Form of output:I will have to make a website with four pages that advertises the Annual Festival held in Lancre.

?Analysis? Form of output: I will have to make a website with four pages that advertises the Annual Festival held in Lancre. Information to be output: I have to explain about: Page 1 - This is the homepage - Info about the town and places to stay as well - Introduce the Festival and de-tails of the events. - A big heading saying "The Lancre Festival 2007" - The dates underneath the heading - Add at least one relevant picture - With hyperlinks to all the pages (Called: "Where to stay", "Festival Event", "Purple Spiders Convert") Page 2 - Have the heading "Where to Stay" - A list of hotels, bed and breakfast accommodation and camping and caravan sites - Put the office phone number - A message telling people that they phone to find out which places that still have vacancies - Add at least one relevant picture - Have a hyper link to the home page in the same place as all the other pages Page 3 - This page is for the programme of events - Show what all the events are (The Purple Spiders concert, the float show, the flower show and the boat race) - Showing the names, dates, times and cost - Put the heading "festival events" for this page - Say where to order tickets - Show which events are free - And put the word "free" in a larger font size and make it colourful so it stands out - Include a map showing the location of the different events - Have a

  • Word count: 986
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Solving and Reducing Internet Problems

(M1) Solving and Reducing Internet Problems (M1) Introduction: This report was produced by undertaking research into the ways of solving and reducing some of the problems associated with different types of business activities. I have identified the problems and what solutions would be. The report was produced by Haroon Sheikh and requested by Websters Supermarket. The report was compiled and submitted on 25th FBY 2008. Findings: I have found that less than one-third of Internet users have any idea what phishing is, and less than four percent have changed their online habits, despite most users being the target of numerous phishing scam attacks. Phishing scams are criminal attempts to steal users' personal information by masquerading as a trustworthy business, such as a bank or auction site, in emails or other electronic communications. Any personal data captured is used for identity theft, credit card fraud, and other crimes. Risks of Internet Connection A business with only physical premises to look after still needs to consider security, a business that presents it self on the Internet immediately has many other forms of threats. There are some issues that can affect e-commerce businesses at any time and these must be considered and monitored. These include: Spam - Not-required rubbish or junk mails, which can be blocked through easily installed filters on email

  • Word count: 1956
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Communications Technology - Assignment 1

Communication Devices - P1 Here I will explain three different communication devices that can be used for worldwide communication. The three that I am going to explain are modems, satellites and mobile phones. Modems (modulator-demodulator) - modems are used to allow computers to communicate with each other over long distances via telephone lines. Essentially their job is to convert a digital signal into an analogue signal and vice versa. This basically means that they convert the digital data (or binary) into modulated electrical signals in the voice frequency of a telephone line. A modem on the receiving end then demodulates these electrical signals into digital data. A section of a telephone line is designated for the use of a broadband connection whilst the other part remains available for voice calls. These are technically the "bands" of a phone line; this is where broadband gets its name from. Broadband filters that are used separate these two bands so that they do not interfere with each other. Modems are generally classified by the amount of data they can send in a given amount of time; usually measured in bits per second. Satellites - satellites are used to transmit a signal from one place to another. They are used to broadcast data all over the world. A satellite can send a signal from somewhere on Earth to a communications satellite in space which then

  • Word count: 3212
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Network Administration

Network Administration I have worked as a computer network administrator for over 5 years. I have worked mostly with networks in a mixed Microsoft Windows NT and Novell Netware environment. I am a Novell Certified Novell Engineer (CNE) and I am a certified Novell GroupWise Administrator. I have taken classes in configuration of Cisco routers. In this essay, I will discuss the definition of a network administrator, the tasks and responsibilities of a network administrator and share a day in the life of a network administrator. For documentation on my credentials, I am including my certification certificates. What is a Network Administrator? A network administrator is one who maintains and troubleshoots your computer systems. Depending on the size of your organization and the complexity of your technology, a network administrator's job can range from ten hours per week to full time. There are some obvious network administration tasks, such as installing or upgrading system software and managing user accounts and disks space, so you probably have some idea of what an administrator does. The International Telecommunications Union (ITU) is a consortium of telecommunications companies worldwide who have, among other things, defined a series of recommendations that describe how a telecommunications management network (TMN) should be operated. The ITU members

  • Word count: 2344
  • Level: AS and A Level
  • Subject: ICT
Access this essay

control questions

I will be looking at different search engines in order to find the information that I am looking for. The information that I am going to be researching is house price data. I'm going to compare 3 search engines to see which one is most appropriate in what I'm looking for. Text based search engine: For this section I'm going to use Google as the text based search engine. In my personal experience many people use Google as their primary search engine. I'm going to search house price data in Google's search bar and see what results I get back from it. The index returned 125,000,000 hits relating to my topic. Directory search engine: For the directory search, I will be using the live search to see what results I get from the topic that I am researching. The results from the search came back with 67,200,000 hits relating to my topic. Meta search engine: For this section I'm going to use ask.com search engine. Ask.com is a little different from the other two search engines because it allows you to actually type a question in e.g. 'how do you build a website' this will return a list of reference related to building a website which I feel is good. I'm going to research the same topic as I did in the other two search engines and see what results I get. The result from this search engine is that I received 4,477,000 hits relating to house price data. Comparing my results

  • Word count: 914
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Computer crime can broadly be defined as criminal activity involving an information technology infrastructure, including illegal access

In this day and age, computer security means to provide confidentiality, integrity and prevention against misuse, accidents and malfunctions, with respect to both computer system and the type of information that it contains. The definitions that I have chosen are: "Computer Misuse Act 1990 "An Act to make provision for securing computer material against unauthorized access or modification; and for connected purposes". It states 3 offenses." [LexisNexis, 2008] Convention on Cybercrime: "The Convention is the first international treaty on crimes committed via the Internet and other computer networks, dealing particularly with infringements of copyright, computer-related fraud, child pornography and violations of network security. It also contains a series of powers and procedures such as the search of computer networks and interception." [Convention on Cybercrime 2008] Computer crime can broadly be defined as criminal activity involving an information technology infrastructure, including illegal access "Under the Convention, damaging, deletion, deterioration, alteration or suppression of computer data without right comprises the 'data interference' offense which can be limited to conduct resulting in serious harm." [LexisNexis, 2008] The three definitions used, for explaining the term computer misuse are quite different from each other. All the definitions covers the whole

  • Word count: 1871
  • Level: AS and A Level
  • Subject: ICT
Access this essay

An explanation to the benefits of computer conferencing and collaborative technologies

An explanation to the benefits of computer conferencing and collaborative technologies Contents Page Executive summary 1 Terms of reference 1 Methodology 1 Findings 2 Conclusions 4 References 4 Executive Summary There are various benefits to computer conferencing however there are still a few problems. The best way to eliminate most of these problems is to diversify the ways of communication. Terms of Reference Report From Chris Kiarie Report to Amanda Walker Due Date 26-11-2004 Topic An explanation to the benefits of computer conferencing and collaborative technologies Methodology Well I used the search engine yahoo I typed in "what is computer conferencing" then looked through all the websites available. However the subject matter was too broad so went to advanced search and excluded the word equipment because I was getting too many websites offering the equipment. The evidence for this is on the references it's the yahoo website. Findings Firstly I would like to explain what computer conferencing does. It is the gives the opportunity for interactive group communication, learning and decision-making. This is done by the use of software and either the Internet or a network. The key features of computer conferencing are; * Asynchronous Communication - This means that communication is not affected by geographical location

  • Word count: 1348
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Database Analysis & Design

Assignment 1 Introduction Within this report I will explain the following areas in detail, * Explain the different types of databases - flat file, hierarchical and relational. Compare the advantages and disadvantages of each. * Describe two analysis methodologies and again compare the advantages and disadvantages. This time use examples to illustrate your key points. * Describe the concepts involved in Logical Data Modelling. * Identify and describe potential modelling constraints that could arise from a logical data model using examples. * Finally discuss the benefits of Logical Data Modelling. Databases There are many different types of databases available for use; the three most common ones are, * Flat file database * Relational database * Hierarchical database I will now explain each database listing the advantages and disadvantages of each. Flat File Databases This section will show a description about flat file databases and the advantages and disadvantages Description A Flat File Database is a text file commonly only containing a record for each line in the file. This sort of database would be used for a simple phonebook sort database, showing peoples names with there telephone numbers and possibly addresses. This could also be used to keep track of friends. An example of a flat file database is a personal phonebook storing names and telephone

  • Word count: 4878
  • Level: AS and A Level
  • Subject: ICT
Access this essay

ICT coursework: Designing and implementing a book rental system

Habib's Book rental system Contents * Project proposal * Possible solutions * Chosen solution * System objectives * Performance Criteria * System objectives Design * Chosen software * Resource requirements * System flowchart * Table design * Entity relationship diagrams * Data entry from designs * Menu form designs * Query designs * Report designs * Test plan Implementation * Implementation plan * Implementation commentary Testing User guide Evaluation Project title is Habib's Books Rental System Aim of project My aim is to investigate and also to try and solve the information handling problems of Habib's books a small shop that rents books to membership only. The owner of shop wants me to design and set up a more efficient way of storing and handing books and membership. I would be including different ways of registering to Habib's books and also I would be making a better way that would be safer and better for the company. I would change things around that would make the company easy to use and a very flexible job for the staff. Input * Member details (member number, name, address, date of birth) * Book details (book bar code, name of book) * Loan details (book number, member detail, date book due back) Processing * Look up member details. * Look up book details. * Look up loan details * Search for videos opposite * Search for

  • Word count: 2898
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Under what conditions would it be appropriate to use a process costing system?

Strayer University Graduate Chapter Questions: Ch. . Under what conditions would it be appropriate to use a process costing system? Process costing system can be used in industries that produce essentially homogenous products on a continuous basis, such as bricks and paper. 2. In what ways are job-order and process costing similar? Job-order and process costing are similar in three ways that the book declares. One, both systems have the same basic purposes- to assign materials, labor, and overhead to products and to provide a mechanism for computing unit product costs. Second, both systems use the same basic manufacturing accounts, including Manufacturing Overhead, Raw Materials, Work In Process, and Finished Goods. Third, the flow of costs through the manufacturing accounts is basically the same in both systems. 3. Costing are accumulated by job-order costing system; how are cost accumulated in a process costing system? Under process costing, costs are accumulated by department, rather than by order, and assign these costs uniformly to all units that pass through the department during a period. 4. What two essential features characterize any processing department in a process costing system? The first feature is the activity performed in the processing department must be performed uniformly on all units passing through it. The second feature is the output of the

  • Word count: 708
  • Level: AS and A Level
  • Subject: ICT
Access this essay