Free Essay

Computer Issues and Seminar

In: Computers and Technology

Submitted By ReenaBasco
Words 2155
Pages 9
Introduction

―Unless you try to do something beyond what you have already mastered, you will never grow.‖
― Ralph Waldo Emerson

We must admit that we do not know everything. What you know for now will soon pass and be forgotten. Learning must be continues. Life is never ending learning. Especially to us, Information technologist/IT Students, today‘s trending will not be the same for tomorrow. Software companies upgraded their versions. Business companies upgraded their systems. The technology is changing, changing for the better, so we must. Big thanks to our fellow Information technologist/IT Students who has a big heart in sharing their knowledge. Through seminars and workshops, they gave time to impart to us their knowledge. These are lessons and topics that are interesting and the needs in the industry. EGlobio Training Center is an organization that conducts seminars and workshops. The topics they‘re presenting are Industry-based seminars. EGlobio Training Center held their 3rd It Innovations Congress seminar last August 16, 2014 with a theme ―Unifying Filipino IT Enthusiast, One Mind | One Goal | One Desire.‖ It was held at Ever Gotesco Malls, Commonwealth. This seminar was attended by different schools. This One-day seminar is subdivided into four parts with certificates. First, CISCO Network Security which is presented by Engr. Dan Ablong. Second, 3D Animation discussed by by Mr. Joselito ―Jet‖ Legazpi. Third and last, Android Mobile Apps Development and HTML5 elaborated by Prof. Erwin Globio.

Computer Issues and Seminar

Page 1

Mr. Danilo M. Ablong Cisco Certified Professional Topic: CISCO Security

Topics discussed? 1.Cisco Definition 2.Types of Attacker 3.What is Security Policy? 4.Function of Security Policy 5.Applying Cisco IOS Security Features to Routers 6.Password Recovery 7.Access Control List

Cisco Definition is an American multinational corporation headquartered in San Jose, California,United States, that designs, manufactures, and sells networking equipment. The name "Cisco" was derived from the city name, San Francisco,which is why the company's engineers insisted on using the lower case"Cisco" in the early days.

Types of Attacker  Reconnaisance - is the unauthorized discovery and mapping of systems, services, or vulnerabilities.

Computer Issues and Seminar

Page 2



Access - System access is the ability for an intruder to gain access to a device for which the intruder does not have an account or a password.



Denial of service (DoS) - is when an attacker disables or corrupts networks, systems, or services with the intent to deny services to intended users.



Worm,Viruses,and Trojan Horses - Malicious software can be inserted onto a host to damage or corrupt a system, replicate itself, or deny access to networks, systems, or services.

What is Security Policy? Function of Security Policy

Applying Cisco IOS Security Features to Routers

Computer Issues and Seminar

Page 3

Password Recovery

STEP 1 Use the power switch in order to turn off the router, and then turn the router back on. STEP 2 Press Break on the terminal keyboard within 60 seconds of power up in order to put the router into ROMmon. STEP 3 Type confreg 0x2142 at the rommon 1> prompt in order to boot from Flash. This step bypasses the startup configuration where the passwords are stored. rommon 1> confreg 0x2142 rommon 2> reset STEP 4 Type configure memory or copy startup-config running-config in order to copy the nonvolatile RAM (NVRAM) into memory Router(config)#copy startup-config running-config STEP 5 Type enable secret <password> in order to change the enable secret password. For example: Router(config)#enable secret cisco
Computer Issues and Seminar Page 4

STEP 6 Type config-register <configuration_register_setting>. Where

configuration_register_setting is either the value you recorded in step 2 or 0x2102 . For example: Router(config)#config-register 0x2102 STEP 7 Press Ctrl-z or end in order to leave the configuration mode and type write memory or copy running-config startup-config in order to commit the changes. Router(config)#end Router#write memory.

Access Control List Access Control Lists filter network traffic by controlling whether router packets are forwarded or blocked at the router‘s interfaces. Types of ACL  Standard  Extended  Named Methods to lessen security threats consist of:     Device hardening Use of antivirus software Firewalls Download security updates

Basic router security involves the following:  Physical security
Page 5

Computer Issues and Seminar

  

Password configuration Logging router activity Backups

Disable unused router interfaces & services to minimize their exploitation by intruders

Computer Issues and Seminar

Page 6

Mr. Joselito “Jet” Legaspi Professional 3D / CG (computer graphic) artist Topic: 3D Animation

What is Autodesk maya? Autodesk Maya /ˈmɑːjə/, commonly shortened to Maya, is a 3D computer graphics software that runs on Windows, OS X and Linux, originally developed by Alias Systems Corporation (formerly Alias|Wavefront) and currently owned and developed by Autodesk, Inc. It is used to create interactive 3D applications, including video games, animated film, TV series, or visual effects. The product is named after theSanskrit word Maya (माया māyā), the Hindu concept of illusion. Computer Animation Is the process used for generating animated images by using Computer Graphics. The more general term is Computer Generated Imagery(CGI). Object animation. Clay animation/Claymation Pixilation Had-drawn/Traditional Flash Animation

3D/Three Dimensional Animation Modern Type of Animation, are digitally modeled and manipulated by an animator.

Computer Issues and Seminar

Page 7

Difference between 2D/3D animation. 2D animation techniques tend to focus on image manipulation while 3D techniques usually build virtual worlds in which characters and objects move and interact. 3D animation can create images that seem real to the viewer. 3D Production Pipeline Pre-production        Story/Concept Art Direction (Look, Execution etc.) Storyboarding Character Design Sound/Voice Over Animatic (Initial Animation) Layout

-

Production Stage        Modeling Structure Rigging Character Animation Lighting Rendering Dynamics

-

Post –production Stage    Compositing Editing Colour Correction

Computer Issues and Seminar

Page 8

Prof. Erwin M. Globio, MSIT Resource Speaker Topic: Android

What is Android? Android is a software stack for mobile devices that includes operating system, middleware and key application. What are the features of Android?           Application framework Dalvik virtual machine Integrated browser Optimized graphics SQLite Media support GSM Telephony Bluetooth, EDGE, 3G, and WiFi Camera, GPS, compass, and accelerometer Rich development environment

Computer Issues and Seminar

Page 9

Android Architecture

Working with Android Development Tools (ADT) The Android Development Tools (ADT) plugin for Eclipse adds powerful extensions to the Eclipse integrated development environment.     It gives you access to other Android development tools from inside the Eclipse IDE. It provides a New Project Wizard It automates and simplifies the process of building your Android application. It provides an Android code editor that helps you write valid XML for your Android manifest and resource files. It will even export your project into a signed APK, which can be distributed to users.

Computer Issues and Seminar

Page 10

Installing ADT To install in Eclipse 4.4 (Kepler) 1. Start Eclipse, then select Help> Install New Software 2. In the Available Software dialog, click Add.... 3. In the Add Site dialog that appears, enter a name for the remote site (for example, "Android Plugin") in the "Name" field. 4 .Enter location https://dl-ssl.google.com/android/eclipse/ 5. Back in the Available Software view, you should now see "Developer Tools" added to the list. Select the checkbox next to Developer Tools, which will automatically select the nested tools Android DDMS and Android Development Tools. Click Next. 6. In the resulting Install Details dialog, the Android DDMS and Android Development Tools features are listed. Click Nextto read and accept the license agreement and install any dependencies, then click Finish. 7. Restart Eclipse. Application Fundamentals      Applications are written using Java The Android Asset Packaging Tool generates apk (Android Package) files containing the code and any data and resources needed Each application runs in its own Linux process Each application has its own VM Each application has its own user id, permissions are set accordingly

Application Components A central feature of Android is that one application can make use of elements of other applications (provided those applications permit it) Android applications don't have a single entry point for everything in the application (no main() function, for example)

Computer Issues and Seminar

Page 11

They have essential components that the system can instantiate and run as needed Activities - An activity presents a visual user interface for one focused endeavor the user can undertake. Services - A service doesn't have a visual user interface, but rather runs in the background for an indefinite period of time. Broadcast Receivers - A broadcast receiver is a component that does nothing but receive and react to broadcast announcements Content Providers - A content provider makes a specific set of the application's data available to other applications. The data can be stored in the file system, in an SQLite database, or in any other manner that makes sense. Intent - An intent is an Intent object that holds the content of the message.

Computer Issues and Seminar

Page 12

Prof. Erwin M. Globio, MSIT Resource Speaker Topic: HTML 5

What is HTML5? There‘s a lot of information on the web. Most of that information is text/html. Most (>95%) of that HTML is syntactically invalid. HTML5 is a new version of HTML. Initial work by the WHATWG (web Hypertext Application Technology Working Group (2004). People involved are Apple, Mozilla, Opera, Google are the major contributors. Work-in-progress recently adopted by the W3C (2007). HTML is important and isn‘t going away any time soon. We should evolve HTML rather than ditch it. But the vast legacy creates problems. HTML 4 – 1997 – Underspecified – Inconsistent – Does not match reality – Missing features needed to compete with propriety technologies (Flash, Silverlight, etc.) XHTML 2 – Requires XML – Not backward compatible (cannot be implemented in current browsers)

Computer Issues and Seminar

Page 13

WHY HAS HTML5 BEEN DEVELOPED    To address issues inherent to HTML/XHTML allowing web to move forward. Attempts to provide the tools to support the new levels of interaction users demand To address the different places on the web

The story… 2009-07-02 On this day, the Director announces that when the XHTML 2 Working Group charter expires as scheduled at the end of 2009, the charter will not be renewed. By doing so, and by increasing resources in the HTML Working Group, W3C hopes to accelerate the progress of HTML 5 and clarify W3C's position regarding the future of HTML. A FAQ answers questions about the future of deliverables of the XHTML 2 Working Group, and the status of various discussions related to HTML. HTML5 and CSS3 What are the features of HTML5?       Revised and improved semantics including section tags, audio, video tags and API to direct HTML embedding canvas element for scriptable graphics rendering on the fly Native drag and drop API Local storage support to make applications even more desktop-like Cross-document messaging Geo Location API: especially important for mobile applications

What are the features of CSS3?     Extended set of selectors such as :first-of-type or :last-of-type Enhanced support for background and border Flexible Box Layout Multi-Columns and Templates native support
Page 14

Computer Issues and Seminar

  

2D and 3D Transformations Transitions and Animations Media Queries

Why do we need HTML5? ―HTML 5 will enable better cross-browser compatibility and better support for ‗Web 2.0-style‗ Web applications in addition to documents.‖ -Brendan Eich, CTO, Mozilla. HTML5 will have an application cache that is capable of storing all resources in your Web app so that the browser can load them and use them even when you‘re

offline. HTML5 enables mobile and desktop Web site designers to deliver the advantages of client-side and server-side development to their users simultaneously. API development and workability in the browsers will take a leap forward. Problems      Not backwards-compatible? extensible? - questionable <P> = <p> ...and... <div class=‖foo‖> = <DIV class=foo> meaning not that strict removal of certain tags—like <acronym> removal of access keys? This could set back the usability/accessibility of markup (or, there could be good reasons for doing this) What does HTML5 mean to Web designers?     new tags for semantic layout improved micro-formatting new tags for incorporating rich media new tags for APIs, applications

Computer Issues and Seminar

Page 15

What about browser support?        Opera 9.x (supposedly) offers best support Safari 3.x - sketchy (best support in my experience) Firefox 3.x - sketchy Chrome? - sketchy IE8 - veeerrrry sketchy IE7 - nope IE6? (LOL!)

WHICH IS BETTER FOR DESIGNER – HTML5 OR FLASH?    Interactivity Client-side data rich application Games

Computer Issues and Seminar

Page 16

PICTURES! 

3rd Information Technology Innovation Congress Tickets

Computer Issues and Seminar

With the speaker, Prof. Erwin Globio

Page 17

Ever Gotesco Mall, Commonwealth, Cinema 5

Computer Issues and Seminar

Page 18

Group Picture with Mr. Jet Legaspi

Group Picture with Mr. Jet Legaspi
Computer Issues and Seminar Page 19

Certificate of Appreciation for DHVTSU

Computer Issues and Seminar

Page 20

Similar Documents

Premium Essay

Advance Issue in Ict

...ADVANCED ISSUES IN ICT | | | Semester | : | June 2013 | Course Leader | : | Iznora Aini Zolkifly | Office Location | : | Faculty of Business and Information Technology, Block B1-3A, Leisure Commerce Square | Consultation Hours | : | Tuesday : 2.30 pm – 4.30p.m Thursday : 2.30 pm – 4.30p.m jk | Telephone | : | 03-76277373 | E-mail | : | iznora@unitar.my | Tutors (Optional) | : | | | | | | | Course Synopsis The course contains current issues in Information and Communication Technology that focus on the area of information science, computer networking, multimedia, medical informatics and information security and computer forensic. Exposure through visitation, events, and seminar will be implemented in this course in order to obtain the global technology as it is impacting all walks of life all over the world. Course Objectives The objectives of this course are: * To expose students to the various area in IT through visitation and events. * To provide a series of seminar in order to gain current issues and trends in ICT. * To develop a knowledgeable and skilled computer professionals guided by the needs of companies and employers. Learning outcomes * Present verbally on current issues in different areas of information and communication technology through group presentation and discussions. * Summarize the latest technology offered in order to solve the real world problem. * Document the finding on current issues and trends in ICT from...

Words: 832 - Pages: 4

Free Essay

Case Study Analysis

...Introduction Critical Thinking is a skill that allows readers to evaluate a situation and judge what is right or wrong through the use of logic and reasoning, beyond their own prejudices. According to Ennis (2001): ”Critical thinking is "reasonably and reflectively deciding what to believe or do. Critical thinking means making reasoned judgments. Basically, it is using criteria to judge the quality of something, from cooking to a conclusion of a research paper. In essence, critical thinking is a disciplined manner of thought that a person uses to assess the validity of something: a statement, news story, argument, research”. Critical Thinking plays a an important role in the case study analysis by giving us a foundation for a deeper learning and integration of the reading. Without thinking critically about what we are studying , we wouldn't be able to learn in a meaningful way or we wouldn't be able to learn deeply enough to have our thinking corrected and enhanced. The purpose of this case study analysis paper is to provide the case study background, identify key problems in the study, provide alternatives, propose solutions and offer a recommendation in the case of Carl Robins by utilizing the critical thinking skills. Background The case study presented in front of us is a case study of Carl Robins, a new campus recruiter for ABC, Inc., who in his first recruitment effort successfully hired 15 new trainees to work for Monica Carrolls, the Operations Supervisor (University...

Words: 1606 - Pages: 7

Premium Essay

Nt1330 Unit 3 Assignment

...BYOD/Mobile Assignment The organization that I work for is in the computer hardware industry. The organization works with top computer technology companies like Dell, Apple, Ibm, and Microsoft. The organization I work for does the manufacturing and assembling of computer hardware and peripherals for those and other various computer companies. The components that are made in this industry include printers, Web and PC cameras, devices that are used for pointing, keyboards, monitors, and even storage devices.4 Computer components that use a semiconductor are not made in this industry. This would include things like a circuit board or a microprocessor. According to Oxford Dictionaries BYOD, which stands for bring your own device, is the practice of allowing the employees of an organization to use their own computers, smartphones, or other devices for work purposes.2 A large number of workers are bringing their own devices into their place of work...

Words: 1097 - Pages: 5

Premium Essay

Product Quality Inspector Training Development

...Lloyd Wayne Murphy Product Quality Inspector Training Development Strayer University September 9, 2012 Abstract March 10, 2008, a group of four IT students: J. Group, L. Elect, K. Tronic, and M. Gadget incurred the involvement of a IT final exam studying session together on the student’s home J. Group, and during the studying session, when J. Group complained of hot the laptop felt. A heated discussion soon ensued regarding J. Group’s concern, whereof the group initiated a concept of the students forming an accord between the students to construct an electronic gadget, which would resolve the issue. Indeed, not only did the gadget soon incur construction in a reduction of the operational heat of the laptop or computer produced: the gadget, as well, enhanced a laptop’s or any computer’s speed, wherein, the gadget incurred attachment. Therefore, the students found a financial backer, N. Merchandise, to initiate the implementation of the construction of Automated Gadget and promptly filed for a LLC to form company: thereof titled Group Automated Gadget, LLC (GAG) on June 8, 2008. Product Quality Inspector Training Development The GAG board is comprised of five individuals: the four students and the financial backer, whom the board elected as President of the board, devised a stratagem of opening a small plant. The GAG board averred the organizations mission to highlight the firm’s goals: GAG product performance excellence equals customer satisfaction. The board of...

Words: 5418 - Pages: 22

Premium Essay

Syllabus

...|[pic] |Syllabus | | |College of Humanities | | |COMM/400 Version 5 | | |Management Communication Skills | Copyright © 2010, 2008, 2006, 2004 by University of Phoenix. All rights reserved. Course Description This course focuses on identifying and developing the communications skills necessary to manage individuals and groups successfully within business and work organizations. Students will identify their management communication styles and will assess and improve their effectiveness in the areas of interpersonal communications, group dynamics, diversity, motivation, team building, and conflict resolution. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change...

Words: 2309 - Pages: 10

Premium Essay

Termpaperwa

...Information Systems, Wiley, 2006 (3nd edition) 2. A package of Harvard Business School Case Studies Additional Readings and Cases: Class handouts as needed. Course Description and Goals This course is designed to provide the current and future managers with understanding and appreciation of the issues that are related to the organization’s information technology assets. The course is not to educate technical specialists, rather, it is to give students a managerial perspective on the use of, design of, and evaluations of information systems that exist in organizations today. The objective of this course is to prepare students to manage information services in both today’s and tomorrow’s environment with its managerial, social, political, ethical and global issues. Conduct of the Course All students are expected to read the assigned materials (text, end-of-chapter discussion board questions (DBQ) and Harvard Business School case studies- HBC) before coming to the class. Some days we will discuss the materials in the text book. You are expected to be prepared to actively participate in this discussion, answering questions such as “What are the issues involved in ...?”, “What do the authors mean by ...?”, and “Give an example of...?” The second use of class time will be group presentation on the selected cases from the case study package. You will be assigned a group and lead the discussion for this activity. Those of you not assigned for...

Words: 4164 - Pages: 17

Premium Essay

Management for Kaplan

...Professional Unit 8 Alternate Seminar Assignment ------------------------------------------------- Full Name:Jasmyne brown Two-digit Section #:       ------------------------------------------------- Instructions: Download this document to your computer before filling it out. Save using SAVE AS and add your name to the front removing the phrase “YourName.” All of the gray boxes below should be appropriately filled in and the document saved again before submitting to the Dropbox. If you did not attend the live Unit 8 Seminar, you must complete the Unit 8 Alternate Seminar Assignment in order to earn Seminar credit. Submit your completed template to the Unit 8 Seminar area of the Dropbox on or before the close of the unit on Tuesday evening (11:59 p.m. ET). If you attended the live Unit 8 Seminar session, you do NOT need to complete this Assignment. Read the Unit 8 Seminar Case Study and be prepared to respond to the related questions. Using specific information from your unit of study, and previously learned information, provide a detailed response for each of the following questions (minimum 10 complete sentences for each item): How might Daniel make use of the 5 steps of the DO IT! problem solving strategy as he strives to gain part-time employment in an office setting? Response: For Daniel a strategies he would need to use is the 5 steps to problem solving. First step is the identify the problem. Next would be to identify this issues. Generating a type...

Words: 601 - Pages: 3

Free Essay

Abc Recruiter

...guideline for a program that can be set in place. Background Here is a new campus recruiter for ABC, Inc., Carl Robins who is faced with several different problems concerning his new hirers. They all are to start work in July and all of their paper work are incomplete. He just found out his training schedule, orientation, manuals, policy booklets; physicals and drug tests were not complete for the 15 new hire that he just hirer. Carl Robins also assured Monica Carrolls who is Operations Supervisor that the new hire will be ready to start work. In addition to Carl problems he check out the training room for the orientation and found out that Joe, from technology services, had reserved the room for the whole month of June for his computer training seminars. This is for the new database software implementation. Carl Robins only had his positions; has the new campus recruiter for past six months and this is his...

Words: 1509 - Pages: 7

Premium Essay

Sample Cv

...• Validates time and attendance and salary of employees • Prepares payroll report every cut off, for manual crediting and for additional instructions • Checks final pay computation and prepares check payment request • Updates clearance workflow for resigned employees • Prepares Letter of Guarantee and Certification of Employment for travelers • Handles/answers payroll issues/concerns of all Emerson employees (approximately 3,000 employees) • Handles Business units of EEAL • Conducts new employee orientation and payroll presentations in Communications meeting for the business units. • Prepares T&A reports for Business units (by request) • Administers timely and accurate payroll processing every 15th and 30th of the month • Assists employees in understanding their BIR form 2316 and 1700 filing • Assists Manager in tax issues • Facilitates the tax consolidation orientation for new hires DURATION DECEMBER 2010 TO JULY 2011 ROLE SERVICE DESK ANALYST FOR FACILITIES, PAYROLL AND COMPENSATION AND BENEFITS Facilities • Accepts room reservation for EMSS sites (SMPC and CGP) • Issues ticket for facilities request (e.g. office supplies, etc.) Compensation & Benefits • Clerical work • Answers inquiries regarding status of loan application, HDMF, SSS, Philhealth, BIR • Employment verification • Screens loan applications (HSBC, UCPB, Pag-ibig and SSS loans) •...

Words: 588 - Pages: 3

Free Essay

Qmb Course Guide

...................................................... 3 Subject Aims .......................................................................................................................... 3 Prescribed References ............................................................................................................ 3 Learning Outcomes .................................................................................................................... 3 Subject Objectives .................................................................................................................. 3 Generic Skills ......................................................................................................................... 4 Awareness Issues.................................................................................................................... 4 Prerequisites ............................................................................................................................... 5 Contact Details ........................................................................................................................... 5 Academic Staff Contact Details ............................................................................................. 5 Email Protocol...

Words: 3953 - Pages: 16

Premium Essay

Training Methods

...Training methods lectures demonstration seminar conference panel role planning case studies simulations projects self discovery movies/videos/computer based training mentoring exercise skill lesson Lecture In this method, one person (the trainer) does all of the talking. He or she may use handouts, visual aids, question/answer, or posters to support the lecture. Communication is primarily one-way: from the instructor to the learner. Pros: Less time is needed for the trainer to prepare than other methods. It provides a lot of information quickly when it is less important that the trainees retain a lot of details. Cons: Does not actively involve trainees in training process. The trainees forget much information if it is presented only orally. Demonstration Demonstration is very effective for basic skills training. The trainer shows trainees how to do something. The trainer may provide an opportunity for trainees to perform the task being demonstrated. Pros: This method emphasizes the trainee involvement. It engages several senses: seeing, hearing, feeling, touching. Cons: It requires a great deal of trainer preparation and planning. There also needs to be an adequate space for the training to take place. If the trainer is not skilled in the task being taught, poor work habits can be learned by the trainee. Seminar Seminars often combine several group methods: lectures, discussions, conferences, demonstrations. Pros: Group members are involved in...

Words: 1311 - Pages: 6

Premium Essay

The Status of Computer Education in the Selected School in the Division of Manila

...use of ICT’s to broaden access to and improve the quality and efficiency of basic education service delivery. The poor performance of students across the country in national and international tests, and the consistent high school dropout rates in both elementary and secondary school levels, underscore the deterioration of the quality of the Philippine schools system. Computer education offers potential for human betterment, at the same time, it is taught with great dangers that neither the potential can be truly realized, nor the danger avoided, without careful far-teaching critical questions being asked about computers in education. It is clear and evident that whatever this eventual outcome, the debate about computers in education is just beginning and is going to be with us for some time. The mathematician, computer scientist, and psychologist, Seymour Papert conducted renowned projects in the 1970’s at the Massachusetts Institute of Technology with the goal of making children the “builders” of their open intellectual “buildings”. (Harris and Kingston, 2002) It was Paperts intention to design “a computer language that would be suitable for children. It offers extraordinary opportunities to create an environment where one could learn algebra, geometry, problem solving, spelling, and history in ways more likely the informal learning of the unschooled toddler than the educational processes now...

Words: 4125 - Pages: 17

Premium Essay

Case Study

...for ABC, Inc. , he have been at this job for six months . In the case we read the lack of experience that he have as a recruiter and all the issues he encounter when situations steps on the way and the managerial skills of his supervisor. Carl needs to find a way that he can perform this work by the time it is needed. The frustration will have a crucial point on this case because of the experience he has on this. The organization of him and responsible manners take place and he needs to act before the company it is being harmed. All of these happens because of a decision of Monica Carrolls, Operations Supervisor to give him a job after only six months of work demonstrating the lack of managerial skills she has. Background According to the University of Phoenix Case Study for Student Analysis (2012), Carl Robins, the new campus recruiter for ABC, Inc., successfully recruited several new hires in spite of having been at his new job for only six months; this was his first recruitment effort, the first recruitment was to hire 15 new trainees to work for Monica Carrols, the operation's supervisor. He scheduled the orientation for the new hire to be on June 15, this to have them working by July. On May 15 Monica contacted him to talk about the training schedule, manuals, policy, booklets, physicals, drug test and a host of other issues that he needs to coordinate for the new hires. Carl assured Monica that everything would be arranged in time. After Memorial Day Carl pulled...

Words: 914 - Pages: 4

Premium Essay

3d Printers Semminar Report

...SEMINAR REPORT ON: 3D PRINTING TECHNOLOGY SUBMITTED BY: NAME: PRANATI DASH ROLL NO: 1021019 UNDER THE GUIDANCE OF: PROF.ASHUTOSH BEHERA PROF.MANOJ MISHRA PROF.JAYANTI DANSANA SCHOOL OF COMPUTER ENGINEERING KIIT UNIVERSITY BHUBANESWAR-24. Seminar Report-2014-15 3d Printing CERTIFICATE This is to certify that the report entitled “3D PRINTING TECHNOLOGY” is submitted by Pranati Dash (1021019) in 8th semester at School of Computer Engineering, KIIT University, and Bhubaneswar during the academic year 2014 as Seminar Report, under my constant guidance and supervision. The matter embodied in this report is original. X Examiner X Prof.Ashutosh Behura Seminar Guide X Examiner Seminar Report-2014-15 3d Printing ACKNOWLEDGEMENT I would like to thank everyone who helped to see this seminar to completion. In particular, I would like to thank my seminar coordinator, Prof. Ashutosh Behura for the moral support and guidance to complete my seminar on time. I express my gratitude to all my friends for their support and help in this seminar. Last, but not the least I wish to express my gratitude to God almighty for his abundant blessings, without which this seminar would not have been successful. Seminar Report-2014-15 3d Printing ABSTRACT The last two decades ended in the midst of revolution caused by a technology that was barely noticeable at the beginning of the decade. In 1980 few would have guessed that personal computer along with...

Words: 4184 - Pages: 17

Free Essay

Case Study Analysis Paper

...Case Study Analysis Paper Melissa Coy COMM/215 Feb 15th, 2015 Beverly Raznoff * The key problems for this case study are as follows: Carl’s paperwork and files for his new hires aren’t complete. Also, the training room has already been scheduled for the whole month of June by another employee. Carl as many issues that need to be remedied such as incomplete employee files, missing paperwork, and the orientation room being double booked. Background Carl has started a new recruitment of trainees for his Operations Supervisor, Monica. In May he was contacted about the paperwork and to see if everything would be scheduled in time for his orientation in June. He assured her that everything would be completed in time. To his dismay a few weeks before his orientation he discovered that that some of the new trainees didn’t have applications or transcripts in their files. The new hires hadn’t been sent to the clinic for their drug tests either. He also found out that another employee, Joe, had scheduled the training room for a computer training seminar for the whole month of June. If Carl wants to get his orientation on schedule and completed he needs to find a way to get his paperwork finished on time and find a place to conduct the training. Alternatives Possible alternatives for Carl’s situation could be: 1. Push the start date for the orientation back to a later date. (Possible constraints: Monica was...

Words: 1002 - Pages: 5