...such as Teaching Strategies and Army Knowledge Online (AKO). Qualified to provide educational training for pre-kindergarten and autistic students. Capable of mentoring new employees to perform organizational task and complete objectives. Demonstrate strong interpersonal skills with various individuals to meet learning objectives and fulfill educational goals, including teachers, coworkers, and parents/guardians. PROFESSIONAL EXPERIENCE Child & Youth Program Assistant/Driver June 2012 – Present Child, Youth and School Services: JoAnn Blanks CDC 9999 Gaylor Road, Bldg. 7 Fort Belvoir, VA 22222 Serve as liaison between parents and staff by preparing written...
Words: 500 - Pages: 2
...Susan W. Eaton 14 Any Street Brooklyn, NY 22222 someone@example.com (718) 555-5555 OBJECTIVE • DEDICATED, SERVICE-FOCUSED PROFESSIONAL SEEKING TO TRANSITION INTO HEALTHCARE AS A NURSING ASSISTANT. • Highly motivated to launch nursing career; future goals include education leading to NA certification and, ultimately, an RN license. • Reliable worker with the ability to quickly learn new concepts and skills. • Backed by a solid work history, reputation as a team player and passion for helping others. • Background includes experience caring for terminally ill cancer patient. • Current on all immunizations (including tuberculosis and hepatitis B). WORK EXPERIENCE WAITRESS 8/2005 – Present, ABC Restaurant, Brooklyn, New York • Received "exemplary" and "exceeds expectations" ratings on all performance reviews. Cited for excellence in interpersonal communications, teamwork, customer service, flexibility and reliability. • Demonstrated the ability to interact with customers from diverse cultures and backgrounds. • Transformed "difficult" customers into loyal, repeat guests by leveraging strengths in premium service delivery and ability to find win-win resolutions. • Commended for multitasking abilities; frequently assigned the largest section of restaurant during peak dining hours. • Recognized for superior performance and dedicated service commitment through four-time awards as "Employee of the Month." Primary...
Words: 311 - Pages: 2
...------------------------------------------------- Ima Pirate 222 Blackbeard Drive • Greenville, NC 22222 • (252) 222-2222 • pirate10@students.ecu.edu Objective To obtain a summer internship at the Institute of Children’s Studies utilizing my formal education and practical skills in research, statistical analysis, and working with children Skills Profile Time ManagementEmpathetic ListenerChildcare | Detail-orientedOrganizational SkillsSPSS II | Excellent CommunicatorPresentation SkillsSYSTAT 8.0 | Education Bachelor of Arts in Sociology, East Carolina University, Greenville, NC GPA 3.5/4.0, Dean’s List, Chancellor’s ListWorked up to 30 hours per week throughout college career to finance education | May 2011 | Relevant Coursework Methods of Research, Introduction to Quantitative Sociology, Advanced Techniques in Quantitative Sociology, Advanced Applied Research, Child Development, Family and Cultural Diversity Certification CPR, First Aid Relevant Experience Research • Assisted in a thesis experiment to research phenomenon of learned helplessness in rats, pigeons, and human subjects utilizing traditional and computerized Skinner boxes • Cared for animal subjects in compliance with appropriate protocols • Maintained laboratory facilities Statistical Analysis • Collaborated with a team of four to create and implement a survey for Methods of Research class project • Wrote 10 original questions to test student population’s knowledge...
Words: 320 - Pages: 2
...Write the following queries in SQL: Display a list of all instructors, showing their ID, name, and the number of sections that they have taught. Make sure to show the number of sections as 0 for instructors who have not taught any section. Your query should use an outer join, and should not use scalar subqueries. By using the university schema provided by db-book.com the following queries were done on the university database. The first query uses an outer join which works similar to the join operation but it keeps the rows that don’t match between the two tables that would be lost in a join operation. There are three forms of outer join: a) Left outer join displays the results from the left table even if the condition does not find any matching record in the right table. b) Right outer join will displays the results from the right table regardless if there is matching data in the left table. c) Full outer join will retain all rows from both tables, regardless if the data matches or not. The group by clause when used in a select statement collects data from multiple records and groups the results into one or more columns. The below is the query using left outer join operation: select ID, name, count(sec_id) as Number_of_sections from instructor natural left outer join teaches group by ID, name; The next query was written by using a scalar subquery without using an outer join operation. A scalar subquery is where the output of a subquery returns only...
Words: 414 - Pages: 2
...Sample Letter of Inquiry The Virtual Community Group, Inc. 17 Park Road Rural Town, NH January 2, 2011 Jane Smith, Executive Director Xavier Foundation 555 S. Smith St. Washington, D.C. 22222 Dear Ms. Smith, I am writing to inquire whether the Xavier Foundation would invite a proposal from the Virtual Community Group, Inc., requesting an investment of $50,000 per year over two years to support our Enterprise 2000 initiative. This grant would provide part of the funds needed for us to train at least 1200 low-income entrepreneurs in rural New Hampshire in the computer skills they need to create sustainable businesses as we enter the twenty-first century. Your literature indicates that the Xavier Foundation is searching for innovative ideas to improve the lives of the rural poor; we believe Enterprise 2000 falls well within your area of interest. We believe that broadly-implemented technical skills programs such as Enterprise 2000 have the potential to transform the lives of many struggling entrepreneurs, and change the economic landscape of impoverished rural communities. Unlike many poverty alleviation initiatives, all of the Virtual Community Group programs are predicated on the assumption that these entrepreneurs already have 90% of what it takes to compete in the marketplace -- intelligence, ambition, initiative, and talent. After two years of experimentation and program development, the Virtual Community Group has fashioned a superb, easily replicable model...
Words: 418 - Pages: 2
...Effect of rating scale categories on reliability and fit statistics of the Malay Spiritual Well-Being Scale using Rasch analysis. 1Aqil Mohammad Daher, 2Sayed Ahmad Hassan, 3Than Winn, 4Mohd Ikhsan Selamat 1,4Population health and preventive medicine, faculty of medicine University Teknologi MARA, Sungai Buloh, Selangor Malaysia 2Department of Psychiatry, faculty of medicine University Teknologi MARA, Selayang, Selangor, Malaysia 3Department of Community Medicine, Mahsa University College, Kuala Lumpur, Malaysia Abstract Introduction Handful literatures have explored the effect of rating categories on reliability based on classical test theory indices, fewer studies have employed the item response theory in examining reliability. We carried out this study to examine the effect of rating scale categories (RSC) on reliability and fit statistics of the Malay Spiritual Well-Being Scale using Rasch model. Methods The Malay Spiritual Well-being scale (SWBS) with the original six and newly introduced three and four rating categories (RSC) was distributed randomly among three different samples of 50 participants each in different community screening programs at in Selangor state , Malaysia. Results The mean age of respondent in the three samples ranged 36-39 year, majority was females in all samples, and Islam was the major religion of respondents. Malay race was predominating followed by Chinese then Indian. Most participants were employed and more than a half in all...
Words: 4515 - Pages: 19
...The University of Melbourne Department of Computer Science and Software Engineering 433-254 Software Design Semester 2, 2003 Answers for Lab 2 Week 3 1. Writing Simple Classes: a) In Java systems, there is only one class with the ‘main’ function, which initiates the execution of the whole system. Therefore, in order to test individual classes (i.e. unit testing), developers are usually writing a simple class with a main function (also known as a driver class) that simply calls all different functions of a target class and prints the results. Your task is to download the file “Keyboard.java” from: www.cs.mu.oz.au/254/Keyboard/Keyboard.html and write a simple driver program that tests the following methods from Keyboard.java: readInt() readString() readLong() readWord() readFloat() readChar() readDouble() readBoolean() Sample Answer: // A class to execute one or more Keyboard methods class Test { public static void main(String[] args) { System.out.print("Please enter a string: "); String str = Keyboard.readString(); System.out.println("String = " + str); System.out.println(); System.out.print("Please enter a word: "); String word = Keyboard.readWord(); System.out.println("word = " + word); System.out.println(); System.out.print("Please enter a character: "); char ch = Keyboard.readChar(); System.out.println("char = " + ch); System.out.println(); System.out.print("Please enter a boolean (true/false): "); boolean bool = Keyboard.readBoolean(); System.out.println("boolean...
Words: 1072 - Pages: 5
...Net-Worm.Win32.Kido.ih Detected | Feb 20 2009 07:04 GMT | Released | Apr 02 2009 16:24 GMT | Published | Feb 20 2009 07:04 GMT | Manual description Auto description This description was created by experts at Kaspersky Lab. It contains the most accurate information available about this program. Manual description Auto description This is a description which has been automatically generated following analysis of this program on a test machine. This description may contain incomplete or inaccurate information. Technical Details Payload Removal instructions Technical Details This network worm spreads via local networks and removable storage media. The program itself is a Windows PE DLL file. The worm components vary in size from 155KB to 165KB. It is packed using UPX. Installation The worm copies its executable file with random names as shown below: %System%\<rnd> %Program Files%\Internet Explorer\<rnd>.dll %Program Files%\Movie Maker\<rnd>.dll %All Users Application Data%\<rnd>.dll %Temp%\<rnd>.dll %Temp%\<rnd>.tmp <rnd> is a random string of symbols. In order to ensure that the worm is launched next time the system is started, it creates a system service which launches the worm’s executable file each time Windows is booted. The following registry key will be created: [HKLM\SYSTEM\CurrentControlSet\Services\netsvcs] ...
Words: 1158 - Pages: 5
...Graduate Institute of Human Resource Management, NSYSU Research Method (I), 2013: Data coding, reliability, and EFA All Rights Reserved by Prof. Nai-Wen Chi I. Data coding after collecting the returned questionnaires: 1. Based on the order of questions, build an excel file for data input. 2. Take out the questionnaires, key in the responses of each questions. If the participants do not answer the question, please leave it blank. 3. When keying in the data, please pay attention to if the participants rate all same response in the whole questionnaire (e.g., 1111111, 22222, 333333). If you find such participants, record the number of such questionnaires and we might drop the data from these questionnaires. 4. When coding the “gender”, please code male as “0” and female as “1” for following analyses. 5. If you are collecting the data of “tenure” or “age”, please ask participants to fill the actual number (e.g., 33 years old). Do not use the categorical responses (e.g., 1-5 years, 6-10 years, 11-15 years…), which will reduce some useful information. ↑ Open a new excel file. Build the coding sheet based on the order of questions/items (e.g., to1-to3, ns1-ns3…) from the left side to the right side. Then key in the data of each questionnaire item by item. When coding the data, please pay attention to the five tips highlighted above. 1 Graduate Institute of Human Resource Management, NSYSU Research Method (I), 2013: Data coding, reliability, and EFA All Rights Reserved...
Words: 1437 - Pages: 6
...Finite Element Method(FEM) for Two Dimensional Laplace Equation with Dirichlet Boundary Conditions April 9, 2007 1 Variational Formulation of the Laplace Equation The problem is to solve the Laplace equation rPu = 0 (1) in domain subject to Dirichlet boundary conditions on @ . We know from our study of the uniqueness of the solution of the Laplace equation that nding the solution is equivalent to nding u that minimizes 1 Z jjrujjPd W= (2) 2 subject to the same boundary conditions. Here the dierential d denotes the volume dierential and stands for dxdy for a plane region. W has interpretations such as stored energy or dissipated power in various problems. 2 Meshing First we approximate the boundary of by polygons. Then can be divided into small triangles called triangular elements. There is a great deal of exibility in this division process. The term meshing is used for this division. For the resulting FEM matrices to be well-conditioned it is important that the triangles produced by meshing should not have angles which are too small. At the end of the meshing process the following quantities are created. Nv : number of vertices or nodes. Nv ¢ 2 array of real numbers holding the x and y coordinates of the vertices. Ne: number of triangular elements. 1 Ne ¢ 3 array of integers holding the vertices of the triangular elements. Nvf : Number of vertices on which the u values are not...
Words: 1740 - Pages: 7
...Introduction There used to be a time when personal grooming products were used by only women. It is because nobody then had asked men what they wanted. In last 5 yrs the prophecy seems to have changed. In 2004, Emami conducted a survey to study the attitude of Indian customers towards the use of cosmetics products. They found out that the Indian male takes an average of 20 minutes in front of mirror to groom them compared to an Indian female who takes an average of 18 minutes in front of mirror every morning. They also found out that 25-30% of the fairness products available in the market were purchased and used by male customers. Hence, identifying a need in the market for men specific fairness creams, Emami launched ‘Fair And Handsome’ – the first men fairness cream to be launched in India in 2005. Emami roped in Shahrukh Khan as its brand ambassador two years later and came out with the popular ‘Hi Handsome’ television commercial. The product was a success and instantly led to a plethora of men grooming products including fairness creams to enter the market. HUL came with Fair & Lovely Menz Active in 2006 and next came Nivea for Men Whitening Moisturiser and Nivea for Men Multi-White Whitening Facial Foam. In 2009, Garnier India entered men's skin care with the Men's Powerlight range that also includes face wash and moisturiser followed by HUL extending its presence by introducing the Vaseline Men range. According to latest statistics, the men's fairness products...
Words: 3067 - Pages: 13
...Business Perspective Assignment | | | Vibhor GargPGDM- Marketing CommunicationRoll No.: 56 | LIST OF CONTENTS | Topics | Page No | 1. | Why Zara? | 2 | 2.2.12.22.32.4 | OverviewBackgroundBeginningGlobal ExpansionsFinancials | 22222 | 3. | Brand Positioning | 3 | 4.4.14.24.34.4 | PEST AnalysisPoliticalEconomicSocio-CulturalTechnological | 33344 | 5.5.15.25.35.4 | SWOT AnalysisStrengthsWeaknessOpportunitiesThreats | 44556 | 6.6.16.26.3 | Business Strategies5 P’s of MarketingPorter Five Force analysisMaslow’s Hierarchy | 77810 | 7. | Recommendations | 11 | 1. WHY ZARA? “People will stare, make it worthwhile”. According to me this is the most apt quote for fashion, clothing. Designer clothes are meant for this sole purpose only and yes, the feel good factor follows. I had dreamt of becoming a fashioner designer during my school days. But due to social stigma I ended up being an engineer and now an mba aspirant. So now instead of designing clothes, I’m studying what makes clothing brand a successful brand. From childhood, I have been a brand hungry person and this has developed a curiosity in me as to how and what makes me want these brands. There are many clothing brands which I have been loyal to but for my individual assignment I have chosen Zara, as it is the new sensation in the market. Being a shopaholic my self I love the brand as they really have a great collection. 2. OVERVIEW 2.1 Background Zara is a flagship brand of...
Words: 4386 - Pages: 18
...Network Performance Project Benchmarking of Wireless Routers Pedro Bustamante Noopur Chowdhary School of Information Science University of Pittsburgh Pittsburgh, United States pjb63@pitt.edu School of Information Science University of Pittsburgh Pittsburgh, United States noc13@pitt.edu Abstract— This paper explores a basic technique for Network Performance Analysis: Compare alternate equipment based on real measurements. Further, this work describes the comparison between two wireless routers configured as access points. The analysis of the equipment was implemented in terms of throughput (TCP) and jitter (UDP). In this way, this work aims to show the results of the benchmarking process of two wireless routers from different vendors through the utilization of a basic performance terminal tool such as “iperf”. Keywords—benchmarking; wireless; routers. network; performance; II. GOALS • First, this project seeks to execute, analyze and evaluate a Network Performance Analysis based on real measurements. • To benchmark two wireless routers of different vendors using an active software network performance tool such as iperf. • To measure and evaluate the total available throughput of parallel TCP connections over tested wireless routers (acces points) in a server/client configuration. • To determine and exanimate the average jitter and percentage of lost packets of parallel UDP connections over the tested wireless...
Words: 4964 - Pages: 20
...The Quality of Data Introduction Value Errors Missing Data and Bad Structures Entity Resolution Anonymous Resolution Conclusion 34 35 39 50 62 66 1 DATA MINING FOR INTELLIGENCE Introduction Computer processors are faster than ever, storage is fairly cheap, network bandwidth is continually expanding, and information technologies are capable of integrating massive amounts of data. With all of these high-end systems and capabilities, there is still a limitation on performing effective analytics and much of this has to do with the quality of the data collected throughout the years. The real challenge lies in improving the accuracy of the data through better collection and representation methods. Only when this problem is appropriately addressed can one realistically expect to see improvement in the detection and analytics of fraud, terrorism, money laundering, and other critical areas. One high-profile situation emphasizes this point. It was reported1 that Senator Edward Kennedy (Massachusetts) was stopped while boarding airline fl ights on five different occasions because his name matched an entry on a government no-fly list. Additionally, Congressman John Lewis (Georgia) claims he was required to submit to additional security checks because his name also matched one on a watch list. In both cases, the data processed by these systems represented only a limited portion of what was necessary to properly perform an appropriate match. Ultimately the situations were...
Words: 10818 - Pages: 44
...Table of Contents CHAPTER 1 INTRODUCTION 4 Quality of life 4 1.1 Company Profile 9 1.1.2 Name of Company 9 1.1.3 Company History 9 1.1.4 Vision & Mission & Core value 11 1.1.5 Business Objectives 12 1.1.6 Corporate Social Responsibility (CSR) 13 1.2 Leadership Profile 14 1.3 Product Profile 16 CHAPTER 2 INDUSTRY ANALYSIS 17 2.0 Porter’s Five Forces 17 2.1 Intensity of rivalry among existing competitors 17 2.2 Threats of entry 18 2.3 Threat of substitutes 20 2.4 Bargaining power of supplier 20 2.5 Bargaining power of consumers 21 CHAPTER 3 EXTERNAL ANALYSIS 22 3.0 PEST Analysis 22 3.1 Political 22 3.2 Economic 22 3.3 Social 23 3.4 Technology 24 CHAPTER 4 COMPETITOR ANALYSIS 24 4.1 VIOR 25 4.2 GIORDANO 27 CHAPTER 5 INTERNAL ANALYSIS 28 5.1 Bases of competitive advantage 28 5.2 Organisational advantages 28 5.3 Functional/Departmental advantages 28 5.4 Inter-relationships with outside bodies 29 5.6 Financial Ratio Analysis 30 5.6.1 Profitability Ratio Analysis 30 5.6.2 Liquidity Ratio Analysis 31 5.6.3 Leverage Ratio Analysis 33 5.6.4 Activity Ratio Analysis 34 5.7 Value Chain Analysis 35 5.8 Target customer 36 5.9 SWOT 37 CHAPTER 6 STRATEGY ANALYSIS 40 Strategic Option A: S1S2S3O1 - Merger and acquisition strategy 40 RACES Evaluation: 41 Strategic Options B: S1S4T2 - Product development strategy (Defensive Strategy) 44 RACES Evaluation: 44 Strategic option C: W1W2T1 - Technology development...
Words: 15563 - Pages: 63