Sunteți pe pagina 1din 117

0900860057, 0900860073, 0900860081, 0900860103, 0900860154, 0900860170, 0900860197

0900860219, 0900860243, 0900860278, 0900860308, 0900860316, 0900860383

1
Addis Walcott

Title Page
Year: 2018
Subject: Electronic Document Preparation and Management
Candidate numbers:-
0900860057
0900860073
0900860081
0900860103
0900860154
0900860170
0900860197
0900860219
0900860243
0900860278
0900860308
0900860316
0900860383

Candidate Name:-
BOWEN, KEVIN CASCIUS
CLARKE, OSEI KWADO
CLARKE, SAMUEL
DOWDING, JOSHUA
GIBSON, TARIQUE
HARRY, JOEL ELIJAH
HAYLIGER, RAPHAEL GAVIN
HERMAN, CAREEM NICKOESI
JERVIS, JAMAL
MOORE, SHEMAR LAWRENCE
PRINCE, NAYSHUN
RIDLEY, ROYON ODEL
WALCOTT, ADDIS

Title of Project: Portfolio, Assignments #1,#2 & #3

Name of Teacher : Yvonne Moses


Addis Walcott

Mark Allocation
For
Portfolio
Allotted Marks Marks Gained
Accuracy And Speed
 One mark for each of the ten documents typed accurately 10 10
Knowledge and Comprehension
 Description of all the components 2 2
 Description of at least 50% of the components 1
 Title page 1 1
 Table of Contents 1 1
 Bibliography 1 1
Total 5
Presentation and Use of
Technology
 Two-page indented OR blocked style letter 1 1
 A circular letter OR form with a tear-off 1 1
 Manuscript 1 1
 Tabulation 1 1
 A notice with an agenda 1 1
 Chairman’s agenda or minutes of a meeting 1 1
 Invitation with a menu OR Programme 1 1
 Flow chart or Organisation Chart 1 1
 A lease or Hire Purchases or WILL with endorsement 1 1
 A Contract Of employment 1 1
Total 10
TOTAL MARKS 25 25
Addis Walcott
Addis Walcott

Addis Walcott

Table of Contents
Title…………………………………………………………………………………………………………………..……I

Introduction………………………………………………………………………………………………………....II

Acknowledgement……………………………………………………………………………………………..…III

Description of component………………………………………………………………………………..…..IV

Letter……………………………………………………………………………………………………………………1

Task Page …………………………………………………………………………………………………………….2

Two pages block style letter on continuation page …………………………………………………3

Task Page ………………………………………………………………………………………………………………5

Letter with cut off…………………………………………………………………………………………………..6


Addis Walcott

Task Page………………………………………………………………………………………………………………7

Report…………………………………………………………………………………………………………………..8

Example of report…………………………………………………………………………………………………..9

Task Page……………………………………………………………………………………………………………..26

A table with tabular work……………………………………………………………………………………...27

Committee Documents………………………………………………………………………………………….29

Task Page……………………………………………………………………………………………………………….30

Notice…………………………………………………………………………………………………………………….31

Task page………………………………………………………………………………………………………………32

Minutes………………………………………………………………………………………………………………….33

Display Work…………………………………………………………………………………………………………..34

Task Page………………………………………………………………………………………………………………..35

Organizational Chart………………………………………………………………………………………………..36

Task Page………………………………………………………………………………………………………………..37

Graduation Programme…………………………………………………………………………………………….38

Legal Work……………………………………………………………………………………………………………...39

Task page………………………………………………………………………………………………………………..41

Employment Contract……………………………………………………………………………………………...42

Last Will and testament……………………………………………………………………………………………48

Bibliography……………………………………………………………………………………………………………..53
Addis Walcott
0900860057, 0900860073, 0900860081, 0900860103, 0900860154, 0900860170, 0900860197
0900860219, 0900860243, 0900860278, 0900860308, 0900860316, 0900860383

Title page:
Basic Obligations

i
0900860057, 0900860073, 0900860081, 0900860103, 0900860154, 0900860170, 0900860197
0900860219, 0900860243, 0900860278, 0900860308, 0900860316, 0900860383

Introduction
In this book called Basic Obligations there is a guide on the basic obligations of
this business and a report which is Cyber Crimes there is also an Oraganizational
Chart of a business which show how an organization is structured. While reading
this book you will learn about different obligations in a business

The obligations in this business are basically clear of understanding, in this book
there is a committee document with a notice with agenda and then minutes of a
meeting. Next there is a graduation programme and in the graduation programme
there are different items done by persons . Then there is a Legal document with
an employment contract and then a Will and Testament in the will and testament
it show different decisions made by persons in a business before they die and to
show that agree with these decisions they sign different documents.

In reading this book you will soon be knowledgeable of some basic obligations of
this business and other businesses. This book is very good for persons who are
interested in learning about a business or an organization .

If any other information is needed please contact # 592-222-2353/64

Or email: walcottaddis@yahoo.com

ii
0900860057, 0900860073, 0900860081, 0900860103, 0900860154, 0900860170, 0900860197
0900860219, 0900860243, 0900860278, 0900860308, 0900860316, 0900860383

Acknowledgement
We would like to specially thank those person who would have helped in doing this School Based
Assignment. If it was not for those persons we would not have been guided in the right in doing this
School Based Assignment.

Firsty God who gave us the courage and understanding in doing this School Based Assignment and also
giving us knowledge on how to go about doing this School Based Assignment.

Secondly our parent who provided resources for doing this School Based Assignment.They also guided
us in doing this School Based Assignment during the weekend.

Lastly our teacher who guided us in every step of completing this School Based Assignment.She gave us
the instructions on how to go about doing this School Based Assignment and we did what we was told.

iii

iii
Addis Walcott

Description Of Content
Sba #1:This task was given to us on the 4th March, 2017 and the researcher was able to type a
letter on this day and hwe was given an assignment to research a news paper
editor,publication and address. After we did this we returned to our class room where we
retrieved our letter and we inserted these things to our compiled document . After which we
inserted a task page and a cover page and we closed off our letter and we inserted the
bibliorgraphy. We saved , print and email our letter to the teacher.

Sba#2:On the 24th April, 2017 the researchers retrieved the letter and we continued our sba
where we extracted a report on Cyber Crimes from a website and we placed it into our sba and
we placed the other bibliography into place and we completed the introduction,
acknowledgement and then we restructured the content page. After which we saved print and
emailed to the teacher.

Sba #3:On the 6th May, 2017 the researchers was given the tabular work to do ,where we
opened publisher and typed out information on table and we sreen shotted it and pasted it into
Microsoft Word and cropped it and on the 13th May,2017 we was able to complete our tabular
work in the compiled folder. we saved the sba and we printed and send it to the teacher.

Sba #4&5:On the 15th May,2017 the researchers was given a part of a notice to type and we
edited it the information and typed it in the compiled document and saved ,print and send to
the teacher.On the 20th May,2017 he was given the other parts of the report and we typed the
information given in compiled document and we saved, print and emailed it the teacher.

Sba#6:On the 22nd May,2017 the researchers was given a organization flow chart to create and
we drew shapes and extracted pictures from the internet and drew up the flow chart ,placed in
the bibliorgrphy and we saved ,print and sent to the teacher.

Sba#7:On the 29th May 2017, the researchers was given a graduation program to create on
publisher and we placed in necessary information and we saved, print and send to my teacher.

Sba#8:On the 10th June,2017 the researchers was given a employment contract to type and
have made changes to the contract by placing necessary information into it after which he
saved,emailed and send to the teacher.

Sba#9On the 17th June,2017 the researcher typed our Last Will and Testament . We received
instructions on how to go about doing it and we made edits to it , completed the task and save
and send to the teacher. After which the researcher created a book name and reorganized his
sba and completed , saved and emailed to teacher.

iv
Addis Walcott

Sba#10: On the 29th July, 2017 the researchers typed a letter with a tear off. We was given the
task and we made some changes to it . After which the researchers was given other instructions
and we carried out these tasks, saved, and send to the teacher via email.
Addis Walcott
Addis Walcott

Task Page
A letter on continuation sheet in block style
Addis Walcott

Walcott’s Restaurant
4 Benn Profit Drive, Plaisance Village, East Coast Demerara, Guyana.
Contact: (592) 222-2364/2353
Email:walcottaddis@yahoo.com,www.walcottsrestaurant.com
“Pleasing our customers is what we Do”

Friday, May 29, 2020

Adam Harris
Kaieteur News
24 Saffon Street,
Charlestown,
Georgetown,
Guyana.

Have you ever noticed the amount of tobacco advertising and paraphernalia at
your local convenience store? From posters plastered across the windows, to
clocks on the wall, to sidewalk displays that create a pedestrian obstacle course—
tobacco is everywhere. Not only is the advertising a mind-numbing eyesore, it is
also dangerous and distracting.

Trying to negotiate a busy sidewalk crowd with sandwich board advertising is


frustrating, but it becomes even more dangerous if you’re a parent with small
children and a stroller. Window advertising obstructs the view of law
enforcement and can be a deadly impediment when police respond to a robbery
in progress.

While many products are advertised in this manner, it is the cigarette makers who
most often choose this in-your-face method to sell their tobacco products. The
Master Settlement Agreement, reached in1998 with the tobacco giants, does not
go far enough in addressing this problem. [City/Country} should adopt local
zoning ordinances limiting the size and location of advertising for all products.
Suggested guidelines include prohibiting more than 10 percent of storefront
windows to covered by advertising of any kind and prohiting sandwich board
signs.
Addis Walcott

Page#2
Adam Harris
Friday, May 29, 2020

We must address the very problem of Big Tobacco trying to buy our communities
and hook another generation of smokers in the progress. We should contact the
elected officials of [City/Country] and encourage them to tackle this issue—to
limit the advertising that threatens the beauty and safety of our community.

Sincerely,
WALCOTT’S RESTAURANT

____________________
ADDIS WALCOTT
Chef
Addis Walcott

Task Page
Letter with a tear off.
Addis Walcott

Walcott’s Restaurant
4 Benn Profit Drive, Plaisance Village, East Coast Demerara, Guyana.
Contact: (592) 222-2364/2353
Email:walcottaddis@yahoo.com,www.walcottsrestaurant.com
“Pleasing our customers is what we Do”

Dear Valued Customers,

We are honoured to be chosen to introduce our restaurant’s latest line of services to your
home and community. Best Catering service you can find around town, Well tasted cuisines out
of many restaurants, Best structured recipes and also good customer service.

The latest comments on our cuisines shows that the food made at this restaurant is nothing
compared to other restaurants. Our aim at Walcott’s Restaurant is to provide good customer
service and to provide well tasted food to customers in oreder to get better feedback.As such,
we are inviting you to detach the self-addressed,Post –Paid Reply, tear off portion of this letter
and submit your comments about our different foods within 10 days. Please state the different
ways in which your family feel or think about our cuisines made at this restaurant.Responces
may be in form of an essay or recipe.

Our culinary committee is made up of a group of professionals from the Caribbean’s well
trained chefs, Chef Walcott, Chef James , Chef King, Chef Isaacs and Chef Frank. They will select
the six “best responses” for an award of a week free lunch at our restaurant. The customer who
gives the best response will win the super prize of $2000.

Yours truly

_______________
Addis Walcott
Manager

___________________________________________________________________________
Walcott’s Restaurant
5-6 Benn Profit Drive, Plaisance E.C.D
Mailing station

SOUTH OROPOUCHE
NAME: --------------------------------------------------------------------------- TELEPHONE: ------------------------

ADDRESS:
-------------------------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------
How I feel or think about Walcott’s Restaurant Cuisines and Services.
Addis Walcott
Addis Walcott

Task Page
An example of a report.
Addis Walcott
Addis Walcott

Cyber Crimes

Chunlian Qu
November 17, 2004

CS5780 – Systems Administration


University of Missouri at St. Louis
Addis Walcott

Contents

1 Type of Attack …………………………………………………………………… 8

2 Types of Offenders ………………………………………………………………… 9

3 Types of Cyber Crimes and Prevention ………………………………………….. 10


3.1 Breaches of Physical security …………………………………………………... 10
3.2 Breaches of Personnel Security ………………………………………………… 12
3.3 Breaches of Communications and Data Security ………………………………. 13
3.3.1 Data Attacks ………………………………………………………………… 13
3.3.2 Software Attacks ……………………………………………………………. 14
3.4 Breaches of Operations Security …………………………………………………17

4 Handling Computer Crime ………………………………………………………... 20


4.1 Steps Taken After Breach ………………………………………………………. 20
4.2 Methods of Investigations ……………………………………………………… 21
4.3 Recommendations Because of Laws …………………………………………... 21

5 References …………………………………………………………………………. 22
Addis Walcott

Cyber Crimes

Cyber crime, also called computer crime, is any illegal behavior directed by means of electronic
operations that targets the security of computer systems and the data processed. It involves a number
of issues ranging from the theft of information from a computer system or network, to the use of a
computer as a tool during committing a crime. As more companies connect their networks to the
Internet, awareness of computer crimes becomes very important.

1 Types of Attacks

In this age of automation and connectivity, almost all organizations are vulnerable to cyber crimes. Here
are the most common targets for cyber crimes:

Military and Intelligence Attacks


Espionage agents may target military and intelligence computers. National security increasingly depends
on computers. Computers store information ranging from the positioning of Air Force satellites to plans
for troop deployment throughout the world. Espionage agents have learned that they can get what they
want from computers.

Business Attacks
Businesses may be the target of their competitors. The worldwide economic competition is becoming
more and more fierce. Industrial espionages have become a growing threat because of the competition
among national economies. Even “friendly” nations in the past have become our economic enemies.

Financial Attacks
Professional criminals may target Banks and other financial organizations for financial gain. These days,
our money may seem to be nothing but bits in a computer, numbers on a screen, and ink on an
occasional bank statement. We tend to depend on more on computer to pay our bills and deposit our
checks electronically. Theft and fraud cases are also increasingly done electronically as well.

Terrorist Attacks
Terrorists may target any organization but especially government and utility company computers. Their
purposes could be to paralyze the government or cause disastrous accidents.
Addis Walcott

Grudge Attacks
Any company can be the target of its own employees or ex-employees. Similarly, universities may be the
target of their students and former students. Their goals are for revenge.

“Fun” Attacks
Any organization can be the target of crackers, sometimes they’re seeking for the intellectual challenge,
and sometimes they are professionals who may do it to ber hired.

2 Types of Offenders
Crackers
Cracker is a person who engages in computer and telecommunications intrusion. Crackers operate in
groups or in individuals. The motivation of a cracker is to access a system or data.

Criminals
There are three major types of criminal behavior: espionage, fraud and abuse. The common motivation
of a criminal is financial gain.

Vandals
Vandals can be roughly divided into two groups: users and strangers. Users are those who are
authorized to use the system they abuse, but they have extended their privileges. Strangers are those
who are not authorized to use the system in any way. A main motivation of vandal is to damage the
system or data files.
Addis Walcott

3 Types of Cyber Crimes and Prevention

Cyber crimes can be classified in many ways. You might divide them by who commits them and what
their motivation might be. Or, you might divide these crimes by how they are committed. Here, I have
chosen to divide computer attacks by the types of computer security that ought to prevent them.

There are four types of computer security:

1. Physical security is protection of the physical building, computer, related equipment, and media
(e.g., disks and tapes).
2. Personnel security includes preventing computer crimes. That is to protect computer equipment
and data from a variety of different types of people, including employees, vendors, contractors,
professional criminals and others.
3. Communications security is to protect software and data, especially when it passes from one
computer to another computer across a network connection.
4. Operations security is protection of the procedures used to prevent and detect security
breaches, and the development of methods of prevention and detection.

3.1 Breaches of physical security


Dumpster Diving
Dumpster diving is called trashing. It means searching for access codes or other sensitive information in
the trash. With the electronic version of dumpster diving, crackers may try to recover erased data from
tapes or disks.

Potential offenders are:

1. System users, anyone able to access the trash area.


2. Anyone who has access to computer areas or areas used to store backups.

Wiretapping
Wiretapping is Interception of communications signals with the intent to gain access to information
transmitted over communications circuits.

Telephone and network wiring is often not secured as it should be. Intruders can physically damage it
and can pick up the data flowing across the wires. Criminals sometimes use wiretapping methods to
eavesdrop on communications, especially in telephone fraud.
Addis Walcott

Potential offenders are:

1. Communications technicians and engineers.


2. Agents for competitors.
3. Communications employees, former employees, vendors, and contractors.
4. Agents for foreign intelligence services.

Eavesdropping on Emanations

Computer equipment emits electromagnetic impulses. Whenever you strike a computer key, an
electronic impulse is sent into the immediate area. Potential offenders may take advantage of these
electronic emanations by monitoring, intercepting, and decoding them.

Because of the emanation threat, government computers used to store and process classified
information require special physical shielding. It’s a major concern for military and intelligence data.

Potential offenders are the same as wiretappings.

Denial or Degradation of Service


Denial of service is called interdiction. It refers to any action or series of actions that prevent any part of
a system from functioning in accordance with its intended purpose. This includes any action that causes
unauthorized destruction, modification, or delay of service. Delay or partial denial is more often called
degradation of service.

One example may involve flooding a computer resource with more requests than it can handle. The
attack is initiated by sending excessive demands to the victim’s computers, exceeding the limit that the
victim’s servers can support and making the servers crash. This causes the resource (e.g. a web server)
to crash and cannot provide normal services for authorized users. Another example can be electronic
sabotage involving the actual destruction or disabling of equipment or data.

It’s very difficult to prevent such attacks.


Addis Walcott

Recommendation for the Prevention(physical security)

Physical security can prevent disaster, or at least to minimize the effects of them. Major concerns of
basic physical security:

1. Locks and keys. The first line of defense against intruders is to keep them out of your building or
computer room.
2. Natural disasters, such as fire, flood, lightning, and earthquakes.
3. Environmental threats, such as electricity and heating and air conditioning systems.

If you want examine and validate a physical security program, you can use some types of tests, such as
regular physical security inspections, random checks and penetration tests.

3.2 Breaches of Personnel Security


Masquerading
Masquerading is acting as an authorized user, usually trying to gain access to a system. It is similar to
spoofing, mimicking, and impersonation. Masquerading may be done in person or remotely.

There are two forms of masquerading: physical and electronic. In person, a criminal may use an
authorized user’s identity or access card to get into restricted areas where he can access to computers
and data. Electronically, an unauthorized person will use an authorized user’s logon ID, password
personal identification number, or telephone access code to gain access to a computer or to a particular
set of sensitive data files.

Social Engineering

Social engineering is to gain privileged information about a computer system by skillful lying, usually
over a telephone line.

Some crackers are very good at social engineering, and use it to discover telephone number, account
names, passwords, and other access information of the legitimate users. This is usually done by acting as
an authorized user or administrator, and asking for assistance.

Harassment
Harassment is using computer methods (e.g., email) to slander or bother someone. Sending threatening
email message and slandering people on bulletin board systems and newsgroups are common types.
Addis Walcott

Software Piracy
Software piracy is copying of software without authorization.

Potential offenders are:

1. Buyers and users of commercial software.


2. Software pirates.
3. Employees who steal proprietary software.

Recommendation for the Prevention(personnel security)

People are the biggest threat to computer. There are many types of people who imperil computers and
information, ex. employees, vendors, contractors, professional criminals. It is necessary to develop a
personnel security program according to different people/different threats. Important components of
personnel security are background checks and careful monitoring on the job.

3.3 Breaches of Communications and Data Security


3.3.1 Data Attacks
There are many types of attacks on the confidentiality, integrity, and availability of data. Confidentiality
keeps data secret from those not authorized to see it. Integrity keeps data safe from modification by
those not authorized to change it. Availability keeps data available for use.

Unauthorized Copying of Data


Piracy is an example of the unauthorized copying of data. Preventing and detecting this type of attack
requires coordinated policies among the different categories of computer security.

Traffic Analysis
Traffic analysis means collection and analysis of information. An eavesdropper can get desired
information by analysis of message characteristics (e.g., length, frequency, destination).

Sometimes, the attacks on data might not be so obvious. Even data that appears quite ordinary may be
valuable to a foreign or industrial spy. For example, travel itineraries for generals and other dignitaries
help terrorists plan attacks against their victims.
Addis Walcott

Covert Channels
Covert channels mean a communications channel that allows two cooperating processes to transfer
information in a manner that violates the system’s security policy.

A smart insider can hide stolen data in other innocent output. For example, a filename or contents of a
report could be changed slightly to include secret information that is obvious only to someone who is
looking for it.

3.3.2 Software Attacks


Trap Doors
Trap door is also called back door. It is a hidden software or hardware mechanism that can be triggered
to allow system protection mechanisms to be circumvented. It is one of classical software attacks.

Trap door is activated in some innocent-appearing manner (e.g., a special “random” key sequence or
transaction in an application at a terminal). Software developers often include trap doors in their code
to enable them to reenter the system and perform certain functions.

Session hijacking
Session hijacking is taking over an authorized user’s terminal session, either physically when the user
leaves his terminal unattended or electronically when the intruder carefully connects to a just-
disconnected communications line.

Session hijacking is a relatively new type of attack in the communications category.

Tunneling
Tunneling uses one data transfer method to carry data for another method. Tunneling is an often-
legitimate way to transfer data over incompatible networks, but it is illegitimate when it is used to carry
unauthorized data in legitimate data packets.
Addis Walcott

Timing Attacks
Timing attacks mean attacks that take advantage of the timing of computer processes and operations to
get access.

These include the abuse of race conditions and asynchronous attacks. In race conditions, there is a race
between two processes operating on a system; the outcome depends on who wins the race.
Asynchronous attacks are another way of taking advantage of dynamic system activity to get access.

Potential offenders are advanced system analysts, advanced computer programmers.

Trojan Horses
Trojan horses are a computer program with an apparently or actually useful function that contains
additional (hidden) functions that surreptitiously exploit the legitimate authorizations of the invoking
process to the detriment of security or integrity.

Trojan horses are a common technique for planting other problems in computers, including viruses,
worms, logic bombs and salami attacks.

Potential offenders are:

1. Programmers who have detailed knowledge of a program.


2. Employees of former employees.
3. Vendor or contractor programmers.
4. Financial system programmers.
5. Computer users.
6. Computer operators.
7. Crackers.
Addis Walcott

Viruses and Worms


A virus is a self-propagating program, which may be embedded in software or firmware. A virus spreads
when the program containing executes.

A worm is a standalone program that can propagate to other computers via networks. It exists
independently of any other programs. A worm simply replicates itself on one computer and tries to
infect other computers that may be attached to the same network.

There is an important distinction between worms and viruses: a worm operates over a network, but in
order to infect a machine, a virus must be physically copied. They have many similarities, and both can
be introduced into systems via Trojan horses.

Potential offenders are the same as Trojan horses’.

The best way to prevent viruses and worms from invading a system are:

1. Be vigilant about introducing new and untrusted software into a system.


2. Use virus-scanning software to check for viruses.
3. Do frequent and careful backups.

Salamis
Salami technique is the process of secretly and repetitively slicing away tiny amounts of money (like the
slices of a salami) in a way that is unlikely to be noticed.

It works on financial data, e.g., taking advantage of the rounding of decimals in bank interest
calculations.

Potential offenders are the same as Trojan horses’.


Addis Walcott

Logic Bombs
Logic bombs are a resident computer program that triggers an unauthorized act when a certain event
(e.g., a date) occurs.

A typical logic bomb tells the computer to execute a set of instructions at a certain date and time or
under certain specified conditions.

Potential offenders are the same as Trojan horses’.

Recommendation for the Prevention(communications security)

As more companies connect their networks to the Internet, communications security is particularly
important. There are many different ways to protect communications:

1. Access control, e.g., the use of good password. It is crucial to enforcing computer security in
networked environments.
2. Cryptographic methods, e.g., encryption of transmitted data.
3. Physical protection and shielding of network cabling.
4. Firewall technology. It can protect internal systems and networks from other networks.

3.4 Breaches of Operations Security


Data Diddling
Data diddling, also called false data entry, is to alter data in an unauthorized manner before, during, or
after input into a computer system.

Potential Offenders are:

1. Participants in transactions being entered or updated.


2. Suppliers of source data.
3. Somebody who prepares the data.
4. Nonparticipant with access.
Addis Walcott

IP Spoofing
IP spoofing is a method of masquerading in which an attacker forges the addresses on data packets sent
over the Internet so they appear to be coming from insider a network in which systems trust each.

How can an operations security program prevent IP spoofing attacks? Two good ways are to require
passwords in all cases and to prevent trust relationships.

Password Sniffing
Password sniffers mean sniffers are programs that monitor all traffic on a network, collecting a certain
number of bytes from the beginning of each session, usually the part where the password is typed
unencrypted on certain common Internet service such as FTP and Telnet.

One-time passwords and encrypted passwords are good ways to keep password sniffing attacks from
compromising systems.

Scanning
Scanning is running a program, often called a war dialer or a demon dialer, that ties a set of sequentially
changing numbers (e.g., telephone numbers or passwords) to determine which ones respond positively;
for example, with telephone number, the program would report those that successfully connect to
modems.

It is similar to war dialing a technique often used by novice crackers.

Potential offenders are:

1. Malicious intruders.
2. Spies attempting to access systems for targeted data.
3. Criminals intent on committing fraud.
Addis Walcott

Excess Privileges
Users in a system have excess privileges—more privileges than they ought to have.

In UNIX environments, intruders who manage to get “root” or “superuser” privileges can play havoc
with the system. In mainframe systems, abuse of privileges is sometimes called superzapping.

Potential offenders are:

1. Programmers with access to Superzap-type programs.


2. Computer operations staff.

Recommendation for the Prevention(operations security)

Operations security includes two major aspects of computer security:

1. Ways you can increase awareness among potential victims of possible computer crimes.
2. Ways you can keep computer criminals from actually committing a computer crime.

Operations security cannot exist in a vacuum. The only way it can be effective is if it is integrated into an
organization’s physical, personnel, and communications security programs. In fact, operations security is
used to help make those programs more productive.
Addis Walcott

4 Handling Computer Crime


4.1 Steps Taken After the Breach
The first step is to assess the situation. You need ask following question:

1. What is the severity level of the intrusion?


2. Who will be involved in the investigation?
3. Who is responsible for determining future actions?
The more such questions have been addressed in advance by the adoption of a written security policy,
the more quickly and accurately the effects of the breach can be ameliorated.

The second step is to repair damage and prevent recurrence. The organization may have to seek help
from outside expertise. In the past, following a serious breach, the government is one choice for an
organization when investigating computer crime. With the number of computer crimes growing each
year, the resources of most governmental agencies have been overburdened. They have insufficient
personnel resources to handle the load and inadequate technical expertise to thoroughly research the
cases. Private companies specializing in the field of network security now offer computer crime and
forensic evidence services. Such specialists must have the specific knowledge base to efficiently and
quickly complete investigations, with a background in recovery and analysis of computer forensics,
formal investigations, and the relevant laws.

Cyber crimes may be subject to the investigation of the NCCS (The FBI’s National Computer Crimes
Squad):

1. Intrusions of the Public Switched Network (the telephone company).


2. Major computer network intrusions.
3. Network integrity violations.
4. Privacy violations
5. Industrial espionage.
6. Pirated computer software.
7. Other crimes where the computer is a major factor in committing the criminal offense.
Addis Walcott

4.2 Methods of Investigations


Initial assessment includes a careful examination and inventory of all potentially affected systems. The
important first step is determining if a criminal still has control of any relevant computer. If they are still
logged on, an important decision is to decide whether to terminate the user. Leaving the intruder on the
system may provide a better opportunity of profiling and ultimately identifying and apprehending the
attacker. On the other hand, if investigator decides to lock the user out and disconnect the system from
network they can often limit the damage to what the malicious user has already accomplished.

As a general rule, an investigator should not let the attacker know that they are being disconnected or
tracked due to unauthorized access.

4.3 Recommendations Because of Laws


Cyber crimes can involve criminal activities that are traditional in nature, such as theft and fraud.
However, Cyber crime is different from the traditional crime. Business and governments need legal
protection and technical measures to protect themselves from those who would steal or destroy
valuable information. Self-protection is not sufficient to make cyberspace a safe place to conduct
business. The rule of law must be enforced.

At present, the state of global legal protection against cyber crime is weak. There are following
suggestions:

1. Firms should secure their networked information. Laws to enforce property rights work only
when property owners take reasonable steps to protect their property in the first place.
2. Government should assure that their laws apply to cyber crimes. National governments remain
the dominant authority for regulating criminal behavior in most places in the world.
3. Firms, governments, and civil society should work cooperatively to strengthen legal frameworks
for cyber security. To be prosecuted across a border, an act must be a crime in each jurisdiction.
Addis Walcott

5 References
David Icove, Karl Seger, & William Vonstorch. “Computer Crime: A Crimefighter’s Handbook”. O’Reilly &
Associates. 1995.

Computer Crime and Intellectual Property Section (CCIPS) of the Criminal Division of the U.S.
Department of Justice Web Page,

http://www.cybercrime.gov/

FBI web page

http://www.fbi.gov

AsianSchool of Cyber Laws Web Page,

http://www.asianlaws.org/cyberlaw/library/cc/what_cc.htm
Addis Walcott
Addis Walcott

Task Page
An example of ruled tabulation with main headings and multiple
columnar headings.
Addis Walcott
Addis Walcott
Addis Walcott

Task page
Notice with agenda
Addis Walcott

Walcott’s Restaurant
4 Benn Profit Drive, Plaisance Village, East Coast Demerara, Guyana.
Contact: (592) 222-2364/2353
Email:walcottaddis@yahoo.com,www.walcottsrestaurant.com
“Pleasing our customers is what we Do”

Friday, May 29, 2020

Notice
Notice is hearby given that the second meeting of the Board of Directors will be held at the registered
meeting office of the restaurant at 2:30 pm on Tuesday May30, 2017.
Simon Bolivar
Secretary

Agenda
1. Confirmation of the minutes of the last meeting.
2. Matters arising from the minutes.
3. Financial irregularities of company accountants.
4. Confirmation of the appointment of Auditor.
5. Date of next meeting.
Addis Walcott

Task Page
Minutes of meeting
Addis Walcott

Walcott’s Restaurant
4 Benn Profit Drive, Plaisance Village, East Coast Demerara, Guyana.
Contact: (592) 222-2364/2353
Email:walcottaddis@yahoo.com,www.walcottsrestaurant.com
“Pleasing our customers is what we Do”

Minutes

Of the first meeting of the Board of Director held on Tuesday May 30 th,2017 at
2:30 pm at the Registered office of the restaurant, Meeting Room at the
Restaurant-Top floor of the restaurant.

Present:

Mr. Derek Walcott

Mr. Samuel Forde

Mr. Tyler Perry (Directors)

Mr. Gerald Francis

Mr. John Gee

Mr. RajibHazra, Secretary

Mr. Khan, Solicitor


Addis Walcott

No. of Minutes Subject of Minutes Details of Meeting


1. Chairpersons of Meeting Mr. ShafiulAlam was
unanimously elected
Chairperson of the
Meeting.
2. Chairperson of the Rewsolved: That Mr.
Company ShifiulAlam be and he is
hereby appointed
Chairpeson of the Board
and of the Company
3. Quorum Resolved: That three
directors shall constitute
a quorum at the Board
Meeting.
4. Appointment of Secretary Resolved: That
MrHumayanKabir, be and
is hereby appointed
secretary of the Company
at a salary of Tk 25000
per month to be
terminable on three
month’s notice either
side.
5. Appointment of Bankers
6. Prospectus
7. Seal
8. Next meeting The next meeting of the
Board was fixed to be
held on Thursday 1st
April,2017 at 3:00 p.m
Date: 15.05.2017 Mr. ShufiulAlam Mr. RajibHazra,
Chairperson Seretar
Addis Walcott
Addis Walcott
Addis Walcott

Task Page
Organization Flow Chart
Addis Walcott

Walcott Restaurant
Organizational Chart

Addis Walcott

Executive President

Tyler Perry Samuel Forde


Jonh Gee
Genral Director of the General Director of
General Director of the Center Planning and Control
Center in Madrid

Perry Walcott
Rickey Gouviea George Wood Nicholas Roberts
Planning and
Technological Research Mobile services Multimedia Control
and Data Services
Francis Monize Frank Wilson
Becillo Center Sasha Bacchus Mabel Simmons Infastucture
Management
Walqa Center Landline Telephony
Joy Williams
Shawn Walcott
Ganada Center
Operations and
Business Support
Katelyn Bacchus
Audrey Becon
Services and Systems
Engineering 44
Innovation
Strategy
Addis Walcott

Task page
Program for Graduation

45
Addis Walcott

Back

46
Addis Walcott

Front

47
Addis Walcott

48
Addis Walcott

Task Page
Employment contract

49
Addis Walcott

Employment Contract

29th May,2017

Between

Walcott’s Restaurant

And

___________________________________________

Audrey Becon of12 Church Street,Georgetown,Guyana.

50
Addis Walcott

THIS AGREEMENT is between

(1) Walcott’s Restaurant whose Registered Office is at 4 Benn Profit Drive, Plaisance, East
Coast Demerara, Guayana (‘’the employer’’) and
(2) Audrey Becon of 12 Church Street, Georgetown, Guyana (‘’the employee’’)

IT IS AGREED that the Employer will employ the Employee and the Employee will work
for the Employer on the following terms and conditions:

1. Receptionist

The Employee’s position is that of Receptionist.

The Employee may forom time to time be required to carry out such other reasonable duties as
the Employer may decide, without additional remuneration, should this be necessary to meet
the needs of the business.______________________________________________________

2. Commencement and continuity of employment

The Employee’s employment with the Employer began on 17thJune,2017._______________

51
Addis Walcott

The Employee’s continuos employment, taking into account any service with Employer and with
any previous employer which counts, began on 19thJune,2017.______________________

3. Probationary period

The first Probationery period of employment will be a probationery, during which the
Employee’s performance will be monitored. The probationery period may be extended by the
Employer. During the probationery period this employment may be terminated by either party
giving one week’s notice to the other in writing.______________________________________

4. Payment
Payment is at the rate of £12 per week and is payable weekly in arrears by cheque on
Friday.________________________________________________________________
Hours in excess of 92 per week are classed as overtime. Over time must be authorized in
advance by Time Manager.____________________________________________________
5. Deductions from wages

The Employer shall be entitled to suspend the Employee’s employment without paqy in the
event of the Employment refusing to obey a lawful order including(but not restricted to) those
given to comply with the Employer’s statutory obligations.______________________________

6. Benefits

After the completion of 6 months continous employment, the Employee will be entitled to
Health Insurance, Relocation, Job Resources,Flex time and Vacation Time.__________________

7. Expenses

The Employer will reimburse all reasonable out-of-pocket exspenses incurred by the
Employee during the operation of his/her day to day, subjects to production, within one month
of written evidence of expenditure, where procurable._________________________________

8. Holidays
*If bank and public holidays are given in addition to annual holiday entitlement, include
following.
In addition to bank and public holidays, the Employee’s annual holiday entitlement is 2
days.
9. Absences due to sickness or injury
In the event of incapacity due to sickness of injury the Employee must advise Walq Center
Manager not later than 12:00 pm on the first day of absence. Full reasons must be given at
this time.___________________________________________________________________
If the Employee is absent for seven days or less, he/she shall immediately on returning to
work complete a self-certification form in respect of each day of absence._______________

52
Addis Walcott

10. Discipline procedure

If the Employee is dissatisfied with a disciplinary or dismissal decision, he/she should apply to
Ganda Center Manger in writing. For further details of the discipline and dismissal procedure
applicable to this employment, the Employee should refer to Reference Document. This
procedure is not contractual.___________________________________________

11. Termination of employment


During the Employee’s probationary period , this employment may be terminated by either
party giving one week’s to the other._____________________________________________

12. General

The Employer reserves the right to vary the terms of employment contained in this Agreement.

The Employer will notify the Employee in writing within one month of such variation. This
statement replaces all of the Employee’s previous terms and conditions of employment with
the Employer.__________________________________________________________________

SIGNED FOR THE EMPLOYER…………………………………………………………

Audrey Becon

Designation

Walcott’s restaurant

Date …………………………………

SIGNED BY EMPLOYEE ……………………………………………………………….

53
Addis Walcott

Audrey Becon

I.D # 6754389123

DATE …………………………………

Task Page

A will

54
Addis Walcott

LAST WILL AND TESTAMENT

OF

Addis Walcott

4 Benn Profit Drive, Plaisance, East Coast Demerara, Guyana.

I, Addis Walcott, a resident of the county of Region 4,State of Guyana, being of


sopund and disposing mind, memory and understanding, do hereby make, publish
and declare this to be my Last Will and Testament, hereby revoking all wills and
codicils at any time heretofore made by me. ____________________________

Article I.

For information purposes, at the time of this will, I am married to Audrey Becon ,
born 17th May 1993. ______________________________________________

Article II.

55
Addis Walcott

I appoint my wife, as Personal Representative of this Will, with full power and
authority to sell transfer and convey any and all property, real or personal, which I
may own at the time of my death, at such time and place and upon such terms and
conditions as my Personal Representative may determine, without necessity of
obtaining a court order. __________________________________________

In the event that Audrey Becon is unable or unwilling to be my Personal


Representative, I appoint Ronald Walcott. _____________________________

56
Addis Walcott

Article III.

I direct that all my legally enforceable debts, funeral expences, expences of my last
illness and administrative expences, be paid by my Personal Representative from
the assets of my estate as soon as practicable after my death._________________

I direct that no Personal Representative or Trustee nominated and appointed by me


shall be required to furnish any bond or other security for the faithful performance
of his or her duties, notwithstanding any provision of law to the
contrary.__________________________________________________________

I direct that all inheritance, transfer, succession and other death taxes which may
be payable with respect to any property includible as part of my gross estate, shall
be paid from my residuary estate, without any appointment thereof.
_________________________________________________________________

Article IV.

Specific gifts are as follows:

1. Condolence letters to Ronald Walcott


2. Memory pictures to Wife
3. Flowers to Peggy Walcott
4. Other jewellery to Wife.

Divide among children and grandchildren the following:

Offering form funeral service, Car (PKK 2567), Insurance(Hand in Hand Trust) ,
Pension, Clothing, Footwear, Eye wear, Other property(Lot 16 Church
Street,Georgetown, Guyana.).
____________________________________________

Article V.

57
Addis Walcott

All reside and reminder of my estate, of every nature and kind, which I may own at
the time of my death, real, person and mixed, tangible, of whatsoever nature and
wheresoever situated, I give, desire and bequeath in equal portions to my children,
proving they survive me.______________________________________________

My living children are:

1. Alex Walcott
All
2. Aliyah Walcott
Children
3. Viera Walcott
4. Audrey Walcott Must
5. Alexis Walcott Receive
6. Shaun Walcott
Property Of Me
7. Christopher Walcott

Article VI.
I wish to have funeral services in Assembly of God Church 14 Middle Walk
Buxton, East Coast Demerara, Guyana. I wish to have Reverend Winston
Beckles to hold my funeral. If he is not available, I wish to have Reverend
Debra Stewart to hold my funeral. The music to be played at the funeral will
be the following: When the roll of call is yonder, Fill me up& over flow, I
give my self away, It’s a beautiful day, You are my all in all, Nobody
Greater, You are God alone, Jesus at the Center of it all,Give me you, I need
you and What a mighty God we Serve.______________________________

I want to be buried in Casket with a bible inside.


Burial will be at Pleasant Anns Grove Burial Ground where the plot and
headstone have been previously purchased.

Article VII.

58
Addis Walcott

This is the place in my house where Social Security Card Driver’s License,
Bank Statements Credit Card bills, Credit Card, Discount Card
Passport, Visa and Bank Card can be found:
1. In my bedroom at the bottom of my big suit case.

These Agencies must be notified of my death:

1. Republic Bank
2. Scotia Bank
3. John Fenandes Limited
4. Bounty Supermarket
5. Giftland Mall

IN WITNESS WHEREOF, I have hereunto subscribed my name and


affixed my seal at the City of Goergetown, State of Guyana this 16th day of
September,2099,in the presence of the subscribing witness who I have
requested to become attesting witnesses hereto.

________________________
Addis Walcott
Testarix

This instrument was, on the date hereof, signed, published and declared by
Addis Walcott, to be his Last Will and Testament, our presence and in the
presence of each of us and we, at the same time, at his request, in his
presence of each other, have hereunto signed our names and addresses as
attesting witnesses.

1.Shaun Walcott of 4 Benn Profit Drive, Plaisance , East Coast Demerara,


Guyana.
2. Peggy Walcott of 123 Uivaugt,East Bank Demerara,Guyana.

59
Addis Walcott

We Kevin Mc Callister, John Gee and Addis Walcott, the Testarix, and the
witnesses, respectively, whose names are signed to the attached and
foregoing instrument, being first duly sworn, do hereby declare to the
indesigned officer that the Testarix signed the instrument as his Last Will
and Testament and that he signed voluntarily and that each of the witnesses,
in the presence of Testarix , at her request, and in the presence of each
other, signed the Will as a witness and that to the best of knowledge of each
witness the Testarix was at that time eighteen or more years of age, of sound
mind and under no constraint or undue influence.

_____________________________

Addis Walcott
Testarix

______________________________

Shaun Walcott
Witness

_______________________________

Peggy Walcott
Witness

The foregoing instrument was acknowledged by me this 18th day of September


2099, by: Addis Walcott who is personally known by me or who has produced his
signature as identification and who did not take an oath.

Notary to public
State of Guyana

My Comission Expires: 20th June, 3009.

Bibliography
www.tcsstore.org/stages/3_develop/t_letters_advertising.doc

60
Addis Walcott

http://www.cs.umsl.adu/~sanjiv/classes/cs5780/projects/cybercrimes.doc

http://classtalkers.com/sba-tips/edpm-sba-tips-sba-tips/tabulation-with-main-headings/

https://www.slideshare.net/syyam2/noticeagendaminut

http:/www.orgcharting.com/tag/organization-chart/

www.kansaslegalsservices.org/files/Simple%20Will.doc

61
Mark Allocation

By

Assignment and Profile

PROFILE MARKS
ASSIGNMENT ACCURACY KNOWLEDGE PRESENTATION

TOTAL
#1 & & &

SPEED COMPREHENSIO USE OF TECHNOLOGY


N
ALLOCATION OF

10

10 5 25

10 5 10 25

MARKS

GAINED
ACCURACY and SPEED
Allocation Marks
of Marks Gained
Appropriate Margins 1 1
Appropriate Layout 1 1
Alignment 1 1
Line Spacing 1 1
Capitalisation 1 1
Appropriate Font, Size, Style and Colour 1 1
Transposition 1 1
Correct Interpretation of Printer Correction Signs 1 1
Communication of Information in a Logical Manner 1 1
Using Appropriate Grammar
Omitted or Added Words 1 1
10
Total 10
1Page

Assignment #1

KNOWLEDGE and COMPREHENSION


1
Allocation Marks
of Marks Gained
2
Description of all the components 2

Description of at least 50% of the 1


components
1
Title Page 1
1
Table of Contents 1
1
Bibliography 1
5
Total 5

Assignment #1
2
Page

PRESENTATION

2
and
USE OF TECHNOLOGY
Allocation Marks
of Marks Gained
Eyes on the copy 2 2
Eyes on copy but with some inconsistencies 1
Eyes consistently off copy 0

Body Posture consistently incorrect 2 2


Body Posture in correct but with some inconsistencies 1
Body Posture incorrect 0

Arm and Hand positions are correct 2 2


Arm and hand positions are correct, with some inconsistencies 1
Incorrect Arm and Hand position 0

Consistently correct key-stroking 2 2


Key-stroking is correct with some inconsistencies 1
Incorrect key-stroking 0

Organised and efficient work habits 2 2


Organized but not efficient work habits 1
Disorganised work habits 0
3 Page

Total 10 10

3
Addis Walcott

Introduction……………………………………………………………………………………………………… i

Acknowledgement……………………………………………………………………………………………..ii

Title Page…………………………………………………………………………………………………………….iii

Description Of Component………………………………………………………………………………….iv

Correcting a Manuscript………………………………………………………………………………………1

Specimen page……………………………………………………………………………………………………..2

Corrected Manuscript…………………………………………………………………………………………..3

Conclusion……………………………………………………………………………………………………………v

Bibliography…………………………………………………………………………………………………………vi
Addis Walcott

This EDPM School Based Assessment assignment #1 is based on manuscript


writing. In this assignment the researcher will be typing a manuscript and a
corrected manuscript.

A manuscript is any document written by hand of typewritten. as opposed to


being mechanically printed or reproduced in some indirect or automated
way. More recently, it is understood to be an author's written, typed, or word-
processed copy of a work, as distinguished from the print of the same.
Manuscripts may be in book form, scrolls, or in codex form. Manuscripts are
mostly used in meetings.

iv
Addis Walcott

We would like to specially thank those person who would have helped in doing
this School Based Assignment. If it was not for those persons we would not have
been guided in the right in doing this School Based Assignment.

Firsty God who gave us the courage and understanding in doing this School Based
Assignment and also giving us knowledge on how to go about doing this School
Based Assignment.

Lastly my teacher who guided us in every step of completing this School Based
Assignment.She gave us instructions on how to go about doing this School Based
Assignment and we did what we was told.

ii

v
Addis Walcott

iii

6
Addis Walcott

1. The researcher was given a manuscript to correct at 1:00 pm at The Zara


Computer Police Training Centre on the 16th of September,2017. The time
allotted was 15 minutes but the researcher hadn’t enough time some we
went over the time by 5 minutes.

After which the researcher saved the document. Then we opened a new
document and started to type our table of content, the introduction, the
acknowledgement, the corrected manuscript, we placed the specimen page into
the document and did our bibliography our title page and our conclusion.

The reason for doing the task is to obtain 25 marks for our EDPM CSEC
examination in May-June 2018.

2. The researcher then placed the corrected manuscript into the document at
2:38 pm on the 16th September,2017.

iv

7
Addis Walcott

8
Addis Walcott

9
Addis Walcott

10
Addis Walcott

TELEPHONE LINES
Advantages of Digital phone lines
Telephone lines were designed to communicate the human voice. They transmit
data using sound waves or an analog data form. Before computer signals can be
transmitted via the telephone lines must be converted from the digital to an
analog format. This process is called modulation. When the signal reaches the
receiving computer it is converted back from the analog to the digital form. This is
called demodulation.

Recently some telephone companies have begun providing digital telephone


lines. It is not necessary to use a modern telephone when using a digital
telephone line such as an Integrated Services Digital Network line to connect a
computer. The signal is already digital one which the computer can process.

Two others are: a large volume of data is transmitted more quickly, and the
same line is used for voice, videos and data transmission.

This means an ISDN user can receive telephone calls, transmit faces and surf the
internet at the same TIME , USING THE SAME LINE.

11
Addis Walcott

The researcher is saying in our opinion a manuscript is the easiest way to write
notes in a meeting. The manuscript is used by many person in different meetings.

In doing this assignment the researcher think that doing the manuscript is easier
for many persons when writing notes in seminars and others.

12
Addis Walcott

* Jacob ,A. & Augustine, A. (2012). Electronic Document Preparation


Management for CSECR Nelson Thrones

vi

13
Addis Walcott

Mark Allocation

By

Assignment and Profile

PROFILE MARKS
ACCURACY KNOWLEDGE PRESENTATION

TOTAL
ASSIGNMENT & & &

#2 SPEED COMPREHENSIO USE OF TECHNOLOGY


N
ALLOCATION OF

10

10 5 25

10 5 10 25

MARKS

GAINED

14
Addis Walcott

ACCURACY and SPEED


Allocation Marks
of Marks Gained
Communication of information in a logical order 1 1
Grammar 1 1
Spelling 1 1
Punctuation 1 1
Capitalisation 1 1
Contextual Usage of Words 1 1
Correct Facts and Details 1 1
References 1 1
Omitted or added words 1 1
Hyphenations 1 1
10
Total 10

15
Addis Walcott

KNOWLEDGE and COMPREHENSION

Allocation Marks
of Marks Gained
2
Description of all the components 2

Description of at least 50% of the 1


components
1
Title Page 1
1
Table of Contents 1
1
Bibliography 1
5
Total

PRESENTATION
16
Addis Walcott

and
USE OF TECHNOLOGY
Allocation Marks
of Marks Gained
Open Web Browser 1 1
Open Page of a Known Address 1 1
Use Search Engine 1 1
Compose E-mail 1 1
Edit and Spell Check 1 1
Use Copy Features 1 1
Add Attachment to E-mail 1 1
Use Address Book 1 1
Send and Save Email 1 1
Print Email 1 1
10

17
Addis Walcott

Table Of Content

Introduction…………………………………………………………………………………….i

Acknowledgement……………………………………………………………………………..ii

Title: Internet And Email……………………………………………………………………iii

Description Of Content………………………………………………………………………..iv

Task Page……………………………………………………………………………………………1

Search Engine……………………………………………………………………………………2

Signing into Email……………………………………………………………………………….3

Compose Email…………………………………………………………………………………….4

Attach File…………………………………………………………………………………………..5

Sent Email……………………………………………………………………………………………6

Conclusion……………………………………………………………………………………………7

Bibliography……………………………………………………………………………………….8

18
Addis Walcott

Introduction

This assignment is based on the internet and email and the different
procedures that can be used with the internet and email such as:
Opening a search engine, attaching a file, sending emails, and signing
into email. When using the internet many things can be done.
The Internet is the global system of interconnected computer
networks that use the Internet protocol suite  to link devices
worldwide. It is a network of networks that consists of private, public,
academic, business, and government networks of local to global scope,
linked by a broad array of electronic, wireless, and optical networking
technologies. The Internet carries a vast range of information resources
and services, such as the inter-linked hypertext documents
and applications of the World Wide Web(WWW), electronic
mail, telephony, and file sharing while Email  is a method of exchanging
messages between people using electronics.

19
Addis Walcott

Acknowledgement
We would like to specially thank those person who would have helped in doing
this School Based Assignment. If it was not for those persons we would not have
been guided in the right in doing this School Based Assignment.

Firsty God who gave us the courage and understanding in doing this School Based
Assignment and also giving us knowledge on how to go about doing this School
Based Assignment.

Lastly my teacher who guided me in every step of completing this School Based
Assignment.She gave we instructions on how to go about doing this School Based
Assignment and we did what we was told.

ii

20
Addis Walcott

Title

 Internet And Email

iii

21
Addis Walcott

Description Of Content

1. On the 7th October,2017 at 1:21 pm the researcher was given the


task to open the a search engine and then screen shotted it and
after we open the email page and place in relevant information
and after which we screen shotted it and place both of them into
a document and after he signed into the email and compose an
email with information on a summer vacation package 2018 and
we enter four friends emails and our teacher and the we attach a
file known as the bibliography and us sent the information and
while it was being send we screen shotted when the email said
sent and we pasted it into the document.

The researcher then organize the document according to the


assignment requirements at 2:50pm.After which we completed
the steps and saved at 3:30pm.

22
Addis Walcott

iv

Task Page

You are expected to summarize information for your Summer Vacation


Packages 2018 and inform 5 persons via email. State all sources in an
appropriate bibliography.

23
Addis Walcott

Search Engine

2
24
Addis Walcott

Signing into email

25
Addis Walcott

Compose Email

26
Addis Walcott

Attach File

27
Addis Walcott

Sent Email

Conclusion

28
Addis Walcott

Some benefits of the internet: faster progress in getting information,


always available , easy to contact people and vast range of information.

The benefits of an email is less labour and fast communication.

All in all using the internet is a fast way to get in contact with persons.

Bibliography

29
Addis Walcott

Retrieved from The World Wide Web (www) on the 7 th October, 2017 1:21 pm form the following:

 https://www.orlandovacation.com/packages/seaworld-vacation-packages/

30
Addis Walcott

Mark Allocation

By

Assignment and Profile

PROFILE MARKS
ACCURACY KNOWLEDGE PRESENTATION

TOTAL
ASSIGNMENT & & &

#3 SPEED COMPREHENSIO USE OF TECHNOLOGY


N
ALLOCATION OF

10

10 5 25

10 5 10 25

MARKS

GAINED

31
Addis Walcott

ACCURACY and SPEED

Allocation Marks
of Marks Gained
Name of Event 1 1
Theme for Event 1 1
Aim of Event 1 1
Correct Headings for Pictures at Event 1 1
Facts and Details of Pictures 1 1
Correct Spelling Throughout 1 1
Correct Grammar Throughout 1 1
Correct Usage of Words 1 1
Communication of Event in a Logical Manner 1 1
References 1 1
10
Total 10

32
Addis Walcott

KNOWLEDGE and COMPREHENSION

Allocation Marks
of Marks Gained
2
Description of all the components 2

Description of at least 50% of the 1


components
1
Title Page 1
1
Table of Contents 1
1
Bibliography 1
5
Total

PRESENTATION
33
Addis Walcott

and
USE OF TECHNOLOGY
Allocation Marks
of Marks Gained
Create and Open Presentation 1 1
Use Template or Wizard to Create Presentation. 1 1
Adding of Slides 1 1
Inserting of Text and Text-boxes 1 1
Use of toolbar or Menu to Apply Formatting 1 1
Applying Backgrounds 1 1
Navigate Slides using Scrollbar ,Slide Sort , Menu and Key Command 1 1
Rearrange Order of Slides 1 1
Saving Presentation 1 1
Printing slides 1 1
10
Total

34
Addis Walcott

Introduction……………………………………….……….………………………………………………….i

Acknowledgement……………………………………………..………………………………………………ii

Description Of Content…………………………………….………………………………………………..iii

Title……………………………………………………………………………………………………………………1

Aim………………………………………………………..……………………………………………………………2

Theme…………………………………………………………………………………………………………………3

List Of Events/Activities………………………………………………………………………………………..4

Announcement……………………………………………………………………………………………………5

March Pass…………………………………………………………………………………………………………..6

100 metres Male and Female……………………………………………………………………………….7

200 meters Female open……………………………………………………………………………………..8

400 meters Male and Female……………………………………………………………………………….9

1200 meters male and female…………………………………………………………..……………….10

3000 meters male open……………………………………………………………………………………..11

1500 meters female open…………………………………………………………………………………12

Reference…………………………………………………………………………………………………………13

Conclusion…………………………………………………………………………………………………………iv

Bibliography……………………………………………………………………………………………………..v

35
Addis Walcott

This assignment is based on creating a power point presentation based on a sport


event. In this assignment you will be observing a number of activities that
occurred at The Guyana Education Trust College Sport Event which is displayed by
the use of pictures.

i
36
Addis Walcott

We would like to specially thank those person who would have helped in doing
this School Based Assignment. If it was not for those persons we would not have
been guided in the right in doing this School Based Assignment.

Firsty God who gave us the courage and understanding in doing this School Based
Assignment and also giving me knowledge on how to go about doing this School
Based Assignment.

Lastly my teacher who guided me in every step of completing this School Based
Assignment. She gave us instructions on how to go about doing this School Based
Assignment and we did what we was told.

ii

37
Addis Walcott

1. On the 22nd September, 2017 at 10:00 am the researcher was given the task
to take out pictures of the activities that occurred at The Guyana Education
Trust College Annual Inter House Sport Event and the researcher went
about doing his task and completed it at 4:00pm.
2. On the 25th September, 2017 the researcher then returned to the
classroom setting and he was given the task to create a power point
presentation with the pictures he took and he also was given the task to
create a word document with the Introduction, Acknowledgement,
Description Of Content, Conclusion and a Bibliography and then he saved
the documents.

iii

38
Addis Walcott

39
Addis Walcott

40
Addis Walcott

Slide 1

Inter-House Sports
2017
09:00 am
22 nd September,2017
Guyana National Service
(ground)

Slide 2
Theme
It s N o t H o w Bi g Yo u Ar e Bu t It s H o w
Bi g Yo u Pl a y It . St r i v e Fo r g r e a t n e ss.

Slide 3
A House

41
Addis Walcott

Slide 4
Aim
T h e r e se a r c h e r a i m i s t o f o c u s o n
t h e a t h l e t e s i n A H o u se a b i l i t y t o
c o m pet e w it h t h e o t h er a t h l et es.

Slide 5
Events
M a r c h Pa ss
Sp e e c h Ab o u t M a r c h Pa st
Ph y si c a l D isp l a y
10 0 m M a l e s/ Fe m a l e s (r a c e )
20 0 m M a l e s/Fe m a l e s (r a c e )
40 0 m M a l e s/Fe m a l e s (r a c e )
8 0 0 m M a l e s/ Fe m a l e s (r a c e )
150 0 m M a l e s/ Fe m a l e s (r a c e )
4x 10 0 m M a l e s/ Fe m a l e s (r a c e )
4x 40 0 M a l e s/Fe m a l e s (r a c e )
T u g o F W a r

Slide 6
Events
March Pass

Speech

Physical Display

Races

42
Addis Walcott

Slide 7
Athletes Ability
 Bo t h m a l e a n d f e m a l e a t h l e t e s h a d m o r e t h a n
o n e se ssio n s t o p r a c t ic e
 T h e a t h l e t e s h a d c o m p e t e d a g a i n st e a c h o t h e r
 Al l a t h l e t e s w e r e p l a c e d in su it a b l e r a c e
c a t e g o r i e s t o su i t t h e ir a b il it y
 T h e m a r c h pa ss se g m e n t t h e y w e r e t h r e e “3”
p r a c t ic e se ssio n s.
 T h e l a st m a r c h pa st p r a c t ic e se ssio n s, su it a b l e
m a r c h e r s w e r e c h o o se t o pa r t ic ipa t e
 T h e p h y sic a l d isp l a y a l so h a d t h r e e “3” p r a c t ic e
se ssio n s
 T h e l a st se ssio n se v e n “7” su i t a b l e d a n c e r s w e r e
c h o o se t o pa r t ic ipa t e

Slide 8
March Pass
 A H o u se m a r c h pa st w a s g r a d e d f o r “99” W h ic h
t h e t e a m b r o u g h t se c o n d 2 n d p l a c e .
 A h o u se m a r c h pa ss w a s c o n sist o f 21 m a r c h e r s
 T h e y w e r e d r e sse d n r e d a n d w h i t e .

Slide 9
Opening Speech
 T h e sp e e c h w a s g iv e n b y a g u e st
 H e st a t e d a v a r ie t y o f im p o r t a n t p o i n t s a b o u t
t h e m a r c h pa ss, p h y sic a l d isp l a y a n d t h e r a c e s.
 H e is a l so a m e m b e r o f Th e Gu y a n a Ed u c a t i o n
T r u st Co l l e g e Sc h o o l .

43
Addis Walcott

Slide 10
Physical Display
 T h e p h y sic a l d isp l a y se g m e n t w a s t h e se c o n d
a c t i v it y d u r i n g t h e sp o r t s
 It w a s m a d e u p o f b o t h m a l e a n f e m a l e
pa r t ic i pa n t s
 A m ix t u r e o f m u si c w a s p l a y e d t o d e m o n st r a t e
e x e r c ise a n p h y sic a l d isp l a y

10

Slide 11
Races
 T h e y w e r e b o t h m a l e a n f e m a l e r a c e s se pa r a t e
 T h e y w e r e a l so d if f e r e n t c a t e g o r i e s in r a c e a n
a g es
 Bo t h m a l e a n d f e m a l e s pa r t i c i pa t e d a c c o r d in g
t o t h e ir g r o u p i n g s
 A pa p e r f o r m a t w a s f o l l o w e d f o r e a c h r a c e

Males Females

11

Slide 12
The Guyana Education Trust
College 2017 Sports (Images)

12

44
Addis Walcott

Slide 13
Reference
T h e Gu y a n a Ed u c a t i o n T r u st Co l l e g e
10 8 Ca r m i c h a e l St r e e t
Cu m m i n g s Bu r g
22n d Se p t e m b e r , 20 17
Gu y a n a N a t io n a l se r v ic e (g r o u n d )

13

45
Addis Walcott

In this assignment a number of activities that occurred at The Guyana Education


Trust College Inter House Sport Event were displayed using a power point
presentation.

Some benefits of using Power Point are:

1. It gives a clear understanding.


2. It can be easily created.
3. It has better procedures for presentation making.

iv

46
Addis Walcott

* Jacob ,A. & Augustine, A. (2012). Electronic Document Preparation


Management for CSECR Nelson Thrones

47

S-ar putea să vă placă și