Monday, January 7, 2013

meeting reflection


In our life we found many problem and solution, in the other hand in our college the problems are increase every year and because of that we cannot found many solutions, so we did a meeting with some student from our college to solve one of the most important problems which it is increasing core skills and how student success.

The several point of increasing core skills is directs the students to the success way in their education trip. So, when we did the meeting we find solutions for this problem. During our meeting we discussed these things. Firstly, me and farah suggested having training programs during the year for students. Then Humaid discussed with us about developing student interest fields and communication skills. Moreover, I suggested providing lecture awareness to advice students. Further Khalifa and farah discussed about the student ambitions. However; we divided some important action item between me , farah and Humaid. Farah will propose financing the training classes through ADMC management, Humaid will do surveys and I will provide teacher’s awareness suggestions and ideas. Furthermore, the recommendations the report should be presented to Academic Services and Khalifa will talk with supervisors to offer classes in wanted date while Farah will ask Academic services to send emails to students to collect voices opinions.

Finally, this practical meeting gave us the importance points to let us do it in real life as a professional member like how and when should adding a point during meeting, and base the agenda on the limited time.

Course evaluation and self-reflection


Course evaluation and self-reflection

At the beginning of the semester, I was looking for classes that are different from the IT classes. Also, I wanted a class that teaches me how to find a job. I thought it must be helpful for my job search. Those were the reasons for enjoy taking the course.

After taking the course, I have had a positive learning experience. By experience, I really mean experience. The course did not teach long equations and theories. Rather, we have had the experience of writing CVs, cover letters, meeting, blogging and interviewing. These seemed not as important as the hard core knowledge. However, I strongly believe that these skills are absolutely necessary to differentiate yourself from the rest who are also well educated.

I really like the fact that I could receive feedback in the class. And I've received plenty from my teacher and classmates in N307. The course with final grades did not satisfy me because I would never know what was wrong with my answers, essays, or reports. The stimulating thinking process involved in many activities of the course was really enjoyable. For the blog posts, I had put a lot of thoughts when I commented in other blogs. Also, it was educational to see how my classmates interpreted and communicated in response to a same question.

I want to thank my teacher for giving us relaxing, relevant and insightful lectures. I appreciated that you have encouraged us to pursue our idea for the proposal when the Officer though it was not realistic. I am thankful for having fun. You teacher has given me many constructive criticism, encouragement, and something to look up to. I learned plenty from your strength and weaknesses. Without you my tutor, I think I could not enjoy the whole course that much.

my work in the project report


Network Layout:

The network layout for the IT department will be organized in a STAR TOPOLOGY design as the company want depending on their business “The design of networks should only be as complex as the business needs it to be (Simmons,2011). We have the router which the ports connected to the Server, Printer and the switches using .The diagram below illustrates the design using Packet Tracer:
There are 3 LAN ports that are connected to the router. The first connect the router to the server while the second port is between the router and the printer and the final port connects the router to the switch. Both the server and the printer have a static IP (192.168.5.5 for the server and 192.168.3.3 for the printer). However, we have putted an IP address for the PC’s and Laptops that the range for those devices is from 192.168.1.1 to 192.168.1.9

 

 

Security policy:

 

In today's high technology environment, organizations are becoming more and more dependent on their information systems. The public is increasingly concerned about the proper use of information, particularly personal data. The threats to information systems from criminals and terrorists are increasing. Many organizations will identify information as an area of their operation that needs to be protected as part of their system of internal control. So our aim is protecting all application systems which are based on computers and manufacturing systems and networks. Our tool to achieve our goals is security. So to achieve our goal we should apply policies. Here some of the policies we can use:
User Information authentication-
It is very important to protect the user himself before protecting any software or Hardwar where the user represents the main assets of a company or firm even home land security so if the user is protected from any intruder or attacker or even sniffer the user won’t be in line of danger. Simple things the user could follow to keep himself protected from attackers:-
1-User must make a monthly change of his password.
2-User should not make a simple (1,2,3,4,5,6) password.
3-User shouldn’t make password known to a possible attacker.
These were few examples of User authentications method passwords are very sensitive information it’s the only thing that makes the computer knows that the user is who he’s clamming to be so if the attacker knows that information then there’s nothing stopping the computer from letting the attacker, some antivirus programs keep your computer protected from attackers that it would be hard to get in your system to steal your password or information.
Anti-virus –
“It is very important that your computer has antivirus software running on your machine. By having an antivirus program running, files and emails will be scanned as you use them, download them, or open them. If a virus is found in one of the items you are about to use, the antivirus program will stop you from being able to run that program and infect yourself. (Lawrence, 2004)