Free Essay

Nt1210 User-Profile

In: Computers and Technology

Submitted By reaver28
Words 326
Pages 2
Ellery Corley
NT 1230
Wednesday
Unit 4. Exercise 1
User-Profile Scenario

From: Systems Administrator
To: Manager

I have reviewed your email inquiry and have the following recommendations.

1. Interns should not have the level of access that allows the changing of their workstations. Thus all interns will be combined into a group for restricted access. This group will be given standard access, not allowing for any changes to workstation unless authorized by System Administrator. This includes the changing of their password every 60 days. 2. Team leads need to have access to their files from any workstation. Thusly, all team leads will be assigned roaming user profiles. This will allow any team lead to access any work station at their convenience as long as the computer is on the network. This will also require team leads to lock or sign out of a work station when they are not using it. Due to the level of access and availability of said access, Team Lead passwords will be set to be changed every 30 days. 3. Since to Marketing Staff have dedicated work stations, they will be added to an ACL, and be designated user rights applicable to their needs. As System Admin, I do understand the need for access to applications, storage, the network, and the ability to change and customize as needed. Due to the level of access that the Marketing Staff will be assigned, they will be required to change their passwords every 30 days. They will be given a list of password protocols to follow when assigning their passwords. They will also be required to lock their work stations when not at their desks.
These system changes will take place by end of business today. Emails will be sent to all users affected by the changes outlining changes, protocols and requirements. Please direct any further questions or concerns directly to the System Administrator.

Thank you for your time,
Ellery Corley
System Administrator…...

Similar Documents

Free Essay

Profile

...English 134 24 January 2012 The Man Behind the Camo, by Kelly McBride, is a profile that focuses on the author’s younger brother, Scott, and his experiences with the concept of manhood. McBride goes about this by describing past events like childhood traditions and activities that she shared with Scott, and then providing her own commentary and thoughts on the matter. McBride’s detailed recounting of her personal experiences helps make this piece a well-written profile because it effectively gives the reader insight into Scott’s childhood as well as their relationship as brother and sister. This firsthand source (memories written onto paper) helps the reader to feel as if they were really there, and makes them more aware of what the actual events were like and how they helped McBride come to the conclusions that she did about Scott and masculinity. The author uses both quotes and detailed imagery to portray her brother in this profile, a combination that both appeals to the senses and works very well to describe events. McBride uses quotes to emphasize or confirm the memory that she is currently describing, which helps to lend the reader a hand and give them a real example of the subject while helping to align the author’s train of thought and the story. For example, when McBride is recalling Scott’s first venture into manhood in the form of football she quotes him saying “’All of my friends were doing it that year. Football is just kind of the ‘guy’ thing to......

Words: 640 - Pages: 3

Free Essay

User

...User DYING, DEATH AND GRIEF: CHAPLAIN PAUL G. DURBIN, PH.D.: TRIBUTE TO DR. ELIZABETH KUBLER-ROSS (2004): THEORIST ON GRIEF DIES AT 78: DR ELIZABETH KUBLER-ROSS DIES AT 78:  [New Orleans Times-Picayune: Aug 26, 2004: The Associated Press] ELISABETH KUBLER-ROSS DIES AT AGE 78 ON AUGUST 24, 2004: [From Elisabeth Kubler-Ross website: http://www.elisabethkublerross.com/ ]: (Taken from a seminar manuscript "Dying, Death and Grief"  By Chaplain Paul G. Durbin, Ph.D.) From the Book of Ecclesiastes, the 5th verse of the 9th chapter, we read, "For the living know that they shall die." Life is but a short journey from the cradle to the grave. For some death comes early in life, for others in the middle years and for some it comes with old age. Whatever period of life death occurs, it comes to all. Death is the great equalizer for it comes to the rich and poor, the loved and unloved, the happy and the sad, to the male and female, the good and the bad. In some cases death can be postponed or delayed, but eventually it comes to all. None of us are exempt as we realize that one day, we too must die. Dying, death and bereavement are fundamental and pervasive aspects of the human experience. We can only achieve fullness of living by understanding and appreciating these realities. The absence of such understanding and appreciation may result in unnecessary suffering, loss of dignity, alienation and diminished quality of living. Though education about dying, death and bereavement should be......

Words: 1192 - Pages: 5

Free Essay

Nt1210

...An operating system is the framework that allows you to communicate with computer hardware in an interactive way (Answers Corporation, 2013). Without this, you would not be able to tell the computer to do anything and it would not have any instructions to follow (Answers Corporation, 2013). This is why it is important for a computer to have an operating system (Answers Corporation, 2013). There are three main operating systems Windows, Mac, and Linux. When it comes to popularity and market share the most popular operating systems are Windows and Mac. Linux is an operating system that is popular with desktop users (HubPages, 2013), According to HubPages, “Windows is the Operating System with the largest market share. However, this doesn’t make it the best when it comes to quality and consistency as it is constantly marred with problems of viruses and malware (HubPages, 2013).” It usually had an affordable price tag at first, but the consumer is charges extra items like soft wear and anti-virus expenses that add up (HubPages, 2013). Linux is usually thought as a less effective than Mac and Windows, however it does offer many software programs that are similar to the Windows and Mac programs for free (HubPages, 2013). All three computer operating systems have Intel processors that make them unique. According to Pearson Certification Team, “Macintosh computers have Intel processors, they are not PCs. Likewise, the Mac OS is not compatible with PC hardware, and PC- based......

Words: 399 - Pages: 2

Premium Essay

Nt1210

...Unit 10 Assignment 1: 1. Which of the following lists a need of transport layer protocols that can be met by the TCP/IP network layer protocol? C 2. Which of the following answers list a need of application layer protocols that can be met by the TCP/IP transport layer protocol?(choose three answers.) A,B,E 3. Which of the following answers lists a service provided by an application layer protocol to the application? A 4. A user opens email client software on her tablet computer after connecting to the Internet. The user successfully downloads her latest email. Another student happens by and starts spouting off about how the first student has been using. Email,POP3,IP,TCP,HTTP,802.11 and other acronyms all just to check email. The first student just stares at this second student, but it does cause the first student to wonder. Which of the following answers accurately describes where some of these features are implemented on the tablet? D 5. A user of a tablet computer goes to a coffee chop and connects to the internet through a wireless LAN. The user then connects to the web server somewhere far away in the internet. Which of the following statements are true about the messages that flow from the tablet’s web browser towards the web server? (Choose two answers.)B,C 6. Which of the following answers accurately describe the size of the TCP,UDP, and IP headers, assuming that the headers include no additional optional field?(Choose three answers.)A,B,C 7. When thinking......

Words: 1059 - Pages: 5

Premium Essay

Profile of Social Media Users and Implication for Improving Teaching-Learning Process

...PROFILE OF SOCIAL MEDIA USERS AND IMPLICATION FOR IMPROVING TEACHING-LEARNING PROCESS AMONG 2nd YEAR BUSINESS ADMINISTRATION STUDENTS OF THE UNIVERSITY OF THE EAST-CALOOCAN ON THEIR 1ST SEMESTER ACADEMIC YEAR 2014-2015 In partial fulfillment Of the requirements for Technical Research and Report Writing By Evangelista, Paulene P. Fajardo, Lyra F. Munoz, Elizabeth P. Paguirigan, Jann-Erika A. Reyes, Jaien Denise CHAPTER 1 Profile of Social Media Users I. Introduction Social media is a popular trend today, especially among college students. Businesses are always looking for new ways to reach customers, especially ones readying to enter the work force. It helps us to interact to the other people around the world.As what Daniel Goleman said (Daniel Goleman, 2013) “Smart phones and social media expand our universe”. We can connect with others or collect information easier and faster than ever. In today’s world where Internet has experienced tremendous growth, social networking sites have become highly significant in peoples’ lives. Social networks are most commonly seen as a technology used only for entertainment purposes. However, they can also be used for serious purposes in business and education environments because they are powerful tools that can accomplish various roles and purposes. It is important to do research on them from an information system and information science point of view by analyzing user information behavior so we can see trends and......

Words: 2306 - Pages: 10

Free Essay

Nt1210

...NT1210 Unit 4 Labs Unit 4 Labs NT1210 8/4/14 Unit 4 Labs Lab Review: 4.1 – Page: 82 and 83 1. To eliminate the crossover issue, lower the amount of equipment and cost. Simplify a network. 2. To increase the maximum distance for a signal. If put after the maximum distance the signal may degrade. 3. The connection and processing speed. It also depends on the number of connections the computer or laptop will allow. Lab Review: 4.2 – Page: 85 1. A. Bend Radius: The minimum radius that a fiber optic cable can be bent without loss of light or impairment. A general rule that it be no less than 15 times the cable diameter B. To not affect a signal sent down the line. 2. The core/Glass Filament, Cladding, Buffer, Strengthener and Outer Jacket. Lab Review: 4.3 – Page: 90 1. Ease of installation, lack of certified fiber optic specialists and changes to the physical design of the network later on. 2. By limiting the devices needed depending on the distance and need of each network. Verify the number of access points needed before the start. Lab Review: 4.4 – Page: 95 1. By selecting a specific layer and testing the health you can definitively say the problem lies either below or above that layer. Example: test the Transport layers health if it is ok you know the problem is in the Application layer. 2 A. B. If the cable is damaged in any way it should be checked. ----------------------- 3...

Words: 255 - Pages: 2

Premium Essay

Nt1210

...jacket/insulation. 7. Next, verify all the wires are in the correct order, and insert the connector into the crimping tool. Crimp it! This requires a little bit of strength, and you may need to use two hands. 8. Now repeat steps 1 through 7 for the opposite end of the patch cable, and you’re finished. This document is provided for informational purposes only and TechRepublic makes no warranties, either expressed or implied, in this document. Information in this document is subject to change without notice. The entire risk of the use or the results of the use of this document remains with the user. The example companies, organizations, products, people and events depicted herein are fictitious. No association with any real company, organization, product, person or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of TechRepublic. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. NOTE: Remember that these instructions are only a general guide. Your actual experience will depend on the tools and materials you are using. Published: Oct. 5,......

Words: 912 - Pages: 4

Premium Essay

Nt1210 Review Questions

...NT1210 Cynthia Allen Unit 7 Chapter Review Questions Key Terms 1. Switched Circuits – A circuit created by the phone company in reaction to signaling ( the user tapping telephone keys or modem sending the same digits w/ the Telco tearing down the circuit when the user is finished. 2. Dedicated circuit – A electrical circuit created by a telco CO. on behalf of a customer, with circuits staying up all the time, dedicated for use by the customer that ordered the circuit, also known as leased lines, leased circuit and point to point. 3. Circuit switching - The overall process by which a series of Telco devices called circuit switches connect a circuit from one customer to another, with the device taking bits on one segment in the link and forwards those bits out the matching outgoing segment without storing the bits. 4. Leased line – A physical link between two locations provided by Telco, that allows two way communications between sites. Because the customer does not own the physical line between the sites, but rather pays a monthly fee for service called a leased line “AKA” dedicated circuit, leased circuit, and point-to-point. 5. Packet switching – The process of forwarding customers data in a WAN by looking at the header of the header of the message sent into the WAN by the customer and making a peer message (per-packet) decision as to where to forward each message. 6. Time –division- multiplexing –A type of logic used by some networking devices including......

Words: 451 - Pages: 2

Premium Essay

Nt1210

...Lab 1.1 Analyze OSI & TCP/IP Networking Models | OSI Layer | Layer Name | Layer Functions | Fill in two or three protocols per layer | Matches with TCP/IP Layers | 7 | Application | How the user or user application gain network access | | Application | 6 | Presentation | Responsible for interoperability between sender and receiver who might using different encoding schemes | | Application | 5 | Session | Establishing, maintaining, and terminating communications between processes or applications across the network | | Application | 4 | Transport | Ensures that the entire message sent from a sender to a receiver has been delivered | | | 3 | Network | Ensures the delivery of individual packets across network links | | | 2 | Data Link | Takes unpackaged bit stream data and packages into units called frames and attaches physical address to each frame | | Network Access | 1 | Physical | Transmit an unpackaged bit stream over some type of physical medium | | Network Access | Analyze TCP/IP networking Model | TCP/IP Layer | Layer Name | Layer Functions | Fill in two or three protocols per layer | 4 | Application | Equivalent to the application, presentation and session layer of the OSI model | DNS, HTTP, SMTP | 3 | Transport | Establishing and maintaining end-to-end communication between the sender and receiver | TCP, UDP | 2 | Internet | pack data into data packets known as IP datagrams, which contain source and destination address......

Words: 550 - Pages: 3

Premium Essay

Profile

...comp#1 unit 4, lab#1 Ms. Anderson Profile A loving mother is always a blessing but a loving and understanding mother can be hard to find. In one instant as kid I decided to take her car for a joy ride in the middle of the. On my way home I decided to take the 1996 honda civic off-road. Before I can get ten feet from the concrete the car is stuck teetering. I go home and try to find a way to bring it back before she goes to work. Being a kid I was worried about getting in more trouble then I could hand so I grab some tools and try to pop the steering colum to make it seem like it was stolen. Maybe a year later I decide to take my grandfather’s truck for a ride. I was gone for a half an hour. In the mist of being gone I was distracted will driving and whent up a curb into the trunk of a parked car. After leaving the seen I end up going to make sure no one got hurt and was arrested. Later released to my grandparent’s custody. I end up staying there although I was dreading going home. I could not pop the steering colum so I went home and went to sleep. When morning came my stepdad went in the garage to smoke a cigarette and found the car missing. He woke up my mom and the where frantic looking for the car. After about ten minutes they come in my room asking what did I with the car I told the I didn’t know what happen. So the end up reporting the car stolen after an hour of lies I finally said “I know were the car is because I took it and got it stuck.” Even after all the...

Words: 522 - Pages: 3

Premium Essay

Nt1210

...C 6. A, B, C 7. C, D 8. A, C 9. D 10. A 11. A 12. B 13. D 14. B 15. A 16. B, C 17. C, D 18. A .19. C 20.B, D Define key terms Transmission control protocol- a set of rules (protocol) used along with the Internet Protocol to send data in the form of message units between computers over the Internet. User datagram protocol- a communications protocol that offers a limited amount of service when messages are exchanged between computers in a network that uses the Internet Protocol. Flow- a directed graph where each edge has a capacity and each edge receives a flow. TCP segment- The unit of transfer between the TCP software on to machines UDP datagram- part of the Internet Protocol suite used by programs running on different computers on a network. Source port- the port from which a packet is sent. Destination port- Identifies the port number of a destination application program. Well-known port number- the port numbers that are reserved for assignment by the Internet Corporation for assigned names and numbers for use by the application end points that communicate using the Internet's transmission control protocol or the user datagram protocol. Dynamic port- is a private port. TCP segmentation- TCP receives data from an application and segments the data into pieces. This segmentation is necessary so that the information can be placed inside the TCP data field. Guaranteed delivery- is the guarantee the delivery of an octet. Error......

Words: 282 - Pages: 2

Free Essay

Nt1210

...NT1210 INTRO TO NETWORKING UNIT3 LAB3.3 The TCP/IP Model Mr. Randy Vogl Gus Perez 19593003 The TCP/IP network model Exercise 3.3.1 What are the distinct differences between OSI and TCP/IP models? TCP refers to Transmission Control Protocol. OSI refers to Open Systems Interconnection. Model TCP/IP is developed on points toward a model the internet. TCP/IP has 4 layers. OSI has 7 layers. TCP/IP more reliable than OSI OSI has strict boundaries; TCP/IP does not have very strict boundaries. TCP/IP follow a horizontal approach. OSI follows a vertical approach. In the application layer, TCP/IP uses both session and presentation layer. OSI uses different session and presentation layers. TCP/IP developed protocols then model. OSI developed model then protocol. TCP/IP offers support for connectionless communication within the network layer. In the network layer, OSI supports both connectionless and connection-oriented communication. TCP/IP is protocol dependent. OSI is protocol independent. http://www.differencebetween.net/technology/internet/difference-between-osi-and-tcp-ip-model/ Read more: Difference between OSI and TCP IP Model | Difference Between | Difference between OSI vs TCP IP Model http://www.differencebetween.net/technology/internet/difference-between-osi-and-tcp-ip-model/#ixzz3f4nyPzTU TCP/IP model protocols and functions. Exercise 3.3.2 Identify the layer in which each protocol resides according to the TCP/IP model. Using figure 3.4 from the......

Words: 1306 - Pages: 6

Premium Essay

Nt1210

...NT1210 LAB 1.1 1.1.1 2931 103 102 101 100 1000 100 10 1 2 9 3 1 ___________________ 2000 + 900 + 30 + 1 = 2931 1.1.2 1102 22 21 20 4 2 1 1 1 0 ________________ 4 + 2 + 0 = 6 1.1.3 112 21 20 2 1 1 1 __________ 2 + 1 = 3 1.1.4 Exercise 1.1.4: Create an expanded mapping for binary number 10010 subscript 2. 2^7 | 2^6 | 2^5 | 2^4 | 2^3 | 2^2 | 2^1 | 2^0 | 128 | 64 | 32 | 16 | 8 | 4 | 2 | 1 | x | x | x | x | x | x | x | x | 0 | 0 | 0 | 1 | 0 | 0 | 1 | = 18 = 18 0 | 0 | 0 | 0 | 16 + | 0 + | 0 + | 2 + | 0 | Exercise 1.1.5: Create an expanded mapping for the......

Words: 252 - Pages: 2

Free Essay

Nt1210

...NT1210 Lab 3 3.1.1 If wireless devices where not governed by the Wi-Fi alliance it would make it hard to communicate hardware and software between different machines. That would mean cable providers, cellphone providers, and internet providers would all have to use their own Wi-Fi frequencies. Without the WI-FI alliance it would be to hard to manage day to day life with all devices not being able to share hardware and software. Also there would be no real security so it would be easy for someone to hack all of your information. 3.1.2 A model that is used to visualize something that I would use is power points. It is easier to explain something to someone when you break down the information into slides and show key points. Power points make information easier to understand. 3.1.3 Data Link Physical Application Network Transport 3.1.4 If the model is to general then you wouldn’t understand it. If the model is to granular then the data would begin to overlap itself. Review.3.1 1. The data wouldn’t be filtered correctly so there would be connection errors. 2. (OSI) started in the 1970s, with a lot of progress on individual standards in the 1980s, and with vendor products appearing by the early 1990s. It was created to compete with TCP/IP. It broke everything into layers and each layer provided facilities to the layer above it and below it. 3. (TCP)/IP resulted from research and......

Words: 334 - Pages: 2

Premium Essay

Users

...------------------------------------------------- Investers Present and potential owners (investors) are prime users of financial statements. They continually assess and compare the prospects of alternative investments. The assessment of each investment is often based on two variables: expected return and risk. Expected return refers to the increase in the investor’s wealth that is expected over the investment’s time horizon. This wealth increase is comprised of two parts: (1) increases in the market value of the investment and (2) dividends (periodic cash distributions from the firm to its owners). Both of these sources of wealth depend on the firm’s ability to generate cash. Accordingly, financial statements can improve decision making by providing information that helps current and potential investors estimate a firm’s future cash flows. Risk refers to the uncertainty surrounding estimates of expected return. The term expected implies that the return is not guaranteed. For most investments, numerous alternative future returns are possible. For example, an investor may project that a firm’s most likely return for the upcoming year is $100,000. However, the investor recognizes that this is not the only possibility. There is some chance that the firm might generate returns of $90,000 or $110,000. Still other possibilities might be $80,000 and $120,000. The greater the difference among these estimates, the greater the risk. Financial statements help investors assess risk by......

Words: 1348 - Pages: 6

Вероника. Беглянка | Euro PVC Black Heel Big Buckle Female Sandals | Baixar toque para celular