Monday, 13 May 2013

D1 UNIT2 - a SYSTEM ADMINISTRATOR


 is a person employed to maintain and operate a computer system and/or network. System administrators may be members of an information technology (IT) or Electronics and Communication Engineering department.
The duties of a system administrator are wide-ranging, and vary widely from one organization to another. Other duties may include scripting or light programming, project management for systems-related projects, supervising or training computer operators, and being the consultant for computer problems beyond the knowledge of technical support staff.
To perform his or her job well, a system administrator must demonstrate a blend of technical skills and responsibility.
I think this is suitable job for those characteristics  that I suggest in P1 .

That person should be chill when she came to job , always be organised,  she/he should know what she/he suppose to do

Motivation – Motivation is the force that makes us do things , this is a result of our individual needs being satisfied so that we have inspiration to complete the task. These needs vary from person to person as everybody has their individual needs to motivate themselves

Adability- Adaptability is a sought-after job skill as employers increasingly rely on flexible job descriptions and rotate employees into different roles. The ability to adapt to changing situations and expectations makes the wrokers  more valuable to a current or prospective employer.
Loyalty- Loyalty is important in the workplace as your employer have to believe you in the work that you been doing. The worker have to giving much as he/she can to make the employer trusting you.

communication skills - good communcation skills at workplace is imporstant in workers life . An organization may consist of employees from different parts of the society. In order to unite the activities of all employees, communication is crucial. Effective workplace communication ensures that all the organizational objectives are achieved. Communicating necessary information to the entire workforce becomes necessary. 

Friday, 10 May 2013

D2 UNIT 14


D2


Bluetooth transmission to sending contact by connecting with another person via Bluetooth then you have to select the option to send you a contact to a person.

Disadvantages of using Bluetooth ;

Problem for Bluetooth is when there are a number of mobile devices in the same room and possibly attempting the same operation also It may happen by accident so that you connect to the person you did not want to.

Advantages of using Bluetooth ;

The technology of Bluetooth is cheap for companies to implement which results in lower costs for the company. These savings are then passed down from the company on to you. Bluetooth is free because in those days almost everyone has already mobile phones have Bluetooth built where everyone can share files with one another.

I also choose SMS to send contact to another person because its easy way to do it but we also can use Bluetooth to sending this contact by connect to web. Bluetooth is the easy way to send this contact because you just need to connect with person you want to send this contact. Bluetooth is also for free so you can send everything what you want,
so if you do not top up your phone or are not on a contract phone then you

Sending sms is good because its easy way to contact with people. Its easy to use , everyone can use it . Quick communiaction to everyone around the world.

Negative aspects:
-If I want to sent SMS message I need credit on my phone.
-Unreliable
-Immeasurable 
-Subject to high levels of message loss and delay 
-Insecure transmission routes
Positive aspects:
-Contact gets there quickly to my friend 
-My phone is with me all the time so; I can send message fast and when I want.
-My friend knows who sent this message.



D1 UNIT 1


 Safety issues and how to keep data safe

On blog sites is anyone could see any information you put up
 so you cant giving them your private information. You can also put some security stuff when you using social network websites. This people that sitting in ICT area and they changing facebook and websites like that , they provide us security of our profile . You shouldn’t accept everyone that just add you to friends or you do not know as a friend also as soon as you put pictures and stuff up they are classed as facebook property and they could do what they wish with them so don’t put any photos you do not wish for strangers to see.

Blog sites like facebook have a privacy mode which only friends can see your posts, details or your photos and also think of a password. You need to put password that no one know and no one would guess. You need to see if the line of passwords go to green line and that provide you the strong password , also don’t put private information or information you would not want strangers to get hold of and don’t put spam or junk on blog sites and only have people like your colleagues or people you know to subcribe to your page or add you as a friend.



10 ways to keep your data safe ;

1. Share nothing

Hacker and scammers can find out all sorts of information about you from social networking sites, so you should put more privacy as you can to provide your profile safe.

2. Use a strong password

3. Encrypt sensitive data

4. Develop good computing habits/instincts

5. Get good security software

6. Control your credit card

7. Use the best Wireless security available

8. Back up your data securely

Thursday, 9 May 2013

M2 UNIT 1


M2
          The risk of using a computer

Computers are fixtures in people's personal and professional lives, providing essential productivity and communication services. Networking capabilities and Internet access are invaluable resources, but they also expose computer users to threats from other users connected to these networks, requiring people to take precautions to protect the data stored on their computers. Risk awareness and responsible behavior oftenminimizes the risk. But you must remember the many aspects and be prepared to face many threats.
 The first is a better example, Microsoft Internet Explorer - the most widely used browser in Europe. In many of its versions, there were errors so large that it was a gate for hackers and spyware. Therefore, do not always believe the software, even manufactured in the large corporations.

-When we use computer viruses can be up to the parties whether you're viewing with some games.
-Children on the Internet forget a grammar and spelling.
-Someone can sneak in to our example, some computer hacker, and then all our data and materials are at risk of your own computer.
-Sometimes the use of social networks and give anyone have any information anyone can use them against us.
-As long as we use the computer away from him, we can make.
-The Internet to the greatest danger faced by children because they may have contact with content in whose violence is.
-The internet is also a lot of cheats.
-Now, rather than read books, play with or go outside kids are playing computer games and this is very bad.
-Financial implications (the use of dialers, or computer programs linking to the Internet through 0-700 numbers).
-Unconscious sharing of information (credit card numbers, addresses, passwords).


-Instead of homework yourself looking for every finished work on the Internet
-Another thing we must remember is that many Internet applications to facilitate movement within the network, containscountless mass of minor errors.