...Ever since I was a teenager I noticed that one of my mom’s biggest wishes was to have the opportunity for her child to go away to a University. Unfortunately she was never going to fulfill that dream though me because I had no intention of going to college. I hated school. My attitude was “college isn’t for everyone” and I let that be known to everyone who even uttered the word “college”. Every Sunday morning my mom would get me up and cook breakfast, we’d sit down at the table as she looked at all the sales ads. I always noticed that she enjoyed ads from Target and Wal-Mart those most. She would spend a lot of time looking the “Back to School” (particularly college) sales. She would just love looking at everything they had to decorate a dorm and etc. I would feel bad that I wasn’t the one to go away to college but the weight was lifted off of me when she started having more kids when I was 13 years old. When I was thirteen she had my little brother, and then when I was sixteen she had my little sister. My brother wasn’t exactly the studious type either. However my sister made decent grades and she is an excellent athlete. She was the best in basketball and track. My mother and myself know absolutely nothing about sports so for a long time we had no idea what kind of potential my sister had. It wasn’t until I attended one of my sister’s first track meets that I realized that she was good enough to get a scholarship. I knew that my mother would not be able to afford...
Words: 646 - Pages: 3
...ITT Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas: Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA NT2580 NT2670 Introduction to Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to Security Auditing for Compliance Countermeasures Information Security Email and Web Services NT1230 NT1330 Client-Server Client-Server Networking I Networking II IS3230 IS3350 NT1230 NT1330 Issues Client-Server Client-Server SecurityContext in Legal Access Security Networking I Networking II NT1110...
Words: 2305 - Pages: 10
...Michael Pallanes 11/4/14 EN1320 Unit 7 Assignment 1: Using Empirical Tools To: Mr. Tedlock From: Michael Pallanes Date: 11/4/14 Subject: Diverting 8” Waste Activated Sludge Line Mr. Tedlock I have chosen the interview questions for this unit 7 assignment. The reason I have chosen the interview questions, is because I think it will be more suitable for what am doing. My questions to Pima County Wastewater Treatment plant will be: 1. How important is it to you to get this 8” WAS line hooked up to building 58? 2. What is the time frame to get this project done? 3. Do you have any survey points, to where this line is going to be laid at? 4. Do you have the old plans from past contractors that have been here before? 5. Do you have any one to blue stake the area for us? 6. What is the time frame for the shut down for when we tie into the 8” line? 7. Who well be involved in the lock out tag out procedure? 8. If we come along to a problem with the excavation who should we talk to? 9. What is the number to the fire department? 10. Is it mandatory for the men that are working on this line to get a tetanus shot? The audience to whom I will apply this method of data collection, will be the board of Pima County. The type of data I hope to gather from this interview is a lot. Like the time frame for this project, the man hours that will be needed to get it done, and what type of equipment will be needed for this...
Words: 284 - Pages: 2
...of popular desktop operating system(s) for standalone and network client computers, and related aspects of typical network server functions. Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course relates to other courses in the NSA program: 1 Date: 8/31/2012 Client-Server Networking I Syllabus NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420...
Words: 1834 - Pages: 8
...following diagrams indicate how this course relates to other courses in respective programs: Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1201 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming Technology Courses General Education/ General Studies 1 Date: 7/18/2011 IP Networking Syllabus Mobile Communications Technology MC2799 MCT Capstone Project NT2640 IP Networking MC2560 Mobile Wireless Communication I MC2660 Mobile Wireless Communication II MC2665 Mobile...
Words: 2573 - Pages: 11
...Jonathan Abreu EN1320 Monday 6:00pm – 10:45pm Unit 5 Assignment 1: Genre Essay- Proposal Draft Terrorism Terrorisms have been part of our lives for a long time. In recent years terrorist attacks have sky rocketed due to governmental and religious disputes. Terrorism comes in different ways such as murder, kidnaping, hijacking and bombings. Terrorism like its own word describes terrorizes by interrupting the peace and our security by the use of political and religious attacks. Terrorism has become the number one choice to probe governmental and religious opposition to those who oppose the cause or believe of certain groups. Some of these terrorist groups take aim at specific location to create fear on those who don’t follow their cause hoping that the fear will make you not want to oppose them. Many groups operate within a single nation or region. (Wilcox, page 1) These groups can also spread out all through the world making hard to control as they rely on guerrilla warfare. (Mockaitis, Par 3) Now in this day and age we have this groups joining terrorist leader spreading all across the world making it hard to monitor and control terrorist attacks. We receive treat on a daily bases now a days, therefore counter terrorism has to be at the top of the game. In a time where every nation is connected with each other, protecting our assets has become much greater. (Cordesman, Par 1) because of the importance of protecting these assets, most countries have special units working around...
Words: 425 - Pages: 2
...Reflections on Essay Writing EN 1320 Composition 1 Class 8 Oct 2014 Unit 3 Assignment 2: Refelerctions on Essay Writing EN1320 Where to start; to explain about what I have learned about writing in composition 1 class. I have always been a pretty good writer, I think. As long as I like the genre that I’m writing on, I can usually produce a good product. Composition one has helped me slower but surely, I think it will just take a little more time. This class has helped me considering it is only the fourth week of class. I guess my style of writing is; I believe I’m a prewritter, most of the time. First, I get all my source material together, I read and outline said materials and I just start writing. I do the same thing that I’ve always done through my entire US Air Force career. It’s how I approach all my writing assignments and I’ve got proficient at it. In the Air Force, I wrote for subordinates or troops, their EPRs (Enlisted Performance Reports). I always used this approach when I wrote metals, awards and disciplinary reports on someone actions. I would start with few bullet statements or what you would call brief statements on accomplishments. I would start with some short bulleted statements and expound on them. I’ve had a few good supervisors in the Air Force that taught me how to write. They have told me, it doesn’t matter what comes out when you write, just get it down. I have used this lot and I got pretty good at it, for example when an accident occurred...
Words: 413 - Pages: 2
...is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming...
Words: 4400 - Pages: 18
...is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming...
Words: 4400 - Pages: 18
...Video game addiction An Assignment Submitted by ______ ITT Composition I (EN1320), _/_/_ Video game addiction Video game addictions is a rather new syndrome since the computer games are relatively young – the oldest being only slightly older than twenty years. Video game addiction is a dangerous phenomenon and is detrimental to the realization of reality by a human being. The official definition of the syndrome is the following: video game addiction is a severe compulsive use of either video or computer games. Indulging in using the games excessively may hinder one’s everyday life. Video game addiction may display itself in the following way: social isolation, excessive amounts of time spent on gaming, diminished imagination, irregular mood swings, too much focus on the in-game achievements, behavior, which is modeled by the rules and realities of any given game (Lindsey 2007). Video game addiction is not going anywhere, as it recently acquired enough infamy to make it worthy of inclusion into the Diagnostic and Statistical Manual of Mental Disorders, under the “Conditions for Further Study” heading. It was deemed worthy of inclusion by the American Psychiatric Association, due to enough evidence, as well as, the fact that video game overuse results have similar symptoms and effects as seen in other psychological addictions. It has been noted that video game addiction bears many similarities to impulse control disorder and compulsive gambling...
Words: 1004 - Pages: 5
...ITT Technical Institute NT1310 Physical Networking Student Course Package Bring this document with you each week Students are required to complete each assignment and lab in this course package on time whether or not they are in class. Late penalties will be assessed for any assignments or labs handed in past the due date. The student is responsible for replacement of the package if lost. Table of Contents Syllabus 2 Student Professional Experience 19 Graded Assignments and Exercises 23 Labs 47 Documenting your Student Professional Experience 57 ITT Technical Institute NT1310 Physical Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1210 Introduction to Networking or equivalent Course Description: This course examines industry standards and practices involving the physical components of networking technologies (such as wiring standards and practices, various media and interconnection components), networking devices and their specifications and functions. Students will practice designing physical network solutions based on appropriate capacity planning and implementing various installation, testing and troubleshooting techniques for a computer network. Where Does This Course Belong? | | | NT2799 | | | | | | | | NSA Capstone | | | | | | | Project | | | | | NT2580...
Words: 10839 - Pages: 44