Computer Addiction

Computer games have been leisure most in secondary level students. Students who are addicted to computer games, most all of them do not attend their classes just to play with their friends or classmates. Students who don’t still know how to play computer games that who are willing to know In playing computer games can be easily addicted to it and some do not do their dally tasks anymore. Many students have no good educational background because they don’t focus on their studies. Some computer addict are undergraduates and don’t want to go to school anymore.

Because of this, computer shops prohibited elementary and high school students to go inside the shops. Some students who are in last year of high school have previous experiences that the regret towards being addicted to computer games, since that they will not graduate If they don’t want to attend to school anymore. Statement of the Problem This study aims to determine the Effect of Computer Games to IBIS 2nd year students. Specifically, it sought to answer the following questions:

  • What are the effects of Computer Games to IBIS 2nd year students studies? 2.
  • What are the effects of Computer Games to IBIS 2nd year students health?
  • What are the reasons why IBIS 2nd year students addicted to computer games?

The study has the following objectives:

  • To know the effects of Computer Games to IBIS 2nd year of Tarmac College of Agriculture students studies.
  • To know the effects of computer Games to IBIS 2nd year of Tarmac college of Agriculture students health.
  • To know the reasons why IBIS 2nd year of Tarmac College of Agriculture students addicted to computer games.

Time and Place The study will be conducted at the researchers room In IT b, Institute of Engineering, Tarmac College of Agriculture, Canalling, Tarmac, from September to October.

Scope and Delimitation’s

The study will be focus and limited only to the effects of computer games to IBIS 2nd year students of Tarmac College of Agriculture. Computer Games are game played using a computer, typically a video game. Addiction the fact or condition of being addicted to a particular substance, thing, or activity. the condition of being addicted to computer games. Hypothesis Students suffer to their studies because of addiction of computer games.

Read more

Public Limited Company Essay

Sainsburys is a plc, a public limited company and has limited liability, which is the idea that the owners (shareholders) are financially only responsible for the amount that they have invested in the company rather than their personal wealth. So if a firm becomes insolvent, the maximum the creditors can receive is the shareholders original investment. In order to both protect and inform creditors the word Ltd or Plc appears after the company name.

By limiting the shareholders liability it encourages people to invest in the company, as it is possible for them to invest with little risk. Public limited companies are the only type of company to be quoted on the stock exchange. Plc’s are part of the Private Sector, which is the part of the economy owned by either private individuals or the shareholders. The Public Sector is the organisations that are either owned or funded by the local or national government.

However there is some concern with plc’s that even though the shareholders own the company the management team run them and this can lead problems with conflicting loyalties where managers may pursue objectives that can improve their job satisfaction or benefit their careers instead of looking after the shareholders best interests. Divorce of ownership and control is a common phrase used to convey the concern for this. Opening new types of store to meet the changing needs of more groups of people as well as existing customers, and indeed piloting 24-hour shopping in some areas.

Sainsbury’s serve on average over 9.5 million customers a week and currently has 432 stores in the U.K., mostly situated in town centres or on the edge of town. A large percentage of these stores were built on previously derelict sites. Sainsbury’s has in the last year opened many new stores and has extended 27 older stores. In the next year Sainsbury’s plan to open another 13 stores and to extend another 22 stores.

Being a firm believer in playing an active part of community Sainsbury’s donated 5 million to charity groups, community projects and sponsorship. Annually Sainsbury’s run a reward scheme for schools and so far has donated approximately 4 million in equipment to schools. Sainsbury’s launched a new Low price guarantee in October 1999 on 1,600 of its most regularly purchased items including its own brand label as well as some top brands.

Is Sainsburys being successful in meeting its objectives? To try and measure whether or not Sainsburys has been successful in meeting its objectives I have gathered information from the company.All these channels and types of communication can be used to express both confidential and open communication. Sainsbury’s also conduct monthly meetings with senior managers within the technical division, where social responsible sourcing is a formal agenda item. Sainsbury’s have a magazine that is distributed to all members of staff that is issued quarterly and also a quarterly review of the progress of Sainsbury’s that includes the Chief Executive and Commercial Director

Internal Communication In a store of Sainsbury’s the most often used forms of non-verbal communication are reports, memorandums, minutes and newsletters. The advantage of using mainly written communication is that there is always a record of the message and normally a back up copy. Verbal communication is normally used to let people know of instructions and developments, such as telephones and face-to-face communication.

External Communication The postal service used to be used heavily by Sainsbury’s but this is somewhat unreliable compared to what technology now has to offer. Now E-mail and the Internet are used a lot as well as the postal service occasionally. Telephones and mobile telephones are also used a lot but these have their restrictions as no copy is made of the conversation and it relies on the recipient to understand all the information and to remember.

Role of ICT Information technology is a key factor in the success of any business. In Sainsbury’s ICT is a tool to make ready existing services or transactions as fast as possible. The telephone system – Before ICT was introduced to Sainsbury’s the Sainsbury’s telephone system was very small a compact with a very little range (not many links with other places and other companies). Now due to the introduction of ICT phone lines have gone digital enabling higher speeds of data transfer and opening paths for other methods of carrying information. This led to the introduction of permanent hard lines with other companies (such as trade dealers) thus opening the field to other technology’s such as video conferencing, conference calling with many lines, e-mail, internet networks, web-sites (cheap advertising), etc

This expansion in the main communication systems widened the field for Sainsbury’s so parts of the countries that where not easily reachable where now in range. New telephone exchanges can handle up to 20,000 calls a minute enabling Sainsbury’s to deal with most of its customer’s queries and complaints. Previously just telephone operators have been trained to deal with e-mail and fax providing even further transfer media in which Sainsbury’s can be reached.

Links with product suppliers – Possibly the biggest impact ICT has had was in the field of effective trade communications. Extract from a Microsoft.com promotional bulletin.

Sainsbury’s Supermarkets, a leading United Kingdom grocery chain, recently launched a new supply-chain initiative to provide tighter collaboration with suppliers, higher profits, and better customer service. The new Internet-based information-sharing and collaboration system, created with the help of Microsoft Certified Solution Provider EQOS Systems, Ltd., will eventually allow all 4,000 of Sainsbury’s suppliers to work with buyers in planning, executing, and managing successful product promotions.

The solution, the first retail system of its kind in the U.K. to be based on the Microsoft Value Chain Initiative, was created in a matter of weeks using Microsoft electronic commerce technologies, such as Microsoft Site Server 3.0 Commerce Edition, Microsoft Windows NT(r) Server 4.0, and Microsoft SQL Server(tm) 6.5. The solution also has future potential for management and tracking of new product introductions, product returns, and product lifecycles.

As you can see the introduction of this new software system allows Sainsbury’s to do effective trade with suppliers by enabling very fast methods of communication. The new network will allow Sainsbury’s to order and trade with suppliers nearly 5 times the speed of the normal method of phone or mail order. Faster communication will allow for faster reaction speed to changes in the market and a better service to its costumers. Improved management – As you may expect ICT has improved management. Mundane tasks done by hand have been replaced by computer processes. All files are stored mainly on networked computer systems available for querying at the click of a button. Networks connect Sainsbury’s stores world-wide meaning files and data can transferred from any where to any where in seconds.

Here is a typical example of ICT in management: Chief executive manager can sit in his/her office in front of his computer and receive reports, files and other documents from for example the secretary. Then he may then wish to send the documents to his non-executive managing directors in other parts of the world (or locally) using e-mail software. They then could read the report and a video conference (video visual meeting) could be set-up.

Improved methods – Due to the use of ICT many tasks have been replaced by computer processes. For example in the old system a worker would have to be employed to address, write and send mail to all customers concerned (which may be thousands if it is advertising) in the new system thousands of letters can be written, uniquely named and addressed and sent to a remote queuing system where all letters will be printed and dispatched.

Read more

Chemotherapy: Understanding the Basics

There are many ways to give chemotherapy; as an IV where medication is put into he body using veins (usually in your arm), or as a catheter, or an IV that stays in a blood vessel in your chest, so a normal IV doesn’t have to stay stuck in your arm. More ways that chemo can be given are pills, capsules, or liquids, shots into the muscle and skin, or as an injection into an area below the spinal cord. Places to give chemotherapy are hospitals, cancer centers, doctor’s offices, and at home.

Many patients receive chemo in hospitals and clinics, while others may need to stay in a hospital so doctors can look over them. Chemo may be given at different times such as every day, every week, or every month. Between treatments the patient needs time to rest. Undergoing chemo might have uncomfortable side effects caused by the medications, the amount taken, and the general health of the patient. Most side effects don’t last long because the healthy cells multiply and side effects eventually go away.

Cancer patients get lots of TTL (tender, love, and care), like lots of food and water, physical therapy, medicines, etc. This type of care helps patients get through treatments and avoid side effects such as nausea and vomiting. This most common effect of chemo Is fatigue. Tiredness can last for days, weeks, or months, but It eventually goes away once the treatment Is over. Rest can assist the body to recover from chemo. Short-term side effects caused by chemo are stomach problems Like not being hungry, constipation, diarrhea, nausea, and vomiting.

Some drugs used In chemotherapy might cause problems that bother or harm the bladder or kidneys. Another Issue caused by chemo Is brief depression and confusion, which should disappear when treatment Is finished. More side effects can be blood disorders Like anemia and blood clotting. Any organ Like the heart, lungs, brain, kidneys, and liver can be affected by chemo for a long period of time. Factors Like the type of drug and/or chemo and whether the patient was treated with radiation at the same time he or she was receiving the treatment may cause a higher risk of cancer later on.

It can be hard to deal with cancer and cancer treatment. Even If the side effects are uncomfortable, It’s Important to make the patient happy and ensure that chemo Is administered. Chemotherapy: Understanding the Basics By accepted effect of chemo is fatigue. Tiredness can last for days, weeks, or months, but it eventually goes away once the treatment is over. Rest can assist the body to recover Short-term side effects caused by chemo are stomach problems like not being hungry, constipation, diarrhea, nausea, and vomiting.

Some drugs used in Another issue caused by chemo is brief depression and confusion, which should sappier when treatment is finished. More side effects can be blood disorders like Any organ like the heart, lungs, brain, kidneys, and liver can be affected by chemo for a long period of time. Factors like the type of drug and/or chemo and whether the patient was treated with radiation at the same time he or she was receiving the It can be hard to deal with cancer and cancer treatment. Even if the side effects are uncomfortable, it’s important to make the patient happy and ensure that chemo is administered.

Read more

Project Plan – Inventory Control and Management

The Marwin Machine Tools Ltd company manufactures small hand tools for a variety of applications. For the purpose of producing their products, the company uses a variety of manufacturing equipment which demand to have set processes in place to insure of the proper operation of the machines. In addition, the machines used in the company demand several alterations during their life-cycle in order to maintain a high level of product quality. Presently, the many alterations required by the machines involved in the production of the small hand tools demand the regular supervision of the shopkeeper.

The shopkeeper insures that that the company has proper equipment inventory and also handles staff safety clothing. However, the current process of supervising the manufacturing inventory at the Marwin Machine Tools Ltd company is outdated, manually intensive, and becoming obsolete; which in the long term would have adverse effects on the production capacity of the company. 2. Project Mission Statement The Marwin Machine Tools Ltd company is therefore undertaking a project management plan to enhance the quality of the processes involved in the supervision of company manufacturing operations.

The main objective of the plan is to arrive at automating the tasks handled by the shopkeeper in order to fuel production capacity, while being able to provide a safer environment for workers. In order to attain such objective, the various processes coordinated by the shopkeeper are to be reviewed, analyzed, and improved on in order to sensibly facilitate the daily tasks handled by the shopkeeper, but also in order to provide a robust process for workers in the maintenance and acquisition of new inventory.

To facilitate process automation and information dissemination in the manufacturing setting, the company is considering the use of RFID (Radio Frequency Identification) technology combined to a client-server database implementation that would allow the shopkeeper and other workers in the manufacturing department to substantially enhance their productivity level (Rockwell, 2004).

3. Project Objectives The intended objectives for the implementation of the project are three fold:

1. To provide the shopkeeper with an automated tool to aid in the tracking of inventory.

In effect this objective comes as the realization that the tasks handled so far by the shopkeeper were too manual and thereby highly intensive to allow the company to improve its level of productivity. From this viewpoint, it came out as imperative to plan for the implementation of various interlinked systems allowing to reduce the manual nature of the tasks handled by the shopkeeper in helping to decrease error-occurrence in the shopkeeper’s duties, and subsequently improve the quality level of maintenance, and updating of the key materials and elements required for the optimum operation of company manufacturing equipment. Read the discuss a new inventory tracking system

2. To provide a networked solution that can be accessed outside of the shopkeeper’s office. For improving access to relevant information stored on the main manufacturing database, the company is also looking into implementing a company wide computer network that would allow the shopkeeper to have access to the inventory database outside of his office.

The project team in this regard is wanting to extend this capability to the implementation of a hybrid wired and wireless network, where the shopkeeper could have access to the main inventory database via tethered computer interfaces, but equally via wireless portable devices. Extending the range of access to the database allows the shopkeeper to have an added degree of mobility within the work environment and therefore renders the person more apt at reacting to eventual manufacturing equipment issues in quasi real-time fashion.

The combination of a company wide intranetwork with the capabilities inherent to RFID technology could prove essential in improving information flow between the main manufacturing centers, keeping inventory up-to-date at all times, and thereby sensibly improve the ability to reduce the time required to complete various processes handled by the shopkeeper.

3. To provide an application that provides flexible reporting capabilities. In addition to the afore mentioned objectives, the application to be use should offer a wide array of tracking and reporting capabilities.

Monitoring information is key to the ability to guarantee a certain level of quality in manufacturing processes (Timken, 2008). Therefore, the application being the main user interface between the manufacturing machines and the shopkeeper, it is a main company objective to implement a solution that is robust, upgradeable, and scalable; while offering the user the ability to create manufacturing and inventory reports in a seamless manner. Also the application should be implemented in such fashion as to allow access from several terminals including desktop, laptop, and wireless handheld devices.

4. Project Work Objectives System Design and Analysis o Hardware o Contact equipment manufacturers to obtain relevant information on monitoring devices for each of the machines used in the manufacturing of small hand tools. o Create a comprehensive list of necessary monitoring and sensing devices to be installed (EMS 2008, Timken, 2008)

Consult with vendors on pricing and installation cost of the various monitoring and sensing devices. o Design an RFID system (tags, antennas, readers) to operate in tandem with the monitoring and sensing devices to provide real-time status and inventory of tools created.

Design a company wide network to operate with the RFID and monitoring subsystems.

Consult with technology firms on the cost of implementation of the network.

Software:

Search suitable software applications to be used on the network by the shopkeeper.

Consult with software implementation firms to ensure of the proper compatibility of software with monitoring system, RFID system, and internetwork. The software system is likely to have several independent modules, however it is imperative to insure that they can function in a seamless fashion to provide the necessary tracking, reporting, and alerting capabilities.

Get an overview of necessary software enhancement/development to provide a robust and user-friendly solution capable of interacting with the monitoring subsystem, the RFID subsystem, and the intranetwork.

Analysis

Establish a list of necessary documentation for the use of the overall system

Estimate the advantages of the system in providing a comparative analysis of the new system versus the old manual system o Plan for implementation and testing measures of the subsystems and of the overall system (Six Sigma, 2006)

Identify areas needing improvement or needing targeted software development to work with the rest of the system.

Development

The development of the hardware subsystems is to be done with a custom hardware development company specialized in the implementation of monitoring and communication systems geared toward inventory control and management.

Preliminary testing of the hardware system is to be done at the vendor’s premise.

Secondary testing involving the monitoring and sensing subsystems is to be done at the company’s manufacturing site during off-production hours.

o Software development and implementation is to be done at the software vendor’s site

Preliminary testing will be done at the software development site as well

Secondary testing will occur at the manufacturing site in tandem with secondary hardware testing

A list of bugs and necessary fixes will be compiled upon completion of secondary testing

Bugs fixes are to be implemented both from the hardware and custom software vendors at their respective sites.

Adequate hardware and software documentation will be provided upon conclusive testing of the overall system at the site.

Installation o All monitoring and sensing devices are to be installed on their respective manufacturing equipment

A layout for RFID tagging and communications will be designed and implemented according to the manufacturing facility requirements.

An IT firm is to be hired to implement a company wide network which will entail of a wired network (Ethernet), and a wireless network combining Ultra High Frequency (UHF with a range of about 100m) communication for RFID devices, and Wi-Fi network capability for interfacing between the RFID subsystem and the computer network subsystem.

The software vendor will install the application of the main server and configure all necessary clients to access the main server. o Vendor will send install disks for the application.

The IT firm will configure the network system in collaboration with the hardware vendor and software vendor.

The IT firm will then perform various tests to insure that the overall system is operating according to the company performance parameters, and interacts seamlessly with the distributed systems (sensing, monitoring, bar code reading)

The IT vendor will import all necessary data from the old database to the new system.

Testing

Overall testing of the system shall be conducted first with the collaboration of the hardware vendor, software vendor, and IT firm.

The shopkeeper will be trained on using each major subsystem and interact with it

The shopkeeper will then be responsible for testing the overall system, its performance, its functionality, its configurability.

The shopkeeper will also be responsible for outlining any problems or issues with the system so that the adequate vendor may revise according to company demanded level of usability and performance.

Training

The hardware and software vendor will be on-site for 2 days of training.

The training environment will be prepared with the assistance of the IT team.

They have the responsibility of providing minimum training to the shopkeeper and to the persons susceptible to directly interact with the inventory monitoring, control, and management system.

The vendors will provide finalized training and operating documentation on the overall system. is responsible for providing training documentation.

User Acceptance

The user acceptance testing procedure shall be the responsibility of the shopkeeper. The shopkeeper will insure that all the logistics of the systems are in place and working according to requirements in order to begin implementing the overall system in the manufacturing capacity of the company.

The shopkeeper and company management together will be responsible for the final approval of the application following testing, improvement if needed, and final system delivery.

5. End-item Specifications The end-item specifications in the project will contain several documents for the training, operation, and maintenance of the overall system. The documentation is to include the sensing, monitoring, RFID, network subsystems, and software application. Most of the documentation is to be delivered under user’s manual format. The sensing documentation will allow the end users to familiarize themselves with the basic functionalities of the sensor systems as they relate to each machine.

However, the end user has minimal need for directly interacting with the devices. The sensing system documentation is meant as a means to meet accepted standard for industrial manufacturing. The monitoring system documentation will be presented in a user’s manual format meant primarily to be used by manufacturing workers and the shopkeeper. The manual emphasizes the function of each monitoring device as it relates to each of the machines in the manufacturing facility.

The RFID documentation provides a detailed explanation of the interaction between RFID tags, antennas, and readers. The documentation is primarily to be used by the shopkeeper, and by manufacturing workers as well. The documentation will also provide a detailed plan of all the fixed RFID devices within the facility along with their primary function. The network documentation is meant for the shopkeeper only or any other employee required to have direct access to the database application for inventory and management control.

The documentation will outline the security measures to insure continued network integrity. The software documentation is a detailed document provided as a user’s manual. It will contain detailed information on how to operate the application for the purpose of process tracking, inventory tracking, inventory control and management, and will also inform the user of the various methods for creating reports and setting alerts levels for each machine within the manufacturing facility.

Read more

Certificate of Administration: Travel Tourism and Hospitality

THE CERTIFICATE OF ADMINISTRATION TRAVEL, TOURISM & HOSPITALITY (CATTH) CERTIFICATE OF ADMINISTRATION IN TRAVEL, TOURISM & HOSPITALITY (CATTH) 1. Philosophy The Certificate in administration in Travel Tourism and Hospitality is designed to develop young Namibians to effectively manage the countries tourism resources to ensure sustained growth of the industry. The course appeals to staff already working in the field and those aspiring to join the industry as employees or operators to its relevance and practical approach.

The course prepares students for a role that will ensure adequate human resource to manage the growing tourism industry in Namibia and abroad. The course will give the student the necessary skills to work or operate in a very demanding environment. It will enable graduates to advance to the Higher Certificate in Travel Tourism and Hospitality or gain meaningful employment, start own operation or act as a tourism consultant. 2. Programme Outcomes By the time the graduate finishes the Certificate of Administration, he/she will be equipped with knowledge, skills and requisite attitude to effectively operate to work in the tourism industry. . Objectives (Purpose) ? By the end of the course, the student will be expected to appreciate tourism industry and the context in which it operates. ? To get the student to understand concepts in Travel Tourism and Hospitality. ? Understand the role of marketing and communication in travel tourism and hospitality. ? To give students the theory and practice of administration and accounting systems in travel tourism and hospitality. ? Appreciation of the role of government in managing tourism resources. 4. Enrolment Standards (Admission Requirements):

To be registered for any of the courses, candidates must: Hold HIGCSE senior certificate in four subjects with 1- 4 symbols OR Hold a Grade 12 senior certificate (IGCSE) with a minimum of C symbol in English Language, a pass in Mathematics and a C symbol in three other subjects totaling twenty five points or more OR Enter through flexible learning path – mature age/prior learning with five years relevant experience in various fields of world of work. Apart from a valid IGCSE 22 certificate, applicants must also have attained a minimum of 25 points on the IUM evaluation scale.

Please note that achievement of these requirements will not automatically guarantee a place on the degree course, it will be subject to a successful interview/aptitude test (as required) and availability of places. OR The equivalent of any of the above as determined by Senate. 5. Teaching Methods The students will be expected to be responsible for their own learning, nobody can learn for somebody else. Emphasis will be placed upon the need for a student to read extensively in each of the subjects. The role of the lecturer is to stimulate learning and to support and guide that process.

Programmed reading will support these endeavours. A wide range of teaching methods will be employed by lecturers from traditional lectures through to small decision-making groups, as well as the use of training films and videos, and advanced business simulations. 6. Learning Standards Class contributions by the students will be encouraged and the extent to which these contributions conform to the teachings of the Certificate of Administration in Travel, Tourism and Hospitality will be an important facet in the success of the student.

Individual assignments will be set by the lecturer every two weeks and should usually exceed the standard of the exam. Like the group assignments these will normally take the form of a duplicated handout, that should be returned with the finished assignment. The student will be expected to carry these out without help. It is in the student’s interest to carry out these tests with integrity. They will be marked anonymously by their fellow students against a given marking plan.

The tutors will use these results to monitor student progress and to make decisions as to whether the student is ready to sit exams when the time comes. (Students may not sit exams unless the lecturer feels he or she has a good chance of succeeding). 7. Credits System As per international acceptable formula, one (1) credit equates ten (10) notion hours (learning). These hours do not include the hours spent by a student in a class. A first year degree IUM student will, therefore, attract one hundred (100) credits. 8. Course Outline Certificate of Administration (100 Credits) ?

Mathematics for Business 33 ? ? ? ? ? ? ? ? ? Spoken and Business English Computer Literacy Professional Presentations Report Writing Namibian and Regional Economics Introduction to Business Accounting I Business Communications I Introduction to Travel, Tourism and Hospitality 9. Assessment & Evaluation The assessment system comprises two components: ? Continuous Assessment (CA) attracts 40% of the final grade ? Formal Exams (FE) attracts 60% of the final grade. The evaluation system comprises two components: ? Students will be asked to complete evaluation sheets for each subject studied ?

An external evaluator will evaluate the course in terms of course content, teaching methods, course resources and assessments. 10. Articulation IUM subjects articulate from Certificate/Diploma to Certificate/Diploma as per the statement in course contents Faculty will decide if and how course work from qualifications from other institutions will articulate with IUM courses. Appeals may be submitted to Senate 11. Credit Transfer Internal students that apply for advanced standing or credit accumulation or credit transfer will have their cases considered by the relevant faculty.

Students from outside IUM will have their cases considered by the relevant faculty. Credit from outside institutions may be awarded up to fifty percent of total credits for any qualification conducted by IUM. Appeals may be submitted to Senate 44 ENG – 111- Professional Presentation NQF Level 5 Module Outcomes: ? ? ? Credits 10 Demonstrate good communication skills: Speech, Listening, written. Apply appropriate visuals in business communication. Employ investigative and interview skills in business situations. Course Content ? Analysing the importance of good speech and associated characteristics in business. Appreciating the values of listening and acquiring useful techniques to make a better listener. ? Learning how professional speeches and presentations are planned and delivered. ? Understanding how to use the telephone effectively and efficiently. ? Learning about the reasons for meetings and interviews taking place in business organisations. ? Appreciating the steps that need to take place for planning successful meetings and interviews. ? Studying different documents required for formal meetings. ? Analysing the types of interviews that take place and the types of questions asked. Learning how to prepare advertisements, job descriptions and press releases. ? Creating advertisements, job descriptions and press releases. ? Appreciating the different types of visual aid equipment that can be used in business communication. ? Studying the use of visuals in business communication. ? Considering how written communication can be enhanced through the use of colour and lettering styles. ENG – 112 – Spoken Business English NQF Level 5 Credits 10 Module Outcomes: ? Explain linguistics concepts and principles. ? Describe communication. ? Explain the purpose and role of seminars.

Course Content Linguistics: ? Applied Linguistics ? Pronunciation ? Enunciation ? Grammar 55 Tutorials ? Selection and formulation of tapes ? Effective deliberation tapes ? SWOT Analysis Perception and Application ? ? ? Seminars ? ? ? Purpose of seminars Acceptable conduct in a seminar Seminar presentation How to illustrate communication Barriers to effective communication How to achieve success in communicated speech MTH – 132 – Mathematics for Business NQF Level 5 Module Outcomes: ? ? ? Credits 10 Calculate basic mathematical models and algebraic computations.

Apply BODMAS acronym and its full application. Calculate basic business and financial transactions. Course Content ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? Applying the four rules of whole numbers, fractions and decimals Multiplying and dividing negative numbers Comparing numbers using ratios, proportions and percentages. Obtaining values for simple financial transactions involving purchases, wages, taxation, discounts. Converting foreign currencies Making calculations involving roots and powers Evaluating terms involving a sequence of operations and use of brackets.

Approximating data using rounding and significant figures. Solving linear and simple simultaneous equations Determine the equations of a straight line through two points. Determining the gradient and intercept of a straight line Drawing charts and diagrams from tabular data Applying general rule and principles of graphical constructions including axes, choice of scale and zero. Identifying points of importance e. g. maximum, minimum and break-even. Calculating and interpreting summary statistics, namely measures of location 66 mean, mode, median) and measures of dispersion (range, interquartile range and standard deviation) ? Applying the laws of probability to mutually exclusive, independent and dependent events. ENG – 113 – Report Writing NQF Level 5 Module Outcomes: ? ? ? Distinguish and employ various reports. Demonstrate and use clear and concise language. Practice proper report writing skills. Credits 10 Course Content Nature and Purpose of Reports ? ? ? Necessity of reports Formats for writing reports Use of clear and concise language Informative Reports ? ? ?

Purpose Situations where used Case studies Analytical reports ? ? ? Purpose Situations where used Case studies Practical Report Writing ? ? ? ? Formulation of Assignment Report presentation Assessment Correspondence ? ? ? ? Letters Memos Faxes Orderly in expression of requested opinion 77 Field Activity ? ? Practical like report writing Assessment and evaluation CSE – 135 – Computer Literacy NQF Level 5 Module Outcomes: ? ? Credits 10 Demonstrate computer literacy skills. Illustrate Information Technology appreciation in problem solving. Course Content Introduction to Microcomputers ?

Overview of the development of computers ? Multi-user computers – mainframes and minicomputers, personal computers and their configuration. ? Essential PC Hardware, peripherals and software. ? Introduction to the main types of Software. ? Binary codes and the microprocessor ? Types of PCs – their uses and strength ? Introduction to Operating Systems (DOS & Windows) ? Information processing – online, offline processing, real-time, batch processing, single tasking and multitasking ? Current IT issues – open & proprietary systems and compatibility, information systems security. Data communications – Introduction to Networks, central and distributed computing, wide area and global networks. Microsoft Windows ? Navigating the desktop, customising the desktop, file and folder management, installing and de-installing a program ? Logging onto an internet Service Provider or Online service provider, managing the mailbox, email security, using a browser and search engine effectively and downloading pages, refining searches Microsoft Word ? Open a blank document and type text, recognise the toolbars, Ruler Bar, Scroll Bar, Status Bar ? Spell checking, search and replace, thesaurus ?

Page set-up, styles and general Formatting 88 ? Creating a tab set, Columns, Tables and Borders/Shading/Page ? Use word Processor Wizard to create a document such as a fax, an invitation or a CV ? Print preview and printing Microsoft Excel ? Start a blank spreadsheet and navigate between workbooks and sheets ? Enter data, change column widths and row heights, Formatting values, Calculating, creating and understanding formulae, using Math and statistical functions ? Creating and editing charts ? Auto Form Introduction to Presentations ? Create and present a simple show. Keyboarding ?

Introduction to the keyboard and basic typing skills ? Introduction to touch typing to be able to acquire at least 35wpm. FIN – 111 – Namibian and Regional Economics NQF Level 5 Credits 10 Module Outcomes: ? ? ? Demonstrate basic economics concepts and principles. Describe economic problems and corresponding economic systems. Explain Namibia’s economic competitive edge over SADC countries. Course Content ? ? ? ? ? ? ? Analysing the Namibian economic structure (namely, Mining, Agriculture, Fishing, Tourism) infrastructure (Transport and Telecommunication), Banking, Insurance.

Analysing the Namibian government structure namely Legislation, Judiciary and Executive. Understanding government development plans of government (NDP 1 & NDP 2) Describing the economies of Southern Africa (Angola, Botswana, South Africa, Zambia, Zimbabwe, Swaziland, Lesotho, Mozambique, Malawi, Tanzania and Democratic Republic of Congo) Examining Namibia’s competitiveness in the region and beyond A case study of Namibia’s industrial policy and the export processing zone initiative in particular.

Explaining Namibia’s stake in SACU, SADC, COMESA, WTO, and AGOA. 99 SBM – 115 – Introduction to Business I NQF Level 5 Credits 10 Module Outcomes: ? ? ? Distinguish between different types of business in public and private sectors. Compare the processes and strategies used by businesses. Analyse business financials. Course Content ? ? ? ? ? ? ? To investigate the purpose and nature of business, looking at the different types of organisations within the Public and Private Sector. Including the activity, size, advantages and disadvantages of a business.

To describe the hierarchy and the external influences of both Private and Public Sector companies including conducting a PEST analysis. Researching the services available to organisations including financial services, consultancy services and local government funding. Demonstrate an understanding of how to market a business taking into account the location, marketing mix, product lifecycle, customer needs and relating this to the overall business objective. Demonstrate knowledge of the production processes, quality, stock control and the factors internal and external that affect production within an organisation.

Human resource management within a business, to include recruiting, payroll, training and development of employees and health and safety issues. Business finance; being able to demonstrate an understanding of balance sheets and profit and loss accounts within a Public and Private sector organisation. FIN – 1129 – Accounting I NQF Level 5 Credits 10 Module Outcomes: ? ? ? ? Demonstrate basic appreciation of accounting theory and practice. Calculate and use appropriate costing methods to specific business transactions.

Practice and illustrate preparation of books of accounts. Interpret financial statements. Course Content ? ? Prepare a trading, profit and loss account, balance sheet and cash flow report for sole trader, partnerships and limited liability companies, after taking into account a normal range of adjustment to the trial balance necessary for such preparation. Recognise and apply appropriate accounting conventions to a range of transactions within the context of the accounting regulatory requirements. 10 10 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ?

Explain and describe the appropriate of account for different types of accounting transactions and be able to prepare a trial balance from these books of account. To prepare and maintain a range of control accounts appropriate to the books of account. To prepare journal entries and deal with the treatment of suspense account items. Operate, calculate and interpret a range of basic financial ratios appropriate to a set of financial statements, particularly in the key areas of profitability, solvency liquidity, asset utilization and investment ratios.

Employ the basic principles of cost behaviour cost ascertainment and to be able to: Classify direct overhead allocation summary Prepare an indirect overhead allocation summary Calculate overhead recovery rates by a variety of techniques and to apply these for the purpose of cost compilation. Explain the difference between fixed and variable costs. Calculate the difference between fixed and variable costs. Calculate break-even points of activity and prepare break-even charts. Appreciate and explain the limitations of break-even analysis.

Understanding the basic principles of different costing techniques and to be able to: Define the different costing techniques Explain and understand the differences between each technique, and Calculate cost using any of the techniques. Understand the basic principles of capital investment appraisal and be able to calculate and interpret figures using the pay back, accounting rate of return or discounted cash flow methods of investment appraisal. BAN – 1117 – Business Communication I NQF Level 5 Credits 10

Module Outcomes: ? Illustrate the purpose of Business Communication. ? Explain the communication process using the Communication Theory. ? Demonstrate the communication process in Business Communication. ? Describe the various tools used in Business Communication. Course Content ? ? ? How to write business correspondence including letters, memos and advertisements. The use of business English in written form looking at spelling, paragraphs, presentation of information and appropriate business language used.

To learn and understand the basic principals of communication, including learning how to overcome barriers of communication, appropriate channels of communication, the purpose of communication and presentation of self when communicating. 11 11 ? ? To be able to communicate information in the form of graphs, this also includes identifying trends from the data. To learn and understand the different types of technology used within communication and the effects of it on business and the organisation.

TTH – 1217 – Intro to Travel, Tourism and Hospitality NQF Level 5 Credits 10 Module Outcomes: ? ? ? Recognize the importance of Travel, Tourism and Hospitality in relation to National Economic Development. Describe and explain the contribution of Travel, Tourism and Hospitality to the National Gross Domestic Product. Comprehend the economic, social/cultural and environmental impacts of Travel, Tourism and Hospitality. Course Content ? ? ? ? ? ? ? ? ? ? ? ? The interrelationship and interdependence between leisure, recreation, travel and tourism.

The significance of economic, social, cultural, political and environment trends of patterns of leisure and tourism. The characteristics of different types of tourists and their motivational behaviour. The supply and demand of tourist travel. The dimensions of the travel system in relation to tourism The main motivational factors that influence the tourist’s choice of travel. Evolution of international travel and transport developments that have affected tourism. The relationship between the development of the inclusive package tour and mass tourism.

The basic requirement to development of a tourism destination. The roles of, and the relationships between, the main intermediaries within a simple tour distribution system. Government’s interest and involvement with main public tourism organization at both national and international levels. Future trends within the travel and tourism sectors. Upon successful completion of this course, the student is awarded a Certificate of Administration in Travel, Tourism and Hospitality. 12 12

Read more

Growth of Telecommunications Systems

Books Wright, Michael and Mukul Patel. 2000. Scientific American – How Things Work Today. London: Marshall Publishing Ltd. B. 1 The world is currently in the middle of a communications revolution as dramatic as the Industrial Revolution that created our modern society two centuries ago. The growth of telecommunications systems, the arrival of the Internet, and the proliferation of computers in every aspect of our lives are transforming both industrial and knowledge-based economies round the world. Higher disposable incomes and increased leisure time are also fuelling demand for luxury electronic goods and new forms of entertainment.

Since the British inventor Alexander Graham Bell patented the telephone in 1877, telephony has become the most important form of distance communication. The telephone network is now truly global, with submarine cables and communications satellites linking every continent. This globe-pning network handles phone calls, fax transmissions, and internet traffic. The long-distance “backbones” of the telephone network are high capacity optical-fiber cables. Lower-capacity copper cables connect individual phones to the network. The analog signal from an ordinary phone is sampled 4,000 times per second and converted into an 8-bit ddigital signal.

Several conversations can then be transmitted simultaneously down the same cable, using a technique known as multiplexing, which increases the capacity of the network. Routing calls through the telephone network is done automatically be telephone exchanges. In near future, the telephone network may also carry video and music channels, interactive televisions, videophone calls. Analog signal – Analog electric signals from ordinary phones are carried by copper cable to the local exchange. Base station – The base station receiving the sthrongest signal from a cell phone routes the call to the cell phone exchange.

Cell – The cell phone network is divided into hexagonal cells, each with a base station in the middle. Cell phone exchange – Calls are routed to the main exchange or direct to a base station by the cell phone exchange. Cell phone network – Base stations send ddigital information to the cell phone exchange over optical-fiber or copper cable. Communication satellite – Orbiting satellites are used to route calls between places not linked by a cable. Ddigital signal – Ddigital information is multiplexed, allowing multiple signals to be transmitted simultaneously. Fax machine – Fax transmissions are sent over the telephone network.

Line-of-sight microwave link – Digitized call from local exchanges are often routed to the main exchange via terrestrial microwave links. Local exchange – The local exchange digitizes calls for long-distance transmission. Long-distance or international connection – Optical fibers are used to transmit long-distance calls, many optical fiber cables are laid on the seabed. Main exchange – The main exchange handles communications between ordinary phones and the cell phone network and routes long-distance and international calls. Microwaves – Ddigital information is sent from cell phones to base stations using microwave frequencies.

Moving cell phone – Mobility is the prime asset of the cell phone. Optical fibers – Transmitting ddigital information by light pulses enables many calls to be sent down one fiber simultaneously. Satellite uplink – Encrypted ddigital information is sent to satellites using microwave frequencies. Seamless reconnection – As the cell phone moves from one cell to another, the call is rerouted from one base station to the next, without the break in the conversation. Urban cell – Cell are smaller in urban areas, giving the network greater capacity. Weakening Signal – As the cell phone moves farther away from the base station, the signal weakens. —- Tanenbaum, Andrew S. and Maareten van Steen. 2002. Distributed Systems Principles and Paradigms. New Jersey: Prentice-Hall, Inc. B. 2 A process is often defined as a program in execution, that is, a program that is currently being executed on one of the operating system’s virtual pprocessors. An important issue is that the operating system takes great care to ensure that independent processes cannot maliciously or inadvertently affect the correctness of each other’s behavior. In other words, the fact that multiple processes may be concurrently sharing the same CPU and other hardware resources is made transparen’t.

Usually, the operating system requires hardware support to enforce this separation. B. 2 Threads in Distributed Systems – An important property of threads is that they can provide a convenient mearns of allowing blocking system calls without blocking the entire process in which the thread is running. This property makes threads particularly attractive to use in distributed systems as it makes it much easier to express communication in the form of maintaining multiple logical connections at the same time. We illustrate this point by taking a closer look at multithreaded clients and servers, respectively. B. 2

Clients and Servers – In the basic client-server model, processes in a distributed system are divided into two (possibly overlapping) groups. A server is a process implementing a specific service, for example, a file system service or a database service. A client is a process that requests a service from a server by sending it a request and subsequently waiting for the server’s reply. This client-server interaction, also known as request-reply behavior. B. 2Communication between a client and a server can be implemented by mearns of a simple connectionless protocol when the underlying network is fairly reliable as in many local-area networks.

In these cases, when a client requests a service, it simply packages a message for the server, identifying the service it wants, along with the necessary input data. The message in then sent to the server. The latter, in turn, will always wait for an incoming request, subsequently process it, and package the results in a reply message that is then sent to the client. Page 657 Communication – All communication in the Web between clients and servers is based on the Hypertext transfer Protocol (HTTP). HTTP is a relatively simple client-server protocol; a client sends a request message to a server and waits for a response message.

An important property of HTTP is that it is stateless. In other words, it does not have any concept of open connection and does not require a server to maintain information on its clients. The most recent version of HTTP is described in (Fielding et al. , 1999). Page 648 The World Wide Web (WWW) can be viewed as a huge distributed system consisting of millions of clients and servers for accessing linked documents. Servers maintain collections of documents, while clients provide users an easy-to-use interface for presenting and accessing those documents.

The Web started as a project at CERN, the European Particle Physics Laboratory in Geneva, to let its large and geographically dispersed group of researchers provide access to shared documents using a simple hypertext system. A document could be anything that could be displayed on a user’s computer terminal, such as personal notes, reports, figures, blueprints, drawings, and so on. By linking documents to each other, it became easy to iintegrate documents from different projects into a new document without the necessity for centralized changes.

The only thing needed was to construct a document providing links to other relevant documents (see also Berners-Lee et al. , 1994). Since 1994, Web developments are primarily initiated and controlled by the World Wide Web Consortium, a collaboration between CERN and M. I. T. this consortium is responsible for standardizing protocols, improving interoperability, and further enhancing the capabilities of the Web. Its home page can be found at http://www. w3. org/. —– London, Sherry. 2000. Illustrator 9 f/x & Design. Arizona: The Coriolis Group, LLC. Page 427 Image resolution seems to be a tricky and complex topic the most people.

I usually urge folks to work in pixels inside the Photoshop because pixels are fixed: A 900-pixel-wide image contains 900 pixels, regardless of its ppl. However, if the ppl is set to 300, the 900-pixel image prints at 3 inches wide; if the ppl is set to 100, the 900-pixel image prints 9 inches wide – but it still contains only 900 pixel across. Therefore, I find it much easier to think in pixels. —– Harb, M. 1989. Modern Telephony. New Jersey: Prentice-Hall, Inc. Page 9 The Telephone of Today The end user or subscriber is the main concern in any communication link. The subscriber can be either a private part or a business.

In all cases, the telephone set is used to transmit and receive, sequentially or simultaneously. The Telephone Set The telephone set is an instrument used to transmit and receive information or calls sequentially or simultaneously, thus permitting one party to communicate with another. For this communicate to take place, the telephone set must have the following component: a transmitter, a receiver, bell, a dialer, and a switchhook. Page 150-152 Cellular mobile communication is considered to be the breakthrough that could revolutionize the way businesses think about and use the most common of communication tools – the telephone.

The cellular mobile telephone is found most often in cars, using low-power radio-frequency carriers to transmit and receive messages in small geographical units called cells. Before the introduction of cellular technology, most North American cities were using high-power radio-frequency transmitters for mobile telephone transmission. Even if a subscriber was lucky enough to have the service, the number of channels was limited, and consequently the possibility of having access to a free line was very slim. Furthermore, once the subscriber got access to a line, the voice quality was poor and privacy almost nonexistent.

This is not the case with the cellular mobile system. With the new technology, subscribers are guaranteed access to a free line 99. 9% of the time. The quality of the voice is comparable to that of regular telephone transmission, and privacy is guaranteed. Cellular mobiles became available in the United States in 1979, when Ameritech Mobile Communications began serving 2000 subscribers in the city of Chicago. By 1985, over 30,000 subscribers in the United Stated were using cellular mobiles, and this number continues to grow in the United States as well as in Canada, the European nations, Japan, and many more.

Operation of a Cellular Mobile System Since is not feasible to set up a communication link between two moving cars using a standard telephone line, it is necessary to use a wireless system with a radio antenna to send and receive telephone conversation over the air. The term “cellular” is derived from the word “cell. ” Cities or towns are divided into geographic areas called cells, each with its own transmitter and receiver. Each cell has a low-power transmission capability, thus making its signal too weak to interfere with other cells with ssimilar frequencies.

Generally, the frequency occupied by two subscribers within the same cell cannot be used by any other subscribers within that cell. The diagram of a cellular system shown in Figure 12. 1 demonstrates the process of relaying messages from car telephone (or portable telephone) to the cell site’s low-powered transmitter, to the Cantel switching office or MTSO (mobile telephone switching office), and to the wireline telephone company’s switching office, to allow interconnection with the existing telephone system. The message is “handed off” from one cell site transmitter to the next as the caller crosses a cell boundary, without interruption.

A master computer keeps track of which cells are using which frequencies (see Figure 12. 1), and when a subscriber wishes to call a subscriber outside his or her cell, the computer may reassign frequencies. As a subscriber moves from one cell to the next, the assigned frequency may change, but the subscriber will at all times be served without interference (Figure 12. 2). —– Meyers, Mike. 2003. Introduction to PC Hardware and Troubleshooting. Asia: McGraw-Hill / Osborne. Page 390 Much of what makes modern computers so powerful is their ability to connection in small or large groups, or networks, and share files and resources.

Every PC tech worth knowing the basics of networking. After all, why get into computing if you can’t while away an afternoon gaming with your buddies, all from the comfort of your computer chair? How Networks Work A network enables two or more computers to share data, hardware such as printers, and even applications. The computers must have some conneactivity, of course: some way for the signal from one machine to reach the other. In addition, the hardware must be compatible and the software set up so that the receiving computer can understand what the sending machine sends.

Think of two kids chatting over walkie-talkie as a network for communication to occur, the hardware has to be in range for the signal, and it has to be from the same set, and the kids need to speak the same language. Networks work ssimilarly. Computers connect in two basic ways: In dial-up networks in Local Area Networks. In dial-up connection, your computer uses a telephone line to connect to an Internet Service Provider (ISP), which then gives you access to other computers, perhaps at your office or somewhere on the Internet.

Computers in a Local Area Network, on the other hand, are connected to a central box – either by cables or by radio waves – through which they can communicate with each other and, if some machine on the network has the appreciate connection, with other computers on the Internet. Let’s look at how both types of network function before we turn to the nuts and bolts of installing and setting up networks. Dial-Up Networks The most common network connection consists of three pieces: a modem, a working telephone line, and an ISP.

The modem enables the computer to communicate via phone lines. The phone line provides the link between the modem and the computers at the ISP. The ISP computers connect to the Big Kahuna of all networks, the Internet. Property installed you to surf, shop, and otherwise explore websites hosted by computers all over the world. Tune in and turn on to dial-up networking. The venerable modem has to recent years been challenged by two new consumer technologies for accessing the Internet so-called “cable-modems” and DSL (Ddigital Subscriber Line) service.

Your computer’s basic need for some kind of pipeline to communicate over hasn’t charged – just the choice of pipeline and the way it’s used. Both technologies take advantage of unused capacity on widely available transmission media. Cable modems use the cables already in place in many homes for receiving cable TV signals as their pipeline to the Internet, rather than the telephone system. The cable TV companies take advantage of the fact that their cable TV signals occupy only a fraction of the capacity of the coaxial cables running into your home.

Adding a cable modem to your computer enables it to use the cable TV connection as its pipeline to the Internet. Cable modems aren’t actually “modems” at all in the sense that the signals they send and receive are entirely ddigital, but because they perform the same function, they go by the same name. you can install an external cable modem to a port (usually USB) on your computer. Page 394 Modem Technology The modem solves one of the problems with the use of analog voice lines to move ddigital data. Modems take incoming analog serial data – in this case, the signal coming over the telephone line- and turn it into ddigital serial data.

Likewise, modems turn the signal flowing out of the PC into analog data than can be transferred over the telephone line. This process – called modulation / demodulation – provides the name for the technology: MOdulation / DEModulation, get it! Phone lines have a speed based on a unit called a baud, which is one cycle per second. The fastest rate that a phone line can achieve is 2,400 baud. Modem can pack multiple bits of data into each baud; a 33. 6 kilobits per second (Kbps) modem, for example, packs 14 bits into every baud: 2,400 x 14 = 33. 6 Kbps.

It is technically incorrect to say, “I have a 56 K baud modem. ” You should instead say, “’I have a 56 Kbps modem. ” However, people use the term baud instead of bps so other that the terms have become functionally synonymous. Page 415 A network enables two or more computers to share data, hardware such as printers, and even applications. Computers connect in two basic ways: dial-up networks and Local Area Networks. A standard dial-up network connection consists of these pieces: a modem, a working telephone line, and an Internet Service Provider (ISP).

To make a LAN work, you need to ensure those things: conneactivity, compatibility, and proper setup of hardware and software. Data is broken up and sent between computers in small chunks called packets and then reassembled. Page 1 Everything in your computer fits into one of two categories: hardware or software. Anything on your computer that you can touch is hardware. However, hardware alone cannot handle all of the PC’s complex activities – it needs the help of software. Software is the technical word for computer programs, the sets of instructions that tell the hardware how to do things.

Computer programs are often compared to cooking rrecipes. The recipe tells you how to use the tools to manipulate the ingredients, and if all goes well, you produce something edible. In the same way, software instruct the hardware has it manipulates data to produce the desired results, whether that’s a memo, a ddigital picture, or an email message. Figure 1. 1 shows a sample of program code. —– Stamper, David A. 2001. Local Area Networks – Third Edition. New Jersey: Prentice-Hall, Inc. Page 135-137 Classes of Software The reason for having a computing system is to solve problems and accomplish the business’ work.

The software that does this is called application software. Ordinarily, application software operates in an environment that makes writing and using the application software easier. The environment-creating software can be separated into network management, development and network access. Application Software As we mentioned at the beginning of this section, the main reason we use computing system is to solve business or scientific problems. Thus, the computer and its extension, the network, are simply problem-solving tools.

Tthroughout history, humankind has constantly built new tools and improved on those already invented. At the beginning of the computer era, computers were quite primitive tools (at least by today’s standards). Programmers at the dawn of the computing age needed to know not only the nuances of the business problem they were solving but also many of the intricacies of the hardware their solution would be running on. In today’s application environment, we have a supporting cast of software that helps to create an application environment that is mostly hardware independent.

Operating System Software Today, we are so need to using OSs to create the system environment that we take them for granted. However, we were into the second generation of computers before OSs appeared and into the third generation of computers before OSs became common. You may correctly infer from this that OSs are not absolutely necessary and, in the early years of personal computing, a vvariety of applications run without using the services of an OS. The IBM Personal Computer (PC) came equipped with a BASIC interpreter in a read-only memory.

Thus, if you did not have the disk operating system (DOS), you could still use your computer by writing and running BASIC programs. Without DOS, BASIC was the operating environment. Furthermore, a few early programs functioned in a stand-alone mode. These programs where on a diskette and were loaded when the computer was loaded. In this mode, if you wanted to run another program, you swapped disk and rebooted. Without an OS, the application program is responsible for accomplishing many hardware-oriented functions such as input/output (I/O) and memory management.

Because these task are common to all applications, software engineers developed OS software. The OS manages the resources of the computer and creates an application environment in which it is easier to develop and use application software because the OS takes care of a vvariety of functions formerly done by applications. Some of these functions are: • Memory management • File management • User interface • I/O interfaces • Resource allocation • Accounting • Protection/security Today, systems running on a LAN are more sophisticated that the early systems that ran without an OS; a LAN node without an OS is unthinkable.

Memory Management – When the computer is started, the OS is loaded into memory a certain portion of the available memory is constantly occupied by the resident portion of the OS. The OS manages the remaining memory and allocates it among itself and the requesting processes according to a memory management scheme adopted by the OS designers. Most current OSs use a memory management algorithm called virtual memory. With virtual memory, the disk is used as an extension of real memory. A process may be thought of as consisting of pages of data and code.

File Management – A disk is a raw storage device. It has the ability to store bits of data but inherently does not have the ability to organize those bits into files, files into directories, and so on. The OS provides this level of disk organization. it establish the data structure that allows users to create partitions, directories volumes, and other disk subdivisions. Some file management systems allow multiple disks to be combines into one logical disk. The file management system allows users to create, delete, and access files.

The file management system maintains the directory structure and store directory and file information such as the date and time last modified, end-of-file pointer, and the file or directories’ locations on disk. Obviously, there are fundamental aspects of using a system. User Interface – When a programmer begins to write a program, an environment is created for that user. If you are a programmer, you may need to use a text editor, compiler, link editor, and application program interface (API), which allows you to use OS procedures to carry out activities such as creating a new file, or starting a new process.

Sometimes a compiler or interpreter includes the API interfaces. Protection Security – Today, nearly everyone is aware that security is an important aspect of computer usage. The OS provides the base on which security is established. We expect the OS to prevent user programs from crashing the system and to eliminate the intrusion of one program into the memory occupied by another program’s data. In shared systems, we also expect the OS and the file management system to provide certain levels of file security. Commonly, an OS will at least provide capabilities that allow administrators to define which users can read, write, or erase a file.

Read more

Computing Architectures

An organization s computer network is a major asset and needs extensive planning for proper function. The network design process is a long and arduous task that requires knowledge of the business need of the organization and the technical skills to achieve those needs. The network designer must first address the major problem of what architecture should be employed in a particular network. The distributed approach and central approach are the two possible choices a network designer has to choose from. Background of Central & Distributed ArchitecturesThere are two mainframe architectures for a network Central and Distributed.

Both architectures employ mainframe computers that hold massive amounts of data, which are accessed by terminals, and whose location is not important to an end-user. An example would be an airline reservation system. Reservation data can be read and changed by an airline clerk, which is then sent to the mainframe to be updated. The system is updated in microseconds so another user does not see old information. The central architecture consists of one storage computer that holds data, whereas the distributed architecture consists of two or more, smaller mainframes physically separated to serve the same purpose.

Advantages and Disadvantages of Central vs. Distributed Data StorageAdvantages of Central Architecture: less maintenance and changes must only be reflected at one site. Less maintenance is required on the overall network because there is only one mainframe, whereas in the distributed approach there are more mainframes to maintain. Secondly, changes that are entered into the system by a user need to be updated only at one mainframe instead of being changed at more than one. For example, John has made a reservation at 8:00 AM for Monday to mainframe A and currently it is updating itself.

At the same time Linda is accessing mainframe B, which is not updated yet. She sees the 8:00 AM slot for Monday as open and reserves it for her customer. The data is now corrupt. This is a very simple example of what can happen with the distributed architecture. With the central architecture the data is updated in one place, leaving no room for error. Disadvantages of the Central Architecture: A higher load on the network is incurred due to having only one central data access point. Second, there is no data redundancy, which means, if the one mainframe goes down the network goes down.

Third, unauthorized access would yield more data to a hacker compared to the distributed approach. Advantages of Distributed Architecture: more redundancy since there are more mainframes with same data, more secure because a hacker doesn t have access to all the data, and less susceptible for entire network to go down since all data is not stored in one place. Disadvantages of Distributed Architecture: More maintenance is required because there are more mainframes and data updates must be updated on more than one mainframe as stated earlier.

Value of ProjectThe value of the project is enormous due to the information technology being a major asset for a company. Data retrieval and transportation is a vital part of most organizations and a must for a company to do business on any scale. That is why a network architecture decision must be made for the best data transfer method. The wrong choice will be a tremendous liability to an organization for two reasons: an undertaking of this kind is expensive and a network must grow as it gets older-meaning it must be planned out from the start correctly or else it will be of no worth later on.

Methodology in Evaluation of Client Sever vs. Mainframe ArchitectureThe network designer has a set of predefined characteristics in order to choose the correct architecture for a particular network including: the physical size of the network, cost, efficiency, and performance. These are general determinants that must be taken into consideration before an architecture is chosen. SizeGenerally, a network that would reach globally, carry variable sized data, and have many users in different locations would be better suited for a distributed approach.

The central approach would be ideal for a small branch office to a statewide network, with a maximum number of users at 1000, and carry continuous or steady traffic. CostA larger global network would be less concerned with cost, whereas a smaller network would be more concerned with it. Cost depends on the scale, amount of data that will be transmitted, complexity of work, etc. An installation of a network usually involves outside contractors with the aid of in-house network operators. The least cost will be determined by adding up work done by the outside vendors, equipment, software, consulting time, and proposals from different bidders.

EfficiencyA standard measure in telecommunications is the 99% quality measure. A network should be totally operable, even if it is down 99% of a year. This can be tested before the installation takes place by running tests and simulations by vendors who are attempting to gain your business. PerformancePerformance will be reflected by the throughput of the network. How fast can data be delivered across the line to from the sender to the destination This will vary from the type of protocol used in both architectures depending on the type of data to be transported. This can also be tested with simulations.

Read more
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat
Close

Sometimes it is hard to do all the work on your own

Let us help you get a good grade on your paper. Get professional help and free up your time for more important courses. Let us handle your;

  • Dissertations and Thesis
  • Essays
  • All Assignments

  • Research papers
  • Terms Papers
  • Online Classes
Live ChatWhatsApp