The use of mobile phones has become pervasive not only for social interaction but also in the day to day transactions. Tyrone Garage is a business where they are four (4) mechanics that travel around the country to repair customer vehicles 24 hours a day and also travel overseas to buy different car parts. Among the types of repair that Tyrone and his employees perform are tyre change or repair, tyre rotation, brake jobs, oil change , belt change etc . The use of nokia phones allow the mechanics to ommunicate with the garage, so they aware of where they are and can provide them with new customer information.
The phones also allow the mechanics to communicate with customers such as getting the customer directions to their location. Although the garage and mechanics will call each other on the same network, the calls to customers will be on different networks. Tyrone Garage has a monthly plan with Digicel which includes 1500 minutes a month to be split between all the mechanics phones and this is used for communication between both the arage and the customers.
Tyrone Garage employees use the nokia cell phones to set reminders of appointments that customer would have made. The nokia phones allows you to instantly check appointments you can also install an instant messaging chat “whatsapp” so you can communicate with an employee, or with the person you intend to meet at any time to confirm, clarify, or alter meeting details (e. g. location, time). This means that if meeting needs to be changed at the last minute, all parties involved can be informed quickly, even if on their way there.
Three security features of Nokia phones that are useful to employees of Tyrone Garage are: Remote locking using SMS messages or security code Remote locking allows the device lock to be activated remotely where they will be a timing set on it where it can lock on it own. The end user themselves can do this by sending an sms from another user or sms emulator as long as a remote locking code is predefined in the terminal. Remote locking code can be from 5 to 20 characters or digits.
If the device is lost the person who finds the phone still cannot activate any nformation on the phone even if they change the sim card because when they insert the new sim card and turn on the phone that person has to enter a security code before the phone is actually boot up. This feature reduces the risk of the device being stolen and increases the possibility of having the phone returned if misplaced or lost since it has the company label at the back of the phone. Call Barring This feature allows the employer to restrict all international outgoing calls from employees phone
Research (4 steps )
Research Step 1: Topic/Working ThesisGatsby by Fitzgerald, The Sun Also Rises by Hemingway, Tender is the Night by Fitzgerald, or For Whom the Bell Tollsby Hemingway. The topic is up to you, but you will be required to complete ALL of the steps of the research process
Briefly state your topic selection and write a working thesis sentence. Your thesis sentence should be the beginning of the argument that you will make about your topic. You can choose what aspect you want to focus on (for example, theme, imagery, character development, etc). You will get a chance later to revise your thesis sentence if you find that your ideas change during the research process. Ultimately, your thesis sentence that you end up with when you write the actual paper should provide a blueprint of what you want to say ABOUT those elements of the novel. Type your topic selection and working thesis
Research Step 2: Annotated BibliographyStep 2:
You are required to use at least one reputable, scholarly source, which should be an article OR a digital book chapter accessed through the library’s online databases that has been written by a scholar/expert in the fields of literature/writing or history. The use of Wikipedia, any online sources that do not list an author, or information that comes from sites that just summarize the plot and key points (like SparkNotes, Shmoop, Cliffsnotes) is NOT acceptable and should NOT be cited as a source. Suggested databases found through lib.fit.edu — JSTOR, Gale Virtual Reference Library, Literature Resource Center, Bloom’s Literature, ProQuest, Academic Search Complete.
Your Annotated Bibliography should follow MLA format. It will include the full citation for the source at the top and then a paragraph explaining what the article is about AND how you plan to use it in your paper. Follow the example linked in the file attached to see what yours should look like.
Research Step 3: OutlineStep 3:
Create an alphanumeric formal outline for your topic. Include your revised thesis statement at the top. Provide evidence from the novel and your secondary source within the outline and include in-text citations that correspond with your Works Cited page at the end of the outline.
Research Step 4: Full EssayStep 4:
For your research essay, you are required to incorporate material from your secondary source AND include quotes from the novel in your paper (properly cited) in order to fulfill the minimum requirements for the assignment.
Please note that you are expected to proofread your formal writing before submitting it. Excessive grammar errors, typos, improper citation, and formatting errors will lead to a lower grade on the assignment. All papers must conform to the conventions of academic writing and MLA format.
Parameters: 1500-2000 words with a Works Cited section at the end