Home >> Free Essays >> All Subjects >> IT

IT Examples and Topics

No Title

Top Three Security Threats Facing Generation Z?

[Author]

[Institution]

Introduction

The rapid development in the field of IT and technology as a whole, while making life easier, is also increasing the sense of uncertainty in our lives. We can no longer anticipate the threats that are making their way towards us and, as a result, we are unable to protect ourselves in an adequate manner ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"bARjuWZQ","properties":{"formattedCitation":"\\super 1\\nosupersub{}","plainCitation":"1","noteIndex":0},"citationItems":[{"id":1049,"uris":["http://zotero.org/users/local/0omESN17/items/NGXQWH4K"],"uri":["http://zotero.org/users/local/0omESN17/items/NGXQWH4K"],"itemData":{"id":1049,"type":"paper-conference","title":"Quantifying the Emergence of New Domains: Using Cybersecurity as a Case","container-title":"International Conference on Knowledge Science, Engineering and Management","publisher":"Springer","page":"324-336","author":[{"family":"Hu","given":"Xiaoli"},{"family":"Feng","given":"Zhiyong"},{"family":"Chen","given":"Shizhan"},{"family":"He","given":"Dongxiao"},{"family":"Huang","given":"Keman"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} 1. Cybercrime is quickly becoming a global concern as the rising levels of criminal activities including cybercrimes like cyber-attacks, hacking, espionage/intelligence, cyber warfare attribution, and deterrence hinder the economic growth and distort law & order of the country ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"3sEJTBOl","properties":{"formattedCitation":"\\super 2\\nosupersub{}","plainCitation":"2","noteIndex":0},"citationItems":[{"id":1050,"uris":["http://zotero.org/users/local/0omESN17/items/8L7IXQL8"],"uri":["http://zotero.org/users/local/0omESN17/items/8L7IXQL8"],"itemData":{"id":1050,"type":"paper-conference","title":"Network Data Collection, Fusion, Mining and Analytics for Cyber Security","container-title":"International Conference on Machine Learning for Cyber Security","publisher":"Springer","page":"1-5","author":[{"family":"Yan","given":"Zheng"}],"issued":{"date-parts":[["2019"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} 2.

Discussion

Cybersecurity is a multifaceted issue that passes through multiple domains and needs multi-dimensional initiatives. While means of intervention are already in place to counteract cybersecurity threats, their prevalence in the workplace has the potential to increase in a significant manner with generation Z becoming a part of the workforce. This generation is more tech-savvy as compared to their older counterparts. This is because they have been raised in the age of social media and smartphone and are not aware of a time or an age prior to this. They have taken to technology more readily than others and have no qualms about the vulnerabilities of a system that they take for granted ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"qn1yyhim","properties":{"formattedCitation":"\\super 3\\nosupersub{}","plainCitation":"3","noteIndex":0},"citationItems":[{"id":1051,"uris":["http://zotero.org/users/local/0omESN17/items/V24I7S4R"],"uri":["http://zotero.org/users/local/0omESN17/items/V24I7S4R"],"itemData":{"id":1051,"type":"book","title":"How to measure anything in cybersecurity risk","publisher":"John Wiley & Sons","ISBN":"1-119-08529-2","author":[{"family":"Hubbard","given":"Douglas W."},{"family":"Seiersen","given":"Richard"}],"issued":{"date-parts":[["2016"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} 3.

According to a recent survey carried out by Microsoft, it was reported that Generation Z was more vulnerable to online tech support scams than any other population using technology at the moment ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"jeQeWEck","properties":{"formattedCitation":"\\super 4\\nosupersub{}","plainCitation":"4","noteIndex":0},"citationItems":[{"id":1052,"uris":["http://zotero.org/users/local/0omESN17/items/JBJEE2Q4"],"uri":["http://zotero.org/users/local/0omESN17/items/JBJEE2Q4"],"itemData":{"id":1052,"type":"webpage","title":"Massive IT Support Fraud ‘Made $10 Million From Thousands Of Elderly Victims’","container-title":"Forbes","abstract":"Hackers used fake virus alerts to dupe thousands of elderly PC users into coughing up cash.","URL":"https://www.forbes.com/sites/thomasbrewster/2019/09/19/huge-fake-it-support-scam-made-10-million-from-7500-victims/","language":"en","author":[{"family":"Brewster","given":"Thomas"}],"issued":{"date-parts":[["2019",8,19]]},"accessed":{"date-parts":[["2019",9,21]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} 4. It is this vulnerability that makes online tech support scams one of the primary cybersecurity threats being faced by generation Z. Microsoft has cited the overconfidence of this generation regarding the use of technology in the matter as the reason why this generation, under its false sense of security as the reasons why they are the most vulnerable population.

Furthermore, pop-up ads/windows is another primary cybersecurity threat being faced by generation Z. As compared to older generations, they are more likely to lose money by involving in risky behavior by not being cautious in their approach ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"eItnldvt","properties":{"formattedCitation":"\\super 5\\nosupersub{}","plainCitation":"5","noteIndex":0},"citationItems":[{"id":1048,"uris":["http://zotero.org/users/local/0omESN17/items/ZPJPBQP3"],"uri":["http://zotero.org/users/local/0omESN17/items/ZPJPBQP3"],"itemData":{"id":1048,"type":"webpage","title":"Gen Z, millennials and males are the most vulnerable groups for tech support scams, new Microsoft report reveals","container-title":"Microsoft News Centre Europe","URL":"https://news.microsoft.com/europe/features/knowledge-is-the-best-defence/","language":"en-GB","author":[{"family":"Dedezade","given":"Esat"}],"issued":{"date-parts":[["2018",10,15]]},"accessed":{"date-parts":[["2019",9,21]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} 5. In this regard, one can say that their risk online behavior i.e. visiting torrent and unsafe website as of result of familiarity with technology puts them at a greater potential for harm as compared older generations and adds to their vulnerability. Thus, it is essential that they are educated on the matter and taught to be conscious of the choices they make online.

Another threat that is commonly directed towards generation Z has more to do with identity theft and lack of privacy. Having a very public social life is very vogue now a day, with more and more teenagers opting for a very public social life. All of this is done in an effort to earn followers and admirers. However, these teenagers are also opening themselves to the possibility of not only being cyberbullied by others but also being catfished. These trends put their very identities at risk and make it possible for people to use their details and images to scam other people. These tactics are often put to great use by pedophiles into grooming young children and use them for their nefarious reasons ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"xrvGtQ8i","properties":{"formattedCitation":"\\super 6\\nosupersub{}","plainCitation":"6","noteIndex":0},"citationItems":[{"id":1054,"uris":["http://zotero.org/users/local/0omESN17/items/3WVH6GUE"],"uri":["http://zotero.org/users/local/0omESN17/items/3WVH6GUE"],"itemData":{"id":1054,"type":"article-journal","title":"The impact of social media on society","author":[{"family":"Amedie","given":"Jacob"}],"issued":{"date-parts":[["2015"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} 6.

Conclusion

While this generation is most vulnerable in terms of cybersecurity threats, at the very same time this is the generation that is the most equipped to launch sophisticated cybersecurity attacks on almost all units on the society. This generation has never lived in a world devoid of technology and they are truly a master of their art. Sure, they blow caution to the wind when while using the internet, but their familiarity with technology also poses the greatest risk to the entire enterprise as a whole. Thus, while they are vulnerable, they have the capacity to make the system vulnerable as well.

Reference List

ADDIN ZOTERO_BIBL {"uncited":[],"omitted":[],"custom":[]} CSL_BIBLIOGRAPHY 1. Hu X, Feng Z, Chen S, He D, Huang K. Quantifying the Emergence of New Domains: Using Cybersecurity as a Case. In: International Conference on Knowledge Science, Engineering and Management. Springer; 2018:324-336.

2. Yan Z. Network Data Collection, Fusion, Mining and Analytics for Cyber Security. In: International Conference on Machine Learning for Cyber Security. Springer; 2019:1-5.

3. Hubbard DW, Seiersen R. How to Measure Anything in Cybersecurity Risk. John Wiley & Sons; 2016.

4. Brewster T. Massive IT Support Fraud ‘Made $10 Million From Thousands Of Elderly Victims.’ Forbes. https://www.forbes.com/sites/thomasbrewster/2019/09/19/huge-fake-it-support-scam-made-10-million-from-7500-victims/. Published August 19, 2019. Accessed September 21, 2019.

5. E. Gen Z, millennials and males are the most vulnerable groups for tech support scams, new Microsoft report reveals. Microsoft News Centre Europe. https://news.microsoft.com/europe/features/knowledge-is-the-best-defence/. Published October 15, 2018. Accessed September 21, 2019.

6. Amedie J. The impact of social media on society. 2015.

Subject: IT

Pages: 2 Words: 600

No Title Neede

Copy rights

Student’s Name

Institution

Date

Software Privacy

The act of copyrights and intellectual property is illegal. The practice is common on some countries but in Europe and United States, it is illegal and punish by law. Software privacy or copyright is the act of copying, sharing, downloading a music or software and use without paying for the software. Though the practices can exposure the computer system to many risk, it is being practiced by many people and therefore, it has direct impact to the owner of the software or music and the society.

The practice denies the owner of the software or music some financial gain. Since most of software are developed for the purpose of profit making, and when it is shared free it deny the software or music owner the financial gain. IT is therefore, important to state that it affects the application or music owner financially. The use of online privacy and the violence of intellectual copyright also affect the society in general. The government loses revenue, which it was supposed to gain from the sale of software or music. In business when a customer purchase a product, the owner of the business gains and the government and the general society. The practice affects the employment rate and economic status of the country as well. Instead of increased jobs and GDP based on the revenue collection failure to make payment affect the growth of the economy.

Sharing of music or software is a practice which is common around the world but illegal in many countries especially in the Western nations. It is therefore, essential for the governments to protect the industry exploitation and promote artists and developers. Through partnership with other countries where the practice is common, the act can be brought to an end. IT is the best technique the government and other interested party can apply in the industry to curb the practice. This will benefit the developers and artists the society and the government. It is therefore, an action of great importance.

Subject: IT

Pages: 1 Words: 300

No Title Needed

[Name of the Writer]

[Name of the Institution]

[Title]

As the technology is making progress by leaps and bounds currently, it is becoming a need of the hour for every field to incorporate the latest techniques of modern technology, in their operations or daily routine. Similar instances can be seen in the case of today's business world. As the organizations are becoming more and more interested in growth, they are moving from domestic or national level to an international or a global level. This expansion or progress is not at all possible without the use of technology.

An information system is an important and integral part of the technology, especially the technology being used in the business processes. An information system is an integrated system that is used for collecting, organizing, processing, storing and disseminating information (Sousa, & Oz, 2014). These systems can also be understood as an organized and elaborated system that is used by organizations and people working in them for the purpose of creation, collection, filtration, processing, and distribution of data.

Business Information systems include various type. The most prominent ones of these are global information system and the other one is a local or national information system. The global information system refers to an information system that is not limited to a nation or a country, in fact, it comprises the whole world, thus the information system development project carried on over such a system will be huge as well. On the other hand, a development project, carried on at a national level would not be that much huge and can be carried on at a small scale.

There are multiple issues that come in the way when an organization goes global especially technology related. One of the challenges that can be faced by the organization is the integration of the technology and information systems. Moreover, training the staff at the new location, regarding the current or newly installed information system at the company.

References

Sousa, K. J., & Oz, E. (2014). Management information systems. Nelson Education.

Subject: IT

Pages: 1 Words: 300

No Title Needed

[Title]

[Name of the Writer]

[Name of the Institution]

[Title]

Introduction

The sharing economy can be defined as an economic scheme based on the peer-to-peer methodology of acquiring, giving access to materials and goods, and services that run an online platform. In other words, the sharing economy can also be defined as consumption that is collaborative and economy that is interdependent (Hamari, Sjöklint & Ukkonen, 2016).

Discussion

Ever since the invention of the internet, technology giants have been working on bringing people and communities together. In 2008, Apple launched the App Store, that instantly brought together buyers and sellers. Sometime later, TaskRabbit Inc., hailed as one of the first sharing economy company, was founded. It has the concept of connecting people who are looking for work and people who are looking to hire workers for some services. For instance, if you wanted to clean your water tank and don't feel like doing it, you had an option to designate the chore.

Although there is much debate about the impact of sharing economy financial model, the sharing economy does not seem to be in trouble at any time soon. The opponents of this business model hold the view that it has created a situation where employees do not get job security and health insurance. With the launch of Air bnb, there is a widely held view that it has dealt a severe blow to long-term renters. As it has created a shortage of housing. Additionally, it has hiked up the prices of rent. Another example is Uber. The opponents say that it has severely damaged the conventional taxi industry. As taxi drivers have lost their fair share of rides, they are seen staging protests against this financial model world over.

There are plenty of benefits of sharing economy. For instance, It has increased opportunities to be self-employed. It also has fostered a sense of trust among the residents of a community. Lower ownership, more business opportunities, and convenient access to capital are some other benefits of sharing economy.

Conclusion

While there may be plenty of negativity around the sharing economy model, there is

plenty to consider as positive. It depends on how one is affected by the sharing economy and is contributing towards it.

References

Hamari, J., Sjöklint, M., & Ukkonen, A. (2016). The sharing economy: Why people participate in collaborative consumption. Journal of the association for information science and technology, 67(9), 2047-2059.

Subject: IT

Pages: 1 Words: 300

No Title Needed

[Title]

[Name of the Writer]

[Name of the Institution]

[Title]

Introduction

Ever since the beginning of time, humans have always found ways to cater to their needs. Stone age bears evidence of humans inventing things like knives and spears made from rocks which helped them killing animals to satisfy their hunger. In the 20th and 21st century, technological advancements had made great strides. In coming time these advancements will only increase further. Moreover, society will be shaped accordingly.

Discussion

There are multiple technologies that would shape the future business making decisions. With growing concerns over privacy regarding new technologies, Ultraprivate smartphones will address these concerns. In this technology, voice calls, text messages, and file transmitted will be encrypted by default. It will prevent hackers from breaching in on the phone calls. Another important technological advancement in the years to come is Artificial intelligence. Artificial intelligence’s impact is increasing day by day. Intelligent systems like Alexa and Google assistant have already made a far greater impact on society.Expert systems, machine vision, and speech recognition are some applications of AI that are rooted to change the world. Everybody is familiar with IoT, but few are acquainted with the term IoB-Internet of Bodies. Self-monitoring technologies are further stamping their authority on human life. Human beings are now getting used to wearing the tracker on themselves. In IoB, there are digital pills that enter the human body and they communicate with sensors available in developed countries. Lastly, quantum computing, though there is not much work done on it yet, has immense potential to shape the world in which we live. Quantum computing, by using superposition and entanglement performs computation. Cryptography, quantum search, and quantum simulation are some of its applications.

Conclusion

Taking into consideration the above discussion, one can conclude that there will be positive and negative impacts of the technologies mentioned. Businesses would bring effectively and up to date practices into play to help increase their revenue. Society can see job cuts and layoffs with intelligent machines taking control of the market.Large scale development of these technologies still remains elusive.

Subject: IT

Pages: 1 Words: 300

No Title Needed

q bjbjll H0efefvPvP8TDp8_8_8_prrrrrr8_8_bbbF8_8_pbpbb.8_.YFL@0 YYYbWaYvPX seq NL1 r 0 h Session C Journal INterpersonal interaction, Groups, Teams

Instructions Complete the following questions, which are worth 5 points each. Seek to apply what you have learned from the chapters, and what you learned completing the self-assessments.

Write 3-5 sentences per question. SEQ NL1 r 0 h

Why is it useful for a manager to understand group behavior Why is it useful for an employee

It is useful for a manager to understand group behavior as it makes it easier for the manager to negotiate and talk to individuals who tend to become part of these informal groups. For an employee, it is useful so that if they become part of any group, they would realize and see the many pitfalls that groups usually fall into and avoid them.

Recall a situation in which you may have encountered or observed groupthink (either as a member of a group or as a target or simple observer).

One situation in which one can see events unfolding as a result of groupthink would be the Soviet invasion of Afghanistan. They collectively thought that they were more powerful than their enemies and this groupthink proved costly.

Why is it important to make a distinction between group and team What kinds of behaviors might be different in these assemblages

The major difference between a group and a team is that a team has a well-defined purpose and they work towards that common goal in an organized manner, whereas a group is just people coming together and combining their efforts for something substantial. Members of a team are formally committed to their goals where as members of a group are free to leave or stay with the group.

How are other organizational characteristics different for a team-based organization One of the major differences between team-based organizations and others is the presence of supervisors. In team-based organizations, the members of the team come together without a supervisor in order to accomplish their projects.

Some say that changing to a team-based arrangement just makes sense for organizations. What are the four primary reasons why this might be so The main reasons for an organization to transform into a team based organizational structure are reduced costs, employee benefits, organizational enhancements and enhanced performance.

If employees are happy working in the traditional boss-hierarchical organization, why should a manager even consider changing to a team-based organization If the feedback of the employees suggests that they would not be happy in a team-based hierarchy, then they should be left with their current hierarchy and told to keep working as they want to, because the worst thing that could happen to any organization is, the morale of the employees being hurt and they stop working as hard as they should.

Explain the circumstances under which a cross-functional team is useful in organizations.

A cross functional team is useful in any organization as in such a team, people from different backgrounds come together and work towards a common goal. This approach can have a single team handle very diverse kinds of business which is in turn very beneficial for the company.

Why is planning the change important in the implementing process Planning the change is very important during the implementation process because if the change is not planned properly, it can cause confusion and cause the workflow to slowdown.

What can happen if your organization prematurely starts building a team-based organization by clarifying the mission and then selecting the site for the first work teams If an organization pre-maturely starts to make such organizational changes, then the overall workflow and the coordination between departments can also get affected.

What are two of the most important issues facing team-based organizations

The two most important issues facing team-based organizations are the increased need for effective leadership and the increasing instability.

PAGE 94 Chapter DOCPROPERTY ChapterNumber MERGEFORMAT 9 DOCPROPERTY ChapterTitle MERGEFORMAT Foundations of Interpersonal and Group Behavior

Chapter DOCPROPERTY ChapterNumber MERGEFORMAT 9 DOCPROPERTY ChapterTitle MERGEFORMAT Foundations of Interpersonal and Group Behavior PAGE 93

2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

.

2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

RSau 2 3 4 E F G j o s t xxxxxxxxjjjjjjjjjjjhhR5OJQJaJhR5OJQJaJhBhdM5OJQJaJhW(hdM5CJOJQJhdMjhdMUhW(OJQJh9hW(OJQJh9hW(5OJQJhW(5OJQJhW(OJQJaJhp)hW(OJQJaJjhp)hW(OJQJUaJR G u yPg gduz hhgdgd6 gd gdR FgdW(gdW(gdW(agdW( W C P t u

4

A

I

M

U

V

l

xxffffxThh5OJQJJaJhhf5OJQJJaJhh r5OJQJJaJhh65OJQJJaJhBh@5OJQJaJhBh5OJQJaJhpu5OJQJaJhv5OJQJaJh5OJQJaJhBhdM5OJQJaJhBh5OJQJaJ

19JKZxy9EUlruzqh5OJQJaJh85OJQJaJh5OJQJaJhBh5OJQJaJhBh@5OJQJaJhh@5OJQJJaJhh5OJQJJaJhhhC5OJQJJaJhh@5OJQJJaJ,GHUWXpY 459@kyhQLh9R5OJQJaJhQLh85OJQJaJhQLh5OJQJaJhQLh@5OJQJaJhU5OJQJaJh45OJQJaJhMK5OJQJaJhBh5OJQJaJhBh@5OJQJaJ/OPk/3LPadefgrh9R5OJQJaJhR5OJQJaJhBh5OJQJaJh.5OJQJaJhvoQ5OJQJaJh5OJQJaJhBh@5OJQJaJhQLh@5OJQJaJhQLh85OJQJaJh5OJQJaJ,

-AHQYZx

5

GVacmhhdM5OJQJaJh5OJQJaJhh5OJQJaJhh@5CJOJQJaJh5OJQJaJh5OJQJaJhBh5OJQJaJhBh@5OJQJaJh9R5OJQJaJhR5OJQJaJ

5678BCpqrsuv

hW(CJOJQJaJhphW(CJOJQJaJhCJmHnHujhW(UhW(hW(CJmHnHu hW(CJjhW(CJUhAjhAUA78 gduzagdshhdM5OJQJaJhAhW(CJOJQJaJhphW(CJOJQJaJhW(F 00PP1hpy/ Dpy2 0@Pp2( 0@Pp 0@Pp 0@Pp 0@Pp 0@Pp 0@Pp8XV8XV 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@666666_HmH nH sH tH @@ kNormal@CJ_HmH sH tH jj k Heading 1@-5CJKHOJQJ_HmHnHsH tH u66 k Heading 2@BB k Heading 3@CJOJQJDD k Heading 4@6CJOJQJFAF k Heading 5@56CJaJDD k Heading 6

@ 5aJBB k Heading 7

@CJaJHH k Heading 8

@6CJaJJ J k Heading 9

@OJQJJaJDA D kDefault Paragraph FontViV k Table Normal V 44 la (k ( kNo List FoF k Body textxCJ_HmH sH tH 88 k Body 1vert k

Body centereda2) 2 k Page NumberCJ44 kBullet-1 FT/T kChapNumCJOJQJ_HmHnHsH tH u44 kBullet-a FX/X k ChapTitle5CJ(OJQJ_HmHnHsH tH u @r kFooter

CJOJQJF@F kHeader

05CJOJQJ4O4 kIndent-1 Indent-1 WOL

6Z4O4 kNL-188 kNL-(1)LL NL-1 deep

h8,, NL-AOJQJ44 kNL-a00 NL-I OJQJ88 k Bullet-(1) F/ Page number CJOJQJ@Z2@ Plain Text@CJOJQJHH k Table titlea5CJOJQJ kChapSummaryHeadDD kLearningObjctiveHead kChapOutlineHead44 k KeyTermsHead(DD kAllQuestionTypesHead)LLAllQestionTypesMixedHeadDD kAllAnswerTypesHeadx44 k SectionHeadA,22 k SampleHeadA-44 k SectionHeadB.LL kAllQuestionTypesHeadSub1/22 k SampleHeadB0414 k SectionHeadC1L1L kAllQuestionTypesHeadSub22212 k SampleHeadC344 k Instructions466

EssayQuestion5PP kMultipleChoiceAnswersRunin6FF kLearningObjectiveText7 ChapOutlineText8 k EssayAnswer 9

ZZ kTrueFalseNumList

QuestionNumListDD kEssayQuestionNumList kMultipleChoiceNumList kKeyTermsNumList88 kAnswer-1

8ZZ kAnswerByReference@

LL MatchQuestionNumList1ColA/ kBold5616 DefKeyTermsBoldL/AL k ProcessedehfHq r6R6 NL-1WOLE

X66 k

FillinNumListF0r0 Answer-aGll kMultipleChoicePossibleAnswerH44 k Body 0vertI44 kIndent-a J88 k Indent-(1) K88 NL-1 1vert L44 NL-1 0vertM22 k MatchAnswerN ULO UL-2P UL-3Q44 kFootnoteROJQJBB k

Table headingS 5OJQJ(/A( kItalic6 BQ kTermBa DefKeyTermsExItal0Bq0 EssayAnsItal kNoneNN MultipleChoiceAnswerCorrectRR MultipleChoiceAnswerIncorrect88 TrueFalse Answer66 NL-aWOL

kWOL Asis3 Asis1_TT k PartTitle./5CJ4OJQJ k KeyTermsText a NL-x-FLbhh828 NL-x-1cTT k

AppendixTitled5CJ(OJQJmHnHuDTRD k Block Textexb Asis2fr Assisi1gq Assisi2hq Assisi3i NL-a-FLj22 k Outline-Ik88 NL-x-2l88HH Outline-I deepm@@ NL-I deepn@@66 k Outline-A o66 k Outline-1 p66 k Outline-a q k Outline-(1) r k Outline-(i) sz z L1BL Outline-(i) deeptH H R kTable cell bodyu0/a0 k Small capsBq MatchAnswerCorrect88 kSupplementHeadx kLabely5BJB Subtitlez@aOJQJBB B k Body Textx_HmH sH tH 6A6 k

Graphic TitleVV kMatchQuestionNL

888 8

kTOC 1x

5aJ88 k Indent-(i) XX kAncillary titlea5CJ0OJQJ kVolume x CJ(OJ QJ BB k Main titleaCJH k

Main subtitleCJ0BB kEdition 8CJ OJQJDD k Main authors CJ OJQJTT kAncillary author 5CJOJQJZrZ Ancillary affiliation CJOJQJ HMCO 5CJOJQJ/ HMCO cities CJOJQJ88 kMastheadOJQJ@/@ k MastheadName6CJOJQJ k Copyright POJQJHH kCopyright sale xOJQJNN kCopyright nonsale xOJQJDD k Madeintheusa OJQJ44 kISBN OJQJHH k Printer code CJOJQJ6 6

kTOC 2 aJ8 8

kTOC 3 6aJ2 2

kTOC 4 XXaJ2 2

kTOC 5 aJ2 2

kTOC 6 aJNr N MultipleChoiceStats

k BOY_MCStats

HH k BOY_MCTopic5B B BRN_MCAnswer

52q 2 BRN_MCStatsQ Table cell assisiPP k

PageBreakParad CJ OJQJDD k NL-1 tablexZ Z OBR_ShortAnsEssay

-2q 2 BRK_MCStats2q 2 OBR_MCStats0 0 k AnswerLetterRQ2 R kTable cell body centeredaVQB V Table cell body indent FL hhQR Table cell body indent FRhhaN1N kTable heading centereda@1@ kTable heading 10CJX1X kTable heading centered 10aCJLQL kTable cell body 10 CJOJQJN N Table body centered 10aR R Table body indent FL 10 hhX X Table body indent FR 10hha44 kTOC Base

. .

kTOC 7 ((. .

kTOC 8 . .

kTOC 9 LL NL-1 deep no WOLFF kCaseHead @5CJ OJQJD D k CaseTitle x@56OJQJ66 k TransText5CJ8BA B k TransBullet F

pJJ k TransHeadX@a 5CJ8A kTransTextSmallCJ@ @ Indent-1 table EssayQuestionTB

Index 1C Body Text IndentG

/0h8P 1@CJR Body Text Indent 2G

/0h8P 818@CJS Body Text Indent 3G

/0h8P 1@CJdP d Body Text 2(

08p1 5@CJB B Comment ReferenceCJaJ8 8 Comment TextCJRY R k Document Map-D M OJ QJ J 44 kIndent-5 .. kKeyTerm5(B ( Style1

FigureCaption5CJ,a , k Answer_ExpHH kAllAnswerTypesHeadSub1H1H kAllAnswerTypesHeadSub2LL kLearningObjectiveNumList k SidebarHeadIdddd@NOPQ5v v k SidebarTextFddddNOPQ0_ 0 k HTML Acronym88 kIndent-6z z XX kMultipartQ_Leadx@ZZ kMultipartQ_Questionx@ kMultipartQ_NextAnswerx@ZZ kMultipartQ_NextAnswer_ByRefx@ k SidebarBull_ F

jddddNOPQ kMultipartQ_FirstAnswer_ByRef

-x-@jj kMultipartQ_FirstAnswer

--44 kCaptionx5

kIndex 3 kSidebarNumListFddddNOPQDQD kMetadata

--N1

N LearningObjectiveBull FJ J kSidebarCaseHead5CJOJQJJJ kStageDirections xa56HH kAnswerDistractor

8JJ k Affiliation 6CJOJQJJ/J k AutoCorrectCJ_HaJmH sH tH @@ kBody 1vert above@@ kBody 3vert below@@ kBody text-righta kEndnote ReferenceH22 kExtractxCJ,A, k KeyTermDef kKeyTermsSubheadJ J kSidebarIndent-1X X kTable cell body centered 10a kHeading 2 Core56,, kSource6HH k Box StartdNTT kBox End,(ddNP k Endnote Text@CJXX kChapter Opening Start-DM JJ kChapter Opening End (FF kChapter Closing StartJJ kChapter Closing End (HH k TextBoxType-DM CJ kKeyTermDefinition6/16 k

KeyTermInLine5 kGraphic Caption5 kTitleHM00 k SubtitleHM kGraphic Source5 kGraphic Number5

kSample Citation@xx@ @OJ QJ BB k Bullet-(3)

BB k Bullet-(5)

z z z BB k Bullet-(6)

c

d

d

BB k Bullet-(4)

F/F kEmph Smallcaps7HSY(rr kWorkbook-FillinNumListdx@mHnHuLL kWorkbookHeader

xCJaJTT

kWorkbook-Indent-1dx@TT

kWorkbook-Indent-adx@FF k HintsBelowd(6CJHBH Balloon TextCJOJ QJ J aJ@j @ Comment Subject5(( kNL_Num(( kNL_1.1 kNL_Even(( kNL_Odd NN k MC-Answer-1

8@@88@@ kChapOutlineSubhead 66 k MiscNLRoman xb/b kHeading 1 Char-5CJKHOJQJ_HmHnHsH tH u44 kHeading 2 CharNN k CitationHead xx5CJOJQJBB kCitationSubhead@ kCitationDD22 k EssayAuthor00 k EssayTitle8A8 kEssayAuthor Char6Q6 kEssayTitle Charvv c Case titledhxxa.5@CJKHOJ PJQJ J aJmH sH xrx c

Case Num list( F

h@OJPJQJJmH sH c Normal (Web)CJaJL/L B Body Text1xCJPJ_HmH sH tH J/J Endnote Text Char_HmH sH tH PKContent_Types.xmlN0EH-J@ULTB l,3rJBG7OVa(7IRpgLr85vuQ8CX6NJCFB..YTe55 _g -Yl6NPK6 _rels/.relsj0 Qv/C/(hO Chvxp_P1H0ORBdJE4bq_6LR70O,En7Lib/SePKkytheme/theme/themeManager.xml M @w7c(EbCA7K

Y,

e.,H,lxIsQ ,jGW)E 8PKtheme/theme/theme1.xmlYKo7Xd7 GJK.eG9R@ZP

z1MDi siLaI/N, IQ XwB

2ZCXFKqKJ WD 0TcKBcqYT(NmONIkwLWfxAiRvr@2SNque_F78TkPvE A67meiW

(IKR6u7n@A4D3RIiGhQB 8HA(aKniOEE0KK9gZ76z/L_zS.Lq__phhC_MbJ@ R8wddmjcp/IDg6wZ0sDw r,qlEyDQQ,c8B,gxMDM./SAeQFSDbjE7CbNpr8fnFrI.1fV21(tkJV1/ QL07fVIhcMZ6/H bWGv TsBCtLQJxyJ C (tRQe1/-/A_Y)6(p_Nnjzb-nVb.7pMMMM ud9c47iV7df 5j

z9JrJ3Ax FU9i3Q/B)LRPx)04N O agYeHjkblChPWalfpX OAXlXVZbr

Zy4Sw3WhPxzSqyu,.in6 mgV/C,jSAh4@3Sm

CcBs

rHDuALqW@C48v2Pn7VKYpVlE7AUeexwPx ,ot eU3gpsq530BUMZ4Ube9i5j ,zE5714g1nsBW 0xnGDA0Y4rl@2E5,bhWjKm68.wB.GtO

-/PK

theme/theme/_rels/themeManager.xml.relsM 0woo5

6Q

,.aic21hqm@RNdo7gK(MR(.1rJT8VAHubP8g/QAs(LPK-Content_Types.xmlPK-6 0_rels/.relsPK-kytheme/theme/themeManager.xmlPK-theme/theme/theme1.xmlPK-

theme/theme/_rels/themeManager.xml.relsPK xml version1.0 encodingUTF-8 standaloneyes

aclrMap xmlnsahttp//schemas.openxmlformats.org/drawingml/2006/main bg1lt1 tx1dk1 bg2lt2 tx2dk2 accent1accent1 accent2accent2 accent3accent3 accent4accent4 accent5accent5 accent6accent6 hlinkhlink folHlinkfolHlink/0

3E NPSMOVYUUUU8@0( B S 3Ftt

A

Q

Y

Z

J 3Ftt

A

Q

Y

Z

J @ AIkJU@,tTtX_vZ4nLN ()X.b@YJ/ JZn28l4/fJU78i/9vu)QpSmT f7VZfY QL,KJjH n,opZXnxxKzx

)28QKL8JS. OJQJo( 88OJQJo(OJQJJo(o p OJ

QJ

o( @ OJ

QJ

o( xxOJQJo(HHOJQJJo(o OJ

QJ

o( OJ

QJ

o(jjjBOJQJo(ph OJQJo(o OJ

QJ

o( OJQJo( OJQJo(o OJ

QJ

o( 000OJQJo( ---OJQJo(o ///OJ

QJ

o(80880o(..pLppL.@ @ @ ..LL...PLPPL. hhhOJQJo( OJQJo(o pppOJ

QJ

o( @ @ @ OJQJo( OJQJo(o OJ

QJ

o( OJQJo( OJQJo(o PPPOJ

QJ

o(o(..pLppL.@ @ @ ..LL...PLPPL. OJQJo( OJQJo(o pppOJ

QJ

o( @ @ @ OJQJo( OJQJo(o OJ

QJ

o( OJQJo( OJQJo(o PPPOJ

QJ

o(o(. hH. pLppLhH. @ @ @ hH. hH. LLhH. hH. hH. PLPPLhH.BOJQJo(ph OJQJo(o Z Z Z OJ

QJ

o(

OJQJo( OJQJo(o OJ

QJ

o( OJQJo( jjjOJQJo(o OJ

QJ

o( hH. hH. pLpLhH. @ @ hH. hH. LLhH. hH. hH. PLPLhH.hhh. hH. hH. pLpLhH. @ @ hH. hH. LLhH. hH. hH. PLPLhH.h OJQJo(h OJQJo(oh OJ

QJ

o(h OJQJo(h xxxOJQJo(oh HHHOJ

QJ

o(h OJQJo(h OJQJo(oh OJ

QJ

o(h v v v OJQJo(h F

F

F

OJQJo(oh OJ

QJ

o(h OJQJo(h OJQJo(oh OJ

QJ

o(h VVVOJQJo(h OJQJo(oh OJ

QJ

o( OJQJo( OJQJo(o pppOJ

QJ

o( @ @ @ OJQJo( OJQJo(o OJ

QJ

o( OJQJo( OJQJo(o PPPOJ

QJ

o( hH. hH. pLpLhH. @ @ hH. hH. LLhH. hH. hH. PLPLhH.hOJQJJo(hOJQJJo(ohpppOJ

QJ

J

o(h@ @ @ OJQJJo(hOJQJJo(ohOJ

QJ

J

o(hOJQJJo(hOJQJJo(ohPPPOJ

QJ

J

o( hhhOJQJo( OJQJo(o pppOJ

QJ

o( @ @ @ OJQJo( OJQJo(o OJ

QJ

o( OJQJo( OJQJo(o PPPOJ

QJ

o(BOJQJo(ph s s s OJQJo(o C C C OJ

QJ

o( OJQJo( OJQJo(o OJ

QJ

o( OJQJo( SSSOJQJo(o OJ

QJ

o(BOJQJo(ph OJQJo(o pppOJ

QJ

o( @ @ @ OJQJo( OJQJo(o OJ

QJ

o( OJQJo( OJQJo(o PPPOJ

QJ

o(h hhhhH.h 888hH.h LLhH.h hH.h hH.h xLxxLhH.h HHHhH.h hH.h LLhH.BOJQJo(ph s s s OJQJo(o C C C OJ

QJ

o( OJQJo( OJQJo(o OJ

QJ

o( OJQJo( SSSOJQJo(o OJ

QJ

o(T....... .... .....

......

.......

........BOJQJo(ph OJQJo(o pppOJ

QJ

o( @ @ @ OJQJo( OJQJo(o OJ

QJ

o( OJQJo( OJQJo(o PPPOJ

QJ

o(h pppOJQJo(h @ @ @ OJQJo(oh OJ

QJ

o(h OJQJo(h OJQJo(oh OJ

QJ

o(h PPPOJQJo(h OJQJo(oh OJ

QJ

o(hhhh56Bo(phhH.h 888hH.h LLhH.h hH.h hH.h xLxxLhH.h HHHhH.h hH.h LLhH.BOJQJo(ph OJQJo(o pppOJ

QJ

o( @ @ @ OJQJo( OJQJo(o OJ

QJ

o( OJQJo( OJQJo(o PPPOJ

QJ

o(

hhh5Jo(.J.pLppLJ.@ @ @ J.J.LLJ.J.J.PLPPLJ.h 888OJQJo(h OJQJo(oh OJ

QJ

o(h OJQJo(h xxxOJQJo(oh HHHOJ

QJ

o(h OJQJo(h OJQJo(oh OJ

QJ

o(h 888OJQJo(h OJQJo(oh OJ

QJ

o(h OJQJo(h xxxOJQJo(oh HHHOJ

QJ

o(h OJQJo(h OJQJo(oh OJ

QJ

o(_v nJ_vZXnxJ_vZXnxYJ/l4LmT@Uf

)()JjVop/9ITtJU7pSn8QKzx QLJZn2u)Q. p 3 _x f 4 /k x(2 n @3 ZR p9 fJB x kjP_eE L GRg8Avv nG39RfpW(d-ey1@2C394M5@AlABhCJMKdM)OQvoQXZ ruz bcdeLf kxoqfqMrstpuxkyE6 R8 kAUsw..QLvfMB@ydm

B6(1ZB4ad@t@UnknownGAx Times New Roman5Symbol3. Cx Arial7.@ CalibriA.Arial NarrowcHelvetica-NarrowArial Narrow3Ax Times.Arial Black Cx Courier New. Cx Helvetica5..)Tahoma7CenturyC., @Calibri LightWingdingsABCambria MathHhP5

P5

pr462 3qHPn2xxX WCDocuments and SettingsmcgannsApplication DataMicrosoftTemplatesHM Ancillary.dotpara 1natshamorning

Oh0 8 D P

hpxpara 1natshaHM Ancillarymorning3Microsoft Office Word@G@@@CP5

.,D.,D hp

K2 Software, Inc. para 1 Titlex 7

C

StyleVersion SappVersion XMLStatusType_AdHocReviewCycleID_EmailSubject

_AuthorEmail _AuthorEmailDisplayName _ReviewingToolsShownOnce Version ChapterNumber

ChapterTitle1.02.37NOIRMw9CChs 6, 12, 13keaton.paul@uwlax.eduKeaton Paul N5.0090Foundations of Interpersonal and Group Behavior

(),-./0123456789@ABCDEFGHIJKLMNOPQRSTUVWXYZ_abcdefghijklmnopqrstuvwxyzRoot Entry F@.Data 1TableWordDocumentH0SummaryInformation(DocumentSummaryInformation8CompObjr F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q

Subject: IT

Pages: 1 Words: 300

No Title Needed

q Qbjbjll H4efefQQL_L_L_L_L____8_L__aaaL_aaaaaL_L_cccaRL_L_caccM@3aR0btL_kaacaaaaabaaaaaaaaaaaaaaaaQX seq NL1 r 0 h Session E Journal Power Conflict in Organizations

Instructions Complete the following questions, which are worth 5 points each. Seek to apply what you have learned from the chapters, and what you learned completing the self-assessments.

Write 3-5 sentences per question.

seq NL1 1 seq NL_a r 0 h . Can a person without influence be a leader Does having influence automatically make someone a leader

It depends on the field that the person wants to work in. A leader, in terms of management, requires a certain degree of communication skills and calmness. If a person is good at engaging individuals in a constructive discourse, he or she can be a good leader.

seq NL1 2 seq NL_a r 0 h . Have you ever engaged in impression management What did you hope to accomplish

Yes, whenever I meet a new person, I engage in impression management. The main goal that everyone tries to accomplish is to show that they are a good individual by trying to control the information that the other person knows about them.

3 seq NL_a r 0 h . Is there a logical sequence for the use of power bases that a manager might follow For instance, should the use of legitimate power usually precede the use of reward power, or vice versa

Power should not be defined by your position in an organization. Power can be garnered in the form of respect and such power is usually more effective than legitimate power. And yes, from a logical perspective, legitimate power should supersede all other kinds of power to maintain law and order within an organization. Reward power and the other kinds of power can be used as per the demand of the situation.

4 seq NL_a r 0 h . Cite examples in which you have been committed, compliant, and resistant as a result of efforts to influence you. Think of times when your attempts to influence others led to commitment, compliance, and resistance.

I have engaged in a number of political conversations with my peers on many occasions. On most of them, the general behavior that has continued is of resistance. Although, on others, I have found some compliance and commitment from individuals.

5 seq NL_a r 0 h . Do you agree or disagree with the assertion that political behavior is inevitable in organizational settings

In my opinion, to a certain extent yes. When dealing with individuals who demand a little too much out of you, political behavior can help a person in navigating the situation.

6 seq NL_a r 0 h . Recall examples of how you have either used or observed others using the techniques

of political behavior identified in the chapter. What other techniques can you suggest

I have observed a lot of people using techniques of political behavior unknowingly. The people who rally to gain influence in the organization are usually seen implementing patterns of political behavior. Making coalitions and impression management are one of the most used techniques.

7 seq NL_a r 0 h . Recall an instance when you have experienced each of the four forms of organizational justice in either a positive or negative manner.

In a positive manner, I have experienced all four forms of organizational justice in the workplace. Interactional and distributive forms of justice are usually very easily implemented in a workplace. In the organization that I worked for, we were being equally paid and equally treated so there was no issue there. But people who had a more experience had an issue with that policy because they demanded a little more respect then what was afforded to them.

8 seq NL_a r 0 h . Are certain forms of conflict more likely than others to be associated with each level of interdependence In what way

There is more of a chance of conflict in reciprocal inter-dependence. In reciprocal inter-dependence, there is maximum interaction between departments and the workflow is cyclical. This can cause the functionality between departments to slow down.

9 seq NL_a r 0 h . How comfortable are you personally in dealing with conflict

I am pretty comfortable while dealing with conflict as I have been taught to listen to both parties, while staying neutral, and then calm the situation down with polite words. In an organizational setting, one can not simply put out decisions and expect people to get along with it as emotions usually run very high.

seq NL1 10 seq NL_a r 0 h . Why dont people engaged in all negotiation situations try to adopt a win-win mentality

Most of the time, people who are engaged in negotiations only care about themselves and this selfish attitude makes negotiations very difficult. A person needs to be self-assured and confident to enter a negotiation with a win-win mentality.

.

2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

.

.

IJXl ) , 5 6 7 8 9 K L fWNNNNhch2aJh25CJOJQJJ-hh5CJOJQJJmHnHuhh5CJOJQJJjhh5CJOJQJUJhOJQJh9hOJQJh9h5OJQJh5OJQJhOJQJaJh2SOJQJaJhp)hOJQJaJjhp)hOJQJUaJI / r8gd gdI8gdixgdix-D9DM gdZgd agdb gd agdagd . _ w . / 5 P vvvvvvvvvvo hch a hchb hb CJOJQJJhh5CJOJQJJmHnHuhh5CJOJQJJ(jhh5CJOJQJUJhchaJhchPaJhchTaJhchWaJhch aaJhch2aJ hzaJ

1 2

0

2

c

h

m

n

q

0asvvvvvvvvvvvvvv.hchX@BaJeh@phr@(hE3@BaJeh@phr@.hche@BaJeh@phr@hh5CJOJQJJjhh5CJOJQJUJhI85CJOJQJJ hchb hch a,2345@Bepqlccccccccccccccccccccc haJhchTaJhT5CJOJQJJhh5CJOJQJJjhh5CJOJQJUJhI85CJOJQJJhP5CJOJQJJhch6@BaJph.hchX@BaJeh@phr@.hch@BaJeh@phr@qrst5C_d3qqqqqjVhchaJhchixaJ

hix5aJhI8h5CJOJQJJjhI8h5CJOJQJUJhchPCJOJQJJhchixaJhix5CJOJQJJhh5CJOJQJJjhh5CJOJQJUJhI85CJOJQJJhchPaJH_x78NadBOa hchh hchh5CJOJQJJhI8h5CJOJQJJ(jhI8h5CJOJQJUJhI85CJOJQJJhchPaJhchBNaJhch-aJhchaJ1x7DPYdhuv Bxnnnnnhch-aJhP5CJOJQJJhF5CJOJQJJhF hch rW hch) hch16 hch)h-5CJOJQJJhI8h5CJOJQJJ(jhI8h5CJOJQJUJhI85CJOJQJJhchqCJOJQJJ8,GIKgdQagd8gd8gdgdF gd-gdBERj ,-6789MNP )9unnnnngn hchd hch5m hchRh85CJOJQJJhI8h5CJOJQJJmHnHuhI85CJOJQJJmHnHuhI8h5CJOJQJJ(jhI8h5CJOJQJUJhchPaJhchaJhchAaJhch-aJ

h.aJ9EOb AGIKLMNOPQ hQhhCJOJQJaJhhjhUhchPCJOJQJJ hch6 hch.KLMNOPQgd8gdQF 00PP1hpQ/ Dp y2 0@Pp2( 0@Pp 0@Pp 0@Pp 0@Pp 0@Pp 0@Pp8XV8XV 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@666666_HmH nH sH tH @@ _Normal@CJ_HmH sH tH jj_ Heading 1@-5CJKHOJQJ_HmHnHsH tH u66_ Heading 2@BB_ Heading 3@CJOJQJDD_ Heading 4@6CJOJQJFAF_ Heading 5@56CJaJDD _ Heading 6

@ 5aJBB _ Heading 7

@CJaJHH _ Heading 8

@6CJaJJ J _ Heading 9

@OJQJJaJDA D _Default Paragraph FontViV _ Table Normal V 44 la (k (_No List FoF _ Body textxCJ_HmH sH tH 88 _ Body 1vert _

Body centereda2) 2 _ Page NumberCJ44 _Bullet-1 FT/T_ChapNumCJOJQJ_HmHnHsH tH u44 _Bullet-a FX/X_ ChapTitle5CJ(OJQJ_HmHnHsH tH u @r _Footer

CJOJQJF@F _Header

05CJOJQJ44 _Indent-1 Indent-1 WOL

6Z4O4 _NL-188 _NL-(1)LL NL-1 deep

h8,, NL-AOJQJ44 _NL-a00 NL-I OJQJ88 _ Bullet-(1) F/ Page number CJOJQJ@Z2@ Plain Text@CJOJQJHH _ Table titlea5CJOJQJ_ChapSummaryHeadDD_LearningObjctiveHead_ChapOutlineHead44_ KeyTermsHead(DD_AllQuestionTypesHead)LLAllQestionTypesMixedHeadDD_AllAnswerTypesHeadx44_ SectionHeadA,22_ SampleHeadA-44_ SectionHeadB.LL_AllQuestionTypesHeadSub1/22_ SampleHeadB0414_ SectionHeadC1L1L_AllQuestionTypesHeadSub22212_ SampleHeadC344 _ Instructions466

EssayQuestion5PP _MultipleChoiceAnswersRunin6FF _LearningObjectiveText7 ChapOutlineText8 _ EssayAnswer 9

ZZ _TrueFalseNumList

QuestionNumListDD _EssayQuestionNumList _MultipleChoiceNumList _KeyTermsNumList88 _Answer-1

8ZZ _AnswerByReference@

LL MatchQuestionNumList1ColA/ _Bold5616 DefKeyTermsBoldL/AL _ ProcessedehfHq r6R6 NL-1WOLE

X66 _

FillinNumListF0r0 Answer-aGll _MultipleChoicePossibleAnswerH44 _ Body 0vertI44 _Indent-a J88 _ Indent-(1) K88 NL-1 1vert L44 NL-1 0vertM22 _ MatchAnswerN ULO UL-2P UL-3Q44 _FootnoteROJQJBB _

Table headingS 5OJQJ(/A( _Italic6 BQ _TermBa DefKeyTermsExItal0Bq0 EssayAnsItal _NoneNN MultipleChoiceAnswerCorrectRR MultipleChoiceAnswerIncorrect88 TrueFalse Answer66 NL-aWOL

_WOL Asis3 Asis1_TT _ PartTitle./5CJ4OJQJ _ KeyTermsText a NL-x-FLbhh828 NL-x-1cTT_

AppendixTitled5CJ(OJQJmHnHuDTRD _ Block Textexb Asis2fr Assisi1gq Assisi2hq Assisi3i NL-a-FLj22 _ Outline-Ik88 NL-x-2l88HH Outline-I deepm@@ NL-I deepn@@66 _ Outline-A o66 _ Outline-1 p66 _ Outline-a q _ Outline-(1) r _ Outline-(i) sz z L1BL Outline-(i) deeptH H R _Table cell bodyu0/a0 _ Small capsBq MatchAnswerCorrect88_SupplementHeadx _Labely5BJB Subtitlez@aOJQJBB B _ Body Textx_HmH sH tH 6A6 _

Graphic TitleVV _MatchQuestionNL

888 8

_TOC 1x

5aJ88 _ Indent-(i) XX _Ancillary titlea5CJ0OJQJ _Volume x CJ(OJ QJ BB _ Main titleaCJH _

Main subtitleCJ0BB _Edition 8CJ OJQJDD _ Main authors CJ OJQJTT _Ancillary author 5CJOJQJZrZ Ancillary affiliation CJOJQJ HMCO 5CJOJQJ/ HMCO cities CJOJQJ88 _MastheadOJQJ@/@ _ MastheadName6CJOJQJ _ Copyright POJQJHH _Copyright sale xOJQJNN _Copyright nonsale xOJQJDD _ Madeintheusa OJQJ44 _ISBN OJQJHH _ Printer code CJOJQJ6 6

_TOC 2 aJ8 8

_TOC 3 6aJ2 2

_TOC 4 XXaJ2 2

_TOC 5 aJ2 2

_TOC 6 aJNr N MultipleChoiceStats

_ BOY_MCStats

HH _ BOY_MCTopic5B B BRN_MCAnswer

52q 2 BRN_MCStatsQ Table cell assisiPP _

PageBreakParad CJ OJQJDD _ NL-1 tablexZ Z OBR_ShortAnsEssay

-2q 2 BRK_MCStats2q 2 OBR_MCStats0 0 _ AnswerLetterRQ2 R _Table cell body centeredaVQB V Table cell body indent FL hhQR Table cell body indent FRhhaN1N _Table heading centereda@1@ _Table heading 10CJX1X _Table heading centered 10aCJLQL _Table cell body 10 CJOJQJN N Table body centered 10aR R Table body indent FL 10 hhX X Table body indent FR 10hha44 _TOC Base

. .

_TOC 7 ((. .

_TOC 8 . .

_TOC 9 LL NL-1 deep no WOLFF _CaseHead @5CJ OJQJD D _ CaseTitle x@56OJQJ66 _ TransText5CJ8BA B _ TransBullet F

pJJ _ TransHeadX@a 5CJ8A _TransTextSmallCJ@ @ Indent-1 table EssayQuestionTB

Index 1R Body Text Indent 2G

/0h8p @ P 818@CJS Body Text Indent 3G

/0h8p @ P 1@CJQ Body Text 3 5@CJC Body Text IndentG

/0h8p @ P 1 5@CJB B Comment ReferenceCJaJ8 8 Comment TextCJRY R _ Document Map-D M OJ QJ J 44 _Indent-5 .. _KeyTerm5(B ( Style1

FigureCaption5CJ,a , _ Answer_Exph/r hDSNL

daOJ QJ _HmHnHsH tH uR/ RDSBdxaOJ QJ _HmHnHsH tH uHH_AllAnswerTypesHeadSub1H1H_AllAnswerTypesHeadSub2LL _LearningObjectiveNumList _ SidebarHeadIdddd@NOPQ5v v _ SidebarTextFddddNOPQ0_ 0 _ HTML Acronym88 _Indent-6z z XX _MultipartQ_Leadx@ZZ _MultipartQ_Questionx@ _MultipartQ_NextAnswerx@ZZ _MultipartQ_NextAnswer_ByRefx@ _ SidebarBull_ F

jddddNOPQ _MultipartQ_FirstAnswer_ByRef

-x-@jj _MultipartQ_FirstAnswer

--44 _Captionx5

_Index 3 _SidebarNumListFddddNOPQDQD _Metadata

--N1

N SLearningObjectiveBull FJ J _SidebarCaseHead5CJOJQJJJ _StageDirections xa56HH _AnswerDistractor

8JJ _ Affiliation 6CJOJQJJ/J _ AutoCorrectCJ_HaJmH sH tH @@ _Body 1vert above@@ _Body 3vert below@@ _Body text-righta A _Endnote ReferenceH22 _ExtractxCJ,a, _ KeyTermDef_KeyTermsSubheadJ J _SidebarIndent-1X X _Table cell body centered 10a_Heading 2 Core56,, _Source6HH_ Box StartdNTT_Box End,(ddNP _ Endnote Text@CJXX _Chapter Opening Start-DM JJ _Chapter Opening End (FF _Chapter Closing StartJJ _Chapter Closing End (HH _ TextBoxType-DM CJ _KeyTermDefinition6/Q6 _

KeyTermInLine5 _Graphic Caption5_TitleHM00_ SubtitleHM _Graphic Source5 _Graphic Number5

_Sample Citation@xx@ @OJ QJ BB _ Bullet-(3)

BB _ Bullet-(5)

z z z BB _ Bullet-(6)

c

d

d

BB _ Bullet-(4)

F/F _Emph Smallcaps7HSY(rr_Workbook-FillinNumListdx@mHnHuLL _WorkbookHeader

xCJaJTT

_Workbook-Indent-1dx@TT

_Workbook-Indent-adx@FF _ HintsBelowd(6CJ6U a6 Hyperlink BphHrH Balloon TextCJOJ QJ J aJ@j @ Comment Subject5(( _NL_Num (( _NL_1.1 _NL_Even (( _NL_Odd NN _ MC-Answer-1

8@@88@@_ChapOutlineSubhead66 _ MiscNLRomanxb/b_Heading 1 Char-5CJKHOJQJ_HmHnHsH tH u44_Heading 2 CharNN _ CitationHead xx5CJOJQJBB _CitationSubhead@ _CitationDD2R2_ EssayAuthor00_ EssayTitle8q8_EssayAuthor Char66_EssayTitle CharN/N ToComment Text Char@_HmH sH tH vv oo Case titledhxxa.5@CJKHOJ PJQJ J aJmH sH xx oo

Case Num list( F

h@OJPJQJJmH sH oo Normal (Web)CJaJL/L Body Text1xCJPJ_HmH sH tH N N

Medium Grid 2CJ_HaJmH sH tH / 6tPKContent_Types.xmlN0EH-J@ULTB l,3rJBG7OVa(7IRpgLr85vuQ8CX6NJCFB..YTe55 _g -Yl6NPK6 _rels/.relsj0 Qv/C/(hO Chvxp_P1H0ORBdJE4bq_6LR70O,En7Lib/SePKkytheme/theme/themeManager.xml M @w7c(EbCA7K

Y,

e.,H,lxIsQ ,jGW)E 8PKtheme/theme/theme1.xmlYKo7Xd7 GJK.eG9R@ZP

z1MDi siLaI/N, IQ XwB

2ZCXFKqKJ WD 0TcKBcqYT(NmONIkwLWfxAiRvr@2SNque_F78TkPvE A67meiW

(IKR6u7n@A4D3RIiGhQB 8HA(aKniOEE0KK9gZ76z/L_zS.Lq__phhC_MbJ@ R8wddmjcp/IDg6wZ0sDw r,qlEyDQQ,c8B,gxMDM./SAeQFSDbjE7CbNpr8fnFrI.1fV21(tkJV1/ QL07fVIhcMZ6/H bWGv TsBCtLQJxyJ C (tRQe1/-/A_Y)6(p_Nnjzb-nVb.7pMMMM ud9c47iV7df 5j

z9JrJ3Ax FU9i3Q/B)LRPx)04N O agYeHjkblChPWalfpX OAXlXVZbr

Zy4Sw3WhPxzSqyu,.in6 mgV/C,jSAh4@3Sm

CcBs

rHDuALqW@C48v2Pn7VKYpVlE7AUeexwPx ,ot eU3gpsq530BUMZ4Ube9i5j ,zE5714g1nsBW 0xnGDA0Y4rl@2E5,bhWjKm68.wB.GtO

-/PK

theme/theme/_rels/themeManager.xml.relsM 0woo5

6Q

,.aic21hqm@RNdo7gK(MR(.1rJT8VAHubP8g/QAs(LPK-Content_Types.xmlPK-6 0_rels/.relsPK-kytheme/theme/themeManager.xmlPK-theme/theme/theme1.xmlPK-

theme/theme/_rels/themeManager.xml.relsPK xml version1.0 encodingUTF-8 standaloneyes

aclrMap xmlnsahttp//schemas.openxmlformats.org/drawingml/2006/main bg1lt1 tx1dk1 bg2lt2 tx2dk2 accent1accent1 accent2accent2 accent3accent3 accent4accent4 accent5accent5 accent6accent6 hlinkhlink folHlinkfolHlink/Q4 qB9Q8KQ578K1s ,69MQ 8@0( B S biORORccd d dBERjORccd d dBERjORmEZIkJo6DV@,tLTtX_vZ4mz -()Xl4/fJU78i/9v QVZFYY fYJjH n,opZXnxxK

)28QKbtL8JS. OJQJo( 88OJQJo(OJQJJo(o p OJQJo( @ OJQJo( xxOJQJo(HHOJQJJo(o OJQJo( OJQJo(h hH.h hH.h pLppLhH.h @ @ @ hH.h hH.h LLhH.h hH.h hH.h PLPPLhH.jjjBOJQJo(ph OJQJo(o OJQJo( OJQJo( OJQJo(o OJQJo( 000OJQJo( ---OJQJo(o ///OJQJo( hhhOJQJo( OJQJo(o pppOJQJo( @ @ @ OJQJo( OJQJo(o OJQJo( OJQJo( OJQJo(o PPPOJQJo( hhhOJQJo( OJQJo(o pppOJQJo( @ @ @ OJQJo( OJQJo(o OJQJo( OJQJo( OJQJo(o PPPOJQJo(h hhhhH.h 888hH.h LLhH.h hH.h hH.h xLxxLhH.h HHHhH.h hH.h LLhH.o(..pLppL.@ @ @ ..LL...PLPPL. OJQJo( OJQJo(o pppOJQJo( @ @ @ OJQJo( OJQJo(o OJQJo( OJQJo( OJQJo(o PPPOJQJo( hhhOJQJo(hOJQJo(hHh hH.h pLppLhH.h @ @ @ hH.h hH.h LLhH.h hH.h hH.h PLPPLhH.BOJQJo(ph OJQJo(o Z Z Z OJQJo(

OJQJo( OJQJo(o OJQJo( OJQJo( jjjOJQJo(o OJQJo(h OJQJo(h OJQJo(oh OJQJo(h OJQJo(h xxxOJQJo(oh HHHOJQJo(h OJQJo(h OJQJo(oh OJQJo(h v v v OJQJo(h F

F

F

OJQJo(oh OJQJo(h OJQJo(h OJQJo(oh OJQJo(h VVVOJQJo(h OJQJo(oh OJQJo( OJQJo( OJQJo(o pppOJQJo( @ @ @ OJQJo( OJQJo(o OJQJo( OJQJo( OJQJo(o PPPOJQJo( hhhOJQJo( OJQJo(o pppOJQJo( @ @ @ OJQJo( OJQJo(o OJQJo( OJQJo( OJQJo(o PPPOJQJo(BOJQJo(ph s s s OJQJo(o C C C OJQJo( OJQJo( OJQJo(o OJQJo( OJQJo( SSSOJQJo(o OJQJo(hhhBOJQJo(phhHBo(phhH.pppOJQJo(hH@ @ @ OJQJo(hHOJQJJo(hHoOJQJo(hHOJQJo(hHOJQJJo(hHoPPPOJQJo(hHBOJQJo(ph OJQJo(o pppOJQJo( @ @ @ OJQJo( OJQJo(o OJQJo( OJQJo( OJQJo(o PPPOJQJo(BOJQJo(ph s s s OJQJo(o C C C OJQJo( OJQJo( OJQJo(o OJQJo( OJQJo( SSSOJQJo(o OJQJo(T....... .... .....

......

.......

........BOJQJo(ph OJQJo(o pppOJQJo( @ @ @ OJQJo( OJQJo(o OJQJo( OJQJo( OJQJo(o PPPOJQJo(h pppOJQJo(h @ @ @ OJQJo(oh OJQJo(h OJQJo(h OJQJo(oh OJQJo(h PPPOJQJo(h OJQJo(oh OJQJo(BOJQJo(ph OJQJo(o pppOJQJo( @ @ @ OJQJo( OJQJo(o OJQJo( OJQJo( OJQJo(o PPPOJQJo(

hhh5Jo(.J.pLppLJ.@ @ @ J.J.LLJ.J.J.PLPPLJ.h 888OJQJo(h OJQJo(oh OJQJo(h OJQJo(h xxxOJQJo(oh HHHOJQJo(h OJQJo(h OJQJo(oh OJQJo(h 888OJQJo(h OJQJo(oh OJQJo(h OJQJo(h xxxOJQJo(oh HHHOJQJo(h OJQJo(h OJQJo(oh OJQJo(_v nJ_vZXnxJ_vZXnxmzl4Lo6D Q@f

)()JjVop/9ITtJU7mE-0LFY8QK8QK p f _x f 4 6 /k x(2 n @3 p9 g x UD(vuLwD(U-.@LwpD)6 JpLqbLqqFFT4c3G b ixoot(u()j,o,v0E316N7I8eN_k-MBNPQSV rW0ZX(M_U_hazjoTo1pZ

qXqtqEsx6zi4qu/ a5mK)eU6qH8DJ j8R.(2SqYZT2SzdS.6 g-V@PDWcvv0,Ad-_i@jjjQ@UnknownGAx Times New Roman5Symbol3. Cx Arial7.@ CalibriA.Arial NarrowcHelvetica-NarrowArial Narrow3Ax Times.Arial Black Cx Courier New. Cx Helvetica5..)TahomaK Janson TextArial7CenturyC., @Calibri LightWingdingsA BCambria MathHhCf pr462 3qHPe2xx)) WCDocuments and SettingsmcgannsApplication DataMicrosoftTemplatesHM Ancillary.dotpara 1natsha Proofreadert

Oh0 H T

ltpara 1natshaHM Ancillary Proofreader2Microsoft Office Word@F@RX@Ll

@Ll

.,D.,D hp

K2 Software, Inc. para 1 Titlex /

K

StyleVersion SappVersion XMLStatusType_AdHocReviewCycleID_EmailSubject

_AuthorEmail _AuthorEmailDisplayName _ReviewingToolsShownOnce Version ChapterNumber

ChapterTitle1.02.37NOIRMDMissing IRM chapterskeaton.paul@uwlax.eduKeaton Paul N5.0014,Power, Politics, and Organizational Justice

(),-./0123456789@ABCDEFGHIJKLMNOPQRSTUVWXYZ_abcdefghijklmnopqrstuvwxyzRoot Entry F mData 1TableLWordDocumentH4SummaryInformation(DocumentSummaryInformation8CompObjr F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q

Subject: IT

Pages: 1 Words: 300

Paper

Paper

Name

School or Institution Name (University at Place or Town, State)

Paper

A computer is just a piece of hardware if it I not equipped with the operating system. An operating system is a software that manages the hardware resources and allows the applications to run on the hardware. With the standardization of building computer hardware, the race for developing operating system has emerged. At earlier different companies were developing proprietary operating system compatible with specific hardware only. One such operating system is known as the UNIX operating system ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"okdUw3v5","properties":{"formattedCitation":"(Sarwar & Koretsky, 2018)","plainCitation":"(Sarwar & Koretsky, 2018)","noteIndex":0},"citationItems":[{"id":57,"uris":["http://zotero.org/users/local/Ugrd7iAF/items/GRYL5P4M"],"uri":["http://zotero.org/users/local/Ugrd7iAF/items/GRYL5P4M"],"itemData":{"id":57,"type":"book","title":"Linux: The Textbook","publisher":"CRC Press","ISBN":"1-351-76829-8","author":[{"family":"Sarwar","given":"Syed Mansoor"},{"family":"Koretsky","given":"Robert M."}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Sarwar & Koretsky, 2018). UNIX was developed in Bell Laboratories by the iteration of the Multics project. The purpose of the developers was to build a multiuser operating system with a single storage system. In early iterations, UNIX remained as proprietary software and raised questions for developers to develop a free and open source operating system.

Linus Torvalds created Linux as compared to the UNIX. He purchased an IBM compatible personal computer in 1991. The computer was equipped with a disk operating system developed by the technology giant Microsoft. He wanted to use UNIX on his computer, and he found out that he can buy the cheapest version of UNIX in $5,000. It was the point when he started thinking about an open source operating system that provides computing freedom to the general public as well. Along with many other programmers he worked on Linux kernel, and after two years of hard work in 19994, version 1.0 of the Linux kernel was released.

Linux is open source software meaning that the source code of the operating system is available to the public. Anyone having the code can use distribute modify and improve the code as well. Whenever the word Linux is used it usually represents the operating system, but Linux is just a kernel ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"EkCkG4o6","properties":{"formattedCitation":"(Xu & Zhou, 2018)","plainCitation":"(Xu & Zhou, 2018)","noteIndex":0},"citationItems":[{"id":58,"uris":["http://zotero.org/users/local/Ugrd7iAF/items/XFLPUI87"],"uri":["http://zotero.org/users/local/Ugrd7iAF/items/XFLPUI87"],"itemData":{"id":58,"type":"article-journal","title":"A Multi-level Dataset of Linux Kernel Patchwork","author":[{"family":"Xu","given":"Yulin"},{"family":"Zhou","given":"Minghui"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Xu & Zhou, 2018). The kernel is the core of any operating system that controls the hardware management of the operating system and over the top applications. Linux kernel was developed from scratch, but it inherited many commands from a UNIX system. Most of the libraries and packages are being used from the GNU program which is also an open source program. Although many commands are same for UNIX and Linux but Linux is not a derivative of UNIX. Thousands of programmers around the world contribute to the project and develop applications and operating system programs for Linux.

Linux is mostly used for server computing due to the ease of customizations and open source project. Most of the internet is powered by Linux servers ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"9AFixAyd","properties":{"formattedCitation":"(Sinitcyn et al., 2018)","plainCitation":"(Sinitcyn et al., 2018)","noteIndex":0},"citationItems":[{"id":59,"uris":["http://zotero.org/users/local/Ugrd7iAF/items/AUIKUYMQ"],"uri":["http://zotero.org/users/local/Ugrd7iAF/items/AUIKUYMQ"],"itemData":{"id":59,"type":"article-journal","title":"MaxQuant goes Linux","container-title":"Nature methods","page":"1","author":[{"family":"Sinitcyn","given":"Pavel"},{"family":"Tiwary","given":"Shivani"},{"family":"Rudolph","given":"Jan"},{"family":"Gutenbrunner","given":"Petra"},{"family":"Wichmann","given":"Christoph"},{"family":"Yılmaz","given":"Şule"},{"family":"Hamzeiy","given":"Hamid"},{"family":"Salinas","given":"Favio"},{"family":"Cox","given":"Jürgen"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Sinitcyn et al., 2018). With the increased penetration of personal computers, people are using the Linux operating system on their home computers as well. The exponential increase in personal computing urged developers to create their customized Linux distributions tailored for the needs of common desktop users. All the Linux distributions are based on the same Linux kernel but different desktop environment such as Debian, KDE, etc.

UBUNTU:

UBUNTU is the most popular Linux based desktop operating system. It is backed by Canonical on Debian packages. It is most popular among users of personal computers due to the simplicity and ease of navigation. It provides users with a large collection of ready to install applications using a graphical interface instead of a command line approach. It requires at least a Pentium IV computer along with 2 GB of main memory.

Linux Mint:

Linux Mint is another Linux kernel-based desktop operating system distribution. It is usually recommended for people migrating from Windows operating system to the Linux because the desktop environment is more or less similar to that of the proprietary operating system. It is available in three main types, Cinnamon edition which is the latest innovation from the developers, Mate edition which id more stable as compared to the Cinnamon edition, and Xfce edition which is a stripped-down, lightweight version of the operating system for low-end devices. Basic requirements remain the same as for UBUNTU.

Fedora:

Fedora is Linux kernel-based operating designed for heavy loads and workstations mainly. Most of the web servers are based on the Fedora server distribution package. The company provides many support options that allow the developers to capture the enterprise market for Linux. Basic hardware requirements are the same for eth fedora as well. The company is supported by RedHat Linux which specializes in Server-side operating system development.

Elementary:

The elementary operating system is developed by at-least hundred developers. It is based on UBUNTU. It has a sleek and modern desktop environment like Macintosh. It is recommended for people looking for free alternative to Windows or Macintosh operating systems. It is secure, and updates are released frequently to patch up discovered security holes in the operating system. System requirements are 500 MHz of the central processing unit, and one gigabyte of random-access memory.

Synopsis:

Ubuntu will release a feature update of its long-term support release version 18.04 consisting features from the latest version ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"ORD9YR5U","properties":{"formattedCitation":"(Nestor, n.d.)","plainCitation":"(Nestor, n.d.)","noteIndex":0},"citationItems":[{"id":55,"uris":["http://zotero.org/users/local/Ugrd7iAF/items/ABS6TVZV"],"uri":["http://zotero.org/users/local/Ugrd7iAF/items/ABS6TVZV"],"itemData":{"id":55,"type":"webpage","title":"Ubuntu 18.04.2 LTS to Arrive on February 7 with New Components from Ubuntu 18.10","container-title":"softpedia","abstract":"May include a new kernel and an updated graphics stack","URL":"https://news.softpedia.com/news/ubuntu-18-04-2-lts-to-arrive-on-february-7-with-updated-components-524785.shtml","language":"english","author":[{"family":"Nestor","given":"Marius"}],"accessed":{"date-parts":[["2019",2,5]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Nestor, n.d.). Along with improved features, the new release will also be based on the latest Linux kernel as well. The user community is excited to see a newer version of GNOME desktop environment along with the change in the kernel. The new release may not update the desktop software because in long term support release cycles the stability of the operating system is more important than the newer software versions. The release will be codenamed as point two feature release of 18.04 LTS version of Ubuntu.

References

ADDIN ZOTERO_BIBL {"uncited":[],"omitted":[],"custom":[]} CSL_BIBLIOGRAPHY Nestor, M. (n.d.). Ubuntu 18.04.2 LTS to Arrive on February 7 with New Components from Ubuntu 18.10. Retrieved February 5, 2019, from https://news.softpedia.com/news/ubuntu-18-04-2-lts-to-arrive-on-february-7-with-updated-components-524785.shtml

Sarwar, S. M., & Koretsky, R. M. (2018). Linux: The Textbook. CRC Press.

Sinitcyn, P., Tiwary, S., Rudolph, J., Gutenbrunner, P., Wichmann, C., Yılmaz, Ş., … Cox, J. (2018). MaxQuant goes Linux. Nature Methods, 1.

Xu, Y., & Zhou, M. (2018). A Multi-level Dataset of Linux Kernel Patchwork.

Subject: IT

Pages: 3 Words: 900

Participant Assessment

Organization Overview

TFF runs a few workplaces from Head Office. The present systems are Windows XP machines, Microsoft Small Business Server, Linux Red Hat File Server and a Microsoft SQL Server. At present the system execution isn't adequate, as the Manufacturing Supervisor featured the system does not populate asks for quick enough, and the Sales Manager has expressed assembling can't stay aware of offers.

There is as of now no VoIP service, remote administration/access or Virtualisation being utilized by the customer. All services should be refreshed to current operating systems and hardware to guarantee the proficiency of the group isn't ruined. CIO has expressed that the correspondences setup and remote at Mt Burr can be disregarded as this has as of late been redesigned; every other innovation should be checked on and setup at the earliest opportunity.

Some of the objectives are:

Give the customer increasingly current hardware for document servers and the SQL database;

In house web server with proper security;

VoIP execution for interchanges;

Virtualisation alternatives with repetition on a domain level;

Viable requesting system for online requests to speak with an in-house database and;

Remote access to database and inward assets.

Hierarchical Structure

There are right now four fundamental locales for TFF – Head Office situated in Millicent, Mt Burr, Pts. Pirie and Adelaide. There is as of now interconnection between the destinations (it is viewed as a WAN) at present.

Each site goes about as a free substance and has their very own foundation, all with an obsolete hardware framework.

Administrator

The administrator division (Data Entry Officers) dwell in the head office at Millicent. All PCs keep running on Windows XP SP1 and have not been refreshed for more than 12 years. These PCs draw in an on reason document server and SQL database, and utilize an inner exchange server for E-Mail. These clients are right now content with the PC's despite the fact that comprehend the execution speeds cause issue. Because of the age of the system and the software utilized, moving up to a later Operating System may cause issues with running software.

The administrator office is intensely dependent on E-Mail and access to the Microsoft Windows Small Business Server – both are viewed as a basic IT service.

Operations and Systems

The business office are adversely affected by the postponed data exchange to the assembling office, anyway have quick access to the servers housed at Millicent. The business office has seen an expansion of 5% in the earlier year and subsequently required more hardware foundation to help the development of the division.

This site is right now working at ideal settings, anyway might want to be setup as the failover if Admin faces basic issues.

The present telephone system here isn't working at ideal dimensions, and along these lines E-Mail and Social Networking has turned into a basic IT service; an in-house exchange server ought to be setup here for quicker access.

Operations

The new observed location will open up soon and will utilize roughly 25 representatives; it is evaluated just 6 staff will require a PC while every single other client operate apparatus. Mt. Burr will get another correspondences rack and ADSL2 association back to Millicent (HO). As this site is recently opened there is no current framework set up, so SkillageIT will "begin starting with no outside help". This site will expect access to the in-house database, telephone system, fileserver access and EMail.

This site is arranged in a remote area and will be hard to direct/keep up in the occasion issues happened. This site should be virtualised and have a repetition interface so any failover does not leave clients without any services for an all-encompassing time allotment.

There is at present no failover setup for IT issues, reinforcement arrangements or remote administration/get to.

This will be cultivated by single-sign on applications utilizing Citrix XenApp. Failover routes, reinforcement arrangements and an audit of current security strategies. The starter "organize" layout has been structured and distributed as beneath. This does not at present incorporate the hosted exchange server, reinforcement arrangement or repetition joins.

System Virtualisation

With the physical hardware chose for server redesigns, the capacity to execute hardware virtualisation through Hyper V 3.0 winds up accessible. Hyper-V, in the past Windows Server Virtualisation, is a utility that enables numerous servers to be hosted on the one physical machine. This implies one machine can be overseen as a File-Share, DNS server, DHCP server or whatever job is required through the business. A portion of the key uses for Hyper-V could be the utilization of making virtual Windows XP machines to help age-old projects, or help new client's progress from their more established PCs. This VM condition can likewise be used for testing purposes for application settings and other true settings before applying them to locales.

By empowering server virtualisation in a data focus, or over a fast WAN, virtual server pictures (.vhd) can be moved crosswise over host machines in a live situation. Using hardware that can play out this capacity will permit TFF a more noteworthy uptime rate and will bring down their downtime.

Expecting Server An and Server B are the two Eland Pro Pedestal, all having the DC, DNS, DHCP and Exchange Server hosted on Server A. In case of system issues on reason, or the prerequisite to move starting with one site then onto the next, Window's Server 2012 with Hyper-V 3.0 can live relocate a VHDX (Virtual Hard Disk) from Server A to Server B. In this procedure, clients are as yet ready to get to Server A's document in a read just organization, yet will compose all progressions to Server B.

By using this apparatus, there is a more noteworthy adaptability in moving servers and data from site-to-site with next to zero downtime. The key job server virtualisation can perform for TFF is the capacity to take depictions of servers progressively; in case of an assault or glitch on the server, the server with the troublesome VHD can be decommissioned and the more established VHD setup.

There are a few extra servers that will be sent for TFF, each with their own unique job. The fundamental jobs to be viewed as are the Active Directory FSMO jobs and the Global Catalog Server.

Domain Controller with DNS and DHCP Role

The Master Domain Control has the DHCP and DNS job connected this DC additionally runs all the Master FMSO jobs for the TFF Company. This Domain Controller additionally houses the dynamic index service and is the base of the TFF woodland. This DC is basic for TFF; any downtime from this machine and there will be group-wide downtime for all locales.

RO-Domain Controller

The Read-Only Domain controller will be executed for repetition. In the occasion the ace DC (tffdc1) goes down (and the reinforcement takes lead), the adaptability to advance this DC ought to be available. This Read-Only Domain serves the motivation behind duplicating the fundamental DC for an excess and goes about as a heap balance for DNS asks.

References

Gopisetty, S., Korupolu, M. R., Mohapatra, D., Murthy, S. S., & Singh, A. (2019). U.S. Patent Application No. 10/203,993.

Padala, P. R. (2018). Virtualization of Data Centers: study on Server Energy Consumption Performance.

Jain, N., & Choudhary, S. (2016, March). Overview of virtualization in cloud computing. In 2016 Symposium on Colossal Data Analysis and Networking (CDAN) (pp. 1-4). IEEE.

Morabito, R. (2015, December). Power consumption of virtualization technologies: an empirical investigation. In 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC) (pp. 522-527). IEEE.

Subject: IT

Pages: 4 Words: 1200

PC Purchase

Your Name

Instructor Name

Course Number

Date

PC Purchase

In this task, we will analyze and compare two Personal Computers from two different retailers. Based on the requirement and limitation of the cost, the task is to select the best out of two systems by thoroughly determining software and hardware requirements and specification of the computers. The main and most important thing to consider before buying a system is the purpose of purchasing one. The hardware and software requirements of the system vary based on the purpose for which one wants to buy a PC. While purchasing a system, a person needs to keep the purpose in mind. This is necessary to buy a compatible and desired product.

Purpose of buying a PC

My primary purpose in buying a computer is primarily for study purposes and also for gaming but considering it a secondary use. Considering studies the users are related to running different software applications and browsers without any problem and issue. In studies related to software and electrical, often, it is required to carry out many complex simulations and processes which consume a lot of RAM when operational. Sometimes, it is also required to install other operating systems along with the original operating system. The examples of such use are the installation of virtual machines and virtual frameworks to enable other systems operational on your computer. This suggests that the microprocessor must be compatible/powerful enough to support such applications and operating systems. Regarding gaming, generally, the main requirement is processor and graphics. A computer must be compatible to support graphic cards to allow ordinary and average complexity level games. These are some of the purposes of buying a computer, and we will now compare two PC’s to select the best one based on our requirements.

Software

One of the very important software required for study purposes is Microsoft Word. The basic software required for installation is Microsoft windows, Microsoft word, Antivirus, PDF pro, and resource kit for Java Integrated Development environment. For gaming purposes, I prefer to buy only one game for the time being 'Call of Duty.' This software is required to be compatible with the hardware system to utilize the services.

Hardware

The two hardware systems we are going to compare in this section are 2020 HP 23 and HP 4NN56AA. The two retailers selected for the comparison are Amazing computer Express and Amazon.com. HP 23 is provided by Amazing computers express while amazon.com is the retailer of HP 4NN56AA. Both the systems are manufactured by Intel Corporation and have equal display sizes of 23.8 inches. The processor model is also the same as both are Intel core i5 computers (Amazon). There is a difference in the size of a hard disk as HP 23 has 1 TB disk space, while that of HP 4NN56AA is 512 GB. There is no graphic description of HP 24 given regarding Graphics description while HP 4NN56AA has integrated graphics, which suggests that there is a plus from the gaming perspective. Both these devices support graphics coprocessors and have Intel UHD Graphics 630. Both the systems have processor count 6, which suggests good processing power. HP 4NN56AA has a CPU processing speed of 1.8 GHz, while that of HP 23 has a processing speed of 1.7 GHz. Both the systems are new and are from 8th generation of the systems, which means they are brand new and have maximum updates.

Cost

We have a cost limitation of $ 1400 in which we have to include both software and hardware requirements. $ 1000 for hardware while 300-400 for software. The 2 Hardware systems compared in the above section are of cost $ 1,159 and $ 969. HP 23 is of $ 1,159 while HP 4NN56AA of cost $ 969.

Talking about the costs of software applications that are going to be installed in the system, the total cumulative price is $ 313. The details are given as:

Microsoft Word: 135Microsoft Window: 60

PDF pro: 50

Norton Antivirus: 20

Java integrated environment: 12

Call of Duty: 36

The cumulative sum for software requirements is equal to $ 313, which is perfect as we were given the range between $300-400.

Conclusion

After analyzing the software and hardware requirements of the systems and also the purpose for which I am intended to buy a computer for use, it is decided to buy HP 4NN56AA. HP 4NN56AA is all in one computer with 12 GB RAM and 512 GB drive of solid-state (Amazon). There are many reasons for selecting HP 4NN56AA over 2020 HP 23

The total cost of HP 4NN56AA is $ 969, while that of HP 23 is $ 1,159. Adding the cost of software requires the total cost becomes $1282.

HP 23 does not have any specification of the graphics description, while the graphics are integrated with HP 4NN56AA.

By making this decision, I am determined that the choice is perfect and will fulfill all the requirements.

Configuration

Amazing computer Express

Amazon.com

Brand and Type of Computer

2020 HP 23 8th generation

HP 4NN56AA8th generation

Operating System

Windows 10

Edition: Home or Pro

Windows 10 Home, Windows 10

Windows 10

Monitor

Color Support

Dimensions (WxDxH)

Horizontal Viewing Angle

Viewable Size

21.30"L x 0.64"W x 16.52"H

Same size dimensions

21.30"L x 0.64"W x 16.52"H

Same size and dimensions

Memory - RAM (GB)

32 GB

12 GB

Hard Drive (GB)

1 TB

512 GB

Processor Brand (X-Core)

Processor Speed (GHz)

1.7 GHz

1.8 GHz

Video Card (integrated or expansion?)

Not specified

Integrated

Software

Office software (Microsoft Office 2019/365)

Microsoft Word 2016

Microsoft Word 2016

Antivirus software

Norton Antivirus

Norton Antivirus

Price

$ 1472

$ 1282

Works Cited

Amazon.com. (2020). 2020 HP 23 All-in-One Desktop Computer/ 23.8" FHD Touchscreen/Intel Hexa-Core i5-8400t Up to 3.3GHz/ 32GB DDR4 RAM/ 1TB HDD +1TB PCIE SSD/DVD/Bluetooth 4.2/ AC WiFi/Windows 10 Home. [online] Available at: https://www.amazon.com/HP-Computer-Touchscreen-Hexa-Core-Bluetooth/dp/B081RHNSQM/ref=sr_1_4?keywords=PC&qid=1578223931&refinements=p_89%3AHP%2Cp_n_operating_system_browse-bin%3A17702486011%2Cp_n_feature_thirteen_browse-bin%3A3078697011%2Cp_n_feature_five_browse-bin%3A13580788011&rnid=2257851011&s=pc&sr=1-4#productDetails [Accessed 20 Nov. 2019]..

 "HP 4NN56AA#ABA Pavilion 24-Inch All-In-One Computer, Intel Core I5-9400T, 12 GB RAM, 512 GB Solid State Drive, Windows 10 (24-Xa0032, Black)". Amazon.Com, 2020, https://www.amazon.com/dp/B07SGH132Y/ref=psdc_13896603011_t1_B081RHNSQM. Accessed 1 July 2019.

Subject: IT

Pages: 4 Words: 1200

Physical Servers

Physical Server

[Name of the Writer]

[Name of the Institution]

Physical Server

Main Post

Physical servers are used to store huge amount of data and information. They act as a storage device and usually used by large enterprise organizations to meettheir their storage demands. Physical servers are often located in server rooms or in data centers and are managed by IT staff of the organization. Most of the servers include two or more physical CPUs with multiple cores. Physical servers enhance data access and sharing (Perlitch, 1991). The advantage of a physical server is that IT staff has access on them 24/7 which helps in meeting the requirements of business crucial problems. A physical server can be located easily anywhere according to the demands of the organization. Organizations can customize and configure the servers according to their business requirements. However, physical servers are very costly and require a lot of physical space. The maintenance of the servers required resources such as air conditions for maintaining room temperature. Physical servers also require a heavy amount of electricity for their maintenance. An organization needs to hire IT staff for the management of servers because without proper knowledge of servers management it is difficult to manage physical servers. All the business operations will be affected in case of hardware failure.

Follow up 1

There are different types of the physical server which provide different functionality according to demand of organization. The different types of servers include a proxy server, mail server, web server, application server, FTP server, open source server, Telnet server, virtual server, etc. All these servers perform different jobs according to their server tasks.

Follow up 2

Virtual servers are used to share hardware and software resources with other operating systems. They can work more effectively and lower the cost of IT staff for an organization. Different software's are used to divide a single physical server into multiple virtual servers. Virtual servers provide more efficiency as compared to physical servers

References

Perlitch, M. D. (1991). Using client servers. Telecommunications, 25(2), 39. Retrieved from https://search.proquest.com/docview/210533614?accountid=41759

Subject: IT

Pages: 1 Words: 300

Playbook/Runbook Part 2 – Social Network Security



Run/ Playbook Part 1: Malware

[Arash Golshan]

[CYB/110]

Run/ Playbook Part 1: Malware

Scenario

With the increase in technology, Malware attacks are becoming very popular. The most common type of Malware attack these days is Trojan horse. A Trojan horse is a type of malware which misleads the users by bluffing them. It is a malicious program which contains the virus that hackers used to get access to the systems. A recent malware attack occurred to me in which hackers tried to access the sensitive data of the company. The malware attack which they used to attack my system was Trojan horse (Chunming, 2003). I recently installed software which I found useful, but it was designed to access the sensitive data from my system. The system started to crash and freezes repeatedly. There was a weird increase in the usage of internet on the system. Antivirus stopped working and applications opened up unexpectedly. It’s challenging to find Trojan virus because usually people consider every software useful and they don't know what is happening at the backend.

The trojan can be of different types. When they are activated on the system, they may annoy user by deleting their files and destroying their information from their system. Some Trojans are even dangerous then malicious software’s because they are designed to be more annoying. The most important thing to rescue yourself from these viruses is to download software’s which are from verified sources. Don't download or install software's which are not from a verified source because you don't know whether it is a software or Trojan attack if anyone suffers from a Trojan attack that individual should suddenly turn of the internet to avoid severe damage (White et al., 2017). Trojans also provide access at the backend to the hackers so that they can access your personal information. They cannot harm users unless users run them on their systems.

The strategy of cybersecurity is very crucial regarding data protection of the owner's business, confidentiality of their customers and malware attacks in all online businesses (Zhang, 2018). What's more, with information fissures such as Trojan’s virus on the ascent, organization’s security, client, and worker data turned into significantly vital factors for every business in the market.

List of information and data employees are not to place online

The company should not place the personal information of the employees online anywhere on the internet. The internet connection (Wi-Fi) should not be open and low secure. Beware of the virus contained files and data before downloading. The employee’s accounts should not contain weak passwords. The employees should not be unaware of the security breaches. They must be trained to maintain and secure their data. Following are some credentials which should not be uploaded online:

Client data

Administrative communications

Intellectual property

Worker records

Guidelines for interacting online

The online interaction has become so problematical nowadays due to the negative interactions with people. Following are some guidelines to ensure safe and secure online interactions. Always keep the personal information limited and proficient. The privacy settings must be on and always go for safe internet surfing. Always choose strong passwords and secure internet connection. Be aware of the people you meet online and what you post. The antivirus must be updated regularly.

Guidelines for secure use of email

There is great danger in using emails when such viruses are on the rising. There are some ways for secure use of email. The first and most important step in data privacy is using strong passwords for your email accounts. For the business companies, the employees should not be able to use email addresses of the company for their messages. Beware of the phishing emails from unknown people and try not to open the emails in your junk folder because most of them contain viruses. These emails must be scanned for malware and spam (Weinstein, 2003) before opening. Try not to check emails when using a public hotspot.

List of items staff at your company should not place on social media

We should always know what to post online or on social media, especially as a company's employee. Try not to post or generally reveal secret organization data electronically. The negative audits or remarks of the opponent or another individual posting about the organization should be handled carefully and do not react on them. For employees, they should not give negative remarks about the company's manager, CEO or any other colleague. Try to avoid posting photos or recordings on the social media that could harm the reputation of the company. Do not post any confidential information or anything illegal.

References

Chunming, Z. M. X. Q. L. (2003). Analysis of Trojan horse and Its Detection [J]. Computer Engineering and Applications, 28, 053.

White, G. B., Fisch, E. A., & Pooch, U. W. (2017). Computer system and network security. CRC press.

Weinstein, L. (2003). Spam wars. Communications of the ACM, 46(8), 136.

Zhang, D. (2018). Big data security and privacy protection. In 8th International Conference on Management and Computer Science (ICMCS 2018). Atlantis Press.

Subject: IT

Pages: 1 Words: 300

Please Choose A Topic With A Title

Autonomous vehicles are safer than human-driven cars

Student

Institution

Autonomous vehicles are safer than human-driven cars

Vehicles provide easy means of transport. With the advancement in technology, a lot has happened in the motor manufacturing industry with people casting eyes on the nature and models of cars being created for that matter. For instance, some have opted to purchase those vehicles whose fuel consumption proves pocket-friendly whereas others are more concerned with car speed among other considerations. However, safety overrides everything as far as transport is concerned. As such, there has been a contested debate over whether self-driving vehicles offer more safety than those driven by humans. This paper, therefore, argues that self-driving automobiles offer more safety than human-driven (HD) lots because they do not make errors like humans and that they do not get tired.

Research has it that human mistakes are the center of the majority of car accidents caused around the globe. The reason behind such a postulation is that individuals are vulnerable to making such errors as texting while driving as well as getting drunk, distractions which do not hold in self-driving cars. A recent study by Hevelke and Nida-Rümelin (2015) reveals that autonomous vehicles adhere to certain set guidelines which enable them to evade mistakes peculiar to humans. Ideally, such guidelines are predictable, hence outshining people who might deliberately decide to violate certain rules for their selfish gains. Therefore, self-driven cars offer more safety than individual driven ones.

Whereas humans get tired to an extent of causing road accidents, autonomous vehicles are devoid of such a misfortune. Cunningham and Regan (2015) state that, “humans are prone to tiredness and boredom.” Ideally, while driving, the fatigue resulting from such circumstances as covering longer distances and even the status of human health might play a great role in facilitating car accidents. On the other hand, autonomous cars function through programmed and computerized processes through which coverage of distances to infinite lengths can be possible. In other words, their operations do not in any way rely on attitudes. Self-driving automobiles are therefore better than HD ones in terms of safety concerns.

On the other hand, naysayers declare autonomous cars to be safer than HD ones is unrealistic. To begin, the endorsers of human-operated vehicles suggest that humans, particularly while in an emergency make better decisions which are absent in autonomous vehicles. For example, while overtaking, a human driver might see it necessary to hit a tree or a building instead of running over pedestrians crossing the road. Sadly, self-driving cars have limited sensitivity to demanding circumstances. That is, they may end up killing a lot of people to the advantage of the car itself, an instance that makes their utilization questionable. To that end, human-operated vehicles are safer than autonomous types.

However much the opponents of autonomous cars seem to be logical in proving their case, I strongly feel they have no point at all. The fact that humans can absorb certain risks at the cost of other people is impractical (Färber, 2016). Essentially, it would deem irrelevant for a driver to hit a tree and risk his life and the lives of other people on board for the sake of pedestrians. An accident is an accident regardless of its magnitude. Debating from such a stance, therefore, confirms earlier arguments that autonomous machines and enhanced road safety are synonymous, unlike the human-powered ones.

In summary, the safety provided by autonomous cars supersedes that of machines under human control. For instance, the position that such cars do not make errors as those committed by individuals says it all. People have the tendency of making wrong decisions such as chatting while driving hence endangering the wellbeing of their respective cars and their lives in entirety. Again, tiredness does not define self-driving cars as opposed to humans who might encounter accidents as a result of such sort of a wearing out process. Motor vehicle manufacturing industry should invest intensively on Autonomous automobiles if bettering human safety is anything to go by.

References

Cunningham, M., & Regan, M. A. (2015, October). Autonomous vehicles: human factors issues and future research. In Proceedings of the 2015 Australasian Road safety conference (pp. 14-16).

Färber, B. (2016). Communication and communication problems between autonomous vehicles and human drivers. In Autonomous driving (pp. 125-144). Springer, Berlin, Heidelberg.

Hevelke, A., & Nida-Rümelin, J. (2015). Responsibility for crashes of autonomous vehicles: an ethical analysis. Science and engineering ethics, 21(3), 619-630.

Subject: IT

Pages: 2 Words: 600

Policies To Implement Regulatory Requirements

Policies to Implement Regulatory Requirements

[Author’s name]

[Institute’s name]

Policies to Implement Regulatory Requirements

Introduction

The board of Red Clay Renovations Company needs to consider the potential risks of data breaching and significantly adopt proper regulatory requirements accordingly. Critical consideration of personally identifiable information (PII) is important to identify various forms of data that could be used to potentially identify a specific individual. When it comes to the domain of PII, it is mainly recognized as mechanisms of biometric information, medical information, personally identifiable financial information (PIFI), and some specific forms of data identifiers ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"l8o20O36","properties":{"formattedCitation":"(Federal Trade Commission, 2019)","plainCitation":"(Federal Trade Commission, 2019)","noteIndex":0},"citationItems":[{"id":1465,"uris":["http://zotero.org/users/local/7Hi3kAOD/items/ZQB37UPX"],"uri":["http://zotero.org/users/local/7Hi3kAOD/items/ZQB37UPX"],"itemData":{"id":1465,"type":"webpage","title":"Finanacial Institutions and Customers Information: Complying with the Safeguards Rule","container-title":"Federal Trade Commission","author":[{"family":"Federal Trade Commission","given":""}],"issued":{"date-parts":[["2019"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Federal Trade Commission, 2019). Detailed consideration of the approach of PII in the case of Red Clay Renovations Company requires the adoption of appropriate regulatory policy according to the data security needs of the organization. The particular source in the form of the "Red Flags" Rule of regulatory requirements is selected to successfully address the requirements of IT security in the case of Red Clay Renovation Company. The specific approach of the Red Flag Rules is proposed to ensure identity theft prevention, specifically in the form of consumer credit information. The practical idea of these regulatory requirements demands proper application of written programs to successfully perceive, prevent, and mitigate the issue of identity theft. The application of this approach is vital for the company to intact the personal financial information of potential customers.

Regulatory Application for Red Clay Renovations Company

A comprehensive understanding of the application of the approach of Red Flags Rules is important to examine the actual implications of this regulatory method. It is noteworthy to mention that when it comes to the consideration of specific regulatory policy in an organizational setting, then it is important to follow four basic stages. The idea of implementing a regulatory approach comprised four prospects of collection, processing, management, and proper storage of the client PII. The Red Clay Renovations Company needs to follow all these four steps to ensure the successful application of the main regulatory policy. The first phase of the collection is critical for the management of the company. It is essential for policymakers to firstly identify potential areas of red flags ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"PbdzffWS","properties":{"formattedCitation":"(Doern, 2007)","plainCitation":"(Doern, 2007)","noteIndex":0},"citationItems":[{"id":1467,"uris":["http://zotero.org/users/local/7Hi3kAOD/items/L9QZUKKK"],"uri":["http://zotero.org/users/local/7Hi3kAOD/items/L9QZUKKK"],"itemData":{"id":1467,"type":"paper-conference","title":"Red tape, red flags: Regulation for the innovation age","container-title":"Conference Board of Canada CIBC Scholar-in Residence Lecture. Ottawa","author":[{"family":"Doern","given":"G. Bruce"}],"issued":{"date-parts":[["2007"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Doern, 2007). This phase of regulatory policy implementation demands the IT department of the company to monitor the risks of data theft closely and systematically collect all the information. The second stage comprised of the perspective of proper processing of the information. This stage requires to set up specific practical procedures to ensure the detection of red flag risks in case of routine operations. The third stage of management is one critical practical prospect that requires the active attention of all the shareholders. The role of all members of management at this stage is crucial to adopt practical strategies to prevent the risk of identity theft in case of PII. The last stage of this procedure is associated with the successful storage of clients' information to ensure a successful form of data security in case of the functioning of all the departments of Red Clay Renovations Company. This phase demands proper upgradation of the program according to changing requirements of data security in the form of PII of all the clients.

Summary

           To conclude the briefing statement about the regulatory requirements in the scenario of Red Clay Renovations Company, it is vital to mention that the selection of suitable regulatory measures is important. This practical approach is necessary to successfully overcome the risk of information theft in organizational settings and meet the standards of data protection in the case of client PII ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"vKXxJCs8","properties":{"formattedCitation":"(Fischer, 2014)","plainCitation":"(Fischer, 2014)","noteIndex":0},"citationItems":[{"id":1466,"uris":["http://zotero.org/users/local/7Hi3kAOD/items/3YYXWLUC"],"uri":["http://zotero.org/users/local/7Hi3kAOD/items/3YYXWLUC"],"itemData":{"id":1466,"type":"book","title":"Cybersecurity issues and challenges: In brief","publisher":"Congressional Research Service","author":[{"family":"Fischer","given":"Eric A."}],"issued":{"date-parts":[["2014"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Fischer, 2014). All the four phases of collection, processing, management, and storage of the information are important steps to meet the standards of data security. 

References

ADDIN ZOTERO_BIBL {"uncited":[],"omitted":[],"custom":[]} CSL_BIBLIOGRAPHY Doern, G. B. (2007). Red tape, red flags: Regulation for the innovation age. Conference Board of Canada CIBC Scholar-in Residence Lecture. Ottawa.

Federal Trade Commission. (2019). Financial Institutions and Customers Information: Complying with the Safeguards Rule. Retrieved from:

https://www.ftc.gov/tips-advice/business-center/guidance/financial-institutions-customer-information-complying

Fischer, E. A. (2014). Cybersecurity issues and challenges: In brief. Congressional Research Service.

Subject: IT

Pages: 2 Words: 600

Porposal

Proposal

Name

Institution

Proposal

Background

Introduction

A lot of what comes under the field of artificial intelligence is not creating a general intelligence that can solve problems in any domain as a human does. However, a domain-specific problem can be solved using artificial intelligence in the best possible manner. The impact of a quantum computer on domain-specific problems is that, instead of testing out every possible branch one after the other until one gets a solution, quantum computing could explore every branch of the problem simultaneously. This paper will discuss the role of quantum computing on improving the performance of artificial intelligence. The paper will focus on; thinking through the implications of quantum mechanics, and the machines that are useful for the quantum computation in order to improve the performance of artificial intelligence.

What is Artificial Intelligence and Quantum Computing?

Artificial Intelligence

Artificial intelligence serves the purpose of creating machines, that are not only intelligent but work and react like humans. The main problem that is associated with artificial intelligence involves computer programming for planning, learning, reasoning, knowledge, problem-solving, perception, etc.

Quantum Computing

Albeit the normal computing owes quantum effects and functions just like normal computing, however, the only thing that distinguishes quantum computing from normal computing is the use of quantum bits. Quantum computing is exponentially faster than normal computing. Some of the important conventional problems can be solved in exponentially less time by using quantum algorithms.

Plan

Literature Review

Literature review Strategy

Selection of related peer-reviewed articles

Literature review on classical or conventional computing

Literature review on quantum computing and its role in improving the performance of artificial intelligence.

Comparison between classical computing and quantum computing.

The role played by classical computing in improving artificial intelligence.

Comparison of the past researches on classical computing and quantum computing and the role both computing techniques have played in improving artificial intelligence.

Summary

Reason and Conclusion

Research gap in the existing literature and this research.

The research aims at filling the research gap on quantum computing and its role vis-a-vis the performance of artificial intelligence.

The research is important as it focuses not only the implications of quantum computing but also on the machine that is useful for quantum computing.

The research is important because it discusses the domain-specific problem and their solution using artificial intelligence and quantum computing.

The research will explore the relationship between quantum computing and artificial intelligence.

The research is important as it focuses on what kind of domain-specific problem can be solved by quantum computing and artificial intelligence.

The paper directs researcher, the pave way for numerical optimization using quantum computing and artificial intelligence.

References

ADDIN ZOTERO_BIBL {"uncited":[],"omitted":[],"custom":[]} CSL_BIBLIOGRAPHY Aaronson, S., & Ambainis, A. (2018). Forrelation: A problem that optimally separates quantum from classical computing. SIAM Journal on Computing, 47(3), 982–1038.

Manin, Y. I. (2000). Classical computing, quantum computing, and Shor’s factoring algorithm. ASTERISQUE-SOCIETE MATHEMATIQUE DE FRANCE, 266, 375–404.

Miakisz, K., Piotrowski, E. W., & S\ladkowski, J. (2006). Quantization of games: Towards quantum artificial intelligence. Theoretical Computer Science, 358(1), 15–22.

Venegas-Andraca, S. E., & Bose, S. (2003). Quantum computation and image processing: New trends in artificial intelligence. IJCAI, 1563.

Ying, M. (2010). Quantum computation, quantum theory and AI. Artificial Intelligence, 174(2), 162–176.

Subject: IT

Pages: 1 Words: 300

Professional Assignment 1

Professional Assignment 1

[Name of the Writer]

[Name of the Institution]

Professional Assignment 1

Q.1 How is information technology changing the way farmers run their business?

Technological advancements have transformed agriculture. The long journey starting from the invention of the plow to today's analytically driven agriculture, humans have come a long way (Boserup, 2017). Unlike previously, farmers can manage their farms sitting across in an air-conditioned cabin. They don't have to toil in the fields anymore in the harsh glare of the sun. Drone surveillance, smart tractors, and numerous sensors are used to monitor the farms nowadays. A huge amount of data is generated and collected through these smart devices. Farmers can analyze this data to instruct the smart GPS based tractor about how much land to plow. Drones can be used to spray pesticides accurately and efficiently. Numerous sensors are keeping track of the weather conditions and informing the farmers prior to any abrupt weather change. Another important aspect of information technology's impact on agriculture is precision agriculture. Precision agriculture has enabled farmers to sow crops precisely and accurately (Das et.al, 2015). Accurate amounts of fertilizers sprayed save farmers a huge chunk of money. This implies that higher yields are producing. This can be helpful in the fight against global food insecurity. Applying accurate amounts of resources means farmers are less wasteful, which implies that farming is contributing to sustainable development. Furthermore, large analytics firms analyze the huge amount of data from the farmers and make recommendations based on the results generated. For instance, a farmer can be recommended about the number of seeds to use per acre.

Q.2 How do the systems described in the case improve farming operations?

The systems described in the case are dedicated to helping farmers in order to empower farmers. This way farmers can be more efficient and profitable. These systems provide farmers with enough capabilities to track their finances and organize agronomic inputs to maximize performance. Global Positioning System (GPS) has made possible precision agriculture. GPS has enabled farmers to take soil samples and analyze them in order to plant seeds compatible with the soil (Tayari, Jamshid & Goodarzi, 2015). With GPS, accurate field navigation has reduced repetitive practices and made possible to cover maximum ground in lesser time. Farmers can now work during severe weather conditions from their cabins. Certainly, GPS has increased the productivity of the farmers. Next system described in the case is Granular. Granular is a piece of software that enables farmers to oversee the operations and activities of their farms even when they are not present at the farms. The software has incorporated crop models based on data-driven techniques to increase yields. It helps teams to improve their efficiency. Lastly, FieldScript is the system mentioned in the case. FieldScript assists farmers to produce yields of the highest qualities. Increase in yield has been witnessed in areas where FieldScript was not employed previously. FieldScript has been termed as a more eco-friendly and sustainability centered system.

Q.3 How do precision agriculture systems support decision making? Identify three different decisions that can be supported.

Farmers can employ techniques of precision agriculture to increase productivity and enhance resource efficiency. This results in a decrease in cost, increase in quality yield, and a more sustainable environment. Farmers in developed countries use technologies like satellite imagery and geospatial tools to support decision making (Schmedtmann & Campagnolo, 2015). Data collected from these tools is analyzed with respect to different scales. Soil and nutrient quantities may differ from field to field and area to area. Precision agriculture lets farmers analyze the soil quality of their farmlands, prepare an assessment of the seeds that should be planted and the amount of water and fertilizers that would be used (Sona et.al, 2016). Three different decisions that precision agriculture can support or influence are mentioned next. First, solid preparation was considered a challenging task prior to the incorporation of technology with farming. However, this activity has been simplified. Tools like FieldScript collects data on the fertility index of the soil. The amount of moisture present in the soil can also be detected. This results in farmers taking decisions to prepare a seed type that withstands the vagaries of the weather. Second, using John Deere tractors' section control, farmers can ensure accurate placement of seeds. This results in farmers taking decisions to estimate seed count that would be sufficient. Wastage of seeds is also reduced using this technology. Lastly, Swath Control Pro, a drone that provides farmers to keep an eye on their farmland. But there is much to this drone. This drone could help is spraying pesticides over the crops. It can identify the species of the pest and lets farmers decide which type of pesticide spray should be used.

References

Boserup, E. (2017). The conditions of agricultural growth: The economics of agrarian change under population pressure. Routledge.

Das, J., Cross, G., Qu, C., Makineni, A., Tokekar, P., Mulgaonkar, Y., & Kumar, V. (2015, August). Devices, systems, and methods for automated monitoring enabling precision agriculture. In 2015 IEEE International Conference on Automation Science and Engineering (CASE) (pp. 462-469). IEEE.

Schmedtmann, J., & Campagnolo, M. (2015). Reliable crop identification with satellite imagery in the context of common agriculture policy subsidy control. Remote Sensing, 7(7), 9325-9346.

Sona, G., Passoni, D., Pinto, L., Pagliari, D., Masseroni, D., Ortuani, B., & Facchi, A. (2016). UAV multispectral survey to map soil and crop for precision farming applications. In Remote Sensing and Spatial Information Sciences Congress: International Archives of the Photogrammetry Remote Sensing and Spatial Information Sciences Congress: 19 July(Vol. 41, pp. 1023-1029). International Society for Photogrammetry and Remote Sensing (ISPRS).

Tayari, E., Jamshid, A. R., & Goodarzi, H. R. (2015). Role of GPS and GIS in precision agriculture. Journal of Scientific Research and Development, 2(3), 157-162.

Subject: IT

Pages: 2 Words: 600

Project

Project

[Author Name(s), First M. Last, Omit Titles and Degrees]

[Institutional Affiliation(s)]

Author Note

[Include any grant/funding information and a complete correspondence address.]

The paper is intended to cover a detailed review of operating system security. Operating system security is a fundamental concern for secure e-commerce and cyberspace. The vulnerable operating system ultimately impacts the overall application and services running on a device. Common computers and devices do not meet the requirements of a secure operating system. Computer architectures nowadays lack built-in mechanism for security policy enforcements because they are mainly based on a one-shot approach. That means either all the services and accesses are blocked, or all are granted. The reasons behind this behavior can be understood by decision-making protocols of the majority of commercial operating systems, which are based mainly on user identity and ownership.

One of the basic security criteria for the operating system is mandatory security which is “a built-in mechanism or logic within the operating system (often called system security module or system security administrator) that implements and tightly controls the definition and assignment of security attributes (Yang & C.Q, 2003)”. This criterion is central to the vulnerability-free operating systems. Conventional systems do not address criteria related to security, such as the trustworthiness of programs and operations. Mainstream operating system mechanisms, despite the claims, provide inadequate application security, which is based on user identity information. Hence it is needed to tackle application vulnerabilities and threats using Kernal level controls. This is one doable and effective way to secure operating systems.

The paper is intended to extensively explain possible security issues using conventional operating systems with details of various levels of security levels, including D, C1, C2, and B2, until A1, which is considered as the most secure level, where most operating systems are secure upto C2 or below. The paper will also cover a recent case study that provides secure operating system controls on kernel level and is built using the Linux based approach. It works by assigning mandatory access controls to ordinary computer systems and ensure kernel-level security.

References

Yang, C. Q. (2003). Operating System Security and Secure Operating Systems. SANS Institute.

Hsiao, D. K., Kerr, D. S., & Madnick, S. E. (1978, November). Operating system security a tutorial of current research. In The IEEE Computer Society's Second International Computer Software and Applications Conference, 1978. COMPSAC'78. (pp. 220-228). IEEE.

Masaki, H. A. S. H. I. M. O. T. O. (2013). A Survey of Security Research for Operating Systems. 情報セキュリティ総合科学, 5.

ADDIN ZOTERO_BIBL {"uncited":[],"omitted":[],"custom":[]} CSL_BIBLIOGRAPHY Balfe, S., Lakhani, A. D., & Paterson, K. G. (2005). Securing peer-to-peer networks using trusted computing. Trusted Computing, 271–298.

Zhao, M. X. (2015). Research on Operating System Security Technology. Applied Mechanics and Materials, 703, 294–297. Trans Tech Publ.

Subject: IT

Pages: 1 Words: 300

Free Essays About Blog
info@freeessaywriter.net

If you have any queries please write to us

Invalid Email Address!
Thank you for joining our mailing list

Please note that some of the content on our website is generated using AI and it is thoroughly reviewed and verified by our team of experienced editors. The essays and papers we provide are intended for learning purposes only and should not be submitted as original work.