Free Essay

Unit 1

In:

Submitted By sukhgill1
Words 4408
Pages 18
Unit 4 business communications

In this summary I will be explaining the Legal and ethical issues in relation to the use of city of Wolverhampton college information.

There are various items of law to protect the use of business information which include relevant data protection legislation for example data protection act 1998, freedom of information act 2000 and computer misuse act 1990.

Most of organisation store and use information about people and their employee. For example the data protection act protects the information held about students and staff of City of Wolverhampton College from being misused. All the information which stores by college it should be obtained fairly and lawfully so they can prevent their students and staff personal information being used by third party for illegal purpose. It should be accurate and up to date so if there have been an incident at college therefore the college staffs can use their personal information to let their families know what’s going on in college.

The freedom of information act came into consequence in 2005. It provides the college the right to request information held by a public authority. The public authority should tell the college if they hold the information which they should provide in 20 working days in the requested format. For example when the cost of a request for information goes beyond a correct limit then the public authority could decide if a greater public interest is being provide by refusing the request. For some reason if there been problem between college and a public authority about a request for information then the information will be investigated by the commissioner’s office and they will take the decision whether to give that information or not.

An ethical issue is a code of practice which will be present in college to keep business ethics on use of email, whistle blowing, organisational policies and information ownership. The college have a policy of practice on the accurate use of email to provide standard information in a one to one meeting to students and as reminder of their deadlines for their assignments or for attendance concerns etc. They do not use email for really confidential information they send that information direct to the addresses in a sealed envelopes which is more secure. The college also have police for use of the internet which will describe to their staff and students what they can and cannot use internet for. For example the college students or staff can use the internet to get some information in order to complete their work but they cannot use internet for social network while they are in class and they also don’t have access to inappropriate website.

A whistleblower is a person who represents any kind of information or activity that is believes to be illegal, dishonest or not correct within a business that is either private or public. For example if there is student who has been using the wrong information to get student facilities such as bus pass or squid card will raise a concern about a business practice to management within the college and outside the college as well. This could have a big impact on college students and the reputation. That college could receive legal protection from the public interest disclosure act if the offence being reported represents a deliberate attempt to break law.

The computer misuse act 1990 is a law in the United Kingdom which the city of Wolverhampton college has to follow because if student or tutor try to hack into other people’s systems they will be withdrawn from the college and could face prosecution. According computer misuse act 1990 any student or tutor in this college cannot misuse software or cannot help a person to get information from unauthorised files from college computers.

The college have many policies to make sure that college performs with regard to college information can be done more ethically. It can be anything from how they manage information to make sure marketing and college other activities are fair and just. For example, one of college polices is that everyone in college has to wear their ID badges which shows that they are student of this college and even tutor has to wear them all the time or they could be sent home for not wearing them and will not be allowed in college unless they show the ID badge this policy applies to everyone student, tutor and any other staff in this college.

The idea of information ownership is simple if you create any information in your day to day work then you are the one responsible for that information. For example, when tutor does one to one meeting with students regarding to their attendance or work concern from other tutor on promonitor and that message on promonitor needs to be confidential and its tutor responsibility to make sure that it only can be viewed by the person who has the authority to it. Since the tutor has written that message it will make them the information owner. As the the information owner the tutor is responsible for keep this message to an appropriate degree. Also owner of this information the tutor needs to keep this information confidentially and act with honesty when anything has to be altered with regard to the information.

The college have to manage and store innumerable information with some individual far more important than others. Lying at the heart of any information system are two essential issues are that the college receives the information they require and the appropriate members of staff receives the information. The college needs to put number of procedures and polices together in place to make sure that information is managed appropriately, concerning security of information, backups, health and safety, organisational policies and business continuance plans.

The information security management deals with keeping the integrity and availability of college information and knowledge. Most of security information focus on digital data however the theme also covers records and knowledge of management. In order to make good business decision the college should have the correct information available as when they need it. For example, college keep their information on IT systems but as the belief on technology rise so does the risk posed by system failure and malicious attacks such as viruses. The IT security policy has included the secure login identification for using IT systems and control that limit access to information.

To minimise the risk of losing vital college information stored on IT servers the college has developed business continuity programmers which involves producing backups of information stored on the servers. For example college might create backup every hour which means if the information is damaged or destroyed a copy is available so the college can carry with as little trouble as possible.

The health and safety display screen equipment regulation 1992, management of health and safety at work regulation 1992 and the workplace regulation 1992 all these acts legislate the use of computer equipment. It is unlikely that computer equipment in itself will be dangerous unless you use it in ways that it can be danger to health of staff or students. As you know most of the work students or other college staff does on computer so bad posture such as incorrect positioning of equipment and susceptibility to repetitive strain injury are health and safety risk that students or other staff are legally required to take seriously. The college staff and students should carry out workstation assessments which will help them to put their computer screen at right level to avoid repetitive strain injury. To ensure that no student or staffs in this college suffer from RSI the college should provide ergonomic equipment which is designed to reduce the risk of injury.

Organisational polices that report to use of business information can help to ensure that decision affecting staff are understandable and reliable, meeting legal requirements, taking full account of their impact and contributing to productive working relationships. Policies are to make sure that staff have guidance to help them comply with legislation. For example, the college policy on storing and usage of student’s data should work within the requirements of the Data Protection Act.

Business continuance plans is the step that a business puts into place to ensure it is efficient of surviving a worst case scenario. One step in the continuance programme might be to make sure the college is creating regular backups of its information. The college could deliberate disasters such as fire, accidents or malicious attacks in its planning. As a result of plan college staff might need to change the way they work for example storing information on their main area instead of on their personal hard drive.

It is important to manage the cost of IT projects. Many aspects of information management can cost money for example it may be necessary to store backup copies of electronic information on a remote server but a small business might not be able to support this expense. The college needs to think implementation and maintenance costs versus the benefits to the college when deciding what policies to accept and what measure to take. A key consideration is cost of development – This is usually a large part of the budget for a new computer system. There will also be ongoing costs once the system is running for slight changes to keep the system in line with the college needs.

The increase of sophistication of a system is most likely going to have a great effect on college staff. One of the effects of an increasing reliance on technology is that college staff needs to be trained to use the equipment and software required to do their job. For example they would need to know what has been changed and what the new way of doing things such as transactions are. By training the staff correctly on the process of the new system means there are likely to be less issues such as mistakes being made. Also because of systems being produced at a higher complexity then before additional trained experts such as development software may be employed as they are able to solve issues when they occur with the system itself.

Audience requirement

At first meeting formalities and appropriate greeting are usually expected for example handshake, introduction of ourselves, eye contact and discussion around a neutral subject such as weather. A friendly character and smiling face are more likely to support communication than a blank face. The audience’s requirements will depend on: age, attention span, gender, special needs and interest.

Age and attention span needs to be taken into deliberation when corresponding with longer written documents or presentations. Think about your audience how old they are? Younger people might have little attentions spans than older people. Teenagers are probably more restful with using technology than pensioners. The main thing to maintain an audience attention is variety for example if a presentation from a tutor or student is boring the audience is likely to switch off. The tutors or students needs to ask question when presenting a presentation or keep section clear which will improve a presentation structure. This will help them to keep their students attention. You can easily separate some members of your audience accidentally by not demonstrating them in examples. Audience can be connected with your messages if they see it as describing to them. The tutor or students need to make sure that they are representing the balanced cross section when including a examples in their communications. They should use examples that draw from the experiences of both men and women from different ethnic background positively.

When presenting a PowerPoint presentation or any other types of written communication the tutor or students large font sizes can help their audience the partially sighted. Also some visual impaired learners find certain colour combinations problematic for example yellow and green so they should avoid these colours. They might need to adapt your communication depending on the needs of audience and they might need to think about where their audience is sitting in the room. People with hearing difficulties who lip read for example would need a clear sight of your face.

The main key to gain the interest of their audience is to get to the point and explain how the topic is important to them. Try to introduce main key points which will help maintain interest. Funniness things can also be used for good effect but be careful not to do too much. Make sure they asking the questions which will keep help them to get the audience to participate. They also need to know how interested their audience actually is in the matter they are to communicate about. If they are already eager to hear what the tutor or student have to say then the tutor or students doesn’t need to work hard to keep them interested.

There is various way available to create a written communication and has a number of differences from spoken communication. Written communication is hardly written and read at the same time. It continues over time and is able to be reused and duplicate also could be reviewed before distribution. The different way of written communication include letter, fax, email and www (worldwide web) etc. the college letters need to reach high standard of communication as people outside the college will judge the college by the letter its staff write. Letters must be clear if they are issuing instruction. A letter may rise legal problems
If it is for example an acceptance of a contract. Firstly, the letter must include introduction which will show the reader what the letter is about and why the college has written that letter to them. Secondly it should have detail which is main part of the letter and it contains the information the college wish to convey to their reader. Lastly letter must define to their reader what they should do next in response to college letter.

Since the adaption of email, faxes are used less frequently in college. a fax is scanned document that is sent by telephone line to a receiver. It could be use to send documents fast if only a hard copy is available for example student’s enrolments forms or staffs signed contract. A cover sheet is usually faxed with the message which describe the name of the intended recipient and the sender. It is also a good practice to let the intended know that you are sending a fax. The college needs to make sure that fax they send gets to the right person because most of the organisation have only few fax machine so they could have several hundreds of employees. Emails are a common form of written communication in college because the college principal or any staff member they all receive quite lots emails in day. It is quick way to communicate as preparing emails does not require any discussion. It does not mean that the content of the email is not created from a lot of interaction but the act itself of communicating through email is one way. The biggest difficulty with emails is that they are not personal. The well-read skills of the email writer will also explain if their message is described exactly as they interned.

The worldwide web has developed the business and the increasing availability of broadband across the United Kingdom has enhanced the range of service offered. Internet technology such as cookies has enabled websites to deliver a much more adapted experience of customers. For example a college website will suggest new course to a returning students based on the courses they have done before in this college. Telephone is one of the method for non – written communication because communicating through out the phone is more personal than emails which means there will be less scope for misinterpretation. With the popularity of telephones, the staff often being spread to various location it is necessity in college to communicate via the phone. For example when receptionist received the delivery package or a letter for certain tutor or any other staff they do not just go and hand it that package or letter they will first make an call to their office to see when they will available so they can give it to them which will save their time. The college also provide mobile phones to tutor when they organise trip to stay in touch with them also it helps the tutor as well so they can stay in touch with students if they get lost because tutor are allowed to give that number to students while they are on trip.

Technology has changed the way in which college can communicate and there is wide range of tools available. Computers are necessary in college in college which allow the college staff and students to use emails, multimedia, presentation and website. Digital broadcasting television service allow the students and staffs of city of Wolverhampton college to see which room they are in when the exams comes. DVD has replaced video as the most visual medium. It allows the college IT department to store more data than CD-ROM for computer programs. DVD are comparatively cheap to duplicate and spread. Tutors use the DVD if it has information which is related to explaining any particular assignment work. Mobile phones has allowed the college staff to stay in touch when they are on trip which has proved an important development for college. For example college also use this facilities to send messages to student when they don’t attend college or when they have borrow some books from study hub and forgot to return it back therefor the staff use this facilities to remind them.

The internet has changed the way we communicate giving people access to free web based email accounts, letting organisations and individuals to distribute the information through website. More and more people are starting to use the internet on their mobile phones which is not possible without wireless application protocol in another words (WAP). It been really helpful in college because college provide this facility free to their students and staff which allow them to access to internet such as emails or any other network which require internet connection. Students been using this facility on their tablets and phones to complete their work while they are on break.

All business does not use formal way in communication. Approved communication such as letter to customers or reports use a formal structure and professional language. Most of the communication in college is informal for example emails, texts messages and quick messages are often informal. However, informal communication does not follow a authorised structure and might not be recorded for example tutors cannot use informal language when they are typing any message on promoter it has to be in formal.

Verbal and non verbal can be communicate in any context. Verbal communication contains voice. For example in college the most obvious way of this is the telephone where only voice can be used but it also involves meeting and presentations. On the other side non verbal communication tells anything that communicates without or in addition to verbal communications. It could be in paper based for example letters, reports or screen based such as presentation slides and emails. It also consists of a complete package of expressions which includes hand and eye movements, attitudes which should be understood along with speech. Verbally communication that are not stating forms of interpersonal communication are called non verbal communication. It includes body language, posture, eye contact facial expression etc. Non verbal signs can have great influence on the listen than the spoken word when we communicate.

Listening is more complex than it may seem but it is vital communication skill. There is a big difference between hearing something and listening to it because listening requires an understanding of the message being communicate. For example when a students present a power point presentation in class their message might not be in those slides but their body language could tell their audience more than the words. One of the most important skill is active listening skill however most of students spend more energy thinking about what the person is going to say rather than listening to what that person is trying to say. The following points are necessary for effective listener - be prepared to listen, keep an open mind and concentrate on the main direction of the speaker’s message, avoid distraction if at all possible and do not ask question when that person is already answering to somebody else question. Through out active listening and questioning you can often get more complete understating o the information.

When a tutor or student are communicating a message to an audience it is vital their message is understood. It is usual to leave time at the end of a presentation for audience to ask some questions. However the success of this sometimes depends on the audience capability to listen throughout the presentation. To make sure that your audience has understood their message they would need to ask them question. It can be done either end of the presentation or during the main key points of the presentation. As well as listening and understating skills seeking clarification is necessary. For example when tutor finish a power point presentation on assignment and you have doubt that you have understood it fully then ask question to make sure you are confident in your understanding which is sign of strength not a weakness. Effective questioning is an essential skill as it can be used to test understanding, obtain information, start a conversation and pull someone into conversation. There are two type of question open and close question. Closed question tend to seek only a one or two-word answer and in doing so limit the possibility for answering. For example when students try to get bus pass from student service the staff often ask them is your attendance is above 85%? These type of question mean the questioner maintains control of the communication which is often not required in a helping relationship. On the side open open question increase the possibility for answering as they demand further discussion. For example having indicate that not completing your GCSE has affected you to not get into university? Open question might take longer to answer but they do give the other person far more choice for self expression and encourage their involvement in the conversation.

Reflecting is a specialised skill which can be applied to a wide range of communication contexts. It includes paraphrasing for example when student putting the message communicate into their own words and at the same time as taking the spirit of the facts and feeling expressed. It is useful process because the student will gets feedback as to how their message has been received. Student needs to respond to the needs of their audience as a communicator. Selecting an suitable level and liberation method for your information is only part of considering your audience needs. In case if you notice that their knowledge on the topic is less developed than you thought or if it become clear that your audience require more information then you must provide them with more information or easier explanation.

Eye contact is an important side of non-verbal behaviour. Main purpose is to give and receive feedback – for example when student present to the class they look at their audience which tell them that they are listening and concentrating on the content of their presentation. When eye contact is maintained this might indicate lack of interest. Eye contact is more likely to be given continuously by a listen than a speaker. Good eye contact is an important practice for anyone who’s presenting.

Your facial expression says a lot about how you are feeling. While you might be confident pitch to investors, your facial expression should betray any nervousness that you are feeling. Some students find it more easier to practice in front of a mirror but they might find it more natural if they do short recording of their presentation. Keep an eye out for anything you do that you think your audience should find distracting. For example if someone hearing to loud music or mobile phones they should be on silent etc.

Body language include gestures posture, head and hand movements. It can be used to reinforce or emphasise what a person is saying. It also shows about emotions and attitudes of a person but it is possible for body movement to conflict with what is said. A skilled teacher may be able to detect such discrepancies in behaviour and use them as sign to a student’s real feeling.

Many students feel terrified when asked to present it to class. However some initial fears can be allayed by good preparation, which will also help to make an effective presentation. Formal and informal communication requires different standards for language and presentation. Formal communication methods are letter, reports, presentation should follow particular conventions and require more formal businesslike language. For example as an infroamtion communication method students might text their class mate friend to say U and want2 etc however if student were sending a message on behalf of college you might send out a letter giving more than 24 hours notice.

Not all communication techniques will suit all audience because when planning how you are going to present information to your audience, it is important to tailor your approach which will student best chance of successful communicating the information. Always remember when picking a format of your delivery the potential technology to use the language and level of complexity ,your first concern should how your audience will feel about any of the decision you are considering. Before preparing material for a presentation think about your prospective audience. Tailoring your talk to the audience is important and you should think about: - the size of the audience expected, the age range etc.

Many presentations require the student to persuade others to accept a proposal or perhaps a change to working practices. The presenter should be able to demonstrate honesty because if your audience feels they cannot trust you then they might not agree with your presentation, prepare yourselves to answer any question in presentation all these tips will help you to deliver a good presentation.

Similar Documents

Free Essay

The a-1 Unit

...The A-1 Unit* I.Time Context: Months after the operation of the A-1 unit of a popular government agency II. Viewpoint Consultant III. Statement of the Problem * A-1 was not a formally established staff. * The allegiance of the members towards the A-1 unit. * Group complaints about the heavy workload/multitasking * Alex Marasigan and Tino Torres do not contribute their fair share of the task. * The unclear assignment between the mother unit and the A-1 unit. * Agency’s concern seemed emphasized mostly to production and less to people. * Muñoz doesn’t want them to see him as a pushy and domineering head. IV. Objectives * Whether to design the A-1 unit with permanent staff. * Whether another training seminar is necessary to recruit more members to the A-1 workforce. * Whether another refreshing course is necessary to put Marasigan, Torres, and the rest of the members back on track. * Whether the A-1 unit be treated and defined to have an independent power and authority with respect to personnel concerns. V. Areas of Consideration * Understaffed and overload of assignment * Group complaints about the heavy workload, bottlenecks, and prioritization of assignments that the staff receives both from the respective home bases and the A-1. * Ambiguity to distinguish leader’s power and authority. VI. Alternative Courses of Action * Establish A-1’s staff; Hire new employees and conduct training seminars that is necessary for recruitment...

Words: 520 - Pages: 3

Free Essay

Mth133 Unit 1

...form Unit 1 1. a. (0,41000) (2,46000) b. slope is m= (y2-y1) / (x2-x1) m= (46000-41000) / (2-0) m= 5000/2 M=2500 c. y=mx+b y = 2500x + 41000 d. For 2008 (year 0 was 2002), x will be 6. Y = 2500(6) + 41000 Y = 15000+41000 Y = 56,000. Bobs salary in 2008 is $56,000. e. 68500 = 2500(x) + 41000 27500 = 2500(x) X = 11 It will take Bob 11 years to reach $68,500. 2. (Notes for myself) L+3=W, W, L+3=W,W a. 2w+2w+ (3x2) = 78 4w+6=78 4w=72 W=18 b. As shown above, if the w=18 then: W=18 L=21 L= W+3 c. L=21 W= (21/3)+4 W=11 2L+2W=P 42+22=P P=64 If the last length (L) was 21 inches, then the new width (W) would be 1/3 of the L, plus 4 which gives you 11. Thus gives you the L as 21 and the W as 11, using the equation 2L+2W=P, the perimeter is 64 inches. 3. a. C = 35+4x C = 6.50(x) b. 35+4x < 6.5x 35< 2.5x 14< x c. The means that to rent the court so that the monthly cost of the first option is less than the second option, which the court must be rented for MORE than 14 hours. 4. a. Values according to equation: y = 4x – 3 X = -1 y = 4(-1) – 3 y =-4 – 3 y = -7 X = 1 y = 4(1) - 3 y = 4 - 3 y = 1 X = 3 y = 4(3) - 3 y = 12 - 3 y = 9 b. [pic] c. Solving for -2x – y = 1 X=-1 ...

Words: 368 - Pages: 2

Premium Essay

Nt1310 Unit 1 Assignment

...placed under construction on 10/28/2015. The construction area was from mile marker 213 to mile marker 236 with significant crashes causing interstate blockage daily. There was a major increase in the number of crashes documented due to various issues within the construction area. After consulting with the area supervisor, I was authorized to develop a crash reduction plan for this section of highway. I identified issues within the construction zone and met with personnel from TxDOT, Texas Sterling, Webber and various other contractors to address the problem issues; to include: water drainage, tapers, extruders, speed limits, lane closures, and worker safety. A HEAT map and crash data was pulled. Day patrols were increased, a UCRP (Drone Unit) was strategically placed, surge operations and multiple laser task forces were conducted. In turn, major crashes were reduced, construction zone safety was increased, and traffic flow was improved; while teamwork and overall area morale were strengthened. During a declared disaster in Navarro County due to major flooding, I was selected to serve as the contact person for field operations. I advised the Chain of Command as it became necessary to close Interstate 45 due to Richland Creek flooding at the 220-milepost. I placed Troopers south of the creek due to the next crest. I informed the command post of locations to station Trooper so that traffic on the interstate could be shut down. I was able to give the Chain of Command alternate...

Words: 1291 - Pages: 6

Free Essay

Nt1210 Unit 1 Lab 1.1

...2000+ | 900 + | 30 + | 1 = | 2931 | 1.1.2 22↓ | 21↓ | 20↓ | | 4X | 2X | 1X | | 1____ | 1____ | 0____ | | 4+ | 2 + | 0 = | 6 | 1.1.3 21↓ | 20↓ | | 2X | 1X | | 1____ | 1____ | | 2 + | 1 = | 3 | 1.1.4 24↓ | 23↓ | 22↓ | 21↓ | 20↓ | | 16X | 8X | 4X | 2X | 1X | | 1____ | 0____ | 0____ | 1____ | 0____ | | 16 + | 0 + | 0 + | 2 + | 0 = | 18 | 1.1.5 27↓ | 26↓ | 25↓ | 24↓ | 23↓ | 22↓ | 21↓ | 20↓ | | 128X | 64X | 32X | 16X | 8X | 4X | 2X | 1X | | 1____ | 1____ | 1____ | 0____ | 0____ | 0____ | 1____ | 0____ | | 128 + | 64 + | 32 + | 0 + | 0 + | 0 + | 2 + | 0 = | 226 | 1.1.6 156 | 28 | 28 | 28 | 12 | 4 | 0 | 0 | | 27↓ | 26↓ | 25↓ | 24↓ | 23↓ | 22↓ | 21↓ | 20↓ | | v | v | v | v | v | v | v | v | | 128x | 64x | 32x | 16x | 8x | 4x | 2x | 1x | | 1 | 0 | 0 | 1 | 1 | 1 | 0 | 0 = | 10011100 | 128 + | 0 + | 0 + | 16 + | 8 + | 4 + | 0 + | 0 = | 156 | 1.1.7 255 | 127 | 63 | 31 | 15 | 7 | 3 | 1 | | 27↓ | 26↓ | 25↓ | 24↓ | 23↓ | 22↓ | 21↓ | 20↓ | | v | v | v | v | v | v | v | v | | 128x | 64x | 32x | 16x | 8x | 4x | 2x | 1x | | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 11111111 | 128 + | 64 + | 21 + | 16 + | 8 + | 4 + | 2 + | 1 = | 255 | 1.1.8 200 | 72 | 8 | 8 | 8 | 0 | 0 | 0 | | 27↓ | 26↓ | 25↓ | 24↓ | 23↓ | 22↓ | 21↓ | 20↓ | | v | v | v | v | v | v | v | v | | 128x | 64x | 32x | 16x | 8x | 4x | 2x | 1x | | 1 | 1 | 0 | 0 | 1 | 0 | 0 | 1 | 11001001 | 128 + | 64 ...

Words: 552 - Pages: 3

Premium Essay

Unit 1: the Contemporary Hospitality Industry

...UNIT 1: THE CONTEMPORARY HOSPITALITY INDUSTRY Get assignment help for this unit at assignmenthelpuk@yahoo.com LO1 Understand the current structure of the hospitality industry Hospitality industry: hotels; restaurants; pubs, bars and nightclubs; contract food service providers; hospitality services; membership clubs and events; brands and businesses Scale and scope: size; types of ownership; turnover; percentage of Gross Domestic Product (GDP); purchasing power Diversity: products and services eg food, drink, accommodation, conference and banqueting, leisure facilities; levels of service; customer base Organisational structure: operational areas eg food preparation, food and beverage services, accommodation services, front of house services; functional eg human resources, finance, marketing, research and development, security, maintenance Hospitality-related organisations and professional bodies: as current at time of delivery, to include People 1st, British Hospitality Association, Institute of Hospitality, British Institute of Innkeepers, Springboard UK LO 2 Understand staffing in the hospitality industry Staff types: functional specialists; operational; craft; skilled/semi-skilled/unskilled; supervisory; management; apprentices; management trainees; full time/part-time; casual; agency; foreign workers; volunteers Hospitality industry: hotels; restaurants; pubs, bars and nightclubs; contract food service providers; hospitality services; membership clubs and events Structures:...

Words: 1081 - Pages: 5

Premium Essay

Unit 1

...to locate in your computer is System Properties. It provides the most vital information about your computer. By reviewing this window System Properties, you will learn the exact Operating System the computer runs. The Operating System is listed under “Windows edition”. Then you will see the title “System”, the speed of your processor is listed, the amount of Installed memory (RAM), and then the System type. Then you will have the title “Computer name, domain, and workgroup settings”. All of these details are very important when using the computer. The Operating System (OS) is the most essential software on the computer. The OS manages the hardware and software. The Operating System gives direct access to the storage, central processing unit (CPU), and memory, so that different programs can work properly. Without the OS the Computer will operate properly. The operating system determines what your computer can or cannot actually do because each OS has different features, options, applications, compatibilities and even the user interface may change. My current computer has Windows 8.1 as the operating system. Within Windows 8.1 the user interface is much different than the previous Windows 7. After, the first initial installation of Windows 8 certain programs did not work and had to be updated in order to be compatible with the system, even though they originally worked in Windows 7. On important change in Windows 8.1 has two different environments. One is the start screen...

Words: 888 - Pages: 4

Free Essay

Unit 1 Assignment 1

...Unit 1 Assignment 1 Integrated Circuit Technology A motherboard is the backbone of the personal computer, it transfers information and power to all the other components. The motherboard is the largest board inside of the computer that contains the basic input and output system that allows every component to communicate with one another. Attached to the motherboard is a chip comprised with dozens of pins called the central processing unit. Along with the CPU attached to the motherboard is the dual-inline memory modules a part of the random access memory. RAM is the most common type of memory used another type is ROM, read only memory, which stores data onto metal disc within the device. The operating system manages the hardware resources and provides a place to run programs. The last components of the personal computer are the tower and the human interface devices. The tower holds all the components that make up the computer except for the HID which are located outside of the computers tower. The main purpose of the HID’s are to help us interact with the computer, a few examples are the keyboard, mouse, monitor, video camera and speakers. You put together the Motherboard, CPU, RAM, ROM, OS, Tower, HID’s add a power supply and you have a basic personal computer. PROCESSOR TRANSISTOR YEAR Intel 4004 | 2,300 | 1971 | Intel 8008 | 3,500 | 1972 | Intel 8080 | 4,500 | 1974 | Intel 8085 | 6,500 | 1976 | Intel...

Words: 427 - Pages: 2

Premium Essay

Nt1310 Unit 3 Assignment 1 Material Analysis

...Assignment 1 Task 1 Task 1 a): Iron Man DVD Interface The purpose of this example, is that it is a DVD that is made for the entertainment of who ever watches the movie. It gives you four things to choose from, Play, Set up, Special features and scene selection. The menu uses button that are interactive and take you to different scenes that have different types of media, for example the special features button will take you to a new scene with different features such as deleted scenes and a cartoon adventures. I think the DVD is a very good display of imagery and animation. It’s very easy to navigate, the buttons are clear and is just a very simple user interface. The graphics used are very crisp and clear. They are well sized as they are...

Words: 1493 - Pages: 6

Premium Essay

Nt1310 Unit 1 Essay

...740 words. Question 3: “Describe the function of the following Docker commands and briefly explain the purpose of each of the parameters. docker run –d –p 8080:5000 –v $(pwd)/data:/data –name container1 lab4 Docker is a software containerization platform, that runs processes in isolated containers. The docker run command is used to define the containers resources at runtime. When the command is run, the container process is isolated. It is separate from the host itself. The –d command is an option run by Docker to communicate whether the container should be run in “detached” mode or in the “default mode”. The –d command signifies that the container should be run in detached mode, meaning the container will be run in the background. The next option used is –p. This is used to publish all exposed ports to the host interfaces. Docker, in turn, ‘binds’ each of the exposed ports to a host port, addresses of the published ports are 8080:5000. The –v command mounts the current working directory into the container. The –v command can be used multipule times to mount datat volumes. Here it is mounted once. The pwd command prints the working directory i.e. data:/data. The –name command assigns the name container1 lab4 as the container name. docker exec –it A637jd9dja /bin/bash The docker command docker exec runs a new command in an already running container. The command only runs while the containers PID (primary process) is running. If the container is paused the command...

Words: 741 - Pages: 3

Premium Essay

Nt1310 Unit 1 Assignment

...Part 1 Question 1: What is computer architecture? Computer architecture is a set of rules and methods that describe the functionality, organization, and implementation of computer systems. The area includes in computer architecture has the fundamental physical components that constitute a computer system (hardware), the kind of instructions or language the computer can understand, and the underlying computer technology that manipulates these instructions (sometimes referred to as microarchitectures). Question 2: How does data represented / stored / processed in computer? Computer use binary digit as 0 and 1 to store data. Binary digit or called bits is the smallest unit of data in the computing. Not only that, all data represented by made up of binary digits. For example, 01000001 could be a number 65, or character as ‘A’ or a color in an image. The data processed through Boolean Logic. It is a form of algebra in all values are reduced to either TRUE or FALSE as 1 and 0. So that can be formed up a group of binary digit. Question 3: How does a computer carry out instruction execution? The computer stores the program code with the data in the main memory, and the CPU controls the execution of this...

Words: 1347 - Pages: 6

Free Essay

Nt1210 Unit 7 Assignment 1

...Unit 7 Assignment 1 Multiple Choice 1.) A 11.) C 2.) A, B 12.) A 3.) B, D 13.) A, D 4.) A 14.) C 5.) A 15.) B, C 6.) B, D 16.) B, D 7.) A 17.) C 8.) C 18.) B, D 9.) C 19.) A, C 10.) D 20.) B, C Key Terms Switched circuit - A circuit established through one or more intermediate switching devices, such as circuit switches or packet switches. Dedicated circuit - it is used in reference to a phone or data line, or to an electrical circuit. Circuit switching - a methodology of implementing a telecommunications link in which two network nodes establish a dedicated communications channel (circuit) through the network before the nodes may communicate. Packet switching - a digital networking communications method that groups all transmitted data into suitably sized blocks that are transmitted through a medium that may be shared by multiple simultaneous communication sessions. Leased line - connects two locations for private voice and/or data telecommunication service. Time-division multiplexing -a method of transmitting and receiving independent signals over a common signal path by means of synchronized switches at each end of the transmission line so that each signal appears on the line only a fraction of time in an alternating pattern. T-carrier system – one of several digital transmission systems developed by Bell Labs, sometimes called T-CXR. DS0 – a standard digital transmission rate for digital telecommunications, stands for Digital Signal Zero. DS1 –...

Words: 336 - Pages: 2

Premium Essay

Unit 2 Reserch Paper 1: Experiment

...it Unit 2 Research Paper 1: Experiment Tanya Hernandez GS1140 Mr. Sanchez 10/01/2015 ITT Technical Institute Unit 2 Research Paper 1: Experiment My sister Jourdan has hired her father-in-law Andy, to remodel her back yard for her new home. The previous owners landscaped part of the backyard, but she would like help in landscaping the rest of it. Andy has the potential to be a great landscaper, but isn’t very good at math and will need Jourdan’s help before he can get started. Jourdan’s yard is 200 feet long, and its width is 75% of its length. The portion of her yard that does not need to be landscaped is along the shortest part of the yard and is 10% of the width of that part of the yard. Jourdan would like to put in grass, but does not want it to take up more than 1/25 of the space in her yard (space is in ft2). What is the largest area the grass can take up? If Jourdan’s grass takes up that much space and each grass piece 4ft wide, how long are they? Jourdan would like to add some brick to her patio. If each of those bricks is 6 inches long 3 inches wide. She only needs to cover 15 square feet, how many bricks does she need? We have discovered that the length of her yard is 150 feet. She will not need to landscape 15 square feet. 120 square feet of yard space will be covered in grass. Each piece of that grass is 30 feet in length. The last part of her landscaping will include laying down some brick and we found out that she will need 10 bricks...

Words: 317 - Pages: 2

Free Essay

Unit 5 Assignment 1 Video

...Unit 5 Assignment 1: Video Summary NT1110 There are two major manufactures we use in today’s market which are Intel and AMD. There are some minor competitions but don’t stay on the market for long. The system bus for the CPU is also known as the Front-side bus as it inserts the CPU and has a 64 bit data pass. In the CPU theirs a controller that controls communication between the motherboard and other components with the CPU. The ALU is responsible for performing complex calculations. Communications between the controllers and the ALU’s uses a 32 bit wide internal data bus. A processor is usually measured in GHz. A system Bus is usually measured in MHz and has limiting factors of speed. The multiplier is the ratio between processor and the System bus. The system bus speed x multiplier equals the processor speed. CPU manufactures have come up with different ways to make the CPU work faster. Two multi-processing requires multiple processors (In other words your system must be designed to support more than one CPU on a single motherboard). Dual Core Processors have been recently developed, that means incorporating multiple processors with multiple ALU’s inside a CPU. These ALU’s process their information individually. There’s two cache memory’s which are SRAM and DRAM. SRAM is also called Static RAM, it is faster and more expensive then DRAM, it holds memory without being refreshed and DRAM must be refreshed. There are three types of RAM which are L1 cache, L2 cache, and L3 cache...

Words: 644 - Pages: 3

Premium Essay

Nt1310 Unit 4 Assignment 1

...Digital graphics assignment 1 CPU- the CPU is an abbreviation for central processing unit and acts as the brain of the computer. Carrying out a high percentage of the commands given by hardware and software that is also installed in the computer. An example of a modern day CPU is the Intel core i7 processor Graphics card- the graphics card is a piece of hardware installed into a computer on the motherboard, which processes and displays images that the computer needs displaying. The graphics card has its own memory built in so it does not strain the CPU to use and doesn’t use the RAM installed to run constantly. The higher the amount of built in memory the higher quality it can process and display images .And example of a modern day graphics...

Words: 739 - Pages: 3

Free Essay

Unit 1 Assignment 1 - Integrated Circuit Technology

...Model | | Year | | | Transistor Count | | | | 4004 | | 1971 | | | 2,300 | | | | 8086 | | 1978 | | | 29,000 | | | | Intel 486 Processor | | 1989 | | | 1,200,000 | | | | Intel Itanium 2 Processor | | 2004 | | | 592,000,000 | | | | Intel 9300 Tukwila Processor | | 2010 | | | 2,000,000,000 | | | | * The transistor count reached a 2,000,000,000 count in the year of 2010 * The name of this processor was Quad-Core Itanium Tukwila * I believe the growth is reasonable. From the advances we’ve made from the 70’s to now such as the cell phone, laptops, hand held devices. It’s no surprise that it increased so much each year. We are able to grow rapidly, and we are in a generation of technology. It wouldn’t be crazy to think that this was possible from seeing other devices progress as well, even now you can hold a computer in the palm of your hand. * The growth from 1971-2014 is outstanding. The first couple years they were released the processors had very few transistors and didn’t increase that much yearly. However, after 1974 with each year the amount of chips almost doubled itself each year. Afterwards with the years to come, the growth rapidly increased. By the year 2010 the transistor count reached 2 billion with the release of the Quad-Core Itanium Tukwila processor. * With this information it’s hard to predict when it could reach 100 billion transistors on a single chip, however seeing the growth from...

Words: 332 - Pages: 2