...In this report I will present my results of my focus 2 tests together with interview report and carrier research. I would like to become a programmer and to make and develop applications on my own. I have also different interests but making programs make me feel innovative. My goals is to finish Computer information systems at Delaware Community College. After I graduate I would like to start working as programmer for some company and gain some experience, meet new people and start making some useful programs. The valuations that I will be centering on through this report are my: Work Interests Assessment, Personality Assessment, and Values Assessment. Work Interests Assessment Results of Work Interests Assessment test shows that my interest is most conventional. I found myself like individual that prefer logical, systematic work. I also like working with numbers and using a computer. The Computer programming is work with computers and numbers, so I found myself in that category. Also, after interviewing Mr. Robison, I peruse that my work should be systematic on computer what kind I mach. Result shows that after conventional I am most in enterprising category. There I found some skills that may match me. Result of jobs offered to me little surprise me. I wasn’t really matched with any jobs in this assessment....
Words: 511 - Pages: 3
...| Disaster plan | | | | 6/6/2010 | | Abstract This is a disaster plan that I created for the IST Department of XYZ Computers company in order to prevent any future problems that may arise such as the situation they had over the weekend when a major water pipe broke and flooded the first floor, causing extensive damage to the servers. Included in the disaster plan I will address a few issues that will aid the company in protecting against such things as any natural disasters that may occur as well as any other occurrences that may deem necessary for such a disaster plan. I will detail my recommendations for using a RAID system for data protection in order to have a well placed back up plan with the most up to date information possible. In short I plan to properly detail a disaster plan the best possible way that I can in order to have a good disaster recovery plan in place rather than having to spend the time and money on extra recovery efforts. Hopefully having such a plan in place will keep from losing important data to unforeseen issues, such as natural disasters due to the geographical location among other issues that may arise at the most in opportune time possible. When creating a disaster plan the first thing to keep in mind is to do a complete risk assessment of the entire existing computer systems. In order to accomplish this task all the risks and probabilities will need to be noted such as any delays to system uptime and how close at hand these...
Words: 1273 - Pages: 6
...Term Paper Proposal To: Dr. Vijay Karan From: Ming-Tzu Chou Date: 13 February 2012 Subject: Management control system Proposed Research Topic: How a new strategy saved and created a bright future for IBM in 90s. Statement of problem: In the early 1990s, IBM suffered in dramatically declining in the revenue of the mainframe sales, and the stock price also dropped. During the period, the personal computer was the most popular products in Information Technology market, and the mainframe was already outdated. Last but not least, IBM could not reduce its cost according to its size and bureaucracy. As a result, many people believed that IBM could only fell or be divided to smaller companies. Louis V. Gerstner, Jr., who was the new CEO, saved IBM and implemented different strategies in the company. Objective & Method: The purpose of the study is to evaluate how a new strategy affected IBM. Except the abstract, the term project will be separated to four parts: problem statement, strategy formulation and strategy planning of solutions, the summary of results, and recommendations. The term project should reach the following goals through in the four sections. 1. Problem statement will describe IBM’s previous business situation and introduce how problems had generated before Gerstner arrived. 2. The solutions from Gerstner will be deeply analyzed according to the theories from strategy formulation and strategy planning in the textbook. 3. The summary of results will be presented...
Words: 319 - Pages: 2
... 2012). Bleeding technology is relatively, new technology. Bleeding technology is unreliable because it has not been tested and it has not proven its worthiness or authenticity. A user will be taking a huge risk to use the bleeding technology which would be more expensive than the leading technology. Bleeding edge technology could be very costly and it could turn into something that could be the beginning of a serious problem. The reason why bleeding edge technology could cause many problems is because it is new and might be quite risky because of the instability. Bleeding edge technology has not been thoroughly tested and has not proven itself to be reliable. As an example of bleeding technology would be an early development of a new computer product that is being develop for the very first time. When a consumer decides to purchase the product, the cost is not the only thing that the consumer faces when choosing to purchase the bleeding edge technology; it is possible that the customer might get stuck with...
Words: 1786 - Pages: 8
...1 Teachers’ Views of Computers as Catalysts for Changes in Their Teaching Practice Sara L. Dexter and Ronald E. Anderson University of Minnesota Henry Jay Becker University of California, Irvine This paper was published in the Journal of Research on Computing in Education. The citation for it is: Dexter, S., Anderson, R. E., & Becker, H. J. (1999). Teachers’ views of computers as catalysts for changes in their teaching practice. Journal of Research on Computing in Education, 31 (3), 221239. Abstract: In this study we examined the use of computers by teachers in their instructional practices and their perception of the impact of computers on changes they have made to their classroom practice. These data draw from 47 teachers from 20 K-12 schools across 3 states who each completed a questionnaire, participated in 3 semi-structured interviews, and allowed 3 observations of their classroom. The teachers who had adopted more progressive teaching practices over time felt computers helped them change but they did not acknowledge computers as the catalyst for change. Instead, they cited catalysts that included: reflection upon experience, classes taken, and the context or culture of the school. We conclude that in order for teachers to implement the use of educational technology in a constructivist manner, they must have opportunities to construct pedagogical knowledge in a supportive climate. Research funded by the program of Research on Education Policy and Practice at the National...
Words: 9206 - Pages: 37
...WBS Dictionary Team One Technologies Project Management | From start to finish lay out of the project | Scope / Requirements | Team One Technologies is determined to helping Greenway Bank develop an approach to examine their scale or level of risk management. | Design | The office will house a local LAN, create a revenue stream, a new inbound customer service call center | Headquarters and four branch locations | Four branches located in New York, Seattle, Orlando, and Los Angeles, corporate offices in St Louis | Budget breakdown / Materials | Total cost on parts, labor and time | Complete data network and communication to all locations | Networks connect large numbers of users to share information and resources | Physical Layout for Voice & Data | A building by building layout or diagram for the Physical layout for the voice and data network | Data storage and off site backups for all 5 locations | off-site data protection, or vaulting, is the strategy of sending critical data out of the main location (off the main site) as part of a disaster recovery plan.Example: Barracuda Networks | Network Configuration Plan | the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance, and provisioning of networked systems. | Documentation for business continuity | The activities performed by Team One Technologies to ensure that critical business functions will be available to customers, suppliers, regulators, and...
Words: 655 - Pages: 3
...1. what is e-classroom? 2. what is industrial robot? Explain that. 3. Describe about the process that Mubin told about his parents. 4. ICT used for doing many dangerous situation succesfully. Explain that. Answers: 1. main book. 2. Industrial robot is a robot that is used in many dangerous work. Now all the industrial work in industry are done by industrial robot. Human become tired,bored but robot never. Robot can do work for long time. In the big industry of the world now robot is uses as labor. 3. Mubin told his parents about the use of computer in operating phone. He also told about the drone system. Mubin works in air force thats why his parents always anxious for him.They think about the airplane accident. Then mubin told them about the latest technology that used in aircraft. Now all the airplane are opetated by computer. Now pilot dont have to do many things. So the posibility of the plane accident now become less. Now a days there is no pilot in the fighter plane. The drone system is used normally in war. 4. Besides the use in aircraft ICT also used in many dangerous sector for doing many dangerous work. Now most of the work in the big industry is done by robot bacuase robot dont get tired or bored like human. Now human just observe the work either its right or wrong. Now in transportation the use of ICT increased a lot. In future if car dmis driven by robot then the number of road accidents will definately less. So now ICT is used in many dangerous sector...
Words: 679 - Pages: 3
...LG’s Michael Ahn on Becoming a Global Player in the Consumer Electronics Market: Knowledge@Wharton ( http://knowledge.wharton.upenn.edu/article.cfm?articleid=2667) LG’s Michael Ahn on Becoming a Global Player in the Consumer Electronics Market Published : January 06, 2011 in Knowledge@Wharton In 2000, executives at South Korea-based LG Electronics set the goal of becoming a top-three player globally by the close of the decade. One year early, in 2009, the company achieved its goal. Meanwhile, revenue has jumped from $5.6 billion in 2004 to more than $13 billion in 2010. Michael Ahn guided the branding effort for LG Electronics North America before stepping down as regional president and CEO last year to become a senior adviser at LG Electronics USA. In a recent conversation with Knowledge@Wharton, Ahn -- who was visiting the University of Pennsylvania to make a speech as part of the Wharton Leadership Lecture series -- named patience, consumer-targeted marketing and achieving synergy among the firm's different divisions as the factors catapulting LG Electronics from a relatively obscure maker of commodity goods to a premium global brand. An edited version of the conversation appears below. This is a single/personal use copy of Knowledge@Wharton. For multiple copies, custom reprints, e-prints, posters or plaques, please contact PARS International: reprints@parsintl.com P. (212) 221-9595 x407. Knowledge@Wharton I would love to start by talking about the consumer electronics...
Words: 1692 - Pages: 7
...Theme: Horror/Suspense Setting: A typical boy’s room- dirty and messy. The only light source would be the computer. Most used part would be the computer table/desktop. Characters: Gio- The main character, a slouchy procrastinator student who was writing and cramming a paper. Stranger- No fact was known other than he is implied to be a ghost or spirit a hint of it’s appearance. • Page 1 Panel 1: Paneling- 1/3 of the page horizontally (most of computer screens are horizontally oriented) A close up shot of a computer monitor, Microsoft word is the open application with only his name on it and a title “A Horror Story” Panel 2: Paneling- 1/3 of the page horizontally Gio leaning on his palm looking bored/thinking (shot from monitor’s POV), with a gleam of the only light source which is the monitor on his face. Thought Bubble: Ahhh, damn. I’ve been doing this for two days now. Panel 3: Paneling- 1/3 of the page horizontally A zoom up shot of the computer clock with “11:11pm” on it. Thought Bubble(top right side): 11:11 do you work, please send me a spirit and have him type his story! • Page 2 Panel 1: Paneling- 1/3 horizontally, 2/3 of the first tier. Gio face palming, same shot from page 1, panel 2. Thought Bubble(bottom left part): Who am I kidding? Wake up kid! Panel 2: inset, remaining of the first tier Gio reaching to the right for the coffee mug in the study table, back shot with him on the center. Thought Bubble(left side of the...
Words: 541 - Pages: 3
...KB Corporation PROPOSAL For Inventory Management System Table of Contents 1 Overview 2 Problem Situations Proposed and Purpose 3 Record methods 3.1 Recommendation for the forms design principles are: 3.2 Computer assisted-retrieval system (CAR) 3.3 Data Retrieval methods by Information Technologies 3.4 Policies for record storage 4 Organizing the record and the classification system. 5 Implementation. 6 Conclusion: Strategically Managing Inventory for Future Growth 1. Overview As the company are expecting to establish another 20 shops in the next 2 years, we have realized how important for the document system for different department. And our products are almost imported from Europe and Asia. We cannot keep to using the manual record for the document record system. This document will explain the requirement for management, inventory, provisioning, customer support, sales support, and book-to-bank systems. Where possible recommendations are given to understand and plan for interconnection, correlation, and data warehousing requirements. Emphasis is given to ensuring all databases will have a capability to provide input to decision support systems needed by both senior management, as well as operational levels of the business. 2 . Problem Situations Our company current operation has shown that the inventory document record is obvious inefficiency. In the aspect of inventory control, more and more errors were found...
Words: 1430 - Pages: 6
...INTRODUCTION Real Estate Management System is website which is helpful for Builders as well as a individual as Buyers or Seller. In the currently all the activities are done manually. It is very tough for person to contact a appropriate Buyer or Seller. Our Real Estate Management System deals with the various activities related to the students. There are mainly 3 modules in this software * Search * Post * List On this Website we can register as a Individual, Agent or Builder. Administrator has the power to activate and deactivate the user account Administrator can also add new user and can edit and delete a user. A Builder can register as user and can buy and sell Properties. An Agent can suggest for buying and selling Properties. An Individual can register as a user and can list, buy and sell properties. SYSTEM ANALYSIS EXISTING SYSTEM: System Analysis is a detailed study of the various operations performed by a system and their relationships within and outside of the system. Here the key question is- what all problems exist in the present system? What must be done to solve the problem? Analysis begins when a user begins its registration & starts to search, list & post property. During analysis, data collected on the various files, decision points and transactions handled by the present system. The commonly used tools in the system are Data Flow Diagram, activity diagram, sequence diagram, collaboration diagram, etc. Training, experience and common...
Words: 1885 - Pages: 8
...Internet Operating Systems For years I thought that operating systems were simple little programs (lines of code) placed inside personal computers to help them run smoothly and efficiently (truth be known, an OS is needed to make any computer run at all). But not until recently did I discover that operating systems must also be used in larger mainframes and servers as well. After all, servers are computers too! And any computer, regardless of its size or purpose, needs internal instructions. It needs a set of executable code that makes the thing come alive. One might say that operating systems are the souls of computers everywhere. This begs a question or two: what types of OS’s are out there? And how do they differ from the one in my iPhone? Also, if I wanted to swap out my current operating system for a different one (after all, my friends keep telling me about all of the great things they’re doing with Linux), how easy of a task would that be? The most common OS for a desktop (or a laptop) in use today is Windows 7 ("Os Platform Statistics", 2012). But what about the operating systems which are used by small and large companies that host web pages? Or what about the large computers that store hundreds of thousands (if not millions) of large data files in a centralized data centers? Or what about those companies that provide search engine services? Companies like Google, facebook, and Yahoo!, maintain their own, internal OS’s, which are designed to serve...
Words: 572 - Pages: 3
...in 1964, has enjoyed ever four decades serving the har dware/ home improvement industry. Which widely known for the outstanding service and quality products. Max Hillman Jr. and Richard Hillman are both helped to start the company and remains as leaders. Avnet is one of the world’s largest transnational electronics distributors of electronic parts, enterprise computing and storage products and embedded subsystems, Avnet provides a vital link in the technology supply chain. Market needs and trends drive Avnet’s product and service strategy, supported by a global infrastructure. It brings a breadth and depth of service capabilities, such as supply-chain and design- chin services, logistics solutions, product assembly, device programming, computer system configuration and integration, and technical seminars. Quaker chemical since 1918, they have been established and maintaining long term relationships with leading enterprise in primary metals, metalworking, and other basic process industries all over the world. Quaker is a $544.1 million dollar company. The company is publicly traded on the New York Stock exchange, and has a long track record of financial consistency and strength. Today, they have business and production presence in every major manufacturing country in the world. Business intelligence (BI) is a broad category of applications and technologies for gathering, storing, analyzing, and providing access to data to help enterprise users make better business decisions...
Words: 400 - Pages: 2
... | |Qualification: | |COMPUTER HARDWARE SERVICING NC II | |[pic] |Technical Education and Skills Development Authority | | |East Service Road, South Superhighway, Taguig City, Metro Manila | TABLE OF CONTENTS Page A. COURSE DESIGN 1-5 B. MODULES OF INSTRUCTION 6-73 • Basic Competencies 6 o Participating in workplace communication ………………… 7-10 o Working in a team environment ……………….... 11-13 o Practicing career professionalism .……………. 14-17 o Practicing occupational health and safety procedures 18-22 • Common Competencies 23 o Applying quality standards …………………………………… 24-27 o Performing computer operations 28-34 o Performing mensuration and calculation 35-38 o Preparing and interpreting technical drawing 39-42 o Using hand tools 43-47 o Terminating and connecting electrical...
Words: 8633 - Pages: 35
...Week 1 – Chapter 1 Jiajun DU 1. Read Chapter 1 – Information Systems in Global Business Today –N/A 2. Weekly Online Discussion Question – completed online in the Discussion Forum Area (no need to copy and paste into document) 3. Chapter 1 Video Case – PDF file located in the Course Documents Area (answer the questions without retyping the question) (1). “Smart Labels” are data and computer based shipping labels. And it can be made byr personal computer. The barcodes can record a lot of data, so it can’t only decrease the transit time, but also increase reliability. UPS can use GPS to provide a better track serves. Once the package arrive a UPS station, the “Smart Labels” can record the information of package and update to the website. The customer can track their packages easier. The UPS can also use this system to control their deliver serves, make sure the package can deliver on time. (2). Costumer order –logistics center-DIAD-delivered-DIAD A. The customer places an order, the logistics center receive the package and updates tracking information. B. When UPS ship out the package, they will use DIAD to scan the “Smart Labels”, so they can update the tracking information in date center. C. When the package is delivered, the customer need to sign name and UPS will use DIAD to update information. (3). Wireless communication can make the express delivery services more flexible and update their information faster. And it makes UPS more efficient and lower the cost of operation...
Words: 360 - Pages: 2