This document announces a written examination for Associate Branch Sales & Customer Service Officer positions in the Dire Dawa District. It provides the date, time, and location of the exam in Dire Dawa on August 26, 2023 at 9:00 AM. It instructs candidates to bring their identity cards and original documents. It also notes that no one will be allowed to take the exam without these documents. The document then provides a table listing 132 candidates with their names, gender, field of study, birth place, current address, area of interest, and university.
Error detection refers to the process of identifying and detecting errors or inconsistencies in data or transmitted signals. It is an essential aspect of ensuring data integrity and reliability in various communication systems, computer networks, and storage systems.
The purpose of error detection is to determine if errors have occurred during data transmission or storage and to provide a mechanism to identify and correct these errors. Errors can occur due to various factors such as noise, interference, hardware failures, or software issues. By detecting errors, corrective measures can be taken to ensure the accuracy and integrity of the transmitted or stored data.
There are several techniques and algorithms commonly used for error detection. Here are a few notable ones:
Parity Check: Parity check is a simple and widely used error detection method. It involves adding an extra bit, called a parity bit, to a group of bits being transmitted. The parity bit is set to 1 or 0 based on whether the total number of 1s in the data is even or odd. At the receiving end, the parity bit is recalculated and compared to the received parity bit. If they do not match, an error is detected.
Checksum: Checksum is a technique that involves calculating a numerical value, often a sum or a hash, based on the data being transmitted. This value is then appended to the data. At the receiving end, the checksum is recalculated and compared to the received value. If they do not match, it indicates the presence of an error.
Cyclic Redundancy Check (CRC): CRC is a more sophisticated error detection algorithm widely used in networking protocols and storage systems. It involves generating a cyclic redundancy code based on the data being transmitted. This code is appended to the data, and at the receiving end, the code is recalculated and compared to the received code. A mismatch indicates the presence of errors.
Forward Error Correction (FEC): FEC is an error detection and correction technique that involves adding redundant information to the transmitted data. This redundancy allows the receiver to not only detect errors but also correct them without the need for retransmission. FEC is commonly used in applications where retransmission is expensive or not feasible, such as satellite communications and wireless networks.
Error detection techniques play a crucial role in ensuring data integrity and reliable communication. They provide a mechanism to detect errors and trigger appropriate actions, such as requesting retransmission or performing error correction. By implementing effective error detection mechanisms, data integrity can be maintained, and the overall quality and reliability of communication systems can be improved.
The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions and communication protocols used in computer networks. It provides a structured approach to understanding and designing network architectures, allowing different systems and devices to communicate with each other effectively.
The OSI model consists of seven interconnected layers, each responsible for specific functions and services. Here is a brief description of each layer:
Physical Layer: The physical layer is the lowest layer of the OSI model. It deals with the physical transmission of data over the network medium, including cables, connectors, and electrical signals. It defines characteristics such as voltage levels, data rates, and physical connectors.
Data Link Layer: The data link layer provides reliable point-to-point or point-to-multipoint data transfer between network nodes. It is responsible for framing data into packets, error detection and correction, and flow control. Ethernet switches operate at this layer.
Network Layer: The network layer manages the routing and forwarding of data packets across different networks. It determines the optimal path for data transmission, handles addressing, and controls congestion in the network. Routers operate at this layer.
Transport Layer: The transport layer ensures reliable end-to-end data delivery between hosts. It segments data from the upper layers into smaller packets, manages data flow, and provides error recovery mechanisms. TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) operate at this layer.
Session Layer: The session layer establishes, manages, and terminates communication sessions between applications. It provides services such as session establishment, maintenance, and synchronization, allowing multiple applications to communicate and coordinate their activities.
Presentation Layer: The presentation layer is responsible for data representation, encryption, compression, and translation. It ensures that data from the application layer is in a format that can be understood by the receiving system.
Application Layer: The application layer is the topmost layer of the OSI model. It provides a direct interface between the network and the applications. It includes protocols and services that support specific applications, such as HTTP for web browsing, SMTP for email, and FTP for file transfer.
The OSI model follows a layered approach, where each layer performs specific functions while relying on the services provided by the layers below it. This modular design allows for interoperability between different network technologies and facilitates easier troubleshooting and development of network protocols.
It's important to note that the OSI model is a conceptual framework and not a specific implementation. Actual networking protocols, such as TCP/IP, do not strictly adhere to the OSI model but borrow concepts from it.
Data Center Multi-tier Model Overview.pptxBeniamTekeste
A multi-tier data center refers to a specialized facility that houses computing infrastructure and provides various levels of redundancy, reliability, and resilience for hosting critical IT systems and applications. The term "multi-tier" signifies the existence of multiple layers or levels within the data center architecture, each offering different functionalities and characteristics.
In a multi-tier data center, the infrastructure is organized into distinct tiers based on their purpose, capabilities, and level of redundancy. These tiers are designed to provide different levels of availability, fault tolerance, and performance, allowing organizations to match their specific requirements and business needs. The most commonly recognized tier classification system is the Telecommunications Industry Association (TIA) Data Center Tier Standard, which includes four tiers: Tier 1, Tier 2, Tier 3, and Tier 4.
Here is a breakdown of the typical characteristics of each tier:
Tier 1: Tier 1 data centers offer a basic level of infrastructure reliability and uptime. They generally consist of a single path for power and cooling with limited redundancy. This tier is suitable for small businesses or organizations with non-critical applications where occasional downtime can be tolerated.
Tier 2: Tier 2 data centers provide slightly higher availability than Tier 1 by incorporating redundant components and infrastructure elements. This includes redundant power and cooling systems to minimize the risk of service disruptions. Tier 2 data centers are suitable for small to medium-sized businesses that require improved uptime and availability for their IT systems.
Tier 3: Tier 3 data centers offer a significantly higher level of availability and redundancy compared to Tier 1 and Tier 2. They have multiple independent distribution paths for power and cooling, ensuring concurrent maintainability and fault tolerance. Tier 3 data centers are commonly used by medium to large enterprises that require high availability and reliability for their critical applications.
Tier 4: Tier 4 data centers provide the highest level of availability, fault tolerance, and redundancy. They have redundant components and infrastructure systems, offering no single point of failure. Tier 4 data centers provide the highest level of uptime and are designed for mission-critical applications and organizations that require continuous operations, such as financial institutions, healthcare providers, and large-scale enterprises.
It's important to note that these tiers represent general guidelines, and the specific requirements and characteristics of data centers may vary based on individual needs and industry standards. Multi-tier data centers play a crucial role in ensuring the availability, performance, and resilience of IT systems and applications, enabling businesses to operate reliably in the digital age.
Cyber, short for "cyberspace," refers to the virtual realm created by computer systems and networks where digital information is stored, transmitted, and processed. It encompasses the interconnected digital infrastructure that enables communication, data exchange, and online activities on a global scale.
In the cyber world, individuals, businesses, governments, and organizations interact and engage in a wide range of activities. This includes accessing information, communicating with others, conducting transactions, sharing media, and participating in online communities. The cyber domain has become an integral part of modern society, shaping various aspects of our lives and transforming how we work, learn, entertain, and connect with one another.
Cybersecurity is a crucial aspect of the cyber landscape. With the increasing reliance on digital technologies, protecting sensitive information and systems from unauthorized access, cyber attacks, and data breaches has become paramount. Cybersecurity measures involve implementing various techniques, such as encryption, firewalls, antivirus software, intrusion detection systems, and user authentication protocols, to safeguard networks, devices, and data from potential threats.
The term "cyber" is often associated with cybersecurity-related topics, such as cybercrime, cyber warfare, and cyber threats. Cybercrime refers to criminal activities conducted in the digital realm, such as hacking, identity theft, phishing, and ransomware attacks. Cyber warfare involves using cyber techniques to disrupt or sabotage the digital infrastructure of an adversary, including targeting critical systems, networks, or information. Cyber threats encompass any potential danger or vulnerability in the cyber domain that can lead to unauthorized access, data breaches, or disruptions to digital services.
Furthermore, the field of cybersecurity extends beyond protection and defense. It also includes proactive measures like ethical hacking, threat intelligence, vulnerability assessment, incident response, and security policy development. Cybersecurity professionals play a vital role in safeguarding digital assets and mitigating risks associated with the ever-evolving cyber landscape.
As technology continues to advance and more devices become interconnected through the Internet of Things (IoT), the cyber domain is expanding, presenting both opportunities and challenges. It is essential for individuals, businesses, and governments to stay vigilant, adopt best practices, and remain adaptable in order to navigate the complexities of the cyber world effectively.
2024 State of Marketing Report – by HubspotMarius Sescu
https://www.hubspot.com/state-of-marketing
· Scaling relationships and proving ROI
· Social media is the place for search, sales, and service
· Authentic influencer partnerships fuel brand growth
· The strongest connections happen via call, click, chat, and camera.
· Time saved with AI leads to more creative work
· Seeking: A single source of truth
· TLDR; Get on social, try AI, and align your systems.
· More human marketing, powered by robots
Error detection refers to the process of identifying and detecting errors or inconsistencies in data or transmitted signals. It is an essential aspect of ensuring data integrity and reliability in various communication systems, computer networks, and storage systems.
The purpose of error detection is to determine if errors have occurred during data transmission or storage and to provide a mechanism to identify and correct these errors. Errors can occur due to various factors such as noise, interference, hardware failures, or software issues. By detecting errors, corrective measures can be taken to ensure the accuracy and integrity of the transmitted or stored data.
There are several techniques and algorithms commonly used for error detection. Here are a few notable ones:
Parity Check: Parity check is a simple and widely used error detection method. It involves adding an extra bit, called a parity bit, to a group of bits being transmitted. The parity bit is set to 1 or 0 based on whether the total number of 1s in the data is even or odd. At the receiving end, the parity bit is recalculated and compared to the received parity bit. If they do not match, an error is detected.
Checksum: Checksum is a technique that involves calculating a numerical value, often a sum or a hash, based on the data being transmitted. This value is then appended to the data. At the receiving end, the checksum is recalculated and compared to the received value. If they do not match, it indicates the presence of an error.
Cyclic Redundancy Check (CRC): CRC is a more sophisticated error detection algorithm widely used in networking protocols and storage systems. It involves generating a cyclic redundancy code based on the data being transmitted. This code is appended to the data, and at the receiving end, the code is recalculated and compared to the received code. A mismatch indicates the presence of errors.
Forward Error Correction (FEC): FEC is an error detection and correction technique that involves adding redundant information to the transmitted data. This redundancy allows the receiver to not only detect errors but also correct them without the need for retransmission. FEC is commonly used in applications where retransmission is expensive or not feasible, such as satellite communications and wireless networks.
Error detection techniques play a crucial role in ensuring data integrity and reliable communication. They provide a mechanism to detect errors and trigger appropriate actions, such as requesting retransmission or performing error correction. By implementing effective error detection mechanisms, data integrity can be maintained, and the overall quality and reliability of communication systems can be improved.
The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions and communication protocols used in computer networks. It provides a structured approach to understanding and designing network architectures, allowing different systems and devices to communicate with each other effectively.
The OSI model consists of seven interconnected layers, each responsible for specific functions and services. Here is a brief description of each layer:
Physical Layer: The physical layer is the lowest layer of the OSI model. It deals with the physical transmission of data over the network medium, including cables, connectors, and electrical signals. It defines characteristics such as voltage levels, data rates, and physical connectors.
Data Link Layer: The data link layer provides reliable point-to-point or point-to-multipoint data transfer between network nodes. It is responsible for framing data into packets, error detection and correction, and flow control. Ethernet switches operate at this layer.
Network Layer: The network layer manages the routing and forwarding of data packets across different networks. It determines the optimal path for data transmission, handles addressing, and controls congestion in the network. Routers operate at this layer.
Transport Layer: The transport layer ensures reliable end-to-end data delivery between hosts. It segments data from the upper layers into smaller packets, manages data flow, and provides error recovery mechanisms. TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) operate at this layer.
Session Layer: The session layer establishes, manages, and terminates communication sessions between applications. It provides services such as session establishment, maintenance, and synchronization, allowing multiple applications to communicate and coordinate their activities.
Presentation Layer: The presentation layer is responsible for data representation, encryption, compression, and translation. It ensures that data from the application layer is in a format that can be understood by the receiving system.
Application Layer: The application layer is the topmost layer of the OSI model. It provides a direct interface between the network and the applications. It includes protocols and services that support specific applications, such as HTTP for web browsing, SMTP for email, and FTP for file transfer.
The OSI model follows a layered approach, where each layer performs specific functions while relying on the services provided by the layers below it. This modular design allows for interoperability between different network technologies and facilitates easier troubleshooting and development of network protocols.
It's important to note that the OSI model is a conceptual framework and not a specific implementation. Actual networking protocols, such as TCP/IP, do not strictly adhere to the OSI model but borrow concepts from it.
Data Center Multi-tier Model Overview.pptxBeniamTekeste
A multi-tier data center refers to a specialized facility that houses computing infrastructure and provides various levels of redundancy, reliability, and resilience for hosting critical IT systems and applications. The term "multi-tier" signifies the existence of multiple layers or levels within the data center architecture, each offering different functionalities and characteristics.
In a multi-tier data center, the infrastructure is organized into distinct tiers based on their purpose, capabilities, and level of redundancy. These tiers are designed to provide different levels of availability, fault tolerance, and performance, allowing organizations to match their specific requirements and business needs. The most commonly recognized tier classification system is the Telecommunications Industry Association (TIA) Data Center Tier Standard, which includes four tiers: Tier 1, Tier 2, Tier 3, and Tier 4.
Here is a breakdown of the typical characteristics of each tier:
Tier 1: Tier 1 data centers offer a basic level of infrastructure reliability and uptime. They generally consist of a single path for power and cooling with limited redundancy. This tier is suitable for small businesses or organizations with non-critical applications where occasional downtime can be tolerated.
Tier 2: Tier 2 data centers provide slightly higher availability than Tier 1 by incorporating redundant components and infrastructure elements. This includes redundant power and cooling systems to minimize the risk of service disruptions. Tier 2 data centers are suitable for small to medium-sized businesses that require improved uptime and availability for their IT systems.
Tier 3: Tier 3 data centers offer a significantly higher level of availability and redundancy compared to Tier 1 and Tier 2. They have multiple independent distribution paths for power and cooling, ensuring concurrent maintainability and fault tolerance. Tier 3 data centers are commonly used by medium to large enterprises that require high availability and reliability for their critical applications.
Tier 4: Tier 4 data centers provide the highest level of availability, fault tolerance, and redundancy. They have redundant components and infrastructure systems, offering no single point of failure. Tier 4 data centers provide the highest level of uptime and are designed for mission-critical applications and organizations that require continuous operations, such as financial institutions, healthcare providers, and large-scale enterprises.
It's important to note that these tiers represent general guidelines, and the specific requirements and characteristics of data centers may vary based on individual needs and industry standards. Multi-tier data centers play a crucial role in ensuring the availability, performance, and resilience of IT systems and applications, enabling businesses to operate reliably in the digital age.
Cyber, short for "cyberspace," refers to the virtual realm created by computer systems and networks where digital information is stored, transmitted, and processed. It encompasses the interconnected digital infrastructure that enables communication, data exchange, and online activities on a global scale.
In the cyber world, individuals, businesses, governments, and organizations interact and engage in a wide range of activities. This includes accessing information, communicating with others, conducting transactions, sharing media, and participating in online communities. The cyber domain has become an integral part of modern society, shaping various aspects of our lives and transforming how we work, learn, entertain, and connect with one another.
Cybersecurity is a crucial aspect of the cyber landscape. With the increasing reliance on digital technologies, protecting sensitive information and systems from unauthorized access, cyber attacks, and data breaches has become paramount. Cybersecurity measures involve implementing various techniques, such as encryption, firewalls, antivirus software, intrusion detection systems, and user authentication protocols, to safeguard networks, devices, and data from potential threats.
The term "cyber" is often associated with cybersecurity-related topics, such as cybercrime, cyber warfare, and cyber threats. Cybercrime refers to criminal activities conducted in the digital realm, such as hacking, identity theft, phishing, and ransomware attacks. Cyber warfare involves using cyber techniques to disrupt or sabotage the digital infrastructure of an adversary, including targeting critical systems, networks, or information. Cyber threats encompass any potential danger or vulnerability in the cyber domain that can lead to unauthorized access, data breaches, or disruptions to digital services.
Furthermore, the field of cybersecurity extends beyond protection and defense. It also includes proactive measures like ethical hacking, threat intelligence, vulnerability assessment, incident response, and security policy development. Cybersecurity professionals play a vital role in safeguarding digital assets and mitigating risks associated with the ever-evolving cyber landscape.
As technology continues to advance and more devices become interconnected through the Internet of Things (IoT), the cyber domain is expanding, presenting both opportunities and challenges. It is essential for individuals, businesses, and governments to stay vigilant, adopt best practices, and remain adaptable in order to navigate the complexities of the cyber world effectively.
2024 State of Marketing Report – by HubspotMarius Sescu
https://www.hubspot.com/state-of-marketing
· Scaling relationships and proving ROI
· Social media is the place for search, sales, and service
· Authentic influencer partnerships fuel brand growth
· The strongest connections happen via call, click, chat, and camera.
· Time saved with AI leads to more creative work
· Seeking: A single source of truth
· TLDR; Get on social, try AI, and align your systems.
· More human marketing, powered by robots
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
ChatGPT is a revolutionary addition to the world since its introduction in 2022. A big shift in the sector of information gathering and processing happened because of this chatbot. What is the story of ChatGPT? How is the bot responding to prompts and generating contents? Swipe through these slides prepared by Expeed Software, a web development company regarding the development and technical intricacies of ChatGPT!
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
The realm of product design is a constantly changing environment where technology and style intersect. Every year introduces fresh challenges and exciting trends that mold the future of this captivating art form. In this piece, we delve into the significant trends set to influence the look and functionality of product design in the year 2024.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
ChatGPT is a revolutionary addition to the world since its introduction in 2022. A big shift in the sector of information gathering and processing happened because of this chatbot. What is the story of ChatGPT? How is the bot responding to prompts and generating contents? Swipe through these slides prepared by Expeed Software, a web development company regarding the development and technical intricacies of ChatGPT!
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
The realm of product design is a constantly changing environment where technology and style intersect. Every year introduces fresh challenges and exciting trends that mold the future of this captivating art form. In this piece, we delve into the significant trends set to influence the look and functionality of product design in the year 2024.
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
Mental health has been in the news quite a bit lately. Dozens of U.S. states are currently suing Meta for contributing to the youth mental health crisis by inserting addictive features into their products, while the U.S. Surgeon General is touring the nation to bring awareness to the growing epidemic of loneliness and isolation. The country has endured periods of low national morale, such as in the 1970s when high inflation and the energy crisis worsened public sentiment following the Vietnam War. The current mood, however, feels different. Gallup recently reported that national mental health is at an all-time low, with few bright spots to lift spirits.
To better understand how Americans are feeling and their attitudes towards mental health in general, ThinkNow conducted a nationally representative quantitative survey of 1,500 respondents and found some interesting differences among ethnic, age and gender groups.
Technology
For example, 52% agree that technology and social media have a negative impact on mental health, but when broken out by race, 61% of Whites felt technology had a negative effect, and only 48% of Hispanics thought it did.
While technology has helped us keep in touch with friends and family in faraway places, it appears to have degraded our ability to connect in person. Staying connected online is a double-edged sword since the same news feed that brings us pictures of the grandkids and fluffy kittens also feeds us news about the wars in Israel and Ukraine, the dysfunction in Washington, the latest mass shooting and the climate crisis.
Hispanics may have a built-in defense against the isolation technology breeds, owing to their large, multigenerational households, strong social support systems, and tendency to use social media to stay connected with relatives abroad.
Age and Gender
When asked how individuals rate their mental health, men rate it higher than women by 11 percentage points, and Baby Boomers rank it highest at 83%, saying it’s good or excellent vs. 57% of Gen Z saying the same.
Gen Z spends the most amount of time on social media, so the notion that social media negatively affects mental health appears to be correlated. Unfortunately, Gen Z is also the generation that’s least comfortable discussing mental health concerns with healthcare professionals. Only 40% of them state they’re comfortable discussing their issues with a professional compared to 60% of Millennials and 65% of Boomers.
Race Affects Attitudes
As seen in previous research conducted by ThinkNow, Asian Americans lag other groups when it comes to awareness of mental health issues. Twenty-four percent of Asian Americans believe that having a mental health issue is a sign of weakness compared to the 16% average for all groups. Asians are also considerably less likely to be aware of mental health services in their communities (42% vs. 55%) and most likely to seek out information on social media (51% vs. 35%).
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
This article is all about what AI trends will emerge in the field of creative operations in 2024. All the marketers and brand builders should be aware of these trends for their further use and save themselves some time!
A report by thenetworkone and Kurio.
The contributing experts and agencies are (in an alphabetical order): Sylwia Rytel, Social Media Supervisor, 180heartbeats + JUNG v MATT (PL), Sharlene Jenner, Vice President - Director of Engagement Strategy, Abelson Taylor (USA), Alex Casanovas, Digital Director, Atrevia (ES), Dora Beilin, Senior Social Strategist, Barrett Hoffher (USA), Min Seo, Campaign Director, Brand New Agency (KR), Deshé M. Gully, Associate Strategist, Day One Agency (USA), Francesca Trevisan, Strategist, Different (IT), Trevor Crossman, CX and Digital Transformation Director; Olivia Hussey, Strategic Planner; Simi Srinarula, Social Media Manager, The Hallway (AUS), James Hebbert, Managing Director, Hylink (CN / UK), Mundy Álvarez, Planning Director; Pedro Rojas, Social Media Manager; Pancho González, CCO, Inbrax (CH), Oana Oprea, Head of Digital Planning, Jam Session Agency (RO), Amy Bottrill, Social Account Director, Launch (UK), Gaby Arriaga, Founder, Leonardo1452 (MX), Shantesh S Row, Creative Director, Liwa (UAE), Rajesh Mehta, Chief Strategy Officer; Dhruv Gaur, Digital Planning Lead; Leonie Mergulhao, Account Supervisor - Social Media & PR, Medulla (IN), Aurelija Plioplytė, Head of Digital & Social, Not Perfect (LI), Daiana Khaidargaliyeva, Account Manager, Osaka Labs (UK / USA), Stefanie Söhnchen, Vice President Digital, PIABO Communications (DE), Elisabeth Winiartati, Managing Consultant, Head of Global Integrated Communications; Lydia Aprina, Account Manager, Integrated Marketing and Communications; Nita Prabowo, Account Manager, Integrated Marketing and Communications; Okhi, Web Developer, PNTR Group (ID), Kei Obusan, Insights Director; Daffi Ranandi, Insights Manager, Radarr (SG), Gautam Reghunath, Co-founder & CEO, Talented (IN), Donagh Humphreys, Head of Social and Digital Innovation, THINKHOUSE (IRE), Sarah Yim, Strategy Director, Zulu Alpha Kilo (CA).
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
The search marketing landscape is evolving rapidly with new technologies, and professionals, like you, rely on innovative paid search strategies to meet changing demands.
It’s important that you’re ready to implement new strategies in 2024.
Check this out and learn the top trends in paid search advertising that are expected to gain traction, so you can drive higher ROI more efficiently in 2024.
You’ll learn:
- The latest trends in AI and automation, and what this means for an evolving paid search ecosystem.
- New developments in privacy and data regulation.
- Emerging ad formats that are expected to make an impact next year.
Watch Sreekant Lanka from iQuanti and Irina Klein from OneMain Financial as they dive into the future of paid search and explore the trends, strategies, and technologies that will shape the search marketing landscape.
If you’re looking to assess your paid search strategy and design an industry-aligned plan for 2024, then this webinar is for you.
5 Public speaking tips from TED - Visualized summarySpeakerHub
From their humble beginnings in 1984, TED has grown into the world’s most powerful amplifier for speakers and thought-leaders to share their ideas. They have over 2,400 filmed talks (not including the 30,000+ TEDx videos) freely available online, and have hosted over 17,500 events around the world.
With over one billion views in a year, it’s no wonder that so many speakers are looking to TED for ideas on how to share their message more effectively.
The article “5 Public-Speaking Tips TED Gives Its Speakers”, by Carmine Gallo for Forbes, gives speakers five practical ways to connect with their audience, and effectively share their ideas on stage.
Whether you are gearing up to get on a TED stage yourself, or just want to master the skills that so many of their speakers possess, these tips and quotes from Chris Anderson, the TED Talks Curator, will encourage you to make the most impactful impression on your audience.
See the full article and more summaries like this on SpeakerHub here: https://speakerhub.com/blog/5-presentation-tips-ted-gives-its-speakers
See the original article on Forbes here:
http://www.forbes.com/forbes/welcome/?toURL=http://www.forbes.com/sites/carminegallo/2016/05/06/5-public-speaking-tips-ted-gives-its-speakers/&refURL=&referrer=#5c07a8221d9b
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
Everyone is in agreement that ChatGPT (and other generative AI tools) will shape the future of work. Yet there is little consensus on exactly how, when, and to what extent this technology will change our world.
Businesses that extract maximum value from ChatGPT will use it as a collaborative tool for everything from brainstorming to technical maintenance.
For individuals, now is the time to pinpoint the skills the future professional will need to thrive in the AI age.
Check out this presentation to understand what ChatGPT is, how it will shape the future of work, and how you can prepare to take advantage.
A brief introduction to DataScience with explaining of the concepts, algorithms, machine learning, supervised and unsupervised learning, clustering, statistics, data preprocessing, real-world applications etc.
It's part of a Data Science Corner Campaign where I will be discussing the fundamentals of DataScience, AIML, Statistics etc.
Time Management & Productivity - Best PracticesVit Horky
Here's my presentation on by proven best practices how to manage your work time effectively and how to improve your productivity. It includes practical tips and how to use tools such as Slack, Google Apps, Hubspot, Google Calendar, Gmail and others.
The six step guide to practical project managementMindGenius
The six step guide to practical project management
If you think managing projects is too difficult, think again.
We’ve stripped back project management processes to the
basics – to make it quicker and easier, without sacrificing
the vital ingredients for success.
“If you’re looking for some real-world guidance, then The Six Step Guide to Practical Project Management will help.”
Dr Andrew Makar, Tactical Project Management
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
During this webinar, Anand Bagmar demonstrates how AI tools such as ChatGPT can be applied to various stages of the software development life cycle (SDLC) using an eCommerce application case study. Find the on-demand recording and more info at https://applitools.info/b59
Key takeaways:
• Learn how to use ChatGPT to add AI power to your testing and test automation
• Understand the limitations of the technology and where human expertise is crucial
• Gain insight into different AI-based tools
• Adopt AI-based tools to stay relevant and optimize work for developers and testers
* ChatGPT and OpenAI belong to OpenAI, L.L.C.
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Call-4-Exam-DD.pdf
1. August 24, 2023
Subject: - Call for Written Examination.
Through telephone based communication, the under listed graduates are
shown willingness to compete for Associate Branch Sales & Customer
Service Officer or other equivalent position for Branches found under Dire
Dawa District.
Thus, you are kindly invited to take a written examination that will be held
on Saturday, August 26, 2023, in the morning session at 9:00 AM (3:00
Local Time) at Dire Dawa Town, Bisrate Gebriel School, which is located
around Number One.
Please bring your identity card and original documents along with
unreturned copy while you come for examination.
Note: No one can seat on written examination without bringing the
aforesaid documents.
Best Regards,
2. S.N.
Name
Gender
Field of Study Birth Place Current address
Area of Interest
for Employment
University
1 Muzahir Ahmednur Abibaker M Economics West Harerge Baddessa Addis Ababa Addis Ababa University
2 Beletew Kasu Bekele M Economics Hararge Hararge Hararge Addis Ababa University
3 Eliyas Mohammed Taye M Economics Harage Harage Addis Ababa Addis Ababa University
4
Firomsa Mohammed Ahmed M Sociology East Hararge
East Hararge
Metehara
Harer Addis Ababa University
5 Sisay Bekele Wubshet M Management Chiro Chiro Harer Addis Ababa University
6 Ermiyas Gosa Sishaw M Management Harerge Diredawa Addis Ababa Addis Ababa University
7 Seyfudin Abdi Sani M Management Hararge Hararge Hararge Addis Ababa University
8 Malike Mume Abdulle M Management Diredawa Chelenko Dire dawa Addis Ababa University
9 Samira Ahmed Yonis F Management Harerge Dire dawa Dire dawa Addis Ababa University
10 Dhugomsa Abdureman Ahmed M Management Hararge Dire dawa Dire dawa Addis Ababa University
11 Hussen Jundi Sani M Management Harerge Gelemso Gelemso Chiro Addis Ababa University
12 Yonas Dawit Kelile M Management Hararge Hararge Hararge Addis Ababa University
13 Gadisaa Elias Mohammed M Management Harer Harer Dire dawa Addis Ababa University
14 Seyfudin Abdi Sani M Management Hararge Hararge Hararge Addis Ababa University
15 Ibsa Yusuf Ahmade M Management Mala Bolo Dire Dawa Dire Dawa Addis Ababa University
16 Obsa Abdulaa Mohammed M Economics Babile Babile Haramaya Haramaya University
17
Anwar Kemer Yusuf M Accounting and Finance Boroda Boroda Harar Haramaya University
18 Anes Alisho Musa M Management Chalanko Chalanko Chalanko Haramaya University
19
Megersa Yusuf Umar M Accounting and Finance Cheleko Cheleko
Haramaya/Dire
Dawa
Haramaya University
20 Tofik Adam Abdulla M Management Chiro Chiro Chiro Haramaya University
21
Yirgalem Mulu Takele M Accounting and Finance Chiro Chiro Chiro Haramaya University
22 Ahmed Haji Mohammed M Management Chiro Chiro Chiro and Bedesa Haramaya University
23 Adinan Adem Sule M Management Chiro Chiro Harar Haramaya University
24 Sheibi Ahamed Mohammed M Management Chiro Chiro Hirna Haramaya University
3. 25
Muktar Ahmed Mumed M Accounting and Finance Dawe Dawe Haramaya/Aweday Haramaya University
26 Abrham Kibru Bizuneh M PADM Walkite Dire Dawa Addis Ababa Haramaya University
27 Hussen Umer Beker M Management Dire Dawa Dire Dawa Dire Dawa Haramaya University
28
Jemaw Agegn Seid M Accounting and Finance Gonder Dire Dawa Addis Ababa Haramaya University
29 Jemal Abrahim Ahmed M Economics Dire Dawa Dire Dawa Dire Dawa Haramaya University
30 Abdi Mengistu Tsegaye M Economics Woliso Dire Dawa Dire Dawa Haramaya University
31 Daniel Tiru Bera M Economics Dansha Dire Dawa Dire Dawa/Harar Haramaya University
32 Ibrahim Kelifa Bekri M Management Gara muleta Gara muleta Haramaya Haramaya University
33 Jafer Kewakib Hussen M PADM Gara muleta Gara muleta Haramaya/Harar Haramaya University
34 Abdi Adem Beker M Economics Gara muleta Gara muleta Harar Haramaya University
35 Arif Kamil Abdulla M Economics Gursum Gursum Dire Dawa/Harar Haramaya University
36
Arifo Jemal Sani M Management Mechara Haramaya Haramaya/Mechara Haramaya University
37 Sumeya Adem Abdellah F Management Badessa Haramaya Harar Haramaya University
38 Abdella Jora Abdula M Melka Balo Harar Dire Dawa Haramaya University
39 Jemal Omer Ali M Management Harar Harar Harar Haramaya University
40 Hunduma Tadiyos Warkina M Management Dembidolo Harar Harar Haramaya University
41
Agidew Shewalem Sileshi M Accounting and Finance Hararge (Gursum) Hararage (Gursum) Dire Dawa Haramaya University
42 Kelkay Kalile Debebe M Management Hirna Hirna Hirna Haramaya University
43 Hayat Endris Sirage F Management Kombolcha Kombolcha Adama Haramaya University
44 Adinan Muktar Aliyi M Economics Konbolcha Konbolcha Harara Haramaya University
45 Sufian Yasin Mume M Management Goba Goba Harar Haramaya University
46
Ahmedsabit Jemal Abrasha M Accounting and Finance Kersa Kersa Haramaya/Harar Haramaya University
47
Shemshaden Mohammed Abrahim M Accounting and Finance Kurfa Calle Kurfa Calle Hararge Haramaya University
48 Mahdi Mume Ahmed M Management watera Watera Harar Haramaya University
49
Roba Firance Liyon
M
Sociology Doba woreda West Hararghe Zone. West Hararge Haramaya University
50
Ibsa Ahmed Abdo F Sociology Karamile West Hararghe West Hararge Haramaya University
4. 51 Mohammed Fuad Ahmed M Sociology Bedeno Harar Harar Haramaya University
52 Kedir Mohammed Jibril M EdPM Fedis/ Oromia Fedis/ Oromia Fedis/ Oromia Haramaya University
53 Meryem Adem Abdelah F EdPM Bedessa Addis Ababa Haramaya University
54 Surafel Alemayew Hailu M Accounting & Finance Grawa Dire Dawa Dire Dawa Dire Dawa University
55 Azeb Tegene Nigatu F Accounting & Finance Assebe Teferi Dire Dewa Addis Ababa Dire Dawa University
56
Aris Ame Abdula
M
Accounting & Finance East Harerge East Harerge Dire Dawa Dire Dawa University
57 Tofik Mohammed Abdo M Accounting & Finance Kurfa Calle Kurfa Calle Harar Dire Dawa University
58 Abdo Ahmed Mume M Accounting & Finance East Harerge Dire Dawa Dire Dawa Dire Dawa University
59
Tehune Zeleke Teferie
F
Banking and Finance
W/Hararge
/Anchar
Chiro Chiro Dire Dawa University
60 Bona Misba Abdosamed M Banking and Finance East Hararge Dire Dawa Harar/Dire Dawa Dire Dawa University
61
Fedasa Genjo Abdeta
M
Logistics and Supply
Chain Management
Dambidollo Dire Dawa Dire Dawa Dire Dawa University
62
Migil Moumin Roble
M
Logistics and Supply
Chain Management
Somali Somali Dire Dawa/som Dire Dawa University
63 Yitbarek Belete Midekso M Economics Meki Dire Dawa Hawassa/ Adama Dire Dawa University
64 Simon Zenebe Misew M Economics Waghemra Dire Dawa Dire Dawa Dire Dawa University
65 Desalegn Fikadu Berta M Economics Yegare Dire Dawa Dire Dawa Dire Dawa University
66 Megbaru Sefineh Ayalew M Economics Kowarit Dire Dawa Dire Dawa Dire Dawa University
67 Melkamu Assefa Worku M Economics Gojam Dire Dawa Dire Dawa Dire Dawa University
68 Mena Fekadu Ejersa F Economics Addis Abeba Dire Dawa Addis Ababa Dire Dawa University
69 Yonas Shawull Worqalmaw M Economics Gedder Gedder Dire Dawa Dire Dawa University
70 Teyar Adem Amme M Economics Kulubi Kulubi East Hararge Dire Dawa University
71 Birnesh Alemu Belayneh F PADM Hirna Dire Dawa Dire Dawa Dire Dawa University
72 Tiblet Aberu Belayneh F PADM Wollo Dire Dawa Dire Dawa Dire Dawa University
73 Muaz Tofikk Mummad M PADM Haramaya Haramaya Haramaya Dire Dawa University
74 Nuredin Abrahim Ahmed M Management Chiro Chiro Dire Dawa Dire Dawa University
75 Samrawit Tarekegn Asefa F Management Bonga Dire Dawa Dire Dawa Dire Dawa University
76 Eliyas Tesfaye Berta M Management Wolkite Dire Dawa Dire Dawa Dire Dawa University
77 Zena Belete Fiker M Management Chiro Dire Dawa Dire Dawa Dire Dawa University
78 Dawit Ejigu Etefa M Management W/Wolega Dire Dawa Addis Ababa Dire Dawa University
5. 79 Selamawit Kassaye Ayele F Management Diredawa Dire Dawa Addis Ababa Dire Dawa University
80
Bedasa Mideksa Bedane
M
Management Southwest Shewa Dire Dawa Dire Dawa Dire Dawa University
81 Yakob Amanuel Yoseph M Management Chiro Chiro Dire Dawa Dire Dawa University
82
Ahmed Aliyi Zikey M Management Oromia, Badesa Badesa
Badessa and
around
Ambo University
83
Abdule Aliyi Ibro M Economics
Oromia,WestHarar
ge
Boke Woreda Badessa Ambo University
84
Abrahim Mohemmed Kemal M
Logistics and Supply
Chain Maangement
Oromia,Chiro Chiro Chiro Ambo University
85 Girma Abate Aklilu M Management Oromia, Ciro Ciro Town West Hararge Ambo University
86
Teshome Birhanu Tulu M Marketing Management
Oromia, Abbichu
Gna
Dire Dawa Dire Dawa Ambo University
87
Abdulfetta Jemal Abdo M
Logistics and Supply
Chain Maangement
Oromia, diredawa Dire Dawa Dire Dawa/Harar Ambo University
88 Tayib Adem Ahmed M Management E/Harage East Hararge Harar City Ambo University
89
Fandishe Ahamad Jemal M Marketing Management Oromia, Kara Mile East Hararge Kobo,Karamile Ambo University
90
Yusuf Mohammed Beker M Economics
Oromia, East
Hararhe
East Hararge Dire Dawa Ambo University
91
Tofik Adem Ali M Management
Oromia, Ifa
Handode
Hadas/West Hararge West Hararge/Hirna Ambo University
92
Asledin Shamsudin Ahmed M
Agribusiness and Value
Chain Management
Oromia Harar Harar Ambo University
93 Musa Mume Yusuf M Marketing Management Oromia, Hirna West Hararge Chiro Ambo University
94
Falmata Abubaker Aliyi M
Agribusiness and Value
Chain Management
Oromia,West
Hararge
West Hararge West Hararge Ambo University
95 Bilal Ahimad Siraj M Management Oromia, Boke West Hararge/Boke Badessa Ambo University
96
Mohammed Abdella Omare M Management W/HARARGE
west hararge/doba
woreda
Chiro Ambo University
97 Tuji Ahmeden M Social Work Oromia, Hararge Hararge Dire Dawa/Chiro Ambo University
98 Aliyyi Usman Mume M CIVIC Ethical Studies oromia, Hararghe Hararge/Chalanqo Harar/Haramya Ambo University
99
Adinan Muhammed Aliyi M
Educational Planning and
Management
Oromia, hararghe Hararge/Gara Mulata
Haramaya and
around
Ambo University
6. 100 Gadisa Hamza Ahmed Male Agricultural Economics Oromia West Hararge Harar/Dire Dawa Ambo University
101 Mustefa Nasir Umer M Management W/HARAR/boke Boke/West Hararge Dire Dawa/Harar Ambo University
102 Abdella Haji Ahmed Male Agricultural Economics Oromia Chiro Chiro Ambo University
103 Ebsa Abdurehman Mumed M Sociology Bedano Bedano Bedano Wollega University
104 Ibsa Jemal Mussa M Sociology Chalanko Chalanko East Hararge Wollega University
105 Lencho Abdo Hassan M Marketing Management West Hararge Chiro Badessa Wollega University
106 Gelasa Ahmedo Reshid M Sociology West Hararge Chiro Oda Bultume Wollega University
107 Shukere Muyedin Ahmedo M Economics Chiro Dire Dawa Dire Dawa Wollega University
108 Abrahim Mohammed Fantu M Sociology Doba Doba Hirna Wollega University
109 Beyan Mohammed Mussa M Economics West Hararge Doka Chiro Wollega University
110 Megarsa Aliyi Bakaro M Mannagement East Hararge East Hararge Aweday Wollega University
111
Jemal Mohammed Ahmed
M
Public
Administration&Dev't Mgt
East Hararge East Hararge East Hararge Wollega University
112
Tajuddin Yusuf Mohammed
M
Public
Administration&Dev't Mgt
East Hararge Gara Muleta Harar Wollega University
113 Ararso Shuyebi Bakri M Mannagement Harar Harar Harar Wollega University
114 Mohamed Ame Abrahim M Mannagement Chiro Hararage, Doba Harar Wollega University
115 Mohammed Bule Adem M Mannagement East Hararge Kersa Haramaya Wollega University
116 Gemechu Abdela Jebril M Economics Chiro Chiro Chiro Mada Walabu University
117
Anawer Abdurazek Karayu M Marketing Management
East
Hararge,Kersa
Kersa Kersa, Harar Mada Walabu University
118 Anisa Kemal Mume F Marketing Management Kera Mille Kera Mille Every Where Mada Walabu University
119 Firomsa Mustefa Beker M Management Gelemso Abro Abro Mada Walabu University
120 Kemal Ziyad Ame M Management East Harge Gurar Harar Harar Mada Walabu University
121 Abadir Abdi Getahun M Marketing Management Gara Multa Dire Dawa Dire Dawa Mada Walabu University
122 Anawar Ahamedteha Kabade M Economics Harar Harar Harar Mada Walabu University
123
Ayantu Sharif Adem F Marketing Management Gara Muleta Harar
Hararge and
around
Mada Walabu University
124 Amin Haji Yuyo M Management Deder Harer Harer Mada Walabu University
125 Hassen Aliyi Mummade M Computer Science West Harareg West Harareg Harar/badesa Mada Walabu University
126 Boru Amansis Aliyi M Sociology West Hararge Chiro Chiro/Badesa Mada Walabu University
7. 127 Chaltu Yasin Hasan F MIS keramale East Hararge Hararge Arsi University
128 Aneso Ahemed Ali M ITIM Hararge, Qarsa Hararge Hararge Arsi University
129 Obsa Kemal Adem M LSCM Bedeno Hararge Hararge Arsi University
130 Samuel Sintayew Alemu M Management West Hararge West Hararge West Hararge Arsi University
131
Hamdi Aman Reshid
M
Management Mesela West Hararge Chiro
Adama,Addis
Ababa
Arsi University
132 Remedan Hassen Mehamed M ITIM gursum Harar Dire Dawa Arsi University