Free Essay

Win Server 2012

In: Computers and Technology

Submitted By balikatan
Words 721
Pages 3
Visio

VIS4

Assignment 1

Assignment – U‐MED Organization Chart
Objective : Apply your knowledge and skills acquired in the Visio course to produce a detailed
Organization Chart.
Instructions: Read the synopsis below and use the accompanying chart to plan, design and produce a final detailed Organization chart based on the information provided.
Synopsis
Jeffrey McNeil is the President and CEO of U‐MED, a leading supplier of medical and surgical equipment and instruments. The recent merger with MedSoft industries who provides integrated software solutions to the medical and pharmaceutical industries has resulted in a full re‐organization of the company’s departments and services. The merger has resulted in combining of services and departments as well as the creation of new positions while removing redundancies.
Lisa Jones is the new VP of Sales for North America, Kevin Dawson retains his position of VP of sales for
Europe, and Brad Lee has been promoted to VP Of sales for Asia. All sales VP report directly to the
President of the company. Each VP of sales has two Sales Account managers reporting in to them.
Norman Sims is the VP of Operations and he looks after the Marketing, Purchasing, Shipping and the
Human Resources departments. Zak Simmons is the director of the Marketing department and looks after a team of 6 graphic designers and marketing specialists.
Louise Green is the director of Human resources. She has a staff of 4 middle managers reporting directly to her.
Albert Grier is the director of purchasing also reports to Norman Sims. Albert has a staff of 5 Purchasing clerks 4 which are currently in place and the fifth one is vacant pending future hire. Peter Hobbs is the director of the shipping and logistics department. Peter manages 3 shipping and logistics coordinators to handle all of the company’s shipping tasks.
Maurice Bell is the Director of Information Technology services. He manages a team of 6 individuals in his department. Maurice also reports to Norman Sims.
The new VP of Finance, Daniel Rutkowski reports in to Frank Beltran the Chief Financial officer who reports directly to Jeffrey McNeil. Daniel Rutkowski also has a dotted line relationship to Jeffrey McNeil as well. Mr Rutkowksi is responsible for the entire financial department namely the Accounts Payable and the Accounts Receivable departments

Marketing
Carey White
Graphic
designer

Human resources Laura Mason,
CPP, Payroll
Manager

John Scrivens
Mobile and social media specialist Ann Toms,
Web designer

Shipping

IT

Sales
Mark Sconce
Director of sales North
America
Patricia Wilkins
Director of
Sales , Asia

Lilian Banks,
Purchasing
Clerk

Brent Gibbons
Help Desk
Manager

Ray Tuske
Shipping
Coordinator

Calvin Smith,
Network
Administrator

Sandro
Colangelo,
Purchasing clerk Van Nguyen,
Purchasing
Clerk

Shelly West,
Complaints
officer.

Lance Petie
Shipping
coordinator

Steven Gomez,
Purchasing
Clerk

Amina
Chaudhary,
Benefits
Manager
Kelly Novak,
Compliance
Manager

Gilbert
Lawrence,
Marketing specialist Purchasing

Will Gear,
Shipping
Coordinator

Quinn Morgan,
Systems
Integration specialist Bill Toews,
Systems
technician

Tammy Burton,
Marketing
specialist

Luis Mendez,
Systems
technician

Susan
Moreland
Graphic designer Caroline
Williams,
Systems technician Bryan Atkins ,
Director of
Sales, Europe
Warren Broten,
Account
manager, eastern Europe,
Leslie
Brokovitch
Account
Manager
Western
europe
Dan Haley
Account
Manager,
Canada
Marcia Smith.
Account
Manager, US
Tye Jamieson,
Account
Manager Asia
(west)
Benny To
Account
manager, Asia
(East)

Grading Rubric
This assignment is worth 20% of your final grade. It will evaluate your ability to use Visio independently and without step by step instructions.
Your are free to use the layout that you feel is best suited to the information to be presented. The grade of the assignment is based the inclusion of all items described in the synopsis and chart, use of effects and appearance of the org chart
Inclusion of all components (45 points)
Inclusion of all correct connectors as per description ( 45)
Layout ( selection of appropriate layout, effects, features, photos, title ) (10 points) What to submit.
The submission of this assignment does not require you to print the final chart and submit to the instructor. You will be able to submit the completed electronic copy of the file to the instructor via the dropbox basket built in to the course in the LMS. Important note.
Name your file as Firstname Lastname U‐MED Assignment 1 YYYY‐MMDD and replace the Firstname and Lastname by your own name and replace the YYYY‐MMDD with the submission date

Similar Documents

Free Essay

2014

...Internacional | Julio de 2014 Tabla de Contenido Introducción 4 Términos de Licencia Universales 7 Definiciones 7 Derechos de uso 9 Derechos para utilizar otras versiones 9 Software de Terceros 9 Código de Versión Preliminar 9 Actualizaciones y Complementos 9 Prohibición de Servicios de Hosting Comercial 9 Limitaciones Técnicas 9 Otros Derechos 9 Documentación 9 Administración de software de outsourcing 9 Reasignación de licencias 9 Activación del Producto 10 Funcionalidad adicional/Servicio opcional 11 Uso de Más de un Producto o Funcionalidad al Mismo Tiempo 11 Componentes de Fuente 11 Componentes del software de Windows 11 Pruebas Comparativas 11 Productos que Incluyen Tecnología SQL Server 11 Elemento de informe de asignación de SQL Server Reporting Services 12 Multiplexación 12 Módulos de System Center 12 Código distribuible 12 Software Plus Services 13 Creación y almacenamiento de instancias 14 Indivisibilidad del software 14 Aplicaciones de Escritorio (Por Dispositivo) 15 Access 2013 16 AutoRoute 2013 16 Excel 2013 16 Excel para Mac 2011 16 InfoPath 2013 16 Lync 2013 16 Lync para Mac 2011 17 MapPoint 2013, Edición Fleet 17 MapPoint 2013 edición Standard 17 Office para Mac Standard 2011 18 Derechos de Uso Comercial de Office Home & Student 2013 RT 18 Office Multi Language Pack 2013 18 Office Professional Plus 2013 18 Office, edición Standard 2013 19 OneNote 2013 19 Outlook 2013 19 Outlook para Mac 2011 20 PowerPoint...

Words: 46164 - Pages: 185

Premium Essay

Resume

... |Institute |Year |Percentage | |B. Tech (Computer Science and |Punjab Technical |Gurukul Vidyapeeth Institute of Engineering and Technology, Ram|2012 |72.45% | |Engineering) |University |Nagar, Banur | | | |Class XII (Non-Medical) |PSEB |Sada Ram Bansal Sr. Sec. School, Kotkapura |2008 |61.56% | |Class X |CBSE |Gandhi Model Sr. Sec. School, Kotkapura |2005 |72.47% | |INTERNSHIP | |Vardhman Polytex |I.T. Assets (Inventory) |From | |Limited, Ludhiana |Responsibilities |3 Jan 2012 | | |Developed Web Application for Centralizing the Data From different Remote Sites |- | | |Responsible for Continual service improvement for...

Words: 285 - Pages: 2

Premium Essay

No Paper

... * Recognized by current and previous employers for communication and problem solving skills with internal and external customers. * Function as a team player, as well as demonstrate a proven ability to work well independently TECHNICAL SKILLS Service Desk support for major healthcare facilities, Windows Server 2008 and 2012 R2 - planning, deploying, configuring and maintaining AD infrastructure, environment and objects |Client computer support and domain integration | TCP/IP, DHCP, WINS, RRAS, IPSEC, Computer Troubleshooting, Cabling | Cisco 2811 router, Cisco 2960 and 3550 switches, basics in Cisco IOS 12.4, RIPv2, EIGRP, OSPF, network tools including Wireshark, and network cabling. TECHNICAL TRAINING Centriq Training Center, Leawood, KS Nov 2014 – July 2015 IT Administrator Program * Technical Competencies: * Installing, configuring, managing, and maintaining hardware. * Windows Sever 2008/2012 R2 and Windows 7 configuration. * TCP/IP suite with an emphasis in subnetting and DHCP. * Name Resolution in a domain and standalone environment; Emphasis DNS (FQDN) and WINS (NetBIOS). * Active Directory structure and services; Objects and creation; Domain controllers; Trusts. * Active Directory Group Policy; GPOs – settings, linking, and testing. * Remote Tools; RRAS;...

Words: 1235 - Pages: 5

Premium Essay

Case Study

...pro-active and ethical outlook. Educational Qualification(s) ➢ First grade holder of ‘Bachelors of Science ‘Information Technology ‘from Kuvempu University, Karnataka in 2012 with 65% ➢ Senior secondary from B.S.E.B, Patna in 2008 with 57%. ➢ Higher Secondary from B.S.E.B, Patna in 2006 with 68%. Technical Qualification(s) ➢ 12 months diploma in Advance Hardware and Networking technology and 2 months exclusively conducted introduction on Biometric Devices and Electronic Security Systems from IACM, New Delhi . ➢ Attended 3 months classroom session of Cisco CCNA from NetHub, New Delhi. Experience(s) ➢ Working with GRAS Education & Training Services Private Limited as Technical Trainer from 12 July, 2012 to 25 Jan 2013. ➢ Working with M-Intergraph Pvt Ltd as Desktop support Engineer from 10 Feb, 2013 to 10July 2014. ➢ Currently working with Acute Informatics Pvt Ltd as L1 profile from Feb,2015 to till now Hardware Skill(s) • Installation & configuration of LAN (Win 2003, Win 2008) • Trouble shooting the networking related problems. • Troubleshooting & maintenance of PCs. • Fault finding & trouble shooting of Monitor, SMPS, and Mother Board. • Installation of Operating Systems: Win XP, Win Vista, Win 7,Win8, • Win 2003 etc. • Installation of various software • Installation of device drivers & hardware components. • Configuration of Printer, Modem, Scanner. Network Skill(s): ...

Words: 447 - Pages: 2

Premium Essay

Kudler Fine Foods Network Topology Paper

...Integrative Network Design Project James Warren NTC/362 July 30, 2012 Andrew Carpenter Integrative Network Design Project This paper will discuss Kudler Fine Foods desire to upgrade their current outdated infrastructure with current technology that will let them stay competitive in today’s market. In order to do this they will need to tie all three of their existing sites together using wireless and VOIP technology. Distributed Computing Currently all three of the Kudlers facilities utilizes a distributed computing system using the same configuration of single server and multiple pc’s, each with a single UPS and 56k modem for connectivity. The computers are connected to an Ethernet backbone (typically a hub that is not very efficient in handling network traffic for many computers) and the 56k modem is the only external connectivity that the sites have. Centralized Computing In order to bring this system up to standards they will need to update to a more centralized computing system which all computing is done on a centrally managed computer system and the users use a dumb terminal (thin client) to connect to these central computers. The cost associated with this has been reduced over the years and was only used previously in enterprise environments but now more businesses are moving over to this type of system. Network Topologies Kudlers three offices use almost identical setups for their servers, POS systems and their site connectivity. They all use the...

Words: 747 - Pages: 3

Premium Essay

Research It 221

...Craig Stevens 5/13/2012 Prof. Edris Server 2008 Research Assignment 3 Windows 2008 has a laundry list of new and improved services to make an IT Admins job just that much simpler. For Example, Active Directory Federation Services which is a software component that can be installed on windows server 2008. Federation Services provides users with single-sign-on access. It uses a claims-based access control authorization model to maintain application security and implement federated identity ("Microsoft Server"). Active Directory Lightweight Directory Services is also an improved service. It is a Lightweight Directory Access Protocol directory service designed for use with directory-enabled applications ("Server 2008"). It is also one of two identity providers that are supported by Active Directory Federation Services. Active Directory Certification Services provides customizable services for issuing and managing public key certificates used in software security systems that employ public key technologies ("ACDS Overview"). It contains certificate authorities which are broken down to Root and subordinate CAs. Then they issue certificates to users, computers, and services, and to manage certificate validity. With Active Directory Rights Management Service you can plan an organization's security strategy by protecting information through persistent usage policies, which remain with the information, no matter where it is moved. You can use ADRMS to help prevent sensitive information...

Words: 843 - Pages: 4

Premium Essay

Server1

...Contents What is the purpose of the Global Names Zone in Windows Server 2008 DNS servers? Explain modifications necessary to DNS for accommodating Read Only Domain Controllers (RDOC). How is this different from the way DNS handles ordinary domain controllers? Explain background zone loading? How does background zone loading promote efficiency in name resolution? Explain how DNS has been modified to add support for IPv6. How can DNS distinguish between IPv4 and IPv6 host in determining which resource record to return? Bibliography Windows Server 2008 has deployed many new and updated items one in particular is its DNS systems. The purpose of this paper is to better understand these modifications. Along with a better understanding how it differentiates between IPv4 and the new up and coming IPv6. We will use many sources to confirm and relate the information as needed. Global Name Zones provide the user to have static records. It does not support dynamic updates (Petri 2009), and it was to aid the old WINS system that has been around since Windows NT. (Petri 2009) It is more commonly referred as the GNZ in the IT world of acronyms. If the records are not maintained by IT administrators it is not worth having them be GNZ’s. It helps you communicate with trusted people outside of your zone. (Ruest 2008) There is a modification that must be done in order to use Read Only Domain Controllers (RDOC). They hold a version of the DNS in remote offices for companies...

Words: 666 - Pages: 3

Premium Essay

Essay 5.1

...one another. The battle for server virtualization and cloud computing markets is at hand and either entity is giving up without a fight. VMware has been an extremely difficult company to beat when it comes to things such as stability, security and overall market share. Microsoft likes to show off its Heterogeneous hypervisor management capability where as VMware V Center lacks basic management functions for vSphere environments. VSphere host, resource pools and storage and networking are some examples. VMware also has an advantage over Microsoft by advising people that SCvMM requires vCenter Server to manage vSphere environments, which results in much higher cost and complex processes and procedures. VMare has had technology speak as its own voice while challenging Microsoft’s Hyper-V hypervisor which is becoming very competitive and becoming a new and rising threat in the server virtualization market. VMware solutions know that by now it is the time for them to act in order for them to maintain their competitive place in the market. So Which one of these are better? Bogomil Balkansky Vice president of product marketing, Virtualization and Cloud Platform at VMware product marketing, Virtualization and Cloud Platform at VMware states that vSphere wins because of the company’s big head start and track record of innovation. David Greschler Director of Virtualization strategy, server and Tools Business at Microsoft virtualization strategy, Server and Tools Business at Microsoft...

Words: 575 - Pages: 3

Premium Essay

Linux Research Paper

...protocol. Bradley (2012) states the following: Since the beginning of the internet, IPv4 has been synonymous with IP and few people ever stopped to think about which version of the protocol it was. But IPv4 has outlived its usefulness. Its successor, IPv6, after nearly two decades of development is finally ready to replace IPv4 as the backbone of the Internet. (p. 34) With all the new technology and devices now accessing the internet the move to IPv6 will eventually happen. According to Bradley (2012), IPv4 is out of IP addresses. IPv4 supports only 4.3 billion addresses; and with PCs, smartphones, tablets, and gaming systems connecting to the Internet, we are running out of IP address. IPv6 uses 128-bit addresses and can maintain 340 undecillion (340 × 1036) addresses. The IPv6 protocol brings with it other benefits. With IPv4 most of the internet relies on Network Address Translation. With IPv6, every device can have its own unique public IP address. Most home and small-business users have one IP address on the Internet -- the one for the router that links their hardware to their ISP. The router issues IP addresses internally to the devices that attach to it, but it must constantly keep track of which traffic belongs to which device, and translate the IP address from the internal one to the public one to facilitate online communications. (Bradley, 2012, p. 34) There are still people who have concerns about their devices working with IPv6. Bradley (2012) states the following: ...

Words: 1059 - Pages: 5

Premium Essay

Resume

...[pic] Resume For MR. ROODARDUTH RAMLOCHUN FABE, MBCS CITP Chartered IT Professional (CITP) August, 2012 Date of Birth : 27th of June, 1968 Passport No : 1140014 Marital Status : Married Summary: • 23 years of varied experience in the IT industry • Experience and demonstrated strength as a Technical Business Planner / Senior Business Analyst • Excellent administrative, consulting and communication skills Awards: | |YEAR |AWARD |REMARKS | |1. |2011 |QCF Level 7 POSTGRADUATE Diploma in Business Management (PgDip) |ASSOCIATION OF BUSINESS EXECUTIVES | |2. |2003 |British Computer Society (Honours Degree) in Information Technology |BRITISH COMPUTER SOCIETY – Graduated on | | | |(Certificate PGM, Diploma PGM, Professional Graduate Diploma, |the 4th of October 2003 | | | |Professional Project) | | |3. |2001 |Advanced Diploma in Business Administration |ASSOCIATION OF BUSINESS EXECUTIVES | Further Studies: 1. MBA (TopUp) University of Sunderland (UK) - 2012 - Global Corporate Strategy - International Business Environment - Dissertation Education: | |YEAR ...

Words: 2182 - Pages: 9

Free Essay

Cis 333 Asignment 2

...Wilson Professor Ali Abedin CIS 333 November 25, 2014 Internet bots, also known as web robots, WWW robots or simply bots, are software applications that run automated tasks over the Internet. Typically, bots perform tasks that are both simple and structurally repetitive, at a much higher rate than would be possible for a human alone. The largest use of bots is in web spidering, in which an automated script fetches, analyzes and files information from web servers at many times the speed of a human. Each server can have a file called robots.txt, containing rules for the spidering of that server that the bot is supposed to obey. In addition to their uses outlined above, bots may also be implemented where a response speed faster than that of humans is required for example, gaming bots and auction-site robots or less commonly in situations where the emulation of human activity is required, for example chat bots. Recently bots have been used for search advertising, such as Google AdSense. (Juusi, 2012) Internet bots are also commonly used in games such as RuneScape, despite the fact that it's not allowed. RuneScape has now known bots as illegal and you will receive a fine of $500-$2,500. Another, more malicious use of bots is the coordination and operation of an automated attack on networked computers, such as a denial-of-service attack by a botnet. Internet bots can also be used to commit click fraud and more recently have seen usage around MMORPG games as computer...

Words: 1003 - Pages: 5

Free Essay

Cloud Computing

...over the Internet. These services are offered from data centers all over the world, which collectively are referred to as the "cloud." This metaphor represents the intangible, yet universal nature of the Internet. The idea of the "cloud" simplifies the many network connections and computer systems involved in online services. In fact, many network diagrams use the image of a cloud to represent the Internet. This symbolizes the Internet's broad reach, while simplifying its complexity. Any user with an Internet connection can access the cloud and the services it provides. Basically, instead of storing all of your information on your phone, hard drive, etc. and taking up space, you can store it in a “cloud”. Otherwise known as a server. Companies purchase server space (i.e. Cloud) instead of actual hardware to back up their files. A cloud computing solution can help your organization at home or your work achieve multiple benefits, including: * Faster time to market due to on demand deployment * Cost Structuring: Predictable operational expenses and IT resources matched to your actual needs compared with implementing and managing excess costs to meet demands. * Increased productivity due to ease of IT management * Easy access for approved users from internet There are many cloud computing companies out there. The few that people recognize are iCloud, Google Drive, and Microsoft SkyDrive. However...

Words: 505 - Pages: 3

Free Essay

Research

...KUMAR Mobile: +1-201-936-2221 Email: partham@nyit.edu Professional Summary: * Having 2 years 5 months of experience as windows 2003/2008 server administrator. * Part of 7active team, responsible for over 50 Windows 7 and Windows 2003 server. * Installation and configuration of Windows 2003/2008 server * Installation of different applications, which are useful for developing for 3D digital content. * Managing Windows Server 2003/2008 product with Active Directory Integration. * DNS, WINS, Disk quota management in windows server 2003/2008. * Providing Active Directory and DNS support based upon request and issues * Creating groups, users and assigning share permissions. * Configuring the switch and assigning the IP to PCs on the network. * Managing the network at client places. * Routine maintenance and clean-up of server file and directory structure. Academic Profile: * B.Tech – Electrical and Electronic Communication Engineering, Vidya Jyothi Institute of Technology affiliated to JNT University, Hyderabad (2008-2012). Experience: Seven Active Technology Solution Pvt. Ltd. as a Admin from November 2012 – April2015. Technical Skills: * Languages : C , .Net, Core JAVA * Operating systems : Windows XP/7/Vista, Windows server 2003/2008 Professional Experience Project 3: Online portal data updating – Sciencetuts.com Project Description: Seven active technology solutions...

Words: 745 - Pages: 3

Free Essay

Deploying Application Firewall in Defense in Depth Principle

...Deploying Application Firewall in Defense in Depth Principle Abstract Information security should be a priority for businesses, especially when they are increasingly involved in electronic commerce. With the understanding that securing an operating system successfully requires taking a systematic and comprehensive approach, security practitioners have recommended a layered approach called defense-in-depth. The cost and complexity of deploying multiple security technologies has prevented many organizations from achieving their information security goal. In view of these constraints and in compliance with recent with recent corporate and industry regulations like Sarbanes-Oxley Act and Payment Card Industry Data Security Standard, businesses now deploy application firewalls as security measures. Based on the foregoing, the author has recommended the use of application firewalls as a single platform for achieving layered security through network protection, application protection and data protection. This paper commences by examining the defense in depth theory and the types of application firewall and the author concludes by citing the Institute for Computing Applications (IAC) of the Italian National Research Council (CNR) as an example of an organization which engaged application firewalls in resolving its network security problem. Research Analysis/ Body The development of Information security is of paramount importance to organizations that have online presence...

Words: 1701 - Pages: 7

Premium Essay

How to Start Online Business

...How to start online business in Malaysia. * Effective 1st July 2013, all online businesses need to comply with the Malaysian Consumer Protection (Electronic Trade Transactions) Regulations 2012. * As reported in all major newspapers on 16th Sept 2014, Chief Executive Officer of the Companies Commission of Malaysia (SSM), Datuk Mohd Naim Daruwish had again reminded people that do business online to register with SSM. This includes business that sells their product through social networking sites such as Facebook and Instagram. * It is an offence punishable under the Registration of Business Act, if they failed to do so. The maximum fine is RM50,000 or jailed up to two years. This is not a small matter and for people that try to supplement their existing income, it is not worth the risk. * Datuk Mohd Naim mentioned that cost of registration is only RM30 and the registration is a simple process. They will also gain from other benefits such as access to microloans and insurance coverage. * To catch these errant online shop bosses, SSM is working together with Malaysian Communications & Multimedia Commission to identify these people. How to Do Online Business in Malaysia To recap, to start an online business in Malaysia, you need to: 1. Register with MMC, if your business activity relates to telecommunication sector. 2. Register with CCM as a business enterprise 3. Get a domain name, a hosting account and a properly designed website. If you want...

Words: 1265 - Pages: 6