Free Essay

W337 - Information Awareness Pe Situation 1 and 2

In: Other Topics

Submitted By megadeth23
Words 333
Pages 2
Information Awareness PE Situation 1

First and foremost I would either remind her to remove the thumb-drive if she is still in the area, or remove it myself if she has already left by the time I noticed the issue. I would also talk to her and possibly counsel her about the incident as soon as possible to ensure she understands the seriousness of the issue at hand. I may also consider training not just for her, but for the entire shop (depending on whether or not I thought that was necessary based on last training dates and/or any prior incidents). Of course this answer is based on isolated incidents. If this becomes a repetitive issue then I may have to take further actions such as having her removed from the shop and/or recommending UCMJ actions be taken.

10.00 out of 10

Information Awareness PE Situation 2

The first issue I see here is that as far as I know (correct me if I'm wrong) only a DOD authorized device can be connect to a DOD computer. I would have to stop SPC Lomas and remind him of this. If he wants to show his buddies what he has on his watch drive, then he needs to do it on his own computer or one of their computers. The main thing I would be concerned about is what he may have brought along with whatever he has on it, such as viruses or trojans. I may also approach SPC. Lomas and order him to show me the contents of the flash drive. If there was, in fact, material not in keeping with Army values, I would delete the material. I would then inform him that if this happens again, I would be forced to take more aggressive actions. I would leave it at that. This sort of thing is better handled on a lower level. But I would go higher if the action continued.

10.00 out of 10…...

Similar Documents

Premium Essay

Assist Family Members Pe Situation a of the FRG Support Circle Leaders in Company A. Any ideas? Submission Materials Submission Field : First off, I would have to ask a few questions. How much did the rent get raised? Does this raise cause serious financial hardship? Would an AER loan help any? and if it would, would it get them out of trouble, or just prolong it? also I would have to consider that, if the wife is 8 months pregnant. She may already be under a lot of stress, and the current situation is not helping any. I would more then likely recommend that both the soldier and the spouse seek financial counseling. I would also want to know why the soldier is disputing the raise in rent. and does he have any legal backing that could help in this situation. I may also recommend the soldier take a copy of his lease to JAG to see if they can find something that may help the soldier out. I would also ensure the company commander and 1SG are aware of the situation as they also may have additional ideas that could help in this situation. Student Comments : Attached Files : Instructor Feedback Grade : 9.00 out of 10 Comments : Very good response, also have FRG and Chaplin visit wife to check on her and see that she is doing ok and if she needs any support as birth nears....

Words: 313 - Pages: 2

Free Essay

Observational Report 2 Social-Awareness

...Observational Report 2 Social-Awareness November 3, 2011 Boyatzis, Goleman and McKee (2004) state that Social-Awareness means “being attuned to how others feel in the moment, a leader can say and do what’s appropriate, whether that means calming fears, assuaging anger, or joining in good spirits. This attunement also helps the leader sense the shared values and priorities that can help guide the group.” Therefore it basically gives one the ability to be more empathetic which in turn, allows them to create resonance. Social-Awareness according to authors Greene and Kamimura (2003) is defined in terms of the importance that students attribute to: 1) speaking up against social injustice; 2) creating awareness of how people affect the environment; 3) promoting racial tolerance and respect; and 4) making consumer decisions based on a company’s ethics. Our personal and professional lives present multiple opportunities to practice Social-Awareness. Like our personal lives, one must avoid creating barriers in their professional lives that prevent them from achieving personal goals and aspirations. In this example, as a direct result of the tragedy that occurred in New York City, September 11, 2001, Arab Americans or those perceived to be Arabian have been unfairly treated by unenlightened Americans. They have been and continue to be targeted as if they themselves flew those planes into the trade center or were the masterminds behind it. The hundreds of news reports......

Words: 708 - Pages: 3

Premium Essay

Alc Mod 1 Pe Answers

...Decision Making Method at Small Unit Level 158-C-1230 Conditions: As a leader faced with a situation which requires you to make an ethical decision. Standards: Resolved the situation ethically by appropriately applying the Ethical Decision Making Method FM-1 FM 6-22 AR 600-100. Training and Evaluation Guide Performance Steps: 1) Clearly define the ethical problem. The ethical problem in the case study is deciding to do the right or wrong thing about the secret papers. It also has to do with whether or not I should confront SFC Sharp about the issue or just the necessary personnel since he’s leaving. 2. Employ applicable laws and regulations. I think in this case I would have to look at my new units SOP’s and then I would look into the regulations over secret documents not being properly disposed of and I would also ask my unit security officer (S2) for their guidance. Not to mention the number of Army values that where discarded in this situation. 3. Reflect on the ethical values and their ramifications. The ethical and army values that come to mind are duty, integrity, personal courage, and loyalty. I placed duty first because as an NCO we should be able to do your job to the fullest and be able to live with and perform the army values without ever thinking. Then integrity because it‘s being able to do what is right regardless of the situation. This then plays into personal courage because it sometimes takes personal courage in order for......

Words: 732 - Pages: 3

Premium Essay

W315 - Prepare and Submit a Situation Report Pe 1 2 and 3

...Prepare and Submit a Situation Report (SITREP) PE Part I 1. QUESTION: What acronym/key word can help you in analyzing terrain? Explain what each letter represents. ANSWER: OACKOC. 2. QUESTION: You and your squad are on an area reconnaissance mission to your next assembly area (AA) and you noticed a route wide enough to deploy your unit, what would you consider that route to be? ANSWER: An avenue of approach. [pic] Concealment. [pic] Concealment. [pic] Key Terrain. [pic] Cover and Concealment. [pic] Concealment. [pic] Obstacle. 10.00 out of 10 Prepare and Submit a Situation Report (SITREP) PE Part II "Blue 1, this is Blue 2, SITREP over" Wait for Blue 1 to respond - "Blue 2, this is Blue 1, send it over" "Line 1 - 201233 October 2012 Line 2 - Observing insurgents emplacing IEDs in road way Line 3 - EEAIIA Line 4 - Four Line 5 - None Line 6 - Green Line 7 - Class 3 Green, Class 5 Amber Line 8 - Continuing to observe. Over" Wait for Blue 1 to confirm full receipt of transmission - "Blue 2 this is blue 1 roger (possible repeat of transmission) Over" "Blue 1, this is blue 2, roger out." 10.00 out of 10 Prepare and Submit a Situation Report (SITREP) PE Part III "Black 2, this is Black 5, SITREP over" Wait for Black 2 to respond - "Black 5, this is Black 2, send it over" "Line 1 - 110910 October 2012 Line 2 - None Line 3 - STURST Line 4 - Three Line 5 - None Line 6 - Green Line 7 - Class 3 Black, Class 5......

Words: 306 - Pages: 2

Free Essay

W328 - Law of War Pe 1 and 2

...Law of War PE 1 1. What would your response to the order be? The order is violating the Laws of War. You can’t force civilians to leave if they don’t want to. Also, you are supposed to protect civilian property more than government property. Destroying the homes could be considered hostile act against civilians. 2. Would you change it? Yes 3. How? Inform the mayor that at 0600 the evacuation will begin and he should gather every one up that is willing to leave. Ask him to inform the people that staying could get them killed and that we will make every effort to keep their homes safe. We will help rebuild any homes that are damaged. 4. What actions would you employ to prevent Law of War violations and crimes? The best thing I could do is to ensure proper training of my soldiers and enforcing the standard as spelled out in FM 27-10. 10.00 out of 10 Law of War PE 2 1. As a senior squad leader how would you respond to this?  I would speak with the commander and state that I understand that the destruction of these weapons is a necessity to the safety of the Military, but civilian casualties are always our concern and never an option. 2. What would be your course of action? My course of action would be to ensure an evacuation the sector of town surrounding the weapon manufacture and the warehouses storing the weapons. An operation order outlining a plan to overtake the manufacture and weapon warehouses without civilian casualties must be......

Words: 272 - Pages: 2

Premium Essay

Alc Mod 2 Pe

...Enforce Environmental Laws and Regulations Practical Exercise .Read the scenario. Using the information provided in the references and lesson, arrive with your best possible solution. You are a squad leader in “Sapper” platoon, Special Troop Battalion, 3rd Brigade, 10th Mountain Division. Your unit will deploy to Afghanistan to conduct operations in support of Operation Enduring Freedom. One of your critical tasks in preparing for your deployment is to train your squad on the laws and regulations that we must implement to protect our environment from being damage and contaminated. The 586th Assault Float Bridge (AFB) Company will conduct a five-day FTX in the Anatuvak training area of Camp Yukon. The unit will depart Fort Chilly and convoy 120 miles on limited-access highways. The commander establishes several rest areas and tactical refueling and maintenance points along the route. Reconnaissance team indicated the trip to take approximately 8 hours. Upon arrival at Camp Yukon, the unit will move into the Anatuvak training area and set up a bivouac site, preceded by their quartering party. During the FTX, the company will conduct tactical-bridging operations on the Yukon River. The FTX will involve normal operations (12 to 16 hours a day), with some night and limited visibility operations. The operations will include the use of pyrotechnics and blank munitions. The FTX will not include live fire due to budgetary constraints. The area has hills, wetlands, several......

Words: 343 - Pages: 2

Free Essay

Squad Training Mod 2 Pe

...According to the Law of War c. 071-430-0028 Consolidate a Unit d. 071-430-0029 Reorganize a Unit III. Treat Casualties a. 081-831-0101 Request Medical Evacuation b. 081-831-1056 Coordinate Medical Activity Support c. 081-831-1057 Supervise Compliance with Preventive Medicine Measures d. 081-831-1058 Supervise Casualty Treatment and Evacuation IV. Perform in a Chemical, Biological, Radiological, and Nuclear (CBRN) environment a. 031-503-1001 Identify Chemical Agents Using an M256A1 Chemical-Agent Detector Kit b. 031-503-1005 Submit Nuclear, Biological, and Chemical (NBC) 1 Reports c. 031-503-1023 Protect Yourself from Nuclear, Biological, and Chemical Injury/Contamination When Changing Mission-Oriented Protective Posture Gear d. 031-503-1053 Report Chemical, Biological, Radiological, and Nuclear (CBRN) Information Using NBC 4 Report e. 031-504-1061 Conduct a Mask Fit Test Using the M41 Protection Assessment Test System (PATS) V. Implement Combat Survival Techniques in Area of Operation a. 061-283-6003 Adjust Indirect Fire b. 071-326-5705 Establish an Observation Post c. 071-410-0019 Control Organic Fires d. 052-192-3262 Prepare for an IED Threat Prior to Movement e. 071-420-0021 Conduct a Movement to Contact by a Platoon...

Words: 283 - Pages: 2

Premium Essay

Information Security Project 1

...Project: Information Security Project 1 Name: Ashiqul Abir Class: NT2580 Date: 02/28/2013 Information security best practice project: The information security best project was housed within the Oxford University computer emergency response team. The project sought build on the knowledge, commentary and information gathered during the 2009 self-assessment exercise. One of the main objectives of the project was to develop an information security toolkit, which includes the policies, guidelines, documentation and education and awareness programmers. Information security: In a devolved environment, such as a collegiate university, it is imperative that policy should not go into retail about how those objectives should be met. It also defines the scope of the policy and identifies roles and responsibilities for security. Information security toolkit: The example polies can be tailored to suit the individual needs of your department, college or hall. The toolkit focuses on some areas like, IT management Operations Network Management Physical Security Building on the 2009 self-Assessment: The 2009 Self-Assessment exercise asked unit within the collegiate university to assess their current approach to IT operations, management and security against recommended best practice guidelines. The information gathered helped the advisory group to understand where further attention, resource, and best......

Words: 280 - Pages: 2

Free Essay

Information Security Chap 1-2

...Principles of Information security textbook problems Chapter 1 & 2 … Study this se t o nline at: m/cards/136 20 58 What is the dif f erence between a threat and a threat agent? A threat is a constant danger to an asset, whereas a threat agent is the facilitator of an attack. What is the dif f erence between vulnerability and exposure? Vu l n e r a b i l i ty i s a fa u l t wi ti n th e s ys te m , s u ch a s s o ftwa r e p a cka g e fl a ws , u n l o cke d d o o r s o r a n u n p r o te cte d s ys te m p o r t. It l e a ve s th i n g s o p e n to a n a tta ck o r d a m a g e . Exp o s u r e i s a s i n g l e i n s ta n ce wh e n a s ys te m i s o p e n to d a m a g e . Vu l n e r a b i l i ti e s ca n i n tu r n b e th e ca u s e o f e xp o s u r e . Who has the def inition of hack evolved over the last 30 years? In te e a r l y d a ys o f co m p u ti n g , e n th u s i a s ts we r e ca l l e d h a cks o r h a cke r s , b e ca u s e th e y co u l d te a r a p a r t th e i n s tr u cti o n co d e o r e ve n th e co m p tu e r i ts e l f to m a n i p u l a te i ts o u tp u t. Th e te r m h a cke r a t o n e ti m e e xp r e s s e d r e s p e ct fo r a n o th e r s a b i l i ty. In r e ce n t ye a r s th e a s s o ci a ti o n wi th a n i l l i g a l a cti vi ty h a s n e g a ti vl y ti n g e d th e te r m . What type of security was dominant in the early years of computing? Early security was entirely physical security. C o n fi d e n......

Words: 3982 - Pages: 16

Free Essay

Pe-Information Processing Summary

...14/11/2014 PE-skill acquisition Perceptual mechanism-information picked up through display by the senses (touch, hearing, vision, kinesthesis and equilibrium) and information is filtered by selective attention (irrelevant information from relevant information). This narrows your options down and increases your reaction time and stops information overload. Translatory mechanism-uses information from perceptual mechanism. Decision making takes place in the translatory mechanism. Comparing short term memory to long term memory. Correct response is selected in the form of motor program, this is sent to working muscles through nerve impulses. Effector mechanism- motor program put into action through nerves. Stimulus identification Response identification Response program Characteristics of short term memory Works quickly-makes the decisions Takes only a fraction of a second to hold and code all the information from the sporting environment Limited capacity- can only hold up to 7 items of information at one time Requires selective attention to work effectively-if there was no selective attention then information overload would occur 30 seconds memory Passes useful information to long term memory to be stored memory Characteristics of the long term memory Passes useful information to long term memory to be stored Long-time memory Unlimited capacity-life time of information Information stored in the form of a motor program-a method of storing the......

Words: 271 - Pages: 2

Premium Essay

Managment Information System 1

...Question 1) (10.5/12) Cloud computing is where software and storage are provided by internet services and are accessed with a web browser. RDM would pay a fee to the supplier that would be far less expensive and time consuming then if they continue in their current situation. RDM remote access systems for consultants are unreliable, they has employed a local IT contractor to maintain its internal system which includes backup files on a weekly bases. The backup protocol is old and once per week is inefficient. IT is not RDM’s core business, they are a small firm management consulting firm and there is the matter of the cost for a new system that they may not be able to afford. Employing an experience and reputable company that offers Cloud computing should be an option that RDM explores. 1.5 /3 Yes, it is appropriate, since RDM’s client base spans across Canada and the United States. Reliable remote access from any location to systems is important. B) The method of Community Cloud computing is several businesses share resources or Private Cloud would be two of the choices that I would recommend. RDM has only 15 employees, costs are important in deciding on what deployment method to use. They have had a system that was not the most efficient for ten years and stayed faithful, now they are looking to upgrade which means the business may be looking to expand. A Community Cloud would cost less and may have more resources available to the group than a Private Cloud...

Words: 1691 - Pages: 7

Premium Essay

Project 2 - Situation C

...economy in terms of GDP growth rate, interest rates, level of unemployment, the business cycle, fiscal policy, monetary policy, international trade, and demographics. The previous categories mentioned are macroeconomic factors which will be considered to initiate any organization. These are all critical when researching for costs and risks. According to the United States Bureau of Economic Analysis, “Finance, insurance, real estate, rental, leasing, health care, social assistance, professional, business and educational services account for more than 40 percent of GDP. Retail and wholesale trade creates another 12 percent of the wealth. The government related services fuel 13 percent of GDP. Utilities, transportation and warehousing and information account for 10 percent of the GDP. Manufacturing, mining, and construction constitute 17 percent of the output. Agriculture accounts for only 1.5 percent of the GDP, yet due to use of advance technologies, the United States is a net exporter of food, (United Sates Bureau of Economic Analysis, 2015).” This makes the United States one of the world’s leading economies especially with its advancements. The United States plays a major role on the economy worldwide because of the status it holds on an international level. Many countries around the world rely strictly on the economy of the United States and during the recession it has impacts millions around the world. Business Cycle The business cycle in terms of the......

Words: 2351 - Pages: 10

Premium Essay

Unbit 2 Pe

...Edexcel BTEC National Level 3 Subsidiary Diploma | Unit number and title | Unit 2 – Computer Systems | Assignment number and title | 1 – Components of a computer system | Start date | 21/9/15 | Hand in date | 1/11/15 | Assessor | WMG | Scenario You are a junior technician in a small business and you are responsible for the IT. The business has 10 computers in all comprised of desktop computers and a server. There are six employees based in the Head Office and your company have taken on a junior employee called Jamil who will be expected to help you out perform basic administrative tasks in the office as well as maintain the ICT systems. Task 1 – Computer hardware components You need to make sure Jamil has a reference guide for the machines in the business to help him understand the environment he will be working in and in case any components fail. You need to put together a presentation slideshow on internal computer components. a) You need to explain the function of internal hardware components of a computer b) Discuss how the components communicate with one another The components are: * Processor * RAM * Hard drive * Power supply unit * Fan * Heatsink * Motherboard * Graphic card and sound cards * CD/DVD drive This task will allow you to provide evidence for: P1 - Explain the function of computer hardware components Task 2 – Jamil asks for advice Jamil is about to buy a new computer and......

Words: 737 - Pages: 3

Premium Essay

Mod 2 Pe

...requirement to the route that we will be traveling. Once arrived make sure no equipment has been staged by and Archeological sites or on the two endangered species area. Mission Related. While conducting the FTX have the rules of what to do in just in case for: Vehicle Leak on land and in water Proper Shower facilities are placed in right areas to keep contaminating the Wetland Map layout of Boundaries’ to every platoon. Numbers to call the proper authorities. Identify what pyro you will be using and to handle them. The best ways to keep track of this through a Risk Management Work sheet day by day. The more you drive certain route you will change the terrain. 1. List the five Components of Fitness. A: CR Endurance, Muscular Strength, Muscular Endurance, Flexibility, and Body Composition 2. There are seven recognized Principles of Exercise; List at least five of them. A Regularity, Progression, Balance, Variety, Specificity, Recovery, and Overload 3. You are designing a fitness program for your Soldiers; list the Three Phases of Conditioning that you must consider A: Preparatory, Conditioning and Maintance 4. When we analyze our wartime mission, we must keep in mind the physical demands of our daily activities and functions. This is done by following the Seven-Step Planning Process. List in order the Seven-Step Planning Process. A: Analyzing the mission, Developing fitness objectives, Assessing the unit, Determining training requirements,......

Words: 894 - Pages: 4

Premium Essay

Situation 2

... | | |SITUATION 2 | | |Your call sign is Black 5 and your platoon leader/sergeant call sign is Black 2. | | |Your convoy consists of 4 vehicles and 16 personnel. | | |After completing your route reconnaissance, your platoon leader/sergeant ordered you to return to forward operating base (FOB) DOG. | | |Your location is. The date is 11 Oct 20XX and the time is 0910. One vehicle operator tells you her vehicle is overheating and she | | |requires a mechanic or wreaker ASAP. Your driver says he still has 1/2 of a tank of fuel. You tell your platoon leader/sergeant that | | |you are establishing a perimeter defense around the disabled vehicle. | | |NOTE: Use Table 2 to encode any location that requires encoding (numbers only). | | |L ...

Words: 580 - Pages: 3