ITM320: Information Technology Management
ITM320: Information Technology Management
Department of Computer Science and Information Systems
Course Outline Oct., 2016, online
Prof. Ron Gonzales, Ph.D.
It is important to have high quality information in Dutchs Deli database. The information must
be accurate, complete, consistent, timely, and unique. This is crucial when providing
ITM325 Weekly Assignments
Week1 Chapters 1 & 2:
Individual Assignment: Project Proposal (50 points each week)
Each student will propose a potential IT project that could be completed for a future BSITM
Capstone class. These projects must have an actual sp
Dutchs Deli has chosen to allow our employee, Nick Zele, to replace our current time and
attendance system by creating his own program. Our decision was based on keeping our work done inhouse. Nick has proven to be a reliable and dependable employee, who
Week 3 Homework
Describe how Quality of Service (QoS) is used to prioritize traffic.
Explain how the Simple Network Management Protocol (SNMP) can be used to
monitor network devices.
Explain the use
Are employees entitled to privacy in the workplace at least as far as their
activities relate to their personal lives?
Yes and No, This is a massive double edge sword that is hard to really put a
black and white policy on. If a employee is taking time at
Week 3 Assignment
1. You work as the desktop support technician at Acme.com. Pat is a member of the
manager group. There is a shared folder called MANAGEMENT on an NTFS partition on
a remote Windows 7 computer. Pat
Week Four Homework
1) The most surprising thing I learned in this chapter is that Frame Relay was
part of the PDSN Standards. I had also not heard of x.25 as a form of service,
as it was popular In the 70s and was slow and expensiv
Geolocation can be defined as the ability to identify the geographical
location of a person or device.
1. What devices, besides cell phones, track and record our
movements/locations as digital records? What are some of the ways
these devices are being use
Week 2 Homework
Discuss how to determine the length of a whip antenna required for
broadcasting at a given frequency.
Explain how transmit diversity can be used to improve upon antenna diversity.
Search for your name on the Internet using a search engine of your choice.
1. Did you find any accurate information about yourself? Did you find any erroneous
information that you may need to correct? If so, what steps will you have to take to
Week Three Homework
1) The most surprising thing I learned in this chapter is that Bluetooth 4.0 has
three different modes, I was not really aware of this other then the Low
2) The most difficult thing was the power leve
Week 4 Assignment
You insert a flash drive and discover that you cannot make use of all the memory
on the USB flash device when configuring ReadyBoost. What do you think the problem
is? What is the suggested sol
Week 1 Homework
Explain what a radio frequency identification (RFID) tag is, and
how it can be used to help automate warehouse activities.
A RFID is a small tag that emits a signal that is its unique
Chapter 8 Review
Ip address, Net Mask, Gateway, DNS
Manufacture, prior install, live cd, looking at it
You are given one in the acceptable range for the network connected to
Chapter 4 Review
1. A hyphen after the su command causes the command to run login scripts and places you in
the login directory for user whose rights you
Week One Homework
1) The most surprising thing I learned in this chapter is the NSFNET, I had never
heard of this prior to this.
2) The most difficult thing would have to be some of the terminology, while I
work in the industry I fe
Week Two Homework
1) The most surprising thing I learned in this chapter is would be the cost
difference between uses a true mesh network for leased lines and the cost of
a true hub and spoke. The programs I work for we do not think
Week 2 Assignment
Where do you configure an individual application to run as an administrator?
Program Compatibility Troubleshooter, right click on the executable
in question and select Troubleshoot Compatibilit
Week 4 Homework
List the three major components that TKIP uses to address security
vulnerabilities and elaborate on how each is used.
Describe how a Remote Authentication Dial In User Service (RADIUS)
1) I dont believe it is possible, every system will have a vulnerability at some
point and their will always be a user that compromises the security. The joke
we have at work is the only secure IT system is one that is offline and crushed
in a machine.
Week 1 Assignment
You are going to migrate files to a shared folder between two
Windows 7 computers. You want to determine the amount of space
needed to accomplish the migration. What should you do?
You should t
2. You have certain hardware or sftware that requires it.
3. X server is the program that communicates with the video card, sending the most
basic instructions on what images should appear on the screen.
5. TWM, FVWM,WM2, MWM
What would you look for in an ISP for a small business system?
Is there any reason to look at operating systems other than Windows?
Should a small business ever consider VoIP?
What considerations would you have in wiring a 10, 20, 50 station business for
CIO Project Status
Professional Presentation Keywords
10 PowerPoint Tips for Preparing a Professional Presentation. (n.d.).
Retrieved April 27, 2
The Oculus Rift Killer: Designed for Done Entirely Better
Running head: TH
Microsoft Office Upgrade
The Case to Upgrade Microsoft Office at Yellow Submarine
Yellow Submarine has continued exceptional growth that is showing the need to upgrade the
ITM200 Assignment Week 2
Page 1 of 2
Please do not repeat the question in your answer.
CHAPTER 8: PAGES 387 - 391
REVIEWING THE BASICS
A Hi-Speed USB port is 40 times faster than Original USB port running at 12 Mbps.