Get help from the best in academic writing.

Discussion post_ PH 335

1. Assume that you want to make entry into community with which you are not familiar in order to help to organize and build the community. Describe such a community, and then describe what steps you would take to gain entrance into community.
2. If you wanted to find out more about your community’s resources regarding exercise programs, with who would you network? Provide a list of at least five contacts, and provide a one sentence rationale for why you selected each.

Probation and Parole—Theories for Treatment

Probation and parole are recognized as having two unique goals: protection of the community and rehabilitation of the offender. As Abadinsky (2018) has suggested, these goals are not mutually exclusive; rehabilitation can also make the community safer if it prevents the offender from recidivating. There are many theories used to guide the treatment of offenders while on probation or parole, some of which you explore in Chapter 7 of the course text.
In this Assignment, you choose a theory (or model) that aligns with your beliefs about the treatment of offenders. Then you use the theory or model to revisit probation and parole topics.
Reference: Abadinsky, H. (2018). Probation and parole: Corrections in the community (13th ed.). New York, NY: Pearson Education.
To prepare:
Select a theory or model from this week’s readings that resonates with your beliefs about the treatment of offenders who are on probation and parole.
Submit a 1,250- to 1,750-word paper that addresses the following bullets. Use the theory or model you selected to reexamine how you have thought about these issues from earlier in the course.
Identify the theory or model that you believe should guide the treatment of offenders on probation and parole and explain why. Use the theory or model to formulate responses to the following items.
Explain the purpose of community supervision.
Describe the difference between probation and parole and how the decision to grant each is made.
Describe the differences and similarities in the decision-making process for community supervision between adult and juvenile offenders.
Identify the challenges that offenders under community supervision face.
Recommend the most useful resources and services available for offenders on probation or parole.
Be sure to reference the course readings to support your responses.

Fixing a simple error in Java code

Religion and Theology Assignment Help I have all of the code finished. I just need someone to fix this one error that I am having. I have attached the error I am getting.
I am looking for someone that can do majority of my projects in this class.
This is due in 3 hours.

Fixing a simple error in Java code

I have all of the code finished. I just need someone to fix this one error that I am having. I have attached the error I am getting.
I am looking for someone that can do majority of my projects in this class.
This is due in 3 hours.

Please solve the given problems

Problems C1, C2, C5, Textbook (modified)
1 (C.1.). Use the following code fragment:
Loop: ld x1,0(x2) ;load x1 from address 0 x2
ld x3, 0(x4);load x3 from address 0 x4
add x1,x1,x3 ;x1=x1 x3
sd x1,0,(x2) ;store x1 at address 0 x2
addi x2,x2,4 ;x2=x2 4
addi x4, x4, 4;x4=x4 4
sub x6,x5,x2 ;x6=x5-x2
bgt x6, Loop ;branch to Loop if x6 > 0
Assume that the initial value of x5 is x2 396 (loop is repeated 99 times)
a. Data hazards are caused by data dependences in the code. Whether a dependency causes a hazard depends on the machine implementation (i.e., number of pipeline stages). List all of the data dependences in the code above. Record the register, source instruction, and destination instruction; for example, there is a data dependency for register x1 from the ld to the add.
b. Show the timing of this instruction sequence for the 5-stage RISC pipeline without any forwarding or bypassing hardware but assuming that a register read and a write in the same clock cycle (for example, when an instruction writes back result to a register in cycle n, another instruction read the register in the same cycle n) as shown in Figure C.5. Use a pipeline timing chart like that in Figure C.8. Assume that the branch is handled by flushing the pipeline (that is, you lose 2 cycles regardless of the branch decision). If all memory references take 1 cycle, how many cycles does this loop take to execute?
c. Show the timing of this instruction sequence for the 5-stage RISC pipeline with full forwarding and bypassing hardware. Use a pipeline timing chart like that shown in Figure C.8. Assume that the branch is handled by predicting it as not taken (now if branch is not taken, we do not lose any cycles but if branch is taken, we lose 2 cycles -this is similar what I have shown in class). If all memory references take 1 cycle, how many cycles does this loop take to execute?
d. High-performance processors have very deep pipelines—more than 15 stages. Imagine that you have a 10-stage pipeline in which every stage of the 5-stage pipeline has been split in two. The only catch is that, for data forwarding, data are forwarded from the end of a pair of stages to the beginning of the two stages where they are needed. For example, data are forwarded from the output of the second execute stage to the input of the first execute stage, still causing a 1-cycle delay. Show the timing of this instruction sequence for the 10-stage RISC pipeline with full forwarding and bypassing hardware. Use a pipeline timing chart like that shown in Figure C.8 (but with stages labeled IF1, IF2, ID1, etc.). Assume that the branch is handled by predicting it as not taken ( that is, if branch is not taken, we do not lose any cycles but if branch is taken, we lose 4 cycles). How many cycles does this loop take to execute?
e. Assume that in the 5-stage pipeline, the longest stage requires 0.8 ns, and the pipeline register delay is 0.1 ns. What is the clock cycle time of the 5-stage pipeline? If the 10-stage pipeline splits all stages in half, what is the cycle time of the 10-stage machine?
Figure C.5 A set of instructions that depends on the add result uses forwarding paths to avoid the data hazard. The inputs for the sub and and instructions forward from the pipeline registers to the first ALU input. The or receives its result by forwarding through the register file, which is easily accomplished by reading the registers in the second half of the cycle and writing in the first half, as the dashed lines on the registers indicate. Notice that the forwarded result can go to either ALU input; in fact, both ALU inputs could use forwarded inputs from either the same pipeline register or from different pipeline registers. This would occur, for example, if the and instruction was and x6,x1,x4.
Figure C.6 Forwarding of operand required by stores during MEM. The result of the load is forwarded from the memory output to the memory input to be stored. In addition, the ALU output is forwarded to the ALU input for the address calculation of both the load and the store (this is no different than forwarding to another ALU operation). If the store depended on an immediately preceding ALU operation (not shown herein), the result would need to be forwarded to prevent a stall.
Figure C.8 In the top half, we can see why a stall is needed: the MEM cycle of the load produces a value that is needed in the EX cycle of the sub, which occurs at the same time. This problem is solved by inserting a stall, as shown in the bottom half.
2 (C-2). Suppose the branch frequencies (as percentages of all instructions) are as follows:
Conditional branches 20%
Jumps and calls 5%
Taken conditional branches 75% are taken
a. We are examining a five-stage pipeline where the branch is resolved at the end of second cycle for unconditional branches and at the end of third cycle (Execute) for conditional branches. Show how many cycles are lost for unconditional branches; when a conditional branch is taken and when a conditional branch is not taken. Given the data in the table, how many cycles are lost due all branch instructions?
b. Now assume a high-performance processor in which we have a 15-deep pipeline where the branch is resolved at the end of the fifth cycle for unconditional branches and at the end of the tenth cycle for conditional branches. Show how many cycles are lost for unconditional branches, when a conditional branch is taken and when a conditional branch is not taken. Given the data in the table, how many cycles are lost due all branch instructions?
3 (C-5). For these problems, we will explore a pipeline for a register-memory architecture. The architecture has two instruction formats: a register-register format and a register-memory format. There is a single-memory addressing mode (offset base register). The ALU operations can of two types:
ALUop Rd, Rs1, Rs2 ? this is similar to RISC V instructions
or
ALUop Rd, Rs1, disp(R2) ? here we add the contents at the memory location to Rs1
? the result is stored in Rd
? Memory address is computed using (Rs2) disp
Branches compare of two registers and are PC relative (add the constant in the instruction to PC). We will still have RISC V like load and store instructions.
Assume that this machine is pipelined so that a new instruction is started every clock cycle. The pipeline structure, similar to that used in the VAX 8700(Clark, 1987), is shown below
IF RF ALU1 MEM ALU2 WB
IF RF ALU1 MEM ALU2 WB
IF RF ALU1 MEM ALU2 WB
IF RF ALU1 MEM ALU2 WB
IF RF ALU1 MEM ALU2 WB
IF RF ALU1 MEM ALU2 WB
The first ALU stage (ALU1) is used for effective address calculation for memory references and branches. The second ALU stage (ALU2) is used for ALU operations and branch comparison. RF is both a decode and register-fetch cycle. Assume that when a register read and a register write of the same register occur in the same clock, the write data are forwarded (That is, the new data written to the register is the value that is read).
a. Find the number of adders needed, counting any adder or incrementor; show a combination of instructions and pipe stages that justify this answer. You need only give one combination that maximizes the adder count.
b. Find the number of register read and write ports and memory read and write ports required. Show that your answer is correct by showing a combination of instructions and pipeline stage indicating the instruction and the number of read ports and write ports required for that instruction. Note the number of register read ports depends on how many register sources are accessed in a given cycle. Likewise the number of register write ports depend on how many different registers are written in a given cycle. The same applies to memory read and write ports.
c. Determine any data forwarding for any ALUs that will be needed. Assume that there are separate ALUs for the ALU1 and ALU2 pipe stages. Put in all forwarding among ALUs necessary to avoid or reduce stalls. Show the relationship between the two instructions involved in forwarding using the format of the table in Figure C.23 but ignoring the last two columns. Be careful to consider forwarding across an intervening instruction—for example,
add x1, …
any instruction
add …, x1, …
d. Show all of the data forwarding requirements necessary to avoid or reduce stalls when either the source or destination unit is not an ALU. Use the same format as in Figure C.23, again ignoring the last two columns. Remember to forward to and from memory references.
e. Show all the remaining hazards that involve at least one unit other than an ALU as the source or destination unit. Use a table like that shown in Figure C.25, but replace the last column with the lengths of the hazards.
f. Show all control hazards by example and state the length of the stall. Use a format like that
shown in Figure C.11, labeling each example.
Figure C.11 The behavior of a delayed branch is the same whether or not the branch is taken. The instructions in the delay slot (there was only one delay slot for most RISC architectures that incorporated them) are executed. If the branch is untaken, execution continues with the instruction after the branch delay instruction; if the branch is taken, execution continues at the branch target. When the instruction in the branch delay slot is also a branch, the meaning is unclear: if the branch is not taken, what should happen to the branch in the branch delay slot? Because of this confusion, architectures with delay branches often disallow putting a branch in the delay slot.
Figure C.23 Forwarding of data to the two ALU inputs (for the instruction in EX) can occur from the ALU result (in EX/MEM or in MEM/WB) or from the load result in MEM/WB. There are 10 separate comparisons needed to tell whether a forwarding operation should occur. The top and bottom ALU inputs refer to the inputs corresponding to the first and second ALU source operands, respectively, and are shown explicitly in Figure C.18 on page C.30 and in Figure C.24 on page C.36. Remember that the pipeline latch for destination instruction in EX is ID/EX, while the source values come from the ALUOutput portion of EX/MEM or MEM/WB or the LMD portion of MEM/WB. There is one complication not addressed by this logic: dealing with multiple instructions that write the same register. For example, during the code sequence add x1, x2, x3; addi x1, x1, 2; sub x4, x3, x1, the logic must ensure that the sub instruction uses the result of the addi instruction rather than the result of the add instruction. The logic shown here can be extended to handle this case by simply testing that forwarding from MEM/WB is enabled only when forwarding from EX/MEM is not enabled for the same input. Because the addi result will be in EX/MEM, it will be forwarded, rather than the add result in MEM/WB.
Figure C.25 To minimize the impact of deciding whether a conditional branch is taken, we compute the branch target address in ID while doing the conditional test and final selection of next PC in EX. As mentioned in Figure C.19, the PC can be thought of as a pipeline register (e.g., as part of ID/IF), which is written with the address of the next instruction at the end of each IF cycle.

Portrait of a writer

University of Memphis / ENGL 1010
Portrait of a Writer
Rough Draft Due for Peer Review: Sunday, April 3
Final Draft Due: Sunday, April 10
Length: 1500-1600 words
Description
The goal of this assignment is to compose an interesting,
insightful portrait of a writer in order to more fully understand
the processes of writing and how our experiences and attitudes
affect our writing. The subject of your portrait must be someone
who regularly engages in writing for academic or professional
purposes (e.g., a student, someone working in an area or career
that interests you, or even a protessional writer you may know).
Collecting Information
As with most research projects, the more information gathered,
the better. Your research will rely on two primary strategies:
1) Conduct a series of interviews with your subject so that
you can ask follow-up questions. Ask about the writer’s
processes and attitudes when it comes to writing.
2) Analyze your subject’s writing samples–ask the writer to
share as much as possible.
Analyzing Information
As you gather and review information about the subject of your
study, what stands out to you about the writer’s attitudes and
processes when it comes to writing? What do the writing
samples reveal about the writer’s attitudes and processes? What
strikes you about the writer’s struggles and accomplishments?
Planning and Drafting
A portrait is your interpretation of all the information you
collect. Strive to make sense of everything you learn about the
writer and convey that to the reader. Adopt the impartial,
analytical stance of a researcher conducting a study. Provide
important background and analyze the writer’s own work and
words to develop your portrait, quoting/paraphrasing from
the writing samples and interviews.
There are many ways you can arrange your material, You could
arrange your material by topic: memories, attitudes, struggles,
successes, processes, nonacademic Whiting, etc. Another way of
arranging material would be to construct a chronological history
of the writer. Or, you could organize by aspects of the writing
process (e.g., invention, drafting, revising, editing).
What Makes It Effective?
An effective portrait is vivid: rich with details, examples,
Previous
Next

How incentive pay affects employee engagement, satisfaction, and trust

Objective: Beyond investing more money in pay and benefits, HR managers need to allow employees to tailor human capital, like time, energy, attraction and etc., to their own needs.
1. For each question, you might answer and write up one paragraph of around 50 words.
Wait, is this a case story? In fact, this is an executive summary of the top research paper, “Does contingent pay encourage positive employee attitudes and intensify work?”, published in Human Resource Management Journal. You can find the research paper in the section of “additional cases” in the course D2L.
Why did HBR publish it as a case story? …En…I guess first because it’s really good research with impressive managerial implications. Secondly, this case study follows the formal structure of a quantitative study as “introduction, theory, method, results, and discussion”. It could be a good example for you when you don’t have a clear picture on the final paper, you could write up a summary like this paper and then expand it for a full paper.
Questions:
1. Among these quantitative results, which one surprises you? Why? For example, I was shocked by the negative relationship between share ownership and job satisfaction.
2. Do you think it’s a good idea to interview one or two HR managers for your case study research?
Reply to Thread

Windows Server (Active Directory and Domain Controller) Network Scenario

You are part of a system admin team for the DEF Company that has an enterprise network of 500 users and three Windows Server 2016 DCs. All users and DCs are contained within a single building. The company is adding three satellite locations that will be connected to the main site via a WAN link. Each satellite location will house between 30 and 50 users. One location has a dedicated server room where you can house a server and ensure physical security. The other two locations don’t have a dedicated room for network equipment. The WAN links are of moderate to low bandwidth.
Explain an Active Directory structure taking into account global catalog servers, FSMO roles, sites, and domain controllers. Please explain the features of DCs and Active Directory that would be used within your team’s design. Please include 7 or more detailed sentences.

Global Studies Question

I have only appointed the section for “deficit spending”. The time period with INFLATION post-Bretton woods; 3.5 pages on the causes and 3.5 pages on what has been done in the past to prevent deficit spending. There is more overall work because it is a group assignment and I will later attach group members’ work as all group members’ work is to come together to form one large essay and I am only to do the deficit spending section. A lot of sources are needed, all need to be scholarly articles, scholarly journals, and any other accredited or verified sources similar to scholarly articles. Rougly 20 sources are needed for this and non can be news articles.

Philosophy Question

Attached is the required reading. After reading the pages, please write an essay of 500-600 words. The essay should be on the following prompt
1. Read the pages
2. 500Find an argument stated by the author (use evidence from the reading)
3. Describe the argument (first paragraph)
4. Make an argument contradicting to the above argument (evidence from the reading) and explain it. (second paragraph…”in my opinion”)
Please do not use any outside sources.

error: Content is protected !!