Flash Cards Ict
Flash Cards Ict
provide data to be entered onto the computer systems. This input device is used to
communicate with the computer and the user.
What is a keyboard? This hardware is used as an input device, which is then used to input data onto the
computer system through the use of the keyboard. the keyboard allows users to create
and use shortcuts on task manager. Not all data can be entered appropriately using the
keyboard.
A mouse is also an input device, which is used to allow the user to communicate with the
computer. A mouse is a point and click device which allows the mouse to communicate
through a cursor on the computer, at a particular point on the screen.
What is a mouse? A mouse is an input device and Is used to communicate with the computer. On the
computer screen there is a cursor. the computer screen tracks the movement if the
mouse and normally displays its location on the screen as a cursor.
A scanner is also an input device which is used to convert documents or photograph into
a digital file that a computer can read or display. Scanners have been adapted for other
uses like security. This can include a fingerprint scanner.
What is a scanner?
A scanner is an input device, and it is used to convert documents into a digital alternative.
Scanners can also be used for security through biometrics.
Sensors are a physical device such as a thermometers, motion sensors and mics. Signal
from sensors enable the computer to decide whether an action should be triggered.
Sensors are an input device, and can be used to measure temperature, motion and light.
What is a sensor? A signal from this enables the sensor to trigger
Microphones can be used to record the instruction from the users, or other sounds that
What is a mic? user wish to collect. Microphones are used to replace the use of mouse and keyboards.
Microphones are a very useful device for inputting data.
Graphic tablets are virtually the same to keyboards but instead of letters, the graphic
tablet uses icons. A graphic card is an input device which is designed to be near the same
to a keyboard, but instead of using letters like the keyboard it uses icons making it easier
for the users to use.
What is a Graphic Tablet?
A VDU is an output device, because it displays requests of information from the computer.
It does however aid the user who is inputting data or instruction because they can check
their work visually and correct any errors. A VDU is primarily an output device which is
What is a VDU? used to check errors, and displays requests of information from the computer.
Barcodes readers can be handheld or static and are used to capture information from a
barcode by using a light source, scanner and decoder. Reduce errors by manual input.
Barcode readers are an input device, which are used through a light source, scanner and a
What is a Barcode Reader? decoder. This reduces the errors by manual input.
Printers have a lot of different types of printers, with different purposes, like creating hard
copies of documents, data, information and images. A printer is an output device and
printers come in different styles for different purposes. Some printers can include inkjet,
What is a printer? laser, photo printers, LCD and LED, line printers, thermal printers and 3D printers.
Plotters are machines used in areas such as CAD for large accurate drawings from
architectural designs. there are two types of plotters, flatbed and drum plotters. Plotters
What is a plotter are an output device and are used to print architectural designs, which are very accurate
and the final product doesn’t lose any quality..
Speakers and headphones provide the users with an audio output. Electronic signal are
converted in to sound waves. Speakers are used to broadcast to everyone within a
earshot and this can be a problem for confidential matters are being discussed. Speakers
and headphones are output device which are used when electronic signals are converted
What is a headphones and speakers? into sound waves. Using headphones for a long period of time and can lead to permeant
or temporary hearing loss
A Braille terminal is a specialist reader for visually inspired users. Displays text that through
individual cells on the terminal. the users intercepts the text or the instructions and is the
converted into braille. Braille Terminal is a specialist reader for visually impaired users. Displays
What is a Braille Terminal? text that through individual cells on the terminal. the user intercepts the text or the instructions
by interpreting the pattern of the pins just as they would if reading a book in braille. As the user
goes through the text the braille will update to form each word.
• Braille is very easily learnt, read and written making it easy for blind people to adapt
very quickly to a braille terminal.
• A braille terminal is a lot smaller compared to previous versions
Advantages and disadvantage of a Braille Terminal? • Barile can’t be read by a sighted person, unless they have learnt it.
• If errors are made to the braille then it can’t be erased.
• VDU are relatively cheap making them easy for people to acquire and set up.
• Can display graphics in different colours.
• No permeant data is saved and it’s just a copy so data can be lost.
Advantages and disadvantage of a VDU?
• Plotters can be used for bigger printouts compared to printers which are limited to the
Advantages and disadvantage of a plotter? size of documents that can be printed.
• the print times on a plotter are extremely slow compared to the standard printer. .
CPU – A CPU is also called a processor or a microchip. This manages ALL of the hardware
activities that happens in a computer. the CPU receives instruc6ions and data, and actions
them using input and output the results. the CPU also manages the some of the storage
devices, both external and internal to the computers systems.
Control Unit: A control unit ensures that the instructions required to operate the
computer are retrieved and interpreted in the correct sequence. This means that
What is a CPU? instructions and the data are transferred from the input or the storage devices and are
placed in the temporary storage of registers in the CPU until the necessary data is ready is
ready to be processed in the arithmetic logic unit (LDU)
.
ALU – Here the computer undertakes its mathematical or logical operations required to
complete the instructions. the data transferred into an ALU is then placed into a special
register called the accumulator and arithmetic (Additions and subtractions) and logical
operations.
Registers - Is small and fast and used by the CPU to store data which is to be processed by
the ALU, the instructions that inform the CPU as to what is to happen to the data.
What is computer storage? RAM - is fast but slower than those within the CPU and larger in size, it holds almost all
other data and instruction that the computer may need for any programs open on the
computer.
ROM – This contains permeant instructions such as basic input/output programs, which,
when you switch on the computer, checks all of the expected devices are in the place.
Checks that they are working and loads the operating systems into the computers. .
USB – USB ports enable the computer to connect with standalone devices such as
printers, camera, camcorders, broadband moderns and mobile devices. the term
universal serial bus refers to the standard for digital data communication over short
distances covering cables.
Fire Wire – Similar to a USB archilteure, but conforms to the IEEE. Standard allows
different elements to communicate without being linked through a computer network.
This type of port often link device which need high speed transfer of large amounts of
What is computer ports? data.
SATA – This allows devices such as optical and other hard drives to link to the computer.
the port is linked to another port on the motherboard with a 7-pin ribbon cable.
Networks – the physical ports are those which connects computers to moderns, routers
or local area networks.
Ethernet – Used for cables based networks. Most computers have at least one such port
which is linked directly to computer network card.
Sound – A device which can be slotted into a computer to allow the use of audio
components for multimedia applications.
Network - A Network interface card, NIC, or Network card is an electronic device that
connects a computer to a computer network, usually a LAN. It is considered a piece of
computer hardware. Today, most computers have network cards.
Graphics – A printed circuit board that controls the output to a display screen.
What are expansion cards?
Storage Controller - A RAID controller is a hardware device or software program used to
manage hard disk drives (HDDs) or solid-state drives (SSDs) in a computer or storage array
so they work as a logical unit.
PSU is used to allow external electricity to be inputted into the compute and is then
What is a PSU? converted by the PSU and converts to an AC current. the PSU runs the computers so it’s
connected to almost everything because it is required for the computer to run. the PSU
must be connected to a cooling system most computer systems have a Fan based cooling
system.
Anti-virus software comes in many forms from those which cover viruses, Trojans and worms to
comprehensive security suites that interact with a firewall and the operating system to maintain
the welfare of the system. Anti–virus software is always running in the background, it scans each
What is Anti-virus? file as it’s opened for any material that match virus definition. It will also attempt to identify any
suspicious activity from a program while it is running.
Firewalls act as a barrier between a trusted system and a network and outside
connections, such as the internet. However, a computer firewall is more of a filter than a
wall, allowing trusted data to through it. Firewalls must be carefully configured to ensure
What is a firewall? that only unwanted access is denied entry.
Anti-spyware is very important because being if spyware is inserted onto your computer
then you could face a tonne of problems. Everyday more and more people use the
internet to shop and store their personal information onto their computers. Spy ware can
What is Anti-Spyware? be inserted onto the computer in a number of ways, through emails, and dodgy sites all
could insert spyware onto your computer. Spy-ware can capture information like web
searches, browsing habits, email messages, usernames and passwords, and credit card
details which all come with repercussions.
Usernames: An account is used to identify the user on the computer. So that the correct user access
can be given to the correct person. Password: This is a private code that is used with the username to
Usernames and Passwords? gain access into the account and grant the correct right to the user. This is important so MUST be kept
safe.
Permissions have different access right for different members of staff. Access levels is set
upon two levels, admin and user. On a network this can be added for individual staff
access. Staff access can be used to give certain members of staff access to certain areas of
the system. This can be set by the administrator or any other administrator with the level
of rights.
Access rights can be set on folders, programs and word documents, allowing the users to
read the folders but not write back or delete, to read and not write. This feature is set
through the operating system and is set by the admin users, and is the standard. This is
What is permissions? done to protect the folders and the files, and staying on good terms with the DPA. the
passwords can still be lost and stolen so it has a medium range of security.
Authorisation Permission is the user rights controls, what a user can do on a network
basis. Permissions enable you to fine-tune your network security by controlling access to
specific network resources.
Access control rights limit the users from damaging, modifying or accessing a file beyond
the access levels, it restricts the file rights to whatever the network manager sets.
Encryption is the process where data is scrambled using an encryption key which is then
sent to the attend place in which it is then decrypted making it viewable for the person
receiving the message. This can help prevent unauthorised users from being able to take
the data and understand it. When corresponding over the internet or when sending
emails information can be stolen such as confidential information. To combat this
What are encryption? problem you can use encryption to prevent people from being able to understand the
information that is being sent across the internet.
Locks are used as a physical security for data. Locks can be used to store essentials like laptops and mobile
devices. Many locks are fitted with a chain to ensure that the lock can’t be mobile and then stops it from
being removed. Many locks and key systems have a different cycle of keys. Building should have several
How are locks used? doors with lock all with different keys. This needs to be done because if someone cans access to one of the
doors, he then can’t access any other door with that key to try reduce the damages if a key is lost or
stolen
Retinal – Retina is in the rear of the eye and like a fingerprint is biologically unique. It’s almost
impossible to change the retina without considerable damage unlike a fingerprint. the retina stays
the same from birth acting as a constant & reliable method of identification. For this to work you
need to be in close proximity to the scanner and glasses and contact lenses will need to be
removed.
Voice Recognition – Voice recognition as a method of biometric access control has limitations as
voices change in different circumstances (stressed, tired, ill, excited and age). Voice recording can
How are biometric used? also be overcome by voice recordings on phones (speaker mode). As a result this method must be
used in conjunction with other access control systems such as CCTV and security guards.
Fingerprint - No two fingerprints have ever been found to be identical. Our fingers secrete affine
watery solution from the ridges that allows detection and fingerprint scanners to work. Some
scanners use a rapid laser to scan the ridges whereas other use electro-statically sensitive pad
which detects the current formed by the small quantities of water in our fingerprint
RFID is a system that is used to track objects, people or animal tags which respond to
radio waves. RFID have integrated circuits that include a small antenna which responds
with the radio waves to allow access.
How are RFID used?
A token is a small hardware device that the owner carries to allow special access to
network sites. This device can be in the form of a smartcard or a key fop which allows
access to the site. Tokens provide another level of assurance, through two-step
How are tokens used? authentication, that allows the person to have a personal pin to provide more insurance
and make it more secure.
Most personal computers can’t handle the type of task that a multi user. A mainframe or
supercomputer is required for this kind of work. To make it economic this computer HAS
to be shared. This means that it needs a multi-user operating system which means that
What is multi user? one or more users can be logged on and use the computer at the same time.
Single processors systems have only a single processor or CPU, which is used between
users by dividing the CPU into time slices and allocating one of theses to each user in
What is single processor? turn. the time slices are very short, giving each user the impression that their programs
are running continuously.
Multiple processor systems have more than one processor. User’s
still have to share processors, but the performance is improved as
What is multi processor? there are fewer per processors. Some super computers have
thousands of processors running at the same time.
Off the shelf is buying the product directly and pre built.
Windows is very straight forward to operate and usually
What is off the shelf? doesn’t require any specialist help for anyone installing the
operating system.
.
Open source refers to a program or software in which the source code is
available to the general public for use and/or modification from its original
What is a open source? design free of charge. Open source code is typically created as a collaborative
effort in which programmers improve upon the code and share the changes
within the community.
Bespoke is classed as a custom software, and also known as bespoke software or tailor made
software is software that is specially developed for some specific organization or other users.
Some advantages of bespoke software include the fact that a product can be tailored to meet the
What is bespoke? specific needs of a company in ways off the shelf software. To develop a custom made operating
system It takes a long time to develop such a program between a few months to a year!
Organisational Policies are a set of policies are principles, rules, and guidelines formulated or adopted by an organisation
to reach its long-term goals. It is expected that all employees will follow these diligently.
What is single processor? Many factors go into Organisational Polices and one of these are disaster recovery and how companies respond to
disasters and insure the data is kept safe. the disaster recovery policy details, what actions should take place in a disaster.
Disasters can be caused by human error or natural error, but still affects the company in the same way.
Waste Acceptance Criteria: Is the disposal of data and computer equipment. This laws is put in
place to ensure that all equipment and data are disposed correctly. This law deals with the
disposal of monitors whereas the Hazardous Waste Reputation covers mercury, hexavalent and
other toxic chemicals in the computers.
Freedom of information Act: Contains clear legal requirements of the safe disposal of data. This
law provides public access to information held by public authorities. It does this in two ways,
public authorities are obliged to publish certain information about their activities and the
What is safe disposal ? members of the public are entitled to request information from public authorities.
Waste Electronic & Electrical Equipment: This is the law stating that certain equipment should be
used with specialist knowledge and tools for dismantling.
Hazardous Waste Regulation 2005: This law is used to protect the people from harmful that may
be present on the computers when disposing of them.
Bespoke is classed as a custom software, and also known as bespoke software or tailor made
software is software that is specially developed for some specific organization or other users.
Some advantages of bespoke software include the fact that a product can be tailored to meet the
What is bespoke? specific needs of a company in ways off the shelf software. To develop a custom made operating
system It takes a long time to develop such a program between a few months to a year!
Organisational Policies are a set of policies are principles, rules, and guidelines formulated or adopted by an organisation
to reach its long-term goals. It is expected that all employees will follow these diligently.
What is single processor? Many factors go into Organisational Polices and one of these are disaster recovery and how companies respond to
disasters and insure the data is kept safe. the disaster recovery policy details, what actions should take place in a disaster.
Disasters can be caused by human error or natural error, but still affects the company in the same way.
Utility software, is a system which is designed to help users analyse, configure, optimize and
maintain a computer. This can include Anti-virus, backing up data and file repair, all of these are
used and needed to maintain a computer, without these working the computer wouldn’t run
correctly and maybe at risk.
Full backup: the purpose of this backup is too backup all files and folders selected. the main
advantage of this backup is that backup can be restored are very fast and easy to complete the list
of files. the main disadvantage of this backup is that it is time consuming, this is a FULL back up so
What is utility software? it takes a long time. therefore, it is time consuming.
Stand Alone Antivirus Software – the purpose of this Antivirus is to maintain a database of know
viruses. the Antivirus carries out basic scans of data contained in storage disks and the computer’s
memory and then does a comparison for possible viruses. Advantage: If something goes wrong
then only the stand alone computer will be effected, a standalone doesn’t affect multiple users.
Disadvantage: Users may use up too much of storage space and this may cause problems on the
network.
Utility Based File Compression: Very popular form of disk compression, used virtually
every PC user whether they realize it or not. A specific program is sued to compress one
of more files into a compressed file. Compressing files can help disk space. It can be used
What is compression software? to compress multiple files into one small one. Compressing files is very time consuming,
and compressing large files can take a long time. Compressing files is very time consuming
and this is one of the main disadvantages.
Whistle blowing is a term used often in the work place. It is the reporting of wrong doing
in a work place in hope of something being done about it. In other words Whistle Blowing
is reporting something in hope of justice.
What is whistle blowing?
A file server is a computer attached to a network that has the primary purpose of
providing a location for shared disk access, like sharing documents stored on a computer.
What is file server? File servers can access storage of a computers files that can be accessed by the
workstations that are attached to the same computer network
A print server, or printer server, is a device that connects printers to client
computers over a network. It accepts print jobs from the computers and
sends the jobs to the appropriate printers, queuing the jobs locally to
What is print server?
accommodate the fact that work may arrive more quickly than the printer
can handle.
A Web server is a program that uses HTTP (Hypertext Transfer Protocol) to serve the files
that form Web pages to users, in response to their requests, which are forwarded by their
computers' HTTP clients. Dedicated computers and appliances may be referred to as Web
What is web server? servers as well.
A mail server (also known as a mail transfer agent or MTA, a mail transport agent,
a mail router or an Internet mailer) is an application that receives incoming e-mail from
What is mail server? local users (people within the same domain) and remote senders and forwards outgoing
e-mail for delivery.
A print server, or printer server, is a device that connects printers to client
computers over a network. It accepts print jobs from the computers and
sends the jobs to the appropriate printers, queuing the jobs locally to
What is hypervisor server?
accommodate the fact that work may arrive more quickly than the printer
can handle.
A network is defined as a group of two or more computer systems linked together. there
are many different types of computer networks. LAN which are computers that are
geographically close together, that are in the same building. WAN the computers are
What is a network? farther apart and are connected by telephone lines or radio waves. CAN the computers
are within a limited geographic area such as a campus or a military base. MANS a data
network usually used in towns or cities. HANS a network contained within a user’s home
that connects a person’s digital devices .
A peer to peer network is created when two or more PC’s are connected and share
resources without going through a separate server computer. Peer to peer network is a
network of computers configured to allow certain files and folders to be shared with
What is a peer to peer network? everyone or with a selected number of users. Peer to peer networks are very common in
small offices that do not have dedicated servers.
In a star network, each device on the network has its own cable that connects to a switch
or hub. A hub sends every packet of data to every device, whereas a switch only sends a
packet of data to the destination device. One of the main advantages of a star network
What is a star network? are that they are very reliable. If one of the connections fails, it does not affect other
users making it very reliable and efficient for businesses to use.
.
Wireless mesh networks, an emerging technology, may bring the dream of a seamlessly
connected world into reality.
Wireless mesh networks can easily, effectively and wirelessly connect entire cities using
What is a mesh network? inexpensive, existing technology. Traditional networks rely on a small number of wired
access points or wireless hotspots to connect users. In a wireless mesh network, the
network connection is spread out among dozens or even hundreds of wireless mesh
nodes that "talk" to each other to share the network connection across a large area.
In order to fix the software from behaving badly, we suggest that you check the software
for any possible updates, if there are any updates then we strongly suggest that the
software is updated in order for the application to run correctly. Once updated we
What is unexpected software behaviour? suggest that the device is restarted to allow all updates to fully function on the computer
system. If no updates are available on your computer then the software might be corrupt
and contain malware which is harmful to your computer. We strongly suggest that the
software is deleted from your device immediately. Once fully deleted, we suggest you
power off your device and reboot in safe mode to stop your computer from being
damaged.
Software freezing is a common fault in most devices, almost everyone has experienced
this issue. One of the main cause of the software freezing is down to bad coding, if the
code is changed or damaged then you will see an increase in system problems. If the
software encounters a software bug, then the software would encounter problems.
What is software freezing? In order to fix software bugs, many precautions can be taken to try fix the problem which
has occurred. One possible fix is to restart the device and reboot in safe mode this will
only run the required software and documents, in order for the device to work correctly.
It is possible that the software is conflicting with some of the drivers, so a safe mode
reboot should fix the issue
Unexpected reboot can be caused by a number of problems. One of the main reasons for an
unexpected reboot is due to overheating parts in a computer, which could be caused by a failing
fan or the processor is getting too hot causing the PC to restart unexpectedly.
What is unexpected reboot? One of the main fixes for this is to invest in a better cooling system like a liquid cooler, which
works better than a standard cooling system like standard fans. If you don’t like liquid cooling
systems, then consider upgrading the fans, so the PC is kept below the emergency temperature
and the computer continues to operate at a decent temperature .
Although it might sound ironic but some updates can cause some issues on a PC. If an
update isn’t installed correctly onto a computer system then the update can conflict with
other software and cause the computer to not operate correctly because the update has
caused a conflict between some other components on a computer system.
How can updates affect performance? One of the main solutions to this problem is to try restart the computer. Some updates
require a system reboot to work correctly. So if the computer isn’t restarted after an
update is complete then the computer’s update might not work correctly. So restarting
the computer should restart the BiOS and face the computer to run the update correctly
without any issues. If this doesn’t work then try restart the computer in ‘safe mode’
which should resolve the issue.
the frozen blue screen also known as the blue screen of death, is one of the worst errors
a PC can encounter. the blue screen is usually occurs when there is a hardware failure, or
a problem with the drivers. If the blue screen appears it can lead to data loss of all
unsaved work, because there is no warning and it randomly restarts losing all unsaved
work.
How can blue screen be fixed? One of the main ways to resolve the issue is to try reboot the computer in safe mode this
will allow the computer to run the computer on the basic components and remove all
other applications. Blue screens usually doesn’t occur on the standard application on the
computer, but the application that people have installed on their computers.
This is also a very common problem encountered on many computer systems. This problem is
usually caused by bad coding in the software which causes the software to fail, and it won’t load
correctly. This is a very common problem and many encounter this problem on a daily basis.
This problem can easily be fixed in multiple ways. One being closing the application and then
How can failed software be fixed? trying to reopen it to see if the software loads correctly. If this doesn’t work then, delete the
software and then try and re-install the application. This is should resolve the issue and stop the
problem from occurring. If this doesn’t work then malware could be conflicting with the software.
So the system will need to be restarted and then rebooted on ‘safe mode’ this will run the
operating system on the required components and will run the necessary software. After the
process has been complete then try re-install the application, and this should resolve the issue
Text messaging or SMS is the act of composing and sending electronic
What is the purpose of SMS? messages, typically consisting of alphabetic and numeric characters between
two or more users of mobile phones, fixed devices or portable devices.
the electronic transmission of mail allows you to send formatted text and images to
What is the purpose of a Email? someone else with an email address. Each E-mail user has a mailbox with a unique
address into which messages can be sent ready to collect and read.
the use of dedicated websites and applications to interact with other users, or to find
What is the purpose of social networking? people with similar interests.
VoIP is where you speck into a microphone and it is then converted into a format that can
be sent over the internet. the person receiving the call must have a VoIP application
What is a the purpose of VoIP? running.
Video conference is similar to teleconferencing except that people in the meeting can
What is the purpose of a voice conference? now see one another because video camera are used to send live images over telephone
lines.
This is text based service, where one [person types a message and the other person
What is the purpose of instant messaging? receives the message immediately seem it pop up in their IM window. Groups can be set
up so that a number of people can chat at the same time.
Body Language – Body language can be used in the workplace to express emotions and
opinions in a physical behaviour as opposed to words and non-physical communication.
Using body language instead of standard words allows people to broadcast their
emotions and feelings better.
This is the skill that gets you the job. Although CV’s and references and demonstration of
skill gets you to the interview. Verbal communication requires you to use emotion to
express ideas and opinions to others.
Meetings – A meeting is where two or more people are gathered together, which have
been convened for the purpose of achieving a common goal through verbal interaction,
such as sharing information.
What is verbal communication?
Telephone – Telephone communications, is the practise of communication across a
telephone. Although there is other forms of communication are also possible over the
same transmission lines, voice communication is the most common.
Questioning techniques how to get the best answer, how not to lead. How to uses quantitative
and qualitative questioning techniques.
Open – An open questions, is a question that is open and anyone can input their own opinion into
the answer.
Closed – A closed question is a question which is closed and is a question which only has an
answer of either ‘yes’ or ‘no’ and only one can be picked.
Leading – A leading question is a question which encourages the answer that is wanted
What is questioning techniques? Open – Open question would be preferred to a closed question if the employee or employee
wants the person who’s been asked the question to express their opinion and emotion into the
question.
Closed – Open question are used in many business situations. Open question might be used if the
employee or employer wants a simply ‘yes’ or ‘no’ answer so they might use a close question
instead of an open question to receive the appropriate answer.
Leading – A leading question could be used if the person who is asking the question knows the
answer and is trying to the answer that they want . .
Written communication can be used in many different ways, written communication can include
E-mails and letters which could be sent to your employer. This can be used to express opinions
and concerns, but not a direct way of showing emotion.
What is written communication? Letter – A letter is a written message from one party to another containing information. Letters
promote the preservation of communication between both parties.
Emails – Emails are like letters but are inputted through the keyboard, that can be sent other a
network to others.
Social Networking – Online networking sites allows users to create their personal profiles, share
photos and videos and communicate with other users.
Non verbal can include anything from posture, facial expression, although emotions and
opinions can’t really be showed through this communication method. Attitude is also a
key fact included in non-verbal communication, when someone gives of an image without
actually speaking.
Body Language (different to above) Many images can be given off from non-verbal
communication, if you’re making eye contact with the other person then that is positive
communication, but if you’re not making eye contact with the person then that Is classed
as negative.
What is non verbal communication?
Body Language (different to above) – Positive body language – This is where the person
gives off a positive image this can be done in a number of ways like eye contact, posture
which all make it positive for people at the workplace.
Negative – is where people give of a bad image. This can be done by not having eye
contact with the person you’re engaging in communication with. Having a bad posture
can also impact this as well making it a negative form of communication.
there are five key barriers that can occur and these include, language, gender, culture, status
differences and physical separation. these barriers to communication can are specific items that
can prevent communication.
Language – A difference in language is one of the obvious barriers to communicate as two people
speaking two different languages cannot communicate with each other
Distraction – there are certain barriers to effective communication that every organization faces.
these potential interruptions of the flow of information are referred to as ‘noise’
Noise – Noise is unwanted sound judged to be unpleasant, loud or disruptive to hearing. From a
physics standpoint, noise is indistinguishable from sound, as both are vibrations through a
medium, such as air or water.
Distraction – Distraction can lead to a loss of communication if the person whom you’re speaking
to then they might be distracted and might forget what you’ve had told them to do, and they
might off missed valuable information.
Noise – Noise is very unpleasant and if information is being passed on then some information
might be misheard.
Lack of concentration – Lack of concentration can lead to many barriers. If some lacks
concentration then they might misunderstand what you’re trying to say to them, which could
cause confusion
Presentations that use animation, video, sound or music are generally much
more interesting than a standard presentation done on slides of paper.
What is presentation software? Presentations are produced using one of many software packages. One
example of this is Microsoft office, PowerPoint. Which has a range of tools to
try make the presentation more engaging and better for its audience.
there are multiple ways of word processing, which carry many benefits and
limitations. Each different style of word processing has its own benefits and
limitations. Most word processing software is very formal and can be used
What is word processing? for various task like questionnaires which are used to gain feedback on the
business An example of word processing can include Publisher which can be
used to create leaflets and booklets.
Emails have become one of the most common form of communication between people
and business. When a company writes an email it need to be written in an acceptable
language for a business. the language that people use in email needs to be acceptable
code of practice.
What is a Email? Emails are used in almost every business no matter the size. Emails are very useful and
can help any member of a business. Emails can be used to send reports and information
across to other members. Emails that are sent need to be formal, because it is in a
business environment.
Rather than producing word processed documents like leaflets and posters. Website
could be a better alternative for advertising. This requires the company to develop their
very own website or pay for one to be made for them. This method can be very
What is a the web? expensive, but the business will also need to pay for programmer to maintain the website
for the business.
these are personal internet journal where the writer will their observations on some topic
and perhaps provide links and evidence to some relevant website that contain more
information on the topic. Blogs are tend to range from minor projects through to
What is a blogs/vlogs? important issues, and comment made on blogs are usually unacceptable for the law.
Blogs are used to communicate with a set audience with a set purpose.
.
Instant messaging is a service which allows people to chat in real time with buddies, this
is pretty much an ‘Instant’ and people receive replies within minutes. Security can be
What is Instant messaging? added to instant messaging making it a lot safer to use and more beneficial for anyone in
a business situation.
Motivated is to achieve something because of one’s own enthusiasm or interest, without needing
pressure from other. This is where people are able to self-initiative, to identify opportunities and
be pro-active in putting forward ideas and solutions. Being ambitious, capable reliable and can
What is self motivation? inspire others with their work ethic.
An independent worker like a manager of a business. If the manager is self-motivated because
they can work independently and create a decent level of work, this could rub off onto the other
staff members at the workplace and make them work self-motivated as well.
Leadership is the ability to take an average team of individuals and transform them into
superstars. The best leader is the one who inspires the workers to achieve greatness and
accomplish company goals.
What is leadership? Chief executive of a business. A chief executive is the highest ranked member of staff in
any business. In order for a business to be successful they require a good leader. This is
why a CEO needs to have good leadership skills in order for the business to be successful
Respect is the way of treating or thinking about something or someone. If you respect
your teacher or mangers, admire them and treat them well. Then other will respect who
are impressive for any reason. Teacher is a key example of a job role that requires respect.
What is respect? If a teacher has respect for their students then they will have respect for their teacher. Or
this can be the other way around
Dependability is defined as the quality of being able to be counted or relied upon. When
you always do everything that you say you will and never make promised that you cannot
keep.
What is dependability? Support staff, many business require a support staff, if the support staff never turn up on
time then they will be pointless and won’t be able to help others at work.
Punctuality is the state of being prompt. Punctuality is an important quality when it comes to
things like public transportation and job interviews. Public transportation, being part of public
What is punctually? transportation is very important because other rely on you to be on time. Doing this shows that
you are dedicated and committed to make sure that you arrive on time and make people happy.
This is the process of working through details of a problem to reach a solution. Problem solving
may include mathematical or systematic operations and can be a gauge of an individual’s critical
thinking.
What is problem solving? IT technicians, many technician encounter multiple problems every single day. It’s their job to try
find solutions to these problems and solve the technical problems that might have occurred.
Determination is a quality that makes you continue trying to do or achieve something that
is a difficult. The act of finding out or calculating something. Marketing team, every
What is determination? business has a marketing team and every year they set yearly goals. In order to achieve
theses the staff need a lot of determination in order to meet the goals set by the
business.
Teamwork is often a crucial part of a business, as it is often necessary for colleagues to work well
together, trying their best in any circumstances. Teamwork means that people will try to
cooperate, using their individual skills are providing constructive feedback.
What is team working skills? Many business have teams working to meet goals and objectives. One job that requires team
working skills Is a group leader, they require to be a good leader and to be able to work as a team
which will help the group meet objectives and goals.
Writing is a form of communication that allows students to put their feelings and ideas on
paper to organise their knowledge and beliefs into convincing and convey means through
What is writing skills? a well-constructed text.. Tax office worker, need to write and send regular letter to many
different people. This is why they require writing skills so that the letters and reports can
look professional for the customers.
Verbal skills refer to the extent to which a person can approach words, sentences written texts
verbs, adjectives the extent to which he/she can comprehend meaning produce synonyms and
antonyms know the meaning and the use of words.
What is verbal skills? Public speaker is someone who requires high level of verbal skills in order to carry out their jobs
correctly. The need to speak in front of crowds regularly and need to be good at doing so.
Numeracy is the ability to reason and to apply simple numerical concepts. Basic numeracy
skills concepts. Basic numeracy skills consist of comprehending fundamental arithmetic’s
like addition.
What is numerical skills?
Accountant. Accountants require a lot of math based work this is why accountant need a
form of numerical skills in order for them to be able to do their job and do it to a decent
standard without any problems.
I an effective way so that you achieve the things you want to achieve. Self-discipline and
In
organisational skills are crucial to success to any profession.
Area manager. There are many area mangers that are required for certain businesses in
What is planning and organization skills? order for business to work well and efficiently. They need to have very good planning and
organisation skills so that they can organise the business in the area and make sure that
they run correctly.
Personal Grooming – Personal grooming is how maintained people are and how they are presented.
This can include whether or not they shower regularly. This gives a good image to the employer
Presentation – ready for work? because it shows that you are dedicated and want to look nice and presentable for work.
Appearance – Appearance can include how well they dree and what they look like, this usually can’t
be changed but is the impression employees give to employer .
Can do attitude – Can do attitude is how well people feel about work and how they approach
work and the type of attitude they use to approach work like the ‘can do’ attitude, which shows
motivation and determination to work.
Attitude – ready for work? Responsive – How responsive is how you react to certain situations, and deal with any problems
that might have occurred, and how you deal with the problem.
Personal Grooming – Personal grooming is important because if you have a good personal
grooming scheme then you are more likely to feel more confident about themselves. They
are more likely to feel more open if they personal groomed.
Why is presentation important to the person?
Appearance – If somebody feel more confident about their appearance then they are
more likely to feel more open and feel confident around others
Can do attitude – This is important to any person because it allows people to have the
attitude to do anything that comes in the way of the employee.
Why is attitude important to the person? Responsive – This is important to any employee because it allows them to respond to
certain situations, in many different ways.
Can do attitude – This is important to any employee because it allows them to have a worker
force that is up to do anything and to try their best to complete the challenge.
Why is attitude important to employers?
Responsive – This is important to any employer because it allows them to have a workforce to
respond to certain situation in an decent manner
A network management refers to the broad subject of managing commuter networks. There
exists a wide variety of software and hardware products that help network systems administrators
manage a network.
What is a network manger? Communication skills, poor communication skills end up side-tracking more projects than project
managers and executives are willing to admit.
Trough communication is a two-way street, a hiring managers, to see how well a potential team
member communicates, including body language and eye contact
A web designer is someone who prepares content for the wen. The role is
mainly related to the styling and layout of pages with content, including text
What is a web designer? and images. Web designers use many technologies but commonly rely on
hypertext and hypermedia resources.
The computing technology industry association (CompTIA) is the association representing the
international technology community. Its goal is to provide a unified voices. CompTIA certifications
What is CompTIA (The computing technology industry help candidates build a solid foundation of essentials knowledge and skills that will help them
advance their careers. Starting at a higher certification level might seem like a timesaver.
association)
Cisco is the leading manufacturer of networking equipment, including routers bridges, frame
switches and ATM switches and a network management software. Cisco allows people to access
and share videos on the desktop, on mobile devices and on demand as easily as making a phone
What is Cisco? call.
MCTP or management component transport protocol is a protocol designed by the
distrusted management task force to support communication between different
intelligent hardware components that make up a platform management subsystems.
What is MCTP (Management component transport MCTP gives web hosting, so across systems composed of racks of servers, MCTP can give
protocol) web hosting IT administrator the ability to physically manage the servers without
requiring root access.
Cisco Certified network associate (CCNA) is an entry level certification for the
Cisco certified professional program. The certification is geared towards
network administrators.
What is a CCNA (Cisco Certified network associate) Doing a CCNA course allows people to showcase their skills, in a specialist
course. Completing the course will allows people to have the opportunity to
gain a higher position in their place of work.
Open source is completely FREE, so any company or person can use this software free of charge,
without any limitations. Open source can open most documents and files created by a
proprietary software. Fairly easy to use if you have a good understanding of Microsoft Office
Suite, then you won’t have a problem with the software.
What is open source? This application may contain the same amount of relevant features as the commercial application,
making it pointless. The software might not have bug fix support and security patches making the
software vulnerable and un-safe. Not all applications that you wish to use have an open source
version available.
The company could use it because, the software is free so the company can use the software for
free. The software supports all documents and files created on a proprietary software, so all
company can use it.
Closed Source will be suitable for this business because a closed source allows companies
to only have the rights to build and develop the products. So no one else can access it
making it safer to use.
When purchasing closed source software, you get more than a disc.
You’ll get a document stating you’ve purchased something, and with it an expectation
that it’ll work in the way promised. If it doesn’t work in that way, you can take legal action
What is closed source? against the provider.
Since closed source companies are the only organisations with the rights to build and
develop their products. This means that viruses can exploit computers by the thousands,
damaging entire networks, and sometimes bringing businesses to a standstill.
The most common method of fixing bugs is for the software producer to supply a patch.
However, users are often pretty bad at installing patches – this means that they, and their
company’s systems, remain vulnerable even after a bug is found.
The company could user this software, because the product is pre-built and has a very little cost.
Making It very straight forward. Some of the software can be very difficult to use and can be
complex to understand, which some employees may find difficult.
Off the Shelf products should be cheap at the price shouldn’t change. Adjustments may be
needed to the software, and theses can be carried very easily, with very little difficulty.
What is off the shelf?
The software can be very difficult to understand due to the development that is inputted into the
program. Off the shelf software can usually be very complex and often contain section, you’ll
never use. Making the software pointless.
The company could use this software, but it would take a long time to develop and could possibly
be worthless by the time the software has been developed. The software is very expensive to
develop so the business would. When companies pay for the bespoke software they’ll get exactly
what they pay for and no added extra. The software only has the needs, that the business requires
What is bespoke? with the software. Making the software efficient. Bespoke takes a long time to develop and can
usually take several months, making the process very long which could be a problem to the
business. To develop a Bespoke software, it requires a lot of money and investment to develop the
software.
The software could be suitable for the company, but the shareware wouldn’t
make a profit form the software because it can’t be sold on, so the software
is pointless.
Shareware can’t be sold onto other people. So people can make profits and
disrupt it. The software could be older and temporary version making un
reliable.
Freeware could be suitable for the business because it’s free and everyone in the business could
use it. Freeware can be protected by copyright so other people can’t duplicate the companies’
software. The software has less support so if the company runs into any problems this could lead
to delays.
Shareware is a completely free software and everyone can use it making it accessible to everyone.
Shareware is protected by copyright so people can’t duplicate the product and make a profit from
What is freeware? it.
Shareware can’t be modified and changes. All freeware can’t be sold on to other people so
companies can’t make a profit from a software. There are less support options, if anything goes
wrong then there is very little support.
Embedded software is great opportunity for any business, because they are custom designed
systems will only have the necessary components and significantly smaller than other computers.
This could be suitable for the business because it would allow more space for other work, and
more opportunity.
What is embedded software?
Since embedded systems are application specific, the custom designed system will have only
necessary components and hence significantly smaller than a regular computer. Obviously, since
the system has less number of components as compared to a computer, so the cost is cheaper.
An internet protocol address also known as an IP address is a numerical label assigned to each
devices (computer, printer) participating in a computer that uses internet protocol for
communication. An IP address serves two principal function. Host or network interface
What is IP? identifications and location addressing. IP serves as the ID of your connection when it’s accessing
the internet. If functions like your street address, IP are used as addresses that allows date to be
routed information from the internet. Your IP address is assigned to your computers connection
to a provisional basis and usually changes when you reboot your router.
TCP is one of the main protocols in TCP/IP networks. Whereas the IP protocol deals only
with packets, TCP enables two hosts to establish a connection and exchange streams of
data. TCP guarantees delivery of data and also guarantees that packets will be delivered in
the same order in which they were sent. TCP us a reliable connection oriented protocol
What is TCP? used to control the management of applications levels services between computers. It is
used for transport by some applications.
User Datagram Protocol (UDP) is part of the internet protocol suite used by programs
running on different computers on a network. UDP is used to send short messages called
datagrams but overall, it is an unreliable, connectionless protocol. An unreliable
What is UDP? connection less protocol used to control the management of application level services
between computers. It is used for transport by some applications which must provide
their own reliability.
Simple Mail Transfer Protocol is an internet standard for electronic mail transmission. SMTP is
What is SMTP? used for mail delivery. If you plan to set up a mail server, you must know that what they are used
for. Each protocol is just a specific set of communication rules between computers.
The file transfer protocol (FTP) is a standard network protocol used to transfer computer files
between a client and server on a computer network. FTP is a built on a client server model
architecture and uses separate control and data connections between the client and the server.
What is FTP? FTP is an acronym for File transfer protocol. AS the name suggest, FTP is used to transfer files
between computers on a network. You can use FTP to exchange files between computers
accounts, transfer files between an account and a desktop computer, or access online software
archives.
The Hypertext Transfer Protocol (HTTP) is an application protocol for disturbed, collaborative,
hyper media information systems. HTTP is the foundation of data communication for the world
wide web. Hypertext is structured text that uses logical links between nodes containing text. HTTP
What is HTTP? is the underlying protocol used by the world wide web and this protocol defines how messages
are formatted and transmitted and what actions web servers and browsers should take in
response to various commands.
The Internet Control Message Protocol is part of the Internet Protocol Suite. ICMP
messages are typically used for diagnostic or control purposes or generated in response
What is ICMP? to errors in IP operations. ICMP supports packets containing error, control and
informational messages. It is an error reporting protocol and is used by routers, hosts and
network devices to generate error messages when the problems delivering IP packets.
A protocol is a set of rules that enables effective communication to occur. We encounter protocols
every day. Computers on a network must all have a way of being able ‘talk’ or ‘communicate’ with
one another and they do this following a protocol. The protocol that is used to most LAN’s and
the internet is known as the TCP/IP protocol. If any computer on the internet are not using the
What is a protocol? standard then they will not be able to communicate with other that are.
Post Office Protocol (POP) is a type of computer networking and Internet standard protocol that
extracts and retrieves email from a remote mail server for access by the host machine. POP is an
What is POP? application layer protocol in the OSI model that provides end users the ability to fetch and receive
email. POP is a protocol used to retrieve E-mail from a mail server. Most e-mail applications use
the POP protocol.
Token rings technology is a communication protocol for local areas networks. It uses a special
three-byte frame called a ‘Token’ that travels around a logical ‘ring’ of workstation or servers. A
token ring is a local area network (LAN) in which all computers are connected in a ring or star or a
What is LAN – Token ring? star topology and a pass one or more logical tokens from host to host. Only a host that holds a
token can send data, and tokens are realised when receipt of the data is confirmed
Ethernet is the most widely installed local area network (LAN) technology. Ethernet is a link layer
protocol. Ethernet is a link layer which is used to network two devices, which format data or
transmission to other network devices on the same network segment. Ethernet is much faster
What is LAN - Ethernet? than a standard wireless WI-FI connection, but because it requires cabling you were extremely
limited in where you could place your computer in relation to the router. Ethernet tis more
reliable, a wired connect (Ethernet) is likely to be faster, more stable and more consistent speeds.
Asymmetric digital subscriber line (ADSL) is a type of digital subscriber line (DSL) technology, a
data communication technology that enables faster data transmission over copper telephone
lines rather than a conventional voice band modern can provide. Unlike most connections, ADSL
What is WAN - ADSL ? doesn’t require phone lines to make a connection, ADSL works alongside the frequencies used by
voice telephone calling, therefore allowing people to continue to make phone calls while using
the internet.
A leased line is a private bidirectional or symmetric telecommunication line between two or more
locations provided in exchange for a monthly rent. Leased lines can be used for telephone, data or
internet services. Leased lines is a dedicated fixed bandwidth, Business can use leased lines for
What is WAN – leased line? stuff like linking PC’s to different corporate offices and enables staff to connect to PC’s at home.
Leased lines are dedicated are this means that they all along the route of your leased lines. The
bandwidth you need has been reserved just for you.
Integrated Services Digital Network (ISDN) is a set of communication standards for simultaneous
digital transmission of voice, video, data, and other network services over the traditional circuits
of the public switched telephone network. ISDN is the development of the plain old telephone
What WAN - ISDN? service that enables it to carry data other traffic as well as voice calls. Instead of using a
continuously changing Analogue between the networks and the businesses.
A metropolitan area network (MAN) is like a local area network (LAN) but spans an entire city.
MANs are larger than LANs but smaller than wide area networks (WAN). MANs are extremely
efficient and provide fast communication via high-speed carriers, such as fibre optic cables. MAN
is a network that interconnects users with a computer resources in a geographic area of region
What is MAN? larger than that covered by even a large local area network (LAN). MANs are used mainly in big
cities because it can interconnect of networks in one city into a single network, which makes the
connections more efficient and easy to maintain.
In relation to the Internet, the PSTN furnishes much of the Internet's long-distance infrastructure.
Because Internet service providers ISPs pay the long-distance providers for access to their
infrastructure and share the circuits among many users through packet-switching, Internet users
What is Voice - PSTN? avoid having to pay usage tolls to anyone other than their ISPs. PSTN is the world’s collections of
interconnected voice telephone networks. Both commercial and government owned. It’s also
referred to as a circuit switching telephone network that can be evolved.
A cellular network is a radio network distributed over land or through cells where each cell
includes a fixed location transceiver know as a base station. These cells together provide radio
coverage over larger geographical areas. Cellular networks maintain information for tracking the
What is Voce - cellular ? location of their subscriber’s mobile devices. In response, cellular devices are also equipped with
the details of appropriate channels for signals from the cellular network systems.
Data and voice communication can be sent over telephone wires or by cellular or satellite
technology. The clearest and most reliable method is over fixed cables between the sender and
What is satellite - voice? receiver. Voice communication requires the towers which carry transmitter/receivers to be in line
of sight to the user communication devices. Disappearing into tunnels on a train, standing in a
remote field or being shielded by a large building can disrupt the point to point.
Satellites orbit over earth in a single location. They receive transmissions and rebroadcast
them to receivers. It required, the satellite between the satellite and the ground. There is
What satellite - data? usually a major delay between transmission of the signals and its receipt. Which can be
seen on televisions new reports from remote locations. Data transmission can also be
compromised by the issue, especially when transfer large files.