...Evaluation This is an evaluation on the past three activities I have done for my controlled assessment. Over all, I must say there were parts I struggled in and other parts I did well in. I will talk about the audience purpose and how I made everything suit my target audience. My Logo: The first activity I completed was essential, it was my Logo. The reason why I found it important is because it is mainly what attracts people to getting to know what your project/event/product is all about – without a good logo, I personally think it is very hard to attract people. I started off by sketching out the logo I wanted and what I had in mind. I then was lucky enough an image I loved on google, it is a cartoon of a group of colourful children holding hands in a circle. I thought that really fit in with the theme of my event but my main concern was asking the artist for permission if whether I can use it or not. I then sent an email to him and was lucky enough to get a reply from him saying that I did not need permission to use it since he does it for a hobby, and even if I needed permission he said he would be happy enough to let me use it since it is for a good cause. I then inserted the template/image and added a colourful title and slogan. My title is “Community Spirit” – the reason why I did not choose anything else is because I really did not want to complicate it as if it was named anything else, people would be confused and not really get the aim of the event. I would...
Words: 1595 - Pages: 7
...communications(無線電通訊) that allow it to communicate(聯絡) almost anywhere, anytime. A built-in(嵌入的) GPRS or CDMA radio ensuring worldwide(遍及全球的) flexibility. An acoustical modem(接聽器) to facilitate(幫助) dialogue(交談) 802.11 wireless local area network connectivity(連線) to enable(使能夠) transmission(傳達) within(在…範圍) a UPS center and a Bluetooth wireless personal area network and an infrared port(紅外線埠) to communicate with peripheral devices(外圍設備). Delivery information is sent to UPS as soon as it [entered] , driver simply(簡單地) scan the package bar code(條碼) electronically collect the receiver(收件人) signature , type in the last name and push a single key to complete the transaction(業務) and send the data. The DIAD IV incorporates(結合) a color screen , which displays(展示) information in an easy to read attractive(吸引人的) manner(吸引人的方式) to customers , the color screen also enables UPS to color code messages , urgent customer pickup messages(緊急的顧客取貨訊息) for example can be color coded to [alert](提醒) the driver. DIAD IV also introduces a groundbreaking(開創性的) new feature(特色) GPS technology to the hand-held terminal market(手持終端機市場), this provides(提供) drivers with detailed directions to pickup and delivery points(取貨和送貨的地點). In order to improve...
Words: 535 - Pages: 3
...(Memo) Report Summary The objective of this report is to demonstrate the correct informal report format, as well as give some general information about writing technical papers and reports. Most importantly, the entire report is written in third person, meaning there are no references to “I,” “we,” “us,” “you,” etc. For the purposes of demonstration, a laboratory exercise will be described in which the experimenter measured the values of various resistors. These resistors have a specified tolerance of +/-10%, and the measured data supports the manufacturer’s claim. Experimental Results Figure 1 shows how to determine the specified value for a given resistor. The most resistors use a 4-band color code, which is at the top of the chart. Figure [ 1 ]. Resistor color code chart [1]. Note the reference in the caption for Figure 1. This is the standard IEEE format for references [2], which are listed in the References section (below) in the order that they are cited. Also note that the picture was originally larger than is currently appears and was automatically pushed to the next page. In order to avoid unnecessary white space, the picture was made smaller so it would fit on the first page but not so small that it was no longer readable. Microsoft Word makes it easier to keep track of numbering (for figures, tables, equations, etc.) as well. The caption for Figure 1 was created by selecting (clicking) the picture, then choosing “Insert Caption” under the “References”...
Words: 653 - Pages: 3
...Annotated Resource List Bennis, Warren. On Becoming a Leader. Rev. ed. Cambridge, Mass.: Perseus, 2010. This was very useful because it gave me a lot of insight on how to become an effective leader. The article helped me understand that to be a leader one must master the context instead of being overpowered by it. There were many steps that were listed to show a person how they can become a more effective leader and how to even gain support of any followers they may have. I plan on using this information the rest of my life. This way I will be able to encourage others that they too, can be a leader. http://ncu.attackyourday.net/ Attack Your Day has really opened my eyes to how much time I have wasted every day. The exercise has been an exceptional series and well worth the time that it takes to make the changes. This exercise was a very useful resource and helped me realize how much time I had and that I never used it wisely. This gave me an understanding on how I could make my time valuable by setting goals and having a daily plan to manage my time. Covey, Stephen. The 7 Habits of Highly Effective People: Powerful Lessons in Personal Change. 2004. The book is like a mentor that gave me advice on how to lead myself into a more effective way of living. Although some parts of the book I may not have agreed with, it still gave me a chance to look at the way Covey thinks and try to realize his reason and by doing so I understand myself even more. I wanted to read a book...
Words: 476 - Pages: 2
...NT1210 Introduction to Networking Introduction to Computer Networking 1 Objectives Identify the major needs and stakeholders for computer networks and network applications. Identify the classifications of networks and how they are applied to various types of enterprises. Explain the functionality and use of typical network protocols. Use preferred techniques and necessary tools to troubleshoot common network problems. 2 Objectives Define a computer network. Identify the primary needs for computer networks and network applications. Draw the four major physical network topologies: bus, star, ring, and mesh. 3 Computer Networking Use large variety of components that must work together. Move bits from one device to another. Bit: Smallest unit of data, binary 1 or 0. Focuses on copying bits on one device to another. Computing devices include computers, gaming systems, televisions, phones, tablets, GPS navigation systems, watches, etc. 4 Defining a Network with User Applications Examples: Digital advertising, online/video games, text messages, websites, social media, and email. Network diagrams often use cloud to identify what part of network to ignore for a particular discussion. LAN vs WAN 5 Defining a Network with User Applications Computer Networks: Cloud Representing Hidden Parts of the Network 6 Figure 2-1 An Informal General Definition of a Computer Network Telecom: Short for telephone communications ...
Words: 4305 - Pages: 18
...Chapter 1 2 & 3 Review Questions Arcacia Godfrey 07/10/15 Mr. Gima (1). 1 bit represents one binary digit. (2). Kilobyte means approximately 106 byte. (3). 64 bits per quadruple word associated with each term. (4). The Random Access memory is used for short term memory and used to process data. (5). this is true the CPU tells the RAM which address holds the data that CPU wants to read. (6). A Character set determines in part what bits the computer stores. (7). the binary equivalent of decimal 123456789 stores in the RAM. (8). An Actuator arm is not a feature of a file system that might be used with a hard disk drive. (9). The Important features provides a convenient way to name a set of data for easier operations like copying and moving. The names gives users an easy way to reference the data and gives the CPU an easy way to identify the data it wants to read from RAM. (10). the classmate flash drive contents will not be usable by the classmate. (11). Changing the disk’s surface so that later the light will reflect differently for 0 or 1 describes how a hard disk drive physically writes a binary. (12). an internal hard disk drive is used for long term memory and connects to the CPU over a bus using a cable. (13). the components of an internal hard drive is an Actuator arm and platters. (14). RAM and optical disc drive are considered to be a solid state. (15). The Binary equivalent of decimal 123456789 the computer will need to consider. (16)....
Words: 1126 - Pages: 5
...Cisco Network Solutions for the Telco DCN: SONET/SDH OSI Environments This document is directed to competitive local exchange carriers (CLECs), incumbent local exchange carriers (ILECs), and Post, Telephone and Telegraphs (PTTs), collectively referred to as telcos (short for telephone companies). This document describes Cisco network solutions for transporting data between Synchronous Optical Network (SONET) and Synchronous Digital Hierarchy (SDH) and the Operations Support System (OSS) in a telco data communications network (DCN). The DCN transports network management traffic between network elements and their respective OSS, making them a vital link between the service network and the network operations center (NOC). The solutions presented in this document will help telcos connect their SONET/SDH network elements to a router-based network using the Open System Interconnection (OSI) protocol, which simplifies the DCN and reduces equipment costs. Version History Version Number 1 Date April 28, 2004 Notes This document was created as a joint effort between Don Schriner in the Cisco CTO Consulting Engineering Group and Alliene Turner in Cisco IOS Documentation. This document was updated. This document was updated. 2 3 May 6, 2005 January 3, 2008 Contents The document presents the recommended Cisco architecture for building the OSI network. Several methods for implementing and scaling an OSI network are included with detailed configuration examples. Specific...
Words: 28935 - Pages: 116
...NT1210 Introduction to Networking Unit 1: Mid-Term Mid Term Review 1 Nibble, Byte, Word, Double Word Nibble, Byte, Word, Double Word Figure 1-2 2 Kilobyte, Megabyte, Gigabyte, Terabyte Size (2N Bytes) Term Size (Bytes) Kilobyte Megabyte Gigabyte Terabyte 1024 1,048,576 1,073,741,824 1,099,511,627,776 Kilobyte, Megabyte, Gigabyte, Terabyte 210 220 230 240 Rounded by Size (Bytes) 1,000 1,000,000 1,000,000,000 1,000,000,000,000 Table 1-1 3 Random Access Memory (RAM) Physically exists as set of microchips installed on plastic card (memory module) Central Processing Unit (CPU) uses RAM like people g ( ) p p use notepad Stores binary value so can use it later Can read data from RAM to recall value stored earlier CPU sends electrical signal over bus (electrical pathway) to communicate with RAM 4 Random Access Memory (RAM) (cont.) RAM uses address for each unique memory location where byte can be stored To write to RAM: CPU sends signal to RAM over the bus g to write (store) value into byte of RAM Address in RAM Value to be written To read from RAM: CPU uses similar process (see example in Figure 1-3 on next slide) 5 CPU Reads Byte 4 from RAM The CPU uses the same bus to read the current value of a byte in RAM as it does to send a message to RAM. The read request lists the address of the particular byte, asking for its value. RAM returns the binary value stored at that address. CPU Reads Byte 4 from RAM 6 Figure 1-3 Writing Individual Bits in Byte 4 of RAM...
Words: 11596 - Pages: 47
...Monograph on the Apple Business Model @2003 Introduction. In 1984, Apple and the Macintosh challenged the world with the dramatic portrayal of a revolutionary woman hurling a hammer at an image of the establishment. With the Twentieth Anniversary of that event approaching, now is a good time to take a look back at this revolution and take stock of the new revolution that the Mac OS X operating system offers. Despite Time Magazine's 80 Days That Changed The World, it would appear that Apple doesn't get much credit for the revolution it sparked in personal computing. As the leading innovator in the computer market, and with a balance sheet holding of four billion in cash, neither its stock value nor its market share is very high. Every few months or so, a journalist reports on impending trouble for Apple Computer. Part of the reason for this negative press is that its main competitor has a 95% market share and billions more in cash. By any other standards, Apple would be judged to be an astonishing success, but a bigger question remains: Why is the Apple market share so small when it has a superior product? Blaming Microsoft for the 'ills' of Apple really misses the point. Both companies were formed early in the computer age, both had product, innovation and opportunity at a critical time, but their history is vastly different. Apple's small market share must be the result of its business model. While the business model has failed the aspirations of the Macintosh Revolution...
Words: 23536 - Pages: 95
...This Cisco IOS command would display the current status of EIGRP? Show IP eigrp neighbors Two metrics used by default in EIGRP metric calculation? Bandwidth and Delay Dynamic routing protocols is considered an exterior gateway protocol only? BGP Is an encapsulation protocol that can be used on cisco routers when configuring subinterfaces? 802.1Q Is the binary equivalent to the dotted decimal netmask- 255.255.192.0? 1111.1111.11100.0000 This routing protocol is considered to use distance vector logic? Rip Has the lowest Cisco IOS administrative distance? Static route Describe the point-to-point WAN connection protocol provided by Telco? Leased Lines This cisco IOS command copies the current running configuration to a tftp server? Copy running-config tftp The concept of EIGRP Feasible distance is the computed metric of a SUCCESSOR route Is the dotted decimal equivalent to slash notation /25 255.255.255.128 The routing protocol that doesn’t support support VLSM? RIP v1 Is the broadcast address for the ip subnet 8.5.8.232 mask 255.255.0.0 8.5.255.255 Is the slash notation dotted decimal mask of 255.255.255.252 /30 The following mask could create an IP subnet from a class B that contains 500 hosts? 255.255.255.0 Port of STMP? 25 Protocol responsible for resolving mac addresses from IP addresses? ARP Two protocols commonly used in WANS at layer 2 of the OSI model? HDLC and PPP 192.168.254.0 is private up networks, classified by? RFC1918 Bits comprise the network...
Words: 2228 - Pages: 9
...Executive summary This term paper is prepared on the telecommunication sector of Bangladesh. Telecom sector of Bangladesh is a very fast growing and dynamic sector. This sector marked its inception in 1989. In this report we have analyzed the history, the value chain activities, the competitive forces, mobile network portability, and national telecom policy etc. We have conducted the risk analysis of the industry in terms of different analysis tools that is SWOT, PESTEL etc. We have covered in and out of the industry in the part A of our report. In part B, we have analyzed the industry players. We have done TTF of our respective company that we have chosen. Then in part C, we have written the case of the respective company that the group members have chosen. Bangladesh’s mobile phone market has achieved exceptional growth since the beginning of 2004, registering a massive 100% growth in its subscriber base during 2004, and 137% during 2005. In recent year of 2012, 15% has been observed in the industry. This trend is forecast to continue over the coming years as the 3G will further boost up the pace of subscribers’ acquisition Many foreign investors are now interested to do business in telecom sector in Bangladesh which reveals that Bangladesh has become a significant hub for telecoms. It has been forecasted that the average revenue from telecoms sector will be Tk 2500 crore a year. Bangladesh is a country which is densely populated and also is a flat and easily extends able...
Words: 27987 - Pages: 112
...technologies, including a microprocessor and chipset, a stand-alone system-on-chip (SoC) or a multichip package. The Company offers microprocessors with one or multiple processor cores. In addition, its Intel Core processor families integrate graphics functionality onto the processor die. The Company offers and develops SoC products that integrate the Company’s central processing units (CPU) with other system components, such as graphics, audio, imaging, communication and connectivity, and video, onto a single chip. The Company offers a multichip package that integrates the chipset on one die with the CPU and graphics on another die, connected through an on-package interface. The Company also offers fifth generation Intel Core processor, code-named Broadwell. The Company offers manufacturing technologies and design services for its customers. Its foundry offerings include full custom silicon, packaging, and manufacturing test services. It also provides semi-custom services to tailor Intel architecture-based solutions with customers' intellectual property blocks. The Company also offers design kits, intellectual property blocks and design services. PC Client Group The Company’s PC Client Group operating segment offers products that are incorporated in notebook (including Ultrabook devices), 2 in 1 systems, and desktop computers for consumers and businesses. The Company’s fifth generation Intel Core processor family is used in 2 in 1 systems. These processors use 14-nanometer (nm)...
Words: 5624 - Pages: 23
...Infosys: Company Profile About Infosys: Infosys Limited was started in 1981 by seven people with $250. Today, Infosys is global leader in "next generation" IT and consulting, with revenues of $6.04 billion. Infosys defines, designs and delivers technology enabled business solutions that help Global 2000 companies in Building Tomorrow’s Enterprise. Infosys provides a comprehensive range of services by leveraging our domain and business expertise and strategic alliances with leading technology providers. Infosys service offerings span business and technology consulting, application services, systems integration, product engineering, custom software development, maintenance, re-engineering, Independent Testing and Validation, Business Process Outsourcing, and IT infrastructure services. Infosys pioneered the Global Delivery Model (GDM), which emerged as a disruptive force in the industry leading to the rise of offshore outsourcing. The GDM is based on the principle of taking work to the location where the best talent is available, where it makes the best economic sense, with the least amount of acceptable risk. Infosys has a global footprint with 64 offices and 63 development centers in US, India, China, Australia, Japan, Middle East, UK, Germany, France, Switzerland, Netherlands, Poland, Canada and many other countries. Infosys and its subsidiaries have 130,820 employees as on March 31, 2011. Establishment: Infosys was founded on 2 July 1981...
Words: 13460 - Pages: 54
...Infosys: Company Profile About Infosys: Infosys Limited was started in 1981 by seven people with $250. Today, Infosys is global leader in "next generation" IT and consulting, with revenues of $6.04 billion. Infosys defines, designs and delivers technology enabled business solutions that help Global 2000 companies in Building Tomorrow’s Enterprise. Infosys provides a comprehensive range of services by leveraging our domain and business expertise and strategic alliances with leading technology providers. Infosys service offerings span business and technology consulting, application services, systems integration, product engineering, custom software development, maintenance, re-engineering, Independent Testing and Validation, Business Process Outsourcing, and IT infrastructure services. Infosys pioneered the Global Delivery Model (GDM), which emerged as a disruptive force in the industry leading to the rise of offshore outsourcing. The GDM is based on the principle of taking work to the location where the best talent is available, where it makes the best economic sense, with the least amount of acceptable risk. Infosys has a global footprint with 64 offices and 63 development centers in US, India, China, Australia, Japan, Middle East, UK, Germany, France, Switzerland, Netherlands, Poland, Canada and many other countries. Infosys and its subsidiaries have 130,820 employees as on March 31, 2011. Establishment: Infosys was founded on 2 July 1981...
Words: 13460 - Pages: 54
...3G Unit-1: GPRS & EDGE General Packet Radio Service (GPRS) General Packet Radio Service (GPRS) is a mobile data service available to users of GSM mobile phones. It is often described as "2.5G", that is, a technology between the second (2G) and third (3G) generations of mobile telephony. It provides moderate speed data transfer, by using unused TDMA channels in the GSM network. Originally there was some thought to extend GPRS to cover other standards, but instead those networks are being converted to use the GSM standard, so that is the only kind of network where GPRS is in use. GPRS is integrated into GSM standards releases starting with Release 97 and onwards. First it was standardised by ETSI but now that effort has been handed onto the 3GPP. GPRS is different from the older Circuit Switched Data (or CSD) connection included in GSM standards releases before Release 97 (from 1997, the year the standard was feature frozen). In CSD, a data connection establishes a circuit, and reserves the full bandwidth of that circuit during the lifetime of the connection. GPRS is packet-switched which means that multiple users share the same transmission channel, only transmitting when they have data to send. This means that the total available bandwidth can be immediately dedicated to those users who are actually sending at any given moment, providing higher utilization where users only send or receive data intermittently. Web browsing, receiving e-mails as they arrive and instant...
Words: 18564 - Pages: 75