- Homework Help
Find study materials for any course. Check these out:
Browse by school
Make your own
To login with Google, please enable popups
To login with Google, please enable popups
Don’t have an account?
To signup with Google, please enable popups
To signup with Google, please enable popups
Sign up withor
Gaming/ergonomickeyboards, game controllers, force feedback steering wheel/pedals
A virus is a malicious program that replicates itself. It is designed to cause damage to a computer system. Use anti-virus software and keep it up to date with the latest virus definition updates, do not open email attachments from people you do not know, do not download files from untrustworthy web sites
Cloud storage is where files (and even software) are stored on a remote server connected to the Internet. It is cheap and you can access you files with any device that can connect to the Internet. You do not know where your files are stored, you need an Internet connection to access them and you trust the company to keep them backed up for you.
The could store files such as information flyers, newsletters and letters so that staff in different countries can access them and work together editing them.
Online applications are websites that do the same job of traditional software. An example would be the photoshop.com website where you can upload your images and edit them in a web page rather than use a piece of software on your computer.
The benefits are they are mostly free and can be accessed on any device that connects to the Internet. You can also collaborate so many people can edit the same image or document at the same time. Other examples are Office365, Google Drive (was called Google Docs) or Prezi for presentations. The drawbacks are you have less features than with a full piece of software and you need an Internet connection to view or edit the documents.
Google Drive to store files and hold documents that different people can edit remotely
1. They can be accessed remotely from anywhere at any time.
2. The documents can be worked on collaboratively by many users at the same time.
3. They save time, server storage space, software costs and travel costs
Compression software creates and extracts files from a zip file. They are used to reduce the file size usually so an email attachment is much smaller (quicker to download)
You can optimise an image by changing the file format (eg from raw to jpg) or by reducing its resolution (the number of pixels)
Copyright,designs and patents act (1988)
For security and safety (eg using CCTV or email monitoring to stop bullying). To help the business run efficiently (tracking what users are doing to make sure they are working well)
DoS is Denial of Service. It is where someone makes a computer or website unusable by sending millions of requests very quickly.
Hacking is where someone tries to gain access to a computer without authorisation. A firewall can help stop unauthorised users gaining access as well as using very strong passwords that cannot be guessed.
Title,first name, surname, address, post code, date of birth, email address, credit card details
The account is protected by a username and password so you need two pieces of information to logon.
Give three ways of ensuring a password is secure.
Change your password regularly
Do not use the same password for many different websites
Never write a password down
BrNT2B– it is more than 6 digits and is a mixture of symbols, numbers and both lower and upper case letters.
Encryption makes data unreadable to anyone who does not have the key to decode it
The Data Protection Act 1998
A firewall is a piece of software or hardware that controls which devices can access a network. They can stop unauthorised computers accessing a company network.
There have been cases where user data such as login IDs and passwords have been stolen from some very high profile websites. Describe two possible impacts of data loss on customers. Describe two possible impacts of data loss on an organisation such as Portland Games.
· Impact on customers – they will lose confidence in the business, they may have their identity stolen, someone could post inappropriate information on their social networking account
· Impact on the organisation – damage to their reputation, loss of customers who do not trust them anymore, costs to contact all customers to get them to change their passwords
How to logon, how to change an order, how to return an item, how to get a refund,contact us, delivery times, how to check or track previous orders
For the community section, different users will have different access rights. Explain what different access rights may be used for the online community.
· Administrator– for people who can edit or remove anything
· Editor –for people who can change posts but not delete them
· User – for people who can make posts, see other peoples posts but only edit their own posts
· Guest – for people who can view other people’s posts but not make posts themselves
A forum is an online discussion site where people can post or respond to messages
A blog is an online diary where people can make posts and share text or photos
Give two advantages of having an online community on the Portland Games website.
· They are cheap to operate as the customers provide all the content
· They can help the company keep in touch with their customers by dealing with complaints
· They can advertising new products and get feedback from customers
· They can help keep customers by making people feel they are part of a family/community
Their email address, their address, their full name
Cyberbullying is using communications technology to deliberately and repeatedly harm other people. It can be done by sending offensive text messages to someone or putting offensive messages on a social networking site such as Facebook
The person could feel anxiety or depression (and ultimately it could lead to suicide)
The workplace can become unsafe so employees do not feel comfortable. More staff will be off absent. More staff may leave (high turnover). Morale may become low.
This is classed as theft
The website address will usually start with https:// rather than http://. Your Internet browser will normally highlight secure sites as well by showing a padlock icon in the address bar.
Encrypt the data
A key is used to encrypt the data so it cannot be understood by anyone that intercepts it. Once it has arrived in South Africa the key is used to decrypt (unencrypt)the data so it is readable again.
Copyright Designs and Patents Act (1988)
What file types would be appropriate in the following types of communication?
a. Portland games recording all their financial data and performing calculations
b. Creating a paper invoice for customers
c. The file extension for applications on a computer
(a) A spreadsheet (e.g. .xls file)
(b) A word processor document file (e.g. .doc file)
(c) An executable file (e.g. .exe)
3G (fast data transfer through the mobile phone network) or Wi-Fi (if they have access to a wireless hotspot)
For security (to keep the drivers safe), to help them make the deliveries as efficient as possible, to help plan further deliveries or send customers accurate predicted delivery times
A hands free Bluetooth headset connected to the phone or a Bluetooth connection in the van that uses a microphone and the van speakers.
A solid state drive has no moving parts so is a lot less likely to be damaged by being dropped (traditional hard drives have spinning disks that can be damaged when dropped). They use less power so the battery will last longer. They have a faster read/write speed so the device will work quicker. They are also silent(no moving parts)
The driver's device could use removable storage rather than an internal solid state drive. Give one advantage and one disadvantage for the device using removable storage. Give an example of a type of removable storage the device could use.
· Advantage –it is a cheap way to add extra storage capacity, it is an easy to way to transfer files from one device to another
· Disadvantage– removable storage like memory cards can be quite small and easily lost
· The removable storage could be an SD (secure digital card) or a USB memory stick
It is both.You can control the computer with the touchscreen (by your finger or a stylus pen) and it also gives a visible output.
RSI is Repetitive Strain Injury and it occurs when you repeat the same motion over and over and over. It can cause pain in the fingers or wrist joint. Prevent RSI by taking regular breaks and using a wrist rest if using a desktop computer.
GPS uses satellites to get a very accurate geographical position. It is found in most smart phones and in satnav systems. The signals are also used for route planning and can be combined with traffic information to find the quickest route for a delivery
GPS could be used track where the delivery vans are to make sure the most efficient route is being followed.
Give one advantage and one disadvantage to the business of using GPS to monitor employees.
· Advantages: it helps keep the employee safe, if the employee knows they are being monitored they are less likely to deviate from their route or stop for an extended lunch
· Disadvantages:the employee may not feel trusted, the cost of the equipment could be high
You need the SSID (network name) to identify the network and then the security key(password) to access it
WPA is Wi-Fi Protected Access and is a wireless security protocol. It is used so a person needs to enter a security key (password) before they can connect to a secure wireless network.
When connecting to a wireless network you will be asked whether it is a public or a private network. Give an example of when you would use each.
· A public network means you cannot ‘see’ other computers on the network – it is used in public places like coffee shops and airports
· A private network means you can ‘see’ other computers and they can ‘see’ your computer –it is used in secure places like homes and offices
Describe two ways in which the delivery driver device can be protected from unauthorised use.
· Username and password to logon
· Biometrics– use a fingerprint scanner for them to logon
The Computer Misuse Act 1990. It is to stop people using computers for criminal activity(hacking for example)
They can be damaged or torn which could make them unreadable. They can be removed accidentally (or deliberately).
RFID is Radio frequency Identification. A radio tag is placed inside the box and it can be read by a scanner outside. They cannot be removed without opening the box and they would not be damaged or torn.
The equipment is more expensive than the equipment for bar codes – both the reader and the tags.
They will have less failed deliveries when someone is not in to sign for the package. A failed delivery costs money as another journey will need to be made. It can also inconvenience the person receiving the package if they have to travel to a depot to pick it up. It will also make the company look professional and organised.
Most people do not check email constantly. If it is a personal email account then someone may only check it once per day or even once per week. A text message (SMS)could be sent instead. This would be more effective as the message is ‘pushed’ to the phone so people are likely to read it as soon as it arrives. People tend to have their phones with them all the time.
Sign up for free and study better.
Get started today!