Monday, January 7, 2013

meeting reflection


In our life we found many problem and solution, in the other hand in our college the problems are increase every year and because of that we cannot found many solutions, so we did a meeting with some student from our college to solve one of the most important problems which it is increasing core skills and how student success.

The several point of increasing core skills is directs the students to the success way in their education trip. So, when we did the meeting we find solutions for this problem. During our meeting we discussed these things. Firstly, me and farah suggested having training programs during the year for students. Then Humaid discussed with us about developing student interest fields and communication skills. Moreover, I suggested providing lecture awareness to advice students. Further Khalifa and farah discussed about the student ambitions. However; we divided some important action item between me , farah and Humaid. Farah will propose financing the training classes through ADMC management, Humaid will do surveys and I will provide teacher’s awareness suggestions and ideas. Furthermore, the recommendations the report should be presented to Academic Services and Khalifa will talk with supervisors to offer classes in wanted date while Farah will ask Academic services to send emails to students to collect voices opinions.

Finally, this practical meeting gave us the importance points to let us do it in real life as a professional member like how and when should adding a point during meeting, and base the agenda on the limited time.

Course evaluation and self-reflection


Course evaluation and self-reflection

At the beginning of the semester, I was looking for classes that are different from the IT classes. Also, I wanted a class that teaches me how to find a job. I thought it must be helpful for my job search. Those were the reasons for enjoy taking the course.

After taking the course, I have had a positive learning experience. By experience, I really mean experience. The course did not teach long equations and theories. Rather, we have had the experience of writing CVs, cover letters, meeting, blogging and interviewing. These seemed not as important as the hard core knowledge. However, I strongly believe that these skills are absolutely necessary to differentiate yourself from the rest who are also well educated.

I really like the fact that I could receive feedback in the class. And I've received plenty from my teacher and classmates in N307. The course with final grades did not satisfy me because I would never know what was wrong with my answers, essays, or reports. The stimulating thinking process involved in many activities of the course was really enjoyable. For the blog posts, I had put a lot of thoughts when I commented in other blogs. Also, it was educational to see how my classmates interpreted and communicated in response to a same question.

I want to thank my teacher for giving us relaxing, relevant and insightful lectures. I appreciated that you have encouraged us to pursue our idea for the proposal when the Officer though it was not realistic. I am thankful for having fun. You teacher has given me many constructive criticism, encouragement, and something to look up to. I learned plenty from your strength and weaknesses. Without you my tutor, I think I could not enjoy the whole course that much.

my work in the project report


Network Layout:

The network layout for the IT department will be organized in a STAR TOPOLOGY design as the company want depending on their business “The design of networks should only be as complex as the business needs it to be (Simmons,2011). We have the router which the ports connected to the Server, Printer and the switches using .The diagram below illustrates the design using Packet Tracer:
There are 3 LAN ports that are connected to the router. The first connect the router to the server while the second port is between the router and the printer and the final port connects the router to the switch. Both the server and the printer have a static IP (192.168.5.5 for the server and 192.168.3.3 for the printer). However, we have putted an IP address for the PC’s and Laptops that the range for those devices is from 192.168.1.1 to 192.168.1.9

 

 

Security policy:

 

In today's high technology environment, organizations are becoming more and more dependent on their information systems. The public is increasingly concerned about the proper use of information, particularly personal data. The threats to information systems from criminals and terrorists are increasing. Many organizations will identify information as an area of their operation that needs to be protected as part of their system of internal control. So our aim is protecting all application systems which are based on computers and manufacturing systems and networks. Our tool to achieve our goals is security. So to achieve our goal we should apply policies. Here some of the policies we can use:
User Information authentication-
It is very important to protect the user himself before protecting any software or Hardwar where the user represents the main assets of a company or firm even home land security so if the user is protected from any intruder or attacker or even sniffer the user won’t be in line of danger. Simple things the user could follow to keep himself protected from attackers:-
1-User must make a monthly change of his password.
2-User should not make a simple (1,2,3,4,5,6) password.
3-User shouldn’t make password known to a possible attacker.
These were few examples of User authentications method passwords are very sensitive information it’s the only thing that makes the computer knows that the user is who he’s clamming to be so if the attacker knows that information then there’s nothing stopping the computer from letting the attacker, some antivirus programs keep your computer protected from attackers that it would be hard to get in your system to steal your password or information.
Anti-virus –
“It is very important that your computer has antivirus software running on your machine. By having an antivirus program running, files and emails will be scanned as you use them, download them, or open them. If a virus is found in one of the items you are about to use, the antivirus program will stop you from being able to run that program and infect yourself. (Lawrence, 2004)

Tuesday, November 13, 2012

Minutes

LSEC N307 Meeting – Minutes
Date: November 5th 2012                                        Time: 03.10 pm – 03.30 pm                                              Place: Room W104                                                  Topic: increase core skills at ADMC

Present: Farah Abdurrahman (Chair); Khalifa Mohamed (Minutes taker);
                Omar Abdurrahman; Humaid Saeed (group members)

Minutes

1             Welcome, Apologies, Minute taker – Meeting opened at 3:10 pm by chair.
2             Student success – increasing core skills

·         Farah and Omar suggested having trainings programs during the year.
·         Farah, Omar and Humaid discussed about developing student interest fields and communication skills.
·         Omar suggested providing lecture awareness to advice students.
·         Khalifa and Farah discussed student ambitions.
·         Action item: Farah will propose financing the training classes through ADMC management.
·         Action item: Humaid will do surveys.

·         Action item: Omar will provide teacher’s awareness suggestions and ideas. 

4          Recommendations – discussion points
·         Report should be presented to Academic Services.
·         Khalifa will talk with supervisors to offer classes in wanted date.
·         Farah will ask Academic services to send emails to students to collect voices opinions.

Meeting closed at 3:30 pm by chair.

5                 Date of next meeting December 20th, 2012
      Starting at: 2:30 pm – 2:50 pm.

Tuesday, September 25, 2012

Cover Letter



Mob: 0551234567
24 September 2012
P.O. Box 1010, Abu Dhabi
Ahmad ALshamsy
H.R manager
ADNOC
Abu Dhabi




Dear Mr. Ahmad ALshamsy
    I am interested in a position in information system security, as mentioned in your e-mail to Abu Dhabi Men's College on 20 September2012.

    As you will see from enclosed c.v., I have studied Information Technology for four years at Abu Dhabi Men's College, and I will be graduated in 2014.

    As well as studying for my major, I have taken specifics course in computer forensics and investigation, and am familiar with many current applications and programs in information system security. Also, I will be completed one work placement with Al Mafraq Hospital after one month.

    My communications skills are good in both Arabic and English, I like hard-working individually or in groups, feel the responsibility of any work that I have to do.

    I would be pleased to attend an interview with your company at any time, note that I am busy after 2:20pm.


Sincerely,
___________________
Omar al shateri

Enc: 

Thursday, September 20, 2012

cv




        MY
PIC.
 
 

                       Omar Abdul Rahman Al Shateri

Tel: +971551234567     E-mail: omar@hotmail.com      P.O.Box: 1010 Abu Dhabi

OBJECTIVE:
          Entry position as system analyst or database designer at ADNOC

PERSONAL INFORMATION:
·         Date of Birth: 1 – Oct - 1991
·         Marital Status:  ( Single)
·         Gender:  (Male)
·         Nationality: Emirati

EDUCATION:
           
            ADMC (Higher Colleges of  Technology, Abu Dhabi Men's)  
Bachelor program will be graduate
IT/ Information system security/higher diploma
GPA (3.5)

2009-2014
In 2014
To present



Courses studied :

·         Computing Fundamentals
·         Website Design
·         Computer Platforms
·         Programming Concepts
·         Database Design Concepts




·         Networking Concepts
·         Principles of Information Security
·         Enterprise Technologies
·         Operating Systems
·         System Analysis




2009-2013
·         Hamdan Secondary School – Abu Dhabi
Diploma average 88.1%

2008-2009
ACADEMIC EXPERIENCE:
·         Implemented and designed Information System; database and program logic

Dec 2011
·         Managed maintenance, repair & troubleshooting of mechanical equipment including compressors, pumps, cooling towers & piping, 50 units in Computer Platforms course




March 2012
SKILLS:

Languages


·         Arabic, native language
·         English, IELTS band 4.5             

Computer

·         Windows
·         Hardware
·         Sofftware


·         Ms-Office
·         Oracle
·         Dreamweaver


  HOBBIES:

·         Play Football with my friends in Abu Dhabi Gate        
·         Challenge swimming in Al Jazira club every month       
·         Read magazines and news paper     

REFERENCES:                          

·         Dimitrios Souvatzis/Instructor
Higher Colleges of Technology
         Abu Dhabi Men's
Tel: 0501231231

·         Mohammad Amian/Instructor
Higher Colleges of Technology
AL Ain Men's
Tel: 0504356567           

Wednesday, September 12, 2012

post 1

The five skills are:

- managing
- applying technical knowledge
- analyzing
- planning
- helping others