Premium Essay

Nt1310 Unit 6 Written Assignment

Submitted By
Words 428
Pages 2
Unit 6: Written Assignment

Question 1. Read the following historical article about the development of nuclear energy: http://www.world-nuclear.org/info/inf54.html
Read multiple time.

Question 2. As you read, take notes on the article using one of the note taking strategies presented in this unit.
Note taken

Question 3. Explain which strategy you are using and why you are using it.
Answer:
The strategy I used is the MIND MAPS, it is also called the mind mapping, concept mapping, spray diagrams, or spider diagrams. This strategy is very good in summering larger unorganized information, and also helps in making connections when dealing with scientific or creative problems. This strategy is very effective in thinking through complex and very difficult problems, it helps to consolidate large information and give them directions. Having pages of information without knowing how they fit together is where MIND MAPS work best, “by using mind maps one can quickly understand the structure of a subject,” ( Mind Maps, n.d, p. 5).
This strategy was made popular by Tony Buzan, and sometimes looks like a work of art. …show more content…
This Nuclear energy history is made of 12 major subdivisions and over 70 individual facts and ideas, with almost all the different ideas and individual facts pointing towards different independent conclusions. These subdivisions and ideas are not fitted together, and has different conclusions, so in order to put this kind of mass information together only Mind map helped me. I tried other strategies like Cornell strategies, but

Similar Documents

Premium Essay

Test

...ITT Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110...

Words: 2305 - Pages: 10

Premium Essay

Fsmo Role Ayer Nate Method

...Sole's Blog SOLVE YOUR IT PROBLEMS FASTER, SAVE YOUR FEET AND GET MORE TIME ON YOUTUBE! * HOME * * ABOUT SOLE VIKTOR * * USEFULL LINKS « How to publish a website with both Anonymous and Forms Based Authentication in ISA 2006 How to configure ISA 2006 with FBA for OWA and NTLM for Outlook Anywhere and Autodiscover in Exchange 2007 » How to place FSMO and Global Catalog roles in Active Directory During installation of Active Directory on a Windows Server 2000/2003/2008 all FSMO roles will automatically be installed on the first server. But Best Practice dictates to move some of theese Flexible Single Master of Operation (FSMO) roles to seperate servers. If you only have one domain controller (not recommended), there is nothing to do since all roles must be on this server, but if you have multiple servers you should move some of theese roles on to more servers. It is also important to be aware of what servers are Global Catalog servers, especially if you have more than one domain and even if only one domain, they will be prefered by applications like Exchange server. It is recommended to place the forest roles on one Domain Controller (DC) and the domain roles on another server. If not all Domain Controllers are Global Catalog servers, it is also important to place the infrastructure master on a server that is NOT a Global Catalog server. Recommended Best Practice setup of FSMO roles. Domain Controller #1 Place the two forest roles on this server. * Schema Master...

Words: 10360 - Pages: 42