Multiple activity charts, Computer Networking

Assignment Help:

A multiple activity chart records the related sequence of activities of more than one subject, men and / or machine on a common time scale showing the relationship between them. By recording their activities separately , it is possible to depict on the chart the periods of working and non working on the part of any of the subjects during a cycle of the process. A study of the chart would bring to light the activity interference or the ineffective utilization of men and/ or machine and action can be taken to rearrange the activities to eliminate or reduce the idleness or ineffective time.

The activities of different workers and machines are recorded against a common time scale in sequence in terms of working time and idle time by drawing respective bars. These timings can be observed by an ordinary wristwatch or a stopwatch according to the accuracy required and the duration of each activity. Timings can also be built up from previous measurements.

The inactive activity is left blank, whereas the active one is normally shaded. Sometimes the followings shadings are also used to represent each activity.


Related Discussions:- Multiple activity charts

Explain the static and dynamic interconnection network, Static and Dynamic ...

Static and Dynamic Interconnection Network In a static network, the connection amid input and output nodes is permanent and can't be changed. Static interconnection network can

What do you mean by platform independence, What do you mean by platform ind...

What do you mean by platform independence? Platform independence means that we can write and compile the java code in one platform (eg Windows) and can implement the class in a

Packets in eigrp, What are different kinds of packets in EIGRP?

What are different kinds of packets in EIGRP?

Ack received - trasnport layer, ACK Received If an ACK is received by ...

ACK Received If an ACK is received by the  sender. The  SR sender marks  that packet  as having  been received by the receiver.

Public key cryptography and private key cryptography, Question: a) Di...

Question: a) Differentiate between the following key terms used in any e-banking security system: (i) Authorisation v/s Authentication. (ii) Data Integrity v/s Data Conf

Define poison reverse, By entering a 16 as the hop count, the other routers...

By entering a 16 as the hop count, the other routers recognize that the destination is unreachable.

Determine the term- web server and webmaster, Determine the term- Web Serve...

Determine the term- Web Server and Webmaster Web Server: A host computer that stores Web pages and responds to requests for viewing. Web servers communicate with Web browse

Explain dynamic key management mechanism, Question: a) Consider the f...

Question: a) Consider the following MIP scenario. Quite a few enterprise networks use private addresses and NAPT for the communication to the Internet. i. Discu

What is an object server, With an object server, the Client/Server applicat...

With an object server, the Client/Server application is taken as a set of communicating objects. Client object commune with server objects using an Object Request Broker (ORB). The

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd