Multiple activity charts, Computer Networking

A multiple activity chart records the related sequence of activities of more than one subject, men and / or machine on a common time scale showing the relationship between them. By recording their activities separately , it is possible to depict on the chart the periods of working and non working on the part of any of the subjects during a cycle of the process. A study of the chart would bring to light the activity interference or the ineffective utilization of men and/ or machine and action can be taken to rearrange the activities to eliminate or reduce the idleness or ineffective time.

The activities of different workers and machines are recorded against a common time scale in sequence in terms of working time and idle time by drawing respective bars. These timings can be observed by an ordinary wristwatch or a stopwatch according to the accuracy required and the duration of each activity. Timings can also be built up from previous measurements.

The inactive activity is left blank, whereas the active one is normally shaded. Sometimes the followings shadings are also used to represent each activity.

Posted Date: 3/26/2013 4:03:29 AM | Location : United States







Related Discussions:- Multiple activity charts, Assignment Help, Ask Question on Multiple activity charts, Get Answer, Expert's Help, Multiple activity charts Discussions

Write discussion on Multiple activity charts
Your posts are moderated
Related Questions
Tunnelling To guarantee privacy for the  organization, VPN specifies that each IP datagram destined for private  use of the  organization, must  first be  encrypted and then en

MPI contains hundreds of functions, a small subset of which is enough for most practical purposes. We shall talk about some of them in this unit. Functions for MPI Environment:

Routing Table A routing  table has columns  for at  three types o information  the network  ID  the cost  and the  ID of the  next  router. The  network  ID is the final  desti

The original IP address procedure divides host addresses into three base classes. The class of an address calculates the boundary between the network suffix and prefix. The origina


Encoding Process c= uG u: binary data sequence of length 4( input) G: Generator matrix which is 7*4 c: Codeword     D

Q. Show the Error control in TCP? Error control in TCP Detect lost segments, out-of-order segments, corrupted segments and duplicated segments Three tools: chec

Can you describe transport and tunnel mode in detail with datagram packets?

Configure IP Settings for the Linksys WRT300N The best way to understand the following settings is to think of the WRT300N as being same to a Cisco IOS-based router with two di