Premium Essay

Macro Instructions

In: Business and Management

Submitted By codeman
Words 382
Pages 2
Discussion Board Instructions
You are required to complete 4 Discussion Board Forums throughout this course. You will research a topic, compose a thread discussing the topic, and reply to at least 2 classmates’ threads. Research outside of the textbook is required for each forum. Acceptable research sources include your textbook, periodicals, journals, newspapers, magazines, and the Bible. The research required for each Discussion Board Forum topic can be accomplished at the Liberty University Online Library via Services/Support on the course menu. Look under Academic Resources for the Library link (sources such as Wikipedia, About.com, book reviews, and blogs are prohibited).

In each thread and reply, you must demonstrate a fundamental understanding of the economic theory and outside research for the specific topic. You must adhere to current APA style when formatting your posts and citing your sources.

Each thread must contain at least 3 or 4 paragraphs including a minimum of 300 words. * In the first paragraph, discuss the relevant economic theory of your topic (your textbook is a good source for this paragraph). * In the second paragraph, you must include outside research to corroborate your thread (from the Liberty University Online Library or elsewhere). * In the third paragraph, cite and discuss a real-world example of your topic. * In the fourth paragraph, integrate biblical insights into your discussion board thread. * Title your thread according to your topic. * There must not be more than 3 students writing about the same topic. * Each thread must contain a minimum of 3 citations in current APA format.

Each of your 2 replies must contain at least 1 or 2 paragraphs including a minimum of 100 words. One of your replies must cover a topic different than the one you discussed in your thread. Seek to understand your...

Similar Documents

Free Essay

Written Report

...Written Report MACRO COMPUTER SCIENCE What is a Macro Computer? A macro (short for "macroinstruction", from Greek μακρο- 'long') in computer science is a rule or pattern that specifies how a certain input sequence (often a sequence of characters) should be mapped to a replacement output sequence (also often a sequence of characters) according to a defined procedure. The mappings process that instantiates (transforms) a macro use into a specific sequence is known as macro expansion. A facility for writing macros may be provided as part of a software application or as a part of a programming language. In the former case, macros are used to make tasks using the application less repetitive. In the latter case, they are a tool that allows a programmer to enable code reuse or even to design domain-specific languages. Macros are used to make a sequence of computing instructions available to the programmer as a single program statement, making the programming task less tedious and less error-prone. (Thus, they are called "macros" because a big block of code can be expanded from a small sequence of characters). Macros often allow positional or keyword parameters that dictate what the conditional assembler program generates and have been used to create entire programs or program suites according to such variables as operating system, platform or other factors. The term derives from "macro instruction", and such expansions were originally used in generating assembly......

Words: 1595 - Pages: 7

Free Essay

Asdsad

...COMPLETE 8086 INSTRUCTION SET Quick Reference: AAA AAD AAM AAS ADC ADD AND CALL CBW CLC CLD CLI CMC CMP CMPSB CMPSW CWD DAA DAS DEC DIV HLT IDIV IMUL IN INC INT INTO IRET JA JAE JB JBE JC JCXZ JE JG JGE JL JLE JMP JNA JNAE JNB JNBE JNC JNE JNG JNGE JNL JNLE JNO JNP JNS JNZ JO JP JPE JPO JS JZ LAHF LDS LEA LES LODSB LODSW LOOP LOOPE LOOPNE LOOPNZ LOOPZ MOV MOVSB MOVSW MUL NEG NOP NOT OR OUT POP POPA POPF PUSH PUSHA PUSHF RCL RCR REP REPE REPNE REPNZ REPZ RET RETF ROL ROR SAHF SAL SAR SBB SCASB SCASW SHL SHR STC STD STI STOSB STOSW SUB TEST XCHG XLATB XOR Operand Types: REG: AX, BX, CX, DX, AH, AL, BL, BH, CH, CL, DH, DL, DI, SI, BP, SP. SREG: DS, ES, SS, and only as second operand: CS. Memory: [BX], [BX+SI+7], variable, etc… Immediate: 5, -24, 3Fh, 10001101b, etc... Notes: • When two operands are required for an instruction they are separated by comma. For example: REG, memory • When there are two operands, both operands must have the same size (except shift and rotate instructions). For example: AL, DL DX, AX m1 DB ? AL, m1 m2 DW ? AX, m2 • Some instructions allow several operand combinations. For example: memory, immediate REG, immediate memory, REG REG, SREG • Some examples......

Words: 5786 - Pages: 24

Free Essay

The Gathering Storm

...VESPASIAN ROME’?S EXECUTIONER Robert Fabbri read Drama and Theatre at London University and has worked in film and TV for twenty-five years. As an assistant director he has worked on productions such as Hornblower, Hellraiser, Patriot Games and Billy Elliot. His lifelong passion for ancient history –? especially the Roman Empire –? inspired the birth of the Vespasian series. He lives in London and Berlin. First published in Great Britain in 2012 by Corvus, an imprint of Atlantic Books Ltd. Copyright ©? Robert Fabbri 2012. The moral right of Robert Fabbri to be identified as the author of this work has been asserted in accordance with the Copyright, Designs and Patents Act of 1988. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior permission of both the copyright owner and the above publisher of this book. This is a work of fiction. All characters, organizations, and events portrayed in this novel are either products of the author’?s imagination or are used fictitiously. 9 8 7 6 5 4 3 2 1 A CIP catalogue record for this book is available from the British Library. ISBN: 978-1-84887-912-6 (Hardback) ISBN: 978-1-84887-913-3 (Trade paperback) ISBN: 978-0-85789-676-6 (eBook) Printed in Great Britain. Corvus An imprint of Atlantic Books Ltd ......

Words: 124835 - Pages: 500

Free Essay

Business Model

...Features • High Performance, Low Power Atmel®AVR® 8-Bit Microcontroller • Advanced RISC Architecture • • • • • • • • • – 131 Powerful Instructions – Most Single Clock Cycle Execution – 32 x 8 General Purpose Working Registers – Fully Static Operation – Up to 20 MIPS Throughput at 20MHz – On-chip 2-cycle Multiplier High Endurance Non-volatile Memory Segments – 4/8/16/32KBytes of In-System Self-Programmable Flash program memory – 256/512/512/1KBytes EEPROM – 512/1K/1K/2KBytes Internal SRAM – Write/Erase Cycles: 10,000 Flash/100,000 EEPROM – Data retention: 20 years at 85°C/100 years at 25°C(1) – Optional Boot Code Section with Independent Lock Bits In-System Programming by On-chip Boot Program True Read-While-Write Operation – Programming Lock for Software Security Atmel® QTouch® library support – Capacitive touch buttons, sliders and wheels – QTouch and QMatrix® acquisition – Up to 64 sense channels Peripheral Features – Two 8-bit Timer/Counters with Separate Prescaler and Compare Mode – One 16-bit Timer/Counter with Separate Prescaler, Compare Mode, and Capture Mode – Real Time Counter with Separate Oscillator – Six PWM Channels – 8-channel 10-bit ADC in TQFP and QFN/MLF package Temperature Measurement – 6-channel 10-bit ADC in PDIP Package Temperature Measurement – Programmable Serial USART – Master/Slave SPI Serial Interface – Byte-oriented 2-wire Serial Interface (Philips I2C compatible) – Programmable Watchdog Timer......

Words: 4689 - Pages: 19

Free Essay

Cisc vs Risc

...A Tale of Two Processors: Revisiting the RISC-CISC Debate Ciji Isen1, Lizy John1, and Eugene John2 1 ECE Department, The University of Texas at Austin ECE Department, The University of Texas at San Antonio {isen,ljohn}@ece.utexas.edu, ejohn@utsa.edu 2 Abstract. The contentious debates between RISC and CISC have died down, and a CISC ISA, the x86 continues to be popular. Nowadays, processors with CISC-ISAs translate the CISC instructions into RISC style micro-operations (eg: uops of Intel and ROPS of AMD). The use of the uops (or ROPS) allows the use of RISC-style execution cores, and use of various micro-architectural techniques that can be easily implemented in RISC cores. This can easily allow CISC processors to approach RISC performance. However, CISC ISAs do have the additional burden of translating instructions to micro-operations. In a 1991 study between VAX and MIPS, Bhandarkar and Clark showed that after canceling out the code size advantage of CISC and the CPI advantage of RISC, the MIPS processor had an average 2.7x advantage over the studied CISC processor (VAX). A 1997 study on Alpha 21064 and the Intel Pentium Pro still showed 5% to 200% advantage for RISC for various SPEC CPU95 programs. A decade later and after introduction of interesting techniques such as fusion of micro-operations in the x86, we set off to compare a recent RISC and a recent CISC processor, the IBM POWER5+ and the Intel Woodcrest. We find that the SPEC CPU2006 programs are divided......

Words: 7813 - Pages: 32

Free Essay

The Following Questions

...Tutorial : 1 1. Introduction Q1. Answer in short. 1. What is system programming 2. State difference between system programming and application programming. 3. State difference between compiler and interpreter. 4. State advantages and disadvantages of interpreter as compare to compiler. 5. Which are the components of smac0 simulator? 6. Write down the instruction set of smac0 Q2. Write note on – 1. Editor 2. Assembler 3. Compiler 4. Interpreter 5. Preprocessor 6. Linker and loader 7. Debugger. 8. Operating system 9. Device drivers 10. Instruction format with instruction code Q3. Select the proper option 1. ---- is a not the system software. a. Editor b. compiler c. Linker d. Accounting software 2. ----- is the system software which does some processing on source program before compilation. a. Linker b. Loader c. Assembler d. Preprocessor 3. Using ---- user can watch the values of variables during step by step execution of program a. Compiler b. Editor c. Preprocessor d. Debugger 4. ----- is a process to execute program from specific memory area allocated to it. a. Linking b. Loading c. Translation d. Relocation 5. ----- is the system software which combines different object programs to create executable program a. Linker b. Loader c. Translator d. Editor Q.4 State true or false 1. System......

Words: 1377 - Pages: 6

Premium Essay

Beta Choice Coach

...Group: Instructions for using the Choice Coach if you have access to apps on the Google Play Store 1. Go to the following link to join the “Choice Coach Beta” Community: https://plus.google.com/communities/107641699106708452316 2. Once you have been approved to join the community, go to the following link to become a BETA tester: https://play.google.com/apps/testing/com.ida.decision 3. Then go to this link to install the latest BETA Choice Coach: https://play.google.com/store/apps/details?id=com.ida.decision&ah=r5GuZEkNcNoY55Y65bhrCIFD-ZQ 4. When opening the app for the first time you should see a “Code?” dialogue box. Make sure that you select “1”. 5. Use the app to help you with the Atlanta Kestrels case. 6. When you have completed the assignment, please email your results to rguymon@gsu.edu by Monday, March 10, at 11:59 p.m. It will count as your class participation points next week. a. To email the results, hold down on the decision name on the main menu. You will be prompted to take one of two actions. Please choose the share decision, and then email the results to me. 7. Be prepared to answer quiz questions about it in the next class. Instructions for using the Choice Coach Excel File 1. Download and open the Excel File, “Choice Coach for Kestrels1.xlsm” file on D2L. 2. Make sure that you enable the content so that the macros can run. (You probably want to use a PC to complete this. Excel macros do not......

Words: 681 - Pages: 3

Premium Essay

Macro Enviroment of Kfc

...SEPTEMBER 2014 _________________________________________________________________________ ARAHAN KEPADA PELAJAR / INSTRUCTIONS TO STUDENTS 1. Tugasan ini mengandungi SATU (1) soalan sahaja yang disediakan dalam Bahasa Melayu dan Bahasa Inggeris / This assignment contains only ONE (1) question that is set in both Malay and English. 2. Jawab dalam Bahasa Melayu atau Bahasa Inggeris. / Answer in Malay or English. 3. Muat turunkan templat tugasan versi bahasa yang berkenaan daripada MyVLE untuk penyediaan dan penyerahan tugasan anda. Tugasan anda hendaklah ditaip dengan menggunakan saiz fon 12 Times New Roman dan langkau baris 1.5. / Download the language version of the assignment template concerned from the MyVLE for preparation and submission of your assignment. Your assignment should be typed using 12 point Times New Roman font and 1.5 line spacing. 4. Tugasan anda hendaklah mengandungi 2500 hingga 3000 patah perkataan tidak termasuk rujukan. Bilangan perkataan hendaklah ditunjukkan di hujung tugasan anda. Jangan menyalin soalan dan arahan tugasan dalam jawapan anda. Pemeriksa tidak akan membaca jawapan tugasan yang melebihi had patah perkataan yang dibenarkan. Jumlah perkataan hendaklah dinyatakan di penghujung tugasan anda. / Your assignment should be between 2500 to 3000 words excluding references. Do not copy the assignment question and instructions to your answer. The number of words should be shown at the end of your assignment. Only assignment......

Words: 1586 - Pages: 7

Premium Essay

Nordstorm

...MGMT395 Case 1: Information & Instructions Pointers when writing up a "case" report 1. Write the introduction and conclusion AFTER responding to the questions. 2. The introduction should be one paragraph describing what your report will discuss. This is NOT an introduction to the company. 3. The conclusion should be a one paragraph summary (100 words) of your findings. No new points should be mentioned here. 4. Lead your responses by explaining the key terms. e.g. If you are asked about corporate strategies as they apply to a company, define "corporate strategy" - using your own words. Then indicate the strategy being used. Describe this type of strategy. Then, support your choice by using facts from either the case or your research. 5. Your responses to each question should be a minimum of 250 words (one page 11 pt. font, 1.5 spacing). 6. Your report should have the following elements: cover page, table of contents, introduction to your report, responses to each question, 100 word conclusion, and a reference page. Ensure you insert page numbers to align with your table of contents. 7. Each report must be submitted through Turn-it-in prior to handing in and include the Turnitin results. (Instruction available in the D2L course site.) 8. If you have any questions...please ask me! Case Assignment 1 USA Fashion Invasion Note: This is a group assignment and must be handed in as one document. You must have an introduction to your report (1-2 paragraphs describing what......

Words: 826 - Pages: 4

Premium Essay

Manage Business Document Design and Development

...completed to pass the unit. Assessment task Word limit Assessment 1: Auto-mark quiz Requires you to answer quiz questions online. N/A Assessment 2: Document standards and processes Requires you to complete a set of document processes and standards with a template. 700 words + Template Assessment 3: Testing, training and review Requires you to submit evidence of training, testing and reviewing documents. 1100 words + Evidence requirement The auto-mark questions (Assessment 1) are stand alone, and must be completed separately from Assessments 2, and 1.3. These are completed online. You are required to complete Assessments 2 and 3 with reference to: (a) a workplace project, or (b) the MacVille cafes study provided. Instructions Once you feel confident that you have covered the learning materials for this unit, you are ready to attempt this assessment. Construct your assessment in a commonly used software program such as Microsoft Word, or you can download a Microsoft Word copy of this assessment from the relevant study period of your course in OpenSpace. To help Open Colleges manage your assessment, please use the following file-naming convention when you save your Microsoft Word document. Your file should be named and saved to your computer’s...

Words: 1195 - Pages: 5

Free Essay

User Manual Critique

...User Manual Critique Chris Bolte ENG/221 November 5, 2012 Janet Chappell So many people depend on some form of media to escape the everyday grind, stay informed, or simply to relax. Media comes in many forms, such as film, radio, internet, and text. Consumers all over the world fill their homes with these many forms of media. In fact, as of May, 2011, consumers worldwide spent over $4.2 billion dollars on home entertainment, and that figure is down from the previous year by 9.8% (Dan, 2011). That is not $4.2 billion spent a year -- that is $4.2 billion spent during the first quarter alone. With all of those media devises in all those homes, it can be a hassle keeping track of all those remote controls. After all, everything comes with a remote control these days. Many have tried to organize the handful of remotes that are in their possession by labeling them, keeping them in a designated drawer or basket, or even gone as far as “Velcroing” them to the wall. However, there is a better method to the madness that requires a little less creativity, but more ingenuity. It is a great little solution known as the universal remote. In most cases, you can put up to four devices onto one remote, eliminating the frustrating remote control cluster that many people deal with, and they can cost as little as $4 and up to more than $100. It all depends on your needs and budget. In this user manual critique, the item reviewed is the One For All Universal Replacement...

Words: 1073 - Pages: 5

Premium Essay

Common Ms Office Errors

...Common MS Office Errors Abstract This paper gives a summary of each Microsoft Office application: Word, Excel, Access, and PowerPoint. For each application, common user errors will be identified, as well as step-by-step strategies to diagnose and troubleshoot the problems for each application. The step-by-step instructions are written for a beginner and intermediate user level. A PowerPoint presentation is included that resembles an actual presentation that could be used for training application support staff. Common MS Office Errors Microsoft Word Microsoft Word is a word processing software package that allows the user to create professional looking documents such as resumes, letters, reports, fax cover sheets, legal documents, brochures, manuals, and other documents. Not only can a user create these document types, they can also create tables and graphs, apply themes and styles, print documents, envelopes and labels. Microsoft Word is easy for beginners to advanced users to create documents with its easy-to-use interface, document wizards, and templates. Microsoft Word is currently the most commonly used word processing software on the market. It is used in schools, universities, businesses, and homes everywhere. The most common errors in Microsoft Word are: recovering lost files, adjusting spaces between lines and paragraphs, spell checker not recognizing misspelled words, opening and saving Word 2007 files in earlier versions, viewing and printing files from......

Words: 1351 - Pages: 6

Premium Essay

It240 Check Point Threat Categorization

... | |Boot sector - Is the area of the computer that contains storage devices like hard drives, and is the area where the firmware and software boot from | |because the codes are located here. | |File – Is a place where data is stored on a computer, there are many different types of files and most if not all data is stored in a file. | |Multipartite - divided or having many sectors, very applicable to computers since they have many parts and are divided into sectors and sections. | |Macro – Instructions, usually one that can automatically turn into more instructions. | |Trojan horse - A virus that allows a backdoor into a computer affecting the computer without the users knowledge and allows the information stored | |on the infected computer to be stolen. | |E-mail worms – A worm that spreads through the user of the user’s email account(s). | |Instant messaging worms – A worm that can replicate it’s self and uses the user’s buddy list and address book on an instant messaging application to | |spread itself....

Words: 829 - Pages: 4

Premium Essay

P1 - Unit 1

...For P1, learners will need to explain how spreadsheets can be used to solve complex problems, and they should provide examples to support their explanation. For P2, learners will need to develop a complex spreadsheet model, where ‘complex’ requires that the spreadsheet contains some aspects of the following range: multiple worksheets (with links), complex formulae, for example at least two-step process, large data sets, cells linkage, data entry forms, for example menu systems, list boxes, drop-down boxes, event controls, data validation, error trapping, lookup tables, nested IF functions, templates, and cell protection. For P3, learners should solve a complex problem using formulae and functions in the spreadsheet. This might best be through a supplied scenario such as a cash flow forecast, a budgeting problem, and ‘what if’ analysis, payroll projections or another similar scenario. This should include some aspects of the following range: relative references, absolute references, logical functions, for example IF, AND, OR, NOT, SUMIF, correct operators, named ranges, file sharing, track changes, security issues, user interface, add-ins, built-in functions, for example cell functions, lookup functions, text functions, statistical function and finding data. P4 requires learners to create charts and graphs from numeric data sets. This can be either the same data used in different graphical images, or a number of different charts or graphs created from different data. Tutors...

Words: 653 - Pages: 3

Premium Essay

The Language of Programming

...The language of Programming Computer programming is governed by many different languages, most of which are simple codes used to define the program. These languages can be specified by their practical application or simplicity of use. They all have the same basic function, which is to take high-level speech and convert it into low-level speech or machine code. Machine code is written in a cryptic series of 1s and 0s referred to as binary. Choosing which language to use is solely dependent on what kind of program you want to make. Writing in a programming language is as close as a computer will get to natural or spoken language. Some examples of the different languages are C++, COBOL, Python, COMPASS, Pascal, and Assembly language. While hard to understand at first, with a little practice the code comes naturally. C++ C++ is one of the most popular programming languages with application domains including systems software, application software, device drivers, embedded software, high-performance server and client applications, and entertainment software such as video games. Several groups provide both free and proprietary C++ compiler software, including the GNU Project, Microsoft, Intel and Embarcadero Technologies. C++ has greatly influenced many other popular programming languages, most notably C# and Java. C++ is sometimes called a hybrid language. It is possible to write object oriented or procedural code in the same program in C++. This has caused some concern that...

Words: 790 - Pages: 4