Friday, November 29, 2019

Magna Deca free essay sample

Jim Sherwood, the marketing manager of a consumer goods company called Magna Deca had his attention caught by direct marketers that were working with the continuously growing home fitness equipment market. Jim’s company focused mainly on marketing through traditional channels. However he was eager to get into direct response marketing and felt they had found an appropriate product to do so. Magna Deca had acquired an at-home physical fitness gym that sold at less than $500. 00. If the market was there, Magna Deca was ready to test it out and see what direct response marketing would do. With that said, a direct response advertising firm was hired to come up with a test direct marketing plan. The plan that was suggested includes simultaneous testing of four positioning concepts and five magazines from five different media groupings at the same time. The names of 20,000 subscribers of five different magazines were to be rented and one quarter of each of these 20,000 subscribers sets were to be exposed to one of four positioning concepts. We will write a custom essay sample on Magna Deca or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page A decision was made that a test program would be run under the name Personal Fitness System. In order to test both media and the message, 5,000 subscribers from each magazine would be mailed a lead generation piece that would be built around each of the four positioning themes. These themes are contained in the following headlines for four different self-mailers: 1. $500 won’t pay for much medical care, but it could buy a lifetime of better health. 2. You don’t have to spend hours jogging to get the exercise you really need. . Give your family the benefit of a complete $40,000 gym for less than $500 4. The Million Dollar Body for less than $500 Yes, I think that the Family gym is a viable direct response product because it is targeting entire families at once. By encouraging a healthy, fit family, this gives the buyer more reasoning to purchase the equipment in order to not only benefit themselves but their family as well. Motivations for buying a family gym would be: $There is no traveling time to the gym People feel more comfortable exercising in the privacy of their own home if they dislike the gym atmosphere $Family gym would be much less expensive than gym memberships for the entire family $A family gym is convenient in the fact that you can exercise whenever the time is right for you $Family gym could become an activity to spend quality time and stay active with family members This relates to positioning because it sets the family gym apart from main competition which would be an actual gym facility. The motivations and attributes of the family gym give meaningful and beneficial reasons to the consumer on why the family gym is more convenient choice than gym facilities to the consumer. The combination of attributes would also allow the company to position for competitive advantage. The media that the company is using is magazines. I think that all of the choices for magazines to position the concepts in are viable to targeting men and possibly their family members when looking at the family gym aspect. Business week using the health improvement, alternative to jogging and family gym positioning concepts. Playboy could be associated with any of the concepts Sports Illustrated using body building and health improvements Mechanics Illustrated could use all concepts Time using health improvements, alternative to jogging and family gym concepts 4. Amor effective way of approaching this situation would be if the company chose the most effective magazine that would fit best with one of the positioning concepts and place all

Monday, November 25, 2019

The Ruby Ridge Catastrophe essays

The Ruby Ridge Catastrophe essays Federal agents in body armor and black ninja uniforms, armored cars crashing up hillsides, even the fabled helicopters of militia nightmares Ruby Ridge had all the elements of a paranoid fantasy, with the difference that it was stamped in real flesh and blood. In the 11- day standoff, Weavers wife was shot dead as she held their 10-month-old daughter in her arms. A day earlier his 14-year-old son and a U.S. Marshal had been killed (Lacayo, 1995). But who was Randy Weaver? What kind of horrible criminal was he to deserve armed federal agents rushing on his house and family? And why isnt there a happy ending to this story? Randy Weaver was a 44-year old ex-Green Beret. He lived in a cabin in the woods of Ruby Ridge with his wife, Vikki, son, Sammy, and daughters, Sara, Rachael, and Elisheba. Randy also had his young friend, Kevin Harris, staying with him and his family. Randy and his family were subsistence hunters and farmers. They had a generator to produce electricity, but they had no televisions or radios. The Weaver family liked to keep things simple and keep to themselves. In October of 1989, Randy Weaver sold two sawed-off shotguns that were under the legal length to a friend. This friend turned out to be an undercover BATF agent (Bureau of Alcohol, Tobacco, and Firearms). Several months after Randy had sold these illegal shotguns, two BATF agents with an offer approached him. The offer was to be an informant for the BATF agency or be charged and go to jail. Randy refused the offer and about seven months later he was indicted on illegal weapons sale. He was then arraigned and told to reappear in court in February of 1991. Randy did not return to court; he returned to his mountain. A warrant was then issued for the arrest of Randy Weaver for failure to appear in court and for the sale of illegal firearms. These were the vicious crimes of the horrible crimi...

Thursday, November 21, 2019

'Sound business models are a necessary component in a healthy Essay

'Sound business models are a necessary component in a healthy visualarts ecology and essential for most publicly funded organi - Essay Example In essence, a business model is greater than the financial transactions of an organisation recorded and presented in its financial statements. A business model provides a clear description of the rationale of how an organisation crates, captures and delivers value. In conducting business, sound business models are a necessary component in the visual arts ecology and most publicly funded organisations. However, there has been a widespread belief that numerous business models in the context of visual arts are relatively weak and have a high possibility of facing reduced funding with time. This beliefs have been backed by available research suggesting the same. Most organisations in the visual arts sector are characterised by undercapitalisation and holding reserves that are too little to support investment and growth and to cushion the organisation during times of crisis (Oakes & Oakes 2012, p.59). In most visual arts organisations, assets are never fully exploited and increased level of activity often translates into increase costs while visitors remain a relatively unexploited source of income. Within the visual arts ecology, there is minimal understanding of what a sound business model is and what it does for an organisation. This indicates the generally lower levels of business skills and understanding within the sector. Despite this, there is, however, a shared ground as to what a good business model should be like. The challenge arises in translating the shared opinion into tangible action. From a total business perspective, the culture depicted in visual art of individualism and a somewhat traditional leaning towards the values of the economic world. This may be problematic as it is difficult to be exemplary in something that you do not have high regard of or have full comprehension of. Business models relating to the visual arts sector and publicly funded organisations are somewhat technical and attention has to be paid to the detail in order to stipulate a viable and sustainable plan for the long run (Townley& Cooper, 1998, p.66). For example key aspects such as free entry into the visual arts organisations can be a blessing but will pose technical business challenges. This is explained by the fact, revenue is not generated directly from customers, let alone the contribution to overheads or surpluses. As a result, increased level of activity would lead to a disproportionate increase in costs compared to the revenues generated. In light of this, the business models drawn up for the visual arts ecology should focus on secondary revenue generating activities in order to supplement their lack of a direct source of revenue and enhance their operational sustainability. In formulating business models in the publicly funded visual arts sector, the key question still remains â€Å"what is a sustainable business model in the visual arts sector?† When creating a good business plan for the not-for-profit sector, key factors need to be p ut into consideration including the mission, the fiduciary perspective, the customer perspective, internal perspective and the growth and learning potential. In

Wednesday, November 20, 2019

Hybrid Cultures and the Hermetically Sealed Cultures Essay

Hybrid Cultures and the Hermetically Sealed Cultures - Essay Example Huntington views the Arab world as being primarily 'sealed' because it avoids the advances and the cultural hybrid elements of democratic countries. According to his view, there is a certain core collective of nations who try to derive their power by opposing western influences and define their own place in an increasingly diverse world. Barber's more capitalistic interpretation understanding of global imperialism is in direct contrast to Huntington's view. He believes America is a hybrid country that is "democratic", even though it is aggressive toward countries that exercise their own sovereignty as 'sealed' cultures. The primary foundation for Huntington's argument on the "clash of civilizations" after the Cold War is that there is not a single country to which American allied nations could rally against in a bi-polar construct. Huntington's perspective is based on American bias on the danger that Communism posed through the Soviet Union as an example of the new Arab threat: During the Cold War global politics became bipolar and the world divided into three parts. A group of mostly wealthy and democratic societies, led by the United States, was engaged in a pervasive ideological, political, economic, and, at times, military competition (Huntington, ,p.21). The criterion for this belief is based on the American view that the conflict with the Soviet automatically created a situation in which they became the two dominant forces and the rest of the countries allied themselves on either side based on whether they followed a capitalist or communist ideology. However, America's identity as a democratic society with immense wealth that had to subdue poorer communist societies is often generalized through Huntington's "triumphalist" view of American domination. In fact, the harshly undemocratic nature of American hegemony in Latin America and other nation states presents a stark contrast to the idealized discourse of freedom and liberty that Huntington defines in the conflict between American and the Soviet Union. This fact is over-generalized in Huntington's view and supports a deliberately biased superiority of western civilization over the rest of the world before 1991. The first basis of Huntington's theory on Muslim culture as to the historicity of violence that was founded in its early beginnings does not hold ground considering that Judaism and Christianity also propounded the use of "the sword" to fight with one another and also against other religions. Surely, the comment made by George Bush about a "Crusade" against Muslim terrorism reveals the age-old Christian tradition of using military force in the name of Christ (Ford para.2). Although Huntington likes to compare Christ's seeming passivity to his enemies in the Christian faith, the United States (as a Christian nation) has certainly gone against the dictates of Christ's message by attacking Iraq without any evidence of WMDS. Similarly, the hollowness of the hybrid foundation for western

Monday, November 18, 2019

This is am african history class, you can choose the topic Research Paper

This is am african history class, you can choose the topic - Research Paper Example They are responsible for leading scientific and intellectual breakthroughs in history. The world, in general, owes the Islam community a debt. In terms of industrialisation, the Islam played an intricate role in the process. They also had a central position to play in the evolution of the philosophical enterprise in the world. This paper will explain how these revolutions shaped the world. In the past, it was easy for scholars, mathematicians, economists, and researchers to draw their inspiration from Islam (Huff 73). Islam worked to open up the minds and hearts of everyone in the world. In thought and study, many scholars can attribute their success to the Islam faith and its growth and spread. It is believed that the Islam community in the late seventeenth century drew their philosophical strength from the Greek. This means that, the introduction of many inventions, for example, the telescope led to the growth of the Western curiosity on the influence of Greco-Islam revolutions. Th e West had a number of inventions and scientific breakthroughs. However, they did not draw their inspiration from anywhere as many civilisations did. Many individuals around the world believe that there was no scientific or intellectual breakthrough in the Islamic world. This is because, most of them believe that all that is Islam developed as a result of the Greek heritage. Without it, many believe that Islam would not have an avenue to exist on its own. Others also believe that, the Arabs cold not identify what the ancient hieroglyphics in their presence meant. This is not until the coming of a European who explored the ancient language and drew conclusions from his research (Abu-Rabi 145). The introduction of foreigners makes the issue of Muslims being intellectually capable of making strides in the world debatable. What these critics do not seem to comprehend is the fact that, every civilisation brings forth diverse worldviews on diverse matters. In the field of optics, the Musl im and Arab community have made significant strides (Huff 79). The most revered thing about the Muslim faith is the belief they exhibit the necessary aspects of knowledge and wisdom in life. This makes them refuse the influence brought on by many education and religious influences from around the world. The fear of foreign influences pushes them to create their own understanding on issues, which pertain to many aspects of life. Islam focuses on regulating the philosophical attitude of the world. This is by overarching the philosophy of embracing mankind regardless of their faith and cultural background. No faith in the world claims that taking another life in the name of religion is justified, and Islam is not the first. Islam embraced the power of science, even when Christianity shunned and condemned the likes of Galileo for the assumptions he made about the earth. This laid the basis for the growth and development of philosophy and science among the Islam community (Huff 81). In A frica, intellectual revolution opened doors for the much needed economic change. Islam can be the perfect ground to lay this intellectual foundation. With the political changes, it is possible to have many channels created by the Western world in the third world countries. In Africa, for instance, the introduction of madrasa ensured that children learned the importance of the different fields in the world. The European and African enlightenment was brought on by the light that Islam shone

Saturday, November 16, 2019

Advantages And Disadvantages Of Using A Pointer Computer Science Essay

Advantages And Disadvantages Of Using A Pointer Computer Science Essay Write advantages and disadvantages of using pointer. How the concept of pointers is useful in the implementation of data structures? A pointer allows a function or a program to access a variable outside the preview function or a program ,using pointer program can access any memory location in the computers memory. 2)since using return statement a function can only pass back a single value to the calling function, pointers allows a function to pass back more than one value by writing them into memory locations that are accessible to calling function. 3)Use of pointer increases makes the program execution faster 4)using pointers, arrays and structures can be handled in more efficient way. 5) without pointers it will be impossible to create complex data structures such as linked list , trees, and graphs. Disadvantages of pointers:- 1)we can access the restricted memory area. 2) Pointers require one additional dereference, meaning that the final code must read the variables pointer from memory, then read the variable from the pointed-to memory. This is slower than reading the value directly from memory. 3). If sufficient memory is not available during runtime for the storage of pointers, the program may crash When setting up  data ststructures  like  lists,  queues  and trees, it is necessary to have pointers to help manage how the structure is implemented and controlled.Pointers and Structures can be used to build data structures that expand and shrink during execution examples stack queues,trees etc.While pointer has been used to store the address of a variable,it more properly applies to data structures whose interface explicitly allows the pointer to be manipulated as a memory address.Because pointers allow largely unprotected access to memory addresses. 2). Elaborate the concept of Fixed block storage allocation and Buddy system in dynamic memory management. Sol. Fixed block storage allocation:- This is the simplest storage maintenance method. Here each block is of the same size. The size is determined by the system manager. Here the memory manager maintain a pointer AVAIL which points a list of non contiguous memory blocks. A user program communicate with the memory manager by means of two function GETNODE(NODE) and RETURNNODE(PTR).The procedure GETNODE is to get a memory block to store data of type NODE. This procedure when invoked by a program returns a pointer to first block in the pool of restorage. The AVAIL then points to the next block.If avail=NULL it indicates no more memory is available for allocation. Similarly whenever a memory block is no more required it can be returned to the memory bank through a procedure RETURN NODE(). Buddy system:- It is the another storage management system which restricts the size of blocks to some fixed set of sizes. These blocks of restricted sizes are maintained in a linked list. Whenever a request for a block of size N comes, the number M the smallest of the fixed sizes but equal to or largest than N, is determined and a block of size M is allocated if available on the list. If not available then a larger block if available is split into two sub-blocks known a s buddies. Each of them are also of fixed sizes and the process is repeated until a block of size M is produced. for example , if k=1 and Fo=8, then the block sizes are 8,16,32,64,128,à ¢Ã¢â€š ¬Ã‚ ¦. THAT is ,the block sizes are successive powers of 2; and the buddy system based on such fixed sizes is called binary buddy system. 3.)Differentiate between static memory allocation and dynamic memory allocation. Illustrate various memory management functions Sol. In case of static storage management scheme , the net amount of memory required for various data for a program is allocated before the starting of the execution of a program once memory is allocated, it neither can be extended nor can be returned to the memory bank for the use of other programs at the same time. On the other hand dynamic storage management schemes allows user to allocate and deallocate as per necessity during the execution of programs. The static storage allocation is easy to implement and efficient from execution point of view .Here all variables those are required for a program is allocated during compile time this is why static storage allocation is a compile time phenomena. In this each subprogram/subroutine of a program is compiled separately and the space required for them is reserved till the execution of the program. On the other hand dynamic memory allocation , space for memory variables is allocated dynamically that is as per the current demand during the execution. When a subprogram is invoked space for it is allocated and space is returned when the subprogram completes its execution. Thus , the space required to run a program is not fixed as in static allocation, rather it varies as program execute. Various memory management functions:- 1)malloc():-The malloc function dynamically allocates memory from heap.The prototype for malloc() function is Void *malloc(size_t size); 2)calloc():- The calloc() function dynamically allocates memory automatically initializes the memory to zeroes. The prototype for calloc() function is Void *calloc(size_t nitems , size_t size); It takes two arguments . The first argument is the number of elements and the second argument is the size of each element. 3) realloc():- The realloc() function changes the size of previously dynamically allocated memory with malloc(), calloc(), realloc() functions.The prototype for realloc() function is Void *realloc(void *block, size_t size); It takes two argument . the first argument is the pointer to the original object and the second argument is the new size of the object. 4.)Write different ways to manage records in memory Sol.) Since records may contain non homogeneous data, the elements of a record cannot be stored in an array . Some programming languages such as PASCAL and COBOL do have record structures built into the language. Suppose a programming language does not have available the hierarchical structures that are available in PASCAL and COBOL . Assuming the record contains non homogeneous data , the record may have to be stored in individual variables , one for each of its elementary data items. On the other hand one wants to store an entire file of records, such a file may be stored in memory as a collection of arrays that is, where elements in different arrays with the same subscript belonging to the same record. Part-B 1.)Illustrate the use of array of pointers and pointers to an array Sol.) An array of pointers is that for eg if we have array of 10 int pointers ie int *a[10] then each element that which is stored in array are pointed by pointers. here we will have ten pointers. In pointer to an array for eg int(*a)[10] here all the elements that is all the ten elements are pointed by a single pointer. int *a[10]:-array of pointers. consider one array int b[10]={1,2,3,4,5,6,7,8,9,0};so elements will be stored in addresses .now this address are stored in array of pointers.thats int *a[10]={b+0,b+1,b+2,b+3,b+4,b+5,b+6,b+7,b+8,b+9};means a+0=address of value 1 is the first element of int *a[](first element of int b[10])and so on. while int(*a)[10]:-here a is an pointer to an array containing 10 integers. suppose int b[10]; then a=b[10]; this will give element of int b[10] array thats b[0];and so on but in case of two dimensional array first we have to allocate base address of respective one dimensional array and base address of element of one dimensional array then only we can use pointer to an array. Give example to show the use of far pointer and dangling pointer problems Sol.) A far pointer uses both the segment and the offset address to point to a location in memory   The far pointer can point to any location in memory. . Far pointers have a size of 4 bytes . They store both the segment and the offset of the address the pointer is referencing. A far pointer has an address range of 0 1M bytes. A far pointer can be incremented and or decremented Only the offset of the pointer is actually incremented or decremented. The segment is never incremented by the arithmetic operators.On the other hand Dangling pointers are the pointers that do not point tao a valid object of the appropriate type. These pointers arise when an object is deleted or deallocated,without modifting the value of the pointer so that pointer stll points to the memory location of deallocated memory .As the system may reallocate the previously freed memory to another process ,if the original program then derefrences the dangling pointer,results in bugs or errors as the memory may contain com pletely different data.   Consider the following example { char *cp = NULL; { char c; cp = &c; }    /* cp is now a dangling pointer */ } Solution to dangling pointer: char *cp = malloc ( A_CONST ); free ( cp ); /* cp now becomes a dangling pointer */ cp = NULL; /* cp is no longer dangling */ Differentiate between linked list and arrays in terms of representations, traversal and searching. Sol.) 1)In case of array traversing is used visiting all elements in an array while to traverse a single linked list we mean to visit every node in the list starting from first node to last node. 2).Searching operation in an array is applied to search an element interest in an array.It is a process of finding the location of given element in an array.The search is said to be successful if the given element is found.there are two types of search operation : Linear search Binary search If the array elements are in random order then one have to use linear search technique and if the array elements are sorted then it is preferable to choose binary search technique.While in case of linked list only linear searching is possible.This is one of the limitation of linked lists as there is no way to find the location of the middle element of the list. can we perform binary search in linked list ,if no then illustrate the reason. Sol.) No, we cannot perform binary search in linked list because there is no way Of indexing the middle element in the list. With a sorted linear array we can apply a binary search whose running time is proportional to log2n. On the other hand a binary search algorithm cannot be applied to a sorted linked list, since there is no way of indexing the middle element in the list. This property is one of the main drawbacks in using a linked list as a data structure.

Wednesday, November 13, 2019

Invisible Man Essay: Race, Blindness, and Monstrosity -- Invisible Ma

Race, Blindness, and Monstrosity in Invisible Man      Ã‚  Ã‚   I'd like to read Ralph Ellison's Invisible Man as the odyssey of one man's search for identity.   Try this scenario: the narrator is briefly an academic, then a factory worker, and then a socialist politico.   None of these "careers" works out for him.   Yet the narrator's time with the so-called Brotherhood, the socialist group that recruits him, comprises a good deal of the novel.   The narrator thinks he's found himself through the Brotherhood.   He's the next Booker T. Washington and the new voice of his people.   The work he's doing will finally garner him acceptance.   He's home.    It's a nice scenario, but the narrator realizes his journey must continue when Jack, the leader of the Brotherhood:    'Now see here,' he began, leaping to his feet to lean across the table, and I spun my chair half around on its hind legs as he came between me and the light, gripping the edge of the table, sputtering and lapsing into a foreign language, choking and coughing and shaking his head as I balanced on my toes, set to propel myself forward; seeing him above me and the others behind him as suddenly something seemed to erupt out of his face . . ."   (Ellison, Invisible Man, 409).    The careful bureaucracy gives way to rage; he regresses, spitting and swearing in a foreign tongue, leaning forward as if to attack the narrator.   And the eruption?   Jack is a Cyclops, the one-eyed mythological giant of terror and lawlessness:    I stared into his face, feeling a sense of outrage.   His left eye had collapsed, a line of raw redness showing where the lid refused to close, and his gaze had lost its command.   I looked from his face to the glass, thinking he's disem... ...Citizen is a rowdy drunk that no one listens to.   Yet Jack is a brother, or, as Invisible Man puts it, the great white father.   He's not such an easy enemy to defeat, and the problem won't just go away.   The map of racism, blindness, and monstrosity that Ellison draws is incomplete because the monster is never defeated.   Perhaps this too is characteristically American.   Ellison's evolved Cyclops has staying power.   He's grown resistant to the hero's tricks and, though blind, he will thrive.   Ellison's Odysseus is doomed to wander longer than eleven years.    [1] This is the Gaelic word for "nonsense".    Works Cited Ellison, Ralph.   Invisible Man.   New York: Random House, New American Library, 1952. Homer.   The Odyssey, translated Richmond Lattimore.   New York: Harper Collins, 1991. Joyce, James.   Ulysses.   New York: Random House, 1990.   

Monday, November 11, 2019

Computers and Digital Basics

1: Computers and Digital Basics TRUE/FALSE 3. Facebook and Twitter are examples of social networking options. F 6. An operating system is an example of application software. F 7. Because of increased versatility, a videogame console is now considered a personal computer. f 8. The purpose of a server is to serve computers on a network. T 9. In the binary number system, 2 is used to represent the value 2. F 10. The number 9 can be considered a character. T 11. Because most digital devices are electronic, bytes take the form of electrical pulses. F 13.A compiler like the one shown in the accompanying figure converts all statements in a program to machine language in a single batch. T 14. An interpreter converts and executes one statement at a time. T 15. The op code specifies the data. F 16. The operand is a command word for an operation. F 17. All computers are case sensitive. F 18. Trojans are computer programs that seem to perform one function while actually doing something else. T 1 9. To assure you can remember your password it is a good idea to base it on information you can easily remember such as your birthday. F 20.You should always use a different password for every account. F MODIFIED TRUE/FALSEIf False, change the underlined work to make it True!1. Digital technology has made it easy to produce copies of music with no loss of quality from the original. _________________________2. Free source projects promote copying, free distribution, peer review, and user modifications. Open3. An area where data can be left on a permanent basis is memory. storage4. The set of instructions that tells a computer how to carry out processing tasks is a computer program. _________________________ 5. Minicomputers were used for small businesses. ________________________6. A(n) supercomputer is a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users. mainframe7. The term server can refer to a combination of hardware and sof tware. _________________________8. A(n) mainframe specializes in compute-intensive problems. supercomputer9. A light switch is like a(n) analog device. digital10. DIPs and PGAs are both shapes of integrated circuits. _________________________11. The results of statements that have been compiled are called object code. _________________________12. A set of machine language instructions for a program is called source code. machine 13. The ALU uses registers to hold data that is being processed. _________________________14. A(n) keylogger is a form of malicious code. _________________________15. A(n) account manager stores user IDs with their corresponding passwords and automatically fills in login forms. passwordMULTIPLE CHOICE1. Digital electronics use electronic ____ to represent data. a. circuits c. transistors b. switches d. components2. Key factors in making electronic devices increasingly smaller and less expensive include ____. . transistors c. both a and b b. integrated circui ts d. neither a nor b3. The first digital computers were built during World War II for ____. a. census taking c. communication b. code breaking d. troop placement4. Initially sales were slow for the personal computer because of ____. a. price c. lack of software b. size d. lack of availability5. In 1982, the percentage of households that had a computer was fewer than ____ percent. a. 10 c. 50 b. 30 d. 706. A global computer network originally developed as a military project is the ____. a. World Wide Web c. Wide-area network b. Internet d. Local-area network7. ____ allow members to post comments and questions that can be read and responded to by others. a. E-mail lists c. Chat groups b. Bulletin boards d. Social networks8. ____ are where people exchange typed messages in real time. a. E-mail lists c. Chat groups b. Bulletin boards d. Online social networks9. ____ provide a space for interacting with friends or friends of those friends. a. E-mail lists c. Chat groups b. Bulletin boar ds d. Online social networks10. A group of computers linked by wired or wireless technology is a(n) ____. a. network c. cyberspace . Web d. Internet11. The ____ is a collection of linked documents, graphics, and sounds. a. network c. cyberspace b. Web d. Internet12. ____ is a term that refers to entities that exist largely within computer networks. a. Web c. WWW b. Internet d. Cyberspace13. ____ is the process of converting text, numbers, sound, photos, and video into data that can be processed by digital devices. a. Digitization c. Scanning b. Digital conversion d. Rasterization14. Technology ____ is a process by which several different technologies with distinct functionality evolve to form a single product. a. volution c. convergence b. rotation d. diversification15. More than ____ percent of cameras sold today are digital. a. 80 c. 90 b. 85 d. 9916. Digital imaging has had an effect in the following areas: ____. a. medicine c. photo processing b. video d. all of the above17. ___ _ tools cloak a person’s identity online. a. Anonymizer c. ID free b. Free ID d. Cloaking18. A computer is a multiple purpose device that can do all of the following EXCEPT ____. a. store data c. accept input b. process data d. think independently19. In a computer, most processing takes place in ____. a. memory c. he CPU b. RAM d. the motherboard20. An electronic component that can be programmed to perform tasks is a ____. a. CPU c. transistor b. microprocessor d. none of the above21. A named collection of data that exists on a storage medium is known as (a) ____. a. memory c. file name b. file d. none of the above22. An area of a computer that temporarily holds data waiting to be processed is ____. a. CPU c. storage b. memory d. a file23. A set of computer programs that helps a person carry out a task is ____. a. an operating system c. application software b. system software d. Windows24.A set of computer programs that helps a computer monitor itself and function more effici ently is ____. a. a software suite c. application software b. system software d. processing software25. The master controller for all activities that take place within a computer is ____. a. application software c. the operating system b. system software d. the CPU 26. A(n) ____ is a microprocessor-based computing device designed to meet the computing needs of an individual. a. personal computer c. ALU b. mainframe d. server27. An ordinary personal computer that is connected to a network is a ____. a. mainframe c. server . workstation d. console28. A powerful desktop computer used for high-performance tasks is a ____. a. mainframe c. server b. workstation d. console29. A compute-intensive problem runs on a ____. a. server c. supercomputer b. mainframe d. super PC30. Data becomes ____ when it is presented in a format that people can understand and use. a. information c. graphs b. processed d. presentation31. The type of data where text, numbers, graphics, sound, and video have been c onverted into discrete digits as represented in the accompanying figure is ____. a. information c. digital b. analog d. none of the above32. The type of data that is represented using an infinite scale of values as represented in the accompanying figure is ____. a. information c. digital b. analog d. none of the above33. The binary number 10 represents ____ in the decimal number system. a. 1 c. 10 b. 2 d. 10034. The type of code that uses only seven bits for each character is ____. a. ASCII c. EBCDIC b. Extended ASCII d. all of the above35. The type of code that uses eight bits for each character is ____. a. ASCII c. EBCDIC b. Extended ASCII d. all of the above36. Digital devices can use ____ as a code to represent character data. . ASCII c. EBCDIC b. Extended ASCII d. all of the above37. You might represent ____ using character codes. a. color dots c. Social Security numbers b. bank balances d. none of the above38. Data transmission speeds are typically expressed as ____. a. bits c . hertz b. bytes d. none of the above39. Storage is typically expressed as ____. a. bits c. hertz b. bytes d. none of the above40. 1,024 bytes is a ____. a. kilobyte c. gigabyte b. megabyte d. terabyte41. 1,048,576 bytes is a ____. a. kilobyte c. gigabyte b. megabyte d. terabyte42. 1,073,741,824 bytes is a ____. a. kilobyte c. igabyte b. megabyte d. terabyte43. A super-thin slice of semiconducting material packed with microscopic circuit elements is a(n) ____. a. integrated circuit c. microchip b. computer chip d. all of the above44. The accompanying figure represents two types of chip carriers. The one on the left is a ____. a. PGA c. PID b. DIP d. GAP45. The accompanying figure represents two types of chip carriers. The one on the right is a ____. a. PGA c. PID b. DIP d. GAP46. The ____ houses all essential chips and provides connecting circuitry between them. a. system board c. circuit board b. ousing board d. chip board47. C, BASIC, COBOL, and Java are examples of ____ programmi ng languages. a. low-level c. system b. computer d. high-level48. The human-readable version of a program is called ____. a. source code c. human code b. program code d. system code49. A(n) ____ converts all the statements in a program in a single batch and the resulting collection of instructions is placed in a new file. a. compiler c. converter b. interpreter d. instruction50. A(n) ____ converts and executes one statement at a time. a. compiler c. converter b. interpreter d. instruction51. A collection of preprogrammed activities such as addition, subtraction, counting and comparison is called a(n) ____. a. compiler code c. machine code b. interpreter code d. instruction set52. ____, as shown in the accompanying figure can be directly executed by the processors’s circuitry. a. Machine sets c. Programming language b. Machine language d. none of the above53. The ____ is a command word for an operation such as add, compare, or jump. a. op code c. ALU b. operand d. instruction code54. The ____ from an instruction specifies the data. a. op code c. ALU b. operand d. instruction code55. The ____ is the part of the microprocessor that performs arithmetic operations, as shown in the accompanying figure. a. instruction pointer c. ALU b. RAM d. control unit56. As shown in the accompanying figure, the ____ fetches each instruction. a. RAM c. ALU b. instruction pointer d. control unit57. The accompanying figure represents the instruction cycle. The first step is Box A and represents the ____. a. fetch instruction c. execute instruction b. interpret instruction d. increment pointer58. The accompanying figure represents the instruction cycle. The second step is Box B and represents the ____. a. etch instruction c. execute instruction b. interpret instruction d. increment pointer59. The accompanying figure represents the instruction cycle. The third step is Box C and represents the ____. a. fetch instruction c. execute instruction b. interpret instruction d. incremen t pointer60. The accompanying figure represents the instruction cycle. The fourth step is Box D and represents the ____. a. fetch instruction c. execute instruction b. interpret instruction d. increment pointer61. In terms of an authentication protocol, the phrase ‘something a person knows’ refers to ____. a. a password c. biometrics b. n ID card d. none of the above62. A ____ is a series of characters that becomes a person’s unique identifier. a. PIN code c. user ID b. password d. all of the above63. In terms of an authentication protocol, the phrase ‘something a person possesses’ could refer to ____. a. a password c. biometrics b. an ID card d. none of the above64. In terms of an authentication protocol, the phrase ‘something a person is’ refers to a(n) ____. a. password c. biometric device b. ID card d. none of the above65. A problem a hacker can cause after breaking into your computer include(s) ____. a. applying for credit in your n ame c. pply for a mortgage using your data b. sending embarrassing e-mails d. all of the above66. A term which can refer to a person who manipulates computers with malicious intent is a ____. a. black hat c. hacker b. cracker d. all of the above67. A ____ attack uses password-cracking software. a. brute force c. phishing b. sniffing d. cracker68. ____ intercepts information sent over computer networks. a. Brute force c. Phishing b. Sniffing d. Cracking69. A hacker posing as a legitimate representative of an official organization such as your bank is an example of ____. a. brute force c. phishing b. sniffing d. cracking70. Password management functions include all of the following EXCEPT ____. a. generating passwords c. providing password strength b. tracking passwords d. recording keystrokes Case-Based Critical Thinking Questions Case 1-1 Karen is trying to get organized and one of her issues is that she doesn’t know what kind of devices correspond to her needs.71. Karen need s an appointment book and is considering one that is digital. For this one piece of equipment, she does not want the device to do anything except maintain her calendar. You suggest she consider a ____. a. PDA c. handheld computer b. smart phone d. BlackBerry72. After you and Karen talk a little longer, she recognizes that she might need a device that in addition to her appointment book will have features such as e-mail, Web access, a built-in camera, and GPS. You suggest she consider a(n) ____. a. iPod c. handheld computer b. regular PDA d. CPU73. If Karen were looking for a device that in addition to voice communications, offers full qwerty keypad, text messaging, e-mail, Web access, removable storage, camera, FM radio, digital music player, and software options for games, financial management, personal organizer, GPS and maps, she might consider a(n) ____. a. regular PDA c. andheld computer b. smart phone d. iPod Case-Based Critical Thinking Questions Case 1-2 Mike and Andre are d iscussing how quickly technology changes. They are discussing how it seems devices are merging to create new products especially in the technology field. They understand this is a process called convergence.74. An example of an old form of convergence is a ____. a. clock radio c. television b. cell phone d. microwave oven75. A great example of convergence in modern technology is ____. a. clock radio c. television b. cell phones d. HD-TV76. A barrier to the rapid deployment of many products resulting from convergence is ____. . rare technology breakthroughs c. people aren’t ready b. legal issues d. both b and c Case-Based Critical Thinking Questions Case 1-3 Jim has just purchased a new computer and it has made him think about how it works. He is particularly interested in how information is processed and stored in his computer. He has come to you for help.77. Jim wants to know why a compiler converts all statements in a program at one time and places them into an object code. You tell him it is so that ____. a. the code is ready to execute b. you can prevent the introduction of new errors c. you can put it on a chip d. one of the above78. Jim knows that a collection of preprogrammed activities is an instruction set. He wants to know what an instruction set is designed to do. You tell him it is designed to ____. a. carry out a particular task b. allow programmers to use them in creative ways for multiple tasks c. limit the number of tasks the computer can perform d. allow the program to run on multiple machines79. Jim wants to know what machine language instructions look like to the machine. You tell him they appear as ____. a. an op code and operand c. basic instructions, such as add b. a series of 0s and 1s d. ll of the above80. When adding two numbers, Jim knows that each number is going into its own register and the control unit provides the instructions such as add. He wants to know where the result of the add goes. You tell him it goes to ____. a. the ALU c. the accumulator b. another register d. the printerCOMPLETION1. An ongoing process of social, political, and economic change brought about by digital technology is the digital revolution.2. At the consumer level, probably the most significant force driving research into fast computers and more sophisticated graphics processing is computer gaming.3.The potential downside of convergence is quality.4. The expectation that a person’s information will not be collected or divulged without permission is confidentiality.5. The ownership of certain types of information, ideas, or representations is intellectual property.6. Worldwide economic interdependence of countries that occurs as cross-border commerce increases and as money flows more freely among countries is globalization.7. A term that refers to the gap between people who have access to technology and those who do not is the digital divide.8. Symbols that represent facts, objects, and ideas are data.9. The manipulati on of data is called processing.10. The concept that a series of instructions for a computing task can be loaded into memory is called a stored program.11. Any software or digital device that requests data from a server is referred to as a(n) client.12. The type of computer that is considered one of the fastest in the world is a(n) supercomputer.13. A special-purpose microprocessor that is built into the machine it controls is a(n) microcontroller.14. The term that refers to the form in which data is stored, processed, and transmitted is data representation.15. In the accompanying figure, the type of sound wave indicated by A is analog.16. In the accompanying figure, as indicated by B, the sound wave has been sliced into samples and so has been digitized.17. Eight bits is a(n) byte.18. A machine language instruction has two parts, the op code and the operand.19. Identifying a person by personal attributes such as fingerprints or retinal patterns is called biometrics.20. Hackers can guess your password by stepping through a dictionary. This process is called a dictionary attack.

Saturday, November 9, 2019

UTC analysis essays

UTC analysis essays Paul Cronan and New England Telephone Company The Paul Cronan story is a depiction of Americas prejudices and the reason why employment laws are necessary. Mr. Cronan was a long-time employee of New England Telephone Company since 1973, whose sexual preferences caused him to contact Acquired Immune Deficiency Syndrome (AIDS). As a service technician, his ailment left him missing work often to gain necessary treatment. His supervisor confronted him asking for explanation as to the missed work, and even though this supervisor promised confidentiality, word quickly spread of Mr. Cronans ailment. Prejudices were evident as outlined in the case study, leaving him to fear of his safety on a daily basis. As his company illness benefits were discontinued, NET placed Mr. Cronan on Long-Term Disability, effectively terminating his employment and leaving the man with half his normal monthly income. In December of 1985, Mr. Cronan enlisted the Civil Liberties Union of Massachusetts (CLUM) to assist in filing a civil lawsuit charging violations of privacy law and discrimination against him. Through an out-of-court settlement it was agreed that Mr. Cronan could return to work and accommodations would be made at NET for his reinstatement. A walkout ensued as workers refused to enter the premises to gain work assignments. Workers filed a union grievance protesting the reinstatement as a violation of the safety and health agreement of their labor contract. Legal Issues; Weekly Issues Studied, Issues Applied to Case Employment at Will is the first subject broached this week as related to the employer and employees right to end employment. The key issue here is that it allows any employer to fire the employee at any time; as well, the employee may terminate his/her position at any time, without repercussion. The importance with this subject is that there are federal restrictions constituting illegal bases for termination; any bas...

Wednesday, November 6, 2019

Free Essays on Tragic Hero (using Hamlet)

A tragic hero is an exceptional character, who has a flaw that leads to his downfall. In most plays the tragic flaw is easy to spot. However, in Hamlet, Hamlet’s tragic flaw is not as easy to point out as some other major Shakespeare’s characters. Hamlet’s complex and deep character produces a variety of possibilities that might’ve led to his demise. However, it seems to be that his constant over rationalizing and hesitating were most prominent in leading to his death. After Hamlet’s father was killed, his world was turned upside down. He was thrusted into a whirlwind of commotion. For one, he had to live life without a man who he deeply loved. Next, his mother remarries, nearly three wakes later. To add insult to an already painful injury, the man his mother-queen married happened to be his late father’s brother. Newly crowned King Claudius did not help the situation. It appeared Hamlet’s life couldn’t get any worse. That was until he was visited by a ghost, who claimed to be his late father. Although an odd and precarious situation, Hamlet was excited. He learned that his, uncle, and now king and father, Claudius, had poisoned and killed the great King Hamlet. Before the apparition departed he called upon a favor of his son: seek revenge. Kill King Claudius. Hamlet’s initial instinct was to do this deed, and do it now. He owed it to himself and to his father. However, as if life hadn’t been rough enough for Hamlet, he quickly was brought down to earth when he realized what he had to do. Commit treason. Go against religious beliefs. These overbearing thoughts would go on to plague Hamlet throughout the play. Hamlet cannot take immediate action. He cannot just go out and kill the king. He has one shot and one shot only. He realizes this, and realizes a bunch of other gloomy prospects. First off, Hamlet is unsure about whether or not killing the king is the right thing to do. He doesn’t even have a without a ... Free Essays on Tragic Hero (using Hamlet) Free Essays on Tragic Hero (using Hamlet) A tragic hero is an exceptional character, who has a flaw that leads to his downfall. In most plays the tragic flaw is easy to spot. However, in Hamlet, Hamlet’s tragic flaw is not as easy to point out as some other major Shakespeare’s characters. Hamlet’s complex and deep character produces a variety of possibilities that might’ve led to his demise. However, it seems to be that his constant over rationalizing and hesitating were most prominent in leading to his death. After Hamlet’s father was killed, his world was turned upside down. He was thrusted into a whirlwind of commotion. For one, he had to live life without a man who he deeply loved. Next, his mother remarries, nearly three wakes later. To add insult to an already painful injury, the man his mother-queen married happened to be his late father’s brother. Newly crowned King Claudius did not help the situation. It appeared Hamlet’s life couldn’t get any worse. That was until he was visited by a ghost, who claimed to be his late father. Although an odd and precarious situation, Hamlet was excited. He learned that his, uncle, and now king and father, Claudius, had poisoned and killed the great King Hamlet. Before the apparition departed he called upon a favor of his son: seek revenge. Kill King Claudius. Hamlet’s initial instinct was to do this deed, and do it now. He owed it to himself and to his father. However, as if life hadn’t been rough enough for Hamlet, he quickly was brought down to earth when he realized what he had to do. Commit treason. Go against religious beliefs. These overbearing thoughts would go on to plague Hamlet throughout the play. Hamlet cannot take immediate action. He cannot just go out and kill the king. He has one shot and one shot only. He realizes this, and realizes a bunch of other gloomy prospects. First off, Hamlet is unsure about whether or not killing the king is the right thing to do. He doesn’t even have a without a ...

Monday, November 4, 2019

Enterotube case study Lab Report Example | Topics and Well Written Essays - 1000 words

Enterotube case study - Lab Report Example Within 3 hours the patient suffered from severe vomiting, feelings of nausea and diarrhea. He also felt consistent abdominal cramps. He had developed mild fever while being admitted. This is a clear case of food poisoning since no other symptoms are visible. No other complication developed. However since several species of bacteria can cause food poisoning it is important to accurately point out the causal microbe for proper treatment approach. In order to reach a proper diagnostic conclusion several tests needs to be conducted to accurately identify the exact species of the pathogenic bacteria responsible for causing the symptoms in the patient. The Enterotube IITM System has been used to help in identification since several evaluations have shown that the system is both simple to use and rapid for analysis of bacterial species (Martin et al, 1971, p.96).It is a pre-packaged diagnostic tool used for identification of Gram Negative bacteria in Enterobactericeae family. Even though the procedure is less reliable than conventional molecular methods yet the advantage of using this system lies in the fact that all the tests can be done simultaneously using just one single colony (Grunberg et al, 1969, p.207). After proper scoring and calculation it can be said accurately that the causal microorganism is S.aureus. S.aureus is a fairly common bacterium found o skin and in noses of even healthy individuals (CDC, 2014).The severity of the food poisoning developed depends on the amount of food ingested.This bacterium is primarily spread through food especially when food is handled under unsanitary conditions. Since patient is a growing child no medical intervention will necessary at this stage. However, rest and intake of large amounts of fluid is absolutely essential for proper

Saturday, November 2, 2019

Networking Assignment Reflection Paper Essay Example | Topics and Well Written Essays - 500 words

Networking Assignment Reflection Paper - Essay Example e is really passionate about market research, has a strong sense of responsibility, and very much knowledgeable about the situation of the different industries in the market. I believe that her professionalism enables her to generate interviewees from industry players and trade associations. Her innate passion for market research coupled with her strong sense of responsibility allows her to finish each project to the best of her ability. These values also encourage her to work amidst the difficulties in data gathering. Her interest in the market and knowledge on how it operates makes her as a credible source and enables her to giver accurate reports. Written skill is a very important requirement for her job because it enables her to communicate her knowledge about the market. The ability to make rational forecast on the market will perform is also important as it is a very crucial part of the industry reports. The capability of gathering data and analyzing them are keys to having accurate results. Compared to the interviewee, I am more comfortable in verbal communication than writing out my ideas. Being inexperienced, I am not adept in making forecasts about industries. However, I am also confident of my skills in gathering data and analyzing them. I love to do researches even though I know that I still need to learn more about judging the quality of the data and how they can be used in order to come up with rational results. I have always been interested in market research yet I am not really motivated to pursue this profession when given a chance. What I really want when I choose this interviewee is how various think-tanks like AC Nielsen come up with the market reports which they present to business organizations. Also, interviewing a market research analyst enabled me to understand her work and the important characteristics needed to excel in her career. The primary challenge when approaching an unknown professional is the fear of being rejected. Noting