Saturday, October 12, 2019

Installing Windows :: Essays Papers

Installing Windows Starting an Internet connection and establishing an email account is a long, hard process. It is not as difficult as designing a web page or starting your own web browser, but it is a difficulty within itself. It is specifically difficult with computers equipped with the Windows ’98 software. I will explain the process of logging onto the Internet and establishing an email account. In order to begin the task of a dial-up, you must first establish a configuration. This process is begun by right clicking on the â€Å"Start† button at the bottom left of your task bar. By selecting the â€Å"Settings† option, and then selecting the â€Å"Control Panel† icon, you are gradually edging towards a dial-up network connection. Next, double-click the â€Å"Add/Remove Programs† icon in the window. This icon resembles two disks with one red and one green dot on them. Click on the â€Å"Windows Setup† tab at the top of the window that has opened. This should be followed by a click of the â€Å"Detail† button. You should then click to add a check in the box next to the â€Å"Dial-up Networking† icon, which is in the shape of a telephone. You should then click â€Å"Next† for the next two screens. This closes the â€Å"communications† and â€Å"Add /Remove Programs† windows. At this point, â€Å"Dial -Up Networking† has been installed in the computer. You must now restart your computer, by simply clicking onto the â€Å"Start† button once again, which is located at the bottom left of the screen. After this, you should click onto the â€Å"Shut Down† button. A window will pop up with the options of: Shut down, Stand-by, Restart, or Restart in MS-DOS mode. You should choose the â€Å"Restart† option. This will reboot the computer. You are now ready to continue with step 2 of the process. Begin step two by clicking, once again, on the â€Å"Start† button and follow this up by clicking on â€Å"Programs† and then â€Å"Accessories†. â€Å"Communications† should then selected and then â€Å"Dial-Up Networking.† You should then click onto the UVic NetLink icon, which resembles a telephone, with two computer screens or monitors attached to it. You should right-click this icon, which leads to the â€Å"Properties† menu. In the â€Å"Properties† menu, click the tab labeled â€Å"Options.† Under the section labeled â€Å"Connection Control,† check to see if the box next to the statement â€Å"Bring up terminal window after dialing,† is checked.

Friday, October 11, 2019

Emerging Technology Essay

The purpose of this paper is to summarize the advantages of computers/software and the use of computer technology in investigations. Summarize the disadvantages to law enforcement with respect to the advancements of computers. Real cases will be researched in order to understand how computers can be utilized in criminal activities, as well as a case that the use of a computer was beneficial to the prosecution in a criminal case. A final conclusion paragraph will address my personal subjective opinion as to whether these technologies, in an overall sense are a benefit or hindrance to law enforcement efforts. Introduction Since computers have become such a big part of our lives it is no surprise that even criminals now know how to hack into large computer networks. Obtaining electronic evidence may be one of the most difficult types of evidence to recover. Another issue is authenticating this evidence; however with the help of legal standards this evidence is admissible in court today. Even though computers are the most dominant form of technology that is used in a variety of situations, there are set backs to everything and computers are no exceptions as this paper will explain (Forensic Science, n.d.). The Advantages of Computers and the Use of Computer Technology in Investigations In order to paint an accurate picture of the advantages of computers and technology relating to investigation we must start as close to the beginning as possible. This would be when President Johnson in his State of the union Address to Congress in 1968. This is where the President made the announcement â€Å"to bring the most advanced technology to the war on crime in every city and country in America† (Northrop, 1993). It was less than ten months when the congress along with the President, put into law the Omnibus Crime Control and Safe Streets Act of 1968. This law created the Law Enforcement Assistance Association (LEAA), to handle and deliver on the promise of the President of technological assistance. During the next ten years the LEAA contributed meanly $50 million to state and local government criminal justice and law enforcement agencies for crime fighting. Otherfederal agencies like the FBI matched the funding as well as local and state governments themselves (Northrop, 1993). To demonstrate the usefulness of computers by police in the fight against crime, this pare to the paper will refer to results from a comprehensive repeated-measures field study that looked specifically at how useful computers are to police in the fight against crime. The study focused on a particular class of computer use, which was the searches for vital information because this is the bulk of computer activity for officers and are valued by the police in their fight against crime. Between 1976 and 1988 the data did â€Å"show a clear improvement in both the use of and benefits from such systems† (Northrop, 1993). The only drawback is that â€Å"the investment in search systems and the promise they hold for improving police effectiveness is badly constrained by inadequate training of patrol officers and detectives† (Northrop, 1993). However, there is a very simple solution to this small glitch and that is to create an adequate training system and put all officers through that training program (Northrop, 1993). The most notable problem facing officers was the chronic lack of information. This spans the range from the police chiefs shortage of information on how to use the departments limited resources to the patrol officers uncertainty over whom to stop and question regarding suspicious behavior. In the 1970’s and early 1980’s, this problem was addressed using a multi-facade management approach and there were big payoffs. The problem of improving how information was provided to police officers in the street or to the detective working a case was harder to fix. They soon realized the only way to specific individuals or cases was the existing records. However, the only means of utilizing those records was to look them up (Northrop, 1993). From utilizing computers in cars so officers could run a license plate and social security number to see if there are any warrants out for the person they stopped, to more advances such as carrying cell phones, GPS tracking systems in cars, crime mapping tools, information sharing between state and local law enforcement, to even sharing information across countries. Technology has come a long way in helping officers and other agents within the criminal justice system do their job. Just a bit more about the advantages of the things mentioned above and time to move on. The most interesting thing is Geographic Information Systems (GIS), which has become a most important tool for law enforcement agencies. GIS, othermapping software and desktop computers now are capable of mapping and data analysis that is way above and beyond what used to be possible with backroom mainframe computers (Rubley, 2011). Another great advancement is the widespread use of everyone using mobile devices. Many officers now use two to three cell phones. The invention of apps has made it easy for everyone to tap a button and instantly retrieve valuable information. Information that used to take several steps to obtain using a browser is now at the officer’s fingertips. Mobile technology is evolving all the time and it is evolving fast, even in the past few years the government has been able to identify a suspect through a facial recognition app on the iPhone, look up a potential jurors social media profile during voir dire, and now they even have real time data streaming to mobile devices which can provide information on a fugitive or get instant news feeds. There is no doubt that computers and technology have taken law enforcement to a whole new level (Rubley, 2011). What Disadvantages Face Law Enforcement with Respect to the Advancements of Computers? One big disadvantage is that there is such a high volume of information being exchanged daily on the internet and while this is a convenient thing for most of us, there are also criminals taking advantage of the opportunity. There is corporate fraud, theft, intellectual property disputes, and even breach of contract and asset recovery issues. These are some of the situations that use computers to commit the crime and use computer forensics to solve the crime (n.a., 2009). An additional disadvantage is making sure that the digital evidence is going to be admissible in court. Since data can be modified very easy, the analyst must be able to comply with the standards of evidence required by law. The analyst must make sure their investigation is fully documented and accounted for. Another real disadvantage is the cost of retrieving the data. Computer forensic experts are hired by the hour and the process of analyzing and reporting the data can take up to 15 hours depending on the nature of the case (n.a., 2009). Other disadvantages are really the same ones facing all users of technology. If the system is down there is no information that can be retrieved. If the user is not trained in using the technological equipment at his/her disposal then this will be a waste of time. If the input of information is incorrect which sometimes occurs because of human error, then that will cause a problem for officers in the long run. The Case Chosen to be researched where the Computer was used to Aid in the Commission of a Crime. 3 NJ Students Charged in School Computer Hacking On April 14, 2010, in Haddonfield N.J. three students hacked into one of the top preforming High Schools. They are now facing charges for attempting to change their grades once they were into the system. The three students are boys, ages 14, 15, and 16 but because they are minors their names have not been released. The Boys were found out when a staff member found one of the boys using keystroke capture software on one of the computers at the school in an attempt to steal a teacher’s password. That student then implicated the others in this crime. The boys were charged with illegally obtaining information and were released to their parents (Associated Press, 2010). This is a wonderful example of how people, who might never have committed a crime in their lives, get ideas about computers as if this is not a crime. They get on the internet, explore places and things that are illegal and never think twice about it because they are either in their own home and feel protected, or they feel that it is easier to get away with computer related crimes and take their chances. There is too much technology and it is dangerous in the wrong hands. People need to realize that especially crime on the internet will always be solved sooner or later because what you do on a computer leaves a print forever that can never be erased. Research Case Where a Computer was Beneficial to the Prosecution in a Criminal Case In this case a woman age 45, named Sonia Martin, from Nigeria and Chicago, Illinois was â€Å"manager of a Chicago cell in one of the most sophisticated and organized computer hacking and ATM cash out schemes ever perpetrated† (U.S. Attorney’s Office, 2012). On August 12, 2012 she was sentenced to serve two years and six months in a federal prison on charges of conspiracy to commit wore fraud. She will also serve five years of supervised release and $89,120.25 in restitution fees (U.S. Attorney’s Office, 2012). According the United States attorney Yates, in November of 2008 a group of hackers obtained unauthorized access into the comp uter system of a company called WorldPay US, Inc., then known as RBS WorldPay, which is a payment processor in Atlanta. The hackers were very sophisticated and used some daring techniques to compromise the data encryption that WorldPay used to protect the customers data on payroll debit cards. These are used by more and more companies to pay their employees. This is convenient for employees as they can use the debit card right away or use it to withdraw their salaries right from an ATM (U.S. Attorney’s Office, 2012). Once they were in, hackers raised the balances and ATM withdraw limits on the compromised accounts. â€Å"They then provided a network of lead â€Å"cashers† with 44 debit card account numbers and their PIN numbers, which they used to withdraw more than $9 million from over 2,100 ATM;s in at least 280 cities worldwide, including cities in the United States, Russia, Ukraine, Estonia, Italy, Hong Kong, Japan, and Canada† (U.S. Attorney’s Office, 2012). The whole thing, $9 million dollars, took less than 12 hours to pull off on November 8, 2008 (U.S. Attorney’s Office, 2012). Throughout the cash out the hackers monitored these fraudulent ATM withdraws in real-time from inside the computer systems of WorldPay. Once the transactions were complete the hackers sought to destroy data stored on the card processing network so they could cover up this illegal activity. WorldPay discovered the unauthorized activity and reported the breach (U.S. Attorney’s Office, 2012). Sonia Martin was working with one of the lead cashers and supervised a cashing crew in Chicago. Martin was given PIN codes, and payroll cards, and then manufactured counterfeit debit cards based on that information. So she handed out cards to her underlings that she recruited and supervised. Together they all withdrew approximately $80,000 from various ATM’s around Chicago, during the early morning hours of November 8, 2008. Martin’s primary addres s is Nigeria (U.S. Attorney’s Office, 2012). This case was investigated by special agents of the federal bureau of investigations. Other who helped provide assistance included; numerous domestic and international law enforcement partners and WorldPay immediately reported the crime and substantially assisted in the investigation (U.S. Attorney’s Office, 2012). Conclusion My belief is that the new technology and computers have really given law enforcement some spectacular tools to do their job. I feel that technology has aided in the increase of incarcerations. Anytime criminals can be taken off the streets or even out of the darkness of their homes where they are committing crimes, this is a good thing. Yes there are some disadvantages that can also be dealt with. The problems of officers being unaware of how to use some of this modern technology can be cured by sending them to some training programs. All officers need to be aware of what evidence to collect when it is possibly on a computer and the chain of custody that this type of technology requires. As technology advances, unfortunately so will the crime that is being committed with that technology. Officers everywhere must be able to respond to these crimes effectively. This is why it is so important for every department to keep up with the fast paced computer technology, cell phone technology and any other technology that will aid in catching the bad guy. References Associated Press. (2010). 3 NJ students charged in school computer hacking. Retrieved June 6, 2013, from abclocal.go.com: http://abclocal.go.com/wpvi/story?section=news/technology&id=7386890 n.a. (2009). Advantages and Disadvantages of Computer Forensics . Retrieved June 9, 2013, from anushreepatil.ewebsite.com: http://www.anushreepatil.ewebsite.com/articles/advantages-and-disadvantages-of-computer-forensics.html Northrop, A. (1993). Police of Computers. Retrieved June 10, 2013, from Center for Research on Information: http://www.escholarship.org/uc/item/71x0h7hb#page-2 Rubley, S. (2011). How Has Mobile Evolved to Help the Investigative Community . Retrieved June 9, 2013, from Blog.Thomson Ruters.com: http://blog.thomsonreuters.com/index.php/how-has-mobile-evolved-to-help-the-investigative-community/ U.S. Attorney’s Office. (2012, August 12). Sentencing in Major International Cyber Crime Prosecution . Retrieved June 9, 2013, from FBI.gov: http://www.fbi.gov/atlanta/press-releases/2012/sentencing-in-major-international-cyber-crime-prosecution

Thursday, October 10, 2019

Middle Age Religion

During the Middle Ages, the Catholic Church was the sole church in Europe, where it has its own laws and its own treasury. The church was considered as an important law-making body, recognized not only by the people, but also by its leaders. The heads of the Catholic Church played big roles in the government, as they used their influence to get their way on things. Bishops were rich people at that time, and has come from a line of noble families. They have a tight hold on the people, especially since they are the ones who are â€Å"closer† to God.The lives of the people living in the Middle Ages were greatly dominated by the church. The church’s influence is limitless, from peasants, to noble lords and even the Kings – they all succumb to the will of the Church. Many of the medieval people dedicated their lives in the service of the Catholic Church and the religion they are in. They offer a life of service to the people of the Church, in hope that their actions w ould be acknowledged by God, the creator. This had been the usual threat being issued by the people of the church in order to get what they wanted from the people (Carr).During the early years of the Christian religion, its growth was being suppressed by the Roman Empire. This is because the Christians have refused to worship the Roman gods or acknowledge the power of the Roman Emperor. Christians have been persecuted all throughout the empire. These persecutions ended during the reign of Emperor Constantine, who made Christianity the official religion of the Roman Empire. Constantine the Great then proclaimed himself as the emperor of the Christian people, thus spreading the religion throughout the Empire (Middle-Ages.org.uk).The beginning of the 5th century saw the crumble of the Roman Empire. This is caused by invading Germanic tribes conquering the city of Rome. This has led to the period referred to as the Dark Ages. The fall of Rome however, signals the rise of the Christian C hurch. The Dark Ages became a stepping stone for the Catholic Religion to flourish. From the Dark Ages up to the Early Middle Ages, the only accepted Christian religion was the Catholic religion. Catholic means universal, or as a whole. Any sect that was established was viewed to be as acts of heresy and the people are heretical (Middle-Ages.org.uk).The power of the Catholic Church in the middle ages was so great, that it owned lands, imposed its own taxes, and created its own laws. It is a very powerful institution that even Kings succumbed to its influence. The Church also accepted gifts and special offerings made by those who wanted to make sure that they have a place in heaven. The influence of the church extended to various lands. They were alongside the kings and rulers of Europe when it comes to power. Those who oppose the Church will instantly receive excommunication – they would go straight to hell when they die (Oakley).One of the major events in the Catholic Religi on in the middle ages occurred in the latter part of the middle ages. This is when the Eastern and Western Christian Churches split because of issues which arise from the crusades. This is called as the Great Schism, separating the two halves of Christian Churches. Another split occurred in the Western Christendom when two Popes have been elected and established at two different places. This is caused by disagreement in the elections. This continued to a few decades, up until the issue was healed at the Council of Constance, and the Catholic Religion finally became known as the Roman Catholic Religion.Works Cited:Carr, Karen. â€Å"Medieval Religion†.   1998. November 4 2007. .Middle-Ages.org.uk. â€Å"Middle Ages Religion†.   2002. November 4 2007. .Oakley, Thomas P. â€Å"Religion and the Middle Ages†.   2007. November 5 2007. .

Care Values and Communication in a Hospital setting Essay

The care values are a set of rules and guidelines that every care practitioner has to follow in order to provide services to their clients. The overall aim of the standards is to improve client’s quality of life by ensuring that each person gets the care that is most appropriate for them as an individual. The three main care values are Confidentiality, Equality and Diversity and Individual rights and beliefs. By achieving these care values we can improve the quality of care and allow all patients to be treated as an individual with respect. Slideshare.net (2012) http://www.slideshare.net/j.slack/what-is-the-care-value-base (Accessed: 22 January 2013) Confidentiality is an important principle in health and social care as it imposes boundaries on the amount of personal information and data that can be disclosed without consent. Confidentiality is where a person disclosing personal information expects their privacy to be protected, such as in a relationship of trust. However in some situations confidentiality can be countered, when there is public interest in others being protected from harm. UCeL (2012_ http://www.ucel.ac.uk/rlos/confidentiality/ (Accessed: 22 January 2013) Confidentiality is very important because as healthcare workers our ability to correctly diagnose and treat our patients depends on getting a correct medical and social history, and having our patients trusts us. If a patients feels that the professional would share this information they may not give them the truth and without that important information they could make the wrong diagnosis and wrong treatment. Yahoo answers (2012) http://uk.answers.yahoo.com/question/index?qid=20070820014312AAuFE9q (Accessed: 25 January 2013) Confidentiality can be used in oral communication in a hospital setting, For example if a patients approached their GP about a private and embarrassing problem they would be expected to show that patient respect and not to share the information given with anyone else. An example of a time where this could be shared is if their GP wanted to send them for tests and had to inform a specialist about their condition. Another type of communication is written this could be used to promote confidentiality as all paper based records must be locked away in a filing cabinet and only be accessed by those authorised to. Also to access your own records you must write a letter and wait approval for this. Also for documents written on the computer there are various passwords and back up options for if the server goes down or a records is deleted. An example of how confidentiality can be used in computerised communication would be having passwords and automatic locks on staff’s computers and email accounts so only they can access their own patient’s information and no other members of staff or unauthorised persons. The last type of communication is specialist one example of how this can be used in confidentiality is if a person has hearing barriers and has to use sign language to communicate with their doctor. If their doctor is giving those results or information on their health and has to use sign language they may need an interpreter and the patients may want to use a quiet and enclosed room with the blinds shut just in case anybody else can see the sign language being used and understands it. Another care value is Equality and Diversity. This means treating everyone equally regardless of their colour, age, gender, ethnicity, sexual orientation, disability etc. This is different to treating people the same as different people have different needs, so individuality should be taken in to account. For example, it would not be equal treatment to provide two different people with information about the services available written in English, if one of those people spoke another language and could not understand English. Wiki.Answers (2012) http://wiki.answers.com/Q/What_does_equality_and_diversity_mean_in_health_and_social_care (Accessed: 22 January 2013) We live in an increasingly diverse society and need to be able to respond appropriately and sensitively to this diversity. Learners in the healthcare setting will reflect this diversity around gender, race and ethnicity, disability, religion, sexuality, class and age. Successful implementation of equality and diversity in all aspects of work ensures that colleagues, staff and students are valued, motivated and treated fairly. London Deanery (2012) http://www.faculty.londondeanery.ac.uk/e-learning/diversity-equal-opportunities-and-human-rights/what-is-equality-and-diversity (Accessed: 25 January 2013) One example of how Equality and Diversity can be used in oral communication in a hospital setting is that a doctor would speak differently to a child than they would to an adult as children may not be able to understand some of the information they are being told if they used big words and medical jargon. Doctors should also use a slower pace and soft tone when speaking to younger patients and ask them regularly if they understand what is being said although they normally have a parent or guardian to accompany them. An example of how Equality and Diversity can be used in written communication would be if a patient cannot read or speak English they may have to produce leaflets in their language so they understand their condition or illness and what treatment is needed more clearly. An example of how Equality and Diversity can be used in computerised communication would be having audio descriptions and talking pages on the NHS website so that people with sight barriers can still access the information they have to offer. The last type of communication is specialist and an example of how this can promote equality and Diversity is if a patient doesn’t speak English they may need a translator to assist the patient in talking to the doctor and to assist the doctor diagnosing the patient. This allows the patient to get the medical attention they require and are entitled to without them learning a second language which makes them equal but also individual. Individual’s rights and Beliefs means being treated as an individual according to our own needs, every individual wants to be treated fairly, in the care sector it is of the utmost importance that a service user is treated fairly and also treated with love, care and respect. The individual rights are respect, choice, dignity, protection, and equality, access to information, non-discrimination, and effective communication. They also have the right to their own beliefs and a doctor must respect a patients beliefs and choice’s when treating them. Wiki.Answers (2012) http://wiki.answers.com/Q/What_is_individual_rights_in_health_and_social_care (Accessed: 22 January 2013) When working within a health and social care sector based environment is to ensure that each service user feels that they can trust you as the service provider.

Wednesday, October 9, 2019

Nursing interview Term Paper Example | Topics and Well Written Essays - 1000 words

Nursing interview - Term Paper Example Finally, the third nurse leader is the Nurse Manager of the Telemetry Unit, known as EFP. Results and Summary of the Interview Preferred Leadership Style and Description of How the Style Assisted in their Success The VP for Nursing, VBM, was honest in disclosing that her preferred leadership style was the autocratic or authoritarian (Leadership-Toolbox.com, 2008). Being in the position that reports directly to the CEO, the position was preferred because, according to VBM, it provides her with the authority to make crucial decisions where complete control of the situation is imminent. Likewise, it focuses on the accomplishment of tasks and endeavors that are relevant in patient care. As such, VBM was noted to indicate that this style is instrumental in achieving the identified goals of the Nursing Department and therefore, reflects either positively or negatively on her performance according to standards that were explicitly set. For the Department Manager, MMC, the preferred leadersh ip style is the democratic style or one which focuses on people; as opposed to tasks (Leadership-Toolbox.com, 2008). ... es through ensuring that her subordinates were effectively motivated to communicate all relevant concerns regarding the department, which inevitably helps in problem solving and decision making at her level. Finally, for EFP, the Nurse Manager, the style that was relayed falls under the servant leadership style. This style was described as â€Å"focuses primarily on the growth and well-being of people and the communities to which they belong. While traditional leadership generally involves the accumulation and exercise of power by one at the â€Å"top of the pyramid,† servant leadership is different. The servant-leader shares power, puts the needs of others first and helps people develop and perform as highly as possible† (Robert K. Greenleaf Center for Servant Leadership, n.d., par. 5). As revealed, she has the tendency to put her subordinates’ interests first, especially in terms of addressing the needs of the patients. This style was deemed helpful in the lead er’s success through generating positive responses from the clients (patients) and creating a conducive and productive working environment that is instrumental in achieving customer satisfaction and manifesting high quality of patient care. Explanation on the Rationale for Choosing Each Individual Leader The three leaders, in their respective roles and positions, were selected to be interviewed for the reason that each of them exhibit a different leadership style. One therefore evaluated that the leadership style was preferred to be applied depending on factors which included the situation at hand (the goals to be achieved), as well as the personalities of the subordinates. In addition, it is also affirmed that the personalities of the leaders contribute to the selected leadership style and one that is being

Tuesday, October 8, 2019

Apple Case study (Strategic brand Management assignment) Essay

Apple Case study (Strategic brand Management assignment) - Essay Example At a garage in Los Altos, California, this team came up with a computer circuit board which they named Apple. Several months later they had come up with around 200 units, over and above bringing on board another partner A.C Markkula Jr. who played a big role towards creating a center of attention in the market as the experienced businessman in the team. Job succeeded in bringing user friendly computer into the market, and Apple II was released in April 1978. It made Apple an industry leader with sales shooting up to 100,000 by the end of 1980. In December the same year, it was launched as a successful IPO. D OGrady, 2009 argues that, Apple has a long history of competitive advantages, since its launch in 1980. Its desktop market was driven due to its superior software like Adobe PageMaker and peripherals like laser printers. Moreover, it has thrived in the education sector by seizing more than half the market, over and above, being one of the most profitable PC company globally. It was in a position to give its customers a complete desktop solution that included hardware, soft ware and peripherals that allowed them to work with the computer in an easier way as plugging and playing. It stood up in the market for having designed products from scratch and the use of unique chips, disk drives and monitors. Additionally, loyal customers for the Macintosh gave permission to the Apple company to sell its products at a best price. Consequently, it paid up for more research to be done, where more invention emerged in respect to the market demand. It is evident that Apple had the first usable personal computing devices. It was brought in by IBM in 1980, and by early 1990 a new standard by the name Wintel dominated the industry. Several manufactures such as Dell Computers built PCs around standard building block from Microsoft and Intel. Growth was driven by lower prices and expanding

Monday, October 7, 2019

Introduction to Business Law Essay Example | Topics and Well Written Essays - 2500 words

Introduction to Business Law - Essay Example Such contracts may get accepted since they provide immense benefits for the company. However, there may be certain circumstances under which such contracts may not be valid especially if the company does not reach into formal incorporation and the individual who has entered into such contracts (usually the promoter) would be held liable for the contract. The promoter is a person who would perform the various activities on behalf of the company even before it has been incorporated and in this way is an agent of the company. He would make several leases and contracts for the company such that the company can be incorporated are able to start off with its required functions that may arise from its objectives. Hence, supposing the company fails to get incorporated or if the shareholders do not accept the contracts, then the promoter may be personally held liable for all the pre-incorporated contracts (National Paralegal College 2003). The problem is actually more serious when the promote r is dealing with a party who may be interested in starting their own company and the promoter is an implied agent for a non-existing birth upcoming company. Hence, the position of the promoter is said to be ambiguous (Singh 2011). On the other hand, contracts are utmost needed for parties to legally be obliged into providing services or goods for a company to be formed. Contracts may be formed at different stages before pre-incorporation and without the presence of pre-incorporation contracts; the company would not be able to come into existence (University of London 2007 p. 43). In several instances, the legal question has been asked whether it is possible for a company to enter into a legally enforceable contract even before it comes into existence. Hence during the period of promotion of the company, the promoters may act as agents (make decisions on behalf of the company), and their role would end once they appoint the board of directors for the company. According to common law s, pre-incorporation contracts would not oblige a company. Once the promoter incorporates the company and appoints the board of directors, he has to hand over all matters to the board of directors, including the contracts that were made during pre-incorporation. The board of directors may accept these contracts or reject it which in turn would hold the promoter personally liable and not the company. Basically there are three types of contracts that may be entered into including pre-incorporation contracts, residuary contracts and provisional contracts (Expedite 2010 p. 10.7). In this paper, the stand of the promoter would be assessed with regards to the pre-incorporation contracts based on the statutory provisions (such as Section 36C of the Companies Act 1985, section 51 of the Companies Act 2006 & Article 7 of the First Directive of the EEC1) and common laws (such as Kelner vs. Baxter2 and Phonogram vs. Lane3). Since the liability on the promoter is very high, recommendations woul d be made that the promoters can implement in order to reduce or avoid liability with the pre-incorporation contracts. Common laws on pre-incorporation contracts One of the leading and initial cases regarding pre-incorporation contracts was Kelner vs. Baxter4 held before the Court of Common Pleas in England. In this case, there were a group of promoters who had created a contract with other parties for a company