Communication and Analysis Skills … · Web viewIn communication and analysis skills, the...
Transcript of Communication and Analysis Skills … · Web viewIn communication and analysis skills, the...
------------------------------------------------------------------------------------------------------------------------------------------
COMMUNICATION AND
ANALYSIS SKILLS------------------------------------------------------------------------------------------------------------------------------------------
A.VIJAY KUMARDIPLOMA 5th SEM E&C
FOREWORDIn communication and analysis skills, the exercise gives ample opportunity for the learners to practice. The involvement in the form of active participation makes learners interesting. This participation makes self confident. Students get a chance to think in unconventional ways and using their own imagination.
This book knowledge’ for independent learners the style of constructive approach to deal with the subject communication.
Dealing with serious academic topics like research in a narrative style, through the simple examples in this book. I hope
COMMUNICATION AND ANALYSIS SKILLS
this material may help for learning a pleasurable activates.
CONTENTS1. Communication skill:
One to one personal communication
2. Communication exercise:Debate on need for factory in village
3. Listening skill: View advertisement and write note down message behind it
4. Reading skill:Article: on Electro Pollution: An invisible killer
5.Writing skill: Preparing a resume and cover letter
6. Knowledge of using internet: Creating an e-mail id
7.Oral communication:Qualities Needed To Be a SUCCESSFUL ENTREPRENEUR
8.Data analysis:
Comparison between Intel® Desktop Boards
9. Presentation skill: Mobile Communications Beyond 3G in the Global Context
10. Pick and speak:
History of computer, Mobile computing, Network security Politics of India, Computer security
COMMUNICATION AND ANALYSIS SKILLS
COMMUNICATION SKILLS
COMMUNICATION SKILLS :COMMUNICATION AND ANALYSIS SKILLS
One to one personal communication
(CONVERSATION BETWEEN RAVI AND VIJAY)
(Mr vijay phone rings and he answers it)
Mr Vijay: hello, this is vjay, sales manager from SSS computer services. What may I help u sir.Mr ravi: sir, I need information about the Dell company computer.Mr Vijay: sir, Dell computer is the most advance computer including all advance features and even we are providing offer till 15th sep for 10% discount.Mr ravi: sir, can I know what are the advance features in these computer?
COMMUNICATION AND ANALYSIS SKILLS
PICK AND SPEAK
PICK AND SPEAK:
COMMUNICATION AND ANALYSIS SKILLS
History of computer
IntroductionThe word computer is an old world that has changed its meaning several times in the last few centuries. Originating from Latin, by the mid 17th
century it meant ‘someone who computer’. The computer remained associated with human activity until about the middle of 20th century when it became applied to a programmable electronic device that can store, retrieve, and process data.It is a general purpose machine that process data according to a set of instructions that are stored internally either temporarily or permanently. The computer and all equipments commented to it are called hardware. The instruction that tell it what to do are calls “software”. A faster computer brings about faster operation and that in turn causes an economic development.Classification of computerTechnology1. Flesh
COMMUNICATION AND ANALYSIS SKILLS
2. Wood3. Metals4. Electronic elements Capacity The term capacity refers to volume of work or data processing capability a computer can handle
1. Micro computer 2. Mini computers3. Medium size computer4. Large computer5. Super computer
Classification by their basic operating principle
1. Analog computers2. Digital computers3. Hybrid computers
COMMUNICATION AND ANALYSIS SKILLS
Network security
IntroductionIn the field of networking, the area of network security consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks,
COMMUNICATION AND ANALYSIS SKILLS
both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: It secures the network, as well as protecting and overseeing operations being done.Network security conceptsNetwork security starts with authenticating the user, commonly with a username and a password. Since this requires just one detail authenticating the user name —i.e. the password, which is something the user 'knows'— this is sometimes termed one-factor authentication. With two-factor authentication, something the user 'has'
COMMUNICATION AND ANALYSIS SKILLS
is also used (e.g. a security token or 'dongle', an ATM card, or a mobile phone); and with three-factor authentication, something the user 'is' is also used (e.g. a fingerprint or retinal scan).Once authenticated, a firewall enforces access policies such as what services are allowed to be accessed by the network users. Though effective to prevent unauthorized access, this component may fail to check potentially harmful content such as computer worms or Trojans being transmitted over the network. Anti-virus software or an intrusion prevention system (IPS)[3] help detect and inhibit the action of such malware. An anomaly-based intrusion detection system may also monitor the network and traffic for unexpected (i.e. suspicious) content or behavior and other anomalies to protect resources, e.g. from denial of service attacks or an employee accessing files at strange times. Individual events occurring
COMMUNICATION AND ANALYSIS SKILLS
on the network may be logged for audit purposes and for later high-level analysis.Communication between two hosts using a network may be encrypted to maintain privacy.Honeypots, essentially decoy network-accessible resources, may be deployed in a network as surveillance and early-warning tools, as the honeypots are not normally accessed for legitimate purposes. Techniques used by the attackers that attempt to compromise these decoy resources are studied during and after an attack to keep an eye on new exploitation techniques. Such analysis may be used to further tighten security of the actual network being protected by the honeypot.
Security managementSecurity management for networks is different for all kinds of situations. A home or small office may only require
COMMUNICATION AND ANALYSIS SKILLS
basic security while large businesses may require high-maintenance and advanced software and hardware to prevent malicious attacks from hacking and spamming.Homes & Small Businesses A basic firewall or a unified threat
management system. For Windows users, basic Antivirus
software. An anti-spyware program would also be a good idea. There are many other types of antivirus or anti-spyware programs out there to be considered.
When using a wireless connection, use a robust password. Also try to use the strongest security supported by your wireless devices, such as WPA2 with AES encryption.
If using Wireless: Change the default SSID network name, also disable SSID Broadcast; as this function is unnecessary for home use. (However,
COMMUNICATION AND ANALYSIS SKILLS
many security experts consider this to be relatively useless.
Enable MAC Address filtering to keep track of all home network MAC devices connecting to your router.
Assign STATIC IP addresses to network devices.
Disable ICMP ping on router. Review router or firewall logs to help
identify abnormal network connections or traffic to the Internet.
Use passwords for all accounts. For Windows users, Have multiple
accounts per family member and use non-administrative accounts for day-to-day activities.
Disable the guest account Raise awareness about information
security to childrenMedium businesses A fairly strong firewall or Unified Threat
Management System Strong Antivirus software and Internet
Security Software.COMMUNICATION AND ANALYSIS SKILLS
For authentication, use strong passwords and change it on a bi-weekly/monthly basis.
When using a wireless connection, use a robust password.
Raise awareness about physical security to employees.
Use an optional network analyzer or network monitor.
An enlightened administrator or manager.
Large businesses A strong firewall and proxy to keep
unwanted people out. A strong Antivirus software package and
Internet Security Software package. For authentication, use strong
passwords and change it on a weekly/bi-weekly basis.
When using a wireless connection, use a robust password.
Exercise physical security precautions to employees.
COMMUNICATION AND ANALYSIS SKILLS
Prepare a network analyzer or network monitor and use it when needed.
School An adjustable firewall and proxy to
allow authorized users access from the outside and inside.
Strong Antivirus software and Internet Security Software packages.
Wireless connections that lead to firewalls.
Children's Internet Protection Act compliance. (Only schools in the USA)
Supervision of network to guarantee updates and changes based on popular site usage.
Large government A strong firewall and proxy to keep
unwanted people out. Strong antivirus software and Internet
Security Software suites. Strong encryption.
COMMUNICATION AND ANALYSIS SKILLS
White list authorized wireless connection, block all else.
All network hardware is in secure zones.
COMMUNICATION AND ANALYSIS SKILLS
KNOWLEDGE OF USING INTERNET
KNOWLEDGE OF USING INTERNET:Creating e-mail account
COMMUNICATION AND ANALYSIS SKILLS
WRITING SKILL
COMMUNICATION AND ANALYSIS SKILLS
WRITING SKILL:Preparing a RESUME
Skilled in computer networking
Name: Mr Vijay Kumar
D O B: 15.7.1993
COMMUNICATION AND ANALYSIS SKILLS
Address: #54, 5th phase yelahanka B’lore 64
Ph: 9632805614
E-mail id: [email protected]
Qualification : Diploma in computer science engg
H+ & N+ Certified
Certificate from IBM & CCNA
Basic ms-office, DTP
Other activities: interested in listening songs, film, painting
Covering Letter
TO General Manager for Job Recruitment
#25, 5th cross, III main road
Agra, Delhi 758 225
24th Sep 2011
The General Manager
S.P.T A.I.R
COMMUNICATION AND ANALYSIS SKILLS
Bangalore station
B’lore 560 124
Sir,
SUB: Recruitment of Assistant Engg for S.P.T
I have completed diploma in EC with result distension from A.K. Polytechnic, Bangalore, 2011. As a student I had done several activities such as team work. In addition to possessing the qualification you have asked for, I can do all technical works in field. I would like to assure you that, given an opportunity, I will serve sincerely for your company.
Thanking you;
Yours faithfully;
Vijay
PRESENTATIONCOMMUNICATION AND ANALYSIS SKILLS
SKILLS
PRESENTATION SKILLS :Mobile Communications Beyond 3G in the Global Context
COMMUNICATION AND ANALYSIS SKILLS
COMMUNICATION AND ANALYSIS SKILLS
READING SKILLS
READING SKILLS:Article:Electro Pollution: An invisible killer
COMMUNICATION AND ANALYSIS SKILLS
Electro-pollution is an invisible but very real threat facing us all today. Since we are constantlySurrounded by electronic gadgets, electro-magnetic waves follow us everywhere.
With hi-tech and hi-touch lifestyles in the cities of India influencing the young and old and, electro-pollution is correspondingly increasing from electronic gadgets such as mobiles, laptops, computers, Wi-Fi, air conditioners and other modern electric and electronic equipments. These instruments produce Electro-Magnetic Frequencies (EMF) that cause stress related problems1. The results are lack of concentration, poor work performance; sleep disorders and major health problems such as brain damage, cancer and heart diseases.
COMMUNICATION AND ANALYSIS SKILLS
Electro-pollution - What research says?A
recent study conducted at the Post-graduate Institute of Medical Sciences, Chandigarh states that if a personUses a mobile for more than one hour a day, it can cause sensor neural deafness2. In a study of animals, Indian scientists have found that radiation emitted from mobile phones causes DNA damage; low sperm count leading to infertility and also a reduction in the testis size in rats. In fact, Gulam Nabi Azad, our union health minister, has issued a warning to Indians, to reduce the usage of
COMMUNICATION AND ANALYSIS SKILLS
mobile phones to less than an hour a day3. Sadly, no one is paying attention to the dangers of electro-pollution.
COMMUNICATION AND ANALYSIS SKILLS
COMMUNICATION EXERCISE
COMMUNICATION EXERCISE:
Topic: need for factory in village and help them and growth in country.
[Participants for the motion: vijay, shalini, asfiya
COMMUNICATION AND ANALYSIS SKILLS
Participants for the motion: ismail, kala, gopal
Chairperson: nanda]
(nanda announces the topic and allots three minutes to vijay to move the motion)Vijay: makes a presentation on development of villages and to provide a chance for people who are unemployed but want to work. And also quotes development of a country to show their people who wants’ to work but unemployed. If the factory is opened in the village near the lake it facilitates water required for the factory and also provides a chance for the people to work in the factory against their poor families to serve. This project
COMMUNICATION AND ANALYSIS SKILLS
also develops the village and also satisfies the village people for their daily life requirement. Investors can put their share and gain from this plan. And also it help’s lot many of people. The advantage what we gain from this is however the villagers are unemployment and they sure agree for
COMMUNICATION AND ANALYSIS SKILLS
DATA ANALYSIS
Intel® Desktop Board DG31PR
Intel® Desktop Board DG33BU
Revision History
First release of the Intel® Desktop Board DG31PR Product Guide June 2007
First release of the Intel® Desktop Board DG33BU Product Guide April 2007
Form Factor microATX (218.44 millimeters [8.60 inches] x 243.84 millimeters[9.60 inches])
microATX (243.84 millimeters [9.60 inches] x 243.84 millimeters[9.60 inches])
Main Memory Two 240-pin, DDR2 1.8 V (only) SDRAM Dual Inline Memory Module(DIMM) sockets
Support for up to 4 GB of system memory
Four 240-pin, DDR2 1.8 V (only) SDRAM Dual Inline Memory Module(DIMM) sockets
Support for up to 8 GB of system memory
Chipset Intel® 82801G I/O Controller Hub (ICH7)
Intel® 82801IH I/O Controller Hub (ICH9DH)
COMMUNICATION AND ANALYSIS SKILLS
Audio 5.1 + 2-channel onboard audio subsystem, featuring:― Intel® High Definition Audio
6-channel (5.1) onboard subsystem, featuring:― Intel® High Definition Audio interface
PeripheralInterfaces
Up to 8 USB 2.0 ports― Four ports routed to the back panel― Four ports routed to two USB headers
Up to 12 USB 2.0 ports― Six ports routed to the back panel― Six ports routed to three USB headers
BIOS 4 Mbit symmetrical flash memory device
8 Mbit symmetrical flash memory device
DATA ANALYSIS:COPMARATION BETWEEN Intel® Desktop Boards DG31PR, DG33BU
SUPPORTED MEMORY CONFIGURATIONS DG31PR
DIMMType
SDRAMTechnology
Smallest usableDIMM (one x16Single-sidedDIMM)
Largest usableDIMM (one x8Double-sidedDIMM)
Maximum capacitywith four identicalx8 Double-sidedDIMMs
DDR2 667 512 Mbit 256 MB 1 GB 2 GBDDR2 667 1 Gbit 512 MB 2 GB 4 GBDDR2 800 512 Mbit 256 MB 1 GB 2 GBDDR2 800 1 Gbit 512 MB 2 GB 4 GB
DIMMType
SDRAMTechnology
Smallest usableDIMM (one x16Single-sidedDIMM)
Largest usableDIMM (one x8Double-sidedDIMM)
Maximum capacitywith four identicalx8 Double-sidedDIMMs
DDR2 667 512 Mbit 256 MB 1 GB 4 GBDDR2 667 1 Gbit 512 MB 2 GB 8 GBDDR2 800 512 Mbit 256 MB 1 GB 4 GBDDR2 800 1 Gbit 512 MB 2 GB 8 GB
COMMUNICATION AND ANALYSIS SKILLS
SUPPORTED MEMORY CONFIGURATIONS DG33BU
System Memory MapTYPES Address Range
(decimal)Address Range(hex)
Size Description
DG31PR 1024 K - 4194304 K
100000 - FFFFFFFF
4095 MB Extended memory
DG33BU 1024 K - 8388608 K
100000 - 1FFFFFFFF
8191 MB Extended memory
Listening skill
COMMUNICATION AND ANALYSIS SKILLS
Listening skill:ADVERTISEMENT:HIGH QUALITY AND LATEST TECHNOLOGY T-SERIES
India’s largest company. latest technology T-series with new unbeatable price and unmatched quality. Wide range of video system
Audio cassettesA range of blind audio cassettes from t-series
Rugged Dynamic
COMMUNICATION AND ANALYSIS SKILLS
Pure quality
Tv technologyPresenting a latest in tv technology includes
hi-fi system, flat tube Remote select the Channel function control
Vcd playerSuper quality presenting audio and video system
Built in amplifier Supports video games Full function remote
6 month warrantyPayment option
COMMUNICATION AND ANALYSIS SKILLS
COMMUNICATION AND ANALYSIS SKILLS
Master/Visa CardAmerica Express CardCitibank Diners Card
ORALcommunication:
COMMUNICATION AND ANALYSIS SKILLS
Oral communication:QUALITIES NEEDED TO BE A SUCCESSFUL ENTREPRENEUR
Successful entrepreneurs have an unwaivering, total belief in themselves and never allow anyone or anything to dispel that belief.
Entrepreneurs are self-motivated; they don't need anyone or anything other than their goals to motivate them.
Successful entrepreneurs are not people who never fail but all successful entrepreneurs have the capacity to bounce back after failure. Most will talk about their failures as part of their learning curve.
COMMUNICATION AND ANALYSIS SKILLS
Entrepreneurs are driven by a manic need to succeed. This can take the form of money, recognition, fame or power.
Successful entrepreneurs are the world's worst losers. They have to win at all costs.
Entrepreneurs are decisive, they take risks, they act impulsively on gut feelings.
The most successful entrepreneurs know their limitations and surround themselves with people who have the skills they lack.
Entrepreneurs are driven and focused on their sales targets at all times.
Successful entrepreneurs are prepared to make personal sacrifices in order to succeed.
Entrepreneurs are intuitive, recognizing niche markets and business opportunities that others fail to see.
COMMUNICATION AND ANALYSIS SKILLS