Premium Essay

Unit 7

In: Computers and Technology

Submitted By dgardner12j
Words 285
Pages 2
Unit 7 Assignment 2: Design an Encryption Strategy
One security option that should be used is the Privacy option for confidentiality. This will help keep information from prying eyes unless the user is authorized. Sensitive information such as SSN (social security numbers), personal home addresses and phone numbers, or other personal information will be kept from employees that do not have the permissions to see this. This should be implemented on all of the managed networks/domains. Richman Investments should use the Access control feature. Using access control will restrict access to network resources and would require the user to have rights/privileges to the information. Used alongside the first feature, this gives the users proper permissions to information and this will help keep users out that don’t need or have access to those sections. Finally, would be to use the Receipt feature. This will help ensure the user that the item they are emailing is getting to the proper user and destination. The user sending the email will receive a receipt stating that the person has received the email. This helps the sender knows that the user got their email and not someone else. It should also be set up once the email is opened, depending on the content of the email; a second conformation receipt is sent stating a time stamp of exactly when the email was read. All emails should include a digital signature so that users know that it came from someone in the company.
Many work better when combined with other security features. Once the groundwork has been laid, Richman Investments should decide if there are any other functions needed to add on as their policies become more…...

Similar Documents

Free Essay

Unit 7

...communication that occurs in one direction only. 5) A half-duplex (HDX) system provides communication in both directions, but only one direction at a time (not simultaneously). 6) A full-duplex (FDX), or sometimes double-duplex system, allows communication in both directions, and, unlike half-duplex, allows this to happen simultaneously. 7) Photodiode is a type of photo detector capable of converting light into either current or voltage, depending upon the mode of operation. 8) Amplitude modulation (AM) is a technique used in electronic communication, most commonly for transmitting information via a radio carrier wave. 9) Analog (or analogue) transmission is a transmission method of conveying voice, data, image, signal or video information using a continuous signal which varies in amplitude, phase, or some other property in proportion to that of a variable. 10) Data transmission, digital transmission, or digital communications is the physical transfer of data (a digital bit stream) over a point-to-point or point-to-multipoint communication channel. 11) Sample rate defines the number of samples per unit of time (usually seconds) taken from a continuous signal to make a discrete signal. 12) Electromagnetic Wave a wave of energy having a frequency within the electromagnetic spectrum and propagated as a periodic disturbance of the electromagnetic field when an electric charge oscillates or accelerates. 13) Refraction is the......

Words: 721 - Pages: 3

Free Essay

Unit 7

...Unit 7 Assignment: Federal Regulations & Letter Stephanie Royer PA 201-02 Introduction to Legal Research Professor Cynthia Middleton July 2, 2013 Stephanie Royer 9104 Doane Ave Las Vegas NV, 89143 702-472-3193 Stephaniedawn76@hotmail.com July 2, 2013 Mike Jones Town Manager 2250 Las Vegas Boulevard North North Las Vegas, Nevada 89030 Dear Mike Jones: I am a long-time resident of our city, and I am writing to express my concern about the recent discussion with others in our community regarding the possibility of high levels of lead in our drinking water. While, I am hoping that the town takes the required actions to make sure our drinking water is safe, I would like to remind you of the long history of drinking water protection. In 1974 Congress passed an act called The Safe Drinking Water Act (SDWA) 42 U.S.C. §300f et seq. (1974), it is the main federal law that ensures the quality of Americans' drinking water. In 1986 the law was amended to include rivers, lakes, reservoirs, springs, and ground water wells. SDWA rules and regulations apply to every public water system in the United States, but allows individual states the opportunity to set and enforce their own drinking water standards as long as the standards are at least as equal or exceeding EPA’s national standards. Most states oversee their own water systems within their borders. In Nevada, The U.S. EPA has granted the NDEP (Nevada Department Environmental Protection) primary......

Words: 611 - Pages: 3

Premium Essay

Unit 7

...Self-Managed Teams Jadira Maldonado Kaplan University MT140-01 Professor Whitley Self-Managed Team Using self-managed teams within the Sandwich Blitz company would help the company grow. This will also allow Dalman to have more time to concentrate on the expansion as well. Self-managed teams empower employees most often in manufacturing, workers are trained to do all most of the jobs in the unit, they have no immediate supervisor, and they make decisions previously made by the first-line supervisors (Bateman & Snell, 2012). Self-managed teams can offer several possible advantages that could be used at Sandwich Blitz; including stronger commitment, employee and customer fulfilment, improved quality, improved productivity, and faster product and service development. On the other hand there will be some drawbacks. Self-managed teams are tough to execute, and failure is a risk when used in an unsuitable situations, or lacking appropriate leadership. A number of organizations have been dissatisfied with the results from self-managing teams. In the case of Sandwich Blitz, self-management teams may work to a sure extent, for example, having the team members cross-trained to do various jobs. This will enhance the flexibility of the team in dealing with staff shortages and in addition to help out with Dalman having to help fix every problem managers have. Thus applying Dalman and Lei’s knowledge of work procedures with the teams would help the team members to find a......

Words: 450 - Pages: 2

Premium Essay

Unit 7

...sociological perspectives and theory can be used in the planning of health care services for the UK population. The main focus of your work is for you to find out information on different sociological perspectives, define the meaning of health and ill health and explore the biomedical and socio-medical models of health. You will present your findings to the rest of your team. Task 1 (P1) - Produce a report which explores and explains the meaning of different sociological perspectives. Make sure that you look at Functionalism, Marxism, New Right, Feminism, Interactionism, Collectivism and Postmodernism. You must outline sociological terminology and use this when describing the perspectives. Please ensure you use key terminology from this unit in your explanations. Task 2 (P2) - Write a letter of at least 600 words identifying the different concepts of health and ill health. You should begin your letter with an introduction outlining the difficulties of defining health and illness. Ensure that you refer to the work of others and identify your sources. Task 3 (P2) Compile a leaflet that can be included with your letter to the Health Care Commission about the 2 models of health. Describe what each model says about the causes of health and illness and include pictures to highlight your points. Task 4 (M1) - Write an account of at least 800 words about how the biomedical and socio-medical models of health apply in everyday practice. You may wish to use a case......

Words: 1176 - Pages: 5

Premium Essay

Quiz Unit 7

...UNIT 7 Quiz 3: ------------------------------------------------- 1. What is a question answered by a Claim of Fact? a. True or False? b. Did it happen? Does it exist? (Correct answer) c. What should we do about it? d. How? 2. What is a question answered by a Claim of Cause? a. Why? b. Why not? c. What caused it? What are its effects? (Correct answer) d. Is it good or bad? 3. What is a question answered by a Claim of Definition? a. What if? b. What is it? How should we define it? (Correct answer) c. Did it happen? d. Does it exist? 4. Would an essay on gun control be a _________________? a. Claim of fact? b. Claim of cause? c. Claim of value? (Correct answer) d. Claim of policy? (Could be) 5. Would the sharing of U.S. information (Wikileaks) be a __________________? a. Claim of fact? b. Claim of cause? c. Claim of policy? (Correct answer) d. Claim of value? (Could be) 6. What are the (3) parts present in any argument? a. How, what and where? b. To be or not to be? c. Claim, Support and Warrants (Correct answer) d. Ideas, facts 7. The Greek words used to refer to the “proofs” are: a. Roman Empire b. Toga Party c. Logos (logic) Ethos (credibility) Pathos (emotion) d. Aristotle, Atheros 8. What is Argument from Cause? a. Blames the author or writer b. Strips down the actual thesis ...

Words: 362 - Pages: 2

Premium Essay

Unit 7

...PS 300 Research Methods Kaplan University Unit 7 Research question My research question is “Are children who play video games more likely to be violent?” My hypothesis is “Kids who violent video games increases aggressive thoughts, angry feelings, and physiological arousal, and those who play non-violent will lead a happy life. Prior research has found common trends among children's video game play as related to gender, age, interest, creativity, and other descriptors. This study re-examined the previously reported trend by utilizing principal components analysis with variables such as creativity, general characteristics, and problem-solving methods to determine factors that predict greater time spent playing video games among children. Fourth and fifth grade students reported their video game play habits and took a creativity assessment. Principal components analysis revealed factors that predict a child will play video games for greater amounts of time. While previous results showed that video game play does not lower a children creativity, results of this analysis build on these results to show that the most creative children do not tend to play video games as often; other characteristics associated with greater video game play include familiarity with gaming, greater practical but less creative problem-solving strategies, and being less likely to be learning academic content. Implications of these findings are discussed. Another perspective, one less......

Words: 571 - Pages: 3

Premium Essay

Unit 7 Video

...Unit 7 Video Summary 5 One of the most common uses of Flash memory is for the basic input/out put system of you computer, commonly known as the BIOS. The BIOS makes sure all other chips, hard drives, ports and CPU function together. BIOS is the first program that is activated during the boot, running on ROM, ready only memory. Startup BIOS activates the POST bootstrap loader which runs POST. POST checks the basic system hardware testing memory and assigning system resources. Startup BIOS also check the CMOS, comparing them to the hardware found during POST. CMOS setting are stored in the RAM ( Random Access Memory) and are not permanent as BIOS setting are and can be changed by the user. BOIS and CMOS are different they are stored on different chips. BIOS are stored in ROM and CMOS are stored in RAM. BIOS are permanent, while CMOS are volatile, it can be erased if the power goes off. BIOS cannot be edited by users. CMOS can be edited by users, configuration can be saved. CMOS setting are not lost because of the CMOS battery, providing power during shutdown. Preserves CMOS configuration stored in RAM. If the battery dies the symptoms would be low battery= slow clock, dead battery which means checksum error during boot. The system will reboot once you clear the checksum error. After POST is complete and the CMOS are checked, the BIOS check the MBR (Master Boot Record), which is located on the first sector on the hard drive. MBR finds the activate partition and loads the 1st......

Words: 303 - Pages: 2

Free Essay

Mm250 Unit 7

...Unit 7: Trees - Assignment Part I. Basic Computations 1. Using the following tree, name two vertices that are considered the following. Explain in your own words how you know: (a) parent-child (2 points). Answer: 202 - 401 Explanation: the parent of a vertex is the vertex connected to it on the path to the root, 202 is the parent and 401 is the child (b) sibling nodes (2 points): Answer: 301, 302, 303 Explanation: If two vertices are children of the same parent, then these two vertices are called siblings, 301, 302, 303 have the same parent that is 201 (c) leaf nodes (2 points) Answer: 301, 302, 303, 401 Explanation: the leaves are all terminal vertices 2. Determine if each of the following graphs is considered a tree. Explain why or why not, using what you learned in this unit. a. (2 points) Answer: not a tree Explanation: A tree is a connected graph with no cycles, and there is cycles in this graph b. (2 points) Answer: yes Explanation: A tree is a connected graph with no cycles, and there is no cycles in this graph c. (1 point) Answer: no Explanation: A tree is a connected graph with no cycles, and there a cycle in this graph 3. Determine and sketch two different spanning trees for this graph: a. (1 point) b. (1 point) 4. Consider this graph: a. Determine the total weight for this graph. Show your work. (1 point) Answer: 122 Explanation: 5 + 10 +5 +10 +17 +15 + 5......

Words: 717 - Pages: 3

Premium Essay

Unit 7 Computer Networks

...Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT COMPUTER NETWORKS R/601/7320 LEVEL 3 UNIT 7 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 COMPUTER NETWORKS R/601/7320 LEVEL 3 UNIT 7 AIM OF THE UNIT This unit aims to give the learners an understanding of the key components, the network protocols and the services provided by network systems. Learners will develop skills required to ensure network security, gain an understanding to the functions of hardware and software components, the purpose, connections and connection devices and why network security is important. Networks are used not only in large organisations but in small businesses and homes. Learners will understand the types of network and the principles across LAN and WANs. They will understand the options for wired and wireless networks and the and appreciate the benefits and risks to businesses of a network. www.ocr.org.uk 2 Computer Networks Level 3 Unit 7 ASSESSMENT AND GRADING CRITERIA Learning Outcome (LO) Pass The assessment criteria are the pass requirements for this unit. Merit To achieve a merit the evidence must show that, in addition to the pass criteria, the learner is able to: Distinction To achieve a distinction the evidence must show that, in addition to the pass and merit criteria, the learner is able to: The learner will: 1 Know types of network systems and protocols The learner can: P1 describe the types of......

Words: 1844 - Pages: 8

Premium Essay

Accounting Unit 7

...Fran Mackenzie | Management Accounting | Unit 7 | | Zahra Ali | 10/30/2014 | | Assessor's comments | Qualification | BTEC Level 3 Extended Diploma in Business | Assessor name | Fran Mackenzie | Unit number and title | Unit 7 Management Accounting ( J/502/5419) | Learner name | Zahra Ali | Assignment title | Tasks 1, 2 and 3 Regional Business Support Agency. Costs and Break Even | | Grading criteria | Achieved? | Comments | P1 | | | P2 | | | M1 | | | D1 | | | | General comments | | Action plan | | Assessor signature | Fran MacKenzie | Date | | Issue date: 6th October 2014 Final hand in date SUBMISSION 1: 3rd November 2014 Student Name: Zahra Ali Learner’s Declaration: I certify that the work submitted for this assignment is my own Signed: Zahra Ali Date: 30/10/14 Issue date: 6th October 2014 Final hand in date SUBMISSION 1: 3rd November 2014 Student Name: Zahra Ali Learner’s Declaration: I certify that the work submitted for this assignment is my own Signed: Zahra Ali Date: 30/10/14 Contents Introduction 3 Task 1 3 P1 3 ‘’1.Describe the main cost elements that a business needs to consider, explaining what category the costs fall into.’’- Blackboard 3 Revenue expenditure – 3 Capital expenditure – 3 ‘’2. Describe variable costs and give an example’’ – Blackboard 4 ‘’3. Describe fixed costs and give an example’’ - Blackboard 4 ‘’4. Describe semi-fixed or semi-variable......

Words: 3696 - Pages: 15

Premium Essay

Humanities Unit 7 Project

...Unit 7 Revolution Era Project I chose to send Bob Marley back to the Revolutionary Era. He was an inspirational Jamaican musician. He advocated for social change. ("Bob Marley Official Site — Life & Legacy — History," n.d.) He never received a Grammy, even though he should have, but in 2001 he was acknowledged with the Grammy Lifetime Achievement Award. He was still a ten when he returned to Trench Town in Jamaica where his musical talent was nurtured. He made his way to the States in 1966. ("Bob Marley Official Site — Life & Legacy — History," n.d.) Bob Marley was a sort of revolutionist in the fact that his music was mostly about stopping racism and colonialism. In his song “One Drop” he say “fighting against ism and scism”. ("Bob Marley Official Site — Life & Legacy — History," n.d.) A monument in Siberia has an inscription that reads “Bob Marley Fighter For Freedom Armed With A Guitar”. ("Bob Marley Official Site — Life & Legacy — History," n.d.) He promoted peace and tolerance. He also believed in smoking marijuana and the good health benefits of it but that is for another time. Part II It is hard to say which role that Bob Marley should play as I see him as a leader, rebel, supporter, and artist. I do believe that I will put him as a rebel and artist. I think that suits Bob Marley best. The first event that Bob Marley will visit is the signing of the Declaration of Independence. The signing of the Declaration of Independence happened on July 4th, 1776. (Sayre,......

Words: 584 - Pages: 3

Free Essay

Unit 7 Assignment 1

...Unit 7 Assignment 1: AD Password Policy Planning TO: Client I can understand you’re concerned with your company’s security after all information on competitors can be invaluable or very harmful to a company and this is why it must be protected from prying eyes. This does not have to mean that you have to lose productivity over trying to secure your networks information. I’m going to give you some tips on how to better secure your network with the tools that you already have at hand, keep in mind that you can also buy better security items to better protect you network things like; smart card, finger print scanners, and retinal scanners.   I only recommend these for really sensitive information and only for certain users in your company. On the server that is the DC log in to the administrator account and in the “Active Directory Users and Computers” in the Domain icon in the left pane click on the “Users” icon, you’ll be able to see all of the users in that domain. From here you can click on any user and make changes as necessary, for user names I recommend you use the following format; using capital and lower case letters the first letter of their name, their whole last name and their employee number, if someone tried to hack the account and all that they knew was the person name and the domain name they could not get in because it is very unlikely that they would know that person employee number and if they do then you have a spy in your company. As for passwords I......

Words: 388 - Pages: 2

Premium Essay

Unit 7: the Developing Manager

...UNIT 7: THE DEVELOPING MANAGER Get assignment help for this unit at assignmenthelpuk@yahoo.com LO1 Understand principles and practices of management behaviour Management theory and styles: assumptions and drawbacks, classical theories, main contributors, the influence of informal groups, hierarchy of needs, systems approach to management, contingency approach, leading authorities Leadership characteristics: styles eg autocratic, democratic, laissez-faire, action-orientated; motivation theories, factors affecting motivation and performance, motivation techniques, effectiveness; conflict resolution; the role of partnerships and stakeholders in the business Communication: communications processes, verbal, written, non-verbal; lines of communication, linear, lateral, formal/informal; barriers to effective communication Organisational culture and change: types of organisational structure and culture; factors influencing changes in culture; types of change eg demographic, economic, legislative; planned change theory; managing and measuring the effectiveness of change; sources and types of power; change drivers LO2 Be able to review own potential as a prospective manager Self-knowledge and appraisal: skills audit eg management skills, leadership skills, practical/technical skills, personal skills (eg interpersonal/motivational/communication skills), organising and planning skills cognitive and creative skills; qualifications (current/planned), strengths and weaknesses......

Words: 926 - Pages: 4

Premium Essay

Unit 7

...Unit 7: Sociological perspectives for health and social care Contents No. | Title | Page no. | 1 | P1: Explain the principal sociological perspectives | 3 | 2 | P2: Explain different sociological approaches to health and ill health | 4 | 3 | P3: Explain patterns and trends in health and illness among different social groupings | 5-7 | | Bibliography | 8 | P1: Explain the principal sociological perspectives Functionalism- The functionalism perspective is the main rule in society and sees society in different ways. Functionalism sees society as a system of highly interrelated parts that work together harmoniously. The main role of an intuition was to socialise with individuals and to ensure that they understood the underlying values of their society and behaved in acceptable ways. This ensured that was order in society. An example of the functionalist approach is that they view society as a body and each part has a function for society to work harmoniously. Marxism- Marxism perspective is a structuralism model. This approach was produced by Karl Marx. He also thought that individual behaviour was shaped by society, but then he realised the economic system was the definition of society and people’s place within it. He then identified that in the industrial society of his time there were two social classes. The bourgeoisies/capitalists– the small powerful group who owned factories and the employments and the proletariat– a much larger poorer group of......

Words: 2555 - Pages: 11

Free Essay

Unit 7

...Unit 7 Activity 1 P1 Sociological perspectives Intro – In this booklet I am going to be giving information explaining the principle sociological perspectives and the different sociological approaches to health and ill health. Functionalism – The theory that all aspects of a society serve a function and are necessary for the survival of that society. This links to This links to health as you are responsible for your own health and wellbeing and it is your responsibility to get better This links to ill health as they often fail to recognise a mental health problem, because of this it could get progressively worse and they could become very unwell and have a low self-esteem. Marxism – Society structure that is based on economic power and how wealthy you are. This has two social classes, the rich and the poor. This links to This links to health as rich people get cared for quicker. This is because they have the money to be able to get private health care. For example a poor person would have to go to a standard hospital and will have to wait hours to be seen to where as a rich person with private health care will be seen to straight away as there are less people waiting. This links to ill health as the believe that if the doctors do not find an illness then there is not one there, this means that they could have a serious health problem which a doctor may not have spotted and because they believe that there is not one there they could develop a serious illness......

Words: 1755 - Pages: 8

Boost (44) | AVIS IMPORTANT A NOS ADHERENTS New! | [Linux GAme,Симулятор Хакера] Uplink Hacker Elite + MODs [ENG] Подробнее... Залито: 16-04-2011 08:32 (3334 просмотра) [Linux GAme,Симулятор Хакера] Uplink Hacker Elite + MODs [ENG] Игры для других платформ В игре игрок принимает на себя роль хакера в 2010 году, который начинает работать на корпорацию Uplink, занимающейся предоставлением работы для хакеров по всему миру. Игрок копит деньги, программное обеспечение, обновляет «железо» Gateway’я (шлюза) и зарабатывает репутацию, выполняя работу по взлому... Раздают: 0 Качают: 0 Размер: 33MB