Free Essay

Phase 5 Ip

In: Business and Management

Submitted By chatelle25
Words 1583
Pages 7
PHASE 5 IP
CTU Online Technical University
ENTR615-1404A-01
Professor: Theresa Pavone
By: Chatelle Bell

CHATELLE BELL
PRECIOUS LIL’S CREATIONS Childcare LLC
10020 SE 425th ST
KENT WA, 98031
(206) 651- 7600
Chatellemarie25@gmail.com

OUR PHILOSOPHY
We believe that self-esteem is the critical component to optimal growth in your children. In this order for a child is to develop a high self-esteem, and we focus on developing the socialization and self-help skills needed to succeed in the other areas of development. How a child would learn to get along with others. Play is the way children will learn about how their world, themselves, and others, and the way in developing in their skills and knowledge as they will need kid, and to be a kid they have to play, to play dirty time to time in having fun enjoy their play time.
MISSION STATEMENT The Precious Lil’s Creations mission is to provide the highest quality of care and education for young children. Our role is to encourage realistic opportunity for success. As for the child center staff members, parents of this community of United State all play an integral part in promoting and providing an environment rich in learning different skills of learning experiences and opportunity for children within in this community. Precious Lil’s Creations adhere to highest, and everything will fall into place. But yes our services will be greatly exceeded to the expectations of our customers and parents.
VISION STATEMENT Every child/family that comes through our doors will be treated with love and respect that when they leave here they will be able to pass on the love and respect to others that they were shown.

SERVICES OF OPERATIONS
Precious Lil’s Creations is open Monday-Friday child care is offered on some weekend, as in evenings and not on Holidays. Childcare hours are from (6:00am to 6:30pm). But remember the fees is based on the hours of your contract is for, not the hours that I am open. If you parents may require an earlier drop off, you would have to call in advance to authorize this time. So if any extra fees will be charged. As well with the late fees will be charged for pick-ups and past you’re agreed upon time. Mulit-aged setting allows children to learn from one another and allow siblings to be together. But some of these child care provider is offering parents more type of flexibility in hour of operation as in evening, weekend, overnight, and before and after school care and special needs to children in all age’s group too.
COMPANY LOCATIONS
Precious Lil’s Creations is based on operations in United State. The facility is original consist of 1,900 sq. in a house it quiet, residential area in the neighborhood. It has a big yard fully fence ensure no one could come in around the house wander away. This yard is furnished with safe type of all age’s toys from toddler to big kids in an entertaining big toys and sandbox, basketball hoop, bikes, balls, chalk and dollhouse. But the house is based on activities and serving and preparation schedule meals everyday breakfast, snack, juice break, lunch, snack of their meals Monday-Friday. Precious Lil’s Creations will also contain with some games, toys, books, computer, puppet shows, and entertainment of the children (www.bplans.com).

MARKET SUMMARY & SEGMENTATION
Precious Lil’s Creations is a type of business become necessary in today fast-paced world. It is some type of increase amount of these families that has like become dependent on the two incomes, has created necessity of the child care industry. There are almost 300 facilities in the area of child care that provide services to Precious Lil’s Creations, of them that have large client base, and lucrative type if business.
Precious Lil’s Creations is to focus on the meeting in local need for the child care service in a 10-mile radius. The children would be taken a flexibly on a full-time or part-time in a basis. Full-time working couples is a company that would want to like establish something in a large full-time regular client base on order establish in a healthy consistent revenue on a based to ensure stability of the business. As for the parents relations is a very important, and imperative in keeping these parents as pleased in this order to help their children in this family home child care. Then we have the part-time workers and drop-ins comprise approximately a 20% of these revenues. In this market would be the primary focus, in a sufficient flexibility in handling a secondary type of market very important to produce supplemental revenues.
COMPETIVE COMPARISON
It is over 300 or more child care providers in the local and city area. This is larger commercial chain for child care business, as for KinderCare, Child Care Aware Recourse, Precious Lil’s Creations, and The Heaven etc. In this big type of chain is competing as well in a good reputation of among in this consumer market. Precious Lil’s Creations is offering a staff to child care ratio, as an appealing to these parents. But additionally in this company business like maintain child care fee level type that is a 5-10% as below in average of the large commercial chain of child care fees (www.bplans.com).

COMPETITIVE EDGE
Precious Lil’s Creations is a child care on a competitive edge in the facility efforts in like obtain all appropriate licensing you would carry as for the certifications. But additional to the pre-hire part is the background in screening the helper as for the volunteer and staff worker in to perform all the individuals before the hire for working as an employer.
STATEMENT OF ETHIC
The research explains how the business and trade is organization to have some code of ethics as for these employees and staff member is supposed to as follow. In this type of breaking of the code is the ethics as a result of a termination with a dismissal from these organizations. But code of ethics is important and clear of lay to like these rules in the behaviors and provide a preemptive in a warning. The developing of the following in a personal code of ethics, as for the childcare providers that can help to ensure that they will be doing their best way to provide atmosphere to fill the trust, love, and growth for these children. You know the best way of a child is to learn different type of programs is by example. As the children are to look to their role models, caregiver should be a responsible and professional.
STATE OF SOCIAL CODE of ETHICS
Responsibility to children is a basic type of foundation in the childhood education and keep the knowledge in a current attend these classes and type of training. You would have to recognize that each child is an individual that will grow, develop, his and her own pace. In treating a child equal and encourage them to participate. But you would also have to maintain a safe, clean environment and healthy too as the children would feel kind of comfortable to learn some skills and play different technical objects. We also have to make sure at all times that children is with you at all times and with all the activities as indoor and outdoor activities and be supervised at all time.

Responsibility to families: is to feel comfortable and welcome those in your childcare in your environment by listen to concerns is sure to in answering any questions. Then learn on some special needs of their children maintain confidentiality. Ask some questions in learning what children like in their interests are and learning on that interest. You would have to open and be active on the communication through email, phone, conferences, surveys, and conversation.
Employment (staff job description): is to be more responsible for supervising nurturing, and caring for the children typically from ages 6 weeks to 12yrs old, and before the child enters kindergarten. Welcome these children each day, in providing meals, perform crafts and activities, changes diapers, and ensures children in behave well when in contact with other children.
Family childcare (Providers): offer care for children in their homes for the services. The requirements are differ from the state to state. The majority of state that provide be regulated in watching more than four children. In my family childcare I hold at least six children and I have voluntary regulation of a process in a place as a provider in caring for these six children and more to come. Yes I provide them with safety, nutrition of these standards. But my parents make this childcare choice at my service to help children to stay in a home – like environment. My childcare is arranged less expensive and more flexible than a center based of care. Some of my parents think their child is better off in small groups with a one on one licensee provider.

Work cited:
Childcare Center Financial Planning Facilities
Retrieved from: www.buildingchildcare.net/uploads/pdfs/CCCManualFINAL07.pdf
Starting a Childcare Development Center
Retrieved from: www.gsa.gov/graphics/.../startupguide.p...
Which is more effective Mass or Niche Marketing? Retrieved from: http://www.smallbusinessbc.ca/growing-a-business/which-more-effective-mass-or-niche-marketing
Childcare Services Industry
Retrieved from: http://www.hoovers.com/industry-facts.child-care-services.1833.html

Similar Documents

Premium Essay

It600-0803a-01:Information Technology Management Entire Buy This Course at: Http: //Myessaybank.Com/Essay Bag/View Paper/Id/1890

...BUY THIS COURSE AT: http://myessaybank.com/essay_bag/view_paper/id/1890 |   Management Effectiveness Using Technology Resources |    Phase 1 - Task 1 | Task Type: | Discussion Board | Deliverable Length: | See assignment details |   |   |   |   |  Primary Discussion Response is due by WednesdayYou have been called in by your boss. The company is considering buying another smaller firm; however, some business analysis is needed for your company management to make its final decision about purchasing. Your boss has asked you to look at the firm that he or she is considering to buy in terms of competitive advantage. You have been asked to explain to senior management how you would provide this information. You have been tasked with using Porter's five forces to make this determination. Discuss and defend to your management how utilizing Porter's five forces to analyze any organization or industry would provide an understanding of competitive advantage. | |   Phase 1 - Task 2 | Task Type: | Individual Project | Deliverable Length: | See assignment details |  The company that you are working for is considering buying another smaller firm. However, there is some business analysis needed for your company to make its final decision about purchasing. Throughout this course, you will be working on creating the Business Strategy and Management Plan.Keep in mind that the final Business Strategy and Management Plan template should contain the......

Words: 3060 - Pages: 13

Premium Essay

Ccna Labs

...Phase 1: Identifying Requirements, Putting the Network Together Scenario NuggetLabs Industries is growing significantly. Due to space limitations, five employees currently share single cubicles…at the same time. While this is great for team building, these space limitations are now impacting business productivity. NuggetLabs has now leased an additional office building roughly 20Km from their headquarters location. While this office will eventually connect to the HQ office, it will initially be set up independently. NuggetLabs Industries has heard rumors of your ninja-like network consultation skills and has agreed to pay you an excessive amount of money to design and build their network infrastructure. Gathering Information To help guide this initial configuration, you‘ve assembled a list of requirements based on various meetings with management. * The new office will initially house 75 employees, each with their own Cisco IP Phone and PC. This office may eventually scale to 200 employees over 5 years. * The Windows admins are planning to install a new pair of redundant servers at the new office. They plan to manage all the IP addresses for DHCP on these servers and are waiting for you to tell them what IP address range they should use. * Windows admins: Jeff Service - (602) 555-1293, Mike Pack (480) 555-9382. * The new office is a two story building with the Main Distribution Frame (MDF) in the northwest corner of the first floor. Because of...

Words: 4941 - Pages: 20

Premium Essay

Study Guide Nsa Capstone

...The current available broadband solutions are cable, dialup(IDSN), satellite, ADSL(much like dialup) but higher rates 1500Kbps down and 256Kbps up,DSL(carries signal as digtal without have to convert it from analog and its faster) and wireless (Verizon ect) 2) Application I would use a wireless network that would allow everything to hook up to my network. 3) Troubleshooting I would start checking to see if it is network wide or certain sections of the network. If it is the entire network I would start looking towards my main switch and server but it was a certain section of the area of a network I would start at that switch and work my way back towards the server. Topic 4: TCP/IP 1) Definition 2) Application 3) Troubleshooting Check IP address, Subnet Mask, Default Gateway Topic 5: Client Server 1) Definition A domain is a is a form of a computer network in which all user accounts,...

Words: 992 - Pages: 4

Premium Essay

Test

...Unit 9 Assignment 2 Phases of a computer attack Phase 1 - Reconnaissance Phase 2 - Scanning Phase 3 - Gaining Access Phase 4 - Maintaining access Phase 5 - Covering Tracks Phase 1:   Passive and Active Reconnaissance Passive reconnaissance:   This is the process of scouting out a company or individuals knowledge and processes, such as finding out when employees come in to work and leave work.   It can also be the result of researching the company through the internet via search engines. Active Reconnaissance:   This is the process of actually scanning the network to find out IP address and services that the network provides.   This process will help the hacker determine what vulnerabilities are on the network as well as other important information such as what operating systems the network is using.   This is a more intrusive part of reconnaissance than the passive way and has a much higher risk of being detected. Phase 2: Scanning This is the process of using the information discovered in the reconnaissance stage and using programs such as port scanners, network mappers, and sweepers.   This can result in getting information such as the user accounts, IP addresses and   computer names. Phase 3: Gaining Access This is the phase where you are taking the information gathered from the reconnaissance and scanning phase, the information gathered is used to exploit vulnerabilities in the network to gain access.   There are several ways to do this such...

Words: 326 - Pages: 2

Free Essay

Five Phase Induction Motor

...Design of Five Phase Induction Motor Sanket M. Bhimgade#1 Swapnil C. Chaudhari#2 Roshan B. Durge#3 Vabeihrohnei Chozah#4 Parag P. Salunke#5 Department of Electrical Engineering Dr. Babasaheb Ambedkar Technological University, Lonere, Raigad (MS - 402 103) sanketbhimgade@gmail.com , 2swapnil.28492@gmail.com , 3roshan.durge16@gmail.com , 4pawhrohnei@gmail.com , 1 Abstract: The conversion of electrical energy into mechanical energy has been and continuous to be a dominant form of power transmission for industrial purposes. The alternating current (AC) electric induction motor has been an industry workhouse for electromechanical conversion for over 100 years. This paper introduces the fundamental electric and mechanical principles of 5 phase AC induction motor. In this paper, a generalized formula is proposed for the selection of number of slots required for 5-phase alternative current (AC) machine design and the criterion for selecting the starting points of each phases. Keywords: Induction motor. Five phase, Stator winding. current. The power per phase is P = VP IP cosϕ and the total power is the sum of the amount of power in each phase. If the currents are equal and the phase angles are the same as in Fig. 1, then the load on the system is balanced, the current in the neutral is zero and the total power is [1], =3 cos ∅ Or Or = √3 = 1.73 cos ∅ cos ∅ I. INTRODUCTION In general, the induction machines having......

Words: 3545 - Pages: 15

Premium Essay

Translating a Letter

...produce watts of power. With radio or sound waves there is amplitude the decibels (dB) of the wave, frequency (Hz) the number of waves per second, and the phase or direction in which the wave begins. As the radio or sound wave dB increases it causes a spike to indicate the value of 1 in this representation, a normal pulse of sound with no spike represents a 0 along the phase. Much like electricity, radio waves transmit the information in the form of pulses. In this case there is no voltage or amperes to produce watts of power. With radio or sound waves there is amplitude the decibels (dB) of the wave, frequency (Hz) the number of waves per second, and the phase or direction in which the wave begins. As the radio or sound wave dB increases it causes a spike to indicate the value of 1 in this representation, a normal pulse of sound with no spike represents a 0 along the phase. -5 volts -5 volts +5 volts +5 volts Electrical transmission of the letter “A” using the ASCII numbering for the letter A. In the electrical diagram a positive voltage resembles the number 1 and the negative side a 0. In this case the ASCII unit for the letter A would be 01000001. A copper wire transmits electricity in the form of voltage (electrical pressure) and Amperes (flow). Each pulse of voltage represents a 1, and a non-pulse, or absence, a 0 or -5 volt. Electrical transmission of the letter “A” using the ASCII numbering for the letter A. In the electrical diagram a positive voltage......

Words: 2069 - Pages: 9

Premium Essay

Is4560 Lab 1 Assessment

...Lab 1 Assessment Worksheet Develop an Attack & Penetration Plan 1. List the 5 steps of the hacking process. * Reconnaissance * Scanning * Gaining Access * Maintaining Access * Covering Tracks 2. In order to exploit or attack the targeted systems, the first initial step I would do to collect as much information as possible about the targets prior to devising an attack and penetration test plan would be reconnaissance. I would use passive reconnaissance as this pertains to information gathering. 3. The reconnaissance phase can have many different faces, and depending on the goal of the attacker, various tools and applications can be used. Nslookup can be used to look up all the available host on a network through the DNS server. You can get IP address information of hosts on your targeted network. You can also get the information of the purpose of the hosts. Whois lookup is a protocol that can be used to interrogate the servers operated by regional internet registries which holds information about every IP/Domain registered on the internet. You can get information about your target such as; the name of the owner, address of the owner. IP ranges that a certain IP belongs to, contact information like emails and phone numbers, administrators names and server names. You can also just use your targets web site. Sometimes the targets website can reveal way too much information without realizing it, and just by looking at the information they......

Words: 1233 - Pages: 5

Premium Essay

Costco

...data processing model to meet business operational requirements. The central computing environment has traditionally included an IBM mainframe and over 50 networked Hewlett-Packard and Sun servers [KRAN04, CLAR02, HIGG02]. The mainframe supports a wide range of applications, including Oracle financial database, e-mail, Microsoft Exchange, Web, PeopleSoft, and a data warehouse application. C8-1 In 2002, the IT division established six goals for assuring that IT services continued to meet the needs of a growing company with heavy reliance on data and applications: 1. Implement an enterprise data warehouse. 2. Build a global network. 3. Move to enterprise-wide architecture. 4. Establish six-sigma quality for Carlson clients. 5. Facilitate outsourcing and exchange. 6. Leverage existing technology and resources. The key to meeting these goals was to implement a storage area...

Words: 1575 - Pages: 7

Premium Essay

Network Administrator

...-9/26/2012] in [ENGL205-1203B-04] with [Carmen Kimble]." IT326-1401A-01: Network Infrastructure Administration D & S Residential Services Network Implementation Plan-2014 Titius Ivie February 3, 2014 Table of Contents Target Organization 5 Corporate Structure 5 Business Goal 5 Part 1: Proposed Network Solution 7 Network Configuration 7 Transmission Media 7 Targeted Users 8 Hardware and Software Requirements 8 Production Applications 10 External and Internal Costs 11 Personnel (External Costs) 11 Hardware and Software (Internal Costs) 12 Short Term and Long Term Benefits to the Organization 13 Part 2: Network Design 14 Physical Topology 14 Part 3: Installation and Configuration 15 Installation and Configuration Steps 15 Part 4: Maintenance and Troubleshooting 19 Maintaining servers on the network 19 Maintaining PCs on the network 19 Implementing security 20 Managing network connections 21 Unauthorized Usage 21 Proper Network Operating System 22 Training users 23 Conclusion 24 Part 5: Remote Access 26 Network Pro Prep Toolkit Screenshots 27 Screenshot of Completed Labs--Phase 1 27 Screenshot of Completed Labs--Phase 2 28 Screenshot of Completed Labs--Phase 3 32 References 35 Target Organization D & S Residential Services has been providing services for individuals with intellectual and developmental disabilities for more than 20 years and serve more than 1900 individuals in Tennessee, Texas,......

Words: 4303 - Pages: 18

Free Essay

Swot Analysis of Reliance Communcations Limited

...[pic]                Summer Practical Training At Reliance Communications, Navi Mumbai   INTRODUCTION: MINS is an IP based solution that shall be designed to cater to a subscriber base of around 1000 subscribers. It shall support all the features and functionalities provided by the legacy switching systems. MINS was required as the rate of the “Qualcomm chipset “for the BSC (base station controller) was rising day by day. Qualcomm company is extracting 5$ per subscriber from any Indian company for using their chipset that why in MINS, BSC is constructed not using any hardware but by binding the system by some algorithms. It means that in MINS, software is prepared which can do the work of the hardware chip for BSC instead of using that Qualcomm chipset. The basic aim of designing of the MINS project is the removal of the Qualcomm chipset for BSC. MINS is not the whole network; it is the part of a network which contains following networks identities. They are:- 1.      BTS CONTROLLER-Base transceiver system controller 2.      BSC-Base station controller 3.      MSC-Mobile switching centre 4.      HLR-Home location register 5.      VLR-Visitor location register MINS also contains some essential parts other than which are specified above. They may be either the parts of the four of them specified above or other ones. They should be considered in following lines as they come into the act. Some assumptions are......

Words: 6859 - Pages: 28

Free Essay

A Project on Mnp

...Summer Practical Training At Reliance Communications, Navi Mumbai INTRODUCTION: MINS is an IP based solution that shall be designed to cater to a subscriber base of around 1000 subscribers. It shall support all the features and functionalities provided by the legacy switching systems. MINS was required as the rate of the “Qualcomm chipset “for the BSC (base station controller) was rising day by day. Qualcomm company is extracting 5$ per subscriber from any Indian company for using their chipset that why in MINS, BSC is constructed not using any hardware but by binding the system by some algorithms. It means that in MINS, software is prepared which can do the work of the hardware chip for BSC instead of using that Qualcomm chipset. The basic aim of designing of the MINS project is the removal of the Qualcomm chipset for BSC. MINS is not the whole network; it is the part of a network which contains following networks identities. They are:- 1. BTS CONTROLLER-Base transceiver system controller 2. BSC-Base station controller 3. MSC-Mobile switching centre 4. HLR-Home location register 5. VLR-Visitor location register MINS also contains some essential parts other than which are specified above. They may be either the parts of the four of them specified above or other ones. They should be considered in following lines as they come into the act. Some assumptions are made preparing the MINS project. They are:-  SSD (Shared secret data)......

Words: 6843 - Pages: 28

Free Essay

System Engineerring Roles in Software Enginerring

... TABLE OF CONTENTS Introduction to tcp/ip tcp ip operaction ,s of tcp/ip layers in tcp/ip model tcp/ip protocols References INTRODUCTION TCP/IP------------ The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite (IP), and is so common that the entire suite is often called TCP/IP. TCP provides reliable, ordered, error-checked delivery of a stream of octets between programs running on computers connected to a local area network, intranet or the public Internet. It resides at the transport layer. Web browsers use TCP when they connect to servers on the World Wide Web, and it is used to deliver email and transfer files from one location to another. HTTP, HTTPS, SMTP, POP3, IMAP, SSH, FTP, Telnet and a variety of other protocols are typically encapsulated in TCP. Applications that do not require the reliability of a TCP connection may instead use the connectionless User Datagram Protocol (UDP), which emphasizes low-overhead operation and reduced latency rather than error checking and delivery validation. TCP---------- The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite. TCP provides reliable, in-order delivery of a stream of bytes, making it suitable for applications like file transfer and e-mail. It is so important in the Internet protocol suite that sometimes the entire suite is referred to as "the TCP/IP protocol suite." TCP is the transport protocol......

Words: 2390 - Pages: 10

Free Essay

Building an Access Control System

...and understanding a hacker’s tactics and scams could make you aware and become more effective when applying countermeasures. There are several methods for carrying out ethical hacking, the most common are limited vulnerability and penetration testing. Limited vulnerability analysis, focus on entry points to gather critical systems and data. By understanding the basic approach used by hackers to target organizations, you will be better equipped to take defensive measures you will be better equipped and know what you are up against. There are steps involved in scanning a network, the following points will highlight them. 1) Check for live systems, 2) Check for open ports, 3) Fingerprint the operating system, 4) Scan for vulnerabilities, 5) Probe the network. Tools that can be used to detect scanning threats and countermeasures that a company can use to deter and avoid vulnerabilities are as follows. “Spoofing user identity -use strong authentication for passwords, do not store secrets (for example, passwords) in plaintext. Do not pass credentials in plaintext over the Internet. Tampering with data –use data hashing and signing, use digital signatures, use strong authorization, use tamper-resistant protocols across communication links, secure communication links with protocols that provide message integrity”. (Microsoft.com) Port scanning is one...

Words: 996 - Pages: 4

Premium Essay

Website Migration Project

...available as a failover in case the main site goes down. There is also a need for the site to be redesigned to allow customers to order products online. The system development life cycle (SDLS) is involves seven phases or steps that are followed in developing an information system from conception up to disposition. The following is the seven-step phase of developing an information system by a software engineer: 1. Conceptual Planning 2. Planning and Requirements Definition 3. System design 4. Development and Testing 5. Implementation phase 6. Operations and Maintenance phase 7. Operations and Maintenance phase Conceptual Planning This is the first phase in the system development life cycle. In this phase the information system conceptual framework is constructed. This will include the evaluation and assessment of the system to be developed to determine the cost and risks associated with the system. The managers will also assess the benefits and the opportunities that will be associated with the system. In this first stage of the system development cycle, there will be also the division and designation of roles to be carried out by various agents in the development of an information system. Planning and Requirements Definition T his is the second phase in the system development...

Words: 3420 - Pages: 14

Premium Essay

Phases of a Computer Attack

...THOMAS FORD IT255 MR. CARTER LIST PHASES OF A COMPUTER ATTACK Phase 1 - Reconnaissance Reconnaissance is probably the longest phase, sometimes lasting weeks or months.  The black hat uses a variety of sources to learn as much as possible about the target business and how it operates, including * Internet searches * Social engineering * Dumpster diving * Domain name management/search services * Non-intrusive network scanning Phase 2 - Scanning Once the attacker has enough information to understand how the business works and what information of value might be available, he or she begins the process of scanning perimeter and internal network devices looking for weaknesses, including * Open ports * Open services * Vulnerable applications, including operating systems * Weak protection of data in transit * Make and model of each piece of LAN/WAN equipment Phase 3 - Gaining Access Gaining access to resources is the whole point of a modern-day attack.  The usual goal is to either extract information of value to the attacker or use the network as a launch site for attacks against other targets.  In either situation, the attacker must gain some level of access to one or more network devices. In addition to the defensive steps described above, security managers should make every effort to ensure end-user devices and servers are not easily accessible by unauthenticated users.  This includes denying local administrator access to business users and closely......

Words: 485 - Pages: 2