En1320 Unit 3 Assignment 1

In: English and Literature

Submitted By anpringle
Words 646
Pages 3
Ever since I was a teenager I noticed that one of my mom’s biggest wishes was to have the opportunity for her child to go away to a University. Unfortunately she was never going to fulfill that dream though me because I had no intention of going to college. I hated school. My attitude was “college isn’t for everyone” and I let that be known to everyone who even uttered the word “college”.
Every Sunday morning my mom would get me up and cook breakfast, we’d sit down at the table as she looked at all the sales ads. I always noticed that she enjoyed ads from Target and Wal-Mart those most. She would spend a lot of time looking the “Back to School” (particularly college) sales. She would just love looking at everything they had to decorate a dorm and etc. I would feel bad that I wasn’t the one to go away to college but the weight was lifted off of me when she started having more kids when I was 13 years old.
When I was thirteen she had my little brother, and then when I was sixteen she had my little sister. My brother wasn’t exactly the studious type either. However my sister made decent grades and she is an excellent athlete. She was the best in basketball and track. My mother and myself know absolutely nothing about sports so for a long time we had no idea what kind of potential my sister had. It wasn’t until I attended one of my sister’s first track meets that I realized that she was good enough to get a scholarship.
I knew that my mother would not be able to afford tuition at a university. I knew that my sister’s high school was not doing anything extra to obtain a scholarship for track; their main

concern was football. And I knew that my mother would not know the first thing about getting my sister a scholarship. In knowing all of this I also knew that if it was going to happen, I’d be the one to do it. One day I wrote down all of my sister’s…...

Similar Documents

Unit 3 Assignment 1

...Short Answer: 1. What two things must you normally specify in a variable declaration? a. variable type b. identifier i. int n; // type - int, identifier - n 2. What value is stored in uninitialized variables? c. is a variable that is declared but is not set to a definite known value before it is used. Algorithm Workbench Review: 3. Write assignment statements that perform the following operations with the variables a, b, and c. d. Adds 2 to a and stores the result in b e. Multiplies b times 4 and stores the result in a f. Divides a by 3.14 and stores the result in b g. Subtracts 8 from b and stores the result in a ii. b = a + 2 iii. a = b * 4 iv. b = a / 3.14 v. a = b - 8 4. Assume the variables result, w, x, y, and z are all Integers, and that w=5, x=4, y=8, and z=2. What value will be stored in result in each of the following statements? h. Set result= x+y i. Set result= z*2 j. Set result=y/x k. Set result=y-z vi. result = x++ - y; vii. Answer -4 viii. result = 4 – 8 = -4 ix. result = ++w + y; x. Answer xi. w = w + 1 = 5 + 1 = 6 xii. result = 6 + 8 = 14 5. Write a pseudo code statement that declares the variable cost so it can hold real numbers. * Declare Real price= 0.00 * Display "the original price." * Input item......

Words: 731 - Pages: 3

Unit 3 Assignment 1

...Jennifer Schneider – NT 1230 – Client-Server Networking – Unit 3; Assignment 1 IPv6 Addressing 1.) Research the following organizations and explain their involvement with the Internet Public IP Addresses a. American Registry for Internet Numbers: Allocates, transfers and records maintenance of IP addresses as well as reverse DSN. b. Internet Assigned Numbers Authority: Allocates IP addresses from the pools of unallocated addresses to the RIRs according to their needs as described by global policy and to document protocol c. Asia-Pacific Network Information Center: Distributes and maintains IPv6 addresses 2.) Approximately how many IPv4 addresses are possible? There are approximately 4.3 billion IPv4 addresses available. 3.) Approximately how many IPv6 addresses are possible? There are 340,282,366,920,938,463,463,374,607,431,768,211,456 Ipv6 addresses available 4.) Why do you think the world is running out of IPv4 addresses? The internet really started in the 70s as a DARPA research project. At the time, there were 60 or so institutions expected to connect. As the interested research community grew, the addressing scheme was expanded from 8 bits (256 addresses in the predecessor to Internet Protocol (IP) known as Network Control Protocol (NCP)) to 32 bits (the IPv4 addresses we have today). At the time, it was still expected that the internet would serve largely defense, research, and educational institutions. It was essentially a laboratory experiment on a really......

Words: 411 - Pages: 2

Unit 3 Assignment 1

...IS3340-WINDOWS SECURITY | Encryption and BitLocker Activity | Unit 3 Assignment 1 | | | 5/1/2014 | | 1. One of the shop floor computers that is connected to your network is commonly used by the floor manager. You want the floor manager’s files to be encrypted on that computer. Although the floor manager’s documents folder is on a central server, there are some local temporary files that could contain sensitive information and should be encrypted at all times. Which Windows encryption feature would best provide encryption for all of the floor manager’s local files while leaving other users’ files unencrypted? Folder Encryption: EFS 2. The human resource (HR) manager stores a spreadsheet with sensitive personal information on her local workstation. The spreadsheet is the only file with sensitive data and the name of the spreadsheet does not change. Which Windows encryption feature would ensure this one file is always stored on the disk in encrypted format? File Encryption: EFS 3. The chief executive officer (CEO) wants to copy confidential sales projection information from her workstation to her laptop via a universal serial bus (USB) device. What is the best option to ensure the confidential information is secure during the copying process? BitLocker To Go 4. You want to encrypt your main file server’s disk that stores confidential information for several users. Which Windows encryption feature encrypts an entire disk and is not......

Words: 294 - Pages: 2

Unit 3 Assignment 1 Essay

...Alpha Arnold PT1420 – Morning Feb 15, 2014 Unit 3 Assignment 1: Homework Short answers: 5. What two things must you normally specify in a variable declaration? You must specify the variable type and an identifier. 6. What value is stored in uninitialized variables? Some languages assign a default value as 0 to uninitialized variables. In many languages, however, uninitialized variables hold unpredictable values. Algorithm Workbench 3. Write assignment statements that perform the following operations with the variables a,b,c A. set b=a+2 B. set a=b*2 C. set b=a/3.14 D. set a=b-8 4. Assume the variables result, w,x,y, and z are all integers and that w=5, x=4, y=8, and z=2. What value will be stored in result in each in of the following statements? A. Set result = 4+8 B. Set result = 2*2 C. Set result = 8/4 D. Set result = 8-2 5. Write a pseudcode statement that declares the variable cost so it can hold real numbers. Dim cost1 As Double = 0 6. Write a pseudocode statement that declares the variable total so it can hold integers. Initialize the variable with the value 0. Dim cost1 As Integer = 0 7. Write a pseudocode statement that assigns the value 27 to the variable count. Dim count As Integer = 27 8. Write a pseudocode statement that assigns the sum 10 and 14 to the variable total /*Declare variables Total=0 A=10 B=14 Begin Total=A+B end 9. Write a pseudocode statement that subtracts the variable downPayment......

Words: 328 - Pages: 2

Unit 3 Assignment 1: Homework

...Kurt Trotter PT1420 Unit 3 Assignment 1 Week 3 07/06/2104 Homework Short Answers 5. You must specify type & name. 6. An uninitialized variable is by default a 0. Algorithm Workbench Review Questions 3) Write assignment statements that perform the following operations with the variable a, b and c. a) Adds 2 to a and stores the result in b. { b = 2 + a } b) Multiplies b by 4 and stores the result in a. { a = b * 4} c) Divides a by 3.14 and stores the result in b. { b = a MOD 3.14 } d) Subtracts 8 from b and stores the result in a { a = 8 – b } 4) Assume the variables result, w, x, y and z are all integers, and that w=5, x=4, y=8 and z=2. What value will be stored in result in each of the following statements? a) 12 = x + y b) 4 = z * 2 c) 2 = y / x d) 6 = y – z 5) Write a pseudocode statement that declares the variable cost so it can hold a real numbers. Dim cost1 As Double = 0 6) Write pseudocode statement that declares the variable total so it can hold integers. Initialize the variable with the value 0. Dim cost1 As Integer = 0 7)Write a pseudocode statement that assigns the value 27 to the variable count. Dim count As Integer = 27 8) Write a pseudocode statement that assigns the sum of 10 and 14 to the variable total. Total = 10 + 14 9) Write a pseudocode statement that subtracts the variable downpayment from the variable total and assigns the result to the variable due. due = downpayment – total 10) Write a pseudocode statement that...

Words: 417 - Pages: 2

En1320 Unit 3 Exercise 1 Analyzing Paragraphs

...1.Marvel Studios, LLC originally known as Marvel Films from 1993 to 1996, is an American television and motion picture studio based at the Walt Disney Studios in Burbank, California. [The studio is a subsidiary of Marvel Entertainment, a wholly owned subsidiary of The Walt Disney Company.]2. Being a part of the Disney conglomerate, Marvel Studios works in conjunction with The Walt Disney Studios, another Disney unit, for distribution and marketing. For financial reporting purposes,[ Marvel Studios is reported as a part of Disney's Studio Entertainment segment.] 3.Marvel Studios includes numerous units and joint ventures, both operating and defunct: Marvel Television, Marvel Animation, Marvel Music, MVL Productions LLC, and MLG Productions. [Among the many animated, television, feature film and music releases, the studio has been involved in three Marvel-character film franchises to have exceeded one billion dollars in North American revenue:] the X-Men, Spider-Man, and Marvel Cinematic Universe multi-film franchises, with X-Men and Spider-Man licensed out to 20th Century Fox and Columbia Pictures respectively.4. Marvel Studios' films are currently distributed by Walt Disney Studios Motion Pictures and by Universal Pictures for the Hulk films. 5.Marvel Studios has released nine films since 2008 within the Marvel Cinematic Universe: Iron Man (2008), The Incredible Hulk (2008), Iron Man 2 (2010), Thor (2011), Captain America: The First Avenger (2011), Marvel's The......

Words: 256 - Pages: 2

Unit 3 Assignment 1

...Unit 3 Assignment 1: Compare Windows 8 and Windows RT Course Objectives and Learning Outcomes Identify the characteristics of popular mobile operating systems. Compare mobile operating systems to their related desktop operating systems. Identify the characteristics of Windows Phone. Identify differences and similarities between Windows 8 and Windows Phone 8. Assignment Requirements Research Windows 8 and Windows RT on the Microsoft website and write a paper that discusses the implications of an integrated platform. Required Resources Web browser Windows RT website http://windows.microsoft.com/en-us/windows/rt Submission Requirements Submit a one-page paper that compares Windows 8 and Windows RT. The paper should identify five similarities and five differences between the platforms. You should also discuss how an integrated platform affects users and developers. Which operating system is required for mobile application development? Why? Evaluation Criteria Category | # | Criteria | CONTENT, 90% | 1.1 | The paper should identify 5 similarities between Windows 8 and Windows RT. Up to 20 points for this element | | 1.2 | The paper should identify 5 differences between Windows 8 and Windows RT. Up to 20 points for this element | | 1.3 | The paper should discuss how an integrated platform impacts users. Up to 20 points for this element | | 1.4 | The paper should discuss how an integrated platform impacts developers. Up to 20 points for this......

Words: 283 - Pages: 2

Unit 3 Assignment 1

...Remote Access Control Policy 1. It is the responsibility of Richman Investments employees, third party contractors, vendors and agents with remote access privileges to Richman Investments networks to ensure that their remote access connection is given the same consideration as the user's on-site connection to Richman Investments. 2. General access to the Internet for recreational use by immediate household members is discouraged through the Investment Dial-In Network. The Richman Investments employee is responsible to ensure the family member does not violate any Richman Investment policies, does not perform illegal activities, and does not use the access for outside business interests. The Richman Investments employee bears responsibility for the consequences should the access be misused. 3. Access to the Richman Investments Trusted Network will only be allowed from Trusted Users and other special ITS administered subnets. 4. Remote or outside Trusted Users (defined below) may gain access to Trusted hosts in one of two ways: a. The outside Trusted user will initiate a connection and authenticate to the Richman Investments VPN endpoint (see VPN_Policy). Username and password pairs will be distributed to Third Parties upon receipt of a valid Third Party Connection Agreement. Currently supporting Windows 8 with Microsoft SQL Server 2014. Network Infrastructure and Control Systems will make client software available upon request. b. The Richman......

Words: 362 - Pages: 2

Unit 3 Assignment 1

...Assignment Requirements 1. Look up other database-naming conventions. Is there one that makes the most sense to you? Explain why. 2. Look for Entity Relation Diagrams. What other ways of diagramming entities and relations did you find? Describe any similarities and differences between them. Solutions 1. A naming convention is important when working with databases in order to provide a clear structure and format; especially in team environments. By using these conventions the database can be understood by anyone applying these conventions; thus increasing maintainability. These are not rules but guidelines that can be adapted to any working environment. All names should be in camelcase with the first letter in lower case. Separate name parts by using camel case and NOT underscores or spaces. This provides better readability and you will not have to use quotes when doing SQL statements. Prefixes or namespaces are the ONLY parts of names that should be separated by underscores. This defines a clear separation between names and areas. Do not use numbers in names. This is poor design, indicating divided table structures. Do not use dot (.) separator between names, remember use camel casing. This way you will avoid problems when doing SQL statements as fields are accessed using dot notation. It goes without saying, do not use reserved database words in any name. Always try to use names that make sense and are descriptive of their purpose. Avoid abbreviations whenever......

Words: 625 - Pages: 3

Unit 3 Assignment 1

...Unit 3 Assignment 1: Networking Models Review 1. Which of the following is true about a TCP/IP network? 2. Which of the following terms is not a common synonym for TCP/IP model? (Choose two answers.) A.D. 3. Think generically about the idea of a networking standard, ignoring any particular standard or standards group. Which of the following is typically true of a standard? (Choose two answers.) B.C. 4. Contrast an international standard as compared to a de facto standard. (Choose two answers.) A.D. 5. Which of the following are true about the commonly used version of the TCP/IP model as shown in this chapter? (Choose two answers.) A.C. 6. The TCP/IP model refers to standards other than those the IETF defines in RFCs. Which of these standards groups is typically the source of external LAN standards? (Choose two answers.) B.D. 7. Which of the following is not a typical reason for a group of ten companies to start a vendor group, for the purpose of pushing a new networking technology? C. 8. The TCP/IP and OSI models have some obvious differences, like the number of layers. Think about the more commonly used version of the TCP/IP model discussed in this chapter, and then think about how to talk about TCP/IP using OSI terms. Which of the following is a correctly phrased statement for how to use OSI terminology? B. 9. Historically, which of the following models were the earliest models used in corporate networks? A. 10. Which of the......

Words: 592 - Pages: 3

Unit 3 Assignment 1

...October 1, 2014 NT2580 Unit 3 Assignment 1 There are three key parts I will have to take into account while designing a Remote Access Control Policy for Richman Investments. These three parts (Identification, Authentication and Authorization) will not be all for the Remote Access Control Policy, I will need to include the appropriate access controls for systems, applications and data access. I will also need to include my justification for using the selected access controls for systems, applications and data access. The first part I need to implement for this Remote Access Control Policy is Identification, which is defined in this sense as: physical keys or cards, smart cards, and other physical devices that might be used to gain access to something. What needs to be done for the Remote Access Control Policy is a group member policy needs to be setup which uniquely identifies each user. Users should be identified by rank with higher ranking users requiring more authentications. Each individual user should be assigned to a group based on rank with special permissions. Using this system for Identification will make our company more secure in day to day operations. The second part I need to implement for this remote access control policy is Authentication, which is defined as: what you know or passwords, numeric keys, PIN numbers, secret questions and answers. For remote access, there must be proof that the person is who they say they are every time they attempt to......

Words: 364 - Pages: 2

Unit 3 Assignment 1

...October 1, 2014 NT2580 Unit 3 Assignment 1 There are three key parts I will have to take into account while designing a Remote Access Control Policy for Richman Investments. These three parts (Identification, Authentication and Authorization) will not be all for the Remote Access Control Policy, I will need to include the appropriate access controls for systems, applications and data access. I will also need to include my justification for using the selected access controls for systems, applications and data access. The first part I need to implement for this Remote Access Control Policy is Identification, which is defined in this sense as: physical keys or cards, smart cards, and other physical devices that might be used to gain access to something. What needs to be done for the Remote Access Control Policy is a group member policy needs to be setup which uniquely identifies each user. Users should be identified by rank with higher ranking users requiring more authentications. Each individual user should be assigned to a group based on rank with special permissions. Using this system for Identification will make our company more secure in day to day operations. The second part I need to implement for this remote access control policy is Authentication, which is defined as: what you know or passwords, numeric keys, PIN numbers, secret questions and answers. For remote access, there must be proof that the person is who they say they are every time they attempt to......

Words: 364 - Pages: 2

Pt1420 Unit 3 Assignment 1

...Jairo Granado Prof. M. Ashraf PT1420 March 28, 2015 Unit 3 Assignment 1: Homework Short Answer 1. What two things must you normally specify in a variable declaration? You must specify type & name. 2. What value is stored in uninitialized variables? An uninitialized variable is by default a 0. Algorithm Workbench 3. Write assignment statements that perform the following operations with the variable a, b and c. a) Adds 2 to a and stores the result in b. { b = 2 + a } b) Multiplies b by 4 and stores the result in a. { a = b * 4} c) Divides a by 3.14 and stores the result in b. { b = a MOD 3.14 } d) Subtracts 8 from b and stores the result in a { a = 8 – b } 4. Assume the variables result, w, x, y and z are all integers, and that w=5, x=4, y=8 and z=2. What value will be stored in result in each of the following statements? a) 12 = x + y b) 4 = z * 2 c) 2 = y / x d) 6 = y – z 5. Write a pseudocode statement that declares the variable cost so it can hold a real numbers. Dim cost1 As Double = 0 6. Write pseudocode statement that declares the variable total so it can hold integers. Initialize the variable with the value 0. Dim cost1 As Integer = 0 7. Write a pseudocode statement that assigns the value 27 to the variable count. Dim count As Integer = 27 8. Write a pseudocode statement that assigns the sum of 10 and 14 to the variable total. Total = 10 + 14 9. Write a pseudocode statement that subtracts the variable downpayment from the variable total......

Words: 533 - Pages: 3

Unit 3 Assignment 1

...Craig Roxbury Unit 3 Assignment 1 Erica Lanier Video Summary 1 In video 1.07 the lesson is on ports and connectors. There are three different types of ports, those are serial port, parallel port and game port. The serial port is usually male and have 9 or 25 pins. The parallel port is usually female and has 25 pins. The game ports are female and have 15 pins. All of those ports have been replaced by USB ports. The video also discusses how the modem connects to a phone line and converts digital to analog. It explains there are two types of SCSI narrow and wide SCSI, the narrow SCSI has 50 pins and the wide has 68 pins. Video 1.09 teaches that there are two types of monitors, you have CRT and LCD. CRT stands for cathode ray tube and LCD stands for liquid crystal display. The CRT is similar to an old television and the LCD uses thin film transistors and the back lighting is through polarized panels. Your specifications of a monitor include screen size, contrast ratio, refresh rate, response time, interfacing, dot pitchand pixel pitch. Video 1.11 focuses on types of printers and the types of problems that come with each. There is the Dot Matrix, Ink Jet and the laser printers. Overall the videos covered your computer basics and the parts that make it productive. I could comprehend the objective of the videos but they all covered a plethora of information in a matter of minutes, so I feel there was a lot that I missed. Fortunately what I did not catch in the video......

Words: 322 - Pages: 2

Unit 3. Assignment 1

...Unit 3. Assignment 1. IPv6 Addressing 1. Research the following organizations and explain their involvement with the Internet public IP addresses a. American Registry for Internet Numbers (ARIN) ARIN, a nonprofit member-based organization, supports the operation of the Internet through the management of Internet number resources throughout its service region; coordinates the development of policies by the community for the management of Internet Protocol number resources; and advances the Internet through informational outreach. IP address space allocation, transfer, and record maintenance http://www.arin.net/about_us/overview.html b. Internet Assigned Numbers Authority (IANA) IANA is responsible for global coordination of the Internet Protocol addressing systems, as well as the Autonomous System Numbers used for routing Internet traffic. http://www.iana.org/numbers c. Asia-Pacific Network Information Center (APNIC) The Asia Pacific Network Information Centre (APNIC) is an organization that manages the assignment of Internet number recourses within the Asian continent. APNIC sets the rules, regulations and standards that all designated organizations must abide by and implement. End-user organizations and Internet service providers take direction from Regional Internet Registries (RIRs) like APNIC to provide Internet resources within certain regions. The Internet number resources include antonymous system numbers as well as IP addresses that assist in clearly......

Words: 577 - Pages: 3

Movies List | HD Lời Th Thầm Dẫn Lối 속닥속닥 2018 | Eat In Style