Monday, December 30, 2019

The Family Mediation And Conflict Resolution Process

Through a series of lectures, class discussions, reading and research, the objectives of this course included in-depth examining of the family mediation and conflict resolution process and techniques. The student endeavored on an educational journey to study mediation within the context of families as a means of resolving conflicts without resort to adversarial means such as litigation. Focus and attention was given to family dynamics, child development, the Texas Family Code, family violence, and facilitating of communication and dispute resolution. The components and benefits of family mediation and conflict resolution were introduced and thoroughly discussed. Through the reading of assigned texts, class instruction and lectures,†¦show more content†¦As previously mentioned, unfortunately one of the many issues that one sees in life is conflict. Conflict is an inevitable part of life. But when conflict is present and tension is high, those involved begin to â€Å"vibrateà ¢â‚¬  and the result, which is conflict, can be ugly and damaging with long-lasting effects. When people are anxious keeping calm, remaining friendly and using reason to tackle the issues at hand can be a very challenging thing to do. Being anxious and trying to resolve the conflict to everyone’s satisfaction is always a task. The ultimate goal however is to achieve a â€Å"win-win† situation for all involved. Thus, mediation and conflict resolution is significantly important to all stakeholders. In this reflection, the student will examine the use of system’s thinking and self-differentiation as a means to successful and productive family mediation and conflict resolution. In an anxious situation or during the time of conflict the most valuable thing one can do is remain in control of one’s own emotions. It is always important to remember that one cannot change anyone else; the only person that one can change is self. This can be incredibly difficult, particularly if one thinks the other party or people involved are being rude, thoughtless, unfair, and/or insensitive. But it is vital that one keeps cool, manage anxiety, and not meet anger

Sunday, December 22, 2019

Database Design Development - 2919 Words

MODULE: DATABASE DESIGN DEVELOPMENT ASSIGNMENT TITLE: VETERINARY SURGERY DATABASE DEVELOPMENT Table of Content Task 1 Page 2 Task 2 Page 5 Task 3 Page 14 Task 4 Page 28 Task 5 Page 30 Reference Page 32 Bibliography Page 33 Task 1 Question: AIM: Draw an Entity Relationship Data Model that describes the content and structure of the data held by Petcare. Specify the cardinality ratio and participation constraint of each relationship type. Answer: I have prepared this assignment to demonstrate an understanding of applying data modeling and analysis techniques to the design and development of database solutions. I am as a sub-contracted to design the database system supporting the Veterinary Doctor for the Petcare.†¦show more content†¦Ã¢â„¢ £ Transform second normal form table to third normal form. Un-Normalized data set: [pic] List all the data contain in the database. Un-normalized data set to first normal form. [pic] The data set represented in to be an un-normalized data set. This can be seen, for instance, if I choice the data â€Å"Animal ID† and â€Å"Owner ID† as the key of this data set and underline it to indicate the realistically and I remove redundant information. A given cell of the table for the attributes, Appointment ID, Appointment date, Appointment time, Branch name, Branch address, Branch telephone number, Branch emergency telephone number, opening hour, Doctor name, Doctor address, Doctor home telephone number, Doctor mobile telephone number, Prescription, Diagnosis made, Period of drug, Name of drug, cost of drug, Charge made, Animal ID, Animal type, Animal breed, Animal name, age and sex contains multiple values. â€Å"The relation is in first normal form if and only if every non-key attribute is functionally dependent upon the primary key.† The attributes, Appointment ID, Appointment date, Appointment time, Branch name, Branch address, Branch telephone number, Branch emergency telephone number, opening hour, Doctor name, Doctor address, Doctor home telephone number, Doctor mobile telephone number, Prescription, Diagnosis made, Period of drug, Name of drug, cost of drug and Charge made are clearly not functionally dependent on my chosen primary keyShow MoreRelatedThe Development And Design Of A Database1429 Words   |  6 PagesABSTRACT The use of agile in database development has grown over the years with the goal of improving the quality of the final product. This, however, has not always been the case. The development and design of a database doesn’t follow simple or single approach; it connects multiple processes and individuals who collectively play key roles in the process. In some instances, database development using agile methods engage in rushed deployments, neglecting the importance of testing. There are dailyRead MoreDatabase Development Life Cycle ( Ddlc )1231 Words   |  5 PagesIntroduction The database development life cycle (DDLC) is the steps involved from the start to finish of a database s life. Typically, a database’s life end when its functionality to a user is no longer applicable to the users needs. The DDLC consists of seven interdependent steps: database planning, database analysis, logical database design, physical database design, implementation and data mapping, integration and testing, operation and maintenance, and disposition (Gupta, Mata-Toledo,Read MoreEssay The Role of Database Administrator1418 Words   |  6 Pagestake the head of a database administrator of an IT department whether the size of the company is small or enormous. In larger organizations, there will most likely be an information technology group that contains the management information system department and data processing group. They are responsible not only for ensuring that the computers are available but also having reliable data on the computer and making sure the company has what it needs to meet its obligation. Database managers usuallyRead MoreDatabase Development Life Cycle ( Ddlc )1230 Words   |  5 PagesThe database development life cycle (DDLC) is the steps involved from the start to finish of a database s life. Typically, a database’s life end when its functionality to a user is no longer applicable to the users needs. The DDLC consists of seven interdependent steps: database planning, database analysis, logical database design, physical database design, implementation and data mapping, integration and testing, operation and maintenance, and disposition (Gupta, Mata-Toledo, and Monger 2011)Read MoreOnline Registration 3963 Words   |  16 PagesDESIGN AND IMPLEMENATION OF A WEB BASED ONLINE STUDENT REGISTRATION SYSTEM WITH SMS FEEDBACK. CASE STUDY: KAMPALA INTERNATIONAL UNIVERSITY . BY OTAJEREHA KENNETH ONORIODE BIT/42017/91/DF A PROJECT PROPOSAL SUBMITTED TO THE SCHOOL OF COMPUTER STUDIES IN PARTIAL FULLFILMENT OF THE REQUIREMENT FOR THE AWARD OF DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY OF KAMPALA INTERNATIONAL UNIVERSITY DECLARATION I OTAJEREHE KENNETH ONORIODE, BIT/42017/91/DF declares that thisRead MoreDatabase Design and Implementation38677 Words   |  155 PagesPhyloInformatics 7: 1-66 - 2005 Relational Database Design and Implementation for Biodiversity Informatics Paul J. Morris The Academy of Natural Sciences 1900 Ben Franklin Parkway, Philadelphia, PA 19103 USA Received: 28 October 2004 - Accepted: 19 January 2005 Abstract The complexity of natural history collection information and similar information within the scope of biodiversity informatics poses significant challenges for effective long term stewardship of that information in electronicRead MoreDad (Data Analysis and Design)1117 Words   |  5 PagesData Analysis And Design BTEC HIGHER NATIONAL DIPLOMA Assignment Institute Name : IDM Computer Studies Pvt. Ltd. Unit Name : Data Analysis and Design Unit : Unit 13 Assignment Title : Understanding and Analysis, Design and Implementation of Database system. Date given : 10th May 2010 Date to be submitted : 20th July 2010 Lecturer : Mr. T. Shanakr Rational The objective of this assignment is to assure that theRead MoreDevry Bis 245 All Ilabs Week 1 - 7 - Latest If You Want to Purchase a+ Work Then Click the Link Below , Instant Download Http: //Www.Hwspeed.Com/Devry-Bis-245-All-Ilabs-Week-1-7-Latest-49449044.Htm?Categoryid=-1 If You1403 Words   |  6 Pagesbusiness situation in which managers require information from a database, determine, analyze and classify that information so that reports can be designed to meet the requirements. 2. Given a situation containing entities, business rules, and data requirements, create the conceptual model of the database using a database modeling tool. Scenario: You have been asked to create two conceptual database models using MS Visio Database Model Diagram Template. The purpose of this lab is to have you gainRead MoreDatabase Design Concept1054 Words   |  5 PagesApply the database development cycle to a given data set Database development creates enterprise data modeling, which forms the range and wide-ranging contents of organizational databases. There are 5 phases in Database Development Cycle: Planning; Analysis; Design; Implementation and Maintenance. Planning In Planning Stage, the organization needs to know why do they need the database; what do they want the database to do; and how are they going to make the database. This is also where theRead MoreData Modeling Concepts1133 Words   |  5 Pagesdata models and the importance of data model. Building a good data model helps organizations in software development, data base design and product maintenance. The document explains the theory, even if it looks like the organizations are spending substantial amount of resources on developing data models, but still it helps organization, keeping the costs low and build a better product. Database constitutes of data structures and is represented by conceptual data structures. Data models are abstract

Friday, December 13, 2019

Louis Vuitton Malletier V Dooney Bourke Inc Free Essays

Louis Vuitton Malletier v Dooney Bourke Inc. In this famous case known as the â€Å"Battle of the Handbags† Louis Vuitton (LV) sues Dooney Burke (DB) for trademark infringement of its multicolore line. The Plaintiff, Louis Vuitton Malletier ,is a French fashion house founded in 1854 by Louis Vuitton. We will write a custom essay sample on Louis Vuitton Malletier V Dooney Bourke Inc or any similar topic only for you Order Now The famous label is well known for its LV monogram, which is featured on most of its products. Louis Vuitton is considered as one of the world’s most valuable and prestigious brands. The LV monogram was created in 1896 by Louis’ son Georges Vuitton who invented the symbol and the letters represent his father’s initials. The logo is a Japanese-inspired flower motif which initially was created as a way to prevent counterfeiting. This memorable logo is now synonymous with luxury, brilliance and indulgence. It is the world’s 29th most valuable brand and is estimated to be worth over $19 billion USD. Unfortunately, Louis Vuitton is one of the most counterfeited brands in the fashion world due to its image as a status symbol. The company takes counterfeiting seriously, and uses all its possible resources to fight counterfeiting. The Defendant, Dooney Bourke, is an American company founded in 1975 by Peter Dooney and Frederic Bourke. The company specializes in fashion accessories and is best known for its high quality handbags, accessories, and travel luggage. Their Signature and Mini Signature handbags consist of the â€Å"DB† initials interlocking in a repeating pattern. The founders of the company started off with two introductory products: surcingle belts and suspenders for men. Their products became very popular due to their unique design and color. Now Dooney Bourke is a well-known brand in America and has a good reputation for making quality products. The defining look of Dooney Bourke is elegant and sophisticated, but above all, it is timeless. Its classic designs make these handbags the perfect accessory for any outfit due to the superior quality and unique form. In 2002, the designer Marc Jacobs invited the Japanese artist Takashi Murakami to come up with a fresh take on the Louis Vuitton †toile monogram† famous entwined LV logo intermixed with flower shapes for a new line of bags. This led to the creation of the Monogram Multicolore design, in 33 colors, displayed on handbags in a repeating pattern against a white or black background. The bags made their debut on Paris runways in October 2002 and were then presented in prestige retail outlets in March 003, where they sold for up to $3,950. Previously LV registered its famous LV monogram design pattern and the individual unique shapes as trademarks with the United States Patent and Trademark Office. In July 2003 D in collaboration with Teen Vogue developed a new line of handbags for teenagers. It was launched as the â€Å"It Bag† collection. The pattern on the purses consisted of the entwined â€Å"DB† initials printed in contracting colors on variety of colored backgrounds and white and black background. D released handbag line looked similar to Louis Vuitton’s trendy model, but the price was significantly lower. Considering the fact that Louis Vuitton fights counterfeiting very aggressively, not surprisingly, the matter ended up in the courts. LV immediately viewed the â€Å"It Bag† as a copy of their design. When Louis Vuitton gathered with legal counsel on their options to file suit against Dooney and Bourke, they became aware of the alternatives that were available to them in order to move forward. For designers and manufacturers in the American Fashion industry, there are four possible avenues to explore: 1) Copyright protection, 2) Patent protection, 3) Trade Dress protection and 4) Trademark protection. Copyright protection covers a range of categories including literacy, musical, dramatic, choreographic, pictorial and architectural works. Within this range, the only one that is applicable to fashion designs is pictorial, as it shields two- and three- dimensional works. Patent protection shields any â€Å"new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof†. Since the design in the fashion industry rarely creates a new process, machine or manufactures, they have a separate statute specifically for them for new, original and ornamental design for an article of manufacture. Trade dress protection is addressed under the Lanham Act to defend the design and appearance of the product as well as that of the container and all elements making up the total visual image by which the product is presented to customers. Colors have also been addressed under the Trade dress protection in which the United States Supreme Court has stated that the color and designs of a product are only protected under the Lanham Act if a secondary meaning has been demonstrated. Color and design must be associated by the customer for that particular product over time. In 2004, the legal team decided to advance with option 4: Trademark protection. They claimed trademark infringement, trademark dilution, as well as unfair competition and false designation. Trademark infringement harbors a manufacturer or seller’s product to include a word, slogan or symbol. For instance, Apple is an example of a word that cannot be used in relationship with software or computers as it will cause confusion from a consumer’s perspective. Nike holds the trademark of the slogan â€Å"Just Do It† that is associated with its product and McDonald’s hold trademark of the golden arches symbol. In some instances this protection can extend to other properties such as its color or even its packaging. For trademark dilution claims, the distinctive quality of a mark must be diluted by blurring or tarnishment. However, the likelihood of confusion is not necessary. Unfair competition and false designation is characterized as likely to cause confusion, mistake or deceive the consumer. Section 43(a) states â€Å"any person who on or in connection with any goods or services, or any container goods, used in commerce any word, term, name or symbol, or device, or any combination therefore, or any false designation of origin, false or misleading description of fact, or false or misleading representation of fact which a) is likely to cause confusion, or to cause mistake, or to deceive as to the affiliation, connection, or association of such person with another person, or as to the origin, sponsorship, or approval or her goods, services, or commercial activities by another person, or (b) in commercial advertising or promotion, misrepresents the nature, characteristics, qualities or geographic origin of his or her or another person’s goods, services or commercial activities, shall be liable in a civil action by any person who believes that he or she is or is likely to be damaged by such act. † In addition under sections 32 and 43(a) of the Lanham Act, tradem ark protection extends above the registered trademarks to the unregistered trademarks from misuse or reproduction in commerce. Once a trademark is established as fundamentally distinctive or to have developed secondary meaning, as well as protection under the Lanham Act, one can then address the likelihood of confusion under trademark infringement. Statutes require a sense of clear case situation as well as a specific element of which the claim can be proven as a violation of the law. This means that sequential evidence is needed, as this poses the validity of the claim and further makes the justification of the case. Without this evidence, the case could be deemed as void, as there is no possible evidence that can prove the claim. Statutes also require the clarity of the case, which means the details of the case or the violation should be given in chronological order so that the justifications set for the claim as well as the laws that could be used to make it more justified could be legally provided. There is actually a varied definition on how violations of laws happen. There are times when a crime committed may not be a violation of the law, or the violation of the law is not a crime. This happens when the crime being claimed is not part of the scope of the statute, or there is no existing law for such crime. Therefore this results in deliberating on whether the action indeed is a crime or a violation of the law. Situations such as this often arise from actions where the defendant is ignorant of the law which he has violated. In addition, the claimant can be the one who is ignorant of the law when he laid evidence on the ‘crime’ allegedly committed by the defendant. Now that we have a thorough understanding of the applicable laws, the rules that govern those laws and what are required by the statutes to prove a violation of law we can examine how the case unfolded. As previously stated, Vuitton filed suit against DB in April of 2004 in the United States District court for the Southern District of New York, claiming trademark infringement, unfair competition and false designation, and trademark dilution. Vuitton moved for a preliminary injunction against DB which would have stopped sales of the â€Å"it bag† until the case was resolved. The District court ruled in favor of DB and Vuitton was not granted the injunction. In determining trademark infringement the court applied the two prong test required of Section 43 of the Lanham Act. First the test looks to whether or not the mark merits protection by determining if the unregistered trademark is distinctive or has achieved secondary meaning. In this case the district court did find that Vuitton’s design was distinctive and had garnered secondary meaning in the market place. The second part of the test involves deciding whether the defendant’s use of the mark is likely to cause consumers confusion as to the origin or sponsorship of the defendant’s goods. Accordingly the court then examined the eight factors weighed in determining likelihood of confusion: 1) the strength of the mark, 2) the similarity between the marks, 3) the proximity of the roducts, 4) the likelihood that the plaintiff will bridge the gap between the markets of the two marks, 5) actual confusion, 6) the defendants good faith in using his or her mark, 7) the quality of the defendant’s product, and 8) the sophistication of the customers. The district court ruled that th ere was no likelihood of confusion based on its evaluation of the 8 factors and thus denied the injunction. In addition, the district court found that Vuitton was unable to prove trademark dilution. LV appealed the injunction denial to the Second Circuit Court of Appeals hoping to force the court into making a more broad judgment with regard â€Å"design piracy†. Unfortunately for Vuitton the court was not in the mood to make a statement in favor of protecting designers. Rather than make its’ own ruling on the case, based on the facts laid out before the court, the Second Circuit instead focused on a mistake by the district court in its application of the standard of likelihood of confusion. The Second Circuit had previously held in Louis Vuitton Malletier v. Burlington Coat Factory that courts must use a sequential market place comparison rather than a side by side comparison when applying the standard of likelihood of confusion. The district court had used a side by side comparison that the Second Circuit deemed improper. In addition, the Second Circuit agreed with the district court that LV was not able to prove trademark dilution at the federal level. In order to prove trademark dilution the plaintiff must demonstrate the following; â€Å"its mark is famous, the defendant is making commercial use of the mark in commerce, the defendants use began after the mark became famous, the defendants use of the mark dilutes the quality of the mark by diminishing the capacity of the mark to identify and distinguish goods and services†. Vuitton was able to prove the first three requirements but was unable to prove actual dilution. While the court did agree that LV could not prove actual dilution (the federal requirement) they vacated the injunction at the state level due to the fact that it only requires LV to show likelihood of dilution. The Second Circuit decided to remand the similarity of the marks factor back to the district court for reconsideration. This meant that the district court would use the sequential market place comparison when examining the similarity of the marks and hold onto all other previous analysis of the likelihood of confusion factors. Even if the market place comparison had an effect on that one factor it was very unlikely to affect the outcome of the district court’s ruling because the similarity of the marks was just one of eight weighted factors. The Second Circuit was essentially making a statement with its handling of this case that it was not prepared to make a precedent setting ruling on the lack of protection for â€Å"design piracy† in the fashion industry. Even if they desired to address the topic, strictly following the established law would have prevented them from coming up with a different result. The court may have felt that any perceived or real injustice plaguing the fashion industry should be handled through the adoption of written law rather than legislated from the bench. Ultimately in May of 2008 the district court granted summary judgment to DB on all claims. The court found that Louis Vuitton did not have adequate evidence to present with regards to the trademark infringement or dilution claims. While the outcome of the case disappointed many people because DB did copy the design, the court based its decision on the interpretation of the law. Another example of a trademark infringement case that could have implications is European Trademark v Google. Originally LV sued Google in France claiming trademark infringement from Google’s AdWords program and the French court ruled in LV’s favor. The court held that Google was committing trademark infringement and diluting the trademark when it decided to sell the LV name to other companies in order for their site to pops up upon a search. Unfortunately for LV the European Court of Justice later ruled that Google in fact was not guilty of trademark infringement. There is a silver lining for LV. The court stated that advertisers using a trademark as a keyword can be held liable for infringement. The court specifically stated that â€Å"such use of a trademark by the advertiser adversely affects the source-indicating function of the trademark if the advertisement does not enable normally informed and reasonably attentive internet users to ascertain whether goods or services referred to by the ad originate from the proprietor of the trademark or, on the contrary, originate from a third party†. Thus, a company like Louis Vuitton does have legal recourse if it finds misleading advertisements from searches of its brand. In addition, Google can be held accountable if it was aware of the improper use of the trademark and did not take the ad or content down. The ruling could have impacted a case like Louis Vuitton Malletier v Dooney Bourke Inc. , but instead has gone farther towards protecting companies in the fairly unregulated internet market place. In closing, companies like LV will have to continue to be extremely aggressive through the use of lawsuits in order to protect their brand. Once more laws are applied to specific industry, such as the fashion industry, it will become easier to convey. The courts can only interpret the law, not create laws to safeguard these specific industries. The courts, as well as the citizens, have to trust that the legislative branch will step up and address these complex issues. How to cite Louis Vuitton Malletier V Dooney Bourke Inc, Papers

Thursday, December 5, 2019

Evaluation Report Brief Deakin University

Question: Write a brief report that evaluates the current state and future direction of Deakin University Services. Answer: Introduction Deakin University is a well-known Australian University which provides higher education to the students of Australia. It established its first campus at a place called Waurn Ponds in Australia and got its name after Alfred Deakin who was the 2nd prime minister of the country. The aim of the university is to provide such education which can help in building better jobs for the future (Deakin, 2015). It is considered among the top universities throughout the world. Scope, objective, purpose and use of the report- The purpose of this report is to get familiar with the services and courses provided by our well known Australian university, the DEAKIN (Deakin, 2015). One can get the brief knowledge about the courses, fee structure, sponsorships online only. Deakin University provides various facilities such as health and fitness, online. Classroom facilities, transportation, accommodation and good quality of food, skilled and highly educated professor, etc. that in terms not only enhances the career opportunity for the student as well as institutional growth. One can save money and time by enrolling their online training sessions. Today, in this busy world, working professionals get the opportunity to enhance their knowledge to a great extent by doing their jobs simultaneously. (service, support and facilities, 2015) The main motivation of Deakin University is to provide excellence and knowledge to their students by the reputed professors. Every year the Number of enrolments is getting increased due the good management to gain the knowledge (Network, 2015). As we all know we have language diversities all around the world. A Person who only knows the French cannot able to understand the lectures in English. So it would be recommendable to provide the lectures in different languages. The only thing one has to be considered in mind before going to the online programs is the comfort level with the updating technologies. The one who is very fond of learning new technologies through video calling like Skype is the perfect combination to grab the opportunity. Facilities given to the students. Yes, these universities provide courses at a very low fee, which can be affordable by students from each and every part of the world. By giving, sponsorships also help the student to a large extent. The university has to impart the training and study materials in maximum number of the language that in terms help the people from different parts of the world (Shanghairanking, 2015). Deakin was honored a 5-star rating by the prestigious college positioning, association Quacquarelli Symonds (QS); the rating demonstrates Deakin is world-class in an expansive scope of regions, has bleeding edge offices and is globally eminent for its exploration and educating. Deakin is in the main 50 of the QS positioning of the world's colleges under 50 years. One of benefit to study in our university is providing health and fitness consideration into the mind of every individual is the keen responsibility of the university without any discrimination. Deakin University now proposed a new way to study for the working professional and family peoples. Every year around ten thousand people are taking admission to Deakin University by enrolling in the cloud online service. In today's world of Internet Cloud computing plays a vital role as it provides the internet based storage for applications, files and infrastructure (Long, Marchetti and Fasse, 2011). Now days, the company may buy or rent space for maintaining huge amount of data for their daily operations. In that prospect cloud computing comes into the picture. One of the objectives of studying Deakin University is lies in the fact that one can avail the Deakins services and facilities outside of Australia. Good Career Counselor helped the students to choose the cloud study online through phone calls or video calling. Online sessions that are held throughout the year are very useful to the students for exam preparation. Deakin intends to fabricate the employments without bounds, utilizing the chances of the computerized age to enlarge access to training and have any kind of effect to the groups it serves. (Cloud computing, 2015) à ¢Ã¢â€š ¬Ã¢â‚¬ ¹Strength 1) A person residing anywhere in the world can avail this facility of cloud online study and easily gets the Deakin university degree. 2) Cloud (online) understudies are backed through our honor winning library SERVICES, intuitive study techniques and understudy help administrations. 3) Cloud Online orientation provides the information and resources about the online orientation (Thecompleteuniversityguide, 2015). Weakness 1) Job seekers have to face many problems getting into the opportunity by realizing that most of the employers dont accept the distance learning degrees. Sometimes they might be considered as a fake degree (Timeshighereducation, 2015). 2) For some of the courses which require practical knowledge such as nursing cannot be offered entirely online basis. 3) Sessions should be given in every language so that worldwide peoples can avail this course. Recommendation 1) After getting the degree, on campus recruitment should be provided to each and every student that will be the greatest help for the job seekers. 2) An exam should be held by the University in every three months for the Students to score the marks. On, the basis of the score sponsorships should be given to the students that in terms reduces the fee structure and brilliant students who are not having much money can get the chance to study in such a reputed university (Network, 2015). 3) Currently Deakin University is very limited to the courses in various fields. They can add fashion designing courses, photography, theatre courses, and dance and music courses for enlarging their areas of interest. Conclusion In order to increase the number of students worldwide some practical classes for the nursing courses should be enrolled in the program so that it can cover each and every field that helps to educate their students with a large number of degree options (Thecompleteuniversityguide, 2015). Deakin University provides lot of scopes to its students which helps them to achieve their desired goal. If it works on the recommendations mentioned, and provide different study options to the students, the university can go a long way and more and more number of students can get themselves enrolled in those streams which will be beneficial for the university. Reference Distancelearningnet.com, (2015). Advantages and Disadvantages of Distance Learning | Distance Learning Net. Deakin.edu.au, (2015). Services, Support and Facilities | Deakin. Deakin.edu.au, (2015). Deakin University | Melbourne, Geelong and Warrnambool, Australia. Timeshighereducation.co.uk, (2015). Deakin University - World University Rankings - 2012-13 - Times Higher Education. Network, A. (2015). Rankings of Australian Universities 2015-2016 | AustralianUniversities.com.au. Thecompleteuniversityguide.co.uk, (2015). Deakin University. Shanghairanking.com, (2015). Deakin University | Academic Ranking of World Universities - 2014 | Shanghai Ranking - 2014. Long, G., Marchetti, C. and Fasse, R. (2011). The importance of interaction for academic success in online courses with hearing, deaf, and hard-of-hearing students. The International Review of Research in Open and Distributed Learning, [online] 12(6), pp.1-19. Tutorialspoint, (n. d.). Cloud Computing Overview. Tutorials Point. Pp 9-83 Sadera, William A. (2009). The Role of Community in Online Learning Success.