Assessment #1

In: Philosophy and Psychology

Submitted By pamelabranham
Words 440
Pages 2
Pamela G. Branham
Economics
Assessment #1

I am pursuing an Associate’s degree in the Administrative Professional program at NWTC. I have worked in this field about 10 years and enjoy it very much. I recently moved to Green Bay, WI 4 years ago October 30th of this year. I have had the hardest time finding a job in this field here without my associate’s degree regardless of my experience. This is why I decided to come back to school.

My economic cost is working part time 36 hours a week most likely making 9 dollars an hour without my degree. I would be making about 15,500 dollars a year. My school loans are about 10,000 a year and I plan to be in school for three years adding up to 30,000 for three year of. I would not be able to work full time because I am a single mother of two my youngest is just starting school. My son will start school full time in two year and that is when I will I go back to work full time. My opportunity cost is 47,000 a year (Labor, 2012) with my degree and experience.

There are many skills need to be an administrative professional here are a couple I feel is a must technology skills, communication skills, organizational skills, and time management skills. To acquire these necessary skills you must be educated in the area rather it be school or training classes. There are many position I could peruse with this degree for example the front office of a school, in a daycare, a cooperate office. Almost every business has a specific person who takes care of mast of the paper work. For me, my dream is to open my own print shop where I would specialize in contracts, advertisement, party invitations, etc.

A student should do their best to pay their student loans back when finding a job you should set aside a certain amount every pay check. If you find yourself in a dead end job with a college degree you need to do some research and find…...

Similar Documents

Assessment Task 1

...School/Portfolio: | The Business School | Course Code/ID: | BUMGT5921 | Course Title: | Organizations: Behaviour, Structure, Processes | Teaching Location: | Melbourne Institute of Technology | Program(s): | Master of Business Administration | Coordinator: | Dr Syed Uddin | Level: | Introductory | Semester: | 2/2013 | Prerequisite(s): | Nil | Corequisite(s): | Nil | Exclusion(s): | Nil | Credit Points/Progress Units: | 15 | ASCED Code: | 080307 | Adopted Reference Style APA 1 COURSE ORGANISATION: 1.1 Student Responsibility It is the responsibility of every student to be aware of the requirements for this course, and understand the specific details included in this document. For full details of programs and school procedures, please refer to the University of Ballarat handbook (http://www.ballarat.edu.au/future-students/handbook ) and The Business School Programs Handbooks available at http://www.ballarat.edu.au/business/handbooks Students should be aware of the content of the handbooks, particularly: * * Special Consideration process and forms * Assignment Coversheet * Submission of tasks and assignments * Grading codes * Appeal process * Unsatisfactory progress - Early Intervention * Appeal process * Unsatisfactory progress - Early Intervention * Grading codes 1.2 Staff The most appropriate contact is your teacher. If necessary they will contact the Course Coordinator at...

Words: 4040 - Pages: 17

Lab Assessment 1

...LAB #1 – ASSESSMENT WORKSHEET Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: MIS 315 Student Name: Instructor Name: Lab Due Date: Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, you planned an attack on 172.30.0.0/24 where the VM server farm resides, and used the Zenmap GUI to perform an “Intense Scan” on the targeted IP subnetwork. Note: These forms have been formatted to allow you to complete the form online and save it using Adobe Reader. You may experience problems with either or both of these actions if you are using any other software program. Lab Assessment Questions & Answers 1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. WINDOWS APPLICATION LOADED STARTS AS SERVICE Y/N 1. Nmap Zenmap GUI T Yes T No 2. T Yes T No 3. ...

Words: 444 - Pages: 2

Lab 1 & Assessment Questions

...IT255 Lab 1 & Assessment Questions Starting Nmap 5.21 ( http://nmap.org ) at 2012-03-28 19:38 Eastern Standard Time Nmap scan report for 172.30.0.10 Host is up (0.0054s latency). Not shown: 92 closed ports PORT STATE SERVICE 53/tcp open domain 88/tcp open kerberos-sec 135/tcp open msrpc 139/tcp open netbios-ssn 389/tcp open ldap 445/tcp open microsoft-ds 1025/tcp open NFS-or-IIS 1027/tcp open IIS MAC Address: 00:0C:29:99:40:7B (VMware) Skipping SYN Stealth Scan against 172.30.0.75 because Windows does not support scanning your own machine (localhost) this way. Nmap scan report for 172.30.0.75 Host is up. PORT STATE SERVICE 7/tcp unknown echo 9/tcp unknown discard 13/tcp unknown daytime 21/tcp unknown ftp 22/tcp unknown ssh 23/tcp unknown telnet 25/tcp unknown smtp 26/tcp unknown rsftp 37/tcp unknown time 53/tcp unknown domain 79/tcp unknown finger 80/tcp unknown http 81/tcp unknown hosts2-ns 88/tcp unknown kerberos-sec 106/tcp unknown pop3pw 110/tcp unknown pop3 111/tcp unknown rpcbind 113/tcp unknown auth 119/tcp unknown nntp 135/tcp unknown msrpc 139/tcp unknown netbios-ssn 143/tcp unknown imap 144/tcp unknown news 179/tcp unknown bgp 199/tcp unknown smux 389/tcp unknown ldap 427/tcp unknown svrloc 443/tcp unknown......

Words: 1062 - Pages: 5

Unit 1 Assessment Worksheet

...IS3445T Security for web applications | Evaluate Business World Transformation- Impact of the Internet and WWW | Unit 1 Lab 1 | | Daniel Alvarado Jr. | 6/24/2014 | | LAB ASSESMENT QUESTIONS & ANSWERS 1. From the results of the Lab #1 – Business Application Impact Analysis Worksheet, what do you consider to be the greatest type of risk and why? * Private own Bank/ due to financial information 2. Why is it critical to perform periodic web application vulnerability assessments and penetration test? * To reduce vulnerabilities and test environments/ in addition to securing operating systems 3. What kind of web application does Damn Vulnerable Web Application use? * PHP/open source APP * Web Based * Penetration Testing 4. Why is connecting your web servers and web application to the internet like opening Pandora’s Box? * Opens your system to vulnerability confidential information 5. What does the skipfish application do and why is it good security tool for web servers and web application testing? * High speed Web App Recon Tool 6. What is tcdump and why is it a good tool for application for testing the Ubuntu Linux web server and web application security? * Allows to see traffic protocol testing 7. What does the Firefox Live HTTP Headers Plug-in application do, and why is this a good tool for web server and web application security testing? * Debug Application * See Server response 8...

Words: 294 - Pages: 2

Assessment 1

...Risk review Candidate’s name | | Phone number | | Email address | | Date submitted | | Performance objective For this task you are required to determine the risk context associated with establishing a new business outlet, within the existing business structure. They will be required to review internal and external environment factors and liaise with all stakeholders to generate a list of risks. Assessment description For the case study provided with this Assessment Task, you are required to review risk management processes and determine scope and objectives, taking into account stakeholder input and both internal and external environmental factors affecting the organisation. With the information gathered, you are to identify risks and present this to relevant parties for feedback. Page numbers in blue denote the appropriate section of the Student Workbook which you should refer to when necessary. ------------------------------------------------- Case Study: Business plan (excerpt) MacVille business plan FY 2011/12 Mission MacVille cafes serve competitively priced, high quality coffee and gourmet food in a safe and comfortable cafe-style environment. Our friendly, well-trained staff provides superior customer service. Vision MacVille aims to deliver our valued customers the very best cafe-going experience. In three years, the business will have established a presence across Queensland and NSW, with the opening of additional cafes. ...

Words: 4699 - Pages: 19

Issc421 Lab 1 Assessment

...ISSC421 Week 1 Lab #1: Analyze Essential TCP/IP Networking Protocols Instructor Name: ________________ Lab Assessment Questions 1. What is the purpose of the address resolution protocol (ARP)? ARP is used to convert an IP address to a physical address such as an Ethernet address 2. What is the purpose of the dynamic host control protocol (DHCP)? Dynamic Host Configuration Protocol (DHCP) assigns dynamic IP addresses to devices on a network, assigning a different address every time it connects to the network 3. 3. Identify the DHCP allocated source IP host address for the vWorkstation desktop and the TargetWindows01 virtual server. 172.30.0.2 – Student VM 172.30.0.8 – Target VM 4. When you pinged the targeted IP host (172.30.0.8 or 172.30.0.200), what was the source IP address and destination IP address of the ICMP echo-request packet? 172.30.0.2 Source 172.30.0.8 Destination 5. Did the targeted IP host respond to the ICMP echo-request packet with an ICMP echo-reply packet? If yes, how many ICMP echo-request packets were sent back to the IP source? Yes, 8 packets sent in the reply 6. Find a TCP three-way handshake for a Telnet, FTP, or SSH session. What is the significance of the TCP three-way handshake? The three way handshake is needed to establish a reliable connection between computers. 7. What was the SEQ# of the initial SYN TCP packet and ACK# of the SYN ACK TCP packet? The SEQ# is 0 for the initial SYN TCP packet and ACK# 1 of the SYN......

Words: 410 - Pages: 2

Assessment 1

...------------------------------------------------- | 1. You can use surveys, such as email surveys, paper surveys and internet surveys. 2. You can use suggestion boxes.3. You could hold focus groups. | | a) Internal customers ☐ b) External customers ☐ Suggestion boxes can generate good ideas from the customers, however they do require maintenance, such as follow-ups in order to make the customers feel valued after they have made their suggestion. The suggestion boxes should be placed in the store where customers have easy access to them | The 5 components are:*Problem identification*Research in to product or service solutions*Evaluation of alternatives*Purchase/use*Post purchase/useThe general process described varies from customer to customer, depending on their different needs and individual characteristics. Every customer is different, to some degree. The idea that, even though individual customers vary from each other, in respect to some personal attributes, consumers act in similar ways with respect to their decision-making and purchasing behaviour. It is this idea that the science of the marketing of products and of services depends on. | 1. Cost (Price) The product was highly overpriced, as I could have gone somewhere else and bought a similar product for cheaper. | 2. Quality The quality was not what I expected, given the sales persons sales pitch. | 3. Time (Delivery) I was given a turnaround time of a few days and ended up......

Words: 757 - Pages: 4

Lab 1 Assessment

...Lab #1 – Assessment Worksheet Overview In this lab, you explored the common tools available in the virtual lab environment. You used Wireshark to capture and analyze network traffic and OpenVAS to scan the network. You reviewed a sample collection of data using NetWitness Investigator, connected to a remote Windows machine, and explored two file transfer applications, FileZilla and Tftpd64. You used PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for the network interfaces. Finally, you used Zenmap to perform a scan of the network and created a network topology chart. Lab Assessment Questions & Answers 1. Name at least five applications and tools used in the lab. Wireshark, NetWitness Investigator, OpenVAS, FileZilla, and Tftpd64 2. What is promiscuous mode? Promiscuous mode allows Wireshark to capture packets destined to any host on the same subnet or virtual LAN (VLAN). 3. How does Wireshark differ from NetWitness Investigator? Wireshark offers a deep dive into individual packets, while NetWitness Investigator allows a high-level view that can be stored and compared to newer packet captures to help identify new threats and problems. 4. Why is it important to select the student interface in the Wireshark? The student interface contains the subnet we are looking for in all of the following steps. Choosing the public interface would prevent us from seeing the traffic related to the lab. 5. What is the......

Words: 439 - Pages: 2

Assessment 1-Business and Administration

...Unit one: Principles of personal responsibilities and working in a business environment Assessment You should use this file to complete your Assessment. • The first thing you need to do is save a copy of this document, either onto your computer or a disk • Then work through your Assessment, remembering to save your work regularly • When you’ve finished, print out a copy to keep for reference • Then, go to www.vision2learn.com and send your completed Assessment to your tutor via your My Study area – make sure it is clearly marked with your name, the course title and the Unit and Assessment number. Please note that this Assessment document has 15 pages and is made up of 7 Sections. Name: Section 1: Rights and responsibilities at work This section will help you to evidence Learning Outcome 1: Know the employment rights and responsibilities of the employee and employer |Learning objective |Place in Assessment | |1.1 Identify the main points of contracts of employment |Question 1 Page 1 | |1.2 Identify the main points of legislation affecting employers and employees |Question 2 Page 2 | |1.3 Identify where to find information on employment rights and responsibilities both |Question 3 Page 3 ......

Words: 3991 - Pages: 16

Assessment 1 - Project Management

...T. +61 2 9283 4388 | E. info@wic.nsw.edu.au Lower Ground, 101 Sussex St., Sydney NSW 2000 Australia | www.wic.nsw.edu.au ABN: 19 080 559 600 | CRICOS CODE: 01856K | RTO: 90501 Assessment 1 – Presentation Instructions: You have been assigned to set update the website for Windsor Institute. It is not required to have skills of developing websites however it is required that you may do some research or discuss with your trainer to identify tasks involved in such projects or processes. You may also visit the current Windsor website (www.windsor-ic.com.au) to identify organisational vision/strategy and needs for the update. You need to demonstrate (present) your ability to identify the strategic and operational needs of the IT project and develop a project plan including scheduling and project control plans like quality and risk management plan. During this demonstration (presentation) you also need to determine project approach or project phases. Duration: Trainer will set the duration of the assessment. Evidence required: Tasks Evidence Submission Task At least 25- 30 presentation slides on the topics listed below. Use screen shots for the plans and the charts to fit them in one slide. Presentation in front of the class and the trainer. Also in printing Your tasks: Prepare some (20-22) presentation slides to present the following items to your trainer:             Windsor’s strategic and operational needs......

Words: 582 - Pages: 3

Business and Administration Assessment 1

...Unit one: Principles of personal responsibilities and working in a business environment Assessment You should use this file to complete your Assessment. • The first thing you need to do is save a copy of this document, either onto your computer or a disk • Then work through your Assessment, remembering to save your work regularly • When you’ve finished, print out a copy to keep for reference • Then, go to www.vision2learn.com and send your completed Assessment to your tutor via your My Study area – make sure it is clearly marked with your name, the course title and the Unit and Assessment number. Please note that this Assessment document has 15 pages and is made up of 7 Sections. Name: Section 1: Rights and responsibilities at work This section will help you to evidence Learning Outcome 1: Know the employment rights and responsibilities of the employee and employer |Learning objective |Place in Assessment | |1.1 Identify the main points of contracts of employment |Question 1 Page 1 | |1.2 Identify the main points of legislation affecting employers and employees |Question 2 Page 2 | |1.3 Identify where to find information on employment rights and responsibilities both |Question 3 Page 3 ......

Words: 3920 - Pages: 16

Business and Admin Assessment 1

...Unit one: Principles of personal responsibilities and working in a business environment Assessment You should use this file to complete your Assessment. • The first thing you need to do is save a copy of this document, either onto your computer or a disk • Then work through your Assessment, remembering to save your work regularly • When you’ve finished, print out a copy to keep for reference • Then, go to www.vision2learn.com and send your completed Assessment to your tutor via your My Study area – make sure it is clearly marked with your name, the course title and the Unit and Assessment number. Please note that this Assessment document has 15 pages and is made up of 7 Sections. Name: Rachel Aspinall Section 1: Rights and responsibilities at work This section will help you to evidence Learning Outcome 1: Know the employment rights and responsibilities of the employee and employer |Learning objective |Place in Assessment | |1.1 Identify the main points of contracts of employment |Question 1 Page 1 | |1.2 Identify the main points of legislation affecting employers and employees |Question 2 Page 2 | |1.3 Identify where to find information on employment rights and responsibilities both |Question 3 Page 3 ...

Words: 3852 - Pages: 16

Bsbsmb401As Assessment 1

...BSBSMB401AS – Establish Legal and Risk Requirements of Small Business ASSESSMENT 1 Question 1 * Sole Trader – One advantage of operating as a Sole Trader are the minimal establishment costs and one disadvantage would be having unlimited liability. * Partnership – One advantage of operating as a Partnership is the ability to split taxation and one disadvantage is that salaries are not tax deductible. * Company – One advantage of operating as a Company is that it allows for perpetual succession and one disadvantage are the statutory obligations. * Trust – One advantage of operating as a Trust is that it offers many of the advantages of a company structure and one disadvantage is that trusts are complex in their structure and require professional advice. Question 2 In Queensland, you are required to register a business name if you trade under a name that isn’t your natural or corporate name. Question 3 In Queensland the Workers Compensation Act is administered by the State via WorkCover Queensland. Question 4 Only when the contracted work performed is paid for as a mix of labour and some materials, or the workers are on lump sum labour only and use other than hand tools, is the employer exempt from paying the levy. Question 5 Government regulations require you, as an employer, to contribute the equivalent of 9% currently of each employee’s ordinary times earnings to an approved superannuation fund on each employee’s behalf. This......

Words: 1447 - Pages: 6

It 273 Project Assessment 1

...Project Assessment 1 Click Link Below To Buy: http://hwcampus.com/shop/273-project-assessment-1/ Assessment 1 Points: 200 Project Directions This component of the Course Assessment consists of a 2–3 page Project that assesses the following learning outcome: IT273-1: Appraise network architectures, models, topologies, and structures used in networking. Once you start the Assessment, you will have 1 week to complete the Project. You must submit your Project to the Dropbox within the specified time. When you are ready to submit it, go to the Dropbox and complete the steps below, or download the directions here: http://extmedia.kaplan.edu/global/DropboxGuide_s.pdf: Click the link that says “Submit an Assignment.” In the “Submit to Basket” menu, select “Essay.” Click the “Add Attachments” button. Follow the steps listed to attach your Word documents. Use the following convention to name your Project: IT273‐Outcome1‐LastName‐ FirstName, where your own name is typed (example: IT273‐Outcome1‐Edison‐Thomas). Submit the completed document as an attachment to the basket. Make sure that you save a copy of your submitted Project. When you are finished, select “Submit for Grade.” Please notify Academic Advising when your Project is submitted and ready for grading. A Kaplan University faculty member will grade the Project within 48 hours and notify your advisor of your grade. A score of 80% or better is required to pass this portion of the Course Assessment. A......

Words: 658 - Pages: 3

Assessment 1

...Michael Ayala 5/12/12 Psych 1 Assessment 1 Essay In the the first example, the researcher used the experimental design in his study to examine how poeple respond to pictures of faces with different racial features. The experimental design is when the experimenter isolates and controls all the variables excpet one, he makes sure that variable is the only one causing the desired effect. The The independent variable, which is the variable that the researcher is manipulating, is computer program that he created that will randomly generate the faces as each subject comes in. In this study the researcher used random assignment as the the subject would come in the the room. Random assignment is went the experimental and control groups a non-systematic and randomized way. The way he did this is by not telling his research nor the subjects knew which order they were going in. The team of researchers that found that the more time students spend interacting with technology, the less empathy they show towards other by doing a correlation study. Since many students already use technology a lot this was would be easier to use. The students increased use of their devices is one variable and their lower empathy towards other is the second one making a negative correlation. A negative correlation is a correlation indicating that the variables simultaneous in opposite directions. The second......

Words: 258 - Pages: 2