Application: Memoirs

Click here to order similar paper @Essaybay.net. 100% Original.Written from scratch by professional writers.


Click here to order similar paper @Essaybay.net. 100% Original.Written from scratch by professional writers.

Application: Memoirs

Austrian heir to the throne assassinated!

Austria-Hungary declares war on Serbia!

Britain declares war on Germany!

The news is getting worse!

Imagine you are a citizen of a country that has just entered into the Great War (later known as World War I). You have read the headlines and the accounts of the events leading up to the war. You have heard daily radio updates. You are bombarded with news. Yet, you feel there is a gap in the reporting—where the news accounts end and the story of the real war begins.

This week for your assignment, you will write your own account of the war, and tell the truth of the war from your perspective. Your fictional memoir will tell the story of everyday people, and how war has affected daily life.

Need a Professional Writer to Work on this Paper and Give you an A+ 100 % Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN

To prepare for this Application:

  • Choose a country from which to write your memoir. Select one that entered into World War I in 1914 and that you have studied extensively in this course.
  • Review Chapter 7 (pp. 96–103) and Chapter 8 ( pp. 105–118)in this week’s Learning Resources to gain a bird’s eye perspective on world events leading up to the start of World War I, especially for the country you choose to write your memoir based on. Also review the articles by Barron, O’Hara & Heffernan, and Share in this week’s Learning Resources to understand the matters of importance to nations at this time in history.
  • Consider how your chosen country has changed between the Era of Imperialism and the beginning of World War I.
  • Consider what political, social, geographical, and economic changes have occurred since the start of the war, and how you, your family and your community have been affected (supposing you lived in this country, at this time in history).
  • Reflect on how nationalism has influenced your response to entry into war, and the response of your compatriots (again, supposing you lived in this country, at this time in history).

The assignment:

  • Compose a 2- to 3-page memoir entry in which you do the following:

    Need a Professional Writer to Work on this Paper and Give you an A+ 100 % Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN

    • Provide an in-depth personal account of the events you have witnessed leading up to the beginning of the war. In your description, be sure to reflect on the effect that political, social, geographical, and economic changes have had on you in the time leading up to the war, and up to the time of your writing (mid to late 1914).
    • Support your assertions by making at least 2 references, in proper APA format, to your course readings.

Need a Professional Writer to Work on this Paper and Give you an A+ 100 % Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN



Click here to order similar paper @Essaybay.net. 100% Original.Written from scratch by professional writers.

Hr operations

Click here to order similar paper @Essaybay.net. 100% Original.Written from scratch by professional writers.


Click here to order similar paper @Essaybay.net. 100% Original.Written from scratch by professional writers.

Hr operations

Task Predecessor Normal Time Crash Time Crash Cost Slope
A None 7 7 NA
B A 3 3 NA
C A 8 4 600
D A 4 4 NA
E B 6 5 600
F C, D 2 2 NA
G E, F 6 6 NA
H F 5 3 400
I G, H 4 4 NA
J I 2 2 NA

In a 3- to 4-page Microsoft Word document, address the following:

Need a Professional Writer to Work on this Paper and Give you an A+ 100 % Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN

  • Draw the AON project network using Microsoft Project, Microsoft Visio, or some other tool capable of creating such a network. Perform a critical path analysis for the network and calculate the ES, EF, LS, and LF times.
  • Calculate the slack time for each activity.
  • Identify the critical path.
  • Assume that the organization will receive a $400 bonus for each day the duration of the project is shortened. The organization is also responsible for paying the crash cost associated with shortening the schedule. To maximize the net profit, identify which task you should crash and by how much.

Support your responses with examples.

Cite any sources in APA format.

Need a Professional Writer to Work on this Paper and Give you an A+ 100 % Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN



Click here to order similar paper @Essaybay.net. 100% Original.Written from scratch by professional writers.

Operations and Supply Chain Mangement

Click here to order similar paper @Essaybay.net. 100% Original.Written from scratch by professional writers.


Click here to order similar paper @Essaybay.net. 100% Original.Written from scratch by professional writers.

Dunstreet’s Department Store would like to develop an inventory ordering policy with a 95 percent probability of not stocking out. To illustrate your recommended procedure, use as an example the ordering policy for white percale sheets. Demand for white percale sheets is 5,000 per year. The store is open 365 days per year. Every two weeks inventory is counted and a new order is placed. It takes 10 days for the sheets to be delivered. Standard deviation of demand for the sheets is five per day. There are currently 150 sheets on hand. How many sheets should you order?

  Need a Professional Writer to Work on this Paper and Give you an A+ 100 % Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN


Click here to order similar paper @Essaybay.net. 100% Original.Written from scratch by professional writers.

LAW AND COMMUNICATION

Click here to order similar paper @Essaybay.net. 100% Original.Written from scratch by professional writers.


Click here to order similar paper @Essaybay.net. 100% Original.Written from scratch by professional writers.

ASSIGNMENT 1

 

1.

 

Compare and contrast male and female gang members. Why do these differences exist?
  Need a Professional Writer to Work on this Paper and Give you an A+ 100 % Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN

 

2.
Determine the family and school risk factors for gang involvement.
3.
Discuss the three models used to understand the relationship between delinquency and gang involvement. Which do you agree with most? Why?
4.
Name and explain various juvenile justice responses to the youth gang problem.
5.
What is the prevalence of school violence today? Discuss the steps taken to prevent school violence?
6.
What are the alternatives police officers have in dealing with juveniles? Do you think amount of discretion give to law enforcement in dealing with youth is appropriate? Explain.
7.
Distinguish between “traditional” bullying and “cyber” bullying. Is one more serious than the other? Explain why or why not.
  Need a Professional Writer to Work on this Paper and Give you an A+ 100 % Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN
8.
Discuss the four pronged threat assessment approach and its purpose.
9.
Compare and contrast the Justice Model with the Welfare Model.
10.
Distinguish between and give examples for static and dynamic risk factors. How do these factors play a part in the pretrial process?
11.
Compare and contrast therapeutic and coercive treatment. Which do you believe is most effective? Support your answer.
12.
What are the characteristics of juvenile court? Why are these important in dealing with juveniles?
13.
Describe the four components that are typically included in a modern, comprehensive graduated sanctions system. What are the essential features of this system? Why is it important to have these features?
14.
Explain and discuss the importance of reentry and aftercare. Why is it important to plan for it in advance? When should planning start?
  Need a Professional Writer to Work on this Paper and Give you an A+ 100 % Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN
15.
What is meant by gender based responsivity? What are the six guiding principles for effective treatment for females?
ASSIGNMENT 2

Family Communication

In the first week of class you described some of the communication rules that are present in your family.  After reviewing guidelines for effective communication in families describe how you want your current or future family to communicate.  What communication rules might you implement?  Describe what you will do to make sure you will meet the challenges of family life. (Length 2-3 paragraphs)

 

 

ASSIGNMENT 3

1.

Discuss mindfulness and its pertinence to effective listening in interpersonal communication. In your discussion, indicate whether mindfulness is a technique or an attitude and explain how we express our mindfulness to others whom we are interacting.
2.
Describe a situation where you would (or would not) express an emotion for an ethical reason. Based on the guidelines for communicating emotions effectively that were raised in the textbook, discuss how two of these guidelines would influence how to act in this situation.
  Need a Professional Writer to Work on this Paper and Give you an A+ 100 % Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN
3.
Distinguish between love and commitment. Then, explain how each is communicated and how it affects relationships between people.
4.
Discuss 3 different approaches to conflict and give an example of each.
5.
Describe how gender plays a role in communication. Then, describe how gender communication affects friendships, romantic love relationships, and family relationships.
 Need a Professional Writer to Work on this Paper and Give you an A+ 100 % Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN


Click here to order similar paper @Essaybay.net. 100% Original.Written from scratch by professional writers.

ER/EER model into a relational data mode

Click here to order similar paper @Essaybay.net. 100% Original.Written from scratch by professional writers.


Click here to order similar paper @Essaybay.net. 100% Original.Written from scratch by professional writers.

Assignment 1
> to represent a problem description given in natural language as an (Enhanced) Entity -Relationship model;
> to convert the ER/EER model into a relational data model;
> to apply Normalization techniques (Bottom-Up approach) on the user-defined forms;
> to implement a relational database system (using ORACLE11g).

Need a Professional Writer to Work on this Paper and Give you an A+ 100 % Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN



Click here to order similar paper @Essaybay.net. 100% Original.Written from scratch by professional writers.

Both face-to-face and online students will undertake this assessment task.

Click here to order similar paper @Essaybay.net. 100% Original.Written from scratch by professional writers.


Click here to order similar paper @Essaybay.net. 100% Original.Written from scratch by professional writers.

Both face-to-face and online students will undertake this assessment task.
The individual assignment (approximately 3000 words) should be done in essay format with headings and it is designed to allow you to develop through research a practically orientated topic. This task requires you to select a particular product/ service or event category of interest to you and discuss specific consumer behaviour influences related to it.

Need a Professional Writer to Work on this Paper and Give you an A+ 100 % Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN
The research paper will be presented in two sections: Section A is a reflective piece in which you analyse your own thoughts and behaviours towards your chosen product/service/event category; Section B addresses the Consumer Behaviour themes raised in the previous section.
You are expected to apply some of the concepts/ models or theories used in the course as well as secondary research (eg. periodicals, trade publications, newspapers etc). The essay should link the concepts/theories or models to the chosen product or service and provide some insight into the kind of behaviour trends that are relevant at the present time, or may be relevant in the future. Students should also analyse the consumer behaviour issues and discuss the implications these issues may have for marketers.

Need a Professional Writer to Work on this Paper and Give you an A+ 100 % Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN



Click here to order similar paper @Essaybay.net. 100% Original.Written from scratch by professional writers.

Part A: Mini Case Study

Click here to order similar paper @Essaybay.net. 100% Original.Written from scratch by professional writers.


Click here to order similar paper @Essaybay.net. 100% Original.Written from scratch by professional writers.

Part A: Mini Case Study (2 pages in total)
You are to provide a one page essay for the following mini case questions (total of two pages) from the textbook. The essay is to be a 1.5 line spacing response to the following mini case.
Mini case study (IV) Shangi-La! (textbook edition 11 page 264)
(15 marks)
The essays do not require in text references or a list of references.

Part B Hands on
You are to go through the Hands on exercise 5A on page 187 of the textbook. The exercise has a number of activities for you to perform but for the assignment we only need the output and answers for the following activities.
PING: Finding other computers
ARP: Displaying Physical Address
TRACERT: Finding Routes through the Internet
Each of the activities listed include a number of deliverables that you will need to attach as part of your assignment submission. For the output of the commands using a screen capture is sufficient. Under Windows use Cmd Alt Print Screen keys combinations to capture the current active window and then paste into word document.

Need a Professional Writer to Work on this Paper and Give you an A+ 100 % Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN
(15 marks)
Part C: Report (10 pages for body of the report)
A business seminar discussing the future adoption of technologies to enable businesses highlighted the theme of mobile computing and cloud based services.
Management has identified that in order to provide employees with mobile access a more flexible networking environment needs to be created. Since the organisation uses a typical client server network design, management feels that it would be a simple and reasonable inexpensive process to add extra connection capabilities to realise the mobile design benefits. The second stage would be to move the solution to the appropriate cloud services.

Need a Professional Writer to Work on this Paper and Give you an A+ 100 % Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN
In order to proceeded with the planning and implementations of the solution you as the IT manager have been called in to provide a report on the type of changes that would need to be implemented and further research on the cloud solutions.
During your initial discussion with management you highlighted how your department has only just finished the process of modernise from the existing ad-hoc system to the new client server solution. The new design, due to the processing needs of the applications utilised by the organisation for day to day activities, the employee’s workstations had to be quite upscale systems in terms of CPU power, memory size, network speed and storage. The back end systems are used mainly as secure data access and storages. The employees have only just begun to come comfortable with the new system and the their responsibilities under the new system.
The new mobile devices direction from management means that the network design needs a major rethink and redesign especially if portion or all of the services will be moved to the cloud.
As a result of the new direction you have been tasked to provide a report to address the following areas of concern and also provide more information to facilitate a better decision making process.
Note: When we say Mobile devices we mean devices that can be used by employees to access the data and services in a unstructured network environment as well as through other third party networks. Major feature of the mobile devices is wireless network connection and reduced device size and processing power.
• Describe and discuss how the redesigned network needs to operate, the possible network design solutions and why the new design is more suitable for the introduction of mobile devices.
• Consider the overall impact that the introduction of new devices would have on the network functionality and availability. Identify possible problems and issues that the introduction of Mobile computing could have on the network services.

Need a Professional Writer to Work on this Paper and Give you an A+ 100 % Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN
• It is evident that the introduction of the previous upgrade was a major disruption to the employees with having to adjust to security and access restrictions of the new network. Identify training and education that might need to be carried out before the introduction of the new network and mobile devices and any ongoing training that might be required.
• The cloud solutions are not well formulated at the moment due to some misunderstanding of what the term actually means. Research and describe the different type and capabilities of cloud networks.
• Identify and describe which service would be the best fit with the needs of the mobile computing that the organisation is moving towards.
(70 marks)
Please read the instructions very carefully.
Report Format for Assignment 2 Part B (10 pages body)
The report needs to be a standard business report and you must reference correctly in Harvard style.
Your report MUST follow the structure for a report as specified in the Faculty of Business Communications skills handbook, however, you will not be required to submit the following sections: Glossary or Appendices. You may want to consider the structure of the marking scheme when structuring the body of your report.
Please view this presentation is you need information regarding writing reports and report styles.
https://usqdirect.usq.edu.au/usq/items/13b1f190-857b-f83d-2df6-3a0860c381f4/0/
Your report must include references where you have used other sources (both in the body text and listed at the end of the report) as specified in the Communication Skills Handbook. For current reference style guide please refer to the online document at http://www.usq.edu.au/library/referencing/harvard-agps-referencing-guide
• Marks will be deducted for submitted work with missing or incorrect references.
• Work submitted with no references in the body of the report will NOT be accepted.
• Your report must be printed with 1.5 line spacing; at least 12-point font size; and the body of the report should be no more than 10 pages of single-sided A4 paper.

Need a Professional Writer to Work on this Paper and Give you an A+ 100 % Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN



Click here to order similar paper @Essaybay.net. 100% Original.Written from scratch by professional writers.

Generalize the basic approaches we used for making the best out of best effort service for real-time interactivemultimedia applications.

Click here to order similar paper @Essaybay.net. 100% Original.Written from scratch by professional writers.


Click here to order similar paper @Essaybay.net. 100% Original.Written from scratch by professional writers.

7.1 Generalize the basic approaches we used for making the best out of best effort service for real-time interactivemultimedia applications.
7.2 Why RTSP is called an out of band control protocol? Find out another protocol that also uses out of band control and compare them.
7.3 Assume an Internet phone application generates packets only during talk spurts. During a talk spurt the sender generates bytes at a rate of 1,000 bytes per second, and every 40 msecs the sender gathers bytes into chunks. Assume that RTP is used that will add a header to each chunk. In addition UDP and IP will be used. Suppose all headers (including RTP, UDP and IP) have a total length of h and an IP datagram is emitted every 40 msecs. Find the transmission rate in bits per second for the datagram generated by one side of the application.

Need a Professional Writer to Work on this Paper and Give you an A+ 100 % Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN
7.4 Consider the procedure described in “Adaptive Playout Delay” for estimating average delay di. Let be the most recent sample delay, let be the next most recent sample delay, and so on. For a given audio application, suppose four packets have arrived at the receiver with sample delays , , , and . Express the estimate of delay d in terms of u and the four samples. 1 1 t r ? 2 2 t r ? 4 4 t r ? 3 3 t r ? 2 2 t r ? 1 1 t r ?
7.5 This chapter describes several FEC schemes. Briefly summarize them . Both schemes increase the transmission rate of the stream by adding overhead. Does interleaving also increase the transmission rate?
7.6 Compare the procedure described in “Adaptive Playout Delay” for estimating average delay with the procedure in Chapter 3 (“Estimating the Round-Trip Time”) for estimating round-trip time. What do the procedures have in common? How are they different?

7.7 Is it possible for a CDN to provide worse performance to a host requesting a multimedia object than if the host has requested the object directly from the distant origin server? Please explain.
7.8 Compare and contrast RTSP and HTTP used for multimedia applications.
7.9 Summarize how the token buckets and WFQs can be used together to provide policing mechanisms.
8.1 What is the most important difference between a symmetric key system and a public key system?
8.2 In what way does a hash function provide a better message integrity check than a checksum (such as Internet Checksum)?
8.3 Can you “decrypt” a hash of a message to get the original message? Explain.
8.4 Suppose that Bob receives a PGP message from Alice. How does Bob know for sure that Alice created the message?
8.5 Consider WEP for 802.11. Suppose that the data is 10101010 and the keystream is 11110111. What is the resulting ciphertext?
8.6. Using the monoalphabetic cipher in the textbook, encode the message “This is a hard problem.” Decode the message “rmij’u uamu xyj.”
8.7 Consider the RSA algorithm with p=5 and q=11.
a. What are n and z?
b. Let e be 3. Why is this an acceptable choice for e?
c. Find d such that de=1 (mod z) and d<160.
9.1 What are the five areas of network management defined by the ISO?
9.2 Define the following terms; managing entity, managed device, management agent, MIB, network management protocol.
9.3 What is SNMP and what are its major parts?
9.4 In this chapter we saw that it was preferable to transport SNMP messages in unreliable UDP datagrams. Why do you think the designers of SNMP chose UDP rather than TCP as the transport protocol of choice for SNMP?

Part 3. Practical assignment [25 points]
This assignment consists of programming a Pinger client. Please submit the following items in a ZIP file.
1) Java or Python source code;
2) Instructions on how to install and run your program;
3) A brief design document explaining your solution.
Note: I shall not provide remedial help concerning coding problems that you might have. Students are responsible for the setup of their own coding environment. Each student is also expected to debug their code.
Option 1: UDP Pinger Lab Using Java
In this assignment, you will study a simple Internet ping server written in the Java language, and implement a corresponding client. The functionality provided by these programs is similar to the standard ping programs available in modern operating systems, except that they use UDP rather than Internet Control Message Protocol (ICMP) to communicate with each other. (Java does not provide a straightforward means to interact with ICMP.)
The ping protocol allows a client machine to send a packet of data to a remote machine, and have the remote machine return the data back to the client unchanged (an action referred to as echoing). Among other uses, the ping protocol allows hosts to determine round-trip times to other machines.
You are given the complete code for the Ping server below. Your job is to write the Ping client.
Server Code
The following code fully implements a ping server. You need to compile and run this code. You should study this code carefully, as it will help you write your Ping client.
import java.io.*;
import java.net.*;
import java.util.*;
/*
* Server to process ping requests over UDP.
*/
public class PingServer
{
private static final double LOSS_RATE = 0.3;
private static final int AVERAGE_DELAY = 100; // milliseconds
public static void main(String[] args) throws Exception
{
// Get command line argument.
if (args.length != 1) {
System.out.println(-Required arguments: port-);
return;
}
int port = Integer.parseInt(args[0]);
// Create random number generator for use in simulating
// packet loss and network delay.
Random random = new Random();
// Create a datagram socket for receiving and sending UDP packets
// through the port specified on the command line.
DatagramSocket socket = new DatagramSocket(port);
// Processing loop.
while (true) {
// Create a datagram packet to hold incomming UDP packet.
DatagramPacket request = new DatagramPacket(new byte[1024], 1024);
// Block until the host receives a UDP packet.
socket.receive(request);
// Print the recieved data.
printData(request);
// Decide whether to reply, or simulate packet loss.
if (random.nextDouble() < LOSS_RATE) {
System.out.println(- Reply not sent.-);
continue;
}
// Simulate network delay.
Thread.sleep((int) (random.nextDouble() * 2 * AVERAGE_DELAY));
// Send reply.
InetAddress clientHost = request.getAddress();
int clientPort = request.getPort();
byte[] buf = request.getData();
DatagramPacket reply = new DatagramPacket(buf, buf.length, clientHost, clientPort);
socket.send(reply);
System.out.println(- Reply sent.-);
}
}
/*
* Print ping data to the standard output stream.
*/
private static void printData(DatagramPacket request) throws Exception

{
// Obtain references to the packet’s array of bytes.
byte[] buf = request.getData();
// Wrap the bytes in a byte array input stream,
// so that you can read the data as a stream of bytes.
ByteArrayInputStream bais = new ByteArrayInputStream(buf);
// Wrap the byte array output stream in an input stream reader,
// so you can read the data as a stream of characters.
InputStreamReader isr = new InputStreamReader(bais);
// Wrap the input stream reader in a bufferred reader,
// so you can read the character data a line at a time.
// (A line is a sequence of chars terminated by any combination of and .)
BufferedReader br = new BufferedReader(isr);
// The message data is contained in a single line, so read this line.
String line = br.readLine();

// Print host address and data received from it.
System.out.println(
-Received from – +
request.getAddress().getHostAddress() +
-: – +
new String(line) );
}
}

Need a Professional Writer to Work on this Paper and Give you an A+ 100 % Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN
The server sits in an infinite loop listening for incoming UDP packets. When a packet comes in, the server simply sends the encapsulated data back to the client.
Packet Loss

UDP provides applications with an unreliable transport service, because messages may get lost in the network due to router queue overflows or other reasons. In contrast, TCP provides applications with a reliable transport service and takes care of any lost packets by retransmitting them until they are successfully received. Applications using UDP for communication must therefore implement any reliability they need separately in the application level (each application can implement a different policy, according to its specific needs).
Because packet loss is rare or even non-existent in typical campus networks, the server in this lab injects artificial loss to simulate the effects of network packet loss. The server has a parameter LOSS_RATE that determines which percentage of packets should be lost.
The server also has another parameter AVERAGE_DELAY that is used to simulate transmission delay from sending a packet across the Internet. You should set AVERAGE_DELAY to a positive value when testing your client and server on the same

machine, or when machines are close by on the network. You can set AVERAGE_DELAY to 0 to find out the true round trip times of your packets.
Compiling and Running Server
To compile the server, do the following:
javac PingServer.java
To run the server, do the following:
java PingServer port
where port is the port number the server listens on. Remember that you have to pick a port number greater than 1024, because only processes running with root (administrator) privilege can bind to ports less than 1024.
Note: if you get a class not found error when running the above command, then you may need to tell Java to look in the current directory in order to resolve class references. In this case, the commands will be as follows:
java -classpath . PingServer port
Your Job: The Client
You should write the client so that it sends 10 ping requests to the server, separated by approximately one second. Each message contains a payload of data that includes the keyword PING, a sequence number, and a timestamp. After sending each packet, the client waits up to one second to receive a reply. If one second goes by without a reply from the server, then the client assumes that its packet or the server’s reply packet has been lost in the network.

Need a Professional Writer to Work on this Paper and Give you an A+ 100 % Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN
Hint: Cut and paste PingServer, rename the code PingClient, and then modify the code.
You should write the client so that it starts with the following command:
java PingClient host port
where host is the name of the computer the server is running on and port is the port number it is listening to. Note that you can run the client and server either on different machines or on the same machine.
The client should send 10 pings to the server. Because UDP is an unreliable protocol, some of the packets sent to the server may be lost, or some of the packets sent from server to client may be lost. For this reason, the client can not wait indefinitely for a reply to a ping message. You should have the client wait up to one second for a reply; if no
reply is received, then the client should assume that the packet was lost during transmission across the network. You will need to research the API for DatagramSocket to find out how to set the timeout value on a datagram socket.
When developing your code, you should run the ping server on your machine, and test your client by sending packets to localhost (or, 127.0.0.1). After you have fully debugged your code, you should see how your application communicates across the network with a ping server run by another member of the class.
Message Format
The ping messages in this lab are formatted in a simple way. Each message contains a sequence of characters terminated by a carriage return character (r) and a line feed character (n). The message contains the following string:
PING sequence_number time CRLF
where sequence_number starts at 0 and progresses to 9 for each successive ping message sent by the client, time is the time when the client sent the message, and CRLF represent the carriage return and line feed characters that terminate the line.
Option 2: UDP Pinger Lab Using Python
You can implement your ping client using Python. You should write a simple Python program that follow a step-by-step process to establish a UDP connection with a server through sockets, and send out ping requests. The other requirements are very similar to those by choosing Java. One interesting point to mention is that, that you can use one programming to write your server program, and use a different language to write your client program.

Need a Professional Writer to Work on this Paper and Give you an A+ 100 % Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN



Click here to order similar paper @Essaybay.net. 100% Original.Written from scratch by professional writers.

Select Racism.

Click here to order similar paper @Essaybay.net. 100% Original.Written from scratch by professional writers.


Click here to order similar paper @Essaybay.net. 100% Original.Written from scratch by professional writers.

Select Racism. Search social work peer-reviewed journals for the following:

I need to be able to print the journals.

Need a Professional Writer to Work on this Paper and Give you an A+ 100 % Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN
The journals need to be quantitative.

a) Three studies which utilize an experimental design;
b) Three studies which utilize a quasi-experimental design; and
c) Three studies which utilize a pre-experimental design.
Write a paper which briefly describes each of the studies, including the following for each study:
a) What is the research question?
b) What is the variable being manipulated?
c) What are dependent variables?
d) What is the population being studied?
e) Explain the designs
f) Critique the designs in terms of internal validity.

Need a Professional Writer to Work on this Paper and Give you an A+ 100 % Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN

1000 words in total ( so about 110 words per journal – 9 journals)
Due: 17 april 2013
Marking criteria
Demonstrated ability to identify relevant research studies that which utilise
experimental, quasi-experimental and pre-experimental designs.
3 marks
Demonstrated ability to describe and explain the research design of each study in
particular the research question, the population being studied and the operational
variables used
8 marks
Demonstrated ability to critique the study designs in terms of internal validity 6 marks
Presentation including clarity of written communication, organisation of the material
(typed with 1.5 spacing, clear margins) and accuracy of APA referencing style
3 marks

Need a Professional Writer to Work on this Paper and Give you an A+ 100 % Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN



Click here to order similar paper @Essaybay.net. 100% Original.Written from scratch by professional writers.

CIS3002 Assignment 1

Click here to order similar paper @Essaybay.net. 100% Original.Written from scratch by professional writers.


Click here to order similar paper @Essaybay.net. 100% Original.Written from scratch by professional writers.

CIS3002 Assignment 1

It is recommended that students commence work on this assignment as early as possible. Please read the extension policy available on the study desk before requesting an extension.
On April 24th, if you are unable to complete the assignment, it is better to submit what you have done so far rather than nothing at all. Assignments will be marked in order of receipt and sample solutions will appear on the study desk group as soon as a reasonable group of assignments have been received and marked. Please note that once sample solutions are released, no further submissions will be marked.
All submissions must be made electronically through the EASE system. Only a single pdf document will be accepted for this submission. Further instructions will be provided on the course study desk closer to the due date. Emailed or mailed solutions will not be marked.

Part A –Theory (20 marks in total)

Question 1 (10 marks)
An information systems project is assessed using a number of feasibility factors before the project is commenced. List and explain the purpose of each of these feasibility factors.
Question 2 (10 marks)
A project manager plays an important role in ensuring the success of an information systems project.
a) Define what a project is. (2 marks)
Need a Professional Writer to Work on this Paper and Give you an A+ 100 % Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN
b) Discuss what role a project manager plays in an information systems project. (4 marks)

c) Give two (2) internal responsibilities of a project manager. (2 marks)

d) Give two (2) external responsibilities of a project manager. (2 marks)

Part B – Applied Theory (30 marks in total)

Need a Professional Writer to Work on this Paper and Give you an A+ 100 % Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN

As a beginning business analyst, you have been tasked by the project manager to develop the system requirements related to the handling of outstanding purchase orders. You decided that the first step in this task was to observe thebusiness processes in action by watching the various users involved with handling outstanding purchase orders as they performed their tasks. A short description of the processes you observed is provided below.
“The shipping department receives all shipments on outstanding purchase orders. When the clerk in the shipping department receives a shipment, he or she finds the outstanding purchase order for those items. The clerk then sends multiple copies of the shipment packing slips. One copy goes to purchasing, and the department updates its records to indicate that the purchase order has been fulfilled. Another copy goes to accounting so that a payment can be made. A third copy goes to the requesting in house customer so that he or she can receive the shipment.
After payment is made, the accounting department sends a notification to purchasing. After the customer receives and accepts the goods, he or she sends notification to purchasing. When purchasing receives these other verifications, it closes the purchase order as fulfilled and paid (Satzinger et. al., p. 155).”

Question 1 (15 marks)
Develop an activity diagram with reference to the observations provided above. Be sure to include the transfer of any documents in your diagram. Note any ambiguities or questions that you have as you develop the model. If you need to make assumptions, also note these.
Question 2 (15 marks)
As noted above, the company’s current system for handling purchase orders is paper-based. You have been hired to work on a proposed enterprise resource system which will convert their current system from paper-based records to online transactions for tracking purchases. The primary source of information for new system requirements is the various stakeholders who will be using it. The project manager has reviewed your activity diagram and believes that you now have enough information to conduct a small group interview session in order to capture the necessary system requirements. To prepare for the interview session the Project Manager has asked you to write a memo which includes the following information.
a) Discuss the various stakeholders who may have an interest in the new system. Be sure to include all three groups of users in your discussion. Your discussion should be at least three (3) paragraphs in length.

b) Prepare an interview session agenda, similar to Figure 4-12 in the Satzinger et. al textbook, which provides the Objective of the Interview, User Participants (by job title) and the questions for Interview/Discussion.
Part C – Applied Theory (50 marks in total)

Question 1 (20 marks)
Review the “Focusing on Reliable Pharmaceutical Service” case study covered in Chapters 1 and 2 of the Satzinger et. al textbook and write your memo with reference to the information in the case study.
Reliable’s management team is unsure which system development approach will best fit their strategic plans: a predictive approach or one of the newer adaptive iterative approaches to the SDLC. To help them understand the various risks and management difficulties of each approach they’ve requested that you write a detailed memo covering the following information.

Need a Professional Writer to Work on this Paper and Give you an A+ 100 % Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN
a) Compare and contrast the modified waterfall predictive approach to the adaptive approach.

b) Include in your discussion the various approaches to organizing the iterations in the adaptive approach.

c) Discuss the types of projects for which each is best suited and the relevant risks and management difficulties of each approach to Reliable’s proposed system.

Question 2 (30 marks)
Review the “Focusing on Reliable Pharmaceutical Service” case study covered in Chapters 1 and 2 of the Satzinger et. Al. textbook and write your memo with reference to the information in the case study.
Based on your earlier memo, the Reliable management team now wants to better understand the potential risks and management difficulties of two of the iterative adaptive approaches to the SDLC. One iterative approach would focus on developing one subsystem at a time. While with the incremental development approach parts of the system are completed in several iterations, turned over to users, and then the cycle is repeated. Both of these iterative approaches first require an application architecture plan.
Reliable’s management team has requested that you write a detailed memo which includes the following information.
• An application architecture plan for Reliable’s proposed system.
• If Reliable were to choose an iterative subsystem approach, write a recommendation on which subsystem they should develop first. Your recommendation should be based on your included architecture plan and be one to two paragraphs long.
• If Reliable were to choose the incremental development approach, provide a recommendation on which parts of the system should be developed in the first iteration. Your recommendation should be based on your included architecture plan and be one to two paragraphs long.

Need a Professional Writer to Work on this Paper and Give you an A+ 100 % Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN



Click here to order similar paper @Essaybay.net. 100% Original.Written from scratch by professional writers.