Saturday, January 25, 2020

DH-106 Comet Investigation

DH-106 Comet Investigation The Comet was the worlds first commercial jet airliner flying double the speeds of propelling planes and blew the worlds mind with speed class and disasters to come from flaws only engineers would notice. With three major accidents in just 2 years.[1] Small tears would be found and the shape of the window and thin shell would ultimately take the toll [2]of these major accidents. 1 Introduction 2 Abstract 3 Table of contents 4 Introduction 5 Background 6 Investigation 7 Finding and recommendations 8 The impact 9 The conclusion 10 Sources The DH-106 Comet was the worlds first commercial civilian airliner to hit the major mainstream and grab the worlds attention. The plane had four ghost jet engines near the main body of the plain. The plain nearly doubled the average speed per hour to the fastest propeller plane on the market. This meant trips could be gnarly cut in half and allow for my rides per day, making aviation have a large interest to the public and gained doubled the amount of passengers in just two years of its entry blowing out U.S business and shooting for the dream of making british planes world wide. De Havilland was founded in 1920 as british airways company and joined with Hawker Siddeley in 1964. Geoffrey De Havilland had pulled some money in with his friends and personal investments to seek out his dream of creating his own plane. The first production plane was the DH.18 and later the The comet had faced three major accidents in just 2 years killing 99 people in total. The dates were: May 2nd 1953- flight 783 leaves calcutta Airport to Delhi flying as BOAC. The plain will only hold for for 6 minutes before being caught in a sever thunderstorm.the plain had only reached 7,500 feet before ripping apart January 10th 1954- 781 will depart from ciampino airport. Leaving from rome. Captions would talk over the radio and right in mid sentence would be cut off, the plane would rip apart and all would die in the plane. April 8 1954-left ciampino airport got about 40 minutes in the air at around 35,000 feet in the air before just ripping apart killing everyone. Planes were recovered by the british navy and put back together for research and better understanding of how the accident went down. Water testing would also be tested to see is the the pressure was the cause of these tragedies. While being tested new materials would be tested such as cold working but would never be implemented for the commercial plane. Cold working is when you make metal extremely cold and then the metal is flattened to make it stronger like a hay bale or bricks. While investigators were rebuilding the planes peace by peace they noticed there were large stress tears by the windows on top of the plane and on the passenger windows. Later on after the three accidents this would be taken into consideration and eventually windows would be shaped more oval rather than square. The material would be the next huge notice. Around the windows were rivets that held the window in place and the very thin metal frame. When the plane is pressurized the metal will contract and expand leading to stress fractures and eventually tears. So when the cabin is having pressure applied on both sides the metal would give and the plane would rip apart like a tissue and kill everyone in a giant fireball. Much stricter regulations were imposed for the industry implying that if any imperfections were implied that the plane be holdted till ready or replaced. Details were huge and everything is to be checked with what paint is used to down right the way wiring is stored. To engineering tech specialist are the ones who give this inspection. They look for loose wires, flat tires, chips in the paint or metal or any other imperfections. Details were looked over for interest of money and not totally understanding totaly what was going on with this new technology. When accidents happen planes were not properly investigated not having proper fixes actually implied till a disaster had already been placed. Time to detail was the downfall of these disasters and if the engineers had payed more attention these accidents and implied there minds, they could have prevented set recorders of failure and set a safer name in the industry.

Friday, January 17, 2020

Importance of Data Security and Data Safety Essay

To prevent companies from using or passing on confidential information to other companies without the permission of the person who the data is about, companies will need to protect the data. With the popularity of the Internet there are opportunities for thieves to steal their personal data. So the government set a law (data protection act) which is used to protect people’s rights concerning how data is used and you also have the right to see such information and have any errors corrected. Also organisation will want to keep data confidential because it will not want its competitors to know how the business is going. List the 8 principles of the Data Protection Act The Data Protection Act says the personal data should: 1. Be adequate, relevant and not excessive. For example college should keep students details and details must be just what is needed and nothing more. 2. Be processed in accordance with the data subject right. For example the person that the data refers to have the right to read the information about him/her and the organisation should provide hem/her with information they need. 3. Be accurate and be kept up to date. There is a duty to keep it up to date, for example to change an address when people move. 4. Not be kept longer than necessary. For example it is alright to keep information for certain length of time but it would be wrong to keep information about past customers longer than a few years at most 5. Be obtained and processed for limited purposes. For example the organization must use the data only in the way it is described and it must not use it for any other purpose. 6. Be secure. This includes keeping the information backed up and away from any unauthorised access. It would be wrong to leave personal data open to be viewed by just anyone. 7. Not be transferred to countries outside Europe without adequate protection. Unless the country that the data is being sent to has a suitable data protection law 8. Be processed fairly and lawfully. For example if you put your money at bank no one can transfer your money without your permission. (a) What is the difference between the Internet, Intranet and Extranet? (P8) Internet: Are public networks that allow the user to use any of its facilities. Intranet and Extranet: is like a private internet. It is like a website that is only accessible to the members of a business or company. The different between Intranets and Extranet is: Intranet: Allow the members of organisation to access the access the system with an organisation. Extranet: Allow the members of organisation to access the system from different location but only by the users who have been given access rights. (b) * What is a browser? Is programme that can read web pages, by downloading HTML code and that allows the browser to interpret the code to the web page. A browser displays web pages, keeps track of where you’ve been, and remembers the places you want to return to, the most used browsers are Internet Explorer and Netscape Navigator. * Describe the role of a browser when using the Internet, Intranet and Extranet Browser allows the people to access information, view images, hear music and watch video, in the term of intranet and extranet the browser allows user to share documents, access databases and allow group work. * Describe the role of email when using internet communications. You can send email to an individual or to a group of people at the same time, you can create mailing list so that you can write a message and send it automatically to number of people. Also you can send files such as pictures, word document and sound as attachments to your message. (a) List major threats to an organisation that could happen while using the Internet. (P9) 1. Hacking (use to steal the personal details and private files of company) 2. The spreading of viruses (use to destroy or damage the important files of company) 3. Internet fraud (taking credit card details from customers) 4. Spay ware (is biggest threat in the computer system which allows someone to log into your computer and use it for their own purpose) 5. Spam ( sending unwanted messages especially commercial advertising) Purpose of assignment In this assignment, I have to do research and get information on the importance of data security and data safety. M research must be from ICT sources and non ICT sources and by using the evidence that I collect I should explain the importance of keeping customer information confidential, the main provision of data protection act, the role of browsers and email in internet communications, the difference between internet, intranet and extranet, the major threats to organization from internet and finally a poster that explains the importance of data safety and data security. The assignment will also gather key skills portfolio evidence. M5 Physical Security: Use of security guards, locks, reinforced doors, windows and walls depending on what is being protected. Use of ICT to enforce security entry on doors, and protected areas of buildings i.e.: swipe cards, fingerprint ID, voice recognition. Firewall: This is a security device, which acts as a single entry/exit point for information and access to a computer system. All traffic must pass through the firewall and therefore a system is secure from external threats. A firewall usually sits between the internal network of an organisation and access by the internet. Virus Protection: It is usual for systems to have some form of anti-virus software installed and running in the background. All files and devices introduced to the system would be scanned, any attempts to alter system files would be blocked, and notification made to the user/system administrator. Preventing the use of floppy disks is a good method of eliminating one source of potential virus problems. Identification of Users: A system of user ID’s and passwords is a simple method of preventing unauthorised personnel accessing the system. These should be managed by the system administrator. With this, only some users will have access to certain programmes and data therefore increasing the level of security on sensitive data. In addition, some users may only be able to read the data and not write the data. Other users may not have the ability to delete or even to access certain files. Encryption software: the data may be encrypted (coded) into a form, which can only then be decoded by the intended user. If the data falls into the wrong hands, it will be meaningless. Backups: To guard against the loss of data, backups should be regularly made. These backups should be stored in a separate place, preferably in a fireproof environment. Passwords software: Password protection usually involves a person typing in: * A User Name – to identify the person. * A Password – to identify the person. He should be the only one to know what it is. Computer viruses: which are programs that destroy the way computer operates without the knowledge of the user, there are huge numbers of viruses some are extremely malicious with the ability to delete or damage files and programs. Some of the threats that they cause to computer systems include: * Deleting data on the hard disk of the organisation computer system. * Enabling hackers to hijack the organisation system and use it for their own purposes. How do viruses spread: * CDs and floppy disks containing infected documents. * Emails containing infected attachments. Hackers: who gain unauthorised access to computer systems for the purpose of stealing and corrupting data, also gaining access to financial information about the organisation business or their customers for the purposes of fraud. Security measures may include†¦ * Each user should be given a user name and a password. * Computer usage may be logged. * Computers should be disconnected from a network when not in use. * Use a firewall – a computer running software, which detects hackers dialling in to a network. Spam: authorised users downloading a web page or receiving an email with hidden active content that attacks the organisation system or send sensitive information to unauthorised people. Organisation can stop spreading of spam by using spam filtering software Spy ware: is software that is placed on organisation computer when the employee visits certain websites, it is used to secretly gather information about the organisation usage and sends it back to advertiser or other interested company to tracking the organisation system use .it can also slow down or crashes the organisation computer Pop up: Many company advertisers on the Internet by using windows that pop up in the middle of computer screen to display a message. They might also open when you click a link or button on a Web site, and they might open either over or under the window, you wish to view. Some pop-up windows can contain inappropriate content or can be a way for employee of organisation to accidentally download dangerous software (called spyware or adware) onto organisation computer. Infringement of copyright: Internet users are not allowed to copy or print some internet materials such as; video, music, files and photos without the permission of copyright holder and sometimes they may have to pay a licence to do so. Theft and fraud: credits card fraud for example people can steal the details on credits card and using them illegally to buy goods Sole trader: A sole trader is the actual owner of a business, a sole trader also has unlimited liability. All the debts of the business are the debts of the owner. They can not issues shares .The whole meaning behind † Sole† means that she/he does not have partners. (e.g. electrical repair, picture framing, photography, diving instruction, retail shops, and hotels) Partnership A Partnership can be liable for all debts, it is easy to setup, but is also inexpensive to form. Forming partnership requires an agreement that is some times called partnership agreement ‘between two to twenty individuals’ which entitles them to jointly own and carry on a trader business together. A partnership is a contract between two or more persons who agree to pool talent and money and share profit or loss. Private limited company A Private limited company has limited liability (the shareholders cannot loose more than their original shareholdings), and a minimum of two shareholders and a maximum of fifty shareholders. It cannot offer its shares to the public. A private limited company is treated as a legal entity. Public limited company A company which may have an unlimited number of shareholders and offer its shares to the wider public. (e.g. Cadbury and Tesco) Multi-National company A company that does business in more than one country, usually by setting up branch offices. Tesco Characteristics * Type of company: Tesco is an international retailer and is a publicly owned company (Public Limited Company Plc). * Products: including food and non-food business, personal finance, internet shopping, electrical items, home entertainment, toys, sports equipment, and many more. * Profit / loss: Tesco’s Profit and Loss 2005 2004 Sales at net selling prices 37,070 33,557 Turnover including share of joint ventures 34,353 31,050 Less: share of joint ventures’ turnover (379) (236) Operating profit/(loss) 1,949 1,735 Share of operating profit/(loss) of joint ventures and associates 130 97 Net profit/(loss) on disposal of fixed assets 53 (9) Profit on ordinary activities before taxation 1,962 1,600 Underlying profit before net profit/(loss) on disposal of fixed assets, integration costs and goodwill amortisation 2,029 1,708 * Size of company: Tesco operates 923 stores and employs 240,000 people , there are 639 branches in Great Britain and 182 in the rest of Europe * Location: they operate in UK, Hungary, Poland, Czech Republic, Slovak Republic, Thailand, South Korea, Taiwan and the Republic of Ireland * Purpose of company: to create value for customers to earn their lifetime loyalty. * Aims: Built good non-food sales expanded into retailing services and exploited e-commerce successfully. * Objective: 1. To deliver a consistently strong customer offer. 2. Making their shopping trip as easy as possible. 3. Constantly seeking to reduce their prices to help customer spend less. * Logo: Cadbury Characteristics * Type of company: is an international retailer and is a publicly owned company (Public Limited Company Plc). * Products: chocolate and drinks brands. * Profit / loss: Cadbury Profit and Loss à ¯Ã‚ ¿Ã‚ ½ (Millions) 2006 à ¯Ã‚ ¿Ã‚ ½ (Millions) 2005 Turnover 6,508.00 6,085.00 Operating Profit / (Loss) 1,003.00 825.00 Net Interest (188.00) (205.00) Pretax Profit 843.00 642.00 Post Tax Profits 703.00 497.00 Total Dividend Paid n/a n/a Retained Profit / (Loss) for the financial year n/a n/a * Size of company: they operate in more than 35 countries and they employs over 55,000 people * Location: Americas, Europe, Middle East and Africa and Asia Pacific. * Purpose of company: the organization work together to create brands people love. * Aims : 1. Deliver shareowner performance. 2. Ensure their capabilities are best in class. 3. Reinforce reputation with employees and society * objective: 1. Responding to consumer needs quickly. 2. Grow shareowner value. 3. Attract and develop the best kind of people.

Thursday, January 9, 2020

Human Rights And The Rights - 1886 Words

Human rights are rights that are believed to belong justifiably to every person no matter what situation, race, or gender. The people get to decide what is wrong and right, from voting, to being treated unequal, being called a minority, to there being government officials mistreating the way humans view things. â€Å"Human rights are rights inherent to all human beings, whatever our nationality, place of residence, sex, national or ethnic origin, color, religion, language, or any other status. We are all equally entitled to our human rights without servitude and compelling victims to commit sex acts for the purpose of creating discrimination.† (Ckmgrey. Ckmgrey. Web. 17 Apr. 2016.) These rights are what protect us, they help all of us such as difrent genders, and race. Human rights were given to us to protect us from harm but there are evil people who do not care and will make you feel like you’re nothing and not worthy of rights. Human trafficking makes people feel lik e they’re nothing and or maybe even would rather kill themselves then have to live through all the painful things those people do. Human trafficking in my opinion is one of the most dangerous things in the United States of America. â€Å"Trafficking primarily involves exploitation which comes in many forms, including: forcing victims into prostitution, subjecting victims to slavery or involuntary pornography.† (Person, and Bonita Aaron. Human Trafficking Is Trafficking That Primarily Involves Exp.Show MoreRelatedHuman Rights And The Human Right1389 Words   |  6 Pagesallow to certain basic rights in every part of the world. Without consideration of the circumstances, nobody has fairly or righteously impowered to take away these basic rights from ordinary citizens of particular country. The human rights are of different types of rights like, political rights and civil liberty rights. The most significant constitutional human right available to a human being of right to life and physical safety. According to Donnelly and Howard Human rights are the expression ofRead MoreHuman Rights Is A Human Right850 Words   |  4 Pagestheir human rights violated. Human rights range from the right of equality, to the right of marriage, to the right of adequate living and more. Anything humans being deserve is a human right. They can be as extreme as 805 million people living in poverty (Yahoo, Derrius Quarles) or as simple as not being allowed to speak about your religion in a restaurant. Human rights belong to everyone. Whether or not we think it is ethical, almost everyone at one point in their lives will have these rights violatedRead MoreHuman Rights And The Rights949 Words   |  4 PagesHuman has many fundamental rights and freedoms to which all humans considered entitled the right to life, liberty, freedom of thought and appearance, and equal treatment before the law, among others. These rights represent entitlements of the individual or the governm ent, as well as responsibilities of the person and the government authorities’ these rights often advanced as legal rights and protected by the rule of law. However, they are distinct from and before the law, and can be used as standardsRead MoreThe Rights Of A Human Right1037 Words   |  5 Pagessomething to be considered a basic human right, one often looks at all the reasons why it should become one. In some cases however, it can be argued that the refusal of something as a human right is actually a violation of already existing human rights. This is the case when discussing PAS/D in reference to becoming a human right. People understand that they have a right to life, liberty and personal security, but nowhere does the charter state people have a right to their own death – not explicitlyRead MoreThe Rights Of Human Rights1211 Words   |  5 Pages The inalienable human rights is something undeniably important in the view of everyone in the world, as nearly all g overnment in the world have some sort of written law that ensure the rights of its citizens, like the Bill of Rights that protect the rights of Americans. Yet, when applying that significance in protecting human rights to people outside of their nation’s border depend considerably on the interests of the government, the interactions between the different nations, and the response concludedRead MoreHuman Rights And The Rights1178 Words   |  5 PagesIntroduction: Human rights are a notion long-debated in history. Two of the three main claims of human rights characteristics are universality and inconvertibility. Universality indicates that human rights are applied equally to every individual, no matter their ethnicity, race, gender, sexuality, age, religion, political conviction, or type of government. Inconvertibility means that human rights are absolute and innate. They cannot be removed or denied by any political authority as they are notRead MoreHuman Rights And The Rights1095 Words   |  5 Pagesâ€Å"Human rights† is a fairly modern concept, and it is one that has been getting a great deal of attention here in the early years of the twenty-first century. While opinions differ wildly about what constitutes human rights, most modern world citizens believe that all people should have at least the most basic rights. Human Rights plays a role in everyone’s life, but not everyone realizes it. It’s involved in every com ment you make that includes someone different. Every near discriminatory â€Å"joke†Read MoreHuman Rights And The Rights1292 Words   |  6 Pagesexactly are Human Rights, can they be violated? Many people don’t pay too much attention to this global issue, however the violation of human rights is a tremendous and current problem. All human beings are born free and equal in dignity and rights. They are endowed with reason and integrity and should act towards one another. Human Rights will be rights that you have basically in light of the fact that you are a human. In the event that you went around and asked diverse individuals What is Human RightsRead MoreHuman Rights And The Rights883 Words   |  4 PagesHuman Rights In this week, we focused on human rights, and the many different human right violations. Human rights are the rights and laws inherited to every human being despite their gender, social status, nationality, religion, or color. Last week we mentioned a few human right violations and discrimination issues. For instance, in the video A Force More Powerful, part 1 talks about several acts of disobedience provoked by the violation of rights of various members of some ethnic groups. The actRead MoreHuman Rights And The Rights1361 Words   |  6 PagesHuman rights are rights that claim that all human beings no matter what gender, race, religion language and etc., are all equally entitled to our human rights. They are the basic rights and freedoms to which all human beings are entitled to such as civil and political rights, the right to life and liberty, freedom of thought and speech/expression, equality before the law, social, cultural and economic rights, the right to food, the right to work, and the right to education. .All have the right to

Wednesday, January 1, 2020

Why Is Spanish Sometimes Called Castilian

Spanish or Castilian? Youll hear both terms used in referring to the language that originated in Spain and spread to most of Latin America. The same is true in Spanish-speaking countries, where their language can be known as either espaà ±ol or castellano. To understand why requires a brief look at how the Spanish language developed to its current form. What we know as Spanish is primarily a derivative of Latin, which arrived on the Iberian Peninsula (the peninsula that includes Spain and Portugal) around 2,000 years ago. On the peninsula, Latin adopted some of the vocabulary of indigenous languages, becoming Vulgar Latin. The peninsulas variety of Latin became quite well entrenched, and with various changes (including the addition of thousands of Arabic words), it survived well into the second millennium. Variant of Latin Emerged from Castile For reasons more political than linguistic, the dialect of Vulgar Latin that was common in what is now the north-central portion of Spain, which includes Castile, spread throughout the region. In the 13th century, King Alfonso supported efforts such as the translation of historic documents that helped the dialect, known as Castilian, become the standard for educated use of the language. He also made that dialect the official language for government administration. As later rulers pushed the Moors out of Spain, they continued to use Castilian as the official tongue. Further strengthening Castilians use as a language for educated people was Arte de la lengua castellana by Antonio de Nebrija, what might be called the first Spanish-language textbook and one of the first books to systematically define the grammar of a European language. Although Castilian became the primary language of the area now known as Spain, its use didnt eliminate the other Latin-based languages in the region. Galician (which has similarities to Portuguese) and Catalan (one of the major languages of Europe with similarities to Spanish, French, and Italian) continue to be used in large numbers today. A non-Latin-based language, Euskara or Basque, whose origins remain unclear,  is also spoken by a minority. Multiple Meanings for Castilian In a sense, then, these other languages — Galician, Catalan and Euskara — are Spanish languages and even have official status in their regions, so the term Castilian (and more often castellano) has sometimes been used to differentiate that language from the other languages of Spain. Today, the term Castilian is used in other ways too. Sometimes it is used to distinguish the north-central standard of Spanish from regional variations such as Andalusian (used in southern Spain). Sometimes it is used, not altogether accurately, to distinguish the Spanish of Spain from that of Latin America. And sometimes it is used simply as a synonym for Spanish, especially when referring to the pure Spanish promulgated by the Royal Spanish Academy (which itself preferred the term castellano in its dictionaries until the 1920s). In Spain, a persons choice of terms to refer to the language — castellano or espaà ±ol — sometimes can have political implications. In many parts of Latin America, the Spanish language is known routinely as castellano rather than espaà ±ol. Meet someone new, and she may ask you  ¿Hablas castellano? rather than  ¿Hablas espaà ±ol? for Do you speak Spanish? Primary Hemispheric Differences in Spanish Since English speakers frequently use Castilian to refer to the Spanish of Spain when contrasted with that of Latin America, you may be interested to know some of the major ​differences between the two. Keep in mind that the language also varies both within Spain and among Latin American countries. Spaniards usually use vosotros as the plural of tà º, while Latin Americans almost universally use ustedes. In some parts of Latin America, particularly Argentina and parts of Central America, vos replaces tà º.Leà ­smo is very common in Spain, not so in Latin America.Numerous vocabulary differences separate the hemispheres, although some vocabulary, especially slang, and can vary considerably within individual countries. Among the common differences between Spain and Latin America are that in the former manejar is used to refer to driving, while Latin Americans usually use conducir. Also, a computer is usually called a computadora in Latin America but ordenador in Spain.In most of Spain, the z (or the c when it comes before e or i) is pronounced much  like the th in thin, while in most of Latin America it has the s sound. Despite these differences, native speakers in Spain can converse freely with Latin Americans and vice versa, especially if they avoid slang. In degree, the differences are roughly comparable to those between British English and American English.