Professional Documents
Culture Documents
purpose of intranet
- keeps private and confidental data within an organisation
- to store relevant information about the organisation thats available for te
workers to use
- to facilitate and make it easier for the users to communicate
- Restricts access to certain sites
- Restricts access to certain employees
- sending and recieving emails and attachments
- allows creation of extranets,
- sharing applications and resources
Virus - Effects
- routine operations are slower
- hard disk drive filled up
- files can be deleted, corrupted, changed
- operating system might be unresponsive
- causes the computer to crash
Viruses- Prevention
- dont download files from untrusted websites
- install up to date anti-virus software
- dont download attachments from emails that come from unknown senders
-scan attachments and emails for viruses
avoid opening spam emails
- the washing machine can analyse the materials and tell you the correct dose of
powder saving money
- washing machine can also use the exact amount of water, saving money and
resources
Virus - what is it
a peice of malicious software or code that infects a computer. it has the ability to
replicate itself and attaches itself to files.
Drones
ADVANTAGES
- less expensive than employing people and aircraft
- safer as there is less risk on human life
- drone can go closer to site than humans
- drone can go places inaccessible to humans
- data is automatically sent back and results processed immediately so faster to
process data
- data can be analysed continuously
- data can be made into graphs and charts
- readings can be taken more frequently
- dont forget to take readings
DISADVANTAGES
- sensors can malfunction
- may go out of range
- has a limited battery
- can lose signal due to storm/ volcano
Smart Cards vs Cash
they are both ways to pay at Point of use
they are both portable
both are used for transaction
it is faster to process the card
card is automatically checked, but cash needs to be checked for correct amount
when money has run out on the card, it cant be used until topped up again
a card can be blocked when stolen
more secuirity in place if card gets stolen
more likely to have cash in your pocket than smart cards
there is a chance of double payment using card
direct vs parallell
- Direct changeover is much cheaper than parallelnas there is only one system
running
- direct changeover is less time consuming than parallel as only 1 set of data is
entered
- direct changeover is cheaper as only one set of staff is needed
- there is less chance of errorrs as the system wouldve been fully test in direct
changeover
- the benefits are immediate wheras with paralllel it takes time to fully
implement
- in direct , the staff wont get a chance to gradually train on the new system, but
in parallel they can
- in direct, if the new system fails, the old system is not there as a backup plan,
but in parallel it is still there
computerised....(.timetable)
quicker to edit and make changes to the timetable
quicker to find problems with timetable iike class clashes
less error prone
what if scenarios can be set up
3D printer
- use a ct or mri scan to scan healthy hand
- save a digital copy of the scan
- load the copy into suitable 3d printer software
- the software slices the model into hundreds of layers
- this is sent to the printer, which prints it out layer by layer using resin
- printer binds the layers together
- the hand is compared to his real hand and is made again if needed, unil a final
version is satisfactory
Encryption
- encryption is the scrambling of data, to make it unreadable to unauthorised
users.they can still gain access, however they wont understand the data. it uses
a encryption key to encrypt, and a decryption key to unscramble in order to
protect personal data such as date of birth, address. and sensitive personal data
such as religion, sexual orientation.
GIS
- GIS is a computer system that allows us to map, model, and analyse large
amounts of data according to location
- allows users to create interactive queries
- allows analysation of spatial information ( how objects fit together in one space)
Audiences
- audiences may be young
- audiences may be old
- audiences may have more experience or be experts
- audiences may be teenagers
smartphones by tourists
BENEFITS
- can contact home with ease
- text messages can be sent instead of calling. can be sent even tif the recipient
is not available, they can see it later.
- you are more likely to have a phone with you
- can search up tourist information and compare different places and prices
online
- can translate languages immediately
- photographs can be taken without using a seperate camera
- videos can be take without using a seperate video camera
- can contact accomodation without having to visit the torist information
- can use GPS, with unfamiliar road which is much easier and more portable than
using maps.
- bookings can be made immediately without having to visit the theatre
DRAWBACKS
- battery life is short and needs recharging
- cost of international use can be high, especially for celluar networks
- there could be a problem with loss of signal
- screen size means its difficult to read
- since it is so portable, it can be easily stolden
smartphones over laptops
- easier to recieve and make phone calls on the move
- they are lighter in weight therefore more portable
- more likely to have a phone with you than a laptop
- easier to connect to celluar networks
biometrics
- biometrics are unique to who you are
- they are always with you
- they cannot be guess or stolen like passwords
- they cannot be forgotten like passwords
- they are difficult to forge
- access cannot be give unless you are present
- iris scan, fingerprint scan, retina scan, facial recognition, voice recognition
- eliminates shoulder surfing
- prevents key logging software from gaining access to passwords
netiquette
dont use capital letters as it is considered as shouting
dont use vulgar or abusive language
check for grammatical errors and spelling
respect peoples opinions and views
do not spam
respect peoples privacy
do not use too many emoticons
what is cloud
- cloud is an online service, used to store data
- data is stored in offsite servers
- many servers in many locations
- uses data redundancy
web layers
behaviour
- it is used to enter scripting language to elements within a web page
- it is the interactive layer
content
- it has the information and data, such as images text
- it is used to create the structure of the wbepage
- written in html
presentation
- this is used to display format elements within a webpage
- provides consistency in styles
- this is how it appears to the user
- written in css
ROBOTICS
more productive
can work in hazardous condition where humans need protective clothing
can work continuously
no wages so overall wage bill decreases and cheaper in the long run
more consistent
more accurate
can do the boring laborious work
PROTOCOLS
HyperText Transfer Protocol
Transfer data between a webserver and the browser and displays a webpage
SSL+TLS
determines variables of the encryption for both the link and the data being
transmitted
SMTP
Communication protocol for email
SLS
Protocol used on the internet
mail merge
open word processing software
create a master template or open one previously made
click on mail merge tab
place holders are placed in the membership card
attach the recipients list database
the data from the fields are imported into the membership cards
the data replaces the place holders
preview the results and check for errors
save the membership cards and print
breaches of copyright
- renting the software to people without permission from the maker
- using part of the code in the software in your own without permission from the
maker
- making copies and selling the software without permission from the maker
- making copies of the software and selling or renting without permision from the
makes
hyper link
it is images or text that links you to something else. if it is pressed, then it takes
you to another webpage
video conferencing
DISADVANTAGES
- There could be time lag in the responses
- Time lag in pictures producing jerky images
- Lip Sync can be an issue/matching sound and image
- Time zone differences can cause the meeting to be held at
uncomfortable times for some employees such as 1am
- Training of staff to use the new equipment can be costly/time consuming
- Requires good network connection/good strength of signal
- Power outages have a greater effect with two venues
- Additional hardware needed is expensive//cost of set up
ADVANTAGES
- Documents do not need to be taken to a central meeting; they would not be
lost in transit
- No need to transport heavy documents
- The conference can be held at short notice
- Reduces the cost of travelling to the meeting
- Reduces the cost of venue hire
- Reduces the cost of hotel accommodation
- Safer than travelling
expert systems
ADVANTAGES
cheaper than regularly retraining that doctor
more up to date
cheaper than consulting many doctors
They provide more consistent answers
Can reduce the time to find the answer
They give a number of different possibilities
Allows the system to be used in parts of the world where experts/medical
specialists not available
Use the collective wisdom of more than one expert
24/7
Disadvantages
They are machines therefore lack common sense
If the knowledge base contains errors then incorrect decisions can be made
Expensive to set up
Cost of training for operators
Expensive to maintain
relational database
better secuirity
easier to add, delete, and edit records,
more complex queries can be carried out,
data is more organised and more consistent,
greater ability to cater for future requiremnts
avoids duplication of data so less data entry.
takes up less storage space
more complex than flatfile as more than one table is required
needs an expert or somoeone who is computer literate, so it is more expensive,
it is easier to filter, sort and understand flatfile databases.
complex queries require more processing power
spam - protection
- spam filter
- dont reply to spam email as the spammer will know that your email is active
- do not sign up to commercial mailing lists
- block images in html messages as they are used as web beacons
- unclick text box allowing your email to be given to third party users when
buying things online.
- if you need to find files on a different website then absolute needs to be used
- relative does not require a path only sub-folders
- relative find the files in the current site or directory, absolute starts from the
root
- absolute begins with a delimiting charecter, unlike relative
phishing prevention
- dont open emails from unknown sources
- dont open attachments from unknown sources
- dont reply to emails from unknown sourrces
- report any phishing attempts
digital certificate
adds a levels of secuirity
verifies the email comes from a trusted source
provides the reciever with a means of replying, private key
public key
valid from
expiry date
serial number
subject name
Relevancy on the internet
check the author as anyone can publish their understanding of a topic
check if the website has excessive advertising
check if the advertising is only related to its own products
check the final part of the URL ends with .acc .gov .org
check if site is endorsed by responsible bodies
check if it has links to other reliable sites
check for testimonials
check if the authours credentials are good
check the last date of update
check for spelling and grammer mistakes
compare to other websites
software
programs and data, for controlling the operation of the computer, and for
processing electronic data
system software: controls and manages hardware, and allows interface between
hardware and user.
a formula can contain a function, and can be a simple calculation. formulas can
be directly entered into the formula bar.
bluetooth vs wifi
bluetooth is used to transfer small files between 2 devices. eg audio files
between earphones and phone. wifi is more suited to full scale networks
bluetooth has a smaller range than wifi
bluetooth has a slower data transfer rate than wifi
bluetooth uses a lower bandwidth than wifi
wifi has better secuirity than bluetooth
bluetooth is cheaper than wifi
wifi is more complex
wifi needs a adapter, router and wireless access points - bluetooth just needs an
adapter
wifi uses key matching encryption, bluetooth uses wpa and wep together
bluetooth uses spread spectrum frequency hopping
Questionnaires
ADVANTAGES
Faster to complete all questionnaires
Cheaper to produce questionnaires than employ an interviewer
Individuals can remain anonymous therefore they are more truthful
More people can answer the questionnaire than can be interviewed They can fill
it in in their own time
DISADVANTAGES
Tend not to be popular with users
Too inflexible cannot ask follow up questions
Users tend to exaggerate their responses as they are anonymous
As its anonymous people may not take it seriously
limited responses and tends to be multiple choice
wifi, how it works
- the computer sends data to its wireless adapter
- the data is converted to radio waves
- the radio waves are transmitted
- the wireless adapter in router recieves the radio waves
- the radio waves are converted to data
- initiates a handshake with wireless router
- user has to enter passkey
ANCHOR- it is a link or reference point, that link with another part of the
webpage
phased implementation
- if new system fails, only one part is affected
- easier to ensure that part of the system is fully evaluated before moving on
- possible to gradually train staff
- trains staff in one part of the system so less costly
file paths
Relative file path is the hierarchial path that locates a file or folder starting from
the current directory
absolute file paths are the complete details and directory needed to locate a file
or folder, and starts from the root
what is phishing
phishing is the sending of genuine, legitimate looking emails, that contain a link
to a fraudulent website, made to steal personal or bank details.
what is pharming
pharming is a malicious code or peice of software that installs in someone
computer, so that when the user tries to visit a real website , it redirects them to
fake website. the information typed in this fake website is sent to the hacker. its
purpose is to steal personal and bank details
EXAMPLE - describe the processing done when a microprocesser keeps the house
at a temperature of 30 degrees.
- temperature sensor constantly read the temperature, which is converted to
digital data using an ADC, and sent to the microprocesser
- microprocesser reads this data
- microprocesser has prestored values on the wanted temperature
- microprocesser compares the data from the sensor to those prestored values
- if the data shows that the temperature is below 30 degrees
- .... then a signal is sent to an acutator to turn on the heater
- if the data shows that the temperature is above 30 degrees
- ..... then a signal is sent to an acutator to turn off the heater.
- ( this sometimes has a mark, sometimes not) : if the data shows that the
temperature is 30 degrees, then nothing is done
- this is a continual process
CLI
- more control over computer settings
- not restricted to predetermined options
- in direct communication with the computer
- better suited for experts and technicians
- takes up less memory
- uses less processing power