What is Global Human Resource Management (GHRM)?
Definition: Global Human Resource Management (GHRM) refers to managing human resources in an international business environment, addressing diverse cultural, legal, and economic systems.
Scope: It involves recruiting, training, developing, and retaining employees across different countries and regions.
Cultural Sensitivity: GHRM requires understanding and managing cultural differences to ensure effective communication, motivation, and collaboration.
Here’s your revised text with relevant theories and key concepts bolded for emphasis:
Attachment Theories
Bowlby’s Monotropic Theory suggests that attachment is innate and pre-programmed for human survival. Humans are born with the need to attach to their offspring. This need to form one main attachment is known as monotropy.
Ainsworth’s Strange Situation is a laboratory observation designed to measure the quality of attachment and differences in attachment styles in infants. Devised in 1970,...
Define Data structure. Explain ADT with example.
A data structure is a specialized format for organizing, processing, and storing data in a computer so that it can be accessed and modified efficiently. Data structures are essential for managing large amounts of data and are fundamental to computer science and programming. They provide a way to manage data in a way that enables efficient algorithms to operate on that data.
Abstract Data Type (ADT)
An Abstract Data Type (ADT) is a theoretical concept
1. #include <stdio.h>
int stringLength(char str[])
{
int length = 0;
while (str[length] != '\0')
{
length++;
}
return length;
}
void stringConcatenate(char str1[], char str2[])
{
int i = 0, j = 0;
while (str1[i] != '\0')
{
i++;
}
while (str2[j] != '\0')
{
str1[i] = str2[j];
i++;
j++;
}
str1[i] = '\0';
}
int main()
{
char str1[100], str2[100];
int choice;
printf("Enter the first string: ");
scanf("%s", str1);
printf("Enter the second string:...
Separate Legal Entity
Limited Liability
Perpetual Succession
Transfer of Shares
Sue & Be Sued
Own Property
Professional Management
Better Funding Access
| Feature | Private Co. | Public Co. |
|---|---|---|
| Members | 2 to 200 | Min 7, No Max |
| Shares Transfer | Restricted | Freely Transferable |
| Public Investment | Not Allowed | Allowed via Prospectus |
| Directors | Min 2 | Min 3 |
| Suffix | Pvt Ltd | Ltd |
By Liability:
Steps involved in muscle contraction
Calcium ions is released from the sarcoplasmic reticulum
Calcium ions binds to troponin
Myosin cross- bridges bind to the actin
The myosin head pivots toward the center of the sarcomere
The myosin head binds an ATP molecule and detaches from actin
The free myosin head splits ATP
Connect
Terminal cisternae abutting a ttubule (E) Triad
Oxygen- binding protein found in muscle fibers (A) Myoglobin
Bundles of proteins (myofilaments) (B) Myofibril
Q) Key Central Government Institutions Supporting Entrepreneurship
To promote entrepreneurship and the growth of Micro, Small, and Medium Enterprises (MSMEs), the Central Government of India has established a comprehensive institutional support system.
These institutions provide finance, training, technical assistance, marketing support, and policy guidance to entrepreneurs.
2.1 National Small Industries Corporation (NSIC)
A Government of India enterprise under the Ministry of MSME.
Services Offered:
MOD-4 1. Project Evaluation (2 Marks)
Project evaluation is a systematic assessment of a project’s relevance, design, implementation, and outcomes.
It is carried out to determine the effectiveness, efficiency, impact, and sustainability of a project, and to draw lessons for future planning.
It helps in:
Measuring performance
Ensuring accountability
Enhancing learning for future projects
2. Objectives of Project Evaluation (1 Mark)
To assess whether the project has met its intended goals and objectives
Distributed mutual exclusion:-Distributed mutual exclusion algorithms coordinate access to shared resources in a distributed system, ensuring only one process uses it at a time. Unlike centralized systems, there's no single coordinator. These algorithms rely on message passing among processes to achieve mutual exclusion.Approaches include token-based (a unique token grants access), non-token-based (processes request permission using timestamps), and quorum-based (access granted if a majority of