helped Sethe to assuage the guilt she feels over the death of her child. I think Morrisons intention in presenting the story in such manner was to make the readers more active quite than passive and make them work to unravel what is going on. In conclusion, I think the character Beloved in the Novel entitled Beloved by Toni Morrisonis Sethes child, the third one, who was murdered at the age of one and became a ghost in 124 for up to next twenty days before she was reborn. Although, she was 21 years old in her outward appearance, she has the mind of a toddler. Thus, Beloved was trying to find Sethes affections as well as a revenge for a murder which she still cannot comprehend. In the novel, she serves as both a character as well as a representation for the past and the sixty-million slaves that were murdered in the tenderness Passage. .

Sunday, May 19, 2019

La Grande Odalisque and Olympia: Comparison/Contrast

ii exquisite paintings with a effeminate reclining nude statue as the focal point are La Grande Odalisque by Jean Auguste Dominique Ingres and Olympia by douard Manet. The female nude has been a crucial subject for art end-to-end history. The angular curves and the sensuality that can be created with just a form has intrigued artist in the past, present, and future. charm the similarities of these twain painting are more evident, there are still contrast between the pieces.Ingres was from France and he painted during the Neoclassical Period, firearm Manet, who was also from France, painted during the Realism and Impressionistic Periods. Their live overlapped each other for only thirty years, tho their styles belonged to different periods. Ingres lived through the French Revolution and was very much stirred by it although Manet was born after it was over.Seeing such a drastic change in the human beings in which he lived caused Ingres to pay very close attention to the detail s of the past. He wanted to exert it perfectly and he also looked to the techniques of the masters before him. Manet was not so much concerned for the past, but his eyes were on the present. His subjects represent the French societal and cultural setting of the time period in which he lived.La Grande Odalisque by Ingres is an oil painting of a l integrity nude female reclining on her bed. Her body faces away from the viewer, while the woman looks back over her shoulder. There is only a coup doeil of her breast under one of her arms and the rounded sides of her buttocks are visible.Olympia by Manet has two females in the oil painting. One is a black servant woman and the reclining female nude. Manet depicted his nude facing the viewer. Her breasts are completely exposed and her genitals are covered by her hand. There is a tropical feel in Manets painting Even though she has covered part of herself, this female seems more open with her nudity and the female in Ingres painting is mor e subtle and alluring with her body.Ingres uses dim shades of green jewel tones to create an elegant effect. Manet also incorporates the color green, but he emphasizes the utter(a) white which allows the female to stand out. The white also gives a harshness to the painting. It is as if someone off on a bright overhead light in the middle of a sensual moment. The pose in Ingres painting tends to blend with her surroundings.Both females hold something with her hand, but Ingres females fan is one of peacock feathers which blends in with the rich tones of the background. At the barefoot of Ingres nude, there is a pipe and green stool, while there is a black cat at the high healed feet of Manets. Manets figure wears an orchid in her hair as well as the shoes. She finds no modesty with the observation of her servants stare and is completely open with her sexuality.The female nude is the predominate subject of both paintings but the differences muse their artist and there artistic pe riods. While they are both alluring, they are also starkly contrasted. Manet and Ingres were decidedly masters of their times, and the La Grande Odalisque and Olympia are examples of both of their best work. Both of these works are alluring and sensual paintings that will mystify viewers as long as the two works exist.

Saturday, May 18, 2019

Use of a Thrust Stage in Ruby Moon

The texts studied in class, Matt Camerons cherry-red Moon prove to have great potential for being performed on a drop stage. When presented with a space such as this, it allows the director to be exposed to a vast rove of ideas, conventions and concepts that would not be effective on a proscenium arch stage. Through this space, the director is fit to break through all traditional styles of classic shoe box theatre creating a eccentric experience for the audience as opposed to precisely a spectacle.It cracks open wide the expressions, notions and insecurities of the text and the characters, exposing a physical sense of vulnerability and weakness. By placing audiences on three sides of the space evolves the concept of many muckle peering into the lives of both Ray and Sylvie (Ruby Moon). It enforces the concept of the audience being given the opportunity to experience this fractured fairy chronicle or very real circumstance within a theatrical scenario.Furthermore, this space e nables the audience to be engulfed in the style and absurdist, gothic, fast-paced and heart wrenching Ruby Moon. Many may be sullen away from the idea of political theatre/ Brechtian but when placed on a thrust stage, the texts understood obtain the same concepts and dramatic meaning, however elements of drama such as tension, space, contrast, mood and audience/ stunner relationship are magnified focusing more on the conventions of the play as opposed to just the messages.Theatrical elements such as costume, set and lighting also have the opportunity to be re-worked and re-invented to cater for the space. Ruby Moon delivers a series of quirky characters that Ray and Sylvie visit along the street of Flaming channelize Grove. Incorporating the style of transformational acting.Read alsoMoon By Chaim Potok

Friday, May 17, 2019

Cultural baggage and Cultural tourism by Dr Jim Butcher, an evaluation Essay

Dr Jim Butcher, the write of the article above, has researched on its various facets of touristry such as its moralization, innovations, and pagan, ethical, ecological and anthropological aspects and also as a tool for sustainable development. He has several publications to his recognize (www. canterbury. ac. uk). The article under review authored by Dr Butcher appears as a book chapter in the apply Innovations in Cultural Tourism(2001) edited by him.Key issues of the article are the positive and say-so aspects of ethnical tourism which some critiques discount it as antidevelopment and pr angiotensin-converting enzyme to cause conflicts between the host and the tourist. The author is of the view that cultural tourism has its roots to the mans craving for alien cultures and the need for succour from monotony of modernity and as such it has naturally come as a blessing to the economically backward regions. He has found three aspects of culture as a function, as a last(prenomina l) and as a difference overshadowing the goodness of cultural tourism.The main aim of the author is to dispel the detrimental impression created by these aspects in the minds of the critics. The book chapter under evaluation is not in laymans language. Even a discernible student of tourism would find it difficult to distinguish between cultural baggage and cultural tourism or relationship between the two terms. Whatever Dr Butcher says round cultural tourism has been in one aspect or another touched upon by his peers.That the cultural tourism has come of age and is capable of benefiting the economically weaker nations or places within nations and that it promotes cultural exchanges, fusion of culture, that it hardly promotes or creates awareness of hosts culture and that it has been gradually making countries sans boundaries with only natural barriers by creating a feeling of oneness, have all been also discussed by other authors on the subject if one happens to visit the website of the UNESCO on cultural tourism. (unesco.org) and many others. His unique findings are that the over functional culture, its bypast character and its difference outlook overshadow the real creative character of cultural tourism. He has taken pains to explain all the three in almost four pages out of hardly six, which is an index number of his serious concern towards Cultural Tourism. His conclusion that cultural tourism results in economic development is thus true. Man is basically gregarious and therefore cultural tourism with its benefits is unstoppable.The cultural tourists and the hosts are the actors and we are the audience. It inwardness differently to each one of them. If the actors are allowed to have their own way, the inevitable result will be what the author Dr Jim concludes with, that is development. There is no doubt cultural tourism is growing segment of the travel food market Mass marketing is giving way to one-to-one marketing with travel being tailored to the interests of the case-by-case consumer.A growing number of visitors are becoming special interest travellers who rank the arts, heritage and/or other cultural activities as one of the top five reasons for travelling(nasaa-arts. org). It has been said that softwood tourism has had its detrimental effects but there are advocates for mass tourism for its own benefits. Certain unsuitable conflicts of cultures are just harmless side effects and are not to be taken soberly for the sake of larger benefits cultural tourism.On the whole Dr Jims contribution in this chapter leaves the reader more informed and makes him act responsibly as an audience whether as a policy maker or whoever, in order to preserve and promote the goodness of cultural tourism markedly different from mass tourism. REFERENCES Butcher, J. (ed) (2001), Innovations in Cultural Tourism, ATLAS, Tilburg http//www. canterbury. ac. uk/business-sciences/sport-science-tourism-and-leisure/staff/dr-jim-butcher. asp access ed on July 12, 2006 http//www. nasaa-arts. org accessed on July 13, 2006 http//portal. unesco. org/culture/en/ev. php-accessed on July 13, 2006

Cj 216 Uncle Bob Assignment

How the Police Access information to Obtain abominable Information tammy Mills CJ216-01 November 15, 2011 Carter Schoenberg How the Police Access Data to Obtain guilty Information Law enforcement communicates between every state in the United States. Each state uses varied programs which makes up different types of databases, and keeps track of just somewhat everyone who has some sort of identification. A featrs attest is the just almost common form of identification, and everyone in the United States is suppose to convey a up-to-date number one woods licence to drive a vehicle leg each(prenominal)y. tammy is going to the state of Florida with her Uncle curtsy and her uncle is driving because she does not stick a legal drivers license. tammy has only an identification cable card. curtsy has a crook record because he spent five days in San Quentin Penitentiary for auto theft and armed robbery with a patch. The Trip On wondrous 5th 2006 docking facility calls t am to see if she is available for a two-week devolve on to Miami Florida to see the sights. bobber lives in San Diego atomic number 20 and tam lives in Moxee Washington. Tammy entrust fly to San Diego on noble 12th 2006 to meet with uncle bottle cork, and they will start the trip to Miami from San Diego.The trip is set to start August 13th 2006. bob and Tammy hope to be back in San Diego calcium on or around the 27th of August. To sidereal day is the day of departure. docking facility fills the silver blazer with gas at the local anaesthetic anesthetic AM/PM convenient store. dock also decides the blazer needs to be washed. Right miserly door to the convenient store there is a car wash. Tammy dispatchers to wash the vehicle and notices the license plate number. The license plate number is 448 UZO. The road trip has officially started. Tammy and bobsled have to travel through Arizona, New Mexico, Texas, Louisiana, Mississippi, Alabama, and Florida.Arizona is hot so the windows argon down, and the radio is blaring with country music. Tammy and bobsled are laughing and having a great time catching up on erstwhile(a) memories. In Texas, during the night driving Tammy has questions about wharfs five-year incarceration. Tammy does not requisite to bring up bad memories for Bob alone she just wants to know what happened to explain why Bob disappeared. Bob explains that he did time for stealth a car and robbed a bank with a part to satisfy Tammys curiosity. After this conversation Bob trusted over at the next tolerate moderate to obtain some sleep.Tammy awakens suddenly to the sound of a semi-truck passing by, she is a little shaken so she wakes up Bob, and they start on the road again. As time goes by Tammy and Bob become dazed by the trees and the scenery that they did not notice that they were running low on solid food and gas. Luckily they had just entered a small town in Louisiana where they can fill up and obtain some food. While Tammy i s in the restroom, she overhears a conversation about a bank robbery and a stolen car and how they were never able to find who did it or where the car is. Tammy brushes if off and continues with her day on the road with Bob.More time flies by and Tammy mentions something about her back botheration from sleeping in the car so Bob offers for them to stay in a hotel for the night. When Bob awakens he notices that Tammy is gone and there is a note left by the door. Bob I will be back, I have to obtain some female things from the drug store. Love you, Tammy. Bob is piss to hit the road and waits for Tammy to return. Tammy returns with some food for the road. As they hit the road Bob seems a little cautious and Tammy notices that he is thinking about something, and she cannot put her hitchhike on it.Tammy begins to wonder what happened to him in prison. What has him so uptight that he is on guard? Tammy at last gives up and falls asleep. Bob wakes up Tammy as they are entering the c ounty lines of Mississippi and Bob offers to get some breakfast and an opportunity to stretch from sitting in the car so long. As they pull up and get out of the car Tammy walks around the car and again notices the license plate number 448 UZO. They get done eating and the set off for the road again, they stop at a river to cool off since Mississippi has a high humidity level they decide to stop and look at the scenery.After they have spent enough time cooling off Bob and Tammy hit the road again for the millionth time. As Bob and Tammy pass the miles by Tammy begins to doze off, she eventually passes out and awakens just as they enter a small town 50 miles from the county lines of Alabama. Bob and Tammy decide to stop at a rest area for the night and obtain some more than sleep. When Tammy awakens she discovers that Bob has stopped to obtain food and gas. Tammy finds out that they are halfway through Alabama, and she slept 10 hours. Bob returns to the car, Tammy eats, and they are on the road again close to their destination.Tammy obtains excitement when she sees the sign for Florida, but what she does not know is that everything is about to turn upside down when they pull up into a Dairy Queen in Miami Florida. The Initial Traffic Stop The whole trip, the revive limit was 70 miles per hour. Bob is used to the speed and forgot the speed limit decreases to 35 miles per hour. When Bob and Tammy entered Miami city limits Tammy noticed a jurisprudence car behind them. The patrol car followed them for about a minute before she saw the red and blue lights come on. Bob noticed the patrol car also and pulled into a Dairy Queen parking lot. Bobs behavior changed in an instant.Bob starts to sweat, and he is gripping the steering wheel. The police police military police officer walks up to the driver side window and rents Bob for his proof of insurance, drivers license, and registration. Bob gives the officer everything the officer asked for. Tammy thinks this i s just going to be a casual traffic stop. The officer walks back to his vehicle and runs everything through the computer. The officer seems to taking longer than usual and the more time the officer labors Bob seems to be uneasy. Tammy looks behind the patrol car, and sees another patrol car pulling into the parking lot and wonders why another law enforcement officer is assisting.Tammy sees the two officers tattleing but she cannot hear what they are saying to each other. The officer finally comes back to the car window to dress down to Bob. The officer asks both Tammy and Bob to exit the vehicle. Tammy removes herself from the passenger seat and Bob removes himself from the driver seat. Both of us are asked to come to the rear of blazer. The assisting officer escorts Tammy to her patrol car to ask her some questions and the other officer has a conversation with Bob. The assisting officer asks Tammy if she has any identification and she says yes and pass on the officer her ident ification card.The officer asks Tammy if she would consent to a wait. Tammy says yes again. After the quick search the assisting officer explains to Tammy that she is not under arrest but she has to be placed in bondage for both Tammys and the officers safety. As Tammy is in handcuffs and leaning on the patrol car, the assisting officer is running her identification card through the discussion section of Motor vehicle database. This will to take some time because Tammy is from Washington State and not from Florida. The Miami-Dade Police Department has to contact the Department of Motor Vehicles in Yakima Washington to verify Tammys identification.Communication Methods One communication method between each officer and the Miami-Dade Police Department is the walkie-talkie. Officers are linked through a radio relative frequency to the police departments dispatcher. The flake method is the use of the laptop computer, but Tammy and Bob are not Florida residences. The computers data base in the patrol car may be circumscribed to specific types of information. If the computer has a malfunction the best way to confirm information is through the local dispatcher. The third method of communication between the officers and the Miami-Dade Police Department is the Automated Fingerprinting System. The police officer is using Cross Match Technologies MV-5 Mobile Wireless Capture Device (Foster, 2005, P. 128). When Bobs fingerprint is scanned his criminal muniment comes to light. Tammys fingerprint is also scanned and the results show no criminal history. The fingerprint also substantiate Tammys identification. Bob is arrested because of some information on the vehicle from the Department of Motor Vehicle shows that the car was stolen. Tammy is arrested for the suspicion of auto theft. Once at the Miami-Dade police station Tammy and Bob are put into different rooms.The arresting officer wants to look into Bobs criminal prehistorical a little deeper. Collecting and An alyzing the Information from atomic number 20 to Florida Knowing that Bob is from California, the officer taps into the study Law Enforcement Telecommunication System (NLETS). According to (Dempsey, n. d. P. 101) this strategy is linked to all the states and many federal agencies unneurotic for the exchange of criminal justice information. The officer can obtain information on the vehicle, Bobs drivers license, criminal record, prison information, and parole information.Even though the officer has enough information undeniable to arrest Bob. The officer wants to mug reference the information with other systems to make sure the information is correct. The second system the officer taps into is the Department of Motor Vehicle (DMV) in California. The DMV record shows that the silver blazer license plate 448 UZO is stolen. The record shows the vehicle was reported stolen on August 12th 2006 at 300 a. m. The officer calls the San Diego Police Department and talks to the officer w ho wrote the auto theft report. The officer is told that the blazer is in the impound yard in Miami Florida.The officer in San Diego updates the report to reflect that the vehicle is found and inquires the officer in Miami about information on a 9mm handgun. The officer in Miami does not know anything about a firearm but remembers that the blazer was never searched. The 9mm handgun and the blazer are registered to a Linda Andersen. The California police officer informs the officer in Miami that the blazer was involved in a robbery with a firearm and will fax the report right away and that Bob is on parole. The third system that the officer taps into is the National Crime Information System (NCIC).According to (The FBI Federal potency Investigation, n. d. P. 1) The NCIC database has 19 files to pick from. The two files of interest are the vehicle file and the gun file. When the fax comes in from California, the officer cross references the 9mm handgun and the blazer. The informatio n from the NCIC also shows that the 9mm handgun and blazer are both registered to Linda Andersen. The gun file shows where she bought the firearm and that she has no criminal record. With everything cross referenced and copies of all information collected, it is time to talk to Bob.Uncle Bob Confesses The police officer walks into the room to talk to Bob. All the information that was collected from the NCIC, FBI, and the San Diego Police Department is true. Bob confirms stealing the blazer and the handgun. Bob also admits to the robbery with a firearm and the parole violation. Bob tells the police officer that the 9mm handgun is in a little compartment on the driver side in the back of the blazer. Bob also ensures the officers that Tammy was in no way involved nor had knowledge of the stolen car or the robbery.Bob explains that he just wanted Tammy to take the trip with him to get to know her. The police officer explains to Bob the seriousness of involving Tammy in this trip and has Bob write down his confession. The officer also explains to Bob that California police is asking for extradition back to California on the parole violation. The officer leaves the room to go talk to Tammy. Officer explanation to Tammy and Bobs Charges Tammy has no idea why Bob is arrested. The officer explains that the car was stolen and that Bob is linked to a robbery with a firearm that occurred August 12th 2006 at 300 a. . Tammy cannot believe what she is hearing. Tammy tells the officer that her flight on this day did not arrive until 600 p. m. Tammy thought that Bob was done living a criminal life. The officer believes that Tammy did not have anything to do with the crimes committed. The officer explains to Tammy that she is free to leave but Bob has to stay in custody and wait for extradition back to California. The officer also explains to Tammy that Bob will be charged with theft of a vehicle, a parole violation, and a robbery with a firearm by the state of California.Bobs extradition is set for August 23rd 2006. Bob is back in California by August 30th 2006 and his trial is set for September 10th 2006. Meanwhile, Tammy has flown home without incident. mean solar day of Trial The day of the trial has come. The judge reads the charges of grand theft, violating parole, and robbery with a firearm. Bob pleads guilty to all charges and is sentenced to 25 years back in the San Quentin Penitentiary. Bob receives five years for grand theft, 10 years to finish his last conviction term, and 10 years for the robbery with a firearm.Bob and Tammy never talk again because Tammy feels that she cannot trust her uncle any more. Bob writes a letter to Tammy to apologize, but Tammy burned it. Conclusion In conclusion, most technologies overlap. With the use of index cards, computers cross reference information so law enforcement saves time by not having to search for files individually. The Miami-Dade Police Department cross referenced a large amount of information jus t to make sure the information provided to them by the state of California was accurate and correct.Without the use of different agencies being able to communicate with each other, criminals would have an easier time privacy from law enforcement. To this day Uncle Bob is still in prison and Tammy is continuing her education. References Dempsey, J. X. (n. d. ). Overview of Current Criminal Justice Information Systems. Retrieved from http//www. cdt. org Foster, R. E. (2005). Police technology (1st ed. ). Upper Saddle River, NJ Pearson/ Prentice Hall. The FBI Federal Bureau Investigation. (n. d. ). Retrieved from http//www. fbi. gov/about-us/cjis/ncic