Wednesday, May 27, 2020
The Effects of Online Education Summary Due to the increasing amount of students enrolling in online schools and courses, the popularity of online education grows annually. The given essay deals with an urgent issue of modern life - online or distance learning and its effects on students. The main aim of the paper is to discuss all the effects of online education, its advantages and opportunities as well as its impact on students. Considering the fact that the systems of online learning play a key role in the training process with the use of technologies of distance training, it should be noted that the majority of systems of distance learning offer a wide set of the collaborative means. It allows to create a more available and flexible environment of training for students. It also helps to transform the systems of distance learning from a platform to the environment, which considerably expands the opportunities for the collaboration of students during distance learning. The institutes, which are able to integrate new instruments into their environment of online and mixed education, will become the founders of the educational technologies of the next generation. Technologies transform education, and their influence constantly grows. By creating the basis for distance learning and using the advanced systems of distance learning, higher educational institutions will be capable to considerably improve the progress of students at present and in the future. The paper summarizes all negative and positive effects of online learning on students. Moreover, the essay states that online education is spread all over the world. The online education is revealed through the process of new knowledge acquisition, its accessibility, speed of information processing and the possibility to store large volumes of knowledge.
Saturday, May 16, 2020
Climate Change in relation to Architecture Tallis Holloway - s5015034 There are many human and natural drivers of climate change, cities and buildings in particular are increasingly affected by risks linked to rapid environmental changes and their impact themselves on the atmosphere however architect s can help limit many contributing factors. This paper examines the role of this profession, architecture s contribution to climate change mitigation/adaption and how architect s can assist in limiting the threat of global warming thus enforcing sustainability. Architect s provide information to clients and management about design, size, materials and costs associated with new buildings and alterations to existing buildings. They further associate with compiling and analysing data on economic, legal, political, cultural, demographic, sociological, physical and environmental factors affecting land use (ANZSCO 2009, Minor Group 232). The role of this profession and the management of new sustainable buildings can manage the alterations to the climatic equilibrium, thus contribute to mitigate and adapt to these shifting conditions. Building s trigger large amounts of CO2, causing them to consequently contribute a vast majority of the energy consumption worldwide , however new advanced design strategies and sustainable technologies can be incorporated into existing/new building s in order to decrease emissions, mitigating long-term impacts and adapt to short-term to theShow MoreRelatedClimate Change : The Greenhouse Effect1199 Words Ã |Ã 5 Pagesexistence, climate change has occurred. Temperatures, sea levels, quantities of gases in the atmosphere, and levels of precipitation have risen and fallen over a span of billions of years. However, over the last two centuries, climate change has been far too drastic to be caused by natural forces alone. Globally, the alterations in temperatures, sea levels, precipitation, melting of ice caps and glaciers, and violence of natural disasters are clearly caused by another factor, in addition to natural climateRead MoreClimate Change Is Our Fault922 Words Ã |Ã 4 Pages Climate Change is Our Fault The truth is earth is heating up and it is partially humans fault. The simplest of human activities can alter the climates to change. Humans are not the only climate drivers. There are also natural factors (Ã¢â¬Å"How Much Does Human Activity Affect Climate Change?Ã¢â¬ ). The earth is changing due to the climate changes . For future generations the earth may perhaps look different (Nuccitelli). Human activity is advancing global climate change rapidly. Humans are the main factorRead MoreHumans And The Climate By Wendy Diep1617 Words Ã |Ã 7 Pages11:628:125:90 Ã¢â¬Å"Humans and the ClimateÃ¢â¬ Wendy Diep December 18, 2014 Ã¢â¬Å"Humans and the ClimateÃ¢â¬ Ã¢â¬Å"Global warming, along with the cutting and burning of forests and other critical habitats, is causing the loss of living species at a level comparable to the extinction event that wiped out the dinosaurs 65 million years ago. That event was believed to have been caused by a giant asteroid. This time it is not an asteroid colliding with the Earth and wreaking havoc: it is us.Ã¢â¬ This is the statementRead MoreThe Ice Of Drilling For Ice Cores1232 Words Ã |Ã 5 PagesThe Ice Chronicles is an in-depth look at one scientists story of drilling for ice cores in arctic climates. The book also describes how the ice cores are drilled and how the ice cores are processed. The team of scientists use the ice cores and the chemical composition of them to get a better grasp of past climates and climate changes. The main drilling mentioned is the Greenland Ice Sheet Project that was overseen by many agencies and supported by multiple higher-education institutions. The projectRead MoreC limate Change Throughout The World1121 Words Ã |Ã 5 PagesKrista Falco Professor Brown English 1301, WS5 April 23, 2015 Climate Change Throughout The World Climate change has been an argument going on for years now. Since industrialization, there has been numerous debates asking the question: Is climate change due to natural evolution or is it the human species causing this change? ScientistÃ¢â¬â¢s try their best to predict the future, but it is just that, a prediction. Take a meteorologist for example. Your local weatherman states that it is going to rainRead MoreClimate Change : Global Air Temperatures1607 Words Ã |Ã 7 PagesOur worldÃ¢â¬â¢s climate is rapidly changing, and those changes will have an enormous impact on our planetÃ¢â¬â¢s people, ecosystems, cities, and energy use. Average global air temperatures are already roughly 1.5 degrees higher than they were at the start of the 20th century, and Ã¢â¬Å"have risen about 1 degree over just the last 30 years,Ã¢â¬ According to the New England aquarium. Climate change can best be described as the long-term change in average weather conditions, including temperature, pre cipitation andRead MoreClimate Changs is Affecting Earths Delicate Ecosystem857 Words Ã |Ã 3 PagesClimate change is a global problem that is affecting EarthÃ¢â¬â¢s delicate ecosystem. Many problems are present in our world today, such as starvation, flooding, heat waves, droughts and disease. These issues are likely to worsen as climate change takes its toll. In the past, the cause of this severe climate change was unknown. Today, it is known that manmade climate change is occurring. Scientists have discovered that humans have had theRead MoreIn the last 100 years, EarthÃ¢â¬â¢s average temperature has risen by 1.4Ã °F. The rising global900 Words Ã |Ã 4 Pagescaused changes in weather and climate. Global warming refers to the ongoing rise in the average temperature near EarthÃ¢â¬â¢s surface. This is causing a climate change, which refers to any significant change (major change in temperature, precipitatio n, or wind patterns) in the measures of climate lasting for an extended period of time (several decades or longer). Due to this, it is projected that the temperature will rise from 2 to 11.5Ã °F in the next hundred years (US EPA, 2014). The Ã¢â¬Å"drivers,Ã¢â¬ whichRead MoreIpcc Status Report on Climate Change Summary Essay831 Words Ã |Ã 4 PagesIPCC Status Report on Climate Change Summary Abstract The following is a summary of the IPCC Status Report on Climate Change. The following questions will be answered: is climate change occurring? About which aspects of climate change are we certain? Uncertain? What are the main factors determining climate change today? What is the likelihood that humans have caused these changes and what data supports this conclusion? And finally, what information is not yet available or are we unable to accessRead MoreQuantification Of The Contribution Of Human Influences ( Hi ) On Regional Climate Change759 Words Ã |Ã 4 Pagesthe contribution of human influences (HI) on regional climate change is a focus of climate change research (Dirmeyer et al., 2010; Kalnay and Cai 2003). Quantification of such influences can help us understand regional climate patterns and improve the accuracy and algorithms/mechanism of downscaling general circulation models (Lawrence and Chase, 2010; Li et al., 2012; Zhao and Pitman, 2002). The important human influences o n regional climate are land-use and land-cover change (LUCC) (Pielke et al
Wednesday, May 6, 2020
The Role of the Internet and Crime Strayer University Crime has been around for a long time and will probably never disappear. With the invention of many things such as the wheel, the tool helps criminals. The wheel helped the criminals get away faster which made it harder to catch them. Criminals will always look for ways to make their Ã¢â¬Å"jobÃ¢â¬ easier. With the advancement of technology come the advanced criminals. The internet has become one of the biggest tools for criminals by making it easier to commit some of the oldest crimes such as theft, extortion, and money laundering. The criminal does not have to be present to commit crime; this means there is a broader area to find victims. They can interactÃ¢â¬ ¦show more contentÃ¢â¬ ¦Experts worry that malicious codes hidden in infected computers or released in worms will produce criminal attacks against businesses. Ã¢â¬Å"The Honey Net Project -- a nonprofit research organization of security professionals -- published a report describing how the organization has monitored ind ividuals trading or dealing with stolen credit card information over the Internet (Germain, J. M. 2003).Ã¢â¬ References Frieden, T. (2009, October 7). Authorities: 100 in U.S. and Egypt charged in ID theft ring - CNN.com. CNN.com - Breaking News, U.S., World, Weather, Entertainment Video News. Retrieved May 17, 2013, from http://www.cnn.com/2009/WORLD/meast/10/07/us.egypt.id.theft/index.html?iref=allsearch Media Group. (2013, May 17). Kent man arrested in distribution, possession of child porn. KIROTV. Retrieved May 17, 2013, from www.kirotv.com/news/news/kent-man-arrested-distribution-possession-child-po/nXtqQ/http:// Finklea, K. (2010, December 22). Congressional Research Service. CRS Report for Congress Prepared for Members and Committees of Congress Organized Crime in the United States: Trends and Issues for Congress . Retrieved May 17, 2013, from www.fas.org/sgp/crs/misc/R40525.pdf Germain, J. M. (2003, September 27). Computer Viruses and Organized Crime: The Inside Story | Security | TechNewsWorld. TechNewsWorld: All Tech - All The Time. Retrieved May 17, 2013, fromShow MoreRelatedRole of the Internet and Crime1140 Words Ã |Ã 5 PagesRole of the internet and crime The Role of the Internet and Crime The Role of the Internet and Crime Michelle Herrick Digital Crime and Digital Terrorism Strayer University Professor Masudur Chowdhury Prepared- 02/16/2013 ` The Role of the Internet and Crime Explain how the Internet has aided criminal activity. The internet has aided to criminal activity by providing an increased amount of anonymity for the criminal. They are able to commit crimes from long distances evenRead MoreThe Internet: Aiding Criminal Activity743 Words Ã |Ã 3 Pages1. Explain how the Internet has aided criminal activity. With the advent of any new technology must also come an added respect and responsibility for that technology. Todays world has been significantly modified over the past decade due the internet and the superconductivity this tool has provided to its users. As a result of this popularity, a criminal element has seeped within the confines of cyberspace to present new challenges for lawmakers and law enforcers everywhere, all the time. TheRead MoreThe Gender Differences in Particular Types of Crime Essay examples1198 Words Ã |Ã 5 Pagesdifferences in particular types of crime. I intend to do this by using various books and the Internet to briefly explore burglary, prostitution and crime related to a violent nature. I also wish to include any graphs or statistics I may find of interest and relevance to this essay. It has been stated that the differences between men and women, and their upbringing, has greatly influenced the crimes they commit and whether they commit crimes at all. I personally feel that thisRead MoreCyber Crimes Reflected Through Television Programs800 Words Ã |Ã 4 PagesCyber Crimes Reflected Through Television Programs Cybercrimes are a culture which has facilitated technological criminal efforts to undermine government and private organizations in order to create disruption and panic on a large scale. TodayÃ¢â¬â¢s television programming takes a series of intelligence type action roles, which prove the impact of post 9/11. Computer crimes have increased nationwide fears. The television series 24 is an action drama featuring a make believe personality known as JackRead MoreTechnology And The Criminal Justice System1009 Words Ã |Ã 5 Pageshave been significant advancements in technology which has in turn changed and increased the type of crimes in todayÃ¢â¬â¢s society. With the new technology, the criminals are ready to exploit it. So therefore, the future direction of crime fighting and its role in social policy implication are geared toward the advancements of technology. For criminal justice system to intervene, deter, or prevent crimes, they must be equipped with the latest technologi es. Advancements to technology within the criminalRead More Computer Crime Essay1055 Words Ã |Ã 5 Pagesstolen, most without detection, by the emerging master criminal of the twenty-first century--the computer crime offender. Worst of all, anyone who is computer literate can become a computer criminal. He or she is everyman, everywoman, or even every child. CHAPTER 1 INTRODUCTION To first understand computer crime one must understand first what crime is. According to Diana Kendall, crime is a behavior that violates criminal law and is punishable with fines, jail or other sanctions (KendallRead MoreThe Positive And Negative Effects Of Social Media701 Words Ã |Ã 3 PagesGambling is now very much today. With networks available on social media, gamblers no longer go to special places and hide to fulfill their desires. This Internet call is known as net gaming. Net gaming is a similar condition to gambling addiction. For example, playing games, shopping. In fact, conduct buying and selling of shares via the Internet that interfere with the work as well, resulting in losses that lead people concerned on the stranglehold of debt. The second negative impact is health willRead MoreThis Research Will Explore A Wide Collection Of Literature927 Words Ã |Ã 4 Pagesliterature in order to discover whether religion effectively prevents crime. It certainly differs from mainstream crime in that it attempts to seek the influences religion may have in committing or preventing criminal deviancy. The role of religion seems to be indistinguishable and is increasingly becoming an area of attention. This taken into account, makes the selected study engaging in that it investigates the impact of religion on crime. It is vital to gather views from a range of sources, which generallyRead MoreCyber Crimes, Moral And Ethical Implication1664 Words Ã |Ã 7 PagesCyber Crimes, Moral and Ethical Implication Introduction The internetÃ¢â¬â¢s rapid growth and computer technology has helped people around the world over the past few years. This evolution has also enabled new forms of crime-dubbed cyber-crime. This phenomenon has greatly evoked feelings such as admiration and fear in people mind. Cyber-crime is defined as crimes committed on internet, with computers as the tool, Agathise E Joseph, June 28th 2006. It is not an Ã¢â¬Å"armed robberyÃ¢â¬ , not a murder but a practiceRead MoreCyber Security : The New Wave Of Social Media1604 Words Ã |Ã 7 Pagesclicking keys. ItÃ¢â¬â¢s no secret; this generation relies on their phones and the internet much like food and water. ItÃ¢â¬â¢s a necessity. With the new wave of social media, which is being used by an alarming 78% of U.S. citizens, the internet is now a tool used by anyone and everyone (Statistics and Market Data on Cyber Crime). We are in the midst of an Internet evolution, with the internet expanding its boundaries and roles in our everyda y lives. You can do anything from complete a complex math problem
Tuesday, May 5, 2020
Question: Describe a situation in your internship, or previous work, where you have taken account of compliance (legislation) in fulfilling your ICT task, and why. If you have not already experienced such situation, describe a situation in your internship where you will need to take account of Australian legislation in fulfilling your ICT task, and why. Answer: Background of the ICT situation involving Australian Legislation Even in the course of the time, a student serves his or her internship in the field of ICT or Information Communication and Technology; it has to be kept in mind that every task the intern performs should take account of Australian legislation for fulfilment of the task (McDermid 2015). One of the main situations that an intern must take into account in this regard is the data security measures taken during each task. For instance, a situation may be taken into account where due to an organizations technical fault or security issues, a huge number of private and confidential data of the clients are breached by making them publicly accessible. This ICT issue needs to be taken care of with compliance to the Australian Code of Ethics for accomplishment. Reason for involving Australian Legislation According to the government of Australia and its Privacy Amendment Bill (Australian Privacy Act 1988), there is legislation that puts forward the Mandatory Data Breach Notification Scheme. This scheme states that any sort of data breach that occurs in an organization needs to be reported to the Office of the Australian Information Commissioner as well as the people who are or might be affected due to the data breach (Otlowski 2007). The purpose of this legislation is to defend the privacy of every individual and increase the community trust of the general mass in Australian organizations and business agencies. Secured private data is the right of every individual, therefore, as the part of an organization it is the responsibility of the intern to abide by the legislation provided for the security of private and confidential data. It is also compliance to the ACS codes of ethics for an employee or intern to maintain absolute privacy of confidential data and abide by the laws preceded by the Australian government. References McDermid, D., 2015.Ethics in ICT: an Australian perspective. Pearson Higher Education AU. Otlowski, M.F., 2007. Disclosure of genetic information to at-risk relatives: recent amendments to the Privacy Act 1988 (Cwlth).Medical Journal of Australia,187(7), p.398.
Thursday, April 16, 2020
The Bay of Pigs Invasion. The story of the failed invasion of Cuba at the Bay of Pigs is one of mismanagement, overconfidence, and lack of security. The blame for the failure of the operation falls directly in the lap of the Central Intelligence Agency and a young president and his advisors. The fall out from the invasion caused a rise in tension between the two great superpowers and ironically 34 years after the event, the person that the invasion meant to topple, Fidel Castro, is still in power. To understand the origins of the invasion and its ramifications for the future it is first necessary to look at the invasion and its origins. Part I: The Invasion and its Origins. The Bay of Pigs invasion of April 1961, started a few days before on April 15th with the bombing of Cuba by what appeared to be defecting Cuban air force pilots. At 6 a.m. in the morning of that Saturday, three Cuban military bases were bombed by B-26 bombers. The airfields at Camp Libertad, San Antonio de los Baos and Antonio Maceo airport at Santiago de Cuba were fired upon. Seven people were killed at Libertad and forty-seven people were killed at other sites on the island. Two of the B-26s left Cuba and flew to Miami, apparently to defect to the United States. The Cuban Revolutionary Council, the government in exile, in New York City released a statement saying that the bombings in Cuba were ". . . carried out by 'Cubans inside Cuba' who were 'in contact with' the top command of the Revolutionary Council . . . ." The New York Times reporter covering the story alluded to something being wrong with the whole situation when he wondered how the council knew the pilots were coming if the pilots had only decided to leave Cuba on Thursday after " . . . a suspected betrayal by a fellow pilot had precipitated a plot to strike . . . ." Whatever the case, the planes came down in Miami later that morning, one landed at Key West Naval Air Station at 7:00 a.m. and the other at Miami International Airport at 8:20 a.m. Both planes were badly damaged and their tanks were nearly empty. On the front page of The New York Times the next day, a picture of one of the B-26s was shown along with a picture of one of the pilots cloaked in a baseball hat and hiding behind dark sunglasses, his name was withheld. A sense of conspiracy was even at this early stage beginning to envelope the events of that week. In the early hours of April 17th the assault on the Bay of Pigs began. In the true cloak and dagger spirit of a movie, the assault began at 2 a.m. with a team of frogmen going ashore with orders to set up landing lights to indicate to the main assault force the precise location of their objectives, as well as to clear the area of anything that may impede the main landing teams when they arrived. At 2:30 a.m. and at 3:00 a.m. two battalions came ashore at Playa Gir?n and one battalion at Playa Larga beaches. The troops at Playa Gir?n had orders to move west, northwest, up the coast and meet with the troops at Playa Larga in the middle of the bay. A small group of men were then to be sent north to the town of Jaguey Grande to secure it as well. When looking at a modern map of Cuba it is obvious that the troops would have problems in the area that was chosen for them to land at. The area around the Bay of Pigs is a swampy marsh land area which would be hard on the troops. The Cuban forces were quick to react and Castro ordered his T-33 trainer jets, two Sea Furies, and two B-26s into the air to stop the invading forces. Off the coast was the command and control ship and another vessel carrying supplies for the invading forces. The Cuban air force made quick work of the supply ships, sinking the command vessel the Marsopa and the supply ship the Houston, blasting them to pieces with five-inch rockets. In the end the 5th battalion was lost, which was on the Houston, as well as the supplies for the landing teams and eight other smaller vessels. With some of the invading forces' ships destroyed, and no command and control ship, the logistics of the operation soon broke down as the other
Friday, March 13, 2020
World War I - Battle of Caporetto on the Italian Front Battle of Caporetto - Conflict Dates: The Battle of Caporetto was fought October 24-November 19, 1917, during World War I (1914-1918). Armies Commanders Italians General Luigi CadornaGeneral Luigi Capello15 divisions, 2213 guns Central Powers General Otto von BelowGeneral Svetozar Boroevic25 divisions, 2,200 guns Battle of Caporetto - Background: With the conclusion of the Eleventh Battle of Isonzo in September 1917, Austro-Hungarian forces were nearing the point of collapse in the area around Gorizia. Faced with this crisis, Emperor Charles I sought aid from his German allies. Though the Germans felt that the war would be won on the Western Front, they agreed to provide troops and support for a limited offensive designed to throw the Italians back across the Isonzo River and, if possible, past the Tagliamento River. For this purpose, the composite Austro-German Fourteenth Army was formed under the command of General Otto von Below. Battle of Caporetto - Preparations: In September, the Italian commander-in-chief, General Luigi Cadorna, became aware that an enemy offensive was in the offing. As a result, he ordered the commanders of the Second and Third Armies, Generals Luigi Capello and Emmanuel Philibert, to begin preparing defenses in depth to meet any attack. Having issued these orders, Cadorna failed to see that they were obeyed and instead began an inspection tour of other fronts which lasted until October 19. On the Second Army front, Capello did little as he preferred to plan for an offensive in the Tolmino area. Further weakening Cadornas situation was an insistence on keeping the bulk of the two armies troops on the east bank of the Isonzo despite the fact that the enemy still held crossings to the north. As a result, these troops were in prime position to be cut off by an Austro-German attack down the Isonzo Valley. In addition, the Italian reserves on the west bank were placed too far to the rear to rapidly aid the front lines. For the upcoming offensive, Below intended to launch the main assault with the Fourteenth Army from a salient near Tolmino. This was to be supported by secondary attacks to the north and south, as well as by an offensive near the coast by General Svetozar Boroevics Second Army. The assault was to be preceded by a heavy artillery bombardment as well as the use of poison gas and smoke. Also, Below intended to employ a substantial number of storm troopers which were to use infiltration tactics to pierce the Italian lines. With planning complete, Below began shifting his troops into place. This done, the offensive commenced with the opening bombardment which began before dawn on October 24. Battle of Caporetto - The Italians Routed: Caught by complete surprise, Capellos men suffered badly from the shelling and gas attacks. Advancing between Tolmino and Plezzo, Belows troops were able to quickly shatter the Italian lines and began driving west. Bypassing Italian strong points, the Fourteenth Army advanced over 15 miles by nightfall. Surrounded and isolated, the Italian posts in its rear were reduced in the coming days. Elsewhere, the Italian lines held and were able to turn back Belows secondary attacks, while the Third Army held Boroevic in check (Map). Despite these minor successes, Belows advance threatened the flanks of the Italian troops to the north and south. Alerted to the enemy breakthrough, Italian morale elsewhere on the front began to plummet. Though Capello recommended a withdrawal to the Tagliamento on the 24th, Cadorna refused and worked to rescue the situation. It was not until a few days later, with Italian troops in full retreat that Cadorna was forced to accept that a movement to the Tagliamento was inevitable. At this point, vital time had been lost and Austro-Germans forces were in close pursuit. On October 30, Cadorna ordered his men to cross the river and establish a new defensive line. This effort took four days and was quickly thwarted when German troops established a bridgehead over the river on November 2. By this point, the stunning success of Belows offensive began to hinder operations as the Austro-German supply lines were unable to keep up with the speed of the advance. With the enemy slowing, Cadorna ordered a further retreat to the Piave River on November 4. Though large numbers of Italian troops had been captured in the fighting, the bulk of his troops from the Isonzo region were able to form a strong line behind the river by November 10. A deep, wide river, the Piave finally brought the Austro-German advance to an end. Lacking the supplies or equipment for an attack across the river, they elected to dig in. Battle of Caporetto - Aftermath: The fighting at the Battle of Caporetto cost the Italians around 10,000 killed, 20,000 wounded, and 275,000 captured. Austro-German casualties numbered around 20,000. One of the few clear victories of World War I, Caporetto saw the Austro-German forces advance around 80 miles and reach a position from which they could strike at Venice. In the wake of the defeat, Cadorna was removed as chief of staff and replaced with General Armando Diaz. With their allys forces badly wounded, the British and French sent five and six divisions respectively to bolster the Piave River line. Austro-German attempts to cross the Piave that fall were turned back as were attacks against Monte Grappa. Though a massive defeat, Caporetto rallied the Italian nation behind the war effort. Within a few months the losses of material had been replaced and the army quickly recovered its strength through the winter of 1917/1918. Selected Sources First World War: Battle of CaporettoHistory of War: Battle of Caporetto
Wednesday, February 26, 2020
Olympic Games in London 2012 - Term Paper Example LOCOG has conducted a number of pilot tests prior to the official launch of the event and those were focused to ensure that the general public transport and working routine does not get affected by the event. For this purpose walking tracks have been established that would lead to the sports park and would avoid large lanes of traffic in form of visitors visiting the place. Manuals and city maps are being spread online and at the local level. The Daily Telegraph reported a large number of bookings from the visitors in advance who are bound to visit the city during the event. For the entire purpose London Transport Plan ( 2nd edition) was released in 2009 which took into consideration factors like passengers routes, visitors stay, businesses and motels handling and all other factors that were necessary to be taken into account (LOCOG, 2010). The entire project was split into various sections that lasted for a particular period.Between 2007 and 2011 the development process was named as Ã¢â¬Å"Building the stageÃ¢â¬ which included establishing the infrastructure of the entire event taking into consideration all the variables involved. (LOCOG, 2012) while the second part (2011 onwards plan) constituted the final touches and enabling the successful organization of the event. The internal environment includes the gigantic sports stadium arena termed the Sports park can accommodate over 80 thousand spectators at one time. It is the first Olympic even that will be HD-TV supported. It has a separate broadcast center that will have the capacity for over 20 thousand media representatives. For ensuring error proof performance and event organization, a number of pilot events were organized in a bid to analyze the level of preparation. The management team needs to facilitate not just the organizers and media person but the athletes as well. For this purpose effective strategy has been devised that will meet the needs. The Risk factor consideration is also taken into account and impact of various issues on the mega event. LOCOG board has established a panel for this purpose that involves the active participation of senior management for mitigating the risks.