Wednesday, January 29, 2020

Fast food restaurant Essay Example for Free

Fast food restaurant Essay Introduction †¢ Franklin Pierce College was founded in 1962 by Frank S. DiPietro †¢ This research project was conducted from September to December of 2004 for the population of Franklin Pierce College. †¢ The population of our survey was based on the 1,591 Franklin Pierce College students on the Rindge campus. 2 Problem Statement Our research team came to the conclusion that there is a lack of fast food facilities in the Rindge area. We came to the conclusion that: Research is necessary to determine if Franklin Pierce College students would patronize a fast food chain in Rindge, NH 3 Research Objectives. †¢ Determine what criteria are important to consumers with respect to patronizing a fast food establishment. †¢ Determine which fast food restaurant would be most successful in the area. †¢ Determine fast food spending habits. 4 Methodology †¢ First, our team identified the problem of the lack of fast food restaurant choices in the area. We conducted primary research on the fast food industry, as well as speaking to others on campus to determine the fast food demand. †¢ We then created our problem statement. †¢ We then created our research objectives, and created our survey with our objectives in mind. †¢ We used convenience sampling, by handing out surveys to 30 students (15 boys and 15 girls) of each class standing, Freshman, Sophomore, Junior and Senior. †¢ We analyzed our data using SPSS software, which created our results so that we could determine our conclusions and recommendations. 5 Survey Questions 1. 2. 3. 4. 5. 6. 7. 8. Are you on the Meal Plan? How many times a month do you go to the Raven’s Nest Pub? Please circle your response. Which fast food restaurant do you most prefer? Please Rate the following statements: I get hungry between the hours of 10pm and 3 am. I travel outside of Rindge for food. I patronize fast food establishments. I prefer fast food restaurants with the drive-thru option. Based on your own experiences which of the following restaurants has the best customer satisfaction? 6 Survey Continued 9. 10. 11. 12. If there were more fast food options in the Rindge area would you patronize them? What fast food chain would you like to see come to Rindge, New Hampshire? Check the appropriate gender. What’s you current class standing? 7 Are you on the Meal Plan? 25% Yes NO 75% Mode= 1 (yes) 8 How many times a month do you go to the Raven’s Nest Pub? 30 25 20 15 10 5 0 0 3 6 9 MEAN 9 Which fast food restaurant do you most prefer? 12% 2% Papa Johns 14% McDonalds 11% Wendys Subway 23% 38% Mode= 3 (Wendy’s). Burger King Other 10 I get Hungry between the hours of 10pm and 3am. Mean 2. 13 Strongly Disagree Disagree Neutral Agree Strongly Agree 0 10 20 30 40 11 I Travel outside of Rindge for food. 45 40 35 30 25 20 15 10 5 0 Strongly Agree Strongly Agree Agree Neutral Disagree 2. 38 Disagree Strongly Disagree MEAN MEAN 12 I prefer fast food with the drive-thru option. Mean 2. 53 Strongly Disagree Neutral Strongly Agree 0 10 20 30 40 13 I Patronize fast food establishments. MEAN 2. 37 Strongly Disagree Disagree Neutral Agree Strongly Agree 0 10 20 30. 40 14 Which of the following restaurants has the best customer satisfaction? 15% 8% 14% Papa Johns McDonalds 8% Wendys Subway Burger King 29% 26% Other Mode= 4 (Subway) 15 Cross Tabulations A you on the meal plan? * What i s your current cl ass standing? Crosstabulation re Count Are y ou on the meal plan? y es no Tot al What is y our c urrent class standing? Freshman Sophomore Junior Senior 30 30 14 16 16 14 30 30 30 30 Tot al 90 30 120 Case Processing Summary N Are you on the meal plan? * What is your current class standing? Valid Percent 120 100. 0% Cases Missing N Percent 0 .0% N Total Percent 120 100. 0% 16 Cross Tabulations. Case Processing Summary N Based on y our own esperiences, which of the f ollowing retaurant s has the best c ustomer sat isf action? * C heck the appropriate gender: Valid Percent 102 85. 0% N Cas es Missing Percent 18 15. 0% N Tot al Percent 120 100. 0% Based on you r o wn esp er ien ces, whi ch of th e fo llo win g r etaur an ts has th e b est cu sto mer sati sfactio n ? * C heck the ap pr o pr iate gen d er : Cr o sstabu latio n Count Based on y our own esperiences, which of the f ollowing retaurant s has the best c ustomer sat isf action? Tot al Papa Johns McDonalds Wendy s Subway Burger King Check t he appropriat e gender: Male F emale 6 4 7 10 15 16 16 18 6 4 50 52 Tot al 10 17 31 34 10 102 17 Cross Tabulations Case Processin g Summary N Which f ast f ood restaurant do y ou m ost pref er? * If t here were m ore f ast f ood options in the Rindge area, would y ou patronize t hem ? Valid Percent 106 88. 3% N Cas es Missing Percent 14 Tot al Percent N 11. 7% 120 100. 0% Wh ich fast fo od restau rant do you most p refer? * If th ere were more fast foo d o ptio ns in th e Rin dg e area, wou ld yo u p atro ni ze them? Cro sstab u latio n Count Which f ast f ood restaurant do y ou m ost pref er? Tot al Papa Johns McDonalds Wendy s Subway Burger King. If t here were more f as t f ood options in the Rindge area, would y ou patronize them? Y es No 2 12 5 37 9 21 7 12 1 84 22 Tot al 2 17 46 28 13 106 18 Limitations †¢ Small sample size †¢ Time †¢ Confusion of questions by our respondents (question 9) †¢ Lack of knowledge of SPSS software 19 Conclusions †¢ Based on our results the top three restaurants students selected to their preference were : Wendy’s with a 38. 3% rating. Second was Subway with 23. 3%, and McDonald’s with 14. 2%. †¢ 64. 2% reported that they travel outside of Rindge for food. †¢ 59. 2% students reported that they patronize fast food restaurants. 20 Conclusions Continued †¢ 78. 3% of students reported that they would patronize a fast food establishment in Rindge. †¢ Subway was recorded as having the highest customer satisfaction ratings at 28. 3%, Wendy’s followed with 25. 8%. 21 Discussion †¢ More than 87. 5% of respondents surveyed replied strongly agree, agree, or neutral when asked if they would patronize a fast food restaurant. †¢ We found that our research for our literature review stated that McDonald’s was the top choice for favorite fast food restaurant. Our survey showed that students would prefer a Wendy’s. †¢ We also found that our research stated that Papa John’s had the highest rating for customer service. Our survey respondents had little to no knowledge of the Papa John’s restaurant. 22 Recommendations †¢ A fast food restaurant should open in the Rindge area, preferably close to campus. †¢ There should be a drive-thru option based on our surveys results of 50% of students strongly agreeing or agreeing with this option. †¢ There should be a fast food establishment which offers late night service for students. Our survey resulted that 70. 8% of students strongly agreed or agreed that they get hungry between the hours of 10pm and 3am. 23 The end Thank you for your time Any Questions? 24.

Tuesday, January 21, 2020

Baghban :: Ravi Chopra

The story starts as Raj is on the verge of his retirement and now he wants to spend more time with his family comprising of wife, children and grand-children. Raj and Pooja spend forty years together. They are very compatible. In their whole life they tried to give their sons a comfortable life. As for example when Aman needs a loan and Raj readily offers it to him even though he is retiring. He does this because he believes that his successful sons will do anything to take care of their parents. But as a matter of fact fate has stored something else for Raj and Pooja. Raj takes early retirement from the bank to spend some more quality time with his wife Pooja. They couple think that now it is their children’s responsibility to take care of them. But unfortunately none of them are actually agreeable to do so. At the time of retirement Raj has no money and that is why his children are indecisive to take their parents. The avoid eth whole case Malhotra children decide some ridiculous thing. They say that the mother would reside with Aman, who is the eldest one. They also decide that father will stay with the second son i.e. Samir. After six months, they would shift to the third and fourth sons i.e. Sahil and Nasir respectively. The reason behind taking this decision by the children was something else. They thought that their parents would never be ready to live without one another. But as Pooja requests a lot Raj could not deny them even if he does not like the whole idea of separation with Pooja. Raj eventually agrees with the decision taken by his four sons. When they go with them in their respective houses, their children as well as maids start ill-treating them. Raj and Pooja feels exhausted and wants to get rid of this loneliness. While living with the second son, Raj used to go to a cafe, run by Paresh Rawal and Lilette Dubey. They use to call him ‘couch potato’ i.e. big brother. To kill his leisure time Raj starts looking upon the cafe’s account and also writing a book on family values and thoughts. The limit of their tolerance breaks down when the sons forget their parent’s anniversary and scheduled for their parents journey to the alternate sons. Raj and Pooja meets in a place where they met at their first anniversary.

Monday, January 13, 2020

Packet Sniffing

Sniffing In short, packet sniffing is the method used to see all kinds of information as is passes over the network it is linked to, but how does a packet sniffer work? A packet sniffer is a piece of software or hardware capable of monitoring all network traffic. It is able to capture all incoming and outgoing traffic for example clear-text passwords, user names and other private or sensitive details. Packet sniffing is a form of wire-tap applied to computer networks instead of phone networks. It came into vogue with Ethernet, which is known as a â€Å"shared medium† network.This means that traffic on a segment passes by all hosts attached to that segment. Ethernet hardware contained a filter that prevented the host machine from actually seeing any other traffic than that belonging to the host. Sniffing programs turn off the filter, and thus see everyones traffic. In the scheme of things, a computer usually only examines a packet of data that corresponds to the computerâ€℠¢s address but with a packet sniffer you are able to set the network interface to ‘promiscuous mode’. In this case it examines ALL available information passing through it.As the data passes through the system it is copied and stored in memory or on a hard drive. The copies are then able to be studied and the information analyzed. The captured information is decoded from raw digital form into a  human-readable  format that permits users of the protocol analyzer to easily review the exchanged information As soon as you connect to the internet, you ‘sign on’ to a network that is under the watch of your ISP. This network can communicate with other networks and in short forms the basis of the internet.If a packet sniffer is located at a server owned by your ISP, it has the potential to gain access to: * The web sites visited. * What is searched for on the site. * Your e-mail recipients. * The contents of your mail. * Any files you download. * A list of your audio, video and telephony options. * A list of visitors to your website. Switched vs. Non-Switched In a non-switched network environment packet sniffing is an easy thing to do. This is because network traffic is sent to a hub which broadcasts it to everyone. Switched networks are completely different in the way they operate.Switches work by sending traffic to the destination host only. This happens because switches have CAM tables. These tables store information like MAC addresses, switch ports, and VLAN information [1]. Before sending traffic from one host to another on the same local area network, the host ARP cache is first checked. The ARP cache is a table that stores both Layer 2 (MAC) addresses and Layer 3 (IP) addresses of hosts on the local network. If the destination host isn’t in the ARP cache, the source host sends a broadcast ARP request looking for the host. When the host replies,the traffic can be sent to it.The traffic goes from the source host to the switch, and then directly to the destination host. This description shows that traffic isn’t broadcast out to every host, but only to the destination host, therefore it’s harder to sniff traffic. Passive Vs. Active Sniffing Sniffers are a powerful piece of software. They have the capability to place the hosting system’s network card into promiscuous mode. A network card in promiscuous mode can receive all the data it can see, not just packets addressed to it. Passive Sniffing If you are on a hub, a lot of traffic can potentially be affected.Hubs see all the traffic in that particular collision domain. Sniffing performed on a hub is known as passive sniffing. Passive sniffing is performed when the user is on a hub. Because the user is on a hub, all traffic is sent to all ports. All the attacker must do is to start the sniffer and just wait for someone on the same collision domain to start sending or receiving data. Collision domain is a logical area of the network in wh ich one or more data packets can collide with each other. Passive sniffing worked well during the days that hubs were used.The problem is that there are few of these devices left. Most modern networks use switches. That is where active sniffing comes in. Active Sniffing When sniffing is performed on a switched network, it is known as active sniffing. Active sniffing relies on injecting packets into the network that causes traffic. Active sniffing is required to bypass the segmentation that switches provided. Switches maintain their own ARP cache in a special type of memory known as Content Addressable Memory (CAM), keeping track of which host is connected to which port.Sniffers operate at the Data Link layer of the OSI model. This means that they do not have to play by the same rules as applications and services that reside further up the stack. Sniffers can grab whatever they see on the wire and record it for later review. They allow the user to see all the data contained in the pa cket, even information that should remain hidden. The terms active and passive sniffing has also been used to describe  wireless network sniffing. They have analogous meaning. Passive wireless sniffing involves sending no packets, and monitoring the packets send by the others.Active sniffing involves sending out multiple network probes to identify APs. How Does a Packet Sniffer Work? A packet sniffer works by viewing every packet sent in the network. This includes packets not intended for itself. How does it do this? Three types of sniffing methods are used. Methods may work in non-switched networks or in switched networks. These methods are: IP-based sniffing I. P -based sniffing works by putting the network card into promiscuous mode and sniffing all packets matching the IP address filter and is the original type of packet sniffing.The IP address filtering isn’t switched on so the sniffing program is able to capture all the packets. This method will only function in non-s witched networks. MAC-based sniffing MAC-based sniffing works by putting the network card into promiscuous mode and sniffing all packets that match the MAC address filter. ARP-based sniffing ————————————————- ARP-based sniffing doesn’t put the network card into promiscuous mode because ARP packets are sent to its administrators. This is because the ARP protocol is stateless.This means that sniffing can be done on a switched network. Once a hacker has found possible networks to attack, one of their first tasks is to identify the target. Many organizations are nice enough to include their names or addresses in the network name. The Sniffer program works by asking a computer, specifically its Network Interface Card (NIC), to stop ignoring all the traffic headed to other computers and pay attention to them. It does this by placing the NIC in a state known as promiscuous mode.Once a NIC is promiscuous mode, a machine can see all the data transmitted on its segment. The program then begins to constantly read all information entering the PC through the network card. Data traveling along the network comes as frames, or packets, bursts of bits formatted to specific protocols. Because of this strict formatting, the sniffer peels away the layers of encapsulation and decodes the relevant information stored in the packet sent, including the identity of the source computer, that of the targeted computer, and every piece of information exchanged between the two computer.Even if the network administrator has configured his equipment in such a way as to hide information, there are tools available that can determine this information. Utilizing any well known network sniffing tools, an attacker can easily monitor the unencrypted networks. Modes: On wired broadcast and wireless LANs, to capture traffic other than  unicast  traffic sent to the machine running the sniffer software,  multicast  traffic sent to a multicast group to which that machine is listening, and  broadcast  traffic, the  network adapter  being used to apture the traffic must be put into  promiscuous mode; some sniffers support this, others don't. On wireless LANs, even if the adapter is in promiscuous mode, packets not for the  service set  for which the adapter is configured will usually be ignored. To see those packets, the adapter must be in  monitor mode. Who Uses a Packet Sniffer? Packet sniffers are often used by ISP’s as a diagnostic tool for their back-up systems, so it is in fact a well-utilized form of technology. Packet sniffing is also sometimes used to investigate the habits and actions of criminals, for example in the FBI’s Carnivore System.As I am sure you will appreciate from the above, packet sniffers can be a useful, relatively harmless tool or a potentially dangerous invasion of privacy. Packet sniffers are a perfec t example of how technology may be used to help or to harm. USES: The versatility of packet sniffers means they can be used to: * Analyze network problems * Detect  network intrusion  attempts * Detect network misuse by internal and external users * Documenting regulatory compliance through logging all perimeter and endpoint traffic * Gain information for effecting a network intrusion * Isolate exploited systems * Monitor WAN bandwidth utilization Monitor network usage (including internal and external users and systems) * Monitor data-in-motion * Monitor WAN and endpoint security status * Gather and report network statistics * Filter suspect content from network traffic * Serve as primary data source for day-to-day network monitoring and management * Spy on other network users and collect sensitive information such as passwords (depending on any content  encryption  methods which may be in use) * Reverse engineer  proprietary protocols  used over the network * Debug clie nt/server communications * Debug network protocol implementations Verify adds, moves and changes * Verify internal control system effectiveness (firewalls, access control, Web filter, Spam filter, proxy) DEFENSE Detection Protection Conclusion Having looked at what they are, why they work and how they are used, it is easy to view sniffers as both dangerous threats and powerful tools. Every user should understand they are vulnerable to these types of attacks and their best defense lies in encryption. Administrators and professionals need to know that these programs are superb diagnostic utilities that can, unfortunately, be used with malicious intent on any network.

Sunday, January 5, 2020

Mgmt 591 Lsi Essay - 865 Words

Tiffany Hawkins May 18, 2013 LSI Paper Mgmt 570 The Life Styles Conflict Inventory assignment gave me a chance to see on paper how my thinking styles influence my ability to deal with conflict situation. The life styles survey is geared towards helping individuals gain an insight into their own self development and personality along with the type of behaviors we exercise to others as well. By doing the survey, I have a better understanding on how I can constructively deal with conflict as an individual. The survey also helps us take a look on the positive and negative qualities of our own personalities and different ways we to build and improve upon them. My score for â€Å"constructive conflict† which includes, pragmatist,†¦show more content†¦I feel at times I accommodate myself at the approval of others. Like for example, I may act differently around certain people then I would around people I feel comfortable around. I also try to maintain a sense of peace and try to smooth over any differences that the group or peers may have. I can honestly say that I try to stay away from any and every conflict if possible. My score for â€Å"aggressive/defensive style† which includes escalator, dominator, competitor, and perfectionist ranked medium/low. The escalator style I scored in the 97th percentile. I wasn’t surprised at my ranking in this field. Growing up I was spoiled as a child and I always got what I wanted. When conflicts do arise I always get very upset at first and think it’s a personal attack against me. It does have affect on my personal relationship with my boyfriend when we get into arguments. I always try to find a way to turn the argument around to make myself look good but I know this is unfortunately self defeating. I know this is probably my biggest downfall among other but I know I can improve on this in order to become successful. I didn’t score to low in the competitor field. I do see winning as an opportunity for growth and development in the business world. In my eyes, winning shows a since of respect and people will getShow MoreRelatedMGMT 591 LS I paper1947 Words   |  8 Pagesï » ¿ Self-Reflection of Leadership Styles Leadership Organizational Behavior: MGMT 591 – 13740 Professor Joseph Neptune January 19, 2014 Self-Reflection of Leadership Styles Life Styles Inventory (LSI) is a survey that â€Å"measures 12 specific styles of patterns of thinking that can either help or hinder a person from reaching his or her potential† (Human Synergistics). Human behavior is a perplex issue and is most often influenced by culture, religion, educationRead MoreLife Styles Inventory ( Lsi )1310 Words   |  6 PagesInventory Analysis Who are we? How do we think and behave? What is the impact of our thinking and behaving styles professionally and personally? How do we change these styles? These are the questions we ask as leaders. The Life Styles Inventoryâ„ ¢ (LSI) is a tool designed to answer these questions. It is a tool â€Å"used to identify a person’s strengths and improvement areas focusing on beliefs, values, behaviors and assumptions about yourself† (Human Synergistics International, 2010). After completingRead MorePersonal Thinking Styles That Are Broken Down Into Three Styles1617 Words   |  7 PagesPersonal Thinking Styles The LSI, Life Styles Inventory, measures twelve specific patterns of thinking that are broken down into three styles described as follows: †¢ CONSTRUCTIVE Styles reflect self-enhancing thinking and behavior that contribute to one s level of satisfaction, ability to develop healthy relationships and work effectively with people, and proficiency at accomplishing tasks. †¢ PASSIVE/DEFENSIVE Styles represent self-protecting thinking and behavior that promote the fulfillmentRead MorePersonal Thinking Styles Of The Lsi I1462 Words   |  6 PagesPersonal Thinking Styles Upon completion of the LSI I was quite surprised by some of the results. My Primary personal thinking style was self-actualization. My backup personal thinking styles were perfectionist and achievement. Upon review of the characteristics of the Self-Acutalizing style and the review of the high range score explanation, I believe that the comments are valid in regards to my own behavior. My percentile score for this category was 85% meaning I scored higher than 85% of theRead MoreLife Styles Inventory ( Lsi )1846 Words   |  8 PagesInventory Analysis Who are we? How do we think and behave? What is the impact of our thinking and behaving styles professionally and personally? How do we change these styles? These are the questions we ask as leaders. The Life Styles Inventoryâ„ ¢ (LSI) is a tool to help answer these questions and develop a plan to address. It is â€Å"a survey that measures the connection between thinking and behaving and its impact on performance. It is used to identify a person’s strengths and improvement areas focusingRead MoreMgmt 591 Final Exam Questions Essay6646 Words   |  27 Pagesbeliefs, feelings, and personality on individual behavior, demonstrate how knowledge of individual difference factors help in understanding, predicting, and influencing individual behavior. Use a diagnostic instrument such as the Life Styles Inventory (LSI) to assess your personal thinking and behavior styles and their role in accomplishing self-improvement goals. Knowledge about individual difference can help in predicting an employee’s behavior in that an employee’s attitudes, beliefs, feelings, and