Friday, July 26, 2013

Paper 1 ( BUSINESS & EMPLOYMENT)

Customers


A.
1. Is the place where a retail transaction is completed. It is the point at which a customer makes a payment to the merchant in exchange for goods or services.
2. Firtly the guy give the credit card, then the cashier pass the credit car into the POS, so the POS send to the database all the information from the credit card and check if its has money or not, after that its returns a message saying if has money or not and the POS accept the credit card.
B.
1. A customer loyalty program can be easy to implement.
2.A customer loyalty program could increase your sales.
3.Customer loyalty programs don't have to be limited to individual businesses.
C.
1. RFID chips are basically tiny two-way radios that are so small they can fit inside a credit card, an article of clothing, the inside of a shampoo bottle cap, etc.The chip, essentially a transponder, carries identifying data and can be queried and read, or “sniffed,” at a distance. RFID technology is now in use in credit cards, ATM cards, “enhanced” driver’s licenses, highway toll networks, and inventory tracking systems.
Small Business


1.  It can be made by copying the card to another blank card and to create or steal the magnetic line.
2.  Two actions he can make is to make it http or to pay to have more cookies in the page
3.  It can help in the speed of the page, it can carry more users and it is easily opened.
4. The payment is via credit card obiously but they cannot steal your magnetic line in your credit card beacuse it has a policy that revices everything they do with the cards.
Employee Monitoring

1. Key logger is the action of recording (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.
2. With the internet organization can connect directly with the general public. Opportunities range from giving away basic product information to automatically updating or patching retail software. Many businesses also conduct retail operations online. 
With the intranets organizations often use internet technologies to facilitate operations within the organization.
With the extranets organizations may use these same internet technologies to connect with their business partners to facilitate supply chain management, help manage projects, manage accounts, or provide advanced technical support.
3. Make it as secure as possible, Assign an administrator to manage the internal site
4. An acceptable use policy (AUP), also known as an acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager of a network, website or large computer system that restrict the ways in which the network, website or system may be used.
5. Logical Decisions also provides consulting and training to help you get the most out of the software and to help you find creative and acceptable solutions to your most difficult decisions.

PAPER 1 HEALTH

Electronic Medical Record
1.- A unique identifier, often an integer, that labels a certain row in a table of a relation-al database
.2. Health information exchange is a work in progress, but the first step is transitioning from paper to electronic records (computer files). Health care providers of all sizes—from a small practice to a large medical center—must purchase an electronic medical records system (EMR) to computerize their records. The computerized records are called electronic health records (EHRs). Once it has electronic records, the provider will likely contract with an HIE or HIO so it can exchange medical data with other providers. Providers may directly request records from other providers, called a “point-to-point” solution. But having an HIE or HIO in the middle to facilitate the transaction seems to have become the standard practice.
3. It is “the right of individuals to keep information about themselves from being disclosed to others; the claim of individuals to be let alone, from surveillance or interference from other individuals, organizations or the government”. The information that is shared as a result of a clinical relationship is consideredconfidential and must be protected.
Project Gerhome
1. -Is an electronic device that records data over time or in relation to location either with a built in instrument or sensor or via external instruments and sensors. Increasingly, but not entirely, they are based on a digital processor (or computer). 
- Oximetry Sensor and Pressure sensors
2. Video monitoring devices fitted in the person's house, allow nursing staff to check in at any time. An amount of privacy is traded off for freedom to stay at home. To help soften the blow, and to aid telehealth-care, a monitor/terminal system fitted in the house, allows doctors, specialists, and friends & family to 'call in' and check up on the person via videoconferencing. With the case of family, who often live across the country, the system reinforces family ties. As far as monitoring goes, everything is checked, from electricity consumption, movement, to chair and bed occupation, the aim is to determine a resident's "normal" behavior, then monitor for any deviation, that can then be analyzed by the software, and flagged when it deviates too much from norm. The system can detect the slight changes in natural rhythms that can give doctors and carers early warning of possible trouble ahead.
3. To a great extent because there is no person watching the elderly person in the house, they can see everything what happens in other places, because it sends signals from what is happening.