L.O. Explore And Explain The Hardware Components Needed For A Given Scenario.

In this blog it will be about the hardware components which will be needed to set up a home office.

There are several hardware components that you will need to make a home office:

  • Monitor – The most comon output device is the monitor. Monitors has changed over the period of time from 4:3 to 16:9 or maybe 16:10. There are amny types of differnet brands for example LCD, Plasma, LG. Modern monitors are mostly Liquid Crtstal Displays (LCD), Thin Film Transistors (TFT) monitors. The older monitors are Cathod Ray Tube (CRT) monitors.
  • Keyboards – The most common input is a keyboard. A keyboard has loads of buttons and keys, it is just like a old fashion typewriter. There are 3 main keyboards: a standard, a laptop size and a thumb size. Desktop computer keyboards, such as the 101 key US traditional keyboards or the 104 Windows keyboards, include alphabetic letters, numbers, symbols, and a variety of function keys. A laptop size keyboard usually have shorter travel distance for the key strokes and a reduced set of keys.
  • Mouse – Another most common input device is a mouse. A mouse is a pointing device that functions by detecting two dimensional  motion relativeto it’s supporting surface. The earlier mice is the Trackball, which is invented by Tom Cranston. The Trackball is used at alternative to a mouse. User’s operate it by rotating the ball which moved the pointer on the screen. The Trackball are often used in the Computer Aided Design (CAD).
  • Microphone – Microphones are used to input sound. In computing they can be used with voice recognation software and a word processing application to enter text. Web cams often have a mircophone in them. Most microphonnes are used in many applications such as: telephones, tape recoders, karaoke systemm etc. There are many microphones invented here are some examples: Condenser Microphone, Dymanic Microphones, Carbon Microphones.
  • Scanner – A scanner can be used to digitise images. They are similar to a photocopier but they make a digital copy instead of a physical copy. Scanners can also be used with optical character recognation (OCR) software to scan text that is editable.  The modern scanners are typically used a charge-coupled device (CCD) or a Contact Image Senser (CIS) whereas older drum scanners use a photomultiplier tube as the image sensor. A rotary scanner is used for high speed document scanning it is another type of drum scanner but using a CCD array instead of a photomultilier. There are moire types of scanner for example planetary scanner, these type of scanners take photographs of books and documents and there are also 3D scanners, these type of scanners as used to produce 3 dimensional models of objects.

 

Digital Footprint

This blog will be about the Digital Footprint.

Some people will before taking on an employee or student an organisation may search for them on the internet to check their Digital Footprint.

What is the Digital Footprint?

A digital footprint is where if you want to have new people to work you will need to find thier digital footprint. In this digital footprint there will be telephone number, thier email address, thier chat messages, emails and also their personal information (Home Adresses, telephone numbers)

This might happen because people don’t want to employ people if they are not going to be any help to the business that they are doing and to find out if they would be or not be able to search for their digital footprint (name) and this would come up their emails, chat messages, Facebook, twitter etc.

If people do not look at the person’s Digital Footprint this could have a result in having someone working for their business who might not be safe to do the job.

Altogether in my opinion i think it is fair becuase if you did not know anything about the person, that wants to work in your business, it could be the wrong type of person and do the job wrong or might not know how to do it.

Advantages & Disadvantages For Touch Screen Devices.

This blog will be about the advantages and disadvantages for touch scren devices.

What are touch screen devices?

Touch scree devices are getting more popular these days, as the years go by. A touch screen is an electronic visual display that can detect the presence and location of a touch within the display area. Touch screen are genarlly refers to touching the display of the device with a finger or han. A lot of people in the society will have at least one thing that is touch screen.

The advantages of  touch screen devices

  • Big screen – This is ideal for web browsing, pictures and movies.
  • Interfaces – Some touch screen devices usually have simple user interfaces, which are more intuitive (more easy to use and easier to understand) for example the IPhone.
  • Co- ordination – Touch screen devices have easier had eye co-ordination.
  • Fastest – Touch screen devices have fastest pointing devices
  • Volume – Touch screen devices have a high volume usage.

The disadvantages of touch screen devices:

  • Big screen – If your touch screen has a big screen then it leads to a low battery life.
  • Arm reach – Touch screen devices could be at arm reach from the device and might not be able to see anything on it.
  • Alternative devices – Touch screen would cost more than alternative devices.
  • Reduction – In touch screen some reduction in image brightness might not occur.
  • Pain – There might be pain because some screns need to be installed at a lower position and tilted to reduce arm which could cause pain.

Data Security

This blog is about the key terms about Data Security. The Key terms are: Computer Viruses, Trojans, Worms, Phishing, Spyware, Adware, Hacking, Denial of service attacks.

What is Data Security?

Data security is keeping data safe. Many individuals, small businesses and major companies rely on their computer systems. If the data on your computer system is damaged, lost, or stolen can can lead to disaster.

Computer Viruses: A virus is a simple program designed to cause harm to someone else’s computer. A virus spreads by duplicating and attaching to itself to other files. The extent of the damage depends on the virus. There are tens of thousands of viruses. Some virus damage is terrible, putting the computer system out of action by erasing files or corrupting data.

Viruses can:

  • Keeping you system up to date,
  • Using an anti-virus system to keep your computer up to date,
  • Not opening an email attachment,
  • Not allowing your friends to use their memory stick on your system.

Trojans: Trojans horses in this way may require interation with a hacker filled with purpose. though the hacker does not have to be the individual resonsiable for distributing the Trojan horse. Trojans may only use drive by downoloads or install via online games in ordere to reach traget computers. Is is possiable for individuals hackers to scan computers on a network using a port scanner.

Trojan purposes:

  • The use of the machine as part as a botnet,
  • Electronice money theft,
  • Data theft,
  • Downloading or uploading files from the user’s computer system.
  • Crashing the computer

Worms: Worms are a destructive program that replicate itself throughout the single computer or across a network both wireless or wired. But worms always cause atleast some harm to the network. Most worms that have been created are desgined only to spread, and don’t attempt to change the system as they pass through.

Examples of some worms:

  • Morris Worm
  • Mydoom,
  • ExploreZip Worm,

Phishing: Phising is similar to fishing in lake. Phishing is an attempt to gain personal infromation about someone by way of deception. They send out e-mails that appear to come out from legitimate websites. Phishig scams is one of the techniquies that is quite common that criminals use today.

Your Personal Information can come out of:

  • PayPal,
  • Pretending to ask the bank for thier bank number,
  • Or sending an e-mail

Spyware: Spyware is the name that implies, this is the software that spies on your computer. If you don’t like to be spied on then computer won’t either. The Spyware can capture information like Web browsing habits. Sometimes, spyware in included along with genuine softwar, and may come from an offical software vendor.

Adware: Adware is a free software that is supported by advertisements. Common adware programs ae toolbars that sit on your desktop or work in conjunction with your web browser. These adverts can be in the form of a pop up.

Hacking: Hacking is this term originally referred to a clever or expert programmer, it is now more commonly used to refer to someones who gain unauthorized accress to other computers. A hacker can hack his or her way through security leveld of a computer system or network

Denial of service attacks:A denial of service attack is an effort to make one or more computer systems unavailable.

3 UK Laws Which Impact On Computer.

In this blog it will be about the 3 UK laws which impact on a computer. The UK laws are:

  • Copyright Law,
  • Computer Misuse Act,
  • Cookie Law

The Copyright Law:

What is Copyright?

Copyright is a legal concept, enacted by most governments, giving the creator of an original work exclusive rights to it, usually for a limited time. Generally it is called ‘ The right to copy’ but also the copyright holder the right to be credited for the work. Copyright law also gives the creator of some kind of media like a webpage to control how they are being used. If something has got a copyright law on it you or other people will not be able to copy it unless you have the right from the creator. The current copyright law in United Kingdom  is to be found on the Designs and Patents Act in 1988.

But copyright laws stop you from loads of things like:

  • Stopping you from giving a copy to your friends
  • Making a copy then selling it online or in public

Computer Misuse Act:

The computer misuse act is and act of the Parliament of the UK. The computer misuse act id developed to help and support the ELC. The computer misuse act is developed in order to support the ELC recommendations that are developed by the private people of the parliament. The purpose of the computer misuse act makes it illegal to gain the unauthorized access to a computer’s data or software, including copying the program.  The computer misuse also states it it illegal unauthorized access to a computer’s data for blackmail purposes.

Cookie Law:

The Cookie law is small text files that most websites use to recognize their visitors. The European Law 2002 that these visitors be given certain information about cookies. From 2011 the law changed meaning that in addition to the provision of certain information visitors must give their consent to the placing of cookies.

Data Protection Act.

This blog is about Data Protection Act:

Question:  Why is it important for organisations and businesses to store accurate and up to date information as well as keeping it safe?

Answer: Organisations and businesses need to store every data/information to make sure they are running everything good and properly. “The Data Protection Act 1998 is a United Kingdom Act of Parliament which defines UK law on the processing of data on identifiable living people” – Wikipedia. 

The Key principles of the Data Protection:

  • The data should be stored fairly.
  • Personal Data should be relevant, and not excessive.
  • The Rights like the right to have data about you removed.
  • Personal Data should not be transferred to any country.
  • Personal Data should be accurate.

Storing and keeping information is also to make sure everything you do is written down in case false accuses are made. Making sure the data is up to date is also important because if you are looking at old data it won’t be useful.  For example is your child gets injured or gets sick and the school will have your child’s family contact numbers, but what if that number does not even work or they had a new mobile they will have a new number so it is important to tell the school up to date. Also information stored on computers are private like bank details or medical details, but people are being stopped by Data Protection Act. 

What is an easy way?

An easy way of finding information/data is on computers because on paper it would be hard. Imagine being a headteacher of a school at the data/information was on papers how many papers will there be. On a computer it would be just a few clicks.

This is Data Protection Act.  “It is the main piece of legislation that governs the protection of data in the UK“-Wikipedia.

 

Selecting The Right Software.

This blog is about selecting the right software:

  • Publisher: If you were going to make a poster, booklet or a leaflet  etc you would use a publisher. Why? You would use a publisher because it has the right tools also it has the right size of paper that y0u would need to make your poster. It also has the right template for a booklet or information leaflet. A poster will good on a Word document but then you wouldn’t be able to make a booklet. This software will be good for business to make information leaflets, booklets or posters.
  • PowerPoint: If you were going to make a PowerPoint presentation either for school or for business you would use PowerPoint. Why? You would use PowerPoint because it also again has the right tools, but if you were going to make a presentation it would be easier, as the class or your manger will be able to see it clearly. But on a Publisher you wouldn’t be able to make a presentation, or on a Word document. This software would be good for business to make a presentation to show your ideas.
  • Word: If you were going to send a letter you would use a Word document. Why? You would use a Word Document because the same as  Publisher and PowerPoint it has the right tools but on Publisher and PowerPoint you wouldn’t be able to make a letter on them software. It would be easier on Word. This software will be good for business to write letters to your manger or you partners.
  • Excel: If you were going to make a a spreadsheet to find out in the whole of year 10 who likes which kind of crisps you would use Excel. Why? You would use Excel because it would be easier to make a table on Excel also on Excel you can make graphs for you data. This Software will be good for business to make spreadsheets and graphs.

Advantages & Disadvantages Of A Laptop, A Desktop PC And A Tablet.

This blog is about the advantages and the disadvantages of a laptop and desktop PC and a tablet:

Laptop:

A laptop is a computer for mobile use. A laptop has most of the same components as a desktop PC, including a display, a keyboard and a pointing device known as a touch pad. A laptop is powered by mains electricity via and AC adapter , and can be used away from an outlet using a rechargeable battery. Laptops are also known as notebook computer, notebooks or netbooks.

These are the advantages of a laptop:

  • Productivity: A laptop can be used places to places whereas a desktop PC  has to stay in one place. For example if you were on a train and you was doing a presentation you could do it on a laptop not on a desktop PC.
  • Quiet: A laptop is often quieter then a desktop.
  • Connectivity: A laptop has loads of Wi-Fi wireless networks and cellular broadband data services.  meaning that a laptop can have easy Internet and local network connectivity.
  • Size: A laptop is smaller that a desktop PC. This is really beneficial when space is premium for example in a small apartment. 
  • Battery: A charged laptop can continue to be used in case of  a power cuts.

These are the disadvantages of a laptop:

  • Wrists: A laptop has a small touch pad, because of that people can have a strain injury.
  • Battery Life: The battery life on a laptop is limited because the capcity drops with time, eventually requiring replacement after as little as a ear. And replacement batteries can laso be expensive.
  • Equipment wear: Because if the laptops portability, laptops are subjected t o more wear and physical damage than desktops.
  • Neck spinal: The integrated screen often required to lean over for a better view, which can cause neck and/or spinal injuries.
  • Thighs: Heat generated from using a laptop on the lap can also cause discoloration on the thighs known as skin syndrome.

Desktop PC:

A desktop computer is a personal computer (PC) in a form intended for regular use at a single location, as opposed to a laptop or a portable computer. Early desktop computers are designed to lay flat on the desk, while the modern one stands upright. Most modern desktops have separate screens and keyboards. A desktop was considered a computer that could fit on a desk.

These are the advantages of  a desktop PC:

  • Battery: It won’t run out of battery whereas a laptop will.
  • Features and power: A desktop computer has more power and more features.
  • Theft: A desktop has a low risk of being stolen, because it is big and heavy.
  • Easier: A desktop are easier to use than a laptop and it is not that expensive to upgrade.
  • Connectivity: A desktop has a better connectivity because it has wire connect to the computer.

These are the disadvantages of a desktop PC:

  • Space: A desktop takes up more space than a laptop.
  • Movement: A desktop is difficult to move if you need to repair it, and to heavy to move it around the house.
  • Monitors: A desktop PC  are normally cheaper than laptops, but they require the user to have a monitor, since there is no screen built into the computer like a laptop.
  • Power use: A desktop PC contain a large power supply form the wall socket to run the hardware.
  • Location: A desktop PC is large and and designed to be set up in a location, making it impractical to move them around frequently.

Tablet:

A tablet is a mobile computer but larger than a mobile or a personal digital assistant, integrated into a flat touch screen rather than a physical keyboard, it often uses an onscreen keyboard.  It also uses a passive stylus pen, or a digital pen.

These are the advantages of a tablet:

  • Weight: The tablet has a lighter weight, lower power models can function similarly to dedicated E-book reader like the amazon Kindle.
  • Battery: The tablet has a longer battery life then a laptop or a netbook.
  • Keyboard: The tablet has a virtual keyboard that it lit, then it is more suitable in dark places.
  • Easier: The tablet has the ability for easier or faster entry of diagrams, mathematical notations and symbols.
  • Pen: The Tablet has users that find it more direct and pleasant to use a stylus, pen or finger and tap on objects.

These are the disadvantages of a tablet:

  • Higher screen risk: The tablet computers are handled more than conventional laptops.
  • Dropping: The tablet has a risk of dropping it.
  • Internet: The tablet has the slow internet speed.
  • Hinge risk: The tablet’s screen hinge is often more complex and delicate.
  • Less user-friendly ergonomics: The tablet does not provide room for a wrist rest, and the user’s arm must move constantly while writing.

Altogether I think that the best one to use is the desktop PC because it has more features and more power, also the connectivity is really good. It is also really easier to use also the battery with never run out. And you won’t need to worry about the theft.