Free Essay

Client Review

In: Social Issues

Submitted By wells559
Words 258
Pages 2
Reflective Summary
Ashley Winn
BSHS 375
September 20, 2015
University of Phoenix

Reflective Summary

Technology has positively affected the field of human services in my opinion. It has improved services as well as access to benefits. Technology advances has made it easier to reach those who are need and provide services that will meet their needs. The use of mobile technology such as laptops, smartphones, and tablets, allows staff to access information needed to assist clients while out in the field. Technology has also allowed clients the option of applying and managing services and benefits from the privacy of their own homes. This option helps to eliminate the stigma and challenges that are associated with those who apply and receive services and benefits. Technology allows various programs and agencies to collaborate with one another in order to deliver services to their clients more efficiently.
As with almost anything, there will be advantages as well as disadvantages that come along. Technology is rapidly changing and therefore it is important that not only the human service provider but also the client stay up to date with technology, this will allow them to work together much easier. I hope to learn more about the privacy and security issues that come along with the use of technology. I hope to learn ways on how to ensure that I will be able to keep my clients information safe. Another thing that I hope to learn is creative ways to incorporate technology to better serve clients and helping them to meet their needs.

Similar Documents

Premium Essay

Issc340 Week 1 Assignment

...Lesson 1 Review: Overview of Local Area Networks The purpose of this activity is to reinforce what you have learned so far about local area networks technologies. 1. What are the main architectural components of a LAN? (Minimum word count: 60) The main architectural components are 1: The network's physical topography (how the nodes are connected) 2: The access method (how the nodes access the transmission medium) 3: the transmission technique (how information passes through the network) 4: the transmission media (wired or wireless) 5: the use of specific protocols (the language used to communicate between computers) 6: the LAN's inter-connectivity (how the LAN shares with other networks) 2. Describe the function and characteristics of a network operating system (NOS). (Minimum word count: 100) A network operating system (NOS) manages the resources used within the network and enebles select services to select nodes. A NOS consists of two main components: a server component and a client component. The server component is the most complex component that runs on the server. The server component can do many things, to include; manage multiple users, provide access to files and printers, provide internet access, and enforce network security protocols. The client component runs on the client machine and enables the client to participate on the network. A NOS client component enables client systems to “see” and access network storage locations as if they were on the client machine...

Words: 270 - Pages: 2

Premium Essay

Pos 355

...how the new system will spread information in different locations. Riordan Manufacturing's operational network allows each of their locations to transmit information for communication. Their corporate headquarters's new human resource system (HRIS) will be installed by NAS Iomega network storage. Riordan's three locations will be connected to San Jose by the wide area network connection (WAN), which communicates at T1 connection speeds. The network server relays its information to the human client computers each location uses. Each location's human resources department can then have access to important information, accessed via their local client server computers. Process All of the files that the human resources department needs for their procedures will be saved to the HR system on the main server at corporate headquarters. The HRIS system will store this information on its employees via Riordan's intranet: • Employee files – includes resumes, performance reviews, and other important information. • Job descriptions – explains a job's functions and the education it requires. • Electronic job posting – lists job openings in multiple locations. • Employee handbook – employees can access the handbook electronically. • Policies and procedures – a place to find the company's policies and operating standards. • Employee file updates – Lets employees update their personal information electronically. • Recruitment – Is...

Words: 435 - Pages: 2

Premium Essay

Nt1330 Unit 6

...1.Describe the purpose of an RPC. A) Remote Procedure Call (RPC) provides a different pattern for accessing network services.It provides Instead of accessing remote services by sending and receiving messages, a client invokes services by making a local procedure call. The local procedure hides the details of the network communication. The main purpose of RPC is to hide the existence of the network from a program.RPC is especially well suited for client-server (e.g., query-response) interaction in which the flow of control alternates between the client and server. Conceptually, the client and server do not both execute at the same time. Instead, the thread of execution jumps from the caller to the callee and then back again. 2. When two computers request a connection, what are the four primary actions that the Session Layer takes? A)the two...

Words: 506 - Pages: 3

Premium Essay

Client Technology Tracking System Milestone2

...PROBLEMS, OPPORTUNITIES, OBJECTIVES AND CONSTRAINTS MATRIX |Project: Client Technology Tracking System |Project Manager: Peter Charles | |Created by: Anna Kelly |Last Updated by: Anna Kelly | |Date Created: 09/22/2011 |Date Last Updated: 09/22/2011 | |CAUSE AND EFFECT ANALYSIS |SYSTEM IMPROVEMENT OBJECTIVES | |Problem or Opportunity |Causes and Effects |System Objective |System Constraint | |The current system dose not accurately track |The papers placed in the three-ring binder are |A searchable database with configuration |Nixed the idea of having configuration and | |configuration information, leading to wasted time |disorganized so the information is never really |information is needed. |component information...

Words: 638 - Pages: 3

Premium Essay

Booger

...Result Therapeutic Result: Correct Rationale Displaying a caring attitude supports the establishment of a therapeutic relationship by conveying genuine concern and a feeling of emotional closeness, which results in the nurse’s ability to achieve a greater level of communication and understanding with the client. Technique 3 Selected Option/ Result Therapeutic Result: Correct Rationale Clarifying is a therapeutic communication technique because it allows the nurse to validate the message received to ensure that both the nurse and client have a mutual interpretation of the message. Page 1 of 3 Report Created on: 10/19/2015 06:47 PM EDT REP_NTIndv_CommModuleReport_1_0 Technique 4 Selected Option/ Result Therapeutic Result: Correct Rationale Focused questions are a therapeutic communication technique because they allow the nurse to clarify a message, collect data, encourage feedback, and confirm the client’s ideas and beliefs. Technique 5 Selected Option/ Result Nontherapeutic Result: Correct Rationale Shaming is an ineffective style of interpersonal communication because the nurse mistreats a client or health team member with communication that belittles the other person,...

Words: 530 - Pages: 3

Premium Essay

Checkpoint

...• How does e-mail benefit an organization? Why might an organization want to limit how an employee uses e-mail during work hours? What is an e-mail’s path once it leaves an organization? E-mails benefit an organization by giving the opportunity to send out information instantly rather than mailing it to client your potential customers. Emails offer a way to save cost on printing information it is paperless so not only is it cost effective but it is also eco friendly. Emailing can increase productivity because it will cut down on waiting for information to get to one place. Emails can also be sent to multiple people at once. An organization may want to limit the time employees use emails during work hour to cut down on loss of productivity. If it is work related then I think organization will not have a problem as long as you are not using emails for personal communications. Employers may also want to limit the time employees on emailing because it is security issue sensitive information can be leaked if the wrong person receives a email with companies information that is not intended for the general public. The path of a email can be insecure, the email path can be broken, it can get delayed, or it may even disappear all together, When an email paths is directed to a person or persons it can also be miss directed to the wrong person by accident and can be leaked out and spread through the...

Words: 255 - Pages: 2

Free Essay

Asdf

... 2006-08-10. Valparaiso, Chile. Each night I’ve been working until the cold winter morning in order to discover a method of communicating via clouds. As of yet, I am unsuccessful. 2006-08-15. Valparaiso, Chile. One project is almost done and I can put it online soon. It’s a theorem database and automated proof thingy for topological spaces. I made it so that I could learn Ruby on Rails - which is hot. 2006-12-09. Buenos Aires. I just got a contract to do a big website. $ + work = travels to tierra del fuego in January. 2006-12-18. Buenos Aires. HTTP upload progress bars are rather obfuscated- they typically involve a process running on the server keeping track of the size of the tempfile that the HTTP server is writing to, then on the client side an AJAX call is made every couple seconds to the server during the upload to ask for the progress of the upload. This is pretty ridiculous. http://four.livejournal.com/730831.html Ebb web server. Like Thin but using libev instead of EventMachine http://ebb.rubyforge.org/ http://squeezebox.rubyforge.org/ Precursor to libuv–the just the C parts of Ebb. Unix only. http://tinyclouds.org/libebb 2007-12-06. Cologne. I’m working on a new HTML templating language using javascript. The language uses indention white space to build a XML hierarchy, the Haml syntax. In and...

Words: 1058 - Pages: 5

Premium Essay

Networks 621

...FACULTY OF MEDIA, INFORMATION & COMMUNICATION TECHNOLOGY DIPLOMA IN INFORMATION TECHNOLOGY (2 YEAR) NETWORKS 621 1ST SEMESTER ASSIGNMENT Name & Surname: ____________________________________________ ICAS No: _________________ Qualification: ______________________ Semester: _____ Module Name: __________________________ Date Submitted: ___________ ASSESSMENT CRITERIA QUESTION ONE QUESTION TWO GENERIC TO BOTH QUESTIONS LAYOUT AND SPELLING Font – Calibri 12 Line Spacing – 1.0 Margin should be justified. REFERENCE According to the Harvard Method TOTAL MARK ALLOCATION 35 30 15 5 EXAMINER MARKS MODERATOR MARKS 10 80 Examiner’s Comments: Moderator’s Comments: Signature of Examiner: Signature of Moderator: The purpose of an assignment is to ensure that the Learner is able to:      Use methods of enquiry and research in a disciplined field. Interpret and evaluate text. Have a sound understanding of key principles and theories, rules and awareness. Solve unfamiliar problems using correct procedures as well as investigate and critically analyse information and report thereof. Present and communicate information reliably and coherently. Page 1 of 4 Instructions and guidelines for writing assignments 1. Use the correct cover page provided by the institution. 2. All essay type assignments must include the following: 2.1 Table of contents 2.2 Introduction 2.3 Main body with subheadings 2.4 Conclusions and recommendations 2.5 Bibliography 3. The length of the entire assignment must...

Words: 777 - Pages: 4

Free Essay

Big Man

...Keep the first copy in the office the other two is given to the contractor. 2. Call API & Toronto Fire Dept. / Log the operators # into the Fire Panel Log 3. Email Kathy, Shane, Ray, Brad & Dispatch. When putting the system back online please follow steps 2 and 3. (It is very important that emails get sent out in order for the client to be up to date!) Requesting Service: When requesting for Elevator/ Escalator Service: 1. Email (Kathy, Shane, Ray, Brad, Dispatch & Tony) explaining details of what’s not working, please incl. the reference number of the service that has been requested. 2. When the technician arrives on site please be sure, they are signed in, and given a badge. Do not forget to sign them out, once finished. 3. Email everyone that is mentioned at point #1 informing whether the elevator/ escalator is back to service and any other details in regards to the incident. Remember to send emails about everything that is happening in the premises so there’s no reason to have complains!! * Please be advised that in order to send Reports to the iPhone email to forward it to the client and dispatch; from now on you will be using vpstockyards@gmail.com; password: TheStockyards!23. DO NOT use your personal email to get any incident report forward to the iPhone...

Words: 256 - Pages: 2

Free Essay

Week 5 Case Study

...Week 5 Case Study Risk Management Policy By Jovan Kirby SEC 280 Professor T. Campbell DeVry University Risk management is the process of making and carrying out decisions that will minimize the adverse effect of accidental losses upon our company. The risk management process is vital to the personal health and safety of employees and the safety of the public. In financial terms, it is vital to our ability to pursue our goals, commence and operate programs, and to perform duties in an efficient and professional manner. We will implement a plan to cover credit card theft and as well as internal breach of personal company information. Some ways to protect against credit card information being compromised is this. We have implemented some ways such as firewalls, restricted policies, and proxy servers. We will go through each one and explain why and how they will make this company stronger and better. First firewalls using a firewall will help build a strong defense. A firewall is a software program or piece of hardware that helps screen out hackers, viruses, and worms that try to reach your computer over the Internet. For example, if a firewall is configured with a rule to block Telnet access, then the firewall will drop packets destined for TCP port number 23, the port where a Telnet server application would be listening. The role of a firewall is to prevent malicious traffic reaching the resources that it is protecting. Some security experts feel this is an outdated...

Words: 765 - Pages: 4

Premium Essay

Lot2 Task 1

...the Web Server. Executive Summary The attack performed on the network had the intention of making the online services provided to students unusable during a critical time of need for those systems. The attack was first performed by acquiring the Administrator password for the systems and using each system to perform a large quantity of requests for service to the web servers. By dissecting what occurred steps can be put in place to prevent such an attack in the future. This attack can be summarized in a few bullets: The attacker was allowed to install software without having Administrator rights The software used sniffed out the Administrator password either via the wire or possibly keystroke logging. Each client computer was able to send a large amount of HTTP requests to the web server. The web server accepted and processed each request. To begin with, it needs to be made mandatory that users on a machine cannot install new software to a machine. Instead, each machine should be preloaded with the tools that would be needed for a typical student to perform their work. In addition, the use of a file monitoring program, such as Tripwire, can be used to detect and notify if any changes have occurred to files or entire folders that shouldn't experience any changes. Next, if the software installed did indeed discover the password over the wire and was able to crack it then two changes need to be made. The first is that the password should be...

Words: 719 - Pages: 3

Premium Essay

Lot2 Task 1

...attack overwhelmed the Web Server. Executive Summary The attack performed on the network had the intention of making the online services provided to students unusable during a critical time of need for those systems. The attack was first performed by acquiring the Administrator password for the systems and using each system to perform a large quantity of requests for service to the web servers. By dissecting what occurred steps can be put in place to prevent such an attack in the future. This attack can be summarized in a few bullets: The attacker was allowed to install software without having Administrator rights The software used sniffed out the Administrator password either via the wire or possibly keystroke logging. Each client computer was able to send a large amount of HTTP requests to the web server. The web server accepted and processed each request. To begin with, it needs to be made mandatory that users on a machine cannot install new software to a machine. Instead, each machine should be preloaded with the tools that would be needed for a typical student to perform their work. In addition, the use of a file monitoring program, such as Tripwire, can be used to detect and notify if any changes have occurred to files or entire folders that shouldn't experience any changes. Next, if the software installed did indeed discover the password over the wire and was able to crack it then two changes need to be made. The first is that the password should be sent...

Words: 725 - Pages: 3

Free Essay

What Is the Difference Between Web-Based Email Architecture and Simple Mail Transfer Protocol-Based Two-Tier Client-Server Architecture

...Assignment 1.docx) Part A: Part A - Assignment Scenario: Read the scenario ‘Deals-R-Us Brokers (Part 2)’ on pages 66-67 of the text. Based on the scenario, create the deliverables listed below. Fred Jones, a distant relative of yours and president of Deals-R-Us Brokers (DRUB), has come to you for advice. DRUB is a small brokerage house that enables its clients to buy and sell stocks over the Internet, as well as place traditional orders by phone or fax. DRUB has just decided to install a new email package. One vendor is offering an SMTP(Simple Mail Transfer Protocol).-based two-tier client-server architecture. The second vendor is offering a Web-based email architecture. Fred doesn’t understand either one but thinks the Web-based one should be better because, in his words, “The Web is the future.” a. Briefly explain to Fred, in layperson’s terms, the differences between the two. b. Outline the pros and cons of the two alternatives and make a recommendation to Fred about which is better. Part A - Assignment Deliverables: Client-server architectures attempt to balance the processing between the client and the server by having both do some of the logic. a) Write a memo to Fred that explains the differences between the two options. Be sure to explain the difference in terms Fred will understand, since he does not know much about technology or networks. b) In the memo outline the pros and cons of the two alternatives and make a recommendation to Fred. Part...

Words: 539 - Pages: 3

Premium Essay

Lot2

... Executive Summary The attack performed on the network had the intention of making the online services provided to students unusable during a critical time of need for those systems. The attack was first performed by acquiring the Administrator password for the systems and using each system to perform a large quantity of requests for service to the web servers. By dissecting what occurred steps can be put in place to prevent such an attack in the future. This attack can be summarized in a few bullets: ← The attacker was allowed to install software without having Administrator rights ← The software used sniffed out the Administrator password either via the wire or possibly keystroke logging. ← Each client computer was able to send a large amount of HTTP requests to the web server. ← The web server accepted and processed each request. To begin with, it needs to be made mandatory that users on a machine cannot install new software to a machine. Instead, each machine should be preloaded with the tools that would be needed for a typical student to perform their work. In addition, the use of a file monitoring program, such as Tripwire, can be used to detect and notify if any changes have occurred to files or entire folders that shouldn't experience any changes. Next, if the software installed did indeed discover the password over the wire and was able to crack it then two changes need to be made. The first is that the password should...

Words: 724 - Pages: 3

Premium Essay

Network Evaluation

...improvement. The following 15 evaluations will be used to access the current state of the network: 1. Evaluation of Client Computer Hardware In the evaluation of client computer hardware, this evaluation seeks to identify all client computer assets owned by the company. All laptops and desktops owned by the company should be made available as needed in order for the evaluation to be as accurate as possible. It will be necessary to perform a review of all client computers that connect to the company assets. These machines will be analyzed for speed, performance, and reliability. I will look for variations in hardware manufacturers. Depending on the circumstance, it can result in better TCO (Total Cost of Ownership) if client computers are limited to one or two manufacturers. In addition, machines that are broken, out of warranty, or outdated will be recommended for repair or replacement. 1. 2. Evaluation of Client Computer Software In the evaluation of client computer software, I will seek to identify all software that is installed on client computers and being used in the workplace. This evaluation can be performed using software metering in software such as Microsoft System Center Configuration Manager, if installed. If not installed, this information will be collected manually by viewing the installed software on each machine. All client computer software will be evaluated to ensure that it is up to date and that it meets or exceeds industry standards. For...

Words: 2399 - Pages: 10