Wednesday, 30 September 2009
the start of 3.1
anyway time for communication unit.
Hello everyone.
Unit 3.1 is a nice easy break from network and database theory. Even so, I’m struggling to keep up with everything. I’ve yet to start a Duke Of Edinburgh award and I’ve got coursework for all of my subjects and I’ve got two different types of maths exams, three different types of English and coursework for all that on top of all this. Not forgetting work experience and other out-of-school activities!
Anyway, the diploma is the subject at hand now. I must now produce information on communication.
Thank You.
The Muffin
3.1 A: Communication
There are different types of communication. Some are more obvious than others. Some are first hand and others are second but they all, near enough, do the same thing. The different types are as follows:
• Face to face
• Telephone
• Video
• Blogs
• Media
Media is a category within itself. The different types of media are as follows:
• Magazines
• Newspapers
• Texts
• Books
All the types of media above all have their time and their place when they are needed the most. For example: Face to face is best used when you want to talk to somebody when they are standing right next to you. It would not work when you are trying to talk to somebody face to face when they are in another country or very far away in general. Face to face is good because this shows, especially in business, that you are capable of being confident enough to confront the desired person you wish to talk to and talk to them. However, you cannot write the things that you say down. At least not in your average situation in the office you can’t.
Telephone is a good source of communication when you are in one office and the target person you wish to talk to is in another office generally far away. This is about it. It doesn’t really work when you are in the office next to them. Not only will you make an idiot of yourself you are also wasting money and time trying to just connect so you can call them and waste more money and more time and make even more of an idiot of yourself.
Video communication is basically face to face except you can ship the video file over great distances using your network or internet. It is a very good way of face to face communication because you can play the video clip as many times as you want. It is efficient. However, it is not efficient when you want to say a one word answer or statement. You also make an idiot of yourself by sitting on a folding chair or your very uncomfortable office chair and talking directly into a camera with a horrible little optical lens.
E-mails are becoming the biggest and for some reason the best form of communication. This is not a very good type of communication simply because if you E-mail somebody you are failing to demonstrate any real skill of communication within your work group. This is not helpful as your employer or boss will not think much of you if you cannot talk to people up-front and personally.
Blogs are very efficient and useful. Reason being: if you’re a devious foreign to my blogs and have not seen any of my other ones (please do) then you will not be aware that my blogs are very, very long and there’s a lot to read. With blogs you can upload mass amounts of information to the internet. The only thing it comes down to after that is weather the information helps. Please answer the poll.
Newspapers just make things up
Magazines distort the news.
Texts aren’t in English and they are usually off the subject.
Books never help in any situation.
Thank You
The Muffin
Wednesday, 23 September 2009
I am going backwards...
I am now doing unit 3.3……. am I going backwards?
They go in order from when I posted them.
Thank You
The Muffin
3.3: Effective Communication and the purpose of it.
I have been instructed to study five websites of the following.
A Retailer
A Manufacturer
A Leisure or Sports website
A Local Government
A Charity
So I will start chronologically.
The Retail website I have decided to study is GAK (Guitar Amp Keyboard). This shop is based in Brighton and it does do some very, very cheap items. It’s not tat so to speak, in fact they’re proper brand-name instruments and instrument accessories which are very high quality if you buy from the shop itself. Buying online is still the same price. All they’re doing is knocking about five pounds off and put five pounds on delivery price. This isn’t a pain considering the main good part of the website is they will compare and beat prices! Unfortunately, not online prices so you have about a 50% chance of actually getting a beaten price. It’s unreliable in-a-nutshell. Much like their delivery service which leads me on to comment on their down-sides, believe me there are a few of them.
Their shop, while it is big, is extremely overcrowded. I had to wait thirty minutes just to ask about trying out a pedal and even then there was a wait time just to get on.
Second was that while the website was very useful and fairly easy to use in buying things, the quality of the box looked like the lowest quality cardboard in the world. You couldn’t get cheaper stuff if you tried.
It arrived five working days late. I ordered it on a Thursday meaning the lateness was appalling.
Trying to park somewhere near the shop when you’re physically going there is dreadful. It’s a bit like trying to get into Fort Knox. You just can’t find it.
If you do manage to actually get someone to help you inside the shop then expect to walk about a lot. The people behind the counter are always sending you to go to someone else in a different department.
While the physical side of the shop is still quite bad, the products themselves are quite good.
The website is easy to use, but the stuff comes late and while you’re ringing them up and saying that your product hasn’t come yet, they say “I’m so sorry I had no idea.”
The next website I’m going to review is the Ibanez Guitar Company. This company is a very, very good company. They give you all the information you need to know about the guitar or bass you need to look at. They give you a very good in-depth spec. of your guitar or bass. They will also give you endorsed retailers near you using a very clever and well designed and thought out database. The only thing I would point out is that the website is a little bit difficult to navigate around. It’s not that hard once you’ve gotten used to it. Overall I can honestly say: “This guitar company is excellent” I’ve never experienced better customer service both online and on the phone! Excellent! Well Done Ibanez!
LA Fitness is my next website I’m reviewing. Looking at the website I can see the cheesy: everyone on the front page is smiling like working is some kind of fun. When we all know, it’s not. This website is hard to navigate around in the sense that it will say: About Us: when you would normally expect then to say some cheesy story about the creator and then their main customer service number. What you actually get on the website is far different. You get this on the front page:
Latest News (this four lines long)
Lifestyle Tip. This one makes me laugh all the time. It says the following:
“We are now working longer hours than any other country in Europe. A survey by the Department of Trade and Industry's (DTI) Work-Life Balance Campaign and Management Today magazine paints a poor picture of working conditions in the United Kingdom.”
How is that a lifestyle tip?
There’s a page that says “Corporate” This means nothing to my age group.
That’s all I have run out of time. I never have enough of it.
Thank you
The Muffin

Wednesday, 16 September 2009
It's Finally 5.9! does this mean no more unit 5?
Hello People
Another Blog and this time it’s on Security and Back-up.
Brief introduction I know but I’m running out of things to say and I’m afraid I might crack a joke!
Thank you
The Muffin
5.9 A: How can physical security be implemented?
Physical Security is a big issue just as much as computer and network security, but if water or fire gets into or onto a computer then the company will have to buy a new computer, put all the past information on it and it will take a very long time, most of it will waste the three most important things:
Time
Money
Movement
However you can prevent this by using what we call it in the trade: Physical security. In Tennis there’s a theory called centre court meaning if you return serve on the right side of the court, moving back to the middle will give you an advantage and theoretically use less power and make you win the game. Try to use the same theory in an office by using some key things to prevent floods, which we will start off with:
Drains in the middle of rooms underneath doors
Drainage systems
That’s about it but you can spread it all over the office and building and use it over and over again. You will find that this is the most common used form of flood-prevention.
In a fire situation however, things are slightly different. You could use things such as:
Air-Con
Sprinklers
Fire Extinguishers
A security phone by all flammable points
Don’t leave ANY and I repeat in block caps, ANY of your computers by a radiator or highly flammable object.
5.9 B: How can these be breached?
It’s scary to think that I am writing a list of ways that can potentially make a company collapse but it is vital to be aware of these things.
Floods
Sparks by water taps
Accident in the kitchen if your companies building has one
Faulty Pipes
Hardware faults
Software crashes
Theft
Collapsed Building from earthquakes e.t.c
5.9 C: Anti-Virus and Firewall
These two can work together very easily, you can actually make your Firewall pick things up and send it to the Anti-Virus so that you can be 100% safe from your computer.
Disadvantage: The Anti-Virus might not detect the virus that is being sent through, this can happen.
Thank you for reading today and I hope I answered some questions.
Thanks
The Muffin
Swipe Cards and Security against virus' and hackers
Hello Everyone.
I Have been told to be more Business-like, more professional and not joking around so much (although I wasn’t aware that I was, I was just putting the blogs in such a way that I felt like I could relate to you) this is not my say in it. This is not under my control either. So here we go, for a blog about Swipe Cards and security.
Thank you
The Muffin
5.8 A: Swipe Cards, Access Codes and Keys to a security room.
Swipe Cards are an advantage in the sense that: it is personal to a specific employee to that company, they are unique and in some sense special. They are bound to the specific person you give them to and they are very hard to hack into. That is Swipe Cards explained in a nutshell.
Disadvantages would be that if there were to be a power cut, then the cards would be rendered useless, meaning no-body would be able to go anywhere. In some cases it would also be very dark in the office.
Access Codes are easier to give out to employees within the company and once again rely on power, a lot of things do. They do not hang around your neck or take up room in your pocket or wallet like Swipe Cards do, they are software as well requiring next to no memory (it doesn’t take up much room to remember a few letters and numbers).
Disadvantages would be that hackers are everywhere these days and always like to watch our modern economy crash and burn (because they think our economy isn’t bad enough) meaning if a company with a lot of money, transferable money is protected by a few numbers and letters then the hacker simply plants spyware and watches type in their password. Once this is done the hacker can type in the password and withdraw all the money that he/she needs.
Keys to a secure room are keys that grant you access to a secure room (funnily enough). Keys do not rely on power so they can still get you from A to B without power (although you will most probably want to get in the room to figure out why the power is gone anyway). They do not require your name on it or anything, they just need to be on your key-ring.
Disadvantages are that the lock can easily be picked, vandalised or simply beaten down. Not the most effective but the differences between good and bad in this case are so great that it is hard to choose between to the three.
5.8 B: Which would I recommend to the people viewing?
I personally would choose passwords seeing as you can trace it, change it and do whatever you want with it.
5.8 C: What is needed to keep a system available 24/7
Quite simply all you need is power, a secure network with a good password and people working the machines.
That’s all, I hope made Mr ICT happy seeing as this is as professional as I can get pretty much.
I would like to thank Wikipedia for helping me out with the information and the link for Swipe Cards is below:
http://en.wikipedia.org/wiki/Magnetic_stripe_card
Well, that’s all for now. Thank you very much for reading and please answer the poll and comment.
Thanks
The Muffin
Hello again my merry muffin minions of madness and manic muffins! today I give you a blog on virus' and in particular. The Klez virus.
that's all for the intro. today
The Muffin
5.7 A: What is the Klez Virus!?!
The Klez virus has got to be the coakroach of virus', you can flush it down the toilet as many times as you like but to no avail. This normally comes in the victims inbox in either Outlook or just general e-mail. The Klez virus first appeared in late 2001 and is still probably the most prolific virus out there! (if not then I can think of another one) and because the infected sender's adress is not on the new e-mail, the worm is very difficult to track indeed.
At some times it acts like a worm, other times it acts like a trojan horse! It's really quite terrifying! That's not the worst part though, what is the worst part you ask? It only comes in SEVEN DIFFERENT VARIATIONS! One of the newest variants, known as: W32.Klez.H@mm is probably the most frightening form of Klez there is. This virus will damage your OS (Operating System) beyond repair! It does this by letting loose a worm called ElKern and overloads your computer with infected files. some times people will have to wipe windows completely from their Hard Drive and re-install just to hopefully purge.
Fear not, if you are reading this using a MAC then you are safe. If not, then I'm sorry just don't read any e-mails that say "Klez removal tool" from a colleague or friend.
for the real Klez removal tool, and I mean the REAL klez removal tool the link is below.
http://www.pcworld.com/article/103259/klez_the_virus_that_wont_die.html
That is a link to the PC-World website which has information on the Klez virus and I would like to thank them for giving me some information.
5.7 B: If Klez isn't worse than this then I don't know what is!
this next virus is like trying to kill Chuck Norris: You just can't do it! but it looks very, very innocent from the outside.
It's called Anti-Virus 2009 (2009 for now anyway)
It will do absolutely nothing to help you
Do not download it
Anti-Virus 2009 is a virus specifically designed to stay there and not move. Once it's there there is absilutely nothing you can do! Not even F11 works! Say you have downloaded it and you think you are alright, you're not! Do not argue! once it's there it will do a scan and in about two seconds it will say you are infected, aside Anti-Virus you're not. Say "Stay unprotected" and continue to panic because you are well and truly stuffed! Anti-Virus fights dirty, quite literally. When I recieved it, it downloaded free and illegal porn onto my computer! It stops from you making backup files because it knows what you are doing, it stops you accessing control panel and program files because it knows what you are doing, it won't even let you put in blank discs! It's horrid! avoid this Anti-Virus 2009 at all costs!
5.7 C: Anti-Virus software beside the one I've just talked about.
There's alot of anti-virus software out there now and I thought I would review some for the muffin's friends, and also for my pleasure. I will be reviewing:
McAfee Anti-Virus
AVG
Windows Defender
those three are the most well known, I am not reviewing Norton because Norton donesn't even count for anti-virus software.
McAfee is a well known anti-virus software and is very very good at detecting things, however it does not actually heal.
AVG is brilliant! it detects and heals at stunning efficiency! I love it!
Windows Defender is also known as DCS: Doesn't Catch S**t. And my god it doesn't.
That's basically it in a nutshell. Thanks for now!
The Muffin
Wednesday, 9 September 2009
I need to correct myself on 5.X A
A very special interview about networking
I'm not spamming blogs on one day! Relax!!
I have contacted an estate agent but not to buy a house: No really. I have
This blog is about the usefulness and tasks e.t.c in an estate agents building. The interview, if you will, went very well and the kind woman on the phone was very helpful. I will put references at the end because that makes it easier!
Anyway. I’m here because on the same day I released the 5.1 and 5.3 blog, the guy who is guiding me through these seven GCSE’s by the hand quite frankly basically said for me to make an idiot of myself and call an Estate Agents (preferably local) and I have therefore decided to phone them so as they don’t see that awkward look on my face that tells them I don’t want to be there. So here we go: have fun reading what comes up in the next paragraph and if you’re looking for help then read further. I will call the given home task: Task 5.X (because it’s about module 5).
Thank you.
The Muffin
5.X A: The Basics.
This building was a LAN based network (meaning they all network under the same roof) there’s an even smaller network in each of the offices and they go through a Hub (somehow they have managed to make full use of it. Full marks to them BUT NOT THE HUB!) Hub’s benefit businesses like Estate Agents because a Hub will send the same bit of information to every computer that comprises within that network. If a computer isn’t in that network, they won’t get that information. That’s how a Hub works. It’s rather annoying when using one in a “Peer-to-peer” network so you should use a Switch if using a “Peer-to-peer” network. For more info on Hubs and Switches, go to 5.1 in my September blog archive.
I can’t remember if the very kind lady said if the were using Ethernet cables and NIC’s or using Wi-fi. I should think they were using Ethernets running across the wall behind a special cover with a special name. I have since forgotten the name of it because there is so much to remember in this unit that even having a photographic memory doesn’t help much. I think it’s called a Trunking. (If someone could fill me in on this then that would be great!).
They do have a file server and a print server in every office but all those are connected as well. They are connected with switches (thank god! If not I would’ve felt sorry for them!) Because if using a hub with print servers, then the printer would be very, very tired. Again, Hubs are not useful much.
I’ll try to draw it out (or at least try to. If you can make out my terrible drawing) if this still seems a bit unclear, however, if this has helped then that’s about it in a nutshell.
5.X B: References.
First off, I would just like to thank the Super-duper-mega-ultra-awesome kind woman on the phone for helping me out during all this. And then, most of all I would like to thank: Beal’s Independent Estate Agents in Gosport located around the middle of the high street if you live near by. In fact, I’m so happy and grateful, their website is going on my blog.
There we go! That’s all for now. I don’t really know what’s up next and to be frank: I don’t know if there is more of module 5 to follow.
Thank you! Thank you all!
Another Diploma Blog!
Well. I've been very busy at the diploma... well come on I obviously want to pass! this one's about more networking!
hope I can answer some questions.
Bye Bye for now.
The Muffin
5.3 A: The Meaning behind Business-Relevant Technology
One word that is not on the title is “systems” meaning each BRT system (Business-Relevant Technology) has a certain purpose. But mainly the way the modern world see’s it from face value is: network several computers together so folders on their hard drives can be accessed on computer A and computer B, allowing a team to work together. This is a common thing you will find in most and if not ALL businesses.
Going back to a “Peer-to-peer” network, a home user might set up a system in the house networking three computers together so they can access the internet via a broadband DSL modem. This can be a wireless DSL modem so you don’t have to use Ethernet cables. However, each computer would need a wireless networking card in order to be able to connect, not just to the other computers, but to the internet itself.
5.3 B: Estate Agencies
The reason an Estate Agency benefits a lot from a BRT system because when a property comes up brand new on the market (not forgetting the situation we find ourselves in today), then because all of the computers in the room (LAN) are connected, then they will get information on it (most probably as a pop-up) all at the same time! Yes, Networking does have a lot of advantages. The only disadvantage is having a Hub.
5.3 C: ADSL and DSL
ADSL is considered a type of DSL because DSL is the same ratio of an ADSL.
Well that’s all for now. Thank you for reading and I hope this answered any questions if you were looking for some.
Thank you.
The Muffin
IT Diploma task 5.1
Below I have posted information I'm doing for an IT Diploma. hope you like it and please comment and follow me.
Cheers guys!
The Muffin
5.1 A: Network components
Components in a network are what make up a network in order for it to work. The following components are essential in a network.
File Server
At least 2 computers or more
An NIC or “Network Interface Card” on all the computers comprising within that network
An RJ-45 Cable otherwise known as an “Ethernet” Cable (this is used to connect the 2 computers together via the NIC Ethernet port)
And if you’re looking to print information out within that network then you will need a print server.
Notice that the file server is at the top of list. This is because without the file server, one will not be able to use information on multiple computers. I.E: If one was to save something on computer “A” in one room and then go to computer “B” then if those two computers were on the same network then one would be able to access that same information in the same directory (then it comes down to a question of if you know what directory it’s in).
Switches (which I will abbreviate to “SW”) are a lot better than Hubs (which I will not abbreviate) because Switches are capable of accessing the database in the file server and taking the information directly to the computer which you would like it to go. Let’s call that computer, Computer C.
However, if I was using a hub and I wanted to send the information from computer A to computer C then the hub would not access the database in file server, instead the hub would send the information to Computer B and C and basically say “would you like this?” when one of the computers (in this case computer C) says “Ah, there it is! Just what I’ve always wanted!” computer B will then, in turn, say “No, I wouldn’t like this.” Hubs are less efficient than switches. Ironically, Switches cost more than Hubs.
If the network is under one roof, then it is known a LAN, or Local Area Network
If the network in one building, then it is a WAN, or Wide Area Network
5.1 B: The roles of the components I’ve just talked about.
The roles have been explained already “in-a-nutshell” kind of way in section 5.1 A. just to sum it up one more time however:
· The File Server is the most important component in the whole network. HOWEVER, they are not required if you have network with just two computers. File Servers work best in an office or a school. A small network between two computers in your average two up two down house is known as a “Peer-to-peer” network. Meaning: both of the computers are equal. It is IMPOSSIBLE and frankly, rather silly and stupid to have a network with just one computer.
· In a small house or “Peer-to-peer” network then it is again, not a good idea to have a print server. Remember, there is only going to be roughly two of you.
· IP addresses are something rather important also, type 212.58.253.71 in your web browser to come up with a well known website. This should not be confused with ISP’s, or Internet Service Providers. These are the people that connect you to the internet. Such as: Virgin Media, Sky.
· An NIC is a Network Interface Card. These things are vital in a network because you NEED these to be able to connect ANYTHING in a network. They connect to the motherboard if you’re looking for advice on these.
· An RJ-45 Cable is needed to connect your NIC to the other NIC port. I.E: a file server.
5.1 C: Switches are better than hubs FULL STOP/any other info.
Should this information have somewhat pointed you in the right direction or confused you even more. Then recommended links are below. (if they do not come up as accessible then copy and paste into your web browser)
http://en.wikipedia.org/wiki/Local_area_network
http://en.wikipedia.org/wiki/Wide_area_network
http://en.wikipedia.org/wiki/Network_card
and finally this last segment talks about why Switches are so much better than Hubs.
A Hub causes more network traffic causing your network speed to slow down greatly.
That about wraps it up.
Well. Thank you for reading. And I hope this helps.
Until Next time!
The Muffin.
Welcome to: The home of The Muffin
This is the blog of The Muffin and i think all of you guys can see where this is going now. I have this whole blogger thing which is relatively easy to use. So now the next thing to do is to gether me a fearsome army as to rule the world!
\m/ !FEARSOME! \m/
So come on. be a part of my fanbase for Muffin support! if you're lucky enough you might even get a Muffin with Sprinkles!!!
\m/
Well... that's all for today remember: subscribe or follow me or whatever it is you can do on blogger that is the equivalent of Subscribing on youtube... BE A SOLDIER FOR TEH MUFFIN!!!
"Don't worry children, let The Muffin guide you..."