Multiple activity charts, Computer Networking

Assignment Help:

A multiple activity chart records the related sequence of activities of more than one subject, men and / or machine on a common time scale showing the relationship between them. By recording their activities separately , it is possible to depict on the chart the periods of working and non working on the part of any of the subjects during a cycle of the process. A study of the chart would bring to light the activity interference or the ineffective utilization of men and/ or machine and action can be taken to rearrange the activities to eliminate or reduce the idleness or ineffective time.

The activities of different workers and machines are recorded against a common time scale in sequence in terms of working time and idle time by drawing respective bars. These timings can be observed by an ordinary wristwatch or a stopwatch according to the accuracy required and the duration of each activity. Timings can also be built up from previous measurements.

The inactive activity is left blank, whereas the active one is normally shaded. Sometimes the followings shadings are also used to represent each activity.


Related Discussions:- Multiple activity charts

Security mechanism, How can the use of NAT and PAT, be considered a securit...

How can the use of NAT and PAT, be considered a security mechanism? Research the acronym(s) if it is not a part of your collection.

Calculate bandwidth needed for voice traffic, The second point to consider ...

The second point to consider is that from each location, some calls are internal to that site and some are going to outside locations. Again, as an approximation, MyCo telecom peop

Explain the meaning of negotiation, Explain the meaning of Negotiation ...

Explain the meaning of Negotiation Negotiation is process of getting both sides to agree on some values or parameters to be used during communication. Maximum packet size is on

Distance vector and link-state protocol, What's the difference among distan...

What's the difference among distance vector and link-state protocol?

Illustrate about the working of socks protocol, Illustrate about the workin...

Illustrate about the working of Socks protocol SOCKS is an open, industry-standard protocol advanced by the Authenticated Firewall Traversal working group of the IETF (Internet

What is the effect on the security of the password, Question: (a) What...

Question: (a) What is a script kiddie? Is it a significant security threat, and why? (b) Assume that UNIX uses the user login name in lieu of the traditional salt, what is

What are triggers and rules, Triggers are special user defined actions usua...

Triggers are special user defined actions usually in the form of stored procedures, that are automatically requested by the server based on data related events. It can perform diff

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd