Premium Essay

Lab Worksheet

In:

Submitted By Doncastle
Words 741
Pages 3
|SMART Goal Worksheet | | | |Remember!! SMART Goals are: |Name: Don castle | |
|My plan is graduate with a high satisfying GPA in Bachelor's in Business| | | |Measurable | | |
|Administration wit h focus in Operations management om March 2018. | | | | | | |
|Before my graduation I plan to get an internship with GE company in | | | | | | |
|Cincinnati Ohio to gain knowledge and experience and also try to secure | | | | | | |
|a position. | | | | | | |
| | | | |Attainable | | |
| | | | |Relevant | | |
|

Similar Documents

Free Essay

Rainforest

...DIPLOMA IN PRE-PRIMARY TEACHERS TRAINING MID TERM ASSIGNMENT ON COMMUNITY HELPER Topic: Community Helpers Subject : Environment Studies Level / Class : GRADE II No. of students : 16 Time : 40 mins Age Group : 6-7 years Teaching Aids : Flash Cards, Marker, VCD, Reference Book “Hello Earth” Aim of the Lesson: a) Main focus - To develop understanding in young learners about Helpers in our community and how they help us? b) General Aim - To develop listening and speaking skills. To enhance their knowledge about community helpers. To enhance the volume of their vocabulary. To develop memorization and imaginative skills. Concepts Introduced: a. Identification of Community Helpers. b. Tools used by Community Helpers. c. Work Place of Community Helpers. d. Dress up of Community Helpers. e. Dramatization of Community Helpers. Time Allotted | Activity Planned | Teacher’s Activity | Student’s Activity | Anticipated Problems (Teacher’s Point of View) | 10 min | Warm...

Words: 682 - Pages: 3

Free Essay

Bill

...by applying theories to your own behaviour. In this assessment, you will submit three (3) out of six (6) tutorial worksheets as part of a portfolio. You must submit worksheet 1 and then choose any two (2) from worksheet 2 to 6. The tutorial program has been designed to assist your learning and is directly linked to this assessment. You should aim to attend most of the tutorials if you seek a good mark. Consumer Behaviour List In the first tutorial, you will be select ONE consumer behaviour from the list below that you have done in the last three months. You will then complete worksheets in the tutorials of weeks 2 – 7 on that consumer behaviour. Once you have selected a behaviour you cannot change as your assessment requires to submit worksheets on the same behaviour. List of Consumer Behaviours * Buying a PC/laptop/high-technology item * Booking/arranging/going on an overseas holiday * Selecting a university * Going to the movies * Choosing a restaurant for a special occasion * Evaluating and selecting a mobile phone plan * Choosing to do volunteer work * Buying a fashion item * Going to a concert * Changing a bad habit (smoking, reducing alcohol intake, getting fit, eating better) Assignment structure and requirements You must follow this structure, do not change the order of the content of the worksheets in any way as this may result in reduced marks. This assignment requires the use of first-person language. The total...

Words: 608 - Pages: 3

Free Essay

Com Essay

...Math 100 Review for Test III As college students, you are expected to be able to review on your own, and carefully manage your time. That is, the primary responsibility for mastering the material is your own. Here are some suggestions that may help in preparing for your first test. As listed in the Course syllabus, you may bring one sheet of self-prepared notes. You are cautioned that spending too much time searching through notes can be fatal. You should know the material well enough that only a quick glance at notes will suffice. A very good source for review is the Worksheets that you have been printing during the term. Printing one or two Worksheets each week is a good study skill. Click on Worksheet in the blue bar in Aleks. This will show the Worksheets and answers. You can also get ALEKS to suggest Review problems for you. Click on Review in the blue bar in ALEKS. You should see something similar to what is below. You should look over the list, and decide for yourself which problems you had trouble with and need to review. Clicking on any topic listed will bring you to Practice on that topic. This test will cover Chapters 5. There are 23 possible topics that were covered. I will certainly not ask a question from every one of these topics, but ... you should be prepared to answer questions on any of them. And there might be a review topic from the first two tests. Based on your work to date, I expect all of you to do very well....

Words: 269 - Pages: 2

Free Essay

Website Planner

...Website Planning Worksheet n o This worksheet can help you to lay a solid foundation for your web sit e. It will help define your goals along with setting  a o o r t p r guidelines to make sure your website is complete and useful for your  visitors. If you don't know an answer or feel like it  e k m s r o w l a t e doesn't apply to you, then simply leave it blank. If you have any quest ions; please call and I'll be happy to help you      Name     Address       r City State   Zip Code                                                Business Phone               n   Home Phone  Cell Phone                 Description of your business c o s (One Paragraph)   e [Type a quote from the document o or the summa ary of an inte eresting point. You can  t   position t the text box a anywhere in the document t t. Use the Dra awing Tools t tab to change the  e formattin ng of the pull quote text bo ox.]      Description of services c e , (Separated by commas) Example: Pizza, Restaurant, Take Out, Salads,  Italian, Entrees, Pasta,  a m p s e         [Type a quote from the u e document o or the summa ary of an interesting point. You can  t anywhere in the document t. Use the Dra awing Tools tab to change  e position the text box a the forma atting of the p pull quote tex xt box.]  1      What is your "Motto· or ·Slogan"?       Do you want people to: ☐ Learn more about your business or organization?  ☐ Hire you to perform a service?  ☐ Buy products from you...

Words: 1820 - Pages: 8

Free Essay

Mineral Lab Worksheet

...Part 1: Recording Observations In the following chart, record your observations of each test for the seven minerals. After you have completed all tests, name the minerals in Part 2 of this worksheet. An example of how to fill out the chart is illustrated follows. Recorded Observations for Minerals 1-7 Tests Example Mineral 1 Mineral 2 Mineral 3 Mineral 4 Mineral 5 Mineral 6 Mineral 7 Color White Gold Green White Pink White White Black Streak White Black White White White White White Brown Luster Shiny Shiny Specks Shiny Specks Shiny Dull Shiny Shiny Shiny Specks Specific Gravity 3.18 5.1 2.8 2.7 2.6 2.65 2.4 2.2 Cleavage & Fracture Cleavage Fracture Fracture Cleavage Fracture Fracture Cleavage Fracture Hardness 4 3.1-5.4 1-2.9 1-2.9 3.1-5.4 6.1-10 1-2.9 1-2.9 Acid No Reaction No Reaction No Reaction Active bubbling and Fizz No reaction No reaction No Reaction Light bubbling and fizz Part 2: Naming the Minerals Name the minerals in the following table. Then, insert a percentage of how certain you are in your identification. Finally, explain your percentage of certainty: What was confusing about this mineral? What other minerals do you think it could be? Remember, the minerals include seven of the following: borax, calcite, corundum, graphite, gypsum, orthoclase feldspar, pyrite, quartz, talc, and topaz. Identification of Mineral Percent Certain Explanation of Certainty Example: Fluorite 80% certain I am almost certain this mineral is fluorite, but I am...

Words: 1502 - Pages: 7

Premium Essay

Lab 1 Worksheet

...CIS333 Lab 1 Assessment Worksheet 1. Name five Applications and tools preloaded on the TargetWindows01 server desktop, and identify whether that application starts asa service on the system or must be run manually. 1. Wireshark must be run manually. 2. Netwitness Investigator must be run manually. 3. Nessus starts as a service. 4. Firezilla starts as a service. 5. Zenmap GUI must be run manually. 2. The allocated source IP host address for the TargetWindows01 server is 172.30.0.8. The allocated source IP host address for the LAN Switch 1 server is 172.16.8.5. The allocated source IP host address for the LAN Switch 2 server is 172.16.20.5. The allocated source IP host address for the IP default gateway router is 172.30.0.1. 3. The targeted IP hosts did respond to the ICMP echo-request packet with an ICMP echo-reply packet when I intiated the ping command and four packets were sent back to the IP source. 4. The command line syntax for running an Intense Scan with Zenmap on a target subnet of 172.30.0.0/24 is nmap-t4-A-v-PE-PS22,25,80-PA21,23,80,3389 172.30.0.0/24. 5. Five different scans that may be performed from the Zenmap GUI are Ping scan, a basic info and host availability and mac address, Intense Scan, Quick Scan, Regular Scan, and Slow Comprehensive Scan. 6. There were thirty six different tests or scripts that the Intense Scan performed. 7. Nmap Output shows Raw Nmap Outdata Ports/Hosts shows IP Hosts and open ports Topology...

Words: 340 - Pages: 2

Premium Essay

Lab 4 Worksheet

...Lab 4 worksheet WORKING WITH WORKGROUPS, USERS AND GROUPS |EXERCISE 4.1 |JOINING A WORKGROUP | |OVERVIEW |In Exercise 4.1, you configure your workstation as a member of a workgroup, so that you can use all of | | |the Windows 7 tools for creating local users and groups. | |Completion time |10 minutes | 8. Take a screen shot showing the Welcome message by pressing Alt+ Prt Scr, and then paste the resulting image into the Lab04_worksheet file in the page provided by pressing Ctrl + V. [pic] |Exercise 4.2 |Creating Local Users and Groups | |Overview |The new hires in the Accounting department at Contoso, Ltd. need local user accounts for their | | |workgroup computers-not only for themselves, but also for other department workers who need access to | | |their data. In Exercise 4.2, you create a new local user account for the director of the accounting | | |department, Jay Adams, using the Windows 7 User Accounts control...

Words: 587 - Pages: 3

Premium Essay

Lab #4 – Assessment Worksheet

...Lab #4 – Assessment Worksheet Using Ethical Hacking Techniques to Exploit a Vulnerable Workstation IS4650 Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you performed all five phases of ethical hacking: reconnaissance (using Zenmap GUI for Nmap), scanning (using OpenVAS), enumeration (exploring the vulnerabilities identified by OpenVAS), compromise (attack and exploit the known vulnerabilities) using the Metasploit Framework application), and conducted post-attack activities by recommending specific countermeasures for remediating the vulnerabilities and eliminating the possible exploits. Lab Assessment Questions & Answers 1. What are the five steps of ethical hacking? reconnaissance, scanning,enumeration, compromise, post-attack activities: recommended countermeasures for remediation. 2. During the reconnaissance step of the attack, what open ports were discovered by Zenmap? What services were running on those ports? There were several Ports, I will list onl a few POrts, 21,3306,22,53,445,111,25, all running TCP: the services running were Linux telneted, smtp Postfix, Apache Tomcat/Coyote JSP 3. What step in the hacking attack process uses Zenmap? Reconnaissance ...

Words: 285 - Pages: 2

Premium Essay

Lab 2 Assessment Worksheet

...IS3340-WINDOWS SECURITY | Lab #2 | Assessment Worksheet | | [Type the author name] | 4/3/2014 | | 1. What is the Principle of Least Privilege? Providing only the necessary access required to carry out a task. 2. What does DACL stands for and what does it mean? Discretionary Access Control List is the list of access control rules (ACL’s). 3. Why would you add permissions to a group instead of the individual? Management of the permissions (add/remove) is easier to do from the Group Level, other than Individual User and is quicker. 4. Why would you allow shared access to groups instead of to everyone? By allowing access by Groups it is easier to manage – all users have to be part of a Group in order to be created. 5. List at least 3 different types of access control permissions you can enable for a file. Read, (permits viewing or accessing of the file's contents) Write (permits adding to the file) Modify (permits reading and writing of the file and allows deletion of the file) 6. Which access control permissions allow you to delete files and/or folders? Modify is the access control permission allowing the user to delete files and/or folders. 7. What is the lowest level permission needed in order to view the contents of a folder? Read 8. If you don’t remember the syntax when using iCacls.exe what command do you type in to see the options? icacls.exe (the command with no arguments) 9. What other tool could...

Words: 331 - Pages: 2

Premium Essay

Lab #2 – Assessment Worksheet

...Lab #2 – Assessment Worksheet IEE 802.3 CSMA/CD & Ethernet II Networking 1. Using the Wireshark Protocol Analyzer how was you able to isolate and inspect IP and CDP packets for further analysis? Navigating to the Analyze menu interface, selecting the “Disable All” button at the bottom of the window, in the “Protocol” window scroll to “IP” and select it the same steps apply to CDP. 2. In what section of the Wireshark Protocol Analyzer interface is the details of a capture packet frame displayed? On the Frame Analysis Window 3. Draw an IEEE 802.3 frame Showing segments and bytes assigned to each segment? 4. What are the main speeds of Ethernet? 10 mbps 100 mbps (fast Ethernet) 1000 mbps (gigabit Ethernet) 10000 mbps (ten gigabit Ethernet) 5. What is the Maximum size allocated for information in an IEEE 802.3 Ethernet Frame? Maximum length Ethernet II frames (1518 bytes, with a payload of 1500 bytes) 6. What is the main difference in the layout of IEEE.802.3and Ethernet II frame? IEEE 802.3 decided to include the Type of both source and destination in the 802.2 LLC header. So they replaced the Type field (bytes 13-14) with a Length field. The length" is not the full frame size - rather, it is the 802.2 packet length - the number of bytes of the 802.2 (LLC and data) portion of the frame, excluding padding. 7. What is the maximum number of bytes assigned to the “source address” segment of an IEEE.802.3? Ethernet and IEEE 802.3 specify similar technologies...

Words: 485 - Pages: 2

Premium Essay

Lab 2 Assesment Worksheet

...Lab 2 Assessment Worksheet 1. A. Denial of Service attack on organization’s email server Medium Risk B. Fire destroys primary data center High Risk C. Loss of Production Data High Risk 2. For the above identified threats and vulnerabilities, which of the following COBIT P09 Risk Management control objectives are effective? 3. A. Denial of Service attack on organization’s email server Threat to Availability B. Fire Destroys Data Center Threat to Integrity and Availability C. Loss of Production Data Threat to Integrity and Availability 4. Effectiveness, Efficiency, Compliance, and Reliability secondary. 5. A. Denial of Service Information- Information would not be able to be accessed to end users from outside the primary server control. By adding firewalls and limiting access to certain IPs, the risk can be lessened. Applications- Deny access to necessary applications needed by the organization. Can be mitigated as stated above by firewall procedures to limit IPs. Infrastructure- Access from remote terminals will be very limited. Firewalls should be installed to help limit which IPs have access. People- Will have limited access to the organization’s server. Contact their local IT manager to give them access to the server by allowing their IP through. B. Fire Destroys Data Center Information- Information will be destroyed by the fire. Back up data to an offsite server/hard drive to have a fall back plan. Applications- Applications will be...

Words: 515 - Pages: 3

Free Essay

Is3230 Lab 6 Assessment Worksheet

...Lab 6 Assessment Worksheet 1. What are the available password policy options that could be enforced to improve security in a group policy object? * Enforce password history, Maximum password age, Minimum password age, Minimum password length, and Passwords must meet complexity requirements 2. How would you set security permission and user access rights on a home computer using windows XP professional or similar that is not a member of the domain? * When a Windows PC is not a member of the domain, the ONLY user accounts it will trust are those it finds in its local security database. 3. Why is the use of the different password policy options available and why is it important to implement complexity and length requirements? * A password policy sets certain standards for passwords, such as the password complexity and the rules for changing passwords. A password policy minimizes the inherent risk of using passwords by ensuring that they meet adequate complexity standards to thwart brute force attacks and they are changed frequently enough to mitigate the risk of someone revealing or discovering a password. 4. Microsoft defines user rights in two types of categories: logon rights and privileges. Explain the difference of the two from an access control perspective? *  Logon rights control who is authorized to log on to a computer and how they can log on. Privileges control access to system-wide resources on a computer and can override the permissions...

Words: 733 - Pages: 3

Premium Essay

Lab 7 Assessment Worksheet

...1. How should you apply the settings the first time you try working with SCW? Lock it down as much as possible (all services not being used). 2. Why or why is it not a good option to implement this configuration from a remote location? Not a good idea because a hacker could be getting the data being transferred or accessed. 3. What are other ports that are normally block when using the SCW process? Identify the port number and the service or application it supports? 80-HTTP, 123-NTP, 135-RPC endpoint mapper/DCOM, 139-NetBIOS, 443-HTTPS, 445-SMB, 3389-Remote Desktop Protocol. 4. How can you run SCW in multiple servers? Systems Management Server (SMS) with Service Pack 1 (SP1) & unattended installation 5. Would the same policy work for all the servers in the domain? Yes 6. In what Operating Systems can you use SCW? SCW is not used with Windows XP or other client operating systems or Microsoft Windows Small Business Server 2003. 7. What is the best practice to disable Windows XP services? By using the Control Panel > Administrative tools > Services shortcut > Stopping Windows services” 8. What is a best practice regarding disabling or enabling a Windows XP Firewall rules? * Use Security Configuration Wizard to configure Windows Firewall. * Use Group Policy to manage Windows Firewall. * Do not configure Windows Firewall settings on a computer-by-computer basis. * Do not configure per-connection settings...

Words: 341 - Pages: 2

Premium Essay

Netw202 Wk4 Lab Worksheet

...1. /20 11111111.00000000.00000000.00000000 11111111.11111111.11110000.00000000 2. /20 255.255.240.0 base2 | 2^7 | 2^6 | 2^5 | 2^4 | 2^3 | 2^2 | 2^1 | 2^0 |   | Decimal | 128 | 64 | 32 | 16 | 8 | 4 | 2 | 1 | Binary | 255 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 |   | 255 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 |   | 240 | 1 | 1 | 1 | 1 | 0 | 0 | 0 | 0 |   | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |   | 3. /20 12 bits in host portion. (2n-2) 212-2=4094 4. /21 11111111.00000000.00000000.00000000 11111111.11111111.11111000.00000000 255.255.248.0 base2 | 2^7 | 2^6 | 2^5 | 2^4 | 2^3 | 2^2 | 2^1 | 2^0 |   | decimal | 128 | 64 | 32 | 16 | 8 | 4 | 2 | 1 | Binary | 255 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 |   | 255 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 |   | 248 | 1 | 1 | 1 | 1 | 1 | 0 | 0 | 0 |   | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |   | 11 bits in host portion. (2n-2) 211-2=2046 5. /22 11111111.00000000.00000000.00000000 11111111.11111111.11111100.00000000 255.255.252.0 base2 | 2^7 | 2^6 | 2^5 | 2^4 | 2^3 | 2^2 | 2^1 | 2^0 |   | decimal | 128 | 64 | 32 | 16 | 8 | 4 | 2 | 1 | Binary | 255 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 |   | 255 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 |   | 252 | 1 | 1 | 1 | 1 | 1 | 1 | 0 | 0 |   | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |   | 10 bits in host portion. (2n-2) 210-2=1022 6. /23 11111111.00000000.00000000.00000000 11111111.11111111.11111110.00000000 255.255.254.0 base2 | 2^7 | 2^6 | 2^5 | 2^4 | 2^3 | 2^2 | 2^1 |...

Words: 1815 - Pages: 8

Free Essay

Lab 4 Assessment Worksheet

...1. What is one Thing that a virus, a worm, spyware, and malicious code have in common? What are the differences among these four threats: They are all created to create a threat to the security of you system. A virus – A small program designed to infect your computer and cause errors, computer crashes, and even destroy your computer hardware A worm – Software applications designed to spread via computer networks Spyware – Tracking software that hides itself (runs in the background) and gathers information without the computer owner's or user's knowledge or permission for the benefit of someone else. Malicious code – Malware short for "Malicious" software is designed to infiltrate or damage a computer system without the owner's informed consent. 2. How often should you update your anti-virus protection? Must be updated regularly to stay effective against new viruses, and most anti-virus software is designed to update automatically, but you can also update your software manually. 3. Why is it a best practice to have and to carry an antivirus boot-up disc or CD? So that there is not a chance of anti-virus program to have issues (with virus, malware, etc.). Installed on the workstation already there could be virus’s already in there. 4. What other anti-malicious software and anti-malicious code applications are included with Avira under the Real-Time Shields application? What risk and threats do these help mitigate? Real-Time Shield (with Avira) shields...

Words: 992 - Pages: 4