Sunday, December 29, 2019

Ancient Civilizations Essay - 495 Words

#1 nbsp;nbsp;nbsp;nbsp;nbsp;A pattern that was common among the ancient civilizations of China, Rome, Greece, Mesopotamia, Egypt, and India was that most of them started as a dictatorship, a monarchy, or a dynasty. Eventually, most of them changed to a democracy, republic, or to class systems. Almost all of the civilizations had one or two great leaders. For example, Egypt had King Tut, Greece had Alexander the Great and Rome had Julius Caesar. nbsp;nbsp;nbsp;nbsp;nbsp;China has had many different leaders through the years. Dynasties, or a series of rulers from the same decent, ruled this government. Some of the most powerful dynasties were the Shang, Zhou, and Qin. These dynasties and many others ruled from the times of 1500†¦show more content†¦The Athenian government evolved from a monarchy into an aristocracy. A monarchy is when a King or Queen exercises central power. In Greece, the government was headed by a privileged minority or upper class, which ruled his or her own city-states. They created a system based on the right of each individual citizen to speak out about issues. nbsp;nbsp;nbsp;nbsp;nbsp;India was an ancient civilization that had many rulers and empires. The first rulers were the Harappans. They ruled from 3500 BC through 1500 BC. The Aryans took over the Harappan empire around 1500 BC. Then, Alexander the Great came and took over control of India. After ruling for only a couple of years, he died. A few years later the Mauryan Empire took over. Next was the Ashoka. Finally, the Guptas ruled from 320 BC through 535 AD.nbsp;nbsp;nbsp;nbsp;nbsp; nbsp;nbsp;nbsp;nbsp;nbsp;The last two civilizations were Egypt and Mesopotamia. Rulers of Egypt were called Pharaohs, and Mesopotamia had a class system wherein the highest class was the rulers. Besides the ruling families, the high class also included leading officials, and high priests. The small middle class had merchants, artisans, and lower priests. The majority of the people were at the bottom and were peasant farmers. nbsp;nbsp;nbsp;nbsp;nbsp;These are the ancient civilizations and what their governmentsShow MoreRelatedAncient Civilization Of Ancient Civilizations2605 Words   |  11 Pagesevent or celebrate or revere a person or God. Mayan stelae monuments are monuments that were fashioned by the Maya civilization of ancient Mesoamerica. They consist of tall sculpted stone shafts and In ancient Maya society, cosmological beliefs encompassed all aspects of life and integrated individuals into a unitary worldview and culture. Inspired by their beliefs, Mayan civilization created some of the most intricate monuments, decorated in colors and hieroglyphics that depicted important imageryRead MoreAncient Civilizations : Compare And Contrasting Ancient Civilizations804 Words   |  4 PagesContrasting Ancient Civilizations Most people believe that all ancient civilizations were the same: they all lived with a steadfast loyalty to their one and only king that ruled all of the lands, civilizations only achievements were monumental buildings, and they vacuously attacked neighboring societies to gain more land for millennia. While some of this knowledge is true to an extent, civilizations accomplished an abundance more than some realize. Some fail to register that early civilizations are uniqueRead MoreThe Ancient Civilization1622 Words   |  7 Pagesadvanced civilization is perhaps the most intriguing story of all.To understand what causes great civilizations, it is vital to note the process of collapse in other civilizations, such as the great Roman Empire. Differences in time period, geographical landscapes, and other circumstances mean no direct correlations are possible, but the outstanding point of similarity is that no single factor accounts for a large civilization s collapse. One similarity betw een these two civilizations is the processRead MoreMayan Civilization : Ancient Civilizations1314 Words   |  6 PagesMayan Civilization The mayan civilization was one of the earliest civilizations that occupied areas that are today known as Guatemala, Northern Belize, and Mexico. The mayan civilization lived through what is known as the Classic Period. Their culture began about 250 C.E. and ended near 900 C.E. While most of the population lived in what is present day Guatemala the population of the mayans rose from 5,000 to almost two million people near the end of the Classic Period. Although the mayans are knownRead MoreThe Differences Between Ancient And Ancient Civilizations1017 Words   |  5 PagesThe different civilizations around the world all have different religions and beliefs. Some may be derived from a past culture and some may be thought up on their own, but they all have a way of doing things regarding their religion. From sacrificing food for their gods, praying to their gods, and building temples in honor of the gods, a civilization can have many different ways to worship the gods and remain devote d to their religion. The three specific religions from the Sumerian, Egyptian, andRead MoreThe Civilizations Of Ancient Civilization1178 Words   |  5 Pages Civilization, derived from the latin word â€Å"civis† meaning â€Å"citizen†, or simply someone who lives in a city. However, what is the difference between a group of people who live in a town and our modern concept of civilization. To find the answer to that question we can turn to the civilizations of ancient times. The beginning of civilization as we know it began in the Neolithic era. This era began with a very distinct change to the way of life, from the old way of migrating constantly to whereverRead MoreEssay on Ancient American Civilizations635 Words   |  3 PagesAncient American Civilizations Cultural development can be separated into three categories of increasing intellect and complexity. Tribal is the lowest form of civilization, Chiefdom the intermediate level, and finally the state level, which represents the highest form of civilization in Ancient America. The tribal band represented the basic primitive level of civilization. In Ancient America, the tribal level was a loose association of bands or villages. TheRead MoreThe Mayan Civilization : Ancient Civilization1425 Words   |  6 PagesThe Mayan Civilization: For many centuries the Mayan was of life was a mystery to archaeologists. Their geography, social structure, government, economy/trade, technology, writing, and arts were all thought to be forever lost. Now, as archaeologists are still uncovering more information, what was once referred to as â€Å"The Lost Civilization of Maya†, has been awakened from the grave of unknown. Geography: The ancient Mayan Civilization surrounded by the Gulf of Mexico and the Pacific Ocean stretchedRead MoreAncient Civilizations And The Egyptian Civilization1403 Words   |  6 PagesWilliam McNeill, author of A World History, is in accordance with the belief that ancient civilizations who were in constant contact with conflict and war could develop a more advanced system of law, bureaucracy, and market prices. By that logic, Mesopotamia would have been far more advanced than Egypt. For example, Mesopotamia frequented attacks from barbarians because of the lay of the land. They also had trouble controlling war between centers of industry due to the inevitable struggle with theRead MoreAncient Egyptian Civilization : Ancient Civilization930 Words   |  4 PagesThe ancient Egyptian civilization is one of the oldest known civilizations in history. It is believed that the ancient Egyptian civilization, based in eastern North Africa, started around 3150 B.C., and survived until 31 B.C. I n this ancient civilization, art was considered to be magical. Whether in the form of painting, sculpture, carving or script, art held the power to maintain universal order and grant immortal life by appealing to various gods to act on behalf of people, both in life and in

Saturday, December 21, 2019

Week 1 Submission Essay - 1132 Words

Homework (100 points) Part 1 Create the tables from demo.sql script Download and Copy the demo.sql file from the Doc Share to the C:\temp directory. At the sql prompt enter the command @V:\temp\demo.sql. This will create some tables and insert data into them. View the script in notepad to determine the table names that were created. Use the describe command to view the structure of the tables. Please use the template below to provide your solutions. Write SQL statements to solve the following requests. Question (4 pts per question) | SQL statement or answer | 1. List all employee information in department 30. | SELECT * FROM emp WHERE deptno = 30; | 2. List employees name, job, and salary that is a manager and†¦show more content†¦Show the employee name, salary, commission, and the total of salary and commission. Be sure you evaluate null values correctly. | | 13. Write an SQL query that retrieves data from the COURSE table for courses that cost 1195, and whose descriptions do not start with ‘Intro’, sorted by their prerequisites in descending order. | SELECT COURSE_NO, DESCRIPTION, COSTFROM COURSE WHERE COST = 1195, DESCRIPTION != INTRO%, PREQUISITES DESC; | 14. Write an SQL query that retrieves data from the STUDENT table for students whose last names begin with â€Å"A† though â€Å"T† and who work for ‘Competrol Real Estate’, sorted by the last names. | SELECT * FROM st udent WHERE (WHERE last_name LIKE [A-T]) AND employer = Competrol Real Estate; | 15. Determine which student does not have the first letter the last name capitalized. Show the STUDENT_ID and LAST_NAME columns. | SELECT student_id, last_name FROM student WHERE SUBSTR( last_name, 1,1 )= SUBSTR (LOWER (last_name), 1,1) | 16. Check if any of the phone numbers in the INSTRUCTOR table have not been entered in the (###)###-#### format. Show the instructor last name and the phone number that is in the incorrect format. | Select phone, last_name from instructor where translate (phone, 0123456789,##########) lt;gt; (###)###-####; | 17. Write an SQL statement that uses the CAST function that converts a number datatype to a varchar datatype. | | 18.Show MoreRelatedCourse Activity : A Case Study Of Students1088 Words   |  5 Pageshours, then on Saturdays of 35.48 hours, last on Tuesdays of 32.25 hours. The main areas the X, Y, Z students are engaging is the Content folders, Discussio ns 1 2, and e-Activities. The highest weeks of student’s engaging in the LMS were in Week 4 and Week 5. The main areas the students did not engage were in Career insights, Week 3 and Week 6 shows they were low in Discussions, Assignments, e-Activity, and Content folders. Equally important, these students were actively using the LMS on TuesdayRead MoreOverview Of A Case Study1054 Words   |  5 Pageshours, then on Saturdays of 35.48 hours, last on Tuesdays of 32.25 hours. The main areas the X, Y, Z students are engage is the Content folders, Discussions 1 2, and e-Activities. The highest weeks of student’s engaging in the LMS were in Week 4 and Week 5. The main areas the students did not engage were in Career insights, Week 3 and Week 6 shows they were low in Discussions, Assignments, e-Activity, and Content folders. Equally important, these students was actively using the LMS on Tuesday,Read Moreis3110 project1391 Words   |  6 PagesProject Part 1 % Grade 8% Project Part 1 Task 1: Risk Assessment Plan Week 1 Week 2 4% Project Part 1 Task 2: Risk Mitigation Plan Week 1 Week 3 4% Project Part 2 Project Part 2 Task 1: Introduction and Business Impact 8% Week 3 Week 4 4% Project Part 2 Task 2: Business Continuity Plan (BCP) Week 3 Week 5 2% Project Part 2 Task 3: Computer Incident Response Week 3 Week 5 2% Week 1 Week 6 9% Analysis Plan Team (CIRT) Plan Risk Management Plan Final Submission DeliverablesRead MoreMgt 300 Module 3 Leadership and Teams891 Words   |  4 Pagesthe following two assignments to complete this week. Do not do both assignments. Identify your assignment choice in the title of your submission. Leadership and Teams – Theoretical Leadership Models Synthesize the topics of leadership and teams by crafting an essay in which, using supporting materials, you assess the theory and practice of leadership as it relates to teams. In your critical essay, address both of the following items: 1. Describe and explain how one leadership model (aRead More200336 Business Academic Skills 2011.1 Essay Instructions (50%)900 Words   |  4 Pageshas been learnt throughout the entire semester. Details Due Date: Length: Week 14 Workshop and online (Turnitin) 1200 words Based on the Learning Portfolio assessment, write a 1200 word academic essay addressing the following question. Students should include six (6) to ten (10) scholarly references which include at least three (3) of the Five Required Resources found on vUWS in the Assessment Tasks sub-folder called Week 14 - Essay, as well as any other references that may help them support theirRead MoreEssay on Acc 504965 Words   |  4 Pagesproject at the end of Week 5 and the final, completed project at the end of Week 7. Using the financial statements for Oracle Corporation and Microsoft Corporation, respectively, you will calculate and compare the financial ratios listed further down this document for the fiscal year ending 2011 and prepare your comments about the two companies’ performance based on your ratio calculations. The entire project will be graded by the instructor at the end of the final submission in Week 7, and one gradeRead MoreComparative Analysis of Kohl and J.Cpenny Essay9 09 Words   |  4 Pagesend of Week 5 and the final completed Project at the end of Week 7. Using the financial statements for Kohl’s Corporation and J.C. Penney Corporation, respectively, you will calculate and compare the financial ratios listed further down this document for the fiscal year ending 2010 and prepare your comments about the liquidity, solvency and profitability of the two companies based on your ratio calculations. The entire project will be graded by the instructor at the end of the final submission in weekRead MoreSupply and Demand and Academic Honesty Policy Essay1057 Words   |  5 PagesGE273: Project PROJECT DESCRIPTION This project has three parts, namely Part 1, Part 2, and Part 3. Project Part 1 Introduction: Different economic studies estimate the price elasticity of demand for certain goods, some of which are reported on page 176 of the Hubbard/O’Brien textbook. The following table presents select elasticity of demand estimates from those reported on page 176. Product Barnes Noble books Coca-Cola Cigarettes Beer Gasoline -4.00 -1.22 -0.25 -0.23 -0.06 Estimated Elasticity Read MoreCourse: Financial Ratios and Ratio1201 Words   |  5 Pagesend of Week 5 and the final completed Project at the end of Week 7. Using the financial statements for Oracle Corporation  and Microsoft Corporation, respectively, you will calculate and compare the financial ratios listed further down this document for the fiscal year ending 2011 and prepare your comments about the liquidity, solvency and profitability of the two companies based on your ratio calculations. The entire project will be graded by the i nstructor at the end of the final submission in weekRead MoreProject Management Models973 Words   |  4 PagesExercise 4 1. Hamilton Country Parks is planning to develop a new park and recreational area on a recently purchased 100-acre tract. Project development activities include cleaning playground and picnic areas, constructing road, constructing a shelter house, purchasing picnic equipment, and so on. The PERT/CPM network shown below is being used in the planning, scheduling, and controlling of this project. D 2 A 9 1 6 3 4 H 6 C E 0 I 6 7 3 Activity time in weeks B 6 3

Friday, December 13, 2019

Private and Public Police Free Essays

Private and Public 1. Relationship between Private and Public Police Lillie Johnson CJS 250 Gregg Herchek April 11, 2010 Private and Public 2. Abstract In my paper I will be discussing the relationship between private and public police, I will tell you how the conflict regard the definition of the public and private space and how it influence the relationship between the two, and I will tell you ways to maintain or improve the relationship between public and private police. We will write a custom essay sample on Private and Public Police or any similar topic only for you Order Now Public and Private 3. In the relationship between private and public police, private police are different. Private officers do not work for us; but they do offer their services for corporations, they basically focus on the corporation that hired them. Private police has three times more than public police does. The private police care less about the due process, civil rights, and the public safety. â€Å"Private police dwells on the protection, immediate deterrence, and commercial enforcement†. Private Security and the Law, 2004). â€Å"Private police have become the most fast growing industries† (Zielinski, n. d. ). Businesses and corporations must hire their own private guards. Private police may be used in certain situations where the public police may have the skills to carry out the job. For example in New York, the private police from the agency went to a place and the private police paid for services, then they brought about affidavits explaining what they had do ne. After that was done then this was a cause focusing on the place to close. Being that these polices was not being honest and they did not represent themselves in the way they should have they was prosecuted for illegal acts. Public police are employed through local towns while private police works for companies. On the other hand, the public police are sometime charged with protecting the citizens and the cities and they have jurisdictions. Now you have a few public police that will overstep their bounds, but I believe only if they feel threaten, but if not then the headquarters are responsible to the public. In each city, public and private police has different ways of relating. Public police help members of communities to help bring about complaints against the private security, but I believe this is only done if something is done wrong. Public police was established back in colonial times and succeeded until the eighteen hundreds. The public police are considered local, state, or federal and their duties are the safety and welfare of the public. Private police has the right to carry a gun, and they also have the right to search and arrest anyone whom they feel has committed a crime†. (Cramer, 2010). Majority of the communities feel that the private police cares more about trying to please their employer than protecting the public, but I believe that they are only doing what they was trained to do. It is certain quality that only allows the private police to do so much. To the average citizens private officers looks like a real police but they do not have the powers to do what a r eal police do. Public police comes with a lot of work, they are trying to protect and serve. I do believe it is hard trying to keep criminals off the streets without enough of force; they can not be everywhere at one time. Private police has the same authority as the city police. Private and Public 4. Conclusions I believe ways to maintain or improve the relationship is to have public meetings where all the force are there and discuss the ways they are similar and how each of them have certain responsibilities. In the article from what I understand private and public police are presented with what is called, â€Å"us versus them† mentality and both are doing their best to protect us no matter if they are private or public police, they are doing what they was trained to do. I also believe that once the public and private police have their meetings they should have one for the community, listen to their views and become their friends and they will probably feel safe calling them if needed. Then the private and public police will know how and what to do to help the community, this to me I believe will help make more room for improvements. Public and Private 4. References Cramer, M. (2010). Police Lend Ear to Worried Tenants. The Boston Globe. Retrieved from Http://www. boston. com/news/local/massachusetts/articles/2010/04/01/html Http://web-mit. edu/gtmarx/www/private. html Schneier, B. (2007). Schneier on Security. Retrieved from Http://www. schneier. com/private-police. html Zielinski, M. (n. d. ) Armed and Dangerous: Private Police on the March. Convert Action Quarterly. Retrieved from Http://mediafilter. org/caq/CAQ54p. police. html How to cite Private and Public Police, Papers

Thursday, December 5, 2019

Analysis and Design of Distributed Pair Programming System

Question: Create a Systems Analysis and Design (SAD) portfolio for either a real or fictional small business entity (SBE) or non-profit organisation (NPO) by presenting a comprehensive SAD report? Answer: Introduction Wiggle ltd is an e-retail company of UK that sells bikes and sporting goods. This company was started with a small independent bike shop and later on spread their business with online accessories. The e-commerce business of Wiggle ltd has become a leading supplier company who supplies to triathlon, running and cycling. It is a good brand for the accessories of the car, cycling and the gyms of the modern cultures. A turnover report of 140 in 2012 is noticed in the Wiggle ltd and the growth of near 20percent of global economy has occurred. The best market of the Wiggle Company regarding to the growth of economy was noticed in Asia, Europe and Australia (Stewart, 2011). There are about 70 million visitors and about 3 million orders dispatches in the year of Olympic. There are several sites of Wiggle in the server and also several advertising sites. The products of the company available in the online shop are such as bikes, shoes, audio equipments, bags, books and other accessories of th e cars, cycle and gyms. As an e-retailer company there are several requirements in case of expanding their business in the field of online business. In case of expanding the business, they need to provide new and modern products to the customers. The company required to review their products and also if possible renew them. The feedback of the customers is required to collects in time to time and should apply those feedbacks and make new products according to those requirements. The company should require targeting the market needs and focusing on the products and services to the customers. Also the company required to focus on the revenue that are generated in the past years and present years and required to compare those ratios to estimate the further cost structure. Wiggle planned to modify their products of bicycle accessories and seek new growths. Customers required high quality products as they worry more about their health then the parts of the cycles, bikes and cars and also the do not compromise their products with costs. Wiggle became UKs largest online bicycle seller company for the last few years but also it is required to make some changes according to the needs of the market to keep growing. They are required to collects the all the feedbacks of the customers from the social networking site as it is the best place to get the feedback (Stewart, 2011). Company should implements new technologies to extract the information of the customers for further growth. To successfully handle the data of the business in the wiggle company, it is required to implement the big data and the cloud system in their operational system. Communication Building and Information Gathering For the successful data handling, company required to make different plans in their business strategy. In case of gathering different information of the customers, stakeholder and the employees of the company, it is required to plan an effective communicative workflow and a data workflow in the business. Communicative workflow is required to analyze and design the business process in the virtual world i.e. in the online business. To build the communication plan it is required to interact with the customers and the employees of the company. The feedbacks of the customers are required to collect and the best ways of gathering the customers feedback is from the social network sites. Company can use the big data technology in their business to extract information of the customers from the social sites (Tian, 2012). It is also essential to instant reply to the customers queries in the companys sites. The interaction with the customers can be done through the emails, SMS and messaging syst em. Also it is required to plan the workflow of data in the business to keep track the requirement of the business time to time. The data workflow can be plan from the information of the present products and the products that are to be required to manufacture in the business. It is required to keep track of all the information of the products that are sold in the past years and the products that are to be manufactured in the present years. Also the maintenance of the records regarding to the manufactured products and the demand of the customers are required. The ratio of the dataflow of the past and the present years should be noted. It will help to estimate the cost and the types of products that will required in the future. To design the system successfully, it is required to collects all the information of the communicative workflow and the data workflow in the business (Tian, 2012). This information will help the organization to calculate the past performance of the company and also to estimate the future requirements of the company. Cloud system can use in the system of Wiggle company to store the information of the different workflow of the business. It can also used to store the information and the feedback of the customers so that there will be no problem in extracting any of the information anytime from anywhere. Trust management Thrust management is very essential in the companies to secure the internet policies of the company. The security system should be maintained in the wiggle ltd in case of accessing the data from the internet. Standard and the general purpose mechanism should be provided to specify the credentials and the security policy applications. There five basic components of the trust management system: Actions Actions are the operations that are required to control the security of the company in the e-retail business. As all the information of the products and the services are provided in the internet, there should be a strong security system to protect the internal information of the Wiggle Company from other competitors (Shelly and Rosenblatt, 2012). Also there is information of the regular customer of the company which are required to be secure otherwise the trust of the customers will be break from the organization. Principals The Wiggle Company should identify the principals of the company that are required to authorize the taken actions. The security system provided in the server of the company should be managed by the IT specialist of the company. The https security should be implemented in the server so that nothing can be hacked (Schirner, 2013). Only the information of the products and information related to the products should be available in the website. None of the internal information should be provide in the server. Policies Policies should be maintained to authorize the principles of the wiggle company. The investigation should be done to know the requirements of the customers which are required to provide in the websites. The information provided in the server should be according to the investigated results. Credentials All the actions, principals and the policies that are to be taken should be done with the advice of the trustees (Park and Rim, 2012). If the actions are approve by the trustees then only it should taken. The principals should be authorized only if it meets the requirement of the customers. Compliance checker The task of the compliance checker is to determine the actions that are requested by the principals and are required to be handled. They are also responsible for polices needed to be taken and to set the credentials (Leva et al., 2012.). Wiggle Company required following all the requirements of the company along with the requirements of the customers regarding to the products and the services of the organization. In the e-commerce business of the Wiggle Company, the approaches of the trust managements are very essential in case of maintaining the security policies of the server of the organization. The trust management has great advantages in the mechanism of the authorization control in the Wiggle Company. System Security Analysis and Design It is required to analyze the security system that can be implemented in the business of the Wiggle Company. Before implementing new security system it is required to determine the current security of the system and find the gaps that are presents in the existing system. The security of the server of the company is required so that no one can steal the internal information of the products and use it in other organization (kumar, 2014). It will provide a bad impression to the customers of the company. Also in the e-commerce business, customers are required to pay for the products online. There should be a proper security to the information of the debit card and the credit card numbers of the customers so that they should not face any problem regarding to their account in future (Killingsworth, 2011). The system should be design so that all the internal data regarding to the information of the customers and the information regarding to the data of the company and the products can be secure. The information of the products should be schedule which contain when the product should be implemented, manufactured and will be ready to release in the market. Investigate: An investigation is done regarding to the requirements of the customers. Information: Gather the information of the customers interest about the products and the new fashion of the market. Design: Implement the information to design the products. The design should be implementing to produce the product (Glover et al., 2010). Manufacturing: After designing of the products, manufacture is started. All the requirements of the customers should be implements in the manufacturing of the products. Implementation: After manufacture, the products are implemented in their server. The advertising is done in the websites of the company. Feedback: The feedback of the customers should be collected from the social site and the comments that are provided by the customers in the company websites. Also along all these step it is also required to make a proper schedule of the products, time and the cost of the production (Du, 2012). The Wiggle Company should get the feedback of the customers from the sports and the Olympic Games that are recently completed and get the information about their products that are used in the sports. Also the company is required to maintain a data storage policy in their business. They are required to store the past data and compare the ratio of the past data with the present data to estimate the future requirements. Also the duration of the maintenance of the products should be calculated (Dou, 2010). The products of the Wiggle Company such as bikes, cars and their accessories should be regularly maintained according to the requirements of the customers. Figure: Communication Process in Wiggle Company Self-Reflective Commentary In the e-retail business, the creation of the SAD portfolio is very much essential to improve the business of the company. I have to search several site and also do many question to the employees and the managers of the company to get the information of the products and the services of the company. The lists of the products that are manufactured in the Wiggle ltd Company are gathered from the shopping websites of the company (Diniz, et al., 2010). Also the comments of the customers are collected from the many other site of the company to get the feedback of the customers. After finishing the projects, I though the project is successful. I succeeded in searching all the information of the company and produce the portfolio. The project can be helpful for the other e-retail business also who are willing to enhance their products throughout the world. Also I think that the project can be made more prominent by direct questioning to the customers and the employees of the company. It will provide me more information about the company business (Dennis, et al., 2012). If I will get one more chance to do the project then I will do all the required parts that I cannot do in this assignment. Also I will gather the feedback from the customers by questioning them through their social networking sites and will use that information in my work. Conclusion In this particular assignment it is cleared that to provide a system analysis and design to the Wiggle ltd it is required to investigate about the interest and the requirements of the customers from the information that can be gather from the social sites and the comments posted on the websites (Chiang, et al., 2011). The e-retail business required to make strong the security system of the company. Also it is required to integral the internal data of the company and schedules the requirements of the e-business of the Wiggle Company. Reference List: Chiang, R., Siau, K. and Hardgrave, B., 2011. Systems analysis and design. Armonk, N.Y.: M.E. Sharpe. Dennis, A., Wixom, B. and Roth, R., 2012. System analysis and design. Hoboken, NJ: John Wiley. Diniz, P., Da Silva, E. and Netto, S., 2010. Digital signal processing. New York: Cambridge University Press. Dou, W., 2010. Analysis and Design of Distributed Pair Programming System. IIM, 02(08), pp.487-497. Du, Q., 2012. The Analysis and Design of Internet Course Teaching System for Operation System. AMM, 239-240, pp.1637-1640. Glover, J., Sarma, M., Overbye, T. and Padhy, N., 2010. Power system analysis and design. Stamford, CT: Cengage Learning. Killingsworth, W., 2011. Design, analysis, and optimization of supply chains. [New York, N.Y.] (222 East 46th Street, New York, NY 10017): Business Expert Press. kumar, V., 2014. Design and Performance Analysis of Optical Transmission System. IOSR Journal of Engineering, 4(5), pp.22-26. Leva, A., Maggio, M., Papadopoulos, A. and Terraneo, F., n.d. Control-based operating system design. Park, Y. and Rim, M., 2012. Factors Analysis Affecting Success of RFID Implementation. The Journal of Korea Information and Communications Society, 37(2C), pp.157-167. Schirner, G., 2013. Embedded systems. Berlin: Springer. Shelly, G. and Rosenblatt, H., 2012. Systems analysis and design. Boston: Course Technology Cengage Learning. Stewart, G., 2011. Well test design analysis. Tulsa, Okla.: PennWell. Tian, Y., 2012. Frequency-domain analysis and design of distributed control systems. [Place of publication not identified]: IEEE Press.