Nt1330 Unit 3 Interview

Great Essays
Interview # 3
Date: 03/24/2016
Interview Transcript

1. What is your role in the Information Technology department at your organization?

What has happened is that the IT department has evolved; before it was a situation where everyone could have done everything. You will find that we have distinct roles now such as webmaster. My role here is two-part because I lecture full-time also. You find that right now due to schedules, there is a little slump in terms of development. In terms of what my role has evolved into as webmaster, I publish web pages, make sure it’s up, linking, and that basically everything goes to the website. In terms of quality control, in terms of content, we’re not in charge of that. What we have are various departments
…show more content…
Recently we have the timetables for the beginning semester, and even more recently we have a notice board that gives you information in terms of all that is happening. It has been noticed that a lot of students don’t read the notice board or they may have an excuse of not being in class when the notice was given. So we’re putting it somewhere you can’t miss it because everyone should have Internet access at some point whether its home or at school. We offer wireless internet, plus we have the libraries, and the labs that they could use so there is no excuse for not getting a notice. Right now there is a move not only to give info about new courses, but also current student information. So right now we’re working on basically getting some dynamic aspect on to the website, things like class schedules, notices, deadlines, due dates, projects, anything you need to know about your current course. We also want to make that dynamic to the point where as soon a change is made on the information system database, it should register on our intranet plus our website. That’s pretty much it, that’s what we’re trying to do right now, that’s what we’re looking at, development, getting it into a dynamic …show more content…
Be able to create an each and concise directory to store information and files related to the web pages. You have to perform system backups and restores and recommends hardware and software upgrades when needed. Also to provide basic technological support, including but not limited to setting up equipment, installing software. That’s pretty much it, and of course knowledge of the software used to create graphics, spreadsheets, word processing files, databases, and PDF

Related Documents

  • Improved Essays

    Part B Q1. The normal dose of paracetamol is very safe to use and it is not over 4g per 24 hours; however, when the patient take more than 6g per 24 hours of paracetamol, the liver necrosis will happen within 10 to 12 hours and liver damage may occur within 24 to 48 hours. For the metabolism, most of the paracetamol is converted to nontoxic metabolites by the phase II conjugation of glucuronide and sulfate and a small amount of paracetamol is oxidized by the Cytochrome P450 (CYP) enzymes in the phase I metabolism. In this phase, CYP1A2 and CYP2E1 enzymes convert paracetamol to N-acetyl-p-benzoquinoneimine (NAPBQI) which is highly toxic substances.…

    • 885 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1 Case Study

    • 1039 Words
    • 5 Pages

    Amazon 5 Bullet Points: MONITOR LOVED ONES OR PATIENTS REMOTELY: Receive instant alerts when a loved one or patient exits the chair to enabling you to provide immediate assistance to reduce falls and prevent injuries. EASY SET UP: Easy to use sensor pad connection is wireless for convenience and portability for use in different settings. Alarm is easily reset by reapplying pressure to the sensor pad or turning off the alarm setting. COMFORTABLE WATERPROOF PAD:…

    • 1039 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 4 Case Study

    • 424 Words
    • 2 Pages

    Utilizing the information from the table above the mean, median and standard deviation will be calculated. The mean equals the average of the sample by adding all the values of the samples and then dividing by the total number of items. The mean for the samples collected is 14.87 ounces which rounded up 14.9 ounces.…

    • 424 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 5 Lab 3

    • 441 Words
    • 2 Pages

    Jonathan Desmond DCN Lab 5 Kali Kali is a live Linux distribution which can be put onto a USB and loaded directly onto a computer. Kali, having being bundled with a variety of testing tools such as Wireshark and Metasploit Framework, is utilized to assess the security of a target machine. The creator of Kali, Mati Aharoni first thought of the idea during a consultation which banned the use of external hardware as well as the stipulation that client computers could only be used if the data remained untouched. He then thought to use a live Linux distribution to assess the client’s security flaws.…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Hi Marcos, That's no problem; I'm always happy to help! You can access and download the required files using the credential's below. Once you access the FTP server, you will find a “FreeFlyer_Releases” folder that contains the most recent version of FreeFlyer, FreeFlyer 7.1.1. Within that subfolder you can select the bitness version installed on your system and access the "Extras" folder. Once you're in the folder then you will find a "Network Licensing" folder that will contain an lmadmin folder from which you can download and save freeflyr.exe to your system.…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    The date for my sister’s engagement party was fast approaching. It was two years before her wedding, and she also has acne prone skin. She decided to look up a dermatologist and found one that she thought would suit her needs. After seeing the regimen done on my sister, and how her skin reacted. I had changed my dermatologists to the same one as my sister.…

    • 415 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    With that I was able to moderate the server a lot more. When I look back there was a server I was staff on that was very small I was just a regular Admin which at the time on that server was second from Co-Owner. But at some point a couple staff members started arguing and the community became a poor environment. Eventually the owner sold the server which then turned out to become a very big server which I can not remember anymore. Ive also had experience being a Builder on servers but this inst the application for that.…

    • 527 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    Nt1330 Unit 3

    • 1174 Words
    • 5 Pages

    Secure Shell (SSH) In this paper, I will discuss the network protocol Secure shell, better known as SSH. Interest in choosing this protocol came from my frequent use of SSH to run applications on the remote servers in Coover Hall. Because of this, I will be exploring the details on how the protocol works, vulnerabilities associated with it and mitigation techniques put in place to counter attacks. SSH is a Cryptographic Network Protocol created to replace Telnet.…

    • 1174 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    1. Why is it a good idea to keep personal information confidential? I think it is important because when you keep it confidential you won’t get your identity stolen. 2. Summarize the components of a strong password?…

    • 74 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3

    • 271 Words
    • 2 Pages

    -------------------------------------------------------------------------------- Security ( show explanationhide explanation ) This is a public or shared computer Select this option if you are connecting from a public computer. Be sure to log off and close all browser windows to end your session.…

    • 271 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3

    • 483 Words
    • 2 Pages

    Microsoft was the one to develop Active Directory. Directory services are provided by Active Directory to windows domain network. It stores all the information related to files, users, resources and computers. It places them in proper hierarchal logical groupings. It uses this information to provide the right access and authority to the right user.…

    • 483 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 1

    • 360 Words
    • 2 Pages

    These days’ security is a critical factor of I.T whether it be protecting physical devices or information. What are some basic examples of ways to provide physical security for a server? What can be done about logical security? Security in the critical factor for everything related to internet.…

    • 360 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 3 Quiz

    • 507 Words
    • 3 Pages

    1. Go to your home directory and run: Most file systems have designated directories to assign permissions or access rights to specific users. File permission controls users to view, change, navigate & execute the designated contents of the file directories. LINUX/UNIX coherently use file permission to enable access to ownership for files & directories. File permission includes rwx is for read, write, and execute permissions.…

    • 507 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Roles of Core Technologies in an Effective IT System Technology permeates all aspects of modern civilization. It is woven into the fabric of our daily lives. What was once barriers to knowledge and communication have been stripped down as we are now connected, in an instant, to the farthest reaches of the globe. With every new advancement comes an opportunity to usher in a revolution in how societies live, work, and play. The major players that make it all possible are the men and women who create and manage the technology we use today.…

    • 996 Words
    • 4 Pages
    Improved Essays