...Communications, Geography& Planning, Psychology, Political Science, Sociology and Economics) in the Faculty of social science. 24 questionnaires were dropped from the analysis on the count of incomplete data entry at the respondent end. Therefore, the analysis presented is for the remaining 300 questionnaires i.e n= 300. The findings revealed that Blackberry mobile phone influenced the lifestyle of more than half (180) 60% of the respondents, the male respondents 96 (32%) were more influenced compared to the female respondents 84 (28%) and the male respondent (52%) couldn’t do without the Blackberry mobile for a day as compared to the female, (48%). The research found that Blackberry mobile phone had influence on the lifestyle of its users. Within all duration of usage the highest influence of Blackberry mobile phone on respondents lifestyle were those who have had their mobile for less than 6 months, a total of (66) 22% respondent agreed and strongly agreed that their lifestyle had been influenced. Those...
Words: 12429 - Pages: 50
...MHz processing power; which is good for a router. When there are any power outages and internet usage is required; it lasts up to 3 hours. a. Telkom Prepaid service, 4mb/s uncapped ADSL for only R499 per month. Top-up is done online or through a phone so it is convenient that you get the data at your local supermarkets and retail stores. This makes it easier for the family no to use up a lot of data. 2. Installation of the router and computer configuration to the network. The configuration settings I maintained because it will pose as a huge issue if the...
Words: 718 - Pages: 3
...Bulletin of Education and Research December 2012, Vol. 34, No. 2 pp.19-28 Pattern of Facebook usage and its Impact on Academic Performance of University Students: A Gender Based Comparison Ahsan ul Haq & Sohail Chand _______________________________________________________________ Abstract This paper explores the popularity and usage pattern of the Facebook among the University students. A self-administered questionnaire is used for collecting data from a sample of 384 students. The study reveals that 87.5% of the students have account on the Facebook and no gender differences found. Male and female on the average spend equal time on internet. Though female users spend more time on Facebook than their counterparts but male users have more Facebook friends. Facebook use, in general, adversely affecting the academic performance of students but this adverse effect is observed greater for male students. The social interaction with the existing friends is found the most common use of the Facebook among students. Keywords: Facebook; Academic performance; Social networking. * Corresponding Author Pattern of Facebook Usage and its Impact on Academic Performance 20 Introduction Among the vast variety of online tools which are available for communication, social networking sites have become the most modern and attractive tools for connecting people throughout the world (Aghazamani, 2010). The first social networking site was created in 1997 in the name of Sixdegree.com, and now there...
Words: 2859 - Pages: 12
...you on successful completion of six months of probation in organization. You are require to assume your appointment by 21st December ‘2012 We wish you a long and mutual faithful stay with us. Thanking you, Yours truly, HR DATAWIND INNOVATIONS PVT LTD. 4. The probation period will be for six months. Thereafter you may be conformed after your performance review, willingness and approval of the CEO. 5. You will be eligible for leaves and other benefits as per rules of the Company as in vogue or altered from time to time. The company has right to amend the rules, which shall be applicable to you. 6. The address given by you and shown in letter will be treated as your address for all communications. In case of any change you will immediately inform the Company, accordingly. 7. You will be observe strict secrecy in respect of information , and working for the Company, its procedure & practices. You will not divulge any information to anyone. 8. Internet Usage: Your job will entail extensive usage of internet while in office. You are expected to use it judiciously and maintain internet hygiene. Personal usage, chatting, download and crashing of data in any form and from any source ( Computers, Mobile Phones and any other official device that you used and shall return ) should be avoided, intentionally erasingof such data will be constructed as destruction of company property. 9. Absence from duty without permission of the management for...
Words: 489 - Pages: 2
...competence and diligence, without misrepresenting material facts. All information disclosed to public must be accurate and understandable. - All funds must be properly recorded in books and records; no expenditures, investments, income or other financial information should ever go unrecorded. - It is critical that you report known or suspicious activity to your supervisor, human resource manager or above. - All employees of Company X are required to sign a Non-Disclosure Agreement and a Non-Compete Agreement prior to the start of employment. 2) Administration and Managing Records - Administration and managing records/contracts is critical to Company X and it is the key into running a successful business. - Records shall be maintained as required by law. - Attention to detail is crucial in keeping records accurate and is especially important when documents are produces for an official purpose such as government request for information or litigations. - Records will be staged or retained for a certain amount of years in case of investigation or litigation. Records need to be retained in whole and employees shall not destroy any records without approval from directors. Document destruction is conducted on an annual basis in December. The retention policy contains specific dates of staging and destruction. 3) Employee usage of Computer, Internet and Phones - Company X’s electronics and office equipment such as but not limited to computers, Internet, phones...
Words: 917 - Pages: 4
...Prestige Telephone Company Question 1: Appraise the results of operations of Prestige Data Services (PDS). Is the subsidiary really a problem to Prestige Telephone Company (PTC)? Consider carefully the differences between the reported costs and costs relevant for decisions that Daniel Rowe is considering. The current data indicate that the PDS is in operating loss. And going by the presented data, yes, PDS is a problem to PTC at this point of time. And this in spite of many major costs being absorbed by PTC while charging a sum towards corporate services to PDS. However the way data was collected, costs calculated and presented could be different from the actual reality. And moreover the trend in the 3 months is that the commercial sales is going up (marginally though) and losses are reducing. Also it is reported that PDS is operating with un-used capacity (which might be another reason for the projected loss). Though PDS is in loss currently, (a) a re-structuring of the cost accounting methods, (b) more marketing activities to increase sales and thereby using the free capacity available, (c) reducing the staff count by reducing the number of shifts, could see PDS being profitable in the long run. Shutting down vs. restructuring PDS The decision has to be based on the ROI and the opportunity cost. By closing down PDS, the lost (customer) sales are the opportunity cost. But the short term benefits could be from the sale of equipment, savings from resource cost, rental...
Words: 764 - Pages: 4
...IT for academic purpose is more advantageous than otherwise be invested especially for those whose academic curriculum mainly decorated in accordance with the modern up-to-date era of Information Technology. On the basis of intellectual interaction between premises and experiences gathered during study, investment on IT will help concerned students understanding how important IT is for their study. Index Terms: Intellectual interaction, Investment insights, IT importance, IT Payoff, Relationship of IT investment, Relevance of IT usage, Statistical tools, Up-to-date era of information technology. ———————————————————— 1. INTRODUCTION The overriding message that can be gleaned from most current research on the implementation of computer-based technology in education is that technology is a means, not an end; it is a tool for achieving instructional goals, not a goal in itself. And yet, many schools and districts have invested in computer-based technology before establishing clear plans for how to use this important tool. In today‘s world, computerbased...
Words: 8234 - Pages: 33
...REDEFINING COMPUTERS BY: LINCOLN NNAMDI CUMMINGS (133151009) Noah and his three sons built the ark using gopher wood.300ft long and 200ft wide, it stood 3 stories high and was built in 55 years (Genesis 6:14-16). The Titanic on the other hand was built in 2 years and 2 months even though they a relatively the same size. So comparably, the time Noah used to build The Ark could have been used to build 27 Titanics. What caused the time usage difference was the introduction of technology. The usage of computers (by computers I don’t just mean a rectangular box connected to a system unit with a mouse and a keyboard.) made productivity rate high. The first computers were used in building the pyramid in Ancient Egypt (constructed 2630 BCE–2611 BCE). The Khufu Pyramid stands 449ft high and is 755ft in width. The over 300,000 laborers used tools such as the plumb bob (a tool similar to a modern-day crane) which made a humanly impossible task possible. Throughout history, several man-made devices such as the abacus and slide rules have been built to aid people in calculating data. The original definition of a computer was any person who performed computation or was required to compute data as an integral part of their job. A computer is now universally defined as “a programmable “electronic device” that stores and processes data into meaningful information. In 1946, John Persper Eckert and John .W. Mauchly built the first digital computer (ENIAC) using vacuum tubes. Von Neumann designed...
Words: 935 - Pages: 4
...1. What is the difference between a. and a. One-month notice period before employee termination. High Moderate Significant Unauthorized data access or exfiltration by the departing employee. When an employee is terminated, they are given a one-month notice period as required by law. During this time, the employee retains full access to company information and systems according to their role. This situation poses a significant risk to the company, as the employee could potentially misuse their access to sensitive data. While this is taking place there is a compensating control in place where monitoring is conducted on two dimensions via EDR (Endpoint Detection and Response), tracking bandwidth usage and monitoring email traffic for unusual activity....
Words: 950 - Pages: 4
....1 Introduction of the Report My OCP report is an educational requirement of MBA Program under an assigned faculty International Islamic University Chittagong, Dhaka campus which is a professional degree. MBA students have to do an OCP report as a practical orientation to the workplace where he/she can amalgamate the traditional hypothetical knowledge. I have completed my MBA from International Islamic University Chittagong with major in Finance & Banking. 1.2 Objective of the Report * To present the overview of the operation QUBEE in Bangladesh. * To observe the activities of Sales & Distribution Department of QUBEE. * To demonstrate different aspects of marketing in the organization. * To find out the operational function of QUBEE’s different sales centers. * To analyze the customer satisfaction of wimax internet Service by QUBEE. * To compare sales and distribution between wimax internet service and dial up internet service. 1.3 Methodology The data needed to prepare this report has been collected from secondary sources. Secondary Data Source: The secondary data have been collected through QUBEE’s official website, Aamra group’s official website and others website related to report topic. 1.4 Limitations While doing the OCP report, I faced some obstacles. These are given below:- * OCP report is one kind of research work. Research work requires enormous time and effort. But the time provide to us is not enough to do the report...
Words: 7140 - Pages: 29
...OVERVIEW Physical security is primarily concerned with restricting physical access by unauthorized people (commonly interpreted as intruders) to controlled facilities, although there are other considerations and situations in which physical security measures are valuable (for example, limiting access within a facility and/or to specific assets and controls to reduce physical incidents such as fires). Security unavoidably incurs costs and, in reality, it can never be perfect or complete - in other words, security can reduce but cannot entirely eliminate risks. Given that controls are imperfect, strong physical security applies using appropriate combinations of overlapping and complementary controls. For instance, physical access controls for protected facilities are generally intended to: • deter potential intruders (e.g. warning signs and perimeter markings); • distinguish authorized from unauthorized people (e.g. using pass cards/badges and keys) • delay and ideally prevent intrusion attempts (e.g. strong walls, door locks and safes); • detect intrusions and monitor/record intruders (e.g. intruder alarms and CCTV systems); and • trigger appropriate incident responses (e.g. by security guards and police). It is up to security designers to balance security controls against risks, taking into account the costs of specifying, developing, testing, implementing, using, managing, monitoring and maintaining the controls. Physical access control is a matter of who, where, and...
Words: 2097 - Pages: 9
...In 1969, Leonard Kleinrock , one of the chief scientists of the original Advanced Research Projects Agency Network (ARPANET) which seeded the Internet, said: “As of now, computer networks are still in their infancy, but as they grow up and become sophisticated, we will probably see the spread of „computer utilities‟ which, like present electric and telephone utilities, will service individual homes and offices across the country.” This vision of computing utilities based on a service provisioning model anticipated the massive transformation of the entire computing industry in the 21st century whereby computing services will be readily available on demand, like other utility services available in today’s society. Similarly, users (consumers) need to pay providers only when they access the computing services. In addition, consumers no longer need to invest heavily or encounter difficulties in building and maintaining complex IT infrastructure. In such a model, users access services based on their requirements without regard to where the services are hosted. This model has been referred to as utility computing, or recently as Cloud computing . The latter term denotes the infrastructure as a “Cloud” from which businesses and users can access applications as services from anywhere in the world on demand. Hence, Cloud computing can be classified as a new paradigm for the dynamic provisioning of computing services supported by state-of-the-art data centers that usually employ Virtual...
Words: 1281 - Pages: 6
...PC Repair PC Repair will provide computer and technical consulting and will provide you with various services like repairing, training, networking and upgrading to all local small businesses as well as home PC users. The company will focus on marketing, responsiveness, quality and creating and retaining customer relations. PC repair was initially formed as a sole proprietorship but was reconfigured as an S Corporation in December 2004. PC repair will currently be a home office start up, utilizing one studio room in the owner’s home situated in Sheikh Zayed Road, Dubai. In the third month of our plan, we will move into a leased office space and hire a second technician. As our sales and profits increase, we plan to hire more personnel. With the extraordinary rate of technological development in the computer industry, there is a constant need for businesses that are specialized in updating and advising customers on computer related issues. Small business PC users will provide the majority of our business revenue. PC Repair has decided to focus mainly on the small business market, as these customers usually don’t have a full time IT person, but have full time IT needs. PC repair will offer an affordable, on demand service for these customers. We can also offer maintenance agreements that generate additional monthly income. For our residential customers, we will offer a very affordable and helpful service with a very flexible schedule to meet their needs. Our market...
Words: 2542 - Pages: 11
...Handbook of Grammar, Mechanics, and Usage Grammar and mechanics are nothing more than the way words are combined into sentences. Usage is the way words are used by a network of people—in this case, the community of businesspeople who use English. You’ll find it easier to get along in this community if you know the accepted standards of grammar, mechanics, and usage. This handbook offers you valuable opportunities in two sections: ● C. modifying elements misplaced (dangling) D. structure not parallel E. nothing wrong ____ 1. Stop here. ____ 2. Your duties are interviewing, hiring, and also to fire employees. ____ 3. After their presentation, I was still undecided. ____ 4. Speaking freely, the stock was considered a bargain. ____ 5. Margaret, pressed for time, turned in unusually sloppy work. ____ 6. Typing and filing, routine office chores. ____ 7. With care, edit the report. ____ 8. When Paul came to work here, he brought some outmoded ideas, now he has accepted our modern methods. ____ 9. To plan is better than improvising. ____ 10. Hoping to improve performance, practice is advisable. The following choices apply to items 11–20. In each blank, write the letter of the choice that identifies the underlined word(s) in each sentence. A. B. C. D. E. subject predicate (verb) object modifier conjunction/preposition ● Diagnostic Test of English Skills. Testing your current knowledge of grammar, mechanics, and usage helps you find out where your strengths and weaknesses lie. This test...
Words: 15492 - Pages: 62
...Salem Telephone Company 1.Variable Cost: Power, Operations: hourly personnel. Fixed Cost: Space cost-rent, Custodial services, Computer leases, Maintenance, Computer equipment depreciation, Office equipment and fixtures depreciation, Operations: salaried staff, systems development and maintenance, Administration, sales, sales promotion, Corporate services. 2. Cost per revenue hour=Cost/revenue hour Power: January: 1546/329=4.6991 February: 1485/316=4.6994 March: 1697/361=4.7008 Operations: Hourly personnel: January: 7896/329=24 February: 7584/316=24 March: 8664/361=24 3.Total Revenue Hour=Intracompany Usage+ Commercial Revenue Hour=205+138=343Hours According to the reading, intracompany work was billed at $400 per hour and commercial sales were billed at $800 per hour, so the total sales should equals 400*205+800*138=192,400 Variable Cost=Revenue Hours*Variable Cost per Revenue Hour =24*343 + 4.7*343 =9844.1 Fixed Cost=the sum of all of the fixed cost (Because Sales Promotion and corporate services are commercial usage, so calculating them at March level) = 8000 +1240 +95000 +5400 +25500 +680 +21600 +12000 +9000 +11200 +8083 +15236=212,939 Contribution Margin Income Statement Sales 192,400 Variable Costs (9844.1) Contribution Margin ...
Words: 753 - Pages: 4