...Eastern Mediterranean University Department of Information Technology ITEC400 – Summer Training Report Submitted by: Name-Surname : PRINCESS ONYEKACHI NWACHUKWU Number : 118021 Name of Company : D.M.S Nigeria (Limited) Location of Company : Onne, Rivers State, Nigeria Dates of Training : 30.7.2014 – 23.9.2014 Duration of Training : 40 working days November 2014 Table of Contents 1. Introduction………………………………………………………………………………………………….. | | 1 | 2. Company Description……………………………………………………………………………………. | | 3 | 2.1 Services Rendered…………………………………………………………………………………... | | 3 | 2.2 Projects Executed……………………………………………………………………………………. | | 4 | 2.3 Roles of D.M.S. IT Department………………………………………………………………… | | 5 | 2.4 Contact Person………………………………………………………………………………………… | | 6 | 2.5 Computers and Hardware………………………………………………………………………… | | 6 | 2.6 Working Environment ……………………………………………………………………………… | | 6 | 3. Problem Definition………………………………………………………………………………………… | | 7 | 4. Work Done…………………………………………………………………………………………………….. | | 8 | 4.1 Software Development ……………………………………………………………………………. | | 8 | 4.2 Troubleshooting Printer Issues…..…………………………………………………………….. | | 15 | 4.3 Troubleshooting Network Connectivity and Hot Swapping ….…………………… | | 16 | 4.4. Learning New Software…………………………………………………………………………… 4.5 Help Desk Activities……………………………………………………………………………… 18 4.6 Problems Faced……………………………………………………………………………………...
Words: 3565 - Pages: 15
...Prepared for: Mr John Andre The unit: Organization and Behavior The Banking Academy Prepared by: Trần Minh Hằng – Helena Class: F05A-065 No of words: 2,759 Submission date: 21th November, 2012 Table of Contents Introduction 3 1.1 Compare and contrast different organizational structures and culture 4 1.1.1 Analyze organizational structures and culture: 4 1.1.2 Compare and contrast different organizational structures and culture: 4 1.2 Explain how the relationship between an organization’s structure and culture can impact on the performance of the business: 5 1.2.1 Describe the relationship between organizational structure and culture 5 1.2.2 Demonstrate this relationship affecting business performance 5 1.3 Discuss the factors which influence individual behavior at work 7 1.3.1 Identify factors which influence individual behavior at work of the two companies 7 1.3.2 Analyze effects of the factors to individual behavior at work of the two organizations 7 2.1 Compare the effectiveness of the different leadership styles in different organizations 8 2.1.1 Identify different leadership styles used by the two organizations 8 2.1.2 Discuss the effectiveness of the different leadership styles in different organizations 8 2.2 Explain how organizational theory underpins the practice of management 10 2.2.1 Analyze the organizational theory which an organization complies 10 2.2.2 Demonstrate how organization theory underpins the practice of management...
Words: 3249 - Pages: 13
...SQL Server 2012 Security Best Practices - Operational and Administrative Tasks SQL Server White Paper Author: Bob Beauchemin, SQLskills Technical Reviewers: Darmadi Komo, Jack Richins, Devendra Tiwari Published: January 2012 Applies to: SQL Server 2012 and SQL Server 2014 Summary: Security is a crucial part of any mission-critical application. This paper describes best practices for setting up and maintaining security in SQL Server 2012. Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This white paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in, or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual...
Words: 15647 - Pages: 63
...Infrastructure and Systems Implementation Plan Sabrenna Anderson Kaplan University Primary Contact | Name | Rosanne Moran | | Phone | 732-930-3800 | | Email | rmoran@wint.net | Backup Contact | Name | Sabrenna Anderson | | Phone | 732-656-3575 | | Email | sanderson@wint.net | Proposal Type | Idea To Be Explored Potentially Identified Solution | Project Type | New Project Enhancement to Existing or Former Project | Working Title of Project | Infrastructure and Systems Implementation Plan | Project Sponsors | WInt IT department, Rosanne Moran, IT Director. | ------------------------------------------------- ------------------------------------------------- Introduction Widgets International, Inc. currently consists of Widgets USA, LLC and Widgets-R-Us, LTD. Combined Widgets International, Inc. has 50 years of experience in providing function critical assembly and machinery solutions. WUSA has cornered the Business to Business market while WRU has grown in leaps and bounds in the retail market. Together as Widgets International, Inc., they stand to increase their market share substantially by creating and offering innovative and cost effective assembly solutions globally. (Anderson, Unit1, 2014) ------------------------------------------------- ------------------------------------------------- Purpose and Justification This proposal will explore the requirements for the application and implementation of an easily manageable information...
Words: 2927 - Pages: 12
...ITT Technical Institute NT1310 Physical Networking Student Course Package Bring this document with you each week Students are required to complete each assignment and lab in this course package on time whether or not they are in class. Late penalties will be assessed for any assignments or labs handed in past the due date. The student is responsible for replacement of the package if lost. Table of Contents Syllabus 2 Student Professional Experience 19 Graded Assignments and Exercises 23 Labs 47 Documenting your Student Professional Experience 57 ITT Technical Institute NT1310 Physical Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1210 Introduction to Networking or equivalent Course Description: This course examines industry standards and practices involving the physical components of networking technologies (such as wiring standards and practices, various media and interconnection components), networking devices and their specifications and functions. Students will practice designing physical network solutions based on appropriate capacity planning and implementing various installation, testing and troubleshooting techniques for a computer network. Where Does This Course Belong? | | | NT2799 | | | | | | | | NSA Capstone | | | | | | | Project | | | | | NT2580...
Words: 10839 - Pages: 44
...Service Request (SR-rm-022) BSA 375 30 July 2015 Service Request SR-rm-022 Section 1 Background Information Riordan Manufacturing is a global plastics manufacturer with facilities located worldwide, with a research and development department located in San Jose California. Riordan Manufacturing has produced a yearly earning forty-six million dollars. Riordan Industries, which is the sole owner of Riordan Manufacturing, is a Fortune 1000 enterprise with revenues reaching over the amount of one-billion dollars. It is highly important to use methods of integrating new systems into Riordan Manufacturing. The method of System Development Life Cycle (SDLC) is a great way to understand the problem, analyze the problem, design the solution, and implement the project. Riordan Manufacturing must revamp its out of date Information Systems, not only in the Human Resource section but in all other sections as well, in order to meet current industry standards, increase efficiency, lower overhead, increase worker productivity and many other factors which will add tremendous value to the company. These values are both tangible and intangible values that cannot be measured by a dollar value alone. This update is in accordance to Service Request SR-rm-022. The most efficient way to update the Human Resource Department would have to include hardware and software that...
Words: 4240 - Pages: 17
...WESTERN GOVERNORS UNIVERSITY Submittal Cover Sheet [pic] Date: 06/12/2012 Student Name: Michael Paul Douglas Student ID Number: 150777 Student Degree Program: Bachelor of Science Information Technology Security Student Email: douglasm@my.wgu.edu Four Digit Assessment/Project Code: CAPW4 Mentor Name: Martin Palma For Revisions Only Indicate Previous Grader: Submissions received with an altered, incomplete or missing cover sheet will be returned for resubmission. Submit to: Western Governors University Attn.: Assessment Delivery Department 4001 South 700 East, Suite 700 Salt Lake City, Utah 84107-2533 wgusubmittals@wgu.edu Capstone Project Cover Sheet Capstone Project Title: Vulnerability Management Plan Student Name: Mike Douglas Degree Program: Bachelor of Science Information Technology Security Mentor Name: Martin Palma Signature Block Student’s Signature Mentor’s Signature Table of Contents Capstone Report Summary (Introduction) 1 Review of Other Work 3 Rationale and Systems Analysis 8 Goals and Objectives 13 Project Timeline 22 Project Development 24 References 28 Appendix 1: Competency Matrix 29 Appendix 2: CVSS GUIDE 32 Appendix 3: DICES IV vulnerability management plan 33 Capstone Report Summary (Introduction) ...
Words: 6924 - Pages: 28
...laboratory has its computer administrator in presence of Mr. Jefrain M. Padre, although there was computer network architecture in the campus there were times that the computer had some troubles including the System Unit and its operating system. So, the researchers decided to make a proposal entitled “Proposed Computer Virtualization of NEUST-Gabaldon Computer Laboratory Using Thin-Client Network”. The proposed project used virtualization for it was essentially lets one computer do the job of multiple computers, by sharing the resources of a single computer across multiple environments. Using an Ncomputing M300 (thin-client) series connection of network it was possible for the entire project. Thoroughly, the entire project covered up network of computer using this device (Ncomputing M300 series) to connect through a server in a series type of network. Also, using a server with a high specification it will then try to run at least one programming language that can be used by the Bachelor of Science in Information Technology students of Gabaldon Campus. Project Goals/Objectives Project Goal: The goal of the project is to provide low cost but energy saver and is efficient to learning computer laboratory with the use of thin-client (NComputing) network. Objectives: 1. To reduce the costs instead of buying new systems. 2. To provide at least one programming language that can be used not only by the students taking Office Productivity subject but also the Bachelor of...
Words: 8853 - Pages: 36
...Recanati Business School Tel Aviv University Master in Business Administration Autumn Semester – Module 1 High-Technology Acquisitions Lecturer: Students: Dr. Nir Brueller Hans-Peter Huber Daniel Ammar Ziv Livne Guillaume Lesouhaitier Date: 11 December 2013 Group Assignment December 2013 High-Technology Acquisitions DAIMLER | TESLA MOTORS -i- Contents Page 1 2 3 4 4.1 4.2 4.3 4.4 4.5 4.6 4.7 4.8 5 5.1 5.2 6 6.1 6.2 6.3 7 8 8.1 8.2 INTRODUCTION ............................................................................................................. 1 ACQUIRER OVERVIEW | DAIMLER ............................................................................. 1 TARGET OVERVIEW | TESLA MOTORS ..................................................................... 3 STRATEGIC APPROACH AND SYNERGIES EVALUATION ...................................... 5 THE ELECTRIC VEHICLE MARKET ................................................................................... 5 DAIMLER'S MOTIVATION TO ENTER THE MARKET............................................................. 6 DAIMLER'S MOTIVATION TO ACQUIRE TESLA ................................................................... 6 DAIMLER ADVANTAGE TO ACQUIRE TESLA OVER COMPETITORS ........................................ 7 MOVE FROM PARTNERSHIP WITH TESLA TO ACQUISITION ................................................ 7 TESLA'S MOTIVATION .........................................................................
Words: 5999 - Pages: 24
...World-Wide Trading Company: Project Implementation Plan Group 3 Kristine Bird (AD Forest Domain OU, Groups and GPO Implementation) Ryan Bonisch (Contact list and LAN Implementation Tasks) Anthony Campo (Configuration of Routers, Switches, and VLANs) Gerald Casanada (Voice VLAN, Wireless, DHCP and DNS) Jennifer Coleman (AD Implementation and Tasks lists for AD Policies) Billie Jo Derouin (Security Implementation) Raymond Mack (Security Technology and Timeline) University of Maryland University College CMIT 495 Professor Sam Musa February 28, 2016 Table of Contents Introduction 2 Purpose 3 Implementation Requirements 3 Project Contact List 3 Tool List 3 Equipment Installation Plan 5 Project TimeLine 6 Lan Implementation task 7 Security Implementation task 11 Configuration Routers 41 Switches 46 VLAN Configurations 49 Voice VLAN and Wireless 51 DHCP and DNS 54 Active Directory Implementation Task 56 Active Directory Policies 58 AD Forest Domain OU formation/AD Group Formation/AD GPO Implementation 68 Security Technologies 88 Introduction The implementation of the WWTC is crucial to keep the business functioning and growing. To ensure that new office installation goes smooth group 3 will create a functional implementation plan from the design we proposed to WWTC over the last 7 weeks. Purpose The purpose of this plan is to provide a step by step guide on the network designed proposed...
Words: 13687 - Pages: 55
...CHAPTER 1: SUMMARY OF THE PROJECT A. Name of the firm FAMILIA RAMAYANA COMPUTER SERVICES this was our company name, it was derived from the name of our group, which is FAMILIA RAMAYANA and combined with the word Computer Services which is what our business offered. Familia Ramayana came from our group in college; it started when our classmate Ms. Bernadeth Paredes used our pictures for every character on a Hindu great epic titled Ramayana and Mahabharata. B. Location Lower Bicutan- The business will be renting a space at Vulcanizing St. K-9 Ext. Gen. Santos Lower Bicutan, Taguig City. It is the best location for us because there was a three school located around and the headquarters of Philippine National Police. The fifty (50) meter radius requirements as provided in the existing zoning code andother applicable rules and regulations wherein computer shops and other similar establishments and places of amusements should be put up or constructed at least two hundred (200) meters away from the schools. C. Brief Description of the Project FAMILIA RAMAYANA COMPUTER SERVICES is computer shop business that also offers other service like photocopy and typing job. Since this type of business required a lot of investment, it is build by way of partnership. The business partners are Ms. Jellen Narvasa, Ms. Joanna Joy Bautista, Ms. Arlene Sario, Mr. Arjie Luchavez, Mr. Alex Dexter Patron, Mr. John Chryson Badjao and Mr. Ruben Majid Jungaya. D .Major Assumptions 1. Market...
Words: 7829 - Pages: 32
...Company Members Project scope statement Project Title: Improve Network Structure for Lawyers Firm Date: June 27, 2012 Document prepared by: Email: * We will provide our clients with IT solutions that offer practical value today while positioning them to meet the business and technological needs of tomorrow. With our constant focus on improved business results, we will make and build definitive plans for the best and most economical IT hardware and solutions. Our goal is to ensure a solid network as well as a state of the art design and equipment for a Law Firm’s work environment. Assure that appropriate telecommunications and computing resources are available to support the mission of the firm Assure that each staff member who uses telecommunications and computing resources in his or her position has a computer of sufficient capability to fulfill their required job responsibilities Ease resource and financial planning by reducing the effort involved in budgeting and planning for new telephone units, computers, network, classroom equipment and server systems. Provide for the cost effective and timely purchasing and installation of new equipment while decreasing the deployment time for new equipment; and disposal of old and obsolete equipment. ------------------------------------------------- Deliverables Dell Desktops and laptops Cisco Routers, switches, and Ip phones will be installed and configured Firewalls will be installed Blade server holding case will be provided...
Words: 11532 - Pages: 47
...Chapter 1 Structure and Functions of a Computer "Hardware: the parts of a computer that can be kicked." ~ Jeff Pesis After completing this chapter, you will be able to: 1. Explain the importance of computer literacy. 2. Define the term computer. 3. Identify the components of a computer. 4. Compare the uses of various types of: input devices, output devices, and storage devices. 5. Describe categories of computers and their uses. Structure and Functions of a Computer 1 1.0 Introduction A computer is an electronic machine designed for the storage and processing of data. The machinery is called hardware, and this highly sophisticated equipment needs equally sophisticated programs (called software) to become a working computer system. Modern society has come to depend very heavily on the use of computer systems. Banks, businesses, government departments, industries, shops, people at home and school all rely on computer to play a vital role in their daily activities. These activities are centered on information. In business, the computer system has been used a lot and replaced filing cabinets as means of storing information, and clerical workers as a means of processing it. By storing and processing information on a computer system, these businesses can function more quickly and efficiently, because information can be found and collated much faster. Discovery Learning: A computer was also called a data processor. Why? 1.1 Major Parts and Functions A Computer is...
Words: 47755 - Pages: 192
...2012 Catalog Volume 20 Issue 1 March 5, 2012 – December 31, 2012 This Catalog contains information, policies, procedures, regulations and requirements that were correct at the time of publication and are subject to the terms and conditions of the Enrollment Agreement entered into between the Student and ECPI University. In keeping with the educational mission of the University, the information, policies, procedures, regulations and requirements contained herein are continually being reviewed, changed and updated. Consequently, this document cannot be considered binding. Students are responsible for keeping informed of official policies and meeting all relevant requirements. When required changes to the Catalog occur, they will be communicated through catalog inserts and other means until a revised edition of the Catalog is published. The policies in this Catalog have been approved under the authority of the ECPI University Board of Trustees and, therefore, constitute official University policy. Students should become familiar with the policies in this Catalog. These policies outline both student rights and student responsibilities. The University reserves the right and authority at any time to alter any or all of the statements contained herein, to modify the requirements for admission and graduation, to change or discontinue programs of study, to amend any regulation or policy affecting the student body, to increase tuition and fees, to deny admission, to revoke an offer...
Words: 130938 - Pages: 524
...DEVELOPMENT OF LEGENDA ONLINE STUDENT TIME TABLE SYSTEM FINAL YEAR PROJECT FINAL REPORT ABUBAKAR MAGIRA TOM U0957657 A thesis submitted in part fulfillment of the degree of B.sc (Hons.) In Software Engineering with the supervision of Dr. Mia Torrez and moderated by Mdm Teo Siew School of Computer Science and Information Technology Linton University College In Collaboration with University of East London December 2012 DECLARATION I Abubakar Magira Tom, hereby declare that the project work entitled “[LEGENDA ONLINE STUDENT TIME TABLE]” submitted to [LINTON UNIVERSTIY COLLEGE], is a record of an original work done by me under the guidance of [Dr. MIA TORREZ], and this project work has not performed the basis for the award of any Degree or diploma/ associate ship /fellowship and similar project if any. ___________________ [ABUBAKAR MAGIRA TOM] Student Date: __________________ [Dr. MIA TORREZ] Supervisor Date: ___________________ Mdm TEO SIEW Project Coordinator Date: ACKNOWLEDGEMENT The special thank goes to my helpful supervisor, Dr Mia Torrez. The supervision and support that she gave truly help the progression and smoothness of my research topic. The cooperation is much indeed appreciated sir. My grateful thanks also go to both Mdm. TEO SIE. A big contribution and hard worked from both of you during the eight week is very great indeed. All projects during the program would be nothing without the enthusiasm and imagination...
Words: 48269 - Pages: 194