All Samples

Below you will find links to a selection of pieces completed by our writers. Please note that these papers were written over a period of several years and therefore contain information that may not be current. If you wish to use material from any of our samples, please ensure that you quote and reference anything you copy.

Report

Strategic Analysis of Bloomberg: SWOT, PESTEL, Porter’s 5 Forces & Value Chain

VIEW THIS SAMPLE

Proposal

The Impact of Economic Recession on Customer Loyalty to Bank

VIEW THIS SAMPLE

Dissertation

The Impact of Economic Recession on Customer Loyalty to Bank

VIEW THIS SAMPLE
Anti-Friction Bearing Systems for Jet Engines
Abstract This paper presents an overview of anti-friction bearing technology for jet engines with an insight into the physics involved in bearing operations. Major issues affecting the lubricant performance have been discussed. Also presented is a quantitative assessment of parameters, viscosity, temperature and pressure, affecting system performance. Several methods to predict the performance of tribological[...]
VIEW THIS SAMPLE
The Syrian Crisis: Deterrence or Coercive Diplomacy?
The Obama administration has generally been reluctant to involve itself in the brutal Syrian civil war, at least overtly. However, following allegations that forces loyal to President Bashar Assad employed chemical weapons in Ghouta, killing anywhere between 300 and 1700 people, President Obama has come under pressure to act on his red line. Limited surgical[...]
VIEW THIS SAMPLE
Discuss the role of the stem cell microenvironment in neurogenesis with reference to microglia
Neurogenesis is the generation of neurons from neural progenitor/stem cells. Until the 1960s it was believed that the nervous system was incapable of regeneration (Cajal, 1928) and that neurogenesis was limited to pre-natal development. Evidence that neurogenesis is, in fact, a life-long process was provided in 1965 by Joseph Altman’s discovery of proliferating cells in[...]
VIEW THIS SAMPLE
Qualitative research: a precursor to science. Discuss.
Introduction Qualitative research is that form of research which seeks to ‘understand and represent other people’s experiences’ (Elliott, Fischer & Rennie, 1999) by gathering and analysing non-numeric data and includes methods such as interviews, focus groups and participant observation. In response to the question, I contend that there are three possible interpretations: a) that qualitative[...]
VIEW THIS SAMPLE
Sports Biomechanics Literature Review – The relationship between the X-Factor and golfing performance
During a game of golf, every shot from the tee or from the fairway comprises both a backswing phase and a downswing phase of the golf swing (Joyce, Burnett and Ball, 2010). The main aim of the golfer is to displace the ball the optimum distance and direction to achieve success (Chu, Sell and Lephart,[...]
VIEW THIS SAMPLE
How glutathione acts to protect mammalian organisms from potentially toxic exogenous and endogenous compounds
Structure and Role in Detoxification One of the fundamental molecules mammalian organisms exploit at the cellular level to protect against potentially toxic exogenous and endogenous compounds is glutathione (γ- glutamyl-cysteinyl-glycine, or GSH). It is an abundant tripeptide primarily concentrated in the liver at levels of 5mM or more, though it can be found in most[...]
VIEW THIS SAMPLE
Do you worry about your dissertation making the grade?
See how we can help you with our dissertation writing service
Find out more
Strategic Analysis of PepsiCo. Inc
SWOT analysis of PepsiCo Inc. v Strengths: PepsiCo brand has a strong presence all over the world. Their food, snacks and beverages are consumed 1 billion times a day in 200 countries. In 2011, three brands of PepsiCo grew to more than $1 billion in annual retail sales, expanding their billion dollar brand portfolio to[...]
VIEW THIS SAMPLE
The vital role that inositides and their components play in the regulation of cell events – The synthesis and metabolism of Phosphotidylinositol(3,5)bisphosphate
1.1 Phosphotidylinositol(3,5)bisphosphate: Synthesis and Metabolism In the year 1850, Joseph Scherer discovered inositol and determined its empirical formula by its isolation from Liebig’s extract of meat. Inositides consist of phosphotidyl-inositol (PtdIns), polyphosphoinositides (PPIns) which are a phosphorylated derivative of PtdIns and inositol polyphosphate(IP). These membrane and cellular components of inositides have been found to play[...]
VIEW THIS SAMPLE
Unresolved Endings – Shutter Island Barney’s Version
1.1 ABSTRACT In this essay, I will focus on the relationship between empathy and reader’s choice of ending. In order to do this I have chosen two narrative texts – Mordecai Richler’s Barney’s Version (1997) and Dennis Lehane’s Shutter Island (2003), both of which have open endings. “The most commonly nominated feature of narrative fiction[...]
VIEW THIS SAMPLE
A review of a Sybil attack in wireless sensor networks
In no more than 2000 words, write a literature review on Sybil attack in wireless sensor networks. All references must be consistent with the IEEE referencing style. Introduction: The increased growth in wireless sensor networks (WSNs) in both civilian and military communities has attracted wide attention [1-3]. Much of the attention has to do with[...]
VIEW THIS SAMPLE
Aetiological Agents in Occupational Asthma
Introduction Asthma is a chronic inflammatory lung disorder characterised by many symptoms of wheezing, cough and chest tightness and also many cells such as mast cells, T-lymphocytes and eosinophiles considered to have major role in initiation of inflammatory response, airway obstruction and mucous secretion.(1) Functionally the immune system is differentiated into antibodies and other cellular[...]
VIEW THIS SAMPLE
The globalisation of business – E-commerce companies
Introduction The Internet started as an internal communications link in 1974, to facilitate the transferring of military information and for research purposes, before being capitalised to a mass-customised information flow. The capability in transferring information to disparate sources using network topology with a front-end browser was envisioned for mass use. In October 1991 , the[...]
VIEW THIS SAMPLE
The Library of Birmingham Project Time Risk Assessment
(extract) ABSTRACT All projects, by their very nature, are subject to risk. The objective of the risk analysis and management process is to minimise the impact of negative events on the project plan whilst allowing the team to take maximum advantage of any opportunities which present themselves. The following report is a robust first stage[...]
VIEW THIS SAMPLE
Nintendo – Innovation Audit
Introduction This paper examines Nintendo Corporation, a Japanese multinational consumer electronics firm head quartered in Japan. The firm is considered as the largest video game company by revenue since it was founded approximately 125 years ago (1889). The name Nintendo can be roughly translated from Japanese to English as “leave luck to heaven” (Liao, 2010).[...]
VIEW THIS SAMPLE
A Focus on Alterity in Contemporary Cultural Production.
By the late 1940s and 1950s, Western nation-states started to see their hegemonic and monolithic conceptions of culture and geographical spaces being threatened. With the end of the World War II in 1945 and Europe’s processes of decolonisation, there was a massive displacement of people from the poorest areas of the globe to the “developing”[...]
VIEW THIS SAMPLE
“Keep My Memory Green”: Recycling in Dickens’ Ghost Stories
I would like to start by telling you a story. “It was a dark and stormy night, we sat by the calcined wall. And it was said to the Tale-Teller, ‘tell us a tale’. And the tale ran thus:… ‘It was a dark and stormy night, we sat by the calcined wall. And it was[...]
VIEW THIS SAMPLE
Critically evaluate the potential of stakeholder theory to contribute to our understanding of large-scale public service IT projects and their implementation.
1. Introduction Previous studies such as Gabberty and Thomas (2007) and Debrabander and Edstrom (1977) suggest that use of information systems adds value, brings productivity, improves performance, and results in enhancing the efficiency and performance of the organisation. Goulielmos (2002) argues that the use of information systems is one of the most important factors that[...]
VIEW THIS SAMPLE
Effective Debriefing Reports
One of the key components of leadership during critical and major incidents, is the ability to plan and facilitate effective pre-briefing and debriefing sessions (Laureate, 2010). These sessions are crucial to the ongoing incident for a number of reasons, including the fact that they are one of the few times within the incident that a[...]
VIEW THIS SAMPLE
An investigation of the causes of the August riots (2011)
This is an extract from my dissertation which explored whether the August Riots (2011) were the result of individual delinquencies in the British underclass or an angry response to an oppressive government. This section focuses on the particular social situation in which the riots occurred. It presents stereotypical views of individual delinquencies in an underclass[...]
VIEW THIS SAMPLE
Energy Homeostasis
It is a truism that energy cannot be created or destroyed. Therefore it is of interest both clinically and in terms of basic science that increased energy intake (food) in man is not invariably accompanied by commensurate increases in body mass (Jequier and Tappy, 1999). The apparent simplicity of the energy balance equation e.g. ,[...]
VIEW THIS SAMPLE
How are we to understand the contrast between the Overman and the Last Man?
In this essay I will analyse the characteristics of the Overman and the Last Man, as well as investigate what use Nietzsche had for illustrating these two personas. Through exposition of this dichotomy and by illustrating the contrast between the two, I will uncover the key differences. Moreover, I will identify the philosophical problems that[...]
VIEW THIS SAMPLE
The process of Bypass Transition
The growth of the boundary layer The bypass transition process can be deciphered by undertaking a study of the three main regions concerned with bypass transition [2]: 1) The buffeted laminar boundary layer 2) Region of intermittent turbulent spot formation 3) Fully turbulent boundary layer The buffeted laminar boundary layer has most of the characteristics[...]
VIEW THIS SAMPLE
Information Risk Treatment
Introduction Risk treatment is the process of selecting and implementing actions that are to be taken to address identified risks to information assets. The output of the risk matrix will determine the actions to be taken by way of risk treatment. As the elimination of risk is impracticable, the least expensive and most effective approach[...]
VIEW THIS SAMPLE
Compare and Contrast Leadership Styles
Introduction The essay compares and contrasts the leadership styles and management of two very different companies. The first organisation is Tesco Plc, which is one of the biggest retailers in UK and a highly profitable organisation. The second organisation which was chosen was the charity organisation British Red Cross. Interviews and observations were undertaken at[...]
VIEW THIS SAMPLE
Online Chat Messenger Email
+44 800 520 0055