Posts

Showing posts from October, 2024

DHCP

Image
DHCP This is an example of a DHCP enabled server. The server is assigned the first ip in this case (19.168.0.1) and it then uses the subnet mask (255.255.255.0) and the start ip address (192.168.0.3) to assign ip address for each of the different clients. This makes it significantly easier for people who need to setup large scale networks without assigning individual ips. HTML  &  DNS Services On the server you must be able to direct traffic to a specific location when requesting for a certain IP, in this case (192.168.0.1). I have set this up as a n A record, which is a fundamental type of DNS record that maps a domain name to the IP address of the computer hosting the domain. When a computer then requests the IP address the DNS service then redirects it to the HTTP service.

UK Digital Strategy 2022

UK Digital Strategy 2022 Digital foundations:  an update on the Plan for Digital Regulation and the supply-side offer to the digital economy. This includes a focus on: digital infrastructure, data, regulation and digital markets, and security. Ideas and intellectual property:  consolidation of the government’s work to support the innovation ecosystem, including in universities and the private sector. This builds on the Innovation Strategy with a specific focus on digital technology. Digital skills and talent:  highlights the UK government’s work to reform and improve our skills and talent provision for the digital economy. This includes: strengthening the digital education pipeline, increasing awareness of the pathways into digital occupations, work to develop an enhanced digital skills base, growing people’s access to digital skills through alternative routes, our work with the private and third sectors, and this government’s reforms to enable UK firms to recruit the bes...

Business Context Part 8

Banking Payments Credit Card: Credit cards work like mini loans you have a spending cap on a credit card. You must pay back everything you paid for using it by the end of the month otherwise you will accumulate debt. You accumulate debt when you don't pay back what you owe and the bank adds a percentage of the money you owe back on to the total amount, so you now owe the bank more money. Debt Card: Debt Cards are not like credit cards, instead of having a spending cap, you instead put your own money directly into your account, which you can then spend online Cash by mail: Very self-explanatory you send the amount that is owed in the mail Any payment made with vendor using Debt cards or credit cards, means the vendor will have to pay a fee to the credit or debt card provider. This is mostly likely Visa or Mastercard. Direct Debit: Mostly used for subscriptions as this is a form of recurring payment. As well as payment for rent  Direct Bank Transfer: This is where you manually type u...

Communication Channels

Communicating to a technical user When communicating to a technical user I would use more technical language that they will be able to understand. This makes it easier for the technical user to understand what I need them to do. For example i might say that to make a minecraft server you must port forward Communicating with a non-technical user When communicating to a non-technical user we need to be aware that most people are not going to be able to understand technical language so it is important to break down these technical aspects into easier to understand bite size chunks. For example i might say to make a minecraft server you need to go into your router and port forward, this means you are allowing people to access your minecraft server through that port you have assigned. Types of Communication Insecure Snapchat, Instagram, Gmail (any email), Facebook, Whatsapp or any service that doesn't explicitly say they have high encryption techniques can be considered insecure forms o...

Digital Inclusion

The Digital divide 1. One factor that is responsible the digital divide  Not being able to access infrastructure that provides access to the internet, for example living in a location without sufficient broadband or mobile coverage or being unable to afford a connection package .  Not having access to a device such as a smartphone, laptop or tablet which can connect to the internet. 2. A couple of impacts that of lack of technology. Means that people can't access valuable information. It can significantly effect education if a user is trying to learn something.

Business Context Part 7

The role of technical change management in digital operational integrity. Organisational change means a change, reorganization or replacement with respect to processes, methods, systems, operations, technologies and structure of an organisation. This change can be developmental transitional and transformational. Key terms Developmental:  Concerned with the development or someone, something or even both. Transitional:  The transition from one position, stage, state or concept to another. Transformational:  Producing a change or improvement in a situation. Preparation Any digital change can be a very complex process and therefore careful preparation is required to ensure that it is successful. The following are examples of the steps that should be taken by an organisation preparing for digital change. Choosing the appropriate digital change strategy to meet the goals of the organisation It is important for organisations to identify where digital change is needed and not inv...

Packet Switching

Switching Switching is the process where data is transferred from one device to another. Packet Switching  Packet switching is not connection oriented its connection-less. No session or channel is established prior to data transfer Data is broken down into individual packets that take different routes to the destination. This means they will not arrive in the correct order. Once the data packets have reached there destination the client will reassemble the packets in the correct order so that the data can be read. Packet switching uses bandwidth more efficiently as the bandwidth dynamically changes depending of the type of information being delivered. Data travels independently and will take different paths to the destination. There is no dedicated channel. There is no waiting for a channel to open.

How data travels on the internet from client to server back to client

Image
 For this example we are going to use the computer in the diagram. 

Hard Drive Manufacturing

Image
The Making of a hard drive On an assembly line for hard drives there cannot be any contamination. Air filtration keeps dust away from the hard drives being manufactured. The first part that is installed is called a voice coil magnet. As shown below Voice Coil Magnet   The are called voice coils because they operate on the same principals as load speakers. Next a robot places one of the hard drive disks in the motor base. Another robot places a round metal spacer at the center of the disc, again. A robot locks the discs into place with a stainless steel clamp. Video with more information

Networks - IP's and Packet tracers

Image
IP Address and Classes Different IP classes A - 255.0.0.0 B - 255.255.0.0 C - 255.255.255.0 D - 255.255.255.255                                                                                                                                     Public IP: Can be anything 32bit character. It is used to identify a network Private IP: Based on the networks subnet mask it is used to identify devices on a network Packet tracer A packet tracer is used to simulate a network and test if the connection will work. It can be used by business to check if there systems will work before they make any financial decisions.

The principles of digital inclusion, and legislation relating to equality and diversity

Digital inclusion and legislation relating to equality Why do organisations check for biases in data sets prior to using them? Organisations check for biases as this can skew results and lead unfair outcomes, which can then lead to ethical and moral issues surrounding the data. Why is it important for organsations to consider access to digital systems, when creating digital products and service?

Business Context Part 6

CAB Board Decision making 1. The change advisory board to meant to assess, priorities, authorize and schedule changes as part of the change control process. The CAB board should include at least one [person from each group affected by the changes. This would include non-IT groups as appropriate. 2. A request for change is a formal request to make changes to a product or system. The request for change is submitted to the CAB for consideration 3. The first stage is to have the request for change accepted for consideration by the CAB. Once it has been accepted for consideration by the CAB. Once it has been accepted for consideration it moves to the second phase. It is during the second phase that the appropriate people who have been included in the CAB look at the request and check for red flags. 4. How much time will it take, How will it affect the company, How much will it cost 5. A goal that has a start date and an end date, so that the task will be completed in a reasonable time. Exte...

Assessment Practice

 1. Discuss the psychological impact of cyber bullying on individuals. Cyber bullying can effect and individuals ability to interact with other people as they may potentially isolate themselves as they feel insecure about there life. 2. Explain how the unsafe or inappropriate use of digital technology can cause a reduction in physical activity. If you spend the majority of your time behind a desk, which is very common these days, you can develop RSI which can affect mainly your hands. As well as this bad posture is easy to develop which can cause people to develop back problems and other spinal issues later in life 3. Describe how digital technology in the bedroom can disrupt sleep patterns. If you are on your phone in bed the blue light coming from your phone can make your brain think its day time and release less melatonin and you won't be able to get to sleep. 4. Explain how digital technology can impact on society through changing behaviors. More people using computers to commu...

Physical Impacts of technology

Physical impacts Posture Back pain is usually due to poor postures when using digital tech, smartphones and computers are used consistently every day putting unnecessary strain on the muscles and ligaments of the spine and neck. people using devices tend to hunch their shoulders, this creates bad posture and leads to nerve pain, headaches, and arthritis, especially as people use computers for many hours in a day Eye strain CVS (computer vision syndrome) is the term used for people such as office workers who spend long periods of time in front of the computer, CVS includes headaches difficulties with focussing itchy, burning watery eyes, dry eyes, double/ blurred vision sensitivity to light Repetitive strain injury RSI is pain felt in the nerves, muscles and tendons caused by repetitive movement and overuse Display screen equipment (DSE) workstation checklist (hse.gov.uk)

Business Context C.E.1 Part 5

Image
  Belbin team roles Resource Investigator:  Uses their inquisitive nature to find ideas to bring back to the team. Teamworker:  Helps the team to gel, using their versatility to identify the work required and complete it on behalf of the team. Co-ordinator:  Needed to focus on the team's objectives, draw out team members and delegate work appropriately. Plant:  Tends to be highly creative and good at solving problems in unconventional ways. Monitor Evaluator:  Provides a logical eye, making impartial judgement where required and weighs up the team's options in a dispassionate way. Specialist:  Brings in-depth knowledge of a key area to the team. Shaper:  Provides the necessary drive to ensure that the team keeps moving and does not lose focus or momentum. Implementer:  Needed to plan a workable strategy and carry it out as efficiently as possible. Completer Finisher:  Most effectively used at the end of tasks to polish and scrutinise the...