Thursday, December 26, 2019

Character Analysis Of Hamlet - 1065 Words

In this essay I will be explaining where and when Hamlet talks about certain characters, to help explain how he thinks about them (ex: King Hamlet, Claudius, and Gertrude). This essay will help to explain Hamlet as well as his thought process throughout the book (story). In Act 1, Scene 2 (Gertrude) (Lines 141-145) Quote â€Å"That he might not beteem the winds of heaven Visit her face too roughly.—Heaven and earth, Must I remember?† In this first part from line 141 to 143 Hamlet says â€Å"Oh God, do I have to remember that? She would hang on to him, and the more she was with him the more she wanted to be with him; she couldn’t get enough of him.† Hamlet talks about his mother and how she had only mourned the death of his father (King Hamlet) for†¦show more content†¦It is not nor it cannot come to good, But break, my heart, for I must hold my tongue.† He says that his mother was too quick to remarry. He states thatâ€Å"Less than a month after my father’s death, even before the tears on her cheeks had dried, she remarried. Oh, so quick to jump into a bed of incest! That’s not good, and no good can come of it either. But my heart must break in silence, since I can’t mention my feelings aloud.† In summary he really disapproves about how quickly his mother moved on from the death of his father. And he doesn t think he should come out about it because he says â€Å"But my heart must break in silence, since I can’t mention my feelings aloud.† Hamlet is broken into pieces by the past and present events that have taken place in his life. In Act 1, Scene 5 (King Hamlet) (Lines 93-98) Quote â€Å"O all you host of heaven! O earth! What else? And shall I couple hell? Oh, fie! Hold, hold, my heart, And you, my sinews, grow not instant old, But bear me stiffly up. Remember thee! Ay, thou poor ghost, whiles memory holds a seat In this distracted globe. Remember thee!† In Lines 93 t o 98 Hamlet says that â€Å"Ah, all you up in heaven! And earth! What else? Shall I include hell as well? Damn it! Keep beating, my heart, and muscles, don’t grow old yet—keep me standing.† In the text Hamlet is talking about his father who gave Hamlet a message as ghost about how he was betrayed by Claudius. Hamlet is talking about how he will remember hisShow MoreRelatedHamlet Character Analysis961 Words   |  4 PagesWhen one reads William Shakespeare’s Hamlet, it is easy to overlook the female characters as powerless and subservient. However, things are not always what they seem at first glance, as a further analysis of Gertrude and Ophelia suggests. Although the plot centers around Hamlet’s quest for revenge, these two female characters have a profound influence on what transpires. These women certainly play more significant roles than they seem at first. In Act I, Gertrude appears to be an unfaithful wifeRead MoreHamlet Character Analysis2058 Words   |  9 PagesWilliam Shakespeare. The play is a drama that includes a love story, betrayal, and a tragic ending. During the time Hamlet was written, the population of England loved watching the hard ache of others and they epically loved murder and gore. Luckily for Shakespeare, todays current population loves watching and reading about the same things which kept most of his work around. The play Hamlet is the story of a young price that lost his father to a murderer who happens to be his uncle, Claudius. ClaudiusRead MoreCharacter Analysis Of Hamlet In Hamlet730 Words   |  3 PagesHamlet is a character of melancholy because he is a very sad individual finding out that his very own uncle has killed his father. He is wanting to commit suicide but he’s contemplating it because it is a sin. He is not to fond of Claudius considering he was the one that had killed his father in th e first place. â€Å"O most wicked speed, to post/ With such dexterity to incestuous sheets!/ It is not nor it cannot come to good/ But break my heart, for I must hold my tongue† This quote is showing how heRead MoreCharacter Analysis of Gertrude in Hamlet902 Words   |  4 PagesGertrude: Character Analysis Introduction There is no doubt in saying that Hamlet is counted as one of the famous play of English language (Thompson and Taylor 74). It was written in 1601 by Shakespeare and was performed at The Globe Theatre. This essay will evaluate role of Gertrude, mother of Prince Hamlet who is the title character of the play. The purpose of this essay is to analyze the character of Gertrude and find out if she was really disloyal to her husband late King Hamlet and responsibleRead MoreHamlet Character Analysis918 Words   |  4 PagesIn the play Hamlet, Shakespeare raises the question regarding deception and the differences between â€Å"seeming† and â€Å"being†. Each character is trying to decipher what each other are truly thinking, contrary to what they are pretending to think. Shakespeare sets Hamlet up to illustrate the complexity of how one must deceive others to reveal the truth.  ¬Ã‚ ¬The coexistence of appearances and reality develops as the Danish court gets engulfed in a we b of corruption, lies and deception. Through how ShakespeareRead MoreHamlet Character Analysis729 Words   |  3 PagesWill Hamlet accept the new changes in his life? What is he capable of to be happy? After his father’s death, Hamlet will have to face the new changes in his hometown, Denmark. Shakespeare develops Hamlet’s character in relation to other characters in these soliloquies. Shakespeare develops Hamlet’s character in relation to the ghost of king Hamlet. To start the ghost says, â€Å"I am thy father’s spirit†(Shakespeare 60). King Hamlet’s ghost had appeared in Hamlet’s life after his death. At first HamletRead MoreHamlet Character Analysis Essay1014 Words   |  5 PagesNicole Ventzke Crystal Jensen 1102 T/H 2/14/11 Hamlet Character Analysis: Hamlet One aspect that makes William Shakespeare’s Hamlet alluring is how he broke the limiting mold of the one-dimensional character by representing characters in all of their human complexity. Hamlet, for example, is a compelling character because he is complicated. As Hamlet himself observes early in the play in, â€Å"Tis not alone my inky cloak/nor customary suits of solemn black, /Nor†¦forced breath/No, nor the fruitfulRead MoreAn Analysis of the Characters in Hamlet Essay1592 Words   |  7 PagesAn Analysis of the Characters in Hamlet Hamlet by William Shakespeare has been considered by many critics as one of the best plays in English literature. It has also been considered as one of the best tragedies among the many Shakespeare wrote. It is a story which revolves around this person called Hamlet, prince of Denmark. It is set in the Elizabethan times in the 16th century. It is a tragedy because it results in the deaths of many characters either accidentallyRead MoreHamlet Character Analysis1502 Words   |  7 PagesWritten by William Shakespeare, Hamlet has a strong relationship with the authors society and era, being the late 1500’s to early 1600’s. Hamlet, a character is confliction with his society, shows different views and actions to his fellow Danish men. Shakespeare could create a character whom through Hamlet’s life choices, his own historical and cultural context and the state of Hamlet being in confliction with the Elizabethan-era and Nihilism showed immense differences from his society, which ShakespeareRead MoreHamlet Character Analysis816 Words   |  4 PagesHamlet is dealt circumstances in life that are not only unfair, but also that he has no control over. Hamlet’s father was murdered by his uncle, his mother quickly remarried to his murderous uncle, and his life is in complete shambles by any measurement. Hamlet is dealt some of the most difficult circumsta nces imaginable, and has no real ability to change the circumstances that he must deal with. Hamlet has no choice but to live in a world that he did not create for himself which is entirely unfair

Tuesday, December 17, 2019

Maintaining Dominant Systems Of Sexuality - 2028 Words

Normal is constantly used to oppress and silence those who do not fit under this definition constructed by institutional forces within society. These institutions have been created to serve as building blocks for society, to guide the public. Originally, these institutions were started to protect and create order, but in today’s world, they provide no protection. However, if an individual does not fit within the system’s socially constructed idea they are objectified for being â€Å"different†. This is especially clear when it comes to sexuality. If society were to denaturalize gender and sexuality, then there would be a way to look at everyone as unique, that â€Å"normal† does not exist because everything is historically and socially constructed.†¦show more content†¦This idea of the average American family, does not accurately depict our society. With the image of this ideal household, this sets a standard that may be impossible for some, due t o their race, gender, class, sexuality, etc. Heterosexuality is never questioned or threaten within society because it is normal. Not only is it a political institution, but it is contributing to the constructions of the gender binary. In Compulsory Heterosexuality, the concept of becoming a mother is brought the reader’s attention. Women are emotionally available and caring towards others so, they make for great mothers. There are plenty of women who choose not to be mothers, does this make them any less of a women because they do not fall under the definition of the female binary. On page 637 of Compulsory Heterosexuality the author writes, â€Å"I am suggesting that heterosexuality, like motherhood, needs to be recognized and studied as a political institution-even, or especially by those individuals who feel they are, in their personal experience, the precursors of a new relation between the sexes.† Now, the gender binary, family gives society the impression that t he men have to be hard working and to provide for his family. While the women are expected to take care of everything else and take care of the

Monday, December 9, 2019

Storage And Computation In Cloud Computing â€Myassignmenthelp.Com

Question: Discuss About The Storage And Computation In Cloud Computing? Answer: Introducation A recognized and renowned regional retailer of Australia is the Webbs Stores. The main business of this company is to sell food items. It also sells some of the specialty stuffs. The company has two original data centers (Arora, Parashar Transforming, 2013). They are in Sydney and Melbourne. Apart from these two main data centers, the company even has some of the regional data centers in Brisbane, Bathurst, Port Macquarie, Auckland and Wagga. Recently, they have decided to move their database from MS SQL Server 2012 R2 to IaaS instance. Webbs Stores have taken a decision of undertaking cloud computing for their business. The problem with this decision is that the data management, the operational and application complexities have become much complicated and they are not able to handle them. They have even decided to close down the regional data center in Auckland because of its traditional infrastructure (Avram, 2014). They could have easily replaced or updated its existing infrastru cture. All the services and the important data are shifted to the cloud database. A Risk and Security Workshop is planned to run for accessing the security risks, threats and the possible control methods, which are need for a hybrid cloud. The following report covers a detailed discussion on the Webbs Stores case study. The report also briefs about the benefits of data migration to cloud IaaS infrastructure. The threats of data migration to cloud are also provided in the report. The report even describes the use of cloud in case of removal and backup of the records. The report further helps to understand how to protect and control the access to the data and services for migration of data. Proper suggestions and recommendations are given in the following report. Type of Security Deployed Webbs Stores have decided to move their database from MS SQL Server 2012 R2 to IaaS instance. They are worried about the security of their data and services. The type of security policy that should be deployed is the authentication and authorization policy (Dinh et al., 2013). Authorization is the permission given to a particular organization or individual for performing a task or job. Authentication is the process of verification of the identity of an individual, who will be performing a task. This security policy is extremely important in case of cloud computing as it provides permission and sanctions the activity to be performed. The open normative format of data, used for authentication purpose in cloud is the SAML or Security Assertion Markup Language (Garg, Versteeg Buyya, 2013). Webbs stores is moving their data to IaaS instance. The best IaaS instances the Microsoft Azure and AWS. The data moved to cloud is bulk in quantity. This type of policy would be helpful for them for protection of their data and services during migration. Benefits and Issues of Deployment The type of data security policy Webb should take is the authentication and authorization. Various advantages will be obtained by them due to this deployment. The benefits are as follows: i) Security: The first and the foremost thing that comes in mind during data migration is the security. Cloud computing provides excess security for transferring data (Fernando, Loke Rahayu, 2013). Moreover, authorization and authentication policy enables only the sanctioned and authorized users for accessing data or service. ii) Cost Effective: Cloud computing is extremely cost effective and does not incur much cost. This type of policy can be easily maintained with lower price. iii) Flexibility: This is again an important benefit that can be obtained by this security policy (Rahimi et al., 2014). The whole system turns out to be flexible after deployment. iv) Scalability: Authentication and authorization makes the database extremely scalable. The advantages of this security policy do make it popular enough to be accepted by several organizations (Arora, Parashar Transforming, 2013). However, it does have few disadvantages. The problems that can be faced after the deployment are as follows: i) Encryption: Encoding any message is a must for authentication and authorization policy. This can be an issue as there always exists a chance of losing the encryption key. ii) Complexity: this is another issue that is normally faced after deployment of this policy (Malawski et al., 2015). The implementation of this policy is complex in nature. iii) Brute Force Attacks: The most common attack that is faced due to this type of policy is the brute force attack. The hacker or intruder gets the password by a software and is able to get all the data. iv) Storage: The storage of usernames and passwords are hacked easily, the moment they are authenticated. Security risks are extremely common for migration of data. Webbs Stores will be migrating the data and services to cloud from MS SQL Server R2 database to IaaS instance (Botta et al., 2016). This new database can have various risks. The threats that are common for database are as follows: i) Loss of Data: This is the most significant threat for migration of data. The data can be lost when it is transferred to another database (Li et al., 2013). Moreover, there is a chance that the data cannot be recovered, which is extremely harmful for the company. ii) Database Corruption: This is the second most significant risk during data migration. The entire database can get corrupted and cannot be recovered. The IaaS Infrastructure Threats and risks are also common for the infrastructure of the cloud, which is the IaaS. The threats are as follows: i) Denial of Service Attacks: This is the most significant threat that occurs in the infrastructure during data migration. When a user uses the resources of the cloud, the overall quality of the services that are used by other users, gets degraded (Almorsy, Grundy Mller, 2016). The intruders utilize this opportunity and get all the resources for denying or slowing down the services. The attack is known as the denial of service or DoS attack. ii) Insider Threats: During migration of data, the infrastructure enables the administrator for accessing the data and the database. This type of risk is known as the insider threat. The Communications The communications between the IaaS instance and Webbs Stores can attract various threats and risks. The risks are as follows: i) Breaching of Data: Breaching of data is extremely common when migration is done (Li et al., 2013). The moment IaaS and Webbs Stores communicates with each other, this type of risk occurs. ii) Incompatible Database: The second most significant threat is the incompatibility of database. It must be compatible to avoid all types of threats while communication. Risks with Backup of Data i) Backup: Periodical backup is extremely needed for any company. Although, there are some risks that are common during the backup of data (Malawski et al., 2015). The risks are as follows: Security: Lack of security can be vulnerable during backup of data. Often data is lost during this backup. Control over Data: During backup of data, the cloud provider obtains the total control and access of the data. There is always a chance that the data can be intercepted. ii) Storing of Data: Data is normally stored in the cloud storage. Webbs stores might face various threats during this storage of data (Xiao, Song Chen, 2013). They are as follows: Security: Security is the most significant threat during data storing. Often data is lost during this phenomenon. Lack of Standardization: The cloud vendor never follow a normal set of protocols or rules for supporting their business (Xiao, Song Chen, 2013). The selection of the vendors should be done carefully by Webbs Stores. iii) Data Retrieval: Several risks are even common during retrieval of data. They are as follows: Snooping: The intruder can always snoop into the data, the moment it is retrieved from the cloud (Almorsy, Grundy Mller, 2016). This is extremely dangerous for confidential data. Leakage of Data: Leakage of data is the most significant risk during data retrieval. Webbs Stores should be careful during their retrieval especially because they are using public cloud. Cloud Backup in DR Plans Cloud DR Plan or disaster recovery is a strategy for any type of backup and recovery of data that is utilized for storing and maintaining of records (Whaiduzzaman et al., 2014). These are stored for security issues. The most important task is done by the cloud backup. The DR plan will simplify the overall procedure of data migration. Only the storage is needed to be transferred. This will in case migrate the entire the data with that particular storage (Xiao, Song Chen, 2013). The benefit that Webbs Stores will be getting is that the entire data will have a copy that is sent to the offsite server by a public network. The major benefit of backup and restore strategy is the easy and simple backing up of data. The whole system of the database of Webbs Stores will be altered with this strategy (Rahimi et al., 2014). The second benefit is that if any data is lost during migration, it can be quickly and easily recovered. Therefore, the cloud recovery plan is extremely helpful for Webbs Stores. Protection of Access and Recommendations Access is the most important security factor. Everyone should not have the access to all the data and services. The authorized and authenticated users should be allowed to access the data and services of Webbs Stores. IaaS Infrastructure The IaaS infrastructure should not be accessed by everyone. Two significant methods are mentioned below for protection of access to the IaaS infrastructure. They are as follows: i) Physical Access to Infrastructure: The physical access should be protected and secured so that there exists no loopholes in the security (Wei et al., 2014). This will prevent the unauthorized users to access the infrastructure and thus it can be protected. ii) Access via API: Unauthorized use of API should be stopped and mitigated for Webbs Stores (Sanaei et al., 2014). It is recommended that they should check and stop this type of access on an immediate basis. MS SQL Server 2012 R2 Cloud Instance The overall access to the previous database, which is the MS SQL Server 2012 R2 can be protected by some methods (Rahimi et al., 2014). Two suggested methods are as follows: i) Physical Access: The physical access should be protected and secured so that there exists no loopholes in the security of the components of hardware and server. ii) Operating system Access: Webbs Stores should be strict about their access to the operating system (Rittinghouse Ransome, 2016). Firewalls might protect their operating system easily. Cloud Network Infrastructure Webbs Stores should protect and control their access to the cloud network infrastructure. Two recommendations are provided for controlling the access to the cloud network infrastructure. They are as follows: i) External and Internal Threats: Cloud network infrastructure always have the risk from external and internal threats (Sanaei et al., 2014). Webbs stores should be careful about their security of cloud network infrastructure. ii) Server Monitoring: Webbs Stores should monitor their server regularly so that the access is controlled (Tao et al., 2014). This can protect the access of the cloud network infrastructure. Cloud Backup and Restore Infrastructure Webbs Stores should protect and control the access of the backup and restoration infrastructure. Two suggestions that can help Webbs Stores in this phenomenon are as follows: i) Encryption: Encryption is the procedure of hiding a confidential data or information in such a way so that it does not get stolen by intruder (Hashem et al., 2015). It encrypts the data into a cipher text and only the authorized receiver is able to access that data. Webbs Stores should opt for encryption for protection of access to the backup and restore infrastructure. ii) Passwords: Passwords can protect any system from hackers and intruders. Webbs Stores should protect their cloud backup and restore infrastructure by applying password protection to it (Botta et al., 2016). It is recommended that the password should be biometric authenticated. The above mentioned recommendations will be extremely helpful for the Board of Webbs Stores for migration of data. Conclusion Therefore, from the above report it can concluded that, a recognized and renowned regional retailer of Australia is the Webbs Stores. The main business of this company is to sell food items. It also sells some of the specialty stuffs. The company has two original data centers. They are in Sydney and Melbourne. Apart from these two main data centers, the company even has some of the regional data centers in Brisbane, Bathurst, Port Macquarie, Auckland and Wagga. Recently, they have decided to move their database from MS SQL Server 2012 R2 to IaaS instance. Webbs Stores have taken a decision of undertaking cloud computing for their business. The problem with this decision is that the data management, the operational and application complexities have become much complicated and they are not able to handle them. They have even decided to close down the regional data center in Auckland because of its traditional infrastructure. They could have easily replaced or updated its existing infra structure. All the services and the important data are shifted to the cloud database. A Risk and Security Workshop is planned to run for accessing the security risks, threats and the possible control methods, which are need for a hybrid cloud. The above report covers a detailed discussion on the Webbs Stores case study. The report also briefs about the benefits of data migration to cloud IaaS infrastructure. The type of security policy that should be deployed is the authentication and authorization policy. The various threats of data migration to cloud are also provided in the report. The report even describes the use of cloud in case of removal and backup of the records. The report further helps to understand how to protect and control the access to the data and services for migration of data. Proper suggestions and recommendations are given in the following report. Migration of data from MS SQL Server R2 database to any IaaS instance would be extremely helpful for the company. References Almorsy, M., Grundy, J., Mller, I. (2016). An analysis of the cloud computing security problem.arXiv preprint arXiv:1609.01107. Arora, R., Parashar, A., Transforming, C. C. I. (2013). Secure user data in cloud computing using encryption algorithms.International journal of engineering research and applications,3(4), 1922-1926. Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an enterprise perspective.Procedia Technology,12, 529-534. Botta, A., De Donato, W., Persico, V., Pescap, A. (2016). Integration of cloud computing and internet of things: a survey.Future Generation Computer Systems,56, 684-700. Dinh, H. T., Lee, C., Niyato, D., Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches.Wireless communications and mobile computing,13(18), 1587-1611. Fernando, N., Loke, S. W., Rahayu, W. (2013). Mobile cloud computing: A survey.Future generation computer systems,29(1), 84-106. Garg, S. K., Versteeg, S., Buyya, R. (2013). A framework for ranking of cloud computing services.Future Generation Computer Systems,29(4), 1012-1023. Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., Khan, S. U. (2015). The rise of big data on cloud computing: Review and open research issues.Information Systems,47, 98-115. Hashizume, K., Rosado, D. G., Fernndez-Medina, E., Fernandez, E. B. (2013). An analysis of security issues for cloud computing.Journal of Internet Services and Applications,4(1), 5. Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption.IEEE transactions on parallel and distributed systems,24(1), 131-143. Malawski, M., Juve, G., Deelman, E., Nabrzyski, J. (2015). Algorithms for cost-and deadline-constrained provisioning for scientific workflow ensembles in IaaS clouds.Future Generation Computer Systems,48, 1-18. Rahimi, M. R., Ren, J., Liu, C. H., Vasilakos, A. V., Venkatasubramanian, N. (2014). Mobile cloud computing: A survey, state of art and future directions.Mobile Networks and Applications,19(2), 133-143. RittinghouType of Security Deployedent, and security. CRC press. Sanaei, Z., Abolfazli, S., Gani, A., Buyya, R. (2014). Heterogeneity in mobile cloud computing: taxonomy and open challenges.IEEE Communications Surveys Tutorials,16(1), 369-392. Tao, F., Cheng, Y., Da Xu, L., Zhang, L., Li, B. H. (2014). CCIoT-CMfg: cloud computing and internet of things-based cloud manufacturing service system.IEEE Transactions on Industrial Informatics,10(2), 1435-1442. Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing.Information Sciences,258, 371-386. Whaiduzzaman, M., Sookhak, M., Gani, A., Buyya, R. (2014). A survey on vehicular cloud computing.Journal of Network and Computer Applications,40, 325-344. Xiao, Z., Song, W., Chen, Q. (2013). Dynamic resource allocation using virtual machines for cloud computing environment.IEEE transactions on parallel and distributed systems,24(6), 11

Monday, December 2, 2019

Saffola Repositiong Essay Example

Saffola Repositiong Essay To analyze how successful was Saffola in repositioning itself from being a â€Å"Curative† Brand to â€Å"Preventive† brand. Case Synopsis For the past few years Marico has been rolling out many new products under the Saffola banner which are all targeted at the health conscious consumers. While edible oil remains Saffola’s flagship product they have diversified into other new products such as Saffola oats, Saffola Muesli and Saffola rice as well. Saffola’s perception a decade ago was that it was more of a curative health rather than a preventive health brand.It was almost like an addition to a doctor’s prescription. The heart patient was advised to shift to Saffola (which is KARDI OIL with high PUFA and low saturated fats). Though it had a stranglehold on this segment of edible oil market, Saffola realized that the curative health (almost a negative health) market is limited in size and scope. The brand positioning also limited its choice of extens ions in to other food categories. Saffola has understood that preventive health market is much bigger market and is trying to re position itself accordingly.It has created an emotional connect with the target consumers by portraying itself as â€Å"Conducive for heart† oil, rather than oil for heart patients. Initiatives by Saffola to re-position itself as a preventive healthcare: * Saffola has come up with a â€Å"‘Heart Age Finder tool† and raises awareness about the fact that, we often forget the one who is the most important to us our heart. * Saffola gifted readers in Mumbai, Delhi and Bangalore a free copy of the Times of India for their heart with advertisements portraying ways to take care of the heart. September 28 being the World Heart Day, Saffola came up with the out of the box solution. They created silence in the air waves of all the radio station and thus portraying the silence with which our heart functions despite taking the entire toll of our strenuous life. Market segments The consumers can be broadly segmented in to the following categories for this study: 1. Consumers of Health brands – in edible oils, mainly refined oils a. Consumers of Saffola b. Consumers of other brands 2. Consumers of un-refined oils ( e. g. Dhara ground nut oil) Research objectiveOur proposition is to conduct a primary research among branded edible oil consumers in order to figure out the following: * Factors which motivate people to buy Edible oil. * The awareness about nutritional values of various edible oil brands / types. * Awareness of various edible oil brands and its â€Å"health perception† among the consumers. If someone is not aware of Sundrop, he or she may not have any perception of its healthy / unhealthy qualities. * The brand perception Saffola oil among people who are aware about Saffola. * Awareness of saffola’s repositioning – among old users.Research Methodology * Based on the research objectives m entioned we have identifies specific factors that would help analyse the objectives and have prepared a questionnaire to enable a study on the said factors. * We are going to go to multi brand retail shops like big bazaar (pimpri chinchwad, sb road, Kalyani Nagar) D-Mart in the city of Pune to get consumers to fill out the questionnaire. * Our target for research is saffola customers and more specifically women. * Having collected the data we will put it through statistical tests to draw conclusions. QUESTIOANNAIRE Gender: MaleFemaleAge:Below 25 25 – 35 35 – 45 45-55 55-65 65-75 Above 75 Marital Status: Married Unmarried 1) Do you believe the type of oil affects the health? Yes No Not Sure 2) Which of the following oil types are you aware about? Underline the one that you buy. * Sunflower * Rice Bran oil * Olive oil * Coconut * Ground nut * Other Please specify if other 3) If you know about the following terms (pertinent to oil consumption) tick yes? * Good Cholesterol * Bad cholesterol * PUFA * MUFA 4) Are you aware about the following brands? * Saffola * Fortune * Sundrop * Sunflower * Others Please specify if other ) Rate the importance of the following factors while purchasing oil? | Irrelevant| Not so important| Important| Very Important| Critical| Price| | | | | | Saturated Fat Content| | | | | | Flavour ( ex Coconut oil, olive, garlic etc)| | | | | | Packaging (convenience, look etc) | | | | | | Availability of the product| | | | | | Package size| | | | | | Advertisement| | | | | | 6) Do you believe Saffola is a health brand? YesNo Not Sure 7) Do you feel that Saffola is justly priced? Yes No Not Sure 8) Which of the following Saffola campaigns are you aware about? * Dil toh bacha hai ji Age of your heart * World Heart Day * Neither 9) How long have you been using safolla? * Less than 1 year * 1 – 3 years * 3 5 years * 5 – 8 years * 8 – 11 years * 11 years and above 10) Which of the following are reasons for the shift ? * Health of near and dear ones * Instruction by dieticians/Local gyms * Doctors * Advertisements * Health Blogs * Others 11) Which of the following Saffola products (other than edible oil) are you aware about? * Oats * Rice * Wheat * Musseli 12) On a scale of 1 to 5, how likely are you to recommend saffola to someone? (1 being the lowest and 5 being the highest)