Friday, August 21, 2020

Maths Coursework Trays Essays

Maths Coursework Trays Essays Maths Coursework Trays Essay Maths Coursework Trays Essay In this coursework applicants were given an assignment entitled Trays. The errand comprised of a businesspeople explanation upon the volume of a plate which was to be produced using a 1818 bit of card. The businesspeople explanation was that, When the territory of the base is equivalent to the region of the four sides, the volume of the plate will be greatest. By saying this, the businessperson essentially implied that when the region of the base of the plate is equivalent to the all out region of the sides the volume of the plate will be at its most elevated. We were advised to examine this claim.Plan.1. I will examine the various sizes of plate conceivable from a 1818 bit of card.2. In the wake of picking up my outcomes I will at that point put them in a table.3. I will attempt to detect any examples from my table.4. I will communicate any examples or other formulae in numerical notation.To research the various volumes given by various plate, I initially choose to compromise in ris ing request from 1-8. (The longest conceivable corner must be 8 as after this there would be no base.) After this I worked out the equation expected to work out the volume for the different plate. For the corner size 11 the manner in which I worked out the volume was 16x16x1 which equalled 256cm. Along these lines the equation to work out the volume for a plate made by a 18x18cm card is (n 2X) X. In this recipe the letter X speaks to the size of the corner. I attempted my equation for the corner length of 2cm,(18-2 x 2) x 2(n 2 X) x X(n 2 X) x XI take off two the corners from each side as the card is square.After discovering the recipe I worked out the volume for the remaining trays.CornersVolume (cm)16x16x11x125614x14x22x239212x12x33x343210x10x44x44008x8x55x53206x6x66x62164x4x77x71122x2x88x832From my table I can see that the most noteworthy volume for a plate made by 18x18cm card is 432 cm this volume is reached if the corners cut are 3cm x 3cm. I can likewise observe that the volu me of the plate ascends as the length of each corner ascends until the corner size goes more than 3. After this the volume begins to diminish as the size of the corner increases.After working out the volume for the plate I proceeded to work out the zone of the bases of the plate alongside the zones of the sides of the plate. I worked out the territory of the base of the plate by finding the size of the side after the corner had been cut off and afterward square this number. For instance to discover the zone of the base of the plate where the corners were 1x1cm ,I initially discovered the size of the sides which were 16 and squared it. The appropriate response was 256cm . The equation for this was (n 2x) which out would be 18 (n) short multiple times 1(x) squared. I than continued to work out the region of the sides, which would be basic in demonstrating that the retailer is correct. To work out the are of the sides of the plate I utilized the equation 4x (n-2x). Here again the n spe aks to the size of card 18cm. The x speaks to the size of the corner. You need to times your answer by four as there are four sides. To work out the region of the sides for a corner estimated 1x1cm the counts would be:4x (n 2x)4 x 1 (18 2 x 1)4 ( 16 )64cmCornersVolume cmArea of base cmArea of sides cm1x1256256642x23921961123x34321441444x44001001605x5320641606x6216361447x7112161128x832464From my outcomes I can see that with respect to the zone of the base, the zone brings down as the corner size is expanded. Anyway the zone of the sides increments as the size of the corner increments until the corner arrives at the size 44 cm. After this the regions are rehashed backward order.I then took a gander at my outcomes to see whether any regions matched.I saw that for the corner size of 3x3cm the territories coordinated as the territory of the base was 144cm and the zone of the sides was 144cm . I likewise saw that the most elevated volume for a plate produced using a 18 by 18cm bit of card was 432cm which additionally got from the corner size 3cmX 3cm. I would thus be able to make the end that the retailer is right.However to ensure that 432cm was the most noteworthy conceivable volume accessible from a 18 by 18 bit of card I chose to utilize decimals. I settled on examining corners of 2.9cm and 3.1cm . I utilized the equivalent formulas.CornersVolumeArea of base cmArea of sides cm2.92.9431.636148.84141.52334321441443.13.1431.64139.24146.32From these arrangement of results I can see that the corner size of 3cm has a higher volume than the corner 2.9cm or the corner 3.1cm. Additionally the territories of the sides and of the base possibly coordinate when the corners slice out are equivalent to 3cm. I can in this way make the end that to get the greatest volume from a 18cm by 18 cm card you have to need to remove corners of three centimetres.I chose to see whether the retailers hypothesis was right on various estimated square cards. The card of which the plate would no w be caused will to be measured 20 x 20 cm. I moved similar formulae for the 18 x 18cm card. I recorded the accompanying results:CornersVolume cmArea of base cmArea of sides cm1x1324324722x25122561283x35881961684x45761441925x55001002006x6364621927x7294361688x8256161289x9162472You can see from the outcomes that they are fundamentally the same as those which were recorded on the 18 by 18cm card. Anyway there is one fundamental contrast, the most extreme volume isn't given when both the regions of the base and region of sides is equivalent. In this way I diagramed the region of the sides against the zone of the base.You can see from my chart that the two region esteems went somewhere in the range of 3 and 4 thusly the most noteworthy worth lay between these two numbers if the retailer was right.CornerVolumeArea of baseArea of Sides3.05589.2905193.21169.583.1590.364190.44171.123.15591.2235187.69172.623.2591.872184.96174.083.25592.3125182.25175.53.3592.548179.56176.883.35592.5815176.8917 8.223.4592.416174.24179.523.45592.0545171.61180.783.5591.51691823.55590.7555166.41183.183.6589.824163.84184.323.65588.7085161.29185.423.7587.412158.76186.483.75585.9375156.25187.53.8584.288153.76188.483.85582.4665151.29189.423.9580.476148.84190.323.95578.3195146.41191.1845761441924.1570.884139.24193.524.15568.0935136.89194.224.2565.152134.56194.884.25562.0625132.25195.54.3558.828129.96196.084.35555.4515127.69196.62I finish up from my outcomes that the businesspeople explanation isn't correct on a 20x20cm card.

Monday, July 13, 2020

Coaching in the Knowledge Era

Coaching in the Knowledge Era This is the era of information overload. The advent of the internet, personal computers, and smartphones mean everyone has easy access to almost all kinds of information.This has posed a special challenge for coaches from all fields of life, especially business. Executive coaching is evolving and it is expected to embrace quite a few trends in the coming years.Watch the video to find out what executive coaching is and why you need it. The only thing that is constant in this world is change.There are certain things in our society such as collective values, beliefs, thoughts, family life, working practices and lifestyle that change from time to time.For example, it was not necessary for the executives in the 1950s to acquire a work/life balance because the entire responsibility of running homes was rested with the women.Moreover, they strictly followed a structured and regimental 9-5 hours a day work routine.They would also not try to balance the leisure time against the work because i t was culturally not important back then.Imagine coaching someone in the 1950s or the 1960s compared to modern era executives and businessmen.The issues of today are totally different from the problems encountered by the executives some 60-70 years ago.As the priorities and problems of the business and people have changed, the coaching industry has evolved itself accordingly as well.The people of the 50s and the 60s consider coaching as we know it today as a new form of psychotherapy.It was not until the 80s or the 90s that they started taking coaching as a way to learn new techniques and ideas and how to implement them to drive the companys success.With the passage of time, coaching became a full-fledged service and the coaches started to create and employ scientific methods to teach their students.Here is a famous Six-Question process for adopting a coaching approach by the best executive coach in the world, Marshall Goldsmith. COACHING IN THE MODERN ERAThere is nothing wrong in s aying that executive coaching has totally changed from what it was just a decade ago.It is important to delve little further into history in order to fully understand this transformation.As mentioned above, coaching transformed into a fully commercial activity way back in the 1970s. Since then, it has changed and evolved drastically.From the early 70s to the early 80s, coaching was only associated with sports.However, it infiltrated into other fields, especially business as the time passed by.It was during that decade that companies seriously started to think about their corporate cultures and things like embracing change, professional development, and employee mindset.Coaching became an important component of companies functions across Australia and the rest of the world in the later years of the 1980s.Sir John Whitmore presented his famous GROW Model of coaching at the beginning of the 1990s which garnered worldwide popularity. The basic purpose of the model was problem-solving an d goal setting.The model is so effective that individual coaches and institutes still widely use it to great effect.Subsequently, coaches across the globe started to adopt many different techniques such as learning development theories and psychological development to name the few as the importance of coaching started to grow.Here is a basic diagram of the Grow Model. Source: slidemodel.comLife coaching also gained tremendous popularity in addition to executive coaching in the 1990s.More and more people hired personal coaches to seek help regarding decision making, how to boost their confidence or make a career change.It was in the 1990s that executive and life coaching entered into the mainstream mode and got all the limelight it deserved.However, a large number of under-qualified and untrained people also moved into this growing and lucrative industry, which had adverse effects on the quality and results of corporate coaching.Therefore, companies started to consider coaching as a specialized field.By then, a number of reputable organizations had already started to offer accreditation programs.These organizations also put forward industry-specific rules and regulations.Today, thousands of coaching organizations are working in the United States alone.They impart industry-specific training and knowledge to both the experienced and novice businessme n. Even the general public has access to a variety of coaching programs.Some of the organizations go to the extent of finding different methods and techniques to support their coaches.There are ample professional development opportunities for different types of coaches.Similarly, various networking events, books and publications, and coaching supervisions also add to their knowledge and experience.The following chart, taken from the final research report of Executive Coaching Industry Research published in 2013, highlights the primary purposes of executive coaching. Source:  www.coachingsurveys.comTHE REQUIRED DISCIPLINEIt can be said with certainty that coaching has become a required discipline in almost all kinds of companies.Most of the courses are designed for senior management, but there are some brilliant coaching programs for junior management and low-level staff as well.Today, around 52% of companies offer coaching programs, both to their senior management and employees.The coaching field is still expanding and there is a lot of scope for new and emerging personal coaches as well as the coaching organizations. The industry is also not stagnant, but it continues to grow.In fact, numerous companies are developing in-house coaching programs for their employees. It also means the demand for individual coaches and coaching organizations will not dwindle anytime soon.THINGS TO TAKE NOTICE OFBusiness coaching has changed a lot over the years and there is no doubt about it. Companies are also much more aware of this change than ever before.They have also recognized the essential link between behavioral psychology and the functioning of an organization.Therefore, it is becoming even more important for the coaches to raise a bar on their performance and enhance their knowledge in areas like individual psychology and organizational understanding.It is the only way to maintain professionalism and high standards in the industry which is getting overly crowded.Business and life coaches are also putting greater emphasis on various psychological aspects of coaching including cognitive behaviors, mindfulness, neuroscience, positive psychology, and emotional intelligence.Nowadays, coaching has a greater impact on human psychology and behavior as well as professionalism.   It also explains why it has transformed into a proper profession over the course of 6-7 decades.Businesses across the world are currently experiencing a sort of recession.During these desperate times, coaching organizations are offering programs which assert the im portance of aggressive marketing and sales techniques.The main goal of these programs is to help organizations increase their revenue in a very competitive yet frustrating business environment where some of the most experienced marketers have failed to deliver.Similarly, dedicated and highly professional coaches also continually evolve and adapt to changing the business landscape, making this industry even more attractive and fascinating.CHANGING EXPECTATIONSThe sports coaches of 1970s worked differently from the coaches of today. There are three main reasons which prompted this change.First of all, the expectations of the clients have changed.Secondly, a number of new businesses with different requirements have emerged in recent years.Thirdly, incessant technological advancements have introduced new methods of delivering effective coaching.Todays executives want to be extra effective.But, the techniques they use to become effective leaders are constantly evolving as is every other aspect of their business, making it necessary for the coaches to always stay on their toes to survive in this industry.CERTIFICATION AND ACCREDITATION IS VERY IMPORTANTJust because you are a qualified coach does not mean you are an effective coach as well. In fact, these two attributes have nothing in common.It can be said that the growing number of coaching accreditation and certification programs is a positive development.Unfortunately, most of these programs are not good enough to produce high-quality coaches who have the ability to be effective and successful with their clients.It has become mandatory for the coaches to acquire coaching certificates despite their apparent shortcomings. If you don’t, you will significantly decrease your chances of getting hired.These programs are growing in importance as companies are hiring both business and life coaches for their employees at a continually increasing rate.After all, a company that is investing heavily in executive coaching pr ograms will make sure that the return on their investment is always positive.Therefore, it is necessary for you as an executive coach to get accredited with a reputable coaching organization if you want to have any chance of success.Here is a detailed guide on how to become a certified coach. COMPANIES EXPECT FAST, MEASURABLE RESULTSCoaching is no longer an exercise which only boosts the confidence of your client and increases his happiness levels.Nowadays, both companies and individual clients want fast and measurable results over a specified period of time.For instance, gone are the days when companies would wait for years for their newly appointed CEOs to reach their full competence.Now, they would rather hire a coach who promises to deliver quick results in the short run and permanent results in the long run.Some of the best executive coaches who deal with c-level executives are equipped with all sorts of analytics and assessment tools.These tools help them develop an actionable plan with their client, including objectives and goals and how to attain them.In simple words, companies expect a business coach to deliver demonstrable results. Most importantly, these results should make a real difference to their company as well.APP-BASED COACHING PLATFORMSThe influx of mobile coaching apps has had a major impact on the coaching industry. Some of these apps are really popular and they have totally changed the way people think of executive coaching.You may argue that apps cannot replace human coaches. We have to agree with you because executive coaching requires actual human relationship which an application can never stimulate.Nevertheless, app-based coaching programs are springing up like mushrooms.They are also expected to make coaching tools such as tracking functions and assessments much more reliable, accurate, and faster.There are, in fact, many benefits of mobile-based coaching programs especially for your clients.For example, he can easily measure his pr ogress against the set milestones.He can also measure your performance as a coach with the utmost ease.You do not have to explain to him everything during the next in-person coaching session and both of you can spend your time on more important matters, such as learning and practicing new leadership techniques.The purpose of mobile apps is to complement coaching and make it more efficient. They are not here to supplant it.NICHE COACHINGCoaches who have specialized in a single field or industry will be in greater demand in the years to come. Niche coaching is on the verge of becoming the next big thing in the coaching industry.You may opine that some characters are common among all leaders and executives.However, executives working in different industries have different requirements. What a tech executive wants is totally different from what an executive working in the gas and petroleum industry requires.All these executives need a coach who has demonstrable experience in their respe ctive fields, making it important for coaches to specialize in a single field of their choice.The following infographic explains why coaching is the best leadership behavior. Source: zengerfolkman.comCOACHING FOR NON-EXECUTIVE LEADERSBusiness coaching is no longer for executives and senior management only. Businesses have realized that coaching has the potential to change the life and career of non-executive leaders as well.In fact, an increasing number of non-executive leaders are taking a keen interest in coaching and it is a very positive development.It is a common saying that people leave the manager not the company when they resign from their jobs. In this regard, senior management can only be effective when they are worried about bad decisions, and moral problems of junior level executives.Companies that can dedicate resources and arrange coaching programs for their non-executive leaders often perform better compared to companies which cannot or do not spend money on non-executive coaching.INTEGRATION OF COACHING INTO LEADERSHIP DEVELOPMENT PROGRAMSNumerous companies are integrating their leadership development programs with their coaching programs. According to some experts, the trend will continue to grow and resonate for a long time to come.It actually makes a lot of sense because the leadership development work is actually a part of the companys coaching process.Instead of learning leadership in the classrooms, active coaching enables you to practice it during your routine, day to day activities.Integrating theory-based knowledge with practical on-job application opportunities is the way to go for both the leaders and their companies.LEADERS AS A COACH TRAINING IS GAINING TRACTIONThis is another growing trend which has gained a lot of traction among business leaders. Working as a leader-coach has a lot of perks. It is an emerging skill which leaders have to master.When leaders teach and guide others about various aspects of business or life, it expands their own knowledge of leadership and management.Furthermore, they get in a better position to promote action and accountability in the teams they lead.The following is a bea utiful TED Talk about leadership and coaching by Mark Smith THE TYPE OF COACHING TO FOCUS ONThere is hardly any organization in the world which does not provide professional development opportunities to their employees.Many companies have even put coaching for their staff on the top of their priority or to-do lists.How do these companies prioritize their coaching needs? Whether the focus should be on the team, executives, external or internal coaching or something different altogether?In this regard, many organizations prefer to develop coaching programs or classes for their senior managers only.On the other hand, external coaches like to coach teams, arguing that it will become a top trend in the coaching world sooner rather than later.Here is an excellent video about different types of coaches you normally come across. STREAMLINED AND CENTRALIZED EXECUTIVE COACHINGThe trend of centralized and streamlined executive coaching enabling companies to hire fewer coaches is also on the ri se. Currently, companies have dedicated coaches for every tier of their employees.Although they are doing a pretty good job yet it is difficult to measure results when so many disconnected coaches are working in your organization.You can align your coaching programs with your corporate goals, enhance their consistency and get demonstrable results by centralizing and streamlining your coaching system.MORE COACHING OPPORTUNITIES FOR MILLENNIALSIt is not surprising that millennial leaders are also taking on the challenge of coaching their teams.Similarly, companies are feeling a greater need to add more coaching opportunities for their millennial employees and leaders. Such employees have a craving for feedback.Similarly, they are more likely to use the latest technological tools to go about their business.Therefore, focusing on providing them with training opportunities might be the perfect recipe for success.The International Coach Federation has also released an infographic which ex plains why coaching really works. Source: https://kenmcgarity.wordpress.com/CONCLUSIONCoaching is on the rise in organizations around the world.This is the trend which is not likely to vanish anytime soon. In fact, companies spend billions of dollars on different types of coaching every year.Coaching has also emerged as one of the most important business trends and needs in the last couple of decades.Similarly, coaching is also evolving just like all other professions.The current generation of leaders who grew in the late 20th century has a totally different opinion about coaching compared to the top leaders who grew in the 60s or 70s.Both companies and individuals are recognizing and appreciating the importance of coaching in the modern world.Similarly, specialization and technology are helping the clients and the coaches to effectively work together and obtain desirable yet measurable results.

Wednesday, May 20, 2020

Sample Annual Report of a Company

The annual report is purposed to measure a comprehensive statement based on company’s activity through the past year. Moreover, it is targeted to shareholders and customers in order to send them a message about the financial conditions and financial development of a particular firm. Literally, most companies are obliged to prepare an annual report in order to fulfill the requirements of shareholders and demanding audience. Generally, sample annual report of a company includes the complex structure of letter to the shareholder, main highlights of the last year, management discussion and analysis, and corporate information. However, some companies can omit certain account elements when addressing to the general public via websites, advertisements, and television broadcasting. Overall, this report presents annual achievements of a company in a combined way with the help of charts and graphs, or simply as a written statement. In 2015, Coca-Cola Inc. finished their global seven-years advertising campaign. Thus, the main promo idea â€Å"Taste the Feeling† denotes Coca-Cola to be a drink which is suitable for common taste and preference. In addition, the drink definitely dilutes everyday routine, making each day a special thing. Under this campaign, all Coca-Cola brands are united together, creating the product harmony. â€Å"Taste the Feeling† idea reflects both functional and emotional aspects of consuming experience. As a result, each customer can get a Coca-Cola bottle with or without caffeine, adjusting the choice towards lifestyle, diet, and opinion about the drink. The company introduced brand-new fully recyclable Plant-Bottle in 2015. This innovative type of bottle generally meets the expectations of the consumers who have been pledging for environmentally-friendly beverage since 2009. Back in 2009, the first attempts to create the bottle fully made from plants were initiated by PET with their vegetable beverage. Comparing Plant-Bottle to the old sample, it is clear that new bottle has the lighter effect on the environment, is fully-recyclable, and allows to keep the resources owing to the fact that it is completely plant-made. Coca-Cola’s labor system expands to the various countries across the whole globe, creating the most diverse network of employees from almost every nation. Moreover, the company has one of the youngest workforces in the world, forming an internal labor network of talented and innovative workers. The group, which is considered to be important for the company is Millennial Voices. The group consists of young associates who help recruit and train their potential colleagues. Millennial Voices is presumed to be a new vision of how consumer and businessman can interact with each other. It has helped the company in such various aspects as shaping everything from the new technology pilots and performed campus recycling initiatives. Flexible work policies and mentoring program are also their important merits. The basic pillar of Coca-Cola’s internal and external policy is sustainability. Integrating this issue onto the very core of the company, Coca-Cola industries continue creating benefit for both shareholders and certain communities. The main aim of the company is denoted in the majority of innovations which will take place in the next decade as a part of the intersection of sustainability and the supply chain. Moreover, the company devotes itself to empower women all across the globe and enables better management of the water resources. References Bellstrom, K. (2016). Coca-Cola Credits Millennials For Its Extended Paid Parental Leave Policy. Retrieved June 14, 2016, from http://fortune.com/2016/04/11/coca-cola-parental-leave-policy/ Financial results and presentations. (2015). Retrieved May 30, 2016, from http://coca-colahellenic.com/en/investors/financial-results-and-presentations/ Hanlon, P. (2015, January 25). Cokes New Taste The Feeling Brand Campaign Doesnt Lose Bad Feelings. Retrieved June 14, 2016, from http://www.forbes.com/sites/patrickhanlon/2016/01/25/cokes-new-taste-the-feeling-campaign-doesnt-lose-bad-feelings/#3343ea1e1b8b Isdell, E. N., Beasley, D. (2011). Inside Coca-Cola: A CEOs life story of building the worlds most popular brand. New York: St. Martins Press. The Coca-Cola Company. (2015). Retrieved May 30, 2016, from http://www.sec.gov/Archives/edgar/data/21344/000002134416000050/a2015123110-k.htm / For the fiscal year ended December 31, 2015

Wednesday, May 6, 2020

The Sacred Text And The Principal Beliefs Of Christianity

Over the centuries, Christianity has organised its beliefs into a systematic theology that draws from its sacred writing and tradition. While the main beliefs of Christianity are shared by all Christian variants, there are degrees of different in the interpretation of these beliefs and how they are lived out in everyday life. This can be seen in the important of sacred text, principle belief of the concept of salvation in John 3:16, principle belief of divine and humanity in ‘John 1:14’, principle belief of resurrection in ‘Mark 16:1-8’, principle belief of revelation in ‘1 corinthians14:6’, and beliefs through the Trinity in ‘2 Corinthians 13:14’. This essay will explain the important of the sacred text and the principal beliefs of Christianity. The important sacred text of Christianity is the Bible. The Bible is primary sacred text of Christianity. The Christian Bible is made of two parts: the Old Testament, which is almost identical to the Jewish Bible; and the New Testament, a collection of Christian writings that includes biographies of Jesus and the apostles, letters to new churches, and an apocalyptic work. The Christian Bible is a collection of writings that Christians believe is of divine and human origin. The Bible is accepted by Christians as trustworthy for belief and practice. As well sometimes referred to as Scripture and Holy Scripture . Christianity views the Bible as the basic source of belief and practice. The Bible is the central sacred text forShow MoreRelatedThe Bible and The Qur’an Essay747 Words   |  3 PagesThrough examining the beliefs derived from the sacred texts of Christianity and Islam, it has become evident that there is a significant relationship between beliefs and the notions of inner and world peace within a religious tradition. Inner peace refers to the ways in which the sacred texts and principal teachings structure an individual’s quest to achieve personal peace and satisfaction. World peace is also achieved through the sacred texts and teachings however, it is the ways in which theseRead MoreThe Sacred Texts And Writings1423 Words   |  6 PagesSacred texts and writings are very beneficial for Christian people since they are the word of God and can be deliberated as supportive indication of understanding the principle beliefs of Christianity which include the divinity and humanity of Jesus Christ, death and resurrection of Jesus Christ, the nature of god and the nature of trinity, revelation and salvation. This essay aim’s at assessing the significant role of the sacred text in providing authentic information in regards to sacred textsRead MoreChristianity And Islam : Sacred Texts Are Vital Sources Of Information On All Aspects Of Peace 1637 Words   |  7 PagesIn both Christianity and Islam, sacred texts are vital sources of information on all aspects of peace. They demonstrate principal teachings about peace, and teachings on inner peace as well as supporting the ultimate aim of world peace. In the Christian sacred text, the bible, Jesus’ ‘Golden Rule’ is â€Å"do unto others as you would have done unto you†; which in relation to peace infers that one must act peacefully to receive peaceful treatment in return. One of the key teachings regarding peace isRead MorePeace Is Both Complex And Multifaceted1631 Words   |  7 Pagespresence of justice acting within the world. For both Islam and Christianity, peace is understood as more than merely an absence of violence and conflict. It refers more fully to an overall sense of wellbeing. Ultimately peace is found in union with God/Allah. Christians and Muslims are taught to live at peace individually and with others, both within their own communities and in the wider human family. The core teachings found in the sacred texts and writings of these two traditions enable adherents toRead MoreReligion and Peace - Christianity and Islam894 Words   |  4 Pagesimperative to understand the source of the teachings for each religion. The principles teachings of peace for Both Christianity and Islam are primarily found in the sacred texts of both religious traditions. Christianity looks to the bible and specifically the New Testament for teachings about peace, whereas Islam focuses’ on the Qur’an and Hadith to guide their beliefs of peace. These sacred texts guide the individual adherents of each religion to achieving inner peace which consequently develops theirRead MoreThe Four Characteristics of Religion1212 Words   |  5 PagesTRADITION† Religion is the belief and worship of an extraordinary and supernaturally controlling power that has developed and become an essential factor in the way humans have ordered and made sense of the world in which we reside in and is defined by its characteristics. To create a dynamic, living and breathing religion, it must have all of these characteristics that distinguish and separate a religion from others. These include beliefs and believers, sacred texts and writings, ethics and ritualsRead MoreComparing Christianity and Islam769 Words   |  3 Pagesbetween the individual, God and their neighbours. Christianity and Islam are both religious traditions that have their sacred texts, the Bible and the Quran and Hadith respectively, as the foundation stones to guiding its adherents to a life of inner-peace. This is achieved through following the principal teachings and taking part in the significant practices whilst following a comprehensive ethical structure as stated in their sacred texts. Both Christianity and Islam strive to emphasise the achievementRead MorePeace in Both Christianity and Islam Essays702 Words   |  3 Pagesand equitable to those who have neither fought against your faith nor driven you out of your homes. In fact God loves the equitable. (Chapter 60, Verse 8). This tells Muslims that all people should be treated kindly and equally. Peace in both Christianity and Islam is promoted by Peace organizations two examples of both Christian and Islamic peace organization groups include Peace wise Peacemakers, World council of churches, Muslim for peace and Muslim peace fellowship. These organizations contributeRead MoreChristianity Report1518 Words   |  7 PagesStudies of Religion-Christianity Origins and Principal beliefs of Christianity Christianity originated in the city of Jerusalem as a monotheistic religion which rooted from Judaism in the 1st century. Jesus of Nazareth, first recognized as a Messiah, is now known as the Son of God to Christians, is accepted as the founder of Christianity. Jesus, given that he sought only to renew Judaism, did not intend to find a new religion. To some people, Jesus is recognized as a normal human being who feltRead MoreWorld Religion : Judaism, Hinduism, And Islam Essay1391 Words   |  6 PagesWorld Religion At first glance and hearing about, Judaism, Hinduism, Buddhism, Christianity, and Islam these five religions-look and sound a lot alike. Each one was founded and developed by mankind, follow a list of religious principles and directives to live by, and they all share the same consciousness of wrong doings being reconciled. Because anyone can strike up a new religion at any time, however, religion cannot be judged on how it looks or sounds. As a comparison we will see just how different

What the In-Crowd Wont Tell You About Research Paper Format Outline

What the In-Crowd Won't Tell You About Research Paper Format Outline The following is an instance of how to structure such a paper. Without regard to the character of your research, if you're writing a paper an outline can help you to not just organize your thoughts, but in addition act as the template for your whole paper. The approval of any academic document highly is determined by the layout and format of the whole report. Just what is an APA paper. Students already expect there are a whole lot of research papers to be carried out. Research papers are a main portion of the educational procedure, and lots of instructors require students to supply an outline of their research paper before they actually. Nonetheless, with the right expertise, executing such research papers is a simple and intriguing endeavor. The ideal advice by a lot of the professionals and experts is to find assistance in the beginning despite doing any experiments. You should have your reasons, and o ur primary concern is that you wind up getting a great grade. By being aware of what format to use at the beginning, it is going to save you a great deal of time because revisions are going to be at a minimum. For the purpose, the exact same instructions about how to compose a research paper suggest using simple grammar structures, active voice and so forth. Naturally, there are lots of benefits of utilizing an outline. Therefore, you should include only the most significant info and prevent using minor facts that could be left out. If a table in the research paper cannot be accommodated in the space remaining on a particular page, continue the text to earn a complete page and set the table on top of the following page. Things You Won't Like About Research Paper Format Outline and Things You Will In case you're not able to do the research paper as a result of any reason, you can rely on ProfEssays to write for you in accordance to your requirements. In the event you doubt that you're able to manage the job, be certain to search for expert guidance. A period at the conclusion of your very last sentence is all that is necessary. Only quote if it's a particular sentence that has a high influence in how it is said or if the individual saying it has a specific authority. Finding an excellent idea of the sort of keywords to put in your paper outline can help you focus and structure your essay. As soon as you've already decided what topic you are going to be writing about, the following thing you ought to pay attention to is the reach of your paper or what you're going to be including in your discussion. Explain briefly the big points you intend to cover in your paper and why readers ought to be interested in your topic. You can also state what sort of approach it is you will use in your paper for the whole discussion of your topic. The outline should clearly depict different topics and subtopics through using headings and subheadings. MLA researc h paper format is just one of the most widespread formats utilized in academic writing. The MLA research paper outline template is just one of the popular formats to be utilized in academic writing. If you take a look at the majority of the very best research papers examples, all of them have a structure that's coherent and permits the text to flow smoothly. The abstract is the most important portion of the report because anybody hunting for your research on a database or within a journal will normally read no more than the abstract. An outline will help to stick to all formal characteristics of the research study. It is important for all types of research papers. Depth research is a huge deal. As soon as you know the best place to turn, you're going to be able to begin a research paper easily. A research paper is quite a serious type of academic writing. It should be interesting to read from the beginning to the end. Before beginning flushing out your research paper outline template, think about the keywords which will help you assemble a coherent introduction. In some instances where an outline is needed, there ought to be a distinctive method of formatting it. It is used to present. It will be a reminder for you to include all the necessary subtleties in it. Where to Find Research Paper Format Outline The essay ought to be typed. Outlines are useful since it helps one organize her or his thoughts much easier.

Thursday, April 23, 2020

It230 Computer Networking Final Essay Example

It230 Computer Networking Final Essay Network Design Franklin Joel Grimes IT 230 Executive Summary This paper will help to clearly define the network design of XYZ Corporation by ABC Computing. Together we will meet your IT challenges in a seamless, highly organized fashion. What we must address together, are the following: ? What are the goals of the network design project ? What things may be assumed ?  Ã‚  Ã‚  Ã‚  Ã‚   The pros and cons of our proposed IT solutions ? The exact scope of our mutual project constraints Why are we having these IT changes? XYZ has grown quickly over the past few years. You have expanded to many locations and must now be capable of acting and reacting as if XYZ were in one compact, efficient location. A wide area network or WAN will allow all areas to function as if they were under one roof, sharing resources in a secure environment. Topologies, what are they? Topologies are the logical structures of the network. We need only discuss one. We will be using a star topology. That means that devices will be connected to a central routing switch in a star like fashion. What does that really mean to XYZ? We will write a custom essay sample on It230 Computer Networking Final specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on It230 Computer Networking Final specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on It230 Computer Networking Final specifically for you FOR ONLY $16.38 $13.9/page Hire Writer This means lower cost of installation, simple maintenance, and ease of upgrading. The network connections will be made by way of a virtual private network. For each of you, this simply means that you not need to dial up connections. Connections will be dedicated, efficient, secure and automated. Network business applications will not be changing. The software and operating systems you are accustomed to will remain in place. The method of communications from one to computer to another; running in the background, will be the main changes. Some serious differences will be a new backup and disaster recovery plan. XYZ will now have a hot site facility. This means that in the event of a disaster, the location, back up programs, back up data, and logistical facilities will be ready for immediate use. Cabling Specifications In buildings that currently have a 100Base-T network; XYZ will save a considerable amount of money. This is due to the fact that the new Gigabit network will be able to utilize the existing Cat-5 cable. According to Hallberg (2005) â€Å"1000Base-T networks are notable in that they can run over existing Cat-5 cable but at ten times the speed of 100Base-T networks†. This savings will offset much of the upgrading to switches As opposed to hubs, as will be discussed in detail further in this proposal. Hallberg (2005) further adds that â€Å"running over Cat-5 cable is a significant advantage for lOOOBase-T, because around 75 percent of installed network cabling today is Cat-5, and rewiring an entire building for a new networking standard is an extremely expensive proposition†. 1000Base-T over Cat-5 has these characteristics according to Hallberg (2005): ? Require eight actual wires (four twisted pairs in a single sheath) ? Must use Cat-5 cable or better ? Are limited to a length of 100 meters (328 feet) for each node connection ? Are not limited in the number of nodes in a single logical segment ? Use RJ-45 connectors for all connections Local Area Network (LAN) Topologies A physical star topology will be used. This topology should make an efficient, yet affordable network. According to Hallberg (2005) A star topology is one in which a central unit, called a hub or concentrator, hosts a set of network cables that radiate out to each node on the network.. Each hub usually hosts about 24 nodes; although hubs exist that range in size from two nodes up to 96 nodes. Regardless of the hub size, you can connect multiple hubs together to grow the network in any way that makes sense. Below is an example of a basic physical star topology. [pic] It would be good to remember that â€Å"all the network traffic used on any of the network connections to the hub is echoed to all the other connected nodes on that part icular hub†. (Hallberg 2005) This means that the bandwidth vailable from the hub is the total â€Å"amount of bandwidth available to all nodes connected to the hub in aggregate†. (Hallberg 2005) This is important. Consider that one computer uses fifty megabits per second of a maximum one hundred megabits per second. All of the other computers are limited to the remaining fifty megabits per second shared equally; however, one connection could use up to fifty percent. In another scenario two computers connected to a hub try to send data at the same time. According to Dux Computer Digest (2009); â€Å"a collision is said to occur†. For this reason a pc connected by a hub must negotiate using Carrier Sense Multiple Access with Collision Detection (CSMA/CD) protocol. The Ethernet adapters in each pc have the ability to listen and to send, but they can not do both at the same time when connected to a hub. This is called half duplex. There is a better option for this network. This network will use gigabit switches. These switches will operate at 10/100/1000 megabits per second. The speed is a bonus, but the main improvement will be that each pc connected will operate at full duplex. There will be no need to listen for data collisions. This doubles the performance of the individual pc’s network ability. According to Dux Computer Digest (2009) â€Å"An Ethernet switch automatically divides the network into multiple segments, acts as a high-speed, selective bridge between the segments, and supports simultaneous connections of multiple pairs of computers which dont compete with other pairs of computers for network bandwidth. †Ã‚   This will greatly enhance network performance. The switch according to Dux Computer Digest (2009) â€Å"accomplishes this by maintaining a table of each destination address and its port. When the switch receives a packet, it reads the destination address from the header information in the packet. † A temporary direct point to point connection between both ports is made, the packet is sent, and the connection is terminated. The network can usually be updated simply by updating its switches and bridges firmware. This saves time and money as the network grows in its lifecycle. Though the physical topology is star, a logical Ring topology will be used as token passing will sometimes be necessary. The network will consist of 24-port bridges, servers, and workstations. The following diagram will help to explain how the different offices and areas of XYZ Corporation will interface with the resources of the Local Area Network, and by a proxy server connection the Intranet that will serve as XYZ Corporation’s Wide Area Network including internet access. [pic] The addressing and components of the LAN are as follows: †¢ The company will have a network ID 209. 168. 19. 0 and can occupy multiple floors. †¢ The subnet mask will be 225. 225. 225. 192 †¢ There will be a subnet for each floor. †¢ This will allow for future growth of up to 62 hosts per subnet (floor), 4 subnets (floors). One server will be a redundant mirror and will physically reside in another location. †¢ One subnet will have a proxy server with a firewall. All internet access will go through this proxy server. This Local Area Network will offer many benefits. What are these benefits? First, this plan builds an affordable network. The network is capable of me eting current needs and has room for future expansion and affordable updates. This LAN can use the existing CAT-5 Cabling. This network will facilitate one hundred users from multiple groups with custom accessibility at each location and can be further expanded. The LAN will be capable of covering multiple floors, offices and purposes. This LAN will have a higher startup cost than a LAN using hubs, but the enhanced capability and future ease of upgrading will offset the cost over the system’s lifetime. Furthermore, this LAN will use a proxy server for internet access. The switches selected have built in firewalls and may be used as bridges. There will be a main file server and redundant mirror in a remote location. The LAN will have a hot site (a complete backup, physical and digital) in addition to the mirror location. The proxy server will, as previously mentioned, provide connectivity between physical locations by forming a WAN or Wide Area Network. This shall be in the form of an Intranet. The logical topology of the Intranet shall be ring topology. This is not to be confused with the physical topology. This logical topology will allow tokens to be passed throughout the network as needed by administrators. Most offices where users have limited access will have switches that connect directly to file servers and proxy servers. Offices of senior management, executives and administrators will have switches that connect to the file server, the proxy server and may communicate directly with any switches connecting other users in these groups. The file server will be connected to a server that will serve as a local redundant mirror. Further, the proxy server shall connect to another redundant mirror at a remote hot site location. In the event of any disaster, this remote hot site will be ready to continue business as usual. The Logical Layout of the LAN; visually, is as follows (locations may tailor the scope and size); [pic] The networks will need several protocols. Protocols are software that forms the rules that network communications use to negotiate and communicate. The following protocols will be necessary: ? As all locations will use Windows XP, TCP/IP will be the only network protocol necessary. If the existing network uses IPX/SPX printer sharing or file sharing these will be deleted and updated with TCP/IP Wide Area Network (WAN) Design XYZ Corporation has many offices in as many locations around the world. What XYZ needs is an efficient, cost-effective, way to exchange data between all of these offices. What ABC Computing recommends to XYZ is an intranet. According to 2005 Hewlett-Packard Development Company, L. P. (2005) this will be a Wide Area Network and will â€Å"enable customers at different locations to view information and to upload and download information†. The purpose of this paper is to lay out the basic requirements for the â€Å"transmission of data and site to site communication†. (Hewlett-Packard Development Company, L. P. 2005) This paper will also cover the WAN layers as well as the physical and data link layers. This paper will deal with Internet connectivity, bandwidth requirements and necessary equipment and configuration. This paper will make recommendations the â€Å"two major domains of wide area network design; Designing the Physical and Data Link Layers, Designing the Network Layer and Internet†. (Hewlett-Packard Development Company, L. P. 2005) What is a WAN According to (Hewlett-Packard Development Company, L. P. 2005) In the most general sense, a Wide Area Network (WAN) is a geographically dispersed telecommunications network. For the purposes of this paper a WAN is generally defined as a network created to connect two or more Local Area Networks (LANs). WAN discussion could include the interconnection between arriers, but this is beyond the scope of this paper. Below is an example of a basic Wide area network. [pic] LANs can be connected to a WAN whether the LANS are in the same city or elsewhere in the world. Public carrier networks are used frequently to create WAN connections between LANs if these LANS are located in different parts of the world. â€Å"In most regions it is the Public Telephone and Telegraph (PTT) companies, which serve Mexico, Europe, Asia, South America, and other parts of the world†. (Hewlett-Packard Development Company, L. P. 005) Since XYZ has one office in Mexico there will be one connection made from that location via TeleMex, a Mexican PTT. XYZ’s Mexican Bandwidth Requirements The Bandwidth required for this connection will need to be a T1. This location is a LAN with one Network Server and 4 nodes. The location is used simply to interface with local manufacturers for parts. This Mexico LAN will to XYZ’s main office in New York. New York Administrators will have remote access to all functions of the Mexico Server and nodes. XYZ’s New York Bandwidth Requirements The New York office will need a T3 connection (45 MBPS). This is based upon the fact that the New York LAN has 48 nodes accessing the proxy server to gain access to the Internet and the corporate intranet. There are 96 nodes accessing the file server locally, but only 48 nodes have permission to access the Internet or the intranet beyond the proxy server. It has been determined that no more than 32 modes will use access simultaneously and these need no more than one MBPS to function efficiently. This leaves 16 MBPS to send real time information to the redundant backup server at the remote location. This will be more than adequate bandwidth. To achieve this bandwidth it will be necessary to lease the bandwidth from a local Telephone Carrier. It will be necessary to install a T3 (DS3) line card and T3 SMB cabling. At The New York site there will need to be a DNS Server, a Proxy Server, and a file server. The proxy server will give access to the Internet; and thereby the Intranet of xyz. The bandwidth will be distributed locally through the LAN by using gigabit switches. The graphic below depicts how leased bandwidth like a T3 is accomplished in the United States. [pic] Hot site requirements XYZ will lease a hot site in Atlanta Georgia. This site will have duplicate equipment and connections necessary to operate in the event of an emergency. This site will need a T3 available in the event of an emergency. This site will not need to be activated except in the event of a natural disaster or terrorist attack, leaving the New York site compromised. Connections There are four types of circuits used in creating WAN connections when considering both the physical and data link layers: Below is an illustration of the four types of connections used in WANs [pic] XYZ will need Dedicated Physical Circuits. According to Hewlett-Packard Development Company, L. P. (2005) â€Å"Dedicated circuits are permanent circuits dedicated to a single subscriber. The connection is always active†. This will be necessary as the logical topology of the intranet will be ring. Hewlett-Packard Development Company, L. P. (2005) further states concerning dedicated physical circuits that the subscriber purchases dedicated time slots, or channels, that provide a specific amount of bandwidth that is always available for the subscriber to use. The channels in a dedicated circuit are created using time division multiplexing (TDM). In addition to providing guaranteed bandwidth at all times, dedicated circuits provide the most secure and reliable WAN connections available. Virtual Private Network The Intranet developed for XYZ will be set up as a virtual private network or VPN. XYZ has spread beyond physical boundaries. This VPN network solution will be implemented to deal with these needs. IN this wide area network this VPN will be called a VLAN. According to Regan (2004) â€Å"A VLAN is a collection of nodes that are grouped together in a single broadcast domain that is based on something other than physical location†. This VLAN will be logically segmented, organized by functions, and applications. Although users may be in different locations they will communicate as if they were on the same wire. Physically, they will be on different LANS. It will be simple to add and subtract users from this VLAN because there will be no physical connections to setup or delete. The administrator can simply add or delete a user to any location from his location. The network will be segmented into broadcast domains. This will conserve bandwidth. This intelligent switching will be more cost effective. Bandwidth will be manages efficiently. The XYZ VLAN can assign membership by port address. This type of network will be easy to implement and highly cost effective. According to Regan ((2004) â€Å"The ports of a switch can be assigned individually, in groups, in rows, or even across two or more switches, if the switches are properly connected through a trunking protocol. † DHCP will assign IP addresses to XYZ’s network hosts. XYZ will use layer 2 switching because layer 3 does not always support layer 2 bridging. XYZ will use the VLAN Trunking Protocol (VTP) and VTP Domains. VTP, according to Regan (2004) â€Å"is a layer 2 messaging protocol that maintains VLAN configuration consistency throughout a common administration domain†. Administrators can manage user name changes over multiple switches by VTP. Ths will help to keep the naming area clean and clear. VTP protocol will help conserve bandwidth further by pruning. â€Å"VTP pruning only sends broadcasts to trunk links that truly must have the information. † Regan (2004) Having a wide area network will allow all of the locations of XYZ to function as one entity. Latency aside, this will be in real time. Bandwidth is expensive, and our position is that this Network Layout will maximize the usefulness while minimizing the expense of a wide area network. The virtual private network will allow for maximum security while still using internet protocols to run an Intranet. This will be a cost effective way for XYZ to approach networking, both now and will allow for unlimited future growth. Network Protocols Since all operating systems will be Microsoft XP Professional and XYZ Corporation will be operating on a VPN the only Network protocols necessary will be TCP and IP. These protocols operate on the Network and Transport layers of OSI model. Transport The Transport and Network layers main concern is with protocols for delivery and routing of packets. These are generally implemented in software. According to Techexams. net (2009) The Transport layer converts the data received from the upper layers into segments and prepares them for transport. The Transport layer is responsible for end-to-end delivery of entire messages. It allows data to be transferred reliably and a uses sequencing to guarantee that data will be delivered in the same order that it was sent†¦. Examples of protocols that operate on this layer are TCP, UDP, NETBEUI, and SPX. Network The Network layer breaks down segments of data into packets and determines the path or routing as well as delivery of packets across internetworks. Network addressing happens at this level. This is called logical addressing or level 3 addressing. IP addressing is an example of this. Other protocols are IP, IPX, ICMP, RIP, OSPF, and BGP. Devices that operate on this level are routers and switches. It is on this level that most packet filtering and physical firewalls operate. Network Remote Access Making the Choice What the difference between virtual private network (VPN) remote access and dial-up. Both can â€Å"provide network access to remote clients†. (Microsoft Corporation 2009) Both methods provide remote access and both have unique advantages and disadvantages. The choice must be made by weighing the businesses needs individually. XYZ will use a VPN as the primary, remote access network solution. Dial up networking will be available to the I. T. staff. According to Microsoft Corporation (2009) â€Å"A dial-up networking solution provides a secure data path over a circuit-switched connection, and it provides the convenience of direct dial-up connectivity to your network for mobile users†. This connection is terminated when the session is complete. â€Å"Microsoft Corporation (2009 further states that â€Å"In contrast, a VPN solution, by using the Internet as a connection medium, saves the cost of long-distance phone service and hardware costs†. A VPN uses the same protocols as the Internet and uses the backbones of the Internet for its infrastructure. â€Å"VPNS use a variety of security technologies, including tunneling, encryption, and authentication†. (Microsoft Corporation 2009) Using Dial-up Networking If dial up networking is used, a remote user calls a remote access server on the network. These dial up lines are a more private solution than a VPN, but the initial investment and continuing expenses are greater. These greater costs are as follows: †¢ Hardware purchase and installation. †¢ Monthly phone costs. †¢ Ongoing support. The following graphic represents a typical dial up remote access design [pic] Remote Access using a VPN A VPN network access solution allows users to connect to network over the Internet. These VPNS according to (Microsoft Corporation 2009) â€Å"use a combination of tunneling, authentication, and encryption technologies to create secure connections†. Microsoft Corporation (2009) further adds that â€Å"To ensure the highest level of security for a VPN deployment, use Layer Two Tunneling Protocol with Internet Protocol security (L2TP/IPSec)†. When organizations have extensive remote access requirements; they generally implement a VPN solution. A VPN will expenses by using existing Internet infrastructures. A VPN offers these two primary benefits: †¢ Reduced costs. †¢ Sufficient security. Figure  8. 4 shows an example of a simple VPN remote access networking design. The following is a generalized VPN Remote Access Design [pic] Flag as ContentBug pic] Many businesses find both beneficial and incorporate both access types within their structure. Both will allow a business or organization to operate in many geographic areas but function as one entity. XYZ Corporation will choose VPN due to the financial gains and the increased performance. Performance will be improved by reducing latency. Latency is caused by router s delay time. The VPN will operate over a VLAN. Network Business Applications All networking will be handled by Windows networking. We will use Cisco Switches and in those instances we will use their proprietary software. All data, graphic, and design programs will remain unchanged. Backup and Disaster Recovery What is the purpose of a Disaster Recovery Plan (DRP)? According to Axia College Week one reading Intro to IT Security (2007), â€Å"The disaster recovery plan (DRP) describes the exact steps and procedures†¦.. personnel, specifically the IT department, must follow in order to recover critical business systems in the event of a disaster†. Furthermore the main function of the â€Å"DRP is to identify the exact strategy for recovering those processes, specifically IT systems and services that are struck by a disaster. What are the key elements of a DRP? ? Shared site agreements allow companies with similar infrastructures and technology to share resources in the event of a disaster. ? Alternative sites are vendors that specifically offer back up functions in case of disasters. These alternative sites fall under the categories of hot site, cold site, or warm site. ? According to Axia College Week one reading Intro to IT Security (2007), â€Å"A hot-site facility assumes the entire burden of providing backup computing services for the customer. ? A cold site merely provides a location and utilities for a business to function in uring a disaster. This does not include an IT solution. ? A warm site is a compromise of the other two. There is a location, utilities and communications hookups. The business must bring work stations and do their own restoration from a back up. Five Methods of Testing a DRP? †¢ Walk-troughs: Members of the key business units meet to trace their steps through the plan, looking for omissions and inaccuracies. †¢ Simulations: During a practice session, critical personnel meet to perform a dry run of the emergency, mimicking the response to a true emergency as closely as possible. Checklists: A more passive type of testing, members of the key departments check off the tasks for which they are responsible and report on the accuracy of the checklist. This is typically a first step toward a more comprehensive test. †¢ Parallel testing: The backup processing occurs in parallel with production services that never stop. This is a familiar process for those who have installed complex computer systems that run in parallel with the existing production system until the new system proves to be stable. An example of this might be when a company installs a new payroll system: Until the new system is deemed ready for full cut-over, the two systems are operated in parallel. †¢ Full interruption: Also known as the true/false test, production systems are stopped as if a disaster had occurred to see how the backup services perform. They either work (true) or they fail (false) in which case the lesson learned can be as painful as a true disaster. Why does a DRP require testing? We must consider Murphy’s Law. Anything that can go wrong will. Unless the DRP is tested there are many things that can go wrong. Even with testing there may be glitches, but without testing there will certainly be failures. We must anticipate the things that can go wrong. The XYZ Plan XYZ will have a warm site setup. XYZ will conduct yearly walkthroughs of the DRP. They will have quarterly simulations to keep personnel vigilant. XYZ will conduct full interruption testing yearly and parallel testing quarterly. Business Continuity Plan 1. Identify the scope and boundaries of the business continuity plan while communicating the importance of such a plan throughout the organization. 2. Analysis of step 1 the BIA. The BIA measures the operating and financial loss to the organization resulting from a disruption to critical business functions. 3. Once the BIA is complete, those responsible for creating the plan must sell the concept of the BCP to key senior management and obtain organizational and financial commitment. 4. Once the BCP has gained the approval of upper management, each department will need to understand its role in the plan and support and help maintain it. This is an education step. 5. Now the BCP team must implement the plan. This includes the training, testing, and ongoing review and support of the BCP. BCP will utilize a hot site for emergency use. This site will have all data, buildings and equipment to continue operations. Physical Security Threats |Category |Specific Threat | |Weather | | | |Hurricane or tornado | |Fire/Chemical | | | |A train wreck carrying large amounts of chloride etc. |Earth Movement | | | |AN earth quake, mud slide or pyro-plastic flow | |Structural Failure | | | |A floor falling down on to another floor | |Energy | | | |A power outage or brown out | |Biological | | | |An outbreak of deadly avian flu, etc. | |Human |Cracking with malicious intent or a military coup | XYZ will use packet filtering routers and firewalls. According to Techexams. net (2009), These protect a network by only allowing approved packets to pass through the devices. The network administrator can limit the addresses that may communicate with the network. XYZ will keep all unused cables, access points, routers and similar devices in locked cabinets, preferably above the ceiling. All un used ports will be locked down. WIFI signal must not bleed out of the building. All laptops must have all data encrypted. These devices must have GPS location devices installed. They must be further configured with remote boot feature on. They further must be configured to give the Information Resources Manager remote access ability. These laptops must have Norton government wipe disk features installed so that in an emergency an administrator my remotely wipe the hard drive when it comes online. Sarbanes-Oxley (SOX) Act of 2002 There will be special access granted to executive level personnel. They will have access to all areas of the IT system that they have been trained to access. There will be a training schedule to allow these persons to learn and access any areas they need to as there knowledge grows. The Asset control manager will have access to logs and will be able to make periodic inspections to make certain that XYZ is in compliance with the Sarbanes-Oxley (SOX) Act of 2002. Section 404 of SOX requires that company executives and third-party auditors to certify the effectiveness of their technologies and processes in place to assure the integrity of financial reports. Complying with Section 404 means assuring that sensitive records are secure. The Statement on Auditing Standards (SAS) 70 is found useful in meeting these requirements. A SAS 70 is an auditing standard developed by the American Institute of Certified Public Accountants for service organizations. SAS 70 prescribes methods for an auditor to examine control activities. Management level security and executives will have access to all records that pertain to SOX at all times. U. S. government auditors and third party auditors are to have access as well. Data Backup and Disaster Recovery Planning XYZ will utilize a Vault Wise platform for a real time backup of information and systems. This platform was created to provide complete data protection and recovery solutions from application-aware backups(e. g. SQL server table-level, Exchange mailbox brick-level) to device block-level operations on in-service production hardware. This backup system will reside at a secondary location and receive real time mirroring information via the virtual private network. XYZ’S security, disaster recovery planning and implementation and data back up will be in good hands if this plan is diligently followed. As the business grows it will become necessary to review these procedures and policies to insure that XYZ remains resilient. XYZ Corporation will use the vendor Unitrend for Backup and Recovery. Unitrend is designed for small to medium businesses that â€Å"have the same critical reliance on the integrity of their data as enterprises, but often can’t afford the operational expenditure of a dedicated staff or the capital expenditure of replacing their IT infrastructure†. Unitrend (2009) Unitrends (2009) provides enterprise-level data protection, at the lowest total cost of ownership in the industry, through a family of scalable disk-based data protection appliances that integrate and protect existing heterogeneous computer and storage systems through a single, intuitive, graphical user interface. According to Unitrend 92009) this is what makes them stand out from the rest of the industry† †¢ Recovery-7 is Unitrends’ next-generation hardware platform, featuring our most powerful processors, 8GB of RAM, and advanced RAID architecture for maximum protection and flexibility. †¢ Up to 15TB of raw disk capacity; with standard in-line compression, this offers protection for as much as 30-60TB of user data. †¢ Effective cost-per-TB of as little as $500, significantly better than both other data backup appliances, and offerings from the best data deduplication vendors (Data Domain, FalconStor, Exagrid). Unitrends does not offer VMware and a SAN? The reason: †¢ There are almost always important servers â€Å"orphaned† from the SAN—systems running Novell or Solaris, for example—as well as desktop and laptop systems that need protection. These servers and user systems often contain critical data, and firms following best practices choose solutions that protect all the organization’s systems and data. †¢ Vmware and SAN do not protect against viruses. †¢ Unitrend does offer virus protection †¢ Unitrend offers backup and recovery for medium to small bus