Drafting of 2 employment contract models
Full-time contract Full-time contract Partial Contract Partial Contract The signers at the end of the document
Full-time contract Full-time contract Partial Contract Partial Contract The signers at the end of the document
Types of contracts we will perform 1. Indefinite contracts This contract will be used for key positions within the company, such as: Manager (Partner) Senior IT Technician The reason is to guarantee stability and long-term commitment, as they are profiles with responsibility and experience. 2. Indefinite contract with trial period This contract will be used … Read more
Planning of the physical network installation 1. Review of available material 10 x 10m Cat6 Ethernet cables 2 cables Ethernet Cat6 de 15m 1 switch Netgear GS308 (8 ports Gigabit) 1 router Xiaomi AX1800 (Wi-Fi 6) 1 Access Point Ubiquiti UniFi 6 Lite (Wi-Fi 6) 5 double RJ45 rosettes 3 sets of channels + flanges … Read more
Material type Model 1 Model 2 Model 3 Network cable UGREEN CAT6 10m, UTP, economical, unshielded Nanocable CAT6 FTP 10m, FTP, protegit, apte per racks Finger CAT6A S/FTP 10m, maximum shielding, ideal for areas with a lot of noise Switch TP-Link TL-SF1008D 8 ports, 100Mbps, very basic Netgear GS308 8 ports, Gigabit, reliable, easy to … Read more
https://docs.google.com/spreadsheets/d/1NqTyNKidSwF4rWzm2b7gaeHXtxMpwk0DaBAdC5OWu9E/edit?usp=sharing
Access the AP Advanced→Access Control→Whitelist →Add add teacher’s mac→
Below is a table with the IP addressing plan adjusted and clear so that you can easily see each network, its mask, devices and connections. network Range and mask Devices and IPs function productionAngel 192.168.10.0/27 255.255.255.224 DNS: 192.168.10.2 DHCP: 192.168.10.3 Web: 192.168.10.4 DB: 192.168.10.5 Gateway: 192.168.10.1 Administrative computer network administrationAsad 192.168.20.0/28255.255.255.240 Bryan: 192.168.20.2Aniol: 192.168.20.3 Alex: … Read more
Introduction This document explains the physical security measures applied to computers to protect them from damage, theft or unauthorized manipulation. 2. What are physical security measures? These are actions or devices that protect computer equipment at a physical level. They have nothing to do with the software, but with the environment and the protection of … Read more