Free Essay

Security Notes

In:

Submitted By Fitchic21
Words 1168
Pages 5
Week 1: Lecture 1: Information

* Information * Information is things that are or can be known about a topic. It is also known as communicable knowledge, which is something you can impart to someone else. It is an unambiguous abstraction of data. Now in the digital sense, the smallest unit of information is a single bit; is the bit on or is the bit off? Now if we go back to the days of landline telephone service, you would call information which would give you a phone number for a subscriber if you describe enough detail who the describer might be. The difference between data and information is that information is knowledge that you get or abstract through processing of data. What I do with those 1’s and 0’s, and how I would apply application software to it, transitions data and turns it into knowledge. * The other thing about information is that information depends on the context around it. For example, lets take numbers….10 digits, well 10 digits by themselves can just be 10 digits, but if I put a semicolon in between them (:), it can now be assumed that it is a time or a duration or a track record. Now if I would put a $ in front of those numbers, it could be the price of something or the amount of money in my wallet. Now if I add another meaning to those numbers lets say, I make the first 3 digits an area or a region assignment, the next 2 digits a group and the last 4 a serial number….I will then have the coding for a social security number. Now they are just digits but it is how I interpret those digits’ in the context that are around them. * Information Security * So, information security is the protection of information, i.e. the protection of the contents of the information. But why do we need to protect it in an enterprise? Well, we should protect it because: * Intellectual property is at stake. Intellectual property are patents, production methods, manufacturing-the new and old car model * For example, if I have a better way to manage a widget, that gives you can Intellectual property stake in the widget. * Financial result- you do not like or want financial results to leak prematurely. You also do not want competitors to know that you are doing worse than they are or that they are doing better than you. * Personnel Data- It wouldn’t be good if it got out that an employee was out on sick leave because they had a mental breakdown * Salary data is another thing that we would not wan to leak. There is no better way to discourage employees then for them to be able to tell who makes what. * Healthcare information, if this was leaked people would be able to see who has what health care policy, who met their deductable, who is seeing which doctor and so on. * Information Classification * Why do we have to categorize information or classifying information? Well, because different information needs different protection. It is also very hard to protect everything with the same level of protection. If someone did that, it would be very expensive. So, there are different categories of information that require different protections. * Merger and acquisition information (who is buying out who) * Proprietary Information * Executive private information (who is getting a bonus) * Personnel Information (hiring and firing) * Health care information (who is pregnant who is not) * Characterization of Classified Information * Classified information is a categorization applied to information that a government claims is sensitive information. Which means that the government restricts it by law to a group of people or groups of people and you have to be cleared for that information with a formal security clearance. A formal security clearance is often required to handle classified documents or access to classified data. Now the purpose of classification is to protect information that can be used to endanger or damage national security. * For example, releasing the plans for an atomic bomb * Classification defines a state secret and gives you a level of protection that is based on the expected damage that the information could cause in the wrong hands. * For example, if a spy is outed in a foreign country that could cause harm. * Government classification * Top-Secret * Can cause grave national damage. This is the highest level of classification. * Secret * Would cause serious damage * Confidential * Would cause damage or prejudicial * “wiki leaks” scandal * Restricted * Would cause undesirable effects. * Implication and Sample Classifications * Implication * The implications of classification are a function of governance activity. How I enforce rules in an enterprise. Each enterprise classifies information differently just like every system in the US government has a classification guide. That classification guide will tell you what is top secret, secret, confidential and restricted. Well, in an enterprise there is very little documented about how information is actually classified or if there is a classification guide its not widely known. * Sample Classifications that you will see in an enterprise * Proprietary * Cost proposal data * Executive private * Personnel Information * Classifications * Directed Classification * Other classifications that you have can be DIRECTED classifications, classifications that are passed down by regulatory authority. Things like the use of social security or identification numbers for employees. HIPAA information, healthcare information privacy accountability act, in which the person knows that their information will not be shared with people who do not have a NEED for that information. Personal privileged information, criminal history information, mistakes that we made in the past stay in the past, and fiduciary data. * Classification * Now the thing about information classification is that it is very subjective and it has to be done. The reason you have to do it is because different directed classifications have different handling requirements. Those handling requirements will dictate how you process that information in an IT system. The other thing is that you can’t protect all of the information equally. If you protect all information equally, very little information will actually be shared. But not only that, it will end up costing you a small fortune because securing everything equally means that you are literally locking up everything as well as keeping track of every piece of data. * Implications for Security * The implications for security are actually very simple. Information classification categorization is the foundation for enterprise security. You have to know what to protect and what you are protecting it from. Once you do that, you can identify what you are actually protecting it from. So lets say if it is healthcare information, you are worried about disclosure and modification. Disclosure transfer into confidentiality (keeping something secret), modification makes something an integrity risk (example, if a medical test result is changed so that it comes back positive instead of negative, that is an integrity issue), and access the availability of information. So basically you want to identify what you are protecting information from because that helps you figure out best how to protect it.

Similar Documents

Premium Essay

Intro to Information Security Notes

...Responses on port 80= a web service is running. HTTP Port 443- HTTPS To run port scans all you need is access to the LAN and/or subnet Technet.microsoft.com/en-us/security/advisory Mitigate vulnerabilities Threats are things you have to respond to effectively. Threats are controllable Risks are manageable Vulnerabilities can be mitigated All affect the CIA triad Not all threats are intentional Confidentiality, integrity, accessibility = CIA Starting on pg 161 DAC- only as secure as the individuals understanding. Access determined by owner. MAC- access determined by data classification itself. data itself has a classification. Need to be cleared to the level of the data security. Also has a “need to know” aspect to it. Non DAC- third party determines the permissions. Role based- pg 166. Access determined on the job of the user. Rule based- variation of DAC. Rules are created and access is based on the rules created. Week of 4/17/13 Starts on pg 146 Project- search SSCP CBK on the library under 24/7 Each of the 7 domains, vulnerabilities in each, security used in each to control, For lab 5--- Make 4 types of connections. 2 secure 2 not secure. telnet, securenet, ssh, and ftp. Will need 3 machines. Student, Target, ubuntu 1 Wireshark setting to capture a file in promiscuous mode on student. Do an FTP to target windows. Command prompt from student to ubuntu. Try to log in. Do questions. Question 9, focus on SSH and what traffic you are getting...

Words: 907 - Pages: 4

Premium Essay

Security Plus Notes

...Chapter 1: Measuring and Weighing Risk Risk Assessment Risks to which the organization is exposed Allows you to develop scenarios that can help evaluate how to deal with risks Ex. An OS, server, or application may have known risks in certain environments Create a plan for your organization. Risks that need addressing Risk assessment components allows the organization to provide a reality check on real risks and unlikely risks. Ex. Industrial espionage and theft are likely, but a risk of a pack of dogs stealing contents of payroll files is low, therefore resources should be allocated to prevent espionage. * Computing Risk Assessment Prioritize Measurements of risk assessment Annualized rate of Occurrence (ARO) This is the likelihood, often drawn from historical data, of an event occurring within a year. Used in conjunction with monetary value assigned to compute Single Loss Expectancy (SLE) and Annual Loss Expectancy (ALE). Risk Assessment formula SLE x ARO = ALE You can expect that every SLE, which is equal to Asset Valve (AV) times Exposure factor (EF), will equivalent to $1000 and that there will be seven occurrences in a year (ARO), the ALE is $7000. Conversely if there is only a 1- % chance of an event occurring in a year (ARO=0.1) then the ALE Drops to 100. Examples: You are the administrator of a web server that generates $25,000 per hour in revenue. The probablility of the web server failing is estimated to be 25 percent, and a failure would lead...

Words: 1897 - Pages: 8

Free Essay

Tvm with Bonds

...Michael Sherman Ph1 IP TVM with Bonds FINC390-1240B-07 Colorado Technical University Online Professor Angela Garrett 26 November 2012 Calculator Results for Redemption Date 11/2012 Total Price | Total Value | Total Interest | YTD Interest | $16,665.00 | $117,957.76 | $101,292.76 | $998.92 | Bonds: 1-16 of 16 Serial # | Series | Denom | Issue Date | Next Accrual | Final Maturity | Issue Price | Interest | Interest Rate | Value | Note | NA | EE | $50 | 11/1990 | 05/2013 | 11/2020 | $25.00 | $50.52 | 4.00% | $75.52 | | NA | EE | $100 | 11/1990 | 05/2013 | 11/2020 | $50.00 | $101.04 | 4.00% | $151.04 | | NA | EE | $500 | 11/1990 | 05/2013 | 11/2020 | $250.00 | $505.20 | 4.00% | $755.20 | | NA | EE | $5,000 | 11/1990 | 05/2013 | 11/2020 | $2,500.00 | $5,052.00 | 4.00% | $7,552.00 | | NA | SN | $25 | 11/1967 | | 11/1997 | $20.25 | $135.27 | | $155.52 | MA | NA | SN | $50 | 11/1967 | | 11/1997 | $40.50 | $270.54 | | $311.04 | MA | NA | SN | $75 | 11/1967 | | 11/1997 | $60.75 | $405.81 | | $466.56 | MA | NA | SN | $100 | 11/1967 | | 11/1997 | $81.00 | $541.08 | | $622.08 | MA | NA | E | $50 | 11/1963 | | 11/2003 | $37.50 | $408.84 | | $446.34 | MA | NA | E | $100 | 11/1963 | | 11/2003 | $75.00 | $817.68 | | $892.68 | MA | NA | E | $500 | 11/1963 | | 11/2003 | $375.00 | $4,088.40 | | $4,463.40 | MA | NA | E | $10,000 | 11/1963 | | 11/2003 | $7,500.00 | $81,768.00 | | $89,268.00 | MA | NA | I | $50 | 11/1998 | 12/2012 | 11/2028...

Words: 555 - Pages: 3

Premium Essay

Something Borrowed Malcolm Gladwell Analysis

...Those notes can only be sequenced so many times before they are repeated by a new musician and called “original”. Intellectual property has been protected in the courts systems, but has favored personal interest over creativity and borrowing. In the case of Weber vs. Repp for example, Repp was claiming to be the owner of the copied Catholic folk music stolen to create music by Weber. With help from a lawyer, it is proven that Weber wrote a song previous to the music and songs by Repp. It was demonstrated that Weber wrote a song, Repp wrote another song sounding similar, and then Weber wrote the song in question. This showing that Weber borrowed from himself and Repp borrowed from him. The musical notes played in the same sequence were copied by both composers and therefore the courts dismissed the case, musical notes are not owned by any one composer. It does not matter what you copy but how much you choose to take. The idea behind Gladwell’s argument is that borrowing some to be creative is and needs to be acceptable in the eyes of “plagiarism...

Words: 1296 - Pages: 6

Free Essay

Narrative

...to harmonize, considering it was our first year learning an instrument. There was no reading or writing when it came to playing the instruments, but with music, a story can be made. For example, half the class would play our recorders in sync with one another, and other students in the class would play percussion. With the rhythm of the music combined, the feel and sound of the music gives the audience a feel of a different environment, such as feeling as though you are taking a journey through an Indian village, or celebrating the first fourth of July in America. As I progressed through the year, music classes turned into singing as well. In order to know the words that we were singing, we had paperback music, which had music lines, notes, and words for us to...

Words: 1172 - Pages: 5

Free Essay

Integrity

...through the paper. Halfway through the paper, I saw my friend John suspiciously looking at the class. My instincts told me that something was wrong. As a result, I began to keep an eye on John. Suddenly, I saw John taking notes out from his pencil case! My mouth hung wide open and I gasped in shock. How could John do that! I thought should I report him? The devil in my mind said that I should not care about this thing after all, he is still my best friend while the angel said that I should be honest and report him. After thinking for a while, I decided to report him. I raised my hand and told the teacher “ Mr Tan, John is cheating by using notes from his pencil case.” The teacher nodded his head and walked towards John’s table. Mr Tan said “John! Why are you cheating?” John shook his head to deny that he did not cheat. Mr Tan confiscated his pencil case and dumped the contents out. Out came pencils, erasers and pens. But there was no notes inside! John let out a smirk from his mouth. I was shocked! I thought that there was a note? Just when I thought all hope was lost, Mr Tan found another zip at the pencil case and he opened it. Suddenly, John’s smirk began to vanish. Waves of panic overwhelmed him. The hidden note was found there! Mr Tan looked at John sternly. He brought John to the principal’s office to explain what had happened. On the next day, the fiery-tempered Discipline Master caned John during assembly period. After this incident...

Words: 333 - Pages: 2

Premium Essay

Note Taking

...Improving Your Note Taking ▪ Effective note taking is one of the keys to succeeding in school. Students should devote a considerable amount of time reviewing information discussed during classroom lectures. It is very difficult remembering specific details from classroom lectures without good notes. These note taking strategies will help you to take better notes: ▪ Make clear and accurate notes Make sure to take legible and accurate notes since it is not uncommon to forget key details discussed in class after it has ended. Frequently, students comprehend the teacher's lecture, so they'll neglect to jot down specific details only to forget them later. Students who keep accurate notes can review them later to fully grasp key concepts during personal study time. Additionally, since during classroom lectures teachers frequently cover many topics, effective notes enable students to concentrate on specific topics. ▪ Come to class prepared Students properly prepared for class usually take better notes. Proper preparation includes completing assigned reading prior to class and reviewing notes from previous lectures. Students who do this can ask questions about confusing concepts and be prepared for new topics. ▪ Compare your notes To ensure your notes are as accurate and detailed as possible, compare them with the notes of other students after class is over. This is useful because your colleagues will frequently write down lecture details that you...

Words: 602 - Pages: 3

Free Essay

Michael Meets Mozart

...Side Notes: • I came up with a killer Mozart-style arrangement involving several songs by modern artists. But I ran into a roadblock with getting permissions. So I decided to do variations on a theme by making my arrangement an original tune. Helpful Hints: • Learn the hardest parts first with the correct fingering. Instead of using a slower tempo to practice longer sections, try using the actual tempo to practice overlapping shorts sections (as small as 2 notes...hands alone if needed). • For those who have heard the recording or seen the video on • When I practice, it helps me to realize that it takes up to 300 YouTube, Steven Sharp Nelson laid down over 100 tracks, including (perfect) reps before muscle memory kicks-in. cello textures never before known possible. Every single sound on the video was made using only the instruments shown: piano, cello, • I like to imagine totally soft and relaxed hand muscles as I play... think "soft hand" when approaching hard sections. mouth percussion and kick drum. Of course we put in additional cool effects. For example the U2-style delay on Steve's pizz at the • For a two-minute-edit version, start at measure 109 beginning. (two-minute-edit minus track available at jonschmidt.com). • A recording of the orchestration only (minus piano) is available at jonschmidt.com. This is very fun for live performances with a monitor speaker next to you on stage so you can hear the parts well. Michael meets Mozart = 91 chills up copyright...

Words: 622 - Pages: 3

Free Essay

Note Taking Assignment

...Dean Helton Note-Taking Assignment 1. Why did you choose Cornell, Outline, or Visual Map? I chose the visual map way of taking my notes this morning at church. I have actuallynever taken my notes that way before, but I really enjoyed it. I am a kinesthetic learner and seeing maps and graphs help me understand things a lot better than just simple notes. I was nervous at first to take my notes this way but I very quickly got the hang of it. After the sermon it was much easier for me to look over my notes and understand what the message and sub nots were pointing out. I will now take all of my sermon notes this way. 2. What did you like about the style of note taking you chose? I enjoyed using this style for many reasons. One of the main reasons was because it gave me the opportunity to listen more to the sermon wrather than focusing on writing down the notes that we were given. It also was a huge help to me after when I was looking over the notes. It gave me a clearer picture of what the sermon was about. 3. What did you dislike about the style of note taking you chose? I think the only thing I disliked about it is that it is almost like an outline,a nd if you are not careful you could miss an important long point that need sto be recorded just for the sake of making your picture graph look good. I added a few take away points at the bottom of my notes that I felt like I needed to add so that I could better understand the over all message. 4. How do you plan...

Words: 380 - Pages: 2

Free Essay

Adsfmct

...Symbols Facebook Symbols for Status Everyone fancy a cool status update decorated with facebook symbols. People always wonder how their friends got symbols for status when they add hearts, music notes , stars and other signs into their status. Actually its not difficult. Follow my steps and you will learn how to add facebook symbols for status. Before you start decoration your status updates with symbols, take a look at complete list of all facebook symbols. These are Unicode text characters that you can put into your status. Just use your imagination and creativity and you will come up with nice ideas. Take these symbols and combine them to create status decoration where you can add your ‘text update’. Most common facebook symbols people use for decoration are heart symbol, star symbol, math signs and music notes. Here we have got the most comprehensive list of facebook status symbols. Just copy and paste them in your status. ๑۩۞۩๑ Type your status message!! ๑۩۞۩๑ ๑۩๑ Type your status message!! ๑۩๑ ▂ ▃ ▅ ▆ █ Type your status message █ ▆ ▅ ▃ ▂ ★·.·´¯`·.·★ facebook symbols for status ★·.·´¯`·.·★ ..♩.¸¸♬´¯`♬.¸¸¤ Type your status message here o ¤¸¸.♬´¯`♬¸¸.♩.. ¤♥¤Oº°‘¨☜♥☞¤ symbols for facebook status ¤☜♥☞¨‘°ºO¤♥¤ ♬ •♩ ·.·´¯`·.·♭•♪ This is musical notes ♪ •♭·.·´¯`·.·♩ •♬ »——(¯` Type your status message here ´¯)——» ¸.·’★¸.·’★*·~-.¸-(★ facebook symbols ★)-,.-~*¸.·’★¸.·’★ •(♥).•*´¨`*•♥•(★) Type your status message here (★)•♥•*´¨`*•.(♥)• O...

Words: 579 - Pages: 3

Free Essay

Exam

...discussions.  No warning will be given to you and the invigilator will make a note of your name and update the Program Manager. You are not allowed to leave the examination hall till you finish your examination. You are required to switch off your mobiles always. |Course |Date |Time |Duration |Type of Exam |Comments | |Principles of Management |Wednesday |10.30 am - 12.30 pm |2 hours |Closed Book/Closed notes |Multiple choice ( 50 min) | | |4th Feb, | | |Laptops not allowed |Descriptive(1 hr 10 min) | | |2009 | | |Internet not allowed |Write with pen no scribbling | | | | | | |Mobile phones are not allowed in the class | |Organisational Behaviour |Wednesday |2.30 - 4.00 pm |90 min |Open Book/Open Notes | ...

Words: 284 - Pages: 2

Free Essay

Cfa Test Experience

...CFA2 、 3 级考生请绕道。 二、作者背景 1. 学历:低于北京 TP 二校的理工科本科 2. 复习时间: 2 个月左右的脱产复习 3. 复习方式:在南京某知名高校内与两名 candidate 一起复习 4. 复习遍数:大概 notes2.5 遍。习题 3 遍 5. 考试成绩:除 alternative investment B ,其余 A 6. 考试用时:上午 1 小时 20 分钟,下午 1 小时 30 分钟 三、正文 3.1 复习资料、习题 a) Schweser Notes 5 本(课本部分) 5 星推荐必看 b) Schweser Notes 5 本(习题部分) 5 星推荐必做 c) 某机构中文翻译(广告位招租) 5 星推荐必购 d) 官方 Reading (课本部分) 负 5 星推荐(学术型人才推荐) e) 官方 Reading (习题部分) 6 星推荐必做 f) 近两年官方 mock (俗称模拟题) 5 星推荐必做 g) 近两年官方 sample (俗称样题) 6 星推荐必做 h) 某机构百题预测(广告位招租) 4 星推荐选作 i) N otes 练习(也就是 6 、 7 两本) 1 星推荐蛋疼者做之 j) 官方 道德手册 3 星推荐选看 k) 辅导班视频(广告位招租) 3 星推荐选看 l) 老婆一只 自己看着办吧 m) 辅导班(广告位招租) 本 3.5 没上 n) 其他 本 3.5 没看 3.1.1 阅读资料 说到考试资料,那官方的 Reading 就是纯 TM 扯淡,如果在今年能够收到电子版的情况下,还去花着 N 百刀买那自己用着都心疼的铜版纸教材,绝对是烧包的表现,一来不 支 持低碳生活,二来过于支持 CFA 的宗旨 —— 骗钱第一,考试第二。 在官网注册完,直奔万能的 Taobao ,在搜索栏 baidu 一下 “ CFA Notes ” 你就能看到 一 个真正的完全竞争市场。具体书的颜色每年不一样,但要用的是哪本,哥们你懂的。 同时某些机构的中文翻译教材,绝对是上佳之选,不要和我 zhuangbility 说兄弟你的 英文能力多么销魂,就是再 TM 销魂,你告诉我什么是 qualified 和 unqualified ,如果告诉 我是 “ 合格 ” 和 “ 不合格 ” 的,本 3.5 告诉你, S+B 离你已经不是太远了。 此外有许多朋友会推荐官方的道德手册(网购 notes 的时候一般会送你),这个问题 下 一章节会提及。 作为补充,辅导班的 “ 免费 ” 视频同样是可以用来借鉴的, 3000 多块钱白给,不要 白 不要。 另外某机构的百题预测也是可以用来把玩的,相当于在最后,对知识点做一个大致 的 温习,不过里面有些题目的答案并不完全正确,当然已经通读 notes 的你肯定能够判断出 的。 3.1.2 习题 大家经常会烦恼要做哪些题,要么说 notes 题少而简单,要么问书后的问答题到底要 不要做。本 3.5 郑重的告诉你,官方 Reading 后面的习题是一定要做的,无论选择还是问 答,因为其中有些干脆就会在考试中重现,比如在看定量分析( quantitative )的时候,你 会发现,为什么书中大篇幅出现的 T-value 和 F-value 的题目数量和只有一句话提及的 P- value 一样多的时候,作者已经内牛满面的在告诉你要考什么了。有人问 Reading 这么厚, 自习时候拿着多烦躁, 3.5 偷偷地告诉你, Reading...

Words: 1170 - Pages: 5

Free Essay

Note Taking

...TAKING LECTURE NOTES I. There are many reasons for taking lecture notes. A. Making yourself take notes forces you to listen carefully and test your understanding of the material. B. When you are reviewing, notes provide a gauge to what is important in the text. C. Personal notes are usually easier to remember than the text. D. The writing down of important points helps you to remember then even before you have studied the material formally. II. Instructors usually give clues to what is important to take down. Some of the more common clues are: A. Material written on the blackboard. B. Repetition C. Emphasis 1. Emphasis can be judged by tone of voice and gesture. 2. Emphasis can be judged by the amount of time the instructor spends on points and the number of examples he or she uses. D. Word signals (e.g. "There are two points of view on . . . " "The third reason is . . . " " In conclusion . . . ") E. Summaries given at the end of class. F. Reviews given at the beginning of class. III. Each student should develop his or her own method of taking notes, but most students find the following suggestions helpful: A. Make your notes brief. 1. Never use a sentence where you can use a phrase. Never use a phrase where you can use a word. 2. Use abbreviations and symbols, but be consistent. B. Put most notes in your own words. However, the following should be noted exactly: 1. Formulas 2. Definitions 3. Specific facts C. Use outline form and/or...

Words: 1031 - Pages: 5

Free Essay

Three Strategies That I Will Apply in My Personal and Academic Life, the Impact, and the Effectiveness

...remember when the email was sent or who sent it. Since reading this chapter, I have started to save specific email information as word documents grouped under different folders. This has proven to be effective for linking related topics in the respective folders which makes locating the information quicker. In my academic life, I will first note the topic to be studied and pay greater attention to the learning objectives. This would then make it easier to skim through the chapter and specifically note the more important material and review that first as well as to research any related topics by using other resources. The chapter also noted the importance of paying attention to any information in bold type and any illustrations. This strategy would greatly increase my knowledge of the topic and improve note-taking. It would also assist in remembering the useful information. Therefore, this would be effective for review and preparation for exams as well as being in an overall position to utilize and apply the new information whenever possible. 2. The ‘Write it down’ strategy The chapter noted that writing a note helps you to...

Words: 728 - Pages: 3

Free Essay

Meeting My Goals – Research Paper

...Meeting My Goals – Research Paper Jeffery Fholer ITT-Technical Institute Meeting my Goals: Better Note-taking/Studying Techniques To be a more successful college student and in turn a more productive employee, I have found I need to learn more effective note taking/studying techniques. As I started my research for this project, I found there are a million-and-one ways to better study and take good notes. Some are actual studies completed by renowned universities and others are merely guides written by persons based off of their personal experience. The first source I selected “Taking Notes: 5 College Success Tips” was posted by Dennis G. Jerz as submitted to him by one his Technical Writing Students Vivinette K. Dietsche. In her paper, Dietsche outlines five basic principles that are beneficial when it comes to taking notes: go to class prepared, improve your listening skills, develop a note taking method that works for you, pay close attention to content and review and edit your notes. Going to class prepared can be as simple as ensuring you have all the supplies i.e., paper, binders and writing instruments necessary to complete assignments. Also covering the course material before showing up to class will give you a better idea what is going on in the day’s lesson plan. Improving your listening skills is crucial in understanding what is being taught. Dietsche talks about having what we called in the military...

Words: 1012 - Pages: 5