V Subtraction, Multiplication and Division, "Geometrical Figures, Liries. * and Lineal Measurement, At..A

Total Page:16

File Type:pdf, Size:1020Kb

V Subtraction, Multiplication and Division, MOM ... EDli6MD ii030 430 AUTHOR " Beatty, ;Leslie: And Others TITLE Miftematicas Fara ta Escuela. Primarias Grado Li(Parte 2) Comentario% Traduccion Prelimimalr de la Ecticion en Ingles Revisadtta. (Mathematic's for the Elementary SchoolGrade 14 Part 2Teascher is Commentary. Pre3.tininary Translatiion of the Revised Enclish. Edition). r INSTITuTpN Statford Univ.,. talit;--Sc)foinlnitbema-tics -Study-- Group. .SPONS AG pri Natioaal Science Fountlation, Washingt.on, t.C. PUB DATE. 67 . NOTE' 145Bp.: For teleCte.d document in Spanish, see SE 0 0 1129. A.ANGULGE Spanish, EDRS PRICE. MF01/PC19 Plus Postage. DESCRIPTORS: *.Arithmetic: *Bilingual' Education': ne,mettaty Education: 4Elementariy School. Mthematics: Geometry; ' Grade 14: Instuctiona.1 Materials: *Mathmatics Curriculum: NathOmatics Instruction; *Te?tching , Guides IDENT PIERS *School Mathematics Study Group ABSTRACT This is Part 2 of the teacher os commentary for*the grade41 mathematics pro§ram.. Part 2' includes the ccmmentary for chapterp 6 through 10. Topics covered inclucle addition ana V subtraction, multiplication and division, "geometrical figures, liries. * and lineal measurement, aT..a. .tractiqns. (RH) .1% NE, V *****It*********************************,******************************** .4 ReproauCtions supplied by RDIIS are the best that can be made * * from the original document.' N * ************4********************************************************** . 4 44 4444. , a. ''' 444. 4, NtiAT.EMATIcAgPARA.L ESC:0E1A i'it.111/ARIA,. Grado 4 (Pane 2) Comentario. t. .(Traduccitin ireliminar de la Idicieiven isglis-reviaada) 1, *. **PERMISSION TO REPROD CE THIS U S DO.ARTMENT OF HEALTH. V MATERIAL HAS BEEN GR TED BY EDUCATION IL WELFARE NATIONALINSTITUTE OF EDUCATION 0..ivrks TH)S .DOCUME NT HAS BEEN REPRO- DUCE E x4( TY AS RECEIVE() F ROM i.*!n Niz THF RE ()SON OR ORGANIZA T ION ORIGIN- ATING )T POINTS OF VIEW OR OPINION" "STATED DO YOT NECESSARILY REPRE- TO THE EDUCATIONAL RESOURCES SENT OF F IC lAt. NATIONAL INSTITUTE OF INFORMATION C.FNTFF) (MCI ". # DLKAT ION POSITION OR POL IC`f a- V. a ',a a 4 4 MATEMATICA:S PAll'A LA ESCUELA PRIMARIA Grado 4 (Pine 2) Comentario (Traducción preliminar de la edicini en inglés revisada iléxt9 preparado bajo,la supervisiem del Comite para la.matemitica de la escuela primaria deI irupo de Estudio de la Matemi.tica Escolar: . Leslie Beatty Distrito eseelar de Chula Vista Chula Vista, California E. Glenadine Gibb Colegio.para Maestros del'Estado .de Iowa, Cedar FalId, Iowa W.41. Guy ,,Universidad de Texas S.B.yIackson - Universidad de Maryland Irene Sauble % Escuelas plib4.cas de Detroit Maa. Stone Universidad de Chicago Weavqr Universidad be Boston .112;L: wilder Universidad de Michigan .4;2W - a sos. ® 1967 by The Board ofTruitliteersigtsthe Leland Stanford junior University .Printed in the United Stattipf Ainerica Imp Permission to make verbatim use of material in this book must be secured from the Director of SMSG. Such permission will be planted except in unusual circumstances,Publications incorporating SMSG materials must include both an acknowledgment of the SMSG copyright (Yale Univer . sity or Stanford University, as the case may be) and a disclaimer of SMSG endorsement. Exclusive license will not be granted save in exceptio.nal circumstances, and then only by specific action of the Advismy Board of SMSG. V Financial support for the School Mathematics Study Group ha's been provided by the National Science poundation. Proy9rto de Traducci6n al Espgiol ,Comisi6n Consultiva -t egle, Universidad e Stanford. F. Fet4liniversidad de Columbia o Garcia, Univérsidad de.Puerto Rico S. Max Kramer, San Jose State College' 0 111 .TABLA DE lAS omeritario.Rara Texto dei el maestro estudAante r Oapitulo ' -6. PROPIEDADES Y,TEONIGAS DE LA ADIOION Y.SUSTRACCIdN II .503 Proptisita de'la unidad. ' 503' Aase latemitica* -0 * . 504. Enseftani& de la 1L-1:1aad 508 NombresdiferenZesp9.ra . el misma nilmero . 508,516 297 Rspaso de la adicion 512,516 - 299 His sdbre la adici6n 517,520 --I 300 a Otto m4tododara'sumar. 522,523' 302 4. .Repaso de la,sUstracción 528/531 307 146s sabre la sustracciOn 02,535 308'- &Ira m4odo-Para reStar 537,540 310 5u6ttacc16n con ceros 543 313 Relaci6n de las técnicas 1 de-la ad1ci6d'y la sustraccicin 545,548 315 El lenguaje de los pro- blemas de sustracc16n. 552,555 31/9 Razonamiento en la forma si-entonces 5571558 321 Rebaso 561,563 324 Amplicaci6n ..... 569,571 330 TEONICAS DE LA HULTIPLICAOION' Y LA DIVISION . 575 Prsv6sito de'la unidad . 575 Base matem4tiea 576 Ensetianza (re la unidad 585 Repaso de laimiltiplica- ci6n y la dIvlsión-- Operaciones 334, Multtplicaci6n porxrnil- tlplo.s diez 592,594 339 Mult1pi1cac1611 pormill- t._ tiplosele 597,599, 342 ' 4. -* kjOQmentario pain)! Texto del , CaPitulo el maest.ro estudiante MAs'.intormaclOn acerca. depqMo multiplic . 2 606 345, .kltiplicaci6n denu ergs maS grandes . 609) 6 1 1 , 34& metodo mis torto de 615.0611 '352 Mult1p1.1caci6n,de mimeros menores que 1007-7igor 620,623 355- Determlnación%de productos de dos nlimeros cualesr quierd mayores que (y menores que, 100),. 626,630' 358 Uso de la multlplitaci6A lb4, para resolver problemas en forma d9 cuentQ 636'4637 '36,4 S. Determlnaci6-factores \---desconocidos 64 6451. 367 Una,manera de dividir dos . ,numeros 65 654 373 lets 1nfoimaci6ntacercade la divisl.611. de dos nlimeros **** *** 658- 375 Uso de la divisiOn para resolver"problemal en' forma de cuento s f66,662. 377' Mis pricti6aen la dlvi- , si6n.de'n-ilmeros . 666,670 381 , Determinación de ,cocientes y residuos 674,678 85 Repaiydampliacion . 681,685 388 Ejerci6ios de prictica . 688 2391 Repaso 692 395 CARACTERIZACION DE F1GURAS GEOMETRICAS CORRIENTES 707 Prop6sito de,la unidad. 70 Base matilitica 708 Enseflanza. de-la 'unidad 716 Tus() triingulo y el adril4tero . 0716.718 410 Comparaci6n de segmentos- de recta 722,724' 414, vi 60 Oomen io para Texto. del el mstro estuaiante Oapitulo ) Triingulos iseafaeles yequiliteros 728)730 418 Angulos 'rectos 733,734, 421 Rectingulos y 'cuadrados "09,740 Ito Superficies' 743,761 429. Prisma rectangular 744,763 431 Priama,triangular' 747,767 45 Pir4m14e. .... 7480771 439 Oilindrd 751,773 441 Cono 754,777, 445 Superficie esf4rica 756,779 447 Cubo 758 Tetraedrp 759 Artatas y cams 781 449 MEDIOION LINEAL 783.2. Prop6sit.(5 de la unidad 783 pase matemitica' 6 784 Enseanza de la unidad . 797 Oomparación de tamahos 798,800 451 Comparación,de tamaflostn contar .... - 862 453 Uso de un compis pare comparar segmentos . 808 459 , edición de segmentos 81o,8 1 146i 1J:9c, de un compis-para modir segmentos recti- 813 .463 Medici6n con;la aproxima- 'cit4n de una unidad 815 465 Udd de unidades.normali- - Was de longitud 818,820 468 Escalas de . 826,827 474 USO4e.esca s .de medida 831 La esgala en pulgadas y la .escala'encentimetros . 83Z Otras unidades.normaliza- das 836,837 482 CombinaciOn*de longitudes 842 487 Perimetro 849,850 494 ,0 \-) i-Comentario pare. Texto del- Capitulo el maestro .estudiante Perimetros 'de poligonos 855 '.499 Meterminaoi6n de peri- metros .. a. 859 503 10. EL CONCEPTO DE IRTMERO RACIONAL863 _Prop6sito de la u4dad . 863 Una nota.para'el maestro 864 Base, matemitica Materiales . 879 Ensetanza.de la unUlad 885 , La idea de ntimer6 raeionai 885;889 506 Unt nueva. elase Nde 'Inimeros 893,894' 510 WiMeros ragianales mayores que pno . 902,905 Nombrei diferehtes para ,e1 MiBmo niimero . 911,013 524 0rdenaei6n de'los nilmeros raeionales 923,924 534 Una nueva clase de nombres930,932 540 Uo de los nximeros racionales 938,939 *546 lUerciePlas de prietiea 945 552 Repaso 949 556 S. viii \ OapItulo 4 0 ,PROPlEDADES Y TEbNICAS DE LA AD1CION YLi SUSTRACCIONII PROPOSITO DE-LA UNIDAD Ayudar a los estudiantes a Comprender tecnicas para sumar yreitarnUmeros'con numerales Ps varios digites, haeiandoles entender cOmo esas te,9nicaa dependen delas prepiedades devnuestro sistema denumeraci6n, dp las propiedades corimatativa y asociativa'de adici6n. - ) 2.*-4,0Pudar a los.estudiantes a'darsecuent'a de que si conocen . las combinations's bisicasde la adiciOn y 1as propiedades ., y-restar nil- . de la:"adiei6n y lasustiacci6n,pu*Sden.suar . i meros cuyos numerales eontenganvp..rioq-digitos. Iyudar a los esiu#antes a lograr destreza enL. adieicin y laAustracci6m,'Io midmo que en la comprobapión de los - resultados de diehas operaciones. Ayudar a-los' tatudianteh aperfaecionar su habilidad pava resolver prob emas mediante elempieo de enunciados.mate- mkticos en ea os que requierA Ia'adici6n y lasustracOión d9 niimeroi cuyossnumerales tienenyarioa digitos, dand9 preferenciaos. Aprender a decidircuindo se debe emplear la suOtmecion. Los alumnoe que ya hayan aprendido aemplear perfectamente las tecnicas ge adici6n la,.sustrac?i6n podrin:completar ripidilmente la primera mitad de esta upidad. Gtros alumnOs :deberin estudiailik cOn misdetenimiento. Sin embargo, la ex- plicaciem de los"concei4os fundamntales que seemplean en las t4onicas es importante y nd debe descuidose conninglin grupo. \porl contrario, debedetrsele.preferencia.' La explisepi6nide èsoa conceptos y'el desarrollo pela habilidS'd para rdsolver 'problemas son los obfetivos principales de es,taunidad. 4 4. 503 - 4 9, si* BA.SE MATEMATIOA 4 I. respuesta a_li.pregunta: %cal es lasuma (WI> y 2?", es 5 + 2. Generalmente, se considera lipe la pregunta significat ds el numeral decimal cle Iasuma de 5 S'T 2?" Para esta preguntal la'respuesta es 7. Anilogamentel la respuesta a: "4Que,ntlmer9 hay quesumar a 4 para que la suma sea- 7?", es 7 - 4.. EiiP.resado como un numeral decimal, '/"(- 4 'es 3. La expbesitin.892 +7367 es una respuesta cotrecta a la., pregunta:1-"Ouil'es lasuma de 892y3679", pero; geneisl-t mente no esla tap conveniente. .Se espera qtiese de como respuesta,el numeral decimal 1,259. Luego,akraprender proceso de la adici6n, un objetiv90o imporiante es escribir uña suma eomo 892 + 367en la forma,de un Auieral decimal. Si los alimeros que se stIman son 42 5i, 37, el'resul'cado es 7 decenas y 9 unidafles.
Recommended publications
  • FGVM-02 Architecture of Vehicle Multimedia Systems
    International Telecommunication U n i o n ITU-T Technical Report TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (13 April 2021) Focus Group on Vehicular Multimedia (FG-VM) FGVM-02 Architecture of Vehicle Multimedia Systems - 2 - Acknowledgement This Technical Report was prepared under the leadership of Mr. Jun Li, Chair of ITU-T FG-VM (TIAA, China) and Yajun Kou, Chair of ITU-T FG-VM Working Group 2 (Global Fusion Media Technology and Development Co. Ltd, China). It is based on the contributions of numerous authors who participated in the Focus Group activities. Due credit is given to the following Focus Group participants: Srinivasagan Ayyappan, Yansong Guo (Great Wall Motors, Co, LTD, China); Yajun Kou, Jun Li (Global Fusion Media Technology and Development Co. Ltd, China); Koji Nakao (National Institute of Information and Communications Technology, Japan); Stiepan A. Kovac (QRCrypto SA; CEuniX.eu Project); Paolo Volpato, Francois Fischer (Huawei Technologies); Latif Ladid (IPv6 Forum); Jonas Walter (Technical University of Darmstadt Institute of Ergonomics & Human Factors); Gaëlle Martin-Cocher (InterDigital Canada, Lte, Canada); Prakash Ranganathan (University of North Dakota); Sébastien Ziegler, Anna Brékine, Cédric Crettaz (Mandat International); and Pradipta Biswas (Indian Institute of Science). Srinivasagan Ayyappan (Great Wall Motors, Co, LTD, China) served as the main Editor of this Technical Report. Stefano Polidori (Advisor), Mythili Menon (Project Officer), and Carolina Lima (Assistant) served as the FG-VM Secretariat. -
    [Show full text]
  • Open Networking & the Security of Open Source Software Deployment
    Open Networking & the Security of Open Source Software Deployment A white paper presenting security considerations for practical deployment January 2021 Table of Contents Executive Summary ......................................................................................................... 5 Welcome ........................................................................................................................... 7 Introduction ...................................................................................................................... 8 Open Source in Virtualised Open Networks ................................................................... 9 The Software Development Process ............................................................................. 11 Shades of Open Source ................................................................................................. 13 Open Interfaces and Open Source Software Are Different .......................................... 15 Two Perspectives: Systems and Component ............................................................... 16 Systems-level Approach ................................................................................................... 17 Component-level approach............................................................................................... 19 Deployment Considerations .......................................................................................... 20 Layered Security Defence ...............................................................................................
    [Show full text]
  • MEC for Automotive in Multi-Operator Scenarios
    MEC for Automotive in Multi-Operator Scenarios 5GAA Automotive Association Technical Report CONTACT INFORMATION: Copyright © 2021 5GAA. All Rights Reserved. Lead Coordinator – Thomas Linget Email: [email protected] No part of this White Paper may be reproduced without written permission. MAILING ADDRESS: 5GAA c/o MCI Munich Neumarkter Str. 21 81673 München, Germany www.5gaa.org VERSION: 1.0 DATE OF PUBLICATION: 03.03.2021 DOCUMENT TYPE: Technical Report CONFIDENTIALITY CLASS: P (Public use) REFERENCE 5GAA WORKING GROUP: Working Group 2 DATE OF APPROVAL BY 5GAA BOARD: 11.01.2021 MEC for Automotive in Multi-Operator Scenarios 2 3 5GAA A-200150 Contents Foreword............................................................................................................................................................. 5 1 Scope ........................................................................................................................................................ 6 2 References ................................................................................................................................................ 7 3 Abbreviations ........................................................................................................................................... 9 4 Definition of Edge Computing ............................................................................................................... 11 4.1 The application perspective (three-tier paradigm) ..........................................................................................
    [Show full text]
  • Illuminating the Higher Layers of Mobile Networks
    Beyond the Radio: Illuminating the Higher Layers of Mobile Networks Narseo Vallina-Rodriguez§, Srikanth Sundaresan§, Christian Kreibich§*, Nicholas Weaver§ⱡ, and Vern Paxson§ⱡ TR-14-003 December 2014 Abstract Cellular network performance is often viewed as primarily dominated by the radio technology. However, reality proves more complex: mobile operators deploy and configure their networks in different ways, and sometimes establish network sharing agreements with other mobile carriers. Moreover, regulators have encouraged newer operational models such as Mobile Virtual Network Operators (MVNOs) to promote competition. In this paper we draw upon data collected by the ICSI Netalyzr app for Android to develop a characterization of how operational decisions, such as network configurations, business models, and relationships between operators introduce diversity in service quality and affect user security and privacy. We delve in detail beyond the radio link and into network configuration and business relationships in six countries. We identify the widespread use of transparent middleboxes such as HTTP and DNS proxies, analyzing how they actively modify user traffic, compromise user privacy, and potentially undermine user security. In addition, we identify network sharing agreements between operators, highlighting the implications of roaming and characterizing the properties of MVNOs, including that a majority are simply rebranded versions of major operators. More broadly, our findings highlight the importance of considering higher-layer relationships
    [Show full text]
  • Clironica Da Semana
    N. 59 - 38 de Fevereiro de 1893 s=» Anno XVIII Rio de Janoiro Domingo ASSIMftTUÍWS PARA OS ESTADOS * 10S000 , MIIWATUIM MW mUl- SiímWTIU ¦i,,,,,1,mu .?5"99i Xn«J;,.:....*• i..^»"-•••;:::;:;;;:iop» PAGAMENTO ADIANTADO TACAMUNTO AIMANTADO TYPOORAPMIA ESCRIPTORIO 70 uva hhth im: m_ . _> ..unuo 7» .o «"A "»» ouviwon *<> NUMERO AVULSO 60 RS. NUMERO AVULSO 60 RS. Sterootypada e impressa nas machinas rotativas de Marinoni, na typographia da ((Gazeta de Noticias » Al auignaluru icwcrmii rio qualquer dia o Irrmiuam nu Iim de março, junli», .piunbro ou ilazemVro Oi ttli.ii cn\ÍAdp* 5 rtdacjlo nio «crio rcsliluiilti ainda que olt pejam publicados sociedade anonyma --rTrarynAifrrrr-mnggr^"'"-" "-"W«ia»iu»:i.riiairi_r,iri ._»»¦«¦«¦»_ E volvou do novo n bcu posto, quedou recomecei oa mona estudos do daiyde novo Interrompe-sei npproxlma- poderiam prosentomonto fuvorecor com paisagem, SPERO DRACOS largo espaço, linmovel, na mesma con- CARTAS DA AUM1A HISTORIAS A VAPOR convencido do quo Jamais apanharia um 110.000 exemplares ao agora um outro carro, o unico. novos recursos o movimento da locallsn- coNsut, n.v tomplnçaooxtatlea. lira ao tempo om quo rou Tiragem touro & unha. (AO SU. OTIIOS I.KON.MIDOS, Esto traz A balda doua rapados farda- çllo d'catos innumoros papeis; faltar- PECADOR POR NECESSIDADE exercito turco, a rampa do Pois apanhei 1 UIIIXIA) o galgando MAU TJOftDAU doa. I" um coupb. A.' illmrgn galopam Ihoa-hla dinheiro o confiança para o desllladeiro, chegava abaixo da torro do cinco nnnos Estava ou uma tardo com Thomaz ds uo soculo, doua soldados. fazer. O govorno, pela sua parte, nocos- Depois do haver residido Kol nos primeiros mezo» Kiapha, aob IvnungI, o cimo coroado dn Duni.iM, 4 do fovcrolro onde cm Dublin, aprendi a Anniinciaç&o, nas terras da Mtilpiqtic, Começara Semana ²E' um ministro.,» slla ser om extremo canto.
    [Show full text]
  • Case No COMP/M.6381 - GOOGLE/ MOTOROLA MOBILITY
    EN Case No COMP/M.6381 - GOOGLE/ MOTOROLA MOBILITY Only the English text is available and authentic. REGULATION (EC) No 139/2004 MERGER PROCEDURE Article 6(1)(b) NON-OPPOSITION Date: 13/02/2012 In electronic form on the EUR-Lex website under document number 32012M6381 Office for Publications of the European Union L-2985 Luxembourg EUROPEAN COMMISSION Brussels, 13/02/2012 C(2012) 1068 In the published version of this decision, some MERGER PROCEDURE information has been omitted pursuant to Article 17(2) of Council Regulation (EC) No 139/2004 ARTICLE 6(1)(b) DECISION concerning non-disclosure of business secrets and other confidential information. The omissions are shown thus […]. Where possible the information PUBLIC VERSION omitted has been replaced by ranges of figures or a general description. PUBLIC VERSION To the notifying party: Dear Sir/Madam, Subject: Case No COMP/M.6381 – Google/Motorola Mobility Commission decision pursuant to Article 6(1)(b) of Council Regulation No 139/2004 1. On 25 November 2011, the European Commission received notification of a proposed concentration pursuant to Article 4 of Council Regulation No 139/20041 by which Google Inc. ("Google", USA), acquires, within the meaning of Article 3(1)(b) of the Merger Regulation, sole control over Motorola Mobility Holdings, Inc. (“Motorola Mobility”, USA)2 by way of purchase of shares.3 Google is designated hereinafter as the "notifying party" whereas Google and Motorola Mobility are referred to as the "parties to the proposed transaction". 2. On 9 December 2011, the Commission adopted two decisions pursuant to Article 11(3) of the Merger Regulation in order to obtain from Google documents which the Commission considered necessary for its assessment of the case.
    [Show full text]
  • DEVELOPING NFC APPS for BLACKBERRY
    22 March 2014 1 DEVELOPING NFC APPS for BLACKBERRY NFC Forum, Developers Showcase March 21st, 2014 Larry McDonough, Principal Evangelist @LMCDUNNA 22 March 2014 2 CONTENTS • Development on BlackBerry • BlackBerry NFC Support • 5 most common use cases • NFC Demos • Q & A 22 March 2014 3 First, Some Stats… • A mobile device management leader with global enterprise customer base exceeding 80,000 • 30,000+ BES 10 commercial & test servers installed • 250,000+ BBM Channels globally since launch • 40+ Million newly registered Android/iOS BBM users in first 60 days • 665+ carriers and distribution partners offering BlackBerry products and services in more than 175 countries around the world 22 March 2014 4 High Level Architecture Native C++ & HTML5 & Android Cascades UI WebWorks Runtime BlackBerry Platform & Services (BlackBerry Enterprise Service 10, Push, Payments, BBM, Invocation Framework, Share Framework, Maps, …) BlackBerry 10 OS Support for NFC in the Android Runtime is coming in 10.3 22 March 2014 5 Strong & Growing Ecosystem Managing corporate... and personal apps Broad range of app dev libraries Wide choice of HTML5 C/C++ C++/Qt Java Android programming BlackBerry Native SDK Cascades Runtime languages WebWorks™ 22 March 2014 6 Top Partners 22 March 2014 7 BlackBerry World • In over 170 Markets • Free to register • Free to submit upgrade • 70/30 revenue share • Credit card, PayPal, Carrier Billing • 5+ Billion apps downloaded 22 March 2014 8 http://developer.blackberry.com • Tools, samples, documentation, Forums… • HTML5 / WebWorks
    [Show full text]
  • NFC Handset Requirements Version 8.0 13/10/2015
    GSM Association Non-confidential Official Document TS.26 - NFC Handset Requirements NFC Handset Requirements Version 8.0 13/10/2015 This is a Non-binding Permanent Reference Document of the GSMA Security Classification: Non-confidential Access to and distribution of this document is restricted to the persons permitted by the security classification. This document is confidential to the Association and is subject to copyright protection. This document is to be used only for the purposes for which it has been supplied and information contained in it must not be disclosed or in any other way made available, in whole or in part, to persons other than those permitted under the security classification without the prior written approval of the Association. Copyright Notice Copyright © 2015 GSM Association Disclaimer The GSM Association (“Association”) makes no representation, warranty or undertaking (express or implied) with respect to and does not accept any responsibility for, and hereby disclaims liability for the accuracy or completeness or timeliness of the information contained in this document. The information contained in this document may be subject to change without prior notice. Antitrust Notice The information contain herein is in full compliance with the GSM Association’s antitrust compliance policy. V8.0 Page 1 of 43 GSM Association Non-confidential Official Document TS.26 - NFC Handset Requirements Table of Contents 1 Introduction 4 Purpose 4 Scope and Objective 4 Use Cases/Services 5 Abbreviations 5 Definition of Terms 6 2 References
    [Show full text]
  • E86806 Rev 03.Pdf
    Oracle® Communications DSR Release 8.0/8.0.1 Release Notice E86806 Revision 03 June 2017 DSR Release 8.0/8.0.1 Release Notice Copyright © 2011, 2017, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs.
    [Show full text]
  • Acronym Dictionary and Glossary
    Acronym Dictionary and Glossary CSR ACRONYM DEFINITIONS CSR Acronym Definitions A-D http://www.csrstds.com/acro-a-d.htm. CSR Acronym Defintions E-H http://www.csrstds.com/acro-e-h.htm. CSR Acronym Definitions I-M http://www.csrstds.com/acro-i-m.htm. CSR Acronym Definitions N-R http://www.csrstds.com/acro-n-r.htm. Acronym Definitions last updated November 26, 2001. If you have changes or corrections, please e-mail them to [email protected]. Thank you. Communications Standards Review e-mail: [email protected] SSEC Acronyms List SSEC Acronyms List http://www.ssec.wisc.edu/pubs/acronyms.htm. Updated 17 December 2001 by the SSEC Webmaster. (current December 2001) ANSI ASC X12N - Acronym Dictionary OCTOBER 1997 ASC X12N ACRONYM DICTIONARY http://www.wpc-edi.com/AcronymDictionary/Index.html ASC X12N ACRONYM DICTIONARY http://www.wpc-edi.com/AcronymDictionary/Dictionary.html Acronym Dictionary http://www.wpc-edi.com/AcronymDictionary/Dictionary.htm. Dictionary A List of Xcellweb Features plus a collection of Internet expressions Xcellweb Services/Dictionary http://www.xcellweb.com/html/dictionary.htm. [email protected] (503) 968-4307 MAD The MIPS Acronym Dictionary Don't get even, get MAD! [email protected] Sunday, October 28, 2001 Leviton Manufacturing Co., Inc. © Copyright 1998 www.levitontelcom.com • e-mail: [email protected] Newton’s Telecom Dictionary BABEL: A LISTING OF COMPUTER ORIENTED ABBREVIATIONS AND ACRONYMS Date Updated: 10/20/93 Version 93C Copyright (c) 1989-1993 Irving Kind All Rights Reserved Irving Kind Internet: [email protected] c/o K &D MCIMail: 545-3562 One Church Lane Baltimore, MD 21208 Sep 1993 version = BABEL93C Sep 1994 version = BABEL94C CSGNetwork's Online Computer, Telephony & Electronics Reference Computer Support Group & CSGNetwork.Com Online Computer, Telephony and Electronics Glossary and Dictionary wysiwyg://79/http://www.csgnetwork.com/glossaryp.htm.
    [Show full text]
  • Roadmap for a Monopolization Case Against Google Regarding the Search Market
    Roadmap for a Monopolization Case Against Google Regarding the Search Market June 2020 Fiona M. Scott Morton David C. Dinielli Biographies Fiona M. Scott Morton is the Theodore Nierenberg Professor of Economics at the Yale University School of Management (SOM) where she has been on the faculty since 1999. Her area of academic research is industrial organization, with a focus on empirical studies of competition. The focus of her current research is competition in healthcare markets and the economics of antitrust. From 2011-12 Professor Scott Morton served as the Deputy Assistant Attorney General for Economic Analysis (Chief Economist) at the Antitrust Division of the U.S. Department of Justice, where she helped enforce the nation’s antitrust laws. At Yale SOM she teaches courses in the area of competitive strategy and antitrust economics. She served as Associate Dean from 2007-10 and has won the School’s teaching award three times. She founded and directs the Thurman Arnold Project at Yale, a vehicle to provide more antitrust programming and policy projects to Yale students. Professor Scott Morton has a BA from Yale and a PhD from MIT, both in Economics. She is a frequent speaker at seminars and conferences across the United States Fiona M. Scott Morton and Europe. Theodore Nierenberg Professor of Economics Yale University School of Management As a senior advisor with the beneficial technology team at Omidyar Network, David is focused on developing a robust analytic framework for antitrust litigation and regulation designed to reduce the competitive, democratic, and other harms caused by big tech companies.
    [Show full text]
  • Sniffing GSM Traffic Using RTL-SDR and Kali Linux OS
    International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 Sniffing GSM Traffic Using RTL-SDR And Kali Linux OS Arjunsinh Parmar1, Kunal M. Pattani2 1P.G.Student, Dept. of E&C, C U Shah College of Engg. & Tech., Wadhwan, Gujarat, India 2Asst. Professor, Dept. of E&C, C U Shah College of Engg. & Tech., Wadhwan, Gujarat, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Global System for Mobile communications (GSM) 3.5 billion subscribers, GSM remains as the only standard for is the most popular telecommunication protocol used in cellular communications[1]. However, the security criteria telecommunication networks. The telecommunications envisioned 30 years ago, when the standard was designed, industry uses a combination of 2G (GSM), 3G (Universal Mobile are no longer sufficient to ensure the security and privacy of Telecommunications Service-UMTS) and 4G (Long Term the users. Furthermore, even with the newest fourth Evolution-LTE) systems to access communication worldwide. generation (4G) cellular technologies starting to be However telecommunications industry keeps a high deployed, these networks could never achieve strong percentage of their deployed infrastructure using GSM security guarantees because the MNOs keep backwards technologies. GSM offers worldwide roaming and compatibility given the huge amount of GSM subscribers. interconnection with any available GSM network. Users are Recent research has shown that mobile devices data can be expected to be aware of the possible security threats. This used as an effective way to track individuals [2]. This work highlights weaknesses and issues in the GSM standard, presents a problem related to users’ privacy, as their and presents an informed approach to help audit GSM location allows the carriers to profile and track their networks for vulnerabilities.
    [Show full text]