The Information Age in the Navy

In: Computers and Technology

Submitted By jaemondr24
Words 563
Pages 3
Written Assignment #1

Email enables Sailors to send messages to anyone or any specific group in the command. My Chief, who is my supervisor, receives emails with instructions from her superiors. My Chief then informs me of the instruction by forwarding that e-mail or sending me an e-mail with tasks to execute. E-mails also allows collaboration between departments of the command to be done fast and effectively. Simply pull up names from other departments using a global access list and send the message. Collaboration between departments are important to mission readiness because it allows them to access resources that they would not otherwise have without their help.

Cellphones allows information and messages to be sent quickly. Telephone repeaters installed throughout the ship allows cellphones to have reception. Quick messages are vital to accomplish tasks in the Navy. Last minute important information might come up that would be important for us to know. For example, if I am given an urgent task to complete and need help, I would immediately text or call one or more of my shipmates.

Microsoft Excel tracks important data in a clear and organized way. Spreadsheets are needed to track important information such as budgets, project deadlines, training dates, and command climate surveys. For example, I am my department’s tracker of material issues in our spaces. I have a spreadsheet for each division which lists the date the issue was submitted, the space location, and whether the issue is corrected. This has helped me keep track of the issues in a clear, organized, and efficient manner.
Microsoft Powerpoint is another asset the Navy uses for training. Powerpoint presentations are easily made, accessible, and deliverable which is perfect the distribution of the training throughout the command.

My command utilizes a share drive. It allows…...

Similar Documents

Your Medical Information in the Digital Age

...MD Your Medical Information in the Digital Age The U.S. is moving toward electronic health records. Here’s how to make that work for you. for granted that you should manage your own résumé. After all, it catalogs your professional history and accomplishments – who else would manage it well? But chances are you don’t oversee your own medical records. Until now, doing so has been difficult because bits and pieces of your information are probably scattered across the files of several doctors, hospitals, labs, and pharmacies. That’s an inconvenient – and potentially dangerous – state of affairs, but one a new federal law may help to remedy. The American Recovery and Reinvestment Act is providing about $30 billion to improve the exchange of health care information. One trickle-down effect will likely be greater access to your lifetime medical information through a personal health record in electronic form. The underlying idea is simple: YOU PROBABLY TAKE Compiling your medical data in one place lets you be the steward of your health information. Like first writing up a résumé, creating a personal health record takes time, but there are several payoffs. Having the record can prevent unnecessary testing and treatment (and, in turn, save you money), reduce the chance of a medication error, and instantly provide vital information in an emergency. It also can be used to keep track of your weight, blood sugar, and much more. (For a list of the minimum information that your record......

Words: 998 - Pages: 4

The Navy

...Running head: THE NAVY 1 The Navy M Stevens University of Phoenix MGT 330 Daniel Capps, Jr. October 13, 2011 The Navy 2 The Navy The Navy’s mission statement is to maintain and train the Naval forces for combat-ready capabilities in completing missions. Collaboration with other uniformed services is one of the main key factors to succeed in every mission. According to Vice Adm. Bill Gortney, “Our mission is to provide a lawful maritime order and deny the use of the sea to terrorist and violent extremist. We do this through our presence…” As an enlisted service member in the Navy the organizational structure practices, uses the physical assets, monetary, human resources, knowledge, technology, and to achieve missions. These missions are set for each fiscal year to cover the monetary assets, and technology required. People interested in joining the Navy reserves and the regular active duty seek out for a Navy recruiter for information. The recruiters will screen the participants based on the person’s interest, background check, age, high school diploma or GED, and citizenship; these are some of the basic requirements that need to be met before enlisting in the Navy and other branches. Another important qualification is the person must be in physical shape before he or she signs a contract, and sent to basic training for three months. The Navy is......

Words: 1410 - Pages: 6

Computers: Tools for an Information Age

...Computers: Tools for an Information Age Chapter 6 Storage and Multimedia: The Facts and More Copyright © 2003 by Prentice Hall Secondary Storage • Separate from the computer itself • Software and data stored on a semipermanent basis – Unlike memory, not lost when power is lost • Benefits Copyright © 2003 by Prentice Hall 2 Benefits of Secondary Storage • • • • Space Reliability Convenience Economy Return Copyright © 2003 by Prentice Hall 3 Space • Store a roomful of data on disks smaller than the size of a breadbox – Diskette contains equivalent of 500 printed pages – Optical disk can hold equivalent of 500 books Return Copyright © 2003 by Prentice Hall 4 Reliability • Data in secondary storage is relatively safe – Secondary storage is highly reliable – More difficult for untrained people to tamper with data stored on disk Return Copyright © 2003 by Prentice Hall 5 Convenience • Authorized users can easily and quickly locate data stored on the computer Return Copyright © 2003 by Prentice Hall 6 Economy • Several factors create significant savings in storage costs – Less expensive to store data on disks than to buy and house filing cabinets – Reliable and safe data is less expensive to maintain – Greater speed and convenience in filing and retrieving data Return Copyright © 2003 by Prentice Hall 7 Magnetic Disk Storage • Data represented as magnetized spots on surface of spinning disk – Spots on disk......

Words: 1315 - Pages: 6

Living in the Information Age

...Writing Assignment 2 The difference between what evaluative and assessment information is provided by an Internet search using Google.com and a search using EBSCO’s Academic Search Premier Database is extremely different. I started my searches by open two different internet windows, Google on one and EBSCO on another. My Google search and EBSCO search was “articles on privacy and security on the internet”. The top result from Google was ftc.gov. This page had a list of three different microsites, two did not have any articles and the other one did. The article I found was on Malware. When I evaluate this article from the techniques from the Berkeley site, it does not rate well. It has no author and it does not cite any sources. The one plus it does have is that it is from a .gov site. Even though it does not rate well I do trust this site. The reason why I trust the site is because in the fifth step of the evaluation process, listen to your gut reaction. Think about why the page was created, the intentions of its author. My gut reaction tells me the information is coming from a government cite so I trust it. The purpose of this article was to inform and educate, there were no other intentions other than to inform and educate. My top result from EBSCO was an article from Communications of the ACM called Privacy and Security as Simple as Possible, But Not More So. The authors of this article are very creditable and qualified on the topic. This article was published to......

Words: 335 - Pages: 2

Personal Identifiable Information in Today’s Age

...Personal Identifiable Information in Today’s Age Problem Statement Personal Identifiable Information (PII) is sensitive data of a person’s identity. If mishandled, this information can result in identity theft. There have been millions of consumers who have had their identity compromised from misuse or lost PII. To adequately protect PII, one must understand what it is. PII is information that can distinguish or trace a person identity. A few examples such as, a person’s Social Security number, age, home and office phone numbers are forms of PII. While the Social Security card is a distinctive document linking a person’s name and Social Security number, when associated with other forms of PII, as previously mentioned, it creates a high risk to the individual and eventually can lead to identity theft (Department of Defense, 2012). To assist consumers with identity theft government officials have established a Task Force and initiated several Acts to protect consumers. End Personal Identifiable Information in Today’s Age Information in today’s age is becoming easily accessible to many people. The Internet is just one resource that can provide information about a person. Internet search engines, such as Google provide a wealth of information, if used properly about a person. It is vital for the public and private sector to be aware and protect critical information from unwanted hands, if used illegally can cause damage to person’s identity. Besides search engines,......

Words: 953 - Pages: 4

Social, Legal, and Ethical Issues in the Information Age

...Chapter 5 Social, Legal, and Ethical Issues in the Information Age Teaching Objectives Students should be able to answer the following questions: 1. What ethical, social, and political issues are raised by information systems? 2. Are there specific principles for conduct that can be used to guide decisions about ethical dilemmas? 3. Why does contemporary information technology pose challenges to the protection for individual privacy and intellectual property? 4. How have information systems affected everyday life? 5. How can organizations develop corporate policies for ethical conduct? Key Terms The following alphabetical list identifies the key terms discussed in this chapter. The page number for each key term is provided. |Accountability, 154 |Intellectual property, 164 | |Carpal tunnel syndrome (CTS), 176 |Liability, 154 | |Computer abuse, 173 |Non-obvious relationship awareness (NORA), 153 | |Computer crime, 173 |Opt-in, 161 | |Computer vision syndrome (CVS), 177 |Opt-out, 161 | |Cookie, 160 ...

Words: 5310 - Pages: 22

Ethical Issues of Information Age

...THE INFORMATION AGE The information age as defined by generation of today is growing up surrounded with intellectual capital that is formed through the use of information. Information means increasing the capacity of the mind to achieve its goals, resulting of an input from another mind”. (Mason, 2012) The construction of high importance of intellectual capital is also very important because of all the different ethical issues. These issues are defined as certain values relating to the conduct of human with respect to what’s right or wrong. The four main ethical issues are, property accuracy accessibility and privacy these are what we need to be more aware of. In disputing the aspect of privacy, it’s important that we pay close attention to two important issues: the growth and value we place on informational technology in our decision making. We should asked ourselves what type of information should a person reveal to others, or what type of conditions or type of things should we keep to ourselves without being forced to reveal them to others (Mason, 2012). The four different categories of private information can be divided into; private communication, and privacy of the body, personal information, and information about one’s possessions (Britz, 2012). For instance privacy can be violated with misuse of communication, the merging of documents, the retrieval of document, as well as alteration of information along with the failed attempt of storing that......

Words: 715 - Pages: 3

Information Age & Information Privacy

...INFORMATION AGE AND INFORMATION PRIVACY UNIVERISTY OF MARYLAND UNIVERSITY COLLEGE 5 AUGUST 2011 | An estimated 35 million people use e-mail – either via their company’s computers or on paid networks. Unlike telephone calls, which by law are private because the phone lines are considered common carriers, a company owns its computer network and all the data in it. Seemingly, private email has been used against employees in everything from sexual harassment cases to charge of trade secret theft. Even employees who carefully delete their email cannot escape cyber-investigators who can hunt through a computer’s backup system to find just about anything ever stored in a computer. That is to say, the use of email is like having a video camera consistently running. Information Privacy can be defined as the relationship between collection and dissemination of the information. There is no doubt that there is a public expectation of privacy, however, the term itself has legal and political issues surrounding it. Information Privacy affects our personal and professional life. With the invention of the personal computer in 1970 and the internet reaching a critical mass in 1990, and the adoption of this technology three decades later, we society catapulted into what is known as the “Information Age”. The “Information Age” has allowed global network communication and shaped our modern society. With so many advancements in technology and the reliability of computers in......

Words: 1364 - Pages: 6

Leadership in an Information Age

...Theme: - Business Management and Information Technology Sub-Theme:- Leadership in the Information age Mrs. Khushboo sandhu, Asst. professor in M.k Ponda College Of management, Bhopal (MBA H.R) Abstract Information will be the greatest opportunity for business leaders in the coming years. Information is becoming the engine that drives the economy & organization, if organization wants to achieve their predetermined goals change management is become necessary. As the scope, speed and impact of information change is appreciated. Organizations must leverage their leaders so that they are able to solve today’s complex problems to achieve organizational and cross boundary goals. In this era international trade, traditional management is impossible as leaders have to work beyond boundaries of nation, work with different cultures. This paper suggests imperatives for leaders and organization to manage change for survival in today’s dynamic information age Keywords:- Dynamic Information age, Change management. Theme: - Business Management and Information Technology Sub-Theme:- Leadership in the Information age ...

Words: 2395 - Pages: 10

Living in the Information Age Wa-6

...fingertips one might wonder how something that seems so complete could even become more advanced. “In the very near future, another huge jump will be made: integrating the information on the Internet with our surroundings. By that I mean being able to look at a building, product or place and immediately seeing information about the subject on our devices and eventually just with our eyes.” (Lejuwaan, Jordan) With this statement you might start to envision seeing how long that line is inside the busy department store, or possibly if someone you might know is working today. I believe that smart phone technology might be interrogated into glasses to allow us to see instant information from the internet, such as customer reviews on a particular item, or even up to date traffic information while we are trying to commute to work. This application might be already in its early development.” a new device has come out that overlays video onto our normal vision using special glasses. It’s called the Vuzix display Wrap 920AR and it goes on sale soon for around $800.” (Lejuwaan, Jordan). With the ever constant advancements in computers, and hand held technology, it is easy to see that the technology of the future is going to be improved to levels that our grandparents might have never believed possible, but in todays technological age it can be, and is very possible. The question really is when we are the grandparents, how will we view the worlds technology? Works......

Words: 570 - Pages: 3

Competing in the Information Age

...LEARNING OUTCOMES Q.1 Describe the information age and the differences among data, information, business Intelligence and knowledge. Ans: We currently live in an information age where massive amounts of information and facts are available to anyone who knows how a computer works. The information age has four fundamental rules to work which are data, information, business intelligence and knowledge. The difference among these are that firstly data, which to put into simple words is the facts that describe an event or object. Information is that same data but the difference is that now the data is transformed into useful and meaningful content relating to the object or event. Business intelligence is the gathering of information from different sources such as suppliers, customers, competitors, partners and industries and gathering them into one place to figure out the patterns, trends and relationships for a successful business to flourish. Knowledge are the facts, information and skills acquired through experience and expertise put together with information and intelligence. As we start form data and move to knowledge we are including more and more information which is relevant, accurate and precise that results in more efficient decision making and problem solving. Q. 2 Identify the different departments in a company and why they must work together to achieve success. Ans. Companies are split up into different departments which allow the company to run smoothly...

Words: 1043 - Pages: 5

Core Drivers of Information Age

...The core drivers of the information age are: Data, Information, Business Intelligence and Knowledge. Data: Data are raw facts that describe the characteristics of an event or object. Before the information age, collecting and analyzing data is a time consuming and complicated task for managers as they used to do it manually. Managers often found difficulty in making business decisions about how many employees to hire, how much material to order. They used to do it based on intuition or gut feelings. In the information age, Managers make more successful business decision by compile, analyze and comprehend massive amounts of data daily. Information: If data is converted into a meaningful and useful context is called Information. Information has a good value when people use it. Having the right information at the right moment in time can be worth a fortune. Having the wrong information at the right moment or the right information at the wrong moment can be disastrous. Business Intelligence: For making strategic decisions, industries analyze patterns, trends, and relationships by collecting information from multiple sources such as suppliers, customers, competitors and partners is called Business Intelligence. Knowledge: Person’s intellectual resources is called knowledge which includes the experience, skills, expertise, information and intelligence. Those who has the ability interpret and analyze information are called knowledge workers. Knowledge workers......

Words: 279 - Pages: 2

Living in the Information Age

...From the automobile to the computer, the light bulb to the micro-chip, the emergence of new technology has been the story of human development over the past 150 years. With the current challenges, such as how to slow global warming, feed a rapidly expanding population, and cure disease, the technology just beginning to emerge is more crucial than ever. The world might be increasingly reliant on high-tech gadgets and new-media information sources, but, contrary to popular belief, that has only seemed to strengthened traditional family values.   What we need to realize is that “traditional family values” is a very hard thing to define, because it means different things depending on different families’ traditions. Since human beings first fashioned primitive hand tools, technology has continuously transformed the way we life, the nature of our relationships with each other and the manner in which we interact with our environment and nature itself. It is said that technology affects us from the cradle to the grave. Technology now affects us before we are born and in many cases after we die. Technology will enable diverse cultures to collaborate more efficiently, in every sphere. It will bring people and organizations together, closer. Technology will strengthen the institution of family and help it survive the onslaught of modernity and individualism by creating newer and richer touch points. Ten years ago, we were drifting away from our extended families – our cousins,......

Words: 523 - Pages: 3

Navy

...Jathan Prince 3/31/11 8 Navy Jathan Prince 3/31/11 8 Navy Essay 5 A “Pet Peeve,” is something that DRIVES YOU CRAZY! I know I have some Pet Peeves of my own, For example: One “Pet Peeve” I have is when my 3 year old little brother, Levi, comes in my room, and thrashes it! Levi leaves his toys EVERWHERE, which causes me to step and trip all over them. This definitely DRIVES ME CRAZY! Another “Pet Peeve” I have, is when I’m playing video games with my friend and my little brother comes in my room and stands in front of the TV. I often ask him to “sit down please.” He just says, “No.” And continues to stand there. It seems as though he is interested in what I am doing, but really, I think he may be trying to DRIVE ME CRAZY! A literal “PET Peeve” I have is when I’m busy doing anything that requires laying or sitting down, my cat “Baby,” Demands my attention. She likes to be petted, cuddled, scratched, fed, or anything that will redirect my focus onto her. For example: right now I am trying to get my homework done, and here she is, right in my face….“Meow?” (Ok, it is pretty cute.) Lastly, one of my previous “Pet Peeves,” (that doesn’t effect me that much anymore.) was timing. I could not stand it, if I was late anywhere! Whether the appointment was important or not, I did not want to be late to it! This is not to say I disregard the value of time or ignore the responsibility of being to school on time, for example. It simply means if my mom says we will go get ice......

Words: 308 - Pages: 2

The Value of Digital Privacy in an Information Technology Age

...Digital Privacy in an Information Technology Age Diana Flynn Strayer University Professor James Merola April 30, 2012 1. List and describe at least three (3) technologies that allow an individual to research citizen’s private data. Intelius.com is a technology that helps people find family members, friends, classmates, military buddies and almost anyone living in the United States. It sells background information to anyone or anybody regardless of who you are. DateCheck is a site hosted by Intelius which stores reports including names, addresses, birth dates, court records, and cell phone numbers. People can access personal records by name, social security number or phone number through Intelius. The second technology is Google.com. If you are looking for information on someone, searching the web using Google is one of the best places to start. A person can find background information, phone numbers, addresses, maps and more. On the flip side, anyone can find the same information about you. Information is given by citizens opening up an account. It is the basic information such as name, address, phone, email or credit card number. Information is shared with companies, organizations, and in individuals outside of Google with consent. Data searched on the web is stored to improve and maintain the security of their systems. Government agencies request information from Google......

Words: 1451 - Pages: 6

Handbook Of Sports Medicine And Science Basketball | Business | Chip Hailstone