Friday, July 26, 2013

Paper 1 ( BUSINESS & EMPLOYMENT)

Customers


A.
1. Is the place where a retail transaction is completed. It is the point at which a customer makes a payment to the merchant in exchange for goods or services.
2. Firtly the guy give the credit card, then the cashier pass the credit car into the POS, so the POS send to the database all the information from the credit card and check if its has money or not, after that its returns a message saying if has money or not and the POS accept the credit card.
B.
1. A customer loyalty program can be easy to implement.
2.A customer loyalty program could increase your sales.
3.Customer loyalty programs don't have to be limited to individual businesses.
C.
1. RFID chips are basically tiny two-way radios that are so small they can fit inside a credit card, an article of clothing, the inside of a shampoo bottle cap, etc.The chip, essentially a transponder, carries identifying data and can be queried and read, or “sniffed,” at a distance. RFID technology is now in use in credit cards, ATM cards, “enhanced” driver’s licenses, highway toll networks, and inventory tracking systems.
Small Business


1.  It can be made by copying the card to another blank card and to create or steal the magnetic line.
2.  Two actions he can make is to make it http or to pay to have more cookies in the page
3.  It can help in the speed of the page, it can carry more users and it is easily opened.
4. The payment is via credit card obiously but they cannot steal your magnetic line in your credit card beacuse it has a policy that revices everything they do with the cards.
Employee Monitoring

1. Key logger is the action of recording (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.
2. With the internet organization can connect directly with the general public. Opportunities range from giving away basic product information to automatically updating or patching retail software. Many businesses also conduct retail operations online. 
With the intranets organizations often use internet technologies to facilitate operations within the organization.
With the extranets organizations may use these same internet technologies to connect with their business partners to facilitate supply chain management, help manage projects, manage accounts, or provide advanced technical support.
3. Make it as secure as possible, Assign an administrator to manage the internal site
4. An acceptable use policy (AUP), also known as an acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager of a network, website or large computer system that restrict the ways in which the network, website or system may be used.
5. Logical Decisions also provides consulting and training to help you get the most out of the software and to help you find creative and acceptable solutions to your most difficult decisions.

PAPER 1 HEALTH

Electronic Medical Record
1.- A unique identifier, often an integer, that labels a certain row in a table of a relation-al database
.2. Health information exchange is a work in progress, but the first step is transitioning from paper to electronic records (computer files). Health care providers of all sizes—from a small practice to a large medical center—must purchase an electronic medical records system (EMR) to computerize their records. The computerized records are called electronic health records (EHRs). Once it has electronic records, the provider will likely contract with an HIE or HIO so it can exchange medical data with other providers. Providers may directly request records from other providers, called a “point-to-point” solution. But having an HIE or HIO in the middle to facilitate the transaction seems to have become the standard practice.
3. It is “the right of individuals to keep information about themselves from being disclosed to others; the claim of individuals to be let alone, from surveillance or interference from other individuals, organizations or the government”. The information that is shared as a result of a clinical relationship is consideredconfidential and must be protected.
Project Gerhome
1. -Is an electronic device that records data over time or in relation to location either with a built in instrument or sensor or via external instruments and sensors. Increasingly, but not entirely, they are based on a digital processor (or computer). 
- Oximetry Sensor and Pressure sensors
2. Video monitoring devices fitted in the person's house, allow nursing staff to check in at any time. An amount of privacy is traded off for freedom to stay at home. To help soften the blow, and to aid telehealth-care, a monitor/terminal system fitted in the house, allows doctors, specialists, and friends & family to 'call in' and check up on the person via videoconferencing. With the case of family, who often live across the country, the system reinforces family ties. As far as monitoring goes, everything is checked, from electricity consumption, movement, to chair and bed occupation, the aim is to determine a resident's "normal" behavior, then monitor for any deviation, that can then be analyzed by the software, and flagged when it deviates too much from norm. The system can detect the slight changes in natural rhythms that can give doctors and carers early warning of possible trouble ahead.
3. To a great extent because there is no person watching the elderly person in the house, they can see everything what happens in other places, because it sends signals from what is happening.

Wednesday, June 12, 2013

Article 1

How dangerous are networking sites?
Topic: Legal

Social and ethical concern related to the IT system
¥     Digital citizenship & MySpace because the 13- year-girl has her account on my space and a woman is using MySpace to bully the 13-year-girl so after the woman was bullying the girl, who later committed suicide.

Describe the relationship of one primary stakeholder to the IT system
¥         MySpace because is the social network used to bully the girl, also the social network users because they are prone to be bullied and even the social networks because in every social network this can happen.

The IT concepts and processes 
1.       Account is created using a device with internet access on any browser.
2.       Information is entered in order to create a personal profile
3.       Profile is set and ready for search engines their kids’ online acts.

Explain the relationship between the IT system and the social and ethical concern described in Criterion A
¥     The relation between the IT and the social and ethical concern is that every step that the girl used to create her account is a step that the women use to start knowing everything about the girl and start bullying the girl.

Social and ethical issues
      Cyber bully because the women is using MySpace as a social network to star bullying the girl, fraud because are creating fake profiles to know all the information about any user on social networks and awareness because it was on the conscious of the woman to bully the girl that later  committed suicide.

Evaluate one solution that addresses at least one problem identified in Criterion C.

The solution it could be to track the users activities and provide into law enforcement, so by knowing everything about the person who is bullying another person, you should tell what is happening and demand the case, so the person who is bullying is going to be in trouble.

Wednesday, June 5, 2013

PAPER 1 MULTIMEDIA

NEWS AGENCIES


1. a. DPI is the resolution of images.
    b. JPEG (bitmap), PNG (Vectorial) 
2. Because as more contibutions they accepted more rich is going to be the news.
3. Because they can have more things to publish in their news.

VIRTUAL ACTORS
1. a. mp4, AVI
    b. Loss of data, change of quality 
2.  - Get the picture
     - Processor analyses picture based on DPI
    - IDs which dots (pixels) are not relevant
    - Eliminates unrelevant data
    - Rearranges dots per inch
3. Advantages that is more cheaper, and faster
   Disadvantages that you can lose the data and the change of quality.

DRY CLEANING BUSINESS
1. PDF, RTF
2. Publishing to manipulate formats that are harder to do that carrying more thing to do and processing software for formats like, reports, letters that doesnt need a hard work to do it.
3. Becasue every computers has PDF, so everyone who wants to see a document that dpesnt has word, he or she can see it in PDF.
4. It is better to create paper promotional leaflets becasue it is easier for the people to know everything about the business, and if they have a doubt, consult on the website or even if you dont undestrand at all, go ask everything you want to know in the business.

Wednesday, May 22, 2013

Article


So This Is How It Begins: Guy Refuses to Stop Drone-Spying on Seattle Woman
Topic: Legal

Social and ethical concern related to the IT system
¥      Privacy because is affecting the privacy of the couple just by spying them, so they could know everything about the couple, by knowing that they can kidnap the couple, they are going to be in trouble and maybe go to jail.
Describe the relationship of one primary stakeholder to the IT system.
¥        Couple and the drone, because the couple has been spied by the drone so they could know everything about from the  couple, and the drone indirectly is also affected because they can be in trouble, and after getting judge they could go to jail.

The IT concepts and processes
Describe step by step, how the IT system works
1.       A remote control send signal to the drone to start flying.
2.       The drone is flying.
3.       The remote control send signal for the drone to go to the couple’s house.
4.       The drone is in the house of the couple.
5.       The remote control send signal to the drone to start spying the couple.
Explain the relationship between the IT system and the social and ethical concern described in Criterion A.
¥         The relationship is that every signal that the remote control sends to the drone is a step that is going to affect the couple. Spying is the main factor that cause the couple to feel like harassed because are invading their privacy, so is a point for the couple to demand what is happening them and maybe the one that is controlling the drone go to jail.

Social and ethical issues
Privacy, Surveillance, and Security because the drone is spying the couple and could know everything about the couple so that affect the privacy and surveillance could be the things that the drone needs to spy the couple, like the materials, and security because every people needs to be secure in everything but always to be alert but they need their own security and privacy.

Evaluate one solution that addresses at least one problem identified in Criterion C.
Demand what is happening and hire some agent to resolve the case from the couple, so the couple is going to know exactly where does the drone come from and from whom, to evaluate certain solutions to put in evidence. 

Saturday, May 18, 2013

Essay 4


How Companies Learn Your Secrets
Brief description
Basically this article talks about Target that is a store where everything you want you are going to find it, like electronics materials, etc.  Also talks about some brief periods in a person’s life when old routines fall apart and buying habits are suddenly in flux. One of those moments the moment, really — is right around the birth of a child, when parents are exhausted and overwhelmed and their shopping patterns and brand loyalties are up for grabs. But as Target’s marketers explained to Pole, timing is everything. Because birth records are usually public, the moment a couple have a new baby, they are almost instantaneously barraged with offers and incentives and advertisements from all sorts of companies. Which means that the key is to reach them earlier, before any other retailers know a baby is on the way. Specifically, the marketers said they wanted to send specially designed ads to women in their second trimester, which is when most expectant mothers begin buying all sorts of new things, like prenatal vitamins and maternity clothing. “Can you give us a list?” the marketers asked.

 IT system involved
Target, Pole and all the people because Pole and Target Company are talking about that the birth record are usually public, the moment when a couple has a new baby, they are almost instantaneously barraged with offers and incentives and advertisements from all sorts of companies. So target tells that if a person wants something in Target you are going to find what you want they have all.

Social and ethical significance
Reliability and integrity because they are talking about when a couple has a new baby, so they are thinking only where they can find and buy stuffs that has any offers for their new baby, Target said that they have what people need, so that’s integrity because people may go to target and when they buy there, so any people was involucrate and integrated to Target.

Areas of impacts  
Environmental because are talking about what does people make, when they have a new baby, so that refers to all the people. Psychological because they what does people think about having a baby, so they sale any products for mothers like prenatal clothes or any other things, so Target reduce the prices and every people would like to buy there so they are going to have more customers.

Friday, May 17, 2013

Essay 3


Eight-Year-Old on TSA Terrorist Watchlist Gets Frisked
Brief Description
This article talks a bout a guy that is 8 years old, that his name is Mikey Hicks that is a Cub Scout in Camden, New Jersey, is a frequent flyer who can’t seem to get a break because he shares a name with another Michael Hicks who has drawn suspicion from the Department of Homeland Security. This is because they have a list about 1600 people named Mikey Hicks so all the people named like this are receiving this treatment every time they fly.

IT System Involved
TSA are the ones involved because they have to investigate who is the guy that has drawn suspicion from the Department of Homeland Security and also the family from Mikey Hicks the eight year old guy.

Social and ethical significance
Surveillance because the TSA have to investigate who is the guy that has drawn the suspicion from the department of Homeland Security, also to start watching what does the family from Mikey Hicks do against this situation.

Areas of impacts
Cultural because is affecting a lot of people from the united states that are named Mikey Hicks so its affect the family from theirs. Legal because you can demand that they are watching and investigating about your case if you are the one that has drawn suspicion from the Department of Homeland Security.