Free Essay

Case Project

In: Computers and Technology

Submitted By danielng
Words 3057
Pages 13
Chapter 5
Case Project Assignment for Chapter 5 In this assignment, use your problem-solving skills and information presented in this chapter to answer the following real-life scenario. Make sure to address all of the questions posed in the following Case Project. You have been asked to design the entire cabling system for a medical instrument manufacturer’s new warehouse. The company already has three buildings, each 1/2 a mile apart, and the warehouse, 2 miles away, will be its fourth building. Currently, the buildings run on separate networks, but the company wants to be able to exchange data among them. For example, the Quality Control Department in Building 1 would like to be able to access servers in the Research Department in Building 2. In addition, the Sales Department in Building 3 wants to conduct video training for its representatives in the field via the Internet.  What kind of transmission media would you recommend for inside each different building and department of the medical instrument company and why?  What type of media would you recommend using to connect the buildings together and why?  Finally, what kind of media should the company use for connecting the corporate WAN to its ISP and ultimately, the Internet? NOTE: The above assignment needs to be turned in as a single Microsoft Word file containing only your answer to the Case Project for Chapter 5. This assignment is turned in using the Assignment Submission for this project found on the Moodle page for this class by the due date listed on the Course Outline.
Hands-On Project Assignments for Chapter 5
Create a new Microsoft Word document for your Lab Notebook for Unit 2. Refer to the Requirements for Lab Notebooks in the Supplemental Materials and begin recording your answers for Chapter 5 in this new Lab Notebook document.
 Complete Project 5 – 3 under the Hands-On Projects heading in the textbook with the following changes:  Start your Window 7 VM (INFO1381-xx) and logon with the user Administrator and Password1 as the password to complete this project.  In step 1 use the FQDN www.abu.ac.jp  In step 3 use the FQDN jmi.ac.in  Record the answers in your Lab Notebook to the questions asked in steps 2 – 7.
When you are finished, follow the normal steps to shut down Windows but use the Start menu in the VM windows. Close the VM window and close the VMware vSphere Client window.
Continued on next page . . .
 Follow the steps below to complete the second Chapter 5 Hands-On Project In this project, you make a straight-through Ethernet Cable using Unshielded Twisted Pair (UTP) in the Room R4 Lab. Then, answer the questions at the end of the project as entries in your Lab Notebook. 1. Request the INFO1381 Lab Bag from the Room R4 Lab Supervisor. 2. Using the wire cutter, make a clean cut at both ends of the twisted pair cable, removing any existing RJ-45 plugs. 3. Using the wire cutter, carefully remove the sheath off of one end of the twisted pair cable, to expose approximately 1 inch of the twisted pairs. Be careful to neither damage nor remove the insulation that’s on the twisted pairs inside. 4. In addition to the four wire pairs, inside the sheath you’ll find a string and in Cat 6 you’ll find a plastic separator. Cut the string and/or separator, then separate the four wire pairs in the full 1 inch of exposed cabling. Carefully unwind each pair and straighten each wire. 5. To make a straight-through cable, align all eight wires on a flat surface, one next to the other, ordered according to their colors and positions listed in the figure below. (It might be helpful first to “groom”—or pull steadily across the length of—the unwound section of each wire to straighten it out and help it stay in place.) 6. Measure ½" from the end of the wires, and cleanly cut the wires at this length. Keeping the wires in line and in order, gently slide them into their positions in the RJ-45 plug. (The sheath should extend into the plug about 3/8".) 7. After the wires are fully inserted, place the RJ-45 plug in the crimping tool and press firmly to crimp the wires into place. (Be careful not to rotate your hand or the wire as you do this, otherwise only some of the wires will be properly terminated.) Crimping causes the internal RJ-45 pins to pierce the insulation of the wire, thus creating contact between the two conductors. 8. Now remove the RJ-45 connector from the crimping tool. Examine the end and see whether each wire appears to be in contact with the pin. It may be difficult to tell simply by looking at the connector. The real test is whether your cable will successfully transmit and receive signals. 9. Repeat Steps 3 through 8 for the other end of the cable. After completing Step 7 for the other end, you will have created a straight-through patch cable. 10. The following image is looking at the RJ-45 from above with the lock tab down.
Make an entry in your Lab Notebook with the brand name of the cable checker and how you know your cable was terminated correctly and fully functioning.
Hands-On and Case Project Assignments Data Communications and Networking (INFO1381) Page 3
Chapter 6
Case Project Assignment for Chapter 6 In this assignment, use your problem-solving skills and information presented in this chapter to answer the following real-life scenario. Make sure to address all of the questions posed in the following Case Project. Your employer, XelPharm, is a large manufacturer and distributor of generic, overthe-counter healthcare products. Its main campus consists of three buildings within two blocks of each other. Each building houses approximately 200 employees, including those in the following departments: Administration, Accounting, Research, Legal, Quality Control, Order Fulfillment, and Production. In addition, XelPharm owns a large distribution warehouse approximately 4 miles away from the headquarters. Currently, its networks rely entirely on wired connections. The company’s Chief Information Officer (CIO) wants you to investigate how wireless LAN technology might benefit XelPharm.  What can you tell him about the wireless standards that might convince him now is the time to adopt wireless technology?  Also, what can you tell him to convince him that wireless networking could improve the company’s productivity?  Which employees could make best use of wireless connections and how?  In what type of situations would all employees benefit from wireless networking? NOTE: The above assignment needs to be turned in as a single Microsoft Word file containing only your answer to the Case Project for Chapter 6. This assignment is turned in using the Assignment Submission for this project found on the Moodle page for this class by the due date listed on the Course Outline.
Hands-On Project Assignments for Chapter 6 When working on Hands-On Projects, you need to document what you have done or record answers to questions asked in the Projects in an electronic document called a Lab Notebook. All the responses are to be recorded within a single Word file for Chapters 5 - 8 (Unit 2). This Lab Notebook document is turned in at the time Test 2 due. See your instructor if you have questions or need additional clarification.  Follow the steps below to begin the Chapter 6 Hands-On Projects:  Since you do not have a physical SOHO wireless connectivity device, you will use an online emulator to complete this project.  Open a web browser on your local computer and navigate to the following URL: http://ui.linksys.com/E4200/2.0.25/ The main Setup window appears. Spend some time examining the various features of the SOHO wireless connectivity device.  Answer the following questions as entries in your Lab Notebook: – What is the Name and IP address of this router? – Does the SoHo Device currently have a public IP address on the ISP's network? – Why is it necessary for the SoHo Device to have two IP addresses?
Hands-On and Case Project Assignments Data Communications and Networking (INFO1381) Page 4
 Complete Project 6 – 2 under the Hands-On Projects heading in the textbook with the following changes:  If needed, open a local web browser and navigate to the following URL: http://ui.linksys.com/E4200/2.0.25/ The main Setup window appears.  Skip Step 1.  In Step 2, select the Manual option on the Wireless Settings page and examine both the 2.4 GHz and 5 GHz Wireless Settings sections.  Record the answers in your Lab Notebook to the questions asked in steps 2 and 3.  Skip Steps 4 - 7
 Complete Project 6 – 3 under the Hands-On Projects heading in the textbook with the following changes:  If needed, open a local web browser and navigate to the following URL: http://ui.linksys.com/E4200/2.0.25/ The main Setup window appears.  Skip Steps 1 – 2.  In Step 5, select the WPA2/WPA Mixed Mode option for the Security Mode.  After Step 6, use the Windows Snipping Tool on your local computer to create a screenshot showing the completed Wireless Settings page. Insert the screenshot into your Lab Notebook.  Skip Step 8.
 Complete Project 6 – 4 under the Hands-On Projects heading in the textbook with the following changes:  Start your Window 7 VM (INFO1381-xx) and logon with the user Administrator and Password1 as the password to complete this project.  Record the answers in your Lab Notebook to the questions asked in steps 1 – 4.
When finished, follow the normal steps to shut down Windows but use the Start menu in the VM windows. Close the VM window and close the VMware vSphere Client window.
Refer to the Lab Notebooks and Case Projects section of the Supplemental Materials handout for the required aspects when completing the Hands-On and Case Projects. Consult the Course Outline for the Case Project and Lab Notebook due date.
Hands-On and Case Project Assignments Data Communications and Networking (INFO1381) Page 5
Chapter 7
Case Project Assignment for Chapter 7 Complete Project 7 – 3 under the Hands-On Projects heading in the textbook. In this assignment, you research Password Management software. You need to evaluate each program’s strengths and weaknesses. It may be beneficial to use a table to organize your findings. Make sure to include your answers to the following questions asked in Step 1 of the Project. a. Which platforms are supported? b. Which Web browsers are supported? c. From how many competitors can the program import passwords? d. What types of authentication are supported (e.g., master password, fingerprint, etc.)? e. What options are available for adding new passwords? For example, is this information collected automatically when the user creates a new account on a Web site? f. Where are the passwords stored? Are they synced across devices? How is the information protected, and what encryption options are available? g. What are some of the differences between the free edition of each program and the paid versions? h. What happens to the user’s account if the user dies or is otherwise incapacitated?
NOTE: The above assignment needs to be turned in as a single Microsoft Word file containing only your answer to the Case Project for Chapter 7. This assignment is turned in using the Assignment Submission for this project found on the Moodle page for this class by the due date listed on the Course Outline.
Hands-On Project Assignments for Chapter 7 When working on Hands-On Projects, you need to document what you have done or record answers to questions asked in the Projects in an electronic document called a Lab Notebook. All the responses are to be recorded within a single Word file for Chapters 5 - 8 (Unit 2). This Lab Notebook document is turned in at the time Test 2 due. See your instructor if you have questions or need additional clarification.  Complete Project 7 – 4 under the Hands-On Projects heading in the textbook with the following changes: 1) You need a USB flash drive to use for this project. The BitLocker process is faster if you use a smaller size USB flash drive. Make sure you backup any important data on the Flash Drive before you complete this project. This USB drive WILL BE ERASED in this project. 2) Before starting this project, insert a USB flash drive into the local computer you are using. 3) Start your Window 7 VM (INFO1381-xx). Open a Console and logon with the user Administrator and Password1 as the password to complete this project.
Continued on next page . . .
Hands-On and Case Project Assignments Data Communications and Networking (INFO1381) Page 6
4) In the Console Window, click the icon in the VMware Client toolbar that looks like a USB drive with a wrench on top of it. This presents a menu with the option Connect to USB Device. From the resulting menu, choose the USB Drive that you inserted into your computer. 5) When you receive the ‘Connect USB Device’ message, click OK. You may see several messages appear in your status bar of your VM indicating that drivers are being installed. Close the AutoPlay window if it appears. 6) On your Windows 7 VM, open Computer (or Windows Explorer). Right-click on the USB Flash drive and select format. Click Start to accept the default format settings. Click OK at the warning. Once formatting completes, close all open windows 7) Open a new Notepad file. Type the following sentence into the Notepad file: The winning lottery numbers are 2-4-6-8-10-1. Save the file on the newly formatted USB drive with the file name LotteryNumbers. Close Notepad.  Continue with step 1 in the textbook. There is no need to insert the USB flash drive in the first sentence since the above steps completed that process on your VM.  In step 3, use the Save the recovery key to a file option. Save the file on the Desktop using the default filename.  After Step 6, use the Windows Snipping Tool on your local computer to create a screenshot showing the encrypted Flash Drive icon in Windows Explorer. Insert the screenshot into your Lab Notebook.  Skip step 7.  Before leaving this project, use the following steps to unencrypt the Flash Drive so it can be used on other computers in the future: o Open Control Panel | System and Security | BitLocker Drive Encryption o Select the link to Turn Off BitLocker and then Decrypt Drive o Wait for the BitLocker Drive Decrypting process to finish  To remove the USB drive you are using, click the VMware Client USB icon and choose USB Device 1 | Disconnect from … and answer the Disconnect USB device message Yes before removing the USB drive.
When finished, follow the normal steps to shut down Windows but use the Start menu in the VM windows. Close the VM window and close the VMware vSphere Client window.
Refer to the Lab Notebooks and Case Projects section of the Supplemental Materials handout for the required aspects when completing the Hands-On and Case Projects. Consult the Course Outline for the Case Project and Lab Notebook due date.
Hands-On and Case Project Assignments Data Communications and Networking (INFO1381) Page 7
Chapter 8
Case Project Assignment for Chapter 8 Complete Project 8 – 1 under the Hands-On Projects heading in the textbook. In this assignment, you select and research and three (3) antivirus solutions Antivirus software for two (2) different operating systems. You need to evaluate each program’s cost, reported effectiveness, and feedback from reviewers. Create a table comparing the pros and cons of each selected product. Make sure to also include your answer to the question asked in Step 3 of the Project. NOTE: The above assignment needs to be turned in as a single Microsoft Word file containing only your answer to the Case Project for Chapter 8. This assignment is turned in using the Assignment Submission for this project found on the Moodle page for this class by the due date listed on the Course Outline.
Hands-On Project Assignments for Chapter 8 When working on Hands-On Projects, you need to document what you have done or record answers to questions asked in the Projects in an electronic document called a Lab Notebook. All the responses are to be recorded within a single Word file for Chapters 5 - 8 (Unit 2). This Lab Notebook document is turned in at the time Test 2 due. See your instructor if you have questions or need additional clarification.  Complete Project 8 – 2 under the Hands-On Projects heading in the textbook with the following changes:  Start your Window 7 VM (INFO1381-xx) and logon with the user Administrator and Password1 as the password to complete this project.  Record the answers in your Lab Notebook to the questions asked in steps 3, 6, 7, 10, 12, and 25.
 Complete Project 8 – 3 under the Hands-On Projects heading in the textbook.  Record the answer in your Lab Notebook to the question asked in step 10.
 Complete Project 8 – 4 under the Hands-On Projects heading in the textbook with the following changes:  Before starting this project, use the following steps to download and install Nmap:  In Internet Explorer, open the URL https://nmap.org/dist and browse through the list to find the largest version number that ends with .exe. At this writing it is the file nmap-7.00-setup.exe. Click this link and follow the instructions on the screen to run the program to install the software.  In step 2, use the IP address range 192.168.120.1-254  Record the answers in your Lab Notebook to the questions asked in steps 2 and 3. When finished, follow the normal steps to shut down Windows but use the Start menu in the VM windows. Close the VM window and close the VMware vSphere Client window.
Refer to the Lab Notebooks and Case Projects section of the Supplemental Materials handout for the required aspects when completing the Hands-On and Case Projects. Consult the Course Outline for the Case Project and Lab Notebook due date.

Similar Documents

Free Essay

Case Projects

...Chapter 2 Solutions Review Questions 1. What term refers to the physical layout of a network’s computers, cables, and other resources? topology, diagram, layout, or map 2. Joining the computers in a network at a central point creates a star topology. Which of the following statements is true of a star topology network? (Choose all that apply.) c. It requires much more cabling than a bus network. d. Its centralized nature makes network management easier. 3. A physical bus topology network requires terminators. True or False? True 4. Which of the following statements is true of a ring topology network? b. It provides equal access to all computers on the network. 5. Which of the following physical topologies is the most fault tolerant? c. mesh 6. What are two advantages of a star topology network? inexpensive easy to troubleshoot and configure 7. Which physical topology does switching use? star or extended star 8. A cable break in a bus network does not affect network communications. True or False? False 9. In a bus network, if the ends of the cable aren’t terminated, what occurs? signal bounce 10. Connecting computers to form a straight line creates a _______ topology network. physical bus or bus 11. How do......

Words: 1445 - Pages: 6

Free Essay

Case Project

...Running head: Case Project Case Project Student College Case Project Linux as an operating system is a powerful tool used in businesses for its secure kernel and command line interface. From a small business to a large enterprise, Linux is used to run servers, store vital information and documents. In Outdoor Adventures, this store needs a more efficient computing system. The system will need to keep information available and secure enough to ensure that the information can only be seen by the right people. To help keep things organized, a file structure will also be required to keep all the files with special permissions together for easy access. To better illustrate the security capabilities of Linux Ed Sawicki of Biznix.org said, “The Linux firewall has functionality that rivals expensive commercial firewalls. Its rules allow fine grained control over stateless and stateful packet filtering. The Linux firewall is extensible, allowing new filtering capabilities as the need arises.” This comparison is powerful when considering what would be the most cost effective direction for a business, but also the safest. Another advantage of linux is that it is generally free to try before applying it to a commercial setting. The product can in effect speak for its self by allowing itself to be made publicly available so there is no need to consider it a “business risk” when a technician can experiment with it first before applying it on a much grander scale....

Words: 1333 - Pages: 6

Premium Essay

Case Project

...Case Project 1. Revenue Recognition for Multiple-Element Arrangements- The Case of Velocity Cellular. a. Base on Criteria listed in ASC 605-25-25-5, the Activation card is considered option 2) “The activation card is a separate deliverable and a separate unit of accounting in accordance with ASC 605-25.” This is because 1) the activation card “has value on a standalone basis,” and can be “sold separately by any vendor or the customer could resell the item on a standalone basis” (Criteria A of ASC 605-25-25-5), and 2) the activation card does not include a general rights of return (criteria C of ASC 605-25-25-5), and so probable and substantial control from the vendor does not apply here. Therefore, the activation card is separate deliverable and a separate unit of accounting. b. Under example 1 set from ASC605-25-55-8 through 55-12, the allocation of the activation card and the prepaid voucher should be allocated as: 1. Activation card: 200[170/ (170+50)] = 154.55 2. Prepaid voucher: 200[50/ (170+50)] = 45.45 This is assuming that there is no nonrefundable down payment. c. According to ASC605-10-S99-1, section f. nonrefundable up-front fees may be recognized as “wholly or partly an advance payment for future products or services.” In other words, the up-front fee is a consideration for future obligations for continuing service....

Words: 529 - Pages: 3

Premium Essay

Case Project

...Acct 306 Case Project Memo: To: Joe Carpet of NeedMoreRoom, Inc. From: Date: August 5, 2012 Subject: Accounting for lease obligation The proper treatment for the first provision in the lease agreement stating, “Lessor requires the lessee to perform general repairs and maintenance on the leased premises.” It should be addressed as follows: The proper treatment for the second provision in the lease agreement stating, “Lessor requires the lessee to remove all leasehold improvements such that the premises are reinstated to original condition.” It should be addressed as follows: 840-20-25-11 Leasehold improvements are investments made to customize buildings and offices occupied under operating lease contracts to make them suitable for the intended purpose. The present value of estimated reinstatement costs to bring a leased property into its original condition at the end of the lease, if required, is capitalized as part of the total leasehold improvements costs. At the same time, a corresponding liability is recognized to reflect the obligation incurred. Reinstatement costs are recognized in profit and loss through depreciation of the capitalized leasehold improvements over their estimated useful life. With the exception of investment properties, property and equipment is carried at cost less accumulated depreciation and accumulated impairment losses and is periodically reviewed for impairment....

Words: 255 - Pages: 2

Free Essay

Case Project

...Battle Space Khalan Howell Central Washington University Battle Space Battle Space is somewhat of a new term to many and is used to represent a combined military strategy. The cyberspace/battlespace is everywhere, it is the computers we sit down at everyday, it's your kids cell phone, it's the gas pipe under your driveway, it's the fiber optic cable running down the street. It has become more than just the internet. It has become a war zone, a place where attacks can come without any warning. When a network is hacked or is no longer under the control of those who are authorized, it can become a very scary place. The Hackers/Cyber Warriors, once they take over a network, they can begin to move money from accounts, crash airplanes, sending them into a downward dive, they gas cause gas and oil spills, blow up generators, halt supply chains, disrupt our transportation system, and even send a military platoon into an ambush. The thought of someone doing this through the use of internet is unfathomable to many but it is a harsh reality to others, especially those who are on the front line. Even worse is that an attack can occur in just seconds and leave absolutely no trace of where the attack came from. The term more familiar we reference to as “War”. This is the organized yet protracted conflict usually set in motion by states or government. It usually involves a high amount of violence and destruction that can last a lifetime. Unlike “War”, Cyber Warfare attacks......

Words: 531 - Pages: 3

Premium Essay

Case Project

...| Festival Cruise Line | Memo To: | Kitchen staff, Festival Cruise Lines Ship Enamorada | From: | food and beverage manager | Date: | October 8, 2015 | Re: | Food Poisoning on the Cruise Ship | | | This memo is to let you know of the regrettable incident of food poisoning that occurred on our cruise ship. I want to inform all kitchen staff to follow the provisions to prevent the spread of illness. Employer’s responsibilities: Prevention is the key to minimizing foodborne illness. We welcome local or state health department inspectors to monitor activities in their communities. We also provide basic food-safety and food-handler training to all kitchen staff. At mean time, we provide hand sanitizer to all employees to prevent the illness spread. Employees’ responsibilities: In order to better serve customer and prevent the spreading of illness, all kitchen staff please follow the cooking procedures. * Kitchen staff who got sick should not preparing food for others and wait at least 48 hours after symptoms stop * Uniforms must be washed every day * Kitchen staff should wash hands carefully with soap and water * Kitchen utensil, counters, and surfaces should be clean and sanitized routinely * Table linens, napkins, and other laundry should clean thoroughly * All fruits, vegetables and cook shellfish need to rinse thoroughly * Check ingredients and make sure it is within the expiration date and safe to consume * Keep working...

Words: 287 - Pages: 2

Premium Essay

Project Case

...Such cases may also be further aggravated when a family member or a Legal Authorized Representative (LAR) is not available to decide if the patient should participate in a clinical trial that offers a treatment may increase the of survival more than the current standard of treatment. We must than think of the patient’s best interest at this point. History of Informed Consent Following World War II, the Nazis who performed medical experiments on prisoners of war without obtaining their consent were convicted of murder, but not for their actions of conducting unethical research. Their actions helped bring to life the Nuremberg Code of 1948; the first legal document to enforce the idea that subjects’ participation in clinical research must be voluntary. Many of the elements that help make up the Nuremberg Code are included in the code of federal regulations (CFR) parts 50 and 312 and the International Conference on Harmonisation  (ICH) E6 good clinical practice guidelines2. Some key guidelines included are 1) Subjects should be of sound mind and able to understand the procedures and risks of a study and make a decision to participate...

Words: 2076 - Pages: 9

Premium Essay

Mini Project Case

...Mini-Project Case With the little experience I have with project management, I would have never of thought of using project management techniques for a mini-project like this. However, after reading the case study on planning a family get-away, I find that it is effective to apply such techniques. By having a vision for the vacation, a list of the tools and equipment needed, a project overview test plan, a budget, a task list, a flexibility matrix and by knowing all the risks involved I believe this works very well. The overall vision, or plan, of a project is a description of the desired target that should occur after the project has ended. Creating a clear vision will effectively communicate where it is headed and what it is trying to achieve. In the case of planning a family get-away, the author clearly states that the project’s goal is to unplug, refresh, and recharge before school starts for her children. Her vision also contains main key factors and a spending budget that gives a more specific plan to achieving the family’s ultimate goal. These factors include specific missions that need to be met, what tangible items will be needed and how much money can be used to divvy up between all necessities. But how did the author acquire this vision? After compromising with her family on not staying home, but not spending too much money, they came up with camping. From the article it seems that there were other camping trips that did not go so well....

Words: 1445 - Pages: 6

Premium Essay

The Super Project Case

...The Super Project Case Analysis Dilemma of incremental analysis [Author Name] General Foods is a large corporation organized by Product lines. Corporation was planning to introduce a new product Super – a new instant dessert, based on flavored, water-soluble, agglomerated powder. Super would be offered in four flavors although chocolate was estimated to account for 80% of total sales. The requested capital investment for Super was $200,000, and its production would take place after modifying an existing building, where Jell-O was manufactured and by using available capacity of Jell-O agglomerator. Cost for the key machine was not included in the project. On the basis of test market experience, once the product is introduced, it was expected to capture a 10% of dessert market share, 80% of which would come from growth in total dessert market share and 20% of which would come from erosion of Jell-O sales. There are basically four categories of capital investment project proposals at General Foods corporation: (1) safety and convenience; (2) quality; (3) increase profit; and other. Super project was considered into third category, as a profit-increasing project. Crosby Sanberg, a manager of financial analysis at General Food Corporation calculated return on investment in three different ways of on Super Project....

Words: 1321 - Pages: 6

Premium Essay

Facebook Case Project

...1. Facebook's business is to build useful and engaging products that enable people to connect and share through mobile devices and personal computers and make the world more open and connected. Facebook generates the substantial majority of their revenue from selling advertising placements to marketers and help them achieve their business objectives, such as online sales, in-store sales, or awareness of their brand. 2. Public companies are required to file various reports with the SEC. The first is 10-Q: quarterly financial statements, and the second is 10-K: annual financial statements. 3. The company’s management is responsible for the financial statements. And four potential users of the statement: - Managers and employees of the company. They are interested in using financial statements to see how they performed and help them sum up and make clear woke objectives for the future. - Investment analysts. They are interested in using financial statements to predict companies' future performance. - Shareholders and investors. They are interested in using financial statements to assess the risks and rate of return of the company. So that they can choose which company they want to invest. - Creditors and suppliers. They are interested in using financial statements to adjust or change the cooperation plans. 4. Facebook's external auditor is Ernst & Young LLP. The auditor offers that Facebook, Inc. maintained, in all material respects, effective internal......

Words: 1049 - Pages: 5

Premium Essay

Orion Project Shield Case

...In reviewing the Orion Shield project case, it is very clear that the Scientific Engineering Corporation did not apply these methods. This paper will compare Scientific Engineering Corporation’s (SEC) project management techniques to the five project management process groups and the nine project management knowledge areas that are detailed in the a Guide to the Project Management Body of Knowledge (PMBOK), 5th ed., 2013. PMBOK has identified five project management...

Words: 4699 - Pages: 19

Premium Essay

The Vigilance Project Case Study

...These teleconferences were frequently cancelled by Didier Amrani, the project manager, without notice and without him having sought input from the rest of the team as to whether there were issues they wanted to discuss. Didier strongly controlled the way meetings were run by restricting the kinds of information that was exchanged and the ways in which it was exchanged. Also, the other French team members seemed to be in accordance to Didier’s behavior. When there was discussion, many...

Words: 2376 - Pages: 10

Free Essay

Case Project 8-1

...D Case Project 6-1 A router forwards data packets by performing "traffic direction" functions between two more separate networks and/or between different computers on the same network. You can use the ipconfig command to get host computer configuration information, including the IP address, mac address, your adapter info and router or switch info, subnet mask, and default gateway. the tracert command can be used to check the path to the destination IP address that you want to reach. The tracert command displays the series of IP routers that are used in delivering packets from your computer to the destination and how long it took on each hop. If the packets are unable to be delivered to the destination, the tracert command displays the last router that successfully forwarded your packets. To get more detailed information about throughput rates and to determine what the physical topology is you need to be able to access the equipment and telco rooms because there might be some hidden problems. Like the equipment may not be compatible causing errors on the network and the cables, ports on connectivity devices, and data jacks have to be labeled and according to TIA/EIA standards. Case Project 6-2 The telcom room is located on the 1st floor of the Connect Spree and there are 4 internal servers, Internet Service and 4 routers inside the telcom room. Black solid line shows the connection of 4 internal servers to routers and the connection of 4 routers with each other....

Words: 968 - Pages: 4

Premium Essay

Multi Projects Case Study

...EXECUTIVE SUMMARY This submission identifies the various challenges portrayed in the case study. It presents an evaluation of these challenges and seeks to identify the causes which led to the challenges. Multi Projects Incorporated is a company that provides a consulting service, it relies on the acceptance of project proposals in order to generate revenue. In the case study, Multi Projects Incorporated has two projects which have been awarded to the organisation. These are at different stages in the project lifecycle. The Goodold project is presently in the Implementation Phase, while the Growin Corporation project has just been awarded to Multi Projects Incorporated and can be said to be at the Initiation Phase. The dilemma presented is that the project manager of the latter project, Jeff Armstrong, is not incumbent of a team player. This submission elaborates on the factors which appear to have caused the dilemma in the organisation, as presented in the case study. The factors include organizational strategy, organizational structure, human resources development and communication. These factors are presented as the driving force behind what appears to be a project manager who is displaying undesirable characteristics. Recommendations as to what and how change should be affected are provided in order to drive behaviours which are perceived as more favourable when considering effective project leadership.  ...

Words: 4004 - Pages: 17

Premium Essay

The Trophy Project Case Study

...We conclude that project design and project cultures play a role in determining how managers and partners cooperate to achieve project objectives to a greater or lesser extent. Ó 2007 Elsevier Ltd and IPMA. All rights reserved. Keywords: Megaproject; Managing projects; Organisation design; Organisation culture; Partnerships 1. Introduction Megaprojects have been described as multibillion-dollar mega-infrastructure projects, [1–3], usually commissioned by governments and delivered by...

Words: 8394 - Pages: 34