Professional Documents
Culture Documents
net/publication/337224136
CITATIONS READS
0 496
1 author:
SEE PROFILE
All content following this page was uploaded by Alfred Tan Yik Ern on 13 November 2019.
Group Members:
1. Jasvinder Kaur - TP046438
2. Saiynova Aidana - TP043189
3. Tan Yik Ern - TP046566
4. Lim Keah Hui - TP041206
5. Ho Chee Hau - TP045123
TABLE OF CONTENTS
CONTENTS PAGE
1. INTRODUCTION 7
TO ORGANISATI ON
AND CUSTOMERS
3. FUNCTIONALITY OF TRIVAGO 10-11
4. ENHANCEMENT 12
6. RECOMMENDATIONS 15
7. CONCLUSION 16
INDIVIDUAL PART :
v. INTERNET 32-34
1. 3 rules of Netiquette
2. 2 types of Internet Access Provider
3. Explain purpose of website
4. Recommend one browser
¨ ¨ ¨ Distinction
¨ ¨ ¨ All credit criteria fully met
¨ ¨ ¨ Produced professional group report with in-depth research
¨ ¨ Group analysis has clear evidence of original ideas
Excellent quality documentation that adheres to Harvard Referencing
¨ ¨ ¨ Credit
¨ ¨ ¨ All pass criteria fully met
¨ ¨ ¨ Citing and referencing are accurate
¨ ¨ ¨ Conforms completely to Report Guidelines
¨ ¨ ¨ Group work has Introduction, Benefits, Functionality, Enhancement,
¨ ¨ ¨ Limitations, Recommendations and Conclusion
¨ ¨ Adequate research undertaken with understanding, analysis and
critical thinking
Group Evaluation and Conclusion shows some thought
Satisfactory documentation with minimal grammatical mistakes and
spelling errors
¨ ¨ ¨ Pass
¨ ¨ ¨ Table of Contents
¨ ¨ ¨ Group discussion on all topics attempted
¨ ¨ ¨ Introduction and Conclusion attempted
Citation and References have been attempted
All areas addressed Fully Partia Fully Partia Fully Partia Fully Partia Fully Partia
lly Not lly Not lly Not lly Not lly Not
Individual Analysis Fully Partia Fully Partia Fully Partia Fully Partia Fully Partia
lly Not lly Not lly Not lly Not lly Not
(understanding)
Original Ideas & Fully Partia Fully Partia Fully Partia Fully Partia Fully Partia
lly Not lly Not lly Not lly Not lly Not
Critical Thinking
Research & Fully Partia Fully Partia Fully Partia Fully Partia Fully Partia
lly Not lly Not lly Not lly Not lly Not
References
Linkage to Fully Partia Fully Partia Fully Partia Fully Partia Fully Partia
lly Not lly Not lly Not lly Not lly Not
Organization
Attends presentation Fully Partia Fully Partia Fully Partia Fully Partia Fully Partia
lly Not lly Not lly Not lly Not lly Not
Additional Comments
Online booking handles the walk-in,emails and phone bookings, which would make the
employees in Trivago organisation to have all their customers data in a structured system. This is
importa1nt as it allows Trivago organisation to market themselves to their previous customers.
This customer list is a valuable resource in business as they would want the data accessible and
structured.
Trivago can maximize reservations through online booking. Customers who book on their
own are more likely to show up as they have paid. If customers cancels the booking the spot will
be open automatically online, giving other customer the chance to book it. By maximizing
reservations, Trivago won’t have unused activity spot or booking on the table. This also saves time
and cut costs. Availability check and instant confirmations eliminate email exchanges between
guests and reservations department. Time is saved because reservation requests will no longer be
processed. Customers can check availability and book instantly, thus closing a booking without
waiting for the staff to confirm the reservation.
BENEFIT TO CUSTOMERS
Online booking is open around the clock. The customers can do transaction for the booking
provided by Trivago any time from anywhere around the world which is a benefit to customers as
it is open 24 hours a day, seven days a week.
Online booking also equip customers with information. Through online booking in Trivago,
they can provide as much information as they want which would make customers appreciate. For
example, description on the hotel rooms, accommodations and customer reviews is provided. This
reduces burden on the staff where they won’t need to answer questions regarding the information
that is provided and staff will have more time for other tasks at workplace.
It is also easy to compare and find reviews for customers through online booking.
Customers can compare Trivago hotels with the price available and choose the best option that is
provided. Because the competition is high, Trivago provides reviews from other customers and
ratings for that hotel rooms. Good and bad reviews are on every hotel is displayed and reasons
behind the thumbs up or down. Trivago also have combined information like for example booking
flights and hotels together in the same package. It makes easier for customers to make complete
plans for their holidays and choose a package that meets their preferences.
Functionality of Trivago
As the world’s biggest hotel search engine , Trivago have huge amount of resources to
support . Over 50 countries , 250 of websites partners , 1 million of hotels , Trivago has become
the main app for travel user and so much more . But how does it works ? Trivago is an
application which can download from both Playstore and Appstore , and it’s free. By searching
the location you desire or you at , it provides accommodations with price , pictures and
comparisons .If is free, how do trivago earn profit ?
Trivago is a hotel agent platform , hoteliers give their informations and pay for advertising . By
using Trivago , hoteliers can reach out to more customers from different area , increasing their
own popularity and profits. Trivago system allows hoteliers to monitor their pages ,
comment ,reviews , pricing and updates . For additional, Trivago has “Hotel Manager Pro”, which
is required fee to access . This pro version of hotel management allows hoteliers to customize their
own pages and listings , also analytics and advanced rates . These systems has help hoteliers to
compete with each other to improve their rankings on the site , and provides better services to
customers.
How to use trivago as a customer :
Even though , it’s no doubt a complete and great application , but Trivago has it’s limitation and
flaws . If Trivago want to make it further , it has to face the issues and step forward.
ENHANCEMENT
Increase the data and information of the company
-The company should increase the data like have more hotel or new spot
-Compare to other company, it has less info as customer difficult to find hotel
-limited hotel option for one places
-According to the worker review, they can’t have a proper database and network to work with
-The company doesn't have proper documentation, it is not organize, worker having trouble in
searching data
-It should provide a better database and network for worker to work efficiently.
RECOMMENDATIONS
1. Recommendations Wrong Booking Dates
Suggestion the programmer and research team of Trivago app have to debugging the
Trivago app on hotel booking system. Make systematic accuracy more precise and explicit. The
display system must display the correct hotel booking dates to Trivago users. Moreover, after
Trivago users completed the hotel booking should immediately contact the customer services to
make a further confirmation with the hotel that users had booked. To verify user reservation with
the hotel or not. Trivago system also have to manual check the booking dates from clients that will
reduce the probability of wrong booking dates on Trivago. Once the booking dates was wrong, the
stuff have to do it right immediately and satisfaction the customer to continued use Trivago App
for booking hotel and date of vacation.
INDIVIDUAL WORK
GREEN COMPUTING
What is Sustainability in Green Computing
Green computing refers to the practice of using computing resources more efficiently while
maintaining or increasing overall performance. Sustainable IT services require the integration of
green computing practices such as power management, virtualization, improving cooling
technology, recycling, electronic waste disposal, and optimization of the IT infrastructure to meet
sustainability requirements. Recent studies have shown that costs of power utilized by IT
departments can approach 50% of the overall energy costs for an organization. While there is an
expectation that green IT should lower costs and the firm's impact on the environment, there has
been far less attention directed at understanding the strategic benefits of sustainable IT services in
terms of the creation of customer value, business value and societal value.
The network and server capacity may be duplicated around the world so that, for example, a single
outage of a server does not affect the company’s operations. Grid computing combines many
servers and/or personal computers on a network, such as the Internet, to act as one large computer.
As with cloud computing, a company may pay for the use of a grid based on the amount of
processing time that it needs. Grid computing often is used in research environments, such as
climate research and life science problems.
Green computing is that a computer and technology is how much responsible for environmental
change. A typical desktop computer and 17-inch monitor that always are turned on release 750
pounds of carbon dioxide in one year, which is the same amount of carbon dioxide released by a
car driven 820 miles. Power management software helps conserve a computer’s electricity
consumption while maintaining acceptable performance. The programs determine when a
computer is inactive and, in turn, power down the computer. Powering down the computer stresses
critical components, such as the CPU and memory, so does this practice actually result in more
waste because these parts must be replaced?
Nuclear power is any nuclear technology designed to extract usable energy from atomic
nuclei via controlled nuclear reactions. The only method in use today is through nuclear fission,
though other methods might one day include nuclear fusion and radioactive decay. Proponents of
nuclear energy contend that nuclear power is a sustainable energy source that reduces carbon
emissions and increases energy security by decreasing dependence on foreign oil. Proponents also
emphasize that the risks of storing waste are small and can be further reduced by using the latest
technology in newer reactors, and the operational safety record in the Western World is excellent
when compared to the other major kinds of power plants. Critics believe that nuclear power is a
potentially dangerous energy source, with decreasing proportion of nuclear energy in power
production, and dispute whether the risks can be reduced through new technology.
Carpal tunnel syndrome is most common in older women. This disease is considered
professional in workers performing monotonous flexion-extensor movements of the brush (for
example, when assembling machines). Also, the disease suffers from sign language interpreters
and motorcycle racers, pianists, bowlers, drummers and, often, artists with experience.
The immediate cause of the carpal tunnel syndrome is the compression of the median nerve
in the wrist area, where the nerve passes through the tunnel (carpal tunnel), formed by the bones
of the wrist and the transverse ligament of the wrist. Different situations can lead to inflammation
and swelling within the joint, tendons, and muscles inside the carpal tunnel. Most often, this is a
job that requires frequent repeated movements. Work at the computer, typists, pianists and meat
packers are particularly predisposed. Other states include:
- Wrist injury;
- Occupations that require strong compression or grip;
- A tumor of the median nerve;
- Diabetes;
- Thyroid gland diseases;
2) CTS symptoms
Carpal tunnel syndrome is manifested by pain, tingling and numbness (paresthesia) in the
innervation zone of the median nerve (weakness of flexion of the hand, thumb and index finger,
hyposthenia of their palmar surface). For objective diagnosis of carpal tunnel syndrome, the Tinel
test is used (percussion over the place of passage of the median nerve in the wrist area, in the case
of a positive test accompanied by paresthesia in the fingers and on the palm), as well as the Falen
test (maximal flexion for three minutes causes pain and paresthesia on the palmar Surfaces 1-3 and
partially 4 fingers).
Carpal tunnel syndrome, also called carpal tunnel syndrome, is caused by compression of the
median nerve. Symptomatic manifestations include:
- Weakness of the brush,
- Painful sensations,
- Numbness of fingers,
- Tingling.
One of the first symptoms of a CTS is a gradual numbness in areas whose sensitivity is
determined by the median nerve. After this, pain occurs in the nerve innervation sites. In the brush
there is a feeling of numbness, especially in the early morning after an overnight rest. Patients all
night shaking their hands and rubbing them, which causes some relief.
Pain can spread up the arm in the direction of the shoulder and even reach the neck. With
the progression of this condition, the muscles of the thumb can weaken and atrophy, causing
clumsiness when the brush works, for example, when you need to take a glass or a cup.
The patient is difficult to touch the thumb pad to the tips of the other fingers, to hold various
objects, for example, a rudder, newspaper or telephone. Patients can not fasten buttons or clean
potato.
In those patients, in whom the symptoms are weakened, exercises aimed at stretching and
strengthening may prove useful. Such exercises can be carried out under the supervision of a
physiotherapist who has training in the use of exercises for the treatment of physical injuries or a
specialist in occupational diseases who is trained in examining patients with physical injuries and
assisting them in acquiring skills to improve their own health and well-being. For example, simple
exercises for CTS;
1. Wrist bend (forward and back)
2. Wrist lift
3. Wrist flex
4. Finger bend
5. Wrist stretch with weight
6. Hand squeeze
Nowadays, everyone are using on computer for working, which brings out that design of
the laptop, computer and all of the gadget is very important to the role of employee , which includes
ergonomic keyboard, ergonomic mouse, ergonomic chair, computer desk, position and distance of
every equipment. As in Trivago, some general provisions for Trivago employees were sitting to
typing on the computer, standing to use the workstation, and to get to do some workspace exercises,
these are also a common posture in most of the workplace.
Most of Trivago worker will be sitting in the office to do all the stuff and working with
computer. For this reason, the distance between the user and the computer screen and the health
of the employee are very important to work a good sitting position.
The user should be seat during operation, hands and feet should be parallel to the floor.
Comfortable arm position is provided by the armrests. If necessary, use the footrest. Place the
keyboard at a distance of 90 degree the edges of the table. The work chair must be adjustable in
height and the forward back inclined forward - to correspond to physiological bends of a backbone.
The user should be need place the monitor directly in front of you, at a distance of 20”-28’’ ,
but not closer than 50 cm. The eye level should be on the upper third of the screen and the user
must to choose a desktop with a working surface height of 25” - 34”and enough legroom.
(Figure 6: correct position for workplace)
(Image Source: http://www.computingcomfort.org/create2.asp )
When working in standing position, as in Trivago that worker needs or wants to stand at
work in his workplace, and they use on leg movements like dynamic activity and static activity
and your monitor should be at eye level, and your keyboard and mouse should be slightly below
the height of the elbow. Most importantly, should be wear comfortable shoes and suitable table
for standing workers. The worker eyes should be 20 - 28 inches from the monitor screen which
computer users.
When we are working hard, we need break time for exercise and just take 3 or 5 minutes
everyday, then do brief exercises like ( for hands, legs, eyes, etc.). Reduce your eyes away from
computer screen at least 25 feet away every 20 minutes. It is most important the health of worker.
So, in Trivago office can use ergonomic furniture and workers can do some exercises and the
made feel like comfortable.
SECURITY
(Figure 7 : Malware )
(Image Source: http://mobileadvertisingwatch.com/wp-content/uploads/2014/09/Threat-Post-
Malware-on-iOS-is-Ad-Thief.jpg )
Malware is the short term for malicious software, it is the software that intends to damage
or disable computer and computer systems. It includes computer viruses, worms, Trojan horses,
and spyware. This malware can steal, delete or encrypt sensitive data, alter or hijack core
computing functions and monitoring user’s computer activity without them knowing. There are
many ways on how we can prevent it. 1.) Do not trust spam e-mails. Approach emails with caution
when the message contains links or attachments. Do not install anything without knowing what is
it. You can also scan email-attachments first before opening them.
Running SpyHunter on daily basis can save your device from getting infected with malware
especially if you have bad web surfing web habits. 5.) Software Firewall will warn you that
malware has infected your machine. Software Firewalls warnings will aid in finding and removing
the malware. Apply skepticism when using this software like when you look at a drive-by-
download. Scrutinize the program requesting access when you receive a prompt from your
firewall.
(Figure 9: Software Firewall )
(Image Source:
https://screenshots.de.sftcdn.net/de/scrn/61000/61785/pc-tools-firewall-plus-20.jpg)
The infected sites had on average of 18,000 threats and 75% of websites in the list were founded
to spread malware for over 6 months. The websites that do not have “https” but enables you to log
in and transfer important information are unsafe.
Biometric device is a device that secure identification and authentication. This device is used to
verify or recognise the identity of a person based on physiological and behavioral characteristics
like fingerprints, facial images,voice recognition and iris prints (Wayman,2005). Biometric
technology aims to reduce fraud and eliminate risks regarding security (Singhal & Jain,2011).
Trivago organisation can heighten their security by applying fingerprint scanner for
employee’s attendance verification. The advantage of this biometric device over other security
mechanism like passwords and punch-card is that it cannot be faked or stolen. Trivago organisation
is able to protect its sensitive data more by implementing fingerprint biometrics as compared to
passwords. Implementation of this security device in Trivago can significantly increase the
security of electronic device such as personal computer,company’s computers and etc.
Other than that, Trivago organisation can use retina or iris scanner. This scanner identifies
a person by scanning their iris or retina. This scanner is more secured biometric device when
compared to other device because retina or iris cannot be duplicated. Trivago organisation should
do analysis of their system to determine which information needs protection via biometric
technology, example customer’s credit card information.
INTERNET
First of all, there is 3 major rules of the rule of Netiqutte in networking. What is Rule of Netiqutte?
Rule of nettiqutte is a etiquette or manner in networking world. It is like a cyber protocol which
giving out an accepted behaviour. Example, when we want to upload some information in a
website or page, we have to giving out a correct information while cannot insult certain people or
organization. Etiquette means "the forms required by good breeding or prescribed by authority to
be required in social or official life", in other words, Netiquette is a set of rules for behaving
properly online. (Shea, 2017)
First rule: Remember the Human
People nowadays using internet, email, instant message, application to communicate with each
other. There is many ways to contact each other. So, what this is rule want to inform us is that we
cannot simply type anything we want and show it to public. If you want people to respect you,
please respect others first. Fix in the mind, what you send out will be read by real guys, please be
respectful. Before you press "send" or "submit," ask yourself, "Would I be okay with this if
someone else had written it?" (Shea, 2017)
Second rule: Don’t abuse your power
In the real life, there is always difference in power or capability in people no matter at where. Just
like in the cyberspace, there will got difference in power or capability too. The term “power” and
“capability” can be mean by the ability and skill in the technology or the experience they got by
working year to year. There will be a chance that you are the one who acquire all these skill or
knowledge which make you stronger and better other people. Just remember: knowing more than
others do or having more power than others may have does not give you the right to take advantage
of anyone. (Shea, 2017) If you ever forget, please recall what the first rule: remember the human
mean.
Third rule: Make yourself look good online
In real life, there will always people who judge what you have done by giving you evaluation while
in virtual world there will not happen something like this, because it doesn’t have the ability to
judge you weather you is good or bad. For example, if you make some crazy stuff by wearing a
lot of weird clothing and go out in street, first expression people give will be “you are silly” while
in virtual world, no matter how you wear, no one will be interested in you, they only interest in
what you write, the element you write. Remember, before you post something to public, always
ensure your grammar and spelling didn’t have any flaw. Then, knowing the statement you are
mention and be clear with it.
Next, we will be talking about what is two of the internet access provider (ISP and OSP)? An ISP
(Internet service provider) is a company that provides individuals and other companies access to
the Internet and other related services such as Web site building and virtual hosting. (Rouse, 2017)
An ISP has the equipment and the telecommunication line access required to have a point-of-
presence on the Internet for the geographic area served. (Rouse, 2017) For example, different
region has different type of providers to use. Most of the large ISP company have their own high-
speed leased lines which make them capable to provide better internet and more services to the
customer. This make them don’t have to lean on the telecommunication company to get better
speed of leased lines. Among the largest national and regional ISPs are AT&T WorldNet, IBM
Global Network, MCI, Netcom, UUNet, and PSINet. (Rouse,2017)
An OSP (Open Settlement Protocol) is a client-server protocol that manages access control,
accounting, usage data and inter-domain routing to make it easier for Internet service providers
(ISPs) to support IP telephony. (Rouse, 2017) It is basically a supporting protocol which giving
out data and information to make the internet service provider works more easy and smooth.
Besides, we going to talk about the purpose of website. Website is a multipurpose place to do
anything you want, it is merely depending on what the users want to use for, what is the objective
of the audience. It can be classified in many ways, like searching for information, buy and sell
product, use for entertainment like games, movies and so on.
Therefore, we going to discuss few purpose of using website. First of all, the most common things
we use in website is searching for information. These websites have all be input with different kind
of information and knowledge from different users. So, the audience can use the search engine to
find different information and research from different website and link.
Next, we will be talk about the entertainment website. As you all know, entertainment website is
a lot, for example, youtube.com, dailymotion.com, y8.com and so on. We can find movies and
games from these websites and use to fill up the free time we have got or rest time. Entertainment
website also can be categorized as online gossip news, online magazines, or some hilarious website.
We can use all these websites to update our information, at the same time to cover our extra time.
Lastly, we going to tell about the e-commerce website which is also a very commonly use
nowadays. For example, lazada.com, e-bay.com, Alibaba.com and so on. All these websites
provides a platform for those who want to sell things to upload their products in there. Then the
audience can search for the products they want and purchase it. This make the people life easy and
convenience while the website boss able to make profit.
These are the purpose of website in networking, the company we are researching right now,
Trivago. It is also a website which can be classifies as service-based business website. Trivago
provides service to the audience by helping the audience to booking hotel and transport for their
trip.
For the browser part, any kind of browser would able to log onto the trivago.com, because this
company enable any type of browser to log in. But ensure it is completely stable for using this
trivago.com, I would likely choose Internet Explorer as a main browser, because it is thee most
old and stable browser.
BLOCKCHAIN TECHNOLOGY
What is Blockchain Technology?
Blockchain is a conveyed database that is utilized to keep up a consistently developing
rundown of record, called pieces. That database is in the storage devices are not all attached to a
common processor. Blockchain also known as peer-to-peer network collectively adhering to a
protocol for validating new blocks. peer-to-peer could direct sharing files and document between
personals computer or device. For example, Bluetooth and Bitcoin transactions are a typically
peer-to-peer connection. Blockchain could keep the track of the creation and modification time of
a document. Security here implies that nobody – not even the proprietor of the archive – ought to
have the capacity to transform it once it has been recorded given the timestamper's intergrity is
never compromised.
Designing the blockchain are inherently resistant to modification of the data. When the
data have been record and saved, the data in any given block cannot be altered retroactively without
the alteration of all subsequent blocks and the collusion of the network. Blockchain are built from
3 technologies, there are private key cryptography, peer-topeer network and program (the
blockchain’s protocol).
Blockchain Technology known as a public ledged of all Bitcoin transactions that have ever
been executed. The Bitcoin network prove as a great deal of transaction activity. Retaining a record
of the transactions helps clients track what was paid to and from whom.
Advantages
Basically the blockchain technology could help us to secure our website, privacy document
and data, online transaction.
Other than that blockchain technology also can disintermediation and trustless exchange.
What if there have two parties are able to make an transaction or exchange without the oversight
or intermediation of a third party, the blockchain will increase the trustworthy to keep their
transaction or exchange in safe situation. Blockchain technology are strongly reduce or even
eliminate counter party risk. For example, a client need to make online transaction money to
another client, between this process of instant transfer will not though the third party. So the online
transaction is secure, because blockchain technology is peer-to-peer.
Durability, reliability, and longevity are included in advantage of blockchain technology.
As the decentralized network, blockchain does not have a central point of failure and is better able
to withstand malicious attacks. So blockchain store data across its network, its will eliminates the
risks that come with data held centrally. Blockchain is using the cryptography to keep the
information.
Blockchain technology can faster the transactions between the client and client. For
example, most of the time banking system need to take up to a few day for clearing and final
settlement, especially outside of working hours. But blockchain technology could reduce the
transaction times to minutes and are processed 24/7. The reason is every single transaction are
peer-to-peer transaction that not link to any third party to proceed the transaction between client
and client.
Disadvantages
The biggest disadvantages in blockchain are always perform slower than centralized
databases. For instance, the transactions is being processed, a blockchain has to do all the same
things just like a regular database does.
Signature verification. The blockchain transaction is a public-private cryptography that
make all the transactions propagate between nodes in peer-to-peer. But the centralized databases,
once a connection has been established, there is no need to individually verify every single request
that comes over it.
Consensus mechanisms. Blockchain is a distributed database, the effort must be expended
in ensuring that nodes in the network reach consensus. But blockchain technology very less in
process the transactions are queued and processed in a single location.
Redundancy. Blockchain technology need to do a lot of work than centralized databases to
done a thing for the same end result. The reason is blockchain must be processed independently
by every node in the network.