...A - Assigned tasks My position required me to focus on various tasks to support the team. However, on a daily basis, my assignments were not repetitive at all. A few tasks I did had to be done every months or quarters. Below is a list of the main requests I had to fulfil, from the most frequent to the least frequent. - The cornerstone of my internship was to manage an Excel database with more than 5000 lines and 700 columns. This database included all the historical and current information the team could ever need about all of our clients in the UK, Africa, Middle East, central Europe and eastern Europe. For instance, it included data such as the contract terms, the subscriber numbers, the revenue in the contract currency and US dollars for each client. I had to keep it updated to reflect the correct contract terms, the latest subscriber numbers and revenue figures, and add the new clients and remove the ones terminating their contracts. As well, it had to be restated to different monthly FX rates and clearly show our forecasts per month, quarter, and year. This database was frequently...
Words: 2169 - Pages: 9
...Week 6 Assignment Andrew Johnson Upper Iowa University Chapter 12 1. Use the DBMS in Fig. P12.1 to determine the types of operations that would take place in the database for the following transactions: a. For this operation, there is only one statement present, and since it is only referencing one remote database. It will therefore only require the use of remote requests operations. b. For this operation, there again is only one statement present, and since it is only referencing one remote database. It will also only require the use of remote requests operations. c. For this operation, there is only one statement present, but since it is utilizing two different remote databases (one in Site A and one in Site C). Therefore, it will require the use of distributed requests operation. d....
Words: 970 - Pages: 4
...Unit 7 I interviewed my grandparents for this unit’s assignment. My grandma Marcia is seventy four years of age, and my Papa Ralph is Seventy one years of age. I would consider them to be pretty hip with the times in regards to technology. I have volunteered at an assisted living unit in the past and it is amazing to see adults of the same age as my grandparents who either do not use internet, do not know how, or do not want to learn. My grandparents have always tried to keep up with the times and learn as much as possible. They have asked my cousins and I in the past to help them learn how to use certain technologies. I taught my grandma how to text and now that is one of her main forms of communicating. My cousin taught them how to set up everything on their computer and how to use their iPod. One of their favorite technologies is the iPad. The websites that they visit the most are the Harkins theatres website, the Walgreens app, and Facebook. It...
Words: 975 - Pages: 4
...This week’s lab dealt with the application of encryption and hashing algorithms to a test file on the Linux operating system. I chose this lab over the other lab option because I find this topic of particular interest and something that I can apply in my day to day duties at my current employer. I also enjoy working with the Linux operating system because I have always found it to be more challenging than Windows which I deal with daily. I had no trouble launching the virtual environment and accessing the Linux virtual machine. The lab used a text editing program called gedit which I am also familiar with and is similar to the notepad application sound withing Windows. The gedit application is launched by using the terminal window within the operating system which is a command line tool. All of the steps in the lab are completed by executing commands in a terminal window and I was able to perform them without any issues except for a couple minor typing errors. By entering commands into the terminal, the user is able to call other programs in the operating system and perform a variety of tasks. After the test file was created using the gedit command, I was able to create a hash using the md5sum command. This generated a unique string that can be used to verify the integrity of the file. After adding additional text to the same test file later in the lab, the hash value was regenerated and it was indeed different than the first generated hash. This has many benefits, but is commonly...
Words: 536 - Pages: 3
...Assignment Description: For the unit 2 assignment, I needed to develop a critical path method (CPM) for the design phase of the ABC Video Rental store project. It was suggested that we use table 6-6 from The New Software Engineering by Sue Conger (2008, p. 167) as a guideline for the development of the CPM. Table 6-6 outlines the functional requirements for the program and what different software options, existing or available for development of the application, would be able to meet those requirements. A table that I found more useful for the assignment goals was Table 6-16 which outlined and defined design phase tasks along with an estimated function point value for each task (Conger, 2008, p. 188). After displaying my CPM for the ABC project design phase I will outline the critical path, the various tasks that fit the dependencies from table 6-6, how the various tasks might be distributed between a two-person team of a project manager and software...
Words: 761 - Pages: 4
...desired Abstract—In an internet distributed system the need for the best client-server assignment is a necessity in order to enhance the performance of such a system. Two major factors appear which are the total communication load in the network and the load balance in each server. But the enhancement should be effective from the time complexity point of view. The proposed algorithms for the optimal assignment of clients and servers was devoted either to enhance one of the main factors or both, or to enhance the time complexity. In this proposed algorithm we will...
Words: 2111 - Pages: 9
...Sole's Blog SOLVE YOUR IT PROBLEMS FASTER, SAVE YOUR FEET AND GET MORE TIME ON YOUTUBE! * HOME * * ABOUT SOLE VIKTOR * * USEFULL LINKS « How to publish a website with both Anonymous and Forms Based Authentication in ISA 2006 How to configure ISA 2006 with FBA for OWA and NTLM for Outlook Anywhere and Autodiscover in Exchange 2007 » How to place FSMO and Global Catalog roles in Active Directory During installation of Active Directory on a Windows Server 2000/2003/2008 all FSMO roles will automatically be installed on the first server. But Best Practice dictates to move some of theese Flexible Single Master of Operation (FSMO) roles to seperate servers. If you only have one domain controller (not recommended), there is nothing to do since all roles must be on this server, but if you have multiple servers you should move some of theese roles on to more servers. It is also important to be aware of what servers are Global Catalog servers, especially if you have more than one domain and even if only one domain, they will be prefered by applications like Exchange server. It is recommended to place the forest roles on one Domain Controller (DC) and the domain roles on another server. If not all Domain Controllers are Global Catalog servers, it is also important to place the infrastructure master on a server that is NOT a Global Catalog server. Recommended Best Practice setup of FSMO roles. Domain Controller #1 Place the two forest roles on this server. * Schema Master...
Words: 10360 - Pages: 42
...ITT Technical Institute 3825 West Cheyenne Avenue, Suite 600 North Las Vegas, Nevada 89032 NT1330 Client-Server networking II Name: ____________________________________________________ Date: _______________________ NT1330 Week 1 Unit 1 Assignment 1 Instructions: 1. Complete this assignment and submit it prior to the beginning of the next class meeting. 2. Completely fill in the bubble for the correct answer(s), any other mark such as an X or just a line through it will be marked as incorrect. True/False Indicate whether the statement is true or false. 1. IPv6 uses 128 bits, or 16 bytes, for addressing, thus providing 2128 (about 340 billion) unique addresses. A True B False 2. Dynamic IP addresses can be assigned when administering TCP/IP hosts. These addresses must be configured and maintained manually. A B True False 3. Using DHCP relay agents eliminates the need to have a DHCP server on every subnet. A True B False 4. One benefit of the hierarchical structure of DNS is that it is possible to have two hosts with the same host names that are in different locations in the hierarchy. A B True False 5. ICS turns your computer into a router so that other computers on the local network can access its Internet connection. A B True False 6. If you inappropriately allowed network discovery in a public network environment (for example, an Internet café), you would allow total strangers to see and access any file shares on your system. A B True...
Words: 1872 - Pages: 8
...Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas: Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA NT2580 NT2670 Introduction to Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to Security Auditing for Compliance Countermeasures Information Security Email and Web Services NT1230 NT1330 Client-Server Client-Server Networking I Networking II IS3230 IS3350 NT1230 NT1330 Issues Client-Server Client-Server SecurityContext in Legal Access Security Networking I Networking II NT1110 NT1210 Structure and Introduction to ComputerLogic Networking IS3120 IS3110 NT1210 Network Risk Management in Introduction to General Education / General Studies NT2580 NT2799 Communications Information Technology Introduction to Information Security NSANetworking Capstone Project IS4550 NT2640 Security Policies and Implementation IP NT2640 Networking IP Networking PT2520...
Words: 2305 - Pages: 10
...aspects of typical network server functions. Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course relates to other courses in the NSA program: 1 Date: 8/31/2012 Client-Server Networking I Syllabus NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420...
Words: 1834 - Pages: 8
...Adonis Chavis NT1330 Unit 6 Assignment 1 H.Borja Ad User Group Design To: Junior Admin Hello, I’ve received your email that asks to provide access to resources throughout your AD environment and a recommendation on some strategies that are best for that situation. First off, accessing one printer is easy, since you have a domain for each department, like Marketing for example. Once each group is created you will assign it to a domain local group, then global group, and lastly to a universal group. Then you will finally add it to the Marketing domain group. Next, with assistance from your HR, you will take all the users within the forest/network and add them to a global group then to a universal group. After that is done you will add the universal to the domain’s local group, but within their domain. This will give the users of those groups specified access to whatever is in that universal group, meaning you need to add/assign the proper printer for them to use so that they can print vacation request to the HR department. Lastly, for Research and Development, to allow access to only the one server, you have to create a domain local group with administrative rights of course. Next, add the users to a customized administrative group that you have control of. Assigning permissions and rights can be done as you are creating and assigning groups/users. Don’t forget to limit the access to only their local machine, as you required. You can do all of this through...
Words: 331 - Pages: 2
...NT1330 Unit 4 Assignment 1. AD Design Replication Scenario AD Design Replication Scenario To whom it may concern: I am the IT Administrator for the company and I have been asked to give my recommendations for the Active Directory Replication Design of the two new Branches. The first I can recommend for you is that all the information that is needed for each new site is correctly documented and added to the Root Active Directory through the Active Directory sites and services. This is done because the Root AD automatically builds the inter-site replication topology based on the information provided about the new site connections. Each new site’s AD will have one each domain controller that is known as the inter-site topology generator and they are assigned to build the topology at their sites. To add two new branch offices we will need to find a strategy to design a replication process. To implement this we will need to use inter-site replication. Inter-site replication is needed when adding domain controllers located in different sites. We will also need a site link (Site link is a logical, transitive connection between two sites that allows replication to occur) protocol of Remote Procedure Call (RPC) over Internet Protocol (IP) which is the preferred choice for the replication process. This allows you to communicate with network services on various computers and also keep data secure when being transmitted by using both encryption and authentication...
Words: 580 - Pages: 3
...explores network design and implementation by applying the TCP/IP protocols to provide connectivity and associated services. Planning and deployment of network addressing structures, as well as router and switch configurations, are also examined. IP Networking Syllabus Where Does This Course Belong? This course is required in the associate degree program in Network Systems Administration and associate degree in Mobile Communications Technology. The following diagrams indicate how this course relates to other courses in respective programs: Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1201 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming Technology Courses General Education/ General Studies 1 Date: 7/18/2011 IP Networking Syllabus Mobile Communications Technology MC2799 MCT Capstone Project NT2640 IP Networking MC2560 Mobile...
Words: 2573 - Pages: 11
...capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming...
Words: 4400 - Pages: 18
...capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming...
Words: 4400 - Pages: 18