Effective Communication (Unit 3.1)
Most communication is now electronic, and they all try to:
To Educate
To tell a message
To get attention
To entertain
To Inform
To Persuade
Most IT Literate people do these on a daily/regular basis:
Visiting/Posting on Websites
Posting Blog entries
Send/Receiving e-Mails
Sending/Receiving Texts
There are still some forms of Non-Electronic Communication, Including:
Newspapers, Magazines and Comics
Reports
Posters
Leaflets, Brochures and Flyers
Letters, Novels and Text Books.
There are also forms of voice media:
Telephone/Mobile Conversations
Talking Face to Face
Radio Transmissions
Podcasts
Advertisements added onto music programs like Spotify
Wednesday, 30 September 2009
Activity 3.5
Newspaper Report:
The paper I chose is The Times,
Newspapers try and aim for one specific audience and specify a certain message, this leads to how adverts are placed in Newspapers, so they can get the best result.
Companies will pay hundreds and thousands of pounds to get the placement in the Newspaper that makes the reader notice it.
Advertisements use several ways to gain the reader’s attention:
I. Bright, contrasting colours
II. Large images that support the Company
III.Slogans and Phrases
The paper I chose is The Times,
Newspapers try and aim for one specific audience and specify a certain message, this leads to how adverts are placed in Newspapers, so they can get the best result.
Companies will pay hundreds and thousands of pounds to get the placement in the Newspaper that makes the reader notice it.
Advertisements use several ways to gain the reader’s attention:
I. Bright, contrasting colours
II. Large images that support the Company
III.Slogans and Phrases
Wednesday, 23 September 2009
Activity 5.11
1.)
Year: 1945, 1990
Price: £3.89, £7.24
Photo: A Picture inserted
Reference (Primary Key): 1, 2, 3
Currency: What type of money, E.g. Pounds, dollars, Yen.
2.)Data validation cannot make sure all data is correct because it only controls what type of data you put in, E.g. Text, Number, Currency.
3.)It can’t get lost as easily as paper based systems and data can be ‘backed up or mixed up with other details, it can also be easily retrived.
Year: 1945, 1990
Price: £3.89, £7.24
Photo: A Picture inserted
Reference (Primary Key): 1, 2, 3
Currency: What type of money, E.g. Pounds, dollars, Yen.
2.)Data validation cannot make sure all data is correct because it only controls what type of data you put in, E.g. Text, Number, Currency.
3.)It can’t get lost as easily as paper based systems and data can be ‘backed up or mixed up with other details, it can also be easily retrived.
Networks:
http://www.majhost.com/gallery/Snake09/SchoolWork/100071.jpg ~ Ring Network
http://www.majhost.com/gallery/Snake09/SchoolWork/1000070.jpg ~ BUS Network
http://www.majhost.com/gallery/Snake09/SchoolWork/100071.jpg ~ Ring Network
http://www.majhost.com/gallery/Snake09/SchoolWork/1000070.jpg ~ BUS Network
Wednesday, 16 September 2009
Muffins International Memo
Date: 16/09/2009
To: The Muffin Boy
From: Gary Simmons
RE: Security Systems on Durey Lane
I am writing to inform you what to say in your next meeting with the CEO of Muffins International about security systems in Durey lane.
The security needs improving in the server room, people might steal our important files and introduce viruses into our system.
I recommend putting staff patrols and advanced security systems on doors, and have a priority system; High-Class staff would be able to access the server room, but these special security features will lead to less profit for selling our muffin shaped computers…
To: The Muffin Boy
From: Gary Simmons
RE: Security Systems on Durey Lane
I am writing to inform you what to say in your next meeting with the CEO of Muffins International about security systems in Durey lane.
The security needs improving in the server room, people might steal our important files and introduce viruses into our system.
I recommend putting staff patrols and advanced security systems on doors, and have a priority system; High-Class staff would be able to access the server room, but these special security features will lead to less profit for selling our muffin shaped computers…
Activity 5.9
Activity 5.9
Physical Security can be implemented by having extra staff members told to make sure something is safe and have a locking system to be sure a room is safe, for example: A server room must always be protected.
The physical security can be breeched if the staff changes for shifts and if it uses an advanced security system, it can be hacked.
Virus checking software and Firewall can be used together to create a secure network, Blocking certain websites can control what the staff is viewing, preventing viruses.
Physical Security can be implemented by having extra staff members told to make sure something is safe and have a locking system to be sure a room is safe, for example: A server room must always be protected.
The physical security can be breeched if the staff changes for shifts and if it uses an advanced security system, it can be hacked.
Virus checking software and Firewall can be used together to create a secure network, Blocking certain websites can control what the staff is viewing, preventing viruses.
Activity 5.8
Activity 5.8
The advantage of using swipe cards, access codes and Keys is that if someone wants to mass-delete important file types like .dll, they would have to have an important reason and the proper privileges to get in.
The disadvantage is that if someone needs to get in and they’ve forgotten their keys or their swipe card.
~Swipe Cards ~
¬Uses mains (Mostly)
¬Limited storage data
¬USB Interface, Could be hacked into
People can’t get in without the card.
~Access Codes~
¬Uses network, If the server goes down, so does the input machine
¬Codes can be forgotten, if forgot, the person can’t get access
~Keys~
¬Could be left at home
¬Keys can be lost or misplaced
A System could need to be on 24/7 so it can get new business deals overnight, also, it costs more to turn a computer off than on, so a business having a 24/7 server is a win-win situation.
The advantage of using swipe cards, access codes and Keys is that if someone wants to mass-delete important file types like .dll, they would have to have an important reason and the proper privileges to get in.
The disadvantage is that if someone needs to get in and they’ve forgotten their keys or their swipe card.
~Swipe Cards ~
¬Uses mains (Mostly)
¬Limited storage data
¬USB Interface, Could be hacked into
People can’t get in without the card.
~Access Codes~
¬Uses network, If the server goes down, so does the input machine
¬Codes can be forgotten, if forgot, the person can’t get access
~Keys~
¬Could be left at home
¬Keys can be lost or misplaced
A System could need to be on 24/7 so it can get new business deals overnight, also, it costs more to turn a computer off than on, so a business having a 24/7 server is a win-win situation.
Activity 5.7
The Klez Virus ~
The Klez virus is a worm that is spread through e-mail, it uses subjects like "Klez Protection" to make the victim open the attachment, The Klez virus then uses the victim's e-mail contacts and temporary files to spread it to a minimum of three people...
The virus first appeared in Oct. 2001, and the virus has mutated into a deep infection.
Approx. 1 in 300 e-Mails have a variation of the Klez virus.
The Mocmex Virus ~
The Mocmex virus collects user info and passwords and blocks most anti-virus settings and Windows Firewall and puts random files onto the infected computer and hides them.
The virus was put into Digital Photo Frames in China around Feb. 2008.
Compared to the Klez virus, these two combined would not be good for a infected computer...
Avast Anti-Virus~
Avast has several protection types:
Standard Shield ~ Real time checking against viruses and Malware
Internet Mail ~ Scans e-Mails
IM Sheild: Protects against malware getting in from Instant Messaging (IM) Programs
Outlook/Exchange ~ Scans Microsoft Outlook/Exchange
Web Shield ~ Scans HTTP and blocks certain URLs
Script blocker ~ Scans webpage for malicious scripts
Network Shield ~ protection against Worms and uses a IDS (Intrusion Detection System)
The Klez virus is a worm that is spread through e-mail, it uses subjects like "Klez Protection" to make the victim open the attachment, The Klez virus then uses the victim's e-mail contacts and temporary files to spread it to a minimum of three people...
The virus first appeared in Oct. 2001, and the virus has mutated into a deep infection.
Approx. 1 in 300 e-Mails have a variation of the Klez virus.
The Mocmex Virus ~
The Mocmex virus collects user info and passwords and blocks most anti-virus settings and Windows Firewall and puts random files onto the infected computer and hides them.
The virus was put into Digital Photo Frames in China around Feb. 2008.
Compared to the Klez virus, these two combined would not be good for a infected computer...
Avast Anti-Virus~
Avast has several protection types:
Standard Shield ~ Real time checking against viruses and Malware
Internet Mail ~ Scans e-Mails
IM Sheild: Protects against malware getting in from Instant Messaging (IM) Programs
Outlook/Exchange ~ Scans Microsoft Outlook/Exchange
Web Shield ~ Scans HTTP and blocks certain URLs
Script blocker ~ Scans webpage for malicious scripts
Network Shield ~ protection against Worms and uses a IDS (Intrusion Detection System)
Wednesday, 9 September 2009
Activity 5.3
1.) Business relevant technology means that it has a definitive purpose.
2.) An Estate Agency can benefit from business relevant technology by having a network to show up to date customer information and info on new houses on the market.
3.) Some people think that ADSL is a form of DSL because it uses the same original system; it just makes it faster for a webpage to show up.
ADSL ~ Asymmetrical Digital Subscriber Line
DSL ~ Digital Subsciber Line
2.) An Estate Agency can benefit from business relevant technology by having a network to show up to date customer information and info on new houses on the market.
3.) Some people think that ADSL is a form of DSL because it uses the same original system; it just makes it faster for a webpage to show up.
ADSL ~ Asymmetrical Digital Subscriber Line
DSL ~ Digital Subsciber Line
Activity 5.1
I. A switch, At least one PC, Ethernet cables, Fibre Optic cables, File Server.
II. The switch:
The switch controls what is sent to the file server, it makes sure everything is in it’s place.
The PC:
The PC is used as per normal…
Ethernet Cables:
Ethernet cables connect the PCs to the switch, ultimately connecting to the File server
Fibre Optic Cables:
Fibre Optic cables transfer data quickly, at very high speeds like 10 Gigabits per second
File Server:
Where everything is sent to be stored/ sent to a print server or an e-Mail server
III. Switches are better than hubs because a hub will try and send the information needed to every computer, but a switch has more intelligence and goes straight to it’s destination, therefore making switches far more efficient when the server is being constantly given information
II. The switch:
The switch controls what is sent to the file server, it makes sure everything is in it’s place.
The PC:
The PC is used as per normal…
Ethernet Cables:
Ethernet cables connect the PCs to the switch, ultimately connecting to the File server
Fibre Optic Cables:
Fibre Optic cables transfer data quickly, at very high speeds like 10 Gigabits per second
File Server:
Where everything is sent to be stored/ sent to a print server or an e-Mail server
III. Switches are better than hubs because a hub will try and send the information needed to every computer, but a switch has more intelligence and goes straight to it’s destination, therefore making switches far more efficient when the server is being constantly given information
Subscribe to:
Posts (Atom)