Preview

Is3350 Unit 1 Assignment

Satisfactory Essays
Open Document
Open Document
653 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Is3350 Unit 1 Assignment
Assignment 1 Part A H. Faizi Student No. 0061040487
Task one:
Item 1:
I am currently at the Oberon Correctional Centre. I have been unemployed for the past 14 months since I became incarcerated. Before I became incarcerated I was employed at a warehouse. I worked there for two years. Before I started working at the warehouse I was studying accounting at Ultimo TAFE. I was unable to continue/complete accounting due to financial difficulties. Finding a job was a headache without a qualification. When I got the ware house job I was able to support myself and my family a little better. However, I wouldn’t be able to survive working at the warehouse in long term.

Item 2:
When I was studying accounting at Ultimo TAFE, I had a lot of financial difficulties. I didn’t have enough money to buy things that were necessary. For this reason I as looking for a job so that I could support myself and my family. When I found the warehouse job my main problem was solved and it was easier to pay for daily necessities.
…show more content…
In the future I want to open doors for myself to a better career rather than working at a warehouse. I want to be able to work at an accounting firm or an engineering company.
Item 4:
After completing TPP7120 and mathematics B level I will have to do mathematics level C in order to achieve eligibility to enrol in an accounting or engineering degree. 1. Once I have completed my current courses I will apply for TPP mathematics level C or enrol in an Accounting degree. 2. Apply for a USQ engineering or accounting degree. 3. Look for a part time job and

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IS3350 Unit 7 Discussion 1 Violating my copyright privileges is definitely not a good thing. I am all for sharing music. If music was not shared, some of the smaller acts would never be recognized. As for my scenario my employment and income is based off of music sales. In this case I am not okay with it.…

    • 250 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    IS3120 Unit 1 Assignment 1 Johnson Company provides networking components and services. Today we are using the yellow pages for advertising, which is still useful but outdated. In most businesses today use other methods such as In person by using sale representatives. Mostly all the businesses today use the internet to reach out to customers, either by having a website, social media, sending emails or even newsletters. There are some that use a totally different approach, some of which include video conferencing and text messages. Other companies even push it further by utilizing social media sources such as Facebook, twitter, LinkedIn, Instagram and so many more to promote their company.…

    • 811 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is3120 Unit 2 Assignment 2 - Evolution of Ethernet Evolution of Ethernet Given the speeds of today’s Ethernet and the progression of the speeds, 10 to 100Gigs over 8 years and 100Gig to 1Tb since, transmission rate will double again in about 8 years. Although this seems true, I read that Ethernet fabric will rival fiber optic transmission capabilities. We must keep in might that a network is only as fast as its slowest component. This means computers will have to continue to get faster at processing requests and switches and routers will have to analyze and forward data packets at a higher speed to keep up with the evolution of Ethernet.…

    • 304 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Application of Risk Management Techniques Treats that this company is vulnerable to are but not limited to tornado, malware, equipment failure, stolen data, DoS attacks & social engineer. The like likelihood of each is moderate to high. Headquarter is located right in tornado alley. Since this building house all three serves, a direct hit would result in a total loss. Since the users connect to the LAN with Windows Vista which is very outdate the risk of malware is also high. Along with having all three servers in a central location, there is no mention of any backup locations or even if a DRP is in place. Therefore equipment failure (loss of data) is very high. There is a mention of a direct attached storage but it appears that there is no AUP in place. This means everyone has access to the data. Stolen confidential data of a customer is a serious and costly risk. There is no mention of any firewalls in place. If the servers are not protected by firewalls or intrusion detection systems can result in loss of availability. Users and social engineering is the weakest and easily the most vulnerable. Lack of access controls and security awareness can result in serious loss of confidentiality and hackers are real threat in today’s world. With the sales people accessing the network through a home office and share internet connection with headquarters, this is the bulk of the concern.…

    • 382 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Ls308 Unit 1 Assignment

    • 435 Words
    • 2 Pages

    t Unit 1 Written Assignment Victor M. Salas-Pellot Kaplan University LS308 - 01 Law assumption does indeed tie into how society functions and vice versa. The basic assumption that law is imbedded in society (Barkan 2009). I agree with this belief. Laws and society affect each other more than people tend to realize, there are a multitude of events that have occurred within our society in America that have forever changed how we operate within our country and how we operate outside of our country. As societies evolve so do the laws within those societies. Every event that occurs within that society will indeed have an affect on its local laws and rules established. For instance, after hurricane Katrina; the local citizens of New Orleans were trapped in the dome with no assistance from FEMA or any other agency. A nation was watching as those who had nothing had to pillage and plunder in order to survive. However, laws did in fact change. This event in society brought forth The Gulf Opportunity Zone Act of 2005. This act was created to give tax breaks to those people who had suffered casualties or theft during the hurricane.…

    • 435 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    At the Acme Distribution Center, your colleagues are the following seven employees: Robert, the lead warehouse receiver…

    • 1078 Words
    • 7 Pages
    Satisfactory Essays
  • Better Essays

    Nu310 Unit 8 Assignment

    • 1627 Words
    • 7 Pages

    Polit, D. F., & Beck, C. T. (2012). Nursing research: Generating and assessing evidence for nursing practice. (9th ed.). Philadelphia, PA: Wolter Kluwer and Lippincott Williams & Wilkins.…

    • 1627 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Is3350 Unit 3 Assignment

    • 603 Words
    • 3 Pages

    Based off my MWA three assignment, I realize that I do have some areas in my research skills, writing, group work, and from making decisions I need to improve on. First, I can improve in my archival research by becoming familiar with the CSU Archives and the information I can receive from them. For example, I never experienced researching on someone or something using newsletters and newspapers. When I had to use these resources to research, it was very difficult for me to transition into gathering information from that source. The more I became familiar with the resources, I was able to adapt and gather the information. Now that I experienced this, I can begin to use the archival research techniques to research on someone or something else in the future.…

    • 603 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Mt302 Unit 1 Assignment

    • 722 Words
    • 3 Pages

    **************** MT302 Organizational Behavior Unit One: Case Incident 2 The Global Recession and Workplace Malfeasance…

    • 722 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Is3350 Unit 5

    • 880 Words
    • 4 Pages

    Electricity at work Regulations 1989. This legislation places the4 responsibility of electrical item on to the employer.…

    • 880 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    I'm one of the TAs for the online class CGS2531 this Fall Semester. I completed the required online training sessions: FERPA Basics and Preventing Harassment. Please find attached to this email the certificates of completion of the aforementioned courses. Let me know if there is any other information or training session needed.…

    • 52 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Sc235 Unit 4 Assignment

    • 440 Words
    • 2 Pages

    Robert Arteche Kaplan University SC235: General Biology 1 Unit 4 Assignment The heart is what some determine to be the most important organ in our bodies and one of the biggest contributors. It is one of the major organs that if we did not have, it would not be possible for us to live. The heart is about the size of a fist and is broken down into four chambers, the aorta, superior vena cava, pulmonary artery, and the coronary artery. The four chambers include the right and left atrium and the right and left ventricle. The heart is responsible for supplying oxygen and blood to the entire body. Blood passes through these four chambers and then exits and pumps into the rest of the body. The heart also has three layers of walls…

    • 440 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    2 3. Career Selection 3 4. Short term and Long term plan 4 6. My Self-Evaluation…

    • 5065 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    5. If you are in the final year or you have a backlog after appearing for the final year examination, you must get your Principal’s or…

    • 844 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    * Hacking attack using an SQL-injection attack * The hackers can gain access to a company’s payment processing network. The attackers then installed malicious code designed to gather sensitive information from the network, which allowed them to easily access the network at their convenience.…

    • 275 Words
    • 1 Page
    Satisfactory Essays