Grandparents World

Grandparents World
Name
Institution

Grandparents World
Cooking and baking are some of the events that young individuals and old people should be involved in. This mostly applies from grandparents to their grandchildren. It becomes even more of amusing when the grandchildren are to taste some of the guidelines, hand over some ingredients, clean the veggies, add or stir elements or even set the table.
Menu planning and Restaurant concerns should be conventional in terms of price, nutrients, food composition or even recipe price. It is also very important to keep diet when planning a menu. In consideration, you should also get to know your customers, if the café is in a small town full of plant employees, you may need to increase ration sizes of proteins to ensure that your customers are pleased enough for another turn up.
In hotel lodging, swimming pool, free unscrewed WIFI and even cleaning services are some of the concerns to be keyed in. This helps mostly in relaxation of one’s mind, excising of the body and timeless charts with friends and relatives R. A. (2006). . It is also a one way to get more and more customers to venture in the hotels.
In a matter of fact, there are also several major customer issues in these organizations. Some of the clients are usually irritated or even upset because they are confused of the mistake you or your firm have made, or even having a bad day. Some of the clients may also ask for a markdown you cannot give, this may be a way of promoting your clients but on the other hand you may be risking or degrading the perception of your brand where, one’s you offer a reduction it becomes harder to get people to purchase at a full price again.

Grandparents World

A simple summary of a baked cake, is a sweet baked food made from a combination of flour, sugar, eggs, milk and other ingredients such as butter prepared in to a solid piece then baked or hovered R. A. (2006). .
The very essential details of a cake may comprise, Boston cream cake, white sponge cake divided by vanilla custard and topped with a decadent chocolate glaze and snowy chocolate sprinkle.
Due to the combined ingredients used to make this product, it will be extra-large and having some benefits to human health. A chocolate cake baked and taken in the morning as breakfast may help to reduce weight and still may help to add some needed nutrients to human body.
The target market for selling baked cake may be stationed in terms of demographic or even geographic features. Demographic criteria mostly include age, gender, family status or even income. While geographic segmentation will involve the regions climate and population density. Using the population estimates from the last census, a bakery can estimate the number of potential customers and plan its operations accordingly.
The cost of production will be estimated when you review the cost to run your bakery or even the identification of variable cost from your fixed cost. The variable products may comprise of those that increase and decrease to how much food you make and sell, while the fixed costs remain constant. Some of the costs may comprise electricity used to run the equipment on which
Grandparents World

you cook food e.g ovens, payroll work costs used to pay employees changes with their production on the amount of food they make, supplies and packaging items and even the ingredients e.g. wheat, butter etc. when they increase the cost of production will also increase with a certain fraction.
The product can be made from home and may be sold at weddings, famer’s market or even in bistros. The business will use a print media where it will use make a beautiful magazine-style collection of the cakes designs R. A. (2006).
When it comes to magazine advertising, the business will use the minor or even the local publications which charges less than the national magazines. Though size, occurrence, regional rates, color, sitting or even negotiate may rise the charges, where a full pages will charge $10,000, frequency will go for $ 2,000 etc. it’s a better bet for small industries depending on your industry R. A. (2006). .
In conclusion, the business will give ad e.g. free delivery until destination points, free tasting samples, discount and even after sale serves in order to promote its customers.

Network Topology

I. Network Design

A. Network Topology

Technical Requirements

In this section, you will assess UMUC’s technical requirements. Use the information provided in the scenario to analyze the need for network topology, cables and connectors, networking and internetworking devices, wide area networking design, and computer systems. If you need more information, feel free to ask your instructor or make some assumptions. If you make assumptions, be sure to list them. This section should be used to describe the technical requirements of the task at hand. That is, you will be making explicit the requirements as you understand them, which will lead to the next section (your proposed solution).

Example (Note: The paragraph that follows is an example. It is expected that students will use this as a reference only. Remember to include references and cite your work according to IEEE-style format.)

Secure Network Contractors believes that students and faculty health, well¬being, and morale have a significant impact on the learning experience and productivity of the academic institution. Secure Network Contractors understands the following technical requirements. The university has invested in a new building that will bestow an academic ambience while providing students and faculty a world class research and learning environment. The university has hundreds of Faculty that teach and perform research within the new academic building. Faculty should be able to seamlessly transition between the newly leased building, and other buildings on the UMUC campus. Students will be required to have a similar experience as classes take place in multiple buildings across campus each day. Faculty and students will be required to print regardless of location, and therefore needs shared printing resources. All computers should be able to communicate, but the human resources department should operate on a separate network due to the sensitive and personally identifiable information they handle. We understand that the newly leased building will need to wirelessly communicate with other buildings on campus, and we will address this in the Wide Area Network (WAN) section that follows. Etc. (students should continue to explain the technical requirements).

Proposed Topology

Select one or more topologies to use for this design (i.e., star, bus, mesh, ring, and please note that the star topology is the most commonly used). This section should be used to provide the details of your proposed solution. Be specific and include the model, manufacturer, features, and cost of devices where appropriate. Students should include a visual representation of the topology selected. Topologies can be created using Microsoft Visio, or you can create a free account at draw.io (https://www.draw.io) and create diagrams. Be sure to review the types of topologies and highlight the benefits and drawbacks for each.

Example (Note: The paragraph that follows is an example. It is expected that students will use this as a reference only. Remember to include references and cite your work according to IEEE-style format.)

Secure Network Contractors believes that from a comparison of all the types available a ring topology is the best solution based on the requirements described by the University of Maryland University College (UMUC). We believe a ring topology satisfies the requirements of forming a single, continuous pathway for data to be transmitted through each node. A ring network topology in where each node connects to exactly two other nodes. A node on a network can be considered a computer, laptop, printer, or mobile device. Each node has a unique network address, which is referred to as the Media Access Control (MAC) address. The MAC address provides… Etc. (students should continue to explain their proposal).

Justification

This section should be used to justify your proposed solution based on the requirement(s). That is, you are explaining why you proposed the solution in the aforementioned paragraph, based on the technical requirement you made explicit in aforementioned paragraph.

Example (Note: The paragraph that follows is an example. It is expected that students will use this as a reference only. Remember to include references and cite your work according to IEEE-style format.)

Secure Network Contractors believes that a ring topology is the best solution based on the requirements described by the University of Maryland University College (UMUC). Specifically, the requirement that data flows in one direction, reducing the chance of packet collisions. The ring topology reduce the need for network servers because they are not needed to control network connectivity between each workstation. Etc. (students should continue to explain their proposal).

B. Cables and Connectors

Note: (Students shouldconsider the needs for both a wired and wireless implementation as your proposal should include both.)

Technical Requirements

In this section, you will assess UMUC’s technical requirements related to cables and connectors. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

Proposed Cables and Connectors

This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Student should be specific when discussing the models, types, and costs.

Justification

This section should be used to justify your proposed solution based on the technical requirements and assumptions., The justification should explain why you chose what you did and how it meets the UMUC’s goals for training and presentation to students

C. Networking and Internetworking Hardware

Technical Requirements

In this section, you will assess UMUC’s technical requirements related to networking and internetworking hardware. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

Proposed Networking and Internetworking Devices

This section should be used to provide the details of your proposed LAN solution, based on the technical requirements and assumptions. Student should be specific when discussing the models, types, and costs.

Justification

This section should be used to justify your proposed solution based on the technical requirements and assumptions.

D. Wide Area Network (WAN) Design

Technical Requirements

In this section, you will assess UMUC’s technical requirements related to the Wide Area Network (WAN) design. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

Proposed Wide Area Network (WAN) Design

This section should be used to provide the details of your proposed ISP solution, Be sure to cover what options are available through leased lines, metro Ethernet, and dedicated connections are based on the technical requirements and assumptions. Student should be specific when discussing the models, types, and costs.

Justification

This section should be used to justify your proposed solution based on the technical requirements and assumptions.

E. Computer Systems Hardware

Technical Requirements

In this section, you will assess UMUC’s technical requirements related to the computer systems hardware for both classroom end points and servers as well as what would be needed for dedicated IT use. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

Proposed Computer Systems Hardware

This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Student should be specific when discussing the models, types, and costs.

Justification

This section should be used to justify your proposed solution based on the technical requirements and assumptions.

II. Network Addressing and Security

A. Subnetting

Overview

Subnetting is a process of breaking a large network into small networks known as subnets. Subnetting happens when we extend the default boundary of the subnet mask. Basically, we borrow host bits to create networks (i.e., subnets).

We have been assigned the network address 192.168.2.0. Based on the chart below, we know this is a Class C address. This is determined by observing the first octet of the IP address, which is 192. This octet falls in between 192 and 223.

Class
Octet Decimal Range
A
1 – 126
B
128 – 191
C
192 – 223

Each class has a predefined default subnet mask that tells us the octets, which are already part of the network portion, as well as how many bits we have available to work with.

How does Marcuse use the terms technics and technology?

General Instructions: Answers should be 4-6 sentences, depending on the question. Include page numbers in your responses so that you can refer back to the reading during the discussion or when asking questions. 

Questions for Marcuse ([1941] 1998), “Some Social Implications of Modern Technology,” pages 41-65:

1. How does Marcuse use the terms technics and technology?

2. What was the principle of individualistic rationality? How was it replaced by technological rationality? (Also see the first part of the other reading).

3. How does technological rationality suppress the freedom of individuals and encourage conformity? (Also see the first part of the other reading).

4. How might technics be used to help the development of individuality, rather than suppress individuality?

5. What is an example from your own life of how technological rationality suppresses freedom and/or encourages conformity?

Questions for Marcuse (1964), One-dimensional Man, pages 1-34:

6. What are the “new forms of control” that Marcuse (1964, p. 1) discusses in Chapter 1? (Keep in mind the ways he is building on the “Social Implications of Modern Technology” essay.)

7. According to Marcuse (1964), in Chapter 2, how does advanced capitalism prevent social change?

General Question:

1. How are Marcuse’s ideas similar or different to those of Miliband (1964)? In particular, think about their explanations for why radical change/revolution has been prevented in capitalist societies.

How would Jenny best allocate her income for the month? What categories and in what amounts should Jenny allocate her funds to reflect a balanced monthly budget?

Assignment 1: Finance Management Discussion Discussion Rules of Engagement:
Be polite and professional. Keep an open mind. Keep personal information personal. Issue complaints privately. Be patient. Be honest. Before You Begin…
To successfully complete your assignment, you should have completed the following tasks:
From your textbook, Keys to effective learning: Study skills and habits for success, read: Time and money: Managing important resources Setting and reaching goals: Using values, stress management, and teamwork Review materials under the topic “Personal Financial Management” In addition to time, another resource that demands good management in order to succeed is money. How can you best manage your finances in tough economic times? What do you need to do financially to succeed in school? The bottom line is to be wise when borrowing money. This module will help you develop skills to manage your time and money.
Read the scenario and respond to the following questions:
Jenny has a part-time job and her net take-home income is $2000 per month. She needs to allocate her funds to reflect a balanced monthly budget. Jenny’s main expense categories include rent, utilities, and groceries.
How would Jenny best allocate her income for the month? What categories and in what amounts should Jenny allocate her funds to reflect a balanced monthly budget? Include the main categories as well as examples of other categories. Considering your own monthly budget, what specific behaviors or actions can you take to be more financially responsible and healthy? Do you have good or bad financial habits? You need not provide any specific personal information. Perhaps you could buy fewer pairs of shoes or limit your entertainment budget, or perhaps you’ve devised clever ways to save money that you can share.
Write your initial response in one to two paragraphs. By the due date assigned, post your response to the Discussion Area. Review and comment on at least two peers’ responses. Complete your participation for this assignment through the end of the module. Be sure to do the following:
Consider their suggestions. Give them helpful feedback on their responses. Share tips or strategies you have found useful in managing your finances. Grading Criteria Maximum Points Quality of initial posting, including fulfillment of assignment instructions 16 Quality of responses to classmates 12 Frequency of responses to classmates 4 Reference to supporting readings and other materials 4 Language and grammar 4