Tuesday 27 November 2012

Unit 14 task 2 M1


How do protocols and devices keep data safe?


you could use passwords onto your documents and when you type in the correct password you can access the document you want to look at. Don’t use anything like your nickname, date of birth, or any names you may know.
also be sure you change your password regularly so if anyone figures out you old password and think that's the password you’re using it will stop the person trying to hack into your account.

Be sure to turn off your Bluetooth when you’re not using it so no one can hack into your phone through a code that is very easy to read.

Wednesday 14 November 2012

unit 1 D1


Safety issues using blogsites

A blog is like an online diary / journal, created and published by an individual or a group. Blogs are web - based publishing tools, meaning they can be easily and quickly published and maintained without the need for technical expertise.

The issues:

Revealing too much personal information - The issue with revealing too much personal information is one of the greatest concerns associated with online technologies today.
Some personal information is obvious - giving names, addresses, birthdates and phone numbers for example.
Some personal information is less obvious however - snippets of your town name, school name, hobbies and interests or where the author wants to ‘hang out’ can all be pierced together to form a very detailed picture of the blogger and their possible offline movements.

Respecting the privacy of others - In the same way that all technology users should be mindful of revealing too much information about themselves, they should also consider what their online postings and interactions reveal about others.

Cyber bullying - Blogs have unfortunately been associated with cyber bullying - that is using the technology to deliberately hurt, upset, harass and embarrass others. Bullying is wrong in any form and it should never be tolerated!
Equally some blogs may be just outright offensive and inappropriate, containing sexist or racist comments, or promoting religious or cultural intolerance.

unit 1 M1


The Features of Blogspot

in blogspot:

  • you can customise your blogspot page however you want it to look
  • you don’t need to use paper because you can upload it to you blogspot page
  • it doesn’t take up too much storage space
  • it’s easy to use
  • it’s free to use
  • you can comment on other peoples work
  • you can create as many blogs as you want
  • you type your work onto blogspot
  • you can get feedback from other people and see if you need to make improvements
  • you can get it on your phone

Wednesday 17 October 2012

Task 3 Unit 2 P3

CNC Programmer

evaluation engineering and manufacturing  have a fantastic opportunity for an  experienced  CNC Programmer to join a business that is responsible for developing and implementing world class manufacturing processes for leading clients.

key duties and responsibilities will include:

  1. development of manufacturing process
  2. generation of manufacturing stage models and drawings using CATIA V5 Rev 16 software
  3. selection of machine tools and cutting tools
  4. generation of 5-axis CNC programmes using CATIA V5 Rev 16 software
  5. generate standard operating procedures (SOP’s)
  6. generation of quality documentation in support of shop floor improvements
  7. support development of internal best practices


Salary: £30k - £40k pa
job type: permanent