Posts

Showing posts from January, 2025

Evaluation Tools

Evaluation Tools Quantitative - Tools used to measure how many, how much, how big and so on. Qualitative - Tools used to measure things like awareness, attitude, appreciation characteristics and qualities. Marketing Analytics Tools Tools that collect and measure marketing data used to improve performance. Could be used to improve the performance of a website, app, etc Search analytics The use of data to research particular customer interactions. It is used by website owners to review their performance on search engines and improve their presence.  Social Media analytics This is the reviewing of data in relation to social media conversations -  what the conversations mean and how they can be used. This enables businesses to look at how their social media activities have influenced their business results. Financial analytical tools These are used to evaluate and interpret an organisation's financial status, and are an efficient way to ensure the organisation receives a good leve...

Digital Tools in Business

Image
Presentation Tools Dashboards: Display/Monitor KPIs - A set of quantifiable measurements used to assess a company's overall and long-term performance is referred to as key performance indicators. Management information Business intelligence Digital infographics: Posters Leaflets Slide/page presentation software: Product demo Sales meetings Training Promotion and marketing Graphs: Sales trends Market comparisons Agile Methodologies The agile methodology is a style of project management that divides a project into phases. Agile Processes are adaptable. This is to allow developers to construct software in whatever method best suits the situation Scrum Scrum methodology is based on a set of extremely specific procedures and roles that must be followed throughout the development process. It's a flexible methodology that regards product team members that use the 12 agile principles in a context that everyone agrees on. Kanban Kanban is one of the most basic frameworks for project man...

Project Management Tools

Image
  Examples of Software to use these tools on Trello - Kanban Chart  Manage Your Team’s Projects From Anywhere | Trello Microsoft - Gantt Charts/Project/Collaboration  Project Management Software | Microsoft Project Github - Gantt Charts/Project/Collaboration  GitHub · Build and ship software on a single, collaborative platform · GitHub Milanote -  Mood boards  Milanote - the tool for organizing creative projects
Criminal Law -  International International laws cover crimes committed outside the UK. A crime carried out in a country will be subject to the laws of that country Cross Border cooperation between security services ensures that extraditions can take place, for persons who committed crimes outside the UK and are currently living in the UK Industry standards and professional codes of conduct 1. Why are industry standards in place? Standards are agreed ways of doing something. They are written down as a set of precise criteria so they can be used as rules, guidelines or definitions. They are mainly in place to create simplicity and ease of use 2. How many national standards bodies belong to the ISO There are 160 national standards bodies as members. 3. Which category of standards is focused on the safety of information assets ISO/IEC 27001 - Stipulates and defines the specifications for the implementation of an information security management system 4. Identify two of the guiding pri...

Criminal Law, Industry standards and professional codes of conduct in Context

The importance of adhering to criminal law Maintains order Resolves disputes Protects individuals Safeguards civil liberty Tasks Penalties for breaches of Health and safety work act: The penalties include a unlimited fine and up to 2 years in prison Computer Misuse Act 1990 The Maximum sentence for breaking the computer misuse act is life in prison, but most of the time you jus get a warning. Waste Electrical and Electronic Equipment Directive The maximum penalty for not following the WEE is an unlimited fine Safeguarding Civil Liberties ( Based Laws ) These laws aim to protect civil liberties Investigatory Powers Act This act defines circumstances under which surveillance and interception can be used Human Rights Act Article 8 of the HRA where it is written defines the respect for private and family life, home correspondent Page 207 Task Test Yourself 1. What are the two penalties that can be given under the DPA/GDPR Higher Maximum - The equivalent in sterling 20 million euros or 4% o...

Homework Due 30/1/25

1. Three essential features for presentation software: A text editor with custom editing A method for inserting editing and resizing graphics  A method to organize and display the slideshow sequentially 2. How presentations can be used in sales meetings They can be used to discuss opportunities for the sales team to discuss current sales, new products and there information which enables them to carry out their job roles effectively.  3. Difference between an info-graphic poster and a info-poster A poster is a subjective and focuses on qualities and storytelling as opposed to quantifiable data. An info graphic focuses on the quantifiable data and translates it into complex data visualizations. 4. Discuss how dashboards are used within a business context. Dashboards are used to track key performance indicators and metrics and so on that are relevant to the business. It provides a visualization of complex data. This makes it easier for the user to establish current performance qu...

ESP Analysis

Image
ESP Grade A Analysis 1st - 1723 is a standard port number for a VPN on more general basis. Using a 1720 port is more commonly used for calling services. 2nd - DENY allows or denies all the traffic from a network IP address. It needs to be at the bottom of the table or the top. It will create conflict if it is in the middle (traffic lose). 3rd - UDP is changed to TCP on the VPN as the traffic must be checked whether or not it has been received. UDP does not check whether the traffic has been received or not. 4th - The change makes perfect sense as pointing to a random workstation would mean none of the services would work. The services are running on the server so they need to be pointing at the server. How to make it better   Add external IP’s, this should be the same as the internal IP    Change the port of POP3 from 143 to 110 due to 143 being the port for IMAP.   Only use wildcards if you need to as they leave the network exposed as any external IP could...

Data Protection Act 2018

Data Protection Act 2018 According to GOV.UK there are several principles of the Data Protection Act: used fairly, lawfully and transparently used for specified, explicit purposes used in a way that is adequate, relevant and limited to only what is necessary accurate and, where necessary, kept up to date kept for no longer than is necessary handled in a way that ensures appropriate security, including protection against unlawful or unauthorized processing, access, loss, destruction or damage The penalties for breaking the Data Protection Act and being a naughty boy include: Up to £10 million or 2% of annual global turnover, whichever is greater Up to £20 million or 4% of annual global turnover, whichever is greater A data subject references any living individual whose personal data is collected, stored, or processed by an organisation. The rights a data subject has include: Right to Access Right to Rectification Right to Erasure Right to Data Portability Right to Object GDPR GDPR - Leg...

Human Rights Act 1998

Human Rights Act 1998 The 12 articles of the human right legislation are in place to make sure that there is a baseline way that people live their lives. This includes being paid correctly, not being forced to be slaves, having food, water, clothes and medicine etc.   Public authorities are allowed to interfere with the right to a private life if it will help with something like an investigation. This can include something to do with national security or public security. Generally, the authority will make an assessment on whether it is safe to inform you that an investigation into you is taking place.  

Regulations: Waste Electrical and Electronic Equipment

Examples of WEE compliance regulations carried out by WEE companies? Local landfill having electronics areas, Battery bins, E-Waste Recycling Centers. The responsibilities of Businesses? Businesses must make sure that the disposal of electronic devices is kept separate from other devices Agencies Producers have to register with to work in the UK Environment Agency (for applicants based in England)  Natural Resources Wales (for applicants based in Wales) Northern Ireland Environment Agency (for applicants based in N Ireland)  Scottish Environmental Protection Agency (for applicants based in Scotland) Labelling Requirements Label ALL EEE products with the crossed-out wheelie bin symbol to indicate that the product should not be disposed of in general waste Reporting Obligations Regularly report the total weight of EEE placed on the UK market, either annually or quarterly. If you have more then 5 tons of waste then you must report as being a large producer if you have less then t...
Task 1    I agree with the first decision because the process described is not very technical and does lack any technical skills. They could have told the person to do other options to allow them to reset their settings easier. It's also aimed to a non-technical audience instead of a technical audience who would be more willing to undertake more complicated ways of coming to a resolution.    I agree with the mark scheme because they are using very basic language and understanding when they are describing. If I was in the scenario, I would lay it out to start at one point and then keep moving through the other trouble shooting methods until one of them works.  Task 2   I agree with what the examiner said because the student seemed to be asking questions towards the end about what has already been asked and is not showing any clear understanding of what is being asked . With the email, the one that is being sent to the business manager is more suited to a tec...

Excel

Image
Functions =SUM - For adding, subtracting, multiplying and dividing =MIN - For finding the minimum value in a dataset =MAX - For finding the maximum value in a dataset =AVERAGE - For finding the average value in a dataset

Copyright Designs and Patent Act

Difference between Trademark, Copyright and Patents Trademark A trademark can be a phrase, word or design that identifies your company and its goods or services. Patent A patent is a granted property right to the creator(s) of a new, unique and useful invention, discovery or process. Copyright A copyright protects original works of authorship including songs, books, movies, articles and much more. The key is that the work must exist on a physical or digital medium, such as paper, film or a digital file. CC BY This license enables reusers to distribute, remix, adapt, and build upon the material in any medium or format, so long as attribution is given to the creator. The license allows for commercial use. CC BY includes the following elements: CC BY-SA This license enables reusers to distribute, remix, adapt, and build upon the material in any medium or format, so long as attribution is given to the creator. The license allows for commercial use. If you remix, adapt, or build upon the ma...

Diagrams for Fault Analysis

Image
Fishbone diagrams end with the fault at the "head" of the fish. The model introduced by Ishikawa (also known as the fishbone diagram) is considered one of the most robust methods for conducting root cause analysis. This model uses the assessment of the 6Ms as a methodology for identifying the true or most probable root cause to determine corrective and preventive actions. Event tree analysis start with the fault at the beginning. The Fault Tree Analysis uses Boolean logic to arrive at the cause of a problem. It begins with a defined problem and works backward to identify what factors contributed to the problem using a graphical representation called the Fault Tree. It takes a top-down approach starting with the problem and evaluating the factors that caused the problem.

ESP Advice

Advice Root cause analysis Root cause analysis (RCA) is the process of discovering the root causes of problems in order to identify appropriate solutions   Troubleshooting Framework Test plan Identifity how to fix the problem Troubleshooting Tools
IPconfig Troubleshooting IPconfig is used to identitfy the local ip address of a system. We used to troubleshoot two systems that had the same IP address.