Preview

Nt1310 Unit 2 Journal

Satisfactory Essays
Open Document
Open Document
742 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 2 Journal
1. One word I encountered that I didn’t know (and what it means):
One term that I came across that I did not know was vetted. After researching the word I found that it meant, “investigate (someone) thoroughly, especially in order to ensure that they are suitable for a job requiring secrecy, loyalty, or trustworthiness” as defined by Dictionary.com. This gave me a better understanding of how Liberia decided that their commissioners appointed would be decided by a broad selection panel to ensure that the committee members agreed that the person was fit for the job.
2. Main argument of this article: The main argument of the article was to explain to the reader a how a truth commission was formed, and broke it down step-by-step explaining how it was started, and ending with outside factors that could be problematic during the trials. Hayner broke down how truth commissions were started, and went into detail also explaining the selection process for adding a person onto the committee. She followed up with explaining how long the truth commissions lasted for, and how these trials were funded. The article transitioned to the next phase of the truth commissions, which defined certain parameters such as what information would be recorded and how much evidence what needed for someone to be found guilty. The final portion of the article
…show more content…

It was interesting to think how dangerous having truth commissions were since the people being tried still had connections to their superiors. The article explained how in certain situations, the truth commotions were forced to be private, in order to keep those associated with the trial

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 8.1 Summary

    • 346 Words
    • 2 Pages

    The final device is an Arduino-based ball sorter that uses a two-stage approach to sorting the balls. The device starts by isolating a single ball and measuring its weight. Afterwards, the device categorizes the ball based on the measured weight and deposits it in the appropriate receptacle.…

    • 346 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 3 Summary

    • 734 Words
    • 3 Pages

    Although Zigbee implements a wide assortment of security measures, there are still a variety of vulnerabilities and attack methods that can be used. These attacks and how they can be carried out will be described in this Section.…

    • 734 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 5 Paper

    • 323 Words
    • 2 Pages

    The Media Access Control (MAC) is one of the sublayers contained in the Data Link Layer (DLL) of the Open Systems Interconnection (OSI) model. The MAC layer provides addressing and channel access control mechanisms, and works to transmit data from one Network Interface Card (NIC) to another across a connected network.…

    • 323 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 5 Activity 2

    • 2141 Words
    • 9 Pages

    In Unit 5 Activity 2 we were asked to predict and then find the brightness and flow rate of a closed circuit with a three cell battery pack, a long bulb, a capacitor parallel to the long bulb, and a round bulb. I originally predicted that the round bulb would be brighter when the circuit was first closed and when the circuit reached a steady state, and that the wire between the round bulb and the negative side of the battery would have a higher flow rate than the other wires. However, in the steady state the long bulb was actually brighter, and all the wires had the same flow rate. The new data allowed me to understand how different resistances in bulbs affects the brightness of bulbs in the circuit.…

    • 2141 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 6 Paper

    • 368 Words
    • 2 Pages

    The stakeholder involved in this decision is Anne Distagne, the CEO of Linkage Construction, Inc. She was the individual involved in the decision-making process. of falsifying information to not display the significant increase in profit.…

    • 368 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 9

    • 386 Words
    • 2 Pages

    Which part of the sine-wave expression cannot be varied in accordance with the low-frequency intelligence to create a modulated signal?…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 4 Paper

    • 567 Words
    • 3 Pages

    Emails provide stability to the organizations. Emails are the backbone that forms the base for the organization structure. Organization has different department for a different purpose. In order to communicate with the environment. Organizations use MS Outlook for maintaining a healthy communication environment in different departments. Every user mailbox data is stored in on exchange server in the form of edb files. In the presence of certain conditions EDB files of MS Outlook get corrupt and are not accessible.…

    • 567 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 6 Paper

    • 853 Words
    • 4 Pages

    and detailed work strategies, monitoring progress, and determining issues solutions. Finally, organizations should dedicate a team of security analysts directed by the expertise of a Chief information security office (CISO) that reports to the Chief information office (CIO) and provides detailed security information to management for assessment and further expansion opportunities to the security infrastructure. Thus, management and a team of dedicated security experts measure system goals, develop strategies towards a more secure organization environment that prevents risks of any magnitude by safeguarding every corner.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Unix processes are instances of an executed program. UNIX, being a multi task operating system handles thousands of processes at a time. We are able to check on what processes are currently running by typing ps at the UNIX prompt. Depending on the options used with the ps command, we can see different outcomes such as $ps -ef | more. This will list all the processes in the system. Some items you might see using the ps command are PID which is the process ID number, TT or TTY shows the controlling terminal for the process. If there is no controlling terminal then a question mark is used.…

    • 567 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 6 Paper

    • 712 Words
    • 3 Pages

    When looking at security of your network first you must determine what laws and regulations you must abide by. Being a police department do you have information stored in your database that would be considered ePHI from when a inmate was treated then you may fall under HIPAA. Do you take credit card for payment of violations? If so you may be required to protect data under SOX or PCI. You must know what data you have and how you must protect it. Are you required to report to the public or the court if your data is breeched? If so at what level or detail?…

    • 712 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 4 Mla

    • 544 Words
    • 3 Pages

    To get my calculations for the GPAs of the students in the MBA program at Whatsamattu U. I created the ranges from 2.5 -4.0. They were split into 6 different ranges. They were 2.5-2.75, 2.75-3.0, 3.0-3.25, 3.25-3.50, 3.50-3.75, 3.75-4.0. I then counted the frequency of each value. The text states that “the frequency column counts the total occurrences of each value”, Mirabella (2011). I found 0 students in the 2.5-2.75 gpa range, 20 in the 2.75-3.0 range, 47 in the 3.0-3.25 range, 44 in the 3.25-3.5 range, 55 in the 3.5-3.75 range, and 34 in the 3.75-4.0 range. The frequencies added together gave me the total of 200. I know this is correct because that is the same amount of students I have in the sample. I then took the individual frequencies and divided them by the total number of students. This gave me my relative frequency. The relative frequency is the percentage of the students who have the same range in their gpa. As stated before there are no students with a gpa in the range of 2.5-2.75, so the numbers for that range, across the board will be 0. The relative frequency for the gpa range of 2.75-3.0 is 10%, 23.5% for 3.0-3.25, 3.25-3.50…

    • 544 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Years ago, when Linux was new, installing and using the alternative OS was best left to propeller-head nerds with oodles of free time. Indeed, just getting Linux up and running on a machine required several hours, just the right mix of supported hardware, and then several more hours. If you were dealing with cutting-edge hardware, it would take a couple days of tinkering to achieve a working install with a graphical interface and a reliable Internet connection.…

    • 1540 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    My recent conflict was at work, I use an application that allows my clients to forward their web responses directly into our customer relationship management application, it parses information based on keywords. This is generally a simple tool that is usually set up on a one for one basis. One tool per company. However, a particularly large client has multiple web response addresses for different departments. The conflict began when my company changed the tool address on a few clients using a particular server, they informed the clients using this particular server, however because most of our clients just have one tool, this meant that the company with multiple tools only had one address updated. Which meant that for almost a month, one of…

    • 811 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 2 Section 2

    • 650 Words
    • 3 Pages

    Section 2(d) of the Copyright Act, 1957 defines the term “author” in the context of several copyrightable works. Section 2(d) (VI) states that in relation to any literary, dramatic, musical or artistic work which is computer-generated, the person who causes the work to be created shall be the author. The definition in itself doesn’t provide for the legal personality of the author. Imagine a situation wherein a painting app has been created by a robot? Who would be the author here? The person who has owns the robot or the one who programmed this robot or the user who generates something new through this application?…

    • 650 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 1 Journal

    • 333 Words
    • 2 Pages

    1) I see myself as a strong group member because I enjoy working with others and have no problem keeping the peace if needed but like to reach a conclusion that works for all with as little drama as possible. I’m not afraid to speak my mind but I bite my tongue and try not to offend. My behavior is usually to make sure everyone agrees on the task at hand and to be cooperative with all.…

    • 333 Words
    • 2 Pages
    Satisfactory Essays