Evaluation for Marshmallows and Spaghetti Bridge by Ryan Pike
Marks out of 5 for each person
5 is for a hard worker, often doing more than their share and producing work of a high standard
4 is for someone who did what was expected and their work was of a good standard
3 is for someone who sometimes failed to participate in activities and complete work by required standard
2 is for someone who regularly failed to participate in activities and complete work by required standard
1 is for someone whose contributions were minimal or there was no participation at all
Tinashe, build, 2
Tyler, build, 5
Ryan, build, 5
Loretta, equipment, 4
Gary, research, 3
Chris, research, 2
Dan, presentation, 5
Emily, scribe, 3
Ben, boss, 5
Wednesday, 18 November 2009
Wednesday, 14 October 2009
Activity 3.4
This is what a good telephone communication should speak:
1. Pick up the telephone before the third ring.
2. On answering the phone, show the caller you are enthusiastic and welcoming. Introduce yourself, for example by saying, ‘Good morning, Snowcone Ltd., Sarah speaking. How may I help you?’
3. When speaking to the caller, use appropriate business language and not slang or jargon. For example, instead of saying, ‘OK’, use the word ‘certainly’.
4. If you are unable to answer the caller’s question, tell them that you need to consult someone else and would they mind waiting. You could also offer to call them back (but make sure you do, even if you don’t have success finding an answer). If they are transferred from one person to another they are likely to get very upset.
5. When you have answered the caller’s question it is polite to ask if there is anything else you can do for them. This is a polite way of bringing a call to an end.
6. Thank the caller for their enquiry and say goodbye.
1. Pick up the telephone before the third ring.
2. On answering the phone, show the caller you are enthusiastic and welcoming. Introduce yourself, for example by saying, ‘Good morning, Snowcone Ltd., Sarah speaking. How may I help you?’
3. When speaking to the caller, use appropriate business language and not slang or jargon. For example, instead of saying, ‘OK’, use the word ‘certainly’.
4. If you are unable to answer the caller’s question, tell them that you need to consult someone else and would they mind waiting. You could also offer to call them back (but make sure you do, even if you don’t have success finding an answer). If they are transferred from one person to another they are likely to get very upset.
5. When you have answered the caller’s question it is polite to ask if there is anything else you can do for them. This is a polite way of bringing a call to an end.
6. Thank the caller for their enquiry and say goodbye.
Wednesday, 7 October 2009
Wellcome Trust
The Wellcome Trust is an independent charity funding research to improve human and animal health. Established in 1936 and with an endowment of around £13 billion, it is the UK's largest non-governmental source of funds for biomedical research.
This is from wellcome trust about us
This is from wellcome trust about us
Wednesday, 23 September 2009
Activity 3.3
5 different websites: Retail, manufacturer, sport, local government, charity.
Retail
Argos
• Argos is the largest general-goods retailer in the United Kingdom and Republic of Ireland with over 700 stores. Argos is unique amongst major retailers in the U.K. because its primary means of displaying goods to customers is via a catalogue. Customers browse through the Argos catalogue, select items to purchase, pay for the items, and then collect the items from the in-store collection desk or have the item delivered to their home – it is a catalogue merchant.
Manufacturer
Apple
• Apple Inc. is an American multinational corporation that designs and manufactures consumer electronics and computer software products. The company's best-known hardware products include Macintosh computers, the iPod and the iPhone. Apple software includes the Mac OS X operating system, the iTunes media browser, the iLife suite of multimedia and creativity software, the iWork suite of productivity software, Final Cut Studio, a suite of professional audio and film-industry software products, and Logic Studio, a suite of audio tools. The company operates more than 250 retail stores in nine countries and an online store where hardware and software products are sold.
Sport
BBC Sports
• BBC Sport is the sports division of the BBC. It became a fully dedicated division of the BBC in 2000. It incorporates programmes such as Match of the Day, Grandstand (discontinued in early 2007), Test Match Special, Ski Sunday, Rugby Special and coverage of Formula One motor racing and the Wimbledon Tennis Championships.
Local Government
Hampshire council
• Hampshire sometimes historically Southamptonshire, Hamptonshire, (abbr. Hants), or the County of Southampton, is a county on the south coast of England. The county borders (clockwise from West), Dorset, Wiltshire, Berkshire, Surrey and West Sussex. The county has an area of 1,455 square miles (3,769 km²) and at its widest points is approximately 55 miles (90 km) east–west and 40 miles (65 km) north–south. The 2001 census gave the population of the administrative county as 1.24 million; the ceremonial county also includes the cities of Portsmouth and Southampton, which are administratively independent, and has a total population of 1.6 million. Christchurch and Bournemouth, within the historic borders of the county, were made part of the non-metropolitan county of Dorset in 1974.
Charity
Oxfam
• Oxfam International is a confederation of 13 organizations working with over 3,000 partners in more than 100 countries to find lasting solutions to poverty and injustice.
Retail
Argos
• Argos is the largest general-goods retailer in the United Kingdom and Republic of Ireland with over 700 stores. Argos is unique amongst major retailers in the U.K. because its primary means of displaying goods to customers is via a catalogue. Customers browse through the Argos catalogue, select items to purchase, pay for the items, and then collect the items from the in-store collection desk or have the item delivered to their home – it is a catalogue merchant.
Manufacturer
Apple
• Apple Inc. is an American multinational corporation that designs and manufactures consumer electronics and computer software products. The company's best-known hardware products include Macintosh computers, the iPod and the iPhone. Apple software includes the Mac OS X operating system, the iTunes media browser, the iLife suite of multimedia and creativity software, the iWork suite of productivity software, Final Cut Studio, a suite of professional audio and film-industry software products, and Logic Studio, a suite of audio tools. The company operates more than 250 retail stores in nine countries and an online store where hardware and software products are sold.
Sport
BBC Sports
• BBC Sport is the sports division of the BBC. It became a fully dedicated division of the BBC in 2000. It incorporates programmes such as Match of the Day, Grandstand (discontinued in early 2007), Test Match Special, Ski Sunday, Rugby Special and coverage of Formula One motor racing and the Wimbledon Tennis Championships.
Local Government
Hampshire council
• Hampshire sometimes historically Southamptonshire, Hamptonshire, (abbr. Hants), or the County of Southampton, is a county on the south coast of England. The county borders (clockwise from West), Dorset, Wiltshire, Berkshire, Surrey and West Sussex. The county has an area of 1,455 square miles (3,769 km²) and at its widest points is approximately 55 miles (90 km) east–west and 40 miles (65 km) north–south. The 2001 census gave the population of the administrative county as 1.24 million; the ceremonial county also includes the cities of Portsmouth and Southampton, which are administratively independent, and has a total population of 1.6 million. Christchurch and Bournemouth, within the historic borders of the county, were made part of the non-metropolitan county of Dorset in 1974.
Charity
Oxfam
• Oxfam International is a confederation of 13 organizations working with over 3,000 partners in more than 100 countries to find lasting solutions to poverty and injustice.
Wednesday, 16 September 2009
Activity 5.7
1) Klez virus causes damage to a computer system by a blended threat: software that distributes itself like a virus but sometimes behaves like a worm and at other times like a Trojan horse. Klez usually arrives in the in-boxes of unsuspecting victims as a file attachment. It uses various subject lines, including "Klez removal tool". Some variants also draw subject lines from random words in files on a victim's hard drive.
When the victim double-clicks the attachment, or even just previews the message, the fun begins for Klez. It pilfers addresses from the victim's e-mail address books, and also searches the hard drive for addresses from the Web browser cache or temporary files.
What makes Klez particularly insidious is that it draws both a new sender and a new recipient from the infected party's sources. This creates at least three victims: the person who first got the worm, the one who is sent the worm, and the one whose address was taken from the original victim and is used as the new sender.
Because the infected sender's address is not on the new e-mail, the worm is difficult to track. And blocking the return address is ineffective, because that person didn't send the worm. Worse, the innocent sender may well be someone you know, making you more likely to open the message, click on the attachment, and perpetuate the virus.
"These types of social-engineering tricks are extremely effective," says virus researcher Sarah Gordon. People don't want to ignore a friend or colleague, she says. "They feel compelled to look at an attachment--even though they've heard the warning."
In the months since Klez was first identified, antivirus vendors have discovered seven versions of the virus. These strains share many behavioral traits but act slightly differently from one another. For example, some later versions can attack other systems over networks by copying infected files to file servers and shared hard drives. One of the newest variants, W32.Klez.H@mm, contains another worm called ElKern that can damage an operating system beyond repair. In some instances, users must reformat the entire hard drive and reinstall Windows to purge the virus from a PC.
2) I have compared the W32/Klez-H virus and the W32/ElKern-C virus and the difference of the two are that W32/ElKern-C is an executable file virus that works only under Windows 98, Windows Me, Windows 2000 and Windows XP and W32/Klez-H will corrupt any installation of Sophos Anti-Virus it finds, so it must be removed with DOS SWEEP or SAV32CLI before installing a new version.
3) I have researched and found that http://www.sophos.com/security/analyses/viruses-and-spyware/w32klezh.html has the best klez antivirus software because it is free, comes from a reliable source, instruction on how to use, information and much more.
When the victim double-clicks the attachment, or even just previews the message, the fun begins for Klez. It pilfers addresses from the victim's e-mail address books, and also searches the hard drive for addresses from the Web browser cache or temporary files.
What makes Klez particularly insidious is that it draws both a new sender and a new recipient from the infected party's sources. This creates at least three victims: the person who first got the worm, the one who is sent the worm, and the one whose address was taken from the original victim and is used as the new sender.
Because the infected sender's address is not on the new e-mail, the worm is difficult to track. And blocking the return address is ineffective, because that person didn't send the worm. Worse, the innocent sender may well be someone you know, making you more likely to open the message, click on the attachment, and perpetuate the virus.
"These types of social-engineering tricks are extremely effective," says virus researcher Sarah Gordon. People don't want to ignore a friend or colleague, she says. "They feel compelled to look at an attachment--even though they've heard the warning."
In the months since Klez was first identified, antivirus vendors have discovered seven versions of the virus. These strains share many behavioral traits but act slightly differently from one another. For example, some later versions can attack other systems over networks by copying infected files to file servers and shared hard drives. One of the newest variants, W32.Klez.H@mm, contains another worm called ElKern that can damage an operating system beyond repair. In some instances, users must reformat the entire hard drive and reinstall Windows to purge the virus from a PC.
2) I have compared the W32/Klez-H virus and the W32/ElKern-C virus and the difference of the two are that W32/ElKern-C is an executable file virus that works only under Windows 98, Windows Me, Windows 2000 and Windows XP and W32/Klez-H will corrupt any installation of Sophos Anti-Virus it finds, so it must be removed with DOS SWEEP or SAV32CLI before installing a new version.
3) I have researched and found that http://www.sophos.com/security/analyses/viruses-and-spyware/w32klezh.html has the best klez antivirus software because it is free, comes from a reliable source, instruction on how to use, information and much more.
Wednesday, 9 September 2009
Activity 5.1
1) The components used in a network are:
• Ethernet
• Broadband
• Router
• ISP (Internet Service Provider)
• Modem
• Hub
• Switch
2) The roles of the components are:
• Ethernet is the common standard used in networks to define the signals needed to let computers connect to each other and send data.
• Broadband is the name given to a modern, fast, always-on connection to the internet.
• A router finds out which routes are available between two computers then sends the data through the quickest. Many modern modems also have a router.
• The ISP (Internet Service Provider) is an organisation that provides access to the internet. Most people pay the ISP for this service, with their computers logging onto the ISP systems that connect to the internet.
• A modem is a device that converts computer data into a form that can be sent through a connection to another place. Two modems are required for this, one at each end of the connection.
• A hub is a box with RJ45 ports (sockets), so several network cables can plug into it to connect computes and other devices on a network. A hub is not as good a switch because data arriving at a port is sent to all the other ports, thereby reducing how much data the system can carry.
• A switch is a box with RJ45 ports (sockets, so several network cables can plug into it to connect computers and other devices on a network.
• A network card fits inside a computer to a network. Network cards can be cable or wireless.
3) Switches are better than hubs because Although hubs and switches both glue the PCs in a network together, a switch is more expensive and a network built with switches is generally considered faster than one built with hubs. Why?
When a hub receives a packet (chunk) of data (a frame in Ethernet lingo) at one of its ports from a PC on the network, it transmits (repeats) the packet to all of its ports and, thus, to all of the other PCs on the network. If two or more PCs on the network try to send packets at the same time a collision is said to occur. When that happens all of the PCs have to go though a routine to resolve the conflict. The process is prescribed in the Ethernet Carrier Sense Multiple Access with Collision Detection (CSMA/CD) protocol. Each Ethernet Adapter has both a receiver and a transmitter. If the adapters didn't have to listen with their receivers for collisions they would be able to send data at the same time they are receiving it (full duplex). Because they have to operate at half duplex (data flows one way at a time) and a hub retransmits data from one PC to all of the PCs, the maximum bandwidth is 100 Mhz and that bandwidth is shared by all of the PC's connected to the hub. The result is when a person using a computer on a hub downloads a large file or group of files from another computer the network becomes congested. In a 10 Mhz 10Base-T network the affect is to slow the network to nearly a crawl. The affect on a small, 100 Mbps (million bits per second), 5-port network is not as significant.
Two computers can be connected directly together in an Ethernet with a crossover cable. A crossover cable doesn't have a collision problem. It hardwires the Ethernet transmitter on one computer to the receiver on the other. Most 100BASE-TX Ethernet Adapters can detect when listening for collisions is not required with a process known as auto-negotiation and will operate in a full duplex mode when it is permitted. The result is a crossover cable doesn't have delays caused by collisions, data can be sent in both directions simultaneously, the maximum available bandwidth is 200 Mbps, 100 Mbps each way, and there are no other PC's with which the bandwidth must be shared.
An Ethernet switch automatically divides the network into multiple segments, acts as a high-speed, selective bridge between the segments, and supports simultaneous connections of multiple pairs of computers which don't compete with other pairs of computers for network bandwidth. It accomplishes this by maintaining a table of each destination address and its port. When the switch receives a packet, it reads the destination address from the header information in the packet, establishes a temporary connection between the source and destination ports, sends the packet on its way, and then terminates the connection.
Picture a switch as making multiple temporary crossover cable connections between pairs of computers (the cables are actually straight-thru cables; the crossover function is done inside the switch). High-speed electronics in the switch automatically connect the end of one cable (source port) from a sending computer to the end of another cable (destination port) going to the receiving computer on a per packet basis. Multiple connections like this can occur simultaneously. It's as simple as that. And like a crossover cable between two PCs, PC's on an Ethernet switch do not share the transmission media, do not experience collisions or have to listen for them, can operate in a full-duplex mode, have bandwidth as high as 200 Mbps, 100 Mbps each way, and do not share this bandwidth with other PCs on the switch. In short, a switch is "more better."
• Ethernet
• Broadband
• Router
• ISP (Internet Service Provider)
• Modem
• Hub
• Switch
2) The roles of the components are:
• Ethernet is the common standard used in networks to define the signals needed to let computers connect to each other and send data.
• Broadband is the name given to a modern, fast, always-on connection to the internet.
• A router finds out which routes are available between two computers then sends the data through the quickest. Many modern modems also have a router.
• The ISP (Internet Service Provider) is an organisation that provides access to the internet. Most people pay the ISP for this service, with their computers logging onto the ISP systems that connect to the internet.
• A modem is a device that converts computer data into a form that can be sent through a connection to another place. Two modems are required for this, one at each end of the connection.
• A hub is a box with RJ45 ports (sockets), so several network cables can plug into it to connect computes and other devices on a network. A hub is not as good a switch because data arriving at a port is sent to all the other ports, thereby reducing how much data the system can carry.
• A switch is a box with RJ45 ports (sockets, so several network cables can plug into it to connect computers and other devices on a network.
• A network card fits inside a computer to a network. Network cards can be cable or wireless.
3) Switches are better than hubs because Although hubs and switches both glue the PCs in a network together, a switch is more expensive and a network built with switches is generally considered faster than one built with hubs. Why?
When a hub receives a packet (chunk) of data (a frame in Ethernet lingo) at one of its ports from a PC on the network, it transmits (repeats) the packet to all of its ports and, thus, to all of the other PCs on the network. If two or more PCs on the network try to send packets at the same time a collision is said to occur. When that happens all of the PCs have to go though a routine to resolve the conflict. The process is prescribed in the Ethernet Carrier Sense Multiple Access with Collision Detection (CSMA/CD) protocol. Each Ethernet Adapter has both a receiver and a transmitter. If the adapters didn't have to listen with their receivers for collisions they would be able to send data at the same time they are receiving it (full duplex). Because they have to operate at half duplex (data flows one way at a time) and a hub retransmits data from one PC to all of the PCs, the maximum bandwidth is 100 Mhz and that bandwidth is shared by all of the PC's connected to the hub. The result is when a person using a computer on a hub downloads a large file or group of files from another computer the network becomes congested. In a 10 Mhz 10Base-T network the affect is to slow the network to nearly a crawl. The affect on a small, 100 Mbps (million bits per second), 5-port network is not as significant.
Two computers can be connected directly together in an Ethernet with a crossover cable. A crossover cable doesn't have a collision problem. It hardwires the Ethernet transmitter on one computer to the receiver on the other. Most 100BASE-TX Ethernet Adapters can detect when listening for collisions is not required with a process known as auto-negotiation and will operate in a full duplex mode when it is permitted. The result is a crossover cable doesn't have delays caused by collisions, data can be sent in both directions simultaneously, the maximum available bandwidth is 200 Mbps, 100 Mbps each way, and there are no other PC's with which the bandwidth must be shared.
An Ethernet switch automatically divides the network into multiple segments, acts as a high-speed, selective bridge between the segments, and supports simultaneous connections of multiple pairs of computers which don't compete with other pairs of computers for network bandwidth. It accomplishes this by maintaining a table of each destination address and its port. When the switch receives a packet, it reads the destination address from the header information in the packet, establishes a temporary connection between the source and destination ports, sends the packet on its way, and then terminates the connection.
Picture a switch as making multiple temporary crossover cable connections between pairs of computers (the cables are actually straight-thru cables; the crossover function is done inside the switch). High-speed electronics in the switch automatically connect the end of one cable (source port) from a sending computer to the end of another cable (destination port) going to the receiving computer on a per packet basis. Multiple connections like this can occur simultaneously. It's as simple as that. And like a crossover cable between two PCs, PC's on an Ethernet switch do not share the transmission media, do not experience collisions or have to listen for them, can operate in a full-duplex mode, have bandwidth as high as 200 Mbps, 100 Mbps each way, and do not share this bandwidth with other PCs on the switch. In short, a switch is "more better."
Subscribe to:
Posts (Atom)