En1320 Lab 4.2

In: English and Literature

Submitted By onelovesd
Words 835
Pages 4
Lab 4.2
Vance Pope
EN1320
02/07/16

References:
n.a. (2016). Software Engineers and Designers. Retrieved from Studentscholarships.org: http://www.studentscholarships.org/salary_ca/7/software_engineers_and_designers.php
Shaw, M. (2000, May). Software Engineering Education: A Roadmap. Proceeedings of the conference on The future of Software Engineering, pp. 371-380.

Reference #1:

This website shows aspiring students what a software engineer does, the median of what could be earned in that field, and also breaks down all the different types of factors a student would want to know before they have begun studying in that field. It also shows students where current software engineers are employed. Those industries include computer systems design related services, electronic product manufacturing, wholesale trade, architectural engineering, public administration, and scientific research and development studies. Though this source is not an article with an author or from a university, I believe this is a good source to use. The reason I feel like it is a good source is because while I was searching on the website I noticed that their website has been mentioned and used on many school websites such as Cal Poly Pomona. The website gives students a great deal of information that other sources found on Google.com do not provide. This source has confirmed what I have seen while searching for software engineering jobs on the internet. It will allow me to provide more information on my Project Part 1 on what I could expect to make as a software engineer and the rate of unemployment in the industry.

Reference #2: Which would you pick education or a well-paid programming job? The need for software developers in today’s software industry grows as days grow old. In this summary, we will discuss Mary Shaw’s article entitled “Software engineering education: a…...

Similar Documents

Itt 255 Lab 6

...Information Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1330 Client-Server Networking II or equivalent, NT1430 Linux Networking or equivalent Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definitions of terms, concepts, elements and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Security Syllabus Where Does This Course Belong? This course is required for the associate degree program in Network Systems Administration (NSA). The following diagram demonstrates how this course fits in the program: NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical......

Words: 3887 - Pages: 16

Lab 4.2

...1. What is the one thing that a virus, a worm, spyware, and malicious code have in common? What are the differences among these four threats: a virus, a worm, spyware, and a malicious code? * Virus- attaches to or “infects” a host program * Worm-standalone program does not need a host * Spyware-covertly collects information * Malicious code-code that has undesired effects such as opening back doors or collecting information. 2. How often should you update your anti-virus protection? * Daily 3. Why is it a best practice to have and to carry an antivirus boot-up disc or CD? * Just in case your computer can’t start you can boot to the cd to try and remove what is causing the problem 4. What other anti-malicious software and anti-malicious code applications included with Avira under the Real-Time Shields application? What risk and threats do these help mitigate? * The following pretty much scan the appropriate files or application to see if there is any harmful files. File system shield, Mail Shield, Web Shield, P2P Shield, IM shield, Network Shield, Behavior shield. 5. In a corporate environment, should new AV definitions be installed as they are available? * Yes, because there are roughly 200 new viruses per day so the sooner it can be update the better off the network will be. 6. Is the quick scan good enough to maintain the system protected? * No, at least once a week you need to do a full scan...

Words: 396 - Pages: 2

En1320 Module 2 Lab

...Introduction 2: When you think of prison you may think of a place filled with criminals and misfits doing there time for the crime they’ve committed. I can’t necessarily speak for everyone, but I now at some point in your life you may have had a loved one or someone very close to you, serve prison time. You don’t want to see that loved one in a place that you picture as dirty, chaotic, dangerous, and depressing. The reality of the situation is the prisons top priority is to provide rehabilitative programming and skills to inmates and parolees in an effort to reduce their likelihood of reoffending by the time they return to their homes and communities. Below is a list of rehabilitative programs and services we offer in prison and during parole “What we do”. You should never have to feel fear and concern when that loved one gets “lock up”. That’s why I fell as though the conditions in the prison systems need to be improved to have positive outcomes such as reducing recidivism and benefiting society financially. Conclusion 1: As we’ve discussed euthanasia cannot only affect the patient but also the friends, family and close ones. You never know really know how a person may suffer within especially cancer patients and Euthanasia can help with the pain and suffering within. Euthanasia can be voluntary, non-voluntary, or involuntary. Voluntary euthanasia is the most common of the three. Non-voluntary is illegal and involuntary is pretty much considered murder. Remember at......

Words: 302 - Pages: 2

Worksheet 4.2

...Worksheet 4.2 U.S. Airlines and Airports 1. What were the effects of the airline deregulation act of 1978 on each of the following? Airlines- The airlines no longer operated in a protected environment. They were free to establish their own routes and fares and to suffer the consequences. New airlines started and threatened the routes of the old carriers. Some airlines expanded; some merged; some failed. Entrepreneurs tried new ideas. Travel Counselors- Open competition changed what was once an orderly fare system to a chaotic one that changed frequently. More consumers were driven to travel agencies by confusing fares, and more travel business was generated by lower airfares. Eventually, airlines reduced commissions, putting financial pressure on counselors and their agencies. Consumers- Schedules and fares changed frequently; often hundreds of fares were available for each route. Discount fares helped air travel become transportation for the masses. Small towns and cities lost air service 2. Name one advantage and one disadvantage of the hub-and-spoke system from the viewpoint of the airlines. Advantage- Airlines can extend service to a larger number of cities, maximizing passenger loads from smaller cities, and save fuel. Disadvantage- Many flights must arrive at almost the same time and depart at almost the same time, adding to airport congestion. Other answers are possible. 3. Name one advantage and one disadvantage of the......

Words: 484 - Pages: 2

En1320 Unit 4 Lab 1

...The time is around midnight. I am in a hospital bed, beaten, bloody, pregnant, and cold. As I lay there, I wonder if this is love. How could a man say he loves a women but then hits her? I thought he loved me. I thought we would be a happy family now that I am carrying his baby. Wow I must have thought wrong. This isn’t love this is painful. We have been together for only a couple of months. He said he would take care of me and the baby. He lied. You might ask why I don’t leave. Well let me take you down my long hurtful road and explain my reasoning. As a kid, I always saw a man hit my mom. I didn’t know why she stayed and how she always would end up with the wrong guy. I always told myself I would NEVER let a man hit me. I dreamt of my mom meeting a “good” man and living happily ever after. That day came when I was in 9th grade, my mom met the man I call my dad. We were a happy family. I graduated high school in 2008. That’s when my life took a turn for the worst. I met Eric when I was 18. He said all the right things. I fell in love fast with this idea of a perfect man. He was from Chicago and I lived in Easley. He came down and to meet me. I moved to Chicago with him after knowing him for only 20 days. He was my escape from the real world. The day came where he hit me the first time. I think it was because I didn’t make his food right or something like that. I made an excuse for him. I thought it was MY fault. He said he was sorry and he would never do it again.......

Words: 911 - Pages: 4

En1320 Annotated Bibliography

...Summary of annotated bib EN1320 I am doing my research paper on sex offenders and what their lives are like after being incarcerated and then released into society again. I read a few articles that talk about sex offenders in a few different states. In the first article it speak about how Minnesota at one point had no laws as far as sex offenders having to register where they live at and work as a sex offender. There was a woman who had a son who was abducted at the age of 12 and he was never found she sought out justice for this. In her investigations she found that other states had laws for sex offenders where they would have to register in their county as an offender and they could not live within a certain amount of distance where there could possibly be kids around. The woman suggested that if this law were in place in her home town where her son was abducted from then the possibility of this every happening would be slim because at least the surrounding neighbors would be aware that there was someone living around them that was a possible danger to children. I agree that all states should have a law in place that states all offenders must be registered and the public should have access to view records. In my second article they speak about a little town in Florida there is a home that offenders go to after being incarcerated for so long. In this place they are waiting out the rest of their time. There are a lot of people who say that the home for these men......

Words: 788 - Pages: 4

Nt1110 Lab 4.2

...In this lab, you will demonstrate the ability to work with decimal and hexadecimal numbers. Required Setup and Tools In this lab, you will need only paper and pencil to do the required work. However, the use of a calculator is permitted to verify the results of a calculation. The Windows calculator may be used for this purpose. Recommended Procedures Task 1: Convert Decimal Number into Binary Procedure 1. Convert the decimal number 125 into binary. Use the division-by-two method shown in the following example below. 2. Convert your binary result back into decimal to prove your answer is correct. This is also shown in the following example. Example: Convert the decimal number 50 into binary using the division-by-two method. Convert the binary result back into decimal. Solution: 50/2= 25 25/2= 12 remainder 1 12/2= 6 remainder 0 6/2= 3 remainder 0 3/2= 1 remainder 1 1/2= 0 remainder 1 (most significant bit [MSB]) Read the answer from bottom (MSB) to top least significant bit (LSB): 110010 Convert 110010 binary into decimal. Weights 32 16 8 4 2 1 Bits 1 1 0 0 1 0 Adding the weights whose bits are 1: 32 + 16 + 2 = 50 Task 2: Convert Binary Number into Decimal Procedure 1. Convert the binary number 10101101 into decimal. Use the method of adding weights, as shown in the example, from Task 1. 2. Use the Windows calculator to prove your answer is correct. This process is shown in the following example. Example: Use......

Words: 755 - Pages: 4

Nt1210 Intro to Networking Lab 4.2

...NT1210 Lab 4.2: Fiber-optic Cables Exercise 4.2.1 The light in an SMF cable travels down the center of the fiber parallel to the direction of the fiber in a single path. Can this type of cable be used to transmit and receive bits simultaneously, or does it require one fiber for transmitting and one for receiving? Justify your answer using your textbook and Internet research. No it cannot transmit and simultaneously receive bits with a single cable. A second cable would be needed for sending bits back. In this case you would need two cables one send bits and second cable receiving bits. Exercise 4.2.2 What characteristics of fiber-optic cables allow them to be used over longer distances with less risk than copper cable? The core in single-mode fiber is only approximately 10 times larger than the wavelength of the light it is carrying. This leaves very little room for the light to bounce around. As a result the data carrying light pulses in single-mode fiber are essentially transmitted in a straight line through the core. Electromagnetic immunity including non-conductivity, Security considerations, decreased attenuation and increased transmission distance, Increased bandwidth potential, Small diameter and weight Long term economics Exercise 4.2.3 MMF distances can still far exceed copper cable, but MMF cannot match the distance available from the more expensive SMF. What is the reason for the distance limitation with the use of MMF? Multimode cables are less......

Words: 333 - Pages: 2

En1320 Comp1

...Is Pro Wrestling fake or real? EN1320 Comp1 Research Paper IIT-Tech As long time avid fan of pro wrestling I always get ask is pro wrestling is fake? Sure pro wrestling is a male oriented soap opera, that storylines and matches do have predetermined outcome. Predetermined meaning the refs, wrestlers and bookers know who is going to win or lose a match before the actual match starts. Yes the hazards can be real inside the squared circle because if a wrestler receives or takes a “bump” the wrong way. It could be a career ending injury that wrestler might not even wrestle again. That being said every pro wrestler trains day in and day out to insure nobody gets hurt in the squared circle. For the untrained eye or people who don’t follow wrestling do not factor that in. Now the question that is always topic of debate about pro wrestling is it a sport or entertainment? Pro wrestling is part entertainment part sport because Greco Roman wrestling style it uses. The moves preformed like headlocks, suplexs and slams come from the Greco Roman wrestling style. Pro wrestling uses “Gimmicks” meaning the persona, usually artificially created; one has in order to draw fan interest. Here is where the entertainment comes into play for pro wrestling. Without the entertainment aspect of it, pro wrestling would boring, stale and not really fun to watch. Who wouldn’t want to watch a guy named “Dude Love” an overweight guy wearing tie dye, sunglasses and talking like a throwback 1960's......

Words: 1353 - Pages: 6

En1320 Module 2 Lab 2.1

...Dorsey Douglas En1320 Module 2 lab 2.1 Creating an Outline The Gaming Industry and all its Fantastical Amazement Introduction: It was once said that videogames would be just a fade. Something that would last about as much as the next generations fasion sense. Course I say its been said, as if there has been an actual book written. By they I mean my father. I cannot think of a time when videogames were not apart of my life. From my earliest memories I can tell you certain patterns from pong, pacman, etc. It has only been the natural progression of who I am that I would want my career to fall into something dealing with the gaming industry. As I said, once considered a fade, it is now a growing billion dollar industry. Hollywood Films, Symphony, Broadway Shows, have all had a tale from a game inspire their respective form of media. For me however it’s a specific part of the industry that I would love to be apart of. That’s the Story telling. I feel as if todays games are truly immortalized by the stories that they tell. From Mario saving the Princess from bowser, to The World Being over Run by a corrupt Private Military Corp. Gaming is where I want to tell my stories. Conclusion: In conclusion, With my focus on school and now my new Career job, I see only great progress in my journey to become the next great gaming story teller. I don’t see much stopping me from my goals but myself. I want to some day be able to sit at the VGA’s and......

Words: 297 - Pages: 2

En1320 Project Part 1

...Exploring and Researching Your Chosen Profession By Robert Maddox EN1320 In this new age of the second industrial revolution, a time where skills in technology are essential to succeed in a competitive work force, cybersecurity is at an utmost priority for many companies and individuals alike. It's here where I feel I can make a truly important impact upon society, all while working with a sense of purpose and success. One can't watch television without the constant reminder of identity theft or devastating hacks by secretive individuals hidden behind false IP addresses and the like. Whether it's a commercial for credit scores and security or shows like Mr. Robot, cybersecurity is on everyone's mind, subconsciously or otherwise. And these issues are only going to increase as technology advances and the internet becomes more readily accessible to terrorists. As a veteran, my duty to protect American citizens did not simply stop when my contract ended with Uncle Sam. Ideally, I would accomplish this through the Federal Bureau of Investigations. There are many criteria to complete in order to accomplish this, and I am in no way close to this, yet one must start somewhere and this degree will be my first step. I have always been interested in computer technology, even if it merely stemmed from my long term relationship with video games. Rebuilding computers and achieving better performance came second nature to me and computers just make......

Words: 1074 - Pages: 5

En1320 Lab 2.1 Drafting an Essay

... ------------------------------------------------- Lab 2.1 Drafting an Essay June 25, 2015 EN1320 Duane Seneschal June 25, 2015 EN1320 Duane Seneschal Ever feel like you are in a dead end job, your life is at the bottom of a pit? That is how I felt before I decided to go back to school. I realized that without a college education that my life was going nowhere. I had no future. I had to break out of this pit that had become my life and chosen job. Without a college degree I was going nowhere had no future. Deciding to get a degree is all good and well, but what degree what path? How does one go about making a decision of this magnitude? It is an overwhelming task that can be frightening. It’s like looking up from the bottom of a hundred foot deep pit and trying to figure out how to get out of the pit and back into the sunlight, it’s scary. Well I know that I enjoyed working with and building computers, and I enjoyed the security field. I started searching to see if combining these 2 fields was feasible or possible. To my delight and pleasure there was a degree program that did cover both of these fields together it was called Cybersecurity. After reading up on Cybersecurity I felt it was a field that I would enjoy. But what exactly is Cybersecurity? After much research what I discovered is that Cybersecurity is different technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access...

Words: 689 - Pages: 3

Libs 150 Quiz 4.2

...Libs 150 Quiz 4.2 Click Link Below To Buy: http://hwaid.com/shop/libs-150-quiz-4-2/ Part A Directions: Each of the following APA-style citations is missing one piece of information. Please select the option that reflects the missing information. Question 1 1 / 1 point Brook, R. H. (2012). Two years and counting: How will the effects of the Affordable Care Act be monitored? JAMA: Journal of the American Medical Association, 41–42. doi:10.1001/jama.2011.1948 Question 2 1 / 1 point (2010). The relative burden of selected social and behavioral risk factors in the United States: Implications for policy. American Journal of Public Health, 100(9), 1758–1764. doi: http://dx.doi.org/10.2105/AJPH.2009.165019 Question 3 1 / 1 point Kim, J. & Davis, J. W. (2011). Prostate cancer screening—Time to abandon one-size-fits-all approach? 306(24), 2717–2718. doi:10.1001/jama.2011.1881 Part B Directions: Match the citation to the citation style for each article record. You will want to reference the UMUC library’s citation resources for these items. Question 4 1 / 1 point Gutfeld, Arnon and Clinton R. Zumbrunnen. “From Nickel Grass to Desert Storm: The Transformation of US Intervention Capabilities in the Middle East.” Middle Eastern Studies 49, no. 4 (2013): 623–644. Accessed May 6, 2014. http://www.jstor.org/stable/23470921 Gutfeld, A. & Zumbrunnen, C.R. (2013). From Nickel Grass to Desert Storm: The transformation of US......

Words: 523 - Pages: 3

En1320 Essay 3 1

...EN1320 EN1320 04/13/2013 04/13/2013 Essay 3.1 Rhetorical Analysis Obamas “A More Perfect Union” Speech Essay 3.1 Rhetorical Analysis Obamas “A More Perfect Union” Speech On March 18, 2008, Senator and future President Barack Obama delivered a speech that was titled “A More Perfect Union” (Obama Race Speech, 2008). This speech took place in Philadelphia, PA at the National Constitution Center. This speech was given during the 2008 Presidential race and looks to address the concerns regarding video of controversial and racially charged comments made by former pastor Jeremiah Wright which seemed to playing on loop in every media outlet possible. He also addressed the subjects of racial tension and race and inequality in the United States. From the beginning of the speech, it is evident that the most effective appeal that Obama chooses to use is ethos. As a rhetoric tool, ethos is used to establish character. Ethos is an appeal to ethics, and it is a means of convincing someone of the character or credibility of the persuader (Examples of Ethos, Logos, and Pathos). In order to establish an effective ethos, the speaker must present themselves in a way that will make the audience believe what they say. A strong example of this is when he uses the quote “We the people, in order to form a more perfect union”. In referring to the U.S Constitution, this compels the audience to make a connection of significance and importance between his speech and that of the......

Words: 1158 - Pages: 5

En1320 Lab3

...Alyssa Bauman En1320 Lab3 “Why We Crave Horror Movies” by Steven King presents an intriguing philosophy of watching horror movies. I believe that the purpose behind this article is to appeal to the reader’s unrealized dark side. King implies that are able to overcome their hysterical fear of things when they’re confronted with it and watching a horror movie is the easiest way to do that. He explains that in some way we all have this courage to overcome our deepest fears and one of the ways we show it is placing ourselves, in this case a movie theater, directly in front of what we know will scare us. The intended audience for this article is most likely the younger age demographic. Horror Movies are especially popular with ages 15-35. When you are younger you have this need to seek out new experience and thrills. Throughout the essay King directs a message to the young by making a comparison of horror movies to roller coasters describing the excitement that is felt throughout the ride. King is trying to persuade his reading audience to watch horror movies that bring his popularity up because he has books that have been made into movies. Although persuasive, King's article does not have factual evidence to solidify his argument that we all crave horror movies. The article uses many rhetorical strategies such as: compare and contrast, analysis and evaluation, cause and effect, absolutes, generalizations, and assumptions. King's ability to use these strategies......

Words: 373 - Pages: 2