OC55731

Ryerson University

61Uploads
4Likes
0Blog Articles
All Activity
Uploads (61)
Blog Articles (0)
Homework Help (0)
RYERSONPHL 710James CunninghamWinter

PHL 710 Lecture Notes - Lecture 5: Anthesis

OC557312 Page
1 Aug 2013
34
The guy is a mental patient, we do not know the man is a patient. None of the story is true, so we are left in a sense, but that is only the first evid
View Document
RYERSONPHL 710James CunninghamWinter

PHL 710 Lecture Notes - Lecture 4: Upton Sinclair, Mind Control, Product Differentiation

OC557313 Page
1 Aug 2013
36
Scenes comparison of mental and real: the court yard is symmetrical. It shows that is the only thing that is real in the movie: the scene where caligar
View Document
RYERSONPHL 710James CunninghamWinter

PHL 710 Lecture Notes - Lecture 3: Silent Film, Plot Twist, Six Acts

OC557314 Page
1 Aug 2013
23
Film: the cabinet of dr. caligari: a film in six acts. Aired in feb 1920 - a silent movie. Genre: gothic horror, murder mystery (a fusion of the two) P
View Document
RYERSONPHL 710James CunninghamWinter

PHL 710 Lecture Notes - Susan Sontag, Paris Photo

OC557312 Page
1 Aug 2013
32
Panofsky said of theatre, that theatre is of elitist whereas film is democratic; for panofsky the film is democratic because not only is it subject mat
View Document
RYERSONPHL 710James CunninghamWinter

PHL 710 Lecture Notes - Documentary Theatre, Voyeurism

OC557314 Page
1 Aug 2013
37
Neighbors by norm mclaren (a film maker in canada) The thesis of the first lecture was neighbors was a film worthy of the name. Where as most films out
View Document
RYERSONITM 820Farid ShiraziWinter

ITM820 Exam Prep.docx

OC5573138 Page
1 Aug 2013
131
Acid (atomicity, consistency, isolation, durability) is a set of properties that guarantee that database transactions are processed reliably. four prim
View Document
RYERSONITM 820Farid ShiraziWinter

ITM820 - Midterm Study Prep.doc

OC5573128 Page
1 Aug 2013
159
The osi security architecture is fully applicable to the internet. Some of the pervasive security mechanisms can be regarded as aspects of security man
View Document
RYERSONENT 526Sean WiseFall

ENT 526 Study Guide - Final Guide: Skoll Foundation, Brad Feld, Google.Org

OC5573117 Page
7 Mar 2013
322
View Document
RYERSONSOC 885Amina JamalSummer

SOC 885 Study Guide - Midterm Guide: Islamic Culture, Arab Culture, Edward Said

OC557315 Page
5 Mar 2013
110
View Document
RYERSONSOC 885Amina JamalSummer

SOC 885 Lecture Notes - Lecture 3: Islamic Feminism, Hijab, Foulard

OC557316 Page
5 Mar 2013
56
Experiences of veiling among muslim girls in a. Context of islamic schools in ontario: according to ontario ministry of education reported in 1999, 2,2
View Document
RYERSONSOC 885Amina JamalSummer

SOC 885 Chapter Notes -Ottoman Empire, Industrial Revolution, Upper Class

OC557313 Page
5 Mar 2013
26
Au: ahmed,l: european colonial powers in the late nineteenth and early twentieth centuries became overarching economic and political parameters of the
View Document
RYERSONSOC 885Amina JamalWinter

SOC 885 Chapter Notes -Headscarf, Hijab, Islamic Fundamentalism

OC557314 Page
5 Mar 2013
43
Law: the hijab debate and the exotic other female. The veil as a religious observance rather than a political symbol: raffarin, pm, stated that the pol
View Document
RYERSONHST 540Christopher PenningtonFall

Exam Prep Part 2.docx

OC5573113 Page
5 Mar 2013
77
Gehlen organization was an intelligence agency established in june 1946 by u. s. occupation authorities in the united states zone of germany, and consi
View Document
RYERSONHST 540Christopher PenningtonSummer

Exam Prep.docx

OC5573126 Page
5 Mar 2013
141
View Document
RYERSONITM 430Junlian XiangWinter

ITM 430 Study Guide - Final Guide: Domain Model, Use Case, Unified Medical Language System

OC5573118 Page
5 Mar 2013
74
Requirements analysis - the purpose of requirements analysis is to understand some of the goals of the computer system that we will design: use case mo
View Document
RYERSONITM 410Irene LeeWinter

ITM 410 Study Guide - Midterm Guide: Business Process Management, Business Process, Order Fulfillment

OC5573120 Page
5 Mar 2013
235
Business process - a process is a series of activities or tasks which transforms inputs into outputs. Physical - the transformation of raw materials to
View Document
RYERSONITM 350Franklyn PrescodWinter

ITM 350 Study Guide - Midterm Guide: Secure Electronic Transaction, Digital Currency, Electronic Data Interchange

OC5573117 Page
5 Mar 2013
79
Issues to consider in choosing: cost per transaction and to set up, repudiability and authentication, acceptance (familiarity/ubiquity) and convenience
View Document
RYERSONITM 315Frank PrychidnyWinter

ITM 315 Study Guide - Midterm Guide: Microsoft Management Console, Network Security Policy, Event Viewer

OC557317 Page
5 Mar 2013
43
A new mmc snap-in offers new and improved features for managing group policy across the enterprise. Key features available only in gpmc that improve ma
View Document
RYERSONITM 315Frank PrychidnyWinter

ITM 315 Study Guide - Midterm Guide: Microsoft Management Console, Ntfs, File System Permissions

OC5573114 Page
5 Mar 2013
34
A data resource made available over a network to authorized network clients. Specific permissions required for creating, reading, modifying. Computer m
View Document
RYERSONITM 315Frank PrychidnyWinter

ITM 315 Study Guide - Midterm Guide: Windows Server 2003, Netiq Edirectory, Active Directory

OC5573121 Page
5 Mar 2013
51
For everyday needs of small to large businesses or as a departmental server in large environments. Supports up to 4 processors in the server (for symme
View Document
RYERSONPCS 181Margaret BuckbyFall

Final Prep.docx

OC5573110 Page
5 Mar 2013
33
The scientific method - body of techniques for investigating phenomena, acquiring new knowledge, or correcting and integrating previous knowledge: obse
View Document
RYERSONITM 500Raymond MossWinter

ITM 500 Chapter Notes -Oracle Vm Server For Sparc, Unique Key, Data Modeling

OC557313 Page
5 Mar 2013
108
Ca erwin data modeler (erwin) is a software tool for data modeling (data requirements analysis, database design etc) of custom developed information sy
View Document
RYERSONITM 500Raymond MossWinter

ITM 500 Chapter Notes -Aggregate Function

OC557312 Page
5 Mar 2013
104
Where conditions: cannot have aggregate functions (syntax error) Having: only use conditions that involve an aggregate function aggregate function is a
View Document
RYERSONITM 407Candace GrantWinter

ITM 407 Study Guide - Final Guide: Expert System, 18 Months, In Essence

OC557313 Page
5 Mar 2013
33
Ict professionals have a responsibility to the public, as outlined in the sei code of conduct. Ict professionals shall act consistently with the public
View Document
RYERSONITM 407Candace GrantWinter

ITM 407 Study Guide - Midterm Guide: Digital Rights Management, Professional Code Of Quebec, Copyright Infringement

OC5573110 Page
5 Mar 2013
46
1 hr, in class, closed book , paper based. 2 short answer questions 1 compulsory and 1 choose from 3 8 marks. Case is the london ambulance case in your
View Document
RYERSONECN 204Amy PengWinter

Finals Prep.docx

OC5573115 Page
5 Mar 2013
61
The equilibrium output is that out put which creates total spending just sufficient to produce that output. No unplanned changes in inventories saving
View Document
RYERSONECN 204Amy PengWinter

ECN 204 Study Guide - Midterm Guide: Gross National Product, Canada Pension Plan, Resource Allocation

OC5573112 Page
5 Mar 2013
60
Macroeconomics examines the whole economy the subdivisions or aggregates. Individual units (household, firm or industry) and their decision making proc
View Document
RYERSONLAW 122Gil LanFall

LAW 122 Study Guide - Final Guide: Public Nuisance, Strict Liability, False Statement

OC5573134 Page
5 Mar 2013
118
Business torts: deal with situations in which one business may try to gain an advantage over another. Whether the tort must involve behaviour that is o
View Document
RYERSONLAW 122Gil LanFall

LAW 122 Study Guide - Midterm Guide: Professional Liability Insurance, Trial Division, Liability Insurance

OC5573114 Page
5 Mar 2013
37
Risk management process of identifying, evaluating, and responding to the possibility of harmful events. Risk avoidance avoid a serious all together. R
View Document
RYERSONITM 305Lin Ying DongFall

ITM 305 Study Guide - Final Guide: Use Case Diagram, Sequence Diagram, Activity Diagram

OC5573110 Page
5 Mar 2013
95
Requires several interrelated models to create a complete set of specifications. Divide and conquer strategy toward complexity for better understanding
View Document
RYERSONITM 305Lin Ying DongFall

ITM 305 Study Guide - Midterm Guide: Software Development Process, Systems Development Life Cycle, Project Management Software

OC5573115 Page
5 Mar 2013
100
System analyst someone who solves problems using information systems technology. Needs broad knowledge and variety of skills including technical, busin
View Document
RYERSONITM 301Franklyn PrescodFall

ITM 301 Study Guide - Midterm Guide: Simple Mail Transfer Protocol, Optical Fiber Cable, Statistical Time-Division Multiplexing

OC5573131 Page
5 Mar 2013
143
Server (host computer) stores data or software that can be accessed by the clients. Client the input-output hardware device at the user"s end of a comm
View Document
RYERSONECN 104Amy PengFall

ECN 104 Chapter Notes -Absolute Advantage, Opportunity Cost, Comparative Advantage

OC5573117 Page
5 Mar 2013
32
Scarcity means that we have to make choices. Having more of one good thing usually means having less of another. Economics: the study of how people mak
View Document
RYERSONPOL 128Laurinda Hartt- Fournier

POL 128 Study Guide - Final Guide: War Measures Act, Maurice Duplessis, Pierre Laporte

OC5573112 Page
5 Mar 2013
165
Dichotomize - divide into two opposing groups or kinds. You"re either with us or against us. Marginalization - the importance of attention that needs t
View Document
RYERSONPOL 128Laurinda Hartt- FournierWinter

POL 128 Study Guide - Midterm Guide: Little Miss Sunshine, Crane Shot, Richard B. Hoover

OC557318 Page
5 Mar 2013
67
Reproduces, reinforces, and reflects society values of the society but it also challenges societal norms. Olive hoover (daughter) arrives late for cont
View Document
RYERSONITM 200Youcef DerbalWinter

ITM 200 Study Guide - Final Guide: Javac, Boolean Expression, Structured Programming

OC557317 Page
5 Mar 2013
233
Class structures and organises a program; has to have the same name as the program itself class quadraticeq { Methods all instructions must be inside a
View Document
RYERSONITM 100Ron BabinWinter

ITM 100 Study Guide - Final Guide: Electronic Data Interchange, Computer-Aided Software Engineering, Secure Electronic Transaction

OC5573122 Page
5 Mar 2013
22
The big four is development questions the four questions an organizations needs to address before implementing a new is for itself. Financially feasibi
View Document
RYERSONITM 100Ron BabinWinter

ITM 100 Study Guide - Midterm Guide: Hypertext Transfer Protocol, Internet Service Provider, Wide Area Network

OC5573111 Page
5 Mar 2013
31
Midterm chaps 1-5/tech guide a,b, c, e. Knowledge-enabled professional - a person who uses information, information systems, and information technology
View Document
RYERSONCMN 124Kathryn VoltanWinter

CMN 124 Lecture Notes - Phrasal Verb, Adpositional Phrase, Independent Clause

OC557312 Page
5 Mar 2013
38
Verb it is an action like run, walk etc. Voice- a term that describes a verb"s ability to show whether the subject of a sentence acts or is acted upon.
View Document
RYERSONACC 100Anthony ChanWinter

ACC 100 Study Guide - Final Guide: Subledger, Cash Flow Statement, Inventory Turnover

OC5573120 Page
5 Mar 2013
156
View Document