It301 Assignment-Unit2

In: Computers and Technology

Submitted By ANDREALIBBY
Words 1181
Pages 5
| |
|The Basement Upgrade |
|Project Charter & WBS |
|Kaplan University |
|Andrea Meeves |
|8/12/2013 |

| |

Worksheet: The Project Charter

Project Name: Basement Upgrade

Project Manager: Andrea Meeves

Project Tracking Number: A1234 Date: August 12, 2013

Project Justification: This project will address the water damage issue that has been identified under the current flooring located in the basement. The project will also address some water damage located in the basement bathroom. This project is being under taken to increase the value of the home and complete the basement.

Overview of Deliverables

1.0 CLEAR OUT BASEMENT 2.0 REMOVE OF CURRENT FLOORING 3.0 CEMENT FLOORING PRE-CARPET PREPARATION 4.0 REPAIR LEAK IN BASEMENT WALL 5.0 CLEAN MOLD ISSUE IN BASEMENT BATHROOM 6.0 CARPET BASEMENT FLOOR 7.0 ARRANGE BASEMENT FURNITURE.

Specific Project Objectives and…...

Similar Documents

Unit2 Assignment 1: Calculate the Window of Vulnerabilty

...IT255 - Introduction to Information Systems Security 9/28/12 Unit 2 Assignment 1: Calculate the Window of Vulnerability To resolve the issue of the window of vulnerability (WoV), we would need to get the patch from Microsoft. According to Microsoft, it will take up to 3 days for the patch to be available. Then, we would need additional time to download and test the patch to make sure that this is what is needed to fix the security breach on the SMB server. After doing the testing, the IT department would need time to install the patch onto the servers and deploy to the client computers. This will take 2 days to do, depending on the IT staff, if they work on weekends will determine the completion date. Meaning, if they will work on the weekend, then the deployment to all computers and servers will be done by that Sunday. If not, then it will be the following Tuesday. So, the time that is needed would be a week. To recap, the security breach was reported on a Friday. On Monday, looked on Microsoft’s website to see when the patch would be released, and it indicated that it would take 3 days for it to be available. Counting Monday, 3 days would be, Wednesday. Depending on the time that the patch is released on Wednesday, would need an additional 2 days to download and test the patch before deploying, if early Wednesday, then Thursday to test. But if it comes late Wednesday, then it would take Thursday and Friday to test. Then that would leave the weekend, if the IT staff...

Words: 292 - Pages: 2

It255 Unit2

...Security Business. Keywords Use the following keywords to search for additional materials to support your work:  Common Vulnerabilities and Exposures (CVE)  Risk Management  Risk Mitigation  Security Countermeasures  Window of Vulnerability (WoV) Servers to have running * Windows DHCP * Server 2003 Target * Ubuntu Desktop * Ubuntu Server ------------------------------------------------- Week 2 Assignment * Calculate the Window of Vulnerability (See Below) * Microsoft Environment Analysis (See Below) Lab * Conduct a Vulnerability Assessment Scan Using Nessus® * Lab book pages 15 – 27 * Screenshots and answer questions on pages 26-27 Project (Part 2 Due Week 11) * Project Part 2. Student SSCP® Domain Research Paper ------------------------------------------------- Unit 2 Assignment 1: Calculate the Window of Vulnerability Learning Objectives and Outcomes  You will learn how to calculate a window of vulnerability (WoV). Assignment Requirements You are reviewing the security status for a small Microsoft workgroup LAN. The workgroup contains many distinct separations in the network determined by group memberships. An example of the network divisions is as follows:  Windows laptops: Traveling salespeople, remote suppliers, branch offices  Windows desktops: Accounting group, developer group, customer service group  Windows servers: Administrative server,......

Words: 1506 - Pages: 7

Assignment

...Click the link above to submit your assignment. Students, please view the "Submit a Clickable Rubric Assignment" in the Student Center. Instructors, training on how to grade is within the Instructor Center. Assignment 2: Joe Salatino, President of Great Northern American Case Study Due Week 4 and worth 100 points Read the Joe Salatino, President of Great Northern American case study located in Chapter 5. Write a six to eight (6-8) page paper in which you: 1.    Discuss why Joe’s employees need to understand the importance of how people form perceptions and make attributions. 2.    Evaluate which learning theory (either operant conditioning, social learning theory, or the learning theory you researched in Week 3) would be most appropriate for Joe to apply in this situation and explain why. 3.    Discuss ways that Joe could apply the learning theory you selected to improve employees’ performance. 4.    Determine how Joe could leverage an understanding of the value of self-efficacy to ensure he hires the most successful salespeople. 5.    Use at least three (3) quality academic resources in this assignment. Note: Wikipedia and other Websites do not qualify as academic resources. Your assignment must follow these formatting requirements: •    Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions. •   ......

Words: 332 - Pages: 2

Unit2

...EMC Confronts Harassment Charges EMC Confronts Harassment Charges Kaplan University MT203-02: Human Resource Management Dana Williams April 30, 2013 EMC Confronts Harassment Charges Introduction According to a lawsuit that files by two women of EMC allege sexual comments, company-paid trips and the failure to promote women for the same experience on the same basis as male employees where discrimination against. Women were being paid lower wages that may have been creating a hostile and offensive environment to women, making it harder for women to work there. The firm gathered 30 sworn affidavits from women supporting allegations that the work-place was hostile and discriminatory. (Noe, Hollenbeck, Gerhart, & Wright, 2009). Review/Analysis of the Case Answer to question #1-In the book it states that sexual harassment is unwelcome sexual advance, sexual favors, and any other verbal or physical contact. In this case according to the complaint that the women filed there where sexual comment, company paid trip to strip club and retaliation toward women who complained. Sexual harassment that goes on in a workplace worldwide on a regular basics. The law that was violated in this case was the unwanted sexual comment. Harassment does not have to be of a sexual nature, however, and can include offensive remarks about a person’s sex. For example, it is illegal to harass a woman by making offensive comments about women in general.......

Words: 522 - Pages: 3

Nt2580 Week2 Unit2 Homework.Pdf

...Barrero, Carlos Sat morning NT2580 Unit 1 Assignment 2 Impact of a Data Classification Standard The user domain is the first layer of the IT infrastructure I will discuss that is affected by the “internal use only” standard. It is the first layer and what some believe to be the weakest in the infrastructure. The user domain is where personal information is created and obtained for internal use only. Each person will have set permissions on what they can and cannot do. This way no one person can mess up or delete anything that doesn’t need to be (Jones and Bartlett Learning). The work station domain is the second layer of the infrastructure that I will discuss. This is also affected by the “internal use only” standard. This layer is where the user can access the network and any applications or information on the system. This requires a user to login with a password or authentication of some kind. This has to be done before this person can get to this information. This will help keep people out that aren’t supposed to be accessing the information (Jones and Bartlett Learning). The LAN to WAN domain is the third layer of the infrastructure I will discuss. I feel this is also affected by the “internal use only” standard. The TCP and UDP are not safe due the fact these are the enter and exit points of the network. This allows all the private information on the network at Richman Investments easy accessible for others outside of the network (Solomon). These are what I......

Words: 313 - Pages: 2

Assignment

...FST-01 ASSIGNMENT BOOKLET Foundation Course in Science and Technology Bachelor’s Degree Programme (BDP) (Valid from 1st July, 2013 to 31st March, 2014) It is compulsory to submit the assignment before filling in the exam form School of Sciences Indira Gandhi National Open University New Delhi (2013-14) Dear Student, We hope, you are familiar with the system of evaluation to be followed for the Bachelor's Degree Programme. At this stage you may probably like to re-read the section on assignments in the Programme Guide that was sent to you after your enrolment. A weightage of 30 percent, as you are aware, has been earmarked for continuous evaluation, which would consist of one tutor-marked assignment for this course. This assignment is based on all Blocks of this course i.e. Block 1-8. Instructions for Formatting Your Assignments Before attempting the assignments, please read the following instructions carefully: 1. On top of the first page of your answer sheet, please write the details exactly in the following format: ENROLMENT NO.: …………………... NAME: …………………........................ ADDRESS: …………………................. ……………………………………… COURSE CODE COURSE TITLE : ………………………………. : ……………………………….. ASSIGNMENT NO. : ………………………………... STUDY CENTRE : ……………………………..… (NAME AND CODE) PLEASE FOLLOW THE ABOVE FORMAT STRICTLY TO FACILITATE EVALUATION AND TO AVOID DELAY. 2. 3. 4. 5. 6. Use only foolscap size writing paper (but not of very thin variety) for writing your......

Words: 760 - Pages: 4

It301-Unit5

...Leading thinkers make great philosophies, and great philosophies make great thinkers, and one of them is W. Edwards Deming. Deming changed our lives by developing better ways for people to work together. He was educated in engineering physics and became an early student of statistics. He derived the first philosophy and method that allows individuals and organizations, to plan and continually improve themselves, their relationships, processes products and services. His philosophy is one of cooperation and continual improvement; to steer clear of blame and redefines mistakes as opportunities for improvement. Deming’s philosophy came about while he was in Japan, doing census work after World War II. He also taught statistical process control to leaders of prominent Japanese businesses. Japanese businesses started applying Deming’s philosophy and saw great improvement; their quality was way more superior then of their competitors. Deming’s points and philosophies apply equally to any kind of business, everyone could use his logic. After using his philosophy, the Japanese saw such improvement in their products and their businesses in general; their business was soaring and their cost was lower than that of other businesses. Japanese businesses soared and ruled the global market. By improving quality, companies will decrease expenses as well as increase productivity and market share. Companies that were using Deming’s philosophy saw that they didn’t have to sacrifice quality to...

Words: 709 - Pages: 3

Nt1230 Unit2 Assignment1

...Lydell Smith NT1230 Unit2 assignment1 1. What does RAID stand for? Redundant Array of Independent Disk 2. When would we use Raid? To divide and replicate data into physical drives. 3. Define the following types of RAID: a. RAID 0-is simply data striped over several disks. This gives a performance advantage, as it is possible to read parts of a file in parallel. However not only is there no data protection, it is actually less reliable than a single disk, as all the data is lost if a single disk in the array stripe fails. b. RAID 1-is data mirroring. Two copies of the data are held on two physical disks, and the data is always identical. RAID1 has a performance advantage, as reads can come from either disk, and is simple to implement. However, it is expensive, as twice as many disks are needed to store the data. c. RAID 5-data is written in blocks onto data disks, and parity is generated and rotated around the data disks. Good general performance, and reasonably cheap to implement. Used extensively for general data. d. RAID 6-is growing in popularity as it is seen as the best way to guarantee data integrity as it uses double parity. It was originally used in SUN V2X devices, where there are a lot of disks in a RAID array, and so a higher chance of multiple failures. RAID6 as implemented by SUN does not have a write overhead, as the data is always written out to a different block. 4. Why is RAID 0 of any use if it offers no redundancy? Fast performs and additional......

Words: 433 - Pages: 2

Benchmark Assignment

...Benchmark Assignment Interpersonal Communication You wouldn’t think it, but as individuals, communication is the most complex activity that we can perform. When you think about it, communication is really a skill that we acquire and develop over time. Some individuals over time become proficient in communication, while others may not fare so well we have to remember that interpersonal communication is a part of knowing our self, our perception of others, how we handles our emotions, and remembering that our gender and culture play a part of how we communicate. Interpersonal communication is necessary in maintaining healthy interpersonal relationships with the individuals we communicate with, especially the ones we care about the most. The way we speak, act in conversations, and convey our messages to the people we surround ourselves with plays great deal on how who we are has a person. When you are using interpersonal communication you are using a dynamic form of communication in which you are exchanging messages and information that can influence thoughts, emotions, behaviors, and relationships between one another. We communicate in many different ways such as emails, telephone calls, text, or by letters and we have to remember how our tone might come across. For myself, I ......

Words: 1700 - Pages: 7

Assignment

...[pic] Assignment 3 / Group Assignment Taylor’s Business Foundation Programme Introduction To Marketing / BUS0313 September Semester 2013 Assignment 3 / Group Assignment (25%): Students are required to work in a group of 3 to 4 members. Students will be allocated one case study to analyse and attempt. The case study comprised of a few questions. Students are strongly encouraged to exhaust relevant syllabus taught and guided throughout the semester to attempt all the questions. Choose either one of the following case study to attempt, please refer to the attachments for the detail of case study. Case study 1: Abou Shakra Restaurant: Creating Customer Value The Old-Fashioned Way Questions: 1. Describe Abou Shakra in terms of the value it provides for customers. (20 marks) 2. Do you think Abou Shakra should develop a high-growth expansion strategy? Why or why not? (20 marks) 3. Should Abou Shakra spend more on advertising than is currently expended? (20 marks) 4. Suggest TWO (2) other methods by which Abou Shakra can provide value to its customers. (40 marks) Or Case study 2: Mavi Jeans: Jeans That Fit Questions: 1. Indicate and explain FIVE (5) factors contributed to the success of Mavi Jeans? (20 marks) 2. How would you define the company’s target market? What is the......

Words: 499 - Pages: 2

Unit2

...Barclays Bank Critical Essay Abstract [The abstract should be one paragraph of between 150 and 250 words. It is not indented. Section titles, such as the word Abstract above, are not considered headings so they don’t use bold heading format. Instead, use the Section Title style. This style automatically starts your section on a new page, so you don’t have to add page breaks. Note that all of the styles for this template are available on the Home tab of the ribbon, in the Styles gallery.] Keywords: [Click here to add keywords.] Barclays Bank Critical Essay The way that Barclays Bank and its alleged collaborators manipulated the London Interbank Offered Rate is one of the most unethical acts I have personally heard of. This is because they collaborated with fellow businesses in the financial lending sector to create an appearance of a healthy and stable economic situation when the inverse was true. While this is morally despicable they were trying to maintain their profitability in a difficult economic time. However this is no excuse for the way they ignored their corporate responsibility to their consumers. This act shows that Barclays bank is very low in terms of ethical development. According to the books pyramid of corporate social responsibility they would be on the bottom. As their actions were motivated purely to meet their economic responsibilities by being profitable. It can be argued that they did what they needed to do in a tough economical time to meet the......

Words: 615 - Pages: 3

Unit2

...P6 | Produce guideline for dealing with problems | | | P7 | Carry out follow up activities after a business event | | | P8 | Review the success off the business event | | | M1 | Assess the importance of meeting organisational and legal requirements when planning a business event | | | M2 | Analyse the arrangements made by an even organiser to plan a business event | | | M3 | Evaluate how a business event can inform future planning | | | D1 | Evaluate the management of a business event making recommendations for future improvements | | | D2 | Evaluate feedback from delegates participating in the event | | | LEARNER DECLARATION I certify that the work submitted for this assignment is my own Candidate Name: | Candidate Signature: | Date | Assessor’s Feedback | Assessors final grading Grade | Grade awarded by assessor | IV Grade | Comments | Pass P | | | | Merit M | | | | Distinction D | | | | Assessor’s Name | Assessor’s Signature | Date | IV’s Name: | IV Signature(if sampled) | Date |...

Words: 624 - Pages: 3

Unit2

...Travis Avery NT2580 Project Part 2 Purpose - This policy defines the security configurations users and Information Technology (IT) administrators are required to implement in order to ensure the integrity, availability, and confidentially of the network environment of Richmond Investments(R.I). It serves as the central policy document with which all employees and contractors must be familiar, and defines regulations that all users must follow. The policy provides IT managers within R.I. with policies and guidelines concerning the acceptable use of R.I. technology equipment, e-mail, Internet connections, network resources, and information processing. The policies and restrictions defined in this document shall apply to all network infrastructures and any other hardware, software, and data transmission mechanisms. This policy must be adhered to by all R.I. employees, temporary workers and by vendors and contractors working with R.I. Scope- This policy document defines the common security requirements for all R.I. personnel and systems that create, maintain, store, access, process or transmit information. This policy also applies to information resources owned by others, such as vendors or contractors of R.I., in cases where R.I. has a legal obligation to protect resources while in R.I. possession. This policy covers all of R.I. network systems which are comprised of various hardware, software, communication equipment and other devices designed to assist the R.I. in the......

Words: 598 - Pages: 3

Assignment

...SUNWAY COLLEGE JOHOR BAHRU DIPLOMA IN BUSINESS ADMINISTRATION COURSEWORK / ASSIGNMENT (GROUP) Module Code Module Title Semester Issue Date Due Date Lecturer : BMGT 0304 : HUMAN RESOURCE MANAGEMENT : MARCH-JUNE 2015 : WEEK 2 : WEEK 6 (30th April 2015) : ANTHONY WONG INSTRUCTIONS 1. 2. 3. 4. 5. 6. There are SEVEN (7) pages in this assignment including the cover page. The assignment must be completed in groups as per instruction. The submitted assignment must include the Assignment Cover Page. References must be acknowledged accordingly. Plagiarism/cheating will result in the assignment being marked FAIL. The assignment must be submitted in hardcopy (printed) format and presented. IMPORTANT Assignments must be submitted on their due dates. If an assignment is submitted after its due date, the following penalisation will be imposed: ● ● ● One to two days late Three to five days late More than five days late 20% deducted from the total assignment marks 40% deducted from the total assignment marks Assignment will not be marked. 1 INTRODUCTION This assignment is a partial fulfillment of requirements leading to Diploma in Hotel Management/Business Admin for students taking a subject in Human Resource Management. The assignment will be done by students in suitable group size which approved by the lecturer. PURPOSES The purposes of this assignment are to assess a student’s ability to: 1. Understand the basic concepts or theories learned in the subject matter.......

Words: 1354 - Pages: 6

Unit2 Crisis

...Unit 3- Case 1+2 Michaela Konen Kaplan University WE are presented with two cases, in both cases we need to use the 6 step model that we have learned from our book. “1. Define problem. 2. Ensure client safety. 3. Provide support. 4. Examine alternatives. 5. Develop a plan. 6. Obtain commitment (James, 2008, pg 76).” It is important to know the steps so we can have a successful intervention. Case 1 You have been called out to a scene in which a 35-year-old woman is experiencing a crisis. Her husband just committed suicide and she is distraught about her circumstances. What information would you want to know before intervening? After finding out the necessary information, how would you handle this case? Before going to talk with the client I would want to know if she found her husband or was even home when he committed suicide. I would also like to see if I can find out anything about her mental health, or see if she has a criminal record. This is just to protect myself and others around. When people experience a crisis like this there emotions are all over the place from being sad to getting angry. I would want to get as much of her information as I could before heading out her way. When you arrive you have only a certain amount of time. So assessment are don’t fast, since we don’t have time to do a in depth one like you would have at a facility. “Objective assessment is based on an appraisal of the client’s functioning in three areas that may be referred to......

Words: 1505 - Pages: 7