Construction Project Management Essentials
Equipment Hire and Maintenance Management
Establish and monitor policies, procedures, and processes for equipment hire and maintenance. Consider the following example:
Example: Forklifts
- Policy: The company utilizes a reputable supplier, such as Kennards, and ensures all operators possess the required licenses.
- Procedure: Complete a standardized order form and obtain necessary authorization before hiring equipment.
- Process: Contact Kennards with the approved order form. Upon delivery, thoroughly check
Networking, Security, and Enterprise Systems Fundamentals
Computer Networks and Internet Technology Essentials
True/False Questions
- Telephone networks are fundamentally different from computer networks. TRUE
- Increasingly, voice, video, and data communications are all based on Internet technology. TRUE
- To create a computer network, you must have at least two computers. TRUE
- An NOS must reside on a dedicated server computer in order to manage a network. FALSE
- A hub is a networking device that connects network components and is used to filter and forward data to
Engineering Ethics, Standards, and Project Management
Equity and Discrimination in Engineering
Equality
- It is illegal to discriminate based on: age, disability, sex, sexual orientation, marriage and civil partnership, pregnancy and maternity, religion or belief, race, and gender reassignment.
- Direct Discrimination: Treating someone less favorably because of a protected characteristic. For example, not promoting someone because they are older.
- Indirect Discrimination: A policy or practice that applies to everyone but disadvantages a particular group. For
Essential Business and Information Technology Concepts
Key Business and Information Technology Definitions
Business Functions
Specialized tasks performed within a business organization, including manufacturing and production, sales and marketing, finance and accounting, and human resources.
Business Model
An abstraction of what an enterprise is and how it delivers a product or service, demonstrating how the enterprise creates wealth.
Business Processes
The unique ways organizations coordinate and organize work activities, information, and knowledge to produce
Read MoreInformation Security Fundamentals: Risk, Access, and Compliance
Risk Management Principles
Risk: The probability of an unwanted occurrence, such as an adverse event or loss. Risk is calculated as: Threat * Vulnerability.
Risk Management Process
The management of uncertainty within an organization as it relates to information systems. The goal is to maintain a balance between the benefits of information systems (IS) and the risks associated with IS.
Risk Management Phases
The Risk Management process comprises two main stages:
- Risk Assessment (Phases 1-3)
- Risk Control
Secure Access Control & Digital Identity Management Strategies
Unit 1: Role-Based Access Control (RBAC)
Role-Based Access Control (RBAC) in Workflow Systems
Introduction to RBAC
Role-Based Access Control (RBAC) is an advanced access control model used to regulate system access based on predefined roles within an organization. Instead of assigning permissions to individual users, RBAC assigns roles to users, and each role is associated with specific permissions. This model enhances security, simplifies management, and ensures that users can access only the resources
Read More