Premium Essay

Ms. Gray

In:

Submitted By cmg23
Words 487
Pages 2
Christie M. Gray Gray 01
Professor Wilkinson
Summer Quarter 2013
24 July 2013

Descriptive Statics
Being a former employee with the Secretary of State Driver Services
Department, also known as the Driver’s License Facility. There are a number of ways in which the organization displays the use of descriptive statics. According to Lind,
“descriptive statistics is defined as methods of organizing, summarizing, and presenting data in an informative way.” The Secretary of State’s office is one of the largest and most diverse offices of its kind. It provides more direct services to Illinois citizens than any other public agency. When an Illinois citizen comes in contact with the state government, it is most often through the Secretary of State’s office. Secretary White’s administration is committed to making the office’s services the most accessible and customer friendly in the nation. The Office of the Secretary of State is visited by more Illinois residents than any other in state government. The Driver Services Department issues licenses to more than 8.5 million drivers and more than 3 million photo identification cards to drivers and non- drivers at more than 130 locations. The office generates approximately $2 billion in annual revenue with about $1.2 billion a year designated for state highway construction funds. The office issues vehicle license plates, titles, and collects taxes for the
Department of Revenue on vehicles and administers the states’ organ/ tissue donor registry. Without statistics this would be a task trying to account for inventory and revenue. As we use consumables and supplies, the system automatically generates and reorders new supplies, once supplies reach a certain number. Also, in regards to organ Gray 02

donor registry, there is a separate data base that holds numbers of

Similar Documents

Free Essay

Pearls

...5 Gauss line = 5 mT = 0.005 T Average background radiation dose to US citizen = 300 mrem Consider therapeutic abortion if dose to fetus > 10 rad (0.1 Gy) To categorize area as restricted from general public, average dose rate > 2 mrem/hr If Tc99m is given to lactating female, cease breast-feeding for 4 days Terminate breast-feeding altogether after administration of I131 or Ga67 Test for Mo99 contamination in Tc99m samples by using a dose calibrator Use thin layer chromatography to test for free Tc in Tc99m Use colorimeter to test for Al in Tc99m MDP White label I < 0.5 mrem Yellow < 50 mrem/hr – AND – not > 1 mrem/hr @ 1 meter Yellow III > 50 mrem/hr – OR – > 1 mrem/hr @ 1 meter Maximum allowable exposure to family members of patients with I131 = 5 mSv Risk for congenital defects from radiation to general population significantly increases > 15 rad (150 mGy) Radiotherapy dose must be > 20% to report to NRC A well counter does not use a gas-filled chamber to detect radiation levels Mo99/Tc99m generator operates on principle of transient equilibrium and is state where daughter radionuclide is short than that of parent radionuclide In secular equilibrium, radioactive daughter’s decay rate is balanced by own decay rate Risk of congenital defects to fetus significantly increases > 100 mGy Annual occupational dose equivalent limit to single organ in radiation worker = 50000 mrem (500 mSv). NaI123 has t1/2 = 13.2 hr Theraspheres used...

Words: 373 - Pages: 2

Premium Essay

American Quarter Horse Research Paper

...Lauren Sims Mrs.Cordon Literature October 10, 2014 The American Quarter Horse Some horses are great at jumping, some at dressage, and some at western, but did you know there is one horse that can do it all? The American Quarter Horse, also known as the “Do it all horse”, can really do it all! They can do everything from racing, jumping, and dressage, to reining, barrel racing, and other rodeo events. That is why the American Quarter Horse is the most popular breed in the U.S! Please keep reading to learn more about the American Quarter Horse. When the Spanish explorers came to America in the 16th century they brought their horses. The Spanish horses were called Jennets. Jennets were short, stocky, and muscular. Although they were short, they were quick, dependable, and very intelligent. The population of Jennets increased and increased. The Spanish would either keep them for herding cattle or trade them to Native American tribes that would use them for hunting. Some jennets were wild and are called mustangs. In the 17th century the English came to America, they built colonies along the east coast and they also brought their horses. The English horses are called Thoroughbreds. They were tall, skinny, had long legs, and were also very fast. The Thoroughbreds also had a lot of work, they were saddled for long rides, used for pulling plows, heavy loads, and sometimes hitched to wagons. It wasn't long after the Thoroughbreds arrived that they started breeding them with the jennets...

Words: 669 - Pages: 3

Premium Essay

Basic Commands in Linux and Windows

...LESSON 2 BASIC COMMANDS IN LINUX AND WINDOWS LESSON 2 – BASIC COMMANDS IN LINUX AND WINDOWS “License for Use” Information The following lessons and workbooks are open and publicly available under the following terms and conditions of ISECOM: All works in the Hacker Highschool project are provided for non-commercial use with elementary school students, junior high school students, and high school students whether in a public institution, private institution, or a part of home-schooling. These materials may not be reproduced for sale in any form. The provision of any class, course, training, or camp with these materials for which a fee is charged is expressly forbidden without a license including college classes, university classes, trade-school classes, summer or computer camps, and similar. To purchase a license, visit the LICENSE section of the Hacker Highschool web page at www.hackerhighschool.org/license. The HHS Project is a learning tool and as with any learning tool, the instruction is the influence of the instructor and not the tool. ISECOM cannot accept responsibility for how any information herein is applied or abused. The HHS Project is an open community effort and if you find value in this project, we do ask you support us through the purchase of a license, a donation, or sponsorship. All works copyright ISECOM, 2004. 2 LESSON 2 – BASIC COMMANDS IN LINUX AND WINDOWS Table of Contents “License for Use” Information....................

Words: 2543 - Pages: 11

Free Essay

Realization

... 10 out of 10 points | | | A multi-tasking operating system is capable of executing more than one program at a time for a user.Answer | | | | | Selected Answer: |  True | Correct Answer: |  True | | | | |  Question 2 10 out of 10 points | | | ASCII code is one of the code schemes used to represent characters in a byte.Answer | | | | | Selected Answer: |  True | Correct Answer: |  True | | | | |  Question 3 10 out of 10 points | | | Operating systemAnswer | | | | | Selected Answer: |  d.  all of the above | Correct Answer: |  d.  all of the above | | | | |  Question 4 10 out of 10 points | | | About 95 percent of the UNIX operating system is written in C language.Answer | | | | | Selected Answer: |  True | Correct Answer: |  True | | | | |  Question 5 10 out of 10 points | | | The two major versions of the UNIX operating system are AT&T's UNIX version V and Berkeley UNIX.Answer | | | | | Selected Answer: |  True | Correct Answer: |  True | | | | |  Question 6 10 out of 10 points | | | You must login to use the system. It means that, in response to prompts you type your user Id and password.Answer | | | | | Selected Answer: |  True | Correct Answer: |  True | | | | |  Question 7 10 out of 10 points | | | You can change your password as many times as you wish.Answer | |...

Words: 285 - Pages: 2

Free Essay

Ct Essay

...Importance of Radiation Safety in Computed Tomography Advances in computed tomography (CT) technology have continued to open new clinical applications, including several procedures for evaluating heart disease. The speed with which CT technology is changing is somewhat unparalleled in medical imaging. The equipment is becoming faster and faster. In the 1990s, a patient had to remain in a CT gantry for a period of approximately 10 minutes for a chest CT, whereas now it takes a few seconds to scan the entire chest. This may give the impression that radiation dose in CT is small, which is not the case. To give an example, a typical chest CT can impart a radiation dose equivalent to hundreds of chest radiographs. The offshoot of higher speed is that shoulder to pelvic scans or even head to pelvic scans are becoming more common, and this is raising questions of justification. Repeat scans on the same patients are also not uncommon. It is becoming clear that many CT examinations (typically one third) are unjustified and can be avoided through appropriate clinical judgment. There is no doubt that newer technology has increased the usefulness of CT examinations in areas where earlier there was little justification of CT. It has been documented that radiation dose to the patient can be reduced significantly through optimization actions. However, repeated examination on the same patient, or examination on a child or pregnant woman, requires a higher level of attention to radiation...

Words: 479 - Pages: 2

Free Essay

Asdfsaf

...PARENTING STYLES Developmental psychologists have long been interested in how parents impact child development. However, finding actual cause-and-effect links between specific actions of parents and later behavior of children is very difficult. Some children raised in dramatically different environments can later grow up to have remarkably similar personalities. Conversely, children who share a home and are raised in the same environment can grow up to have astonishingly different personalities than one another. Despite these challenges, researchers have uncovered convincing links between parenting styles and the effects these styles have on children. During the early 1960s, psychologist Diana Baumrind conducted a study on more than 100 preschool-age children (Baumrind, 1967). Using naturalistic observation, parental interviews and other research methods, she identified four important dimensions of parenting: * Disciplinary strategies * Warmth and nurturance * Communication styles * Expectations of maturity and control Based on these dimensions, Baumrind suggested that the majority of parents display one of three different parenting styles. Further research by also suggested the addition of a fourth parenting style (Maccoby & Martin, 1983). The Four Parenting Styles 1. Authoritarian Parenting In this style of parenting, children are expected to follow the strict rules established by the parents. Failure to follow such rules usually results in punishment...

Words: 4242 - Pages: 17

Free Essay

Marketing for Arabians Ltd

...Shaunya Fraysher Arabians LTD began as a tax deduction with five Straight Egyptian Arabian mares used for breeding in the 1970s. This company has become the world’s leading breeder of these rare horses. Arabians LTD enjoys annual net income of approximately 1 million dollars, not bad for a couple who started out looking for a tax break. Currently they market mostly oversees in Israel, Egypt, Saudi Arabia, and other countries in the Mid-East. Here in America their marketing is limited to Arabian horse magazines. This is the most efficient marketing campaign for the company at this time; however, I see opportunities for advancement. Egyptian Arabians are so rare that if not for being in captivity they would be on the endangered species list. This breed is the oldest know horse, both archeologically and recorded breeding, in the world. After all, who has not admired the hoses of the Pharaohs? Every horse must be able to have its ancestry traced to the Egyptian desert, wild caught prior to the early 1800s. No intentional breeding for physical characteristics other than that of the originals is permitted. In 2006, there were 17,000 true SE Arabians in the world. Using this as a marketing strategy here in the US could potentially bring in new investors who might invest for this reason. Expanding the advertisements into other horse magazines, web sites, and social media adds expressing the need to save this breed could potentially bring in financing or purchasers wanting to help “save”...

Words: 903 - Pages: 4

Free Essay

Full Size or Compact

...Full Size or Compact The love people have for horses have been around for centuries. There are many breeds of horses; the most popular is the Quarter Horse. Over the years a smaller breed of the Quarter Horse has emerged, the Quarter Pony. There is certain criteria a Quarter Horse must have, the Quarter Pony must meet certain criteria, and since the Quarter Pony comes from the Quarter Horse breed the two are alike and different. Even though the Quarter Pony is a small replica of the Quarter Horse, the Quarter Horse is one of the most recognized horse breeds in America. The Quarter Horse has certain criteria it must have to be considered for registration with the American Quarter Horse Association (AQHA). The following is some of the AQHA regulations that are required (AQHA, 2011). The horse must be 14.2 Hands High (HH) or taller, but not over 15.3 HH, must be from a bloodline of registered Quarter Horses (mother and father must be registered with the AQHA), the horse must be one of the 17 basic Quarter Horse coat colors, and must be tall, muscular, lean, and fast. The quarter Pony has certain criteria it must meet to register with the International Quarter Pony Association (IQPA). The following is some of the IQPA regulations that are required (IQPA, 2011). The horse is required to be under 14.2 HH and over 11.2 HH, must come from one parent that is registered with the AQHA (the mother or father must be registered with the AQHA), the horse does not have to be one...

Words: 512 - Pages: 3

Premium Essay

Zara Case

...ZARA: IT for Fast Fashion With ZARA's fashion business expanding, Salgado and Sanchez have a critical decision to make on whether to upgrade the current, seemingly out of date IT system. Like other large clothing retailers, ZARA adopts a highly standardized business model for ordering, design, manufacturing and procurement across all product categories and regions. However, unlike most clothing retailers, ZARA's business model is based on fast delivery times with minimal inventory, decentralized decision making process and very low data integration among different stores. Unlike its competitors, Zara relies on its individual store managers and designers, rather than an elite team of senior managers, to perform market research on latest trends and decide what clothes to design and procure. ZARA's approach to Information Technology is based on its business needs. In order to establish itself as a brand, which aligns closely with customers' taste, ZARA needs to have information on latest trends from all its stores to keep pace with the ever-changing fashion world. On the other hand, ZARA's popularity and high growth requires an upgraded IT system, which can be easily replicated and scalable to new stores. ZARA's current DOS system serves this purpose efficiently as it is easy to install in a newly opened store and requires little training. ZARA's approach of simple, non-integrated low cost IT investment is well in sync with its decentralized...

Words: 1179 - Pages: 5

Free Essay

Zara Case

...According to the point of view of Salgado , Zara is getting bigger and bigger and its operating system getting more and more obsolete. Thus, it gives Zara to have a comparative advantage because for a strategic perspective. Although Zara's advantage over its competitors is not so much a result of IT leverage, the sustainability of its competitive edge might be at risk due to a lack in IT investment.The current assumption for the IT investment states about 18,000 hours. The Zara's staff devoted to IT contains about 50 people divided in several departments. So we can suppose that only 10 people are devoted to POS software and so 10 people are able to handle this project. With a brief calculation, we can figure that it would take too much time to set up this project with an internal team. That is why we are prone to think that externalize would provide a more efficient solution, completely handle by an outsourced professional team. It could be a little more expensive at short and long term that is why if we choose this option we have to integrate a training system of our staff to lower the outsourced fees. An important point is that Zara has always developed its own IT solutions and if we make it through subcontractors we are not sure that it would match with Zara values or way of doing. Zara has been used to make it alone. Thus we think that some member of the IT staff could work with subcontractors in order to lower these expenses and help them to create an It solution...

Words: 600 - Pages: 3

Premium Essay

Effective Managerial Skills

.... Evaluate Microsoft’s strategy in good and poor economic times. In Good Economic Times: Microsoft is the world’s most successful software company. The original mission of this company is “a computer on every desk and in every home, running Microsoft software.” Microsoft's tactic was to be a software manufacturer and make its operating system available to computer manufacturers for use in their personal computer products, and then sell the owners of PCs software to run on that operating system. The history was begins in early 1980, where Microsoft creates DOS Operating System for IBM computer. The company used this inertial success with IBM to sell software to other manufacturer, quickly making Microsoft a major player in this industry. This is one of the changes for Microsoft to grown faster with the inertial advertising efforts focused on communicating the company range products from DOS to the launch of Excel and Windows. Later in 1986, Microsoft went to public with windows operating system and Microsoft office. The strategy contribute to launch this two application is a milestone for Microsoft to future successful. After that, Microsoft found an instant success where they launch the window 3.0 which is offered an improved set of windows icons and application like file manager and program manager where still being used today. Microsoft doing a magazine advertising and received endorsement from the top computer magazine in the industry is another...

Words: 321 - Pages: 2

Free Essay

Msom Ppt

...RAD 205 Scoliosis Problem Set 9/23/13 In RAD 205 you will be provided with an example calculation of the organ dose to a patient’s liver for one PA projections for scoliosis. The example assumes the exposure was made with 50 mAs at 90 kVp. For this Problem Set, recalculate the organ dose assuming the exposure was made with 20 mAs at 90 kVp. This assignment is organized into a series of problems. Each problem is worth 3 points (one point for correct equation, one for correct work, and one for the final answer). The example problem below illustrates what is expected. This example problem would earn 3 of 3 possible points. Example problem: If an exposure is measured at 25 milliRoentgen, what is the exposure in units of Roentgen? Equation(s): Show your work: State your answer: The problems that you are to solve are listed below. Refer to the class handout titled “RAD 205 Effective Dose to Patients in Diagnostic Radiography” as you work through these problems. 1 RAD 205 Scoliosis Problem Set 9/23/13 Problem 1. What is the Entrance Skin Exposure? Refer to page 3 of the handout and show your work on the nomogram at right. Equation(s): none for this problem. Use the nomogram instead of an equation. Show your work: Use a straight edge to draw a line starting at 90 kVp on the axis at the far right and ending at approximately 20 mAs at the axis on the left. Find the point at which your line crosses the axis in the middle (ESE). Read the approximate ESE...

Words: 415 - Pages: 2

Free Essay

Week Five

...While contrasting UNIX systems to Windows a few of the features discovered in UNIX incorporate: the usage of simple text for saving data; a ordered file system; UNIX manages tools for example printing equipments, mouse and keyboard and also other tools like files. The UNIX system also manages directories and procedures like files. There's only one root directory inside the UNIX operating system hierarchical tree. UNIX utilizes devices and applications via the command line in contrast to utilizing a single monolithic application which includes all the same functionality. The kernel offers services to begin and stop applications, deals with the file system that saves and arranges the computer system files and data. The kernel usually shifts data into as databases for storage and use. Both UNIX and Windows file systems are ordered and both support lengthy names as much as 255 characters. File Processing Evaluation UNIX programs that are based upon simple text files for setup use a lot of powerful devices that are utilized to process text files. Piping is widely utilized to reroute the result of one command to the input of the subsequent command. UNIX deals with most command in a consecutive order (first in first out) but the procedure may be overridden by making use of variables and alternatives (ADD). This lets commands to be installed collectively and implemented without storing all the results to an output file. UNIX utilizes commands that include: Echo - shows text...

Words: 2702 - Pages: 11

Premium Essay

Unix vs Windows Critique

...manufacturers (Apollo Group, Inc., 2005). With manufacturing plants in Albany, Georgia, Pontiac, Michigan, and Hangzhou, China, Riordan’s e-business plays a vital role in continued growth. Riordan’s Internet site states, “Riordan Manufacturing, Inc. is an industry leader in the field of plastic injection molding. Purpose The purpose of this paper is to discuss the differences between UNIX/Linux versus Microsoft Windows. Our paper will discuss facts that cover security, administrative, networking, performance, programmability. Security Technical One of the key differences between the Unix approach to system security and the MS Windows approach is that significant security characteristics of Unix systems are a consequence of good architectural design. Modularity within the system is another example of architectural security in UNIX, but lacking in MS Windows. These differences in the design and relative security of Unix and Microsoft OSs illustrate a distinct difference in philosophy between them. A couple of factors considered in regards to the security features are the importance of privilege separation, user control and automatic execution. Unfortunately, the difference appears to be that where Unix has a philosophy of security built into the...

Words: 2022 - Pages: 9

Free Essay

Os History

...Sistemas Operativos Historia En la década de 1940, los primeros sistemas electrónicos digitales no tenían sistemas operativos. Los sistemas de la década de 1950 en general funcionaban solamente con un proceso a la vez. Y se permitía una sola persona a la vez para utilizar la máquina. Todos los recursos de la máquina estaban a disposición del usuario. La facturación por el uso de la computadora era simple- porque el usuario tenía toda la máquina. Originalmente, cada usuario escribía todo el código necesario para implementar una aplicación concreta, incluidas las muy detalladas de la máquina de nivel de entrada/salida de instrucciones. Muy rápidamente, la codificación de entrada/salida necesaria para implementar funciones básicas se consolidó en un sistema de control de entrada/salida (IOCS). Los usuarios que deseaban realizar operaciones de entrada/salida ya no tenían que codificar las instrucciones directamente. En su lugar, utiliza las rutinas IOCS para hacer el trabajo real. Los primeros sistemas de almacenamiento real para un solo usuario fueron dedicados al trabajo más que al tiempo de ejecución del trabajo en sí. Los trabajos generalmente requerían un tiempo de configuración considerable alto durante el cual el sistema operativo, cintas y paquetes de discos se montaban, y las formas adecuadas se colocaban en la impresora, etc. Cuando los trabajos se completaban, se requería un tiempo considerable de "desmontaje" como cintas y paquetes de discos que eran retiradas, etc...

Words: 4031 - Pages: 17