CompTIA Essays

  • The Importance Of Certification In The Information Technology Field

    847 Words  | 2 Pages

    The Information Technology field today is a fast-paced, and in-demand job field. Those men and women entering this job field are faced with a multitude of challenges and ever changing environments. These changes in the job fields are ever in demand because of the use of computers, electronics, and programming being utilized by businesses and people. In this paper, topics such as IT Certifications and why they are important will be covered and this will give you a better understanding of what you

  • Computer Systems Analyst Career

    838 Words  | 2 Pages

    Career planning is an important part of learning as it allows an individual to prepare for the possible future direction in the corporate world. As a result, learners should understand and prepare adequately for their future careers. There are various technological careers in relation to computer systems that appeal to my future. Most of these careers have emerged due to technological advancements that have introduced new demands for organizations. In this case, I am interested in a career in computer

  • Interview Summary Sample

    1132 Words  | 3 Pages

    His educational background consists of a Bachelor’s Degree in Psychology and several certifications such as CompTIA Network +, CompTIA Security +, and Certified Accreditation Professional (CAP). In addition, he is currently enrolled in the CompTIA Cyber Security Analyst (CSA+) certification course. According to Claburn (2016) in 2014 the SANS Institute released a report that suggest having IT certifications can increase income

  • Case Study Of Online Tutoring

    1312 Words  | 3 Pages

    Executive Summary Purpose To provide professional training courses and help individuals become experts in the field of business and technology. Range of unique courses to develop skilled professionals who could play a important role in the growing technology industry. The goal of online tutoring is to replicate these same onsite services in a digital environment, especially to students who may not otherwise be able to visit the tutoring center in person Thus, online tutoring will bean extension of

  • Pros And Cons Of Cyber Security Internships

    1198 Words  | 3 Pages

    Hello this is Cristian Munoz I 'm currently a freshman at El Paso community college. My major is computer science with a minor in cyber security. I 'm not your ordinary college student, I was a part time student at El Paso Community College and at University Texas at El Paso. Unfortunately, this semester I wasn 't able to enroll part time at both Universities due to high tuition rates, but that didn 't stop me from going to school. I 'm currently enrolled fifth-teen credited hours at El Paso Community

  • Egocentric Leader's Role In The Current Department Head

    633 Words  | 2 Pages

    Due to the lack of enthusiasm for the job the current Department Head has built a department where there is little trust and little work to excel. The current Department Head is an egocentric leader and believes he is the only one who is able to communicate with the chain of command or attend meetings on behalf of the department (Guttman, 2012). Filling two different, but very important roles, makes it difficult for him to be able to fulfill all the needs of the commands for all roles without delegating

  • Career Plan

    620 Words  | 2 Pages

    Ideal Career Overview My ideal career would allow me to do something that interests me. I enjoy working with words and with numbers. I've also had success in the areas of technology and customer service. I'm looking for a stable workplace environment. I would prefer to work for an established company – one with developed rules and procedures. I like having coworkers, someone with whom to brainstorm and to discuss successes and failures. In a team, I want someone else to be the bold innovator, the

  • Disadvantages and Advantages of Encryption

    647 Words  | 2 Pages

    keys easier and you don’t have to rely on third party. If you do not adapt any of his method you will be left out you will be left behind in this global environment. Works Cited Arthur Conklin, G. W. (2010). Principles of Computer Security: CompTia Security+ and Beyond. Burr Ridge, Illinois: McGraw-Hill. M.D., D. C. (2011, January 12). Advantages and Disadvantages of Symmetric and Asymmetric Key Encryption Methods. Retrieved from Yahoo Vocies: http://voices.yahoo.com/comparing-symmetric-asymmetric-key-encryption-6329400

  • Week 2 Assignment 1

    630 Words  | 2 Pages

    that a user has not overclocked their system. (n.d.). Retrieved March 21, 2014, from http://wiki.answers.com/Q/How_can_you_verify_that_a_user_has_not_overclocked_their_system?#slide=1 Muller, S., Prowse, D. L., & Soper, M. E. (2012, September 25). CompTIA A+ Cert Guide: Power Supplies and System Cooling | Foundation Topics | Pearson IT Certification. Retrieved March 20, 2014, from http://www.pearsonitcertification.com/articles/article.aspx?p=1945640

  • The Role of Security Policy

    916 Words  | 2 Pages

    organization are responsible for the important information. Role-back Access Control will allow the company and organization to keep track of the users. Works Cited Conklin, W.A., White, G., & Williams, D. (2012). Principles of Computer Security: CompTIA Security+™ and Beyond (Exam SY0-301) (3rd ed.). Retrieved from The University of Phoenix eBook Collection database. role-based access control (RBAC). (2012). Retrieved from http://searchsecurity.techtarget.com/definition/role-based-access-control-RBAC

  • Security Proposal Paper

    1123 Words  | 3 Pages

    Security Proposal Dustin Riedemann Kaplan University IT286: Introduction to Network Security Prof: Denver Lee Martin September 30, 2013 I. Authentication Authentication – the use of a system to allow user’s access to a computer or network based on three factors: something you know, something you have and something you are. Purpose: Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. This will allow you to only allow

  • TSA Activities Essay

    968 Words  | 2 Pages

    What TSA activities have you been involved in: Throughout my time in TSA, I have been involved in various activities. These include being a chapter delegate at the state and national conferences, achieving the Silver recognition award, earning my Lonestar and Texan awards at two leadership conferences, and lastly being inaugurated as chapter treasurer and regional secretary. Additionally, I have been a national finalist for Computer Numerical Control, along with having participated in various other

  • Overcoming My Circumstances with Perserverence

    862 Words  | 2 Pages

    network management. Later, I went back to school and earned a Master of Science degree in information science. After coming to America, I earned certifications as Microsoft Certified Professional, Microsoft Certified Systems Engineer and Network+ from CompTIA. In addition, I earned an MBA from Morgan State University in May 2013. Over the last 28 years, I have had work experience in numerous areas such as an accounting, information systems, database management, network administration, and financial management

  • IT Professionals: The Skills Framework for the Information Age

    1286 Words  | 3 Pages

    The Skills Framework for the Information Age (SFIA) has been established in July 2003. It is a system for IT Professionals so that they could use the advancement of the workforce according to the requirements of the business. It can also be defined logical 2-dimensional framework in which on one axis is the areas of work and on the other axis is levels of responsibility. It is considered as an effective resource which provides advantage to business by providing all facilities of the management in

  • Computer Support Specialist

    1069 Words  | 3 Pages

    Computer support specialist help people with trouble they are having such as software, hardware, and equipment trouble. There are many ways that they can assist people with their troubles they are having. Some computer support specialist offer services such as help desk service, in home service, and in store help. The computer support specialists are always needed. I am going to tell you about the computer support specialist career field. A computer support specialist has many responsibilities. A

  • Types of Network Attacks

    1187 Words  | 3 Pages

    in computers and computer networks, or the computers and networks itself. There are many types of network attacks, but only 3 common attacks that can be found in the book “Seven deadliest network attacks” by Borkin, Kraus, and Prowell (2010), and “CompTIA security+ all-in-one exam guide (Exam SY0-301) third edition” by (Conklin, White, Williams, Davis, & Cothren, 2011). The types of network attacks will be focus on are denial of service attack, war dialing attack, and man-in-the-middle attack (Refer

  • Trends in Nursing Informatics: Mobile Devices

    1182 Words  | 3 Pages

    Introduction For years healthcare delivery has been limited to health provider areas such as hospitals, doctors offices, clinics and other facilities offering care. The introduction of mobile technologies in the healthcare field has changed the way health care is practiced and plays a key role in its future. Concerns remain at the forefront of discussions regarding patient privacy and transmission of proprietary data. The introduction of the personal digital assistant and smart phone will revolutionize

  • What is Hardware?

    1315 Words  | 3 Pages

    Introduction I have already learned hardware since week 2, and already done all the tutorial question on time. I have study about it, and read many books, today I want to tell about hardware, hardware is most important devices of people ….since the computer was born…. What is hardware? Hardware is a ware which you can touch and you can see. They need a computer function. It a hardware can be related to input, output and storage. They also can be call as physical component, such external hard disk

  • The Pros And Cons Of Information Security

    1679 Words  | 4 Pages

    What is Information Security and why it is Important? Information security refers to “the process and methodologies that are designed and implemented to protect print, electronic, or any other form of confidential, private and sensitive information or data from unauthorized access, use, misuse, disclosure, destruction, modification, or disruption” (SANS Institute, n.d.). Information security programs are important in maintaining confidentiality, integrity, and availability (figure 1 page X). For

  • The History of Computers in Education

    1508 Words  | 4 Pages

    The history of computers in education starts with the MARK1 and ENIAC computers being used in 1944 and 1946 in Harvard and the University of Pennsylvania respectively. The first use of computers then in education was to compute problems in the mathematical, scientific, and engineering fields to allow students to deal with big problems they would more than likely encounter one day in a real world situation. In 1959, Donald Bitier began the “large-scale” PLATO project, which was a “several thousand-terminal