Preview

Is3350 Unit 2 Assignment

Powerful Essays
Open Document
Open Document
1380 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Is3350 Unit 2 Assignment
Introductions: All three of my subjects are females that I have known for at least 5 years. Two of the subjects (1 and 2) are mother and daughter. The mother and daughter were asked in a group setting with 11 questions I had a lot of questions because I wasn’t sure of what my younger subject would be able to answer. Everybody was asked the same questions. Since I knew my subjects I just called and seen whether they would be willing to answer some questions. They all agree so I did the mother and daughter on September 15 on a Tuesday, and my third subject was September 16 on a Wednesday. I drove to their house and I spent about 3 hours with subject 1 and 2, and I spent 2 hours with subject 3. Subject 1 and 2 was questioned in subject 1 bedroom …show more content…
In every question she always included her kids (who chronically aren’t children, but are adults, even those they aren’t mentally their age). This subject while answer the questions was also helping her daughter to understand the question being asked. The daughter would do something like throw a tantrum and the subject automatically would drop what she was doing to check on her daughter. It was interesting to see this play out. The mother knew that if she would check on her daughter, the daughter would stop throwing the tantrum. When ask what/where she seen herself in 10 years she responded “Hopefully still taking care of my girls,” she knows that when she leaves there will be nobody to help. Her biggest fear was that she would die and that her girls would be put in a home. Her biggest accomplishment was getting her older girl ready for a job. When ask why that was her biggest accomplishment she said that she wanted to make sure that they would know how to take care of each other. For the fact that every answer involved her daughters in some way. I am putting her in stage 7, middle adulthood with the crisis of generativity or stagnation. She is in the generativity part of the crisis, but I don’t think that she will be able to move on and be in the integrity part of stage 8 if the girls are still dependents of her. She could even go into despair if she knows that they aren’t self reliance. She will see it as if she

You May Also Find These Documents Helpful

  • Good Essays

    Ec1330 Unit 1 Assignment

    • 478 Words
    • 2 Pages

    After working on the EC130 Title Equipped Console, we went back to our second assignment: creating a new helicopter (H125) tailboom jig.…

    • 478 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Jennifer’s full time position as Sales would need Sales access for her primary position. She should only have By Position access to Accounts Payable when she is working that position. She would need Read Only for Shipping and Receiving in order provide customers with information on inventory availability. Neither of her positions should have required her to have full access to Shipping and Receiving.…

    • 252 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is4796 Unit 1 Assignment

    • 370 Words
    • 2 Pages

    My company; RLR Securities Inc., has been in the security service since 2002 we started out with only four (4) people, now we have grown to twenty-two (22) people, RLR Securities Inc. was formed as a small corporation who’s focus was mainly on database performance tuning and security services for database applications. By 2006 we started providing complete security services, including assessments, penetration testing, policy creation, and regulatory compliance assistance.…

    • 370 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Is3440 Project Part 1

    • 3157 Words
    • 13 Pages

    First World Savings and Loan is a financial institution that processes credit card transactions and loan applications online. We are currently considering implementing an open source infrastructure. This could potentially save us over $4,000,000 per year in licensing fees for the software we are currently using. However, due to our business needs; we must still comply with the Sarbanes-Oxley Act (SOX), Payment Card Industry - Data Security Standard (PCI-DSS), and the Gramm-Leach-Bliley Act (GLBA). We must comply with SOX, because we are a publicly-traded financial institution; PCI-DSS, because we process online credit card transactions; and GLBA, because we are a financial institution. All of the regulations of these three compliancy laws must be met, while still maintaining the Confidentiality, Integrity, and Availability (CIA) triad.…

    • 3157 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    Given the speeds of today’s Ethernet and the progression of the speeds, 10 to 100Gigs over 8 years and 100Gig to 1Tb since, transmission rate will double again in about 8 years. Although this seems true, I read that Ethernet fabric will rival fiber optic transmission capabilities. We must keep in might that a network is only as fast as its slowest component. This means computers will have to continue to get faster at processing requests and switches and routers will have to analyze and forward data packets at a higher speed to keep up with the evolution of Ethernet.…

    • 304 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Security implementation responsibilities focus on implementing the access controls and account management processes outlined in this Plan. The following positions are responsible for security implementation:…

    • 1211 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    IS4560 Unit 3 Assign 1

    • 779 Words
    • 3 Pages

    systems from the network diagram. A security control is any mechanism that you put in…

    • 779 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    I'm one of the TAs for the online class CGS2531 this Fall Semester. I completed the required online training sessions: FERPA Basics and Preventing Harassment. Please find attached to this email the certificates of completion of the aforementioned courses. Let me know if there is any other information or training session needed.…

    • 52 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    The SEC decided to enforce this provision for the first time for the James Nordgaard. Because James decided against resigning, the company retaliated against him (Deakins, Campbell, & Ferrantella, 2014). The company took away his rights to trade and access to the company’s system. James couldn’t even get into his email. They moved him into a little room and eventually found a way to accuse him of violating the company’s confidentiality agreement. On August17, 2012, James resigned, and he sued the company for violating his…

    • 841 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    IS3340-Unit 2-Assignment 2

    • 1549 Words
    • 6 Pages

    i. WU HIPAA Security Policy requires procedures to ensure that access to a system that contains EPHI and is used to provide patient treatment is made available to any caregiver in the case of an emergency if the denial or strict access to that EPHI could inhibit or negatively affect patient care. During extreme emergency conditions, RO would rely upon BJH electronic access to the IMPAC electronic medical record as well as BJH Health Informations Management (HIM) for access to the physical medical record.…

    • 1549 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Johnson Company provides networking components and services. Today we are using the yellow pages for advertising, which is still useful but outdated. In most businesses today use other methods such as In person by using sale representatives. Mostly all the businesses today use the internet to reach out to customers, either by having a website, social media, sending emails or even newsletters. There are some that use a totally different approach, some of which include video conferencing and text messages. Other companies even push it further by utilizing social media sources such as Facebook, twitter, LinkedIn, Instagram and so many more to promote their company.…

    • 811 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Devs010 Unit 3 Assignment

    • 261 Words
    • 2 Pages

    Lab practical will be used to carry out these tasks, students will be prompted to develop programs in JavaScript.…

    • 261 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Eg2401 Unit 1 Assignment

    • 4754 Words
    • 20 Pages

    billion personal computers in the world at present. In the United States alone, over 50% of…

    • 4754 Words
    • 20 Pages
    Powerful Essays
  • Satisfactory Essays

    Violating my copyright privileges is definitely not a good thing. I am all for sharing music. If music was not shared, some of the smaller acts would never be recognized. As for my scenario my employment and income is based off of music sales. In this case I am not okay with it.…

    • 250 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    IS3445 Project Part 4

    • 565 Words
    • 2 Pages

    The security of a web application should become top priority when it comes to ensuring the security of the information that the application contains. When we, as an organization, think of security, we should all think of ways that the attacker would attempt to breach the application in order to gain access to the network, or exploit the vulnerability to his or her own benefits. There are many weaknesses pertaining to web applications, and these weaknesses each have an attack associated with it, with the attacker having his or her own motivation for the attack. The attacker’s motivation deeply depends on the type of attack that has occurred at that time. Listed below is a list of the common weaknesses and attacks associated with e-commerce and social networking applications.…

    • 565 Words
    • 2 Pages
    Good Essays