Free Essay

Phase 2 Ip

In: Other Topics

Submitted By runningblind924
Words 292
Pages 2
Phase 2 Individual Project The Cornell method of note taking is very thorough. I liked it because the summary portion makes it easy to quickly review your notes without going in to full detail, and still be able to grasp concepts. I did not like the fact that you had to do the questions/keywords after you took the notes. This, to me at least, felt backwards from what I am used to and it became more time consuming for me because of that. I liked the outline method because of the way it flows with the text that I was reading. I disliked the outline method because actually typing it out, all of the letters and numbers get a little bit confusing and it almost takes away from the different points. My preferred method for note taking out of the two would be outline. It is easier to type and you can quickly look at key concepts. It is visually more appealing to me. Outlining your notes also seems to allow you to pack in more details than I was able to put into the Cornell notes. After reading chapter eight, I feel that I am a visual learner. I think that since I am a visual learner it makes sense that I would prefer the notes that are more visually appealing. I read that a visual learner should summarize information in visual formats such as short sentences or bullet points, which to me would be more like an outline. This also makes sense because I learned that visual learners are better at remembering what they read if it is written in descriptive text and with outlines you can pack in more detail, which allows you to be more descriptive.

Similar Documents

Premium Essay

Econ Phase 2 Ip

...Phase 2 IP By: Tiffany Geisler Class: ECON210 Colorado Online University Gross Domestic Product or GDP is an economic indicator used to measure a countries status of economic development & status as well as performance. It incorporates the total market value of all the goods and services produced within a particular country. It is calculated on an annual basis which incorporates public consumption, investments, imports & exports, government spending, and private consumption within a defined area (Chron, 2014). PART 1 Country A’s GDP: 140,000 cars Country A’s consumption of GDP by percentage = 64.28% Country A’s GDP per capita = .28 cars Keynesian economics states that government can influence the aggregate demand through intervention policies to stabilize the economy in times of excessive inflation and deflation (Boundless, 2014). During periods of low demand, country A’s government can provide tax breaks to individuals and/or industry to increase buying potential and increase spending as well as purchase additional cars to boost the country’s economy. This process can be worked in reverse in time of excess demand to slow down the economy. PART 2 According to the latest release from the U S Department of commerce Bureau of Economic Analysis, the United States GDP is rising and the country’s Gross Domestic Income (GDI) is rising. This indicates that the current business cycle is in an expansion phase. The real GDP today is......

Words: 702 - Pages: 3

Premium Essay

Acct 316 Phase 2 Ip

...Running Head: APPLIED MANAGERIAL ACCOUNTING: PHASE 2 INDIVIDUAL PROJECT APPLIED MANAGERIAL ACCOUNTING ACCT614-1304B-02 Phase 2 Individual Project Aliyah W. Meehan Colorado Technical University Online ABSTRACT In this Assignment I will attempt to do several things. I will introduce a new 1.5 gigabyte computer memory chip on behalf of EEC while using a job order costing system, which is a costing system where costs are to be collected then assigned to different units of production for each unique job, or process costing system, which is a costing system that is known to accumulate production costs by using a department or process’s data over a specific period of time in order to report the costs of a new product. I am going to focus and highlight the many differences within the various systems in use to do this job. I will also attempt to describe how these selected systems will work for EEC in order to track the costs of these products. Furthermore, my job in this assignment will be to identify the actual cost driver in order to explain the pattern and process of cost tracking. I will then go on to provide examples of products that the EEC’s firm could offer in order for a job-order costing system to be appropriately applied. •Should EEC use a job-order costing system, which is a costing system where costs are collected and assigned to units of production for each individual job, or a process costing system, which is a costing system that accumulates production......

Words: 1867 - Pages: 8

Free Essay

Mkt305 Phase 2 Ip Ctu

...MKT305-1102A-08 Phase 2 Individual Project Heather Haines April 17th, 2011 Dr. Roy Viar IV Colorado Technical University Online Limited Brands Limited Brands is the parent company for seven other companies, Victoria’s Secret and Victoria’s Secret Pink, Bath and Body Works, La Senza, C.O. Bigelow, White Barn Candle Company and Henri Bendel (Overview, n.d.). Mainly known for Lingerie and beauty products, they also sell clothing and accessories. Creating brands that make woman feel sexy, glamorous and fashionable. Inviting us to pamper and indulge ourselves whenever we want. Victoria’s Secret brings in 42% of Limited Brands net sales. Victoria’s Secret was started in the mid 70s by Roy Raymond, in San Francisco, CA. He wanted to create an atmosphere for men to feel comfortable buying lingerie for their wives. You could say the first customer target was men. After growing the business to four locations he was forced to sell it in 1982 to The Limited. By the early 90s, new management took over and focused on an older age group, thirty to forty year old women, as their target. Today there are over 1,000 stores nationwide and catalogs and the internet allow us to shop anyplace and anytime. Pink is Victoria’s Secret line started in 2004 and is targeted for the college-aged girls (Overview, n.d.). Victoria’s Secret and VS Pink’s demographic is women ages 18-44. The psychographic profile of Victoria’s Secret and Pink are that the stores offer a......

Words: 942 - Pages: 4

Premium Essay

Study Guide Nsa Capstone

...Topic 1: The Input/Output Process 1) Definition Motherboard, CPU, RAM, Hard drive, Graphics Card, NIC Card, Power Supply, and ROM Drive 2) Application I/O processes is basically how the devices communicate so they can work together. For example when you plug in a USB device the computer has to find a driver. That driver is like a translator for the USB device so the computer understands what the USB device is doing. 3) Troubleshooting The most common issue is that either the driver is corrupted or the driver is the incorrect one. To fix this use the disk the printer came with and reinstall the driver or go to the products website and download the driver for that product and model. Topic 2: The OSI Model 1) Definition The OSI model is a conceptual model that characterizes and standardizes the internal functions of a communication system by partitioning it into abstraction layers. 2) Application 3) Troubleshooting Topic 3: SOHO Broadband 1) Definition The current available broadband solutions are cable, dialup(IDSN), satellite, ADSL(much like dialup) but higher rates 1500Kbps down and 256Kbps up,DSL(carries signal as digtal without have to convert it from analog and its faster) and wireless (Verizon ect) 2) Application I would use a wireless network that would allow everything to hook up to my network. 3) Troubleshooting I would start checking to see if it is network wide or certain sections of the network. If it is the entire network I would start......

Words: 992 - Pages: 4

Premium Essay

Ccna Labs

...Phase 1: Identifying Requirements, Putting the Network Together Scenario NuggetLabs Industries is growing significantly. Due to space limitations, five employees currently share single cubicles…at the same time. While this is great for team building, these space limitations are now impacting business productivity. NuggetLabs has now leased an additional office building roughly 20Km from their headquarters location. While this office will eventually connect to the HQ office, it will initially be set up independently. NuggetLabs Industries has heard rumors of your ninja-like network consultation skills and has agreed to pay you an excessive amount of money to design and build their network infrastructure. Gathering Information To help guide this initial configuration, you‘ve assembled a list of requirements based on various meetings with management. * The new office will initially house 75 employees, each with their own Cisco IP Phone and PC. This office may eventually scale to 200 employees over 5 years. * The Windows admins are planning to install a new pair of redundant servers at the new office. They plan to manage all the IP addresses for DHCP on these servers and are waiting for you to tell them what IP address range they should use. * Windows admins: Jeff Service - (602) 555-1293, Mike Pack (480) 555-9382. * The new office is a two story building with the Main Distribution Frame (MDF) in the northwest corner of the first floor. Because of...

Words: 4941 - Pages: 20

Premium Essay

It600-0803a-01:Information Technology Management Entire Buy This Course at: Http: //Myessaybank.Com/Essay Bag/View Paper/Id/1890

...BUY THIS COURSE AT: |   Management Effectiveness Using Technology Resources |    Phase 1 - Task 1 | Task Type: | Discussion Board | Deliverable Length: | See assignment details |   |   |   |   |  Primary Discussion Response is due by WednesdayYou have been called in by your boss. The company is considering buying another smaller firm; however, some business analysis is needed for your company management to make its final decision about purchasing. Your boss has asked you to look at the firm that he or she is considering to buy in terms of competitive advantage. You have been asked to explain to senior management how you would provide this information. You have been tasked with using Porter's five forces to make this determination. Discuss and defend to your management how utilizing Porter's five forces to analyze any organization or industry would provide an understanding of competitive advantage. | |   Phase 1 - Task 2 | Task Type: | Individual Project | Deliverable Length: | See assignment details |  The company that you are working for is considering buying another smaller firm. However, there is some business analysis needed for your company to make its final decision about purchasing. Throughout this course, you will be working on creating the Business Strategy and Management Plan.Keep in mind that the final Business Strategy and Management Plan template should contain the......

Words: 3060 - Pages: 13

Premium Essay

Virtual Private Network

...VPN Concepts A virtual private network (VPN) is used to transport data from a private network to another private network over a public network, such as the Internet, using encryption to keep the data confidential. In other words, a VPN is an encrypted connection between private networks over a public network, most often the Internet. VPNs provide the following services:  Confidentiality: VPNs prevent anyone in the middle of the Internet from being able to read the data. The Internet is inherently insecure as data typically crosses networks and devices under different administrative controls. Even if someone is able to intercept data at some point in the network they won’t be able to interpret it due to encryption.  Integrity: VPNs ensure that data was not modified in any way as it traversed the re Internet. Authentication: VPNs use authentication to verify that the device at the other end of VPN is a legitimate device and not an attacker impersonating a legitimate device. Cost savings - VPNs enable organizations to use the global Internet to connect remote offices and remote users to the main corporate site, thus eliminating expensive, dedicated WAN links and modem banks.    Security - VPNs provide the highest level of security by using advanced encryption and advanced authentication protocols that protect data from unauthorized access. Scalability - Because VPNs use the Internet infrastructure within ISPs and devices, it is easy to add new users.......

Words: 6523 - Pages: 27

Free Essay

System Engineerring Roles in Software Enginerring

... TABLE OF CONTENTS Introduction to tcp/ip tcp ip operaction ,s of tcp/ip layers in tcp/ip model tcp/ip protocols References INTRODUCTION TCP/IP------------ The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite (IP), and is so common that the entire suite is often called TCP/IP. TCP provides reliable, ordered, error-checked delivery of a stream of octets between programs running on computers connected to a local area network, intranet or the public Internet. It resides at the transport layer. Web browsers use TCP when they connect to servers on the World Wide Web, and it is used to deliver email and transfer files from one location to another. HTTP, HTTPS, SMTP, POP3, IMAP, SSH, FTP, Telnet and a variety of other protocols are typically encapsulated in TCP. Applications that do not require the reliability of a TCP connection may instead use the connectionless User Datagram Protocol (UDP), which emphasizes low-overhead operation and reduced latency rather than error checking and delivery validation. TCP---------- The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite. TCP provides reliable, in-order delivery of a stream of bytes, making it suitable for applications like file transfer and e-mail. It is so important in the Internet protocol suite that sometimes the entire suite is referred to as "the TCP/IP protocol suite." TCP is the transport protocol......

Words: 2390 - Pages: 10

Free Essay

Web Development I Class

...Patricia Goodwine Discussion Board 2 19 February 2013 In the student tool called M.U.S.E, it touches upon the subjects within the Web Development I class. The videos which are needed to view for the upcoming first Individual Project are; Introduction to Phase 1, How to Use the eBook, Introduction to Dreamweaver, How to Choose the Right Colors, Introduction to Photoshop and Phase 1 IP Demo; is to help students understand what is needed to complete the project. In the follow paragraphs, will explain how this work. With the ‘Introduction to Phase 1’ video, the instructor shows what the class is about and what to do in a step-by-step matter with the Dreamweave. It also states how to use the videos if someone gets overwhelm, what do to. In the next video, ‘How to Use the eBook’, it helps students understand how the eBook works alongside Photoshop and Dreamweaver while the student is building their web site. In the ‘Introduction to Dreamweave’ video, the instructor explains to students how Dreamweave is used, as well as some advice where to start and how to get comfortable with the program. The video ‘How to Choose the Right Colors’ shows how and why to pick the right colors for your web site, which can make all the difference between a bad or great web site. As in the ‘Introduction to Dreamweave’ video, ‘Introduction to Photoshop’ it helps the student understand how to take a screenshot, using the Clipboard and cropping images. Finally, in the video ‘Phase 1 IP Demo’, he gives an......

Words: 377 - Pages: 2

Premium Essay


...Unit 9 Assignment 2 Phases of a computer attack Phase 1 - Reconnaissance Phase 2 - Scanning Phase 3 - Gaining Access Phase 4 - Maintaining access Phase 5 - Covering Tracks Phase 1:   Passive and Active Reconnaissance Passive reconnaissance:   This is the process of scouting out a company or individuals knowledge and processes, such as finding out when employees come in to work and leave work.   It can also be the result of researching the company through the internet via search engines. Active Reconnaissance:   This is the process of actually scanning the network to find out IP address and services that the network provides.   This process will help the hacker determine what vulnerabilities are on the network as well as other important information such as what operating systems the network is using.   This is a more intrusive part of reconnaissance than the passive way and has a much higher risk of being detected. Phase 2: Scanning This is the process of using the information discovered in the reconnaissance stage and using programs such as port scanners, network mappers, and sweepers.   This can result in getting information such as the user accounts, IP addresses and   computer names. Phase 3: Gaining Access This is the phase where you are taking the information gathered from the reconnaissance and scanning phase, the information gathered is used to exploit vulnerabilities in the network to gain access.   There are several ways to do this such...

Words: 326 - Pages: 2

Free Essay

Five Phase Induction Motor

...Design of Five Phase Induction Motor Sanket M. Bhimgade#1 Swapnil C. Chaudhari#2 Roshan B. Durge#3 Vabeihrohnei Chozah#4 Parag P. Salunke#5 Department of Electrical Engineering Dr. Babasaheb Ambedkar Technological University, Lonere, Raigad (MS - 402 103) , , , , 1 Abstract: The conversion of electrical energy into mechanical energy has been and continuous to be a dominant form of power transmission for industrial purposes. The alternating current (AC) electric induction motor has been an industry workhouse for electromechanical conversion for over 100 years. This paper introduces the fundamental electric and mechanical principles of 5 phase AC induction motor. In this paper, a generalized formula is proposed for the selection of number of slots required for 5-phase alternative current (AC) machine design and the criterion for selecting the starting points of each phases. Keywords: Induction motor. Five phase, Stator winding. current. The power per phase is P = VP IP cosϕ and the total power is the sum of the amount of power in each phase. If the currents are equal and the phase angles are the same as in Fig. 1, then the load on the system is balanced, the current in the neutral is zero and the total power is [1], =3 cos ∅ Or Or = √3 = 1.73 cos ∅ cos ∅ I. INTRODUCTION In general, the induction machines having......

Words: 3545 - Pages: 15

Premium Essay

Fiction Corp Data Ctr Mov

...of this move. The Fiction CEO has informed Big-Proj that the capital budget cannot exceed $500,000 and must not interrupt business operations. The data in the center supports remote retail locations, an off-site 100-seat call center and 3 remote warehousing operations 24 hours a day. Any significant downtime to its production systems would impact Fiction Corporation’s operations and profitability. Fiction Corporation has hired Big-Proj to supervise and execute its data center move several miles away to its new headquarters facility. The Project life cycle has been signed for 30 days. Big-Proj typically handles these types of moves as part of its normal operations; along with network upgrades, and ERP deployments. The move will include 2 large UPS, 4 RS/6000 AIX application servers, 10 virtualized servers, and 20 PC servers. A part of the strategy on the project will be to keep Fiction Corporation’s systems up and running as they serve 500 remote location retail stores that are connected via frame relay with ISDN backup. The company wishes to employ a seamless migration that minimizes impact on staff and customers. Overall, the process should start with a thorough audit of the existing data center to accurately inventory the equipment, functions, and processes that will be moved to the new location. One of Nigel’s directives is work closely with Fiction Corporations IT Operations Organization to mitigate risk and establish...

Words: 2202 - Pages: 9

Premium Essay


...Table of Contents Introduction 3 Problem Statement 4 Analysis 5 Recommended Solution and Implementation 9 References 12 Appendix A 14 Appendix B 15 Introduction Tridoc Medical Services is a medical office that was founded by three doctors. The office has six employees, besides the three doctors, working for it. There are three medical assistances and three employees who work the front desk. The office has decided to upgrade their current telephony system to a new VoIP system. The office does not have any equipment, wiring, or software for a VoIP network. To create the network, there will need to be network cabling installed throughout the office to each location where a phone is located. New IP phones will need to be installed where each network drop is placed. There will need to be a proxy server...

Words: 2642 - Pages: 11

Free Essay

Foreign Exchange of Exim Bank

...origin – 01 copy h) Certificate of Arrival Material issue by Project Director – 01 copy Thanking You. With best regards, BILL OF EXCHANGE NO.ARMA/BTCL/01/2009 TOTAL L/C VALUE BANGLADESH TAKA=2,48,60,000.00 CLAIM AMOUNT BANGLADESH TAKA=1,36,73,000.00 At sight of this first Bill of Exchange the same tenor and date being unpaid pay to: Exim Bank Ltd., Malibagh Branch, 484 D.I.T. Road, Malibagh, Dhaka-1217 or order of the sum of BDT.2,48,60,000.00 (Say in word Two Crore Forty Eight Lac Sixty Thousand) only. Account of : Supply, Transportation, Installation, Testing and Commissioning of 100 KVA, Single Phase 50Hz, 45a # 2A, Diesel Engine Generator sets. Drawn under: One Bank Ltd., Kawran Bazar Branch, HRC Bhaban, 46 Kawran Bazar C/A, Dhaka. L/C No.1882-09-99-0047 dated 28.04.2009 Contract No.DP/L-09/IP/07-08/Upa-zilla Growth Center Project/204 DATED 15.04.2009. To: One Bank Ltd., Kawran Bazar Branch, HRC Bhaban, 46 Kawran Bazar C/A, Dhaka. A/C: Bangladesh Telecommunications Company Limited (BTCL). BILL OF EXCHANGE NO.BE/ARMA/BTCL/01/2009 TOTAL L/C VALUE BANGLADESH TAKA=2,48,60,000.00 CLAIM...

Words: 1375 - Pages: 6

Free Essay

Ospf White Paper

...WHITE PAPER BIDIRECTIONAL FORWARDING DETECTION FOR OSPF Fast Failure Detection to Speed Network Convergence OVERVIEW In both Enterprise and Service Provider networks, the convergence of business-critical applications onto a common IP infrastructure is becoming more common. Given the criticality of the data, these networks are typically constructed with a high degree of redundancy. While such redundancy is desirable, its effectiveness is dependant upon the ability of individual network devices to quickly detect failures and reroute traffic to an alternate path. This detection is now typically accomplished via hardware detection mechanisms. However, the signals from these mechanisms are not always conveyed directly to the upper protocol layers. When the hardware mechanisms do not exist (eg: Ethernet) or when the signaling does not reach the upper protocol layers, the protocols must rely on their much slower strategies to detect failures. The detection times in existing protocols are typically greater than one second, and sometimes much longer. For some applications, this is too long to be useful. Bi-directional Forwarding Detection (BFD) provides rapid failure detection times between forwarding engines, while maintaining low overhead. It also provides a single, standardized method of link/device/protocol failure detection at any protocol layer and over any media. THE PROBLEM WITH CONVERGENCE The process of network convergence can be broken up into a set of discreet......

Words: 6315 - Pages: 26