Premium Essay

Request for Screenshots

In: Business and Management

Submitted By errolradford
Words 314
Pages 2
Microsoft Request Letter

Errol F. Radford

ENG/221

07 September, 2010

Dr. Rose Safer

Errol F. Radford
3245 Bushwick Way
Lorton Va. 22078
(803)275-1334

Microsoft Corporation
One Microsoft Way
Redmond WA. Zip

07 September, 2010
SUBJECT: Screenshot Request Letter
To whom this may concern:
Thank you for taking time out of your day to read this letter of request. I will be brief in my explanation of this request as to not waste your time
I am an IT student enrolled at the University of Phoenix. I have been tasked to facilitate a presentation on Software Applications. I have done extensive research on the subject and have come to find that a picture is clearly worth a thousand words. After looking at several of your tutorials and technical manuals online, it came to me that it would be more effective if I could visually and orally present the information to my audience.
Fact of the matter is that your organization has the best illustrated examples I could find to facilitate this information to my audience. This is evident by the sheer volume and in depth information you have amassed and published in the technical arena.
With your permission to use your screenshots the benefit to you would be two fold. First it would be free advertisement of your product to a large group of information Technology enthusiast learning and working with Software Applications. Second this captured audience is inclined to use and recommend your product to a vast number of potential clients.
As a leader in this field I am sure you agree that first to contact is also first to contract in the ever changing field of Information technology. So again I graciously ask your permission to use your product for both yours and my interest.
Sincerely yours

Errol F. Radford
REFERENCES

There are no references used in this

Similar Documents

Premium Essay

Wireshark

...ISM4220 Business Data Communications Wireshark Lab 2 - Ethernet Part I. Capturing and analyzing Ethernet frames Let’s begin by capturing a set of Ethernet frames to study. Do the following: * First, clear your browser’s cache, and start it with a blank page. You may also want to close out all other browsers or web activities (It is important to do this step, so your Wireshark results won’t be overwhelming.) * Start up the Wireshark packet sniffer, and start a packet capture * Enter the following URL into your browser * http://lix1.myweb.usf.edu/about-usf-st-petersburg.htm * Stop Wireshark packet capture. * Save this capture with a name “Lab2 trace1 – yourlastname”, and the default file type should be .pcapng. You will need to submit this trace file, which shows your unique IP address and time stamp to prove the origin of your work. * Now locate the GET and OK packets that your computer communicated with the server that hosts the About USF St. Petersburg web page you’ve just visited. There could be multiple GET and OK packets, depending on the web activities going on. Make sure you get the right GET and OK packet using the info column of the Packet List. Create a lab report using MS Word, and answer the following questions. Q1. Provide the packet #s of the GET and OK packet. When you select the GET message in the packet list, you can see in the Packet Details (middle window), there are 5 section items * Frame ...

Words: 1908 - Pages: 8

Premium Essay

Facebook Fun

...$500 EVERYDAY with FACEBOOK FAN PAGES! ver 1.8 (Updated: 16th September 2010) From the desk of your favorite author Adam C. Miller A member of Warrior Forum 1 $500 EVERYDAY with FACEBOOK FAN PAGES! ver 1.8 DISCLAIMER The information presented herein represents the views of the author as of the date of publication. Because of the rate with which conditions change, the author reserves the rights to alter and update his opinions based on the new conditions. This manual is for informational purposes only and the author does not accept any responsibilities for any liabilities resulting from the use of this information. While every attempt has been made to verify the information provided here, the author and his referrals cannot assume any responsibility for errors, inaccuracies or omissions. Any slights of people or organizations are unintentional. This publication is not intended for use as any source of advice such as legal, medical, or accounting. The publisher wants to stress that the information contained herein may be subject to varying international, federal, state, and/or local laws or regulations. The purchaser or reader of this publication assumes responsibility for the use of these materials and information. Adherence to all applicable laws and regulations, including international, federal, state and local governing professional licensing, business practices, advertising, and all other aspects of doing business in the EU, US, Canada or any other jurisdiction...

Words: 6105 - Pages: 25

Free Essay

Blasted

...Telecom Lab 1 HTTP Deliverables - 1. HTTP GET Packet- Browser - HTTP 1.1 Server – HTTP 1.1 By analyzing the 2. HTTP Packet is sent over TCP 3. Source port for HTTP GET – 50049 Destination port for HTTP GET – 80 4. Language browser supports – English US 5. My IP Address: 172.19.17.83 IP Address of www.ietf.org server: 104.20.0.85 6. The status code returned by the server to your browser – 200 OK 7. The Last-Modified Date for the HTML file at server is- Tue, 03 May 2011 16:34:53 8. 17807 bytes of content is being returned to your browser. screenshot 9. Approximately 13 GET requests. As this is by default persistent HTTP connection, for each object there will be a GET request. Screenshot 10. There were 2 data containing TCP segments containing 1460 and 705 bytes respectively for a total of 2165 bytes. 11. What other protocols were used by your computer to retrieve the content? What were not used to retrieve the content? Deliverables – DNS Lab IP Address – 172.19.17.83 DNS IP address – 129.210.250.201; 129.210.250.202 1. DNS query and response messages are sent over UDP. 2. Destination port for the DNS query message – 52 Source port of DNS response message – 50280 3. IP address is the DNS query message sent – 129.210.250.201 Using ipconfig to determine the IP address of your local DNS server. - 129.210.250.201 Yes, they are same. 4. “Type” of DNS query – A. No answer in the query message. 5. Number of “answers” provided...

Words: 324 - Pages: 2

Premium Essay

Computer Hw

...Assignment Type: Discussion Board   Deliverable Length: 4–7 paragraphs     Due Date: 2days  Discussion Board Posting Policy 1. Definitions: a. Main Post - the student's direct response to the DB assignment. The main post can be the student's first post of the week or a subsequent post. b. Response Post - the student's replies to others in the class. Response posts are required to be relevant and substantive, to add something to the issue being discussed. It cannot be over-emphasized that all DB posts should help move the online discussion forward.  c. Initial Post - the student's first post to the DB in the week. This post is an original substantive response to another student or to the Unit DB Forum. 2. The Online week begins on Monday and ends on Sunday. A minimum of three posts by each student are required each week: d. The main DB post. e. At least two (2) relevant and substantive response posts to others in the class. 3. Students are expected to make their initial DB post early in the week but not later than 11:59pm, CT, Wednesday before the designated due date for the assignment. f. The initial DB post can be the main post or any of the two required response posts as described in statement #2 above. g. The remaining two posts must be uploaded on any two separate days in the week. One of the two separate days can be the day the initial post is made. 4. Students are strongly encouraged to participate actively in the DB several days...

Words: 854 - Pages: 4

Premium Essay

Dhcp Server Configuration in Ubuntu

...DHCP Server configuration 1) Configure the network interface to give a static IP address to the DHCP server Edit the file /etc/network/interfaces [pic] 2) Use the command sudo apt-get install isc-dhcp-server in the terminal to install DHCP. 3) For the DHCP to assign Ipv4 addresses edit the file /etc/dhcp/dhcpd.conf and provide the range of address you want to the DHCP server to assign. [pic] 4) For ipv6 address, create a new file dhcpd6.conf and then configure the range of ipv6 addresses which needs to be assigned. The file should be created in /etc/dhcp/dhcpd6.conf [pic] 5) For ipv6, edit the file /etc/sysctl.conf and provide the below configurations. net.ipv6.conf.all.forwarding=1 net.ipv6.conf.all.autoconf=1 net.ipv6.conf.all.accept_ra=1 [pic] 6) Enter the below commands to enable the configurations made above. sudo sysctl -w net.ipv6.conf.all.autoconf=1 sudo sysctl -w net.ipv6.conf.all.accept_ra=1  sudo sysctl -w net.ipv6.conf.all.forwarding=1 7) Install the router advertisement daemon or radvd by using the command Sudo apt-get install radvd 8) Create file /etc/radvd.conf and put the internal interface and prefix there. [pic] 9) Now restart all the service using the commands - Sudo /etc/init.d/networking restart - Sudo /etc/init.d/radvd restart ...

Words: 335 - Pages: 2

Premium Essay

Midterm

...out of 70. Question1 Marks: 4 Create an organization named FIU-CT-<USERNAME>. Next create four machine groups under the newly created organization. The groups are SCIS-CT, MR-CT, GL-CT, and CEC-CT.  What must be included in the answer file? * A screenshot that shows the newly created organization and the machine groups. Self Assessment: Choose one answer. | Fully Completed! | | | Partially Completed! | | | Not Done! | | Question2 Marks: 4 Create a username for, newadmin-<USERNAME> -ct, Stanley Folk. Stanley has limited access to only the SCIS building. His user role is similar to yours. Hint: All other required information needed to create a user can be made up at your own discretion.  What must be included in the answer file? * Screenshots that show the newly created user and the relevant pages showing the assigned roles, scopes, and logon hours. Self Assessment: Choose one answer. | Fully Completed! | | | Partially Completed! | | | Not Done! | | Question3 Marks: 2 Use Naming Policy to force all machines in mr and cec networks to check into their respective machine groups, namely, mr and cec.  What must be included in the answer file? * A screenshot that shows the newly created naming policies. Self Assessment: Choose one answer. | Fully Completed! | | | Partially Completed! | | | Not Done! | | AGENTS:  Tip: Estimated time required to finish this part is 18 minutes; The marks for this part...

Words: 2067 - Pages: 9

Premium Essay

Trying to Join Site

...IT1115 Introduction to Information Technology Syllabus Credit hours: 6.0 Contact/Instructional hours: 70 (50 Theory, 20 Lab) IT1115 Introduction to Information Technology Syllabus COURSE SUMMARY COURSE DESCRIPTION This course explores foundational topics related to information technology. Topics examined include computing devices, hardware, software, operating systems, computer networks, security, and computer programming. Logical problem solving, troubleshooting, and maintenance of computer systems are also introduced. MAJOR INSTRUCTIONAL AREAS 1. Computer History and Fundamentals 2. Hardware 3. Operating Systems 4. Basic Networking 5. Basic Security 6. Software 7. Basic Programming 8. Web Technologies 9. Troubleshooting COURSE LEARNING OBJECTIVES By the end of this course, you should be able to: 1. Identify the evolution of computers and different types of computers. 2. Convert numbers between binary, decimal, and hexadecimal number systems. 3. Explain the purpose, functions, and characteristics of a CPU. 4. Describe the physical components of a computer and various input and output devices, including storage and memory. 5. Describe the function of BIOS and the booting process of a computer. 6. Describe basic operating system architecture, its components, and storage management. © ITT Educational Services, Inc. All Rights Reserved. [2] 6/15/15 IT1115 Introduction to Information Technology Syllabus 7. Describe basic types of computer network topologies and connections...

Words: 12527 - Pages: 51

Premium Essay

Nt1210 Unit 1 Assignment 1 Subnet Analysis

... All devices must be configured correctly (16 marks) 1.3 Configure the routers with a password of cisco1. Provide a screenshot of this configuration and show proof of your configuration. (5 marks) 1.4 Test your network and provide screenshots as proof of a successful connection. (4 marks)   Question 2 2.1 As a network administrator why is important to understand the OSI model? (9...

Words: 824 - Pages: 4

Premium Essay

Nt1310 Unit 1 Assignment 1

...incoming connection requests should be rejected with the following exceptions. iptables –A INPUT –s 10.10.111.0/24 –d 10.20.111.0/24 –j REJECT -m state --state NEW,ESTABLISHED,RELATED. iptables –A FORWARD –s 10.10.111.0/24 –d 10.20.111.0/24 –j REJECT -m state --state NEW,ESTABLISHED,RELATED....

Words: 1021 - Pages: 5

Premium Essay

Inventory Management Case Study

...is given how much amount of work in past and which vendor comes frequently in default list in terms of delivery. 6) Keeping a regular check on due date of vendor payments. 7) Sales team can update the ERP module with monthly and quarterly forecast so that production know in advance how much units tentatively needs to be manufactured. Implementation of ERP module can result in better sink between Manufacturing, Production and Sales team of the company by keeping a check on Available stock, products most manufactured, timely dispatch etc. Marketing/Sales Management: As company has fixed clientele and is not doing much in Marketing. As far as sales is apart from getting order the main point of concern are as follows:- 1) Orders 2) Sales Requests 3) Meeting lead times as promised to...

Words: 984 - Pages: 4

Free Essay

Memo Paper

...MEMORANDUM TO: Microsoft FROM: XXXXXX DATE: May 19, 2010 SUBJECT: Request for Permission Dear Microsoft, My Company in writing this letter is asking permission for the company and it's users to officially use, develop, and share screenshots of the new Windows 7 in our company’s manual. We know through your company’s web site and call’s to your Help line that Microsoft is currently not allowing companies to do this but we are asking for us to be allowed to do so. We believe it is in your best interest and ours to let us do this. Here are our reasons why: 1) It will allow us to show the reader desktop pictures – In our manual, we will cover the basic areas of navigation, like getting from the desktop to the control panel and demonstrate the proper steps needed to get from one area to another area in Window 7 operating system. In the companies manual we use many different work areas on the computer. By giving a screen shot to the end user they will understand more with a screen capture by seeing it in our manual. We try to give our users as much detail information as possible but a screen shot will help the user understand our information across to them easier. 2) Goodwill – As we are a Non-profit organization to allow us to use, develop, and share this manual it will help us keep our cost down and be able to provide a better product for our end users. Because your company is the biggest developer in the world of Operating Systems, you are currently...

Words: 396 - Pages: 2

Premium Essay

Operating System Upgrade Implementation Report and Presentation

...Router…………………………………………………………………………….12 Firewall…………………………………………………………………………..13 Server…………………………………………………………………………….13 Ethernet…………………………………………………………………………..13 Printers…………………………………………………………………………...14 Necessary Networking Components……………………………………………………..14 Modem…………………………………………………………………………...14 Network Switch………………………………………………………………….15 Print Server………………………………………………………………………16 DHCP Server…………………………………………………………………….17 LDAP Server…………………………………………………………………….17 WAP……………………………………………………………………………...17 DNS Server………………………………………………………………………18 Database Report……………………………………………….…………………………....19 Database Examination…………………………………………………………………...19 Database Modification…………………………………………………………………...20 Database Query and Screenshots………………………………………………………...21 Information Assurance Presentation (PPT)…………………………………..23 Web Technology Tutorials…………………………………………………….. (24-28) Tutorial 1: Setting up a Homepage in a Brower……………………………………………...24 Tutorial 2: Enabling and Disabling of Cookies……………………………………….……...24 Conclusion…………………………………………………………………………………..29...

Words: 3956 - Pages: 16

Free Essay

Eng 221

...ENGLISH 221: Technical Writing Fundamentals PRINT OUT—PRINT OUT-- PRINT OUT—PRINT OUT-- PRINT OUT If you have any questions about the syllabus, please post them in the Main Classroom. Susan Colebank scolebank@email.phoenix.edu (University of Phoenix) susancolebank@gmail.com (back-up; do not CC this address when you e-mail me at my UOP address) COURSE NUMBER: ENG221 COURSE TITLE: Technical Writing Fundamentals COURSE START DATE: 1/17/12 COURSE END DATE: 2/20/2012 FACILITATOR AVAILABILITY I am in the Classroom five days of the week: Sunday, Monday, Wednesday, Thursday, and Friday. I am on in the morning and then again at night, with the afternoon set aside for telecommuting and taking care of my daughter. I provide you with these times to make it easier to communicate with me, and not to limit our contact. I want you to know that, should you need to contact me outside this timeframe, you should not hesitate to do so via my University of Phoenix e-mail. I HIGHLY RECOMMEND e-mailing me with your questions or concerns, since it is best to document our conversations with a paper trail. I have yet, in nine years of being a UOP instructor, found a student who has a question or concern that couldn’t best be discussed via e-mail. If you need to call me, then please e-mail me first to schedule a time and to leave your phone number. For emergencies, when you are not able to gain access to messages on the Online Learning System (OLS), please send a message to...

Words: 8583 - Pages: 35

Free Essay

Web Site of Midland Bank

...Problem in the current web site of Midland bank The first problem that I found in Midland bank’s web site is that it’s a full of unnecessary images and the images sizes are very large. These images are just capturing the whole pages that create bad effect of the pages. For example , this picture doesn’t mean any effective sense here rather it just reduce the sizes of take proper information on the page. These pictures also increasing the page loaded time and it is hamper for any web site and customers feel disappointed when they browse the sites. Therefore, another problem are the site has lack of information. The information are not organized nicely and the site is not look like a standard financial service’s web site. Moreover, in this website meta description is not mention clearly. Visitors will be confused about the description while they visit the site. Then, in this site they don’t mention about reward program or the ranking position of their bank. Additionally, they just put their sponsor’s picture in their site but they don’ mention about their designation and other information about their sponsors that is very difficult to recognize their sponsors through visiting web site. In my observation another findings they don’t take important information in their site and the information that provided in their web site is not organized clearly. They uploaded many unnecessary pictures instead of providing important information. For example, this picture is not needed...

Words: 571 - Pages: 3

Free Essay

Student

...Lab 5 Instructions Packet Tracer: Use of the TCP/IP Protocols and the OSI Model [Adapted from Cisco Networking Academy Network Fundamentals] Background: In Packet Tracer simulation mode, you may view detailed information about packets and how they are processed by networking devices. Common TCP/IP protocols are modeled in Packet Tracer, including DNS, HTTP, TFTP, DHCP, Telnet, TCP, UDP, ICMP, and IP. Packet Tracer uses a representation of the OSI model to display how these protocols are used by networking devices in creating and processing packets. The term “protocol data unit,” or PDU, is a generic description of what are known as segments at the transport layer, packets at the network layer, and frames at the data link layer. Help Files and Tutorials: From the pull down menu, choose Help->Contents. A web page will open. From the left frame, choose Operating Modes->Simulation Mode. If you are not already familiar with it, read about simulation mode. Realtime and Simulation Modes: In the far lower right of the PT interface is the toggle between Realtime and Simulation mode. PT always starts in Realtime mode, in which networking protocols operate with realistic timings. However, a powerful feature of Packet Tracer allows the user to "stop time" by switching to Simulation mode. In Simulation mode, packets are displayed as animated envelopes, time is event driven, and the user can step through networking events. To switch from Realtime mode to Simulation mode, click...

Words: 1426 - Pages: 6