Friday, July 26, 2013

Paper 1 ( BUSINESS & EMPLOYMENT)

Customers


A.
1. Is the place where a retail transaction is completed. It is the point at which a customer makes a payment to the merchant in exchange for goods or services.
2. Firtly the guy give the credit card, then the cashier pass the credit car into the POS, so the POS send to the database all the information from the credit card and check if its has money or not, after that its returns a message saying if has money or not and the POS accept the credit card.
B.
1. A customer loyalty program can be easy to implement.
2.A customer loyalty program could increase your sales.
3.Customer loyalty programs don't have to be limited to individual businesses.
C.
1. RFID chips are basically tiny two-way radios that are so small they can fit inside a credit card, an article of clothing, the inside of a shampoo bottle cap, etc.The chip, essentially a transponder, carries identifying data and can be queried and read, or “sniffed,” at a distance. RFID technology is now in use in credit cards, ATM cards, “enhanced” driver’s licenses, highway toll networks, and inventory tracking systems.
Small Business


1.  It can be made by copying the card to another blank card and to create or steal the magnetic line.
2.  Two actions he can make is to make it http or to pay to have more cookies in the page
3.  It can help in the speed of the page, it can carry more users and it is easily opened.
4. The payment is via credit card obiously but they cannot steal your magnetic line in your credit card beacuse it has a policy that revices everything they do with the cards.
Employee Monitoring

1. Key logger is the action of recording (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.
2. With the internet organization can connect directly with the general public. Opportunities range from giving away basic product information to automatically updating or patching retail software. Many businesses also conduct retail operations online. 
With the intranets organizations often use internet technologies to facilitate operations within the organization.
With the extranets organizations may use these same internet technologies to connect with their business partners to facilitate supply chain management, help manage projects, manage accounts, or provide advanced technical support.
3. Make it as secure as possible, Assign an administrator to manage the internal site
4. An acceptable use policy (AUP), also known as an acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager of a network, website or large computer system that restrict the ways in which the network, website or system may be used.
5. Logical Decisions also provides consulting and training to help you get the most out of the software and to help you find creative and acceptable solutions to your most difficult decisions.

PAPER 1 HEALTH

Electronic Medical Record
1.- A unique identifier, often an integer, that labels a certain row in a table of a relation-al database
.2. Health information exchange is a work in progress, but the first step is transitioning from paper to electronic records (computer files). Health care providers of all sizes—from a small practice to a large medical center—must purchase an electronic medical records system (EMR) to computerize their records. The computerized records are called electronic health records (EHRs). Once it has electronic records, the provider will likely contract with an HIE or HIO so it can exchange medical data with other providers. Providers may directly request records from other providers, called a “point-to-point” solution. But having an HIE or HIO in the middle to facilitate the transaction seems to have become the standard practice.
3. It is “the right of individuals to keep information about themselves from being disclosed to others; the claim of individuals to be let alone, from surveillance or interference from other individuals, organizations or the government”. The information that is shared as a result of a clinical relationship is consideredconfidential and must be protected.
Project Gerhome
1. -Is an electronic device that records data over time or in relation to location either with a built in instrument or sensor or via external instruments and sensors. Increasingly, but not entirely, they are based on a digital processor (or computer). 
- Oximetry Sensor and Pressure sensors
2. Video monitoring devices fitted in the person's house, allow nursing staff to check in at any time. An amount of privacy is traded off for freedom to stay at home. To help soften the blow, and to aid telehealth-care, a monitor/terminal system fitted in the house, allows doctors, specialists, and friends & family to 'call in' and check up on the person via videoconferencing. With the case of family, who often live across the country, the system reinforces family ties. As far as monitoring goes, everything is checked, from electricity consumption, movement, to chair and bed occupation, the aim is to determine a resident's "normal" behavior, then monitor for any deviation, that can then be analyzed by the software, and flagged when it deviates too much from norm. The system can detect the slight changes in natural rhythms that can give doctors and carers early warning of possible trouble ahead.
3. To a great extent because there is no person watching the elderly person in the house, they can see everything what happens in other places, because it sends signals from what is happening.

Wednesday, June 12, 2013

Article 1

How dangerous are networking sites?
Topic: Legal

Social and ethical concern related to the IT system
¥     Digital citizenship & MySpace because the 13- year-girl has her account on my space and a woman is using MySpace to bully the 13-year-girl so after the woman was bullying the girl, who later committed suicide.

Describe the relationship of one primary stakeholder to the IT system
¥         MySpace because is the social network used to bully the girl, also the social network users because they are prone to be bullied and even the social networks because in every social network this can happen.

The IT concepts and processes 
1.       Account is created using a device with internet access on any browser.
2.       Information is entered in order to create a personal profile
3.       Profile is set and ready for search engines their kids’ online acts.

Explain the relationship between the IT system and the social and ethical concern described in Criterion A
¥     The relation between the IT and the social and ethical concern is that every step that the girl used to create her account is a step that the women use to start knowing everything about the girl and start bullying the girl.

Social and ethical issues
      Cyber bully because the women is using MySpace as a social network to star bullying the girl, fraud because are creating fake profiles to know all the information about any user on social networks and awareness because it was on the conscious of the woman to bully the girl that later  committed suicide.

Evaluate one solution that addresses at least one problem identified in Criterion C.

The solution it could be to track the users activities and provide into law enforcement, so by knowing everything about the person who is bullying another person, you should tell what is happening and demand the case, so the person who is bullying is going to be in trouble.

Wednesday, June 5, 2013

PAPER 1 MULTIMEDIA

NEWS AGENCIES


1. a. DPI is the resolution of images.
    b. JPEG (bitmap), PNG (Vectorial) 
2. Because as more contibutions they accepted more rich is going to be the news.
3. Because they can have more things to publish in their news.

VIRTUAL ACTORS
1. a. mp4, AVI
    b. Loss of data, change of quality 
2.  - Get the picture
     - Processor analyses picture based on DPI
    - IDs which dots (pixels) are not relevant
    - Eliminates unrelevant data
    - Rearranges dots per inch
3. Advantages that is more cheaper, and faster
   Disadvantages that you can lose the data and the change of quality.

DRY CLEANING BUSINESS
1. PDF, RTF
2. Publishing to manipulate formats that are harder to do that carrying more thing to do and processing software for formats like, reports, letters that doesnt need a hard work to do it.
3. Becasue every computers has PDF, so everyone who wants to see a document that dpesnt has word, he or she can see it in PDF.
4. It is better to create paper promotional leaflets becasue it is easier for the people to know everything about the business, and if they have a doubt, consult on the website or even if you dont undestrand at all, go ask everything you want to know in the business.

Wednesday, May 22, 2013

Article


So This Is How It Begins: Guy Refuses to Stop Drone-Spying on Seattle Woman
Topic: Legal

Social and ethical concern related to the IT system
¥      Privacy because is affecting the privacy of the couple just by spying them, so they could know everything about the couple, by knowing that they can kidnap the couple, they are going to be in trouble and maybe go to jail.
Describe the relationship of one primary stakeholder to the IT system.
¥        Couple and the drone, because the couple has been spied by the drone so they could know everything about from the  couple, and the drone indirectly is also affected because they can be in trouble, and after getting judge they could go to jail.

The IT concepts and processes
Describe step by step, how the IT system works
1.       A remote control send signal to the drone to start flying.
2.       The drone is flying.
3.       The remote control send signal for the drone to go to the couple’s house.
4.       The drone is in the house of the couple.
5.       The remote control send signal to the drone to start spying the couple.
Explain the relationship between the IT system and the social and ethical concern described in Criterion A.
¥         The relationship is that every signal that the remote control sends to the drone is a step that is going to affect the couple. Spying is the main factor that cause the couple to feel like harassed because are invading their privacy, so is a point for the couple to demand what is happening them and maybe the one that is controlling the drone go to jail.

Social and ethical issues
Privacy, Surveillance, and Security because the drone is spying the couple and could know everything about the couple so that affect the privacy and surveillance could be the things that the drone needs to spy the couple, like the materials, and security because every people needs to be secure in everything but always to be alert but they need their own security and privacy.

Evaluate one solution that addresses at least one problem identified in Criterion C.
Demand what is happening and hire some agent to resolve the case from the couple, so the couple is going to know exactly where does the drone come from and from whom, to evaluate certain solutions to put in evidence. 

Saturday, May 18, 2013

Essay 4


How Companies Learn Your Secrets
Brief description
Basically this article talks about Target that is a store where everything you want you are going to find it, like electronics materials, etc.  Also talks about some brief periods in a person’s life when old routines fall apart and buying habits are suddenly in flux. One of those moments the moment, really — is right around the birth of a child, when parents are exhausted and overwhelmed and their shopping patterns and brand loyalties are up for grabs. But as Target’s marketers explained to Pole, timing is everything. Because birth records are usually public, the moment a couple have a new baby, they are almost instantaneously barraged with offers and incentives and advertisements from all sorts of companies. Which means that the key is to reach them earlier, before any other retailers know a baby is on the way. Specifically, the marketers said they wanted to send specially designed ads to women in their second trimester, which is when most expectant mothers begin buying all sorts of new things, like prenatal vitamins and maternity clothing. “Can you give us a list?” the marketers asked.

 IT system involved
Target, Pole and all the people because Pole and Target Company are talking about that the birth record are usually public, the moment when a couple has a new baby, they are almost instantaneously barraged with offers and incentives and advertisements from all sorts of companies. So target tells that if a person wants something in Target you are going to find what you want they have all.

Social and ethical significance
Reliability and integrity because they are talking about when a couple has a new baby, so they are thinking only where they can find and buy stuffs that has any offers for their new baby, Target said that they have what people need, so that’s integrity because people may go to target and when they buy there, so any people was involucrate and integrated to Target.

Areas of impacts  
Environmental because are talking about what does people make, when they have a new baby, so that refers to all the people. Psychological because they what does people think about having a baby, so they sale any products for mothers like prenatal clothes or any other things, so Target reduce the prices and every people would like to buy there so they are going to have more customers.

Friday, May 17, 2013

Essay 3


Eight-Year-Old on TSA Terrorist Watchlist Gets Frisked
Brief Description
This article talks a bout a guy that is 8 years old, that his name is Mikey Hicks that is a Cub Scout in Camden, New Jersey, is a frequent flyer who can’t seem to get a break because he shares a name with another Michael Hicks who has drawn suspicion from the Department of Homeland Security. This is because they have a list about 1600 people named Mikey Hicks so all the people named like this are receiving this treatment every time they fly.

IT System Involved
TSA are the ones involved because they have to investigate who is the guy that has drawn suspicion from the Department of Homeland Security and also the family from Mikey Hicks the eight year old guy.

Social and ethical significance
Surveillance because the TSA have to investigate who is the guy that has drawn the suspicion from the department of Homeland Security, also to start watching what does the family from Mikey Hicks do against this situation.

Areas of impacts
Cultural because is affecting a lot of people from the united states that are named Mikey Hicks so its affect the family from theirs. Legal because you can demand that they are watching and investigating about your case if you are the one that has drawn suspicion from the Department of Homeland Security.

Essay 2


NASA to encrypt data after its latest laptop loss
Brief description
This news is about that a laptop and documents were stolen from a locked vehicle of one of its employees at NASA headquarters in Washington DC. The machine was password protected, but the agency acknowledged that the information might still be accessible to hackers since it was not encrypted. As a result, NASA has warned its workers to watch out for bogus messages.

IT System Involved
NASA is the one that is involved because are the ones that are suffering because some important documents and laptop has been stolen from a locked vehicle and the machine was password protected but is not enough protected so the hackers can unscramble very easy this machine and have access to it.

Social and ethical significance
Privacy and anonymity because by the stolen laptop and the documents the hackers may know a lot of important things from the NASA and also it could be security because the NASA need to improve their password protected for the hacker to be difficult to access to it.

Areas of impacts
Legal and political because the laptop and the documents were stolen the NASA should demand that and the hackers are going to be affected just because they were doing things that they don’t have to be doing. 

Thursday, May 16, 2013

Essay 1


More Privacy Perils: Facebook Data Is Greater Than The Sum Of Your Likes

Brief description
This article talk about the app of facebook that, in more like you gave to a page talking about rarely topics (related to gays) in the case of religion is going to think that the person that have liked the page may be gay or not. Creates a lot of stereotypes in the people involved.

IT system involved
The ones that are involved in this privacy peril are all the users from facebook because are the ones that the other people may think they are gay just because  they are giving like to any page, they create a lot of stereotype on the person affected.

Social and ethical significance
Privacy and anonymity because every people can see what things you liked on facebook and what is the meaning of the thing you liked, and because of that they can start to create stereotype from your own. Intellectual property because they are criticizing about what you think from the page you liked with the stereotypes and that is and effect on what you think about the page you liked.

Areas of Impacts
Psychological and morally may be the area affected just because they are thinking you are gay and that is against the religion and against the people morality. Because you just liked a page about that, but doesn’t mean you are gay because of that, Stereotyping is really bad in this case, because they are creating a bad looking to the people.

Wednesday, May 15, 2013

Database (Case 2)




  • At least I learned how to create tables, forms, relations, etc. With any information we know how to distinguish a name, a title, a number and what categories owed to everything. So we made an exercise that we nee dto create a database for the suppliers of all the information of some animals.

  • My conclusion is that this program is really imporotant to know how to manage becasue we can use it for the life, and to do works on there that are importants for us, and also is important because some company can tell you to create a database with any information they have, so your are allowed and able to do it without any complication.

Wednesday, April 24, 2013

Article 3


Global internet slows after 'biggest attack in history'
Brief description of the situation
The internet around the world has been slowed down in what security experts are describing as the biggest cyber-attack of its kind in history.
Key stakeholders and IT system involved
Five national cyber-police-forces, Spamhaus, Cyberbunker, Sven Olaf Kamphuis.
Related issues of social and ethical significance
Globalization and cultural diversity because all the people are affected by the decreasing of the internet last years. There is a row between a spam-fighting group and hosting firm has sparked retaliation attacks affecting the wider internet.
Areas of social Impacts
Economic because attacks can break down the wall street and other economic business. Political because can cause confusion between governments to know who is attacking.
Evaluating the impacts and conclusion 
The impact is serious because this problem can continue because like you know the technology is improving every single day and the people start to improve their knowledge about anything. My conclusion is that all the companies of security need too improve their software to avoid the spam or some other impacts.

Article 2


Brief description of situation
With mind control, a monkey fed itself marshmallows with a robotic arm. The Lancet describes how a 52-year-old woman a quadriplegic for nine years. Has spent the past 10 months learning to maneuver the robotic arm with her thoughts, allowing her to pick up objects of various shapes, shake hands, and even grasping a chocolate bar and taking a bite. Researchers made technological advances in the past 10 months
Key stakeholders and IT system involve
A monkey that fed itself marshmallows with a robotic arm, The Pitt professor of neurobiology described how the mind-controlled arm works. Jan Scheuermann used the arm and hand to consume the entire chocolate bar.
Related issues of social and ethical significance
People and machines. Because the people creates a computer microchip brain that can control all your body. Also create a robotic arm that you control about your mind.
Areas of social impact
Health. Because you put a bet on a human brain to control, so it is also a robotic arm that can be controlled by the brain, the chip can do damage as this in a very important part of the body.
Evaluating the impacts and conclusion
this is serious because they can manage you in any way. my conclusion is that the responsible from this is the university of pitsburg , the consequences are that they know every state of emotion that you could have just by the chip, is a really bad thing because you are person and you are free in anything you want to do and you dont need to be controlled that a legal problem you can demand the person that insert you taht chip.

Article 1


How hackers can switch on your webcam and control your computer
Brief Description
There was a malicious virus known as Remote Administration tools that it used by hackers to switch on your webcam and start to control any machine without your knowledge. You cannot see what they are doing with your machine.
Key stakeholders and IT system involved
The people involved in this article are the hackers the ones that control the computers, Alex, the security manager from the software company.
Related issues of social and ethical significance
Privacy and anonymity because the hackers can control your computer, and also they can explore all your documents that you don’t want anyone to know about it.
Areas of social impact
Legal because once the hackers enter to your computer they can know all your private things that you don’t one anyone to know it and that makes you to investigate who did that, so you need to follow some rules.
Evaluating the impacts and conclusion
I think that is a serious impact because a lot of they can pass until you know who hack your computer. My conclusion it could be to improve the anti-virus for the computers, so that generate a better security to it. 

Case 1


1.The items of hardware that will need to be purchased are a router or depends on the connection you want to have, you buy something faster than a router, an internet connection via mobile.
2. The items of software that will need to be purchased are: you will need an antivirus if you want to have internet acces beacuse you never know if theres gonna be a virus in the page you are going to navigate or search for information, a good firewall, a navigator like google chrome or firefox.

3.
4.
ANTIVIRUS A ROUTERAN INTERNET CONNECTIONA NAVIGATORA GOOD FIREWALL
IT CAN BEIT CAN COSTVIA MOBILE, IT CAN COSTIT CAN BE FREEIT CAN COST FROM
FREE.FROM 1000Q TOFROM 400Q TO 700Q MONTHLYOR COST LIKE50$ TO 200$ DEPENDING
(PANDA3000Q.DEPENDING ON NAVIGATION.20$.WHICH YOU GET.
CLOUD)(SPEED TOUCH)(CLARO INTERNET ACCESS)(GOOGLE CHROME)AVAST FIREWALL.
5. Its a peer-to-peer connection the one we are going to use for this type of connection and we can use a type of topology that is called a star formation that i can use the 6 or 5 spaces to connect the mobiles, desktop computer and the cellphones.

Types of Networks

Network
Diagram (image)
Brief Description
Main components
Main difference with the rest
Benefits (at least 2)
Local Area Network
http://maribeta.galeon.com/imagen.jpg
Is a computer network that interconnects computers in a limited area such as a home, school, computer laboratory, or office building using network media.
Network adapter, Network medium, cable connectors, power supply, Hub/switch/router, network software
Is a computer network that interconnects computers in a limited area such as a home, school, computer laboratory, or office building using network media.
1. Centralized IT administration
2. Reduced operating costs
Wireless LANs
http://t2.gstatic.com/images?q=tbn:ANd9GcQZdFVNXOK1gf4ru08pwSdUWmnUYaCuN2qj_t0OyI0HjAfbMQtA
Links two or more devices using some wireless distribution method (typically spread-spectrum or OFDM radio), and usually providing a connection through an access point to the wider Internet.
The mix of location based services and wireless LAN is creating many possibilities for improving security and enabling location aware advertising because of easier installation and mobility.
Links two or more devices using some wireless distribution method (typically spread-spectrum or OFDM radio), and usually providing a connection through an access point to the wider Internet.
1.Installation Speed and Simplicity
2. Reduced Cost-of-Ownership
Personal Area Networks
http://www.techfuels.com/attachments/general-internet-terms/1086d1206444362-personal-area-network-personal-area-network.jpg
Is a computer network used for communication among computerized devices, including telephones and personal digital assistants.
PANs can be used for communication among the personal devices themselves (intrapersonal communication), or for connecting to a higher level network and the Internet (an uplink).
Is a computer network used for communication among computerized devices, including telephones and personal digital assistants.
1. Benefits from extremely short range.
2. Replacing the cables between a computer and its peripherals, so minimal range is desired to avoid interference with other nearby computers.
Metropolitan Area Network
http://t1.gstatic.com/images?q=tbn:ANd9GcSai7iYOgavscyatLzPnsDwzt2mRxtPSJcHeaPu2wVwyXWpOHpoVQ
Is a computer network that usually spans a city or a large campus.
Usually interconnects a number of local area networks (LANs) using a high-capacity backbone technology, such as fiber-optical links, and provides up-link services to wide area networks (or WAN) and the Internet.
Is a computer network that usually spans a city or a large campus.
1. The bandwidth (potential speed) of the connecting links.
2. Some installations allow multiple users to share the same high-speed Internet connection
Wide Area Network
LAN WAN scheme.svg
Is a network that covers a broad area (i.e., any telecommunications network that links across metropolitan, regional, or national boundaries) using private or public network transports.
Relay data among employees, clients, buyers, and suppliers from various geographical locations. In essence, this mode of telecommunication allows a business to effectively carry out its daily function regardless of location.
Is a network that covers a broad area (i.e., any telecommunications network that links across metropolitan, regional, or national boundaries) using private or public network transports.
1. used by corporations or organizations to facilitate the exchange of data between their computers in dispersed offices.
2. All the computers on the network are connected to central database on the server.
Storage Area Network
http://ticostyle.files.wordpress.com/2010/03/san.jpg
Is a dedicated network that provides access to consolidated, block level data storage.
used to make storage devices, such as disk arrays, tape libraries, and optical jukeboxes, accessible to servers so that the devices appear like locally attached devices to the operating system. A SAN typically has its own network of storage devices that are generally not accessible through the local area network by other devices.
Is a dedicated network that provides access to consolidated, block level data storage.
1. Can be easier to manage than other storage systems. By consolidating information into one easily accessible place
2. Increased efficiency.
Virtual Private Network
http://upload.wikimedia.org/wikipedia/commons/thumb/0/00/Virtual_Private_Network_overview.svg/330px-Virtual_Private_Network_overview.svg.png
Extends a private network across public networks like the Internet.
It enables a host computer to send and receive data across shared or public networks as if they were an integral part of the private network with all the functionality, security and management policies of the private network.
Extends a private network across public networks like the Internet.
1.Is a private network
2.All the information keeps in your documents, just for you.
Virtual LAN