Nt1310 Unit 9 Study Guide

Improved Essays
1. Write a list of fifteen or more specific actions you have taken in the past two days. (The actions will be specific if someone could have recorded you doing them with a camera.)
Take shower
Cooking
Clean the house
Eating breakfast
Make up
Change clothes
Go to school
Do the homework
Study
Eating lunch
Go to work
Use my phone/computer
Watch movie
Texted with friends online shopping sleep 2. Type each action from your list above in the appropriate quadrant on your chart. After each action, put the approximate amount of time you spent in the activity. For example, Quadrant IV might be filled with actions such as these:
1. Watched TV (2 hrs)
2. Phone call to Bob (1 hr)
3. Played video games (3 hrs)
4. Went to the mall (2 hrs)
5. Texted
…show more content…
I feel very worry about my discoveries because I don’t spend lot of my time on studying and homework.

* What different choices, if any, do you intend to make about how you use time? I want to spend more time than my daily actions on my homework and study and not to spend a lot of my time on using phone/computer and watching movie.

4. First, review the self-management tools discussed in chapter 4 on pages 147-154 (Monthly calendar, Next actions list, Tracking form, Waiting-For List, Project Folder, 32-Day commitment form). Discuss in another paragraph which of these tools, other than the monthly calendar tool, seem like a good choice(s) for your self-management system, including examples from your life of how you can use them. I think monthly calendar tool and next actions list tool seem like a good choice for my self-management system because it is easy to understand and it’s helpful to reach goals. For example, sometime I forgot to do the important things like to do my homeworks and forgot to turn in it on the due date, so I lose a lot of point. But if I use monthly calendar or next actions list tools, I think it will help me to remember to do my homeworks and the due

Related Documents

  • Decent Essays

    QUES 1. A router has the following CIDR entries in the routing table: Address/Mask Next Hop 135.46.56.0/22 Interface 0 135.46.60.0/22 Interface 1 192.53.40.0/23 Router 1 Default Router 2 For each of the following IP addresses, what does the router do if a packet with that address arrives? 1. 135.46.63.10 2.…

    • 607 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    The new Mercedes-AMG GLC 63 has been spotted on mule testing recently almost undisguised. This trim is going to join compact SUV competition on auto market. Even though the details are not complete yet, there are several changes found on the tested vehicle. Here is the update on it. Power and Specs Under that long hood, the SUV will be empowered by twin turbocharged V8 4.0 liter engine that produces up to 503 hp of power output with 516 lb-ft of torque performance.…

    • 401 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 1 Term Paper

    • 455 Words
    • 2 Pages

    5.2.3Direct Access DirectAccess is new to the Windows 7 operating systems. DirectAccess enables a remote user to work on their corporate network when they are away from the office without the need of a VPN. As long as the remote user is connected to the Internet, DirectAccess will automatically connect the remote user to the corporate network without the need of any user intervention.…

    • 455 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    I have to agree with you that waterway ports are the busiest at the same time I do not believe that are the hardest to secure. Living here in Jacksonville, FL I have several ports around me. There is Jacksonville Port Authority (Jaxport) that controls three cargo terminals, a cruise terminal and an intermodal rail terminal. Blount Island (controlled by the Marines) is one terminal that I am familiar with because of the military. This facility has some of the tightest security even more than some operational bases.…

    • 455 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    How to Configure a VPN Connection in Windows 8.1 A VPN is one common method of extending a private network across the Internet and gain access to network resources from a remote location in a secure manner. A virtual private network (VPN) is a private network that uses public telecommunications infrastructure, usually the Internet, to connect to a private network, such as a company's internal network infrastructure. A VPN remains private by using a secure tunneling protocol and other security mechanisms including encryption. This ensures that only authorized users can access the private network and that the data cannot be intercepted by anyone else. A virtual private network makes it possible to have the same privacy and protection when sharing network resources across WANs.…

    • 638 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    ASSIGNMENT QUESTIONS: 1. What is the regulation or law that you would propose? Be very specific in the wording. (This will be your own idea and written in your own words). (20 points) Answer:…

    • 672 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Study Guide

    • 432 Words
    • 2 Pages

    1. Name three specific cyber issues that have necessitated new laws. 1) Credit card fraud. 2) Cyberstalking. 3) Theft of intellectual property and Identity theft.…

    • 432 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3 Term Paper

    • 621 Words
    • 3 Pages

    Security Ecommerce site Phishing, “brand spoofing” or “carding”, is not a “pass-time” process but is a business-like on which organized crime groups extensively use and make a big deal of money. Phishing, being one of the most security challenges, is a hacking technique of malicious and fraudulent mass mailing, masquerade as emails from government agencies, business partners or even company executives using modern way such as social media, phone calls and any other communications to get access to usernames and passwords, credit cards or other sensitive information to steal valuable data. According to Anti-Phishing Working Group (APWG), an increase of 86% of phishing attacks in companies from 2013 to 2015 has been analyzed (source: Forbes).…

    • 621 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1 Study Guide

    • 1037 Words
    • 5 Pages

    Question from Chapters 5,6,7,8 1. What UML diagram types do you need to represent the essential features of a system? A. Activity diagrams, which show the activity that make up a system process and the flow of control B. Use case diagrams, which show the interactions between a system and its environment. C. Sequence diagrams, which show interactions between actors and the system and between system components. D. Class diagrams, which show the object classes in the system and the associations between these classes.…

    • 1037 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 1 Term Paper

    • 485 Words
    • 2 Pages

    1. Define the following terms: According to the textbook below are the following definitions. • Surface water-Water from lakes, streams, rivers, and surface springs (Friis, 2012, pg. 211). • Groundwater- Any water that is stored naturally deep underground in aquifers or that flows through rock and soil, supplying springs and wells; this water is less susceptible to contamination than surface water (Friis, 2012, pg. 211).…

    • 485 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Greetings, The exercise for this learning guide unit was really useful. There are many case in which one could need to look for a file, or just directory information, and this assignment gave us the opportunity to play a little with this. I had to write something similar some time ago to consolidate thousands of .csv files into one single file. The files were generated by a test system in which only 32 units can be tested simultaneously.…

    • 402 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    NT1410 Module 5 Exercise 1 Securing Desktop & Mobile Operating Systems Sierra Baltins Friday Whether or not a person uses a desktop or mobile operating system, there are forms of protection available. There are several operating systems that offer protection to the user, but some operating systems are more vulnerable than others. Mobile devices may automatically provide the user with different security systems than the desktop can offer. Either way, these security systems are designed to stop cyber-attacks.…

    • 635 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Assignment Questions 1. List three things you learned about assessment and measurement in the context of the video discussions. First and foremost, properly conceived assessment is an essential aspect of education. The educational review process and all associated components should be routinely examined to ensure quality as well as make improvements. Because learning is a very complex endeavor, it is important to create measurement instruments that are sufficiently comprehensive and applicable (Gronlund, 2013).…

    • 1143 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    NCWIT #1 Problem to solve using technology * Please answer in 150-250 words: please describe a problem that you would like to solve using technology and explain how you would solve it (this could be a social problem, a technical problem, a local problem, a world problem, etc.) A problem I would like to solve by using technology is the issue of bullying. Bullying is a major issue not only in the United States but all around the world, it most commonly occurs in schools. I could solve it by spreading through social media and other devices about the risks that bullying can lead to people.…

    • 1074 Words
    • 5 Pages
    Decent Essays
  • Improved Essays

    1. I think that I would rather have a conversation with others in phone because it limits the chances of misinterpretations. I mostly text my friends or family because if they’re busy with something, it is just more convenient for them to check their phone and see that I texted them. Another great reason I rather text is because I come from a big family and if there was an emergency, one person’s text can be sent to everyone in my family text group. The only thing that I hate is because I can send anything with emotion in the message, so conflicts would arise.…

    • 681 Words
    • 3 Pages
    Improved Essays