Free Essay

Security Basics

In:

Submitted By jayej
Words 1033
Pages 5
Task 1: Procedure
1. Firewalls may be hardware devices or software programs. Examples of these types of firewalls and compare their features are noted below. NETGEAR ProSAFE N300 WiFi 8-Port Gigabit VPN Firewall FVS318N
Key Technologies:
• Securely connects up to 5 remote office or traveling users • True firewall using stateful packet inspection (SPI) and intrusion detection • Initiates up to 12 VPN tunnels simultaneously
• NAT routing and VPN pass-through for extra security • IPV4/IPV6 support • Application layer gateway support (SIP and FTP)
• Smart Wizard® connects to your ISP quickly and easily • Windows®, UNIX®, Macintosh® and Linux compatible • Integrated 8-port 10/100/1000 Gigabit Ethernet switch
• 5 SSL VPN connections • 64 VLAN support

Norton by Symantec Internet Security for Mac
Key Technologies:
• Online identity protection • Antivirus • Antispyware
• Browser protection • Antiphishing technology • Smart firewall
• Vulnerability protection • Daily protection updates • Email and Instant Message monitoring
• Location awareness • Confidential file guard • Free support 24x7

A firewall device is a protective system that provides a layer of protection between your computer network and the Internet. When used correctly a firewall prevents unauthorized use and access to your network. The firewall carefully analyzes data entering and exiting the network based on your

configuration. It ignores information that comes from unsecured, unknown or suspicious locations. A firewall plays an important role on any network as it provides a protective barrier against most forms of attack coming from the outside world.
Software firewalls are programs installed on your computer in which you can customize allowing you some control over certain functions and protection features. A software firewall will protect your computer from outside attempts to control or gain access your computer, and, depending on your choice of software firewall, it could also provide protection against the most common Trojan programs or e-mail worms. Additionally, software firewalls may also include privacy controls, web filtering and more. The downside to software firewalls is that they will only protect the computer they are installed on, not a network, so each computer will need to have a software firewall installed on it.
Task 2: Procedure
1. Which companies provide free and trial versions of their anti-virus software? Trial Version Free
Panda 
Norton 
McAfee 
AVG 
Kaspersky 

2. Viruses and other malicious code Infect a computer in one of several different ways, such as through downloaded Trojan horse programs, malicious email attachment, and drive-by-downloads. What does each of these terms mean and how do these types of infections take place?
• Trojan horse - A destructive program that masquerades as a benign application. Once they're installed, the program will infect other files throughout your system and potentially

wreak havoc on your computer. They can even send important information from your computer over the Internet to the hacker who sent the virus. The hacker can then essentially control your computer, slowing your system's activity or causing your machine to crash.
• Malicious email attachments - is any piece of email that was sent with the intention of disrupting your computer or network. Malicious email is commonly distributed by infected computers. When your computer is infected, the malicious script will scan your contacts list and automatically send itself to some or all of the people you exchange mail with.
• Drive-by-downloads - Downloads which a person authorized but without understanding the consequences. Examples, counterfeit executable program, ActiveX component, java applet, spyware, malware, or crime ware. Such downloads may happen when visiting a websites, viewing an e-mail message or by clicking on a deceptive pop-up window, for instance, an error report from the computer' operating system itself is being acknowledged, or that an innocuous advertisement pop-up is being dismissed.
Task 3: Procedure
1. Full Back up: this is the most in depth backup, and takes the longest to do. This will keep an archived backup of any folder you modify, as it happens.
Incremental Back up: This is essentially the same extent as a full backup, but acts on a set schedule and will back up all changed files from the last incremental backup.
Differential Back up: This is often used with a full back up and will provide a backup of all files that have changed since the last full backup. This can take much less tape or disc space to carry out, but this process can make it take much longer to restore all your files.
2. Why should we back up our data offsite and why should we check periodically? Files get deleted accidentally, or hardware in a workstation or server fails, and precious data critical to businesses gets damaged or vanishes. Or we may have a local or natural disaster in which

all of our data may be lost as well. Periodic testing of backup restores is needed, to ensure that the system works and your backup data is preserved and can be reached quickly to recover when something happens to your main backup location.
3. Cold site - is essentially office or datacenter space without any server-related equipment installed. The cold site provides power, cooling, and/or office space which waits in the event of a significant outage to the main work site or datacenter. This site needs extensive support from IT personnel to get all necessary servers and equipment migrated and functional. Cold sites are the cheapest cost-recovery option for businesses to utilize.
Warm site - offer office space/datacenter space and will have some pre-installed server hardware. A warm site will contain only servers ready for the installation of production environments and make sense for aspect of the business which is not critical, but requires a level of redundancy. Downfall is the actual downtime associated with the software-loading/configuration requirements for engineering.
Hot Site - are essentially mirrors of your datacenter infrastructure. The backup site is populated with servers, cooling, power, and office space. The feature of a hot site is that the production environments are running concurrently with your main datacenter. In the event of a significant outage event to your main datacenter, the hot site can take the place of the impacted site immediately. However, this level of redundancy does not come cheap, therefore making this process of backups to be the most expensive.

Similar Documents

Premium Essay

Linux Security Basics

...Linux Security Basics Security is always at the top of the list when setting up a network and also administering a network. Linux is an operating system that can be easily obtained over the internet due to its open source distributions. Linux is one of the most secure operating systems because of having less use than Windows for the end user. There are several security technologies in Linux that can be implemented into a network. The three technologies that I will be discussing are SELinux, chroot jail, and iptables. SELinux was developed by the National Security Administration in an effort to incorporate a strong, flexible mandatory access control architecture into the major subsystems of the Linux kernel. The NSA recognized that operating system security is critical at higher levels. It provides a tool to enforce the separation of information based on the confidentiality and integrity requirements. This helps when addressing threats of tampering and bypassing of application security. It also assists in the isolation of damage that is caused by malicious software or damaged applications. SELinux uses the Flux Advanced Security Kernel which contains components that provide support for enforcing many kinds of MAC policies like type enforcement, role-based access control, and multilevel security. The Linux kernel that is implementing SELinux enforces MAC policies that limit the user programs and system servers to only what they need to complete the job. When a limit...

Words: 1313 - Pages: 6

Premium Essay

Security Plan Basics

...To perform a security plan, a full risk assessment has to be performed. This involves developing security policies and implementing controls to prevent computer risks from becoming reality. Risk assessment is a very important part of computer security planning. It provides a baseline for implementing security plans to protect assets against various threats that could occur in all of the seven domains of IT infrastructure. The User Domain is the weakest domain, therefore measure need to be taken to reduce the chance that user’s activity can bring down a system unknowingly or knowingly. A mandatory Computer Security training will need to be implemented in order to educate the users on the proper use of work computers. Train the users to use their machine properly and can effectively cut down on mistakes that can leave systems vulnerable to attacks. Also, there will be restriction to user’s ability to bring in and corrupt data using CDs, DVDs, and USB drives. Remote Access Domain, with the condition that the users are off sites, it is hard to know if their password has not been compromised. In cases where data is accessed without proper authorization, data should be completely encrypted to prevent sensitive materials from being presented to the open market. To prevent unauthorized people from logging onto the system, password delay and or denial after several tries should be implemented. Also, real time lock out should be implemented. Workstation Domain, the problem associated...

Words: 433 - Pages: 2

Free Essay

Linux Security Basics

...IT302 7/9/2012 Research Linux Security Basics Linux, being one of the most secure operating systems in the world, has many features and services that enhance security to the maximum. Linux isn’t completely secure, like some people like to claim, but many distributions strive to make security a key feature. One of the greatest reasons Linux is more secure, is the simple fact of having a smaller user base than other operating systems; this means that Linux is a smaller target for most malicious intents. That doesn’t mean that distributions rely on this to secure their OS. There are many great and complex security features and services that come with Linux. One of the most complicated security features, I believe, is SELinux. Security Enhanced Linux is a security model developed by the NSA and provides a fine grained permissions system for files, users, groups, sockets, ports, and processes. SELinux was conceived because the current user level security system that Linux, and other operating systems, offer is insufficient for. To ensure a maximum security environment, SELinux uses the MAC security model. This means that an object only has the minimal set of permissions it requires to operate. SELinux uses sets of policies to handle permissions providing the system with a great level of security. These policies can be assigned as roles to users enabling specific rules and regulations for specific individuals. SELinux may be a powerful security feature, but it can also be a pain...

Words: 1200 - Pages: 5

Free Essay

Basic Security

...Phoenix. AMI 6 Beeps: Keyboard controller / gate A20 failure The keyboard controller is a chip on the motherboard that communicates with your keyboard. It also controls the A20 gate that provides access to the high memory area (HMA). This component is indicating a failure. This is a problem with either the keyboard or the motherboard. Phoenix 1-3-4-1 Test 512 base address lines. Sometimes a memory stick can become loose causing the computer to be unable to read the memory or get errors as it's reading it. Try fixing this issue by opening the computer removing each of the memory sticks you have in the computer and then placing them back into the slots, reset the memory and restart the computer. If this doesn’t work replace the memory. Basic Security Hardware Network address translation: Every system on the Internet needs an IP address--like a phone number for computers--which is used to forge links with other systems across the network. NAT foils unauthorized connections by giving PCs behind the firewall a set of private addresses, while presenting to the world a single, public address. This switch makes it difficult for others to reach through...

Words: 962 - Pages: 4

Free Essay

Security Basics

...Identity theft is the crime of using someone else's personal information for self-gain. According to an article in USA Today, identity theft is surpassing traditional theft and is becoming the leading form of property crime (Anderson). The Federal Trade Commission estimates that more than 9 million individuals are victims of identity theft each year. The Justice Department puts the figure at more than 3.5 million households (Anderson). Anyone can become a victim of identity theft and it is not limited to the financial activities of one’s life. People’s identity is also stolen in order to commit criminal activities. Both activities are defined as fraud and are punishable by law if caught. Financial identity theft or fraud includes bank fraud, credit card fraud, computer and telecommunications fraud, social program fraud, tax refund fraud, and mail fraud. In fact, a total of 25 types of financial identity fraud are listed and investigated by the United States Secret Service (Obringer). In 1997, Secret Service agents made approximately 10,000 financial crime arrests which 94 percent involved identity theft (Obringer). Fifteen years later, Javelin Strategy & Research reports that over 12 million financial identity theft cases were reported (Javelin Strategy & Research). Other types of identity theft usually involve financial elements as well but are typically committed to fund some sort of criminal enterprise. Criminal activities include gaining...

Words: 752 - Pages: 4

Free Essay

Network Security Basics

...‫آﻣﻮزش ﻛﻠﻴﺎت اﻣﻨﻴﺖ ﺷﺒﻜﻪ‬ ‫وﻗﺘﻲ ﺑﺤﺚ اﻣﻨﻴﺖ ﺷﺒﻜﻪ ﭘﻴﺶ ﻣﻲ اﻳﺪ ، ﻣﺒﺎﺣﺚ زﻳﺎدي ﻗﺎﺑﻞ ﻃﺮح و اراﺋﻪ ﻫﺴﺘﻨﺪ ، ﻣﻮﺿﻮﻋﺎﺗﻲ ﻛﻪ‬ ‫ﻫﺮ ﻛﺪام ﺑﻪ ﺗﻨﻬﺎﻳﻲ ﻣﻲ ﺗﻮاﻧﻨﺪ ﺟﺎﻟﺐ ، ﭘﺮﻣﺤﺘﻮا و ﻗﺎﺑﻞ درك ﺑﺎﺷﻨﺪ ، اﻣﺎ وﻗﺘﻲ ﺻﺤﺒﺖ ﻛﺎر ﻋﻤﻠﻲ ﺑﻪ ﻣﻴﺎن‬ ‫ﻣﻲ اﻳﺪ ، ﻗﻀﻴﻪ ﻳﻚ ﺟﻮراﻳﻲ ﭘﻴﭽﻴﺪه ﻣﻲ ﺷﻮد . ﺗﺮﻛﻴﺐ ﻋﻠﻢ و ﻋﻤﻞ ، اﺣﺘﻴﺎج ﺑﻪ ﺗﺠﺮﺑﻪ دارد و ﻧﻬﺎﻳﺖ ﻫﺪف‬ ‫ﻳﻚ ﻋﻠﻢ ﻫﻢ ، ﺑﻪ ﻛﺎر اﻣﺪن ان ﻫﺴﺖ.‬ ‫وﻗﺘﻲ دوره ﺗﺌﻮري اﻣﻨﻴﺖ ﺷﺒﻜﻪ را ﺑﺎ ﻣﻮﻓﻘﻴﺖ ﭘﺸﺖ ﺳﺮ ﮔﺬاﺷﺘﻴﺪ و وارد ﻣﺤﻴﻂ ﻛﺎر ﺷﺪﻳﺪ ،‬ ‫ﻣﻤﻜﻦ اﺳﺖ اﻳﻦ ﺳﻮال ﺑﺮاﻳﺘﺎن ﻣﻄﺮح ﺷﻮد ﻛﻪ " ﺧﺐ ، ﺣﺎﻻ از ﻛﺠﺎ ﺷﺮوع ﻛﻨﻢ ؟ اول ﻛﺠﺎ را اﻳﻤﻦ ﻛﻨﻢ ؟‬ ‫ﭼﻪ اﺳﺘﺮاﺗﮋي را ﭘﻴﺶ ﺑﮕﻴﺮم و ﻛﺠﺎ ﻛﺎر را ﺗﻤﺎم ﻛﻨﻢ ؟ " اﻧﺒﻮﻫﻲ از اﻳﻦ ﻗﺒﻴﻞ ﺳﻮاﻻت ﻓﻜﺮ ﺷﻤﺎ را ﻣﺸﻐﻮل‬ ‫ﻣﻲ ﻛﻨﺪ و ﻛﻢ ﻛﻢ ﺣﺲ ﻣﻲ ﻛﻨﻴﺪ ﻛﻪ ﺗﺠﺮﺑﻪ ﻛﺎﻓﻲ ﻧﺪارﻳﺪ و اﻳﻦ اﻟﺒﺘﻪ ﺣﺴﻲ ﻃﺒﻴﻌﻲ ﻫﺴﺖ . ﭘﺲ اﮔﺮ اﻳﻦ‬ ‫ﺣﺲ رو دارﻳﺪ و ﻣﻲ ﺧﻮاﻫﻴﺪ ﻳﻚ اﺳﺘﺮاﺗﮋي ﻋﻠﻤﻲ - ﻛﺎرﺑﺮدي داﺷﺘﻪ ﺑﺎﺷﻴﺪ ، ﺗﺎ اﻧﺘﻬﺎي اﻳﻦ ﻣﻘﺎﻟﻪ ﺑﺎ ﻣﻦ‬ ‫ﺑﺎﺷﻴﺪ ﺗﺎ ﻗﺪم ﺑﻪ ﻗﺪم ﺷﻤﺎ رو ﺑﻪ اﻣﻨﻴﺖ ﺑﻴﺸﺘﺮ ﻧﺰدﻳﻚ ﻛﻨﻢ.‬ ‫ﻫﻤﻴﺸﻪ در اﻣﻨﻴﺖ ﺷﺒﻜﻪ ﻣﻮﺿﻮع ﻻﻳﻪ ﻫﺎي دﻓﺎﻋﻲ ، ﻣﻮﺿﻮع داﻏﻲ ﻫﺴﺖ و ﻧﻈﺮات ﻣﺨﺘﻠﻔﻲ وﺟﻮد‬ ‫دارد . ﻋﺪه اي ﻓﺎﻳﺮوال را اوﻟﻴﻦ ﻻﻳﻪ دﻓﺎﻋﻲ ﻣﻲ داﻧﻨﺪ ، ﺑﻌﻀﻲ ﻫﺎ ﻫﻢ ‪ Access List‬رو اوﻟﻴﻦ ﻻﻳﻪ‬ ‫دﻓﺎﻋﻲ ﻣﻲ داﻧﻨﺪ ، اﻣﺎ واﻗﻌﻴﺖ ﭘﻨﻬﺎن اﻳﻦ ﻫﺴﺖ ﻛﻪ ﻫﻴﭽﻜﺪام از اﻳﻨﻬﺎ ، اوﻟﻴﻦ ﻻﻳﻪ دﻓﺎﻋﻲ ﻧﻴﺴﺘﻨﺪ . ﻳﺎدﺗﻮن‬ ‫ﺑﺎﺷﺪ ﻛﻪ اوﻟﻴﻦ ﻻﻳﻪ دﻓﺎﻋﻲ در اﻣﻨﻴﺖ ﺷﺒﻜﻪ و ﺣﺘﻲ اﻣﻨﻴﺖ ﻓﻴﺰﻳﻜﻲ ، ‪Policy‬ﻫﺴﺖ . ﺑﺪون ‪، policy‬‬ ‫ﻟﻴﺴﺖ ﻛﻨﺘﺮل ، ﻓﺎﻳﺮوال و ﻫﺮ ﻻﻳﻪ دﻳﮕﺮ ، ﺑﺪون ﻣﻌﻨﻲ ﻣﻲ ﺷﻮد و اﮔﺮ ﺑﺪون ‪ policy‬ﺷﺮوع ﺑﻪ اﻳﻤﻦ ﻛﺮدن‬ ‫ﺷﺒﻜﻪ ﻛﻨﻴﺪ ، ﻣﺤﺼﻮل ﻳﻚ آﺑﻜﺶ واﻗﻌﻲ از ﻛﺎر در ﻣﻲ اﻳﺪ.‬ ‫ﺑﺎ اﻳﻦ ﻣﻘﺪﻣﻪ ، و ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ اﻳﻦ ﻛﻪ ﺷﻤﺎ ‪ policy‬ﻣﻮرد ﻧﻈﺮﺗﺎن را ﻛﺎﻣﻼ ﺗﺠﺰﻳﻪ و ﺗﺤﻠﻴﻞ ﻛﺮدﻳﺪ‬ ‫و دﻗﻴﻘﺎ ﻣﻲ داﻧﻴﺪ ﻛﻪ ﭼﻪ ﭼﻴﺰي رو ﻣﻲ ﺧﻮاﻫﻴﺪ و ﭼﻲ را اﺣﺘﻴﺎج ﻧﺪارﻳﺪ ، ﻛﺎر را...

Words: 1242 - Pages: 5

Free Essay

Lab 7 Security Basics

...Lab 7: Security Basics Task 1: Procedure 1. An example of hardware firewall is Belkin, and an example of software is Norton 360. Task 2: Procedure 1. Almost all anti-virus programs offer some sort of trial period for first-time users. McAfee is the only one that I know for sure offers free protection. 2. A Trojan Horse is an email virus usually released by an email attachment. If opened, it will scour your hard drive for any personal and financial information such as your social security, account, and PIN numbers. Once it has collected your info, it is sent to a thief’s database. A malicious email message is one which had been deliberately crafted to cause problems on the server or on the client. Drive- by downloads are downloads which a person authorized but without understanding the consequences (e.g. downloads which install an unknown or counterfeit executable program, ActiveX component, or Java applet). .Any download that happens without a person's knowledge, often a computer virus, spyware, malware, or crime ware. Task 3: Procedure 1. Full backup is a complete backup of everything you want to backup. Differential backup software looks at which files have changed since you last did a full backup. Then creates copies of all the files that are different from the ones in the full backup. Incremental backup software creates copies of all the files, or parts of files that have changed since previous backups of any type (full, differential or incremental)...

Words: 432 - Pages: 2

Free Essay

Unit 9 Security Basics

...Kaspersky Total Security Free Trial Kaspersky Total Security Paid Version Real Time Blocking of Spyware Multiple PC management from one PC, data back-up & encryption, & password management Always current cloud based protection Real-time antivirus & anti-theft protection for your Android smartphone Proactive detection of Malware Advanced anti-theft & Internet threat protection for your Android tablet Safe Money, two-way firewall, award-winning parental control, & advanced identity theft protection Real-time Protection against Mac & PC malware, Safemoney technology, and parental control Privacy protection including webcam protection, security notifications on Wi-Fi networks, & additional tools to protect personal information Mcafee Total Protection Free Trial Mcafee Total Protection Paid Version Protect against viruses and malware Secure your Macs Optimize your PC Safeguard your smartphones and tablets Protect your family Manage all your devices from one place Block spam and dangerous email Password manager Protect against hackers and thieves Protects Multiple PCs Protect your social network Free Anti-Virus Software Paid Anti-Virus Software Malwarebytes Anti-Malware Mcafee Total Protection Panda Free Antivirus Norton Anti- Security Comodo Cleaning Essential 6 Kaspersky Total Security Norton Power Eraser AVG Anti-Virus Programs Trojan Horse Program: A Trojan horse, or Trojan, in computing is a generally non-self-replicating type of malware program...

Words: 495 - Pages: 2

Premium Essay

Course Descriptions

...GE117 Composition I | A 4 credit hour Composition course This course covers phases of the writing process, with special emphasis on the structure of writing and techniques for writing clearly, precisely and persuasively. Prerequisite or Corequisite: TB133 Strategies for the Technical Professional or equivalent GE127 College Mathematics I | A 4 credit hour Mathematics course This course will include, but is not limited to, the following concepts: quadratic, polynomial and radical equations, linear functions and their graphs, systems of linear equations, functions and their properties and triangles and trigonometric functions. Activities will include solving problems and using appropriate technological tools. Prerequisite: GE184 Problem Solving or TB184 Problem Solving or GE150 Survey of the Sciences or equivalent; Prerequisite or Corequisite: TB133 Strategies for the Technical Professional or equivalent GE184 Problem Solving | A 4 credit hour Science course This course introduces students to problem solving techniques and helps them apply the tools of critical reading, analytical thinking and mathematics to help solve problems in practical applications. GE192 College Mathematics II | A 4 credit hour Mathematics course This course will include, but is not limited to, the following concepts: exponential and logarithmic equations and functions, graphs of trigonometric functions, trigonometric equations, polar coordinates, oblique triangles, vectors and sequences. Prerequisite:...

Words: 1186 - Pages: 5

Free Essay

Nt1110 Lab 7 Security Basics

...Lab 7: Security Basics Lab 7: Security Basics Task 1: Software: We offer solutions to fit all of your security needs. | Free Antivirus + Firewall | Internet Security Suite | Extreme Security | Antivirus/Anti-Spyware EngineDetects and blocks viruses, spyware, Trojan horses, worms, bots, and rootkits. | | | | Two-Way FirewallMakes your PC invisible to hackers and stops spyware from sending your data out to the Internet. | | | | Advanced FirewallMonitors programs for suspicious behavior spotting and stopping new attacks that bypass traditional anti-virus protection. | | | | Privacy & Security ToolbarProvides site check, do not track, Facebook privacy scan, private browsing and more. | | | | Identity ProtectionMonitors your credit and alerts you of changes in your credit files. | | | | Advanced Real-Time AntivirusChecks files against an always-up-to-date cloud database of antivirus signatures. | | | | Enhanced Browser ProtectionProtects your computer by blocking web threats before they reach your browser. | | | | SupportCustomer service and technical support available 24/7 via live chat. | | | | Parental ControlsFilters and blocks inappropriate websites and limits time spent online. | | | | Threat EmulationAnalyzes downloads and warns you if a download is malicious--stopping it from infecting your PC. | | | | Find My LaptopLocates your lost or stolen laptop on a map, locks it down and recovers important files...

Words: 1060 - Pages: 5

Free Essay

Unit 9 Lab Security Basics

...Unit 9 Lab Security Basics Task 1: Features of Hardware and Software Firewalls * Hardware Firewall – Cisco ASA 5505 Firewall 1) Usually purchased as a stand-alone product typically found in routers or other networking equipment. 2) Usually a minimum of 4 network ports (the Cisco unit has 8) 3) Usually used in businesses or large networking systems 4) Intended for network security * Software Firewall – 2014 Trend Micro Instant Security and Antivirus 1) Usually purchased by individual users 2) Usually an installable form of software 3) Protects from outside attempts to control or gain access to your computer 4) Protects against Trojan programs or email worms 5) Only protects individual computer, not a network Task 2: Part 1: Which anti-virus program is free and which provide trial versions * Panda – No free trial or free version; yearly prices : $31.99, $49.99, $35.00 * Norton – No free product ,free trial version for 30 days; yearly prices : $49.99, $79.99, $49.99 * McAfee – No free or trial versions; yearly prices : $79.99, $49.99, $44.99 * AVG – No freeware, trial for 30 days; yearly prices : $39.99, $54.99 * Kaspersky – Offers a free anti-virus software and 30 trial; yearly prices : $69.95, $64.95, $59.95, $59.95 Part 2: Define malicious code terms Term – Trojan horse Program Definition – generally non-self-replicating type of malware program containing malicious code that, when executed...

Words: 1359 - Pages: 6

Free Essay

Mortgage

...Leah Dolce ECO 103 Mortgage Project While doing this project, I kept finding myself to be very indecisive as to what I wanted in a home and what things would be important to me if I were to purchase one. This project helped me understand the basics of buying a home such as: where I would want my kids to go to school, how many bedrooms, how many bathrooms, property, neighborhood reputation, and much more. I had very little knowledge about most of the surrounding area so now I know what kind of research I would have to do to make sure I know exatcly what I want when purchasing a home. I did know I wanted it to be at least 3 bedrooms, 2 bathrooms, and have an updated kitchen. I was able to find those things in the home I selected but what I didn't realize was what the cost would be. There is a huge financial difference between a 15 year fix and a 30 year fix mortgage. For the home I selected it was a $522.76 difference in the monthly payment and a $91,271.79 difference in the amount of interest I would be paying for the life of the loan. If I was abel to afford such a hefty, monthly payment I would choose the 15 year mortgage because in the long run it would be cheaper. The lesson learned here, though, is find a more affordable house and make updates as you go along. All -in-all I had fun doing this project and it helped me understand the process into buying a home and gave me great internet resources to do...

Words: 282 - Pages: 2

Premium Essay

Hostel Management Synopsis

...SYNOPSIS TITLE OF THE PROJECT HOSTEL MANAGEMENT SYSTEM PROBLEM STATEMENT This project needs to create the Hostel Management System (HMS) to organize the rooms, mess, student’s record and the other information about the students. All hostels without HMS are managed manually by the hostel office. And hence there is a lot of strain on the person who are running the hostel. This particular project deals with the problems on managing a hostel and avoids the problem which occur when carried manually. INTRODUCTION In hostels without a HMS all the things have to be done manually. The Registration form verification to the different data processing are done manually. Thus there are a lot of repetitions which can be easily avoided. Identification of the drawbacks of the existing system leads to the designing of computerized system that will be compatible to the existing system with the system which is more user friendly and more GUI oriented. We can improve the efficiency of the system, thus overcome the drawbacks of the existing system. Hostel management gives on idea about how the students details, room allocation, mess expenditure are maintained in the particular concern. The hostel management system also includes some special features like How many students can live in a room, and the students of the hostel can be recognized from their ID number. The administration has the unique identity for each members as well as students details. The stock management...

Words: 903 - Pages: 4

Free Essay

How to Present to Investors

...nonstop work. Startups are a counterexample to the rule that haste makes waste. (Too much money seems to be as bad for startups as too much time, so we don't give them much money either.) A week before Demo Day, we have a dress rehearsal called Rehearsal Day. At other Y Combinator events we allow outside guests, but not at Rehearsal Day. No one except the other founders gets to see the rehearsals. The presentations on Rehearsal Day are often pretty rough. But this is to be expected. We try to pick founders who are good at building things, not ones who are slick presenters. Some of the founders are just out of college, or even still in it, and have never spoken to a group of people they didn't already know. So we concentrate on the basics. On Demo Day each startup will only get ten minutes, so we encourage them to focus on just two goals: (a) explain what you're doing, and (b) explain why users will want it. That might sound easy, but it's not when the speakers have no experience presenting, and they're explaining technical matters to an audience that's mostly...

Words: 303 - Pages: 2

Free Essay

Table

...(L) SUK H207 AHCC1113 (P) V207 AHCC1113 (P) M102 (L) FAI DKB AELE0343 (P) SUK CC205 JS AHCC1163 (P) FAI M003 AELE0343 (T) SUK H207 JS AHCC1163 AHCC1153 (L) WYL DKB AHCC1153 (P) WYL LAB 2 AHCC1163 (P) FAI V207 AHCC1153 (P) WYL LAB 3 AELE0343 READING AND WRITING AHCC1153 BASIC SOFTWARE APPLICATION I AEPD1013 STUDY SKILLS AHCC1163 DRAWING BASIC AHCC1103 ART APPRECIATION AHCC1113 GRAPHIC DESIGN BASICS School of Social Science and Humanities Certificate in Graphic Design - Year 1 1st semester 2013/2014 8 9 10 AHCC1103 (T) HAR V102 11 AHCC1113 (L) JS DK 6 Tutorial Group: M1CGD2 12 1 2 3 4 AEPD1013 (L) PRA H209 5 6 7 8 9 Mon Tue Wed Thu Fri Sat AHCC1103 (L) HAR DK AB1 AELE0343 (L) SUK H207 AEPD1013 (T) PRA H207 AHCC1163 (L) FAI DKB AELE0343 (P) SUK CC205 AHCC1153 (L) WYL DKB AHCC1113 (P) V304 AHCC1113 (P) V207 AELE0343 (T) SUK H207 JS JS AHCC1163 (P) FAI V208 AHCC1153 (P) WYL LAB 2 AHCC1153 (P) WYL LAB 2 AHCC1163 (P) FAI V202 AELE0343 READING AND WRITING AHCC1153 BASIC SOFTWARE APPLICATION I AEPD1013 STUDY SKILLS AHCC1163 DRAWING BASIC AHCC1103 ART APPRECIATION AHCC1113 GRAPHIC DESIGN BASICS School of Social Science and Humanities Certificate in Graphic Design - Year 1 1st semester 2013/2014 8 9 AEPD1013 (L) PRA H209 10 11 AHCC1113 (L) JS DK 6 Tutorial Group: M1CGD3 12 1 2 3 AHCC1103 (T) HAR V104 AELE0343 (L) SUK H207 4 5 6 7 8 9 Mon Tue Wed AHCC1103 (L) HAR DK AB1 AHCC1163...

Words: 517 - Pages: 3