Nt1310 Unit 1 Personal Reflection

Decent Essays
Through my courses, I have learned about research being done that involves generating and processing large sets of data, which require the assistance of outside facilities such INBRE, and have noticed a growing demand for people who understand the techniques necessary to process such data. However, there is limited resource available at university to learn such techniques, which is why I’m excited to learn more about the techniques at the internship.
I am currently working in Dr.Cripps lab where I screen for transcriptional regulators of adult myogenesis in Drosophila by RNAi, and determine transcriptional factors of extradentin; my research has led me to dabble in the use of position weight matrices in the prediction of such factors, and I

Related Documents

  • Decent Essays

    Nt1310 Unit 3 Components

    • 152 Words
    • 1 Pages

    The first component that needs to be bought is the Case. The case is what holds all of the components for a computer work. In order to make the case useful it has to have many components like the motherboard. The motherboard is how all the components 0f a computer communicate . The motherboard is screwed into the left side of the case.…

    • 152 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Nt1310 Unit 2 Assignment

    • 463 Words
    • 2 Pages

    During my job as a problem solver issues are brought to my attention that have to be actioned straight away where there is no time to ask questions. A problem was brought to my attention that we had reports of a product that had infestation problems, the product in question was Bird seed. I myself had to look into this straight away as it was a problem that would immediately impact Amazons customers. I first had to locate which product this was and would ask the associate who brought this to my attention to show me the location. After inspecting the product it was found that there were small black creatures crawling around inside the bags.…

    • 463 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Kaplan University IT286 Unit 8.2 Jennifer Polisano Answer 8.2: As the IT Security Professional for Web Site 101, I will be recommending adjustments for recent security issues, including data loss due to employee negligence, physical break ins, identifying employee security standards, identifying network access specifics, and the recent hacking of the home page of Web Site 101. Web Site 101 currently has 300 employees working on three levels of the office building. In the previous years, this organization has grossed 2 million dollars revenue per year. For the organization to continue to thrive, these security problems will need to be addressed immediately.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Great Essays

    Nt1330 Unit 3

    • 1174 Words
    • 5 Pages

    Secure Shell (SSH) In this paper, I will discuss the network protocol Secure shell, better known as SSH. Interest in choosing this protocol came from my frequent use of SSH to run applications on the remote servers in Coover Hall. Because of this, I will be exploring the details on how the protocol works, vulnerabilities associated with it and mitigation techniques put in place to counter attacks. SSH is a Cryptographic Network Protocol created to replace Telnet.…

    • 1174 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    The Pangu 9 jailbreak is now out for those of you running the latest iOS 9.0.2 software update. You can follow the guide for jailbreaking with Pangu 9 on every device that can run the iOS 9.0.2 firmware. You can catch that completely list available from the requirements section below. Those with anything under the iPhone 4S cannot follow this guide, just like they cannot update to any version of iOS 9. REQUIREMENTS…

    • 516 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Data Communication and Net-Centric Computing (COSC 2061) Assignment 2 Student Name: Weibin Zhong Number: s3503887 Introduction This report is identifying what are FDMA, TDMA and CDMA and how to maintain the communication seamlessly and the roaming service as well as the cost of roaming service. Furthermore, the 1G, 2G, 3G and 4G generations will be discussed.…

    • 1458 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Nt1330 Unit 6 Term Paper

    • 620 Words
    • 3 Pages

    1. Structural ex ante constrains on the agencies that prevent deviations before they occur “The most effective means for achieving policy stability are constraints on the flexibility of agencies, rather than reliance on rewards, punishments, and oversight.” Enfranchising the constituents of presidents and congress through administrative structure and process, we can constrain the bureaucrats. We should clarify each political player’s responsibility and right by regulations and laws with negotiation and bargain.…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1 Term Paper

    • 510 Words
    • 3 Pages

    Components: Components are all the parts that make up a computer. Components include software and hardware. Proxy server: A proxy server is basically an server that bridges the gap between you and the internet. When you have proxy up and running the other computers from the internet cannot see your IP address so it covers you in something known as an internet camouflage. The computers can only see the proxy's IP.…

    • 510 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    • Authentication- this domain controller is made only for routine security processes. Due to this, it can perform these processes much faster than another server that is busy running programs and processing resources. Using a domain controller makes it easier for a user to access the domain and network, and the time savings are often rather large if this is used across a big network. Resource Authentication.…

    • 484 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 1 Paragraph

    • 632 Words
    • 3 Pages

    We’ve used a lot of devices and storages so far in our life, but one thing that might be weird to people is the RAID. RAID stand for redundant array of independent disks and is a place for people to store their information. It is stored on CDs, instead of the normal flash drives and hard drives. RAIDS are different from the normal CDs, because they have to divide the data and spread the blocks into several megabytes for RAID to work. This is to make RAID efficient and fast.…

    • 632 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Nt1310 Unit 2 Term Paper

    • 1473 Words
    • 6 Pages

    Question 3 HIV can be transmitted from the HIV positive mother to the infant during pregnancy, labor, delivery, and breastfeeding. Without an intervention, transmission rates range from 15% to 45%, but the rate can be reduced to below 5% with effective prevention programs (1). These interventions are known as prevention of mother to child transmission (PMTCT). PMTCT involves antiretroviral treatment (ART) for both the mother and infant. PMTCT also includes procedures to prevent HIV acquisition in the pregnant woman and provides breastfeeding practices.…

    • 1473 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Short Term 12 Reflection

    • 1314 Words
    • 6 Pages

    Short Term 12 was a very interesting movie. It had hints of being realistic, but with aspects where you knew it was a movie. It’s about a group of workers who work in a foster care residential facility setting. The main character, Grace, deals with her own personal struggles while she supervises the children at the facility. I have a short bit of experience at a facility like Short Term 12 in some aspects; I can see where parts of the movie are realistic and where are some are an exaggeration because it is a movie.…

    • 1314 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Nt1330 2.3

    • 955 Words
    • 4 Pages

    1.1 Describe ways of recognising when a business problem exists Within our company, you can recognise if a business problem exists by observation. If you’re clients are leaving and if you are not getting new customers, then this is a way of recognising that a problem exists. In a larger company, I would imagine that they recognise business problems by keeping management reports on everything you do and then compare them with the businesses expectations. If anything is below the expectation then it should be looked into further to see where the problem is.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    NCOA Reflective Report

    • 952 Words
    • 4 Pages

    Before I came to Kisling Non-Commissioned Officer Academy (NCOA), I thought of myself as a good leader with certain traits and aspects. I believe that if I take care of my airmen, that they’ll take care of me by completing work orders, squadron objectives, or any future events without question. It wasn’t until I attended NCOA, that I was able to put concept names to the leadership traits that I had. For example, I would put aside my self-interest for the good of the work center because I wanted my guys to know that I have their best interest at heart. Which turns out to be part of transformational leader idealized influence.…

    • 952 Words
    • 4 Pages
    Improved Essays