Premium Essay

Unit 2 Lab 2: Self - Control

In:

Submitted By jcabigting
Words 352
Pages 2
Jaime H. Cabigtnig
Unit 2 Lab 2: Self - Control
TEMPTATION |WHAT WILL I DO IF I YIELD TO TEMPTATION?|WHAT WILL I DO IF I BEHAVE HOW I WANT MYSELF TO BEHAVE?|
Leaving work earlier|I will not make the money that Is owed to me|Know that the extra money will benefit my family|
Cursing|Donate $2 to charity|Reward myself with a positive word for today|
Lying|Defame my character to my boss or co-workers|I will develop a good reputation of dependability with my co-workers |
Quick to anger|Alienate people and their ideas and possible resolutions|I will encourage an atmosphere of understanding and cohesion which is a good quality when trying to move up the ladder professionally|
Eating fast food|Waste money and gain weight|Keep money in pocket and not gain weight|
Driving poorly (Fast, recklessly, etc.)|Get a bad driving record putting in danger potential jobs and possibly our license|People will not be mad at you in traffic jams. Employers will not have any problems hiring you. You will save money in cars and tickets.|
Judging Co-Workers|Alienate myself from open discussions about problems we encounter and are trying to solve as a team|Develop a reputation of a team player and a problem solver who can work with others and rationally discuss solutions|
Procrastination|Not finish projects and jobs I am put in charge of and miss opportunities to bigger projects that come with promotions and raises|Finish by jobs well within the time constraints and attract upper managements’ attention for big projects and get chances to prove myself beyond my current position.|
Poor time management|Miss appointments and scheduled events and opportunities to develop relationships with supervisors and co-workers that can benefit me later on in life.|Develop a reputation for punctuality and dependability and receive good marks on this at current jobs and impress future employers when we

Similar Documents

Free Essay

Computer

...of Contents Graded Assignments 2 Unit 1 Assignment 1: It Takes Courage 2 Unit 2 Assignment 1: Left in the Lurch 3 Unit 3 Assignment 1: Gratitude Journal 4 Unit 4 Assignment 1: Create a Business Letter 5 Unit 5 Presentation 1: Small Group Presentation: Leadership, Conflict Resolution, and Teamwork 7 Unit 5 Assignment 1: Compare and Contrast Effective and Ineffective Leaders 8 Unit 6 Assignment 1: Create a Long-Term Financial Plan 10 Unit 7 Assignment 1: Calculating Credit Scores 11 Unit 8 Assignment 1: Writing a Prospective Schedule 12 Unit 9 Assignment 1: Using Social Media for Job Searches 14 Unit 10 Assignment 1: Putting the Finishing Touches on Your ePortfolio 15 Laboratory Assignments 17 Unit 1 Lab 1: Personal Persistence Narrative 17 Unit 1 Lab 2: Grit Test 21 Unit 2 Lab 1: Optimism 24 Unit 2 Lab 2: Self-Control 25 Unit 3 Lab 1: Curiosity in Modern Times 27 Unit 3 Lab 2: Integrity Matters 28 Unit 4 Lab 1: Create a Research Summary Memorandum 29 Unit 5 Lab 1: Resolving Systemic Conflict: Scenario Analysis 31 Unit 6 Lab 1: Time Value of Money 32 Unit 6 Lab 2: Budget Exercise 33 Unit 7 Lab 1: Calculating House Cost 35 Unit 7 Lab 2: Delayed Gratification 37 Unit 8 Lab 1: Initiative Reflection 39 Unit 8 Lab 2: Time Management Reflection 40 Unit 9 Lab 1: Creating a Professional Profile 41 Unit 10 Lab 1: Creating a Personal and Professional Development Plan 43 Graded Assignments Unit 1 Assignment 1: It Takes Courage ...

Words: 11662 - Pages: 47

Premium Essay

Accounting

...available for downloading at any time during the course. ------------------------------------------------- Graded Assignment Requirements Assignment Requirements documents provided below must be printed and distributed to students as the guidance for completing the assignments and submitting them for grading. Instructors must remind students to retain all handouts and assignment documents issued in every unit, as well as student-prepared documentation and graded deliverables. Some or all these documents will be used repeatedly across different units. Unit 1. Lab 1. Preparing a Virtual Workstation Image Windows 7 Virtual Machine “Keyless” Installation and Re-arm Process Purpose: This section describes the reason for and the procedure to use the “keyless” installation for Windows 7 Professional applicable to our lab environment for IT109/NT1230, and to use the “Re-arm” procedure to extend the trial period to meet our curriculum needs. Background: In installing Windows 7 Professional into a virtual machine in the VMware Player for the labs in our lab environment, if the Product Key for Windows 7 Professional is applied and activated during or at the end of the installation, the installed virtual machine will be authorized to launch only from the physical computer from which it was installed, as Microsoft registers the product key to associate with the hardware identity of the physical computer in their antipiracy database during the activation process. Subsequently...

Words: 5558 - Pages: 23

Premium Essay

It Project Management

...Systems BSc/BSc (Hons) Computing (Information Systems Development) • (Web Systems Development) BSc/BSc (Hons) Information Technology Management for Business BSc (Hons) Computer Games (Design) BSc/BSc (Hons) Cyber Security and Networks BSc/BSc (Hons) Networked Systems Engineering IT PROJECT MANAGEMENT 1 module code M3G405252 MODULE HANDBOOK – TRIMESTER A SESSION 2015/2016 Module Code: M3G405252 Module Title: IT PROJECT MANAGEMENT 1 Standard Module Abbreviation: ITPM1 Module Level: 3 Credit Points: 20 Module Leader: Edwin Gray, Office: M609, email:e.gray@gcu.ac.uk September 2015 Issue 1 01/09/2015 Edwin M Gray, BA, MSc, MBCS, CITP, CPSSADM Contents Page 1 Introduction 3 2 Module Overview 3 3 Module Descriptor 4 4 Module Assessment 7 5 Feedback 10 6 Indicative Reading 10 7 The Library, Saltire Centre 11 8 Learning Material Supplied By Module Leader 12 9 Module Delivery Structure 12 10 Learning and Teaching Plan 14 M3G405252 IT PROJECT MANAGEMENT 1 INTRODUCTION This handbook gives details of the module content, teaching schedule, recommended reading, assessment and feedback strategies used for students undertaking the module IT Project Management 1 (M3G405252 (old code: COMU350) Module Leader contact details: Eddie Gray, M609, (e.gray@gcu.ac.uk) Programmes Taking This Module This module’s host programmes are: • P01627 BSc/BSc...

Words: 3307 - Pages: 14

Free Essay

Software

...0 3 Elective -I Digital Control Systems Distributed Operating Systems Cloud Computing 3 0 3 Elective -II Digital Systems Design Fault Tolerant Systems Advanced Computer Networks 3 0 3 Lab Micro Processors and Programming Languages Lab 0 3 2 Seminar - - 2 Total Credits (6 Theory + 1 Lab.) 22 JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD MASTER OF TECHNOLOGY (REAL TIME SYSTEMS) I SEMESTER ADVANCED COMPUTER ARCHITECTURE UNIT I Concept of instruction format and instruction set of a computer, types of operands and operations; addressing modes; processor organization, register organization and stack organization; instruction cycle; basic details of Pentium processor and power PC processor, RISC and CISC instruction set. UNIT II Memory devices; Semiconductor and ferrite core memory, main memory, cache memory, associative memory organization; concept of virtual memory; memory organization and mapping; partitioning, demand paging, segmentation; magnetic disk organization, introduction to magnetic tape and CDROM. UNIT III IO Devices, Programmed IO, interrupt driver IO, DMA IO modules, IO addressing; IO channel, IO Processor, DOT matrix printer, ink jet printer, laser printer. Advanced concepts; Horizontal and vertical instruction format, microprogramming, microinstruction sequencing and control; instruction pipeline; parallel processing; problems in parallel processing; data hazard, control hazard. UNIT IV ILP software approach-complier...

Words: 3183 - Pages: 13

Premium Essay

Lab1

...Instructor Guide Lab 1: Computer Model Understanding Activity (paper and pencil) Learning Objectives and Outcomes The student is expected to demonstrate the ability to work with the von Neumann model of a computer. To demonstrate this ability, the student will: 1. Draw a diagram of a computer from the von Neumann perspective, including definitions of all parts of the model. 2. Provide examples of the Input, Output, and Memory sections of the model. 3. Provide a comparison table showing the similarities and differences between desktop and notebook computers. Required Setup and Tools In this laboratory, students will need only paper and pencil to do the required work. However, the use of a drawing program, such as Visio or the Drawing toolbar in Microsoft Word, is suggested for drawing the von Neumann computer model. Lab Solutions The student should provide solutions similar to what is shown here. Task 1: Here is an example of the von Neumann model of the computer. 1 Memory Control Unit Arithmetic Logic Unit Output Input Accumulator Central Processing Unit Here are the functions of each component in the von Neumann model of the computer. Component Control Unit Arithmetic Logic Unit Accumulator Function Control operations between all components of the computer. Perform calculations using the accumulator. Store the result of the last calculation. Accumulators are registers that store temporary numbers and can be hard-wired to the logic unit. They were...

Words: 765 - Pages: 4

Premium Essay

Management Research

...Chapter 6 Elements Of Research Design Instructional Goals 1. To clarify the various components of research design as indicated in Figure 5.1 of the book; 2. To highlight obvious combinations in research design choices; for example, a lab or field experiment is invariably conducted to establish cause and effect relationships; a lab experiment is always done in a contrived setting with maximal researcher interference and in a longitudinal fashion.; 3. To stress the importance of making optimal research design choices aimed at balancing scientific rigor and research costs (and feasibility). Discussion Questions 1. What are the basic research design issues? Describe them in some detail. Basic research design issues are primarily a function of the purpose of the study (whether it is exploratory, descriptive, or hypothesis-testing), and relate to such aspects as the type of study to be done (causal or correlational), the setting in which it will be done (natural or contrived), how much of researcher control will have to be exercised (very little in the case of field studies, to very much in the case of experimental designs), how many times data will have to be collected (one shot versus longitudinal), and the unit of analysis – i.e. the level at which data will be aggregated. For most correlational studies, the field setting with minimal researcher influence will be the choice. Most field studies are generally cross-sectional, though some could be longitudinal. Longitudinal...

Words: 3561 - Pages: 15

Premium Essay

Hello from the Other Side

... Name______________________________________________ IB Guide to Writing Lab Reports Standard and Higher Level Chemistry 2010-2011 Table of Contents page 1 Explanations, Clarifications, and Handy Hints page 2 - 13 IB Laboratory Evaluation Rubric page 14 - 15 Formal Lab Report Format page 16 Error Analysis Types of Experimental Errors page 17 Error Analysis: Some Key Ideas page 18 Precision and Accuracy in Measurements A Tale of Four Cylinders Assessment of Errors and Uncertainties in IB Lab Reports Explaining Terms and Concepts in Error Analysis page 19 - 20 page 21 Mathematics of Evaluating Accuracy and Precision page 26 - 27 Rejection of Data page 28 More Examples of Propagating Error page 29 - 31 page 22 - 25 Typical Instrumental Uncertainties page 32 Checklist for Writing IB Lab Reports page 33 - 34 Please read carefully and keep this handy reference for future use in writing exemplary lab reports. Page 1 IB Guide to Writing Laboratory Reports Explanations, Clarifications, and Handy Hints The nature of science is to investigate the world around you. An inquiring mind is essential to science. Experiments are designed by curious minds to gain insight into wonder-producing phenomena. Hopefully, this process of designing experiments, doing experiments, thinking about experimental results, and writing lab reports will tremendously benefit YOU! IB Chemistry is the challenge you have...

Words: 11919 - Pages: 48

Premium Essay

Is3440 Linux Security Lab 1

...Week 1 Lab This lab consists of two parts: Make sure you label each section accordingly and answer all the questions. For this lab it is recommended that you review the Demo Lab presentations in the Unit 1 and Unit 2 Learning Space. Click the PRACTICE link > DEMO LAB > then click the hyperlink to launch the demonstration. Part # 1 Install a Core Linux Operating System on a Server Learning Objectives and Outcomes Upon completing this lab, students should know more about the following tasks: * Install a base Linux operating system using a Fedora core Linux server for production use on the VM server farm * Create secured partitions within the core Linux server for desired security hardening, performance, and application support * Enable a network time server during installation to maintain a synchronized time setting throughout the system * Set a hostname that is descriptive of the role of the server to maintain standard and concise naming conventions during installation * Create a non-privileged user account for system administration access as a secure alternative to logging in as root user Overview In this lab the students will see how to install and partition a Fedora Core Linux Server. The installation process, applying passwords, creating partitions, and system administrator access controls will be part of the operating system configuration requirements. The demonstration will show how to use the terminal or terminal emulator for...

Words: 1494 - Pages: 6

Premium Essay

Heat and Mass

...NATIONAL UNIVERSITY OF SCIENCE AND TECHNOLOGY PAKISTAN NAVY ENGINEERING COLLEGE HEAT & MASS TRANSFER LAB MANUAL ENGINEERING SCIENCES DEPARTMENT HEAT & MASS TRANSFER LAB MANUAL ENGINEERING SCIENCES DEPARTMENT LAB INSTRUCTIONS 1. No late submissions 2. If you miss the submission time, you will be marked zero in that lab 3. If cheating or plagiarism is observed in the lab report, zero will be marked in that lab. 4. Detailed calculations should be shown. 5. Neat work will earn good marks. 6. Graphs should be made by hands. MS excel graphs will not be accepted. LAB MARKS DISTRIBUTION LAB REPORT/ ATTENDENCE | 50% | LAB PERFORMANCE | 10% | MID TERM ASSESMENT/QUIZES | 10% | FINAL LAB ASSESMENT | 30 % | TOTAL | 100% | TABLE OF CONTENTS S.NO | DATE | OBJECTIVE | PAGE NO | SIGNATURE | 1. | | To show that the intensity of radiation on a surface is inversely proportional to the square of the distance of the surface from the source of radiation | | | 2. | | To show the intensity of radiation various as fourth power of source. | | | 3. | | Determination of barrier temperature gradient between two different metals in end to end pressure contact. | | | 4. | | To perform energy balance on air flowing throw a duct heated by cylindrical rod | | | 5. | | To perform energy balance on air flowing throw a duct heated by cylindrical rod using DAQ | | | 6. | | Determination...

Words: 4135 - Pages: 17

Premium Essay

It- 3rd Year

...E-COMMERCE (TIT-501) UNIT I Introduction What is E-Commerce, Forces behind E-Commerce Industry Framework, Brief history of ECommerce, Inter Organizational E-Commerce Intra Organizational E-Commerce, and Consumer to Business Electronic Commerce, Architectural framework Network Infrastructure for E-Commerce Network Infrastructure for E-Commerce, Market forces behind I Way, Component of I way Access Equipment, Global Information Distribution Network, Broad band Telecommunication. UNIT-II Mobile Commerce Introduction to Mobile Commerce, Mobile Computing Application, Wireless Application Protocols, WAP Technology, Mobile Information Devices, Web Security Introduction to Web security, Firewalls & Transaction Security, Client Server Network, Emerging Client Server Security Threats, firewalls & Network Security. UNIT-III Encryption World Wide Web & Security, Encryption, Transaction security, Secret Key Encryption, Public Key Encryption, Virtual Private Network (VPM), Implementation Management Issues. UNIT - IV Electronic Payments Overview of Electronics payments, Digital Token based Electronics payment System, Smart Cards, Credit Card I Debit Card based EPS, Emerging financial Instruments, Home Banking, Online Banking. UNIT-V Net Commerce EDA, EDI Application in Business, Legal requirement in E -Commerce, Introduction to supply Chain Management, CRM, issues in Customer Relationship Management. References: 1. Greenstein and Feinman, “E-Commerce”, TMH 2. Ravi Kalakota, Andrew Whinston...

Words: 2913 - Pages: 12

Premium Essay

Case Study: Behavior Domain Interventions

...interventions that can assist with DM transition are behavioral self-control (BSCT) and relaxation training. BSCT teaches DM to monitor his drinking, set a limit on how much and when he will drink, teach strategies to control alcohol intake, and develop coping skills (Stitzer & Higgins, 2000). Stress can trigger DM to relapse or to regress on his success so relaxation is very important. Relaxation therapy uses several different techniques to accomplish stress reduction. Breathing exercises to calm the mind, meditation helps with physical and emotional stress, and muscle relaxation to help release the tension (alcoholrehab.com,...

Words: 776 - Pages: 4

Free Essay

Idrivesa

... |T |P/D |C | | |English |2+1 |- |4 | | |Mathematics - I |3+1 |- |6 | | |Mathematical Methods |3+1 |- |6 | | |Applied Physics |2+1 |- |4 | | |C Programming and Data Structures |3+1 |- |6 | | |Network Analysis |2+1 |- |4 | | |Electronic Devices and Circuits |3+1 |- |6 | | |Engineering Drawing |- |3 |4 | | |Computer Programming Lab. |- |3 |4 | | |IT Workshop |- |3 |4 | | |Electronic Devices and Circuits Lab |- |3 |4 | | |English Language Communication Skills Lab. |- |3 |4 | | |Total ...

Words: 26947 - Pages: 108

Premium Essay

Meow Investments Meow Documents

...Unit Plans Unit 1: Information Systems Security Fundamentals Learning Objective  Explain the concepts of information systems security (ISS) as applied to an IT infrastructure. Key Concepts  Confidentiality, integrity, and availability (CIA) concepts  Layered security solutions implemented for the seven domains of a typical IT infrastructure  Common threats for each of the seven domains  IT security policy framework  Impact of data classification standard on the seven domains Reading  Kim and Solomon, Chapter 1: Information Systems Security. Keywords Use the following keywords to search for additional materials to support your work:  Data Classification Standard  Information System  Information Systems Security  Layered Security Solution  Policy Framework ------------------------------------------------- Week 1 Assignment (See Below) * Match Risks/Threats to Solutions * Impact of a Data Classification Standard Lab * Perform Reconnaissance & Probing Using ZenMap GUI (Nmap) * Page 7-14 in lab book. Project (See Below) * Project Part 1. Multi-Layered Security Plan ------------------------------------------------- Unit 1 Assignment 1: Match Risks/Threats to Solutions Learning Objectives and Outcomes  You will learn how to match common risks or threats within the seven domains of a typical IT infrastructure with solutions and preventative actions...

Words: 1409 - Pages: 6

Free Essay

Accounting

...and tutor support. Why (a) do you suppose Union Planters purchases investments, rather than simply making loans? Why does it purchase investments that vary in nature both in terms of their maturities and in type (debt versus stock)? 1. They may have excess funds that they havent loaned out yet and instead of having the money just sit there the bank manager may decide that it could earn more revenue by choosing to invest. 2. Depending on the situation the bank manager may also feel that they can make more money by investing the excess funds rather than lending the money out. For example right now interest rates are at an all-time low and they may feel like the return on the interest is not enough compared to investing. 3. The bank manager may feel that these investments will mature and be worth more in the future so they may choose to hold long term to create more revenue. (b) How must Union Planters account for its investments in each of the two categories? 1. Trading securities Balance sheet at fair market value a. Gain/Loss reported as part of income 2. Available-for-Sale Balance sheet at fair market value a. Gain/Loss Comprehensive income/ separate from Stockholders equity until realized 3. Held to-Maturity reported at amortized cost Planters had none (c) In what ways does classifying into investments two different categories assist investors in evaluating the profitability of a company like Union Planters? The categories will be different because it assumes there will be...

Words: 3165 - Pages: 13

Premium Essay

Informative

...------------------------------------------------- Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory, 30 Lab) Prerequisite: IS3110 Risk Management in Information Technology Security or equivalent Corequisite: None Table of Contents Course Overview 5 Course Summary 5 Critical Considerations 5 Instructional Resources 6 Required Resources 6 Additional Resources 6 Course Management 8 Technical Requirements 8 Test Administration and Processing 8 Replacement of Learning Assignments 9 Communication and Student Support 9 Academic Integrity 10 Grading 11 Course Delivery 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 Unit Plans 15 Unit 1: Information Security Policy Management 15 Unit 2: Risk Mitigation and Business Support Processes 25 Unit 3: Policies, Standards, Procedures, and Guidelines 33 Unit 4: Information Systems Security Policy Framework 42 Unit 5: User Policies 50 Unit 6: IT Infrastructure Security Policies 58 Unit 7: Risk Management 66 Unit 8: Incident Response Team Policies 74 Unit 9: Implementing and Maintaining an IT Security Policy Framework 83 Unit 10: Automated Policy Compliance Systems 90 Unit 11: Course Review and Final Examination 97 Course Support Tools 101 Evaluation of Student Learning 102 STUDENT COPY 103 Graded Assignment Requirements 104 Unit 1 Discussion 1: Importance of Security Policies 105 Unit 1 Assignment 1: Security Policies Overcoming Business...

Words: 18421 - Pages: 74