Friday, 19 August 2016

P6- Select information to support a business decision-making process Report 2

Report 2
Introduction
In this report I have been given Car Insurance Information which seems to show the pricing of the Policies and extra costs that comes with the policy, from what I can make out it all seems to about 1 year unlike the other spreadsheet. The data is all organised in 1 sheet with different categories which make things simpler for me to organise. First I well have to make sure the data is correct in different level such as if it’s accurate and how up to date it is. Then once I have verified everything I will then make 3 different graphs from the information and make recommendations the manager can use hopefully.
Data
With all the data I collected from the spreadsheet I had to make sure a couple of things which was the information’s validity, accuracy, relevance and currency. Not knowing these things could result into me getting the wrong information and redundant data.
Validity – First I had to verify the information for its validity and making sure it was the correct for my purpose. I already knew the source where the data has come from which is FSA Car Insurance Information, so I went on their website to check what kind of information they provide. To further verify the information was correct I checked 3 of the car insurance companies websites to make sure the pricing is correct or at least similar.
Accuracy – The information seems to be accurate as there is no odd patterns or spikes in the data, for example none of the data seems to jump in pricing and it’s all normally in the range of £50, £250 so this way I know the information is accurate,  
Relevance – All the data in spreadsheet was relevant to what I needed for because I was asked to analyse data for the business linked with Motor vehicles and the spreadsheet shown different car insurance policies prices with excess compulsory and voluntary.
Currency- The information has not been updated because it is from the past, the data shows information from 2013 and 2012 which I can still analyse and get important facts but it is not the latest information to something like this current year 2015. Also even though it has 4 months’ worth of information it doesn’t show every month which means it was not regularly updated.
Investigation
From the spreadsheet I will then investigate this data and sort it in ascending order so I can find the top and lowest selling like I found in the other spreadsheets. From the graphs I will take about the
First I decided to make a graph for the top 3 highest selling premiums and as you can see it is Admiral, 1st central and Autonet, these were the companies. Above the individual bars you can see how much each of the premiums cost with Admiral being the highest at 249.99 and Autonet begin the third lowest 199.99, however you can see by the both of the other ones it’s the same in price so there isn’t much of a difference.
The second graph I decided to make is the Top 3 Lowest selling premiums which turned out to be Endsleigh, RAC and Sheila’s Wheels. I have found out the two of them were similar which were Endsleigh and RAC both pricing at 99.99 whereas Sheila’s Wheel was 9.99 lower.
This is the third graph I decided to make which shown all the Policy Extras which consists of Courtesy Car, Breakdown Cover Cost, Personal Accident Cover Cost and Legal Cover which all added up together for each Insurance company. You can see at the bottom axis the different insurance companies and the bars representing the prices. From this graph you can see that Esure, Churchill, Barclays are the highest for the insurance policies extras. The cheapest insurance policies extras are for Admiral, Tesco and Swift cover which charge £0 which is quite amazing.

Recommendations/Conclusion
From the Graphs I have created there is some important information I have collected that I think the managers will find useful.
My first recommendation would be to rethink the pricing strategy to make it suitable with the other competitors for example with the third graph the top 3 insurance companies seem be way more overpriced than the other companies as there Policy extras are much lower. Of course it would be the best if the policies were £0 because it would mean the company would attract more customers but they still need to be making a bit of profit
In my conclusion all of the different insurance companies could use the information for the graphs so a company can have similar pricing strategies. From what I have also find out







P6- Select information to support a business decision-making process Report 1

Report 1
Introduction
In this report I am going to explain my findings and data I got from the car insurance spreadsheet which was about the different car models that sold in 2012 and 2013. The type of data in the spreadsheet is mostly figures which shows overall profits from the make of the car and there is also data the market share of the car and whether it has had an impact/ change on the market. The data is presented is separated in two different tables one of which showing the month for the sales and this is the one I am going to be using mostly. Hopefully if I extract good information I will be able to make graphs and recommendations from these graphs which the managers can use for further profit for the business.
Data
With all the data I collected from the spreadsheet I had to make sure a couple of things which was the information’s validity, accuracy, relevance and currency. Not knowing these things could result into me getting the wrong information and redundant data.
Validity – First I had to verify the information for its validity and making sure it was the correct for my purpose. I already knew the source where the data has come from SMMT because there was a logo on the spreadsheet so to validate this I visited there webpage which shown information about motor vehicles and how this organisation provides data about this.
Accuracy – The information seems to be accurate as there is no odd patterns or spikes in the data, for example some of the registration numbers between both of the years seem to be similar so the information must be accurate.
Relevance – All the data in spreadsheet was relevant to what I needed for because I was asked to analyse data for the business linked with Motor vehicles and the spreadsheet shown different car models along with the number of registrations and market shares, this is just what I needed to get important information from th
Currency- The information has not been updated because it is from the past, the data shows information from 2013 and 2012 which I can still analyse and get important facts but it is not the latest information to something like this current year 2015. Also even though it has 4 months’ worth of information it doesn’t show every month which means it was not regularly updated.

Investigation
Through the investigation process I decided to work out different values from the data to give the company an estimate of figures such as what car was the most popular sale for both years, which was the worst selling car for both years and the total sales for both years. I think all of this is important information that the business can use.

From this first spreadsheet I decided first see which is the bestselling car for this company  so I complied this chart which is showing the best Selling Cars for 2012 and 2013 and further indicating at how much registrations the top cars get. As you can see each bar represents both of the years 2012 and 2013 and from this chart it looks like 2013 was the better year as there more registrations of the highest selling Car. This leads onto the highest selling car which I found out to be Ford for both years and all the months this data was recorded at.
This is the second chart I complied but this time showing the worst selling cars for 2012 and 2013. As you can see on the side the legend shows both years however there are not many bars this is because these cars got 0 registrations however in April of 2013 you can see that the Saab got 2 registrations. 2013 was not the same year as 2012 because there were different cars for example the Saab that was very common for not selling in 2013 didn’t even appear once in 2012.
This is the final chart I created from the data I was given and I decided to do a more broad overview seeing the total number of car sales for both years 2012 and 2013. From this graph you can see that overall there were more sales in 2013 than 2012 and this is for every month not just 1 but the different was not that big like there was not big jumps between the bars. Obviously if there were more registrations (Sales) it was probably because the population was rising slowly this means more people will need to buy a car.
Recommendations/Conclusion
Based on the three charts/ graphs I managed to create from the data I have some recommendations that might be useful for the business.
From the first chart which is the best selling cars for both years I would advise for the business to stock and order more of these as more people seem to be buying and registering more of the vehicles on the road. From the data I pointed out that Ford was the bestselling vehicle so anything within that range will sell well. Even though I only have data from the past from what I can predict is that this will continue to grow and increase the number of Ford sales thus leading to more profit for the business.
Another recommendation I would make from the second chart which shows the worst selling/ registering cars for both years is for the business not to stock these cars which are Saab, Dacia and Proton. It probably costs the business a lot of money for them to import and stock those cars so it they didn’t order them in the first place they would avoid this hassle and maybe not waste as much money.

In conclusion the amount of car sales and registrations are going up as you can see by the chart, even though the difference is very minor as long as the business continues to carry on stocking the top few cars and not stocking the very few selling cars they can make a lot of money. However one thing to note is the business will have to carry on monitoring data like this because one year might not be the same as the others and things can change very quickly like the bestselling car, you have witnessed this with the worst selling car.

P5- Identify the information systems used in a specified organisation

P5- Describe typical services provided by networks
Describe typical services provided by networks. 

Directory services: used for e.g.

Account management
Account management is important for many networks and the users connected to it as it allows for certain powers for each user. Account management has the power to edit the user and the type of account it is, adding and removing users of the network and granting accessing to specific areas but normally this is strictly monitored. Many important organisations use this that manage a large number of users so for example when a new person joins the organisation a new user is created using the account management and their policies are set and the same rule applies when a person leaves the organisation. Account management can also chance powers for certain users for example a higher level person in the business which gained promotion can get higher access to be a computer administrator and allow for local machine editing.

Authentication management
Authentication management is a service normally that is used for form ID and in operating system users. All the different users connected will have different authorities such as some can access the network and use resources of the public network and access the printer connected to the network and authentication management takes care of this by verifying specific things about the user. There are many authentication management methods such as Passwords (Depending on the complexity of the password it will be verified using different methods), Encrypted Certificates (often certificates are provided for some level of authentication), Smart Card (which can be scanned and verify

Active directory
Active directory is another type of directory service made by Microsoft Corporation. This can be used in small or big networks. This kind of directory can store entire objects and verify the directory to authenticate it. However active directory is only installed in special network operating systems as this is a special feature to manage networks. For example it can verify all users and computers in the windows domain network and enforce security policies, so when a person logins into a computer and submit the password active directory will check whether the password was correct in the first place and also it will decide whether the user is an administrator, guest or a normal user. However it also use in telephones and telephone directory. For example it will sort, look up and request information based the original request.

DNS
DNS Stands for domain name server and is very important for the internet and every network connected. DNS Translates domain names that are normally in alphabetic so they are easier for humans to remember and then they are translated into IP Addresses. For example www.google.co.uk can be translated into 192.165.261.3. DNS Runs special purpose network software to find each of the addresses over the internet. For example your web browser acts as a DNS Client that issues a request to the DNS Server normally on a database so navigation is made easier, there are many DNS Servers all with different hierarchy and if one of the lower ones don’t find it the next higher one is needed and finally one the request is fulfilled it will flow back from the chain of DNS Servers to the client so they can get the webpage they requested for. Of course DNS Servers are fast and everything happens in a blink of an eye otherwise it will cause further delay. Furthermore many large scale businesses can purchase permanent ones so it can be much faster for users finding their website to get information.

Telecommunication services: communication e.g.

Email
Email is the most popular and widely used communication method because of its ease of use. Emails allow for communication via text however other things can be implemented into the email such as files, images, videos, music and even other links. Without emails none of this communication wouldn’t be possible or an even longer method would be required. Emails have their own email address which is kind of like there ID and when other users want to send emails this email address is required otherwise it just won’t send. Emails just like everything else in the network require protocols for sending and receiving which are normally POP3 and SMTP for correct email delivery and then report back to the person sending the email if it was successfully delivered or not. Furthermore for emails to be viewed a client software is required such as Microsoft Outlook however it can also be web based such as Gmail, Yahoo mail, Mail bird 2.0, Thunderbird, Inky, eM client, Claws Mail etc and most of these are free to use. And finally without an email server none of these emails can be stored. Email clients are useful for businesses as multiple email addresses from different email client can be used on the same application and the switch between them is very easy and save a lot of time

Internet relay chat (IRC)
Internet relay chat is an application that allows for communication using telecommunication networking. IRC are computer programs that can communicate with a form of text. The good thing about this is it allows for instant messaging rather than waiting extra time for a message. Now as this has improved the protocols can allow for more than 2 people to just be connected. Some examples of IRC can be Undernet, Talk City etc. Everything through IRC is very secure and private to make sure other connections are not connected and sharing the privacy. An IRC Server is needed and is responsible for storing and broadcasting the messages. But the only disadvantage is that every user connected must have the IRC Client to precipitate in the chat. Furthermore many commands can be added to the IRC Chat to make something happen for example you can type in /join to join a particular group chat. 

Discussion boards
Discussion boards are just like real life but can be used on computers and over networks. Normally it is like a bulletin board which the user can setup so other users can read this bulletin board and leave a message. Discussion boards can be operated and created by many websites however special software is also available for the download. Discussion boards allow for a good discussion to be taken place so thoughts and ideas can be shared using different materials such as picture, videos, text, music etc. The best thing about discussion boards is they allow for people to communicate over different networks from miles away in different locations, just like emails. Discussion boards can be used for various ways such as a student asking a question on a topic, employees from different businesses discussing topics together etc. So in basic terms it is similar to online forums. Some examples of discussion board software are Board Portal Software, phpBB, myBB etc.

Remote access
Remote access is a need for modern day networking as it allows users to access files and other documents without being at the actual desktop location. Normally the user accessing the files is on a different network so they can usually use a software that will content and configure the connection between them and the other host.

Mobiles
Remote access can also be used via mobile phones as technology is now implemented into these smartphones. For example on android and IOS you can get apps such as Netop Mobile and Team Viewer which is successfully popular. You can then connect your mobile phone to a desktop computer and then control features such as transfer files from mobile to computer, access a desktop with all the features and programs and remotely administer unattended computers such as servers. Just like the remote desktop some authentication is required but say for example you are connecting to workstation, as long as it’s on standby and connected to the internet with a remote desktop connection allowed you can connect with it from the other side of the globe on a completely different network. Furthermore normally the same software will be required on the device for it to connect but as smart phones there are like miniature computers.

Remote desktop
Remote desktop software is the most commonly use software in any operating system as it is easy for users to use. Normally only a few things are required such as the IP Address, computer name, username, location and other network addresses. Once everything entered it should be able to connect to the other system and there servers. Many locations use this feature such as big businesses that need help or troubleshooting with other companies or customer problems or colleges/ universities to let students access work from other places. Remote desktop software can also be implemented with the operating system, for example Windows has “Remote Desktop Connection” that allows for remote desktop operating. However other open source and freeware programs can be downloaded. Remote desktop has many good features such as capturing the users mouse and keyboard for it to be in real time in the actual software which makes this so much easier but furthermore some remote desktop software’s also support real-time file transfer where you can simply drag a file from your own personal computer to the remote desktop connection then storing it on the server.
Of course you cannot just gain authentication into any old remote desktop connection where normally a username and password is required to login. The uses of remote desktop can be used for various things such as remote administration and cloud computing.

Social networking
Social networking can also be used in remote access.

File services:

File transfer
File transfer in very important whether is done over a network or just offline. File transfer can be done over the internet in numerous ways such as over the cloud, remote access or through normal cabling. File transfers over the internet are normally done over the file servers which stores all the files and documents uploaded to that store and anyone access that server can download the files they require. File transfer is just like data transfer which can be done in two ways like uploading or downloading a file. Again just like anything over the network protocols are required for the connection to be setup securely and be maintained smoothly. Like a stated previously file transfer is become increasing popular through cloud storage which can allow for good transmission speeds of course depending on your speed. Furthermore they also give a lot of storage for files to be uploaded. File transfers can be done over one computer to another computer or on another entirely different network however it can be also done to storage mediums such as a hard disk or USB Device. Furthermore for the file transfer to be done quicker it can be compressed into a smaller files or split into different parts for it to speed up quicker especially for larger files. This is all thanks to telecommunications otherwise it will be much harder for this process.

File sharing
File sharing is exactly what it sounds like and offers access to the documents and files to other users which are on a different network. Resources can be spread to easily which is the main culprit for pirating and entertainment industry losing billions every year. File sharing can be done by various ways when a document is uploaded to a file server and that server can share the information for that file, the download links for this this file can be wrote in different places so people can download the file, again this allows for direct access and very fast transfer speeds. However file sharing files can also distributed via peer to peer networks using peer networking software’s, normally a broad range of material is shared using this however it doesn’t offer direct access and the file is stored in many different computers which will be seeding the file (uploading) and this can throttle the speed majorly not allowing for the best transmission speeds.

Application services: application software e.g.

Database
Databases are important for any one that needs to store information as they can store a lot of this in a special way using algorithms so the database doesn’t become too big of a file. Databases allow for good management of the details included as they can easily be updated from the tables to all the way to the queries. For example large businesses would have many centralised databases to store customer information and details such as personal information, credit card information etc. Databases normally use software such as Microsoft access which can allow for further database adjustments such as numerical values, images and other text features. Database models can also be administrated by the network managers or business heads.


Web Proxy
Web proxy is an application that is used over networking to allowing for secure networking, better networking performance and anonymity. Web proxy applications can be downloaded to many operating systems as well as being used over the internet for example some of these can be Ultrasruf, WinGate, CCProxy, Fiddler etc. These are just a few examples that are free however there are many that are paid for as well. Web proxy requires an internet connection so when you visit the website the server will back up the history of that web page and other webpages you visit, so again you can be anonymous on a network. There are many uses for a proxy such as the proxy will filter encrypted data, bypass censorship or any blocking over the original network connected, and improve performance as the cache stores previous websites visited, translation for around the globe, security can make sure annoying using trackers cannot hunt down the original request for the website and further providing anonymity. Web proxy applications usually allow users to type a website request and the request will be sent to the proxy server, an everyday application that acts like this can be Google chrome and Firefox however advanced applications as the ones stated above can also be used.

Shared resources

Printing
Printing is a shared resource for many large scaled businesses, offices, schools and universities. Printers can be shared over the network so many computers can access the files being scanned or the look at the documents being printed. Shared printing is the biggest cost and space saver as only one printer can be used of a whole room which just a simple Cat5 cable and switch connecting it all together rather than buying separate printers. Shared printing is the best for businesses that print of confidential documents all the time as only the computers connected on the network can gain access to the printer and without authentication they cannot. This printing can be done wirelessly with a wireless printer or wired through a normally printer however for wireless printing everything should be in range and every computer must have a Network interface card. With shared printing document transfer is done much more easily and at a faster rate. Furthermore with share printing not only computers can be connected by also other devices such as Tablets and phones can be connected and can also print documents.

Voice over IP (VoIP)
Mobile networking

Authentication

Users
User authentication is very important for highly protected networks that operate on a large scale and have many confidential documents. With user authentication it allows for identity to be logged into network resource, this is normally done via user name and passwords and the network resource can be anything such as a server. Further authentication is usually done after this such as monitoring through the software based firewall which will check secure connections. User authentication is used in many places such as Remote desktop access to login to the desktop remotely on another network, FTP for get files from a secured server and also HTTP as many webpages require authentication when logging into the website such as Outlook, Twitter etc. Authentication the most important when used in the dynamic IP Addresses for different computers and most of the time proper identification is required before letting the user access the networks resources. For example many users can only authenticate one user per network and computer. However many organizations using this are getting very strict with this, for example if you use PayPal the same device you login and use PayPal with will be logged on their servers but when that is changed and your using a computer on a different network it might not be straight forward logging in and further authentication might be required as it doesn’t normally recognise this device.

Hardware

Hardware authentication is also used in many ways for security in physical devices to grant access to the right users and not the wrong. Just like User authentication, hardware authentication protects sensitive data on the device the authentication is required. This can be used in many devices including computer devices, tablets, phones, electronic scanners etc. For example a popular example you might see this on is the iPhone with its fingerprint scanner, without the correct fingerprint you cannot access to the phone and any of the data on the phone. However in many organisations now a day’s special optical recognition can be used which is based on genetic and biometric data. For example a retina eye scanner can be used to scan your eyes to allow for authentication however this technology is expensive and therefore it’s only used in high level organisations.