Saturday, December 28, 2019

Summary Of Book The Poisonwood Bible - 1079 Words

Major Work Data Sheet Name: Noah Andrews Period 3 Part I Title: The Poisonwood Bible Author: Barbara Kingsolver Date of Original Publication: Kingsolver started writing it in 1993, it was published in 1998 by HarperCollins publishing company. Biographical information about the author: Barbara Kingsolver was born in 1955, and she grew up in the farmlands of Kentucky. She has lived all over the world, including destinations such as the Canary Islands, Mexico, and South America. She currently lives in southwest Virginia. She was named one of the most important writers of the 20th century by Writer s Digest. She also established the Bellwether prize for fiction, which helps new authors get recognized for their fantastic work. http://www.kingsolver.com/biography/ Genre(s) and characteristics of genre(s): Family Saga-a historical retelling of a family experience and struggle in the Congo. Historical Fiction-Kingsolver uses this genre to express the general feeling of guilt the Americans experience. Coming of age-As shown by the before and after attitudes of the Price daughters, all of them grow up, especially Adah, and perceive life from a more mature level when they arrive home. (except Rachel) Political Allegory-A general motif of American guilt from post-colonialism shows in all of the Price women, showing how Kingsolver uses the guilt to her advantage.

Friday, December 20, 2019

The Child s Emotional Tie - 850 Words

Attachment is having a strong bond with one or two people in their life. These individuals mean everything to them. They are the person they find consolation when they feel down. In addition, they feel secure, safe and excited to be around these individuals. For example, a mother is the first person that comes in contact with her child. According to Freud as cited in Berk (2012) the child’s emotional tie to the mother is the â€Å"foundation† for relationship later on in life. Therefore, the findings on early infant attachment and subsequent developments depends on the consistency of care and affection given to the infant determines the behavior of the child. For the past several years, the focus has been on the interaction between the parent and the infant and the effect it has on the developmental processes such as attachment, emotional regulation, temperament, and many more (Evans Porter, 2009). According to Erikson’s theory as mentioned in Gross (2011) that if care has been under constant nurture and sensitivity the child will develop a sense of hope and trust around his environment. Erikson’s psychosocial theory- basic trust versus mistrust can be linked to parent-child attachment (Berk 2012). For example, newborn to one year old establishes trust if nurture is properly provided by the primary caretaker. Otherwise, feelings of doubtfulness happens if affection is not provided. Furthermore, Pasco Belsky (2011) refers to attachment as a special bond between the child andShow MoreRelatedThe Principles, Sequences And Stages Of A Child s Growth And Development1284 Words   |  6 Pagesand stages of a child s growth and development. This includes Social development, Physical Development, Intellectual development and communication development. Physical development outlines the basic body changes which you begin to develop such as fine motor skills, which is like writing and so on. This also includes social development, where you w ill meet new people everyday and interact with them, and become more involved in the relationships you will share with others. Emotional development whereRead MoreCase Study on Processes in Pre-school Children Essay1674 Words   |  7 PagesDescription of Child In order to be a school age child or in middle childhood you first have to go through the preschool years. Jose was born in Salinas, CA in February 2009. He lives with his mother and dad and has two sisters. His mother doesn’t work right now so, he is most of the time with his mother while his dad works full time and only sees him before going to sleep. Both of his parents are Mexican descent and are a working class. For his age, he is the average size and has short hairRead MoreThe Social And Emotional Development Essay1108 Words   |  5 PagesAttachment relationship is important for both child and parents/caregiver to develop because of social and emotional need. A child’s emotional and social development has significant impact for the social function of a child throughout their lives, education, friendships and employment. Research show that a child with no social and emotional development are at very high risk of having poor relationships with peers, academic problems and can lead them into poor decision in life and crime. Many researchesRead MoreHuman Development : The Persepectives Of An Individual Narrative Can Provide An Overwhelming Sense Essay1544 Words   |  7 Pagessense During the prenatal stage my mother remained healthy throghout the summer pregnancy. I was born at an average birth weight of 8.0 pound with no complacations through assisted vaginal birth, even with the increased risk of being the second child. My healthy birthweight reflected my mothers diligince in healthy eating, avoidance of tetragens, and staying active throughout the pregnancy. According to Urie Bronfenbrenner’s theory of the ecological model every person is affected by a number ofRead MoreHow Does Attachment Influence The Social And Emotional Development Of The Child? Essay1378 Words   |  6 Pagesthe social and emotional development of the child? A child’s social and emotional development has significant implications for the social functioning of a child throughout their lives, in their education, friendships and employment. A child with poor or social and emotional development are at risk of experiencing poor relationships with peers, academic problems and can lead them into involvement in unsociable activities or crime. Research suggests the key to social and emotional development liesRead MoreChild Abuse and Maltreatment Is Not Limited to a Particular Age and Can Occur in the Infant, Toddler, Preschool, and School-Age Years. Choose One of the Four Age Groups (Infant, Toddler, Preschool, or School Age) and937 Words   |  4 PagesChild abuse is more than bruises and broken bones. While physical abuse might be the most visible, other types of abuse, such as emotional abuse and neglect, also leave deep, lasting scars. (Help guide.org). The earlier abused children get help, the greater chance they have to heal and break the cycle—rather than perpetuating it. There is a myth that only bad people abuse their children. (Help guide.org) But the fact is while it s easy to say that only bad people abuse their children, it s notRead MoreAdvertising And The Emotional Response Of Advertising989 Words   |  4 Pagesif they were follow ing a specific formula. In addition there were also some differences in how these companies decided to sell their product. The main aspect that can clearly be seen in each of these commercials from different companies, is the emotional response that advertisers are expecting to get out of viewers. However different these different products may be, there are some key similarities in the ads that the companies put out in order to sell the products. Most people that have any knowledgeRead MoreThe Role Of A Father954 Words   |  4 Pagesneeded love and support. Showering them with lots of cash does not necessarily indicate love and support. He should be ready to give them an ear, comfort them and spend quality time as well as quantity time with them. This is crucial in creating an emotional tie, a prerequisite for strong and healthy family relationship. The father therefore plays the role of loving and supporting his spouse and offspring. Camon extensively explored the effects of not having a fathers love and support on a child’s developmentRead MoreThe Emotional Link Of Attachment1661 Words   |  7 Pagesthroughout one’s life. It is defined as the â€Å"strong affectionate tie we have for special people in our lives that lead us to experience pleasure and joy when we interact with them and to be comforted by their nearness in times of stress† (Berk, 2011, p. 264). When an individual meets the child’s needs, an attachment begins to form. The primary caregiver, preferably the mother, is considered to be the initial secure base for the child. The emotional connection infants have towards their mother is what theoristRead MoreThe Social And Emotional State Of Good Tv Shows1243 Words   |  5 PagesMichelle Seiler 11-11-15 Child Development #10 Do you know what your kids are watching on TV these days? My topic is What is the social and emotional state of good TV shows vs bad TV shows. I think my topic is important because TV is very influnetly to children. There are many positive aspects of good TV shows. It can promote early reading, teach songs, and teach good values children need in life. The negative aspects of bad TV shows are that it can teach children bad language, violence, and inappropriate

Wednesday, December 11, 2019

Review Of Cloud Solutions And SDLC Approach My Assignment Help

Question: Review of Benefits and Disadvantages of Cloud Solutions and SDLC Approach? Answer: Introduction: The My Health Record has been the initiative by Commonwealth Government in Australia. It has been providing people with the integrated platform through online. This has helped in recording, viewing, modifying and handling the information regarding health issues. The project of My Health Record has been considering solutions to be cloud based. This has been required to be investigated. The report has discussed various non-functional requirements, review of benefits and disadvantages of cloud solutions and SDLC approach. The non-functional requirements: The cloud-based refers to the servers, resources and applications made available on demand of the users through online from the servers of the cloud computing providers. The non-functional requirements are the qualities expected to be possessed by a system. It also considers the constraints within which the system operates (Botta et al., 2016). Used to the FURPS+ acronym as the reference, the non-functional requirements have been sometimes called as the ilities. This is because it might end with the term ility like reliability, maintainability, availability and so on. Moving of My Health Record to cloud has various advantages like decreasing of capital costs, operating costs with increase in support for mobile and remote staffs. It also supports the infrastructure flexibility. As implemented appropriately, the cloud services could change the corporate view of My Health Records IT as center of cost to the competitive advantage. This would able to affect positively the top-line revenue. The project should assure that the provider of cloud service delivers the services that the company needs for running the business. This has been critical for effective migration of all the IT services to cloud. In order to ensure the proper choice, some attributes of the non-functional requirements are to be followed while evaluating the service provider (Buyya, Vecchiola Selvi, 2013). Usability: This has been different depending upon the identification of the clients. The clients might be the architects or developers, business rulers or the IT operations. In every case the company requires to consider the easy usage of the software. They must also consider how well the interfaces have been designed. The IT would be no longer secret in the company. Rather, the engaging systems have been out there for the external world. The effective designing of the systems become more significant than before. Reliability: The business-critical services have been very complicated. The business at many times could not afford to possess their services of IT going down due to an outrage impacting the business effectively. Missed calls, e-mails, unshared documents and delayed quotes could affect the top-line revue with the bottom-line costs (Toosi, Calheiros Buyya, 2014). The reliability has been concerned about decreasing the probability of the service outrage. The company should seek for the service providers that possess the least history of cloud outages. Performance: It deals with the method how well the cloud architecture has been suited for supporting the workloads deployed over it as the workloads increase. Security: One of the primary disadvantages to move to external cloud has been the poor security. As the service provider of cloud does not possess the necessary and proper security measures, the security gets compromised (Wei et al., 2014). Hence, the cloud providers should be searched for who acquires multi-factor authentication created in their service along with full encryption at-rest and in-transit for content. Here, the policies of centralized security to control the local or remote servers have also been important. As the software interfaces are considered, the reason of the linking between the system and the Google Big Table has been to put away and fetch information. The reason behind the connection between the mobile devices and systems has been to deliver the mobile access to that system. Apart from this, the system has been integrated to social media networks like Twitter and Facebook. The interfacing of the system with the users has been of two kinds. Firstly, in the system administrator interface the administrator has been privileged with permissions for accessing the overall system (Tebaa Hajji, 2014). In the organization administrator interface, the administrators get permission for modifying and accessing the overall data belonging to My Health Record they administrate. As per as the member interface is concerned, the members are able to observe and update their personal data and the profiles and the public pages of the company they were not belonging to. As the application of the project would be working over the Google App Engine there has been no existence of any particular hardware interface. Thus the non-functional requirements must consider in terms of those qualities the company want from the IT system along with the constraints they have been doing. The decision for moving into the cloud has been adding in many ways the constraints they have been doing (Chen et al., 2015). The company would not have the overall free reign to perform whatever they need if they go for off-premise cloud. This cloud has been operated by vendors but had to align the service levels provided by them. Review of cloud-based solution: The industry experts have believed that the trend of cloud computing would continue to grow and develop further. As this technology has been undoubtedly advantageous for companies of all sizes, it has not been without downsides. The various strengths and weaknesses regarding the implementation of cloud-computing have been described below (Gai et al., 2016). Strengths: Cost efficiency: Cloud computing has been likely the most cost effective strategy to utilize, keep up and update. Conventional desktop software has been costing organizations a lot in terms of economy. Including the licensing charges for various clients can turn out to be extremely costly for the establishment. The cloud, then again, is accessible at considerably less expensive rates and thus, can altogether bring down the organization's IT costs (Rittinghouse Ransome, 2016). Also, there are numerous one-time-installments, pay-as-you-go and other adaptable choices accessible, which make it exceptionally sensible for the organization being referred to. Practically Unlimited Storage: Putting away data in the cloud provides practically boundless capacity limit. Thus, My Health Record requires more need to stress over coming up short on storage room or expanding the present storage room accessibility. Reinforcement and Recovery: Since all the information is put away in the cloud, backing it up and reestablishing the same is significantly less demanding than putting away the same over physical devices. Moreover, most cloud specialist organizations are typically sufficiently equipped to deal with recuperation of data (Hwang, Dongarra Fox, 2013). Thus, this makes the whole procedure of reinforcement and recuperation substantially more straightforward than other conventional strategies for information storage. Programmed Software Integration: In cloud, the software reconciliation is normally something that happens naturally. This implies that the company does not have to take extra endeavors to tweak and incorporate the applications according to the inclinations (Leymann et al., 2014). Simple Access to Information: When the individuals enroll themselves in the cloud, they can get to the data from anyplace, where there is an Internet. This advantageous element gives the chance to move past time zone and geographic area issues. Quick Deployment: In conclusion and above all, cloud computing gives the upside of quick deploying. When anyone decides on this strategy for working, y the whole framework can be completely functional in a matter of a couple of minutes. Obviously, the measure of time taken here will rely on upon the exact type of technology needed for the business (Jula, Sundararajan Othman, 2014). Weaknesses: Technical Issues: Despite the fact the data and information on cloud can be gotten to at whatever time and from anyplace, there have been times when this framework can have some genuine brokenness. The company ought to know about the way that this innovation is constantly inclined to blackouts and other technological issues. Security in Cloud: The other significant issue while in the cloud is that of the security issues. Before receiving this innovation, the company ought to realize that they have to surrender all the sensitive data to an outsider service provider of cloud (Leymann et al., 2014). This could possibly put the organization to incredible hazard. Henceforth, they have to ensure that they pick the most dependable specialist organization, who would keep their data absolutely secure. Inclined to Attack: Putting away data in the cloud could make the organization powerless against outside hacking attacks and dangers. The SDLC approach: The Systems Development Life Cycle or the Software Development Life Cycle or SDLC has been the framework defining tasks to be done at every step in the cloud computing process. Two types of SDLC are to be discussed here. The predictive SDLC: The most prominent and surely understood predictive approach is the waterfall method. The term waterfall has turned into the token predictive strategy about debating the benefits of predictive versus adaptive (Zhang et al., 2014). The quality of a predictive approach is its emphasis on structure and keeping up a comprehensive vision of the resolution space. Its shortcoming is the unyielding thoroughness. However there is no reason not to reap what is required from these systems with an eye for general efficiencies. The adaptive SDLC: By and by, there are more than adequate in genuine cases to demonstrate that the adaptive procedures do work in the "huge." Adaptive SDLC run from the Rapid Application Development or RAD, that essentially prototypes items into reality, to Scrum, with its overwhelming dependence on group collaboration (Kalloniatis et al., 2014). This continues up to XP, which takes adaptive to the outrageous with its adaptation of combined programming and consistent surveys. These lighter and more agile system make cloud computing rapidly. Yet they do have a tendency to be somewhat strategic, frequently missing key strategic scopes. Recommendation to the SDLC for the current project: For the given project the Adaptive methodology is suggested. The adaptive methodology is also known as the agile methodology. This is because they follow Agile Manifesto which is a collection of central principles supporting iterative development. The cloud SDLC is flexible in utilizing the Agile SDLC using IBM Rational Unified Process or the SCRUM. These have been designed as an iterative approach for developing and quick deployment life-cycles. For bringing the operations on the similar table, the DevOps could be used that has to be particularized in the framework of cloud SDLC. Conclusion: Like everything the cloud computing also contains certain pros and cons. While this innovation could prove a great asset for My Health Record, it could also harm as it is misused or not understood properly. In short, the data as stored in big data center all over the globe, it could turn as the target of hackers or not used properly by the employees of providers of cloud. The professionals of My Health Record need to assure that the cloud computing never become any service used by few users. Like other innovations in this capitalized world, the cloud computing has been the first to be commercialized. Then its pros and cons are taken into the consideration. References: Botta, A., De Donato, W., Persico, V., Pescap, A. (2016). Integration of cloud computing and internet of things: a survey.Future Generation Computer Systems,56, 684-700. Buyya, R., Vecchiola, C., Selvi, S. T. (2013).Mastering cloud computing: foundations and applications programming. Newnes. Chen, M., Zhang, Y., Hu, L., Taleb, T., Sheng, Z. (2015). Cloud-based wireless network: Virtualized, reconfigurable, smart wireless network to enable 5G technologies.Mobile Networks and Applications,20(6), 704-712. Choi, C., Choi, J., Kim, P. (2014). Ontology-based access control model for security policy reasoning in cloud computing.The Journal of Supercomputing,67(3), 711-722. Gai, K., Qiu, M., Zhao, H., Tao, L., Zong, Z. (2016). Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing.Journal of Network and Computer Applications,59, 46-54. Grewal, R. K., Pateriya, P. K. (2013). A rule-based approach for effective resource provisioning in hybrid cloud environment. InNew Paradigms in Internet Computing(pp. 41-57). Springer Berlin Heidelberg. Hu, F., Hao, Q., Bao, K. (2014). A survey on software-defined network and openflow: From concept to implementation.IEEE Communications Surveys Tutorials,16(4), 2181-2206. Hwang, K., Dongarra, J., Fox, G. C. (2013).Distributed and cloud computing: from parallel processing to the internet of things. Morgan Kaufmann. Jula, A., Sundararajan, E., Othman, Z. (2014). Cloud computing service composition: A systematic literature review.Expert Systems with Applications,41(8), 3809-3824. Kalloniatis, C., Mouratidis, H., Vassilis, M., Islam, S., Gritzalis, S., Kavakli, E. (2014). Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts.Computer Standards Interfaces,36(4), 759-775. Leymann, C. F. F., Retter, R., Schupeck, W., Arbitter, P. (2014). Cloud computing patterns.Springer, Wien. doi,10, 978-3. Li, J., Li, Y. K., Chen, X., Lee, P. P., Lou, W. (2015). A hybrid cloud approach for secure authorized deduplication.IEEE Transactions on Parallel and Distributed Systems,26(5), 1206-1216. Li, Q., Wang, Z. Y., Li, W. H., Li, J., Wang, C., Du, R. Y. (2013). Applications integration in a hybrid cloud computing environment: Modelling and platform.Enterprise Information Systems,7(3), 237-271. Lu, P., Sun, Q., Wu, K., Zhu, Z. (2015). Distributed online hybrid cloud management for profit-driven multimedia cloud computing.IEEE Transactions on Multimedia,17(8), 1297-1308. Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing.Information Sciences,258, 371-386. Zhang, H., Jiang, G., Yoshihira, K., Chen, H. (2014). Proactive workload management in hybrid cloud computing.IEEE Transactions on Network and Service Management,11(1), 90-100.

Wednesday, December 4, 2019

Criminal Procedure free essay sample

After reading the situation and being asked five questions, I have come up with answers for each one of them. In this paper I will let you know what the answers to each one of the questions are. I will also provide you with the reasoning on why I chose the answers that I did. First, I believe that Officer Smith did have reasonable suspicion to make the stop of the vehicle. In all actuality, any reason is good enough for an officer on patrol to pull you over. It does vary as far as the type of tape you have over the taillight goes.If you were to use transparent tape than it would make the light more visible. Therefore, you would have less of a chance of being pulled over. Section 4(2) provides exceptions stipulated in s. 23, 24, 25, 27 and 28 of the penal code committed by a Ugandan outside Uganda. Such as Treason, acts intended to annoy the person of the President, concealment of treason, terrorism, promoting of war on chiefs and many others. It should be noted however that under international law, there is no restriction on the competence of the court to prosecute its own nationals for crimes committed outside its territorial jurisdiction if this right to national jurisdiction is conferred by statute. In Uganda vs Mustapha Atama 1975 HCB 254, where the accused a Kampala business man was charged in the chief magistrate’s court with obtaining money by false pretence contrary to section 9 of the PCA cap 106 now cap 120. The prosecution alleged that the accused while in the republic of Zaire obtained shs. 3360/- from the charge-d’ affaires of the Ugandan embassy by falsely pretending that he required the money for the maintenance of eight Ugandan soldiers who were stranded in Zaire while on an official mission. On the issue on whether Ugandan courts had jurisdiction over the matter as the offence had been committed in the Republic of Zaire, though in Uganda’s embassy. It was held that s. 6 of the PCA cap 106 now cap 120, confers jurisdiction to courts in Uganda to try offences committed partly within and partly without Uganda. While s. 2(b) merely presupposes the existence of a law conferring extra territorial jurisdiction to the courts in Uganda, in the absence of a Law enabling Uganda Courts to try nationals for acts committed whole outside Uganda, the Chief magistrate would have no jurisdiction to try such cases. Secondly, Local jurisdiction’s Magistrates are usually appointed to specific magisterial areas with reference to s. 5 of the MCA. The general rule is that every offence must be tried by a court within the local limits of the jurisdiction where it was committed under s.  31 of the MCA cap 16. Should the accused be found outside the area in which the offence was committed, the court in whose local limits of jurisdiction he is found will have him brought before it and cause him to be removed, in custody, to the court having jurisdiction to hear the case under s. 32 of the MCA. i. e the offence is committed in mbale and the fugitive is in Masaka, the court in Masaka will hand him over to t he Mbale court which has Local jurisdiction over the offence that was committed by the accused. However where the offence is committed partly within and partly without the Local limits of jurisdiction, any court having jurisdiction in either the two places may hear the case with reference to s. 37 of MCA. Thirdly on jurisdiction, the power to try cases, where an offence is committed in Uganda within the territorial boundaries and is committed within the local limits of jurisdiction of a particular magisterial area, the judicial officer handling the case will still have to ask himself whether he has the power to try the case, or whether the court he presides over , has jurisdiction to hear the case. For instance the Anti Terrorism Act No 14 of 2002 section 6, provides thus; The offence of terrorism and any other offence punishable by more than ten years imprisonment under this act are triable only by the high court and bail in respect of those offences may be granted only by the High court. Only the High court has powers to try the offence of terrorism under the Anti terrorism Act. The original jurisdiction of a chief magistrate’s court is governed by section 161 (1) (a) MCA. A chief magistrate may try any offence other than an offence in respect of which the maximum penalty is death. Example of these are murders, treason, rape, aggravated robbery, etc. However, a chief magistrate may pass any sentence authorized by law under section 162(1) (a) MCA. This means that he can pass a maximum sentence of imprisonment for life and can impose a fine of any amount. A magistrate grade 1 may try any offence other than an offence in respect of which the maximum penalty is death or imprisonment for life. Under 162 (1) (b) MCA, as amended provides that a magistrate grade 1  may pass a sentence of imprisonment for a period not exceeding ten years or a fine not exceeding four million, eight hundred thousand shillings or both. In Uganda vs Nicholas Okello (1984) HCB 22, The charge in this case was for attempted defilement contrary to section 123(3) PCA cap 106 of which the maximum sentence was 18 years imprisonment. The magistrate 1 tried this offence and sentenced the accused to 18 years imprisonment. He appealed against sentence and conviction. It was held that the magistrate had no powers to try such offence and therefore the trial was a nullity. A magistrate grade 2 may try any offence under any written law other than the offences and punishments specified in the first schedule of the MCA. Section 161(1) c) MCA. The sentencing powers of a magistrate grade 2 are limited to imprisonment for a period not exceeding three years or a fine not exceeding half a million shillings S. 162(1) c) MCA. In the Uganda vs c. Kiwanuka [1979] HCB 210, In this case the magistrate grade 2 tried the accused of the offence brought under the fire arms Act, which was an offence stipulated under the first schedule to the MCA to which a magistrate grade 2 had no powers to try. It was held that the conviction of the accused and sentence imposed on him by the magistrate grade 2 in disregard of the provisions of the first schedule was illegal. Article 129 of the constitution gives a list of the courts of judicature in Uganda such as, the Supreme court which is a superior court of record and a final court but does not have original jurisdiction like high court but has appellate jurisdiction. With reference to article 132(2) of the 1995 constitution of Uganda provides that it hears appeals from the Court of appeal. The court of appeal has appellate jurisdiction and hears decisions of the high court with reference to article 134(2) of the 1995 constitution, also has powers to hear cases or petitions regarding any questions as to the interpretation of the constitution according to article 137, Constitutional court. According to article 139(1) of the constitution, confers High court unlimited original jurisdiction in all matters with such appellate and other jurisdiction as may be conferred on it by the court or any other law. Section 1 of the T. I. A cap 23 provides that the high court has unlimited jurisdiction to try any offence under any written law and may pass any sentence authorized by law. Except that no criminal case can be brought under the cognizance of the high court for trial unless the accused person has been committed for trial to the high court in accordance with the M. C. A. Section 2 of the T. I. A provides the sentencing powers of the high court whereby it may pass any lawful sentence combining any of the sentences which it is authorized by law to pass. High court hears decisions of the Chief magistrate and magistrate grade 1 as provided in section 204(1) a) of M. C. A. with reference to section 168 of the M. C. A.  provides for committal proceedings where, When a person charged with an offence to be tried by the High Court appears before a magistrate and the Director of Public Prosecutions has complied with subsection (1), the magistrate shall give the accused person a copy of the indictment together with the summary of the case, read out the indictment and the summary of the case and explain to the accused person the nature of the accusation against him or her in a language he or she understands and inform him or her that he or she is not required to plead to the indictment, commit the accused person for trial by the High Court and transmit to the registrar of the High Court copies of the indictment and of the summary of the case. According to the law in Uganda, judicial officers are not entitled or empowered to make any phone calls to the accused to appear before court. There is a clear procedure on the issuing of summons. With reference to the Blacks law dictionary summon refers to a writ or process commencing the plaintiffs action and requiring the plaintiffs to appear and answer. A criminal summon is a simple court document that contains a number of facts justifying an inquiry into a complaint against an accused person and requiring him to attend the inquiry. It is a document issued by court to be served on the person addressed in it requiring that person to appear before court on the date specified in the document to answer charges brought against him or her. Most importantly every summon must be in writing, prepared in duplicate, signed and sealed by the magistrate or such other officer as the chief justice may from time to time direct with reference to section 44(2) of the M. C. A. Every summon must be directed to the person summoned and shall require him or her to appear at a place, date, time indicated therein before the court having jurisdiction to inquire into and deal with the complaint or charge as provided in section 44(2). In section 44(3), a summon must also state shortly the offence with which the person against whom it is issued is charged. This is basically for purposes of letting the accused know and prepare for the charge he is being compelled to answer. Service of summons to accused is supposed to be in person. According to section 45(1) of MCA every summon must be served by a police officer or an officer of the court issuing it or any public servant but in practice, a summons is served by a police officer or an officer of the court called a process server. A summons must be served on to the persons to whom it is addressed personally but the section states, if practicable. The summons is served on the accused by giving him a duplicate of the summons and in practice he must sign the original copy of the summons. Section 45(2) of the MCA provides that every person on whom a summons is so served, shall if so required by the serving officer, sign a receipt of it on the back of the original summons. In a situation where service of summons to an accused who cannot be found, service of summons maybe effected by leaving the duplicate of the summons for the accused with an adult member of the family or the accused’s servant who normally resides with him or by leaving it with his employer as provided in section 46 of the MCA. The person with whom the summons is left, if so required by the process server, must sign receipt of it on the back of the original summons. The procedure when service cannot be effected is provided in section 47 of the MCA, the process serving officer shall affix the duplicate of the summons to some conspicuous part of the house or homestead in which the person summoned ordinarily resides and thereupon the summons shall be deemed to have been duly served. Where the person summoned is in the active service of the Government or of the East African Community, the court issuing the summons shall ordinarily send it in duplicate to the head of the office in which that person is employed, and the head shall thereupon cause the summons to be served in the manner provided by section 45, and shall return it to the court under his or her signature with the endorsement required by that section. That signature shall be evidence of the service as provided by section 48 of the MCA. A summon can too be issued to a company with reference to section 49 of the MCA, that provides that service of summons on an incorporated company or other body corporate may be effected by serving it on the secretary, local manager or other principal officer of the corporation or by registered letter addressed to the chief officer of corporation or by a registered letter addressed to the chief officer of the corporation at the registered office of the company or body corporate in Uganda. Service of criminal summons on a body corporate can be done by sending the summons by registered mail addressed to the chief officer of the company, secretary, local manager or other principal officer of the company. These officers of a company are deemed competent to plead on behalf of the company. In showing proof that service was effected, section 50 provides where a summon can be served, that is at any place in Uganda. Where the summons was served outside the local limits of jurisdiction of the presiding court or if the accused for whom the summons was intended doesn’t appear at the place, date and time indicated, the court might either on its own or upon application by the prosecution decide to issue a warrant for his apprehension. But before the court does so, it will be necessary to show by evidence that the accused was served and had deliberately refused to obey the summons. According to section 51 of the MCA, ordinarily proof of service of summons shall be given by calling the process server to give evidence on oath that service was effected. But where the officer is not present or the summons was served outside the local limits of the jurisdiction of the issuing magistrate, proof maybe effected by the person with whom the summons was left, swearing an affidavit before a magistrate and presenting the original summons duly endorsed in the manner described above. Even if the original summons is not endorsed, the affidavit shall be admissible in evidence if the court is satisfied from the statements made in it that service of the summons has been effected properly with reference to section 51(2) of MCA.