Premium Essay

Rw Memo

In: Historical Events

Submitted By jmandabach
Words 838
Pages 4
Name DEPT. 199 Reflection: Questions for Reflection

1. The first goal of DEPT. 199 is to teach you to locate, select, and document secondary source material relevant to your topic. What did you learn how to do that you didn’t know before about this kind of library/research work? Offer specific examples from work you completed as part of this class that demonstrates that you have achieved this goal.

The most important thing I learned was that the library is so much more than a place to borrow books and study for midterms/finals. First, there is a librarian assigned to your major which is extremely helpful because they are like a mini expert on many of the topics you may need help on. Second, there are many databases with sources that are available online to Fisher students, which can help when doing any type of written submission for a class. Finally, I learned that Rochester has such a vast history that I knew absolutely nothing about before I stepped foot in the class. I used Kate Ross a few times to help locate additional sources for my project. I also used ProQuest extensively for newspaper articles I could use as sources, and I also used the State of Black Rochester book we had for class.

2. The second goal of DEPT 199 is to teach you how to analyze and incorporate research into your own argument, position, solution to a problem, or answer to a question. In what ways does your final research paper (the final draft) demonstrates your developing skill in connection with this goal? Point to specific places in the final paper where your arguments, though uniquely your own, have been developed in conversation with research that you have completed.

My final research paper analyzes the data from many different sources to support my position; it also quotes many of the people in each article and...

Similar Documents

Premium Essay

Mr Yszzz

...great and has been factory restored it is running win 7 now it has a charge but i left the charger in kirby park and now it is gone also missing a very useless key the (`) key other than that it is in wonderful shape a charger $9.99 on amazon and a key is $5.00 i already bought a new computer so i have no need for this anymore....now the price is fairly firm this is a sony viao it cost me well over $500.00 new and its in great shape other than a 4 dollar key so give me a call never before noon at five seven zero 778 eight 7 six 2 chris Reply to: pxhgf-2887445344@sale.craigslist.org [Errors when replying to ads?] i have a newer dell laptop it was 600 when i bought it a few months back it has windows 7 160gb hard drive 2gb ram dvd rw drive 3 usb ports sd reader 15.6 widescreen it works perfectly not a single problem. just dont need anymore i bought a new alienware 250obo Refurbished Dell Latitude D610 Laptop, Pentiun Centrino 1.7ghz CPU, 40gb Hard Drive, 768mb Ram, Wireless, DVD, Windows 7, email or call 570-235-8812. Ted Cash only on used components Refurbished Dell Latitude D610 Laptop, Pentiun Centrino 1.7ghz CPU, 40gb Hard Drive, 768mb Ram, Wireless, DVD, Windows 7, email or call 570-235-8812. Ted Cash only on used components acer laptop 15.6 lcd cd/dvdrw works good.I just got a new one so im selling this one needs a new battery.It charges but could use a new battery.ebay has them for like...

Words: 391 - Pages: 2

Free Essay

Lab 2

... Unit 2: Lab 1: Managing Files CH 6, Lab 1: Managing Files 1. [Denise@localhost ~]$ mkdir Unit2 2. [Denise@localhost ~]$ cd Unit2 [Denise@localhost Unit2]$ mkdir memos reports 3. [Denise@localhost Unit2]$ cd [Denise@localhost ~]$ touch memo.one [Denise@localhost ~]$ touch memo.two [Denise@localhost ~]$ touch memo.three [Denise@localhost ~]$ touch report.jan report.feb report.mar 4. [Denise@localhost ~]$ cp memo.one Unit2/memos 5. [Denise@localhost ~]$ cp memo.two Unit2/memos/memo.2 6. [Denise@localhost ~]$ mv memo.three Unit2/memos ((I removed the forward slash & it worked. Not sure if it is correct or not, but I am going to continue anyway…..)) [Denise@localhost ~]$ mv memo.three/Unit2/memos mv: missing destination file operand after `memo.three/Unit2/memos' Try `mv --help' for more information. [Denise@localhost ~]$ mv memo.three /Unit2/memos mv: cannot move `memo.three' to `/Unit2/memos': No such file or directory [Denise@localhost ~]$ mv memo.three/Unit2/memos mv: missing destination file operand after `memo.three/Unit2/memos' Try `mv --help' for more information. [Denise@localhost ~]$ mv memo.three/Unit2/memos.3 mv: missing destination file operand after `memo.three/Unit2/memos.3' Try `mv --help' for more information. 7. [Denise@localhost ~]$ mv memo.three Unit2/memos [Denise@localhost ~]$ mv report.jan report.feb report.mar Unit2/reports 8. [Denise@localhost ~]$ cd Unit2/reports [Denise@localhost reports]$ cp report.mar report.mar...

Words: 1139 - Pages: 5

Premium Essay

Linux Networking

...NT-1430 Unit 2 Lab Lab Objectives * Perform basic system administration tasks * Creating users * Setting user passwords * Group membership and management * Working with the Linux filesystem structure * Creating files, directories * Commands, options, arguments * Copying files, moving/renaming files, deleting files * File and directory permissions Lab 1 Record your answers in the spaces provided. 1. Start your virtual machine 2. Log into the system as root with the password you specified last week 3. Create a user account for yourself with the following convention: [First Initial][Last Name] Example: John Doe would be jdoe a. Be careful, as Linux is a case-sensitive OS. Jdoe != jdoe b. Record the command used: __________________________________________________ 4. Set a password for your newly created account. Record the command used. ____________________________________________ 5. Create and set passwords for the following users: c. mark d. max 6. Log out of root and log back in as your newly created account 7. Run the following commands in sequence, and then report your findings: e. ls f. ls –a g. ls –l h. ls –al 8. Run the following commands and report your results. What is different about step 6? i. ls /tmp j. ls –a /tmp k. ls –l /tmp l. ls –al /tmp 9. Which command will display your......

Words: 1169 - Pages: 5

Premium Essay

Intro to Linux

...A Practical Guide to Linux Commands, Editors, and Shell Programming SECOND EDITION ® Mark G. Sobell Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Capetown • Sydney • Tokyo • Singapore • Mexico City Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals. The author and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein. The publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales, which may include electronic versions and/or custom covers and content particular to your business, training goals, marketing focus, and branding interests. For more information, please contact: U.S. Corporate and Government Sales (800) 382-3419 corpsales@pearsontechgroup.com For sales outside the United States, please contact: International Sales international@pearson.com Visit us on the Web: informit.com/ph Library of Congress......

Words: 228961 - Pages: 916

Free Essay

Netstat

...Chapter 2 Solutions Review Questions 1. The Netstat command indicates that POP3 is in use on a remote server. Which port is the remote server most likely using? b. Port 110 2. On a Windows computer, what command can you enter to show all open ports being used? a. Netstat 3. Which protocol uses UDP? d. TFTP 4. Which protocol offers guaranteed delivery and is connection oriented? c. TCP 5. TCP communication could be likened to which of the following? d. Phone conversation 6. Which of the following protocols is connectionless? (Choose all that apply.) a. UDP b. IP 7. Which command verifies the existence of a node on a network? a. Ping 8. FTP offers more security than TFTP. True or False? True 9. List the three components of the TCP/IP three-way handshake. SYN, SYN-ACK, and ACK 10. What protocol is used for reporting or informational purposes? c. ICMP 11. List the six flags of a TCP packet. SYN, ACK, PSH, URG, RST, FIN 12. A UDP packet is usually smaller than a TCP packet. True or False? True 13. What port, other than port 110, is used to retrieve e-mail? b. Port 143 14. What port does DNS use? d. Port 53 15. What command is used to log on to a remote server, computer, or router? c. Telnet 16. Which of the......

Words: 481 - Pages: 2

Premium Essay

Bus 230

...30Chapter  7 major topics: -Keyboards- Input device that contains keys you press to enter data and information into a computer or mobile device -Pointing devices         -Mouse- fits under palm of your hand comfortably                     -as you move the mouse, the pointer on the screen moves with it         -Touchpad- small, flat, rectangular pointing device                        - sensitive to pressure and motion                        -move finger on the touchpad in direction you want pointer to go         -Pointing Stick- ball in-between keys on the keyboard that can control the                                                  pointer-- push in the direction you want the pointer to go                                 -pressure sensitive, shaped like eraser on end of a pencil          -Trackball- stationary device on the side of the mouse the size of a Ping-Pong                                         ball -Optical Scanners- Light-sensing input device that converts printed text and images into a form the computer can process                        -Optical Readers- a device that uses a light source to read characters, marks, codes and then converts them into digital data that the computer can process -OCR (Optical Character Recognition) Devices- devices that usually include a small optical scanner for reading characters and sophisticated software to analyze what is read -OMR (Optical Mark Recognition) Devices- devices that read hand-drawn marks, such......

Words: 3963 - Pages: 16

Free Essay

Bsa/310 Wk 3 Indiv

...Kudler Accounting System By Victor Cromartie BSA /310 February 25, 2013 Adaptation to an accounting system within a business or enterprise adds informative value across the company’s infrastructure. The value displayed by the accounting system role plays in effective facets such as faster processing to all accounting functions and foundationally offering over the top results to errors prone from human weaknesses within the data processing schema. System adaption can improve managerial resourcing and monitor processing thus allowing for better control within Kudler entities presently and within the future. Values stream outward as time and responsibilities are placed into organized role task for employees, allowing for improved customer service among consumers and stakeholders. Core features within the accounting system will address priority levels of information, enhancing decision making in all facets of company planning and viable control functions. A point of central consideration should be the inventory focus within Kudler Fine Foods. Inventory remains essential in balancing all spherical points within the Kudler organization. [pic] Characteristics of the System In the opinion of this accounting firm, Kudler Fine Foods needs to purchase software to record, maintain, and report their information. Every organization has several processes with some experiencing more complex than others. If Kudler wants to remain...

Words: 1103 - Pages: 5

Premium Essay

Bp Co. Essay

...British Petroleum Individual Project Phillip Zaphiropoulos Friday, November 16, 2012 ADM1300 B Jean-François Aubert “In partial fulfillment of the requirement of ADM1300.” ADM1300 Fall 2012 Individual Project – British Petroleum 1. Executive Summary To: CEO Robert Dudley From: Phillip Zaphiropoulos Date: November 16, 2012 British Petroleum is a public limited company. They suffered a huge downfall from their 2010 Mexican Gulf oil spill, although have rebounded very positively since then with major improvements in the company, both ethically and environmentally. This company markets its products in over 100 countries and, as of December 2011, employs over 83,000 employees. British Petroleum has worked hard to honour their commitments to the people and communities of the Gulf Coast. This company produces the natural resources that the world depends on daily, and produces them in some of the most operative, proficient, and resourceful ways which are possible today. (BP, n.d.). This company proves to be constantly evolving in the world. They are always innovating and coming up with new ways to operate their business as to cause the most minimal effect or damage on the environment. BP has become one of the most environmentally aware companies of the modern age, especially from what they have gone through in the Gulf of Mexico, and the revolutionary technologies they have integrated in their business operations. The vertically integrated company uses......

Words: 3845 - Pages: 16

Premium Essay

Test

...MILESTONE 4 – DATA MODELING Synopsis D ata modeling is a technique for organizing and documenting a system’s data. Data is viewed as a resource to be shared by as many processes as possible. As a result, data must be organized in a way that is flexible and adaptable to unanticipated business requirements – and that is the purpose of data modeling. In this milestone you will first discover those entities in the system that are or might be described by data. With each entity we identify, we will define it in respect to the business. Then, we will construct a Context Data Model that graphically depicts each of the entities and the relationships they have with each other. Next, we will refine the context data model to include primary and foreign keys. The resulting model is called a Key-Based Data Model. Finally, we refine the key-based data model to include any hierarchies and attributes, and this model is referred to as the Fully Attributed Data Model. Objectives After completing this milestone, you should be able to: Understand and perform the techniques for entity discovery. Define each entity with respect to the business and complete an entity/definition matrix. Perform the necessary data modeling techniques to organize and document the data requirements for the proposed system. Construct the Context, Key-Based, and Fully Attributed data models. Prerequisites Before starting this milestone the following topics should be covered: 1. Data......

Words: 2656 - Pages: 11

Premium Essay

Recommendation on Hardware

...| | Memo To: | | From: | | cc: | | Date: | September 26, 2012 | Re: | Recommendation on Hardware | | | i. PC versus Mac It’s been years for Mac and PC user to dislike each other. When the newer versions of operating systems were introduced by Microsoft and Apple, the war between PC windows 8 and for Mac OSX 10.8 Mountain Lion really heats up. It makes it hard for a business to choose and implement a computer system that is easy to use, efficient with cost and performance, reliable and long lasting. Let’s look into some specification on the PC and Mac: Mac refers to Macintosh that produced by apple that runs on Mac OSX. Mac is only manufactured by Apple Inc. Most of its applications are from app stores. For example: iLife, iTunes, Time Machine, Safari browser are among the popular applications. The Mac attracts a smaller group of people compare to PCs’. A smaller group of user means less chance of getting virus attack. However, the threats of malicious software are growing. The repair of Mac is not hard, anyone with operating system understanding should be able to perform repair on the Mac OS. On the other hand, PC refers to various brands computers runs Windows operating systems. There are many companies that manufacture PCs, such as HP, Dell, Toshiba, and Lenovo. Microsoft Office and internet Explorer are the most used software application among them all. PC users are from business to personal for its compatibility. It’s a much large group than Mac......

Words: 1500 - Pages: 6

Free Essay

Ssaassd

...A Practical Guide to Fedora™ and Red Hat® Enterprise Linux®, Sixth Edition Lab Manual Mark G. Sobell Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Capetown • Sydney • Tokyo • Singapore • Mexico City Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals. The author and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein. The publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales, which may include electronic versions and/or custom covers and content particular to your business, training goals, marketing focus, and branding interests. For more information, please contact: U.S. Corporate and Government Sales (800) 382-3419 corpsales@pearsontechgroup.com For sales outside the United States, please contact: International Sales international@pearson.com Visit us on the Web: informit.com/ph Copyright © 2012 Mark G. Sobell All rights......

Words: 38351 - Pages: 154

Premium Essay

Term Paper on Computing Fundamental

...INTRODUCTION A. Origin of the report: This report on “Features, Advantages, Disadvantages and Price of Desktop Computer, Laptop Computer, Palmtop Computer, PDA and Mobile Phone” is submitted to Tahmina Khanam, course teacher of the course MGT 308 “Computing Fundamental” on July 02, 2009. The information of the report has been conducted under the direction of Lecturer Tahmina Khanam. B. Purposes: To find out the different features of different types of computer and latest technology and their advantages, disadvantages and prices. C. Scope of the study The frontier of the report is that it only discusses about desktop computer, laptop computer, palmtop computer, PDA and mobile phone. We have known a lot of things through the internet. D. The Limitations of the study The report has some limitations. The websites did not provide clear information about a lot of topics. Everything in there is very complicated. E. Methodology There are two types of method by which we have collected all the data and information. The first method is that we went to computer sales centre to know about the computers features and prices. The second is that we searched the internet for further information. The data and other analysis those have been done in this report are on the basis of the course “MGT-308 – Computing Fundamental”. F. Report Preview We discuss one by one the types of the computer. And we also include features, advantages, disadvantages and price with...

Words: 8668 - Pages: 35

Premium Essay

Unit 3 Business

...|Assignment title |The role of marketing and market research | | | |Assessor |Hazel Murkin/Liliana Ribau | | | |Date issued |1st October 2014 | |Interim Deadline |22nd October 2014 |Final deadline |7th November 2014 | |Duration (approx) |6 weeks | | | |Qualification suite |BTEC Extended Diploma in Business Level 3 | |covered | | |Units......

Words: 1937 - Pages: 8

Free Essay

I/O Lab Paper

...* * 1 2 3 4 5 6 7 8 9 Number 1 is pointing to the PS/2 inputs that would connect a keyboard or mouse to a desktop computer. These inputs are for the most part being “upgraded” to USB ports. USB inputs for these devices allow users the option of using wireless mice and/or keyboards. For obvious reasons this adds a great deal of convenience and takes away some of the clutter that wired keyboards and mice make. It also allows for users to use different types of mice, like the one I use. Not only is it wireless, it has a trackball as opposed to the typical mouse that you have to move around. I control the pointer with my thumb, and can use the mouse on any surface, including my lap. Number 2 is pointing to the Parallel port. Historically the parallel port was used for zip drives, scanners, external modems, sound cards, webcams, gamepads joysticks, external hard drives, and CD-ROM drives. As with many of the other ports, the parallel port is being replaced with the USB port for many of it’s past functions. However, if you still have a parallel printer, they do make a USB-to-parallel adapter. Number 3 is pointing to the serial port. There are quite a few devices that can be plugged in to this input, such as dial up modems, bar code scanners, printers, older digital cameras, networking, serial mouse, and what I would say is the most common use for this input, an LCD or other display units. Just......

Words: 2919 - Pages: 12

Premium Essay

Ensr

...ISSN 1940-204X Performance Management at Perelson Weiner LLP1 Jan Bell Babson College Alfred J. Nanni, Jr Babson College Introduction and entrepreneurs. (See Exhibit 3 for a description of PW’s business.) PW’s business development is relationship-based; the firm doesn’t advertise for business. Instead, personnel develop long-term relationships with clients. These relationships typically start with tax return or financial statement preparation and then grow to include services that provide value to the client in other ways. Weiner explains his client focus this way: “We don’t seek short-term transactional services; we want to spend our time developing client relationships that last 40 years rather than seeking one-time opportunities.” To ensure that clients receive value from PW’s services, Weiner insists that personnel have unique expertise before offering services to clients. PW’s expertise and its ability to add unique value lie in providing traditional tax preparation, accounting, and auditing services, which are then enhanced by meaningful proactive business and tax consulting advice. Weiner has made a strategic decision to focus on these sources of client value plus one other sort of advice. With a New York City location, Weiner feels that PW can also add value for its clients by assisting them in the selection of the best specialized professional service firms in other areas. For example, PW personnel help clients find the best asset ...

Words: 12109 - Pages: 49