Find Online Tutors for Homework Help

  • The Technological Innovations and the Business Strategy of BBC

    Over the years, the company grew from a single person entity to one that employs people in the thousands and spans across the globe in its operations. (Briggs, 1985) The BBC is well known for its record of impartiality and independence in reporting and coverage of news events. Though there has been some criticism in the recent past about the way in which it has handled some events, nonetheless, on the whole, the record of BBC has been relatively unblemished. The BBC is a pioneer in terms of launching a global news channel covering almost all regions in the world. To quote from the profile of BBC on its website,…

  • Strengths and Weaknesses Urban Planning in Australia

    Government and urban authorities formulate programs aimed at improving the urban environment and promoting given economic and social goals. Since ancient times, as depicted by the ruins of ancient cities, urban planning has been practiced with well-organized streets, water and sewage systems, and walls. For example, during the Renaissance, European city areas were carefully and scientifically planned to allow movement of the populace, and the city walls were strongly fortified for security reasons (Grogan Proscio, 2001).Modern urban planning and reconstruction programs were largely shaped by the events of the Industrial Revolution, especially the disorder and squalor of the slums. These events challenged governments and urban planners to come up with…

  • Extreme Makeover as a Reality Show

    “Recently, televised ‘makeovers’ – in which a member of the public is plucked from obscurity and transformed, by virtue of clever hair, make-up and style consultants, into a glamorous creature – have become popular. Makeovers have now become almost ubiquitous, with a rash of television programmes portraying the results of makeovers not only on a personal appearance but also on their homes, gardens and even their cooking skills. Documentaries that follow the progress of raw recruits into shining professionals also reflect the concept of change and metamorphosis inherent in makeovers” (Gillen, 2001). Playing to the modern culture’s Cinderella dream for a better future and our insecurities regarding who and what…

  • The Technological Innovations and the Business Strategy of BBC

    Over the years, the company grew from a single person entity to one that employs people in the thousands and spans across the globe in its operations. (Briggs, 1985) The BBC is well known for its record of impartiality and independence in reporting and coverage of news events. Though there has been some criticism in the recent past about the way in which it has handled some events, nonetheless, on the whole, the record of BBC has been relatively unblemished. The BBC is a pioneer in terms of launching a global news channel covering almost all regions in the world. To quote from the profile of BBC on its website,…

  • Strengths and Weaknesses Urban Planning in Australia

    Government and urban authorities formulate programs aimed at improving the urban environment and promoting given economic and social goals. Since ancient times, as depicted by the ruins of ancient cities, urban planning has been practiced with well-organized streets, water and sewage systems, and walls. For example, during the Renaissance, European city areas were carefully and scientifically planned to allow movement of the populace, and the city walls were strongly fortified for security reasons (Grogan Proscio, 2001).Modern urban planning and reconstruction programs were largely shaped by the events of the Industrial Revolution, especially the disorder and squalor of the slums. These events challenged governments and urban planners to come up with…

  • Extreme Makeover as a Reality Show

    “Recently, televised ‘makeovers’ – in which a member of the public is plucked from obscurity and transformed, by virtue of clever hair, make-up and style consultants, into a glamorous creature – have become popular. Makeovers have now become almost ubiquitous, with a rash of television programmes portraying the results of makeovers not only on a personal appearance but also on their homes, gardens and even their cooking skills. Documentaries that follow the progress of raw recruits into shining professionals also reflect the concept of change and metamorphosis inherent in makeovers” (Gillen, 2001). Playing to the modern culture’s Cinderella dream for a better future and our insecurities regarding who and what…

  • Writtint1

    AbstractWe design an software to find optimal(shortest) path on the University of Minnesota map by using the A* algorithm. Using GUI (Graphical User Interface) to visualize the path on the map and print the list, which contains the transient nodes. It is definitely efficient way for students to make route planning in the campus. The approach supports that query the shortest path and manage the time in the campus. Maps are kind of diagrammatic form that represents physical features such as buildings and roads, and maps play an essential role in the development of civilization. Most of people are familiar with using maps to find routes and locate their position…

  • Week5AssignmentGroupAtRiskSpecializationMindMap

    Week 5 Assignment Group At Risk Specialization Mind MapThis assignment provides the opportunity for you to specifically plan the Final Project in Week Six by brainstorming and outlining each required component of your website using a mind map. For this assignment you will select a specific group at risk as a specialization. There are additional groups identified this week and listed as recommended resources to select from. These groups include child immigrants of Central America, homeless veterans, and sub-groups relating to poverty. You may also elect to focus on one of the groups or a sub-group of those already researched during Weeks One thru Five, which comprise the sections of…

  • TrainingandDevelopment

    Benchmark Assignment: Training and DevelopmentGrand Canyon University: HRM 635May 20, 2020                                                                  Benchmark Assignment – Training and DevelopmentThe Force Support Squadron (FSS) has a responsibility to provide military and civilian personnel with Airman and Family Support Services (AFS&S). This is done by providing career enhancement, professional military training, and quality of life programs. The organization’s objective is to ensure its continued success during a crisis, as well as day-to-day operations.Goal: Improve Effectiveness of TrainingThe goal for the FSS is to ensure fundamental procedures are improved, once training has been revamped. Foremost, squadron commanders will be charged with ensuring their squadrons completion of duties, qualifications, additional tasks, and ancillary training. This will allow…

  • Task2Instructions

    In this task, you will address the real-world business situation that you identified in task 1. Using relevant data you have gathered, analyze the data and recommend a solution. This recommendation will be included in a report that you will write, summarizing the key details of your analysis. Note: You must successfully pass task 1 before work on task 2 is started. Approved data analysis techniques for this task include the following: Recommended Analysis Techniques: regression (linear regression, multiple regression, or logistic regression) time series or trend analysis (regression, exponential smoothing, or moving average) chi-square t-test ANOVA crossover analysis break-even analysisAdditional Approved Analysis Techniques: statistical process control linear programming decision…

  • Task1template

    Data Driven Decision MakingTemplate Student name: ID number: Date: 13/8/2018 PROMPT RESPONSE B. Describe a real-world business situation that could be addressed by collecting and analyzing a set of data. Poor corporate governance in the U.S is of concern to businesses as it could lead to heavy fines disrupting a business. Financial institutions are experiencing huge fines for failing to adhere to the required standards and regulations. Poor corporate governance costs the financial institutions over $150 billion since 2009. B1. Summarize one question or decision relevant to the real-world business situation you will answer by collecting and analyzing a set of data. What is the effect of shady dealings in…

  • Milestonethree

    CONTINUOUS MONITORING PLANChaston CarterHuman Factors in Security03/25/18Continuous monitoring is one of six stages in the Risk Management Framework portrayed in NIST Special Publication 800‐137. The motivation behind a Continuous monitoring project is to figure out whether the entire arrangement of planned, required, and conveyed security controls inside a data framework or acquired by the framework keep on being compelling after some time in light of the inescapable changes that might happen. Nonstop checking is a vital action in surveying the security impacts on a data framework coming about because of arranged and spontaneous changes to firmware, the programming, or environment of operation (Whitman & Mattord, 11 May 2016). Overall security…

  • MIlestonefour

    Communication Security PlanSouthern New Hampshire UniveristyChaston CarterHuman Factors In Security04/08/2019Communication Security PlanIn every organization small or large there is need to create a value of its data and one way to this is through ensuring that the workforce understands and knows what kind of threats can be encountered. It also includes the measures which can be undertaken to protect against them. However several organizations have encountered high-ends of data breaching hence left with millions of credentials stolen. Due to this issue, most organizations invest heavily towards implementing cybersecurity laws and education programs for training employees in understanding how to protect their personal information and organization computers. They also train them…

  • Milestone3

    IT 600 Final Project Milestone Three Template: Full Organizational ProfileChaston Carter GPOS Feature Profile Criteria Student Analysis Multiprogramming Tech Description This is a basic system of parallel processing in which several programs are executed simultaneously on a uniprocessor.  Since the operating system has only one processor, it will only execute only one of the programs at a time though the user sees as if all the programs are running at the same time.  If the machine has the capability of causing interruption to the system, then the operating system will run one program and then execute the other after a given time. For a system with the capability of protecting…

  • Milestone2

    Milestone Two: Analytical Organizational ProfileInstitution AffiliationChaston Carter1/13/19 GPOS Feature Profile Criteria Student Analysis Multiprogramming Tech Description Multiprogramming can be expressed as the rapid movement which exists between the processes in a CPU which is used in executing the program processes which are running in the operating system. Business Requirement If multiprogramming is not applicable in a system, the business operations will be affected since employees who are based in workstations will not have the ability of running numerous programs at once which in turn limits the organization’s operational productivity (McHoes, & Flynn, 2018). Multiprocessing Tech Description Multiprocessing is expressed as the utilization of two CPUs or more in a computer…

  • Decision Tree Analysis

    Please see Scoring Guide Attachment and example data sets are linked below!CompetencyExplain the use of classification analysis in data science.ScenarioSprockets Corporation designs high-end, specialty machine parts for a variety of industries. You have been hired by Sprockets to assist them with their data analysis needs. Sprockets Corporation management would like more insight to their sales data. You have been directed to perform a decision tree analysis between the sale price and the related product features to provide a different insight into the predictive power of these variables. Use two separate packages for your analysis: the Python programming language and Python module: docclass.py from “programming collective intelligence” and the R Programming…

  • Summarize the videos (at least 500 words)

    Using your own words (at least 500 words), write a response to the videos uploaded. In your response summarize the videos and mention what have you learned about HMI and its programming? Include at least one figure in your response. 5 videos:1. https://www.inductiveautomation.com/resources/article/what-is-hmi2. https://www.youtube.com/watch?v=kujHQgK352o3. https://www.youtube.com/watch?v=oowpRI2ms484. https://www.youtube.com/watch?v=tWBez-e-5oQ5. https://www.youtube.com/watch?v=H46A833p2f009/05/202020engineering

  • Discussion Post Help

    Discussion: Spurious Correlations and Extraneous VariablesCorrelational research describes relations among variables but cannot indicate that one variable causes something to occur to another variable. Rather, a statistically significant correlation coefficient simply indicates there is a relation among a predictor variable and an outcome variable.In correlational research, if there is a statistically significant correlation coefficient between two variables, you want to know that the relation truly exists. This goal is challenging to achieve because other variables that you are not studying may complicate the study and the interpretation of the results.You may find a spurious relation in which one common causal variable, sometimes referred to as a third variable, is responsible…

  • PRG/420 Java Programming Discussion

    Respond to the following in a minimum of 185 words:Loops are used frequently in coordination with arrays.Explain how loops and arrays go hand in hand and how difficult some array processes would be without the use of loops. Are some loops better to use with arrays than others? Provide a code example that supports your comments.20/05/20205informationsystems

  • PRG/420 Java Programming 4 LABS

    (LAB 1) Count input length without spaces, periods, or commasGiven a line of text as input, output the number of characters excluding spaces, periods, or commas.Ex: If the input is:Listen, Mr. Jones, calm down.the output is:21Note: Account for all characters that aren’t spaces, periods, or commas (Ex: “r”, “2”, “!”).(LAB 2) LAB: Output range with increment of 10Write a program whose input is two integers, and whose output is the first integer and subsequent increments of 10 as long as the value is less than or equal to the second integer.Ex: If the input is:-15 30the output is:-15 -5 5 15 25Ex: If the second integer is less than the…

  • PRG/420 Java Programming 4 LABS

    (LAB 1) Mad Lib – LoopsMad Libs are activities that have a person provide various words, which are then used to complete a short story in unexpected (and hopefully funny) ways.Write a program that takes a string and integer as input, and outputs a sentence using those items as below. The program repeats until the input string is quit 0.Ex: If the input is:apples 5shoes 2quit 0the output is:Eating 5 apples a day keeps the doctor away.Eating 2 shoes a day keeps the doctor away.Note: This is a lab from a previous chapter that now requires the use of a loop.(LAB 2) Varied amount of input dataStatistics are often calculated…

  • “Analyzing &amp

    Visualizing Data – discussion Post”Initial PostR is a language and environment for statistical computing and graphics. It is aGNU projectwhich is similar to the S language and environment which was developed at Bell Laboratories (formerly AT&T, now Lucent Technologies) by John Chambers and colleagues. R can be considered as a different implementation of S. There are some important differences, but much code written for S runs unaltered under R.Why are statistical programming languages important to data scientists?What are someadvantages and disadvantages the R programming language hasover the other main statistical programming languages (i.e.Python,SAS,SQL)?Reply PostWhen replying to a classmate,offer your opinionon what they posted comparing the R programming language to the…

  • Working with Scratch

    Hide Assignment InformationInstructionsGetting Started:In this assignment, you will get to experiment with and animation and game development program called Scratch.Scratch offers an easy interface to develop fun animations.As you get to know the program, you will soon realize that it is also capable of many, more interesting and advanced features.Let’s get started: Go to Scratch. Create an account so you can access all resources. Click on “Explore” and choose a few programs. Run them to get a taste for what you can do using Scratch. Look for the “Look Inside” button where you get to see the code behind each program. Click on Create and follow the prompts on how…

  • Discussion Board 2 OOAD

    300 WORDSAssignment DetailsYou are trying to decide the best methodology to approach developing your online product ordering system. You have heard that using object-oriented programming will save you time and allow you to reuse many of the functions that you develop for this application. You also recognize that there will be requests for future functionality to be added to this ordering application after you launch the first version.You have decided to evaluate the similarities and differences between structured procedural programming and object-oriented programming (OOP). You also are looking at how the object-oriented concepts can enhance your overall design and development of this application.Using the online library, the Internet, and all…

  • Linear Programming using Excel

    Read Balakrishnan, chapter 3 and work through the Fifth Avenue Ties (product mix), Win Big Gambling (marketing mix) and International City Trust (portfolio selection) problems in the chapter.30/04/202020mathematics

  • Programming c

    read the instruction and write a c programming.only one main.cpp no header files needed.there is a templet you are going to start with.there is also an example of 3×3 game you can get some references.do as it says.need explanations and do not write very lengthy code please.as compact as it can be.19/05/202050computerscience

  • 2 Semester 7th Apa

    Please explain what each of the following courses mean to me within my nursing career and how I wasable to apply the various BSN essenals through the compleon of various course assignments andclinical pracce experiences. I have aached the BSN essenals as well as a course descripon for eachcourse. The paper needs to be 2 pages in length, re#ecng on each class. The descripon of each class islisted below along with an explanaon of each BSN essenal. Ulize as many BSN essenal as possiblefor each course reflection.I need the assignment by 10am tomorrow morning1 pages minimum12 Point Font (Times New Roman)Semester 2Care Management IINursing care management of diverse adult and…

  • Early Childhood Research Assignment

    In this assignment, you will use the following transferable skills: Communication Critical thinking Information literacyThis assignment will demonstrate your ability to make sophisticated use of information, including primary source material. In addition, your synthesis and/or evaluation skills will be combined with your knowledge, application, and/or analysis skills. This will be demonstrated by connecting research articles on child development theory and best practices with an explanation of how the findings can strengthen the early childhood field.To complete this assignment, do the following: Review research studies from the last 5 years related to the following: Review two (2) research studies related to how teaching practices support high-quality programming for children and families.…

  • Arraybased Application Programming

    General description: A tiny Lotto system allows up to 1000 people play “lotto”. This system provides some functions to facilitate lotto players to check their game status and get more information of lotto playing statistics. To simplify the system, we generate random data to mimics the lotto drawing, and we also use random data instead of real game data taken from lotto players. The lotto drawing is a process when the system randomly generates winning numbers, which is a list of 8 distinct integers from a barrel of 30 integer numbers (i.e., all numbers are between 1 and 30, inclusive). These 8 winning numbers are divided into two parts: the…

  • Java programming assignment

    marking guide.Purpose of the systemNot attempted0pointsHas little explanation of classes and system1pointsExplanation has information about all the classes and their relatio ship. Has explanation about what system can accomplish after implementation2pointsClass DiagramNot attempted0pointsClasses are designed but there is no relationship between them2pointsClasses and relationships are created but have minor issues 3pointsClasses and relationshisps are perfectly done4pointsPerson ClassNot attempted0pointsMajor issues or misisng more than one from constructor, getter, setter and toString()2.5pointsAny one of constructor, getter, setter, toString() is missing or have some issues or incorrect4pointsHave appropriate constructors, getter, setter and toString() method5pointsCustomer ClassNot attempted0pointsMajor issues or misisng more than one from constructor, getter, setter and overridden toString()2.5pointsAny one of constructor, getter,…

  • Programming assignment

    Enhance and correct a Tic Tac Toe game. The game is intended to be played against a computer.The object TicTacToeBoard is initialized to indicate if the computer is the player 1 or player 2. Your task is to allow turns between the player and computer and to determine if a winner exists.Keyboard input implies using the Scanner object.Review Section 7.7 in the textbook.Ideally, do 1 task at a time and test the results. The tasks are arranged so that the previous work will help with your testing.The TicTacToeBoard class uses a Character class which is a wrapper class for char. It allows for the value null. Thus, the board values…

  • Programming code org Flappy Bird video review 2

    https://ohlone.instructure.com/courses/10551/discussion_topics/150353Posted: 11 hours agoDue: 28/04/2020Budget: $6Tags: science computerAnswers 0Bids 62MusyokionesRanchoddas Chanchad PhDDr shamille ClaraWIZARD_KIMSasha SpencerEssay-tutorPROVEN QUALITY RESPECT WRITEREmily MichaelBrainy Brianmichael smithPaula HogAgher EditorPROF washington watsonCatherine OwensTiny ChrisMichelle OwensTutor Cyrus KenUNDISPUTED GEEKJenny BoomJessica Luisbrilliant answersCasey Celiaprof avrilNursing_MissCotton CandyChrisProfSaburBAll Works solveransRohanEva Greensmart-tutorDrNicNgaoDr_Hakuna_MatataWendy LewisProf.MacQueenseniorwriterkim woodsAbdullah AnwarRey writerJudithTutorDr.HoorainAmerican TutorperfectoSaad FahimJen Tech1phyllis youngToniskyPROFJUMAAAshujatElprofessoriHarris KhansuniyaziaMiss_AqsaElaine CarterTutor-paulaHawks EyeHurairaPROF. ANNPhyill Youngfirstclass tutorMiss_AmericanOther questions 10Economics HWStats Homework for Writer A_management.memo1 page due tomorrow 10pmreading home work helpDigital Literacy and Application software ( INSS )Hardware 4aNot ratedProgramming – code.org Flappy Bird reply 2https://ohlone.instructure.com/courses/10551/discussion_topics/15035328/04/20206computerscience

  • Intro to database

    Describe Microsoft Access and its components (tables, relationships, forms, queries, reports). Distinguish key differences between ACCESS and EXCEL. Give a brief overview of the case study. Evaluate the ACCESS features that enabled Ken Steward to develop the daily product inspection database without programming experience or expertise. Explain the responsibilities of a database administrator as they relate to assuring data security and integrity. The Essay must be 4-5 pages long. Double Space. Must have an introduction with a clear thesis statement, three to four main points and a conclusion Conduct research to find relevant information using reliable sources to support your views. Use at least 2 academic books and 3 scholarly…

  • PRG/420 Java Programming Discussion

    Respond to the following in a minimum of 180 words:Most programming languages provide loop statements that help users iteratively process code. In Java, different loop types exist.Explain the different types of loops presented and situations where each type can be used. Provide code examples to support your comments.13/05/20206informationsystems

  • PYTHON programming

    This assignment has three problems, worth a total of 26 points.• Removing Vocals (6 pts): Write a function to remove the vocals from a sound object.• Fading (16 pts): Write functions to add a fade-in and fade-out effect to a sound object.• Panning (4 pts): Write a function to add a panning effect (from left to right) to asound object.Before you start coding, make sure you read through this whole document. If any of the instructions aren’t clear, feel free to ask about it on Piazza (use the psa2 folder).At the end of the document is a reference section on using the sound module that you may want to use…

  • Intro to programming and logic

    Programming languages can be classified in different ways. Describe a classification of programming languages and explain which type of programming language(s) you find most effective and why.Example programming language types: Imperative, Functional, Logical and Object-Oriented.Writing requirements: The Essay must be at least 3 pages long. Double Space Must have an introduction with a clear thesis statement, a body discussing the three main points and a conclusion Conduct research to find relevant information using reliable sources to support your views. (Use at least 2 academic books and 3 scholarly articles from a library database Use APA Style for in-text citations, and referencesAPATemplatesandMaterials-20200324.zipPosted: an hour agoDue: 26/04/2020Budget: $10Tags: due sunday Answers 0Bids 95MusyokionesGabriella Malkabdul_rehman_Quickly answer…

  • C Programming

    Organization ABC is taking online orders from its customers. Save the following information for each order:- OrderID (Auto incremented)- Customer name- Address- Number of items in the order- Payment of orderOrders will be processed on first come first server basis25/04/20202computerscience

  • AVD2

    APA formatted research paper on the following topic: Why are statistical programming languages important to data scientists? What are someadvantagesanddisadvantages the R programming language hasover the other main statistical programming languages (i.e.Python,SAS,SQL)? Must include 3 peer reviewed references. Must be 4 and half page paper.13/05/202020engineering

  • TV shows writing

    For this assignment you will develop a list of what you consider to be the 10 best prime-time television series of all time (excluding sporting event series like Monday Night Football / but streaming feature series from places like Netflix are acceptable). The essay you submit should start with a numbered list of these series along with the years each program was originally broadcast. When compiling your list, be sure you are clear on the meaning of the term “television series.” Individual events and single episodes are NOT series. Also, the list of series should be your own, using your own selection criteria. You should not simply locate a similar…

  • Create an Algorithm Using Pseudocode

    You work in the IT group of a department store and the latest analytics shows there is a bug that allows customers to go over their credit limit. The company’s president has asked you to develop a new algorithm to solve this problem.Createyour algorithm using pseudocode in Coral Language (https://corallanguage.org/simulator/) that determines if a department store customer has exceeded their credit limit. Be sure you gather the following inputs from the user: Account number Balance of the account Total cost of all the products the customer is looking to purchase Allowed credit limitAfter you gather the inputs, make sure your algorithm calculates if the user can purchase the products and…

  • Week 4

    FOLLOW RUBRIC & READINGS–Differentiating between a developmental delay and a learning preference is an important investigational skill early childhood teachers need to have in their tool belt. Professionally communicating this information to families is an integral part of the process. It can be difficult to communicate sensitive information with families, so it is best to be prepared prior to meeting.For this assignment, imagine you are the teacher in a four-year-old preschool classroom, and you have three students whose behaviors concern you:Billy is a four years and eight months old boy. He is the youngest of three at home and loves cars. You are noticing linguistically that Billy is still using…

  • Write a response to the following question

    How do we reconcile motivation, striving towards self-actualization, and waiting on the will of God?250 wordsPosted: 5 hours agoDue: 09/03/2020Budget: $25Tags: no tagAnswers 0Bids 102Miss HilaryRewrick PatandGuru OliviaWORDPOWERDr.ManahilESSAYS EXPERT PROFESSORProf Double RMiss AmoraThe grAdeQuality AssignmentsTeacher TrumahnNora WilliamPHD doctorateMadem_JenniferAmanda SmithQuickly answer Dr. RocalDr_inaayabennetsandovaMEERAB NAEEMHomework ProMath GuruuUSH soluTionsRanchoddas Chanchad PhDEssays Gurusuraya_PhDProCastrol01prof. SpeedstarPROF_TOMMYAsad UllahPaula HogElprofessoriMichelle OwensDr_BiyaBridget YoungJessica Luisimhmd.fmichael smithhassan0906Catherine OwensWendy Lewisabdul_rehman_Prof.MacQueenprofessor mitchprof avrilDr shamille Clarakim woodsbrilliant answersRey writeransRohanTerry RobertsperfectoAmerican TutorBRENDAH LEEDr Candice_2547Angelina MayEmily MichaelEmily ClareBrilliant GeekChrisProfMiss ProfessorProf. Kaylinlopezwork solutionsEva GreenDrNicNgaoRESPECT WRITERAdrian MonroeCasey CeliaTutorJoeKimUrgent TutorMathStat Geniusphyllis youngSophia MilesMalik TutorRyan GoslingQuickstack001seniorwriterSaburBMiss_iqra_A Colossal Geniusmadam excellentSaad FahimNursing_MissSasha SpencerTiny ChrisTutor Cyrus KenJenny BoomLiza_JulietPROFJUMAAAfirstclass tutorDr. ElahiA-Grade WritersuniyaziaDr R Judy MarkMiss Emily BluntMiss Lily J.Expert_ChristineSmarticianTop Notch AnswernyamaimuleTutor-paulaBismillahOther questions 10outlineHumanities – Pursuit of HappinessLaw…

  • DQW9

    Discussion: Legal and Ethical ConductAs emphasized in this week’s media presentation, all nurses need to be familiar with the laws and regulations that govern their practice: their state’s Nurse Practice Act, ANA’s Nursing: Scope and Standards of Practice, specialty group standards of practice, etc. In addition, basic ethical principles guide nurses’ decision-making process every day. ANA’s Code of Ethics and ANA’s Social Policy Statement are two important documents that outline nurses’ ethical responsibilities to their patients, themselves, and their profession. This said, there is a dilemma: The laws are not always compatible with the ethical positions nurses sometimes take. This week’s Discussion focuses on such a dilemma. To prepare:Review this…

  • Java assignment1

    Exercise 24.3: (pg no. 971)(Implement a doubly linked list) The MyLinkedList class used in Listing 24.5 isa one-way directional linked list that enables one-way traversal of the list. Modifythe Node class to add the new data field name previous to refer to the previousnode in the list, as follows:public class Node<E< {E element;Node<E< next;Node<E< previous;public Node(E e) {element = e;}}Implement a new class named TwoWayLinkedList that uses a doubly linked listto store elements. Define TwoWayLinkedList to implements MyList. You needto implement all the methods defined in MyLinkedList as well as the methodslistIterator() and listIterator(int index). Both return an instance ofjava.util.ListIterator<E< (see Figure 20.4). The former sets the cursor tothe head…

  • Computer science Python essay

    Assignment Content In this course, you have learned that computer programming is key to computer science. The ability to program a succession of instructions to resolve a computing problem is a valuable skill that is integral to many aspects of modern life. You have also seen the versatility and distinguishing characteristics that make Python 3 a popular choice for programmers.End-of-Course Essay Write a 1- to 2-page essay in which you connect this course to your own career or personal life. Imagine the audience for this essay is someone interested in finding out about your experience with this course and the programming language.An essay is a short composition on a particular…

  • 5Step

    Assignment StepsResources: Marketing: Ch. 2: pg. 40-46, 54-69; Ch. 3: pg. 72-92; Ch. 8: pg. 207-227; Ch. 9: pg. 242-257Scenario: You are the marketing manager for a local nonprofit charity whose funding is based on membership fees. You’ve noticed a severe drop in new memberships and a decline in repeat memberships, which is threatening your organization’s ability to survive and grow. You have decided to implement the Five-Step Marketing Research Process to help understand the problem and create solution strategies to implement.Createa10- to 20-slide (not counting the cover slide and reference slide) Microsoft®PowerPoint®presentation with speaker’s notes on the Five-Step Marketing Research Approach detailing how you will use each step to…

  • Networks healthcare into data bases 3b

    Attached.questions to answer: 11-1,5pgs long.Thank you.8F13B426-DC67-48F9-B8A7-962A73FEBC5D.jpeg6ACD4DA4-6254-4775-AF3A-839F23CF6CEA.jpegPosted: an hour agoDue: 19/12/2019Budget: $20Tags: asapurgent Answers 1CLASS_PROFF (Not rated)4.5 (1)Chatan hour agoPurchase the answer to view itTry it first(plagiarism check)Buy answer $40Bids 51Dr CloverMukul5078ESSAYS EXPERT PROFESSORQuality AssignmentsPaula HogSplendid TutorDr Ava_MiaLilliana_Smithprofessor mitchDr Candice_2547Catherine Owensbrilliant answersJessica LuisRey writerProf.MacQueenEmily Michaelsarapaul2013computerscienceRESPECT WRITERDrNicNgaouniversity workMiss ProfessorWendy Lewisimhmd.fhassan0906kim woodsJenny Boomprof avrilTerry RobertsGradeSaverAngelina Mayperfectojim clairephyllis youngUrgent TutorStano 001ansRohanTopanswersYoung Kim hoodsChrisProfJamie AckerUmair_ArifTalentedtutorfastestwriter1Saad FahimKaya ScodelarioLiza_JulietSaburBAZHARAKRAM300CLASS_PROFFUnique_ProfOther questions 10rewrite these answers in a completely diffrent way FIN515 – Week 5 – Problem Setas discussedLearning Assessment System Assignment (LASA) 1: Team Performance Report A little help with Javascript/htmlwritingexcelsiorsstatistics HW due in 15 Hours programming MKT question 5Quality at the JobBlog ArchiveCopyright © 2019 HomeworkMarket.com Read MoreApplied SciencesArchitecture and DesignBiologyBusiness & FinanceChemistryComputer…

  • Enterprise system java programming

    Please do part 3/5/6 9f the parts attached. Thanks youMITS5502_Project_40.pdfProjectPart_1.zipProjectPart_2.zipProjectPart3.zipPosted: a year agoDue: 24/10/2018Budget: $25Answers 0Bids 42PROF washington watsonPROF_TOMMYfarhatullahPaula HogUSH soluTionsBethuel BestkatetutorJenny BoomMich MichieAabish Aabidahbrilliant answerswizard kimThe grAdework solutionsMadam A plusguru answersAsad UllahPhd christineChrisProfWendy Lewisbest tutor 2014Computer_Science_ExpertMiss ProfessorUltimate GEEKFLOVODOHDr. Claver-NNGoodwriterDr.Qura-tul-ainDr NawazishsmartwriterAngelo GrahamsAs soon as PossibleProf. TrevorsamGood studyTeacher TrumahnNora WilliamThiagoPapersGuruCarla BunnieDrNicNgaoDexterMasterskingzeroOther questions 10read instructions pleaseCyber Security Graduate Level Phase 4 and JournalHelp with Assignment In Telecommunications and Network Security W4 journal Murphy Visits Your Projectweek 7 Extra Creditwk6PP( need ALL instructions followed correctly)CIS 462 Case Study 2: SCADA WormCover LetterNot ratedHelp with java codeI need help fixing the errors in thecode for the database in my program that it is due tonight. Not ratedInformation…

  • M4Discussion

    M4 Assignment 1 DiscussionDiscussion Topic Due March 3 at 11:59 PMAssignment 1: Discussion QuestionTo extend its international presence, Martinetti International has formed an expansion strategy focused on acquiring other like enterprises outside the European region. Martinetti, a subsidiary of a publicly owned parent company, is based in Rome where it enjoys an established brand name and superb reputation. As part of Martinetti’s globalization strategy, it has acquired Sand Coast Resort Group located in the heart of Chinatown, Singapore. Both hotel enterprises share common business values and excellent reputations, and offer high-end luxury accommodations for the local businessman and international traveler. The acquisition offers Martinetti ownership of the Sand Coast brand,…

  • “Benchmark Patient&#x27

    s Spiritual Needs: Case Analysis”Details:In addition to the topic study materials, use the chart you completed and questions you answered in the Topic 3 about “Case Study: Healing and Autonomy” as the basis for your responses in this assignment.Answer the following questions about a patient’s spiritual needs in light of the Christian worldview. In 200-250 words, respond to the following: Should the physician allow Mike to continue making decisions that seem to him to be irrational and harmful to James, or would that mean a disrespect of a patient’s autonomy? Explain your rationale. In 400-500 words, respond to the following: How ought the Christian think about sickness and health? How…

  • 40 Question quiz

    “B movies” were usually more prestigious movies that also cost more to make than other feature films.a. Trueb. FalseWhich of these court cases would play an enormous role in the breakup of vertical integration in Hollywood?a. United States vs. Paramount. This case made it illegal for studios to own every part of the production and distribution process.b. United States vs. Fox. This case set a minimum percentage of profits that studios had to pay actors.c. United States vs. RKO. This case made it illegal for film studios to act as distributors without also owning stakes in the production process.d. United States vs. MGM. This case imposed sanctions on studios that…

  • Os Scheduling

    SMP5: Scheduler with Signals============================This MP is a variation of SMP4.In the last MP, we built a simulated OS process scheduler. The scheduler canhold only a certain number of processes (workers) at one time. Once the processhas been accepted into the scheduler, the scheduler decides in what order theprocesses execute. We implemented two scheduling algorithms: FIFO and RoundRobin.In this MP, we are to simulate a time-sharing system by using signals andtimers. We will only implement the Round Robin algorithm. Instead of usingiterations to model the concept of “time slices” (as in the last MP), we useinterval timers. The scheduler is installed with an interval timer. The timerstarts ticking when the scheduler…

  • PRG/420 Java Programming 3 LABS

    Edit: Make sure to use the starting code found within the attached LAB Images.The code assignments have to be pasted into the LabProgram.java box for grading and the starting code can not be changed.(LAB 1) Exact ChangeWrite a program with total change amount in pennies as an integer input, and output the change using the fewest coins, one coin type per line. The coin types are Dollars, Quarters, Dimes, Nickels, and Pennies. Use singular and plural coin names as appropriate, like 1 Penny vs. 2 Pennies.Ex: If the input is: 0the output is: No changeEx: If the input is: 45the output is: 1 Quarter2 Dimes(LAB 2) Leap YearA year in…

  • PRG/420 Java Programming 3 LABS

    Edit: Make sure to use the starting code found within the attached LAB Images.The code assignments have to be pasted into the LabProgram.java box for grading and the starting code can not be changed.(LAB 1) Smallest NumberWrite a program whose inputs are three integers, and whose output is the smallest of the three values.Ex: If the input is: 7 15 3the output is: 3(LAB 2) Interstate Highway NumbersPrimary U.S. interstate highways are numbered 1-99. Odd numbers (like the 5 or 95) go north/south, and evens (like the 10 or 90) go east/west. Auxiliary highways are numbered 100-999, and service the primary highway indicated by the rightmost two digits. Thus, I-405…

  • InfoTech Import in Strat Plan (ITS83131) (Phd Information Technology)

    Note :Discussion is already submitted and I need to responses for my friends postingsDiscussion 1 (Week 1): Business Strategy Options Menu: Forum Why is it important for business strategy to drive organizational strategy and IS strategy? What might happen if the business strategy was not the driver?Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:Ask an interesting, thoughtful question pertaining to the topicAnswer a question (in detail) posted by another student or the instructorProvide extensive additional information on the topicExplain, define, or analyze the topic in detailShare an applicable personal experienceProvide an outside source (for example, an article…

  • Research Paper

    I attached the files for the PaperEssay3.docxInstructions.docxPosted: 20 hours agoDue: 24/04/2020Budget: $25Tags: PaperAnswers 1College Research (Not rated) (Not rated)Chat17 hours agoPurchase the answer to view itAnswerDocument.docxTry it first(plagiarism check)Buy answer $15Bids 73MusyokionesTeacher TrumahnQuickly answer Daniel JohnsonWIZARD_KIMDr. ElahiGabriella Malkmichael smithDr. BeneveMalik Tutoruniversity workabdul_rehman_Agher EditorRanchoddas Chanchad PhDAsad UllahDr.Qura-tul-ainElprofessoriRESPECT WRITERJenny BoomRihAN_MendozaRosie SeptemberEmily MichaelUNDISPUTED GEEKStano 001Tiny ChrisSasha SpencerMathStat GeniusJessica Luishassan0906ProCastrol01professor mitchimhmd.fGuru OliviaChrisProfDrNicNgaoAll Works solverNursing_MissTutor Cyrus KenEva GreenDexterMasterskim woodsProf.MacQueenYoung Kim hoodsCasey CeliaProff work phd TutorJoeKimBrilliant Geeksmart-tutorprof avrilCotton CandyansRohanwork solutionsrunge-kutta acerMichelle OwensAbdullah AnwarSaad FahimWendy Lewisfirstclass tutorJen Tech1SaburBTerry Robertsmagz64Harris KhanAdrian MonroesuniyaziaMiss_AqsaTutor-paulaElaine CarterGuruWriter24Hawks Eyejohnmutuajmabookideakatty_julietOther questions 10Java Programming IIAlgebra assignmentHelp nowCIS-518 week6 case study 1Unit4 – Individual Projectweek 7 vict.Intelligence and CounterintelligenceBLOG POSTPRG420 (Version 10) – Week 2 DQ 2- An A Work!!!Research PaperNot…

  • FinalExam

    Final ExamJava Object Oriented Programming Instructions: Answer the questions with the best answer provided.  This exam should be completed independently.  Please do not seek answers from other students. The questions are multiple chose and fill in the blank. When you complete the exam save the file as LASTNAME_FinalExam.doc. Email the file to stevegr@wuv.edu when complete. Submission Deadline: You have until 1159PM on 5/12/2020 to submit the exam for a full grade. 1. The following could be considered a category of objects. This entity defines all of the common properties of the object that belong to it:a. Stackb. Classc. Pointerd. Queue2. A class consists of the following elements:a. Graphs and Treesb.…

  • FinalEssayv3_Binay

    Recommendation Essay: Emergency Response Challenges in Natural DisastersThe[WLB1] emergency response is an immediate priority after natural disasters to provide emergency first aid and medical services to injured persons as a way of mitigating the effect of the hazardous event on people and the environment. Arranging for housing, food, water, and medications precedes the top priority of searching-and-rescuing as well as lifesaving medical triage. Natural disasters and multifaceted emergencies such as earthquakes, droughts, floods, snowstorms, and frost waves pose weighty effects on the household food security and nutrition status of affected population groups (De Haen, and [WLB2]Hemrich). The natural disasters emergency response faces a major challenge of food insecurity. Even without…

  • DBM405_Milestone6_

    04/14/2019DBM405AWeek 1Order Management DatabaseThis project is to manage customers and the orders they place online for a local company. The company’s employees are responsible to manage the order. The purpose of the project is to take orders online by the customers and maintain their information in the system. The system will also maintain the details of the current employees. Order information is maintained in the system that can be shipped to the customers. This allows the company to expand beyond just a store front and to keep a better track of customers’ information and what they order.The system will maintain the information about the customers, orders, order details, items, and…

  • Chpt12

    CHAPTER 12 Managing SystemsSupport andSecurityChapter 12 describes systems support and security tasks that continue throughout the useful life of the system. In addition to user support, this chapter discusses maintenance, security, backup and disaster recovery, performance measurement, and system obsolescence. Explain the systems support and security phase Describe user support activities, including user training and service desks Define the four types of maintenance Explain various techniques for managing systems maintenance and support Describe techniques for measuring, managing, and planning system performance Explain risk management concepts Assess system security at six levels: physical security, network security, application security, file security, user security, and procedural security Describe backup and disaster recovery List…

  • Chapter08

    Essentials of Organizational Behavior, 14e (Robbins/Judge)Chapter 8 Motivation: From Concepts to Applications1) With reference to the job characteristics model, which of the following defines skill variety?A) the degree to which a job requires completion of a whole and identifiable piece of workB) the degree to which work activities generates direct and clear information about performanceC) the degree to which a job provides the worker freedom in scheduling and procedureD) the degree to which a job has an impact on the lives or work of other peopleE) the degree to which a job requires a variety of different activitiesAnswer:  EExplanation:  E) The job characteristics model (JCM) describes jobs in terms of…

  • Ch 2

    Crime Waves, Fears, and Social RealityThe American criminal justice system is a mirror that shows a distorted image of the dangers that threaten us—an image created more by the shape of the mirror than by the reality reflected.—Jeffrey Reiman and Paul LeightonFor decades, polls have found that people in the United States are wor- ried about crime. A Gallup poll found that people worried their credit card information would be stolen by hackers (69%), their homes would be bur- glarized when they were not there (45%), their car would be stolen (42%), their child would be physically harmed while attending school (31%), they would be mugged on the streets (31%),…

  • BUS352BenchmarkCaseStudy

    Part 11. Chapter 2, Questions 1 and 2Ashland MultiComm Services (AMS) provides high-quality communications networks in the Greater Ashland area. AMS traces its roots to Ashland Community Access Television (ACATV), a small company that redistributed the broadcast television signals from nearby major metropolitan areas but has evolved into a provider of a wide range of broadband services for residential customers. AMS offers subscription-based services for digital cable video programming, local and long-distance telephone services, and high-speed Internet access. Recently, AMS has faced competition from other network providers that have expanded into the Ashland area. AMS has also seen decreases in the number of new digital cable installations and the rate…

  • BMGT485Week3LA1instructionsandcoursematerial

    Learning Activity #1An Interactive Map of the Worlds Wealth The world map depicted by Ferreras (2016) is interactive. Click on the various categories to see how the map changes shapes.Compare the map of the World Median Ages and the map of Wealth Distribution. Draw as many conclusions about this information as you can and then think about what that means for the business leader today. How would they select products, markets, leaders and managers to work for the company? Support your ideas, reasoning and conclusions with the course material.https://www.huffingtonpost.ca/2016/07/23/world-map-wealth_n_11145122.html07/23/2016 11:39 EDT|Updated07/25/2016 11:00 EDTA World Mapped According To Wealth Looks Very DifferentJesse FerrerasThe Huffington Post CanadaAny map of the world shows…

  • Multiple Linear Regression Linear Programming Decision Theory

    In the Multiple linear regression model, y (the response) is the ISOw (westward-moving intraseasonal modes) and x (the predictor variable) is the ISOe (eastward-moving intraseasonal modes). ISOe is further broken down to into more variables by applying power functions of the predictor variable to create a polynomial. Higher power terms are included in the model in order to seek evidence of any improvements in how they increase the accuracy of how wave modes are displayed. This selection is arbitrary and purely based on the assumption that it may lead to the development of a better model for depicting the relationship between the independent and dependent variables. Each of the introduced…

  • Ch 3

    The operating system can be categorized into three kinds, namely desktop operating system, network operating system and embedded operating system. Interestingly, Disk Operating System (DOS) is considered to be the first operating system which was used in IBM compatible desktop computers in 1980s. The primarily used computers were mainly utilized for teaching programming with the use of language called BASIC. The early computer programs were written in code. However, in later stages, a compiler and an interpreter were used that converted the source code into machine language that could be comprehended by the Central Processing Unit (CPU). In the year 1980, students were able to write programs and store them…

  • Computer Memory Hacking

    Computer Memory HackingHacking has become so common in today’s world that almost every person who uses computer and internet can be a victim of hackers. According to Ciampa (2009), a hacker is a person who uses advanced programming skills and techniques to break into any specific computer system (p. 16). Hackers can gain control of computer memory or RAM to commit theft of information or to steal private information. There are many important files that a person stores in the computer memory. Hackers gain control of the system’s memory to access those files and manipulate them according to their needs. There exist some common tools that hackers normally use to…

  • Impact of Culture on the International Marketing

    The issue is examined primarily under the views stated in the theory and the tests that have been made by researchers in this area. Furthermore, a method of primary research is proposed in order to formulate a more complete view of the problem. The structure, the conduction and the data evaluation regarding the specific research are analyzed in accordance with the current conditions and demands of the commercial market. Some temporary assumptions regarding the particular issue are also been expressed as a supplementary tool to the completion of the task.The definition of culture as an element of international marketing is not much differentiated from its original form. In this context,…

  • Research Metohd proposal

    As more countries around the world become globalized, offering tourism packages to multitudes of diverse foreign visitors, competition continues to become intense requiring a new focus in order to sustain competitive edge and build growth strategically. However, outside of these generic business principles is a new type of focus as a method of building a more solid brand: corporate social responsibility (CSR). CSR involves the activities of senior managers and the entire organisational staff to improve relationships with the domestic community and even international customers and citizens by promoting concepts of trustworthiness, ethical programming and diversity (as several examples). Corporate social responsibility includes multiple dimensions of moral principles that must…

  • Para Professionals’ Role in Special Education

    Paraprofessionals’ Role in Special Education Introduction The MN National Resource Center for Paraprofessionals defines a paraprofessional as an employee: Who works under the supervision of a professional staff/a teacher who holds the ultimate duty for education programs as well as related services’ design, implementation and evaluation. It also defines him as an employee who is in an instructional position or who provides other indirect or direct services to both students and their family members (McVay, 2000). A paraprofessional is able to know a student better compared to anyone else. This is especially so if he/she is working with a student one-to-one. They therefore are significant teaching team members (Hultgren, 2004).…

  • Active learning

    The experience relates to the idea of Reg Revan’s Action Learning, which we applied in fulfilling an important academic requirement for the (Course/Subject) class. In this paper, I will expound on the learning I had and the insights I gained, and relate the relevance of Action Learning to my experience. As part of the requirements of the course (Name), we were assigned as a group to report on injection therapy for Achilles tendinopathy. The group presentation we had to prepare should last for 15 minutes, which for me was rather long and would require heavy preparation, especially research. I have worked with other people before but only for short assignments,…

  • QSAR

    The loaded values are expected to give descriptive information about the descriptors that will be interpreted in terms of significant biological correlation relationships. Notably, the experimental model applied in this study revealed that the main features describing the binding activities of the experimental compounds were partially charge-based receptors. This was an automatic measure of molecular electronic property. The same property can be used in an auto correlated that can be used to weigh substitute descriptors’ position. Additionally, the linear regression equation and its application can be used in predicting biological activity in the study. It is worth noting that the comparison of the result with the literature data indicates that…

  • Time value of money

    gger amount in the days to come.The renowned fact that money possesses a time value implies that time value of that money must be put into account when making decisions to do with finance. This is done by restating values of money through time with what is called Calculations of Time Value of Money. These calculations are applied so as to shift monetary unit values of through the given time period. The calculations can be used to state future monetary flows in present value terms and also to restate today’s value amounts into future monetary values. These calculations are by far the most powerful tool that is available for making…

  • Advertisement and Marketing Communication

    The VIP Electronic Cigarette marketing communication is faulted for many reasons that range from social to moral and financial aspects. It is the audiences of these adverts are the same targeted market or the already existing customers. This implies that the information from this marketing communication is consumed and applied by the same audience. Gray and Andersen (2008), notes that placing adverts within the fabric of films causes a significant rise in the level of sales of the firm. As such the spot adverts that were run by the same company within ITV programming could have the same effect. The problem here is not that it could cause the same…

  • Usability study on a web page UML

    For instance, a web page that is well designed to display the home page gives the viewers an attractive side that is needed by the viewers. A web page that displays the initial steps to the viewers gives an attractive display. The first approach is designing the index. This is where the web page denotes an index that is used to scroll up and down. The web page is designed to show an index which people may use to scroll viewer in looking for the information that is needed.mos t web pages have an index that is used as a universal index. Most of these index shows that people need…

  • Data Management Layer Design

    Data management layer design The key definitions are object persistence which is the selection of storage format and to ensure that optimum performance is attain. Object persistence uses four basic formats they include: Files Object-oriented databases Object-relational databases Relational databases 1. Files Below are types of files Sequential and random access files These are the file access modes that are supported by many programming languages such as istream and ostream. Sequential access files These is the type of access mode that if efficient where data is stored according to given attributes which are then used in retrieving the files. The mode is best suited for data which requires reports. Sequential…

  • Talk Show Internet Assignment

    TV emerged in the 50s as America’s dominant cultural form, presenting an image of authority that was mainly middle-class, middle-aged, white, and male. TV soon took over American prime time activity. Beginning in the 60s, family breakdown, religious, and education crises, diminishing state authority, and a growing vocal and visible minority with new ideas and groups. All these led to a dramatic change in public perceptions with the most significant being the impact that progressive movements and social crises had on media talks regarding political correctness and multiculturalism (Quail, Kathalene Loubna 33). TV talk shows have always been around since the TV was commercialized. They are a crossover from the…

  • Satellite Radio

    While there are many pitfalls to this strategy, in that there are political, religious and social landmines in each country, there will also be many great rewards if the exporting is handled sensitively and correctly.Satellite radio began as an alternative to traditional radio, that was limited by spotty coverage in the rural area and questionable sound quality. Satellite radio promised fewer commercials, enhanced sound clarity and uninterrupted signals to this segment of the radio audience. Working similarly to satellite television, satellite radio produces, record and mixes programming in a broad studio, which is then sent to the satellite that orbits the earth, reflect the signal back and disperse it throughout…

  • The Secret History of Hacking

    The Secret History of Hacking Today nearly everyone familiar with computers is familiar with the notion of hacking. Strictly speaking hacking refersto the process where an individual gains illegal access to a computer network through manipulating computer code. Hacking, however, has increasingly come to refer to broader ranging notions of a computer subculture. Indeed, one considers that social media giant Facebook host regular ‘hackathons,’ where computer programmers stay up all night programming code that will potentially be used for the website. With the widespread cultural use of the term hacking, one considers the history of this subculture. This essay examines the ‘secret history of hacking’. While most individuals associate hacking…

  • Analysis of Quasi Market Structures and Their Introduction on the Quality and Strength of Production and Programming in the BBC

    The intended goals and desires that the reforms were enacted to effect will also be analyzed along with the level of realization that these goals had in actuality. Moreover, the analysis will seek to take into consideration a wide array of past scholarship and opinions on the matter and seek to provide the reader with a balanced interpretation of the means by which the BBC was ultimately weakened by the changes that were put into effect during the transitional period in question.Similar to an institution of government, the way in which the culture of the BBC had developed, grown, and solidified into something of a rigid system that was change…

  • Principles of Detail Design

    Clements et al differentiate architectural design from detailed design in a uniquely interesting way. He alluded that architecture could be defined as a form of design yet the reverse was not possible. The interpretation is that design is not within the realms of architecture since the end of any masterpiece can be manipulative. There is a close relation between detailed design, architecture and construction. From this, designers aiming for success in detailed design are obligated to have or obtain full understanding of the requirements and architecture of the system. Proficiency in particular design strategies such as object-oriented, programming languages, and methods and processes for software quality control becomes a requirement.…

  • Outsourcing IT Servises

    Another form of outsourcing is based on salary cost arbitrage that takes place between national economies when a company will seek to contract with another business abroad where the labor costs are cheaper, so that cost savings will be gained in the overall organization. Some companies may establish overseas branches of their company and hire employees directly in the foreign market, but this is technically different than outsourcing on a business-to-business basis. In this context, most companies perform a cost analysis on the savings that can be gained through outsourcing by comparing local salaries and the internal requirements for managing the services with the quoted rate of the outsourcing company…

  • Internet and Electronic Marketing

    E-Commerce is a traditional and important part of Internet marketing. In addition, Internet marketing has currently expanded into many different business areas beyond e-commerce. For instance, online banking has been provided by the growing number of banks that offer very useful services to their clients 24 hours a day no matter where they are. Selling products directly to consumers via the Internet is known as B2C (business to consumers) while selling goods to businesses is known as B2B (business to businesses). Social network marketing is making headlines these days as the most noticeable social websites are Facebook, Twitter, and MySpace. There are more than 40 different social networking sites on…

  • Robots Cooperative Control with Disturbance Observer

    They comprise one of the largest and most diversified classes of machines that are able to autonomously interact in an industrial environment. Additional challenges arise when programming for complex or specific processes between multiple robotic systems, for which many solutions exist modeled after both high-level human-interactive robotics and biological systems. Observing and controlling disturbance in this varied group of robots provides a unique challenge for engineers and researchers.Understanding cooperative control in current industrial robotics and in prototypes that may become part of robotics technology in the future is paramount to addressing disturbance in these systems. Though taxonomies in the field of cooperative robotics are rapidly changing, Dudek provides a convenient…

  • Colours R Us’ Case Study

    Programming, on the other hand, is the actual implementation of the HR plan. Programming involves recruitment, training, and lay-offs (Bateman and Snell, 2007, p.332). The third stage, which is the evaluating stage, measures the effectiveness of HR plans in producing the results needed to contribute to the organization’s business plan. It measures such indicators as productivity, quality, innovation, satisfaction, turn-over, absenteeism, health (Bateman and Snell, 2007, p.322).It is assumed that the company Colours R Us has already undergone planning as the first stage of its HR planning process for its Magnificent Miniature lines. It has determined that it will need 30 persons for its latest product ordered by its main…

  • Needs Analysis of Microsoft Corporation

    At the point when the event is harmful, some inspiration or objective of the hackers must be determined and addressed through the most appropriate measures. For example, the goal could be aimed at upsetting ordinary business operations, consequently denying information accessibility and production.Microsoft has been a leader in the design and programming of computer software, including operating systems and software applications. However, the future of Microsoft, as said by Steve Ballmer, the company’s CEO, is that of both a hardware and software corporation. According to the CEO, in about five to ten years, the company will be a manufacturer of devices as an addition to its software services and applications.…

  • Cross Cultural Management

    Corporations are currently enjoying the benefits of globalization. Companies now have a large consumer base and a wide supply of labor. However, globalization has resulted in a series of new challenges. Cultural conflict is one of the major challenges facing managers today. The issue of culture is a relatively modern problem arising from the rapid globalization of societies. Therefore, managers are required to adopt effective cross-cultural management style so as to reduce cultural conflicts and enhance business success. Cross-cultural management is detrimental to the success of a business. As a management style, this new method enables managers to develop innovative means of handling intercultural communication. Moreover, cross-cultural management enables companies…

  • To begin assignment read Henry Mintzberg’s article (enclosed) The Fall and Rise of Strategic Planning (Harvard Business Review JanuaryFebruary 1994)

    One weakness with strategic planning is that it is comprised of a calculated approach which is fixed towards attaining a goal in contrast to strategic thinking which is committed to encompass other people’s views in attainment of that particular goal. Strategies are only effective if committed people infuse them with their energy directed at achieving the stipulated goals. On the other hand, it can be noted that planning could not learn or think but only limited to the widely held belief of doing things within an organisation.He posits that strategic planning should have been termed strategic programming rather where it would be promoted as a process to formalise the strategies…

  • The Impact of Television Advertising of Food on Children

    A common concept that is used within society is the use of eating food and the different habits that it promotes among children. It is known from parents and the medical community that the advertisements that are a part of some of the food campaigns have the ability to change the healthy eating habits of children. Promoting specific types of foods and snacks cause various changes in what children believe they should eat as well as what is acceptable in society. Understanding the basic role that the media plays in eating habits and beginning to evaluate and change the way that the industry functions can help to alter the promotions…

  • Critical diference between java and C#

    loper the earlier sentence could be explained as ‘a short description of the Java language and platform’ instead the words C# and the .NET platform were replaced with words Java and the Java platform ( Obasanjo, 2007).C# is developed by Microsoft as part of the .NET initiative and later got consented as a standard by European Computers Manufacturing Association (ECMA) and International Organization for Standardization (ISO). The development of the C# language was led by Anders Hejlsberg and has a procedural, object-oriented syntax based on C++ and comprises features of several other programming languages with a special attention on simplification. C# is supposed to be a simple, modern, general-purpose, object-oriented…

  • EU Policy in the Area of Communications

    As set forth by the TVWFD, access to information is to be enforced such that all citizens may enjoy on free television the major sports and cultural events, or at least the public extracts featuring highlights of such events, that are of high public interest. Also, the Directive mandates Member states to ensure freedom of reception and retransmission in their jurisdiction of television broadcasts from other Member states, except when the broadcast seriously and gravely threatens to impair the physical, mental or moral development of minors, in particular, those that involve pornography or gratuitous violence (Council of European Communities, 1989, p. 23).As set forth by the TVWFD, access to information…

  • Planetarium summary out of class

    Sur Lecturer Planetarium Summary: Outside Today we visited Ritter Planetarium and we had the chance to view a show on space mirrors, a sky tour, and time cubes. We even watched, though through a telescope, at the Sun. We confirmed that Ritter Planetarium is indeed an art full-dome immersive imagining theatre that uses the projection system of Spitz SciDome XD. Capable of projecting more than six million pixels on to the 40 foot dome, this SciDome XD preserves all of the tasks of an out-dated analogue planetarium though also providing breath taking pictures of our Universe. It also capacitated to performance a full dome programming for kids on Saturday afternoons.During…

  • A Knowledge Management Framework for Expert Decision Making

    tructured analytics provides a repository of structured data in the form of presentable reports and charts which facilitates easy decision making .Off late organizations use variety of tools and methods to perform analysis on structured data as per their requirements in various fields like finance , supply chain management , forecasting etcData is available for an organization from various unstructured sources like emails, web sites, news articles, government notices, pre existing company records etc. Though data available from these sources are useful they are haphazardly organized and hence it becomes very difficult for various stake holders to understand and take a well informed decision. In order to organize the available…

  • (Business information system) DIRECT LINE reviews and system aquisition

    Beal’s (the IT director for the company) strategy the company focuses on building software systems in house rather than outsourcing the development. Therefore, according to his vision the company can do much better by developing products in house. It enables them to get a better understanding of the work domain and the exact requirements of the product. Similarly, in house development will also help in reducing non functional errors, as most of the performance related metrics would be known prior to the coding phase.On the other hand, recently the company has diverted from its long followed strategy of custom made in house products to buying vendor made products. Hence, the…

  • Career Competency Model

    The knowledge an individual to know how to tackle the problem and make a positive change where necessary. To see the progress and development in the profession, building an individual career competency model and a career ladder/lattice will help. The process will identify the knowledge, abilities, and skills that are important to perform critical functions in an industry or profession. It enables the creation of materials that assist professionals in the success of their careers. Career ladders and lattices are types of machinery that assist individuals visualize and have knowledge about job opportunities as they grow in their career. The lattice offers guidance through the development of career paths for…

  • How Marketing Is Done On an International Scale

    This paper illustrates that culture is the collective programming of the mind which distinguishes the members of one group or category of people from another. It is a phenomenon that involves the values, ideas, practices, artifacts and other meaningful symbols that enable people to understand each other for easier communication. Culture in itself also encompasses the goals that are shared by a community. It embraces the way of life of a group of people, which may differ from the next group. Some of the factors that contribute to such differences are the behaviors and practices of previous generations, which are in turn passed on to the next generation by way…

  • Manipulating Data

    Manipulating Data Introduction A programming paradigm is a form of computer programming in which the elements and structureof computer programs are built. The programming languages are determined by the programming paradigms that they support. In the past 60 years, there have been many different ways through which programming has evolved in collective grouping and manipulating data by spaghetti code, structured programming, modular programming, and object-oriented programming.Spaghetti code is a particular programming code which was initially used in programming. It uses branching from one code to another. It is the result of an old code that is modified over the years plenty of times. Another aspect is that changing one part…

  • Stat 2

    STATISTICAL PROGRAMMING Pure integer programming problem is a linear programming whereby all the variables are required to be integers (Render, et al. 2012). The Linear programming problem below is a pure integer LP problem but also has mixed sets of integers, thus mixed integer linear programming.Minimize Z=8X12+4X1X2+12X22Subject to: 6X1+X2≥50 X1+X2≥40A statistical programming that uses a scale of 0-1 is a simple and powerful integer scale. Zero-one linear programming involves problems (Braaksma, et al, 2012)), in which the variables are restricted to be either 0 or 1 for instance,Minimize Z=8X1+6X2Subject to: 4X1+5X2≥10 X1+X2≤3 X1 X2 ≥0 X1 X2=0 or 1A mixed integer programming problem is a linear programming in which only…

  • Introduction to computing

    f software programs that run on a much deeper level than these surface uses that are essential to the usability and accessibility of any of these other programs. This type of software is called system software, without which the computer would be a nearly useless collection of plastic, metal and wires. This software governs everything from how the computer stores and interprets data to how it is analyzed and accessed and eventually displayed on the screen for user input. Additionally, how the computer responds to user signals is also managed by system software in operations that are generally never seen or even imagined by the end user. To understand how…

  • Class Discussion cis 242

    Discussion Making Decisions in C++ using Conditions, Operators and Values Please respond to the following: Explain how decisions are made in C++ programming using conditions, operators, and values. Give a coded example to support your response. Define the significance of Boolean operators and explain how they relate to the conditions in your discussion. Give an example using C++ syntax to support your response. Note: values can be either variables or constants. The structure of Decision Making in C++ requires (at-least) one or more conditions for evaluation, if the condition is determined to be true the statement(s) needs to be executed, however, the if the condition is becomes false, there is…

  • Strengths and Limitations of Regression Analysis Using Linear Programming

    An individual will collect data parting the question at hand and thereafter employs regression to estimate the quantitative effect of a causal variable in comparison with the variable that they directly or indirectly influence their performance, (Wendorf, 2004). This method of data analysis has been in operation for an extended period especially in the economic statistics. Regression has also become popular among lawyers in the recent past, being used as evidence of liability under Title VII of the Civil Rights Act 1964. Regression analysis while handling a single explanatory variable is characterized as a simple regression. (Fox, 1997) Regression analysis will be used when it is determined that two or…

  • Dicuss The Applications Of Greedy Algorithms

    ApplicationsGreedy algorithms mostly (but not always) fail to find the globally optimal solution, becausethey usually do not operate exhaustively on all the data. They can make commitments to…Python Programming

  • What Am I Doing Wrong?This Is The Assignment Below Team

    Week3 ) Week 4.pyWeek 4Q1: ProjectWeek 4.pyprint ( ‘Welcome to the Team Manager’ )selection = Noneroster = Nonewhile selection != ‘9’ :print( ‘==Main Menu=print(‘1. Display Team Roster’ )print( ‘2. Add Member’ )print( ‘3. Remove Member’ )print(‘4. Edit Member’ )print( ‘9. Exit Program’ )selection = input (quot;Selectiongt; quot;)12if selection == ‘1’:for x in roster:print (x)15elif selection == ‘2’:16name = input(quot;Alex Shaw: quot;)17if roster is None:18roster = [Alex Shaw]]19list ( roster)20else:21roster . append (name)22elif selction == ‘3’:23name = input(quot;David Blanequot;)24roster . remove (David Blane)25elif selection ‘4’:2627oldname = input( ‘Alex Shaw:newname = input( ‘Alex Finch:28roster = [x. replace (Alex Shaw, Alex Finch) for x in roster]while selection != ‘9’ gt; elif selection ==…

  • I Need Assistance With

    In [3] : import sqlite3 as dbimport pandas as pdfrom datetime import datetimefrom collections import defaultdictdisk_engine = db. connect ( ‘ file: prob0 . db?mode=ro’, uri=True)def load_data( ) :df = pd. read_sql_query ( quot;SELECT * FROM soccer_resultsquot;, disk_engine)return dfIn [4]: # Test: Exercise 0 (exposed)df = load_data ( )assert df . shape [ 0] == 22851, quot;Row counts do not match. Try loading the data againquot;assert df . shape[1] == 9, quot;You don’t have all the columns. Try loading the data againquot;print ( quot;\n (Passed! ) quot;)df . head ( )(Passed! )Out [ 4 ] :date home_team away_team home_score away_score tournamentcitycountry neutral0 1994-01-02BarbadosGrenada0Friendly Bridgetown Barbados FALSE1994-01-02GhanaEgypt– NFriendlyAccraa FALSE2 1994-01-05Mali Burkina…

  • Can You Help Me Write Java Class Called

    Areawith three overloaded static methods forjavac Area. javajava AreaEnter radius of circle : 100Area of circle : 31415.926535897932Enter length of rectangle : 10Enter width of rectangle : 20Area of rectangle : 200.0Enter base 1…Java Programming

  • Consider The Following Recurrence Relation Where

    nkare greater than 0:if n lt; kb En, k 79it * = 1b [ n – 1 , k – 1] + 6 [ mik] other wiseal. Dynamic Programming is a method in whicha complex problems solved by breakingit into subproblems. solving each of…Engineering Technology

  • Use Python Programming

    Write a program that takes two text files as arguments and outputs the number of tokens theyhave in common. Here is an example of input/output:Input file 1:We reviewed the trip and credited the cancellation fee. The driverhas been notified.Input file 2:If a trip is cancelled more than 5 minutes after the driver-partnerhas confirmed the request, a cancellation fee will apply.Output:(optionally print out the common words, then…)6Python Programming

  • Create A Subclass Of The Class

    JPanelnamedDisplayArea. An object of thepackage waste;import java.awt.Color;import java.awt.Dimension;import javax.swing.JPanel;/**** @author*/public class DisplayArea extends JPanel {public static final int DISPLAY_SIZE = 500;…Java Programming

  • You Are A Team Leader With One Licensed Practical Nurse/Licensed Vocational Nurse And One Nursing Assistant On

    Question You are a team leader with one licensed practical nurse/licensed vocational nurse and one nursing assistant on your team. You also share the unit clerical person with two other team leaders and the chaerge nurse. You have foubd lpn/lvn to be a seasoned team member and very reliable. The nursing assistant is young and very new seems a bit disorganized but is avery willing team member. At various times you will be directing these three individuals during your workday, that is asking them to do things supervising their work and so on. What leadership style ( authoritative, democratuc or laissez-faire) should you use with each person or would it…

  • I’D Like Help With This I Need To Use Panda Numpy And Matplotlib In Python The Type Of Program I’M Writing Is

    Question I’d like help with this. I need to use Panda, Numpy, and matplotLib in Python. The type of program I’m writing is described below. The two csv are Housing.csv and P I need to load one of two CSV files and then perform histogram analysis and plots for select variables on the datasets. The first dataset represents the population change for specific dates for U.S. regions. The second dataset represents Housing data over an extended period of time describing home age, number of bedrooms and other variables. The first row provides a column name for each dataset. The following columns should be used to perform analysis: PopChange.csv:  Pop…

  • This Is A Program I Am Doing

    #Convert US measures to metric system measures #Get an Question This is a program I am doing; #Convert US measures to metric system measures #Get an input from user (William) to convert miles to kilometers #Store the input value in a variable Miles=float(print(‘William, please tell me how many miles you want converted to kilometers: ‘)) #Perform the conversion in arithmetic expression #Store the result in a variable Kilometers=Miles*1.6 Print(William,Miles,miles is equal to,Kilometers,kilometers. Isn’t that amazing!) when I run this, this is what I get: Python 3.7.4 (tags/v3.7.4:e09359112e, Jul 8 2019, 19:29:22) [MSC v.1916 32 bit (Intel)] on win32 Type help, copyright, credits or license() for more information. RESTART: C:/Users/Gsuar/AppData/Local/Programs/Python/Python37-32/Gretchen_ Suarez_Lab2.py…

  • Hello Below Is The Assignment That I Am Working On I Already Have The Code That Is Compiling And

    Question Below is the assignment that I am working on. I already have the code that is compiling and running successfully. However, I am having a hard time creating the UML diagrams for the code, that I have also provided below. Can you please help me with the UML diagrams? Are they supposed to be individual diagrams, because they are all separate codes or will they all inherit with each other so they will be all connected? Please help! Assignment: A class named Square that contains data fields for height, width and surfaceArea, and the methods computerSurfaceArea() and computerPerimeter(). A subclass named Cube, which includes an additional data field named…

  • I Need Help In Writing A Java Class The Class Contains A Specific Constructor With An

    Question I need help in writing a java class. The class contains: A specific constructor with an appropriate ArrayList parameter that copies the data from the parameter to the data object within the class itself. A GetResult method that returns an ArrayList of integers (note the lower case I) that are the bins of the histogram. The value ranges of the bins are set via other methods below. A RuntimeException is thrown if the histogram is not valid for any reason. Note that a histogram can be valid for zero data elements, but is invalid if the MinRange is greater than the MaxRange value below. A method named SetNumberBins that…

  • Conceptsarraylist Collectionssortingenhanced For Loopcollections

    Question Concepts ArrayList – Collections Sorting Enhanced For Loop Collections Class Add 5 names to the collection. Bob Susan … Output the Strings onto the console using the enhanced for loop. 2. Sort the list using the method Collections.sort. Output the sorted List. Shuffle the list, and output the shuffled list. Note that Collections (with an s) is a class, while Collection is an interface. The Collections class has many useful static methods for processing interfaces, including the sort method. 3. Search for the name Susan in the list. What location was it found? Search for a name that is not in the list. What location is reported? 4. Convert…

  • Hi Team My Assignment Is Based On Analysis Smart Meter Data By R Programming I Have Data

    Question Hi team, My assignment is based on analysis smart meter data by R programming. I have data about the consumption every 30 mins during a whole year. The problem that I have to solve will be something like finding higher or lower usage during the year and that of course from organisations prospective. I have a questions: What the benefit of finding the result to the organisation? I do not know how can I answer that Engineering Technology

  • 1 Write A Program Named Filemaker Py

    that will be used to store the first name and age of somewhile True:name=str(input(‘Enter first name of friend or press Enter to quit: ‘))if not name :print(‘File was created’)breakage=int(input(‘Enter age (integer) of this friend: ‘))if not age :…Python Programming

  • Television and Media

    Television and media Nowadays, competition in broadcasting has achieved its zenith, especially at prime-time nightly line-ups, which are to helpAmerican workers distract from their problems and have a rest. Prime-time is the most favorable broadcasting period, as the majority of Americans usually watch TV between 8 and 11 p.m. Such TV-business-giants as CNN and NBC compete particularly actively at this time in order to attract additional viewers, so they apply such broadcasting techniques as counter-programming, block-booking and tent-poling as a the means of inertia law maximization. Program scheduling thus becomes a critical business-strategy for both channels, since their ratings have decreased over the last several months (www.dawgnetnews.com, 2006) because of…

  • Television and Media

    Television and media Nowadays, competition in broadcasting has achieved its zenith, especially at prime-time nightly line-ups, which are to helpAmerican workers distract from their problems and have a rest. Prime-time is the most favorable broadcasting period, as the majority of Americans usually watch TV between 8 and 11 p.m. Such TV-business-giants as CNN and NBC compete particularly actively at this time in order to attract additional viewers, so they apply such broadcasting techniques as counter-programming, block-booking and tent-poling as a the means of inertia law maximization. Program scheduling thus becomes a critical business-strategy for both channels, since their ratings have decreased over the last several months (www.dawgnetnews.com, 2006) because of…

  • Television and Media

    Television and media Nowadays, competition in broadcasting has achieved its zenith, especially at prime-time nightly line-ups, which are to helpAmerican workers distract from their problems and have a rest. Prime-time is the most favorable broadcasting period, as the majority of Americans usually watch TV between 8 and 11 p.m. Such TV-business-giants as CNN and NBC compete particularly actively at this time in order to attract additional viewers, so they apply such broadcasting techniques as counter-programming, block-booking and tent-poling as a the means of inertia law maximization. Program scheduling thus becomes a critical business-strategy for both channels, since their ratings have decreased over the last several months (www.dawgnetnews.com, 2006) because of…

  • Television and Media

    Television and media Nowadays, competition in broadcasting has achieved its zenith, especially at prime-time nightly line-ups, which are to helpAmerican workers distract from their problems and have a rest. Prime-time is the most favorable broadcasting period, as the majority of Americans usually watch TV between 8 and 11 p.m. Such TV-business-giants as CNN and NBC compete particularly actively at this time in order to attract additional viewers, so they apply such broadcasting techniques as counter-programming, block-booking and tent-poling as a the means of inertia law maximization. Program scheduling thus becomes a critical business-strategy for both channels, since their ratings have decreased over the last several months (www.dawgnetnews.com, 2006) because of…

  • Television and Media

    Television and media Nowadays, competition in broadcasting has achieved its zenith, especially at prime-time nightly line-ups, which are to helpAmerican workers distract from their problems and have a rest. Prime-time is the most favorable broadcasting period, as the majority of Americans usually watch TV between 8 and 11 p.m. Such TV-business-giants as CNN and NBC compete particularly actively at this time in order to attract additional viewers, so they apply such broadcasting techniques as counter-programming, block-booking and tent-poling as a the means of inertia law maximization. Program scheduling thus becomes a critical business-strategy for both channels, since their ratings have decreased over the last several months (www.dawgnetnews.com, 2006) because of…

  • Television and Media

    Television and media Nowadays, competition in broadcasting has achieved its zenith, especially at prime-time nightly line-ups, which are to helpAmerican workers distract from their problems and have a rest. Prime-time is the most favorable broadcasting period, as the majority of Americans usually watch TV between 8 and 11 p.m. Such TV-business-giants as CNN and NBC compete particularly actively at this time in order to attract additional viewers, so they apply such broadcasting techniques as counter-programming, block-booking and tent-poling as a the means of inertia law maximization. Program scheduling thus becomes a critical business-strategy for both channels, since their ratings have decreased over the last several months (www.dawgnetnews.com, 2006) because of…

  • Television and Media

    Television and media Nowadays, competition in broadcasting has achieved its zenith, especially at prime-time nightly line-ups, which are to helpAmerican workers distract from their problems and have a rest. Prime-time is the most favorable broadcasting period, as the majority of Americans usually watch TV between 8 and 11 p.m. Such TV-business-giants as CNN and NBC compete particularly actively at this time in order to attract additional viewers, so they apply such broadcasting techniques as counter-programming, block-booking and tent-poling as a the means of inertia law maximization. Program scheduling thus becomes a critical business-strategy for both channels, since their ratings have decreased over the last several months (www.dawgnetnews.com, 2006) because of…

  • Television and Media

    Television and media Nowadays, competition in broadcasting has achieved its zenith, especially at prime-time nightly line-ups, which are to helpAmerican workers distract from their problems and have a rest. Prime-time is the most favorable broadcasting period, as the majority of Americans usually watch TV between 8 and 11 p.m. Such TV-business-giants as CNN and NBC compete particularly actively at this time in order to attract additional viewers, so they apply such broadcasting techniques as counter-programming, block-booking and tent-poling as a the means of inertia law maximization. Program scheduling thus becomes a critical business-strategy for both channels, since their ratings have decreased over the last several months (www.dawgnetnews.com, 2006) because of…

  • Television and Media

    Television and media Nowadays, competition in broadcasting has achieved its zenith, especially at prime-time nightly line-ups, which are to helpAmerican workers distract from their problems and have a rest. Prime-time is the most favorable broadcasting period, as the majority of Americans usually watch TV between 8 and 11 p.m. Such TV-business-giants as CNN and NBC compete particularly actively at this time in order to attract additional viewers, so they apply such broadcasting techniques as counter-programming, block-booking and tent-poling as a the means of inertia law maximization. Program scheduling thus becomes a critical business-strategy for both channels, since their ratings have decreased over the last several months (www.dawgnetnews.com, 2006) because of…

  • Television and Media

    Television and media Nowadays, competition in broadcasting has achieved its zenith, especially at prime-time nightly line-ups, which are to helpAmerican workers distract from their problems and have a rest. Prime-time is the most favorable broadcasting period, as the majority of Americans usually watch TV between 8 and 11 p.m. Such TV-business-giants as CNN and NBC compete particularly actively at this time in order to attract additional viewers, so they apply such broadcasting techniques as counter-programming, block-booking and tent-poling as a the means of inertia law maximization. Program scheduling thus becomes a critical business-strategy for both channels, since their ratings have decreased over the last several months (www.dawgnetnews.com, 2006) because of…

  • Television and Media

    Television and media Nowadays, competition in broadcasting has achieved its zenith, especially at prime-time nightly line-ups, which are to helpAmerican workers distract from their problems and have a rest. Prime-time is the most favorable broadcasting period, as the majority of Americans usually watch TV between 8 and 11 p.m. Such TV-business-giants as CNN and NBC compete particularly actively at this time in order to attract additional viewers, so they apply such broadcasting techniques as counter-programming, block-booking and tent-poling as a the means of inertia law maximization. Program scheduling thus becomes a critical business-strategy for both channels, since their ratings have decreased over the last several months (www.dawgnetnews.com, 2006) because of…

  • Television and Media

    Television and media Nowadays, competition in broadcasting has achieved its zenith, especially at prime-time nightly line-ups, which are to helpAmerican workers distract from their problems and have a rest. Prime-time is the most favorable broadcasting period, as the majority of Americans usually watch TV between 8 and 11 p.m. Such TV-business-giants as CNN and NBC compete particularly actively at this time in order to attract additional viewers, so they apply such broadcasting techniques as counter-programming, block-booking and tent-poling as a the means of inertia law maximization. Program scheduling thus becomes a critical business-strategy for both channels, since their ratings have decreased over the last several months (www.dawgnetnews.com, 2006) because of…

  • Scrutiny of Property as an Investment Class

    The theory of risk and return are vital to investment theory and practice. The more the anticipated risk, the greater is generally the return called for. Risk is a calculation of what is anticipated to occur but not what is really happening. Investment determinations nevertheless need the inference of an unidentified future return, which is known as expected return. Since there is a series of probable results there is no assurance that the estimation will be accurate, but it is the most excellent likely evaluation. The increase of allocation of anticipated returns about the entire expected mean estimation is typically calculated by the standard deviation (σ), or its square, the…

  • Cyber Crime and Information Systems Security The Concept of Phishing

    Users can log in to their banks’ website, credit card site, or share markets for any online transactions. No doubt, this provides convenience but it also comes with its own price of managing the security of the transactions. Crimes against Information systems is a growing concern amongst the Cybersecurity experts and Federal Law agencies as this has the potential to bring down a system and operation which otherwise would run smoothly.These crimes are illegal activities where computers are used as the primary interface. These types of crime have cost and continue to impact the economies of the worlds by many billions of dollars annually. Using the computer as a tool…

  • HDDVD vs BLURAY

    Weaknesses are happening on a couple of fronts. On the content development front, the DVD authoring front, we continue to see extreme price pressure in authoring services. The price of DVD authoring software has come down. The fact that more and more people are doing it puts incredible pressure on the production community to develop a quality product that is certifiable over all of the various players, delivers the same experience to the customer, and builds and maintains margins in their production services. (Sweeting, 2004, p7-46)On the other side, when we look at the next generation high definition DVD disc, which will certainly be all the rage in 2006, a…

  • How an iPod works

    The Ipod: Inside Out The Ipod is the most pervasive piece of technology ever to enter the American culture. They are everywhere and everyone either owns one or knows someone who does. For many people it is hard to imagine life after Ipod. It goes everywhere, is ready on a moment’s notice, and provides pleasure beyond our wildest fantasies. All this emotion and lust for an inanimate object has been described in psychology texts spanning the last 150 years. Now you’ve grown up, gone to school, and own your own Ipod. It gleams in the sun, brings a smile to your face, and is your closest companion from morning until…

  • Experience as a Mechanical Engineer

    I have performed robotics and automotive engines jobs. This gave me exposure when it comes to handling matters of the same nature. I am trained to fix a single component of an extremely large system. Therefore, finding effective and efficient solutions has been nurtured in the course of my career. Either alone or as a member of a team, my experience demands problems solving techniques on any project or system. I have worked for small and influential companies. Modern technology has caused the duties of a mechanical engineer to be advanced. I have a course on computers programming, and I can use information technology and computer techniques when the need…

  • Develop a partial risk and mitigation plan

    These are the malicious programs that are spread via the internet which damage stored information in the computers. High Attack by the malicious programs would lead to loss of information that is stored in the computers which results into a significant loss for the company. The first impact would be loss of documents while the latest would be total crushing of the ICT system. 2 Hacking The ICT students may hack the schools’ accounts, which would lead to loss of information and money. Medium If this happens, the school may lose a lot in terms of cash. This is because hackers can even clear the school fees for students with…

  • Linear Programming

    It is evidently clear from the discussion that since resources are scarce there are limitations on what can be achieved for example if materials and machine time are in short supply. Output, therefore, will be limited by the availability of these resources. It is a Constrained Optimization Problems arise from applications in which there are explicit constraints on the variables. The constraints on the variables can vary widely from simple bounds to systems of equalities and inequalities that model complex relationships among the variables. Constrained optimization problems can be furthered classified according to the nature of the constraints, for example, it can either be a linear, or nonlinear problem. The…

  • The biology of belief by Bruce h Lipton

    He realizes that, contrary to popular belief, life is determined more by the environment than it is by our genes. In this book he argues that the DNA is actually controlled by outside signals that are beyond the cells, together with vigorous and persuasive messaging from our positive and negative thoughts. By examining the way the bio-chemical effects of the brain’s functioning, this work seeks show that all the body cells are affected and influenced by our thoughts. He thus tries to help explain the interaction between nature and nurture. In the first chapter, Lipton provides us with his description of cells which he sees as complete entities that are…

  • District Budgetary Overview

    The schools in the district would require to prepare a budget for the period of July, 1 to June, 30 and submit the same for sanction of the governing body by July, 15. The three generally accepted accounting practices include the incremental budgeting, the zero-based budgeting, and the planning, programming, budgeting system. The incremental budgeting is done the district school where they adjust the budget of the previous year to that of the next year (Hosted, 2012). The zero-based budgeting includes starting he budgeting at the beginning of the year. The planning, programming, and the budgeting system include the cost on a per-pupil basis. Due to this accounting practice, the…

  • Clarks University IT

    Admissions Essay. As the first member of my family to attend college, I am deeply conscious of the vast difference that education can make in one’s life. My parents have made several sacrifices to ensure that my sisters and I have received the best possible education. After earning my Bachelor’s degree in Electronics at Osmania University, Hyderabad, the necessity of sharing my father’s heavy financial burden compelled me to postpone my dreams of a further academic career. My long-standing passion for computers, coupled with my programming skills in C and Java (I am a Sun certified Java programmer), have contributed towards my successful career at the GE Innovation Center, India.…

  • Television and Media

    Television and media Nowadays, competition in broadcasting has achieved its zenith, especially at prime-time nightly line-ups, which are to helpAmerican workers distract from their problems and have a rest. Prime-time is the most favorable broadcasting period, as the majority of Americans usually watch TV between 8 and 11 p.m. Such TV-business-giants as CNN and NBC compete particularly actively at this time in order to attract additional viewers, so they apply such broadcasting techniques as counter-programming, block-booking and tent-poling as a the means of inertia law maximization. Program scheduling thus becomes a critical business-strategy for both channels, since their ratings have decreased over the last several months (www.dawgnetnews.com, 2006) because of…

  • Becoming agile through mindfulness

    Organizations dealing with information systems development (ISD) have started shifting to agile methods. This has been necessitated by the fact that the previous traditional methodologies, such as waterfall methodology, have been restrictive in terms of processes and extensive planning (Lee amp. Xia, 2010). The agile manifesto has been derived from the following four main tenets. interactions and individuals over roles and processes, contract negotiation through customer collaboration, response to change over plan following and a working software rather than an exhaustive documentation. Through these four doctrines, the agile manifesto came up with 12 principles that have led to the creation of different other methodologies. Such methodologies as XP (eXtreme Programming),…

  • Individual Assessment (Part 2)

    9 2250 Programming is the act of original formulation of processes and steps within the tendering process. The definition is applicable to both the private and public sector when it comes to tender submission. Programming is a process involved with identifying the mission, objective, procedures, rules, and the manipulation of human capital of an organization in the process of seeking success (Fischer-Hübner 2006, p. 10). In order for an organization to be effective, regardless of the situation, there must be effective channels of communication within all tiers. There should be enough human motivation and responsibility of actions. As such, the tender submission requirements do not subject management, being one of…

  • Grace Hopper and the Invention of the Information Age

    1 250 The end of the war opened new opportunities in the civilian sector for the professor. She would become an employee of the Eckert-Mauchly Computer Corporation. Hopper made valuable contributions to the development of programming languages and applications for the UNIVAC computer. She developed a compiler which helps to act as an interface between machine language and human language. This revolutionary accomplishment now forms the basis of modern programming languages and applications. It helped to create the basic syntax for coding applications. Hopper would invent the term “computer bug” when a real moth was found to be trapped in the UNIVAC computer (Beyer, 69). Hopper’s greatest contribution was the…

  • “Management Science &amp

    System"The cost of the rooms was £120 per room per night. They would book the accommodation but if they found out a week in advance that they were not going to make the trip, they would cancel at a cost of 10% of the total value. If they cancelled one (1) to three (3) days in advance then the charge would be 50% and on the day 100%. The Reservations manager who was pretty new did not know how to handle situations like these and so he flatly refused to accept the booking or to give it any further thought. The hotel was already 60% booked for two of the…

  • “Major differences between NEC3 &amp

    JCT SBC 2011"The provisional sum for the JCT SBC 2011 contract is not mandatory like the case of NEC3 contract. The project manager is usually at pains to decide whether to adopt the discrepancies manifest in cost estimation for a project. The variations negate the principle of cost control in NEC3 contracts. The variations also compromise the control of overall project cost. Moreover, the costs associated with compensation events are separate from the initial tender price. 3.&nbsp.Cost scrutiny The cost scrutiny should be made mandatory for both contracts because this allows easy cost evaluation. The large number of firms usually involved in a single mega construction contract requires long-supply chains.…

  • One might argue that a shift in television programming from the wholesome shows of the 1950s and 1960s to the negative reality programs today has resulted in a youth culture of violence and selfishness Do you agree or disagree Provide concrete examples

    Viewers of the past left the sofa with a clear mind and consent in contrast to audience of the present age, whose mind is crowded with negative messages and darkness of the reality. In fact, it would not be wrong to state that issues are exaggerated to make them sound more violent and aggressive to comply with the increasingly demanding nature of the modern viewers. Today’s media emphasizes upon the darker side of pictures and the same negativity is indirectly inculcated in the immature mentality particularly of the juvenile viewers. People confront media for a major portion of their day and reality shows happen to be the most demanded programs.It…

  • The Main Character of Castle

    That includes being ready to put her emotions on the line and accept the love being offered to her by a man who has stood by her for the past 4 years of her life. It was important to me, as a person who believes in the healing powers of psychiatry, that the episode portrayed her visits to a psychiatric professional as one that truly helps her get her life back together after her shooting in the previous season. By showing the analytical aspect of the doctor’s visit and allowing her to figure things our for herself with her doctor acting only as her guide, her character as a strong,…

  • Genetic Predisposition to Alcoholism

    Genetic Predisposition to AlcoholismIt is a mysterious fact that some people begin to drink alcohol and become dependent to an extent that they cannot perform tasks or feel comfort without taking alcohol, while others begin to drink but remain independent. This mystery has triggered a lot of research into determining the causes of the difference. Investigation of genetic relationship to alcoholism constitutes an active part of the entire research to determine exact cause(s) as to the disparity. However inconclusive, certain research outcomes create close link of alcohol dependence to genetic structure. According to Hart and Ksir (2011), most individuals who begin to take alcohol and develop serious dependence do so…

  • Change the ethic form for your dissertation

    Outline of Proposed Research Project Working Perception of China as a tourist country: Western tourists’ point of view 2. Brief of Context:The principal research area of this study is to identify the perception of Western tourists about China as the final destination place. The research will highlight the potential avenues that are available for Chinese tourism industry which will ensure that the best options are available for the tourists. With the help of this study, China can work on developing crucial elements of its tourism industry to meet the requirements of the Western tourists. 3. Brief description of location (scope) of the study: The exceptional growth rate of Chinese tourism…

  • History of Computers

    The study would even outline trend of computer science profession in next 10 years.The beginning stage of computers has its roots in 19th century. Its history is closely knitted with an English mathematics professor called as Charles Babbage. He was able to frame the design of an analytical machine. On basis of this framework computers are being designed in present scenario. Computers can briefly be categorized into three generations. Each generation basically lasts for a specific time frame. These generations individually has delivered improved and new computer or rather further modifications on existing ones. First generation was from 1937 to 1946. Electronic digital computer firstly was designed in 1937 by…

  • Human Rights and Development

    equality, freedom from discrimination and torture and equality in accessing fair trial, health, education, and housing (Australian Council for International Development 2010, p. 1-2). The elements of human rights-based approach include international human rights framework, transparency, empowerment, participation, and partnerships (Australian Council for International Development 2010, p. 5). Ideally, human rights-based approach applies in development cooperation and development programming. Notably, applying a human rights-based approach in development necessitates for good programming practices. The application of a human rights-based approach to development may lead to significant benefits and drawbacks as discussed below.Many countries believe that development and the respect for human rights have a mutual relationship and guarantee better life for…

  • The Future of Advanced Business Application Programming

    ABAP is a fourth generation language which utilized for the thousand small embedded programs known as transactions that structure the application.&nbsp. ABAP is a code written in a language like COBOL that is also known as interpretive language in syntax.&nbsp. The language is able to be coded to appear almost like COBOL.&nbsp.Its application permits SAP clients to expand the functionality of the core product (Nina, 2000). SAP is extremely flexible, it is capable to be employed for particular business functions quite than the entire business enterprise and can be customized for the companies for there precise requirements.&nbsp. Each SAP installation has its own precise configuration and set of functions.&nbsp. The…

  • Software Engineering What Makes It Run

    The paper mainly consists of what is in each column of the sub heading and how it aids to boost up our knowledge.A non-profitable society formed in US in 1963 under government acceptance to set international standards which otherwise serves as a leading technical authority in Science and Technology departments such as Biomedical engineering, Electric Power, Telecommunication, Consumer Electronics, Computers and Aerospace systems is the Institute of Electrical and Electronics Engineers in short IEEE society. The website given to explore is one of the official sites of this society which works for the benefit of individuals who are directly or indirectly connected to the subjects stated above. It provides training…

  • Computer Programming

    The “implements” keyword is used by a concrete class to indicate that it implements the interface and that each method in the interface is declared with the signature specified in the interface declaration.Note that we use an interface class instead of an abstract class since there is no default implementation to inherit as would be in abstract classes. It is also noteworthy that an interface class must be declared in a file with the same name and a .java file-name extension.Should the user fail to select anything in the special features panel that is reinforced or sealable top, the default is, it is assumed that the container is not reinforced…

  • Teaching English as a Second Language Role of the ESL Teacher

    8 2000 The ultimate aim of the ESL programs is to improve the English language proficiency of the identified ESL learners and to make them competent enough to communicate with their peers and their teachers, participate in the classroom activities and to achieve learning outcomes as the first language learners. This paper seeks to explore the various ESL programs with special reference to the different roles played by the ESL teacher, the modes of delivery of the ESL programs, the diversity of ESL learners, the key theories and ideas about second language acquisition, the planning and programming of ESL lesson sequencing and the various ESL teaching strategies employed by ESL…

  • Using Word Press Create a Home Page for a business or student club or nonprofit organization

    Hans IT Solution Hans IT website The Hans Website is a business website based on Hans IT solutions multinational information technology firm. It consists of five navigation web pages namely home, about, services, contact information and specialization.Company descriptionHans IT solution is a multinational information technology firm specialized in artificial intelligence, programming, security, networking and frameworks. Established in 2005, the company credits itself with the provision of networking solution and protecting client database. The rationale behind the company foundation is to provide a secure internet experience for our client in the modern technology enhanced business environment where online programs and database are vulnerable to criminal activities.For the past ten years, the…

  • Media and its influences on Culture

    Media and its influences on Culture Arabic culture is closely related to and often seen within the context of Islamic culture. all the laws, rituals, practices attached to the Islamic religion are adhered to within the geographical location of Arab states. Here it is not the individual but the society that holds prominence and the concept of social responsibility is very strong. On the other hand, American culture is all about the individual (Sullivan, 2006). The concepts of democracy, egalitarianism, freedom and individuality that bind Americans, give it a certain mythic identity (Sullivan, 2006). Added to this equation are the different social subcultures that superimpose cultural diversity giving America the…

  • International Relations Structures of International Governance

    Global governance seeks the change in the politics and administrative terms, however, the paradigm is deeply embedded in the traditional intergovernmental framework. They see global governance as a form of supranational organization in which governments “sacrifice their authority to a higher supranational authority” (Sandler, 1997). Using this approach, global governance is viewed primarily in terms of a trade-off between national sovereignty and supranational authority which is obviously too simple. In addition to this, people started adopting the fact that the governments cannot be the sole agency to governance due to their incomplete capabilities and outright partiality on some issues (Vayrynen, 2003). Thus the importance of NGOs was recognized by the…

  • Java PROGRAMMING

    Java Programming al Affiliation Java Programming The term structured programming in the simplest and most basic sense refers to the subset of procedural programming that are modified and enforced in a logical manner and structure. The aim and objective of structured programming is to enable the program to be more effective, efficient and for the users to understand and comprehend them. Object programming on the other hand refers to a programming technique that is founded on the aspects of data structures which imbibe the data (Hughes, 2009). It is important to note and record that the data exist in fields in form of fields which are clinically referred to as…

  • Linear Programming as an Important Technique and a Useful Tool for Mix Management

    The model of the linear programming is formulated on the basis of mathematical programming as well as optimization methods that are extensively employed by industry and business for about several years. It necessitates the assignment of insufficient resources on the basis of a specific standard of optimality (Robbins &amp. Tuntiwongpiboon, 1989. Lorraine, Alain, &amp. Dominique, 2006) and (Megiddo, 1991). OrganizationIn this connection, I would like to provide an analysis of the use of linear programming techniques and tools for the purposes of hospital management. While considering the prospective reduction in cost and effective operations of the hospital resources, hospitals are confident enough to improve services as well as management of…

  • Business Operations and the Influence of Development of Technologies

    Supply chain management integrates the key business processes, from end-user through original suppliers. Companies and corporations involve themselves in a supply chain by exchanging information regarding market fluctuations and production capabilities. Technology can be used effectively to enhance the performance of the supply chain to ensure value propositions at all points of the supply chain. Ensuring superior value propositions based on customer service leads to a competitive advantage. If all relevant information is accessible to any relevant company, every company in the supply chain has the possibility to and can seek to help to optimize the entire supply chain rather than sub optimize based on a local interest. This will…

  • Using Nintendo Wii in Library Programming for Young Adults

    (MacKenty, 2006)One of the most controversial issues that are highly associated with playing video games is the common perception that that these games could promote a culture of violence among the American youths. (Lieberman, 1998) In line with this matter, many studies have shown that playing violent video games is considered as one major factor that could increase the number of massacres in different schools. (Gegax, Adler and Pedersen, 1998)Despite the negative impact of playing video games in the students’ aggressive behavior (Winkel, Novak and Hopson, 1987. Graybill et al., 1987), the researcher will discuss the benefits of using Nintendo Wii and other game consoles in each of the local…

  • The Impact of Culture on Business and Management in Different Cultural Contexts

    Identification of cultural diversity has opened up new avenues and challenges for business and provided wider space for management researchers and psychologists to understand human behavior in relation to business and management.&nbsp. On this concept, Dowling et al’s (2008) elaboration on international HRM deals with three perspectives. firstly cross-cultural management and human behavior. secondly, different HRM systems in various countries. and thirdly, aspects of HRM on multinational companies.&nbsp. Hofstede (1980) refers to culture as a collective mental programming of a group of people belonging to one region, and is difficult to change. in such settings, specific culture becomes institutionalized in their family and educational structures, religious organizations, government, law, literature,…

  • Training of IT Professionals

    The results of the research showed that information technology is an ever-growing professional field which has increased the demand of IT professionals all over the world. Information technology is one of the most progressive professional fields of the present world. It mainly refers to the use of computer systems and networks for storing, processing, and retrieving data or information required to run different business processes. Earlier, the use of the term ‘Information Technology’ was limited to banks and hospitals where employees needed to store and retrieve information on a regular basis to perform different activities. With the increase in the use of information technology in every field of life, the…

  • Arrays

    [School] Number] September 9, Real Life Application of Arrays An array in programming is a series of objects which are of the same size and type. They allow one to store groups of items of the same data type in memory. These phenomenon can be applied in real life situations. First example is this is the use of 2-D and 3-D arrays to represent weather and climatic data in area. The surface of the earth can be divide with 2-Dimensional gridline and then a 2-dimensional array is used to store and display the average climatic conditions on the grid. Another real life example where an array can be used to…

  • Sunshine Lives In Black and White

    Sunshine Lives in Black and White Your School Sunshine Lives in Black and White When television first arrived en masse to American households, the family often gathered around the set to watch the news and a few variety shows. The novelty of television was what made it entertaining. As the media advanced, situational comedies and dramas, most adapted from the previous form of family entertainment, the radio, joined the news shows and variety shows. The 21st century idea of television reflecting the lives of the viewers was foreign to those involved in its early years. Instead, the programming of those early years of television, specifically the 1960s, reflected an idealized…

  • PROGRAMMING AND CULTURE IN ARCHITECTURE WAY

    First Last Number: Programming and Culture in Architecture Way MAJOR FUNCTIONS OF THE SITE Guatemalteca Bakery Restaurant, in the form of a site, is surrounded by beautiful environment as well as transportation facilities that prove to be highly conventional for the customers to visit the same. One of the major functions of this site can be reckoned as considering customers’ demand and perception based on which it has been able to provide superior offerings to the customers. Apart from this, another major function of the site is the offering of large parking facility for keeping the vehicles of the customers, which is likely to grow the attractiveness of the restaurant…

  • User Interfaces

    As an operator settles on the kind of interface to use they should endeavor to make it easy, enjoyable and efficient.There are three main types of user interfaces including web based interface, which requires for the user to accept the input and provide the output, the command line interface where the user offers inputs by typing command strings and the system provides output and the graphical user interface whereby the user gives commands through the selection and clicking on icons that are displayed on the screen (Mandel, 1997). In the past, computer software was designed without considering the end users of the same. Today, it is becoming increasingly important to…

  • Business Personality of Mark Zuckerberg

    He is one of the youngest billionaires within America and indeed the entire world. His wealth has been exponentially increasing since he has hit the nail on the head by launching Facebook – a website that is loved by millions worldwide. Mark Zuckerberg is a success story because he has made things happen, and that too consistently. He set off on his mission ever since he was a student at Harvard University. His mission, therefore, was to connect university alumni and on-campus students with one another. He was very successful at doing so and later on this expanded to different users who were not a part of American universities and…

  • Java Programming

    import java.awt.BorderLayout.import java.awt.Color.import java.awt.Container.import java.awt.FlowLayout.import java.awt.Font.import java.awt.GridLayout.import java.awt.Window.import java.awt.event.ActionEvent.import java.awt.event.ActionListener.import java.awt.event.WindowAdapter.import java.awt.event.WindowEvent. import javax.swing.JButton.import javax.swing.JDialog.import javax.swing.JFrame.import javax.swing.JLabel.import javax.swing.JMenu.import javax.swing.JMenuBar.import javax.swing.JMenuItem.import javax.swing.JPanel.import javax.swing.JTextArea.import javax.swing.JOptionPane. public class Calculator extends JFrame implements ActionListener{ // Variables final int MAX_INPUT_LENGTH = 20. final int INPUT_MODE = 0. final int RESULT_MODE = 1. final int ERROR_MODE = 2. int displayMode. boolean clearOnNextDigit, percent. double lastNumber. String lastOperator. private JMenu jmenuFile, jmenuEdit, jmenuView, jmenuHelp. private JMenuItem jmenuitemExit, jmenuitemCopy, jmenuitemPaste, jmenuitemStd, jmenuitemSci, jmenuitemDigitGrp, jmenuitemAbout. private JDialog dialog. private JLabel display. private JButton button[]. private JPanel masterPanel. private JTextArea textarea. Font f12 = new Font("Times New Roman", 0, 12). Font f121 = new Font("Times New Roman", 1, 12). ……

  • Analysis of Refactoring

    Analysis of RefactoringIt is usual that existing code needs to be maintained–usually to fix bugs or introduce new features. Sometimes, it is not feasible to do this to large programs without restructuring major parts of the code. The existing rode can also have very low readability and be overly and unnecessarily complex, whereby the task of maintenance becomes impractical and inefficient. A solution to this problem is refactoring, or “cleaning up,” where the code is altered to make it readable and maintainable. thus fixing bugs or implementing new features becomes easy. The term “refactoring” is analogous to factorization in mathematics, where (x^2 – 1), for example, can be factored as…

  • The Pros and Cons of Different Scripting Languages

    The fundamental challenge of Web page development is that while it is easy to create a Web page, it is more difficult to create an attractive and exciting one.HTML, the markup language that describes the appearance of a page, is easy to learn, and requires no background in programming. HTML has undergone several revisions in order to meet the expanding needs of Web page authors. However, there are limits to what can be achieved inside HTML. The Java programming language was introduced to dramatically extend the Web developer’s set of tools, but is still more complex than HTML. Java is very easy to learn. however, like most programming languages, it…

  • United Holidays

    It is considerably easy to carry out. DisadvantagesIt is time consumingWritten sources3 b. Discuss the purpose and features of a CASE tool, which could support the development of the required system for United HolidaysPurpose:They enhance software development. They generate codes automatically and also used in normalization. Diagramming tools are used to draw the system models required or recommended in most methodologies.Description tools are used to record, delete, edit, and output non-graphical documentation and specifications.Prototyping tools are used construct system components including inputs, outputs, and programs. Inquiry and reporting tools are used to extract models, descriptions, and specifications from the repository.Quality management tools analyze models, descriptions, and prototypes for consistency, completeness,…

  • The Point of Making People and Organizations More Accountable

    For example, in an international session that looked at accountability across all sectors involved in HIV, including community, government, and UN, a reporter reported that –The movement is now fragmented. There are some new voices but it’s not representative of everyone. And ever since treatment became accessible, the sense of urgency is lost. Many activists who were fighting for their lives have now gone on medication and gone back to having full-time jobs (Narayanan, 2006).One strong point of making people and organizations more accountable is that people’s ability to realize their rights to resources have increased (Newell &amp.Wheeler, 2006b). Accordingly more responsive institutions enable people to gain access to resources,…

  • Technologies for Business

    It is critical to note that the success and failure of such technologies also depend upon the way you project yourself and your company. Normally, small and start-up businesses are largely dependent upon the person who is running the whole show, therefore, the business vision as well as the strategic direction of the company which it is going to take. &nbsp. The available technologies which can serve the basic purpose functionality, as well as advanced functionalities for the firm, include operating systems, PHP, .NET, Java Beans,&nbsp.J2EE, Java Scripting, FLASH, MySQL, ORACLE, SQL SERVER, SAAS, and AJAX. &nbsp.These technologies are easily available at relatively low expect few technologies such as Oracle,…

  • Advancement Of Structured Information Standards

    Grid computing increases the throughput of a networked system. Various heterogeneous but networked resources across administrative boundaries can be modeled into virtual computer architecture for resource sharing. The concept of grid computing is to solve complex computational problems that can not be solved by the limited resources of a single computer or group of computers within an organization.It is apparent from the above figure that networking technologies are more rapidly than microprocessor technology. There is always a large chunk of processing power that remains underutilized in many computer clusters. Advancement in networking technology can logically be used to club all these underutilized resources thus solving the crunch of processing power…

  • Media’s Effect on Children

    Media’s Effect on Children In an article by Earles, Alexander, Johnson, Liverpool, and McGhee (2002) d "Media influences on children and adolescents: Violence and. sex" the researchers established a strong correlation between violence on television and aggressive behavior. The study was able to elicit aggressive behavior from children after showing them a video in which an adult is rewarded for hitting a doll. The authors pointed out that excessive scenes of violence on television can desensitize children into believing that it is acceptable because it is familiar. In addition to excessive scenes of violence on TV, television often portrays people of color negatively. The article further talked about that sexual…

  • Spyware and Implementing Network Security

    More malicious variants attempt to intercept passwords or credit card numbers as a user enters them into a web form or other application.The scourge of spyware is going to be here for quite a while, simply because the attacker make so much money from it. An attacker can make a dollar or more per month per infected system by using spyware to inject pop-up ads, Spam and other annoyances. Therefore, attackers have a vested interest to constantly adapt their software and make it ever more stealthy and sticky. Additionally, the stakes are even higher if the attacker can steal credit card or bank account information. What we’ve seen in the…

  • Ethical Hacking

    ETHICAL HACKING Ethical Hacking According to Raymond, the term ‘Hacker’ has a dual usage in the computer world. Originally, the term was defined as:HACKER noun 1.A person who enjoys learning the details of computer systems and how to stretch their capabilities-as opposed to most users of computers, who prefer to learn only the minimum amount necessary. 2. One who programs enthusiastically or who enjoys programming rather than just theorizing about programming (Raymond, 1991).From the above definition it is clear that, the original idea behind hacking has nothing malicious in its intent. According to me hacking is justified, provided the intent behind performing a hack is not destructive.Today organizations are increasingly…

  • A Career in Accounting

    The stockholders suffered in untold misery because the Enron executives acted maliciously in cohorts with the auditors while the swindled investors of Madoff trusted overly in the financial statements which were twisted and distorted by the accountants of the alleged fraudster. In the international landscape, the recession started in the United States of America. First, it was the banking system. Then, the credit in housing mortgages crumbled and collapsed. The auto industry followed in the imbroglio. And well, if America sneezes, the world catches cold. All those could have been avoided by proper accounting and sound auditing. Accounting as a career plays a significant role in the world order because…

  • Appropriate Advertising

    AUDIENCE APPROPRIATE ADVERTISING Lesson 7 October 17, 2006 Audience Appropriate Advertising During any one of the hundreds of PG movies shown on television, there is a risk that nearly naked women with unrealistic bodies will suddenly parade across the TV screen. Advertisers hold their audience fixated with their minimal use of underwear when words begin to flash on the screen. "Invisible Lace". "Secret Embrace". Surprisingly, the family movie has been interrupted by a Victoria’s Secret commercial. Younger and more impressionable viewers will keep these visions in their mind and memory as unscrupulous advertisers bombard television viewing with advertising that is offensive to families trying to enjoy some common entertainment. They…

  • Hypnosis A personlised induction to hynosis will always be more effective ”Discuss”

    202512 A personalised approach to hypnosis is concentrated on induction, deepener, hypnotic suggestion work and sometimes the proper exit from trance state, according to most of the therapists. Ready-made hypnosis scripts written by an experienced professional therapist work well if the person is unused to hypnosis and have misgivings about it. By personalising the process according to the knowledge of the client and his situations, There are many points that could be included in a personalised induction. But the main suggestions rest on four components: 1. Personalisation2. Atmosphere3. Conceptual negatives4. Four sense test. Personalisation connects to the individual’s personality, circumstances of hypnosis, desired achievement and his particular need. Atmosphere is…

  • An Overview of InCar Information Systems

    However, these devices, which have little to do with the actual driving of the car, are becoming more and more advanced – presenting many problems for designers and users alike. The permanently increasing complexity of in-car electronics and the rapidly growing amount of sensors, actuators and electronic control units, make the data increasingly more difficult to keep secure, correct and failsafe.In a recent survey carried out by Goldman Sachs in America, there are approximately 200 million cars in the United States and an incredible 500 million passenger hours each week is spent inside them. In another survey, Delphi Automotive research found that more than a third of PDA owners use…

  • History of Google

    Being the gateway to the web for more than hundreds of millions of people globally, Google can utilize using more than 100 languages (Vise, 2006). In fact, its brand has already been officially listed as a verb in the Webster’s Dictionary (Vise, 2006). Indeed, Google is growing faster and bigger than its competitors.Given the success that this search engine has achieved, it is only proper to make an analysis on its success story. This case study will trace the history on how the founders Larry Page and Sergey Brin created and developed their business, showing a detailed profile of each of them. Furthermore, this case study will present the history…

  • A Linear Programming

    In mathematics, linear programming (LP) problems involve the optimization of a linear objective function (i.e., maximize profit or minimize cost) subject to linear equality and inequality contraints. {"Linear Programming." Wikipedia: The Free Encyclopedia}.Since the problem involves a production and distribution system, use of the Transportation Method in Linear Programming is the best way to solve this. {Heizer, Jay and Render, Render. "Production and Operations Management". pp. 373-399}. A dummy destination is required since the production capacity is greater than the demand. {Heizer, Jay and Render, Render. "Production and Operations Management". p381}… FromToAshmumBranfordCrackersCookiesChipsCrackersCookiesChipsMilford205030Guilford30 2520This recommendation will enable the company to minimize total operating cost at US$ 3,195,000 per month whilst efficiently…

  • Media Trial

    Topic: Media Trial Instructions: Ray Surette s that "media trials are crucial in the social construction of crime-and-justice realityNot surprisingly, media trails involve cases that contain the same elements popular in entertainment programming – human interest laced with mystery, sex, bizarre circumstances, and famous or powerful people. In their coverage the media simplify the task of reporting, interpreting and explaining a trial. As in the entertainment media, recurrent themes dominate media trial constructions, and crime is nearly universally attributed to individual failings rather than to social conditions. The three most common types of media trials utilize narratives taken directly from entertainment media: abuse of power, the sinful rich, and evil…

  • Wiki Blog and Podcast analysis

    Such a transition may require one or more strategies from the following as defined by Ballard (2008):This presentation is pertaining to the feasibility analysis of Wiki, Blogs and Podcasts for Smith Systems Consulting for the purpose of two way interactions with the customers. The paper is presented in the form of feasibility study and proposal for Smith Systems Consulting. The organization is in the business of web site development for the customers staring from conceptualization to productionization. Smith Systems Consulting uses cutting edge programming, database &amp. networking tools, methods and techniques to develop the websites for their customers. In order to keep in touch with the customers, Smith Systems Consulting…

  • Mass Media and Its Role in Society

    About 5,000 AM and 5,000 FM stations are broadcasting in local communities as are 1,550 commercial and 350 educational television stations (Hiebert 2001). All citizens are heavily exposed to mass media, but how is this enormous amount of ready information impacting society? Does it influence opinions or reflect society’s thoughts, and feelings? Obviously, mass media does indeed influence opinion as it is the genesis of the information by which opinion is formed. To what degree depends on the variables considered as the effects of mass communication are many and diverse and may be short or long-term, obvious or concealed, intense or ineffectual. They may derive from any number of aspects…

  • The Microsoft trial the Pro an Cons

    Microsoft countered that innovation and competition were not unlawful, and that the browser and the operating system were inseparable as the browser was not a separate product but a feature of the operating system. Microsoft purported to demonstrate this in court by showing a video of the sluggish performance and increase in errors that would occur if the browser was removed from the product.The DOJ submitted evidence to show that the browser and operating system were separable. They also pointed out that it was possible to obtain a standalone version of the browser, for example for the Macintosh operating system.Although Microsoft argued that the browser was being provided free, the…

  • Remote temperature sensor

    Instrumentation and control are a vital part of any feedback automated system. Research and control data must be collected frequently and recorded as soon as it is collected in order to draw conclusive results from it. The results obtained can be used for controlling and monitoring of many industrial applications or may give results towards an experiment that is being carried out. This project consists of a remote temperature sensor. It comprises of a different sensors located at ten different geographical areas. The sensors measure the temperature of the surrounding and send it after every ten minutes to a computer located at a meteorological department.In this project, a metrological data…