OC10593

Ryerson University

142Uploads
4Likes
0Blog Articles
All Activity
Uploads (142)
Blog Articles (0)
Homework Help (0)
RYERSONITM 820Debashish RoyWinter

ITM 820 Study Guide - Midterm Guide: Data Link Layer, Replay Attack, Chmod

OC1059318 Page
4 Mar 2015
104
Difference between encoding & encryption, encoding is public. Transforms data into another format using a scheme that is publicly available so that it
View Document
RYERSONMKT 828Louis PikeFall

MKT 828 Lecture Notes - Lecture 2: Marketing Mix, Physical Exercise, Swot Analysis

OC105935 Page
12 Sep 2014
62
In sport marketing we use 5 ps: product, promotion, price, place, people. Sports marketing management: developing consistent, marketing-minded strategi
View Document
RYERSONITM 600Khalil ArbousaFall

ITM 600 Study Guide - Final Guide: High-Bit-Rate Digital Subscriber Line, Appletalk, Category 5 Cable

OC1059334 Page
9 Dec 2013
303
With abr, the transfer characteristics provided by the network can change subsequent to connection establishment. A flow-control mechanism offers sever
View Document
RYERSONPOL 607Joseph ZboralskiWinter

POL 607 Lecture Notes - Lecture 7: Bretton Woods System, General Agreement On Tariffs And Trade, World Trade Organization

OC105934 Page
10 Apr 2013
43
It is impossible for a state to be completely sovereign the way it once used to be. Globalization is viewed as a bad thing by people on the left wing,
View Document
RYERSONPOL 607Joseph ZboralskiWinter

POL 607 Lecture Notes - Lecture 6: The Globe And Mail, Canadian Content, Mass Media

OC105933 Page
10 Apr 2013
21
View Document
RYERSONPOL 607Joseph ZboralskiWinter

POL 607 Lecture Notes - Lecture 9: Thomas Robert Malthus, Developed Country

OC105932 Page
10 Apr 2013
28
Thomas malthus was a mathematician who was alarmed by the disparity between the population & food supply. He said there would be a fierce struggle over
View Document
RYERSONPOL 607Joseph ZboralskiWinter

POL 607 Lecture Notes - Lecture 10: Islamic Extremism, Black Budget, Machine Gun

OC105934 Page
10 Apr 2013
38
0. 001 (weapon gunpowder bombs: 1914. 1. 0 (weapon large cannon: 1940. 20,000 (weapon hiroshima atomic bomb: 1961. 50 million (weapon largest hydrogen
View Document
RYERSONPOL 607Joseph ZboralskiWinter

POL 607 Lecture Notes - Lecture 8: Gulf Stream, Global Cooling

OC105933 Page
10 Apr 2013
46
Technology causes population growth: because advanced health care technology, medicine keeps people healthy and living longer, more food access as bett
View Document
RYERSONPOL 607Joseph ZboralskiWinter

POL 607 Lecture Notes - Lecture 3: Mutual Assured Destruction, Warsaw Pact, Cuban Missile Crisis

OC105933 Page
6 Mar 2013
62
1945 1990 -> bi-polar system (aka cold war) Wwii destroyed all the major players: german was devastated economically and militarily so was japan, durin
View Document
RYERSONPOL 607Joseph ZboralskiWinter

POL 607 Lecture Notes - Lecture 4: Global Politics, Dependency Theory, Globalism

OC105933 Page
6 Mar 2013
25
They look at the world as it is. The world should be something other than what it is. Idealistic: he wrote the book the republic", plato believed avera
View Document
RYERSONPOL 607Joseph ZboralskiWinter

POL 607 Lecture Notes - Lecture 2: Civic Nationalism, Ethnic Nationalism, Potash

OC105934 Page
6 Mar 2013
38
Population: in order to have a state, you need a stable population. Territory: canada is quite well positioned in many ways. We have stuff that people
View Document
RYERSONPOL 607Joseph ZboralskiWinter

POL 607 Lecture Notes - Boogie 2Nite, Ultimate Power

OC105933 Page
6 Mar 2013
55
Politics can be seen as a decision making mechanism for society. Everything in society and human life is governed by politics. Politics can be seen as
View Document
RYERSONPOL 607Joseph ZboralskiWinter

POL 607 Lecture Notes - Lecture 5: Global Issue, Film Studio, October Revolution

OC105933 Page
6 Mar 2013
32
Big impact of printing would be rise of capitals (capitalism: allowed to print out contracts & other things. Political impact was rise of democracy: bo
View Document
RYERSONPOL 607Joseph ZboralskiWinter

POL 607 Lecture Notes - Lecture 6: Mass Media, Canadian Content, The Globe And Mail

OC105933 Page
6 Mar 2013
29
View Document
RYERSONITM 410Margaret PlazaWinter

ITM 410 Chapter Notes - Chapter 10: Optical Character Recognition, Flowchart, Digital Image Processing

OC105935 Page
24 Feb 2013
88
Chapter 10 the order entry/sales (oe/s) process. Order entry/sales (oe/s) process is an interacting structure of people, equipment, activities & contro
View Document
RYERSONITM 350Franklyn PrescodWinter

ITM 350 Chapter Notes - Chapter 6: Debit Card, Mondex, Main Source

OC105936 Page
20 Feb 2013
44
Edi used van as platform for operation initially. Edi was mostly used in large companies & was expensive: edi has moved from vans to the web & web is a
View Document
RYERSONITM 350Franklyn PrescodWinter

ITM 350 Chapter Notes - Chapter 4: Business Process Reengineering, Relational Database, Database Model

OC105934 Page
12 Feb 2013
39
Legacy system is an old outdated application that has not yet been replaced or upgraded. Erp systems have all the characteristics of enterprise-wide sy
View Document
RYERSONITM 350Franklyn PrescodWinter

ITM 350 Chapter Notes - Chapter 5: Disaster Recovery Plan, Intrusion Detection System, Cryptographic Hash Function

OC105938 Page
12 Feb 2013
50
Error is an unintentional act or omission that leads to undesirable consequences. Fraud is an intentional act that relies on deception to misappropriat
View Document
RYERSONITM 350Franklyn PrescodWinter

ITM 350 Chapter Notes - Chapter 3: Internet Engineering Task Force, Asynchronous Transfer Mode, Hypertext Transfer Protocol

OC105935 Page
5 Feb 2013
54
Chapter 3 evolution and applications of the internet. Internet protocol (ip) is a protocol that uses a set of rules to send and receive messages at the
View Document
RYERSONITM 410Margaret PlazaWinter

ITM 410 Chapter Notes - Chapter 4: Data Flow Diagram, System Context Diagram, Flowchart

OC105933 Page
5 Feb 2013
67
Refer to figure 4. 1 for data flow diagram (dfd) symbols on pg 104. Data flow diagram (dfd) is a graphical representation of a system: it depicts a sys
View Document
RYERSONITM 430Aziz GuergachiWinter

ITM 430 Chapter Notes - Chapter 2: Whiteboard, Software Development Process, Iterative And Incremental Development

OC105935 Page
30 Jan 2013
36
View Document
RYERSONITM 350Franklyn PrescodWinter

ITM 350 Chapter Notes - Chapter 2: Software Agent, Infomediary, Web Banner

OC105935 Page
30 Jan 2013
64
Chapter 2 internet business models and strategies. Business model is the manner in which a business organizes itself to achieve its objectives, which n
View Document
RYERSONITM 410Margaret PlazaWinter

ITM 410 Chapter Notes - Chapter 3: Euclidean Distance, Emerging Technologies, Industrial Robot

OC1059310 Page
28 Jan 2013
55
Process strategy specifies the pattern of decisions made in managing processes so that the processes will achieve their competitive priorities: it guid
View Document
RYERSONITM 350Franklyn PrescodWinter

ITM 350 Chapter Notes - Chapter 1: Smart Card, Buy Side, Personal Information Protection And Electronic Documents Act

OC105936 Page
23 Jan 2013
62
Trading exchange is an online marketplace, usually on a website that enables suppliers. & customers to carry out their business electronically often us
View Document
RYERSONITM 430Aziz GuergachiWinter

ITM 430 Chapter Notes - Chapter 1: Reverse Engineering, Domain Model, Sequence Diagram

OC105933 Page
20 Jan 2013
36
Design emphasizes a theoretical solution that fulfills the requirements, rather than its implementations (ex. under section 1. 3) In object-oriented an
View Document
RYERSONITM 410Margaret PlazaWinter

ITM 410 Chapter Notes - Chapter 1: Workforce Productivity, Strategic Alliance, North American Free Trade Agreement

OC105938 Page
20 Jan 2013
50
Operations management refers to the systematic design, direction and control of processes that transform inputs into services and products for internal
View Document
RYERSONITM 305Lin Ying DongFall

ITM 305 Chapter Notes - Chapter 3: Feasible Region, Domain Analysis, Business Rule

OC105938 Page
20 May 2012
28
Are technology-independent guidelines under which a firm operates. Needs special handling cuz a product that does not incorporate business rules will f
View Document
RYERSONITM 407Candace GrantWinter

ITM 407 Study Guide - Final Guide: Arette, Eharmony, Lawrence Lessig

OC105934 Page
17 Apr 2012
59
Social equality do we have a responsibility. Software development can software be unethical, unintentional power. By unintentional power huff means tha
View Document
RYERSONITM 407Candace GrantWinter

Therac-25 Decision Analysis (Final Exam)

OC105934 Page
17 Apr 2012
76
Shareholders of aecl may not invest any longer. Patients will lose trust from the hospitals where the accidents occurred since they were negligent in s
View Document
RYERSONITM 407Candace GrantWinter

ITM 407 Study Guide - User Friendly

OC105933 Page
16 Apr 2012
11
Read the article for a better understanding of the three types of intangible assets and answer the following questions: Describe the three types of int
View Document
RYERSONITM 407Candace GrantWinter

ITM 407 Study Guide - Open-Source Software

OC105932 Page
16 Apr 2012
17
Read the first reading on intellectual property and consider the following questions: Property originally referred to land but it now also includes obj
View Document
RYERSONITM 407Candace GrantWinter

ITM 407 Study Guide - Eharmony, Blogosphere, Digital Divide

OC105932 Page
16 Apr 2012
26
View Document
RYERSONITM 407Candace GrantWinter

Final Exam preparation (question 2)

OC105931 Page
15 Apr 2012
66
It is important because intellectual property is someone"s creative work & invention or innovation. It takes a lot of effort to create something origin
View Document
RYERSONLAW 122Stan BendaWinter

Chapter 1.docx

OC1059311 Page
15 Apr 2012
22
Chapter 1 risk management and sources of law. Risk management is the process of identifying, evaluating and responding to the possibility of harmful ev
View Document
RYERSONLAW 122Stan BendaWinter

Chapter 2.docx

OC1059311 Page
15 Apr 2012
21
Chapter 2 litigation and alternative dispute resolution. All adults can use canadian courts even if they are not canadian citizens. A corporation can s
View Document
RYERSONLAW 122Stan BendaWinter

Chapter 3.docx

OC105935 Page
15 Apr 2012
20
Tort generally consist of a failure to fulfill a private obligation that was imposed by law. Tortfeasor is a person who has committed a tort: ex. on pg
View Document
RYERSONLAW 122Stan BendaWinter

Chapter 4.docx

OC105936 Page
15 Apr 2012
17
View Document
RYERSONLAW 122Stan BendaWinter

Chapter 5.docx

OC105939 Page
15 Apr 2012
16
Tort of conspiracy usually occurs when 2 or more defendant agree to act together with the primary purpose of causing the plaintiff to suffer a financia
View Document
RYERSONLAW 122Stan BendaWinter

Chapter 6.docx

OC105936 Page
15 Apr 2012
12
Tort of negligence determines whether the defendant can be held liable for carelessly causing the plaintiff to suffer a loss or injury (ex. Duty of car
View Document
RYERSONLAW 122Stan BendaWinter

Chapter 7.docx

OC105937 Page
15 Apr 2012
18
Chapter 7 the nature and creation of contracts. Contract is an agreement that creates rights & obligations that can be enforced in law. Meeting of the
View Document