School-Work:
SEMESTER (2)
1- What is the Data Protection Act?
According to Wikipedia, the Data Protection Act 1998 (DPA) is a United Kingdom Act of Parliament which defines UK law on the processing of data on identifiable living people. It is the main piece of legislation that governs the protection of personal data in the UK.
2- Who is the information commissioner?
In the UK, the ICO is a regulatory office or part of parliament that deals with the DPA. Its mission is uphold common rights and spread information and awareness.
3- Who is the data controller?
A data controller is a person who specifies the amount of information that they would like to share and their purpose according to their wish.
4- Who is the data subject?
An individual who is a subject of personal data is called a data subject.
5- Who are the data users?
Data users are the people who hold personal data (for processing).
6- What is personal data?
Personal data is data consisting of information about a living individual who can be identified.
7- List all eight points of the DPA.
The Data Protection Principles are requirements that data users must meet to comply with the Data Protection Act. These eight principles state that any personal data stored by a data user shall :
-be obtained and processed fairly and lawfully
-be held only for the lawful purposes described in the register entry
-be used only for those purposes and only be disclosed to those people in the register entry
-be adequate, relevant and not excessive in relation to the purpose for which they are held
-be accurate and, where necessary, kept up to date
-be held no longer than is necessary for the registered purpose
-be surrounded by proper security.
-additionally an individual shall be entitled to access, have corrected, or have erased, data held about him by a data user.
Online Service And Safety And Health:
Identify the main health issues.
If we use a computer for many hours (as people often do at work), there are some health issues that might affect us...
Identify the main safety issues.
Online Services and Security and Privacy of data:
Identify the maid data security aspects in the below categories:
1) Need to protect confidentiality of data.
1-Use study codes on data documents instead of recording identifying information and keep a separate document that links the study code to subjects’ identifying information locked in a separate location and restrict access to this document.
2-Encrypt identifiable data.
3-Remove face sheets containing identifiers from survey instruments containing data after receiving from study participants.
4-Properly dispose, destroy, or delete study data / documents.
5-Limit access to identifiable information.
6-Securely store data documents within locked locations.
7-Assign security codes to computerized records.
a
2) Shop security
In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Encryption doesn't prevent hacking but it reduces the likelihood that the hacker will be able to read the data that is encrypted. In an encryption scheme, the message or information, referred to as plaintext, is encrypted using an encryption algorithm, turning it into an unreadable cipher text. This is usually done with the use of an encryption key, which specifies how the message is to be encoded.
Any adversary that can see the cipher text should not be able to determine anything about the original message. An authorized party, however, is able to decode the cipher text using a decryption algorithm, that usually requires a secret decryption key, that adversaries do not have access to. For technical reasons, an encryption scheme usually needs a key-generation algorithm to randomly produce keys.
Online Services :
1) Define Online services?
An online service refers to any information and services provided over the Internet. These services not only allow subscribers to communicate with each other, but they also provide unlimited access to information. Online services can range from simple to complex. A basic online service may help subscribers gain needed data through a search engine, while a complex one might be an online mortgage application from a bank. Online services may be free or paid.
2) Describe the effects of them in society?
Pros:
1) Information on almost every subject imaginable.
2) Powerful search engines
3) Ability to do research from your home versus research libraries.
4) Information at various levels of study. Everything from scholarly articles to ones directed at children.
5) Message boards where people can discuss ideas on any topic. Ability to get wide range of opinions. People can find others that have a similar interest in whatever they are interested in.
6) The internet provides the ability of emails. Free mail service to anyone in the country.
7) Platform for products like SKYPE, which allow for holding a video conference with anyone in the world who also has access.
8) Friendships and love connections have been made over the internet by people involved in love/passion over similar interests.
9) Things such as Yahoo Answers and other sites where kids can have readily available help for homework.
10) News, of all kinds is available almost instantaneously. Commentary, on that news, from every conceivable viewpoint is also available.
Cons:
1) There is a lot of wrong information on the internet. Anyone can post anything, and much of it is garbage.
2) There are predators that hang out on the internet waiting to get unsuspecting people in dangerous situations.
3) Some people are getting addicted to the internet and thus causing problems with their interactions of friends and loved ones.
4) Pornography that can get in the hands of young children too easily.
5) Easy to waste a lot of time on the internet. You can start surfing, and then realize far more time has passed than you realized. Internet and television together of added to the more sedentary lifestyles of people which further exacerbates the obesity problem.
6) Internet has a lot of "cheater" sites. People can buy essays and pass them off as their own far more easily than they used to be able to do.
7) There are a lot of unscrupulous businesses that have sprung up on the internet to take advantage of people.
8) Hackers can create viruses that can get into your personal computer and ruin valuable data.
9) Hackers can use the internet for identity theft.
10) It can be quite depressing to be on the internet and realize just how uneducated so many people have become in today's society.
1) Define Online services?
An online service refers to any information and services provided over the Internet. These services not only allow subscribers to communicate with each other, but they also provide unlimited access to information. Online services can range from simple to complex. A basic online service may help subscribers gain needed data through a search engine, while a complex one might be an online mortgage application from a bank. Online services may be free or paid.
2) Describe the effects of them in society?
Pros:
1) Information on almost every subject imaginable.
2) Powerful search engines
3) Ability to do research from your home versus research libraries.
4) Information at various levels of study. Everything from scholarly articles to ones directed at children.
5) Message boards where people can discuss ideas on any topic. Ability to get wide range of opinions. People can find others that have a similar interest in whatever they are interested in.
6) The internet provides the ability of emails. Free mail service to anyone in the country.
7) Platform for products like SKYPE, which allow for holding a video conference with anyone in the world who also has access.
8) Friendships and love connections have been made over the internet by people involved in love/passion over similar interests.
9) Things such as Yahoo Answers and other sites where kids can have readily available help for homework.
10) News, of all kinds is available almost instantaneously. Commentary, on that news, from every conceivable viewpoint is also available.
Cons:
1) There is a lot of wrong information on the internet. Anyone can post anything, and much of it is garbage.
2) There are predators that hang out on the internet waiting to get unsuspecting people in dangerous situations.
3) Some people are getting addicted to the internet and thus causing problems with their interactions of friends and loved ones.
4) Pornography that can get in the hands of young children too easily.
5) Easy to waste a lot of time on the internet. You can start surfing, and then realize far more time has passed than you realized. Internet and television together of added to the more sedentary lifestyles of people which further exacerbates the obesity problem.
6) Internet has a lot of "cheater" sites. People can buy essays and pass them off as their own far more easily than they used to be able to do.
7) There are a lot of unscrupulous businesses that have sprung up on the internet to take advantage of people.
8) Hackers can create viruses that can get into your personal computer and ruin valuable data.
9) Hackers can use the internet for identity theft.
10) It can be quite depressing to be on the internet and realize just how uneducated so many people have become in today's society.
Online Shopping:
1) Define online shopping.
Online shopping is the process of buying goods and services from merchants over the Internet. Shoppers can visit web stores from the comfort of their homes and shop as they sit in front of the computer using the World Wide Web.
Consumers can buy a huge variety of items from online stores, and just about anything can be purchased from companies that provide their products online. Books, clothing, household appliances, toys, hardware, software, and health insurance are just some of the hundreds of products consumers can buy from an online store.
2) Identify the pros and cons for business customers.
When shopping online there is likely to be a wider range to choose from than in a conventional shop and the price of the item will likely be cheaper compared to a conventional shop. When you know exactly what you are looking to buy such as a specific book title or you have a specific brand and model number, the lower price available online will often mean shopping online will offer you your best value. In addition if you are looking to buy a more generic products, particularly ones in bulk such as paper serviettes or candles where the item will suffice and it won’t matter too much if there are slight discrepancies between the delivered product and what you were expecting.
Websites don’t close like traditional shops, so you can shop any time of the day or night, rather than having to visit during business hours. This is particularly handy for shift workers, people in remote areas, or people with limited ability to leave the house including those with young children.
Prior to purchase you can use the internet to research products and compare prices more easily than phoning or visiting several different stores.

When buying in a conventional shop you will often take home the required item instantly, compared with buying a product online when there will be a delay between purchase and delivery. When ordering online within Australia delivery will take at least a couple of days and more often a week. If you are ordering from overseas delivery can take several weeks or even months depending on how much extra you are willing to pay for priority freight.
Although the advertised online prices may be cheaper you may not get the item as cheaply as you initially think once the currency has been converted into Australian dollars, once freight is included and once international transaction fees are charged.
3) Describe how it operates
- Shopping cart: the online shopper adds purchase items to a shopping cart, effectively the online equivalent of a high street store shopping basket. It's worth noting that some websites don't choose to include a shopping cart - for example if they sell only one product.
- Checkout: When ready to pay, the shopper heads to checkout. Product information in their shopping cart generates what is called a 'purchase description' that is sent to a Payment Gateway - such as WorldPay - to securely process the payment.
- Payment Gateway: The shopper is directed to the Payment Gateway where they choose a payment method and enter payment details.
- Transaction: The Payment Gateway pairs the shopper's payment details with the purchase description from the shopping cart to produce a 'transaction'.
- Authorisation: The Payment Gateway encrypts and sends transaction details to the shopper's card issuer for authorisation. Card issuer authorises or declines the transaction.
- Confirmation: The Payment Gateway notifies the shopper and the e-business that the order has been completed - normally via a confirmation screen and an email.
- Merchant Account: The Payment Gateway receives the purchase amount from the shopper's card issuer, and sends it to the business's Merchant Account. This can take 1-2 days.
- Bank account: From the Merchant Account, the funds are paid into the business's standard bank account, normally with a short delay that's specified by the Merchant Account provider.

4) Identify the security issues.
Look for the latest credit card password procedures, such as Verified by Visa.
In the last year, each major credit card issuer has come up with a secure system online that involves use of a password known only to the credit card owner. This presents to you the highest form of online security possible when shopping, and so you should look for sites that support these new standards.
Check the return/refund, warranty, guarantee and other policies.
Take the time to ensure that you are dealing with a reputable, reliable merchant that will offer you the same shopping peace-of-mind that you would get elsewhere. If the online merchant doesn't post sufficient information to provide you a degree of comfort about such policies, consider taking your business elsewhere.
Make sure that the checkout process is secure
Always make sure that you are using a site that provides full "encryption" over the credit card transaction, which helps to ensure that your credit card information can't be accessed while it is in transit. You can determine this by looking for a small "padlock" at the bottom of your browser screen, or by a message indicating that you are entering a secure site.
Look for privacy and security policies
A company that is very conscious about security issues will most often post some information online for you to read. Take the time to look for the security and privacy policies that the online store might have posted and read them, since this will give you more comfort that you are shopping with a site that will carefully guard your credit card and personal information. If concerned, do due diligence If you are dealing with an online store, but are unsure whether they are reliable and credible, do a search for them on the Internet, to see if other consumers have expressed concern or have had positive or negative experiences.
Understand the "safe-shopping" policies established by the issuer of your credit card
Take the time to understand the guarantees that your card-issuer offers with respect to shopping online. You will likely find that even if you are subjected to an online fraud, you will not be liable for any loss greater than $50, which should put your mind to rest.
Shop around
Often what might seem to you to be a bargain might not be, once you factor in other costs, or if you don't consider that there might be other online stores offering the same product or service at a lower cost. Take the time to look at alternatives.
Beware of hidden shipping, duty and other costs
Many of those who shop online are surprised by the hidden charges that were not well-documented on the site. Make sure you understand all the potential charges before committing to a purchase, and if something seems unclear -- ask! Look for sites that clearly post such charges as part of the checkout process, or post the information elsewhere on their site.
Keep receipts and other documentation
Make sure you print out a copy of the receipt once you've finished the purchase. In addition, if the online store offers to send you a copy of the receipt by e-mail, take advantage of this option.
Order early! The common complaint of every online Christmas shopper is that they ordered too late to ensure delivery of their goods by Christmas. Shop early -- and shop often!
SEMESTER (1)
Using Spreadsheet
Spreadsheet modeling is a computer program that allows you to create, edit and maintain full data in industries like financial services, customer services etc. It can be used in industries to check how much is made, what is leftover and what is lost. Types of spreadsheet models include bank or debt analysis, Business Planning etc.
Spreadsheet uses are listed in:
*Calculating financial losses, gains, profits, etc in business and companies.
*Solving equations easily and briefly in a correct manner.
*Organizing data in an understandable method and displaying it in a pleasing way, such as in charts and tables.
*Budgeting, as it will automatically tabulate mathematical equations (ex. adding, subtracting, multiplying, finding the mean average...) for you.
*Producing graphs and charts from the data you input into the different cells.
*For sorting data either alphabetically or numerically, or by some other variable.
CSV stands for:
Comma Separated Value
Calculating ISBN numbers
An ISBN is a 10 digit "structured" number - different parts of the number have different meanings (similar to the ZIP codes). The parts of the number are separated by spaces or hyphens>.The ISBN is broken up into four parts, the sizes of the first three parts are variable, but the total number of digits used in these parts must add up to nine. The last digit is a check digit which is calculated from the previous nine digits. The ISBN's are usually printed on the back cover of a book and look like these examples:
80 + 63 + 8 + 7 + 0 + 35 + 20 + 15 + 18 = 246.
0 + 36 + 56 + 7 + 6 + 45 + 0 + 12 + 14 = 176.
Advertisements
Advertising is nothing but a paid form of non-personal presentation or promotion of ideas, goods or services by an identified sponsor with a view to disseminate information concerning an idea, product or service. The message which is presented or disseminated is called advertisement. In the present day marketing activities hardly is there any business in the modern world which does not advertise. However, the form of advertisement differs from business to business.
The Press – Press constitutes news papers, printed brochures, magazines, pamphlets, yellow pages classifieds etc., on which, advertisements are sold for a price, depending upon the occupation of sizes, graphics and number of subscribers. Press advertising has become one of the most popular and widely used medium of advertisement because of the economical and it reaches huge number of people in a any geographical area.Radio – Radio is the universal medium and also affordable. In recent years, radio drives more volume of listeners to it. Airing ads on Radio has become popular in modern times. The cost of airing advertisements on radio is cheap and affordable for the small sized business segments.
Television – The medium constitutes voice and video which can create infinite impression in the minds of the audience. The advertisements, on this medium can be more reachable and covers large number of audience. Even though it is considered as ‘quite expensive' but reaches large number of audience regionally, nationally as well as internationally. Television ads are more impressive because they have the ability to convey message with sight, sound and motion.
Internet - Internet advertising is on-line advertising that includes banner ads, text ads, search engine ads, classified ads, pop ups, social networking ads, direct emails, internet marketing campaigns, banner ads, billboard ads, pixel format of ads, video ads etc,. As the utility of internet is increasing the number of unique visitors is targeted. Internet is the medium that covers world wide area to create global awareness.Event Organization - trade shows and events are conducted for advertising via exhibitions, sponsorships in popular shows, brand sponsors, brand ambassadors by the popular public figures etc, for creating great impression of the product/service.
Specialty Advertising - This Advertising uses imprinted, decorative products on the special occasions such as key chains, computer mouse, mugs, calendars etc. These articles are distributed for free of cost and the recipients need not purchase or make a contribution to receive these items. These advertisements are meant to pre-publicity of product or service.
Outdoor Media - This type of advertisements is displayed on the flexi boards, banners, and mostly on the top of the building to capture large audience. These ads are displayed in huge public places where the sight of the ad should be reached.
Central Cooling System
Air conditioning is the process of altering the properties of air (primarily temperature and humidity) to more favorable conditions. More generally, air conditioning can refer to any form of technological cooling, heating, ventilation, or disinfection that modifies the condition of air.
An air conditioner (often referred to as air con, AC or A/C, and not to be confused with the abbreviation for alternating current) is amajor or home appliance, system, or mechanism designed to change the air temperature and humidity within an area (used for cooling and sometimes heating depending on the air properties at a given time). The cooling is typically done using a simple refrigeration cycle, but sometimes evaporation is used, commonly for comfort cooling in buildings and motor vehicles. In construction, a complete system of heating, ventilation and air conditioning is referred to as "HVAC".
Central Heating System is a heating system that distributes heat evenly to each room in the house.
A heating system consists of:
- A boiler (the heat source)
- A cylinder (to store the hot water)
- A pump (to push water around the system)
- A timer (to turn the hot water and heating system on automatically)
- Room thermostat (to control the temperature of the house)
- Cylinder thermostat (to control the hot water temperature)
- Radiators (to heat the room)
How does a boiler work?
A controlled burn of fossil fuels, like gas, takes place within the boiler and the heat produced is transferred to water.A gas boiler consists of various components which transfer the heat energy from fuel to a heating system.
| Heating systems in the UK are used on average for less than five months of the year. In addition the amount of heating required can be pre-determined, i.e. 18 degrees centigrade in the bedrooms, 21 degrees in the living room and so on.It is the hot water requirement that tends to vary with usage, yet it is often treated as a lower requirement to, boiler location, ease of installation, cost etc. The issue is often compounded by the variety and choice of water heating systems that are now available, yet in general terms there are only two main types of system: | ||
|
Robots in car manufacturing
The term robot comes from the Czech word robota. Most robots in the world are designed for heavy, repetitive manufacturing work. They handle tasks that are difficult, dangerous or boring to human beings.
A robotic arm is a type of mechanical arm, usually programmable, with similar functions to a human arm; the arm may be the sum total of the mechanism or may be part of a more complex robot. The links of such a manipulator are connected by joints allowing either rotational motion.
The end effector, or robotic hand, can be designed to perform any desired task such as welding, gripping, spinning etc., depending on the application.
The most common manufacturing robot is the robotic arm. A typical robotic arm is made up of seven metal segments, joined by six joints. The computer controls the robot by rotating individual step motors connected to each joint. Unlike ordinary motors, step motors move in exact increments. This allows the computer to move the arm very precisely, repeating exactly the same movement over and over again. The robot uses motion sensors to make sure it moves just the right amount.
Your arm's job is to move your hand from place to place. Similarly, the robotic arm’s job is to move an end effector from place to place. You can outfit robotic arms with all sorts of end effectors, which are suited to a particular application. One common end effector is a simplified version of the hand, which can grasp and carry different objects. Robotic hands often have built-in pressure sensors that tell the computer how hard the robot is gripping a particular object. This keeps the robot from dropping or breaking whatever it's carrying. Other end effectors include blowtorches, drills and spray painters.
Industrial robots are designed to do exactly the same thing, in a controlled environment, over and over again. For example, most industrial robots work in auto assembly lines, putting cars together. Manufacturing robots are also very important in the computer industry. It takes an incredibly precise hand to put together a tiny microchip.
Currently, humans still work alongside robots for many reasons, most important of which is the ability of people to reach areas the larger robot arms cannot. As robotics technology improves, it is conceivable that the auto industry will become fully automated or employ human workers only sporadically. In the future, positions in the auto-manufacturing industry (at least in production facilities) will probably entail dealing with the robots themselves and not the cars or trucks; repair, programming and maintenance of robots will still need to be done by humans.
You can also watch car wheel manufacturing using robots in here.
- Chassis
- The chassis is actually the baseline part or component. It is the frame on which the entire body is supposed to rest. The frame is shifted to the assembly line and fastened to the conveyor belt. Components from various suppliers are brought in and the manufacturing process is initiated. All the integral parts, including gear boxes, gas tanks, suspensions, rear axles, drive shafts, wheel drums, braking systems and components of the steering box, are incorporated within or on the chassis with the help of robots and experts.
- Car Body
- The body is constructed on a different assembly line from that of the chassis. The robots perform numerous welding jobs in a very short time span and with a high level of proficiency and precision that is nearly impossible for humans to achieve. Robots place components such as deck lids, assembled doors, fenders, hood panel, bumper reinforcements and trunk lid on the appropriate spots of the body shell and skillful workers secure and bolt the components together.
- Painting
- A quality control team examines the body thoroughly and looks for any defects, including dents, dings or any abrasives, so corrective action can be taken. The car is then cleaned scrupulously. It is then ready for a coat of primer. A film of undercoat is applied evenly and allowed to dry in a drying booth. Another coat of base paint is applied and left to dry. Finally, robots complete the spray painting to get a perfect finish.
- Internal Integration
- The internal parts such as the glass, speakers, radio, dash panels, seats, interior lights, steering column, brakes, all weather-stripping, trim panels, gas pedals, headliner, fascias and carpeting are integrated at this stage. The robotic systems then secure the windshield within the windshield frame. It is now time for undergoing a water test to make sure that all the parts were fitted right. The stage is now set for mating the body with the chassis.
- Mating the Body With the Chassis
- At this stage, the robots lift the shell from the conveyor, place it on the car frame and merge the body with the chassis. The skilled workers secure the body tightly to the frame. Then the finishing elements like the tires, battery, gasoline and antifreeze are added to the car. The car then goes through a final check up. Any shortfall is immediately attended to at the central repair area by expert technicians.
Global positioning system
The Global Positioning System (GPS) is a space-based
satellite navigation system that provides location and time
information in all weather, anywhere on or near the Earth,
where there is an unobstructed line of sight to four or more
government and is freely accessible to anyone with a GPS
receiver.
The GPS program provides critical capabilities to military,
civil and commercial users around the world. In addition,
GPS is the backbone for modernizing the global air traffic
system.
Mobile phones
An electronic telecommunications device, often referred to as a cellular phone or cellphone. Mobile phones connect to a wireless communications network through radio wave or satellite transmissions. Most mobile phones provide voice communications, Short Message Service (SMS), Multimedia Message Service (MMS), and newer phones may also provide Internet services such as Web browsing and e-mail.
Mobile-Phones Features : Software and Applications
Other non-SMS data services used on mobile phones include mobile music, downloadable logos and pictures, gaming, gambling, adult entertainment and advertising. The first downloadable mobile content was sold to a mobile phone in Finland in 1998, when Radiolinja (now Elisa) introduced the downloadable ringtone service. In 1999, Japanese mobile operator NTT DoCoMo introduced its mobile Internet service, i-Mode, which today is the world's largest mobile Internet service.
Mobile payments were first trialled in Finland in 1998 when two Coca-Cola vending machines in Espoo were enabled to work with SMS payments. Eventually, the idea spread and in 1999 the Philippines launched the first commercial mobile payments systems, on the mobile operators Globe and Smart. Today, mobile payments ranging from mobile banking to mobile credit cards to mobile commerce are very widely used in Asia and Africa, and in selected European markets.
HOME-WORKS:
Mobile Phone: Features
All mobile phones have a number of features in common, but manufacturers also try to differentiate their own products by implementing additional functions to make them more attractive to consumers. This has led to great innovation in mobile phone development over the past 20 years.
The common components found on all phones are:
All mobile phones are designed to work on cellular networks and contain a standard set of services that allow phones of different types and in different countries to communicate with each other. However, they can also support other features added by various manufacturers over the years:
- roaming which permits the same phone to be used in multiple countries, providing that the operators of both countries have a roaming agreement.
- send and receive data and faxes (if a computer is attached), access WAP services, and provide full Internet access using technologies such as GPRS.
- applications like a clock, alarm, calendar and calculator and a few games.
- Sending and receiving pictures and videos through MMS, and for short distances with e.g. Bluetooth.
- GPS receivers integrated or connected (i.e. using Bluetooth) to cell phones, primarily to aid in dispatching emergency responders and road tow truck services. This feature is generally referred to as E911.
- Push to talk, available on some mobile phones, is a feature that allows the user to be heard only while the talk button is held, similar to a walkie-talkie.
Biometric Applications
Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes.
Biometric devices, such as fingerscanners, consist of:
- A reader or scanning device
- Software that converts the scanned information into digital form and compares match points
- A database that stores the biometric data for comparison
It can be grouped into the following two classes:
- Biological – are the biometrics derived directly from the part of a human body. The most used and prominent examples are the fingerprint, face, iris and hand recognition
- Behavioral – are the biometrics by persons behavioral characteristics, such as gait-recognition, keystroke recognition, speech/voice recognition and etc



















No comments:
Post a Comment