Nt1310 Unit 1 Exercise 2

Improved Essays
Exercise 2.1
If I add my tuition, cost of books, supplies, gas to get to and from class, and my MacBook for one semester it totals to about $5,050. If I divide that total by the total number of hours I will be in class, which is 92, I get $55. It will cost me $55 per class day to attend college next semester. $55 may not seem like a lot of money here and there, but everyday for 16 weeks it begins to add up. A total of $5,050, is a lot of money and I make sure to get use out of every penny. I never miss a day of class unless I have a medical emergency or other serious issue that cannot wait till after class. My parents pay for me to go to college and I am extremely grateful for that. I make sure to pay them back by attending my classes and maintaining good grades.

Exercise 2.2 My overall score on this exercise was 105. According to that score I am intrinsically motivated at a high level. This means that I am motivated from within myself. I agree with these results because I am
…show more content…
Being financially wealthy relieves a lot of stress. You will never have to worry about feeding your family or providing them with a home. Money doesn’t buy happiness but it can help in the process if you have health, family and success.
Exercise 3.1 Many students have a negative view on learning. They feel learning is unenjoyable and even unnecessary. For this exercise I marked 2 out of the 10 questions true. I feel learning is somewhat like memorizing information. If you memorize it, you’ll eventually have it learned. Whether you have it memorized or learned, you will always have it somewhere in your head. I feel that the learning pace in a classroom is controlled by the slowest student in the room. If a student is stuck on a topic and asking questions, the professor cannot continue on with the lesson. A student can always continue on themselves, but they will not know whether they’re teaching themselves properly or not.
Exercise

Related Documents

  • Improved Essays

    1.7 III (b) VEGF: VEGF is also known as vascular permeability factor (VPF) is an endothelial cell specific mitogen in in vitro and is the main factor responsible for vasculogenesis and angiogenesis in a variety of in vivo models. The gene transcripts level of VEGF is stimulated at the time of implantation because process of implantation occurs under hypoxic condition. In rodents, VEGF is involved during embryo–endometrium crosstalk by regulating endothelial cell proliferation and vascular permeability of endothelial cells at implantation sites in rodents (Rabbani and Rogers, 2001; Rockwell et al., 2002). The VEGF’s mRNA and protein expression level has been noticed in endometrial stomal, endothelial, and glandular cells during the mid-secretory stage in the human (Charnock-Jones et al., 1993).…

    • 414 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Sara Ann Thornley 2/3/17 Macronutrients Dr. Huggins Assignment #1 1. A reducing sugar is a sugar that is capable of breaking down certain substances. They have a free ketone or aldehyde group which allows them to become hemiacetale and hemiketals (Gropper, 65).…

    • 528 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    On october 12, 2015 at or about 1102 hours i was dispatched to 1735 east young circle (publix supermarket), hollywood florida, in reference to a cellphone being taken. Upon further investigation it was later found that the cellphone would equal the amount to grand theft (over $300.00usd). Let it be also noted during the time of this investigation, i was working an off-duty detail at the above location. Upon arrival i made contact with the james othman, herein after referred to as the victim. The victim advised me that at approximately 1051 hours his phone was taken from the customer service counter (located at the south side of the store).…

    • 587 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Due to the age of the existing equipment, four new Cisco Catalyst 3560 V2 24 port switches will be use and configure for network redundancy by connecting each switch in a multiple links, single IP address with routing protocol Border Gateway Protocol (BGP). This multi-homing will detect when one of the links fail and not send traffic over that link anymore until the issue is resolved. This redundancy configuration will meet Western County Bank management requirement reducing unplanned outages and regular maintenance performed on the network equipment supporting 10 GB links as well as static or LACP-based (link aggregation control protocol) network interface controller (NIC) teaming. The Time Warner Cable, Business, Dedicated Internet Access, and AT&T Uverse Business Internet service will provide redundancy to the Internet…

    • 452 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    2. The IEEE 802.11n:- The IEEE 802.11n standard, appear in 2008, And become popular because the jump in data transfer rates from about 54 Mbps to nearly 600 Mbps. The IEEE 802.11n standard was officially completed in 2009 but most of the technical features were ratified in 2007. Most companies supported for the creation of a 60 GHz based standard for WLANs to succeed the 802.11n standard, and a lot of attention and effort was devoted to this activity.…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ilab 5 jerry Metcalf Keller Graduate School of Management Professor: Gregory Gleghorn 6/4/2017 VPN Connection The type of VPN connection solution that we will be using to connect user to the internet work will be the Cisco Any connect client and the RSA secureID. We will be going in to detail of how the connection process goes and also how to configure it. Both clients are required in order for the user to authenticate and connect to the company network. When the user is connected they will be able to do their job remotely and send and retrieve information remotely.…

    • 678 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 8 Exercise 1

    • 1124 Words
    • 5 Pages

    // // half_fit.c // Half-Fit // #include #include #include "half_fit.h" #include "type.h" #include "math.h" //unsigned char array[MAX_SIZE] __attribute__ ((section(".ARM.__at_0x10000000"), zero_init)); #define MEMORY 32768 #define BASE_ADDR (void*) 0x10000000 static header_free* buckets[11]; /* START Helper Functions */ // CEIL_32 Function U32 CEIL_32 (U32 value) { // Re-adjust value to round up (or ceil) to nearest multiple of 32 return ((value-1)/32 + 1) * 32; // (e.g. 32->31->0->1->32, 196->195->6->7->224) // ^OPTIMIZE OPTION: USE BITWISE OPERATORS } // Function to calculate required size U32 adjust_size(U32 initial_size) { // Add 4 bytes because of header size U32 newSize =…

    • 1124 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Implementing Firewall Filter Implementing firewall filters on a network makes the network free from attackers and very secured. Some of the boundaries that I will consider using on my firewall will be blocking ports on the network. First of all I will establish a new FTP session which the will initiate a connection to an FTP server that listens on TCP port 21 by default. This will help users on the network to login with user name and password before any data to port 21 will accepted. I will establish SSH(secure shell) which will provide a strong and secure communications over the network.…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 3 Assignment 3

    • 1039 Words
    • 5 Pages

    Group I, Category 19 Incorrect RFC Decision ISSUE DDS proposed a denial determination. The evidence in file supports a more restrictive RFC, as a result, additional vocational documentation is required. CASE DISCUSSION & POLICY ANALYSIS (INCLUDING SPECIFIC REFERENCES) This 57-year old is filing a DIB claim alleging disability due to loss of right eye, COPD, high blood pressure, edema of both legs and feet, back surgery, weight gain, depression, and neuropathy, as of 10/22/2014.…

    • 1039 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    is a software-based protocol that provides a way to locate files, devices or even individual in a network. LDAP uses port 389 and is uses by Microsoft as the main protocol that opens up this type of access. LDAP is lightweight which indicates a smaller version with a smaller code and it is part of X.500. The latter acts as a standard for network directory services. /***************************…

    • 442 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Policy-based management: SQL server has a feature called policy-based management which is used to define and also implement policies in SQL server. It is used if we want to apply any policy against a table or database and then checks whether the database or table satisfies with the given policy. If target database objects are not satisfied with the policies then either a trigger should be fired or we can enforce it so that an administrator will come to know that there is some policy violation. It will manage one or more instances of SQL server.…

    • 391 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Introduction The current information technology (IT) infrastructure consists of a mix of 2008 and 2008 R2 servers, with two legacy Windows 2000 servers, and four Windows Server 2012. In addition to the Windows server environment, the network consists of routers, switches, and security appliances, such as firewalls. The environment also consists of important services to ensure the security, and stability of the network.…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    WSUS is a Windows Server Update Service, that allows the administrators to have a server with Windows updates on site. Administrators can test new updates and approve the successfully tested Windows updates for release. Only the approved updates will be applied to the client computers. Using Group Policy, the administrators can point client computers to WSUS server, so the client computers will only receive the tested and approved updates from this server, instead of receiving all the updates (including potentially harmful updates) from the Windows update web site. This assures, that none of the new Windows updates will create unexpected issues with the clients' systems.…

    • 572 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    SIP Trunking BroadConnect boasts its many years of experience and emphasis on customization. We take every business and design the best phone systems content for it, based on your needs and budget. Since we understand that communication is a major component of a successful business, you will never receive excessive or useless features that will only hinder your company’s ability to grow. Our network is prevalent throughout North America, and it uses converged T1 that is fast and reliable.…

    • 480 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Professor Doupé, Thank you for your reply, and for your questions. We are excited to potentially have your guidance in our research, and hope we have provided clear explanations to your questions below: 1. SSL/TLS encryption secures data flowing between client and server. Using SSL during an authentication attempt could provide a secure way for a non malicious server to authenticate with the device, while blocking out sign in attempts from malware. 2.…

    • 682 Words
    • 3 Pages
    Decent Essays

Related Topics