Mobile phones: a blessing or a hazard?

Mobile phones: a blessing or a hazard? by Rafika Saidani A necessity of life For every one to have a telephone is a necessity. It is helpful and useful. Having a simple telephone keeps you in touch with other people you know. It is a more convenient mean of communication, much faster than sending a letter that take days to reach their destination. The mobile phone is even a better invention. The mobile phone is the fastest growing technology ever. Mobile phones are being more attractive, addictive and an obsession especially for the younger people. Teenagers are the biggest market for mobile phones. They spend so much on pre-paid credit. Having a mobile phone gives them a sense of independence and makes them feel they are part of this trend of the "fast" way of life. Also businesses are already taking full advantage from the invention. It helps them keep in touch with potential customers and business partners. It means for them being in touch all the time with a moving and competitive environment. A painful experience Mobile phones may offer security and may even save your life. A personal experience I had was when I was travelling from Coventry to Heathrow airport with my husband to catch a flight. On the way the car suddenly broke down on the motorway. We spent a lot of time waiting on hard shoulder for help. My husband then decided to walk till he reached a house on

  • Ranking:
  • Word count: 737
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Assignment A: Analysis of Transactional Website

Assignment A: Analysis of Transactional Website ProSport is an online internet sports shop (www.prosportuk.com), it prides itself on it's commitment to sports people and supplying them with specialist equipment to perform and enjoy their sport to the maximum. There aim is to make shopping a pleasant and secure experience. ProSport has been in operation since 1986, it was started by Richard Sutton an ex-professional footballer with Norwich City and an England Youth International whose career was cut short by injury. Structure and Navigation The structure and navigation of the site is relatively easy to use and is well set out. The webpage has numerous navigation tools and links to other parts of the website, that all seem to work. The overall page has a good flow and has a good combination of text and picture that accompany each other well without clashing with each other. From the home page you will find eight sections containing all of the products. Once inside a section you will see a list of product groups on the left hand side. Once you have clicked a product group you are sent to another page, when inside click the picture of the product you are interested in, this will take you to an individual product page where you can make colour or size selection and add it to your basket. To go back at any point within a section use the list on the left hand side or the links

  • Ranking:
  • Word count: 4526
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Networking Systems. Network Cabling, Network Interface Cards,Network Connectivity

Task 1 * What does networking design involve? This involves considering the design for computer networks which cover a wide range of topics such as security and layout. * What is required for networking installation? The desires for network installation include different devices such as hubs, routers, switch and cat5 Ethernet cable etc. * What is network configuration? To communicate with other computers, computers need a network connection. This is accomplished by having the operating system recognize an interface card (such as Ethernet, ISDN modem, or token ring) and configuring the interface to connect to the network. * How can network security be improved? Setting up a firewall, freeware security package and a separate defence can amplify the security on a network, adding passwords and setting use permission settings. * What are the main functions of a network? Although the main function of network layer is routing, routing itself is done from source network to destination network a router doesn't store IP address of hosts it only has the IP prefix of the networks. * How does managing a client-server network differ from peer to peer networks? Managing for example a client-server network will be different to a P2P network as the operating system between the two will be dissimilar. Linux is a classic example of a client-based server. * What is meant by

  • Ranking:
  • Word count: 1682
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Information Retrieval tools. I have used a database to carry out my searches. I used Emerald because it was the best tool to use as it offers Boolean, limiting search, and proximity.

Coursework 2: Information retrieval tools Description of the Search Strategy I have searched for the NHS (National Heal Service) because I know it is a public sector that gives out allot of information. Most of the information is important and can be very helpful. I also searched for this term so that I can improve my knowledge on how to prevent illnesses for example the flu. I have used a database to carry out my searches. I used Emerald because it was the best tool to use as it offers Boolean, limiting search, and proximity. I have combined these terms using many functions that were available on Emerald. These were Boolean logic, using the AND, or OR, limiting the search, and phrase search. These functions allowed me to broaden my search and helped me to narrow the information. I have used all of these functions so that I can get a really good quality of information that will help me with my study. The only reason why I narrowed and broadened my search was to get a good authority of the material. Having a good source of authority (quality) will help me to receive maximum quality of information that is available. Phrase search is a good function but by on its own, it is not effective. This is the reason why I used phrase search with the other functions so the results would be high in quality. I have also searched for terms in particular fields for example, I have

  • Ranking:
  • Word count: 1661
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Legislation regulating E-Commerce

Data Protection Act 1998 This is the act that deals with the customer details that can be collected or stored on paper and electronically. In e-commerce when the user enters all the personal details such as name, address, telephone number, e-mail address and etc. According to this data protection act, the customer has a right to avoid from sending his/her details to a third party. Computer Misuse Act 1990 This act is a law that works against illegal activities such as: hacking, misuse software's or helping person to get access to someone else's computer. This act prosecutes hacking or attacking a computer with viruses. According to computer misuse act there are three new offences such as: * unauthorised access to computer programs or data * unauthorised access with the intent to commit further offences * unauthorised modification of computer material In an e-commerce website, Computer misuse act can be used to prevent the website getting hacked by hackers. For example when a user gets registered with an e-commerce website such as Amazon where you have to put all the details including the card details. So if someone hacks into the amazons account, he/she can order products and it will add to the customer's account. This can lead to unauthorised crimes. Consumer Credit Act 1974 This is another important act in e-commerce related to payments by the customers and

  • Ranking:
  • Word count: 540
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Testing Database

Testing Testing strategy The basic objective of testing the system is to ensure that everything is working as expected. During the testing we should look out for the following: * Macros should work as expected * Queries should run and return accurate outputs (and store required information property where appropriate) * Forms should display fields correctly * Command buttons should run actions as expected * Report should be printed correctly * Input should be validated correctly where appropriate * Required fields should not be empty. System should detect required fields that are empty The testing of the system will be divided into 3 parts: * Functional - the testing of individual components of the database. This is done when the component is created and will be documented in the implementation * System testing - the testing of the full system from beginning to end. This is done using the test plan below and will be done and documented once the whole system in complete. * End-use testing - getting the end user to test the system for a day. Done by the end user to detect any errors/problems and to establish whether the system meets the user requirements Testing plan Test Number What to test How to test it Expected Outcome Test switchboard and switchboard options Manually click all the buttons on the switchboard Switch board should load on database startup.

  • Ranking:
  • Word count: 780
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Communication in Boots.

P4. Communication is essential in any business and is vital for the business to be successful. Boots and their employee's communicate in both formal and informal ways. During working hours communication between a boss and his/her employee would be formal, as it is concerned with work. This includes meetings, written memos and telephone conversations and reports would be formal or formally presented. But if it was during a lunch hour or out of work time, I would believe the communication would still be formal to a certain extent, but not as formal as it is their own time and can do as they wish unlike at work they must obey members of staff above them. In Boots they have lines of communication which is formal way of communicating. They have both main categories of communication which are oral and written. Lateral communication In Boots they have lateral communication is communication which takes place across the different functional areas and is usually the same level. For example; A meeting between marketing sales and finance about the following month's advertising campaign. 2 Possibly a training exercise/event run by human resources 3 A design brief from sales to production with information on the product(s) which may be wished for from the customers of boots and this may have been done with a questionnaire which is field research. 4 A meeting for all functional

  • Ranking:
  • Word count: 685
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Computer Science Info-Age & Ethics

Computer Science Info-Age & Ethics New times bring new crimes. It's a story as old as humanity and as new as the Internet. First come cars, and then car thieves. Telephones are followed by telephone fraud. Now we've got computers . . .. To make home, school, and office life easier, society relies on computers. As a result of this dependency, computer use grows everyday. Along with the growing use of computers comes widespread computer crime. With the Internet becoming increasingly popular, more and more people are becoming computer literate, and networks are becoming more readily accessible. The rise in computer crime can easily be blamed upon the increasing number of users. The Internet is widely deemed as a new community. Either way you look at it, the Internet offers cover for con artists and plenty of places where larceny can lurk. The most common crimes committed via technology media are the same basic variations of the four main time-tested, real-world crimes: . Forgery (of E-mail) 2. Assault (on your Web site, E-mail box, or computer system) 3. Fraud (cyber scams) and 4. Robbery (theft of valuable information) Various types of people commit computer crimes. The two most familiar being hackers and crackers. A hacker is a person who enjoys exploring the details of a programmable system and how to stretch their capabilities. A cracker is one who breaks

  • Ranking:
  • Word count: 1175
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Creating Hyperlinks

To insert the button I clicked on insert-interactive images-flash button when the options screen came up I entered information such as; style, background color, button text, font, link, target screen and then name of the button. I then clicked OK. Creating Hyperlinks To link between pages I needed to create hyperlinks, to do this I first wrote the text that I wished the hyperlink to display I then highlighted it and entered the link into the box that appeared I then pressed enter Entering text To enter the text on my site I simply clicked where I wanted it to go and typed it in, I also changed the properties of the text i.e. alignment, color, size, bold, format, etc by highlighting the text and using the toolbar. Accuracy To check the accuracy of my work, e.g. all of my links worked and that there were no spelling errors in the pages I got my friend to read through the page for spelling errors and dead links. Here is a spelling error that was found. and here is the correction Back-up saving To ensure that I dint lose any work if the computer crashed I regularly saved my work, I did this by clicking on the file menu and then "save all frames" or "save" button depending on which file page I was working on. I have provided screenshots below of the buttons I used. I also saved it onto a cd incase the computer was damaged and the work was lost. Spelling and

  • Ranking:
  • Word count: 820
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Ecommerce (M) BETC IT

Potential risks to organisations of committing to an e-commerce system Organisation means a group of people work together with a common goal or objective in an organisation, there are many types of organizations, and in my presentation I would use businesses as a type of organization to develop my ideas and explanations. E-commerce offers competitive advantages such as improved customers service, reduced costs and entry to the global market, which attracted a lot of organizations to committing their businesses to an e-commerce system. However this typical system is not as perfect, there are also tons of potential risks of using e-commerce system. Especially for a new to e-commerce organisation, their site always not been fully protected or functioned, it would cause series of issues which need to be solved, and in order to solve these issues, organizations have to pay huge amount of money and time to investigate and maintain their systems. A website never born perfectly, the site like Amazon and eBay, years of changes and development has to be made. For example an business have their own management way, policy and security protection etc and it works very well before they committed to an e-commerce system, they set their tasks and they finished it perfectly without anything to do with ICT, but after they committed to an e-commerce system, it's a completely different story.

  • Ranking:
  • Word count: 956
  • Level: AS and A Level
  • Subject: ICT
Access this essay