Saturday, December 28, 2019

Economic Growth And Development Of Latin America Through...

Economic Growth and development of Latin America Through Socialism. South America is turning to the left this much is widely known. It is due to the socialist ideas and values that are very old in the Latin American culture. They can be found, according to Hugo Chà ¡vez, in biblical texts, in the Gospel, and in the practices of our indigenous peoples. The Bolivarian Revolution that started in Venezuela under the presidency of Hugo Chà ¡vez has reignited debate in Latin America and internationally on the questions of socialism and revolution introducing the reflections on class-struggle, neoliberalism, counter-power, revolutionary parties, community and communes, economy, politics, society, race and the hopes, and prospects of what is called â€Å"Socialism 21st Century† in contemporary South America. Neoliberalism is the deregulation and expansion of the market economy, it includes eliminating barriers to trade such as tariffs and government subsidies of national industry, and implementing national policies that favor the needs of business and investment (â€Å"Is Capitalism a good†). This in turn causes a loss in state revenue, which means a loss in the amount of funding available for social welfare programs. Neoliberalism became dominant in Latin America, especially in the 1990s, because of the debt crisis, the availability of highly educated technocrats, a new middle class of entrepreneurs, the failure of import substitution industrialization, and public support. Most Latin AmericanShow MoreRelatedThe Collapse Of The Soviet Union1387 Words   |  6 PagesHowever, in Latin America there has been a resurgence of socialism into the 21st century. This resurgence has come to be known as the Pink Tide. It is associated with a moderate form of socialism that attempts to work with the current capitalist global economy and globalization. Although the degree of socialism differs from country to country, the foundation among all the states was to rebuild the region through multipolarity and solidarity. Since the implementation of neoliberal economic policies inRead MoreRussia and Latin Americas Responses to Industrialization Essay1499 Words   |  6 PagesIn the 19th century, Russia and Latin America responded similarly to industrialization in the formation of a growing middle class, in a â€Å"boom† in exports and new economic ties, in urbanization, and in similar acts of revolutionary disobedience against a dictator. Latin America, as a result of industrialization, created a small market for manufactured goods unlike Russia’s vast industrial market powered by foreign investments. Also, there were long-term effects to Russia’s revolution in which a socialistRead MoreUnderstanding Latin Americas International and Economic Relations wi th Import Substitution Industrialization Model1546 Words   |  7 Pagesit’s benefits as well as its shortcomings, a small introduction of how it came to be and why must be provided. As a product of the 1930s economic crisis and wear and tear of the liberal model, ISI appears in Latin America as another economic option, proposed by ECLA (Economic Commission for Latin America, dependent of the UN) as a means of bringing Latin America out of stagnation and work towards industrialization to eliminate its dependency on agriculture which was seen as vulnerable. There are twoRead MoreImport Substitution1497 Words   |  6 Pagesmeant to generate employment, reduce foreign exchange demand, stimulate innovation, and make the country self-reliant in critical areas such as food, defense, and advanced technology. What Does Import Substitution Industrialization (ISI) Mean? An economic theory employed by developing or emerging market nations that wish to increase their self-sufficiency and decrease their dependency on developed countries.  Implementation of the theory focuses on protection and incubation of domestic infant industriesRead MoreSummary of Development of Underdevelopment1309 Words   |  6 PagesThe Development of Underdevelopment by Andrew Gunder Frank - A book Summary In his writing regarding underdevelopment of development, Andrew Gunder Frank has tried to illustrate the history of the development, underdevelopment, and the evolution of dependency to a world system theory. Finally he has come up with some alternatives and has tried to elaborate the new dualism and the recent movements in the world. According to Frank, development thinking emerged as an instrument of post war AmericanRead MoreLatin American International Locations Aren t Resistant The Global Disaster1352 Words   |  6 PagesLatin American international locations aren t resistant to the global disaster. It hit this place as it was emerging from one of the maximum severe periods of expansion in current many years. according to ECLAC figures, local GDP grew an annual common of five% among 2003 and 2008. that is a median growth of greater than three% consistent with capita, a figure that had no longer been carried out because the days of the import substitution model (ECLAC, 2008, p. 13). a few countries like ArgentinaRead MoreDemocracy and Accountability: Making the Transition from an Authoritarian Regime1600 Words   |  7 Pagesrights can, at times, motivate social and political groups to move mountains. In the 1980s, authoritarian regimes were representative of these large obstacles. This struggle is not new to Latin Americans. Throughout their history, from slavery, which still exists today, to political and religious oppression, Latin Americans have continually fought to gain basic human rights. Americans have come to see these rights as rooted in life, liberty, and the pursuit of happiness. In the late twentieth and earlyRead MoreEssay on Liberation Theology in Latin America1734 Words   |  7 PagesThe populist governments, seen in the 1950’s and 1960’s in South America, spurred industrial growth and a sense of â€Å"consciousness† amongst the inhabitants of the Latin American countries. The industrial growth greatly benefited the middle-class and the working-class; however, the poor were driven into shantytowns and rural areas. To illustrate the great poverty of this time in Latin America, people living in â€Å"shantytowns† resided in vast settlements built of cardboard and other available materialsRead More CUBA: The Great Journey in Economic Develo pment on the United State’s Doorstep5530 Words   |  23 PagesCUBA: The Great Journey in Economic Development on the United State’s Doorstep Introduction A discussion of Cuba and the occurrences within the country over the last century is often surrounded by probing analysis as to the extent to which the Revolution of 1959 actually served as a change from past regimes. It is ignorant to evaluate the revolution in a vacuum, because past events that created the climate where such a change could take place. Yet it is also immature to stateRead MoreTheories or Concept Practices of Developing Countries1234 Words   |  5 Pagesjustice, equity, fair and equal economic opportunities for all citizens. A democratic government has branches and institutions for implementation, formulation and enhancement of policies and laws; a basic democratic government has the judiciary, the legislature, the Executive and most recently the Civil Society (Robinson, 2001). Collaboration of these institutions ensures that the society has better living standards. Democratic governments promote human rights and development; human rights policies designed

Friday, December 20, 2019

Was It A Self Defense - 1022 Words

Was it a self-defense? Jimmy Carter once said, â€Å"I say to you quite frankly that the time for racial discrimination is over†. If only this was the case. African Americans are still wrongfully racially profiled based just on their skin color. After researching this topic with the help of many trustworthy sources, the Zimmerman Trial began to seem more like an act of racial profiling rather than self-defense. This was determined by considering what Trayvon Martin was doing at the time and if Zimmerman’s actions were correct. Although racial profiling still occurs today, African American lives should matter as much as any other Americans. Trayvon Martin’s actions are said to be what ultimately lead George Zimmerman s response. Zimmerman is†¦show more content†¦This needs to be fixed in our nation as this should not be allowed. In another stage of the case, a debate kicked off about what happened after Zimmerman began chasing Martin. Zimmerman was told b y the police on the phone that he was not required to chase after Martin. From witness Rachel Jeantel understanding, Martin told her that Zimmerman was chasing him and confronted him. Jeantel claims she, â€Å"heard Trayvon say, ‘Why are you following me for’† (Linder). This is critical because, if Zimmerman were to have proceeded after Martin, denying requests from police officers to stay put, then this would show that Zimmerman had some sort ill feelings towards Martin. Zimmerman was wrong for this because acting just off of his hate towards African Americans does not condone his actions. This is not certain as from Zimmerman’s perspective Martin was the one who jumped him. If Zimmerman really did see Marin as â€Å"a suspicious guy†, why would he follow him unless he had intentions of putting up a fight. There are many factors that are making Zimmerman look like the bad guy in the situation. Furthermore, after the altercation between Zimmerman a nd Martin escalated, the two soon sprung into physical attacks, but it is unknown who acted first. Jeantel once again claims to have overheard Martin say, â€Å"‘Get off, get off.’ Suddenly the phone hung up, shut off† (Padnani). Zimmerman, having disobeyed police orders, continued to follow Martin and then

Thursday, December 12, 2019

Business Technology & Knowledge Management

Question: 1. Describe risk analysis as it relates to information systems security and explain three ways to approach systems security risk. 2. Valacich describes four international business strategies in the digital world, what are they? Describe each one and point out their relevant strengths and weaknesses. 3. What does the term knowledge worker mean in the context of todays business world? 4. View the following sites: i. www.informationweek.comii. www.itwire.comiii. www.delimiter.com.auiv. www.computerworld.com.au Then write a paragraph on which technologies and issues seem to be current (hot) at the moment, and which seem to be most important to business managers, according to each of these sites. 5. Describe what primary and secondary storage are, compare and contrast these two types of storage. 6. Describe the four services available from a network i.e. network services. 7. List and explain three benefits of using extranets. 8. List and describe the five typical revenue models for e-commerce. 9. What are the advantages of storing information in a relational database using a database management system (DBMS)? 10. Contrast technological safeguards and human safeguards in information systems security, using examples to illustrate your points. Answer: 1. Describe risk analysis as it relates to information systems security and explain three ways to approach systems security risk. Risk Analysis in information system has been referred to as process of determining risks developing plans as to how to mitigate the risk in a well define manner. Risks arise due to either some threats (untrained staff, illegitimate user, manipulation of the information) or vulnerabilities (hackers, poor network design, and poorly designed website). The three ways to approach systems security risk have been discussed as under: i.Acceptance: Acceptance refers to the process of accepting the risks. In case of information systems security, the business managers on behalf of the authorized person are liable to accept the risk either high or low (Aloini, Dulmin Mininno, 2007). ii.Mitigation: Mitigation refers to the commonly used approach for systems security. In this fixing the flaws providing some strategies to overcome the same is done. iii.Transference: Transference refers to the process of allowing a third party to accept the risk on your behalf (Anon, 2015). 2. Valacich describes four international business strategies in the digital world, what are they? Describe each one and point out their relevant strengths and weaknesses. The four international business strategies in the digital world are as follows: i. Home replication business strategy: Home replication business strategy refers to type of strategy which is very common in todays globalized economy. In this type of strategy, the organization pursuing the same mainly focus on their domestic customers need and export their products so as to generate additional sales and profits. ii. Global business strategy: Global business strategy refers to a type of business strategy in the digital world where in products are lunched in the global market. It has been seen that, companies who practice this type of strategy try to attain economies of scale (Kim Solomon, 2012). iii. Transnational business strategy: Transnational business strategy refers to a type of business strategy where in the organization decides as to what all aspects are to be decentralized what all aspects are to be kept under central control. iv. Multi domestic business strategy: Multi domestic business strategy refers to a type of business strategy where in markets are flexible and responsive to the as well as demands of the market as a whole. 3. What does the term knowledge worker mean in the context of todays business world? Knowledge worker in todays business world refers to the type of worker whose main capital is knowledge. Some of the examples of a knowledge worker are software engineers, architects, engineers, doctors, scientist, lawyer or any other personnel whose main aim is to think for a living (Amar, 2002). A knowledge worker can be distinguished from an ordinary worker on the basis of its problem solving skills which require high levels of creative divergent skills. In todays business world, a knowledge worker is referred to as a worker who has a deep background in terms of education expertise in a particular field. In some fields knowledge workers are also known by the term Gold collars as they are highly paid personnels (Awad Ghaziri, 2004). 4. View the following websites: informationweek.com itwire.com delimiter.com.au computerworld.com.au Then write a paragraph on which technologies and issues seem to be current (hot) at the moment, and which seem to be most important to business managers, according to each of these sites. The technologies issues which seem to be hot at the moment and important to the business managers have been discussed in this section of the report. They are: Technological at the moment: One of the emerging technologies which can be seen in todays business environment is the virtual reality (VR) services. It has been seen that, there are nine core industries which are impacted by VR. Issues at the moment: A site i.e. Delimiter has come to an end. This has led to a great loss in the technological advancements. 5. Describe what primary secondary storage are, compare and contrast these two types of storage. Primary Storage: The internal hard drive of a computer is termed to be as primary storage as it stores the data which is directly accessible to the CPU of the computer. Secondary Storage: The external hard drives are known as secondary storage as they are not directly connected to the computers CPU. External hard drives store information magnetically The difference between primary secondary storage has been discussed as follows: Primary Storage Secondary Storage Primary storage refers to the main memory of the computer. Secondary storage refers to the external devices such as Compact Disk, Floppy, any magnetic device, etc. Primary storage easily access the CPU of the computer. Secondary storage does not easily access the CPU of the computer. Primary storage is connected via CPU. Secondary storage is connected via data cables. Storage in primary memory is faster. Storage done via secondary memory is slow in nature. 6. Describe the four services available from a network i.e. network services. The four services available from a network i.e. network services have been mentioned as follows: E-mail file sharing Online games World wide web (www) file server Instant messaging printing 7. List explain three benefits of using extranets. Extranet is similar to intranet, but the main difference is that it is used to select external partners such as suppliers, customers business partners to exchange the useful data or information. The three benefits of using extranet have been described as under: i. With the help of extranet, more integrated supply chains can be implemented. With the help of integrated supply chains, proper track of orders and inventory management can be practiced (Bort Felix, 1997). ii. The second benefit of extranet is to have an effective collaboration amongst the business partners to work them online on a common documentation grounds. iii. Lastly, extranet will help the businesses to improve its relationship with the trading partners improve the security measures of the same as the communication between the parties will be done under a secure environment (McKenna, 2006). 8. List and describe the five typical revenue models for e-commerce. The five typical revenue models for e-commerce are as follows: i. Advertising revenue model: In advertising revenue model, fees are generated in exchange of the advertisements done by the advertisers. For example, google.com, facebook.com, etc ii. Sales revenue model: In this type of revenue model, wholesalers retailers sell their products online. The main benefits attained by the customer are in terms of time saving, fast delivery of the product and convenience (Rajput, 2000). For example, amazon.com, buy.com, etsy, etc iii. Subscription revenue model: In this type of revenue model, users are charged on a periodic basis i.e. monthly, yearly or weekly basis to incur a particular type of service. For example, xing.com, linkedin.com, zattoo.com, paypal.com iv. Transaction fee revenue model: In transaction fee revenue model, company receives commission on the basis of volume for executing the transactions. The major source of revenue is the transaction fee paid by the customers (Laudon Traver, 2002). For example, ebay.com v. Affiliate revenue model: The affiliate revenue model refers to the type of model which is based on the principle of commission. In this type of model, the merchants advertise sell their products with the help of partner websites. Commissions are provided to the merchants based on the actual revenue earned (McKercher Mosco, 2007). This model is a win win situation when they earn high levels of commission on sale of the product or service. For example, affilinet.com. 9. What are the advantages of storing information in a relational database using a database management system (DBMS)? The advantage of storing information in a relational database using a database management system (DBMS) is discussed as follows: i. Improved decision making: Well managed data better access of data helps to generate better quality data which will help to make one of the best decisions. ii. Better end user productivity: DBMS helps the users to combine its data with various tools to convert the data into useful information (Dhillon, 1997). iii. Data security: It has been seen that, when more number of users access the data, the security of the same becomes at risk. With the help of database management system (DBMS), a framework is provided to provide better data privacy security policies (Kim Solomon, 2012). iv. Better sharing of data: DBMS helps to create an environment which helps the users to have better access of data. Such type of an environment helps the users to respond quickly (Fisher, 1984). v. Better access of data: DBMS helps the end users to have access of the prompt queries. 10. Contrast technological safeguards and human safeguards in information systems, security, using examples to illustrate your points. Technological safeguards refer to the safeguards which are built to protect the information as well as control the access of the same. Some of the measures which are used to safeguard the information are the limit to access the electronic information, use unauthorized information, etc. Some of the elements which are taken into consideration in case of technological safeguards are as follows: Integrity Access control Authentication identity Audit control Human safeguards refer to the measures taken by personnel to measure as well as protect the hardware facilities in store. It has been seen that, threats either in paper or electronically creates problem as a whole. Therefore, various policies procedures shall be taken place in order to safeguard the information technology (Jemielniak, 2012). Some of the elements which are taken into consideration in case of human safeguards are as follows: Device media control Security of the workstation Access to control of the technology Use of the work station References Aloini, D., Dulmin, R. and Mininno, V. (2007). Risk management in ERP project introduction: Review of the literature.Information Management, 44(6), pp.547-567. Amar, A. (2002).Managing knowledge workers. Westport, Conn.: Quorum Books. Anon, (2015). Awad, E. and Ghaziri, H. (2004).Knowledge management. Upper Saddle River, N.J.: Prentice Hall. Bort, J. and Felix, B. (1997).Building an Extranet. New York: Wiley Computer Pub. Dhillon, G. (1997).Managing information system security. Basingstoke: Macmillan. Fisher, R. (1984).Information systems security. Englewood Cliffs, N.J.: Prentice-Hall. Frappaolo, C. (2006).Knowledge management. Oxford: Capstone Pub. Hrsa.gov, (2015).How Do I Ensure Security in Our System?. Hvide, H. and Kristiansen, E. (2007).Management of knowledge workers. London: Centre for Economic Policy Research. Jemielniak, D. (2012).The new knowledge workers. Cheltenham: Edward Elgar. Kim, D. and Solomon, M. (2012).Fundamentals of information systems security. Sudbury, Mass.: Jones Bartlett Learning. Laudon, K. and Traver, C. (2002).E-commerce. Boston: Addison Wesley. McKenna, B. (2006). Infosec institute opens doors.Infosecurity Today, 3(1), p.6. McKercher, C. and Mosco, V. (2007).Knowledge workers in the information society. Lanham: Lexington Books. Patalas-Maliszewska, J. (2013).Managing knowledge workers. Berlin: Springer. Rajput, W. (2000).E-Commerce systems architecture and applications. Boston, Mass.: Artech House.

Wednesday, December 4, 2019

History of Bsu Che free essay sample

After a year, the proposed Bachelor of Science on Hotel and Restaurant Management was recommended by the Babuls Academic Council in a Referendum dated February 2, 2001. The Institute of Home Economics shall help realize the vision of the Vulcan State University to become the center of educational development in Vulcan and in the whole nation. The first director of the institute was Proof. Fidelity P. Stared. The second dean of INCHES was DRP. Eloise Monoester P.Jose, a graduate of Doctor of Philosophy, Major in Home Economics in UP Dilemma who took her office last 2003 and retired at April 27, 2008. The institute had its first batch of graduates in BASE last March 2004 with Ms. Catherine S. Dollop as Magna UCM Lauded. AS regards to the BSRAM students, they are having their on-the-job training in various hotels and restaurants in the Philippines as well as in Singapore. Beginning 2003, INCHES was also transformed as a service college. We will write a custom essay sample on History of Bsu Che or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Hence, mom economics subjects in the other colleges like Food Technology, Garments Technology, Consumer Education, Home Management, and other related subjects are now handled by the Institute. The institute transferred to the new Home Economics building beside the IBIS Hostel on August 2006 though the effort of the former University President Rosaries Pimento. Due to the increasing student population the Institute was converted into a college on August of 2006. Upon the retirement of DRP. Jose on April 13-15, 2008, the College of HomeEconomics submitted its programs for CLAMP accreditation and passed the preliminary visit. As recommended by the IBIS Academic Council, the proposed course BBS Tourism Management was approved and offered in school year 2009-2010. On February 6, 2009, two major fields of specialization in BASE were approved by the Vice President for Academic Affairs, DRP. Iranian D. Faustian, BASE major in Food Production Entrepreneurship and Beauty Culture and Hair Science Entrepreneurship and will be offered in school year 2009-2010.

Thursday, November 28, 2019

Close Reading Analysis Of Last Of His Kind Essays -

Close Reading Analysis of Last Of His Kind The 33rd President of the United States of America, Harry S. Truman, had over ten biographies published about him, each one being different from one another. This book is especially unique due to its style, easy reading, and simple sentence structure. The tone of the book Last of His Kind, by Charles Robbins, is best described as informative and effusive, in other words the book is very outgoing by often giving "fun facts" and a great deal of insight. There is also some juggling of conversation between Harry, his friends, and the author. This "juggling" helps to give the book its own distinct style and also keeps the reader focused. The author's view towards Truman was very admiring. The style is informal for conversations due to the use of jargon like "I put up a whirlwind membership campaign for the Kansas city Automobile Club and made a good living at it." This suggests that Truman is being involved in automobiles and often gives a little insight. Also, it often seems as though Harry is speaking to the reader directly. Slang is also a big part of conversation mostly because of the author's attempts of making the conversations appear more life-like by giving the people the southern accent that they had. Slang sayings like "?you were late and you caught the devil" are also often used, throughout the whole book. Other slang words like "Bum," and "gimpy" are also being used. The formality and informality fluctuates between the author and Harry. When Harry is speaking the style is informal but when the author is speaking the style switches to high formal. The sentence structure is basically simple and conversation-like when Truman or his family/friends are speaking but changes to compound and sometimes complex when the author is speaking. A good example would be "?[s]o I came to the United states senate and went to work? (notice the simple words) Beyond pointing out that both his opponents had not been above seeking Pendergast's help?." Notice the change of style between Truman's sentence and the author's. Figurative language like metaphors and similes are only used in conversations. Most sentences are clear, organized and parallel. They are also very specific when referring to certain actions in the past that will affect the future. The sentences are mainly short thought they sometimes tend to run on. (nobody is perfect) The diction, often formal when the author speaks, tends to push towards formal due to the choice of elegant words used, but when Truman speaks, it tends to be informal and neutral. Denotation and connotation, even though its hardly used, it is used when Truman speaks about his wife, Bess, and daughter, Margaret. The syntax maintains an active voice throughout the whole book and only is passive in a few small spots. The sentences are loose in some parts and become periodic in other parts; it mostly depends on what is going on. A good place to find periodic sentences is around the atomic bomb, and the firing of Gen. MacArthur. Parallel structure is maintained throughout the book and is sometimes not parallel when Truman speak. The syntax is generally simple and only slightly becomes complex when the author speaks. Simple syntax, a peaceful tone, and great insight on Harry S. Truman all contribute to the style of the book making it unique and captivating. The mixture of first and third person point of view combined with all the other good aspects of this book make it not only interesting but also bring it one step closer to grammatical perfection.

Sunday, November 24, 2019

Free Essays on Fellowship Of The Craft

, it’s layered facets include the sailors inexplicable link to the see, which leads to a common belief system that then leads to a trust, resulting in a deep bond or brotherhood within a crew. These relationships coincide with the captain’s, and are overshadowed by the militarily reminiscent no-questions-asked authority of the captain, again born of the same links to the sea and unwavering trust. These two end results of the fellowship are the entire basis of a successful voyage, in both the safety and productivity of a vessel, and the emotional well being of her crew. Joseph Conrad concludes that â€Å"it is the sea that gives it-the vastness, the loneliness surrounding their dark stolid souls,† (Conrad, pg. 1095) making a sailor what he is. A further example of the innately honorable relationship within a crew can be noted a sailors own recollections, â€Å"Can you imagine a rough, uneducated sailor like Jim, forgetting all about himself at a time like tha t and thinking only of the safety of a shipmate? Ah!-They were the men that were true, uncut diamonds of the first water and coming to the surface they cast a beam of sunshine when you least expected it.† (Harlow, pg. 364) These men are ... Free Essays on Fellowship Of The Craft Free Essays on Fellowship Of The Craft â€Å"The Fellowship of the Craft† The â€Å"fellowship of the craft† is truly the most important aspect of a crew, and therefore of their ship and her voyage. This fellowship or comradery is the tie that binds the men together, with common goals, views and especially the trust the afore mentioned bring, making the fellowship the life-blood of a vessel. Authors of sea literature illustrate and utilize this fellowship in numerous ways, helping to give the unknowing, unsea-worthy reader an opportunity to better understand this mystical connection. The fellowship of the craft is an extraordinarily complex inter-relationship of crew, captain & inevitably, the sea herself. While one would be hard-pressed to fully explain this with mere words, it’s layered facets include the sailors inexplicable link to the see, which leads to a common belief system that then leads to a trust, resulting in a deep bond or brotherhood within a crew. These relationships coincide with the captain’s, and are overshadowed by the militarily reminiscent no-questions-asked authority of the captain, again born of the same links to the sea and unwavering trust. These two end results of the fellowship are the entire basis of a successful voyage, in both the safety and productivity of a vessel, and the emotional well being of her crew. Joseph Conrad concludes that â€Å"it is the sea that gives it-the vastness, the loneliness surrounding their dark stolid souls,† (Conrad, pg. 1095) making a sailor what he is. A further example of the innately honorable relationship within a crew can be noted a sailors own recollections, â€Å"Can you imagine a rough, uneducated sailor like Jim, forgetting all about himself at a time like that and thinking only of the safety of a shipmate? Ah!-They were the men that were true, uncut diamonds of the first water and coming to the surface they cast a beam of sunshine when you least expected it.† (Harlow, pg. 364) These men are ...

Thursday, November 21, 2019

Paper - What is a Database Essay Example | Topics and Well Written Essays - 500 words

Paper - What is a Database - Essay Example As an example of the business use of a database, an online store is a common one, and E-bay is a large database that consists of customers and sale items. It is an also an example of a database with a web-form, that is, a form where a customer can enter their contact information along with the information about the item they want to sell. As a second example that relates to this one, any business needs to track clients or customers and their respective contact information. While the following will expand on the example of an online store, it should be mentioned that most business' have customers and most customers need to be tracked, so this is a second example of a business application. An online store, like E-bay, would need at least two tables of information, and these would be a table that contained customers and their information and financial transactions, and in turn, a store would also minimally have a table that contained all of the items that were for sale. In general, a ta ble is a set of information that has unique and self-contained information. In the case of the store, one wants to establish a 'relational' [O'Neill and O'Neill 15] database – that is, one needs to link up the customers (table 1) with their inventory (e.g. table 2), but one also needs to keep this information apart.