Friday, September 4, 2020

Pinterests Growth Rate

Presentation The online life is a wonder that has overwhelmed the world. Because of the straightforward thought of interfacing individuals through the web, the world has seen the advancement of a few stages through which individuals can connect with colleagues, speak with far off companions and family members, share assessments and pictures, and market their items and services.Advertising We will compose a custom exploration paper test on Pinterest’s Growth Rate explicitly for you for just $16.05 $11/page Learn More Pinterest has recorded the quickest pace of development in the web-based social networking industry having accomplished the degree of getting ten million unique guests for every month inside the most brief time frame (Boorstin standard. 1). This was a quicker development rate when contrasted with any semblance of Facebook and Twitter which are the biggest web based life destinations (Shabat standard. 6). This paper assesses the development rate, size, benefit and s ituating of Pinterest in order to help the degree of comprehension on how informal communities flourish. Development rate The development pace of Pinterest has been noteworthy since its initiation in 2010. Boorstin revealed that between mid January and mid February 2012, Pinterest developed at a pace of 85% (standard. 2). This was set apart by the passage of a large number of new clients as guests perused through the site to acquaint themselves with the new online networking. This was a similar period wherein the organization accomplished 10 million enlisted guests. The quick pace of development anyway eased back down in the following month since Pinterest just dealt with a pace of 18%. In any case, Comscore announced that there was a development pace of 52% in March which saw the web based life increase a sum of over 17.5 million enlisted clients (Hempel standard. 2). In contrast with Pinterest, Twitter developed from 4 million clients to 20 million clients inside a time of a quart er of a year. By March 2012, Pinterest had written history most definitely. Chart indicating Pinterest development rate between October 2011 and March 2012 Advertising Looking for research paper on business financial matters? We should check whether we can support you! Get your first paper with 15% OFF Learn More Image recovered from: http://sq1agency.com/blog/2012/03/pinterest-at-the-main 30-us-locales sends-more-referral-traffic-than-twitter/Table demonstrating Traffic report for Pinterest in February 2012 Image recovered from: http://sq1agency.com/blog/2012/03/pinterest-at-the-best 30-us-destinations sends-more-referral-traffic-than-twitter/The social website exploited advancements, for example, the Amazon cloud administrations which made versatility simpler (Jackson standard. 1). What draws in guests to the site is the way Pinterest empowers clients to arrange and assemble data and have others see the outcomes. To put it plainly, this online life utilizes pictures to accomplish what Facebook and Twitter did utilizing wordings (O’Brien standard. 1). Size According to Jackson, Pinterest works utilizing just 12 individuals. Among this group is the CEO and prime supporter Silbermann, Sharp the other fellow benefactor and Tim Kendall who recently filled in as the executive of adaptation for Facebook (Hempel standard. 5). This is difficult to accept since the social site handles a lot of information and a great many clients. In March 2012, the web-based social networking oversaw 100 million visits (O’Brien standard. 1). Pinterest isn't yet the size of Facebook and Twitter which are the biggest web based life accessible. In March 2012, Pinterest recorded an aggregate of 17.8 million enlisted clients to make it the quickest developing online life in history.Advertising We will compose a custom exploration paper test on Pinterest’s Growth Rate explicitly for you for just $16.05 $11/page Learn More In October 2010, Pinterest was esteemed at $200 million from after the arrangement with Andreessen Horowitz which raised $27 million (Hempel standard. 4). O’Brien draws out that Pinterest would as of now be worth roughly $550 million. The estimation of the organization would anyway increment to about 4 billion US Dollars if it somehow managed to be taken over by Twitter or Facebook. This is in light with the ongoing obtaining of Istagram by Facebook which was worth $1 billion. In the event that Instagram could be purchased at that value, at that point the value of Pinterest will be considerably more passing by its development rate. This is the reason its valuation is evaluated to be worth multiple times the cost paid by Facebook. The cost of securing would be higher than the real valuation of Pinterest supposing that any procedure of a take over is started right now, it would be a transition to pick up mileage from forceful contenders. Situating Pinterest utilizes people’s want to be social using pictures. The util ization of pictures was a change to the well known utilization of text by other social destinations. It was anyway an extraordinary thought given that Pinterest concentrated on pictures instead of text. Pinterest in this way situated itself as a web based life that centers around the advancement of pictures. Pictures are a basic piece of promoting since they make visual incitement. Pictures pull in the consideration of a crowd of people as a result of the discernible attributes and subtleties of the special visualization of things that are posted. Pinterest in this manner pulls in numerous individuals who wish to publicize their items since the online life advances the utilization of pictures. Pinterest is a viable advertising specialized device for some organizations. On account of the a great many surfers who visit internet based life, there is an enormous crowd from which advertisers can recognize expected clients. The way toward creating powerful advertising correspondence inclu des recognizing an intended interest group, deciding destinations, planning interchanges, choosing channel, building up spending plan, picking media blend, estimating results lastly overseeing IMC. Pinterest makes it simpler for advertisers to convey to the clients who have been distinguished as likely purchasers. They can post photos of their items (the message) on the internet based life and have a huge number of watchers see and give criticism on their conclusions. Pinterest likewise makes it simple for advertisers to deal with the promoting correspondences process since their records are movable because of chairman rights which permit them to evacuate unjustifiable remarks and alter where wrong data is posted (control). Pinterest is likewise utilized by advertisers to execute promoting programs. Kotler’s 5Ms that are helpful in publicizing are embraced for this situation to address components of cash and estimation (Kotler 5). After the strategic chose by a promoter, the pictures go about as the message while the site is the media.Advertising Searching for research paper on business financial aspects? How about we check whether we can support you! Get your first paper with 15% OFF Find out More The enormous quantities of guests that rush this web-based social networking make it the perfect stage for advertisers to show their items. On the off chance that somebody opens the Pinterest site, what comes up on the screen regardless of whether it is another client are many items that various individuals are publicizing. Pinterest claims as a perfect media since it spares advertisers a large number of publicizing costs since it is allowed to work a record. The crowd focused on additionally doesn't need to pay in order to have the option to get to data on the site. Pinterest additionally doesn't charge per post thus sponsors can post the same number of pictures as they need. This is likewise a decent promoting media since topographical area doesn't impact the scope of advertising correspondence messages. Productivity Pinterest acquires benefits from promotions made by enormous organizations, for example, multinationals. The organization additionally deliberately benefits when the s ite’s guests make buys because of clicking certain connections of adverts found on the web based life page. This works out as in the sponsors offer a business cut at whatever point buys are made by guests of Pinterest. As indicated by Segall, these connections allude guests to internet shopping destinations, for example, (EBAY FORTUNE 500) and Amazon (AMZN FORTUNE 500) (standard. 3). This way to deal with income creation has been questioned by certain individuals while others support the company’s methodology of meeting its specialized expenses. Henceforth, Pinterest produces income without meddling with the exercises of surfers as it just adds moneymaking connects to promotions. Marking showcasing blend Pinterest has effectively actualized the advertising blend in its technique. It has marked its administrations through its situating system. The company’s usage of the promoting blend has added to the fruitful marking process since Pinterest has gotten mainstrea m. The result of Pinterest can be depicted as pin structure association in online networking. The valuing technique includes no expense to clients of the site since it is web based life. By working in the web, the spot component doesn't trouble the organization since the web is accessible all inclusive. Special exercises include Pinterest promoting itself through online journals and adverts on different destinations. Pinterest utilizes a little group to deal with all tasks and this empowers them to be viable in administering obligations and actualizing procedures. The individuals component disentangles the procedure of the executives and tasks of Pinterest. The physical proof of Pinterest is the most discernible component of the promoting blend since an appealing showcase of items, pictures, text and flags are brought to the screen when the site is opened. End Pinterest is the quickest developing online networking ever. The inventive plan to build up a pin configuration has surprise d the world. The web based life has figured out how to pull in guests who have a shopping mentality to its website. This has made sponsors to rush in huge numbers as they show pictures of their items trying to create deals. Henceforth, Pinterest has developed to get probably the best stage for advertisers to actualize their showcasing com

Saturday, August 22, 2020

1994 Rwandan Genocide Essay Example for Free

1994 Rwandan Genocide Essay The 1994 Rwandan Genocide affected on many individuals in various manners. In this exposition the causes I will cover are ethnic pressure because of Belgium Colonization, Propaganda and despise talk, the job of the global network, and political issues. The outcomes I will cover are causalities, the financial impacts, recognition and training, and populace relocation. In this little nation in Africa called Rwanda this awful slaughtering occurred. The Rwandan Genocide started on April sixth 1994 when the president was killed, trailed by the prime minster the following day. It endured 100 days, â€Å"100 long stretches of slaughter† finishing on the eighteenth of July 1994. The slaughter included numerous gatherings. The culprits were †Hutu regular citizens, Hutu armed force, Interhamwe-the young people of Hutu sorted out into a fanatic local army, and radio RTLM-a radio broadcast reporting to slaughter all Tutsis. Casualties included †Tutsi, Hutu political conservatives for instance prime minster AgatheUwilingiyimana. Different gatherings incorporate †RPF (Rwandan Patriotic Front). President Juvenal Habyarimana who was in control if the Hutu government, and the global network for instance the UN (United Nations) Peacekeepers. During these 100 days of butcher a huge number of Tutsi we killed. Ladies and young ladies we assaulted, and many tormented by having their bosom cleaved off and sharp articles embedded into their vaginas. Numerous individuals attempted to rear in schools and houses of worship however were found and executed. I have recently expounded on the unique situation and the course of the 1994 Rwandan Genocide. I am currently going to compose the reasons for this awful occasion beginning with ethnic strain because of Belgium Colonization. Ethnic strain because of Belgium Colonization is ostensibly the greatest reason in the 1994 Rwandan Genocide. It is a political and social reason that occurred over a significant stretch of time. Beginning in 1860 and coming directly down to 1926. In 1860 the principal Tutsi ruler was selected. In 1884 German wayfarer Carl Peters enters the Rwandan realm and acquires settlement rights. In 1885 Germany announces a protectorate over present-day Rwanda. In 1890 Rwanda acknowledges German pioneer rule with opposition. A German regional chairman isn't selected until 1907. In 1916 WW1 Belgium Allied Forces catch German East Africa. In 1924 Great Britten expect command over Tanzania, while Belgium is allowed trusteeship over Rwanda and Burundi. Belgium Colonization starts. In 1926 Rwandans were given a character card appearing if an individual was Hutu, Tutsi or Twa. Preceding colonization individuals could ‘jump’ races e. g. Hutu’s could become Tutsi’s. Calipers were the devices of colonization. The size of the noggin and nose and the shade of the eyes were the components that decided if an individual was a Hutu, Tutsi or Twa. The consequence of the out of line framework was †Tutsi could have government positions, be landowners, be bosses of Hutu, gather charges, get instruction (no one but Tutsi could go to class after the colonization), be a director for the equity framework. Hutu were denied advanced education, land proprietorship and positions in government. The personality cards that everybody was given were exceptionally clear they had what ethnic gathering they were from, their place of birth, their date of birth, their calling, their place of habitation, the name of their companion, their C. I number, and their mark. A statement structure boss investigator of the worldwide Rwandan court summarizes this reason well â€Å"European frontier history was a significant supporter of what in the end turned into the massacre in Rwanda†. The second reason I will talk about is Propaganda and despise talk. This is a social Cause; it is present moment since it happened very quick after the demise of the president and prime minster. Kangura Newspaper was a paper about how talking about the Tutsis were, this was propelled by first woman AgatheHabyarimana in 1990. Kangura implies wake them up in English. In the paper they had supremacist remarks, for example, â€Å"They look like creatures, really they are animals†, â€Å"If you permit snakes to live among you, you will be exterminated†, â€Å"They look revolting with their shaggy hair and whiskers that are brimming with fleas†. RTLM (Radio Television des Milles Collines) or normally known as â€Å"Hate Radio†, utilized great exciting music to get individuals to hear it out then they utilized in to pass on contemptuous messages, for example, â€Å"cut down the tall trees† this implied for all Hutu radicals to clear out the Tutsis. RTLM frequently alluded to Tutsi as cockroaches. In 1990 Kangura paper distributed the 10 instructions for the Hutus they were an all-encompassing form of 1, Every Hutu must realize that the Tutsi lady is working for the Tutsi ethnic reason Hutu is a deceiver who an) Acquires a Tutsi spouse, b)Acquires a Tutsi mistress, c) Acquires a Tutsi partisan or protegee. 2, Every Hutu must realize that our Hutu little girls are increasingly commendable and progressively faithful as a lady, as spouses and as moms. 3, Hutu ladies, be cautious and ensure that your spouses, siblings and children see reason. , All Hutus must realize that all Tutsis are exploitative in business. We have taken in this for a fact for a fact. Hutu is a swindler who a) structures a business partnership with a Tutsi, b) puts resources into own assets/open assets in a Tutsi undertaking, c) Borrows cash from/advances cash to a Tutsi, d) Grants favors to Tutsis. 5, Strategic positions, for example, governmental issues, orga nization, financial aspects the military and security must be confined to Hutu. 6, A Hutu lion's share must win all through the training framework. 7. The Rwandan Army must be solely Hutu. No Solider may wed Tutsi ladies. 8, Hutu must quit showing compassion for the Tutsi. 9, Hutu any place they are must stand joined together, in solidarity, and worried about the destiny of their Hutu siblings. Hutu should continually counter Tutsi publicity. Hutu must stand firm and cautious against their shared adversary. The Tutsi. 10, The social Revolution of 1959, the Referendum of 1961 and the Hutu Ideology must be instructed to Hutu of each age. Hutu must get the message out. Any Hutu who oppresss his sibling Hutu for getting the message out and instructing this philosophy is a double crosser. A statement from Leon Mugesera summarizes this reason â€Å"The deadly error we made in 1959 was to let them escape †¦ they are outsiders from Ethiopia so we will send them by the most limited course tossing them into the Nagbarongo waterway. We should act. Wipe them all out†. The third reason I will talk about is the job of the universal network; it is a political reason that is a present moment since it turned into an issue not long after the colonization. During this reason the world just remained by and viewed. Following WW11 and the Holocaust, The United Nations embraced a goals on December 9, 1948, which expressed â€Å"genocide, regardless of whether carried out in time of harmony or time of war, is a wrongdoing under universal law which they attempt to forestall and to punish†. There were two chances to mediate that were missed. In October 1993 The United Nations Assistance Mission for Rwanda started with the organization of 21 soldiers under the order of Brigadier †General Romeo Allaire of Canada. Extra soldiers proceeded with o show up until February 1994, when the mission was completely set up with 25,000 faculty. Numerous fighters showed up without weapons, food or water; vehicles and radios were conveyed second hand from different missions and infrequently in working condition. On eleventh January 1994 Officers were storing weapons and preparing non military personnel local armies; the degree of readiness would empower the homicide of 1000 Tutsis at regular intervals. This expression will polish off this reason pleasantly, â€Å"clearly, the slaughters in Rwanda comprised massacre, so why didn’t the world steep into stop it? In my fourth and last reason I’m going to examine political issues (the job of the Hutu fanatics in the Habyarimana government and the impetus). This is a political reason which was present moment. President Juvenal Habyarimana came to control through a military overthrow in 1973. He guaranteed national solidarity. By 1994 numerous Rwandans were calling for popularity based government. In January 1994 despite expanded state persecution and the French-upheld up-work of military, 50,000 Rwandans walked in an expert majority rule government show in Kigali. The development to the Hutu’s needing power is over a significant brief time of time†¦ just 3 years! In October 1990 common war began when the Rwandan Patriotic Front (RPF), a local army of Rwandan Tutsi exceeds expectations and Hutu protesters situated in Uganda, attacked Rwanda. A large number of Tutsis were captured. In 1991 RPF military triumphs forced President Habyarimana into drafting another multi-party constitution. In 1992 UN drove harmony talks drove between the RPF, The Rwanda government and 12 resistance groups to attempt to accomplish a force sharing understanding. In August 1993 Arusha Peace Accords were marked to unbiased Tanzania. Hutu Power’ began broadcasting Tutsi detest messages in the media. In 1993 A Hutu Power Party no taking an interest in the legislature set up Radio/TV Libre de Millie Collines (RTLM) to get round the Arusha understandings unequivocal preclusion on government supported despise discourse. I has been accepted that the Ã¢â‚¬Ë œfinal nail in coffin’ was the meeting of P occupant Habyarimana. At 8. 30p. m on April 6, 1994, President Juvenal Habyarimana of Rwanda was coming back from a highest point in Tanzania where, under worldwide tension, he was haggling with the resistance to arrive at a settlement. A surface-to-air rocket shot the plane out of the sky. All ready were slaughtered. I have quite recently expounded on the reasons for the 1994 Rwandan Genocide, I am presently going to expound on the results of the ‘100 long stretches of slaughter’. Beginning with causalities. The 19

Friday, August 21, 2020

Hauroun and the Sea of Stories Compared to Lord of the Rings Free Essays

Hauroon and ruler of rings Frodo Baggins and Haroun Khalifa are both legends, both from various stories however have a fundamentally the same as excursion. Frodo Baggins from J. R. We will compose a custom article test on Hauroun and the Sea of Stories Compared to Lord of the Rings or on the other hand any comparative subject just for you Request Now R Tolkien’s Lord of the Rings is a hobbit of center earth who minds his own business and likes to be distant from everyone else, he goes on an undertaking that completely changes him. Haroun Khalifa from Salman Rushdie’s Haroun and the ocean of stories is a multi year old kid living with his dad in a fanciful dismal city. The two characters go on an excursion that changes there life always, the characters missions have numerous comparative stages to the excursion. Both start there journey with a call to experience, neither one of the characters are expecting it yet both appear to be anxious to go. The two characters fight among great and shrewd and the two characters become experts of two universes, and accomplish apotheosis or god like status and afterward have the opportunity to live. Both saints are called to the experience from numerous points of view, Frodo Baggins is called to experience during his uncles 111th birthday celebration party when his uncle Bilbo vanishes. Bilbo left a gold ring for Frodo so Frodo addresses the wizard Gandalf who says to keep it safe and not to put it on. A long time later the shrewd wizard Gandalf comes back to disclose to Frodo the ring is very hazardous and was fashioned by the dull master, Sauron and must be wrecked, that is the point at which his excursion started and Frodo starts his excursion heading towards Rivendell to converse with the mythical people about how to devastate it. Haroun is called to his excursion when he gets back one day to discover his mom has fled with the upstairs neighbor who has consistently been basic towards Rashid Khalifas narrating which impacts Haroun significantly. Haroun contends with his dad about the handiness of stories and why they are significant, this smashes Rashid. Haroun battles with school because of his moms nonattendance so his dad takes him on a narrating trip for some extravagant governmental issues, they travel to the Valley of G and when Rashid goes up to recount to a story and nothing comes out, this is Haroun’s call to experience, to support his dad. Great VS malicious. That is the thing that pixie tails and stories rotate around, both Frodo’s and Haroun’s experience spins around it. In Lord of the Rings the underhanded that Frodo is battling is the dimness of the ring and the insidious that stays inside Mordor. Saruman, the underhanded wizard attempts to make Frodo change from great to abhorrent yet didn't succeed. In Haroun’s story the underhanded that he battles is somebody named Khattam-Shud, Khattam-Shud is contaminating or harming the tales so they can not be told. Rashid and Haroun travel to the Land of Gup to attempt to make sense of what is happening. They arrive and the whole land is getting ready for war, the guppies Vs the Chupwalas. The war closes with the triumph of the Guppies and they reward Haroun with giving his desire that his dad can recount stories once more. Toward the finish of every story the legends arrive at the phase of apotheosis, Frodo arrives at apotheosis when he devastates the ring by tossing it in the magma, all the fiendishness leaves and the great dominates. Frodo is the ace of two universes the universe of the non existent Mordor and the Shire, he is taken a gander at as a lord and everybody will always be thankful for his triumph over haziness. Haroun arrives at apotheosis after the war closes, he is overpowered with satisfaction that his dad can recount stories, Haroun comes back to the miserable city with his dad to find that the city is not, at this point dismal, the once overlooked city name has been recollected and when Haroun gets back he sees the last individual as there hanging tight for him, his mom. Haroun’s story closes cheerfully ever after as does Frodo’s. Both of the legends were from an exemplary fantasy , the tales had a call to experience, both altogether different calls to experience yet the two of them satisfy there objectives and arrive at apotheosis, I surmise you can say Haroun and Frodo both lived joyfully ever after. The most effective method to refer to Hauroun and the Sea of Stories Compared to Lord of the Rings, Essay models

Lawrence v. Texas Essay Example | Topics and Well Written Essays - 1500 words

Lawrence v. Texas - Essay Example Texas, 539 U.S. 558 (2003). He included that the rule Anti-homosexuality controls an individual relationship which is viewed as â€Å"within the freedom of people to choose,† Lawrence v. Texas, 539 U.S. 558 (2003). For this situation, the applicants were both consenting grown-ups during the time the supposed offense was submitted which was held in private, Lawrence v. Texas, 539 U.S. 558 (2003). He included that the freedom secured by the Constitution gives significant assurance to grown-up people in concluding how to direct their private lives particularly on issues identified with sex, viewed as a close and an individual decision, Lawrence v. Texas, 539 U.S. 558 (2003). Taking everything into account, the Justice remarked that the State can't corrupt the presence of these demonstrations of private sexual lead by making it a wrongdoing nor would it be able to legitimize intrusion into the individual and private existence of an individual missing any authentic state intrigue, Lawrence v. Texas, 539 U.S. 558 (2003). Equity Kennedy clarified that if a rule was held to be invalid under the Equal Protection Clause, at that point there may be a way that such rule might be considered as substantial if conditions were changed, for example, if the restriction of a lead is applied either between a similar sex or distinctive sex members, Lawrence v. Texas, 539 U.S. 558 (2003). He clarified that the shame of making an ensured direct criminal despite everything remains if the meaningful legitimacy of the rule isn't analyzed and regardless of whether it were not enforceable under equivalent assurance reasons, Lawrence v. Texas, 539 U.S. 558 (2003). Besides, being a criminal offense, it subjects the individual to all the outcomes, which may either be the discipline or in his requests for employment from that point, for such a â€Å"state-supported condemnation,† Lawrence v. Texas, 539 U.S. 558 (2003). Announcing

Saturday, July 11, 2020

Tips On Finding The Right College Research Paper Writing Service

Tips On Finding The Right College Research Paper Writing ServiceAre you thinking about hiring a college research paper writing service? You may be concerned that the writers you have in mind will do a poor job, but they might be hired to write good articles.There are ways to make sure that your college research paper writing service is qualified, talented and has a good reputation for producing good work. Whether you choose to handle all the paper writing yourself or choose to outsource it, here are some tips on how to get started with the perfect writer for your needs.Ask for samples. Ask your college research paper writing service what types of articles they are currently working on. You can ask them what types of topics they are interested in, and you can also ask them if they would be interested in working on a particular topic based on their own research or if they are comfortable going on an assignment with a particular writer.Look at what other writers have written before you hire them. Make sure you look at their recent published articles and check out the websites of their clients. This will help you see what sort of articles they have produced in the past. A professional writer should produce work that is of a high quality and should write about topics that they know well.Always give your research paper writing service a deadline when you first start out. Writing articles fast can be difficult, but when you are struggling to write a paper you can count on your writer to get your work done on time. They should also produce articles that are relevant to your topic, as deadlines are almost always part of the deal when you work with your writer.Another way to ensure that you get a quality research paper writing service is to work closely with them. Be sure to ask them about their process and see how they decide which articles they want to work on. When you go to your writers you should ask them if they have any rough drafts to show you, this is a great wa y to work together on topics, and also a way to gauge the quality of the article. If your writer doesn't have a finished article ready for you to read, this might be a sign that they aren't the best choice for your project.Your research paper writing service can provide you with articles that are published on sites that help you to promote the work of others, or they can write articles on your behalf. This can be a very good idea for you, as you can have the best of both worlds. Either way you should be happy with the finished articles. Make sure that they are published appropriately and that they meet all of your requirements before you start looking for other freelance writers.Once you find a college research paper writing service that is right for you, you can begin to look for ways to find out more about them. If they don't offer a website or if you don't have any luck on getting in touch with them, you can try other search engines such as Google and Yahoo and look for some revi ews online to get a feel for what people think of their writing services.

Wednesday, June 24, 2020

Computing Abstraction Information - Free Essay Example

Discuss computing as a discipline and the role of abstraction in advances made in computing Computing has been defined in various ways, including the body of knowledge that surrounds computers and computation used by the Computing Sciences Accreditation Board (Denning et al 1989), and any goal-oriented activity requiring, benefiting from, or creating computers (Shackelford et al 2006). According to the Joint Task Force for Computing Curriculas definition therefore, computing encompasses design and implementation of hardware and software systems for a wide range of purposes; processing, structuring, and managing various kinds of information; doing scientific studies using computers; making computer systems behave intelligently; creating and using communications and entertainment media; finding and gathering information relevant to any particular purpose, and so on. By its nature, computing draws knowledge and skills from the fields of engineering, mathematics and science, from which the discipline itself is rooted. Abstraction is a mental model which removes complex details, and leaves only the information necessary to accomplish the goal (Dale Lewis, 2006). The concept is widely used in Electrical Engineering circuit analysis as Thevenin and Nortons theorems for representing complex circuits as equivalent simple circuits. Abstraction has also been key in the development of computing as it allowed innovations within individual layers of computing systems to be researched and developed independently of each other, e.g. the developments in Operating Systems designs and User Applications were all happening independent from advances in processor construction. Discuss Unicode standards. The Unicode standard is a universal means of character encoding, developed by the Unicode Consortium, that is used to represent every character in every language (Wikipedia). The Unicode character set 16 bits per character, enabling it to represent over 65,000 characters (Dale Lewis, 2006); a lot more than the ASCII sets 256 characters, which were incorporated as a subset of the Unicode character set. Each character is represented by a hexadecimal code, and the characters are classified under their source, e.g. ASCII/Latin, Thai, Greek, Chinese, etc. The versatility of the standard has made it widely popular, and is used in many programming languages and computer systems. Not all of the available codes in the standard have been assigned to characters, and although more than 30 writing systems are currently included, more are constantly being added. The standard was first published in 1991, and has also been in constant revision since then; version 5.1 is expected during March 2008. Who first thought about the idea of using the binary number system to be able to create electronic devices that can present numbers and do calculations? The binary number system as we know and use in computing today, was first used in the early 20th century on early non-mechanical computers. The word bit, short for binary digit was coined by John Wilder Tukey, an American statistician and early computer scientist, who was working on an early computer project with John von Neumann in 1946(tefan Porubsk 2007). However, George Stibitz of the Bell Telephone Laboratories (Bell Labs), New York City, had build a demonstration 1-bit binary adder using relays in 1937. Although it was just a demonstration machine, it was still the first binary computer (Stephen White 1996). Write the decimal number 127 as a Hexadecimal, an Octal and as a Binary number. According to the Free Dictionary, the Hexadecimal Number System is a positional system of numeration that uses hexadecimal digits and a radix of sixteen. To convert the decimal 127 to hexadecimal, we shall employ the recursion method. Division Quotient Remainder Hex Number 127/16 7 15 F 7/16 0 7 7F So the hexadecimal equivalent is 7F The Octal Number System is a positional system of numeration that uses octal digits and a radix of eight. To convert the decimal 127 to octal, we shall employ the recursion method. Division Quotient Remainder Octal Number 127/8 15 7 7 15/8 1 7 77 1/8 0 1 177 So the octal equivalent is 177 The Binary Number System is defined as a positional system of numeration that uses binary digits and a radix of two To convert the decimal 127 to binary, we shall employ the recursion method. Division Quotient Remainder Binary Number 127/2 63 1 1 63/2 31 1 11 31/2 15 1 111 15/2 7 1 1111 7/2 3 1 11111 3/2 1 1 111111 1/2 0 1 1111111 So the binary equivalent is 1111111 What is the minimum number of bits is needed to represent marital status? Given that marital status can be one of the following options: married, divorced, widowed or never married. Explain your answer. In the inherent nature of the binary system, each bit can only have two states, such as zero or one, one or off, etc. Each bit can, therefore, only represent two things, i.e. with one being the one-state, and the other, the zero-state. In order to represent a more varied field, more bits would be required. In this case the marital status field contains has four possible states, namely married, divorced, widowed and never married. In general 2n bits represent n states (Dale), so in this case, 2n = 4 = 22. So 2 bits would be required to represent the marital status, and this would use one of the combinations of 00, 01, 10 or 11 to correspond to one of the possible states. Given a fixed-size number scheme where k in the formula for the tens compliment is 6 (see page 61), answer the following questions: a) How many positive integers can be represented? In the formula for tens complement, Negative (I) = 10k-I, k is the number of digits. For k=6, then the largest integer possible is 999,999. In a fixed size number system, half of the numbers represent negative integers, and in this case the positive integers would range from 1 to 499,999. Therefore, 499,999 positive integers can be represented. b) How many negative integers can be represented? The negative integers are represented by integers 500,000 till 999,999. Thus giving (999,999-500,000)+1=500,000 negative integers represented. c) Draw the number line showing the three smallest and largest positive numbers, the three smallest and largest negative numbers and zero. Show the behaviour of the following circuit with a truth table Inputs Gate 1 Gate 2 Gate 3 Gate 4 Gate 5 A B C (AB) (BC) C (AB+C) (AB+C)+(BC) Output 0 0 0 0 1 1 0 1 1 0 0 1 0 1 0 1 1 1 0 1 0 0 1 1 0 1 1 0 1 1 0 0 0 1 1 1 1 0 0 0 1 1 0 1 1 1 0 1 0 1 0 1 1 1 1 1 0 1 1 1 0 1 1 1 1 1 1 0 0 0 0 0 Draw a circuit corresponding to the following Boolean expression: AB + (B + C) a) Calculate the capacity of a hard disk with 3736 Cylinders, 128 Heads and 63 Sectors with 512 bytes per sector. Give the answer in gigabytes (GB) and in gibibytes (GiB). We shall use the equation: Disk Size in Bytes = No. of Cylinders * No. of Heads * No. of Sectors * Bytes per sector = 3736 * 128 * 63 * 512 = 15696221184 Bytes According to the decimal definition of Gigabyte, 1 Gigabyte= 109 Bytes Therefore, the disk size in Gigabytes is = 15696221184/109 = 15.696 GB Since, 1 Gibibyte= 230 Bytes = 1,073,741,824 Bytes Then the disk size in Gibibytes is, = 15696221184/ 230 = 14.618 GiB b) Why do you think that the practical use of binary prefixes remain mostly ignored by marketing literature. According to James Wiebe, hard drive manufacturers have historically used decimal computations to determine disk size (Wiebe 2003). This gave them numbers to describe capacity which were direct and easily understandable by their clients. Marketing literature have a much greater impact and sales appeal to an audience when advertising a disk as having a capacity of 120GB, as opposed to 115.039GB. A less complicated number is also more comfortable for the general public to deal with, than mathematical jargon. c) The following image is how windows reports the disk usage of a hard disk with a capacity reported to be 50GB by its manufacturer. Explain why it does not seem to add up. The discrepancy in the sizes of the disk reported by the manufacturer, and the Windows operating system is due to the dissimilar computations used to obtain the decimal representation of the disk capacity. Disk manufacturers use decimal or Base10 arithmetic to perform the computation, while Operating system vendors use binary, or Base2 arithmetic. The decimal GB is (1000x1000x1000) Bytes, while the binary GB is (1024x1024x1024) Bytes (Wiebe 2003). Therefore the binary size of this disk is: 52,428,795,904/(10243) =48.8281 =48.8 GB a) Write a pseudo code algorithm to get three positive integers from a user and print them in numerical order. Print Please enter three positive integers separately Set List 1 to 0 Set List 2 to 0 Set List 3 to 0 Read num1 Read num2 Read num3 If (num1num2) (num1num2) Set Li to num1 If (num2num3) Set List2 to num2 Set List3 to num3 else Set List2 to num3 Set List3 to num2 ElseIf (num2num1) (num2num3) Set Li to num2 If (num1num3) Set List2 to num1 Set List3 to num3 else Set List2 to num3 Set List3 to num1 Else Set Li to num3 If (num1num2) Set List2 to num1 Set List3 to num2 else Set List2 to num2 Set List3 to num1 Print The numerical order of the numbers is: Print Li+ +List2+ +List3 b) Enclose the algorithm within a loop that repeat until the user enters the first value of the trio as negative. When the user enters a negative value for the first value the program must not require the second and third values to be entered. Print This program will sort 3 positive integers. To end, please enter a negative value for the first entry Print Please enter three positive integers separately Set num1 to zero While (num1=0) Set List 1 to 0 Set List 2 to 0 Set List 3 to 0 Read num1 If (num10) break Read num2 Read num3 If (num1num2) (num1num2) Set Li to num1 If (num2num3) Set List2 to num2 Set List3 to num3 else Set List2 to num3 Set List3 to num2 ElseIf (num2num1) (num2num3) Set Li to num2 If (num1num3) Set List2 to num1 Set List3 to num3 else Set List2 to num3 Set List3 to num1 Else Set Li to num3 If (num1num2) Set List2 to num1 Set List3 to num2 else Set List2 to num2 Set List3 to num1 Print The numerical order of the numbers is: Print Li+ +List2+ +List3 Print Thank you for using the program c) List the identifiers in the algorithm in b) and tell whether they named data or actions. The algorithm uses the following variables: num1:data, integer num2:data, integer num3:data, integer List 1:data, integer List2:data, integer List3:data, integer Print:action output data to display Set:action store value into the variable If ElseIf Elseaction perform the indented statements depending on the whether the condition is true or false. While:action repeat the indented statements if the condition is true d) Verify the algorithm in b) using a walk-through. num1 num2 num3 Li List2 List3 At the beginning 0 ? ? 0 0 0 After first entry 4 ? ? 0 0 0 After second entry 4 7 ? 0 0 0 After third entry 4 7 5 0 0 0 After If statement 4 7 5 4 5 7 On second iteration -1 0 0 0 a) Use Pep/7 assembly language instructions to write a program to add the decimal values 7 and 19 and store the result in memory location 7D (Location is given in hexadecimal). BR Main num1:.WORD d#7 num2:.WORD d#19 Main:LOADA h#0000,i ADDA num1,d ADDA num2,d STOREA h#007D,d DECO h#007D,d STOP .END b) Write the above program in Pep/7 machine language using hexadecimal notation. 70 00 07 00 07 00 13 08 00 00 19 00 03 19 00 05 11 00 7D F1 00 7D 00 zz Distinguish between the four programming paradigms mentioned in Chapter 8 and discuss the benefits of using each of them as purported in the literature. Also give an example of a programming language that supports each of the paradigms and the URL of a vendor for each language. In their discussion of programming paradigms, Dale and Lewis (2006) introduce four programming paradigms namely: imperative, functional, logic programming, and object-oriented paradigms. As the name implies, the imperative programming paradigm is characterized by sequential instructions executed in an order governed by control structures to solve a task. The languages in this class allow the programmer to express algorithms as a hierarchy of tasks, and they tend to use a syntax that is similar to descriptions of everyday routines. One such language in this category is C++, which is available from Borland/CodeGear. Information on their product and tutorials and downloads can be obtained from https://www.codegear.com/products/cppbuilder. The functional programming paradigm is based on the mathematical theory of functions. Computations are crafted and expressed as function calls, with no need for variables or value assignments, making it quite simple. One of the popular languages in this paradigm is Lisp, which is available from Franz Inc. and more information on the product can be accessed their website at https://www.franz.com/. The third kind discussed by Dale and Lewis is the Logic programming paradigm, which is based, as the name suggests, on the principles of symbolic logic. It utilizes axioms, inference rules, and queries and program execution is by systematic search in a set of facts declared by one type, and another type making use of a set of inference rules. It is widely utilized in artificial intelligence, and PROLOG is a popular logic programming paradigm language. EZY Prolog is a PROLOG compiler which is available from EZY-Software at: https://www.ezy-software.com/ezyprolog/Prolog_Inference_Engine/ezy_prolog_overview.htm. In the object-oriented programming paradigm the data and operations are encapsulated in objects, which interact with each other. Programmers are able to express their algorithms using a hierarchy of objects. Smalltalk is a popular object-oriented programming language available from Cincom in their VisualWorks product, whose website is https://www.cincomsmalltalk.com/userblogs/cincom/blogView. What exchange will be made next? The Selection Sort algorithm works by progressively working through the array from the first or last index, and exchanging the positions of the current element and the next matching element in the unsorted section of the array. The sorting procedure may be by numerical or alphabetical precedence in ascending or descending order. In the given example, the sorting algorithm is performing a numerical sorting procedure in descending order from right to left. The next position to be processed is that occupied by element 10, and it shall be exchanged with element 14, which is the highest numerical element in the unsorted subsection. Compare Bubble Sort and Quicksort by giving an example of a scenario where each of these algorithms would outperform the other. Bubblesort and Quicksort are simple sorting algorithms that are classified under exchange sorts, as they sort data by systematically exchanging the positions held by individual items in an array (Knuth 1997). Bubble sort works by progressively working from one end of the array, comparing the two adjacent items, switching them if so determined by the sort criteria, and then shifting the focus one step forward in the array to repeat the procedure on the next item in the array with the one from the prior sort. The operation continues until the end of the array has been reached, at which point the highest or lowest value shall have bubbled to the end of the array. The rest of the items in the array may have altered their positions in the array, but may not be in their sorted positions. Therefore, the procedure may have to be repeated a number of times, in order to get the second, third, and all other items into their correctly sorted positions. Due to its operation, the bubble sort is an inherently slow procedure, and a common method used to improve the performance, is to reverse the direction and invert the sort criteria when at the end of the array. Quicksort, on the other hand, works by progressively breaking down the data for sorting, first into two lists of greater-than and less-than around an element in array called a pivot, recursively sorting the sub lists, and then combing the two sorted sub lists to give the final sorted array. The Quicksort algorithm can be further enhanced when sorting really large lists of data, by recursively breaking down the sub lists into smaller ones using pivot elements in the sub lists. This would be handy when, for example, sorting names of participants attending a conference. The first pivot could be surnames starting with M, giving sub lists of A-L and M-Z. The A-L sub list could then itself be pivoted using F, and so on until a level is reached at which point simple sorting can be done. After which, the sub lists would be recombined to give the sorted list of data. Sorting such a large list of data using the Bubble sort would be extremely slow and impractical. However, the Bubble sort algorithm can be used as a simple confirmation algorithm to verify if the data list has been correctly sorted. If we setup the Bubble sort algorithm to keep count of any exchanges it performs, and we obtain a result of nil, then the list has been arranged correctly. Use examples to show when each of the three partition selection approaches mentioned in chapter 10 is optimal. Partition selection describes the decision process by which memory locations for new programs in variable length. Partitions are allocated. There are three general methods used in the allocation (Dale Lewis, 2006) namely: first fit, best fit and worst fit. The First fit method simply places the program into the first partition big enough to hold it. For example, in a system that uses fixed partition sizes determined at boot time, the system may divide the memory into partitions of size X, Y and Z, where Y is greater than X and Z is greater than Y. When a new program is started, and is determined to require a memory size larger than X but less than Y, then it is loaded into the first Y or Z size partition that is available. If a Z size partition is available ahead of any Y size partition, then it shall be allocated that partition. Best fit criteria works by allocating the program the smallest partition that it can fit in. In the above example, if the program is determined to require a size larger than X, but less than Z, then it shall be allocated an available Y size partition. The worst fit method allocates the program the largest partition that is big enough to hold it. In the above example, a Z size partition would be allocated. This method is impractical to use in fixed partition sizes, as it would be wasteful. In dynamic partitions, though, where partition sizes are constantly getting resized to fit programs, this allocation method leaves the largest partitions intact to accommodate other programs later on. The term virtual machine is used in three different contexts (Page 235, 328 and 343). Discuss the relation between the different definitions of a virtual machine. According to Dale and Lewis (2006), a virtual machine can be defined in three different contexts as: A hypothetical computer entity operating on a computer and running programs by interpreting Byte code. An implementation on a computer system where a user utilizes the computer resources as they would on their own computer, although in effect the resources are shared with other users in a similar environment on the same computer system. The illusion created by a timesharing system that each user has a dedicated machine. The first definition refers to an interaction between processes running on computer, for example The Java Virtual machine is a computer process running on a computer that provides a separate computer environment for the execution of Java bytecode. The second and third definitions are interconnected and are in the domain of computer system and its timesharing user environment. One is the virtual machine from the perspective of the user, who is primarily concerned with their own virtual computing environment created through the sharing of resources, e.g. a Linux terminal window. The other is as seen by the computer system itself, which is running a managerial process overseeing the administration of the timeshared resources for all the users on the system, e.g. IBMs VM/370 operating system (Creasy, 1981). Bibliography Bubble sort From Wikipedia, the free encyclopedia [Online] Available at:https://en.wikipedia.org/wiki/Bubble_sort Creasy R.J 1981. The Origin of the VM/370 Time-sharing System IBM Journal of Research and Development Volume 25 No. 5 Dale N. Lewis J. 2006. Computer Science Illuminated, Third Edition Sadbury, Massachusetts: Jones Bartlett Publishers Denning, P.J et al 1989 Computing as a DisciplineComputer Volume 22, Issue 2 Pages: 63 70 Donald Knuth. The Art of Computer Programming, Volume 3: Sorting and Searching, Second Edition. Addison-Wesley, 1997. ISBN 0-201-89685-0. Section 5.3.1: Minimum-Comparison Sorting, pp.180-197. James Wiebe 2003 When One Billion does not equal One Billion, or: Why your computers disk drive capacity doesnt appear to match the stated capacity White-paper on the controversy over drive capacities Quicksort From Wikipedia, the free encyclopedia [Online] Available at: https://en.wikipedia.org/wiki/Quicksort Shackelford R. et al 2006 Computing Curricula 2005: The Overview Report ACM SIGCSE Bulletin Volume 38, Issue 1 Schwartzman, S. (1994). The Words of Mathematics: an etymological dictionary of mathematical terms used in English. ISBN 0-88385-511-9. tefan Porubsk: Bit. Interactive Information Portal for Algorithmic Mathematics, Institute of Computer Science of the Czech Academy of Sciences, Prague, Czech Republic [Online] Available at: https://www.cs.cas.cz/portal/AlgoMath/ComputerScience/DataStructures/Bit.htm [Accessed on 24 February 2008] Unicode From Wikipedia, the free encyclopedia [Online] Available at: https://en.wikipedia.org/wiki/Unicode