Entries by admin

IP1 Research

PowerPoint presentation of 6–7 slides (100–150 words of speaker notes per slide)                                                                                                                                                                               Weekly tasks or assignments (Individual or Group Projects) will be due by Monday, and late submissions will be assigned a late penalty in accordance with the late penalty policy found in the syllabus. NOTE: All submission posting times are based on midnight Central […]






paper 6 7040

Network Management Paper: In this paper, you will research and report on network management tools associated with (1) policy compliance, (2) bandwidth management,and (3) asset management. Compare and contrast, at least, one tool for each of the three network management areas. What is the best tool for each area? Can one tool be used for managing more than one area? Why or why not? Support your information and make sure […]






Desktop and Network IT Operations 2

You are the new chief executive officer (CEO) of a rural health care clinic serving a population of approximately 500 residents. The clinic has not yielded a positive return in over 5 years and operates on a minimum budget. You need start digitizing and electronically store a plethora of medical records. Focus your discussion on […]






As the new manager of a convenience store, you have noticed issues with the manual method of tracking sales using paper sales tickets and spreadsheets, as well as, shortages on some of the more popular items carried in the store. Present your case for upg

As the new manager of a convenience store, you have noticed issues with the manual method of tracking sales using paper sales tickets and spreadsheets, as well as, shortages on some of the more popular items carried in the store. Present your case for upgrading to a database driven solution for tracking sales and inventory […]






Paper 5 7040

Network Security Paper: In this paper, you will define the security strategies of Defense in Depth and Layered Security along with comparing and contrasting the strategies by explaining, at least, two advantages and disadvantages of implementing each security strategy.  Support your information and make sure all information sources are appropriately cited. The paper must use APA […]