Preview

Nt1310 Unit 2 Project

Better Essays
Open Document
Open Document
1504 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 2 Project
Module 2 Project Supervisors play an essential role in the planning process. Supervisors have to take the goals and objectives that the upper level manager’s hand down to them, and figure out what is needed to achieve those organizational goals. Once the supervisors know the goals of the company, they can make all their decisions and priorities reflect those goals. Since the supervisor is in charge of all the responsibilities, goals, and resources for their department, they need to ensure that those line up with the organizational objectives. Supervisory planning is also essential with projects. Even though it may seem as though taking the time out to plan will slow that project down, the efficiency goes up so much with planning that more …show more content…
First off there are the authoritarian and democratic leadership styles. With the authoritarian style, the leader has one hundred percent control, making decisions single-handedly, and giving orders, leaving no room for employee input. The democratic style takes a different view, with the supervisor letting employees have input and power in the decision making and problem solving for the department. Finally, with laissez-faire leadership, under which the supervisor lets the employees completely direct, and control themselves, with no leadership from the supervisor. With all these different styles of leadership, it is a common thought that the type of leadership depends on the circumstances. In Fiedler’s contingency model, Fred Fiedler says that a leader should determine whether their leadership style is going to work in a certain situation, and if it does not, they should try and change the situation to where their leadership style will be effective. In contrast, the Life cycle theory of leadership says that the leader should try to adapt their leadership style to the situation, instead of the other way around. Lastly, the Path-goal theory of leadership says that the leader should focus on promoting rewards, and the behavior that must happen to achieve those rewards. I have had supervisors from pretty much every one of these categories. The ones that were the hardest to work …show more content…
The ideal process through which a supervisor would make a decision would be with the rational model. With this, the supervisor identifies the problem, then the alternate solutions. Next they gather and organize facts, objectively evaluate the alternatives, choose and implement the best alternative, and get feedback and take corrective action. Because this is such a long and intensive process, it is not something that supervisors can, or are willing to, go through with. Other times, the supervisor may be simply lacking in ideas for alternatives. Sometimes simplicity is needed in the decision making process, though it may not always be the best solution. Bounded rationality is also used at times, which is a decision that meets the barest standards of what is acceptable. While this is sometimes useful, as with decisions of little importance where the time to come up with a better solution would cost more than a better solution would save, a better solution could possibly have been thought of had the extra time been taken. This is obviously not a good technique to use with high-importance decisions. Other decision making traps that leaders need to steer clear of are recency syndrome and stereotypes. When a supervisor tends to only remember and make decisions off of recent events, the decisions will not be as

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 8.1 Summary

    • 346 Words
    • 2 Pages

    The final device is an Arduino-based ball sorter that uses a two-stage approach to sorting the balls. The device starts by isolating a single ball and measuring its weight. Afterwards, the device categorizes the ball based on the measured weight and deposits it in the appropriate receptacle.…

    • 346 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Check the linearity of the Black Box by connecting the DC Power Supply to the input of the Black Box, and the Multimeter to the output of the Black Box, then change the input voltage regularly and notice the changing in the output voltage of the Black Box.…

    • 237 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT1330 Unit 2 homework

    • 364 Words
    • 2 Pages

    Check the workstations using ipconfig /all and find out if the ip range is within the address range you assigned, if it is a different address then the workstation failed to contact the DHCP server and has gone into apipa mode. The Network Interface Card might be assigned an incorrect driver. Another possible cause of the problem is that the patch cable is not plugged into the Network Interface Card, or is not connected to a switch on the other end. However, it could be that the server has run out of IP addresses that it can assign to clients. You can easily tell if this is the problem by comparing the size of the DHCP address scope to the number of devices on your network that request IP addresses from the DHCP server. But since only some of the workstations have got addresses the problem might be the DHCP server. Start off by doing some ping tests to verify that the DHCP server is able to communicate across the network. If the DHCP server is able to communicate with other computers on the network, then I recommend verifying that the DHCP server has an IP address that is compatible with the scope that the server is configured to assign addresses from. The server itself has to be assigned a static address in the same subnet range, such as 192.168.0.199. If this still doesn’t solve the problem make sure that the DHCP server is still authorized by the Active Directory to lease IP addresses. You should also check to verify that the scope is active, and that the necessary services are running on the DHCP server.…

    • 364 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 2 Case Study

    • 257 Words
    • 2 Pages

    1. The first standard was created in 1997 by the Institutue of Electrical and Electronics Engineers (IEEE). They called it 802.11 which only supported a maximum network bandwidth of 2 Mbps- too slow for most applications.…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 4 Case Study

    • 317 Words
    • 2 Pages

    I have attached question number 11 for everyone to review. This step is not completely done because we are missing expenses and revenues for 2017. The reason I am sending it out to you guys is so that you can see what I have done so far. This information may be particularly relevant to Jon. In the excel document, there are two tabs so far: the original budget, and expense scenario 1. The first tab is all the calculations I have done to get to tab 2. Also, In tab 1 I have made the following assumptions.…

    • 317 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    64. Yes p, because the elements are the same and they have the same number of…

    • 373 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 5 Activity 2

    • 2141 Words
    • 9 Pages

    In Unit 5 Activity 2 we were asked to predict and then find the brightness and flow rate of a closed circuit with a three cell battery pack, a long bulb, a capacitor parallel to the long bulb, and a round bulb. I originally predicted that the round bulb would be brighter when the circuit was first closed and when the circuit reached a steady state, and that the wire between the round bulb and the negative side of the battery would have a higher flow rate than the other wires. However, in the steady state the long bulb was actually brighter, and all the wires had the same flow rate. The new data allowed me to understand how different resistances in bulbs affects the brightness of bulbs in the circuit.…

    • 2141 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    The project contains two parts, photogrammetric survey, and GIS analysis. The photogrammetric survey part was done by Agisoft photoscan software. This kind of survey is desired in many fields, such as Archeology field. This is because of the tendency of collapsing in Archeology’s targets. On the other hand, ArcMap and ArcScene are responsible for the data analysis part. With GIS, the complexity of the 3D data can be simplified, the data can be interpreted, and new data can be generated. Plus, we can comfortably work on improving our model by digitizing, coloring, outlining, and updating data even after we finish the project.…

    • 909 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 9

    • 386 Words
    • 2 Pages

    Which part of the sine-wave expression cannot be varied in accordance with the low-frequency intelligence to create a modulated signal?…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 2 Case Study

    • 824 Words
    • 4 Pages

    I don’t believe that the State of the USA designed to replace GDP as the primary measure of economic performance. I simply believe that the United States would like to see more indicators as to how our economy is doing and what we can do to help boost the economy. While taking in other information on what’s going on with the country. First standing us as a nonprofit agency I 2007 and would later gather more notice in 2010 with a health care bill that required Congress to help finance and raw data from education energy, economy, health care and the environment to name a few. The group is not meant to interpret the data, just too simple disseminate it to everyone in a nonpartisan manner. With The State of the USA not being designed to replace the GDP as the…

    • 824 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 9

    • 392 Words
    • 2 Pages

    A light-emitting diode (LED) is a semiconductor light source. LEDs are used as indicator lamps in many devices and are increasingly used for general lighting. Appearing as practical electronic components in 1962, early LEDs emitted low-intensity red light, but modern versions are available across the visible, ultraviolet, and infrared wavelengths, with very high brightness.When a light-emitting diode is switched on, electrons are able to recombine with holes within the device, releasing energy in the form of photons. This effect is called electroluminescence, and the color of the light (corresponding to the energy of the photon) is determined by the energy band gap of the semiconductor. An LED is often small in area (less than 1 mm2), and integrated optical components may be used to shape its radiation pattern. LEDs have many advantages over incandescent light sources including lower energy consumption, longer lifetime, improved physical robustness, smaller size, and faster switching. However, LEDs powerful enough for room lighting are relatively expensive, and require more precise current and heat management than compact fluorescent lamp sources of comparable output.Light-emitting diodes are used in applications as diverse as aviation lighting automotive lighting, advertising, general lighting, and traffic signals. LEDs have allowed new text, video displays, and sensors to be developed, while their high switching rates are also useful in advanced communications technology. Infrared LEDs are also used in the remote control units of many commercial products including televisions, DVD players and other domestic appliances. LEDs are also used in seven-segment display.…

    • 392 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    · S/W Environment: Minimum one Web Browser should be installed before PC installation, Use IE 5.5 or higher, Go to Tools > Internet Options > Security tab and click on Custom Level button and make sure that under the Scripting section the Active Scripting is set to “Enable”.…

    • 1858 Words
    • 8 Pages
    Good Essays
  • Satisfactory Essays

    It is an exception code which is suggestive of Windows registry corruption. 0x80070002 errors can start happening if the Windows registry has corrupted entries. Windows OS and Windows programs will fail to work unless you find a 0x80070002 fix.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    nt1330 unit 7 assinment1

    • 350 Words
    • 2 Pages

    I can understand how you concerned with your company’s security after all information on competitors can be invaluable or very harmful to a company and this is why it must be protected from prying eyes. This does not have to mean that you have to lose production over trying to secure your networks information. An easy measure like user names and passwords can be used to protect less sensitive information but how strong you make those usernames and passwords can have a significant effect on how well your information is protected. I will give you some tips on how to better secure your network with the tools that you already have at hand, keep in mind that you can also buy better security items to better protect you network things like; smart card, finger print scanners, retinal scanners, etc. but I only recommend these for really sensitive information and only for certain users in your company. On the server that is the DC log in to the administrator account and in the Active Directory Users and Computers in the Domain icon in the left pane click on the users icon, you’ll be able to see all of the users in that domain. From here you can click on any user and make changes as necessary, for user names I recommend you use the following format; using capital and lower case letters the first letter of their name, their whole last name and their employee number, ex. “CCbattle1234@Domain*%#.Local” if someone hack the account and all that they knew the person name and the domain name they could not get in because it is very unlikely that they would know that person employee number and if they do then you have a spy in your company. As for passwords I recommend that they be alpha numeric and what this means is that they should be at least eight characters long, be composed of upper and lower case letters, should contain at least one number and one special character.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Lab 2

    • 473 Words
    • 2 Pages

    Deciding on which cybersecurity program to use to protect clients’ login and password is always a gamble. OAuth 1 and OAuth 2 are the two most popular protocols used to safeguard client information. This protocol is used by major corporations including Twitter (Twitter Developers Documentation, n.d.) and Instagram (Authentication, n.d.), OAuth or Open Authorization) is a program which was developed to protect client passwords and information from other third-party applications. Generally, O-Auth protects information through a protocol which requires the third-party system to request a token from the server to access the client’s information without knowing their password. According to Aaron Parecki, the manager of OAuth.net and an experienced O-Auth user, the Open Authorization 1.0 protocol was designed by a small group of developers from several websites and Internet Services (Hammer-Lahav, 2010) in 2007 tasked with standardizing other authorization protocols such as Flickr Auth and Google AuthSub. (Parecki, n.d.; Chae, Choi, Choi, Yae, & Shin, 2015) Parecki continues to describe the beginning of O-Auth 2.0. He says that the objective of OAuth 2.0 was to learn from OAuth 1 and “…update it for the emerging mobile application use…” as well as to streamline certain features which were overly…

    • 473 Words
    • 2 Pages
    Satisfactory Essays