Get help from the best in academic writing.

AU Employee Engagement CapraTek Leadership Team Internal Memorandum

AU Employee Engagement CapraTek Leadership Team Internal Memorandum.

Research options for measuring and addressing employee engagement issues at CapraTek and then write a 2-3 page internal memo for the leadership team to propose possible actions. Use the information in the interactive learning module to give you the scenario at CapraTek.Today’s employees have the expectation that their job will be more than a place of work where they will spend a minimum of 40 hours a week. HR professionals pay attention to all facets of the employee experience, from what it feels like to be recruited, to the step-by-step process of onboarding a new employee, and ultimately to how an employee separates from the company. The stages that employees go through during their career in your organization are known as the employee life cycle.Multiple people are responsible for ensuring employee engagement throughout the employee life cycle in an organization, including managers and HR professionals. Many organizations are measuring employee engagement via different tools and strategies because they are aware of the potential ROI (return on investment).HR professionals should anticipate a need before it actually happens in the organization, at least to the greatest possible extent. As the managers of the organization’s most valuable resource—people—even the smallest negative influences can have a major impact. Part of anticipating these needs is knowledge of employee engagement and the Gallup model of the employee life cycle. Then, HR pros need to be able to research the situation and provide leadership with options for a solution to the employee or workplace issue the organization is facing. This assessment takes the learner to the HR role, having to respond to a situation that introduces one of a group of first line supervisors who are not sufficiently engaged with their direct reports.ScenarioBe sure to read the background for this scenario in the interactive learning module for this assessment.Currently, CapraTek is experiencing what senior leaders in the organization consider poor engagement. In some cases, supervisors and managers are disconnected from their subordinates. Some leaders are being seen as insensitive to their direct reports’ professional needs and desires. Based on information gathered, gossip, and actual formal complaints, many employees say they don’t see their first line supervisors as invested in their futures, so they only focus on getting work done.Among the many supervisors at CapraTek is Karla, whose employees and others have recently approached the HR department about the lack of connection, recognition, and professional development offered from first line supervisors to employees. Karla has a history as a good supervisor; she’s quite shy and reserved and supports her employees, but she is not really engaged with them and spends way too much time in her office. She avoids making contact with her direct reports and has not nominated any of them for recognition in four years, something that every other leader in the organization does. These types of complaints have been repeated by the employees of two other supervisors in CapraTek.Alley is an HR Pro at CapraTek, responsible for the organization that Karla and her employees are part of, and she is about to attend a meeting with senior leaders. The senior leaders have been doing a lot of chatting among themselves about employee engagement. Alley wants to be ready to ask the questions she knows are coming, and she wants to have a plan of action to present to senior leaders if they ask what strategy she is planning to use to address the employee engagement challenge. The HR Pros are now in a situation where they will need to collect information from employees about their attitudes and opinions on their supervisors, managers, and the leadership overall. Exactly how this will be accomplished is a major component of this assessment.Your ChallengeAs an HR professional at CapraTek, you have been tasked with putting together an internal memo that briefly describes the employee engagement issues that have been observed and options that the leadership team could consider to address the engagement issues in advance of a meeting with the organization’s leadership team.InstructionsWrite an internal memo of approximately 2–3 pages that an HR professional could use as a reference when attending a meeting with the organization’s leadership team. Include the following in the memo:Format your paper as an internal memo that includes the following fields at the top of the page: To, From, Internal Memo: CapraTek Employee Engagement, Date.The rest of the memo can be written as a normal paper including an introduction, conclusion, and the following elements: Describe the current employee engagement situation at CapraTek as observed from the material throughout the course.Explain the stages in the employee life cycle according to the Gallup model.Explain theories of motivation that lead to organizational commitment, employee retention and employee development.Prepare a list of tools and practices that could be used to collect data about employee engagement at CapraTek. What are the actions that could address the engagement problems?Analyze what criteria would be present for you to know that employees at CapraTek are engaged and functioning as effectively as possible in the workplace. What is the ideal state of employee engagement?What would that look like in the day-to-day work of employees?Submission RequirementsThe deliverable for this assessment applies professional skills in Human Resources Management (HRM) to workplace situations which you will likely encounter in your day-to-day work in HRM. As part of your learning, we focus on the development of effective professional communication skills for the workplace.Length of paper: Your memorandum should be 2–3 double-spaced pages, including the resources page.Organization: Make sure that your assessment writing is well-organized, using headings and subheadings to organize content for the reader.Font and font size: Times New Roman, 12-point.Number of resources: A minimum of four course readings.Evidence: Support your thoughts and ideas with data and/or in-text citations. Use current APA format for in-text citations and create a reference list at the end of your documents.APA formatting: Resources and in-text citations are formatted according to current APA style and formatting.Written communication:Convey purpose, in an appropriate tone and style, incorporating supporting evidence and adhering to organizational, professional, and scholarly writing standards.Write for a specific audience, using the vernacular of the profession.Use spell-check and other tools to ensure correct spelling and grammar.Scoring Guide CriteriaCompetency 1: Apply models of employee motivation, growth, and engagement in the workplace to create the employee experience. Describe the current employee engagement situation at CapraTek.Explain the phases in the Gallup employee life cycle and theories of motivation.Competency 2: Analyze the ways in which culture, employee, and leader behavior impact strategic retention. Analyze what criteria would be present in the workplace for you to know that employees at CapraTek are engaged and functioning as effectively as possible in the workplace.Competency 4: Design practices that impact the employee life cycle and generate positive employee and organizational outcomes. Create a list of possible tools and practices from the field that could be used to assess and address employee engagement at CapraTek.Competency 5: Communicate clearly, accurately, and professionally in the Human Resource Management field. Convey purpose, in an appropriate tone and style, incorporating supporting evidence and adhering to organizational, professional, and scholarly writing standards.
AU Employee Engagement CapraTek Leadership Team Internal Memorandum

Homeland Security Department Measures in the USA Term Paper

Terrorism is a very devastating aspect that has affected the United States of America and the world at large. It is an act that is perpetrated by various terrorist groups through an assortment of means, for instance trade. For this reason, there has been a dire need to put up counterterrorism measures in an effort to deal with this issue. Homeland Security department is a very significant and esteemed body in the United States of America. Homeland Security is a term that is used to refer to security efforts and measures that are put in place by the department of Homeland Security in order to protect the different states against any form of a terrorist attack. This piece of work looks at the various aspects associated with the Homeland Security department in the U.S. with much emphasis being given to terrorism that is perpetrated through trade and the strategy that has been put in place by the department of Homeland Security in an effort to counter the terrorism. The department of Homeland Security was founded through an integration of various bodies, including the federal departments and agencies. The bodies came together into an integrated and unified department aimed at providing maximum security against all terrorism-related activities. The September 11, 2011, terrorist attack played a significant role in fuelling the formation of the homeland security department. Few days after the attack, the department was established to oversee and manage an exhaustive national strategy in an effort to safeguard the U.S against terrorism as well as responding to any attacks that could occur in future. It was however not until the Homeland Security Act was passed by Congress in November the year 2002 that the department of Homeland Security was formally recognized as a separate, cabinet-level entity/ department. It became fully operational on 1st March 2003 and its primary responsibility was ensuring security through coordinating and unifying national homeland security efforts that had been established before its formation. Currently the Homeland Security department has become a more effective and efficient department which has been able to reinforce the security enterprise hence creating a more secure America, which is more prepared in terms of fighting terrorism for instance through establishment and maintenance of appropriate equipment and strategies necessary for confronting a wide range of security threats (Stana, 2003). The Department of Homeland Security is headed by a Secretary in charge of Homeland Security who is entitled to a lot of powers and duties and is assisted by other officers for instance the director of the secret service, a chief information officer, a chief human capital officer, a chief financial officer and an officer for civil rights and civil liberties. Get your 100% original paper on any topic done in as little as 3 hours Learn More Some of the duties and responsibilities of this department involve the prevention of terrorism within the United States of America, reduction of chances of terrorist attacks in the United States and minimization of damages that may occur from terrorists’ attacks in the United States. The Homeland Security department is able to achieve the above-named functions through ensuring maximum border and transportation security, emergency preparedness and response, information analysis and protection of infrastructure, adoption of science and technology to support Homeland Security and liaising with other bodies and agencies among others. As mentioned earlier, there are various ways through which terrorism could be perpetrated and hence the need to come up with a variety of counterterrorism strategies in order to be safe. This is the duty of the department of Homeland. Trade is a sector that has been used by terrorists to carry out their dangerous ventures through the supply chain and it has, therefore, necessitated the department of Homeland Security to take appropriate measures. Terrorists can, for example, take the advantage of the supply chain to transport deadly weapons easily. To counter terrorism in the trade sector, the Homeland Security department came up with the strategy to enhance international supply chain security. This strategy was developed in response to the SAFE Act, which called for the development of strategic plan in order to promote the security of international supply chain. This was in an effort to improve the level of security by curbing the transportation of mass destruction weapons and any other materials which may threaten security in the United States. Although this strategy is deemed to be very useful, it does not totally replace the security measures that were in existence way before its establishment but instead acts as a supplement to improve the level of security in the United States. The development of this strategy is a significant achievement in the fight against terrorism. This strategy harmonizes its goals with the existing strategies in order to facilitate the realization of these goals. Supply chain security plays an essential role in promoting the general security levels in the nation. We will write a custom Term Paper on Homeland Security Department Measures in the USA specifically for you! Get your first paper with 15% OFF Learn More To achieve this, the strategy has got various programs, elements as well as initiatives that are aimed at solving problems. The security strategy also identifies the degree of risk in different areas so as to allow for appropriate measures to be taken. Identification of degree of risk also facilitates proper allocation of resources which are directed towards maintenance of security (GAO, 2008). The main purpose of this strategy was to combat terrorism in the United States. This strategy came as a result of threats of terrorism-attacks. The supply chain is one of the significant areas where terrorists can take the advantage to transport mass destruction weapons. Based on the directions by the SAFE Port Act in 2006, the Department of Homeland Security was obliged in developing and implementing a strategy to improve the security of international supply chain through the cargo supply. This strategy was meant to be integrated with the already existing measures which had been laid down to promote the security of the cargo supply. The plan was developed upon the realization that more efforts were needed to curb terrorism cases which were on the rise. It was realized that the existing strategies need to be supplemented if terrorism was to be completely eliminated in the cargo supply chain. In reality, this strategy reflected the work that had already been established by the agencies involved in the cargo supply chain. The strategy gives an outline and tactical plans associated with the already existing plans for better performance in regard to protecting the nation and its environs. The strategy has been deemed to be very significant in boosting the already existing measures so as to maximize security level in the cargo supply chain. The strategy has, for instance, contributed too much to the National Response Plan. The National Response Plan is responsible for giving directions on how the United States responds to a certain happening in terms of roles and responsibilities and communication, among other aspects. This strategy, therefore, promotes the effectiveness of National Response Plan by outlining the strategic objective of the department based on the trade recovery and supply chain security. This strategy consequently plays an important role in boosting the effectiveness of the existing measures by giving appropriate guidance which in turn facilitates appropriate course of action (Thomas, 2010). To ensure that trade security is maintained at the highest possible level, this strategy also gives the security efforts from the country from which the container originates up to the port of the United States as well as its release from the port to the area of destination within the state. This close severance ensures that there is no dangerous weapon that finds its way to the United States. Through meticulous inspection during the stuffing of the cargo as well as unloading in the United States, this strategy has significantly improved the level of security in the country. However, this strategy concentrates mostly on the cargo entering into the domestic ports. Otherwise, the trading partners are bound to come up with their appropriate measures on the cargo entering into their ports. Not sure if you can write a paper on Homeland Security Department Measures in the USA by yourself? We can help you for only $16.05 $11/page Learn More Nevertheless, there are some security measures which call for bilateral agreements between the trading partners. A good example is where the security fright initiate requires that all the trading partners involved in any trading activity come up with an agreement and comply with it. Otherwise, this strategy cannot be effective if there is no agreement between or among the partners. Another notable contribution of this strategy towards the nation’s security especially in respect to terrorism is the fact that the plan gives a description of trade recommencement efforts and provides a generalized decision hierarchy for the prioritization of vessels and cargo in case the supply chain is disrupted. This is essential as it provides guidance in the decision-making process eliminating chances of taking irrelevant measures. The fact that there have been various terrorism-attacks that have happened in the name of trade has made the existence of the strategy of enhancing international supply chain security very vital. It is a crucial counterterrorism tool based on the idea that security level in the international supply chain can only be fully realized through end to end critical examination of the cargo at strategic points. This strategy, therefore, puts more emphasis on the shipment of goods from foreign origin to the United States destinations. This strategy also promotes the measures aimed at facilitating cooperation with international trading partners in ensuring maximum security for the containers heading to the United States. Cooperation with the trading partners is vital because its support will significantly determine the effectiveness of these safety measures. In connection to this, this strategy implements initiatives to eradicate any threat to the United States ports posed by the international cargo reaching the domestic ports. This strategy also includes the protocols for resumption in case any disruption on transportation takes place. The department of Homeland Security has been appreciated for effective implementation of this strategy, an aspect that has put the United States in a better position when it comes to fighting terrorism. There are various principles that govern this strategy to ensure that it is effective. They include accurate data and information in regard to all that is involved in transport, secure cargo that eliminates chances of unwanted goods and the principle of safe transit which promotes a procedure that ensures that the cargo remains secure from the moment it enters and moves through the supply chain. This facilitates detection of any threat during transit. The strategy was developed using an approach that facilitated effectiveness and thus allowing for maximum security of the international supply chain and hence that of the nation as a whole. The fact that the cargo passes through different jurisdictions makes the facilitation of the cargo security more complicated. In some cases, cargo may pass through a number of nations which may have various jurisdictions before reaching its destination. This makes the process of maintaining cargo security more involving. Due to the differences in jurisdictions, United States, through the department of Homeland Security, liaise with the trading partners in order to assist them in enhancing the security of the cargo heading to the United States. The Department of Homeland Security is charged with the responsibility of protecting the territory of the United States from the terrorist attacks as well as the natural disasters. However, the department cannot ensure total security in the nation on its own but rather in conjunction with other bodies such as the United States Coast Guard which is charged with the responsibility of protecting the environment, public, economic and security interests in the maritime region. This includes the America’s coasts and ports as well as international wasters. The other notable body in charge of security in the nation is the Immigration and Customs Enforcement, which guards the United States borders from any form of attack (Wagner

The Sleeping Barber Problem Philosophy Essay

essay order This report includes concurrent programming and deadlocks that were created and analysed throughout the report. There are two parts that include in the report; The Sleeping Barber Problem and The Dining Philosophers. The report includes every method that was used to complete both parts; this includes explaining and describing. For my references I used a couple of websites to help me understand more about the concept. Introduction In this report I have included two parts these are as follows: The Sleeping Barber Problem The 1st part of my assignment is about a barber shop. I have written a program to simulate the use of a monitor to coordinate the operation of the barber and the client’s. The barber shop includes only one barber that works. The living room is divided into a waiting room with a fixed number of chairs and a table with comics, and a workroom where the barber cuts hair of a customer. Incidentally this work room serves as bedroom when it was not customer as our barber has the nasty habit of partying all night, so it catches up on sleep lost when the room is quiet. When a customer arrives, it opens the door to the salon. If no space is available, it remains outside. Otherwise it will sit in an empty chair. At the opening of the door chime sounds to awaken our Venetian barber if he had bitten a nap. When the barber releases a client, it does not have the right to sleep if there is room in the world. When the barber finished cutting a customer, it pays 10 francs. Then he leaves the room. The barber takes the next customer, if he goes to bed … and so on. The Dining Philosophers The 2nd part of the report is about one of Dijkstra’s more delightful contributions is his problem of the Dining Philosophers. It illustrates many of the subtle problems inherent in concurrent programming. The Sleeping Barber Problem Approach to the program and Analysis The barber shop has many different types of solutions as many different types of program languages can be used to solve the problem. I had many different types of thought, but then came to a stage and chose to use Java coding as I have more experience in this program. The threads Our program will be divided into two types of threads. On one side there will be the barber, represented by a single thread looping constantly to see if a customer expects, take care of him if necessary or when going to bed. On the other side there will be a thread per client, which simulate the “ physical” customer. He will try to return to the store, will sit if he can, will shave and disappear. While our program will have one barber, there may be as many customers as men on the planet (or at least memory space). Threads so customers will stack until the space become available in the waiting room, and then the barber takes care of them. I will now show what each the barber and customers role are inside the program: What is the barber? The thread symbolizing the barber will be unique. It will START ‘s launch, customer foremost and will loop on itself for eternity. Here’s what our barber is to spend his life on: Is there anyone in the waiting room? If so I take care of his case, if I not go to bed and have a nap When a client I do is enter the slaughterhouse; I cut hair I get my money then he leaves Obviously, when you get to the end we re-loop. This re-loop is done as many different actions are taken therefore it’s needed in Java programming. What is the customer? Here are the actions that realize the thread symbolizing each client. If there are multiple clients, identical threads will compete: I look in the salon to see if there’s room to spare. Whether I go or I expect; When I’m inside I sit on a chair I expect that the barber is free; I get up from my chair (and thus frees up) and I enter the room; I let his beard trimmed; When he finished, I pay and I get home. Read comics if seat available at waiting room Looking at the size difference between the action list of the barber and the customer, we note that the customer is more things. In fact, the customer must manage additional resources from the barber the free space in the waiting room when present at the exhibition entrance. Resources Writing and explaining how the program will be running plays a big role in having a successful program. I have to know what type of resources and the needs of the program I need to make it work perfectly. The needs: Firstly it is clear that we will have a semaphore on the number of seats available in the waiting room. It will limit the number client can find the room simultaneously. When a client is present supernumerary the thread will wait for the release of the resource (the chair). Now we must manage the sleep of the barber. We need a semaphore blocking the barber when there is no client. It must be incremented to the arrival of each client and initialized to zero. Must thread the barber and the customer have a time in common when haircuts takes place. There are a myriad of bitouilles possible, but the simplest is to have two semaphores: one for the client’s arrival, the second for his departure. Here’s how the four semaphores will be used in our virtual barber: places Number of seats available in the waiting room of the exhibition upon arrival of a client, it performs a wait on the semaphore. If the number is zero free space on his arrival, he will wait for a client releases a chair. The client makes a post when he managed to enter the room of the barber (so it rises from the chair). salle_vide The semaphore salle_vide corresponds to a value equal to the number of customers in the waiting room. it is 0 when the latter does not have any customer. The barber performs a wait on the semaphore and crashes (goes to sleep) when the room is empty. room This semaphore is initialized to 0. Any customer arriving in the waiting room waits for the release of this resource. He was released by the barber when it is ready to receive a client’s piece of work. Out The purpose of this semaphore is very similar to the previous one. The client performs a wait is over and the barber freeing this resource by a post when he finished shaving the customer. While the semaphore before the start synchronization shaving, it synchronizes the end. I will now present a summary of the evolution of each of these semaphores during the passage of a client in the salon. I guess the room is empty before it happened and that no other client comes while he is there. I do not décrierai lock operation, it is quite explicit. places salle_vide room out action initial state 8 0 0 0 exec (hand) barber lying 8 (0) 0 0 b: wait (salle_vide) arrival of a customer (8) (0) 0 0 c: wait (squares) the client asseoie 7 (0) 0 0 c: post (salle_vide) the client waits 7 0 (0) 0 c: wait (piece) Client Home 7 0 (0) 0 b: post (piece) between the customer 7 0 0 0 c: post (places) shaving client 8 0 0 (0) c: wait (outside) the barber shaves … 8 0 0 (0) b: sleep () it releases its customer 8 0 0 (0) b: post (outside) Semaphores framed by a pair of parentheses mean that wait has been done on this resource and a thread is blocked, waiting for the release of this resource. Means that the post has been taken. Program Organisatized Our program “virtual” the barber has three global variables: Four semaphores The lock to the body The value of the fund It also has two functions: proc_barbier and proc_client respectively procedures barber and client. The main program (main) deals first initialize the semaphore and lock. Then it creates the thread corresponding to the barber. It goes straight to bed since no customer has yet been created. Simulating client threads are created one by one dynamically when the user presses the I “entry”. If he lets his finger pressed the button a few seconds can quickly create a large number of clients. The results of the application are sent to standard output (stdout). Instructions for use: On a fast station this small program can quickly make mistakes. Under the Linux operating system the machine uses the kernel call clone () to create a new thread, which has the effect of creating a new process. In my tests I found (after falling asleep myself on the entry “ key”) with more than 200 client process waiting for my poor barber. There are two main methods used inside the program this includes the following; Barber; while(1) { P(Customers) //wait for C and sleep P(accessSeats) //mutexprotect the number of available seats NumberOfFreeSeats //one chair gets free V(Barber) //Bring in a C for haircut V(accessSeats) //release the mutexon the chairs ……. //here the B is cutting hair This green highlighted writing is showing the comments of the codes.} //while(1) Customers while(1) { P(accessSeats) //mutexprotect the number of available seats if ( NumberOfFreeSeats> 0 ) { //if any free seats NumberOfFreeSeats– //sitting down on a chair V(Customers) //notify the B V(accessSeats) //release the lock P(Barber) //wait if the B is busy …. //here the C is having his hair cut } else { //there are no free seats V(accessSeats)//release the lock on the seats //C leaves without a haircut } }//while(1) The Dining Philosophers The example below shows a solution where the forks are not explicitly represented. Philosophers can eat if you eat any of its neighbors. This is comparable to a system where the philosophers who cannot get the second fork must leave the first fork before they try again. In the absence of locks associated with the forks, philosophers must ensure that the decision to start eating is not based on stale information on the state of the neighbors. Eg if philosopher B sees that A does not eat, then turns and looks C, A could begin eating while B looks at C. This solution avoids this problem by using a single mutex lock. This lock has nothing to do with the holders, but with the decision procedures that can change the states of the philosophers. This is ensured by the monitor. The test procedures, collection and observation are local offensive to monitor and share a mutex lock. Note that philosophers who want to eat do not hold a fork. When the monitor allows a philosopher who wants to continue eating, the philosopher acquires again the first fork before picking up the second fork now available. When done eating, the philosopher will signal to the monitor that both forks are available now. Note that this example does not address the problem of hunger. For example, the philosopher B can wait forever if meal periods of philosophers A and C always overlap. To also ensure that no philosopher is hungry, you could keep track of the number of times that a philosopher cannot eat when hungry neighbors leave their holders. If this number exceeds some threshold, the state of the philosopher could change to Hunger, and the decision procedure for collecting holders could be increased to require that none of the neighbors go hungry. This further reduces dependence coincidence. The lifting of the threshold for the transition to the Hungry reduces this effect. In 1984, K. Mani Chandy and J. Misra proposed a different solution to the problem of dining philosophers have considered arbitrary reagents (numbered P …, P) compete for an arbitrary number of resources, unlike Dijkstra solution. Also fully distributed and does not require any central authority after initialization. However, violates the requirement that “the philosophers do not speak to each other” (due to the prompts). For each pair of philosophers who compete for a resource, create a fork and give it to the philosopher with the lower ID. Each holder may be either dirty or clean. Initially, all forks are dirty. When a philosopher wants to use a set of resources (ie eating), must obtain the holders of its neighbors that fall. When a philosopher with a fork receives a request message, keeps the fork if it is clean, but leaves when it is dirty. If you send the fork, the fork cleans before doing so. After a philosopher is done eating, all his forks become dirty. If another philosopher had previously requested one of the forks, clean the fork and sends it. This solution also has a large level of coincidence and has solved a problem arbitrarily large. It also solves the problem of hunger. The clean / dirty labels serve as a way to give preference to process more “hungry” and a disadvantage to processes that just “eat”. One might compare its solution one where the philosophers are not allowed to eat twice in a row while others use forks between. Their solution is more flexible than this, but has an element that tends in that direction. In their analysis take a tiered distribution preferred holders and their states clean / dirty. They show that this system can describe an acyclic graph, and if so, the operations in their protocol cannot convert that one cyclic graph. This ensures that the deadlock cannot occur. However, if the system is initialized to an absolutely symmetrical, like all philosophers holding their forks on the left, then the graph is cyclic in the beginning, and its solution cannot prevent a deadlock. Initializing the system so that the IDs below philosophers holders have dirty ensures that the top graph is acyclic. Implementations of a typical philosopher I will now be commenting on some of the implementations of a typical philosopher: Figure 2.2 1 typicalPhilosopher() //Name 2 { 3 while ( true ) // while loop used 4 { 5 think(); //typical philosopher is thinking 6 7 pickUpLeftFork(); //typical philosopher picks up the left fork 8 pickUpRightFork(); //typical philosopher pick up the right fork 9 10 eat(); //typical philosopher is now eating 11 12 putDownLeftFork(); //typical philosopher puts down the left fork 13 putDownRightFork();//typical philosopher puts down the right fork 14 } // end while 15 16 } // end typicalPhilosopher Figure 2.3 1 typicalPhilosopher()//Name 2 { 3 while ( true ) // while loop used 4 { 5 think();//typical philosopher is thinking 6 7 pickUpBothForksAtOnce(); //typical philosopher picks up both folks 8 9 eat();//typical philosopher is now eating 10 11 putDownBothForksAtOnce();//typical philosopher puts both folks down 12 } // end while 13 14 } // end typicalPhilosopher Figure 2.4 1 typicalPhilosopher()//Name 2 { 3 while ( true ) // while loop used 4 { 5 think();//typical philosopher is thinking 6 7 while ( notHoldingBothForks ) //while loop used so that typical philosopher can’t pick up both folks at once 8 { 9 pickUpLeftFork();//typical philosopher pick up the left fork 10 11 if ( rightForkNotAvailable ) //he picks up the left for in the previous if he hasn’t got the right fork available 12 { 13 putDownLeftFork();//typical philosopher puts the left fork down 14 } // end if 15 else //if else statement used to make it work properly 16 { 17 pickUpRightFork();//typical philosopher picks up the right for 18 } // end while 19 } // end else 20 21 eat(); 22 23 putDownLeftFork();//typical philosopher puts the left fork down 24 putDownRightFork();//typical philosopher puts the right fork down 25 } // end while 26 27 } // end typicalPhilosopher Figure 2.5 1 typicalPhilosopher() 2 { 3 while ( true ) 4 { 5 think();//typical philosopher is thinking 6 7 if ( philosopherID mod 2 == 0 )//if the remainder is not 0 it performs action if 0 then performs the action 8 { 9 pickUpLeftFork();//typical philosopher picks up the left fork down 10 pickUpRightFork();//typical philosopher picks up the right fork down 11 12 eat(); 13 14 putDownLeftFork();//typical philosopher puts the left fork down 15 putDownRightFork();//typical philosopher puts the right fork down 16 } // end if 17 else 18 { 19 pickUpRightFork();//typical philosopher picks up the right fork 20 pickUpLeftFork();//typical philosopher picks up the left fork 21 22 eat();//typical philosopher is eating 23 24 putDownRightFork();//typical philosopher puts the left fork down 25 putDownLeftFork();//typical philosopher puts the right fork down 26 } // end else 27 } // end while 28 29 } // end typicalPhilosopher As you can see from the above figure of the typical philosopher different types of condition and statements were used. These statements and conditions allow the program to implement different types of actions. Conclusion Recommendation

Declaration of Independence & US Constitution Questions

Declaration of Independence & US Constitution Questions.

Question 1 The Declaration of Independence is the most authoritative statement of the founding principles of American democracy. Identify and briefly explain five (5) basic political principles expressed in the Declaration of Independence. Question 2 Identify and discuss TWO specific examples to demonstrate that the Articles of Confederation, the first national government of the United States, established a weak and ineffective form of government.Question 3 Identify and discuss TWO specific examples to demonstrate that the Constitution which replaced the Articles of Confederation established a stronger and more effective form of government. Question 4 The design of the U.S. Congress resulted from a compromise between the large states and the small states at the Constitutional Convention. This came to be called the Great Compromise. Explain in your own words the Great Compromise.Question 5 Identify and explain the opposing positions of the Federalists and the Anti-Federalists during the debate over the ratification of the U.S. Constitution on the question of whether the national government should be more powerful or less powerful. Question 6 Explain how the addition of the Bill of Rights, the first ten amendments to the Constitution, addressed Anti-Federalist concerns about the power the national government.Question 7 At critical moments in the course of American political development, citizens engaged in conflict and resolution about the meaning of the Declaration of Independence and the Constitution. These great political episodes can be described as conservative revolutions. Define conservative revolution. Question 8 Explain how Abraham Lincoln’s efforts to steer American democracy through the crisis over slavery in the 1850s and 1860s result in a shift in understanding of individual rights or the meaning of democracy and equality.Question 9 Explain how Franklin Delano Roosevelt’s response to the Great Depression result in a shift in understanding of the proper role of government. Question 10 The Framers of the Constitution created a federal system of government. • Define federalism. • Select ONE of the following. Explain what it is and how it has been used to increase the power of the federal government relative to the power of the states. o federal mandates o the commerce clause o “strings-attached” federalism o Americans with Disabilities Act (1990) o Civil Rights Act (1964) o Clean Air (1970)
Declaration of Independence & US Constitution Questions

ECON Los Angeles Pierce College Malaysian Foreign Exchange Market Discussion

ECON Los Angeles Pierce College Malaysian Foreign Exchange Market Discussion.

I’m working on a macro economics question and need support to help me study.

Part 1- Answer the following question: What is an example of exchange rate? Explain.To post your initial discussion post, click the “reply” button at the top of the introduction thread below.Part 2- Respond to one of your class-mates on whether you agree or disagree and why.You are required to reply to at least one of you class-mates in this forum; don’t forget to complete this requirement of the activity or you will lose points.Grading Rubric:Share your answer in the discussion forum by creating a reply below the instructions. Review the rubric for information on how this assignment will be scored. Access the rubric by clicking on the three vertical dots at the top of this assignment.Total Possible Points =6 points3 points – Shared answer prior to the due date and question prompt was fulfilled3 points – One reply submitted prior to the due date and demonstrates a thoughtful response.
ECON Los Angeles Pierce College Malaysian Foreign Exchange Market Discussion

Essay Writing at Online Custom Essay

5.0 rating based on 10,001 ratings

Rated 4.9/5
10001 review

Review This Service