En1320 Module 2 Lab 2.1

In: English and Literature

Submitted By DDIII
Words 297
Pages 2
Dorsey Douglas
En1320 Module 2 lab 2.1
Creating an Outline

The Gaming Industry and all its Fantastical Amazement

Introduction: It was once said that videogames would be just a fade. Something that would last about as much as the next generations fasion sense. Course I say its been said, as if there has been an actual book written. By they I mean my father. I cannot think of a time when videogames were not apart of my life. From my earliest memories I can tell you certain patterns from pong, pacman, etc. It has only been the natural progression of who I am that I would want my career to fall into something dealing with the gaming industry. As I said, once considered a fade, it is now a growing billion dollar industry. Hollywood Films, Symphony, Broadway Shows, have all had a tale from a game inspire their respective form of media. For me however it’s a specific part of the industry that I would love to be apart of. That’s the Story telling. I feel as if todays games are truly immortalized by the stories that they tell. From Mario saving the Princess from bowser, to The World Being over Run by a corrupt Private Military Corp. Gaming is where I want to tell my stories.

Conclusion:

In conclusion, With my focus on school and now my new Career job, I see only great progress in my journey to become the next great gaming story teller. I don’t see much stopping me from my goals but myself. I want to some day be able to sit at the VGA’s and if nothing else have my name mentioned in the nominations for Game of the Something. Doesn’t Matter I just wanna be on the…...

Similar Documents

Lab 2

...Lab #2 – Student Steps: Student steps needed to perform Lab #2 – Align Risk, Threats, & Vulnerabilities to the COBIT Risk Management Controls: 1. Connect your removable hard drive or USB hard drive to a classroom workstation. 2. Boot up your classroom workstation and DHCP for an IP host address. Copyright © 2013 Jones & Bartlett Learning, LLC, an Ascend Learning Company Current Version Date: 05/30/2011 www.jblearning.com All Rights Reserved. -11- Student Lab Manual 3. Login to your classroom workstation and enable Microsoft Word. 4. Conduct a high-level narrative discussion and review of the COBIT v4.1 Framework. 5. Review the COBIT P09 Control Objective definition, scope, and focus areas for assessing and managing IT risk. 6. Relate how the COBIT (P09) Control Objective definition relates to assessing and managing IT risk within each of the seven domains of a typical IT infrastructure: User, Workstation, LAN, LAN-to-WAN, WAN, Remote Access, Systems/Applications Domains 7. Explore the structure and format of how to align risks, threats, and vulnerabilities identified from your IT infrastructure to the COBIT P09 Control Objective definition, scope, and focus areas Information, Applications, Infrastructure, and People. 8. Explore the hierarchy for assessing and managing IT risks: • Step #1: Align the risk, threat or vulnerability assessment to C-I-A primary first and assess • Step #2: Align the risk, threat, or vulnerability remediation to Effectiveness,......

Words: 381 - Pages: 2

En1320 Module 2 Lab

...Introduction 2: When you think of prison you may think of a place filled with criminals and misfits doing there time for the crime they’ve committed. I can’t necessarily speak for everyone, but I now at some point in your life you may have had a loved one or someone very close to you, serve prison time. You don’t want to see that loved one in a place that you picture as dirty, chaotic, dangerous, and depressing. The reality of the situation is the prisons top priority is to provide rehabilitative programming and skills to inmates and parolees in an effort to reduce their likelihood of reoffending by the time they return to their homes and communities. Below is a list of rehabilitative programs and services we offer in prison and during parole “What we do”. You should never have to feel fear and concern when that loved one gets “lock up”. That’s why I fell as though the conditions in the prison systems need to be improved to have positive outcomes such as reducing recidivism and benefiting society financially. Conclusion 1: As we’ve discussed euthanasia cannot only affect the patient but also the friends, family and close ones. You never know really know how a person may suffer within especially cancer patients and Euthanasia can help with the pain and suffering within. Euthanasia can be voluntary, non-voluntary, or involuntary. Voluntary euthanasia is the most common of the three. Non-voluntary is illegal and involuntary is pretty much considered murder. Remember at......

Words: 302 - Pages: 2

Module Labs and Short Answer

...Module 1 Short Answer An operating system is a level of programming that allows you to do stuff with computers. It interacts with the computer’s hardware to transmit your command into a language the computer can interpret. Operating systems is like a computer manager what a software needs and what your system can provide to support the software needs that includes your memory processing unit and your computer storage access among other things that makes sure your system is never overtaxed. The five differences I came up with is price, quantity of functions, compatibility, easy to use, easy to find system. Windows is most common due to its mid-range price and most popular used in the operating systems today. Mac OS is in the higher range of price but hardly any compatibility but good for home pc that you don’t use to play games or want any viruses because Mac has very little virus due to the windows market share. Almost every application or game will work on a windows operating system but due to this you may need a antivirus on your system due to windows is very vulnerable to viruses. With windows there is also so many functions to make windows very easily to use and with its popularity it has the highest tech support although windows due run slower due to all the applications and software it can run. Mac OS is high in price due to its high reliability and it looks way better than a windows. Linux is the cheapest operating system because it is just a kernel and not a...

Words: 371 - Pages: 2

Lab 2 Unit 2

...Lab 2.1 1. What are the Regulatory requirements? 2. What are medical rules or laws of private information that we need to know to set up this Database with the customer information (Data privacy)? 3. Please give me any specific requirements that are necessary? Business rules 1. Appointments 2. Social security 3. Medical record 4. Driver license 1. Middle initial 2. Are you a Jr. or Sr. Patient Entity | Patient Visit entity | 1. Medical record number | 1. Group number, appointment | 2. Social security number, Driver license | 2. Allergies | 3. Taking any medications | 4. Taking any medications | Composite key | Composite keys are the most common. | Make sure patient fills out all the whole application. Lab 2.2 Data Requirements 1. Allow Software Management Team and IT Staff to view, add, edit, and delete the types of software to be tracked. This includes type of software, licensing dates, status, and location. 2. Allow Software Management Team to enter, edit, and delete New Software Requests. 3. Allow Software Management Team to view the different licensing agreements and types. This includes viewing the pricing per agreement. 4. Allow Software Management Team to sign out software to users with administrative privileges. 5. Allow Software Management Team and IT Staff to update the status of software licenses. 6. Allow users, assigned IT users, Staff, and Software......

Words: 342 - Pages: 2

Module 2

...1. Discuss where a computer stores its basic hardware settings, why it does so, and what some of those settings are. A computer stores its basic hardware settings in the ROM (read-only memory) it does this because it is non-volatile. Which means when the computer powers off the information on the Rom will stay. Unlike RAM (random access memory) which is volatile and gets emptied when the computer gets turned off. 2. Compare storage devices using four criteria: versatility, durability, speed, and capacity. Storage device do about the same thing but there are a lot of factors to look at for when u are looking for the best versatile storage u wouldn’t want to go with a hard disk because it can access data only form its fixed disk platters. Were as more versatile device like a dvd drive can access any DVDs, DVD movies, and CDS. Then u want to look at durability. Most storage device or even anything technological can be damaged if misused or mishandled so u want to find something that can hold up better. Like CDs and DVDs would be more durable than hard disks. Being able to access data is always important. Most storage devices people look are always looking for speed. Most devices take that into aspect like Hard disk, CD, DVD, Blu- ray, and solid state drives are all really fast compared to older technology’s like tape drives. Another huge factor in people buying a storage device is capacity. When someone looking for storage the more the better. The hard disk usual holds......

Words: 1700 - Pages: 7

En1320 Module 2 Sharing Ideas

...Alusine Timbo Jalloh NT 1230 Client Server Networking Unit 1 Problem Set 1: Problems Lesson 2 Knowledge Assessment Fill in the Blank Complete the following sentences by writing the correct word or words in the blanks provided. 1. Windows Easy Transfer supports two types of migrations, called side-by -side and _wipe-end-load. 2. When a serious problem occurs with Windows 7, you might be able to repair it by starting the Windows PE operating system and running diagnostic tools. In this scenario, Windows PE is called by another name, which is Windows Recovery Environment. 3. To migrate user profile information from one computer to another, you can use either Windows Easy transfer or User State Migration tool. 4. A computer running Windows PE will automatically reboot after 72 hours of continuous operation. 5. Windows Easy Transfer supports migration using any removable storage medium common to the two computers except Floppy Disk. 6. The Windows 7 component that enables the computer to support more than one language is called the Multilingual user Interface (M U I).. 7. The reason it is possible to remove the Windows 7 installation disk to supply the Setup program with drivers is that Windows PE runs on a Ram-disk. 8. To upgrade Windows XP to Windows 7, you must perform a clean install. 9. The files and settings that Windows Easy Transfer can migrate to a Windows 7 computer are primarily stored in user profile. 10. As a preinstallation......

Words: 1231 - Pages: 5

Module 2

...FIN301 Module 2 Instructions for CASE and SLP Assignments 07-13-15 Module 2 - Home ------------------------------------------------- PRESENT VALUE Modular Learning Outcomes Upon successful completion of this module, the student will be able to satisfy the following outcomes: * Case * Explain the concept of present value. * Calculate the present value of a future stream of income. * Describe the determinants of the discount factor. * Explain the determinants of present value. * SLP * Explain the concept of present value. * Describe the determinants of the discount factor. * Explain the determinants of present value. * Discussion * Explain the concept of present value. * Describe the determinants of the discount factor. Module Overview In order to value assets such as stocks, bonds, or investment projects, you need to be able to place a value on payments that you will receive in the future. If you as a financial manager with to invest in some new equipment, you need to be able to place a value on the total amount of additional profits your company will receive over the next several years due to this new purchase. In general, people prefer to have money paid to them today rather than tomorrow. The value of one dollar today is exactly one dollar. But what about being paid one dollar exactly one year from now? Would you pay a dollar for the that dollar to be paid to you in one year? Definitely not!......

Words: 1797 - Pages: 8

Module 2

...PLANNING Learning Objectives – module 2 At the end of the session the student should be able to understand the decision making process, the various types of decision making and the planning process in an organisation. They are also expected to comprehend the outcomes of a planning process like vision, mission, objectives & strategy. The module has 4 sessions Topics – Module 2 (4 sessions) Decision making Types of planning The planning process/ framework Strategic planning in an organisation Outcomes of planning process Hierarchy of strategy MBO – Peter Drucker Decision Making ‘the process of identifying & selecting a course of action to solve a problem / take advantage of an opportunity’ Problem – the discrepancy between ideal & actual situation ‘Problem – something that that endangers the organisations ability to reach its objective Opportunity – some thing that offers a chance to exceed objectives’ Peter F Drucker Problem finding process Deviation from the past experience Deviation from set plan Other people Performance of competitors intuition Problem finding - errors False association of events False expectation False self perception & social image Other factors Threshold of problem recognition Setting priorities Selecting the right ones – leave the easy ones Allow self solutions Types of DM STRUCTURED Made under established situation i.e. definable, predictable & analysable Called programmed DM Routine problems Application of rules/......

Words: 1957 - Pages: 8

Module 3 Lab

...In this lab, you will demonstrate the ability to examine and investigate the different types of motherboards and CPUs used in a computer. Required Setup and Tools Photos of motherboards and CPUs are provided in the lab worksheet. However, if possible, the case cover of a desktop computer should be removed in order to get a look inside the system at the motherboard. The system should be unplugged and off when this work is done. You also need access to the Internet for research. Use the Lab 3 Worksheet to submit your responses. Recommended Procedures Task 1: Examine the Motherboard Procedure 1. Examine the following motherboard. One interesting thing you will see is the use of two BIOS chips. The M-BIOS chip is the Main BIOS chip and the B-BIOS chip is the Backup BIOS chip, which is used to rewrite the M-BIOS chip if it becomes corrupted. (Refer to the high-resolution images for closer inspection.) 2. Using the Internet, locate information on the LGA 1156 connector. What processors is it used with? What is its purpose on the motherboard? All LGA 1156 processors and motherboards made to date are interoperable, making it possible to switch between a Celeron, Pentium, Core i3 or Core i5 with integrated graphics and a Core i5 or Core i7 without graphics. 3. Using the Internet, locate information on the Intel H55 Chipset. What processors is it used with? What is its purpose on the motherboard? It is for the old Socket 1156 for first generation i3 / i5 / i7 and i5-760......

Words: 955 - Pages: 4

Mat 106 Module 2 Mat106 Module 2

...MAT106 MAT 106 Quantitative Literacy Module 1 to Module 5 MAT 106 Complete Course Click below link for Answer visit www.workbank247.com http://workbank247.com/q/mat106-mat-106-quantitative-literacy-module-1-to-m/10428 http://workbank247.com/q/mat106-mat-106-quantitative-literacy-module-1-to-m/10428 MAT 106  Quantitative Literacy Complete Course MAT 106 Module 1 Unit 1 Assignment 1 Meet and Greet Your Classmates Please provide some basics about yourself. Tell us about some of your interests, places you have lived, and about the people in your life. This is a chance for students and the instructor to learn more about one another and to collaborate. In your post, please comment on how you plan to approach this class. How will you set aside time to study? How will you organize your study area? How have you successfully studied for math in the past? MAT 106 Module 1 Unit 1 Assignment 2 Advertising Claims In this assignment, look for and provide two advertisements that you think contain logical fallacies. Use any advertisement that you can find in magazines, on television, or from the Internet for this assignment. Your two examples must represent two of the following logical fallacies: 1. Appeal to Popularity 2. False Cause 3. Appeal to Ignorance 4. Hasty Generalization 5. Limited Choice 6. Appeal to Emotion 7. Personal Attack (ad hominem) 8. Circular Reasoning 9. Diversion (Red Herring) 10. Straw Man The goal is to examine......

Words: 3324 - Pages: 14

Module 4 Lab 1

...Week 4 Lab 1 This lab involves research on the size, speed, and slot type for RAM, as well as the model, interface type, capacity, and transfer rate of hard disks and optical disks in your computer system. Required Setup and Tools In this laboratory, you need: * A desktop or notebook computer * Access to the Internet for research Recommended Procedures Task 1: Examining RAM To find out the types of RAM available to upgrade your computer, follow these steps: 1. Acquire computer information: Determine the make, model, and serial number of your computer by physically examining it. On a desktop computer, these numbers are on the back of the computer. For a laptop computer, this information is on the bottom of the computer. If the model and serial number are not clearly visible, refer to the manufacturer’s website for this information; otherwise, select a laptop you would consider buying for yourself and use its model number to obtain the information. a. Service Tag FPR5SW1 b. Computer Model Inspiron N7010 1 In Microsoft 10 go to life at a glance. 2 Go to settings 3 System 4 about That is where you will find it very simple. 1. Check the commercial RAM website: Search the Internet for the commercial website of the manufacturer of the RAM by its name. Go to the RAM memory website and type in the make, model, and serial number, if required, of your computer. Search for the information on......

Words: 539 - Pages: 3

Nt 11oo Lab 2.1

...of a desktop or notebook computer. * Access to the Internet for research. Recommended Procedures Task 1: Identify the Ports Procedure 1. Look at the front and back of a desktop or notebook computer for the following bus connectors: RS232, USB, FireWire, and infrared. How many of each type of connector did you find? 2. Label the appropriate names to the ports and adaptors given below. PS/2 Port Parallel Port Ethernet/ Rj45 Firewire VGA Port HDMI Audio Mini Jack Sockets USB Ports Task 2: Identify Memory Slots Procedure 1. Using the Internet, locate a diagram or photo of these types of memory slots on a desktop or notebook computer: Memory Stick (MS), Micro Drive (MD), Compact Flash (CF), and Secure Digital (SD). 2. Explain the diagram or photo(s) with the name of each type of memory slot. Network expansion card external hard drive port Examples: USB Port Audio jack socket IEEE 1394a Port External Serial Port Mini SD card slot Micro SD card slot USB port Card Bus SD card slot Task 3: Identify the Configuration Procedure 1. Identify the following configuration. 2. Define a SCSI and the need to use a SCSI Controller. ------------------------------------------------- SCSI is Small Computer System Interface. It is a set of parallel interface standards developed by the ------------------------------------------------- American National Standards Institute for attaching printers, disk drives,......

Words: 562 - Pages: 3

Module 2

...Mini Case 2 Macie Steiner Florida Southwestern January seventeenth How Long Can They Fly In summary of case four Boeing: How Low Can They Fly? Druyun still worked for the air force when she was offered a job with Boeing, Druyun assisted Boeing with obtaining contracts with the air force. Now if we take a step back and look at the big picture late 2001 Druyun, an acquisitions for the U.S Air Force starts negations with Boeing to lease Boeing jets as refueling tankers, she later than awarded them a 4 billion dollar contract, and gave them proprietary pricing data. After ethical violations of CEO (Stonecipher) of McDonnell Douglas Boeing incorporates ethical monitoring. The identified stakeholders are Boeing, Druyun and Stonecipher. The Procurement Integrity Act prohibits the release of source selection and contractor bid or proposal information. Also, a former employee who served in certain positions on a procurement action or contract in excess of $10 million is barred for one year from receiving compensation as an employee or consultant from that contractor ("Procurement Integrity"). The ethical implications of the procurement act are that it can be a conflict of interest to negotiate with a supplier. The relevance in this case is that Druyun was still a part of the military when negotiations began for a new position at Boeing and per Druyun she awarded Beoing “a parting gift” before leaving the military that made Boeing......

Words: 380 - Pages: 2

En1320 Lab 4.2

...Lab 4.2 Vance Pope EN1320 02/07/16 References: n.a. (2016). Software Engineers and Designers. Retrieved from Studentscholarships.org: http://www.studentscholarships.org/salary_ca/7/software_engineers_and_designers.php Shaw, M. (2000, May). Software Engineering Education: A Roadmap. Proceeedings of the conference on The future of Software Engineering, pp. 371-380. Reference #1: This website shows aspiring students what a software engineer does, the median of what could be earned in that field, and also breaks down all the different types of factors a student would want to know before they have begun studying in that field. It also shows students where current software engineers are employed. Those industries include computer systems design related services, electronic product manufacturing, wholesale trade, architectural engineering, public administration, and scientific research and development studies. Though this source is not an article with an author or from a university, I believe this is a good source to use. The reason I feel like it is a good source is because while I was searching on the website I noticed that their website has been mentioned and used on many school websites such as Cal Poly Pomona. The website gives students a great deal of information that other sources found on Google.com do not provide. This source has confirmed what I have seen while searching for software engineering jobs on the internet. It will allow me to provide more......

Words: 835 - Pages: 4

En1320 Lab 2.1 Drafting an Essay

... ------------------------------------------------- Lab 2.1 Drafting an Essay June 25, 2015 EN1320 Duane Seneschal June 25, 2015 EN1320 Duane Seneschal Ever feel like you are in a dead end job, your life is at the bottom of a pit? That is how I felt before I decided to go back to school. I realized that without a college education that my life was going nowhere. I had no future. I had to break out of this pit that had become my life and chosen job. Without a college degree I was going nowhere had no future. Deciding to get a degree is all good and well, but what degree what path? How does one go about making a decision of this magnitude? It is an overwhelming task that can be frightening. It’s like looking up from the bottom of a hundred foot deep pit and trying to figure out how to get out of the pit and back into the sunlight, it’s scary. Well I know that I enjoyed working with and building computers, and I enjoyed the security field. I started searching to see if combining these 2 fields was feasible or possible. To my delight and pleasure there was a degree program that did cover both of these fields together it was called Cybersecurity. After reading up on Cybersecurity I felt it was a field that I would enjoy. But what exactly is Cybersecurity? After much research what I discovered is that Cybersecurity is different technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access...

Words: 689 - Pages: 3

Cillian Murphy | Entertainment Kills Society - 581 Words | U Disco GPS L1 L2 Señal Jammer Interfaz USB Dispositivo de blindaje de automóvil