Premium Essay

Mod 3 Disc

In:

Submitted By howell
Words 282
Pages 2
1. The ethical problem to me is what SGT Day said"as far as i'm concerned SFC Sharp destroyed them two weeks ago." compromising SGT Day's integrety cause he is ignoring the fact that classified information was not properly secured.
2. AR 380-5 section V covers how to secure and also destroy classified information.
3. Duty: it is my duty to do the right thing. Honor: compromising anyone of the Army Values effect any soldiers honor. Integrity: following the Army Values regardless of the situation, and Personal Courage: haveing the courage to bring up a mistake that others try to cover up to protect a "well liked NCO" and possibly face reprisal from my peers.
4. I will remind SGT Day about the Army Values and inform him he has a duty to fulfill. The problem with letting SGT Day go unchecked with his comment, he will keep sweeping problems under the the table and his soldiers will see this and start doing the same,"LEAD BY EXAMPLE"
5. The course of action i will take is this. i will talk to SFC Sharp about the papers i found, i will give SFC Sharp the opportunity to work out the problem with the chain of command. If he is not willing to do the right thing i will talk to the 1SG myself. I will also get the entire section together and have SGT Day give a class on the Army Values as well as how to properly destroy classified information, and other topics out of the SOP.
6. I will monitor progress through out the section, make an assessment and make changes as needed and follow up on my

Similar Documents

Free Essay

Cyber Attack

...Abstract Failing to communicate and collaborate in crisis or emergency situation will undoubtedly increase the vulnerability of an organization toward potential crisis. This paper highlights the significance of effective communication and collaboration at different levels in the event of or during a crisis. This is a case of a cyberattack against Sony Pictures Entertainment once on December 3, 2014 and another attach on December 8, 2014 was considered for the purpose of this research. These cyberattack shows how techniques are not just a strategic weapon to bring down societies or to terrorize societies. But it shows that attackers are getting increasingly comfortable with using cyberattacks and can quite easily gain access to consumer personal information, business information, and employee information and can bring a company to its knees. The recent attacks not only on Sony but also Home Depot, Target and others are raising concerns. What needs to be done? The attacks are becoming more frequent, more invasive and the attackers are being bold. Should there be collaboration between businesses to combat the rising issues? Will this change the way that others businesses work together? What role does the government have in protecting citizens and their right to privacy especially from foreign attackers? These issues are significant as they underline the element of crisis communication and collaboration. Introduction In the face of increasing business demands for...

Words: 1827 - Pages: 8

Premium Essay

Nt1310 Unit 8 Assignment 1

...Introduction In this assignment I will be investigating the requirements of 3 computer set ups and how you would assemble them; the first will be a gaming pc. This is a pc that is specifically designed to run at faster speeds with a dedicated graphics chip and a high power processor. The next will be what is known as a thick client this is a home computer that would be needed to operate independently of a server but have access to the internet via a network card installed on the mother board. The final computer system I will be investigating will be a home theatre system, this is normally a smaller setup but with a dedicated sound card for the surround sound environment in most home theatre systems. I want to make this as simple as possible picking only the best but still somewhat affordable components for each and go into detail on the specific parts of each system that makes them stand out amongst the others and why...

Words: 1042 - Pages: 5

Free Essay

Pc Games

...defining characteristics include a lack of any centralized controlling authority and greater capacity in input, processing, and output. PC games reached widespread popularity following the video game crash of 1983, particularly in Europe, leading to the era of the "bedroom coder". From the mid-90s onward they lost mass-market traction to console games before enjoying a resurgence in the mid-2000s through digital distribution. The uncoordinated nature of the PC game market and its lack of physical media make precisely assessing its size difficult. Contents 1 History 1.1 Early growth 1.2 Industry crash 1.3 New genres 1.4 Contemporary gaming 2 Platform characteristics 2.1 Fidelity 2.2 Openness 2.2.1 Mods 2.3 Dominant Software 2.3.1 Digital Distribution Services 3 PC gaming technology 3.1 Hardware 3.2 Software 3.3 Multiplayer 3.3.1 Local area network gaming 3.3.2 Online games 3.4 Emulation 4 Controversy 5 Computer games museums History Early growth Spacewar!, developed for the PDP-1 in 1961, is often credited as being the second ever computer game. The game consisted of two player-controlled spaceships maneuvering around a central star, each attempting to destroy the other. Although personal computers only became popular with the development of the microprocessor and microcomputer, computer gaming on mainframes andminicomputers had previously already existed. OXO, an adaptation of tic-tac-toe for the EDSAC, debuted in 1952. Another pioneer computer game...

Words: 4427 - Pages: 18

Free Essay

Misses

...N Felhasználói útmutató Személyi számítógép VPCF11 sorozat n 2 N Tartalomjegyzék Bevezetés ........................................................................... 4 További információk a VAIO számítógépről.................. 5 Ergonómiai szempontok ............................................... 7 Az első lépések................................................................... 9 A kezelőszervek és a csatlakozók............................... 10 A jelzőfények ............................................................... 15 Áramforrás csatlakoztatása ........................................ 16 Az akkumulátor használata ......................................... 18 A számítógép biztonságos kikapcsolása.................... 25 Az energiatakarékos üzemmódok használata ............ 26 A rendszer frissítése.................................................... 29 A VAIO számítógép használata ........................................ 30 A billentyűzet használata ............................................ 31 Az érintőpárna használata........................................... 33 A speciális funkciógombok használata....................... 34 A beépített kamera használata ................................... 35 Az optikai meghajtó használata .................................. 36 A „Memory Stick” használata ..................................... 43 Más memóriamodulok/memóriakártyák használata ... 48 Az internet használata................................................. 54...

Words: 23770 - Pages: 96

Free Essay

Leadership Communication Plan

...Communication Development Plan Andrea Etchen LDR 5223 Dr. Angie Sokol April 30, 2016 Communication Development Plan Introduction The fundamental foundation in the Leadership Communication textbook is that “effective leadership depends on effective communication” (Barrett, 2014, p. 4). Without effective communication, leaders accomplish little (Barrett, 2014, p. 4). The lack of communication from a leader, makes him or her not a leader (Barrett, 2014, p. 4). Mastering communication for leadership allows for leaders to move into leadership positions and lead a group to a common goal (Barrett, 2014, p. 5). Effective leadership communication requires the leader to anticipate, transmit, appreciate, understand, and craft messages to reach the wanted recipient as intended (Barrett, 2014, p. 7). Current Assessment Leadership Communication Ethos/Image Based off of the Self-Assessment of Leadership Communication Capabilities, my leadership communication regarding ethos and image are acceptable, but could be worked on as I scored a 3.5/5.0 (Self-Assessment of Leadership Communication Capabilities). This result showed me that my strengths were in relation to my understanding of how people viewed me and my willingness to improve. I am aware of myself enough to see how me leadership style is and how it affects others. But my weaknesses could hinder this, as I do not like to ask for opinions of my style and I lack confidence (Self-Assessment of Leadership Communication Capabilities)...

Words: 2092 - Pages: 9

Premium Essay

Ps3 Penetration Strategy

...A Case Study With Sony On Penetration Pricing As Global Pricing Strategy Meaning of Penetration Pricing This is a marketing strategy used by firms to attract customers to a new product or service. Penetration pricing is the practice of offering a low price for a new product or service during its initial offering in order to attract customers away from competitors. The reasoning behind this marketing strategy is that customers will buy and become aware of the new product due to its lower price in the marketplace relative to rivals. It can often increase both market share and sales volume. Additionally, the high sales volume can also lead to lower production costs and higher inventory turnover, both of which are positive for any firm with fixed overhead. The tagline “special introductory offer” is the classic sign of penetration pricing. The aim of penetration pricing is usually to increase market share of a product, providing the opportunity to increase price once this objective has been achieved. Penetration pricing is, therefore, the pricing technique of setting a relatively low initial entry price, usually lower than the intended established price, sometimes lower than the costs too, to attract new customers. The strategy aims to encourage customers to switch to the new product because of the lower price. Penetration pricing is most commonly associated with a marketing objective of increasing market share or sales volume. In the short term, penetration pricing is likely...

Words: 4316 - Pages: 18

Premium Essay

History of Playstation

...A Case Study With Sony On Penetration Pricing As Global Pricing Strategy Meaning of Penetration Pricing This is a marketing strategy used by firms to attract customers to a new product or service. Penetration pricing is the practice of offering a low price for a new product or service during its initial offering in order to attract customers away from competitors. The reasoning behind this marketing strategy is that customers will buy and become aware of the new product due to its lower price in the marketplace relative to rivals. It can often increase both market share and sales volume. Additionally, the high sales volume can also lead to lower production costs and higher inventory turnover, both of which are positive for any firm with fixed overhead. The tagline “special introductory offer” is the classic sign of penetration pricing. The aim of penetration pricing is usually to increase market share of a product, providing the opportunity to increase price once this objective has been achieved. Penetration pricing is, therefore, the pricing technique of setting a relatively low initial entry price, usually lower than the intended established price, sometimes lower than the costs too, to attract new customers. The strategy aims to encourage customers to switch to the new product because of the lower price. Penetration pricing is most commonly associated with a marketing objective of increasing market share or sales volume. In the short term, penetration pricing is likely...

Words: 4316 - Pages: 18

Free Essay

Euler-Lagrange Partial Di Erential Equations

...arXiv:math.DG/0207039 v1 3 Jul 2002 Exterior Differential Systems and Euler-Lagrange Partial Differential Equations Robert Bryant Phillip Griffiths July 3, 2002 Daniel Grossman ii Contents Preface Introduction 1 Lagrangians and Poincar´-Cartan Forms e 1.1 Lagrangians and Contact Geometry . . . . . . . . . 1.2 The Euler-Lagrange System . . . . . . . . . . . . . . 1.2.1 Variation of a Legendre Submanifold . . . . . 1.2.2 Calculation of the Euler-Lagrange System . . 1.2.3 The Inverse Problem . . . . . . . . . . . . . . 1.3 Noether’s Theorem . . . . . . . . . . . . . . . . . . . 1.4 Hypersurfaces in Euclidean Space . . . . . . . . . . . 1.4.1 The Contact Manifold over En+1 . . . . . . . 1.4.2 Euclidean-invariant Euler-Lagrange Systems . 1.4.3 Conservation Laws for Minimal Hypersurfaces 2 The 2.1 2.2 2.3 2.4 2.5 Geometry of Poincar´-Cartan Forms e The Equivalence Problem for n = 2 . . . . . . . Neo-Classical Poincar´-Cartan Forms . . . . . . e Digression on Affine Geometry of Hypersurfaces The Equivalence Problem for n ≥ 3 . . . . . . . The Prescribed Mean Curvature System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v vii 1 1 7 7 8 10 14 21 21 24 27 37...

Words: 82432 - Pages: 330

Premium Essay

Popular Music and Contemporary U.S. Culture

...Music in Different Cultures Popular Music and Contemporary U.S. Culture Popular Music in its Many Facets In its broadest sense, popular music is an umbrella term referring to a vast range of commercially mass-marketed musical genres contrasting with classical or art music and intended for mass consumption (e.g., rock, rock and roll, hip-hop, grunge, heavy metal, rhythm and blues, punk, soul, techno, funk, rap, house). This wide-ranging term encompasses a plethora of musical styles involving various rhythms, vocal styles, instruments, and technologies. Characteristically, popular music is a global cultural phenomenon and an accessible form of commercial music aimed at a worldwide audience. Traditionally, British and American forms of popular music have tended to dominate the industry. Corresponding to social, economic, and technological change, popular music is intimately linked to the identity of musicians, performers, or artists, as well as audiences and fans. Popular music is ubiquitous; from shopping malls and advertising to gymnasiums/fitness classes and political campaigns, popular music is a common feature of people's everyday lives and a significant aspect of consumer culture. For fans and enthusiasts, popular music can be a leisure-time pursuit occurring on evenings or weekends; alternatively, it can constitute a lifestyle, or way of life (e.g., Deadheads—a group of fans of the American band Grateful Dead who saw the band at...

Words: 3041 - Pages: 13

Free Essay

Actionari Hidraulice

...ALI BEAZIT ACŢIONĂRI HIDRAULICE Colecţia „Inginerie mecanică” ALI BEAZIT ACŢIONĂRI HIDRAULICE Editura Academiei Navale “Mircea cel Bătrân” Constanţa, 2010 Referenţi ştiinţifici: Prof. univ. dr. ing. Florea TRAIAN Prof. univ. dr. ing. Ionel NICOLAE Descrierea CIP a Bibliotecii Naţionale a României ALI, BEAZIT Acţionări hidraulice / conf. univ. dr. ing. Ali Beazit – Constanţa : Editura Academiei Navale ”Mircea cel Bătrân”, 2010 Bibliogr. ISBN 978-973-1870-68-7 62-82(075.8) Corector: Ozana CHAKARIAN Tehnoredactare: Florentina PETRIŞ Copertă: Gabriela SECU Editura Academiei Navale „Mircea cel Bătrân” Str. Fulgerului nr. 1, 900218, Constanţa Tel. 0241/626200/1219, fax 0241/643096 Email: editura@anmb.ro Copyright © 2010 Editura Academiei Navale „Mircea cel Bătrân” Toate drepturile rezervate ISBN 978-973-1870-68-7 CUPRINS Prefaţă Capitolul 1 Acţionări hidrostatice............................................................ 1.1 Generalităţi.................................................................................... 1.2 Avantajele şi dezavantajelor sistemelor de acţionare hidraulică... 1.3 Lichidul de lucru………………………………………………... 1.3.1 Proprietăţile lichidelor de lucru………………………………… 1.3.2 Prevenirea oxidării şi prevenirea coroziunii……………………. 1.3.3 Numărul de neutralizare................................................................ 1.3.4 Lichide rezistente la foc................................................................. 1.3.5 Lichide...

Words: 35551 - Pages: 143

Free Essay

Caracterizarea Merceologica a Bicicle

...a două pedale acționate cu picioarele. Se estimează că mersul pe bicicletă este de trei ori mai eficient din punct de vedere energetic decât mersul pe jos, iar viteza este de trei - patru ori mai mare. Fiind inventate în Europa secolului 19, bicicletele sunt acum în număr de peste un miliard, asigurând în multe regiuni mijlocul principal de transport. Ele sunt de asemenea foarte populare ca mod de recreație, și au fost adaptate pentru folosință în multe alte domenii ale activității umane cum ar fi cel al jucăriilor, fitness, aplicații militare, servicii de curierat și sportul numit ciclism. Forma și configurația de bază a cadrului, roților, pedalelor, șezutului și a ghidonului au suferit doar mici schimbări din 1885, când a fost construit primul model cu lanț, cu toate că multe detalii importante au fost îmbunătățite, în special odată cu apariția materialelor moderne de fabricație și a proiectării asistate de calculator. Acestea au permis răspândirea modelelor speciale pentru cei ce practică un anume tip de ciclism. Bicicleta a influențat istoria în mod considerabil, atât în domeniul cultural, cât și în cel industrial. În anii de început, construcția bicicletelor s-a inspirat din tehnologiile deja existente, dar în ultima vreme bicicleta a contribuit la rândul ei la dezvoltarea tehnologiilor, atât în vechile domenii, cât și în altele noi. Strămoșul bicicletei a fost creat de către baronul german Karl Drais, care a inventat și și-a patentat mașinăria...

Words: 5739 - Pages: 23

Premium Essay

Supply Chain

...THIRD EDITI ----- --·-- --·-- - - -- - O N -- SU PP LY CH AI N MA NA GE ME NT Stra tegy , Plan ning , and Ope ratio n Sunil Chopra Kellogg Schoo l of Manag ement Northwestern University Peter Meindl Stanfo rd University --------Prentice I-I all Uppe r Saddl e River , New Jersey ·--· PEAR SON -- · - · - - - "ibrary of Congress Cataloging-in-Publication Data :::hopra, Sunil Supply chain management: strategy, planning, and operation I Sunil Chopra, >eter Meind!.-3rd ed. p. em. Includes bibliographical references and index. ISBN: 0-13-208608-5 1. Marketing channels-Managemen t. 2. Delivery of goods-Management. i. Physical distribution of goods-Management. 4. Customer servicesvfanagement. 5. Industrial procurement. 6. Materials management. I. vfeindl, Peter II. Title. HF5415.13.C533 2007 658.7-dc22 2006004948 \VP/Executive Editor: Mark Pfaltzgraff ii:ditorial Director: Jeff Shelstad ;enior Project Manager: Alana Bradley E:ditorial Assistant: Barbara Witmer Vledia Product Development Manager: Nancy Welcher \VP/Executive Marketing Manager: Debbie Clare Vlarketing Assistant: Joanna Sabella ;enior Managing Editor (Production): Cynthia Regan flroduction Editor: Melissa Feimer flermissions Supervisor: Charles Morris Vlanufacturing Buyer: Michelle Klein Vlanager, Print Production: Christy Mahon Composition/Full-Service Project Management: Karen Ettinger, TechBooks, Inc. flrinter/Binder: Hamilton Printing Company Inc. fypeface: 10/12 Times Ten Roman :::redits...

Words: 138607 - Pages: 555

Free Essay

Secutiry in Informatics

...cumpărături sau plata unor taxe. În urma implementării unor mecanisme de securitate într-o retea de calculatoare, informatiile nu vor putea fi accesate sau interceptate de persoane neautorizate (curioase sau, eventual, chiar rău intentionate) si se va împiedica falsificarea informatiilor transmise sau utilizarea clandestină a anumitor servicii destinate unor categorii specifice de utilizatori ai retelelor. Persoanele care atentează la securitatea retelelor pot apartine unor categorii diverse, comitând delicte mai mult sau mai putin grave: studenti care se amuză încercând să fure posta electronică a celorlalti, "hacker"-i care testează securitatea sistemelor sau urmăresc să obtină în mod clandestin anumite informatii, angajati care pretind că au atributii mai largi decât în realitate, accesând servicii care în mod normal le-ar fi interzise, sau fosti angajati care urmăresc să distrugă informatii ca o formă de răzbunare, oameni de afaceri care încearcă să descopere strategiile adversarilor, persoane care realizează fraude financiare (furtul numerelor de identificare a cărtilor de credit, transferuri bancare ilegale etc.), spioni militari sau industriali care încearcă să descopere secretele / strategiile adversarilor, sau chiar teroristi care fură secrete...

Words: 5182 - Pages: 21

Free Essay

Avoiding Taxes - Essay

...Model SR7500/SR8500 User Guide AV Surround Receiver CAUTION RISK OF ELECTRIC SHOCK DO NOT OPEN CAUTION: TO REDUCE THE RISK OF ELECTRIC SHOCK, DO NOT REMOVE COVER (OR BACK) NO USER-SERVICEABLE PARTS INSIDE REFER SERVICING TO QUALIFIED SERVICE PERSONNEL The lightning flash with arrowhead symbol within an equilateral triangle is intended to alert the user to the presence of uninsulated “dangerous voltage” within the product’s enclosure that may be of sufficient magnitude to constitute a risk of electric shock to persons. The exclamation point within an equilateral triangle is intended to alert the user to the presence of important operating and maintenance (servicing) instructions in the literature accompanying the product. IMPORTANT SAFETY INSTRUCTIONS READ BEFORE OPERATING EQUIPMENT This product was designed and manufactured to meet strict quality and safety standards. There are, however, some installation and operation precautions which you should be particularly aware of. 1. Read Instructions – All the safety and operating instructions should be read before the product is operated. Retain Instructions – The safety and operating instructions should be retained for future reference. Heed Warnings – All warnings on the product and in the operating instructions should be adhered to. Follow Instructions – All operating and use instructions should be followed. Cleaning – Unplug this product from the wall outlet before cleaning. Do not use liquid cleaners or aerosol cleaners...

Words: 44992 - Pages: 180

Premium Essay

Tourism

...Guide University of Sunderland London Campus Contacts Module leader US: Dr. Donna Chambers, Reader Module tutor USLC: Dr. Barbora Cherifi, Academic Tutor 3rd floor staff room barbora.cherifi@sunderland.ac.uk Module information TITLE: Current Practices in tourism, Hospitality and Events CODE: CHTM33 CREDITS: 30 LEVEL: M MODULE BOARD: Tourism PRE-REQUISITES: none CO-REQUISITES: None LEARNING HOURS: 300 Learning Outcomes: Upon successful completion of this module, students will have Knowledge 1. Demonstrated an advanced knowledge of current issues, debates and practices in Tourism, Hospitality and Events. 2. Critically evaluate current research and scholarship relating to tourism, hospitality and events. 3. Critically evaluate the strategic challenges facing Events, hospitality and Tourism organizations. Skills 4. Demonstrate the ability to communicate concepts and analysis orally as well as in written form. 5. Demonstrate the ability to analyze, synthesize and diagnose issues and opportunities in tourism, hospitality and events. 6. Reflect critically on the relationship between theory and practice in tourism, hospitality and events. Content Synopsis This module is conceived as an open platform for students to engage with current practices, issues and debates in Tourism, Hospitality and Events. As well as introducing students to the latest theoretical debates in the field, the module offers the opportunity to gain an inside knowledge...

Words: 3834 - Pages: 16