Saturday, December 28, 2019

The Breakdown Of A Personality - 2612 Words

This paper will be focusing on the breakdown of a personality in every single way possible. Personality is a topic that involves multiple theories and developments. The breakdown of each development and theory will help have a better understanding for unanswered questions for many people. In this paper there will be included the theories of Sigmund Freud, Abraham Maslow, and Carl Rogers. The developments within this paper will show the works of how a personality is developed and classified. It will show the steps of how each person is made into an individual and how each individual may have something in common. The theories will show how the developments even came about and how the studying and research have answered the unanswered†¦show more content†¦Finding out the five factors of the person is now one of the most influential ways and is the key to figuring out a person and their personality. Classifying traits Before going straight into the five factors, there are things that come before that stage such as predicting the behavior of a person. When it comes to the behavior of a person there are two labels that can define them which are â€Å"introvert† or â€Å"extrovert.† Introverts are known as people who do not do well with social interaction and extrovert is the opposite, the people who are comfortable with social interaction. Introversion and extroversion are thought of as a trait which leads into the classifying of traits. Trait theories Classifying traits of a person include common traits, individual traits, cardinal traits, central traits, secondary traits, surface traits, and source traits. Each of these traits is a trait that adds up and defines a person and their personality. Common traits are characteristics that tell people from a certain culture and share what their similarities are. Individual traits are the classification of persons’ unique qualities. Cardinal traits are the basic trait that leads to the actual trait the person is classified as. These traits then lead into central and secondary traits and most people don’t quite understand how they differ from cardinal traits. Central traits are known as the building blocks of a

Friday, December 20, 2019

Customer Service - 2488 Words

Customer Service Research Paper Before I get into further analysis of my own personal experience, I am going to explain about different characteristics that are involved in customer service. Most businesses will tell you that quality customer service is the keystone to success. An essential component of outstanding customer service is the possession of a great staff. Larger companies may be weighed down by employee handbooks that specify the customer service guidelines. Independent, smaller businesses have the advantage of selecting employees that possess excellent customer service know how and capabilities. The customer service department should also be extremely familiar with the inventory, services, and policies entailed in the store.†¦show more content†¦A good idea is to ensure the customer that methods will be taken to prevent this problem from happening in the future. Employees can make a difference if the customer feels that they are making a difference on the business. Many companies learn that ef fective service recovery heightens customer loyalty. It costs approximately five times as much money to acquire an existing customer then it does to keep an old one. Without using these methods, I have found that there are many approaches that make the customer angrier than they were in the first place. One of the best is telling the customer how important they are and how much this call means to the company, and then letting the customer sit on hold forever. It is even better when it is just a recording that interrupts the annoying elevator music on the phone repeating over and over that this call is important to us, remain holding. If this call is so important, why am I on hold for an hour? A business can always keep transferring the customer to different departments, and each department can redirect them. This will make the customer become angry at all of the departments and not just one employee. At least with one employee, the customer may not feel the whole company is unqualified and not helpful. Making the customer explain their problem over and over makes them angrier and angrier. One of the best ways to make a customer irate is to putSho w MoreRelatedCustomer Service2541 Words   |  11 Pagesï » ¿Customer Service at Datatronics Datatronics is an organization that serves their customers with Enterprise Resource Planning integrated solutions. Their growth is mainly attributed to acquisitions of smaller competitors. E-Z RP was such a company that despite its inferior size compared to Datatronics was able to succeed and outperform Datatronics on grounds of customer service and customer satisfaction. Datatronics recognized the fact and acquired E-Z RP with the aim to improve in that respectiveRead MoreCustomer Service Services And The Service Sector2162 Words   |  9 PagesSince+ the global economy embraced customer service, issues regarding levels of customer service have become more prominent in service organisations. Even now there are organisational managers with no training or knowledge of how organisations in the service sector require a high level of customer service. This is ignorance of the fact good customer service can create a competitive advantage; increase profit; efficiency; and increase staff a nd customer retention and satisfaction. Based on comprehensiveRead MoreCustomer Service And An Organization1445 Words   |  6 Pagescontinuously fail in customer service satisfaction for many reasons. As service failures are inevitable, it is important for companies, especially small businesses, to capitalize on learning the importance of reducing service failure. Just as the seed is the core of the fruit, customer service is the core of an organization; its meaning is the primary function for organizations to retain business and discover new ventures. Customer service is the primary source of business-to-customer communication andRead MoreCustomer Service Essay641 Words   |  3 Pagesto communicate with customers to identify and agree on product/ service specifications. It is crucial to be aware that customer expectations and needs will change from time to time and will be affected by market trends, fashions and changes in external environments. This means the business plans need to be adapted to changing needs of customers and is important that organisations communicate with its customers. Profiling is a method to understand the needs of the customers. Profiling enables organisationsRead MoreThe Etiquette Of Customer Service1601 Words   |  7 PagesThe Etiquette of Customer Service – Instructional Guide Overview Objective Key points How to say â€Å"I’m sorry† without apologizing in customer service? There are justifiable situations that require customer service representatives to say â€Å"I’m sorry† without apologizing. Situations include: a plan benefit that is not covered, denial of a pre-authorization, or an appeal denial. Session#1 I’m Sorry When this occurs, there are phrasesRead MoreCustomer Service Representatives1622 Words   |  7 PagesZappos. This is followed by a hierarchal ranking of the four major presenting problems for the company, which are: maintaining the â€Å"wow† image without overspending, inventory management/distribution problems, transportation efficiency problems and customer behavior problems. Each of these problems is addressed in more detail in the discussion section and the recommendations section at the end of the analysis. Prior to the conclusion and recommendations section, a list of possible strategic alternativesRead MoreCustomer Service At The Restaurant2103 Words   |  9 Pages†¢ Execute exceptional outstanding customer service by recruiting, leading and developing people and planning, organising, directing, controlling and evaluating all the operations of the restaurant to build sales and control costs to deliver optimum business results for the restaurant †¢ Understand, enforce and train Crew and Managers on all appropriate policies, award minimums, security and safety procedures. †¢ Modifying the operational procedures as per the requirement of the profitability of theRead MoreCustomer Service1186 Words   |  5 Pagessome companies aim to look after their customers well, ensuring that the customer is at the heart of their business and everything they do. In marketing terms this is called being customer focused. It is important to realise that customers can take their business anywhere they want to and if they are not satisfied they will take their business elsewhere. Therefore, it is very important to understand who our customers are, their expectations of the service they experience and how that effects futureRead MoreEssay on Customer Service1144 Words   |  5 PagesSection 1 – Understand the factors that affect an organisation and the customer service role 1. Complete the table below with a description of the products and services for at least two commercial organisations, public organisations and third sector organisations. Please ensure you provide a description for each organisation, rather than a list. Organisation type Name of organisation Description of products and services Commercial organisation Commercial organisation Read MoreQuestions On Customer Service And Customer Services1913 Words   |  8 Pagesthe main problems a company may has on the customer services, it point out that many companies may issue on dealing with customers feedbacks thus it lead enterprise loss their market share because of bad performance on customer services and they may give the bad comments on company’s products and services. Therefore, they need to establish a system ii. Body 1 It will analyze several problems a company might have, a company may hard to collect customers’ feedback and manage it, and then some company

Thursday, December 12, 2019

Commercial Law Law of Torts

Question: Discuss about the Essay for Commercial Law and Law of Torts. Answer: 1st. The scenario that is provided depicts that Alan went to the shop of Ben for making the purchase of Russian vodka. After his visit, he made asked Ben for three bottles of vodka that is Russian. Upon his inquiry, Ben gave the answer that the bottles that Alan was holding in his hand are of the same description that was demanded by him. Alan then made the purchase of those bottles, paid money for the same, and received a receipt from Ben in exchange for that purchase. In the above context, we can say that as a result of the purchase, there exists a contractual relationship between them. According to the law of contract, any contract stands as a document that is more than a mere agreement, and that possess the feature of enforceability in the court of law (Barker, Lunney Trindade, 2012). Hence, it can be said that the contract acts as agreements that exist between more than two persons that make the formation of obligations that are enforceable wither for doing or refraining from doing any particular act. Several elements must be followed by the formation of a contract. Those elements are the consideration, offer, intention, legal capacity and acceptance (Bridge, 2012). The primary element of a contract is an offer. Either one party of any contract makes such offer. The person who indulges himself or herself in the offer making is known as the offeror. The person to whom the offer is made is known as the offeree. In the scenario, Alan made the invitation to Ben make him the offer. Receiving that offer, Ben caused himself to offer Alan to make the buy of bottles of vodka. In the case of Gibbons v Proctor (1891), there was a policeman who was allowed to make the recovery of a reward at that time when he sends the information by being ignorant of the offer of that reward (Brudner, 2013). The next element known as acceptance is also of immense importance. Once the offer is made, it has to make by the other party or parties in any contract. The party who makes the acceptance in any contract is known as the acceptor. After the acceptance is made, the same has to be appropriately communicated to the person who made that offer (Calfa Grossmann, 2015). The moment the acceptance is communicated appropriately the performance procedure by the offeror is to start. In the scenario that is given, the Alan made the acceptance of Bens offer of buying three bottles of Russian vodka. The next element is the consideration. It is that amount that is provided by a party of any contract in the exchange of the service to the other parties of the contract. The consideration is often regarded as the essence of any contract. Any contract is entered into only for consideration. In the provided scenario, Alan renders the considered to Ben for the supply of the bottles of vodka. In the acknowledgment of that payment of consideration, Ben gave Alan the receipt for that payment. The intention of the parties to any contract also acts an element that is important for the formation of any contract. In any contract, there has to be the intention of the parties to any contract, which is generated by their free will and not under any force. In the case study, there is the intention of the parties that is Alan and Ben to make the dealing and thus entering into the contract. The legal capacity is also an important contractual element. The law of contract makes the express statement that during entering into a contract a person must attain the legal age that is eighteen years and must not be under the effect of alcohol (Crump, 2013). Any bankrupt and a prisoner are also not allowed to enter into a contract. Alan and Ben both have the legal capacity to enter into an obligation that is contractual. Hence, from the above discussion it can be said that there exists a valid contract between Ben and Alan, as all the elements of a contract are present in their dealing. 2nd. The Sale of Goods Act governs the transactions where by any person who is known as the buyer make the transfer of goods to any person known to the seller, for the payment any amount that is known as price or value. Under the Sale of Goods Act, the contract for the sale of goods and services makes its involvement in the making of the regulations and rules for both contracts of sale and contract of sale. Part 1(h) of the Sale of Goods Act delivers the definition of the term goods. The term goods under the Act make the inclusion of all kinds of moveable and excludes claims and money (Davies, 2016). Timber, growing crops, shares and stock are included in the term goods. There are several warranties that are guaranteed by the Act that tends to render protection to both the buyers and sellers. In Part 1, of Sale of Goods Act of the territory of Singapore declares those warranties that render protection to the buyer's interest from the intentions that are fraudulent of the seller. There is implied warranty that is guaranteed by Part 1 of Section 15 of the Sale of Goods Act of Singapore for the goods that are sold by way of description. In the simpler terms, the goods that mean that whenever any goods are sold by way of description, the goods must comply with the qualities that exist in a description (Durkheim, 2014). In Part 5 of Section 53 of the Sale of Goods Act of Singapore, deals with setting out the rules and the norms that are to be followed by a buyer in case of breach any warranty by any seller. The Section states expressly that any buyer is always entitled to bringing any legal action, for making the breach of any warranty, against seller (Eggen, 2015). In the additional terms, there is also the entitlement to the buyer to make settlement of violation of any warranty by making the reduction of the price of purchase. The present case suggests that the seller is Ben, and the buyer is Alan. There was the clear demand or requirement by Alan that he wants to make the purchase of three bottles of vodka that is Russian. When Alan made his entry at the liquor shop of Ben, he held some bottles of vodka in his hands and demanded his requirement of Russian vodka to Ben. The reply of Ben was that the bottles in the hands of Alan fulfill his requirement. On getting that reply, Alan made the purchase of the drinks and offered his friend, who got ill as a result of drinking those drinks. Upon making the inquiry, it was found out that the drinks delivered by Ben were not originally Russian vodka and were illicit drinks. Hence, it can be said that Ben made the violation of Section 16 and 15 of the Sale of Goods Act by making the supply of illicit drinks in the place of Russian vodka. For the act of Ben, Alan is entitled to bring the legal action or claim against Ben. 3. The receipt that was issued by Ben to Alan for the payment of money of the bottles of vodka enshrined the statement that the products that are sold once from the shop of Ben are not subject to refund. The receipt also enshrined the words that that seller also is not responsible for the safety of the products that are sold by the shop. Hence, in accordance with the words of the receipt, there is no liability of Ben if the products of him were unsafe in any (Furmston, Cheshire Fifoot, 2012). The primary issue that is involved in this scenario is that whether the receipt that is delivered by Ben to Alan amounts to a contract that ism enforceable in the court of law. The receipt can never be considered as a contract. It is because the receipt is a mere acknowledgment of the fact that Alan made the payment of money for the bottles of vodka that is purchased. The receipt is neither an agreement nor a contract that is enforceable in any law court (Furmston Tolhurst, 2010). The receipt in the court of law would be considered as the evidence of the payment of consideration by any justice, in deciding the contractual relationship that exists between them. The contract that exists between the two parties that is Ben and Alan is not express but implied. The presence of the contract between is evident from the dealing between them. There is a reputed case named Olley v Marlborough Court Ltd, where Olley could not find the keys of hotel that she left in a safe position in the reception. A disclaimer by the hotel authorities makes the express statement that the proprietors would not held themselves liable for the loss of articles unless the managers of the hotel for their safe custody handle those articles (Hunter, 2015). The Court held that the fault was on the part of the hotel authorities for acting negligently. It was evident that Olley kept the keys of the hotel at the reception. Hence, the disclaimer that was issued on the part of the hotel was regarded by the court as not a part of the contract, and the hotel cannot rely on that disclaimer (Markovits, 2015). The contract that existed between Alan and Ben depicts that Ben was under the duty to make the performance of the contract by the delivery of the exact requirement that was demanded by Alan. By the delivery of illicit drinks, Ben made the breach of the contract terms and the violation of the provisions of Sale of Goods Act. Hence, there lies the option that is available to Alan for suing Ben. In that suit, Alan could either claim for refund against the faulty products that were rendered by Ben or could claim for damages for the loss that he sustained for the unsafe goods Ben delivered. In that suit, the receipt of Ben would be neither valid nor enforced. The Court would never consider such receipt (McKendrick, 2014). 4. The scenario that is to be discussed in the last questions suggests that the friends of Alan got affected by the disease of diarrhea. As a result drinking the drinks that were delivered by Ben. The primary issue that was involved in the case that is whether there lies any claim on the part of friends of Alan against Ben. The issue that is involved in the case can be resolved by the application and the discussion of the principles of foreseeable conduct and proximate cause in the law of torts. There is also the requirement of the discussion of the principles of negligence in a resolution of the issues (Mullender, 2013). In the tort law, there is the requirement on the part of any person to take that reasonable care in order to avoid omissions or act that could foresee reasonably in the injury of any other person. In the case of Nettleship v Weston [1971] CA, it was held by the Court that at the time of driving any motor car, it is foreseeable that any passenger or other users of the road are affected directly in case the driver is careless (Poole, 2012). In the case of Margereson v Roberts [1996] CA, the Court held that children who play near the factory of asbestos have the risk of suffering from a disease called mesothelioma. Hence, the working of the factor would be considered as foreseeable to the harm of those children (Rose, 2013). The term proximate cause refers to the primary cause of an injury. It is not necessary that the proximate cause would be the closest cause in either space or time or the first event that is responsible for setting the events in motion or in the sequence that led to any injury. The principle of proximate cause is involved in making the production of the consequences that are foreseeable without the intervention of any unforeseeable cause. The term proximate cause is also referred to as the legal cause (Schwenzer, Hachem Kee, 2012). The term negligence refers to the failure of any person to take the care of something which was under that duty of taking care and failed to take that care. The essential feature of negligence is that the failure of any person to take that care also amounted to the loss of any other party (Yeo, 2012). In the case that is given the foreseeable principle, proximate cause and negligence is applicable. The sustaining of diarrhea by the friends of Alan is foreseeable to the act of Ben, and the proximate cause of that disease is the act of Ben. The principle of negligence suggests that Ben was under the duty of delivering genuine drinks to Alan. Ben made the breach of his duty by giving Ben illicit drinks. The transferring of the illicit drinks has lead to the health problems of friends of Alan. Hence, it can be said that Ben was negligent that lead diarrhea of Alan's friends. It is evident that there is no contract between Ben and friends of Alan. However, by the application of the principles of foreseeable conduct, proximate cause and negligence makes it clear that Ben is responsible for the health hazard of friends of Alan. Hence, those friends have the right to sue Ben. Reference List Barker, K., Cane, P., Lunney, M., Trindade, F. (2012).The law of torts in Australia. Oxford University Press. Bridge, M. G. (2012).Benjamin's sale of goods. Sweet Maxwell. Brudner, A. (2013).The unity of the common law. OUP Oxford. Calfa, B. A., Grossmann, I. E. (2015). Optimal procurement contract selection with price optimization under uncertainty for process networks.Computers Chemical Engineering,82, 330-343. Crump, D. (2013). How to Read a Contract Proposal Written by Someone Else, or Evaluating the Seven Elements of Agreement.Fla. St. U. Bus. Rev.,12, 109. Davies, P. S. (2016).JC Smith's the Law of Contract. Oxford University Press. Durkheim, E. (2014).The rules of sociological method: and selected texts on sociology and its method. Simon and Schuster. Eggen, J. M. (2015). Mental Disabilities and Duty in Negligence Law: Will Neuroscience Reform Tort Doctrine?.Indiana Health Law Review,12, 591. Furmston, M. P., Cheshire, G. C., Fifoot, C. H. S. (2012).Cheshire, Fifoot and Furmston's law of contract. Oxford university press. Furmston, M., Tolhurst, G. J. (2010).Contract formation: Law and practice. Oxford University Press, USA. Hunter, H. (2015). Modern Law of Contracts. Markovits, R. S. (2015). TORT-RELATED RISK COSTS AND THE FIRST-BEST ECONOMIC INEFFICIENCY OF THE HAND FORMULA FOR NEGLIGENCE: HOW TO FIX THE FORMULA WHEN IT CAN BE FIXED AND WHY IT SOMETIMES CANNOT BE FIXED. McKendrick, E. (2014).Contract law: text, cases, and materials. Oxford University Press (UK). Mullender, R. (2013). English Negligence Law as a Human Practice.Law Literature. Poole, J. (2012).Casebook on contract law. Oxford University Press. Rose, F. D. (Ed.). (2013).Contract, Tort Restitution. Oxford University Press. Schwenzer, I., Hachem, P., Kee, C. (2012).Global sales and contract law. Oxford University Press. Yeo, T. M. (2012). The Future of Promissory Estoppel in Singapore Law.

Wednesday, December 4, 2019

Blockchain for Bitcoin Technology

Question: Discuss about the Blockchain for Bitcoin Technology. Answer: Introduction: The block chains are the distributed databases maintaining continuous growth of records ordered in lists called blocks. It is the public ledger of every Bitcoin transactions which have been executed. The completed blocks are incorporated to it leading to constant increase in size of the block chains. These blocks have been imposed over the blockchain in chronological order and linear manner. The research would be conducted around Bitcoins. The bitcoins has been developed as rewards in competitions where users offer power of computing to authenticate and record transfer of data into block-chains. The study would not reveal any other cases supported by the block-chains like smart contracts and the licensing. The study would describe the research. Then the evaluation of the contribution of block-chains with bitcoins has been discussed. A model to stimulate has been developed with its limitations and justifications. Lastly conclusion has been drawn on the key findings fitting to the research. At first the topic blockchain technology in Bitcoin is defined. Then the area of blockchain technology in Bitcoin is unfolded. The areas that are not to be included in this research are mentioned. Lastly the general findings from blockchain technology in Bitcoin are revealed. In the next section, the fiend of the review has been described. After describing the research, evaluation is done on the contribution of the research that has been done to the area. Next the limitations of blockchain technology in Bitcoin are shown. Lastly the section ends by mentioning the values of the limitations in the project. Then the best solution for the present situation is given. It important features are discussed. Its quality and contribution to the given research field is analyzed. A model is drawn stimulating it. Lastly conclusion is drawn upon the key findings from the review of blockchain technology in Bitcoin. Research description: Boyd Carr, (2016) researched that Blockchain is the decentralized method for data transaction in data management. It was first designed for the Bitcoin cryptocurrency. The interest in this field originated since the idea has been coined in the year of 2008. The reason behind this was its core attributes providing data integrity, anonymity and security. This has been done in the absence of a third party organization that could manage its transactions. Thus it created attractive areas of research. This has been especially from the view point of limitations and technical challenges. A systematic mapping of the study with the aim of gathering every relevant research on the technology of lock-chain is set. The main aim has been the understanding of the present challenges, future directions and topics of the research. Various online journals are studies. That show focus on the Bitcoin systems. Most of the studies has been dealing with reveal and improve of the Blockchains from the security and privacy view-points. Several of the proposed solutions have been lacking concrete discussion on the effectiveness. Many scalability of Block-chain involving the latency and throughput has been kept unstudied. Evaluation of the contribution of the research:The contribution of the research has been interesting to watch where it has been heading. Bitcoin has got many attentions in cryptocurrency. According to Gbel et al. (2016) more people has been buying and trading Bitcoins per day. Hence it has been crucial as a research topic. The research would attract the academia and industries to carry on further researches from both the technical and business perspectives. The Bitcoin has been the only solution to utilize the Blockchain technology. There has been various other cryptocurrencies currently who have been giving competition to Bitcoin. The future researches from this study might also involve other cryptocurrencies. The review would not only help in focusing on Bitcoin and the other cryptocurrencies but also highlight applications possible utilizing the solution of blockchain. Utilizing of decentralized scenario like the share of virtual properties could be a contribution of the research. This would revolutionize the approach in which the organizations would sell the products. Gipp, KostiBreitinger (2016) states that as the solutions of blockchain are used for more users, it would appreciate the reviews like this done on the technical challenges and limitations. The increase in sizes and bases of users has triggered to conduct this type of researches relating to the scalability. Moreover, the research will leave its impact on the privacy and security concerns. This would give birth to inventions of new areas to prevent the disturbance on blockchains. Limitations of the research:The systematic mapping of the research would enable the understanding of the present gaps in the research. Crosby et al., (2016) state thatone of the fundamental limitations on the study is relating to the publication bias. It refers that the problem that the positive outcomes are to be published more than that of the negative ones. This is because that the negative take much time to get published. Moreover, they have been less cited in the publications. Other limitation has been the selection bias. It refers to the distortion of the statistical analysis. This has been owing to the used criteria for selecting the publications. Lastly the there has been limitation regarding inaccuracy the extraction of data and the misclassification. This indicates the possibility of extraction of data differently by various reviewers. Importance of the research gaps in the project:As researched by Zheng et al., (2016) this identification of systematic mapping of the research would help the practitioners and the researchers to concentrate on research areas that need more researches. The seeking of the gaps of research would reply the unanswered queries in the present technology of blockchain. The addressing of the publication issue has brought the usage of various scientific databases. This is done within the search protocols to seek maximum number of papers. This has raised the quantity of papers found for this study along with raising the possibility to seek the papers with negative outcomes. Nonetheless, the Blockchain innovation has been considered as another subject in the software engineering industry. It has been further distributed as white papers inside the companies. Thus, all exploration led on the specialized perspectives on Blockchain could not been incorporated in this mapping study. In any case, by u sing just logical databases as hotspots for finding significant research, papers are gathered of higher quality. The issue of selection bias has been addressed by the developing o careful search protocols. Pilot searches could be done on various keywords ensuring what has been concluded from the study. Rigorous criteria for inclusion and the exclusion could be defined form this. This would ensure that every paper elected has been the section of the research topic (Bracamonte, Yamasaki Okada, 2016). Most of the researches relating to the block-chain have been relevant to the regulation, legal and economic factors of Bitcoin with the possibility of its cryptocurrency. The current selected solution at best: The solution is the data extraction and mapping process. Matzuttet al., (2016) claimed is designed to gather data required to address the queries of research in this review. The data items collected are the basic information regarding the study. It includes the objectives and major findings from the study. It helps to organize and assess the data. The selection and search outcomes are found from the process. There has been the Prisma-Flow model provided with the process. Many journals have been retrieved initially as the search protocol designed has been registered to the scientific databases selected. The initial round on the inclusion and the exclusion has been lying on the basis of the titles of the papers retrieved. Various papers excluded have been discussed from the business view-point of Bitcoin. They have not been included in the study. Retrieval of numerous papers relevant to other scientific fields where the Blockchain has another definition than technology in computer scie nce is done. The most important features have been the identification of security, wasted resources, usability and privacy. These have been good due to the identification of exchanging property of Bitcoin. This has caused economic harm for the clients. This fit into the research was said by Karame (2016). This is because there is a scope of introducing the audit software to increase the usability in the Bitcoin exchanges. The aim of this software has been to deduce the solvency of exchange participants. This could be done without the publication of crucial data. There has been connection between the buyer and the seller with limited layer for anonymity. This prevents the buyers to find and validate data in Bitcoin. Different models could be presented through which the rating or reputation could be imposed conjoining the transactions of Bitcon. This considers every pros and cons. These aspects could be improved. This could be done on the network of Bitcoin. Thus the usability is improved delivering extra data for users who have been making transactions. Limitations:Colombo (2016) argues that the technology of block-chain has certain challenges that are identified through the review. Several technical limitations identified in adapting the technology of block-chain in future are throughput, latency, bandwidth and size, security, wasted resources, usability and versioning with hard forks and multiple chains. They have been the limitations for certain reasons. The potential issues throughput in the network of Bitcoin presently gets maximized to transactions per second. In order to develop enough protection for the transaction block of Bitcoin, it takes 10 minutes to finish a transaction roughly. In order to gain security efficiency, more time has to be spent in the blocks. This is because it has been outweighing the expense of couple of attacks. Currently the block-chains size in the network of Bitcoin has been over five hundred thousand megabytes. The community of Bitcoin assumes that the quantity of each block has been one mega bytes. The block has been created for every ten minutes. Dwyer (2016) discusses that this causes limitations in the quantity of transactions to be handled. In the security section the present block-chain at Bitcoin can have 51% attack. The mining at Bitcoin has been wasting large quantity of energy about fifteen million dollars per day. This has been the reason of effort of proof-of-work. The API of Bitcoin to develop services has been hard to use. There has been the requirement to design an API for blockchain that is more developer-friendly. This resembles the REST APIs many times. Small chains that comprises of lower quantity of nodes possess high chances of fifty-one percent attack. Another problem arises as the chains have been split for versioning and administrative purposes (Krug Peterson, 2015). These limitations fit to the review as the blockchain posses the ability to alter the method of transactions. Moreover, the block-chains applications have not been limited to the crypto currencies. The data integrity attributes of security and the anonymity has been suffering from various restrictions and obstacles. They are assesses and resolved in this research. Scalability has been another problem which has been also mentioned in this study. This research would help in identifying the present status done by blockchain. Conclusion: The research has continued to seek several problems and solutions to overcome the limitations of the technology of Block-chain. Most of the study has concentrated on addressing the challenges. Every block comprises of a timestamp. It comprises of links to previous blocks. As recorded once, the block-chains have been resistant inherently to any kind of modification of data. Maximum researches on block-chain of present day have been concerned about the security and privacy issues. It has conducted scalability problems on the Blockchain. The review has evaluated the ability of the solutions suggested in an aim of the evaluation criteria. The limitations are searched and the way it has been valuable to the project is found out. A suitable model is drawn justifying the best solution selected. Though various solutions to the limitations and solutions are presented but few of them has been just small proposals and lack strong assessment on the effectiveness. References: Boyd, C., Carr, C. (2016, July). Fair Client Puzzles from the Bitcoin Blockchain. InAustralasian Conference on Information Security and Privacy(pp. 161-177). Springer International Publishing. Bracamonte, V., Yamasaki, S., Okada, H. (2016). A Discussion of Issues related to Electronic Voting Systems based on Blockchain Technology. Colombo, R. J. (2016). Bitcoin: Hype or Harbinger.J. Int'l Bus. L.,16, 1. Crosby, M., Pattanayak, P., Verma, S., Kalyanaraman, V. (2016). Blockchain technology: Beyond bitcoin.Applied Innovation,2, 6-10. Dwyer, G. P. (2016). Blockchain: A Primer. English, S. M., Nezhadian, E. (2017). Conditions of Full Disclosure: The Blockchain Remuneration Model.arXiv preprint arXiv:1703.04196. Ferrin, D. (2015). A Preliminary Field Guide for Bitcoin Transaction Patterns. InProc. Texas Bitcoin Conf. Gipp, B., Kosti, J., Breitinger, C. (2016). Securing Video Integrity Using Decentralized Trusted Timestamping on the Bitcoin Blockchain. Gbel, J., Keeler, H. P., Krzesinski, A. E., Taylor, P. G. (2016). Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay.Performance Evaluation,104, 23-41. Hari, A., Lakshman, T. V. (2016, November). The Internet Blockchain: A Distributed, Tamper-Resistant Transaction Framework for the Internet. InProceedings of the 15th ACM Workshop on Hot Topics in Networks(pp. 204-210). ACM. Karame, G. (2016, October). On the Security and Scalability of Bitcoin's Blockchain. InProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security(pp. 1861-1862). ACM. Krug, J., Peterson, J. (2015). Sidecoin: a snapshot mechanism for bootstrapping a blockchain.arXiv preprint arXiv:1501.01039. Matzutt, R., Hohlfeld, O., Henze, M., Rawiel, R., Ziegeldorf, J. H., Wehrle, K. (2016, October). POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store. InProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security(pp. 1769-1771). ACM. Miscione, G., Kavanagh, D. (2015). Bitcoin and the Blockchain: A Coup D'tat through Digital Heterotopia?. Nugent, T., Upton, D., Cimpoesu, M. (2016). Improving data transparency in clinical trials using blockchain smart contracts [version 1; referees: awaiting peer review]. Zheng, Z., Xie, S., Dai, H. N., Wang, H. (2016). Blockchain Challenges and Opportunities: A Survey.