... This paper concentrates on the book Strength Finder 2.0 and within this book they provide you with an assessment test that targets you’re top five strengths. The book gives a description of each strength, and provides a scenario to clarify its meaning. The importance of this assessment will help you distinguish your top strengths and what you can do to apply in the work place. I will share with you my top five strengths, its description, my thoughts, and how I can use those strengths to better my future as a leader. My first strength is achiever, which did not surprise me because I am hard working, and when I set my eyes on a goal I try my hardest until that goal is reached. The achiever theme explains my drive, I have a constant need for achievement. By the end of the day I must always achieve something in order to feel good about myself, and when I do not achieve anything I feel dissatisfied with myself. This strength strongly describes who I am, and no matter what I am doing I feel that this strength applies to any activity that I am doing. I feel that my previous job is a perfect example of my achiever theme. I was a dishwasher/line cook at a restaurant called Sunset Grille and I started working there when I was 21. I started out as dishwasher only making minimum wage, which felt degrading to me, but a job is a job I told myself, and at least I was making money. I did, however strived to make more money; I asked my boss how I could do that...
Words: 1922 - Pages: 8
...Section I: Based on the information provided, we thought it would be best to first look at the provided software and instructions from the assignment. We decided to use the program that was given to us which was Rainbowcrack. The reason behind this being that none of us has had a large amount of experience cracking passwords and there seemed to be a lot of literature on how to use Rainbowcrack online. Dually, to be noted is that we were informed that salting was used on the passwords in order to make cracking them even more difficult. ----(Insert Addition or changes if necessary) Section II: The first thing we did was downloaded and extracted Rainbowcrack on to our respective machines. From there, after reading the documentation that was provided by rainbow crack (readme.txt), we learned that there wasn’t a set install that came provided, instead you click the specific .exe file to use that particular tool. After trial and error we decided that it would be easiest to use the rcrack_gui.exe in order to...
Words: 1415 - Pages: 6
...to the 10.20.111.0/24) - all incoming connection requests should be rejected with the following exceptions. iptables –A INPUT –s 10.10.111.0/24 –d 10.20.111.0/24 –j REJECT -m state --state NEW,ESTABLISHED,RELATED. iptables –A FORWARD –s 10.10.111.0/24 –d 10.20.111.0/24 –j REJECT -m state --state NEW,ESTABLISHED,RELATED. 1)The internal machine should respond to a ping from 10.10.111.0/24 We use following iptables commands:- iptables –I FORWARD 1 –s 10.10.111.0/24 –d 10.20.111.2 –j ACCEPT –p icmp --icmp-type echo-request –m state --state NEW,ESTABLISHED,RELATED =>The following outputs shows the implementation of rules on the int-rtr and the rule is listed using iptables –L =>We verify the rule by pinging the IP address 10.20.111.2 from the backtrack machine =>Thus we can ensure that the iptables rule is correct, as indicated by the above output. 2) The internal machine (10.20.111.2) should accept all incoming SSH and http requests from 10.10.111.0/24 We use following iptables commands:- iptables –I FORWARD 1 –s 10.20.111.0/24 –d 10.10.111.2 –j ACCEPT –p tcp –m state –state NEW ,ESTABLISHED,RELATED --dport ssh iptables –I FORWARD 1 –s 10.20.111.0/24 –d 10.10.111.2 –j ACCEPT –p tcp –m state –state NEW ,ESTABLISHED,RELATED --dport http =>The rule is listed as follows: =>Thus as the rule mentions the internal machine receives SSH and http requests from 10.10.111.0/24 =>The following screenshot determines that http request was received to the internal machine...
Words: 1021 - Pages: 5
...Administering a wireless network can be very troublesome for anyone involved, but with technology like controller based wireless systems, this task can be made easier to configure. Wireless networks are used to connect computers, devices such as smart phones and tablet wirelessly by relaying data traffic through access points (AP), with little used of wired infrastructure. A few AP can be suitable for a small setting such a two story building, but in large enterprises such as a campus, far more APs would be required. This type of setting would require the wireless technician to configure each AP which can span from more than 100. Luckily Wireless controllers were introduced to help alleviate what would seem like a long tiring process by being the centralised device that helps to manage the deployment of large scale wireless networks and access points. First, wireless controllers provide centralised authentication, load balancing fail over and high security. By eliminating the whole idea of MAC address table and constant update for every single access point on the network, this meant that once an access point has been added to the wireless controller it will be automatically configured to the specifications of the network. Additionally, wireless based controllers offers load balancing by automatically directing traffic away from an access point with high traffic to one with less traffic. The controllers also perform failover capabilities by choosing another neighbouring access...
Words: 705 - Pages: 3
...ITT Technical Institute Springfield, MO Unit1 Activity1 Tom McKellips NT1310 Bryan Thurlkill September 26, 2013 Voice vs. Data * Cell Phones – Since a cell phone is considered a two way radio, which transmits the digital signal via radio waves-invisible light waves-that move through the air. Cell phones can be seen as both voice and data, depending on what type of cell you have. * Landline Phones – A simple phone that has to be plug into a jack, which is mostly used in business and in a few homes now days. The signal travels through the wires to a switch than to its destination. A landline phone sends a voice signal across the network. * SMS / Text Messaging - text messaging has become a very popular mode of communication. Short Message Service (SMS) is a communication protocol allowing the interchange of short text messages between mobile devices. SMS messages are presently transmitted over signaling channels of a voice network, such as over SS7 channels. * Fax Machines – Fax machines sends data through networks which is a lot faster than using regular mail. A fax machine takes a copy of a document than sends it through a transmission line to another fax which than prints out an exact copy of that same document. This transmission is sent through a data network. * Pagers - Pagers were the most popular wireless communications devices for several reasons: They are very easy to use, their batteries last several weeks, and they are light enough...
Words: 534 - Pages: 3
...Methods We conducted a systematic review of literature published between 2007, the time at which the last WHO review was conducted, to June 2015 (specific search period: January 1, 2007-June 30, 2015). Our aim was to determine the current state of HIV prevention and care and treatment programmes globally using available literature. Our search included peer-reviewed (Medline, PsycInfo, Sociological Abstracts), internet, and grey literature databases. Additional requests for literature were made to UN agencies (see Tables 1 and 2 for specific search strategy). A total of 430 abstracts were initially identified and entered into an Endnote library. All abstracts in English were reviewed. Studies were excluded if they were: (1) not in English; (2) published prior to 2007; (3) not focused on prison populations; (4) focused primarily on post-release; or (5) not focused on HIV. Papers were also excluded if they did not contain clear sampling methods and/or study details. After initial review, 295 abstracts were deemed not applicable due to duplication, falling outside inclusion criteria, and/or being irrelevant to the review. Full text articles for the remaining 135 abstracts were collected and reviewed. After full text review, 50 articles were retained for data extraction. Results are presented below by thematic areas. HIV...
Words: 1391 - Pages: 6
...August 29, 2014-ENTRY 1: ME, A WRITER Attitude : My attitude toward completing this course is excitement, but at the same time nerve-wrecking. I am excited to finally learn about a subject that I am interested in. Although, the nerve-wrecking part, because I am an average student. I tend not to do well in certain subjects. However, I believe that this course, will help me overcome difficult obstacles. Inventory : I have learned as a writer working through the inventory exercise, that I need to improve my grammar and reading skills. I have learned as a writer working through the inventory exercise that I have a difficult time understanding the context. I realized that my comprehension skills are not at par of my education level. I do understand that I...
Words: 911 - Pages: 4
...Assignment 1 Task 1 In this assignment I have been asked to describe in report format the various platforms for video in interactive media such as Worldwide web, email attachments, DVD; CD ROM; Kiosks, presentations. Also I will discuss how video is used on all the platforms mentioned above. Worldwide web Worldwide web can be used for many different things such as short films, for example on websites such as YouTube and Facebook. Promotional material can also be used, for example on search engines it will base your previous searches to then see what products you may be interested in and market it towards you on some online shopping websites or just on Facebook or YouTube advertisements. Film trailers will we also on movie sites for trailers such as imdb.com which allow you to search and look for rating of movies which you may wish to watch in the future. User generated content is also uploaded to the world wide web on websites such as social media sites and also sites like YouTube where people record short videos from there mobile device and then...
Words: 3533 - Pages: 15
...Question 3 Part A: A variable power supply converts alternating current that is not regulated, into a constant direct current with the aid of a rectifier. Its main function is to supply a steady voltage to other components such as a device or circuits that are normally operated within specific power supply ranges. An AC ammeter is a device that has two terminals, has no resistance to flow and is polarized. Usually, an ammeter is connected in series with components of a circuit as it measures the sign and magnitude of AC current passing through the component. In order for this to work the circuit must be open to connect the ammeter. A CRO (cathode ray oscilloscope) is an instrument that allows you to observe voltages that are always varying as a plot. Its main function is to observe the change of electrical signals over a period of time. This change is displayed as a shape. The waveform being displayed notifies you about characteristics such as frequency, amplitude distortion and rise time. The lateral search coil is used to measure flux density as well as field strength in the solenoid. This reading is then sent to the oscilloscope so the waveform can be analyzed. The slinky spring serves as a mean of producing the electromagnetic field due to current flowing through it. PART B: Connect the variable power supply to the ammeter as well as the slinky spring. The lateral search coil should be connected to the oscilloscope Place the slotted base that holds the wooden...
Words: 1027 - Pages: 5
...EXPLORING ENGINEERING ASSIGNMENT 2 NXT SENSORS 1. LEGO LIGHT SENSOR:- Lego Light sensor is one of the sensors that give the robot vision. The Light sensor enables our robot to distinguish between light and dark. It can read the light intensity of colored surfaces. Lego light sensor is also well behaved as such sensors go but the physics of sensing light levels is much more complicated so is the task of interpreting the values returned by light sensors. The light sensor is a passive devices that convert this light energy whether visible or in the infra-red parts of the spectrum into an electrical signal output. Light sensors are more commonly known as “Photoelectric Devices” or “Photo Sensors” because it converts Light energy (photons) into Electricity (electrons). With the help of screwdriver one can adjust the sensitivity of sensor. The light sensor measures how much light is shining on it. It has two modes: “LIGHT” and “DARK”. In “light” mode, the more light shines on the sensor, the higher the signal it sends out. In “dark” mode, it’s just the opposite- the signal increases the darker it gets....
Words: 702 - Pages: 3
...LAB TEST – 1 INTERNET SECURITY 100018595 Date: 08/08/2016 Question 1 Solution: Honeypot is nothing but a mechanism used to enhance the security of computer systems from various illegitimate attackers. Here, in case of a server in use, a server is used as a honeypot, that portrays the same functionalities of the actual main server. The attacker believes this server to be the actual server and tries attacking the server. Any such unusual behaviour is recognised and the attacker is blocked from accessing the server. Thus, the security of the network and the systems involved in it, are significantly enhanced with the aid of honeypots. Question 2 Solution: Blackholing is caused as a result of dropping packets in a...
Words: 1937 - Pages: 8
...education services that will be provided as well as any related services, such as SLP, OT, or PT, services that will be needed by Hayden. This section also contains information regarding supplementary aids or services that may be needed. The IEP must also contain information regarding, if any, and to what extent Hayden will not participate with his general education peers in the regular classroom. The IEP must also address any accommodations or modifications that may need to be put in place in order to meet Hayden’s individual needs. An example of an accommodation would be that the student will be able to take any classroom, district, or state assessment in a separate, quiet, individual setting. Modifications can include shortening assignments or modifying a classroom assessment. An IEP must also contain information regarding when special education services begin as well as the anticipated frequency, location, and duration of each provided special education service (Turnbull, Turnbull, & Wehmeyer, 2010). The last component of an IEP is the transition plan. This plan is put in place when the student turns 16 and contains measurable postsecondary goals and states the transition services needed to meet the student’s postsecondary goals. Members of an IEP team include, a general education teacher, special education teacher, school administrator, school psychologist, parent, and any other individuals how may interact with the student or provide related services such as speech...
Words: 683 - Pages: 3
...Assignment 1 Task 1 Dominic Keenan Part 1 Interactive media is now on lots of platforms such as the world wide web, email attachments, Dvds, cds, kiosks, Presentations, mobile devices these all can play media such as graphics or sounds or both together as a video. In this task I will be discussing how video is used on each of these platforms and what makes them useful and more efficient. World Wide Web The world wide web is full of interactive media and can play media on a certain website such as YouTube or any other video streaming website. It also uses short films such as a film trailer on a certain website such as imdb or the local cinema in your area may have a trailer up on its website to give the public a brief of what the film might be these are found on...
Words: 3437 - Pages: 14
...1) In your own words, define the term stakeholder The term stakeholder can be defined as any person, social group, or organization that has an interest or concern in an organization. Each stakeholder can be affected by the business’ actions. Primary examples of stakeholders include owners and employees (internal stakeholders), as well as the community, customers, suppliers, media, etc (external stakeholders). 2) In the 3rd section of the ATOM Flash module, identified alternatives, provide what you think would be the impact of each alternative for the 3 stakeholders. Stakeholders - ATOM, client, young people For the first alternative, “tell the client you're not interested”, ATOM Communication Agency would, obviously, lose a valuable customer. At the same time, however, they would gain a positive recognition for being against underage drinking, an illegal and unethical behaviour. In the future, this would be advantageous in attracting other clients that are more favourable to ATOM, such as those who hope to create anti-drinking campaigns. Young people would be also impacted, since less exposure to negative campaigns can be translated to better health and a more positive community in the long run....
Words: 478 - Pages: 2
...movies all weekend, buy a sturdy model with high capacity so you can charge your smartphone once or eight to ten. You can also a good friend a favor! Buy Power Bank, five important tips Smartphones such as the Apple iPhone and Samsung Galaxy are very effective handhelds. You can move a lot involved. The downside is that they consume a lot of energy. This allows the battery charge is one day or less it. Many people therefore choose to to carry a external battery, so they move to recharge a smartphone. Capacity versus 1 portability The main specification of a power bank capacity this is indicated in milliampere hours. (MAh). The greater the capacity, the more you can recharge your smartphone or tablet. But a greater capacity also means a higher weight and a higher price. In addition, power bank with high capacity also a lot bigger. 2 Charging current from your smartphone or tablet Most small models banking for smartphones give a maximum charging current of 1 Ampere (1A). This is enough for almost everyone, but some will find that the charging time is longer charging via the mains adapter. The loading time of your smartphone or tablet depends on the charging current. There are more and more smart phones that can handle a higher maximum charging current, can handle of 1.5 to 2 amperes. With a bank that can provide this power, charge your smartphone as fast as with an adapter. To purchase a bank after which the maximum charging current of your smartphone or tablet. This way you...
Words: 1631 - Pages: 7