Premium Essay

Unit 8 Assignment: 1 Written Reflection on Our Interview

In: English and Literature

Submitted By leecj
Words 329
Pages 2
Unit 8 Assignment:1 Written Reflection on Our Interview

After conducting my interview, I can say that I walked away from this experience with many a lesson learned. The first lesson that I learned was that after choosing a person to interview, then asking that person, most will jump on the defensive and ask “about what”. This is due to the fact that most people are usually pressed for time. They initially want to know how long this process will take without ever stopping to realize that the length of most interviews is dependent upon how long it takes for the interviewee to answer the questions that are asked.
Another reason is because most will be curious about the nature of the interview, meaning what questions will be asked. This response I received tells me that people in general do not like discussing certain subjects. Some of these subjects include race, religion, and politics. These two topics are considered to be in the “No Go Zone” of interviews based entirely on their nature to insight the greatest of arguments. Another lesson I learned while conducting my interview is that most people have never been interviewed in the first place. This fact will show when the person being interviewed starts to give one word answers to questions asked. This actually happened though I informed the person that the purpose for the interview I was conducting was to gain a better insight on the subject! Lastly, I learned that when conducting the interview process you will find yourself doing about as much talking as the person answering the questions. This will happen due to a misunderstanding of the question, one word answers, shyness, or, the person may just be too uncomfortable answering the question in general. All in all, I would say that my experience during this assignment taught me that I have no phobias or fears when it…...

Similar Documents

Premium Essay

Written Assignment #1

...Written assignment #1 Written Assignment # 1 Written Assignment # 1 List several powers of the legislative, executive, and judicial branches of Government. 1. The Executive Branch of the Government is listed as the Office of the President of the United States, the Vice President of the United States and the elected cabinet members of the Department heads of the 15 major departments of the United States. The primary powers of this branch are as follows: The president can call for a special election when a state representative vacancy presents itself. Make senate appointments in light of resignation until the next assembly. The vice president holds the office of president of the senate; but without a vote; unless there is a tie. The President has the power of approval or veto of bills presented by congress. The President is the guardian of the Constitution. The President presides as The Commander In Chief of the armed forces. He has the power to grant pardons. He has the power to make treaties if ratified by 2/3 majority of congress. He has the power to appoint ambassadors and departments of state, and to appoint Justices to the Supreme Court. The President may also convene either or both houses or adjourn them as he sees fit. 2. The Judicial Branch of Government is made up of the Supreme Court. Federal courts enjoy the sole power to interpret the law, determine the constitutionality of the law, and apply it to individual cases. It......

Words: 1001 - Pages: 5

Premium Essay

Albatross Anchor Unit 8 Written Assignment

...Isabella Johnson MT435 Unit eight Kaplan University 03/21/2013   Introduction In the last stage of KU Consulting analysis we will examine an in-depth look at Albatross Anchor. Albatross Anchor is a family business that has been in business for over 35 years. During that period they have built long lasting relationships with business partners and recognized in the industry. They have built strong name recognition and known for their quality product. These are some of the strengths that distinguish Albatross Anchor from competition. KU Consulting will address four primary challenges identified and set possible solutions. Also there will be discussion about possible building alternation that will improve Albatross Anchor’s operations. KU Consulting will make it a top priority to not impose a high expense on Albatross Anchor, but only include what is necessary to remain best at operations. Question one Challenge one: Time Management The production timeline for Albatross Anchor’s primary product is currently at a slow pace and affecting their ability to meet their customers demand in a timely manner. One of the most noticeable is that there is a 36 hour changeover period. This creates a high production cost because during this period the employees are still being paid while no goods are being produced. When companies are placing large orders, they are taking on average four weeks to be made. Albatross Anchor maybe losing re-peat business from these clients due......

Words: 1550 - Pages: 7

Premium Essay

Written Assignment Unit 4

...Running Head: WRITTEN ASSIGNMENT Writing Assignment/ Unit#4 Shannon Brown Kaplan University PA 328 Professor Mighdoll April 16, 2013 The United States of America has an extensive history when dealing with the issues of copyright and what regulations or laws should protect the author. America has been deliberating the issue as early as 1787 when James Madison requested that a provision be added to the constitution that would provide protection to literary authors for a determined time (U.S. Copyright Office). Many individuals and organizations have made a mark in the history of copyright laws and regulations but research proves that the Berne Convention is responsible for setting a standard for international copyright laws. The Berne Convention enjoyed much success by signing over a 160 participating member nations. The United States became a member of this international community in 1989 (U.S. Copyright Office). The Berne Convention is an international agreement intended to protect its member’s against copyright infringement and also to allow protections for as long as 70 years after the death of the author, provided the works have been viewed (U.S. Copyright Office). The Berne Convention is a treaty whose members believe that intellectual property is important and should be held to some degree of copyright protection (eBook Chp.16 2012). The Universal Copyright Convention (UCC) was another organization that worked to protect the......

Words: 483 - Pages: 2

Premium Essay

Unit 10 Assignment 1: Video Summary 8

...Unit 10 Assignment 1: Video Summary 8 Video 2.04 chkdsk (Check Disk) Topics * Disk Options * Drive properties Terms * Cross-linked Files: FAT Files that point to the same cluster. Cross-linked files are created as the computer is improperly shut down or an application abnormally aborts. For this video it reminded me that chkdsk used to be scandisk. Video 2.01 Windows Update Topics * Security Center * Control panel access * Internet explorer access route Video 2.10 Support Tools Topic * The Dependency Walker Terms * Dependency walker: troubleshoots faulty applications. For this video, I have learned the name of the process I have used to repair applications. Video 2.15 DirectX Diagnostic tool Topics * Run line access point / run line command * System tools access point Terms * Dxdiag: DirectX multimedia program run code. Video 4.01 Comparing LAN’s and WAN’s Topics * Stand-alone computer * Peer-to-peer Network * Client server Terms * LAN: Local Area Network * WAN: Wide Area Network * Work group: A peer-to peer network and all network computers. * Domain: A type of client-server network that requires at least on server prompted to have the role of domain controller. In the Video 4.01, I learned that Local Area Networks cover a short distance, and that Wide Area Networks can cover...

Words: 494 - Pages: 2

Premium Essay

Module 1 Written Assignment

...Module 1 Written Assignment Robert Collazo Rasmussen College What steps are required in the planning and design of this domain infrastructure? Determine the Number of Forests. This step involves determining whether one or multiple forests are required to meet the organization’s objectives. Determine the Number of Domains. This step involves determining the number of domains that are required to meet the organization’s objectives. Assign Domain Names. This step involves assigning names to each of the domains. Select the Forest Root Domain. This step involves selecting the forest root domain. Determine Domain Controller Placement. This step involves deciding where domain controller resources will be placed for each domain in each forest. Determine Operations Master Role Placement. This step involves deciding the placement of the operations master roles for the forest and each domain. Determine Domain Controller Configuration. This step involves determining the disk space, memory, processor, and the network requirements for each domain controller. How would you implement and configure the AD domain for these offices? When implementing AD for these offices I would configure first a forest or domain. Then I would configure trust, sites, and active directory replication. Then I would configure the global catalog and master operations. What would you implement to allow access between domains? Which type would you recommend and why? Selective authentication By creating...

Words: 918 - Pages: 4

Premium Essay

Pt1420 Unit 8 Assignment 1: Homework

...instructions in a computer program which loops endlessly. Example of an infinite loop: Set k = 1 While k < = 5 Display k End While 7. A FOR loop looks like what other loop in a flowchart? A For loop looks like a count-controlled loop. 8. Why is it critical that accumulator variables are properly initialized? An accumulator is used to keep a running total of numbers. In a loop, a value is usually added to the current value of the accumulator. If it is not properly initialized, it will not contain the correct total. 9. What is the advantage of using a sentinel? The advantage of using a sentinel is that when you are processing a long list of values with a loop a sentinel marks the end of a list of items. There is no limit to how many times a loop can execute. 10. Why must the value chosen for use as a sentinel be carefully selected? The value of a sentinel needs to be carefully selected because it can’t be mistaken as a regular value in the list. Algorithm Workbench: 3. // Declare a counter variable. Declare Integer // Constant for the maximum value Constant Integer MAX_VALUE = 100 //Display the multiples of 10 from 0 through 100 For counter = 0 to MAX_VALUE Display counter End For   4. //Declare Integer number Declare an accumulator variable Declare Integer total = 0 Declare Integer counter For counter = 1 to 10 Display “Enter a number.” Input number Set total = total + number End......

Words: 303 - Pages: 2

Premium Essay

Physics Unit 8 Assignment 1

...Unit 8 Assignment 1 20. Because the magnetic force which deflects the electrons is defined by F = q * v x B (v x B is the cross product of the 2 vectors), so: The force vector would always be perpendicular to both the v and B vectors. Since the force is perpendicular to the electron's velocity vector, and thus the path of the electrons, the work done by the field on the electrons is 0, because W = F*d*cos(theta), and theta=90 degrees, therefore cos(theta)=0, and W=0 If W = 0 then there is no change in the kinetic energy of the electrons, thus their speed remains constant; the acceleration provided by the magnetic field was used only to change the direction. 31. Well, it depends upon the Sensitivity setting of the metal detector. As it is clear, the threshold value of the metal detector's sensitivity can be adjusted to suit various needs. so it is obviously set to discard small variations caused by a very small pieces of metal. 34. Yes, There is nothing seperately as a DC motor or DC generator. It is simply a DC machine. It acts either as a motor or a generator depending on the input. If the input is mechanical energy, the output is electrical : this is generator action If the input is electrical, the output is mechanical torque: this is motoring action 48. when you step up the voltage with transformers you lose current. It is a trade off and motors are not 100% effective so you would have a power loss. Unit 2 Assignment 1 8. when your......

Words: 647 - Pages: 3

Free Essay

Unit 1 Assignment 2 Change Wheel Reflection

...Lena Cruz GS1145 Strategies for the Technical Professional Unit 1 Assignment 2: Change Wheel Reflection After moving from San Bernardino, California to Salem, Oregon, there have been many changes in my life. My boyfriend and I seem to be happier living in a nice, small town community rather than the crowded and long winded commute we once had in California. The environment here is fresh and clean, and the people nicer. We do miss the food in California, but other than that we are happier here in Oregon. My two change wheels have acknowledged technology as a major factor in how I view the world and how it applies to my life. I have always loved technology and wanted to finish my degree pursuing my passion. I loved Michigan Technological University and it has been hard to find a similar institution with a developed Networking program. I have tried finishing my degree at University of Hawaii West Oahu, but their program and the long, arduous commute between University of Hawaii West Oahu and Honolulu Community College made the experience unfavorable to an ideal learning environment. I felt that ITT Technical Institute can give me a similar experience to what I once had at Michigan Tech, and will allow me to finish my degree. It’s been about 3 years since I have been to school, but I feel prepared and eager to learn. This quarter has given me classes that I have already experienced. Although I am unhappy with the outcome, I feel that I do need the refresher courses......

Words: 421 - Pages: 2

Premium Essay

Unit 8 Assignment 1

...IS3350 Unit 8 Assignment 1 To: Verizon Date: 2 February, 2014 Subject: Data Breach Executive Summary Overview Verizon’s 2013 Data Breach Investigations Report (DBIR) provides truly global insights into the nature of data breaches that can help organizations of all sizes to better understand the threat and take the necessary steps to protect themselves. The breadth and depth of data represented in this year’s DBIR is unprecedented. It combines the efforts of 19 global organizations: law enforcement agencies, national incident-reporting entities, research institutions, and a number of private security firms — all working to study and combat data breaches. Analysis With 47,000+ Security incidents analyzed, 621 confirmed data breaches studied, and 19 international contributors, Verizon has ample amounts of data to compile and use to better their network. This data can also be analyzed to see what types of people are making these breaches and what motives they may have for doing so. In the 2013 DBIR, 69% of breaches were spotted by an external party and 76% of the network intrusions were due too weak or stolen passwords. Some of the other factors that have been realized was that 75% of the attacks are opportunistic and 19% of attacks are some form of espionage. There is also much evidence that many of these breaches could be tied to organized crime and gathering financial information. On a very basic level, just looking at the history of organized crime, money has......

Words: 344 - Pages: 2

Free Essay

Unit 8 Assignment 1 Video Summary 6

...Unit 8 Assignment 1 Video Summary 6 VIDEO #3.01 Topics: * Microsoft Operating Systems * Other Operating Systems Terms: * DOS – Disk Operating System is an acronym for several closely related operating systems that dominated the IBM PC compatible market between 1981 and 1995 * UNIX - is a family of multitasking, multiuser computer operating systems that derive from the original AT&T UNIX. * Command Line Interface - also known as command-line user interface, console user interface, and character user interface (CUI), is a means of interacting with a computer program where the user issues commands to the program in the form of successive lines of text (command lines). Summary: The video taught me that everything that was developed after series 9x of operating systems is built on the NT platform. Also the NT did not have a device manager or a hardware wizard as well as not supporting plug and play. I also learned that Linux was developed by a Finnish student named Linus Torvalds. This information is not really useful for me its old information that for me has no value unless I want to be a technology historian. Unit 8 Assignment 1 Video Summary 6 VIDEO #3.02 Topics: * Partitioning * Creating Partitions * Create/Delete Partitions Terms: * Partition - In personal computers, a partition is a logical division of a hard disk created so that you can have different operating systems on the same hard disk or to create the......

Words: 819 - Pages: 4

Premium Essay

Nt1330 Unit 8 Assignment 1

...Group Policy in a Mixed Client OS Environment Unit 8 Assignment 1 ITT Technical Institute Floyd Washington Jr. May 16, 2015 Group policy is a tool used for customizing, controlling, and securing Windows operating systems. It was introduced in Windows 2000 as part of the IntelliMirror technologies. Group policy can be applied at the local computer level or to OU’s, domains, or sites in an Active Directory environment. Group policy was supported by Windows XP Professional, but not XP Home Editions. Group Policy in Vista adds many settings which gives administrators more control over users and computers. In this essay I will discuss five of the newer features that was not in the older versions of windows. * The first policy that I will discuss is the Control Removable Media policy. Devices like thumb drives, flash memory card readers, and external USB hard disks made it easy for users to transfer data between two computers. Although convenient, the ease that removable media created brought about the rise in industry espionage. User could easily copy and share company secrets with competitors by copying the information on to a removable device and uploading it to another computer. Software was made available to block access to USB ports on sensitive terminals. * The second policy that I will discuss is the Control power management settings. Power management on a single computer can save energy and money. Enforcing a power management strategy can save a......

Words: 532 - Pages: 3

Premium Essay

Unit 8 Interview

...Karenromine1 – LS100 – 01 – Unit 6_Assignment.doc Professor Joshua Dalrymple Kaplan University Online May 24, 2015 LS100 PARALEGAL INTERVIEW Your Name Karen Romine Instructor Name Professor Joshua Dalrymple Class/Section LS100-01 Interview Project Proposal Legal Studies Professional Interviewee Who: Candy Inman of Daniels Law Firm Why: Candy is a paralegal. She has worked for the Daniels Law Firm for 15 years. I have talked with her a few times. She is pleasant, respectful, kind, and a good personality. She was very helpful. I chose Candy Inman. She has worked for Daniels Law Firm for 15 years. I have used that Law Firm before and she was very pleasant and helpful. I liked her a lot. I have called a couple of times and she was very knowledgeable. List of Potential Interview Questions What was your Education/Training? Candy has had no formal training. She has learned everything on your own or from what Mr. Daniels has taught her. She would get other files and see how something was written. It took her a while to understand the law but she said it clicked one day. Do you have a license or certification? She has no license or a certification. Mr. Daniels taught her what she knows. She went to court with him and learned a lot from there. She taught herself a lot of what she knows about writing wills, estate, and court documents. Why did you pick this career? She applied for this job and Mr. Daniels and Candy got along......

Words: 1448 - Pages: 6

Premium Essay

Written Assignment 1

...Case Study Assignment 1 “What advantages would the proposed Advanced Mobile Communications and Information System provide for Whitman Price Consulting? What problems might it assist in eliminating?” Several advantages to an information system would respond directly to what Whitmann Price Consulting help their clients with. Such as creating a sustainable business, managing assets, operating globally, and most importantly responding to change. Management Information Systems (MIS) are used by organizations to track, store, manipulate and distribute information to the appropriate people when necessary. Using a management information system would enable a business to streamline their operations into a cohesive functioning unit. MIS support business decision making by providing management with critical data. They serve to enhance the organization's communication, reduce human labor, support short- and long-term business goals and distribute complex information. The advantages to an information system are essentially strengthening what Whitman Price Consulting strives to do for its clients. One important advantage is globalization. Information technology has not only brought the world closer together, but it has allowed the world's economy to become a single interdependent system. Meaning, that we can not only share information quickly and efficiently, but we can also bring down barriers of linguistic and geographic boundaries. The world has developed into a global...

Words: 300 - Pages: 2

Premium Essay

Written Assignment 1

...Written Assignment 1 The article “ Where have all the criminals gone” has an interesting topic. The main theme of the article is that there was a massive crime drop in the 1990’s. They give you many reasons on why crime had such a big drop. The main reason why crime had such a big drop is because abortion was legalized throughout the country. I will get more into detail on why that particular topic in another question. But, what the author is trying to say about the subject is that abortion had a big impact on the 1990’s crime drop. Throughout the article is lists different reasons why crime may or may have dropped due to that cause. Those causes range from gun laws to the increase reliance on prisons to the aging of the population. while some of those reasons did help with the crime drop, the majority did not. One of the arguments is that we increased the reliance of prisons. For example, there was increase number of drug arrests. there was also an increase of many other sentences, including violent crimes. The evidence linking increased punishment with lower crime rates is very strong. These harsh prison terms have shown to act deterrent. Imprisonment in the 1990’s was one of the most key answers to why crime had began to drop. Roughly one third of crime dropped because of imprisonment. Another explanation for why crime could’ve dropped was the increase use of capital punishment or the death penalty. Some people thought that because of the increase of......

Words: 817 - Pages: 4

Free Essay

Unit 8 – Assignment 1: Dns Zone File

...Unit 8 – Assignment 1: DNS Zone File Assignment Requirements The Just Legal Company in Figmont, Nebraska has acquired a new Internet address – They want to set up a DNS server. What would a basic DNS file look like? Describe the file. A DNS Server is a hierarchical naming system for computers and resources connected to the internet. Basically each line is a text description that defines a single resource records Domain Name Servers (DNS) are the They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses. Information from all the domain name servers across the Internet are gathered together and housed at the Central Registry. Host companies and Internet Service Providers interact with the Central Registry on a regular schedule to get updated DNS information. When you type in a web address, e.g.,, your Internet Service Provider views the DNS associated with the domain name, translates it into a machine friendly IP address (for example is the IP for and directs your Internet connection to the correct website. The Domain Name System is a hierarchical naming system for computers and resources connected to the internet. Basically this is the Internet's equivalent of a phone book that lets you have name to number mappings on your computers. The name is the number and vice versa. This is achieved through the DNS. The DNS is a......

Words: 300 - Pages: 2

Run! Bitch Run! (2009) English Hollywood Movie Download HD Watch Online HEVC [720p] 800MB | Netherlands Antilles | Alte Berufe