Premium Essay

Nt1330 Client Server Ii

In: Computers and Technology

Submitted By Claude37
Words 464
Pages 2
Claudine Estes
7144 Olive St
Kansas City, MO 64132
(913) 265-0362 Professional Experience

10/2010 – Present
Office Administrator
Devon’s Cleaning Service KC
2723 E 114th St #1309, Kansas City, MO

* Maintain a presentable, welcoming office environment including the lobby, conference rooms * Ensure that all client and vendor meetings are handled professionally, including set up and clean up * Proficient with the office technology in order to assist staff in meetings, and conference calls * Answer telephone, direct, screen calls, taking and relaying messages * Provide information to callers, greet clients and escort individuals to correct destination * Provide general clerical and administrative support to all levels of professionals * Schedule appointments, organize meetings, maintain appointment diary either electronically or manually * Prepare letters and documents, receiving and sorting out e-mail and deliveries * Ensure that common areas in office premises are equipped with required office supplies as appropriate * Monitor the use of equipment and supplies within the office.

6/2014 – 7/2015
Mail Insert Machine Operator
Pitney Bowes
6301 Equitable Rd, Kansas City, MO 64120

Job duties * Ensured that the mail is reviewed for proper date, postage, and good quality barcodes prior to being placed in the appropriate mail trays by verifying the zip codes on the mail match the mail trays properly * Checked for presort endorsement on the mail * Ensured that finished mail is organized neatly and placed right side up facing forward * Communicated errors found in the mail to operator or supervisor to prevent re-work of mail * Ensured postage metered rejects separated by postage rate and mail separated by specific jobs * Removed mail piece jams from machine by pulling mail backward and upward to…...

Similar Documents

Premium Essay

Client Server

...CLIENT SERVER PROGRAMMING AND MULTIMEDIA Introduction Client/server describes the relationship between two computer programs in which one program, the client, makes a service request from another program, the server, which fulfills the request. Although the client/server idea can be used by programs within a single computer, it is a more important idea in a network. In a network, the client/server model provides a convenient way to interconnect programs that are distributed efficiently across different locations. Computer transactions using the client/server model are very common. For example, to check your bank account from your computer, a client program in your computer forwards your request to a server program at the bank. That program may in turn forward the request to its own client program that sends a request to a database server at another bank computer to retrieve your account balance. The balance is returned back to the bank data client, which in turn serves it back to the client in your personal computer, which displays the information for you. The client/server model has become one of the central ideas of network computing. Most business applications being written today use the client/server model. So does the Internet's main program, TCP/IP. In marketing, the term has been used to distinguish distributed computing by smaller dispersed computers from the "monolithic" centralized computing of mainframe computers. But this distinction has largely......

Words: 2053 - Pages: 9

Premium Essay

Client/Server Technology

...Final Exam CIS145 – Introduction to Client/Server Technology Name: Gail Jamison Configuring Search Options Windows Search is the native file and index searching program used in the Windows operating system. Windows Search checks for keyword matches between a word specified by the user and the contents of files or the file name itself. Configuring Windows Search allows the user to specify what types of files are searched, as well as modifying index settings. Windows Search options are found in the Indexing Options portion of the Control Panel in all current Windows operating systems. Click the Windows "Start" button. Select "Control Panel" from the options. Click "Indexing Options" in Windows 7. For Windows Vista or XP, click "System and Maintenance" then "Indexing Options. Click the Advanced" option and provide permission when prompted. Configure any of the options in the current tab and "File Types" tab. Click "OK" once you are finished. Windows Search is now configured. Deploying and Managing WSUS The first step in the deployment of Windows Server Update Services (WSUS) is to make important decisions, such as deciding the WSUS deployment scenario, choosing a network topology, and understanding the system requirements. The following checklist describes the steps that are involved in preparing for your deployment. Synchronization is the process by which a WSUS server obtains the updates. WSUS is 3.0n SPI...

Words: 1131 - Pages: 5

Free Essay

Client and Server Security

...Table of Contents Project Outline 3 Security Requirements 4 Perimeter Security 5 Client and Server Security 10 Database Security 10 Server Security 12 Wireless and Remote Access Security 15 Security Configuration Management 19 References 23   Project Outline Tiger Tees is a medium sized business with 4 locations across the eastern United States. This company produces and sells t-shirts for school systems, both locally and across the country via the internet. The organization’s headquarters is located in Beckley, West Virginia, and employs 25 people. The departments include the warehouse, human resources, accounting, sales, and administration. The second location of Tiger Tees is located in Columbus, Georgia, and employs 10 people full time, and 4 persons part time. The third location is located in Washington, DC, and employs 15 people. The fourth location located in Richmond, Virginia is the smallest of all the locations employing 5 persons full time. Tiger Tees is a fast growing company in dire need of a secure network that will ensure that the confidentiality, integrity, and availability of client information remain confidential. All transactions completed are sent to the organizational headquarters in Beckley, WV and processed there. In the past these orders and transactions have been completed by telephone and e-mail. A secure wide area network would streamline this process making the transactions more secure, and providing faster service to the......

Words: 5336 - Pages: 22

Premium Essay

Client Server

...on each client Distributed Cache Mode 5) are previous versions of files. Volume Shadow Copies 6) are files changed since the last backup job Incremental Backup 7) is accessible from a Windows 7 instllation disk Windows RE 8) files cached on a central server Hosted Cache Mode 9) executes Power Shell commands on remote computers Windows Remote Management 10)includes configuration settings and registry information System Restore Point 1) What service priority guideline is NOT accurate? Rate issues according to how the issues affect senior management. 2) Place these troubleshooting steps in the correct order, using the procedure described in this lesson as your guide. Establish Symptoms, Most probable cause, Test results, Document Solution 3) Which Windows 7 tool does NOT aid in the network troubleshooting process? User account Control Panel 4) Which Windows 7 tool does NOT aid in the hardware troubleshooting process? Nslookup.exe 5) What operating systems cannot use Branch Cache? (choose all that apply) Windows Vista and Win Serv 2008 6) When you load Win RE from the Windows 7 installation DVD, the system provides you with a choice of recovery tools; what tool is NOT included? Win Easy Transfer 7) Place the following steps of the Windows 7 startup process in their proper order. Post, Initial Startup, Boot Manager, Boot Loader 8) Which Windows XP startup component is no longer needed in Windows 7? 9) Branch Cache is a client/server......

Words: 324 - Pages: 2

Premium Essay

Client Server Networking

...Servers can be configured with a variety of roles and typically need services and additional features installed or added to perform the specific tasks assigned to them. Some of these roles will include: domain controller, database server, backup server, file and print server, web server, and an email server. Based on the requirements of the company president and vice president, two servers running Windows server 2008 with 10 roles assigned between both should be sufficient to accommodate the needs of the company and all of the demands put to them. The server roles will include the file and print server role to allow all employees to share files with one another and store files in a centralized location as well as to print to a single shared printer. The application server role will allow all employees to access and use the GIS program as well as serve as the host for the World Wide Web and any and all web based application and download files. The email server role will provide all functions of needed for users to send and receive emails to and from one another as well as storage for email data until any of the users can log in and retrieve email. Another role the server will be tasked for is for Remote Access and VPN connections for offsite employees through any web browser and or email. The Domain Controller role will serve as a central repository of information or data store for the Active Directory and will make it possible for administrators to maintain......

Words: 461 - Pages: 2

Premium Essay

Client Server Networking 2

...NT1330 M1 March 18, 2014 Unit 1 Exercise 1 TASK You are setting up a new network for your company. You have a single location with approximately 145 hosts. Plans IT plans should accommodate 50% growth within the next 2 years. Growth 70 – 75 more hosts. What subnet range/s should be used? I would use a Classless addressing and start with a Network address with a Subnet Mask of This gives you 254 hosts per subnet which accommodates for your 50% growth over the next 2 years. For the time being you could use this one subnet and add another down the road if needed. If we add a second subnet down the road, and we are using DHCP, we would also setup a DHCP Relay Agent to relay the DHCP Broadcast messages across both subnets. Should IP addresses be dynamically or statically assigned? While you are setting this up, you can statically assign IP addresses for your servers, routers, firewalls, and printers. The rest of the computers and laptops should be setup to use dynamic IP addresses from DHCP. It should be standard security to have a firewall installed for your network to protect company information. You would have a router setup at access the internet for business purposes. If DHCP is used, should a router, firewall, or Windows Server be utilized and why? I would definitely setup a DHCP server to centrally manage your IP address pool. DHCP gives you a centralized administration point for dynamic IP configuration....

Words: 260 - Pages: 2

Premium Essay

Client Server 2

...ITT Technical Institute 3825 West Cheyenne Avenue, Suite 600 North Las Vegas, Nevada 89032 NT1330 Client-Server networking II Name: ____________________________________________________ Date: _______________________ NT1330 Week 1 Unit 1 Assignment 1 Instructions: 1. Complete this assignment and submit it prior to the beginning of the next class meeting. 2. Completely fill in the bubble for the correct answer(s), any other mark such as an X or just a line through it will be marked as incorrect. True/False Indicate whether the statement is true or false. 1. IPv6 uses 128 bits, or 16 bytes, for addressing, thus providing 2128 (about 340 billion) unique addresses. A True B False 2. Dynamic IP addresses can be assigned when administering TCP/IP hosts. These addresses must be configured and maintained manually. A B True False 3. Using DHCP relay agents eliminates the need to have a DHCP server on every subnet. A True B False 4. One benefit of the hierarchical structure of DNS is that it is possible to have two hosts with the same host names that are in different locations in the hierarchy. A B True False 5. ICS turns your computer into a router so that other computers on the local network can access its Internet connection. A B True False 6. If you inappropriately allowed network discovery in a public network environment (for example, an Internet café), you would allow total strangers to see and access any file shares on your system. A B True...

Words: 1872 - Pages: 8

Free Essay


...NETWORK MODELS CLIENT/SERVER & P2P 11/24/2014 Condarrial McCall | Condarrial McCall November 23, 2014 NT1110 CLIENT/SERVER -The roles of each computer in a client/server network are distinctive, affecting both the hardware used in every computer and the software installed in every computer. In a client/server environment there are many advantages such as, increased security, central administration, and making sharing better. Some examples of client/server networks; Windows Server 2003, Novell Netware servers, and Windows 2000 server. Some benefits of a client/server network are only a single computer, or group of computers can be the central of all the networking services that may be needed. The security is quite easy with this type of network model, since it can setup a single server to handle all information requests or login requests for the whole network. Meaning there can be one username and password for each individual user on the network. SERVER Is a computer on the network that provides other computers called (clients or workstations) with access to resources, such as disk drives, folders, printers, modems, scanners and internet access. Server run tasks for clients, file servers holds data and programs files for clients, mail servers holds and distribute email to clients. Servers can be used for different types of software and tasks. Servers tend......

Words: 704 - Pages: 3

Free Essay

Client Server Configuration

...Assignment 1 Client Server Configuration Unit 7 Assignment 1 Client Server Configuration Robert D Williams ITT-Tech MR. Brockman NT1230 Client Server Networking Friday, February 10, 2012 The hardware side should be set up with raided hard disks preferable in as a raid 6. There should be at least two NICs for each server to ensure that connectivity is not lost. IT recommends that we have at least three hours of a backup power available. In order to cut costs IT would like to if more then one server is required to set up virtual servers. The server roles that we network administration recommends would include, active directory services for security to ensure that they only authorized persons are accessing the system and to help to make sure that if necessary encrypt the information so that if the system is breached the information stays secure. An active directory domain services so that IT can manage the system better. This would include user profiles and is a required to add other services that will be needed as well. An active directory domain rights service is recommend to help ensure that only the users that need certain information have access to it. This also enables us to limit what some users can do with the information such as look or modify the information in a file. An application server, so that all employees will have access to needed programs to get their jobs done. A dynamic host control protocol and a domain name server are......

Words: 589 - Pages: 3

Premium Essay

Client Server Ii

...The IP address range you stated is of through You also said that you left Friday afternoon the day of the change and returned Monday morning to see that only some workstations had picked up the new leases from the new DHCP scope. I have come up with a couple solutions and approaches to just make sure everything you have done is right. First of all make sure you have implemented everything correctly in your DHCP scope range sometimes it’s a simple number mistake that can throw everything out the window also do the same for your subnet inputs any slight number will destroy everything that you are trying to achieve. Make sure the scope is under the established DHCP local role IP address range on your assigned server. My next approach would be to see if there’s connectivity between your user machines to the network. Make sure your NIC’s are all up to date and working. Most of these approaches I understand are very simple but it does not hurt to check up on. Another approach is rather long and very tedious but depending on how many users you have I would relay a memo to most of them with instructions to release their IP addresses and renew them through the console command input. I understand that most users may not have the required know how to do these tasks but for those I would actually go and input the commands manually and hopefully this will finally fix your problems. If there are still problems after you check all of these things feel free...

Words: 341 - Pages: 2

Free Essay

Udp Client Server

...UDP Client and Server The  UDP client and server are created with the help of DatagramSocket and Datagram packet classes. If the UDP protocol is used at transport, then the unit of data at the transport layer is called a datagram and and not a segment. In UDP, no connection is established. It is the responsibility of an application to encapsulate data in datagrams (using Datagram classes) before sending it. If TCP is used for sending data, then the data is written directly to the socket (client or server) and reaches there as a connection exists between them. The datagram sent by the application using UDP may or may not reach the UDP receiver. UDP client import*; import*; public class MyUDPClient {      public static void main(String[] args)      {          try         {               // InetAddress class is used to getting local address                InetAddress ia = InetAddress.getLocalHost();               //DatagramSocket class is used creating UDP socket               DatagramSocket ds=new DatagramSocket(1236,ia);               // this is message string passes to the server               String y="Hell srver i am client";               //converting this string in to byte array with help of getBytes() method                byte [] b=y.getBytes();               //creating DatagramPacket of byte array               DatagramPacket dp =new DatagramPacket(b,b.length,ia,8);               // send to the server socket               ds.send(dp);       ......

Words: 486 - Pages: 2

Premium Essay

Client Server Networking I

...------------------------------------------------- NT1230 ------------------------------------------------- Client-Server Networking I ------------------------------------------------- Homework Assignments Name: Ernani Narag Week 6 Homework: Due Week 7 Assignment 1: Ticket Escalation Assignment Requirements Respond to the following email, making recommended solutions and explaining the rationale for your recommendations: ---- FROM: Manager TO: Systems Administrator RE: Support Prioritization I am receiving complaints from department supervisors that their support issues are not being addressed in a timely manner. We need a ticket escalation policy to ensure business priorities are met, while managing end-user expectations. Please draft a policy describing how support requests will be prioritized. In addition to normal troubleshooting prioritization, please address the following departments: customer service, sales, accounting and marketing, prioritized in that order. How can we better manage these business requirements? ---- Submission Requirements Address all of the concerns of the manager and provide a recommendation. Microsoft Word. 1-2 pages. Self-Assessment Checklist I made recommendations to address all of the concerns in the email. | * | I explained my reasoning. | * | I composed a professional response. | * | I used critical thinking. | * | I have followed the submission requirements:File......

Words: 359 - Pages: 2

Premium Essay

Nt1330 Client Server Unit 2

...Junior Admin Dear Junior Admin After reading the problem you are having, I have also run across this issue before and would be glad to offer what advice I can. I know how frustrating this can be especially when you feel like you have done everything right only to have the network get the better of you. A DHCP scope only determines which IP address is allocated to the clients. A scope defines the set of IP address and associated configuration information that can be supplied to a DHCP client. As you are aware a scope must be defined and activated before a DHCP client can use the DHCP server for dynamic TCP/IP configuration. You are more than able to configure as many scopes on a DHCP server as you need on your network environment. You are aware that as a DHCP administrator you can create one or more scopes especially on one or more Windows Server 2008 which is running the DHCP server service. However because the DHCP server do not communication scope information with each other, you must be careful to define the scopes on multiple DHCP servers as they are not assigning the same IP address to multiple clients or assigning addresses that are statically assigned to existing IP hosts. The IP addresses defined in a DHCP scope must be contiguous and are associated with a subnet masks. If the addresses you want to assign are not contiguous you must create a scope encompassing all the addresses you want to assign and then exclude specific addresses or address ranges from the......

Words: 398 - Pages: 2

Free Essay

Nt1330 Client Server Networking a multi-master database. As such, is can be updated by any Domain controller that is writeable. There are some sensitive operations that need to be more strictly controlled than others (schema management and adding or removing one or more domains from an active directory forest) that are specified roles. This means that only one domain controller in the replica ring can provide a specific operation. To find the roles being held by the domain controllers, the best tool to use would be the ntdstil. Using this tool, do the following: 1 Go to the Start button 2 Type “roles”, hit enter 3 Type “connections”, hit enter 4 Type “connect to server (name of server) and (name of domain), press enter 5 Type “quit”, press enter 6 Type “select operation target”, press enter 7 Type “list roles for connected server”, press enter, and quit A system can have only one schema master and domain naming master in the entire forest and only one PDC, RID and IM in your domain. If any of the domain controllers fail, then you can transfer the roles or seize them. The Primary Domain Controller Emulator is the role which carries the highest importance in the domain (since it is responsible for the password changes and/or account lockout, as well as the Group Policy Object setting changes in the domain). However, if the domain controller holding PDC fails there will be no immediate impact. Once you find that the domain controller holding the PDC has gone down, then you......

Words: 316 - Pages: 2

Free Essay

Client Server Analysis

... Client/Server Analysis: Project Part 2 Paul Elander ITT Technical Institute Professor Alan Stern Client-Server Networking I 5/21/2014 Upon further review of the client, Home Hospice Care (HHC), the options for upgrading to a new Windows operating is feasible but with limitations. Windows 7 Ultimate would be the preferred edition to install. Choosing Windows 7 Ultimate as the preferred operating system has all the features of Windows 7 Professional but has many more available extras which may prove valuable to Home Hospice Care’s infrastructure. This edition provides more flexibility and stability within their network and offers more capabilities than the Professional Edition. Unfortunately, Home Hospice Care does not qualify for Windows 7 Enterprise Edition. With features like Encrypting File System (EFS), Server Domain Joining, Software Restriction Policies, and many more features which adds security and helps to simplify the IT administrative tasks. When upgrading to Windows 7 from Windows XP, the process is simple: Wipe-and-Load installation. I had chosen to incorporate eleven (11) workstations at the Home Hospice Care’s facility. The workstations’ will be located at central or key points within the company’s infrastructure and positioned within specific offices. The first workstation will be located at the receptionist’s desk and have the computer name: REC1 (allowing for expandability if the company adds another receptionist in the future). Workstations two (2)......

Words: 1465 - Pages: 6

William Holden | Seau Systme | Edward Keane