Wednesday, March 25, 2020
Networking Essays (1661 words) - Server, Server Hardware
Networking For my independent study, I have created a network in my house. A network by definition are more than one computer that are linked together electronically via a protocol (common language) so the computers can communicate and share resources. This network improves the day-to-day life by adding value and usefulness to the computers. The processes and ideas that I have learned thru this experience can be applied directly into todays rich electronic business environment. Identifying the needs of the user is the first step for building a well-designed Network. A professional installation was needed to maintain the aesthetics of the rental house. Most of the wires are run in the attic and then down plastic conduit attached to the wall. The conduit is run all the way to the wall boxes where the Ethernet ports are located. Every wire is clearly labeled and included in an easy to read schematic of the house. This way future tenants will have the ability to utilize the network. Next, every room needed to have access to the network. In order to minimize the overall use of wires, hubs were placed in strategic locations. An 8-port 10/100-megabit auto-sensing hub is located in the computer room and a 5 port 10-megabit in the sound room. There, needed to be docking stations, so laptop users or visiting computers could easily plug into the network and utilize the pre-existing monitor, keyboard, and mouse. These are the basic needs that have been put into the des ign of the network. Each computer setup is unique with certain strengths and weaknesses. The network takes advantage of the strengths of each individual computer and makes them available to all users. A network essentially expands the capabilities of each computer by increasing functionality thru resource sharing. In the house, there are a total of four computers and two laptops. Processing speed and an abundance of ram is not essential for a server with such low traffic. Thus the most antiquated computer was elected for this function. Between all the computers, we have several extra pieces of hardware such as a zip drive, CDRW, DVD ROM, scanner, and multiple printers. Each piece of hardware is dispersed between the computers. There were several immediate efficiencies that occurred when the network went operational. The zip drive is located on the server while the CDRW is located on one of the individual workstations. Previously, if the need arose to burn some information stored on the zip disk to a CD, the individual computers were practically worthless for this task. However, with the network, one can map a network drive on the computer with the CDRW to the zip drive on the server. This allows information to be efficiently transferred from the zip drive to a CD. In addition, the server also has a scanner attached to it. The problem is that the server is too slow to handle sophisticated photo editing software. Now an image can be scanned on to the server and then a faster computer can be used to edit it. There are 3 different printers, each varies in quality, speed, and maintenance costs. The most expensive one is reserved for only making color photos, and the other two are used for everyday printing, one of which is much faster and has more reliable paper feeding. A user can easily choose a printer depending on their needs. This network takes full advantage of each computer through resource sharing which ads tremendous value for its users. In Business it is important in any network to be able to restrict access to individuals private files or directories. Security would demand that not all users would be allowed access to highly confidential information. There is other information that would be made available to other users on a read only basis. The same is true of the users in my network. Microsoft developed NT to be very secure. Most of this security is devoted to protecting network resources and the filing system (NTFS). The administrator decides who gets access to which resources by setting up users and user groups. Each person is asked to choose a user name and password. Then the administrator identifies the needs and privileges of each individual user.
Friday, March 6, 2020
buy custom Computer Systems essay
buy custom Computer Systems essay There are many types of objectionable files that can be found on computer systems. Other than viruses attack that infect computer systems day in day out, there are many other forms of objectionable files and publications like pornography which ranges from movies with highly or mild sexual images, nude pictures, computer games depicting sexual violence and other sexual exploitation materials (Rosenman, 2009). Contrary to the belief that these materials must be necessarily files, there are other acts that amount to objectionable behavior such as sexual grooming of the underage. Another form of unwanted file in a computer system is Trojan horse. Nick (1999) defines a compute virus as a program normally designed by programmers and it spreads through infecting executable files or hard and floppy disks initially before multiplying in the whole system. They not only infect program files but any form of executable code. A different form of virus referred to as macro virus has the ability of infecting spreadsheet and word processing documents which use macros. Trojan horse is a harmful program that is frequently confused with viruses. It is a program that assumes the shape of something else, like a game or a movie. For example you may thing it is your downloaded game but when you run, it messes up other files on the hard drive by may be deleting them (Nick, 1999). There are many sources of objectionable files; this is the main reason why they keep on circulating all over the world. Out of all the sources, the internet serves as the major source of Trojans, viruses and other unwanted content. In most cases they come about due to downloading free or small-charge software on the internet, the developers attach them to these free software applicatios to help them cover overhead charges (Mckay, 2010). Sharing of applications on shared networks leads to spread of unwanted files. There also are other questionable websites which are full of objectionable content or files. Visiting them can also generate malicious files to downloaded automatically and get installed in the computer. HTML documents with JavaScript or other executable files code can spread malicious files. These form of objectionable files spread through, in the case of a virus, executing a program code that has been infected by a virus hence infecting other programs when it runs. This can happen on the same computer or on other computers that are connected together on the same network. Sharing a copy of an infected file with other with other computer users leads to infection or transfer of these infected. Other forms of viruses referred to as multipartite spread through both infecting the floppy disks boot areas and infecting the files. Unauthorized users or otherwise referred to as intruders can also access your computer system and install objectionable files or copy pornographic materials on your computer system (Barry, 2010). Mellon (2006) observes that there are many websites that expose children to pornographic content and child predators. Pedophiles often pose as good people in some sites such as social networks with an intention of luring them into bad acts. Chat rooms are a source of objectionable file especially when it allows sending of executable code. Additionally email spoofing that can easily trick the users to attempt into making objectionable statements. Ways a Technician can use to Detect Objectionable Files on a Computer System. As a professional, a technician has various ways of detecting that a system/s they are charged witth are infected with objectionable files, whether viruses or pornographic content. There are several symptom signals that a computer is probably infected. First of all, incase of viruses or Trojan horses, PC will start working slowly. These contents have the ability of really slowing down a computer system and often it can take a longer time than usual to restart or sometimes the internet connections become very slow (Nick, 1999). Secondly, according to Mana Media (2004) new desktop shortcuts may appear or there can be alterations on home page. These are good signs of virus infections because they sometimes tamper with internet settings or redirect with you computers default home page settings a different unwanted web sites. They also go to an extent of adding new shortcuts on the computers desktop. Sometimes one may experience annoying popups on the computer. This is as a result of the objectionable files ability to swap the computer with bothering popup ads eve if the user is not connected to the internet, whereas secretly monitoring and tracking the browsing behavior and collecting the users personal information. Strange as it may sound, a technician can also detect whether a PC is infected with objectionable content if there are e-mails being sent from your mailbox to unknown destinations and you did not actually write them. For instance if Trojan find its way into a computer system, it attain total control of your mailbox (Mellon, 2006). By so doing, it starts generating and sending e-mails attached with viruses, spam, e-mail hoaxes and other malicious contents to other recipients. These are not exclusive ways of detecting objectionable files but the most common ones that can easily alert a technician or any other computer user that there must be something wrong with the system. Buy custom Computer Systems essay
Wednesday, February 19, 2020
Issues in Strategic Management Strategic Audit Exercise Essay
Issues in Strategic Management Strategic Audit Exercise - Essay Example Apple experienced good success during the late 1980s but after that there were testing times during the 90s. John Sculley, previously the CEO joined Apple in 1983. Sculley came to Apple with the valuable experience of the 'Cola-War' between Coke and Pepsi. Steven Jobs, more of technology oriented initially found this approach little weird, but later gave Sculley a free hand. Gradually, over the years, Apple has succeeded in regaining the lost glory to a great extent. Feb 27 edition of Business Journal (2007) points out that the ipod helped in this transformation process with the sale of over 90 million ipods since its launch in 2001. After this successful parade of its ipod, Apple has now taken up another ambitious product called 'iphone'. This gadget is an integration of an iPod, a mobile phone, a portable computing machine and a digital camera. With touch controls and an internet communication device the iphone is an innovative product from the armory of Apple. Slated for a full-fl edged launch in June 2007, iphone also has the Wi-Fi connectivity and Bluetooth features and it is based on quad-band GSM + EDGE technology. Now it is to be seen how Apple can mobilize its resources to convert this venture into another success story. Over the years Apple has also established a dependable value chain with strong links with its suppliers and distributors, but the spat with its arch rival Microsoft will not allow Apple to take things lying down, it'll have to be on the path of innovation with regular inputs from market. Though the iphone promises to be a cult item that may influence the industry to follow suit, yet there are certain finer edges which need to be smoothened before Apple expects an ipod like revolution. For example ipod became such a craze owing to its compatibility with the most popular music format-MP3, and the most popular operating system-Windows. But it at the moment industry analysts are keenly watching the verbal dual between Apple and Microsoft. O n the one hand Apple has issued a warning about MS Vista being a security threat to the ipods while on the other hand Microsoft chief Bill Gates underlined the importance of the 'software part' when asked for his views on Apple iphone. He sought to downplay the technological advancement and innovative features that Apple has put in it. This dual promises more fireworks in near future. Resources Audit Such an audit is done to identify different types of resources available to the company. Some of the resources that Apple Inc. could mobilize for carrying out its business are; Financial resources: The Company has been able to post a record revenue billion and record net quarterly profit of $1.0 billion, or $1.14 per diluted share for its fiscal 2007 first quarter ended December 30, 2006 (Apple, 2007). During the operations Gross margin was 31.2 percent, up from 27.2 percent in the year-ago quarter. What is the source of strength is that the International sales accounting for 42 percent of the quarter's revenue. The very fact that the company has been able to sustain the onslaught of Microsoft and IBM provides an insight into the strength of its financial resources. Company's consistent track record of dividend indicates that Apple values its
Tuesday, February 4, 2020
Supply Chain Management Assignment Example | Topics and Well Written Essays - 1500 words
Supply Chain Management - Assignment Example Supply chain management includes a series of well-coordinated decisions and activities that are used to provide sufficient integrated supplier services, transporters, ware houses and customer. This often ensures that the correct products and services are taken to delivered at the right locations in the right quantities while minimizing the cost of undertaking these activities. The essence of this is to acquire sustainable competitive market advantage. A company supply chain can be immensely complicated because it entails a large number of customers and suppliers. Logistic functions may be used to help the flow of raw material from the producer of the item, to the manufacturer then the distributor and finally the end user of the product(Wisner 104). The internal supply chain involves the manufacturers. In this case, it entails sourcing, distributing and production as a whole. Sourcing is where the company makes some purchases, process orders, make negotiations for contracts and formul ate the purchase process. In production, the raw materials are transformed into components of an end product or the product itself. Distribution is where the flow of material or end product is managed as from the manufacture to the customers. To ensure that the process is done successfully, enterprise resource planning systems should be used. The enterprise resource planning system usually store and processes the data of the company. In addition, it integrates the companyââ¬â¢s information system as a whole. ERP is beneficial as it facilitates the flow of all the details in the company and also ensures that the daily company processes are managed appropriately (Wisner222). The supplier networks are also another key component of the supply chain. They may be the organizations responsible for all the direct and indirect service and product provision. For instance, a computer manufacture supplier may include all the organizations responsible for the provision of all items of the com puter. This may include computer chips, motherboards and hard drives just to mention a few. The distribution networks the real movement of goods from the manufacture to the customers. The main focus is on the packaging, storing and how the materials are handled at the receiving ends; the warehouses, docks and the retail stores. One crucial consideration in the distribution process is the mode of transportation and its management. This includes how the external carriers have been managed or how the private carriers are selected. Another important thing to consider is the e - commerce sector. This plays a vital role as it facilitates the flow of funds and information. E commerce is when advanced technology is used to carry out the business transactions in a company. E commerce is conducted in a variety of electronic media. It entails business to customer transactions, business to business transactions, and customer to customer transactions. A few websites that carry out such include e -bay, Covisint, priceline.com and the likes of Amazon.com. The types of electronic media are bar codes, fax, electronic fund transfer (EFT), electronic data interchange (EDI) and many others (Wisner 10). In e- distribution, one is advised on where to pick their supplies and how to use them via the internet or web based environment. E- Procurement has changed the whole supply chain where the distribution and manufacturing bit is concerned. There is a seamless flow of information on fulfillment from the manufact
Monday, January 27, 2020
A Soldier Always At War English Literature Essay
A Soldier Always At War English Literature Essay Many war veterans have a hard time adjusting to life after war. What happened in the war is always on their mind. What they went through was so tragic that they cannot forget about what happened. Krebs in Earnest Hemingways Soldiers Home is struggling to adapt to normal life after coming home from World War I. He is not the same person he was before the war, I dont love anybody (169). His view on the world is different. He even sees women in a different way than he did before, Besides he did not really need a girl. The army had taught him that (166). Krebs came home from the war later than most of the other soldiers. People in his hometown do not have the patients to listen to his war stories. He may feel that people do not understand what he went through His town had heard too many atrocity stories to be thrilled by actualities (165). It also may make him feel like he is different than everyone else. Since no one wants to hear about his stores, and he does not want to take any conse quences of living in a civilized manner, he can never move on in his life from the war. The saying you cant go home again relates to Krebs because the war is always on his mind and he cannot escape it. Hemmingway makes a clear distinction in the story between the two names that Krebs goes by. His family still calls him Harold; the text refers to him by Krebs. Before the war, Krebs is known as Harold. Harold was an innocent boy. His life was simple. He did not have much experience of the world. He had enlisted to the war from a Methodist college. He enlisted to the Marines most likely because many of his friends enlisted. Like many whom enlisted during the time, he had not had any experience in the battlefield. The death of his friends, and fellow people that he knew was tragic. The death he saw from the war scarred him. His family always knows him as Harold I had a talk with your father last night, Harold (167). After the war though, Krebs left behind a part of himself back in Europe. He never talks about how bad the battles were. He was in some of the bloodiest battles in the war. He never talks about them because he does not want to relive them. The battles changed him because he saw so much death. He is no longer Harold. The war had such an impact on him that he turned into a completely different person. No one recognizes this new person. Other than the change of names the war changed Krebss view on women. In Europe it was all about the sex. He does not want a relationship with a woman in his own town because relationships are complicated, and he does not want to take any risks and lose anything else. Krebs did not have to communicated much with the French or German girls, But he would not go through all the talking (167). Having a relationship is too much work for Krebs. All he cares about it the sex, You couldnt talk much and you did not need to talk (167). Doing all the work to get a girl is too much work. Krebs just returned home and is not used to the women. At Germany he did not have to do much to get attention from them There is a picture which shows him on the Rhine with two German girls and another corporal. Krebs and the corporal look too big for their uniforms. The German girls are not beautiful (165). The only way that he could have a relationship is to more on from what happened from the war, but he is ha ving too much of a hard time. Krebss family knows that he needs to move on from the war. They try to encourage him to drive the family car. They likely do this so that Krebs can have more freedom. They may think that letting him have the ability to drive the family car will make him want to do other things like getting a job or going back to school He thinks you have lost your ambitions, that you havent got a definite aim in life (169). Krebs says he loves no one, because he does not want to take any consequences. They wanted him to get a job but, Krebs does not want to do it. His mother is probably the most desperate person to want him to move on. She prayed for him to try to give him some hope, but Krebs does not think much of it. He does not want to do what his mother and father ask him to do, because he wants to live a simple life. He no long has any ambition like his father predicts. He lost that during the war. He sees his sister play baseball because she is much like he wants to be. Young, innocent, and si mple. That is what Krebs wants to be after the war. Krebs may never go back to who he once was. He has to move on from the war to be able to achieve anything in his life. He is always remembering what happened in the war. He wishes he was back in Germany sometimes. He also needs to tell people about his stories without lying about it. Before he left the war, he fit in well with his hometown. Now he is an outcast to everyone. He will not take any chances in life anymore. He saw too many people die in the war from taking chances. The saying you cant go home again may live with Krebs his entire life. His views may never change. He may never move on. His family still knows his as Harold, but he will remain to be Krebs as long as he decides.
Saturday, January 18, 2020
Game Development Essay
Once upon a time, the peaceful Kingdom of Greenland was invaded by the unexplained monster ruled by a tyrannous Garviod who was famous for his black magic. The beautiful Kingdom fell into ruin and despair. The inhabitants become an unexplainable creature. Some are became plants, trees, animals and those who are unkind to the nature became stones, garbage and monsters. Unfortunately, one of the inhabitants that have been transformed by a black magic was the old Prophet living in a cage and he became an old Tree. According to his prophecy, there will be a simple gardener who will have the power to fight the monsters in the Kingdom. The old prophet Tree traveled to find the man on his prophecy. As he traveled, he found Seedy. Humble and loving nature gardener who was transform to a seed. The old Tree gives him a map to find the treasure of X-lost. Then he said, ââ¬Å"That the only way to break the evil spell and return the inhabitants of Greenland into normal was the magical light hidden in the treasure of X-lost.â⬠But the ruling monsters Garviod heard about the magical treasure of X-lost and he keeps the treasure in one if his castle. Seedy humbly vowed to rescue the Kingdom and he started his journey to find the treasure of X-lost in the Castle of Garviod. Could Seedy overcome the many obstacles facing him and became a true hero? Letââ¬â¢s find it in the ââ¬Å"Adventure of Seedyâ⬠. 1.2 Statement of the Problem The following problems were identified: 1. In many computer games, others kids are rewarded for being more violent. The child practicing violence in his own like killing, stabbing and shooting. 2. Some computer games are teaching kids a wrong values. 3. Some of games are simply for entertainment. 1.3Objectives The aims of the study are: 1. To development a game that would not portray violence. Rather than using a objects that represents violence, the proponent will design an object that are simple yet related to the environment. 2. To design a game that will teach the kids/user the value of environment. 3. To develop a game that makes learning fun not only to entertain. The items, weapons and object in the game are design next to the concept of environment.
Friday, January 10, 2020
Zczxc
The managerial grid model (1964), developed by Robert Blake and Jane Mouton, is a behavioral leadership model. The model is an excellent way to map out different leadership styles, and an excellent way to evaluate the leadership performed by leaders and managers. This model identifies five different leadership styles based on theà concern for peopleà and theconcern for production. It is important to remember that none of the concerns are right or wrong, and the concerns are ideally balanced to the respective situational context of leadership. The model is graphically illustrated at the end of the article. Concern for Peopleà relates to the degree to which a leader considers needs of employees and team members before deciding how to accomplish a task. A high degree of concern could be coupled to a more democratic leadership style, whereas a low concern for people could be coupled to an autocratic leadership style. * Concern for Productionà relates to the degree to which a lead er emphasizes production effectiveness and efficiency when deciding how best to accomplish tasks. By charting the position in the grid it is possible to diagnose which leadership style is being performed, and to evaluate the appropriateness of the style of leadership.The five different leadership styles found in the managerial grid are presented below: Country Club Leadership ââ¬â High Concern for People/Low Concern for Productionà A country club leader is mostly concerned about the needs and feelings of his/her employees or team members. This leader probably supposes that members of the organization will work hard if the feel happy and secure. However, production may suffer under this leadership style, and the effectiveness of the organization may suffer due to a lack of direct supervision and control.Produce or Perish Leadership ââ¬â High Concern for Production/Low Concern for Peopleà A produce or perish leader is very concerned about production effectiveness, and pr obably sees workers as means to achieve great results. This leader also sees workforce needs as secondary to the need of a productive and efficient workplace. He/She might have very strict and autocratic work rules, and perhaps views punishment as the best motivational force. Impoverished Leadership ââ¬â Low Concern for Production/ Low Concern for Peopleà This leader is very ineffective.The leader has neither a high regard for creating efficient systems or rules to structure work processes, nor for creating a motivated or satisfied work environment. The result of this leadership style could be a highly disorganized workplace with low satisfaction and motivation. Middle of the Road Leadership ââ¬â Medium Concern for Production/Medium Concern for Peopleà This style tries to balance the two competing concerns. It tries to compromise different needs, and may seem as a great solution. However, when compromising, leaders risk that neither the concern for people nor the conce rn for production is fully met.This may lead to average performance, where top results may not be achieved. Workers may end up moderately motivated and satisfied, and production may only become moderately effective. Team Leadership ââ¬â High Concern for Production/High Concern for Peopleà According to the Blake Mouton model, this is the best and most effective leadership style. These leaders both stress the importance of workforce needs and production needs. This leader manages to engulf workers into the importance of production efficiency, and manages to motivate employees.This creates an atmosphere of team spirit, where each team member is highly motivated and satisfied, which commits the worker to work hard and increase productivity. Use of the managerial grid Firstly, leaders should plot their own style into the managerial grid, and diagnose which leadership style they are conducting. Secondly, leaders can evaluate their leadership style, and assess if they could improve their leadership style in some way. Thirdly, leaders should put their leadership style into the respective situational context, and try to balance their leadership style to the needs found in the organization.The team leadership style may not be best in all situations, and some situations, like e. g. and economic crisis, might call for an entirely different style like e. g. a produce or perish leadership style. Leaders must therefore analyze which leadership style is called for, and afterwards analyze whether or not they conduct the most appropriate style. This analysis is therefore based on the different contingencies facing an organization, and leaders may use the knowledge fromContingency Theoryà or theà PESTEL Frameworkà to analyze which leadership styles are most appropriate for the viability of the organization.
Subscribe to:
Posts (Atom)