Preview

Is3350 Unit 2 Assignment

Powerful Essays
Open Document
Open Document
1380 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Is3350 Unit 2 Assignment
Introductions: All three of my subjects are females that I have known for at least 5 years. Two of the subjects (1 and 2) are mother and daughter. The mother and daughter were asked in a group setting with 11 questions I had a lot of questions because I wasn’t sure of what my younger subject would be able to answer. Everybody was asked the same questions. Since I knew my subjects I just called and seen whether they would be willing to answer some questions. They all agree so I did the mother and daughter on September 15 on a Tuesday, and my third subject was September 16 on a Wednesday. I drove to their house and I spent about 3 hours with subject 1 and 2, and I spent 2 hours with subject 3. Subject 1 and 2 was questioned in subject 1 bedroom …show more content…
In every question she always included her kids (who chronically aren’t children, but are adults, even those they aren’t mentally their age). This subject while answer the questions was also helping her daughter to understand the question being asked. The daughter would do something like throw a tantrum and the subject automatically would drop what she was doing to check on her daughter. It was interesting to see this play out. The mother knew that if she would check on her daughter, the daughter would stop throwing the tantrum. When ask what/where she seen herself in 10 years she responded “Hopefully still taking care of my girls,” she knows that when she leaves there will be nobody to help. Her biggest fear was that she would die and that her girls would be put in a home. Her biggest accomplishment was getting her older girl ready for a job. When ask why that was her biggest accomplishment she said that she wanted to make sure that they would know how to take care of each other. For the fact that every answer involved her daughters in some way. I am putting her in stage 7, middle adulthood with the crisis of generativity or stagnation. She is in the generativity part of the crisis, but I don’t think that she will be able to move on and be in the integrity part of stage 8 if the girls are still dependents of her. She could even go into despair if she knows that they aren’t self reliance. She will see it as if she

You May Also Find These Documents Helpful

  • Good Essays

    Ec1330 Unit 1 Assignment

    • 478 Words
    • 2 Pages

    After working on the EC130 Title Equipped Console, we went back to our second assignment: creating a new helicopter (H125) tailboom jig.…

    • 478 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Jennifer’s full time position as Sales would need Sales access for her primary position. She should only have By Position access to Accounts Payable when she is working that position. She would need Read Only for Shipping and Receiving in order provide customers with information on inventory availability. Neither of her positions should have required her to have full access to Shipping and Receiving.…

    • 252 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Global Limited is a global provider of infrastructure information systems, whose services cater to a wide range of industry sectors. One of Global Limited’s business objectives is information security for their clients. In order to provide their clients with information security, Global Limited has utilized a risk management approach to protect their client’s information.…

    • 515 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Is3350 Unit 4 Assignment

    • 414 Words
    • 2 Pages

    IT projects are very different from other projects (like construction projects) in almost every aspect from initiating to releasing the project. Because these projects are mostly very diverse in term of cost, size and complexity. They often include a team having members of diverse knowledge, background and skills and the technologies involved are also diverse. A lot of technical teams are involved in developing something that may look acceptable for outsiders.…

    • 414 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Given the speeds of today’s Ethernet and the progression of the speeds, 10 to 100Gigs over 8 years and 100Gig to 1Tb since, transmission rate will double again in about 8 years. Although this seems true, I read that Ethernet fabric will rival fiber optic transmission capabilities. We must keep in might that a network is only as fast as its slowest component. This means computers will have to continue to get faster at processing requests and switches and routers will have to analyze and forward data packets at a higher speed to keep up with the evolution of Ethernet.…

    • 304 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Cybercrime is on the rise. As companies try to protect their customers PII, criminals are trying to get it. Ponemon Institute did a survey of how the information was affecting larger companies (Institute, 2014). Unfortunately the hackers are using the information to ruin their credit. Russian hackers obtained 1.2 billion usernames and passwords (Institute, 2014).…

    • 276 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Security implementation responsibilities focus on implementing the access controls and account management processes outlined in this Plan. The following positions are responsible for security implementation:…

    • 1211 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    IS4560 Unit 3 Assign 1

    • 779 Words
    • 3 Pages

    systems from the network diagram. A security control is any mechanism that you put in…

    • 779 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    I'm one of the TAs for the online class CGS2531 this Fall Semester. I completed the required online training sessions: FERPA Basics and Preventing Harassment. Please find attached to this email the certificates of completion of the aforementioned courses. Let me know if there is any other information or training session needed.…

    • 52 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    The SEC decided to enforce this provision for the first time for the James Nordgaard. Because James decided against resigning, the company retaliated against him (Deakins, Campbell, & Ferrantella, 2014). The company took away his rights to trade and access to the company’s system. James couldn’t even get into his email. They moved him into a little room and eventually found a way to accuse him of violating the company’s confidentiality agreement. On August17, 2012, James resigned, and he sued the company for violating his…

    • 841 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Johnson Company provides networking components and services. Today we are using the yellow pages for advertising, which is still useful but outdated. In most businesses today use other methods such as In person by using sale representatives. Mostly all the businesses today use the internet to reach out to customers, either by having a website, social media, sending emails or even newsletters. There are some that use a totally different approach, some of which include video conferencing and text messages. Other companies even push it further by utilizing social media sources such as Facebook, twitter, LinkedIn, Instagram and so many more to promote their company.…

    • 811 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Devs010 Unit 3 Assignment

    • 261 Words
    • 2 Pages

    Lab practical will be used to carry out these tasks, students will be prompted to develop programs in JavaScript.…

    • 261 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Eg2401 Unit 1 Assignment

    • 4754 Words
    • 20 Pages

    billion personal computers in the world at present. In the United States alone, over 50% of…

    • 4754 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    IS3445 Project Part 4

    • 565 Words
    • 2 Pages

    The security of a web application should become top priority when it comes to ensuring the security of the information that the application contains. When we, as an organization, think of security, we should all think of ways that the attacker would attempt to breach the application in order to gain access to the network, or exploit the vulnerability to his or her own benefits. There are many weaknesses pertaining to web applications, and these weaknesses each have an attack associated with it, with the attacker having his or her own motivation for the attack. The attacker’s motivation deeply depends on the type of attack that has occurred at that time. Listed below is a list of the common weaknesses and attacks associated with e-commerce and social networking applications.…

    • 565 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Violating my copyright privileges is definitely not a good thing. I am all for sharing music. If music was not shared, some of the smaller acts would never be recognized. As for my scenario my employment and income is based off of music sales. In this case I am not okay with it.…

    • 250 Words
    • 1 Page
    Satisfactory Essays