Multiple activity charts, Computer Networking

Assignment Help:

A multiple activity chart records the related sequence of activities of more than one subject, men and / or machine on a common time scale showing the relationship between them. By recording their activities separately , it is possible to depict on the chart the periods of working and non working on the part of any of the subjects during a cycle of the process. A study of the chart would bring to light the activity interference or the ineffective utilization of men and/ or machine and action can be taken to rearrange the activities to eliminate or reduce the idleness or ineffective time.

The activities of different workers and machines are recorded against a common time scale in sequence in terms of working time and idle time by drawing respective bars. These timings can be observed by an ordinary wristwatch or a stopwatch according to the accuracy required and the duration of each activity. Timings can also be built up from previous measurements.

The inactive activity is left blank, whereas the active one is normally shaded. Sometimes the followings shadings are also used to represent each activity.


Related Discussions:- Multiple activity charts

Define the term pipelined processor, Pipelined Processor A pipeline pro...

Pipelined Processor A pipeline processor can be described as a processor which comprises of a series of processing circuits known as segments and a stream of operands (data) is

Dijkstra algorithms - network layer and routing , Dijkstra Algorithms T...

Dijkstra Algorithms To calculate its  routing  table  each router applies an algorithm  called  the dijkstra algorithm to its  state database. The dijkstra algorithm  calculate

What is lrc, What is LRC? In LRC, a block of bits is separated into row...

What is LRC? In LRC, a block of bits is separated into rows and a redundant row of bits is added to the whole block. It can detect burst errors. If two bits in one data unit ar

Explain functions and protocols and services of each layer, Describe in pro...

Describe in proper details about OSI Model ? Explain the functions and protocols and services of each layer ?

Command to configure a explanation on an interface, Recognize the command t...

Recognize the command to configure a explanation on an interface Ans) Router(config-if)# explanation Finance department

What are the unix-based firewalls, What are the Unix-based firewalls T...

What are the Unix-based firewalls The Unix-based firewalls are considered most secured as compared to the Windows NT based ones. The firewalls bind the holes of the operating

Cidr presentation, Inside a device, every address mask is stored as a 32-bi...

Inside a device, every address mask is stored as a 32-bit number. When we submit a prefix and an address mask they use a changed form of dotted decimal addressing known CIDR addres

Rip routes entering and leaving the router, Recognize the command that will...

Recognize the command that will show the RIP routes entering and leaving the router? Ans) Route# debug ip rip

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd