Wednesday, February 24, 2010

FIN621 Paper

FIN621 Paper Fall2009 Date 24-02-2010 Stat Time 11:00 to 1:00

Total Questions: 50 Marks 82

Total MCQ,s 44 Marks 44

Total Long Questions: 6 Marks 38

1. Calculate Commen Stock and Amotoation? Marks 3

2. Caculate the Rupee and Percentage Change? Marks 5

3. This Question is write the Comment on about the Paragraph (about long)? Marks 5

4. This also a Write the Comment on the Paragraph (about long)? Marks 5

5. Calculate the Common Stock and Devident and total amount of preferred shares? Marks 10

6. Calculate the Common Share and Calculate the Preferred Shares? Marks 10

MCQs about the Ratio and debit and credit and net income.

Monday, February 22, 2010

Online Quiz Links

Online Quizs Links:

1st Semester


Principles of Marketing:
http://wps.prenhall.com/bp_kotler_pom_12/63/16220/4152510.cw/index.html

Principles of Management:

http://wps.prenhall.com/bp_robbins_management_9/0,12495,3683909--t,00.html


Biz Maths Stats a- Biz Stats:


http://wps.prenhall.com/bp_berenson_bbs_11/85/21959/5621551.cw/-/t/index.html


2nd Semester


Economics:

http://wps.prenhall.com/bp_hubbard_econ_2/85/21850/5593663.cw/index.html


http://wps.prenhall.com/bp_case_econ_8/52/13546/3467830.cw/index.html


Business Communication:


http://wps.prenhall.com/bp_bovee_bct_8/27/6966/1783510.cw/index.html


also you can consult these two books

http://wps.prenhall.com/bp_thill_ebc_7/45/11769/3013110.cw/index.html


http://www.prenhall.com/bp_bc_study_hall/

Financial Management:


http://cwx.prenhall.com/bookbind/pubbooks/wachowicz/chapter1/deluxe.html

Money & Banking:


http://wps.prenhall.com/bp_ebert_be_6/56/14384/3682354.cw/index.html


Organizational Behavior:


http://wps.prenhall.com/bp_robbins_ob_12/44/11274/2886227.cw/index.html

Cost & Management Accounting:

a- Cost Accounting:

http://wps.prenhall.com/bp_horngren_cost_12/31/8132/2082045.cw/-/t/index.html


b- Management Accounting:

http://wps.prenhall.com/bp_horngren_ima_13/19/4971/1272780.cw/-/t/index.html

http://highered.mcgraw-hill.com/sites/0077098595/student_view0/chapter1/self-test_questions.html

Entrepreneurship and Business Ownership:


http://wps.prenhall.com/bp_ebert_be_6/56/14384/3682354.cw/index.html


E-Commerce:

http://wps.prenhall.com/bp_laudon_ecommerce_4/85/21926/5613191.cw/-/t/index.html


*~*Best OF Luck*~*


Do Remember me in Your Prays....
3rd Semester

STA630 Paper

SAT630 Paper Fall2009 22-02-2010 Timing 11:00 to 1:00

Total Questions: 68

Total Marks: 92

Total MCQs: 64 Marks: 64

Total long Questions: 4 3+5+10+10 Marks: 28

Question # 1 what is basic point of executive summary of the "Interview Surveys". Marks: 3

Question # 2 What is mean by clustry? and what type of problem faceing this research? Marks: 5

Question # 3 Write the Basic Principle of Interview. Marks : 10

Question # 4 What is Termination of the interview. Marks : 10



MCQs are all the Lectures 1 to 45.

Wednesday, February 17, 2010

MGT301 GDB

I am focusing on mood or image style to execute the massage, because I think it more efficient way to enhance the product.

 This style especially based on beauty as well give the message of love.

 This also explains the sincerity of the company.

 Beautiful manner is used to make and show the people beautiful. so people try to use it in a perfect manner.

Lifestyle

I would try to exploit the fact that I can associate my product, detergent or beauty soap, with the emotions and feelings of people as any stain on clothes or blemish on face naturally arises human feelings and knowing this, I can use this feeling to attract attention for my product i.e. soap.

Scientific evidence:



Scientific evidence is a witness qualified as an expert by knowledge, skill, experience, training, or education" may testify and offer opinions in court if "scientific, technical, or other specialized knowledge will assist the tier of fact to understand the evidence or to determine a fact in issue.



Logical Reason: In this era therefore the time of science and technology people want the logical reason about every thing. If a manager can prove by using the scientific evidence that his company’s product is effective and harmless for the people then customer’s reliability increase on the product and they trying to buy it

MKT610 GDB

first of all what is Social CRM? Well, first let’s take a look at what has happened to get from CRM to Social CRM. The difference between these two is just one word, social. Social brings a new element into CRM because now instead of just dealing with data and information we are dealing with conversations and relationships. These conversations and relationships take place not just from company to consumer but also from consumer to consumer.so we can say that CRM can be a next big thing in business processes while relating broader aspects of CRM

ENG101 GDB

How would you like to see a permanent end to all of your problems?

We all have problems – and our problems only end - when we do. The only people without problems are in the cemetery. I’d like to stick around – problems and all. How about you?

No matter what problems we have to face today, there is a solution, because we have nothing to deal with but our own thoughts. As long as we think that our destiny is in the hands of other people, the situation is hopeless. We need to confront our problems with courage, boldness and action.

There’s an old Chinese saying that goes, “If you live with a problem long enough, it could eventually become a blessing.” Within every adversity in life, there is always a seed of an equivalent or greater benefit. We have to look for it - find it - and act on it.

We learn courage - when we face danger. We learn patience - when we endure suffering. We learn tenderness - when we taste pain. We learn to prize true friends – when false ones forsake us. We treasure health - when illness strikes. We learn to prize freedom - when we are in danger of losing it. Without trouble we would be like plants that have sprouted, grown, and been nurtured in the overprotected shelter of a hothouse -- too tender ever to live in the open.

How can we possibly become a strong person, if we have an easy life? The tougher it is, the tougher we have a chance to become – if we choose to fight back. Tough times never last – but toughpeople do.

When you see a highly decorated military person all dressed up with rows of battle ribbons and awards on their chest, you are looking at someone who courageously faced and conquered danger, hardships, adversities, problems, life-threatening situations, torture, injury, and heartbreak, watching their buddies die terrible deaths. These people had fortitude - the ability to endure and last. They wouldn’t quit, give up or run away. Yes there were times, I’m sure they knew, when they bit off more than they could chew, but through it all when there was doubt – they ate it up – and spit it out – the records show – they took the blows – and did it their way.

We don’t just get the sweet out of life without the bitter - we’d like to, but we don’t. The sun doesn’t always shine; sometimes there are storms, tornadoes, earthquakes, car accidents, fires and death. No one escapes theproblems of life. If it doesn’t happen sooner in life, it will happen later.

We can overcome just about any problem, obstacle, or adversity that life deals us – if we have a strong enough will. Where there is a will, there is a way. Create a “bull-dog” determination and a “burning desire,” that will eventually mow down all opposition.

Success is not measured by what a person accomplishes, but by the opposition they have encountered, and by the courage with which they have maintained the struggle against overwhelming odds.

Don’t pray for an easy life, without problems – pray to become a strong person. The higher you go in life, the more problems you will have to deal with.

CS401

[org 0x0100]
jmp start
filename1: times 128 db 0 ; 1st file name

filename2: times 128 db 0 ; 2nd file name

handle1: dw 0 ; handle for 1st file

handle2: dw 0 ; handle for 2nd file

buffer1: times 1000 db 0 ; buffer for 1st file

errorMSG: db 'file could not be opened$'

success: db 'Successfully copied$'

start: mov ch, 0

mov cl, [0x80] ; command tail length in ex

dec cx ; leave the first space

mov di, 0x82 ; start of command tail in di

mov al, 0x20 ; space for parameter separation

cld ; auto increment mode

repne scasb ; search space

je next ; if found, proceed

jmp problem ; proceed to error printing

next: push cx ; save origional cx

mov si, 0x82 ; set si to start of param

mov cx, di ; set di to end of param

sub cx, 0x82 ; find param size in cx

dec cx ; excluding the space

mov di, filename1 ; set di to space for filename1

rep movsb ; copy filename there

mov byte [di], 0 ; terminate filename with 0

pop cx ; restore original cx

inc si ; go to start of next filename

mov di, filename2 ; set di to space for filename2

rep movsb ; copy filename here

mov byte [di], 0 ; terminate filename with 0

mov ah , 0x3d ; service 3d - open file

mov al, 0 ; read-only mode

mov dx, filename1 ; address of filename

int 0x21 ; DOS service

jnc open ; if no error, proceed for file2

jmp problem ; proceed to error printing

open: mov [handle1], ax ; save handle for first file

push cx ; save cx register

mov cx, 0 ; open file with normal attributes

mov ah, 0x3c ; service 3c - create file

mov dx, filename2 ; address of filename

int 0x21 ; DOS service

pop cx ; restore ex register

jnc store ; if no error, proceed

jmp problem ; proceed to error printing

store: mov [handle2], ax ; save handle for second file

readloop: mov ah, 0x3f ; service 3f - read file

mov bx, [handle1] ; handle for file to read

mov cx, 1000 ; number of bytes to read

mov dx, buffer1 ; buffer to read in

int 0x21 ; DOS service

jnc write ; if no error, proceed

jmp problem ; proceed with error printing

write: test ax, ax ; are zero bytes read?

jz succeeded ; yes, operation completed

mov ah, 0x40 ; else, service 40 - write file

mov bx, [handle2] ; handle for file to read

push cx ;save cx register

mov dx, buffer1 ; buffer to write

int 0x21 ; DOS service

jc problem ; error in writing?

pop cx ; restore cx

cmp ax, cx ; more bytes to read?

je readloop ; yes, start with next byte



succeeded:

mov dx, success ; select success message

jmp exit



problem:

mov dx, errorMSG

exit: mov ah, 9 ; service 9 - output message

int 0x21 ; DOS service

mov ah, 0x3e ; service 3e - close file

mov bx, [handle1] ; handle of file1 to close

int 0x21

mov ah, 0x3e ; service 3e- close file

mov bx, [handle2] ; handle of file2 to close

int 0x21

mov ax, 0x4c00 ; terminate program

int 0x21 ; DOS service

Tuesday, February 16, 2010

FIN623

THE ONE YOU HAVE WAS ALSO MADE BY ME AND NOW SEE THIS I HAVE DONE SOME AMENDMENTS BECAUSE A KIND FRIEND DRAW MY ATTENTION TO THE SEC 21 REGARDING DEDUCTIONS SO I CHANGED IT A BIT NOW I HAVE MADE THIS ONE PLEASE SEE AND COMMENT AND DO REPLY I HAVE NOT YET POSTED OK.
Tax Payer: National Co ltd

Residential Status: Resident Company

Revenue Account as Submitted by Co.
Tax Year: 2009

NTN: 00000
Administration Expenses

1,372,000.00
Gross Profit
4,602,000.00
Rents and rates
87,000.00
Dividend
47,500.00
Auditor’s Fee
34,000.00
Bad debts recovered
4,000.00
Bad debts
11,000.00
Income tax refund
14,000.00
Contribution to Provident Fund
72,800.00
Depreciation
190,000.00
Fire insurance premium
48,000.00
Interest on long-term loans
247,500.00
Legal charges
93,700.00
Reserve for taxation
393,000.00
Stationary expenses
40,000.00
Underwriting commission
14,500.00
Vehicles repairs & maintenance
188,200.00
Net profit
1,875,800.00
4,667,500.00
4,667,500.00
Computation of tax payable
Net profit as computed by company
1,875,800.00
Bad debts recovered allowed
(4,000.00)
Custom duty paid
(36,000.00)
Contribution to Provident Fund
(72,800.00)
Additions by Taxation Officer on account of inadmissible expenses:
Depreciation
190,000.00
Legal charges
93,700.00
Bad debts unaccepted (11000-8000)
3,000.00
Taxable income
2,049,700.00
tax payable . 35%
717,395.00
If any one have the solution or have done part of it please share so we can discuss further. i have received a bit of solution from previous mail thread but i have still doubts though person posting also was not sure, here it is:

Tax Payer:National Co ltd
Resident Company
Revenue Account as Submitted by Co.Tax Year: 2009
NTN: 00000
Computation of tax payable
Net profit as computed by company 1,875,800.00
Less income tax refund (14,000.00)
Bad debts recovered allowed (4,000.00)
Custom duty paid (36,000.00)
Contribution to Provident Fund (72,800.00)
Additions by Taxation Officer on account of inadmissible expenses:
Depreciation 190,000.00
Legal charges 93,700.00
Bad debts accepted 8,000.00
taxible income 2,040,700.00
tax payable =2040700*0.35 714,245.00

PHY301 GDB

Bipolar junction transistor

BJT redirects here. For the Japanese language proficiency test, see Business Japanese Proficiency Test.

A bipolar (junction) transistor (BJT) is a three-terminal electronic device constructed of doped semiconductor material and may be used in amplifying or switching applications. Bipolar transistors are so named because their operation involves both electrons and holes. Charge flow in a BJT is due to bidirectional diffusion of charge carriers across a junction between two regions of different charge concentrations. This mode of operation is contrasted with unipolar transistors, such as field-effect transistors, in which only one carrier type is involved in charge flow due to drift. By design, most of the BJT collector current is due to the flow of charges injected from a high-concentration emitter into the base where they are minority carriers that diffuse toward the collector, and so BJTs are classified as minority-carrier devices.

ENG201

Here is the solution of quiz 1 eng

1. There are three choices in this life; be good, get good or give up.

2. How wonderful this news is!

3. Levin wanted friendship and got friendliness. He wanted steak and they offered spam.

4. Where are you going right now?

5. Our labors in life; learning, earning and yearning are also our reasons for living.

And Just help u for quiz 2 dont copy paste ok

Listening Skill
We hear - often without listening - when sound waves strike our eardrums. When we don't remember what we have heard, it is probably because we did not listen. A good example is the situation that frequently occurs when we are introduced to a new employee or a new acquaintance. A few minutes later we can't recall the person's name. Why? Because we probably failed to listen to the name when we were introduced.



Johnson defines listening as "the ability to understand and respond effectively to oral communication." Thus, we can state at the outset that hearing is not listening. Listening requires more than hearing; it requires understanding the communication received. Davis states it this way: "Hearing is with the ears, but listening is with the mind'."

Some of the attributes of a good listener are as follows:

* He usually makes better decisions because the inputs he receives are better;

* He learns more in a given period of time, thereby saving time; and

* He encourages others to listen to what he says because he appears more attentive and better mannered.

The typical listener, after 2 weeks can remember only 25 percent of what he has heard in a briefing or a speech. Therefore, listening is not effective for receipt and retention of factual details. For retention of factual details we must place our dependence on the written word.

Researchers have discovered that we can improve our listening comprehension about 25 percent. Most of us process the sender's words so fast that there is idle time for us to think about the message while it is being given. During this idle time a good listener ponders the sender's objectives, weighs the evidence being presented, and searches for ways to better understand the message. It follows that good listening can be considered "a conscious, positive act requiring willpower."

The ability to listen more effectively may be acquired through discipline and practice. As a listener you should physically and mentally prepare yourself for the communication. You must be physically relaxed and mentally alert to receive and understand the message. Effective listening requires sustained concentration (regardless of the length of the message), attention to the main ideas presented, note-taking (if the conditions are appropriate), and no emotional blocks to the message by the listener. You cannot listen passively and expect to retain the message. If you want to be an effective listener, you must give the communicator of the message sufficient attention and make an effort to understand his viewpoint.

There are 3 types of listening.

1. Content Listening

2. Critical Listening

3. Active Listening

There are several resins to improve effective listening. According to Tortoriello, some of these barriers are as follows:

* Recognizing that a personal risk is involved. Our thoughts and ideas might be changed in some way. Any change is threatening. . . initially;

* Listening for only those things that are relevant to our own goals and objectives;

* Listening for only those things that serve to satisfy our own needs;

* Casting aside those things that don't conform to our own models of the world; and

* Filtering the thoughts and ideas of the sender according to our frame of reference attitudes, beliefs, expectations, and relationship to the sender of the message.

Have you raised these barriers? Is the message coming directly to you without passing through some fine filters you have placed in the communications loop?

Are you an effective (good) listener? Do you listen intently and try to understand what the sender means? Do you try to put your understanding of the message in your own words and feed back what you feel the communicator meant - without adding to or deleting anything from the message?

If so, you will reach a better understanding with the originator of the message. Are you willing to enter the communicator's world for a few moments and share his experiences through intensive listening? By so doing, you can become an effective listener and convey a great kindness to him. At that point, you have taken a positive step toward improving your ability to communicate with others.

This is just your help for understaning question ok not copy.

There are three choices in this life; be good, get good or give up.

How wonderful this news is!

Levin wanted friendship and got friendliness. He wanted steak and they offered spam.

Where are you going right now?

Our labors in life; learning, earning and yearning are also our reasons for living.

IT430 Quiz

Fee for Transaction Models include
Select correct option:


Travel Agents and Insurance brokers
Automobile Sales and event tickets
Stock brokers and online banking
All of the above



Which one of the followings is an example of Banner advertising?

Select correct option:


Branding
Affiliate programs
Partnership
All of these



Question # 3 of 10 ( Start time: 12:37:26 PM ) Total Marks: 1

Log files consist on information about each visitor's _________.

Select correct option:



Location

IP address

Time of visit

All of above


Question # 4 of 10 ( Start time: 12:39:08 PM ) Total Marks: 1
In which type of approach, we further dig the data for retrieving information from data warehouse?

Select correct option:

Slice
Dice
Drill down
Roll up
Question # 5 of 10 ( Start time: 12:40:48 PM ) Total Marks: 1

Dividing potential customers on the basis of variables such as social class, personality, or lifestyle is called____________.

Select correct option:

Demographic Segmentation

Geographic Segmentation

Psychographic segmentation

Behavioral segmentation



Question # 7 of 10 ( Start time: 12:44:30 PM ) Total Marks: 1

If a company's marketing stretegy is focusing on customers having age less than 30, which of the following marketing segmentation technique is being used by company?

Select correct option:


Demographic Segmentation

Geographic Segmentation

Psychographic segmentation

Behavioral segmentation


Question # 8 of 10 ( Start time: 12:45:07 PM ) Total Marks: 1

Which of following marketing campaigns are cheap an effective way to target potential customers?

Select correct option:


Sale forces

E-mail

Media promotion

Marketing software


Question # 9 of 10 ( Start time: 12:45:58 PM ) Total Marks: 1

OLAP stands for……………

Select correct option:

Online Analytical Program

Online Analytical Processing

Online Application Program

Online Analysis Performance

Question # 10 of 10 ( Start time: 12:46:36 PM ) Total Marks: 1

Press release can provide information about current events and news to, which of following, via a internet?

Select correct option:


Print media

T.v commercial

Press or media

T.v program.

ECO403 Quiz

Final goods and services" are those that are:


Select correct option:
Double counted in the calculation of GDP.
Sold to ultimate or final purchasers.
Produced outside the country.
Used in the production of other goods and services.



Flexible exchange rates have the benefit of:

Select correct option:
Changing as the price levels and interest rates between countries change.
Being under the full control of the government.
Making international transactions easier and cheaper.
None of the given options.



A government wishing to reduce the level of unemployment through the use of fiscal policy would be most likely to:

Select correct option:
Boost the money supply by relaxing credit controls.
Cut interest rates.
Increase the size of the budget deficit.
Encourage a depreciation of the exchange rate.



The short run consumption function has:

Select correct option:
Rising Average Propensity to Consume.
Falling Average Propensity to Consume.
Constant Average Propensity to Consume.
First rising then falling Average Propensity to Consume.



All models of aggregate supply predict:

Select correct option:

An upward-sloping SRAS curve.
A vertical LRAS curve.
That the actual level of output is equal to its natural rate in the long run.
All of the given options.


Okun’s law states a relationship between the GDP gap and the:

Select correct option:
Trade deficit.
Government budget deficit.
Actual and expected inflation rate.
Actual unemployment rate and the natural rate of unemployment.



A common misperception about inflation is that it reduces real wages; this is:

Select correct option:
True only in the short run.
True only in the Long run.
True only in Command economies.
None of the given options.



Which of the following is TRUE regarding Constant returns to scale?

Select correct option:

Output doubles when the amounts of all factor inputs double
Output remains constant over time
The marginal productivity of labor equals the marginal productivity of capital
The marginal products of capital and labor do not change


In a poor country:

Select correct option:


The supply of capital is low.
The demand for capital is low.
Both the supply of and demand for capital are low.
None of the given options.


Trade restrictions have no effect on income under floating exchange rates because:

Select correct option:

Net exports increase but investment decreases.
The exchange rate rises to offset the initial increase in net exports.
The fall in imports equals the rise in exports.
All of the given optio

MGT613

MGT613 GDB Solution:
Problems Tools


1 A manager wants to display a wall chart in the meeting room to help identifying the processes and facilities flow. Flow chart

2 A manager needs to check the rate of occurrence (central tendency and dispersion of data) of a particular quality problem found in the assembly line over a period of time. Histograms

3 Reason of a variation in the diameter of yarn might be due to the mechanical fault and raw material. Manager wants to know the relationship between these variables to see which one has a strong correlation with the problem. Statistical process control (SPC)4 Operations manager of an Airline wants to identify all the possible causes of delays in flight. Scatter diagram

5 The causes of flight delays are identified and the operations manager wants to decide which problem should be addressed first. Cause and Effect Diagram

MTH101

MTH101 Assignment Solution:

Download the link: http://sharecash.org/download.php?file=405254

2nd link: http://filesanywhere.com/fs/v.aspx?v=8970638958656da69fab

CS402

CS402 Assignment Solution:

Download the link: http://sharecash.org/download.php?file=405253

2nd link: http://filesanywhere.com/fs/v.aspx?v=89706389586475b96f98

MTH301

MTH301 Assignment Solution:

Download the link: http://sharecash.org/download.php?file=405252

2nd link: http://filesanywhere.com/fs/v.aspx?v=89706389586473a5acab

Monday, February 15, 2010

CS001

Q1. Compare the following with examples.
1. Active and Inactive window

When you are doing more than one thing at a time on your computer, you have different windows on the desktop showing you what you are doing. The one you are using at that very moment is the 'Active' window, and all of the others are the 'inactive' windows
2. File and Folder

File or folder is other terms used for file folders, but file folders is a common name for the item in the United States. Manila folders are likely the most common, but file folders come in many different forms. In the United States, letter and legal sizes are common.
3. Resizing and restoring window

Resizing and restoring windows are similar but different tasks.

Resizing a window is likely self explanatory - you can make the window larger or smaller, and you can resize the window vertically, horizontally, or a combination of the two.

Restoring windows, however, does not allow you to do the same thing. Restoring the window reverts the window to its previous location and size if you have either minimized or maximized the window.
4. Folder tree and Window explorer

Folder tree

A folder tree with support for drag and drop. Rearrange the nodes in the tree by dragging and dropping them like you do with folders in a file manager or in a mail program (Outlook, Thunderbird etc.). Ajax is used to send the new structure to the server.

Window explorer

Is a file manager application that is included with releases of the Microsoft Windows operating system from Windows 95 onwards It provides a graphical user interface for accessing the file systems. It is also the component of the operating system that presents the user interface on the monitor and enables the user to control the computer. It is sometimes referred to as the Windows Shell, or simply “Explorer”.
5. Shutting down and Restarting computer

shutting down turns it off unstill you turn it back on

restarting turns it off for a few seconds then automatically turns it back on
Q2. What is system tray? What is its use?

In Windows the System tray is usually found on the right hand side of the taskbar bar. It contains icons like the clock, volume adjuster, networking connection, antivirus. Programs that tend to always be running sit in here and don’t take up room on the normal taskbar.

Messages can pop up from here as well saying things are out of date and need updating, or you have lost your network connection.

To adjust some of the settings in Vista you can right click the task bar, click properties, click notification area

STA301

STA301 Assignment # 7 Solution:

Word Formate Solution:

Download the link: http://sharecash.org/download.php?file=401733

2nd link: http://filesanywhere.com/fs/v.aspx?v=897063885a6570adb1ad 

Sunday, February 14, 2010

MGT613 GDB

Following are some of the quality problems that operations managers often have to face regardless a manufacturing or a service organization. You are required to identify which quality improving tool would be helpful in determining their problems exactly and provide a clear picture of the scenario:

First one is done for you.
Problems
Tools
1
A manager wants to display a wall chart in the meeting room to help identifying the processes and facilities flow.
Flow chart
2
A manager needs to check the rate of occurrence (central tendency and dispersion of data) of a particular quality problem found in the assembly line over a period of time.
3
Reason of a variation in the diameter of yarn might be due to the mechanical fault and raw material. Manager wants to know the relationship between these variables to see which one has a strong correlation with the problem.
4
Operations manager of an Airline wants to identify all the possible causes of delays in flight.
5
The causes of flight delays are identified and the operations manager wants to decide which problem should be addressed first.

HRM611

Answer:


I Like Friends who are:

Yes it is s fact that Man is a social animal and he needs some friends for living and to enrich the social life people make friends. Some people make friends who are similar to them and some make different from them. It all depends on their nature. I will prefer friends for myself that are similar to me.

Reason of choosing such type friends:

According to my point of view to make similar friends I will prefer generally the following reasons for making such type of friends which are as under:

 Same way of thinking.

 Say way to reach out a solution

 Quickly resolving style for problems.

 Same way of judging.

 In fact same liking of hobbies.

 Same way of calibrating anything.

 Same mutual aspects in the society.

 Well aware abut each other.

 Same Negatives and Positives aspects for decision.



COMPARISON

Friday, February 12, 2010

HRM624

Question # 1
What is the importance of cooperation in the workplace environment with the relevance of conflict management?
Answer

We can define the cooperation in the work place as

“Cooperation is our aim in our lives, to help others achieve things not only for peace but for the advancement of human society. In order for it to work you must devote a large part of yourself - without greed and jealousy - to fulfilling work which aims to help the world.”

Importance of cooperation in the work place

To achieve something, we need to cooperate so that we achieve what we are trying to do. If we don't talk to each other and you want to tell someone something, it doesn’t get done, does it? If people do what they say they will do then it gets done.

In the workplace, you are likely to find two forms of conflict. The first is conflict about decisions, ideas, directions and actions. The second form, "personalized conflict" is often called a personality conflict.

Workplace conflict is commonplace, but managers who can incorporate certain types of conflict management strategies that work will soon be able to achieve their goals and minimize disruptions. Managers will successfully eliminate conflicts and turn the situation into a problem-solving opportunity that will ultimately benefit the entire office. Collaboration is one of the conflict management strategies, this conflict management strategy is considered one of the most successful, but it needs the right environment to work.

Cooperation leads to productivity, "team morale", and a generally good working atmosphere. Cooperation is a necessity for resolving a conflict/may build an environment of peace. Cooperation comes firstly from within us. In order for it to work you must devote a large part of yourself - without greed and jealousy - to fulfilling work which aims to help the others. To achieve something if you are part of a team, of any kind we need to cooperate so that we achieve what we are trying to do.

Question # 2
What do you think is there any danger to employees in a move to increase
Work place cooperation?
Answer

Yes I think there are different dangers for the employees in a move to increase work place cooperation

There are following dangers that can be face to a employee in a work place cooperation

It is a sad fact that, increasingly, employees face hostility from clients or the general public, often this can become a dangerous situation, especially if the situation or circumstance is Miss-interpreted by either party.

Such situations can very quickly escalate with either party exposed to an act of violence and the subsequent of legal implications is the thing that is must be acted on such.

These occurrences very often occur as part of the job role or whilst executing the job itself. As a consequence the employer, under the Health & Safety Act, must make provision for staff training to eliminate or reduce the possibility of work related violence

The Heath and Safety at Work Act imposes the requirement that the workplace must be safe: Employers have a legal duty to ensure the work place and environment is safe.

Employee and employer must recognize that the work role can sometimes be dangerous.

The Health and Safety Executive defines work related violence as anis assault or threat which occurs while the victim is/was working and was perpetrated by a member of the public.

This Code is intended to focus the Board and each Director on areas of ethical risk, to provide guidance to Directors to help them recognize and deal with ethical issues, to provide mechanisms to report unethical conduct, and to help to foster a culture of honesty and accountability. Here it has some steps as conflict of interest, corporate opportunities, confidentiality, fair of dealing, protection and proper use of corporation assets, compliance with law, rules and regulations

Question No 3
in your opinion what type of steps the management of the organizations might be
Taken to protect the interests of workers while facilitating an environment of
Cooperation?
Answer:

By having a solid program in place, it will help to protect you and your organization. Below are some steps you can take to develop and implement an exemplary disciplinary action program.

Although some states can terminate an employee “at will,” (with or without a reason), it is still important to have clear and concise disciplinary policies and procedures in place.

Ensure that upon hire, new employees read all of the organization’s policies and procedures (regular and personnel). To verify this, have them sign and date a form stating that they read and understand all policies and procedures.



Your procedures should contain verbal and written warnings to the employee. When an employee violates a policy or procedure, talk to him first to ensure he is aware of and understands the violation

 If the employee violates the policy or procedure again, issue a written warning. As with the verbal warning, documentation should include what the violation was, the date it was committed, and what was discussed to re
Red Zone organizations are made up of individuals who are short on “Green Zone” qualities such as trust, optimism, and goodwill. When a project fizzles or fails in a Red Zone workplace, people turn to shame and blame—focusing not on what went wrong, but on who did wrong.

A Red Zone organization isn’t a fun place to work. People aren’t excited to be there. Most everyone favors victory over solutions. And they waste more time and energy on self-preservation than they spend on bottom-line priorities.

To stand a chance of keeping their stars, Red Zone organizations often dangle carrots such as bigger-and-better pay, perks, or bennies. Still, productivity and morale suffer because Red Zone attitudes fog the corporate culture.

A Green Zone environment, in contrast, is a fun place to work. Employees work together to pursue a shared vision. They value collaboration and get the job done with a strong sense of teamwork and excellence.

Sure, Green Zone qualities can’t save a company that makes lousy products or offers crummy customer service. Yet, studies show when all else is equal, Green Zone organizations enjoy long-term profitability and growth, while their Red Zone counterparts suffer in all areas. Some companies even

So can Red Zone organizations move into the Green Zone? And can employees at all levels learn to collaborate? Absolutely!. Collaboration isn’t magic. It’s a mind-set and a skill-set—both of which can be learned—that can make a big difference to a company’s bottom line.

I don’t think that corporation can be dangerous to employ to increase workplace cooperation. Cooperation at work place creates a .Responsive and pleasant environment for the employees which lead to enhanced Performance and decreased conflicts at the work place

ACC501 GDB

Market value of a firm is determined by below ratios. By calculating them we can see that XYZ's capital strcuture is more efficient that that of ABC


1. Earnings per share of XYZ is = EPS=Retained earnings/No of Shares = 200,000/85,000 = Rs 2.35

Earnings per share of ABC is =EPS = Retained earnings/No of Shares = 250,000/140,000 = Rs 1.78

2. Book Value per share = Common equity/shares outstanding

XYZ BV= (850,000+320,000+200,000)/85000= Rs 16.11

ABC BV = (1400,000+500,000+250,000)/140,000=Rs 15.35

3. Market price to Book value Ratio = Market value per share/BV per share

XYZ M/B = 15/16.11= 0.93

ABC M/B = 12/15.35 = 0.78

PAK301 GDB

"*PAK301 GDB Idea Solution"**The only functioning institution of Pakistan has been the judiciary.

Practically, they made Musharraf run away from the country. They are
inquiring about the hundreds of people found missing. Many of these people
were handed over by Musharraf to USA for money. Each time he surrendered
some Pakistanis to USA, he was paid. Now that the CJ of the Supreme Court is
investigating the matter, Musharraf ran away from the country. As long as
the current CJ is serving, Musharraf will not return to Pakistan.
Judiciary appears to be doing its work without fear. It is the executive,
which is running away from its responsibility. The confrontation may make
their democratic institutions stronger ultimately, I think.*

Thursday, February 11, 2010

IT430

IT430 Assignment#5 Solution…
Provided By
About Virtual University:
- 1) The Virtual University, Pakistan’s first University based completely on modern
Information and Communication Technologies
-2) The Virtual University allows students to follow its rigorous programs regardless
of physical location
-3) By identifying the top professors of the country, regardless of their institutional
affiliations, and requesting them to develop and deliver courses, the Virtual
University aims at providing the best courses not only to its own students but also
to students of all other universities in the country.
SWOT ANALYSIS of Virtual University.

ENG301

ENG301 Assignment Solution….

Mr. Ali Akbar

Cupola Pakistan Ltd

87-A Gulberg

Lahore

Date

12-Jan-10

Dear Mr. Ali Akbar

I am writing to apply for the programmer position advertised in the Times Union. As

requested, I am enclosing a completed job application, my certification, my resume and

three references.

The opportunity presented in this listing is very interesting, and I believe that my strong

technical experience and education will make me a very competitive candidate for this

position. The key strengths that I possess for success in this position include:

I have successfully designed, developed, and supported live use applications

I strive for continued excellence

I provide exceptional contributions to customer service for all customers

With a MBA degree in Marketing, I have a full understanding of the full life cycle of

Customer Relationship in the market and also have experience in learning and excelling

at new creation of relation with customer.

Please see my resume for additional information on my experience.

I can be reached anytime via email at aqeelhanjragem1986@gmail.com or my cell phone,

0333-4002185

Thank you for your time and consideration. I look forward to speaking with you about

this employment opportunity.

Sincerely,

CS507

CS507 Assignment#6 Solution….
QNo#1



Q2. What is the difference between Cold sites, Warm sites and hot sites? Explain it in your own words.
There are three different types of backup sites:
Cold backup sites
Warm backup sites
Hot backup sites

Obviously these terms do not refer to the temperature of the backup site. Instead, they refer to the effort required to begin operations at the backup site in the event of a disaster.

Difference between cold site, warm site & hot site:

A cold backup site is little more than an appropriately configured space in a building. Everything required to restore service to your users must be procured and delivered to the site before the process of recovery can begin. As you can imagine, the delay going from a cold backup site to full operation can be substantial.
Cold backup sites are the least expensive sites.

A warm backup site is already stocked with hardware representing a reasonable facsimile of that found in your data center. To restore service, the last backups from your off-site storage facility must be delivered, and bare metal restoration completed, before the real work of recovery can begin.

Hot backup sites have a virtual mirror image of your current data center, with all systems configured and waiting only for the last backups of your user data from your off-site storage facility. As you can imagine, a hot backup site can often be brought up to full production in no more than a few hours.

A hot backup site is the most expensive approach to disaster recovery.
Backup sites can come from three different sources:
Companies specializing in providing disaster recovery services
Other locations owned and operated by your organization
A mutual agreement with another organization to share data center facilities in the event of a disaster

Each approach has its good and bad points. For example, contracting with a disaster recovery firm often gives you access to professionals skilled in guiding organizations through the process of creating, testing, and implementing a disaster recovery plan. As you might imagine, these services do not come without cost.
Using space in another facility owned and operated by your organization can be essentially a zero-cost option, but stocking the backup site and maintaining its readiness is still an expensive proposition.

Crafting an agreement to share data centers with another organization can be extremely inexpensive, but long-term operations under such conditions are usually not possible, as the host's data center must still maintain their normal production, making the situation strained at best.
In the end, the selection of a backup site is a compromise between cost and your organization's need for the continuation of production.

FIN622

FIN622 Problem No: 2 Solution

Working:
No. of orders=required Units/Order quantity

= 200000/200000= 1 order
= 200000/150000=1.333 orders

= 200000/100000=2 orders

= 200000/50000= 4 orders

= 200000/20000= 10 orders

= 200000/10000= 20 orders

Ordering cost =Number of orders x Cost per order

Order size of 200000 = 1*50= 50

Order size of 150000 = 1.333*50

= 66.5Order size of 100000 = 2*50

= 100Order size of 50000 = 4*50

=200Order size of 20000 =10*50

=500Order size of 10000 = 20*50= 1000

Carrying cost = Average ordering quantity x Carrying cost per unit

Order size of 200000 = 100000*.06= 6000

Order size of 150000 = 75000*.06= 4500

Order size of 100000 = 50000*.06= 3000

Order size of 50000 = 25000*.06= 1500

Order size of 20000 = 10000*.06= 600

With order size of 10000 = 5000*.06= 300

(b) What kind of trends do you find in ordering costs and carrying costs while decreasing the order size?There is negative trend in ordering and carrying cost.(c) Which order should be placed by Mr. Saleem according to the table and why?Mr. Saleem should place an order of 20,000 books .Because at this point there is EOQ. and total cost is minimum.And also RU/EOQ =200000/18257.42 (10 order approximately) (d) Calculate economic order quantity. Is your answer consistent

with your findings in part (a).Solution:EOQ =2xRUxOCUC x CC%= 2*200000*50/.06=333333333.33EOQ = 18257.42

Wednesday, February 10, 2010

STA301

STA301 Assignment # 6 Solution:
Word Formate:
Download the link: http://www.filesanywhere.com/fs/v.aspx?v=896f6b8f5c657275a4

MGT502

Its just for idea
Questions:1. In the above scenario which negotiation perspective has been used(distributive/ integrative)? Give logical reasons to support your answer. (5marks)
Answer:
In this case the bargaining is distributive because in this bargaining one’s tactics focus on trying to get one’s opponent to agree to one’s specific target point or to get as close to it as possible. As you see the CEO of the company did the same thing, the CEO of that company decided to decrease the average salary from 3 million per year to 2.2 million per year which is almost 28 percent decrease. In this case CEO focus on trying to get his opponent to agree on specific target (28% decrease in salary) and in the last he offer them 27% and bring them on no win situation. Distributive bargaining leaves one party a loser. It tends to build animosities and deepens divisions
2. What factors do you believe lead to the lack of settlement in the negotiationof New Horizons? (5 marks)
Answer:
In this case the negotiation should be better if both parties are open with information and sincere about the conflict, understanding that if they unbending on there point of conflicts the lost of the company and the labors. They should trust one another and enthusiasm to maintain flexibility in negotiation.Determine CEO and the LABORS side’s Best Alternative to a Negotiated Agreement is (BATNA) if BATNA determines the lowest value acceptable to CEO/LABORS for disgreement. Any offer you receive that is higher than your BATNA is better than an impasse

CS610 GDB

CS610 GDB Solution:

Optical fiber can be used as a medium for telecommunication and networking because it is flexible and can be bundled as cables. It is especially advantageous for long-distance communications, because light propagates through the fiber with little attenuation compared to electrical cables. This allows long distances to be spanned with few repeaters. Additionally, the per-channel light signals propagating in the fiber have been modulated at rates as high as 111 gigabits per second by NTT,[14][15] although 10 or 40 Gb/s is typical in deployed systems.[16][17]Each fiber can carry many independent channels, each using a different wavelength of light (wavelength-division multiplexing (WDM)). The net data rate (data rate without overhead bytes) per fiber is the per-channel data rate reduced by the FEC overhead, multiplied by the number of channels (usually up to eighty in commercial dense WDM systems as of 2008). The current laboratory fiber optic data rate record, held by Bell Labs in Villarceaux, France, is multiplexing 155 channels, each carrying 100 Gb/s over a 7000 km fiber.[18]For short distance applications, such as creating a network within an office building, fiber-optic cabling can be used to save space in cable ducts. This is because a single fiber can often carry much more data than many electrical cables, such as Cat-5 Ethernet cabling.[vague] Fiber is also immune to electrical interference; there is no cross-talk between signals in different cables and no pickup of environmental noise. Non-armored fiber cables do not conduct electricity, which makes fiber a good solution for protecting communications equipment located in high voltage environments such as power generation facilities, or metal communication structures prone to lightning strikes. They can also be used in environments where explosive fumes are present, without danger of ignition. Wiretapping is more difficult compared to electrical connections, and there are concentric dual core fibers that are said to be tap-proof.[19]Complete Artical can be viewed at the link given belowhttp://en.wikipedia.org/wiki/Fiber_optics

CS610 GDB

CS610 GDB Solution:

Optical fiber can be used as a medium for telecommunication and networking because it is flexible and can be bundled as cables. It is especially advantageous for long-distance communications, because light propagates through the fiber with little attenuation compared to electrical cables. This allows long distances to be spanned with few repeaters. Additionally, the per-channel light signals propagating in the fiber have been modulated at rates as high as 111 gigabits per second by NTT,[14][15] although 10 or 40 Gb/s is typical in deployed systems.[16][17]Each fiber can carry many independent channels, each using a different wavelength of light (wavelength-division multiplexing (WDM)). The net data rate (data rate without overhead bytes) per fiber is the per-channel data rate reduced by the FEC overhead, multiplied by the number of channels (usually up to eighty in commercial dense WDM systems as of 2008). The current laboratory fiber optic data rate record, held by Bell Labs in Villarceaux, France, is multiplexing 155 channels, each carrying 100 Gb/s over a 7000 km fiber.[18]For short distance applications, such as creating a network within an office building, fiber-optic cabling can be used to save space in cable ducts. This is because a single fiber can often carry much more data than many electrical cables, such as Cat-5 Ethernet cabling.[vague] Fiber is also immune to electrical interference; there is no cross-talk between signals in different cables and no pickup of environmental noise. Non-armored fiber cables do not conduct electricity, which makes fiber a good solution for protecting communications equipment located in high voltage environments such as power generation facilities, or metal communication structures prone to lightning strikes. They can also be used in environments where explosive fumes are present, without danger of ignition. Wiretapping is more difficult compared to electrical connections, and there are concentric dual core fibers that are said to be tap-proof.[19]Complete Artical can be viewed at the link given belowhttp://en.wikipedia.org/wiki/Fiber_optics

CS403

CS403 Assignment Solution:
CREATE TABLE IF NOT EXISTS ‘Customers’ (

‘ Customer_No’

int (8) unsigned NOT NULL AUTO_INCREMENT,

‘ First_Name ‘ varchar (32) NOT NULL,

‘ Last_Name’

varchar (32 ) NOT NULL,

‘ Address’

varchar (100 ) NOT NULL,

PRIMARY KEY ( ‘ Customer_No ‘ )

);

CREATE TABLE IF NOT EXISTS ‘Order ‘ (
‘ Order_No ‘ int (11) unsigned NOT NULL AUTO_INCREMENT,
‘Customer_No ‘ int (8 ) NOT NULL,
‘ OrderDate ‘ date NOT NULL,
‘PromisedDate ‘ date NOT NULL,
PRIMARY KEY (‘order_No ‘)
KEY `CustNo`

(`Customer_NO`)

) ;




CREATE VIEW `CustOrder` As
SELECT

`Customer`. ` Customer_No ` As ` Customer No`,

`Order`.`Order_No` As

` Order No` ,

`Customer`.` First_Name` As

` First Name` ,

`Customers`.` Last_Name` As ` Last Name`,
FROM (` Customer` JOIN `Order` ON

((` Customer` . ` Customer_NO` = ` Order `. ` Customer_NO ` ) )
);


Constraints for table `order` to enforce uniqueness and referential integrity.




ALTER

TABLE ` Order `

ADD CONSTRAINT `CustNo ` FOREIGN KEY ( ` Customer_No ` ) REFERENCES
`Customer ` (` Customer_No `)

ON UPDATE CASCADE;




CREATE VIEW `CustOrder` As
SELECT

`Customer`. ` Customer_No ` As ` Customer No`,

`Order`.`Order_No` As

` Order No` ,

`Customer`.` First_Name` As

` First Name` ,

`Customers`.` Last_Name` As ` Last Name`,
FROM (` Customer` JOIN `Order` ON

((` Customer` . ` Customer_NO` = ` Order `. ` Customer_NO ` ) )
);

ISL201

Assignment of ISL 201
Solution


1) Elaborate what kind of behavior should we adopt towards non-Muslim parents?
Allah says
"It is not fitting for the Prophet (PBUH) and those who believethat they should pray for forgiveness for polytheists, even though they be of kin, after it is clear that they are companions of the Fire."[9:113]
This is after they die upon disbelief as non-Muslims. It is, however, permissible to guide them to Islam in their lifetime.
In another hadeeth, it is narrated that while Abu Hurairaha embraced Islam, his mother continued to be an infidel for quite a long time. He continuously tried to convince her in favor of Islam, but to no avail. Nevertheless, he continued respecting and obeying her. Once when he was trying to convince her she became insolent and uttered some insulting remarks about the Prophet (PBUH). Because of this, Abu Hurairah was very much pained. He went to the Prophet and complained saying, "O Messenger of Allah! I have always been trying to make my mother accept Islam but she always refuses to accept it. But today when I asked her to believe in Almighty Allah, she became very much annoyed and started insulting and rebuking you which I could not stand and tears came to my eyes. O Messenger of Allah! Pray to Allah that He may open the heart of my mother to Islam." The Prophet (PBUH) immediately raised his hands and prayed, "O Almighty Allah, guide the mother of Abu Hurairah." Abu Hurairah was overjoyed and went home. When he reached home he found the door was bolted from the inside but he heard the sound of flowing water, which assured him that his mother was taking a bath. Hearing his footsteps, she hastily finished the bath. Then she opened the door. She said, "O my son Abu Hurairah, Allah has heard you. Be witness that I recite the Shahadah." He started crying out of sheer joy and went back to the Prophet (PBUH) with the tiding that Almighty Allah had accepted his prayer and had given his mother the treasure of Islam. The Prophet (PBUH) was also pleased to hear that. He praised Allah and gave Abu Hurairah some advice. Then, on his request, he prayed, "O Allah, put the love of Abu Hurairah and his mother in the hearts of all true Muslims and put the love of all true Muslims in the hearts of both of them."

2)contribution of the following Muslim Scientists in the field of Medicine.
Ibn-i-Sina
His full name was Hussain ibn Abdullah ibn Hassan ibn Ali ibn Sina. He was born around 980 in Afshana, near Bukhara ,which was his mother's hometown, in Greater Khorasan, to a Persian family.
Ibn Sīnā developed a medical system that combined his own personal experience with that ofIslamic medicine, the medical system of the Greek physician Galen, Mesopotamian and Indian medicine.
Though the threads which comprise Unani healing can be traced all the way back to Claudius Galenus of Pergamum, who lived in the second century of the Christian Era, the basic knowledge of Unani medicine as a healing system was developed by Hakim Ibn Sina in his medical encyclopedia The Canon of Medicine. The time of origin is thus dated at circa 1025 AD, when Avicenna wrote The Canon of Medicine in Persia.
Abu Ali al-Hasan ibn al-Haytham
Abu Ali Hasan Ibn al-Haitham was one of the most eminent physicists, whose contributions to optics and the scientific methods are outstanding. Known in the West as Alhazen, Ibn al-Haitham was born in 965 C.E. in Basrah, and was educated in Basrah and Baghdad. Thereafter, he went to Egypt, where he was asked to find ways of controlling the flood of the Nile. Being unsuccessful in this, he feigned madness until the death of Caliph al-Hakim. He also travelled to Spain and, during this period, he had ample time for his scientific pursuits, which included optics, mathematics, physics, medicine and development of scientific methods on each of which he has left several outstanding books.

3) Only pen down the names of the recipients of Zakat without any discussion.

1.Fuqaraa and al-masaakin
The Poor and the Needy are those who do not even have basic needs fulfilled.
2.'Amil zakah
Those who administer and collect Zakat even if they are rich.3. Muallaf
People who need to be reconciled Islam. For example, new Moslems who need to be strengthened and the enemies of Islam to protect Moslems from their evils.4. Riqab (slaves)
Freeing captives such as prisoners of wars.5. Gharimun (debtor)
People burdened by debts or guaranteed debts of others and are unable to pay them due to abject poverty.
6.Fi sabilillah
Part of zakah designated for the cause of Allah to attain Allah's pleasure.7.Ibnu Sabil The traveler who is stranded in a foreign land and lacks the means to achieve his objectives is entitled to zakah, even though he could find someone to lend him the needed amount and he has enough resources in his own country to pay their debts.

Tuesday, February 9, 2010

CS201 GDB

CS201 Introduction to Programming GDB Solution

“Although for consistent and reusable design we follow Object Oriented paradigms; “structured approach” has still its worth in some imperative and critical applications. Support or contradict this statement with solid arguments."

Answer:

Help 1

Structured Programming

Structured programming takes on the top-to-bottom approach.It splits the tasks into modular forms. This makes the program simpler and easier to read with less lines and codes.This type of program accomplishes certain tasks for that a specific reason.For example, invoice printers use structured programming. This type has clear, correct, precise descriptions.

Object Oriented Programming

This type of programming uses sections in a program to perform certain tasks.It splits the program into objects that can be reused into other programs.They are small programs that can be used in other software.Each object or module has the data and the instruction of what to do with the data in it. This can be reused in other software directly.

Help 2.

There are advantages as well as disadvantages to using either structured programming languages or object-oriented languages when developing an application. One of the more popular structured programming languages is known as Pascal (Wikipedia – Structured Programming, 2005). Pascal is often used to help teach programming to students in an educational format (Wikipedia – Pascal, 2005). In general terms, a structured programming language is laid out in a series of explicit statements and does not generally contain commands which redirect the execution of statements to other areas of the program (Wikipedia – Pascal, 2005). In comparison, object-oriented languages often contain a set of reusable modular components, which can be called to execute at various points throughout the program, without having to be completely rewritten. Some of the more popular object-oriented languages include Java and C++ (Wikipedia – Object-oriented Programming, 2005). There is an advantage to using structured programming when writing classes and complex functions are not necessary. It can take up more time and energy to develop classes rather than simply write a straightforward piece of code, which executes a specific set of commands. It depends on what the overall purpose of the program is. One of the main disadvantages to using a structured programming language versus an object-oriented language is that it is not ‘modular’. In other words, the code is not split up into reusable sections. The code is written and executed sequentially; therefore you may have redundant code. It may take longer to develop programs using structured language (What Is Object-oriented Programming?, 2000). One of the advantages to using object-oriented programming languages is that it is modular. It is possible to write a reusable piece of code, such as a function or a class, which can be used multiple times throughout a program without having to rewrite it (Cashman, Shelly, & Vermaat, 2004, p. 405). This can save the developer much time and effort in the development process. One of the possible disadvantages to using an object-oriented programming language is its sheer complexity. It is not typically recommended to use object-oriented languages when developing smaller, less complex programs or programs that are built to run on low powered computers (What Is Object-oriented Programming?, 2000).Considering the potential complexity of a filing system application, it would probably be recommended to use object-oriented technology. Also, being that application development using object-oriented languages can be done faster, this might save the developer’s time so that they could deliver the program to the client sooner (Cashman et al., 2004, p. 405).

CS101

Cyber Crime:-
Cyber crime is criminal activity done using computers and the Internet. This includes
anything from downloading illegal music files to stealing millions of dollars from online
bank accounts. Cyber crime also includes non-monetary offenses, such as creating and
distributing viruses on other computers or posting confidential business information on
the Internet.
OR
Issues surrounding computer crime have become high-profile, particularly those
surrounding hacking, copyright infringement, child pornography, and child grooming.
There are also problems of privacy when confidential information is lost or intercepted,
lawfully or otherwise.
Two Types of Cyber Crime…
Computer crime encompass a broad range of potentially illegal activities. Generally,
however, it may be divided into one of two types of categories:
(1) crimes that target computer networks or devices directly;
(2) crimes facilitated by computer networks or devices, the primary target of which is
independent of the computer network or device.
Examples of crimes that primarily target computer networks or devices would include,
• Malware (malicious code)
• Denial-of-service attacks
• Computer viruses
Examples of crimes that merely use computer networks or devices would include,
• Cyber stalking
• Fraud and identity theft
• Phishing scams
• Information warfare
More Examples…..
*Fraud achieved by the manipulation of computer records.
* Spamming wherever outlawed completely or where regulations controlling it
are violated.
* Deliberate circumvention of computer security systems.
* Unauthorized access to or modification of
o programs (see software cracking and hacking).
o data.
* Intellectual property theft, including software piracy.
* Industrial espionage by means of access to or theft of computer materials.
* Identity theft where this is accomplished by use of fraudulent computer
transactions.
* Writing or spreading computer viruses or worms.
* Salami slicing is the practice of stealing money repeatedly in extremely small
quantities
* Denial-of-service attack, where company websites are flooded with service
requests and their website is overloaded and either slowed or crashes completely
* Making and digitally distributing child pornography
Now take Examples which one u like and give very briefly
the methods that can be used to minimize the ill effects of
listed crimes.

ENG101

ENGLISH COMPREHENSION (ENG 101) Assignment No 4
TOTAL MARKS: 15
Due Date: 11-02-2010
Q.2 Paraphrase the following passage without quoting from the text. Marks: 5


The developed nations have paid a great price in terms of their national resources in their strenuous effort to protect life, to safeguard peace. They displayed sufficient wisdom to overcome the traditional inclinations towards military solutions of world problems. This has happened for the first time. And it has provided an abiding pattern to apply new, peaceful and joint approaches to solving the most acute world problems. For the first time in world history, the most powerful weapons ever created were not used. Instead, they became an instrument of human experience, the means of great discoveries, and the tool of deep penetration into the secrets of Nature. We trust, it will henceforth and forever take its deserved place among the sophisticated tools of enlightened generations.
Paraphrase of above passage :
The advanced nations like peace to defend life. They displayed many solutions of world problems. Educated generation creat powerful weapons and tools but dislike usage of these powerful tools.
Q.1 Write an essay on any ONE of the given topics. It should comprise 200-
230 words. Marks: 10
“It is not in the stars to hold our destiny but in ourselves.”
OR
“Efforts and courage are not enough without purpose and direction.”

Answer:
“efforts and courage are not enough without purpose and direction”

Efforts, courage, purpose and direction are very important things for success. These all are join with each other. Effort is very important for success but you know where you make effort. This is very important point. If don’t know where you spent your effort then all your effort to fulfill any work is false.
Courage add beauty in your efforts without it your efforts not success. So courage is a key point to complete your work.
If you want to maximize your talent and become a talent-plus person, you need to make every action count. You must determine where you want to go. People who are undecided about what they want to do or where they want to go cannot success in their life or their talent. A purpose is also a key point of a successor with out it your talent is not completed.
Purpose is the key that open the door of direction that where you want to use.

Monday, February 8, 2010

STA630

STA630 Assignment # 1 Solution :

In this scenario,following threats to internal validity exist:

History effects

In the scenario above , Pakistan television programme was the history effect which was an external even out of control of management.All the employees take much interest in that programme due to which the validty of the training influence adversely.

Maturation effect

In the scenarion above , the length of time was too much according to some employees .And 3 employees left the training due to the fact that they were getting bored from training programme..Thats why this threat to internal validity exist in scenario.

Testing effect

This effect also exist in this scenario ,As the questions asked in pretest influence the performance of employees adversely.

Instrumentation effect

This is another threat to internal validity which exist in this scenario.The question asked in pretest were quite easy than the questions asked in posttest.Which influence the result of training program adversely.

Mortality

Mortality effect of threat to the internal validity exist I this scenari , as some of the employees left organization during programme .Which contaminate the programme because leaving of some members hinder the training process and make it difficult to intreprete the exact result.Following threats to internal validity does not exist in the scenario above.

Selection bias effect

This is the threat which exist due to non random selection of subjects for 2 comparison groups.Whereas in scenario above members of 2 groups were selected randomly.So, there was no selection differentiation in scenario.

Sunday, February 7, 2010

CS201

class String
{
private :
char string [ 30 ] ;
public :
String ( )
{
strcpy ( string , "" ) ;
}
void getString ( )
{
cout << "Enter the String : " ;
cin >> string ;
}
void display( )
{
cout << "The String Is : " << string << endl ;
}
// Declaration (prototype) of overloaded sum operator
String operator + ( String & s ) ;
String operator += ( String & s ) ;
};

String String :: operator + ( String &s )
{
String temp; // Declared object temp of String type
strcpy ( temp.string , "" ); // Initialized the temp with empty string
strcat ( temp.string , string ); // Concatenated the driving object’s string to //
temp object
strcat ( temp.string , s.string ); // Concatenated the argument’s string to the
// temp object
return temp; // Returned the temp object
}

String String :: operator += ( String &s )
{
String temp; // Declared object temp of String type
strcpy ( temp.string , "" ); // Initialized the temp with empty string
strcat ( temp.string , string ); // Concatenated the driving object’s string to //
temp object
temp=temp+s;

return temp; // Returned the temp object
}

Saturday, February 6, 2010

STA301

STA301 Assignment Solution:

Download the link: http://sharecash.org/download.php?file=367998

If link not download then Email to me: uzair777@gmail.com

ECO402

Eco402 Assignment Solution:
If we examine the market for rice in Pakistan during the year 2007 and 2009, the demand of rice was higher in the year 2007 but it fell down during the year 2009, due to the drop in the export demand of rice. But the Government wants to keep the price of rice at higher level.
The given equations show the quantity demanded and quantity supplied of
rice during the year 2007.
Year 2007: Demand: Qd = 1,600 - 125P
Year 2007 Supply: Qs = 440 + 165P

a. Calculate the market clearing price level and quantity in the year
2007, in that year there were no effective limitations on the
production of rice.

Market clearing price condition
Quantity demanded = Quantity supplied
1600-125p = 440+165p
1600-440 = 165p+125p
1160 = 290p
P = 1160/290
Now: P = 4
Now putting values in the quantity demanded side or supply side
We are putting values in the quantity demanded side
Qd = 1600-125p
= 1600-125(4)
Qd = 1100
b. Why the government wants to keep the price at higher level i.e. to
$5.50 when there is decline in export demand. Will it effect on the
quantity demanded or quantity supplied equation and curve and how
much?

Yes it has effect on quantity demanded or quantity supplied.
Qd = 16, 00 – 125($5.50)
Qd =16, 00 – 687.5
Qd = 912.5

Quantity demanded is equal to Qd = 912.5

Qs = 440 +165($5.50)
Qs = 440 + 907.5
Qs= 1347.5
Quantity supplied is equal to Qs = 1347.5 Ans

c. Now with the help of new quantity equation calculate what should be
the quantity of rice which the government must buy?
Now
Excess supply = Qd –Qs
= 912 .5 -1345.7
= -435
The government will buy Q = 435
B.
Suppose a profit-maximizing monopolist is producing 800 units of output
and is charging a price of $70 per unit.
If the marginal cost of last unit produced is 50 what will be the elasticity of
demand for the product?
P = 70$ , MC = 50
P =MC/1+ (1/Ed) 70=50
We find “Ed”
P - MC = 1/Ed
70 – 50 = 1/Ed
20 = 1/Ed
Ed (20) = 1
Ed = 1/20

MTH302

Q No: Correct Option

1 A

2 A

3 B

4 C

5 B

6 D

7 B

8 B

9 B

10 C

Friday, February 5, 2010

CS601 GDB

GDB OF CS-601
DATA COMMUNICATION

Please don’t copy as it. Take help and do it yourself.
Because the Data Link Layer is Layer 2 of the seven-layer OSI model of computer
networking. It corresponds to or is part of the link layer of the TCP/IP reference model.
The Data Link Layer provides the functional and procedural means to transfer data
between network entities and might provide the means to detect and possibly correct
errors that may occur in the Physical Layer. The Data Link Layer is concerned with local
delivery of frames between devices on the same LAN. Data Link frames, as these
protocol data units are called, do not cross the boundaries of a local network. Internetwork
routing and global addressing are higher layer functions, allowing Data Link
protocols to focus on local delivery, addressing, and media arbitration. In this way, the
Data Link layer is analogous to a neighborhood traffic cop; it endeavors to arbitrate
between parties contending for access to a medium. The data link thus provides data
transfer across the physical link. That transfer can be reliable or unreliable; many data
link protocols do not have acknowledgments of successful frame reception and
acceptance, and some data link protocols might not even have any form of checksum to
check for transmission errors. In those cases, higher-level protocols must provide flow
control, error checking, and acknowledgments and retransmission. The Data Link Layer
protocols respond to service requests from the Network Layer and they perform their
function by issuing service requests to the Physical Layer. The Data Link Layer is often
implemented in software as a "network card driver". The operating system will have a
defined software interface between the data link and the network transport stack above.
This interface is not a layer itself, but rather a definition for interfacing between layers.
The data link thus provides data transfer across the physical link. That transfer can be
reliable or unreliable; many data link protocols do not have acknowledgments of
successful frame reception and acceptance, and some data link protocols might not even
have any form of checksum to check for transmission errors. In those cases, higher-level
protocols must provide flow control, error checking, and acknowledgments and
retransmission.

CS401


CS401 Assignment Solution:

Download the link: http://sharecash.org/download.php?file=364456

CS403


CS403 Assignment # 5 Solution:

Download the link: http://sharecash.org/download.php?file=364440

FIN622

Dear Students.... FIN622 Assignment Solution of Problem#1....
Cost of component: Common stock
Do = 1.75, g = 5% = 0.05, Po= Rs. 25
D1 = 1.75 (1 + 0.05) = 1.75 (1.05) = 1.84
Re = (1.84 / 25) + 0.05
= 0.073 + 0.05 = 0.12 or 12.00 %
WACC BV: Common Stock
Weightage of common stock (BV) x Re = 0.47 x 0.12 = 0.056
WACC MV : Common Stock
Weightage of common stock (MV) x Re= 0.52 x 0.12 = 0.06
Weightage of Preferred Stock (BV):
MV of preferred stock / Total Capitalization MV = 2,500,000 / 48,000,000= 0.05
Weightage of Bonds (BV):
BV of Bonds / Total capitalization BV = 12,000,000 / 42,500,000= 0.28
WACC BV: Bonds
(Bond weightage BV x Cost of bond) (1 – Tax rate) = (0.28 x 0.09) (1- 0.35)= (0.025) (0.65)= 0.016
WACC MV:
Bonds(Bond weightage MV x Cost of Bond) (1 – Tax rate) = (0.26 x 0.09) (1 - 0.35)= (0.023) (0.65)= 0.015
Weightage of Loans (MV):
MV of Loans / Total Capitalization MV = 8,000,000 / 48,000,000= 0.17
Overall WACC (BV):
WACC common stock + WACC preferred stock + WACC Bonds + WACC Loans= 0.056 + 0.72 + 0.016 + 1.36 = 2.15
Overall WACC (MV):
WACC common stock + WACC preferred stock + WACC Bonds + WACC Loans = 0.06 + 0.60 + 0.015 + 1.22 = 1.89

Thursday, February 4, 2010

MGT502 Quiz

MGT502 Quiz # 5
Download the link: http://sharecash.org/download.php?file=362511

CS302 GDB

CS302 GDB Solution…..
When we convert continues signal in to digital
we can get the exact information. No chance of
lost of information because digital system have
only two values. While in analogue signal much
distortion is there.
Analogue to digital conversion is easy. Because
in this conversion we just break the signals in to
parts then quantized that assign values.
But in digital to analogue conversion is very
difficult there are so many processes. Like
ASK, FSK, PSK and QSK. It becomes very
difficult to choose exact method of conversion.
And these methods of conversion are difficult to
implement.

CS402 GDB

CS402 GDB Solution:
Download the link: http://sharecash.org/download.php?file=362471

CS504


CS504 Assignment Solution:

Download the link: http://sharecash.org/download.php?file=362474

ECO402

Assignment No. 2
ECO-402
Micro Economics
Solution

Part “A”
(a)
Market clearing price condition
Quantity demanded = Quantity supplied
Qd = Qs
1600 -125p = 440 + 165p
1600 - 440 = 165p + 125p
1160 = 290p
P = 1160/290
P = 4
After putting the values of “P” in the quantity Demanded equation
Qd = 1600-125p
= 1600-125(4)
Qd = 1100
After putting the values of “P” in the quantity Supply equation
Qs = 440 + 165p
= 440 + 165(4)
Qs = 1100
(b)
P = 5.50
Qd = 1600-125p
= 1600-125(5.50)
Qd = 912. 5
Qs = 440+165p
= 440+165(5.50)
Qs = 1347.5
(c) Now
Excess supply = Qd –Qs
= 912 .5 -1345.7
= -435
(Q =435) This quantity Government will buy.
Part “B”
Lerner’s index of monopoly power
L = Mp
= P – Mc / P
We drive the formula for Ed from Lerner’s index.
- 1 / Ed = P-Mc / P
Multiply by – both sides
1 / Ed = Mc-P / P
Ed = P / Mc –P
Ed = 70/50-70
Ed = -3.5

Wednesday, February 3, 2010

MTH302 GDB


MTH302 GDB Solution:

Download the link: http://sharecash.org/download.php?file=358631

MGT613 Quiz

MGT613 Quiz # 4

Download the link: http://sharecash.org/download.php?file=358629

MGT201 Quiz

MGT201 Quiz # 3

Download the link: http://sharecash.org/download.php?file=358627

CS403 GDB

CS403 GDB Solution:
It is true normalization is a complex process and can be easily proved today’s most of RDBMs like SQL, Oracle etc are based on relation model like tables are connected to each other using primary and forgine keys.As we know there are five normalization forms first three are often used.In First normal form DBA has to identify the unique key for the entity identification.It become more complex when DBA has to identify redundant information (columns) in an entity and create separate table to place this information in rows and build relation between them in Second Normal form.It becomes even become more complex when DBA has to join two tables with the help of third table to build relation ship between two entities in third Normal form.The purpose of all effort is to reduce data redundancy between tables, to centralize information and only capture entity related information. The benefit of this is increase of DBMS performance, better hardware resource management and data integrity

MTH302 GDB


1. Determine Variable Unit Costs.

Determine the variable costs of producing one unit of this product. Variable costs are those costs associated with making the product or buying it wholesale. If you are making a product, you will need to know the cost of all the components that go into that product. For example, if you are printing books, your variable unit costs are paper, binding, and glue for one book, and the cost to put one book together. Let's say you calculate your unit variable cost at $11.50.

2. Determine Fixed Costs

Fixed costs are costs to keep your business operating, even if you didn't produce any products. To determine fixed costs, add up the cost of running your factory for one month. These costs would include rent or mortgage, utilities, insurance, salaries retirement benefit cost of non-production employees, and all other costs. In other words, fixed costs are all costs of your business except those directly related to producing your products. Let's say you determine your monthly total fixed cost at $25,000.

3. Determine Unit Price

Determine the unit price for your product. This price may change as you see where your break-even point is, keeping in mind the damage of equipment and other unexpected expenses, and also desired profit, for now let's say your unit price is $25.00 per book.

Breakeven Point = Fixed Costs/(Unit Selling Price - Variable Costs) =25000/(25-11.5) =1851.851

The above mention calculation provides good profit range from which company can set aside desired amount that will collect interest or purchase annuities.

MKT630 GDB

MKT630 GDB Solution:


At the best of times entering in international marketing it can be a complex and challenging process. Yet, when it is approached with careful deliberation, exporting can be a rewarding growth strategy for any business. Make a commitment to exporting. Conduct research to find the right marketPrimary market research.. Devise marketing strategies for your target marketEnter market through direct &indirect export.Use of foreign agent to sell and distribute. Manufacture products in the foreign country by either setting up business or by acquiring a foreign subsidiary. Enter into a joint venture with a foreign entity. Appoint a franchisee in the foreign country

MGT211 GDB

MGT211 GDB

Yes it is true the farmers in Pakistan are facing many problems such as low profit, expensive in input, poor marketing, poor technology etc. Through cooperative society we pledge to continually improve the value of our products and services through the pursuit of innovation, new products, new ideas and new processes that will benefit the company and our customers. We will enhance our opportunities for growth by balancing the needs of our customers, supporting our communities, and protecting the environment.

MGT201 Quiz

Question # 1 of 10
Which of the following costs would be considered a fixed cost?Select correct option:Raw materialsDepreciationBad-debt lossesProduction labor
Question # 2 of 10
Expected Portfolio Return = ___________.
Select correct option:rP * = xA rA + xB rBrP * = xA rA - xB rBrP * = xA rA / xB rBrP * = xA rA * xB rB
Question # 3 of 10
Why markets and market returns fluctuate?
Select correct option:
Because of political factorsBecause of social factorsBecause of socio-political factorsBecause of macro systematic factors
Question # 4 of 10
Which of the following can be used to calculate the risk of the larger portfolio?
Select correct option:Standard deviationEPS approachMatrix approachGordon’s Approach
Question # 5 of 10
Which of the following market in finance is referred to the market for short-term government and corporate debt securities?
Select correct option:
Money marketCapital marketPrimary marketSecondary market
Question # 6 of 10
Which of the following would be considered a cash-flow item from an "operating" activity?
Select correct option:
Cash outflow to the government for taxesCash outflow to shareholders as dividendsCash inflow to the firm from selling new common equity sharesCash outflow to purchase bonds issued by another company
Question # 8 of 10
A 5-year annuity due has periodic cash flows of Rs.100 each year. If the interest rate is 8 percent, the present value of this annuity is closest to which of the following equations?
Select correct option:
(Rs.100)(PVIFA at 8% for 4 periods) + Rs.100(Rs.100)(PVIFA at 8% for 4 periods)(1.08)(Rs.100)(PVIFA at 8% for 6 periods) - Rs.100Can not be found from the given information
Question # 9 of 10
Which of the following is correct regarding the opportunity cost of capital for a project?
Select correct option:
The opportunity cost of capital is the return that investors give up by investing in the project rather than in securities of equivalent risk.Financial managers use the capital asset pricing model to estimate the opportunity cost of capitalThe company cost of capital is the expected rate of return demanded by investors in a companyAll of the given options

FIN623

1.according to capital gain sec.37 buying and selling of vehicles and earning the profit after this process this profit is will not be treated as capital gain
2.section 37 of capital gain says that any disposal of asset rare precious things that keep hold and then sell it gaing profit will be treated as capital gain and included in the taxable income for tax deduction

MCM301 GDB

Cultural Differences in Non-verbal Communication
General Appearance and DressAll cultures are concerned for how they look and make judgements based on looks and dress. Americans, for instance, appear almost obsessed with dress and personal attractiveness. Consider differing cultural standards on what is attractive in dress and on what constitutes modesty. Note ways dress is used as a sign of status?
Body MovementWe send information on attitude toward person (facing or leaning towards another), emotional statue (tapping fingers, jiggling coins), and desire to control the environment (moving towards or away from a person). More than 700,000 possible motions we can make — so impossible to categorize them all! But just need to be aware the body movement and position is a key ingredient in sending messages.
PostureConsider the following actions and note cultural differences:
Bowing (not done, criticized, or affected in US; shows rank in Japan)
Slouching (rude in most Northern European areas)
Hands in pocket (disrespectful in Turkey)
Sitting with legs crossed (offensive in Ghana, Turkey)
Showing soles of feet. (Offensive in Thailand, Saudi Arabia)
Even in US, there is a gender difference on acceptable posture?
GesturesImpossible to catalog them all. But need to recognize: 1) incredible possibility and variety and 2) that an acceptable in one’s own culture may be offensive in another. In addition, amount of gesturing varies from culture to culture. Some cultures are animated; other restrained. Restrained cultures often feel animated cultures lack manners and overall restraint. Animated cultures often feel restrained cultures lack emotion or interest. Even simple things like using hands to point and count differ. Pointing : US with index finger; Germany with little finger; Japanese with entire hand (in fact most Asians consider pointing with index finger to be rude) Counting: Thumb = 1 in Germany, 5 in Japan, middle finger for 1 in Indonesia.
Facial ExpressionsWhile some say that facial expressions are identical, meaning attached to them differs. Majority opinion is that these do have similar meanings world-wide with respect to smiling, crying, or showing anger, sorrow, or disgust. However, the intensity varies from culture to culture. Note the following:
Many Asian cultures suppress facial expression as much as possible.
Many Mediterranean (Latino / Arabic) cultures exaggerate grief or sadness while most American men hide grief or sorrow.
Some see “animated” expressions as a sign of a lack of control.
Too much smiling is viewed in as a sign of shallowness.
Women smile more than men.
Eye Contact and GazeIn USA, eye contact indicates: degree of attention or interest, influences attitude change or persuasion, regulates interaction, communicates emotion, defines power and status, and has a central role in managing impressions of others.
Western cultures — see direct eye to eye contact as positive (advise children to look a person in the eyes). But within USA, African-Americans use more eye contact when talking and less when listening with reverse true for Anglo Americans. This is a possible cause for some sense of unease between races in US. A prolonged gaze is often seen as a sign of sexual interest.
Arabic cultures make prolonged eye-contact. — believe it shows interest and helps them understand truthfulness of the other person. (A person who doesn’t reciprocate is seen as untrustworthy)
Japan, Africa, Latin American, Caribbean — avoid eye contact to show respect.
TouchQuestion: Why do we touch, where do we touch, and what meanings do we assign when someone else touches us?
Illustration: An African-American male goes into a convenience store recently taken over by new Korean immigrants. He gives a $20 bill for his purchase to Mrs Cho who is cashier and waits for his change. He is upset when his change is put down on the counter in front of him.What is the problem? Traditional Korean (and many other Asian countries) don’t touch strangers., especially between members of the opposite Mad. But the African-American sees this as another example of discrimination (not touching him because he is black).Basic answer: Touch is culturally determined! But each culture has a clear concept of what parts of the body one may not touch. Basic message of touch is to affect or control — protect, support, disapprove (i.e. hug, kiss, hit, kick).
USA — handshake is common (even for strangers), hugs, kisses for those of opposite gender or of family (usually) on an increasingly more intimate basis. Note differences between African-Americans and Anglos in USA. Most African Americans touch on greeting but are annoyed if touched on the head (good boy, good girl overtones).
Islamic and Hindu: typically don’t touch with the left hand. To do so is a social insult. Left hand is for toilet functions. Mannerly in India to break your bread only with your right hand (sometimes difficult for non-Indians)
Islamic cultures generally don’t approve of any touching between genders (even hand shakes). But consider such touching (including hand holding, hugs) between same-Mad to be appropriate.
Many Asians don’t touch the head (Head houses the soul and a touch puts it in jeopardy).Basic patterns: Cultures (English , German, Scandinavian, Chinese, Japanese) with high emotional restraint concepts have little public touch; those which encourage emotion (Latino, Middle-East, Jewish) accept frequent touches.
Smell
USA — fear of offensive natural smells (billion dollar industry to mask objectionable odors with what is perceived to be pleasant ) — again connected with “attractiveness” concept.
Many other cultures consider natural body odors as normal (Arabic).
Asian cultures (Filipino, Malay, Indonesian, Thai, Indian) stress frequent bathing — and often criticize USA of not bathing often enough!
Paralanguage
vocal characterizers (laugh, cry, yell, moan, whine, belch, yawn). These send different messages in different cultures (Japan — giggling indicates embarrassment; India – belch indicates satisfaction)
vocal qualifiers (volume, pitch, rhythm, tempo, and tone). Loudness indicates strength in Arabic cultures and softness indicates weakness; indicates confidence and authority to the Germans,; indicates impoliteness to the Thais; indicates loss of control to the Japanese. (Generally, one learns not to “shout” in Asia for nearly any reason!). Gender based as well: women tend to speak higher and more softly than men.
vocal segregates (un-huh, shh, uh, ooh, mmmh, humm, eh, mah, lah). Segregates indicate formality, acceptance, assent, uncertainty.