Archive for January, 2012

week 8

Posted in Uncategorized on January 26, 2012 by stephenmcguire91

this week i researched health and safety and illness associated with it


health and saftey issues week 8

Posted in Uncategorized on January 26, 2012 by stephenmcguire91

1. CO2 Fire Extinguisher  because Dry powder fire extinguishers are the best type of extinguisher for use on flammable liquids and gases.  Certain types of dry powder extinguishers are specially designed for use on particular fire types, and have powders geared towards dealing most effectively with these specific situations.

2. it is necessary to use ant-static equipment incase of an electric shock Always use an anti-static wrist strap when working on a computer except when working on monitors: more about that. One end is an elastic band that fits around your wrist and which is connected to an alligator clip by a wire. The clip connects to a metal part of the computer chassis, which equalizes the voltage between you and the computer, thus avoiding static sparks.

3. If you follow the instructions about how to unpack a package with anti-static instructions there is no risk, otherwise you might get an electric shock; hope not across the heart; it could be fatal even with a fraction of one amp.

4.The cable between the plug and appliance is vulnerable to physical damage, which  can lead to a breakdown of insulation between the internal conductors (live,  neutral and earth) causing a short-circuit current to flow. Without the fuse in  the plug this could lead to fire. The fuse senses the short-circuit current and  interrupts it before damage can occur.

5.The Electricity at Work Regulations 1989 came into force on 1st April 1990; their purpose is to require precautions to be taken against the risk of death or personal injury from electricity, in work activities.

In the main, the Regulations are concerned with the prevention of danger from electric shock, electric burn, electrical explosion or arcing or from fire or explosion initiated by electric energy.

All places of work covered by the Health and Safety at Work Act (shops, offices, factories, workshops, farms, garages, sports and entertainment centres, etc.) are covered under these new Electricity at Work Regulations.

The regulations convey principles of electrical safety, as applied to any electrical equipment, any work activity having a bearing on electrical safety – in other words they all apply to all electrical systems and equipment, in connection with work activities, whenever manufactured, purchased, installed or taken into use, even if its manufacture or installation pre-dates the regulations.

6. Computers, televisions, lab analyzers, EKG monitors, and other  types of biomedical electronic equipment may contain hazardous materials.  Of particular  concern are heavy metals such as lead (used in cathode ray tube [CRT] monitors and lead solder),  mercury (used in the lights behind Liquid Crystal Displays [LCD]), and cadmium (used in batteries,  resistors, CRTs, and plastic components), chlorinated plastics (PVC) used in cable wiring,  brominated flame retardants (used in plastic computer housing and circuit boards).


  • Large household appliances e.g. fridges, cookers, microwaves, washing machines and dishwashers
  • Smallhousehold appliances e.g. vacuum cleaners, irons, toasters and clocks
  • IT and telecommunications equipment – e.g. personal computers, copying equipment, telephones and pocket calculators
  • Consumer equipment e.g. radios, televisions, hi-fi equipment, camcorders ad musical instruments
  • Lighting  equipment e.g. straight and compact fluorescent tubes and high intensity discharge lamps
  • Electrical and electronic tools – e.g. drills, saws and sewing machines, electric  lawnmowers
  • Toys, leisure and sports equipment e.g. electric rains, games consoles and running machines
  • Medical devices e.g. (non infected) dialysis machines, analysers, medical freezers and cardiology equipment
  • Monitoring and control equipment e .g. smoke detectors, thermostats and heating regulators
  • Automatic dispensers e.g. hot drinks dispensers and money dispensers




week 7 Legal implications of information Systems

Posted in Uncategorized on January 26, 2012 by stephenmcguire91


The Regulation of Investigatory Powers Act 2000 (RIPA) is concerned with

the regulation of surveillance by public authorities in the conduct of their

legitimate business. Surveillance is an essential part of modern life but has

not until now been the subject of formal statutory control.

2.   Interception of a communication, use of  communications data, have directed survelliance, covert human intelligence sources and intrusive survellience

3.  it contains three parts

4.The Freedom of Information (Scotland) Act 2002 (also referred to as FOISA or the FOI Act) came into force on 1 January 2005.  FOISA gives everyone – anywhere in the world – the right to receive information from Scottish public authorities, subject to certain exemptions.


  • the right to information, and the obligations of Scottish public authorities
  • exemptions to that right, and circumstances in which these exemptions apply
  • the powers and duties of the Scottish Information Commissioner
  • how the right to information is enforced
  • the requirement for Codes of Practice, issued by Scottish Ministers
  • a list of bodies covered by the Act.

6.They must produce a ‘publication scheme’, which is, in essence, a guide to the information they hold which is publicly available

They must deal with individual requests for information. Individuals already have the right to access their personal data, held on computer, and in some paper files, under the Data Protection Act 1998. This is known as the ‘subject access right’. The Scottish Act permits individuals to access all other types of non-personal information that public authorities hold, subject to specific exemptions in the Scottish Act.

7.The 1998 Data Protection Act came into force early in 1999 and covers how information about living identifiable persons is used. It is much broader in scope than the earlier 1984 act, but does contain some provision for a transitional period for compliance with the new requirements.


  • Processed fairly and lawfully.
  • Processed only for one or more specified and lawful purpose.
  • Adequate, relevant and not excessive for those purposes.
  • Accurate and kept up to date – data subjects have the right to have inaccurate personal data corrected or destroyed if the personal information is inaccurate to any matter of fact.
  • Kept for no longer than is necessary for the purposes it is being processed.
  • Processed in line with the rights of individuals – this includes the right to be informed of all the information held about them, to prevent processing of their personal information for marketing purposes, and to compensation if they can prove they have been damaged by a data controller’s non-compliance with the Act.
  • Secured against accidental loss, destruction or damage and against unauthorised or unlawful processing – this applies to you even if your business uses a third party to process personal information on your behalf.
  • Not transferred to countries outside the European Economic Area – the EU plus Norway, Iceland and Liechtenstein – that do not have adequate protection for individuals’ personal information, unless a condition from Schedule four of the Act can be met.

9.Information that is accessible by other means. Information relating to or dealing with security matters. Information contained in court records. Where disclosure of the information would infringe parliamentary privilege Information held by the House of Commons or the House of Lords, where disclosure would prejudice the effective conduct of public affairs Information that is not held by the Commons or Lords falling under is subject to the public interest test). Information which  the applicant could obtain under the Data Protection Act 1998 or  where release would breach the data protection principles. Information provided in confidence. When disclosing the information is prohibited by an enactment; incompatible with an EU obligation; or would commit a contempt of court.

10.• Information supplied by, or relating to, bodies dealing with security matters. Information relating to Court records.  Parliamentary privilege.  Information provided in confidence.  Information prohibited from disclosure by any other piece of legislation or enactment.

11. The Data Protection Act (1998) allows individuals to find out what information is held about themselves on computer and some paper records.

12. You must protect personal information byfollowing the eight principles of good practice.

13.The Copyright, Designs and Patents Act , is the current UK copyright law. It gives the creators of literary, dramatic, musical and artistic works the right to control the ways in which their material may be used. The rights cover: Broadcast and public performance, copying, adapting, issuing, renting and lending copies to the public. In many cases, the creator will also have the right to be identified as the author and to object to distortions of his work.

14.Software licensing is a contract of agreement between the software publisher and the end user, sometimes referred to as the End User License Agreement, or EULA. Though software licensing can be a paper agreement, it is most often imbedded in the software itself as part of the installation process. If the user does not agree to the software licensing terms, he or she can indicate so with a click. This aborts the installation process.



16. The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities, such as hacking into other people’s systems, misusing software, or helping a person to gain access to protected files of someone else’s computer.  The Computer Misuse Act came into being after the 1984-1985 R v. Gold case, which was appealed in 1988.

17. there are three sections to it



19. (a) no


20. (a) 

The right to prevent processing

The right to prevent processing for direct marketing

21. (a) so no one can take the images for themselves

(b) ask for permission

22. (a)   you can download is right there and then, and you do not have to wait for your order to arrive

(b)  it could be a virus.









installing Computer Hardware report

Posted in Uncategorized on January 19, 2012 by stephenmcguire91
  • so far i have researched on all parts of the computer
  •  got the costs of the parts
  • and am writing about the functions of them

next week will be working on the build plan.

week 6

Posted in Uncategorized on January 12, 2012 by stephenmcguire91

1 . Keyboard, Mouse,Microphone,USB stick,Scanner

2.  hard disk drive,printer, projecter,monitor

3.  Floopy disk drives, Cd/Dvd/ driver, USB


5. Look at the back of your computer and identify the cables that are            Connected to it.

Depending on the number of peripherals you are using there may be several cables attached at this time. The most frequent are:

• Line cord

• The mouse cable

• Keyboard cable

• Monitor cable

Disconnect the power cord from the computer. Always keep your antistatic wrist strap connected to chassis ground on the computer. If it comes loose during the disassembly process, reattach it immediately.

Disconnect the cable that connects the keyboard to the computer by pulling it straight back from the computer. Take a sticker and write down keyboard and stick it on the keyboard cable. This is a good way to identify computer pats.

Do the same thing for the mouse cable, the monitor cable and all other computer components you may have attached.

6.  USB,Keyboard,Mouse


Ps-2-ports.jpg The PS/2 connector is a 6-pin Mini-DIN connector used for connecting some keyboards and mice to a PC compatible computer system.

8.You don’t have to power down the device or computer to  un-plug or plug it in.

9. a female DB is at the back of the computer which the male DB connects to