Free Essay

It302

In: Computers and Technology

Submitted By KennyHarrelson
Words 478
Pages 2
There are some goods in the economy that are required by the public but are not profitable for the businesses. Businesses do not like to invest where profit is not there. Such goods are provided by the government to the people and are known as public goods. Public Goods are freely available to the public and generally have two major characteristics: The good is non rival in consumption i.e. your consumption does not affect my consumption neither it decreases my consumption nor it increases my consumption The good is non excludable i.e. you cannot refrain a person from using that good despite of whether he is paying or not paying for the good.
Cup of coffee at coffee shop is there property and you will have to pay for buying it. Hence, it is rival as well as excludable. It is a private good.
City fire protection is provided by the government and it is non rival and non excludable. Provided free of cost hence, it is a public good.
Polar Bears are a common resource a natural resource or wildlife you can say.
Clean Air is non rival and non excludable but not provided by government. Though government can take steps to ensure that air is not polluted by industries and firms.

1. Do corporate managers always act in the best interest of shareholders?
• The claim that managers can ignore the interests of shareholders is deduced from the fact that ownership in large corporations is widely dispersed. As a consequence, it is often claimed that individual shareholders cannot control management. There is some merit in this argument, but it is too simplistic.
The extent to which shareholders can control managers depends on (1) the costs of monitoring management, (2) the costs of implementing the control devices, and (3) the benefits of control.
When a conflict of interest exists between management and shareholders, who wins? Does management or do the shareholders control the firm? There is no doubt and that ownership in large corporations is diffuse when compared to the closely held corporation. However, several control devices used by shareholders tie management to the self-interest of shareholders.

2. Research and present one CEO (Chief Executive Officer) pay package. Does this CEO earn more money if the company performs well? What penalty does the CEO receive if the company does not perform well?
• In most cases, CEO's receive huge bonuses for good performance. A lot of times their salary is not very much and they are mainly paid through their bonuses in an effort to avoid taxes from the IRS. If the company does not do as well, the CEO is not penalized but sometimes will not receive as big of a bonus. They will always normally receive at least a 6 figure bonus. In this case, we are considering a company such as Microsoft.

Similar Documents

Free Essay

It302

...# # This is the main Apache HTTP server configuration file. It contains the # configuration directives that give the server its instructions. # See for detailed information. # In particular, see # # for a discussion of each configuration directive. # # Do NOT simply read the instructions in here without understanding # what they do. They're here only as hints or reminders. If you are unsure # consult the online docs. You have been warned. # # The configuration directives are grouped into three basic sections: # 1. Directives that control the operation of the Apache server process as a # whole (the 'global environment'). # 2. Directives that define the parameters of the 'main' or 'default' server, # which responds to requests that aren't handled by a virtual host. # These directives also provide default values for the settings # of all virtual hosts. # 3. Settings for virtual hosts, which allow Web requests to be sent to # different IP addresses or hostnames and have them handled by the # same Apache server process. # # Configuration and logfile names: If the filenames you specify for many # of the server's control files begin with "/" (or "drive:/" for Win32), the # server will use that explicit path. If the filenames do *not* begin # with "/", the value of ServerRoot is prepended -- so "logs/foo.log" # with ServerRoot set to "/etc/httpd" will be interpreted by the # server as "/etc/httpd/logs/foo.log". # ###...

Words: 4666 - Pages: 19

Free Essay

It302-Unit6B

...IT302-Unit6B- Kaplan University As a consumer when we use a kiosk for a transaction, we expect it to provide us with a level of service or actions at least on a par with a proficient sales person or staff. If this is what we expect when we use a kiosk or similar device, then any design or implementation we are involved in must be done to the same or a higher level. After an introductory exposure to the requirements needed to meet the expectations of those who will be using the kiosk, our efforts need to be directed to create a device that meets or exceeds those expectations. In order to meet these expectations our first step is to thoroughly understand what is anticipated and needed to meet the expectations of potential users. In order to accomplish this we will need to conduct market research to truly find out what is expected by potential customers. Our design will need to attract potential customers and create an interest in products that are promoted or displayed. The clients’ initial impression will be an important part of this task. If the kiosk fails to attract the customers and impress them, it will simply become a device that takes up room. In order to maximize the any benefits that we may receive from the kiosk, we need to select the proper location and provide proper exposure for the kiosk. No matter how well designed it is or the bells and whistles it may have, if it’s in a poor location and lacks exposure...

Words: 677 - Pages: 3

Free Essay

It302-Unit4

...IT302-Unit4- Kaplan University Part 1: Dashboard Design. For the dashboard that I anticipated is required to meet the needs of the task that I discussed in Unit 3, I believe that the best approaches are either a Semantic Network or the use of Scenarios, Flowcharts and Cognitive walkthroughs, and more specifically Scenarios. Although this may be the most productive approach, it is likely that in the process of creating the dashboard that parts of a number of the conceptual designs could contribute to the finished product. While the Semantic Network is comprised of elements that would be useful and productive, particularly by providing ease in exploring the problem space and graphical views, it does not offer us all the information that would be constructive. To accomplish that, I believe the use of Scenarios, Flowcharts and Cognitive walkthroughs would provide us with the most useful means to develop a dashboard adequate to provide the functionality we are seeking. Of these, the use of Scenarios would provide the easiest means to develop a dashboard with the desired functionality initially along with the ability to modify easily as required to accomplish what is needed. By creating scenarios and including them in the early development of the dashboard we will provide ourselves with a means to develop a versatile form that can be easily amended as needed to provide a finished console that provides the full functionality that...

Words: 590 - Pages: 3

Premium Essay

It302-Unit5

...IT302-Unit5- Kaplan University Part 1: Design choice and wireframe. The range of purposes that kiosks serve is broad and varied. From providing information or services to the purchase of an extensive array of goods a kiosk can be and frequently is used to meet the desires and needs of the general public and consumers. In recent years there has been a substantial and steady increase in the frequency that we see or use some form of stand alone kiosk. The wireframe that I considered is more general in nature. This was done to provide flexibility in the design that can be easily used across a broad range of services with minimal modification. It also accommodates easy adjustment for use by disabled individuals. [pic] Part 2: Report of design principles. The final goal in designing a kiosk is to generate a product that will meet the needs of the business or organization that is using it to provide goods or services to its potential clientele. The purpose is to produce a product that is highly intuitive, and also provides clear and concise instructions on the proper use of the kiosk in general and specific features for those patrons that need assistance. The final design is influenced by several factors; • The service it provides and its ultimate function. • Ease of use and convenience for all users including handicapped. • The surroundings it needs to blend with. • Ease...

Words: 807 - Pages: 4

Free Essay

It302-Unit6

...IT302-Unit6A- Kaplan University Part1 – Introduction. The approach I used in unit 5 was a generic design which is flexible in nature with a basic layout planned so it can be easily molded, or modified to fulfill a variety of needs or applications. The wireframe associated with the design is shown without a supporting structure. The associated structure will be dictated by its application and placement. Part 2. WIMP. WIMP is an established approach that has become commonplace in its usage with and basic functionality on kiosks. The term WIMP stands for windows, icons, menus and pointers which are the primary objects used in the presentation of data to the customer or client and the means to communicate with the system. The term was coined by Merzouga Wilberts in 1980 that was part of the working group at Xerox Parc that ultimately developed the Graphical User Interface under the guidance of Allen Kay (Charlotte). Although still used, the term “WIMP” is slowly being overtaken by newer approaches and standards. As stated by Allen Kay, "We've taken the WIMP interface as far as it can go," he added, referring to the Windows-icon-mouse-pull-down menu” (Laurie, 1995). The first and most possibly the largest single item that the user sees is the monitor. Not only is it the most visible item we see whether the kiosk unit is handheld or free standing, it is the device that we depend on most for our visual interaction with...

Words: 1787 - Pages: 8

Premium Essay

Unit 8 It302

...Ariel Ruiz It302 Assignment 8.1 1. Which company originally created NIS under the name Yellow Pages, and then later changed the name since it was owned by “another corporation”? NIS was developed by Sun Microsystems. 2. What configuration file is used to tell Linux which system (NIS, DNS, files, etc.) to use for name resolution, authentication, etc.? The /etc/ncsd.conf configuration file is used to tell Linux which system to use for name resolution, authentication, etc. 3. The file format for an NIS database file is called a dbm. 4. Which Linux file generates two maps in NIS? The /etc/passwd file generates two maps: one indexed by username, the other indexed by UID. These maps are named passwd.byname and passwd.byuid. 5. What utility is used to display raw information from an NIS server? The ypmatch utility or ypcat utility is used to display raw information from an NIS server. 6. Which is the name of the init script for LDAP: ldap or slapd The name of the init script for LDAP is slapd. 7. What is the name for the root, or top level, entry in an LDAP directory? DSE is the root, or top level entry in an LDAP directory. 8. Expand and explain the following acronyms: a. CN = Common Name = is the attribute value used in the Relative Distinguished Name (RDN) b. DC = Domain Component = my-domain c. DN = Distinguished Name = uniquely identifies each entry in an LDAP directory. d. DSE = DSA Specific Entry = is...

Words: 319 - Pages: 2

Premium Essay

It302 Research #1

...IT302 Linux Administration Research #1 I researched three Linux security technologies which are, SELinux, chroot jail and iptables. As you read into this research you will see that they are split up into their own catagories so that it is easy to read information on whichever topic you would like. SELinux As part of its Information Assurance mission, the National Security Agency has long been involved with the computer security research community in investigating a wide range of computer security topics including operating system security. Recognizing the critical role of operating system security mechanisms in supporting security at higher levels, researchers from NSA's National Information Assurance Research Laboratory have been investigating an architecture that can provide the necessary security functionality in a manner that can meet the security needs of a wide range of computing environments. End systems must be able to enforce the separation of information based on confidentiality and integrity requirements to provide system security. Operating system security mechanisms are the foundation for ensuring such separation. Unfortunately, existing mainstream operating systems lack the critical security feature required for enforcing separation: mandatory access control. As a consequence, application security mechanisms are vulnerable to tampering and bypass, and malicious or flawed applications can easily cause failures in system security. The results of several...

Words: 1295 - Pages: 6

Premium Essay

It302 Unit 5

...UNIT 5 PROJECT Human Computer Interaction IT302 Professor Tamara Fudge Charlissia D. Fields Kaplan University Part I. Design Choice and Wireframe: Interface design refers to the element of website/ appliance/ device design that is aimed at creating a favorable environment for interaction between the user and the system and/or the owners of the website/ appliance/ design. In this paper we take a closer look at the principles being utilized to ensure that various aspects of interface have been taken into account at the design stage (Jenifer, 2010). A case study for an online customer care desk for ABC college. Part II. Report of Design Principles: 1. Comprehensibility and Learnability To ensure that the interface in comprehensible and easy to learn, the program shall first of all use language that is simple and which is commonly used in the interface design for education sector. Where a salient feature is used, the design shall ensure that it is positioned strategically in a way the user may derive its usage from its position (Kevin, & John, 2011). 2. Effectiveness/Usefulness Utility The utility/ usefulness of the interface are defined by the ability of the site to help as many clients as possible. Also, the ability for the user to use minimum time on the site is essential. To ensure this is possible, the website is created using very high...

Words: 855 - Pages: 4

Premium Essay

It302-Unit9-.Doc

...IT302-Unit9- Kaplan University Part1: Introduction. The approach I used in unit 5 was a generic design which is flexible in nature with a basic layout planned so it can be easily molded, or modified to fulfill a variety of needs or applications. The wireframe associated with the design is shown without a supporting structure. The associated structure will be dictated by its application and placement. Part 2: Haptic Specifications. Although possibly not needed or beneficial, multiple responses in affirming an action by the user are not particularly undesirable. In many cases the confirmation of an action is not only desirable, but may be mandatory for the benefit of the operator, particularly in the case of a client who has a hearing or vision problem. Feedback from the kiosk to confirm an operation may not only meet the ADA requirements, it may be reassuring to some users who may not need confirmation of an action due to physical reasons, but are simply reassured by having an indication that their actions ware correct and completed. Although the operating system of the kiosk possibly will be capable of additional tasks such as signifying that a keystroke was performed correctly, the use of these features may not be wanted by all users. It would be easy, and probably desirable, to design the system so features can be utilized or not as the user wishes. Through the use of messages, sounds or lighting a key or...

Words: 1152 - Pages: 5

Free Essay

It302 Unit 7

...TEXT AND THE USER INTERFACE IT302 Human Computer Interaction Unit 7 Assignment Kaplan University Part 1: Introduction The interface that was chosen in past assignments was the smartphone. The user can determine how the smartphone is set up, but in general there are some basic designs that every user needs in order to operate their own personal smartphone. These designs consist of icons that a user has memorized. Icons such as settings, home, phone and text are very common on smartphones and are used to help the user personalize their device. Part 2: Commentary Text Commentary text makes system states or system functionality visible (Heim 2008). Text should be readable, in that it is easy for the user of the interface to understand and read. The line spacing is very important when making the text on an interface readable. There are other aspects of the interface that make it readable as well such as: line length, formatting, the width of the margins and the scroll bar (scrolling). The interface should also use words that are common and easy for the user to understand. This just means that the designer of the interface should not use words that are not in most users’ everyday language. An example of this type of word is interface or dialog box. If the designer uses words that have no words that are like them in real life then the users of the interface will not try to make them have a different meaning than that which is intended. The text should...

Words: 1115 - Pages: 5

Free Essay

It302-Unit8-Rapier-John.Doc

...IT302-Unit8- Part1: Introduction. The approach I used in unit 5 was a generic design which is flexible in nature with a basic layout planned so it can be easily molded, or modified to fulfill a variety of needs or applications. The wireframe associated with the design is shown without a supporting structure. The associated structure will be dictated by its application and placement. Part 2: Non-Speech Sounds. Non-speech sounds are a part of our life that we have been exposed to from our youngest days until the present. Over time we learned to understand what they represented and understand more as we were exposed to them. Many key us to an action or event that occurred or is occurring around us even if we can’t or don’t see what sound is in response to. Our ability to interpret non-speech sounds and its connection to vision is a trait that can be effectively used in designing a kiosk. Sound can be employed as a vehicle to attract us to a kiosk, or draw attention to a product or service. While the sound may not directly provide information, it can used to create an interest in a product or service and draw us to it. A certain amount of care is needed in the selection of the sound that is being used to attract customers. Its purpose is to create interest and to support it, but not to take control of the presentation of the product. The same formula can be applied when we are using a kiosk. As well as sounds...

Words: 917 - Pages: 4

Free Essay

It302-Unit7-Rapier-John.Doc

...IT302-Unit7- Kaplan University Part1 – Introduction. The approach I used in unit 5 was a generic design which is flexible in nature with a basic layout planned so it can be easily molded, or modified to fulfill a variety of needs or applications. The wireframe associated with the design is shown without a supporting structure. The associated structure will be dictated by its application and placement. Part 2: Commentary Text. Commentary text should be selectable using different means. The most obvious means of selection is by the use of a designated help button. When touched this will display a help screen to provide a means for the customer to seek assistance. Additionally, this should also be accomplished by clicking the mouse curser on an item or text that information is desired on. All of these means should result in the same basic effect. The commentary text used in the presenting the product to potential customers has the potential of using a variety of text styles and sizes. Also in some cases color will be added to the text for emphasis or used to highlight items or attract the consumers’ interest. When initially presenting an item the text that is to be used will be designed in a manner to catch potential customers’ attention. This can be accomplished through the use of text styles that catch the eye, such as a change in size or creating an emphasis through the use of colors. Using a text style...

Words: 1034 - Pages: 5

Free Essay

It302 Activity 1

...Chapter 2 Installation Overview 1. A Net Boot CD is a way to install a new system from a hard disk or over a network. 2. Three considerations for planning an installation are; a. SELinux improves system security by implementing mandatory access control policies in the Fedora kernel b. Install a Graphical desktop environment (GUI) such as GNOME and/or KDE. c. Install additional software and services packages to fit the need of the user. 3. By default Fedora divides the disk into three partitions, including ‘/boot’ and Logical Volume Manager (LVM). 4. Manual partitioning the hard disk has its advantages, such as being able to isolate a filesystem for security or backup needs. 5. The / (root) partition is the main filesystem on the hard disk. Any new created directories will become part of the root filesystem unless a filesystem is created. 6. The swap partition is where Linux temporarily stores programs and data when it does not have enough RAM to hold all the information it is processing. 7. The /boot partition holds the hernel and other data the system needs when it boots. In order for the /boot partition to work properly it must be one of the first partitions on the disk. 8. The /var (variable) partition holds the bulk of system logs, package information, and accounting data. The /var/log partition is commonly used in a separate partition to isolate system logs from other files in the /var directory. 9. The /home partition is...

Words: 831 - Pages: 4

Free Essay

It302 Final Project

...CH 22 1. Sharing, remote storage, reduce the work load of administrator. 2. # mount bravo:/home /bravo. Home # mount 192.168.1.1:/home /bravo.home # umount /home 3. The showmount command can be used to display a list of directory hierarchies that a server is exporting. 4. $ mount | grep nfs 5. It contains information about major file systems in the system. And it is located in the /etc directory. 6. /opt *.example.com(ro,sync) 7. NFS attribute caching can cause inconsistencies when large numbers of client nodes are asked to access files that have been updated recently and the attribute caching data on the client has not expired. Disabling attribute caching eliminates the problem but may degrade performance for frequent file operations requiring file attribute data. 8. The root_squash option maps root to nfsnobody; all_squash maps all users to nfsnobody. 9. The option requires that the requests originate on an internet port less than 1024. 10. Because it has no disk space, a diskless workstation has no swap space. The only choice is to use NFS. If it did not use NFS for swap space, the workstation would be limited by the amount of its physical memory. 11. Because it resides on the lan and file data and user id values appear unencrypted. 12. The nosuid option forces setuid executable in the mounted directory hierarchy to run with regular permissions on the local system. CH 23 1. smdb, nmbd 2. Set the username map parameter...

Words: 806 - Pages: 4

Free Essay

It302 Reserch 1

...There are many ways to have internet access these days. Coffee shops, libraries, airports and even public buses have free wireless access. With all these free accesses to the World Wide Web, there is also many potential ways for hackers to potentially get your personal information and use it for their gain. There are many ways to combat this situation by using several security measures with Linux programming, which the majority of the software is free. Some of those security technologies are SELinux, TCP Wrappers, IPtables and Chroot Jail to name a few. In basic Linux security, Discretionary Access Control is based practically by users and groups. The process is run by a user and then has access to anything other users has access to, making it not so secure. The U.S. National Security Agency (NSA) developed the SELinux (Security Enhanced Linux) to combat the lack of strong security. The SELinux implements Mandatory Access Control (MAC) in the Linux kernel which enforces policies that limits the user or a program of what they can do. It is designed to prevent process from reading and/or tampering of data and programs. MAC is an important tool for containing security threats made by user errors, hackers or software errors. It’s pretty hard to bypass the security measure since the kernel is checking the MAC rules right after checking the DAC rules on a constant basis. There are three states you can place SELinux to run in; Enforcing, Permissive and Disabled...

Words: 827 - Pages: 4