Free Essay

Unit 7 Assignment 1

In:

Submitted By boogiebeat
Words 1873
Pages 8
Invitation to Participate in
Wellness Works
Obesity Prevention and Control Planning Committee

TO: Dr. Jeff Ritter, Chief Financial Officer FROM: Bertha Simmons, Wellness Program Director

RE: Capella Banking Bureau Obesity Prevention and Control Worksite Program

As you may be aware, Capella Banking Bureau is planning to continue implementing a worksite obesity prevention and control program in September, 2014. The new program will involve planning, building, promoting, and assessing a variety of nutrition and physical activity program components Capella Banking Bureau employees. We are inviting you to be a part of the Planning Committee.

The purpose of this committee is to develop, guide, and oversee the program, including—
• Identifying the interests of company employees
• Motivating employees to participate in the program
• Keeping management excited about the company’s obesity prevention efforts
• Discussing potential program components and deciding what activities to include

“With high obesity rates in the United States, these health care costs can directly affect employer profits.4 It is estimated that employers spend $13 billion annually on the total cost of obesity.3 Approximately 9.1% of all health care costs in the United States are related to obesity and overweight” (CDC, 2011).

“Workplace obesity prevention and control programs can be an effective way for employers to reduce obesity’ (CDC, 2011).

Along with your participation, I am predicting the Wellness Works program at Capella Banking Bureau to become a return of investment (ROI) and to grow from further being a money pit. “Obesity affects more than health care costs, it also has a significant impact on worker productivity because the more chronic medical conditions an employee has, the higher the probability of absenteeism or presenteeism” (CDC, 2011).

Without this program chronic diseases are most likely to increase and jeopardize the working population. Jeopardizing wellness of the working population will open seats of employment complex to fill. Continuing the Wellness Works program the company plays a key role in disseminating healthy behaviors within the workplace. “Additionally, well-designed programs have the potential to extend beyond the worksite and positively influence dependents (spouses and children), and thereby reduce an organization's health care costs” (CDC, 2011). Replacing the Wellness Works program may risk losing a number of employees who have benefited from its effectiveness.

Our Human resource professionals noticed that our wellness program helps reduce health insurance costs, and return on investment (ROI) started appearing frequently in wellness discussions. “When it became obvious that wellness programs could have an impact on workers’ compensation costs, we began to see different departments start to look outside their silos and create integrated strategies” (Associated, 2014).

“Claims adjusters will tell you that poor health conditions such as obesity inherently slow the normal progression of a workers’ compensation claim. A Duke University Medical Center analysis found that obese workers:

• Filed twice the number of workers’ compensation claims
• Had seven times higher medical costs from those claims
• Lost 13 times more days of work from work injury or work illness than did non-obese workers

A study by the National Council on Compensation Insurance (NCCI) found:

• Workers’ compensation medical claims open for one year cost three times as much when the injured employee is obese.
• Claims that are open for five years are five times more costly when involving an obese claimant.
• Cost differential can be even greater for smaller claims.

Given the strong link between poor health and work comp costs, maintaining a healthy lifestyle should be a high priority for employers” (Associated, 2014).
“One survey of more than 1,000 U.S. employers (most of which had more than 1,000 employees) found that 72 percent provided education or training on lifestyle behaviors to their employees, and 40 percent offered financial incentives for participation in health appraisals or screenings. Department of Labor data show that in 2000, 18 percent of all employees (including part-time) were eligible for wellness programs, and 9 percent were eligible for fitness center programs” (U.S. Department of Health & Human Services, 2003).
“Given the large number of companies that have implemented health promotion and disease prevention programs, many for several decades now, it is not surprising that a large amount of information has been reported on the effects of these programs on employee health and productivity, and on the costs and benefits of these programs to the companies that sponsor them. Moreover, many companies and studies have reported that these kinds of programs have had positive effects on employee health and job performance, and have resulted in cost savings for the companies that provide them. The nature and quality of this information vary a great deal, since these programs generally were not designed to be research studies. Many of the available reports are case studies. When more systematic studies are undertaken, they often must address limitations that include selection bias, skewed data, confounding variables, small sample sizes, and lack of control or comparison groups. These limitations in turn make it difficult for studies of worksite programs to attribute a causal relationship between the program and the measured effects and to generalize the findings to other locations, businesses, or workforces” (U.S. Department of Health & Human Services, 2003). Figure 9.Source of data: Ref. 150 (U.S. Department of Health & Human Services, 2003).
“Findings on the return on investment for health promotion and disease management programs were reported for nine employers: Canada & North America Life; Chevron; City of Mesa, AZ; General Mills; General Motors; Johnson & Johnson; Pacific Bell; Procter & Gamble; and Tenneco. These programs provide health education to their employees to promote behaviors that will improve health or prevent disease, and typically include exercise programs, health-risk appraisal, weight control, nutrition information, stress management, disease screening, and smoking cessation. The review found significant return on investment for the programs provided by these nine employers, with the range of benefit-to-cost ratios, ranging from $1.49 to $4.91 in benefits per dollar spent on the program, and a median of $3.14. For instance, at the high end, General Motors realized at one of their sites an annual savings of $105.50 in total health care costs per enrollee for an annual program cost of $27 per enrollee-a ratio of 4.91 of benefits-to-cost ” (U.S. Department of Health & Human Services, 2003).
Examinations were performed on “demand-management program“, this program is designed to assist the wellness of employees by increasing the influence of self-care and decreasing the use of medical treatment. The variation in the return on investment in this kind of program ranges from $2.19 to $13 in benefits per dollar spent. Also, in the examination, “three studies of ROI for disease-management programs found a range in benefit-to-cost ratios from $7.33 to $10.38. For multiple category programs that combined elements of these programs, they found a range of $5.47 to $6.47 in benefits per dollar spent” (U.S. Department of Health & Human Services, 2003).
CIGNA
The goal of CIGNA's Working Well Program is to keep its 34,000 U.S. employees healthy and at work. The Working Well Program's annual budget is $2.5 million. The program is implemented at all 250 domestic offices. Working well has a broad range of programs for all employees with special emphasis on issues of concern to women who make up 76% of CIGNA's employees (U.S. Department of Health & Human Services, 2003).
The Working Well Moms Program encourages and supports breast-feeding. Over three-quarters of CIGNA women are of childbearing age. Breast feeding duration rates for participants are 72% at 6 months and 36% at 12 months, significantly higher than control groups and U.S. data. This has decreased pharmacy costs - 62% fewer prescriptions for breast-fed children. The program has also contributed to decreased medical costs - a savings of $240,000 in healthcare expenses. In addition, program participants have 74 fewer absences per 100 mothers, a savings of $60,000 in lost time annually (U.S. Department of Health & Human Services, 2003).
The Working Well Triumph Program provides skill training and support for disabled employees to improve their health, adopt healthy lifestyles, and reduce the likelihood of future disability leave. This program has resulted in healthcare costs savings of more than $900 per program participant (U.S. Department of Health & Human Services, 2003).
The Working Well Flu Shots Program provides free immunization inoculations at all significant employee locations. The program is aimed at reducing workplace absenteeism. Program participants have 29% less absenteeism as compared to employees not getting a shot. This produced a savings of $33 per employee participant. The overall return on investment for the program was 3 to 1(U.S. Department of Health & Human Services, 2003).
CIGNA's smoking cessation program, which combines behavioral counseling and pharmacologic treatment, is offered to all CIGNA employees and their benefits-eligible family members who want to quit smoking. The program helped 67 percent of its participants quit smoking after 12 months, a quit rate up to three times higher than comparable smoking cessation programs. CIGNA estimates saving $949 in health care costs for each successful participant, a return on investment of 9.5 to 1(U.S. Department of Health & Human Services, 2003).
To contact CIGNA for more detailed information, see: www.Cigna.com.
Becoming a partner of Wellness Works, you will contribute to the wellness of our employees resulting in a high return of investment. “You will also contribute to pointing out typical health promotion and disease prevention programs and provide health education to most or all of our employees.
“Designing this effective program will improve employee health and productivity and produce good returns on investment, you should partnering with an array of health and productivity programs (rather than focus on the "pure" wellness program) and integrate them with health and demand-management or disease-management activities” (U.S. Department of Health & Human Services, 2003) which begins here with the Capella Banking Bureau staff.
We plan to meet twice a month. The committee will be breaking into smaller teams where much of the work will occur. Getting to know how effective we work together is our main priority. We look forward to viewing your opinion to keep the Wellness Works program alive and active.

Thank you in advance for considering working with us on this important effort. I will be scheduling our first meeting. If you have any questions please feel free to contact me at bsimmons@outlook.com. (CDC, CDC: Center of Disease Control and Prevention, 2011).

Bertha Simmons
Well Program Director of
Capella Banking Bureau

References

Associated. (2014, May 27). The Bottom Line: Why you should integrate risk management and workplace wellness. (A. Richter, Editor) Retrieved August 31, 2014, from IB Madison Blogs: http://www.ibmadison.com/Blogger/The-Bottom-Line-By-Associated/May-2014/Why-you-should-integrate-risk-management-and-workplace-wellness/
CDC. (2011). CDC: Center of Disease Control and Prevention. Retrieved August 31, 2014, from CDC's LEAN Works! - A Workplace Obesity Prevention Program: http://www.cdc.gov/leanworks/why/index.html
U.S. Department of Health & Human Services. (2003, September). ASPE.hhs.gov: Assisting Secretary for Planning and Evaluation. Retrieved August 31, 2014, from Prevention Makes Common "Cents": http://aspe.hhs.gov/health/prevention/index.shtml#BUSINESSES

Similar Documents

Free Essay

Unit 7 Assignment 1

...Unit 7 Assignment 1: AD Password Policy Planning TO: Client I can understand you’re concerned with your company’s security after all information on competitors can be invaluable or very harmful to a company and this is why it must be protected from prying eyes. This does not have to mean that you have to lose productivity over trying to secure your networks information. I’m going to give you some tips on how to better secure your network with the tools that you already have at hand, keep in mind that you can also buy better security items to better protect you network things like; smart card, finger print scanners, and retinal scanners.   I only recommend these for really sensitive information and only for certain users in your company. On the server that is the DC log in to the administrator account and in the “Active Directory Users and Computers” in the Domain icon in the left pane click on the “Users” icon, you’ll be able to see all of the users in that domain. From here you can click on any user and make changes as necessary, for user names I recommend you use the following format; using capital and lower case letters the first letter of their name, their whole last name and their employee number, if someone tried to hack the account and all that they knew was the person name and the domain name they could not get in because it is very unlikely that they would know that person employee number and if they do then you have a spy in your company. As for passwords I recommend...

Words: 388 - Pages: 2

Premium Essay

Unit 7 Assignment 1

...Refraction, Reflection and Optics ITT Technical Institute Physical Networking – NT1310 11/10/2014 Refraction, Reflection and Optics Refraction The most common real life example used when discussing refraction is a straw in water. When a straw is placed in a glass of water and viewed from the side, it appears to be broken or bent. This is due to the difference in the refractive indices of air and water. Since water is denser than air, the straw appears to bend as the light it reflects is slowed by the density of the water. This phenomenon also makes submerged objects, such as fish look closer to the surface than they actually are. Another common example is a rainbow, where sunlight is refracted by raindrops. Sunlight consists of a mixture of different wavelengths, or colors, of light, with blue, for example, having a shorter wavelength than red. When this light passes through raindrops, the shorter wavelengths are bent more than the longer ones, splitting the light into its different colors. Reflection Pretty much everything you see could be considered reflection. The fact we can see is due to light reflecting off of objects and into our eyes. A good example, I guess, is the moon. When it glows at night that is just light from the sun reflecting onto the Moon's surface, and bouncing back, giving it that glow. Degradation of signal strength in fiber-optic transmission Some of the main factors that cause degradation are electromagnetic fields, heat, quality of fiber...

Words: 376 - Pages: 2

Premium Essay

Nt1310 Unit 7 Assignment 1

...Assignment 7 Siddhant Sharma 2013160 a) Division of Assignment In Assignment 6, we used an ADC to convert values that the LDR and NTC thermistor measured and make LEDs light up according to the particular threshold values. Here, we are required to take a user driven input from the terminal, check if the input is valid, and then see whether the LED light from the LDR or NTC is on or off. We do this using a UART library. We connect the MCU via a cable to a serial USB port, here : USB0. For taking an input from the terminal, we use a command called screen. Screen takes an argument for the port that the Arduino Microcontroller is connected to. In this case, it is USB0, therefore, command : screen /dev/ttyUSB0. Proper communication between...

Words: 592 - Pages: 3

Premium Essay

Nt1310 Unit 7 Assignment 1

...Unit 7. Assignment 1. Refraction, Reflection and Optics Refraction: The most common real life example used when discussing refraction is a straw in water. When a straw is placed in a glass of water and viewed from the side, it appears to be broken or bent. This is due to the difference in the refractive indices of air and water. Since water is denser than air, the straw appears to bend as the light it reflects is slowed by the density of the water. This phenomenon also makes submerged objects, such as fish look closer to the surface than they actually are. Another common example is a rainbow, where sunlight is refracted by raindrops. Sunlight consists of a mixture of different wavelengths, or colors, of light, with blue, for example, having a shorter wavelength than red. When this light passes through raindrops, the shorter wavelengths are bent more than the longer ones, splitting the light into its different colors. Reflection: Pretty much everything you see could be considered reflection. The fact we can see is due to light reflecting off of objects and into our eyes. A good example, I guess, is the moon. When it glows at night that is just light from the sun reflecting onto the Moon's surface, and bouncing back, giving it that glow. Degradation of signal strength in fiber-optic transmission. The main factors that affect this is number of connectors, splicing, Quality of Fiber / connectors, also not using an Attenuator according to the distance, or using dirty attenuators...

Words: 256 - Pages: 2

Free Essay

Unit 1 Assignment 7 Questions.Dcox

...Unit 1 Assignment: Homework 1. Why is the CPU the most important component in a computer? A. The CPU sends signals to control the other parts of the computer, almost like how a brain controls a body. The CPU is an electronic machine that works on a list of things to do, called 'instructions'. It reads the list of instructions and does each one in order. A list of instructions that a CPU can run is a computer program. 2. What number does a bit that is turned on represent? What number does a bit that is turned off represent? A. When a bit is turned on it represents a 1, when a bit is turned off it represents a 0. 3. What would you call a device that works with binary data? A. A device that works with binary data is called digital data. 4. What are the words that make up a high-level programming language called? A. The words that make up a high-level programming are called key words or reserved words. 5. What are the short words that are used in assembly language called? A. Short words that are used in assembly language are called Nmeumonics. 6. What is the difference between a compiler and an interpreter? A. A compiler translates a high-level language program into a spate machine language program. An interpreter both translates and executes the instructions of a high level program. 7. What type of software controls the internal operations of the computer’s hardware? A. The operating system is the software that controls the internal operations of the computers...

Words: 270 - Pages: 2

Free Essay

Nt1210 Unit 7 Assignment 1

...Unit 7 Assignment 1 Multiple Choice 1.) A 11.) C 2.) A, B 12.) A 3.) B, D 13.) A, D 4.) A 14.) C 5.) A 15.) B, C 6.) B, D 16.) B, D 7.) A 17.) C 8.) C 18.) B, D 9.) C 19.) A, C 10.) D 20.) B, C Key Terms Switched circuit - A circuit established through one or more intermediate switching devices, such as circuit switches or packet switches. Dedicated circuit - it is used in reference to a phone or data line, or to an electrical circuit. Circuit switching - a methodology of implementing a telecommunications link in which two network nodes establish a dedicated communications channel (circuit) through the network before the nodes may communicate. Packet switching - a digital networking communications method that groups all transmitted data into suitably sized blocks that are transmitted through a medium that may be shared by multiple simultaneous communication sessions. Leased line - connects two locations for private voice and/or data telecommunication service. Time-division multiplexing -a method of transmitting and receiving independent signals over a common signal path by means of synchronized switches at each end of the transmission line so that each signal appears on the line only a fraction of time in an alternating pattern. T-carrier system – one of several digital transmission systems developed by Bell Labs, sometimes called T-CXR. DS0 – a standard digital transmission rate for digital telecommunications, stands for Digital Signal Zero. DS1 –...

Words: 336 - Pages: 2

Free Essay

Is3230 Unit 7 Assignment 1

...Unit 7 Assignment 1 The scalability of the mobile computing in this infrastructure will benefit the school district by being cost effective and the IT technician would not have to monitor/manage many devices in this environment. Reducing the cost of deployment on WLAN implementation, you will want to address many areas of concern: individuals accessing your network, risk of deploying new Software/Configuration, compliant with standards and laws, classification, encryption, security, protocols, and the use of mobile devices. The implementation of access controls in your WLAN will assist in making your environment a little more secure than without. Utilization of the Acceptable Use Policy (AUP), will instruct staff members and students on how to utilize WLAN correctly by law, policies, and standards. Any individual that is not compliant will be subject to disciplinary measures by the school district. Staff members will use access control Role Base Access Control (RBAC), using this control will assign user rights based on the user’s job specification within the school. As for the student body, students will be issued temporary usernames and passwords that will be issued quarterly. Students will have minimum accessibility to files, folders, and services. All accounts are subject to being audited at any given moment notice. There will always be risk involved with any network. Deploying WLAN in a school environment will be a concern with security always. The protection of data...

Words: 499 - Pages: 2

Premium Essay

Is3230 Unit 7 Assignment 1

...| Unit 7 Assignment 1 | Implementation of Authentication Process | | | WLANs (wireless local area networks) are becoming increasingly prevalent, not only in schools, but in many businesses and establishments. They can provide a plethora of benefits within a school environment including flexibility, speed, and resource mobility. A WLAN would assist in ease of use, and make many of the day-to-day functions of school employees easier. If a WLAN were implemented into the school, it would need to have groups with users assigned to their pertinent groups. Possible groups include students, teachers, IT department, administration, counselors, and high-level admin (Principals, Vice Principals). Of course, within the teachers/educators group, would be all teachers in the classroom. Within the IT department group would be the IT department and any other employees involved in managing and configuring any IT systems. Within the administrators group would be anyone in the front office and does daily administration duties within the school. Counselors would include any student or education counselors in the office. Lastly, high-level administrators would be the highest ranking individuals in the school including the Principal and Vice Principal. With any network, including a WLAN, there are inherent risks involved. With a WLAN, the wireless aspect opens up additional avenues for hackers or data being compromised. There could be tech-savvy students who could access the network...

Words: 549 - Pages: 3

Premium Essay

Nt 2640 Unit 7 Assignment 1

...Scenario 1: End user complains of lack of connectivity to any resource not on the directly connected network. The host cannot ping its default gateway. The output of the “ipconfig /all” command is below. Also the IP address assigned to the router for that segment is also displayed below. What do you think the problem is with the configuration of this host? PC “ipconfig /all” output (summarized) Ethernet adapter Local Area Connection: Physical Address. . . . . . . . . : 00-AB-C5-00-00-00 DHCP Enabled. . . . . . . . . . . : No IPv4 Address. . . . . . . . . . . : 192.168.40.9 Subnet Mask . . . . . . . . . . . : 255.255.255.128 Default Gateway . . . . . . . . . : 192.168.40.254 DNS Servers . . . . . . . . . . . : 8.8.8.8 Router “show ip interface brief” Router# show ip interface brief Interface IP-Address OK? Method Status Protocol GigabitEthernet0/0 192.168.40.254 YES NVRAM up  up Answer: The problem is that either the IP address is wrong or the subnet mask is wrong. That is because the 192.168.40.9 IP address is not in the same subnet as the default gateway IP address (192.168.40.254). Changing the subnet mask to 255.255.255.0 or changing the IP address to 192.168.40.129 – 192.168.40.253 would resolve the problem. The ping command can be used to check for connectivity, and it was. The tracert command could have been used to see where the ping failed. Scenario 2: One user complains of lack of connectivity...

Words: 1499 - Pages: 6

Premium Essay

Unit 7 Assignment 1: Future Statement

...The new technology that is going to exist in the future will be a Nano Earpiece Turaion. This device will be hands free, it will only to attach to the user in the ear. What it is, a new modified, advanced, and shrieked version of a computer. Just that you would be able to control everything with your mind. For example, if you wanted to look for a song that you wanted to hear, you give the command in your mind, and the device automatically reacts to your command and bring ups the song. How this device works is that it reacts to the persons mind you see the brain gives out signals so the device is programmed to detect the person’s given signal and so they respond to the person’s command by bringing up what they want. This would benefit the society is easy to use, it can be carried anywhere and it would damage your ear drum. Those who work from home would benefit them, in which they would be able to do in chore or duty in the house while using the Nano Earpiece Turaion. Basically people of all ages will be able to use this device without a problem, it will make people lives easier, just by thinking about it they can use the internet and make payments, browse, anything the person tends to look up will be with a simple thought. I think it would do some impact in the economy therefore it will be used only by Wi-Fi so no more bills for the people using internet. I assume it will help politics in their work or any given relevance that could be useful to them for using the...

Words: 288 - Pages: 2

Free Essay

Mc2560 Unit 7 Assignment 1 Mobile Application

...David Lewandowski Mobile Communication Devices Unit 7 Assignment 1 Mobile Application A Static Web Application is any web application that can be delivered directly to an end user’s browser without any server side alteration of the HTM, JavaScript or CSS content. Static web applications generally refer to rich sites that utilize technologies in the browser instead of on the server to deliver dynamic content. The primary difference is that a traditional web app, the server is the one responsible for fetching the data and compiling it all into the HTML that the user then can see, while the static web application, the browser is responsible for doing that. Static Web Application: 1. The user agents browser sends a request to a static web server at a specified address 2. The Server receives the network request and maps the address to “barebones’ HTML file is stored on the server 3. The server sends the HTML file to the user agent, which will then render it and display it to the user 4. The JavaScript in the HTML pages uses the browser to connect to the data services and then fetches the information it needs to construct the content of the page you are on 5. The JavaScript in the web page, takes the data and manipulates the HTML of the page, updating it with the data the it fetched (Step 4) Advantage of Static Web Application: * Cheaper to Build * Quick to Build * Easier for Search Engines to Index * Quicker Load Times Disadvantages...

Words: 421 - Pages: 2

Premium Essay

Gs2745 Unit 7 Assignment 1: Calculating Credit Scores

...Unit 7 Assignment 1: Calculating Credit Scores Course Objectives and Learning Outcomes Identify the factors that determine someone’s credit rating. Calculate the cost of a loan given various ratings of the borrower. Analyze various personal finance scenarios dealing with student loans, personal consumer loans, mortgages, the true cost of bad credit, compound interest, savings, investing in assets, budgeting, and using self-control when spending. Assignment Requirements A credit score needs to be protected and improved. You need to understand the true value of a credit score by researching the causes of bad credit scores and how to improve them. Using the Internet and ITT Tech Virtual Library, you will research how the credit score is calculated and what influences the credit score. Answer the following questions in detail. How is your credit score (FICO) created? Who reports your FICO score? What are the factors in determining the FICO score? What steps could you take to improve your FICO score? Required Resources Skills for Living a Rich Life, Chapter 12 Computer with MS Word and Internet access ITT Tech Virtual Library Printer Submission Requirements Prepare a two- to three-page typed paper, double-spaced, using 12-point Times New Roman font. Please include appropriate references in APA format. This assignment is due at the beginning of Unit 8. GS2745 UNIT 7 ASSIGNMENT 1 How is your credit score (FICO) created? FICO Scores are calculated...

Words: 872 - Pages: 4

Premium Essay

Unit 7/365 Week 3 Assignment 1

...given to the customer so that we can call at any time to have access at night as well. Sale of each product or service, the customer service, it should be backed up as part of the quality assurance. Are delivered to customers in real time on an ongoing basis the hosting service and Internet, the customer immediately detect a problem even a little in the quality. That's why there is a possibility that the service has received final issue, a working knowledge of the customer support team 24/7/365 to resolve quickly the customer and must be Isp host. To retain customers, better chance support services from a variety of fast, of the company. To provide support to consumer Internet-related services that are many different ways. In particular, customer support services provided by the Web hosting company, is characterized by a truly great diversity of support channel. In this sense, you can get there is a chance you've noticed all queries, performed at high speed in the time frame of the solution. 24/7 support means the customer support service of 24 hours. It is a Quality Assurance Department that is provided by the Web host. To ensure uninterrupted service web hosting services of any, this is a feature high priority...

Words: 802 - Pages: 4

Free Essay

Unit 7 Assignment 1 Ip Trouble Shootin

...There are different tools available to help in the configuration and troubleshooting of networks. TRACERT and Ping are two of them. This assignment will be discussing troubleshooting procedures of both. These two tools of troubleshooting are among the most popular and can be used on Windows as well as other platforms. They are very simple to use and give out a lot of output but very little input. TRACERT decides the route by sending the first echo packet with a TTL of 1 and incrementing the TTL by 1 on each subsequent transmission until the target replies or the full TTL is reached. The TRACERT command determines where a packet stopped on the network. Default gateway found there was not a valid path for the host. Could possibly have a configuration problem with the router or network where several paths can be taken to arrive at the same place, or where several intermediate systems which can include a router or bride can be involved. Time Exceeded message is a command that is used by the TRACERT along with IP TTL field letting it be known that each router has a successive router in a route. A Port Unreachable message is a message that the traceroute command that the complete route has been found, and the command can quit. In conclusion of the TRACERT command, this tool is much better because it determines if the route works, and it can supply the IP address of each router in the route. Ping allows computers to talk between each other’s and this helps narrow down the cause of...

Words: 556 - Pages: 3

Premium Essay

Unit 7 Assignment 1 Ad Password Policy Planning

...Unit 7 Assignment 1 AD Password Policy Planning TO: Client I can understand you’re concerned with your company’s security after all information on competitors can be invaluable or very harmful to a company and this is why it must be protected from prying eyes. This does not have to mean that you have to lose productivity over trying to secure your networks information. Simple measure like user names and passwords can be used to protect less sensitive information however how strong you make those usernames and passwords can have a great effect on how well your information is protected. I’m going to give you some tips on how to better secure your network with the tools that you already have at hand, keep in mind that you can also buy better security items to better protect you network things like; smart card, finger print scanners, retinal scanners, etc. but I only recommend these for really sensitive information and only for certain users in your company. On the server that is the DC log in to the administrator account and in the “Active Directory Users and Computers” in the Domain icon in the left pane click on the “Users” icon, you’ll be able to see all of the users in that domain. From here you can click on any user and make changes as necessary, for user names I recommend you use the following format; using capital and lower case letters the first letter of their name, their whole last name and their employee number, ex. “JVentura10415867@Domain*%$.Local” if someone...

Words: 470 - Pages: 2