Saturday, December 28, 2019

Negative Effects Of Identity Theft - 872 Words

Identity theft In today’s social environment, internet become to the most important tools for the most people living in this world. People can do everything by using the internet; here are some very common example: people can buy anything we need from the internet with their credit card, and they can use their social software to connect with others. It seems the internet bring so many convenience to us, however, it will also bring some negative effect, such as the â€Å"identity theft†. Most of the people who always use internet or computer must heard the word â€Å"identify theft†. The definition of â€Å"identify theft† is someone else steal your personal information, like the information about your credit, your†¦show more content†¦Just like the statement from website â€Å"identity theft†: â€Å"Methods of identity theft evolve rapidly as new mediums (such as social media) develop quickly, so it is almost impossible to completely preve nt identity theft, however it is possible to reduce the likelihood of being a target by taking certain precautions.† (Identity theft)Here are some ideas that can prevent yourself away from the identity thief The first method is to install an anti-virus and similar software on your personal computer and laptop, such as anti-phishing software, because most of those software could provide the function to help you check if there any threaten to your computer. Furthermore, if you are using the smart phone or some other tablet PC, you also can install or activation the security app. The second method is trying to use a difficult passcode when you create for an important personal account, such as the password for your debit card or the password of your social media account. Sometimes the passcode contain some special symbol such as â€Å"underline†, â€Å"asterisk† is harder for others to decipher. In case some website may not allow you to create a passcode with symbol, it is better not use your or your family member’s birthday as the passcode. The third method is do not input your personal information when you are using the public network. BecauseShow MoreRelatedCyber Criminals: Cyber-Crime and Cyberstalking Essay1422 Words   |  6 Pageswell as targeting individual people. On a different level, stalkers can leave long term effects on their targets and get away with it effortlessly. Additionally, identity theft is causing people millions of dollars and there are very few ways to track people down. All of these crimes can be done by any person in almost any location. Cyber-crimes negatively affect society due to hacking, stalking, and identity theft. Criminals develop along with technology. Once the Internet came out, people foundRead MoreThe Most Problematic Social and Economic Problem in Today’s Society997 Words   |  4 PagesIdentity Theft might just be the most problematic social and economic problem in the US. Identity theft can cause many problems for the victim and the thief, obviously. One problem is the victims personal record, it is extremely important to have a clean one if you want to apply for college, buy a house, become a citizen, etc. Another problem is after the identity theft has taken their toll, the victim is suffering with trying to recover all the money that they have lost. And the most dangerous problemRead Moreâ€Å"According to the Australian Bureau of Statistics Personal Fraud Survey 2010-11, an estimated total1500 Words   |  6 Pagesand over were victim of at least one incident of identity fraud in the 12 months prior to the survey interview..† (Afp.gov.au, 2014) Identity fraud is a type of fraud that involves illegally pretending to be somebody else for a beneficial gain. This can result in emotional and/or financial devastation. This is a very common legal issue facing Australian stakeholders, costing them a total of $1.4 billion AUD to date (Afp.gov.au, 2014). Identity theft has many consequences and issues that are involvedRead MoreSocial Media And Its Effect On Society1155 Words   |  5 Pagesunhealthy addictions. Social networking sites do have a beneficial effect. They make it easier to keep up with their distant friends and family. However, these sites are preventing real life relationships. Although many people think they need social networking sites to keep up with their friends, networking sites should have a limited access policy, because it discourages too many people from physical interaction, identity theft has become a much bigger issue, and nothing is done about cyber bullyingRead MoreCell Phones : Good And Bad891 Words   |  4 PagesCell phones could be both good and bad. Some people say that cell phones are dangerous. While, other people would argue that cell phones are a great invention. With every invention comes positives and negatives. Some of the advantages that cell phones provide is that testing is a fast and easy way of communication, texting and have social media all on your phone can always keep you updated and social with your friends, and people always have all of their personal information at one touch and carriesRead MoreThe New Transgression Of The Modern World : Cyber Crime1689 Words   |  7 Pagesand multiple other sources that report on the new transgression of the modern world, cyber crime. Within cyber crime we will be looking into a variety of specific types of online misconduct, beginning with Cyber bullying. We will also delve into Identity Theft, Online child sexual abuse material, and Sales and Investment Fraud. Along with looking into the wide array of different types of online crime, we will discuss different deterrents to try to avoid the risk of a cyber attack and tips to stop theRead MoreMedia And The Internet Has Made Huge Strides On The World Today1294 Words   |  6 Pagesinternet poses many threats and one big issue is the problem of getting your identity stolen on the web. In this particular paragraph I will observe what identity theft possess and I will present the types of problems that identity theft has created for victims. The effects of identity theft have existed for a long time and the consequences of it have caused great harm to victims. One of the main problems that identity theft has caused is the credit of victims being damaged. â€Å"Although the impersonatedRead MoreEffects of Violence on Adolescence1408 Words   |  6 PagesIntroduction Violence is a malicious act done by a human being that has the intention of harming or killing another living being. Violence is everywhere: in the home, in the school, and in the community. Violence causes negative effects to humans’ mental health. These negative effects may trigger symptoms of posttraumatic stress, depression, and even anxiety. Symptoms of these disorders can be some of the following: anxiousness, avoidant behavior, feeling a loss of motivation, and feeling of uneasinessRead MoreA Brief Note On Public And Private Information1539 Words   |  7 Pagesaccessibility. But this can also be a very bad thing, there are also people who take advantage of this accessibility to information in a negative way, with public information being as accessible as it is it makes it a lot easier for people to steal others information. For example identity thieves can steal people’s information they find online and gain access to their identity, because a lot of peopleâ⠂¬â„¢s information is online and accessible to everyone. This poses the question, should public informationRead MoreInternet has done more harm than good600 Words   |  3 Pagesthink of the Internet as a good source of getting knowledge, there are many disadvantages associated to it. One of the main harmful effects of the Internet is its abusive uses. Internet promotes the identity theft and destroys valuable documents of public information through spam messages and viruses. Every year due to the Internet insecurity, many people lose their identity. Furthermore, another weakness of Internet is the preying and exploitation of people especially children by deviants using this

Friday, December 20, 2019

The Bistro on Patrick Street in Waterford - 3428 Words

Contents Executive summary: 2 Industry analysis 3 Type of business 5 Business objectives 6 Business goals: 6 Company Mission Statement 7 Swot Analysis: 7 Pest analysis: 8 Competitor analysis 8 Ownership Structure 9 Legal Ownership 9 Internal Management Team: 9 External Management Resources 10 HR Needs 11 Wages 11 Industry Laws and Regulations 13 Suppliers (prices, terms, conditions, perceived benefits, back plan 13 Quality Control Procedures 14 Day to Day Operations (production) 14 Physical Plant 14 Equipment 14 Assets 15 Special Requirements 15 Inventory 15 12 month forecast 17 profit and loss 18 Bibliography 19 Executive summary: The premises I have chosen is unit is 47 The Bistro, Patrick Street, Waterford. Rent is negotiable and I have yet to hear back from the advertiser but based on the other properties around the area and also taking into account the fact that the building is ready to go I estimate the yearly lease to cost â‚ ¬15000-25000k I would like to apply for a loan to secure a rental agreement on this property with the intention to start up a novelty cake shop / bakery cafe named The Bakery .The reasons I chose this area of Waterford city are as follows, It is a known location, There is a lot of foot fall in the area, The premises has all the equipment available without new purchase necessary, It is in the centre of town. This business plan will lay out every step involved in starting my business , my finances and my budgets and my ability to repay the loan.

Thursday, December 12, 2019

Method of Selection of The Employee Hiring †MyAssignmenthelp.com

Question: Discuss about the Method of Selection of The Employee Hiring. Answer: Introduction Selection is considered to me the second step of the employee hiring process whereby the candidates who have applied for the job are chosen based on certain criteria. There are several methods or criteria which can be used in order to assess the candidates. Data Tech has recently got a new project and for that purpose it needs to hire various employees who could carry out the various tasks which are available in an organization. Hence, in this report the various methods which are open to the company for the different posts have been provided along with the justification for choosing the given method (Hendry 2012). Once this has been done the program monitoring evaluation method has been suggested. This method will go a long way in helping the organization to understand heather its selection proceeds in a good condition or not. Once these steps are being evaluated, it can also be observed that the previous users of the system will be providing advice to the company and give their feedback which would then help the firm to carry out its operations in the business successfully. Method of Selection Selection can be described as the process of selecting a well qualified person for a given role. He is the one who will be able to successfully deliver valuable contributions to the given organization. The term selection mainly applies to the selection of the given workers. Job analysis forms the basis of the given selection system (Foster 2014). This is done to see to it that the selection criteria which will be applied by the company are related to the job and also adds value to the organization. Methods available for selecting and considering an employee: These methods include a series of Application forms and CVs, Online short listing and screening, Interviews, Psychometric Testing, and Aptitude Testing, profiling exercises in Group, Assessment centers and References Application forms and CVs In this kind of a selection method, the application forms which are filled up during the recruitment method are screened along with the Resume or the CVs. This method is generally used to put off some candidates and scan the relevant skills in a candidate by testing their resumes. The primary advantage of using the given method is that it ensures that there exists consistency in the given short listing process (Cascio 2018). Online screening and short listing With the advent of the modern technology, there is an Applicant Tracking System which enables the users of the system to filter the potential employees ad helps them in proper usage of the system to carry out the selection procedure. The initial screening in this method is generally based on the assessment whereby the various qualifications as well as the requirements pertaining to the given job are assessed. The applications are filtered against a certain set criteria such as a particular skill like Microsoft Excel and others (Brewster and Hegewisch 2017). The online screening appears to be a quick and useful way of sorting through and selecting the various applications. However, in the given scenario, the use of the appropriate selection criteria plays a huge role. The perils of using the online application system imply the Particular Data Protection Act which needs to be abided by. There exists certain cost of implementing the given system. Interviews The interviews are one of the most effective kinds of selection method whereby the personality as well as requirements of the job are thoroughly assessed in a particular candidate (Alfes et al. 2013). The members which are involved in the given interview process should be trained properly and the they should be having adequate knowledge of the kind of questions which are relevant. Psychometric testing In the given method, a test is undertaken in order to understand the mental ability of the person. It covers testing of the logical ability and personal profiling (Bolander and Sandberg 2013). Ability and aptitude tests In the ability testing, the given skills are tested: General intelligence; Verbal ability; Numerical ability; Clerical ability; Sensory and motor abilities. Personality profiling The particular method is only applicable for certain posts whereby the personality is assessed as per the requirement of the job. Presentations Very often with posts related to sales and marketing, the presentations are considered to be an optimum tool to understand the communication ability of the candidate (Purce 2014). The matter in the presentation along with the way the message is presented is considered to be an important part of the evaluation criteria. Group exercises In the group exercises, the group discussions and role plays are considered to be relevant parts of the process whereby the knowledge of the candidate is discussed. The candidates provide references which are assessed in order to analyze the reliability of the candidate. Chosen selection method of Data Tech Name of the Post Method Reasons Database Administrator Psychometric Testing The psychometric testing method will be used for the given post in order to understand the ability of the given individual with respect to various areas like verbal, logical and quantitative skills of the candidate. This job requires a person who is a skilled and has in depth knowledge about his particular field. The reason behind choosing the particular method is to make sure that the person will be tested for relevant skills and for this he can belong to any background as a skill test will already take place. Reliability and Validity Research The average reliability for this kind of a selection method is 0.7. This reflects that the given test is highly reliable. No test will be able to achieve 100% reliability but a higher reliability score reflects a good measure. In terms of validity the psychometric test measures construct validity hereby it measures the traits important for a particular job (Townley 2014). Specialist Librarian Interview For this specific post the method which has been selected is the Interview (Marchington et al. 2016). An interview takes place whereby the two parties discuss various relevant issues with respect to the job position. Interview proves to be a good source of information for the recruiter in order to find out more about the skills of the candidate and his relevant experience (Bryson, James, and Keep 2013). For a librarian, the person will need to show case various experience skills and this can only happen n an interview. The interviewer may ask the candidate a certain set of questions in order to test his knowledge and this shall help the recruiters and the selectors to learn more about the candidate. The interviewer needs to have a set of questions ready for the candidate which will help him to understand the capability of the candidate. Reliability and Validity Research In terms of validity the given method makes use of a criterion validity. This means that doing well in the interviews predict highly that the person will do well outside as well (Townley 2014). The reliability of the given measure is 0.9. IT Help Desk Operator Online screening and short listing For the given post, the company can conduct an online screening and short listing technique. For this method, the company will invite various applications online and keep a tract of them using a portal. They can even give an online skill test in the portal which will help them to shortlist the candidates The IT Help Desk Operator is post whereby the candidate needs to have sufficient knowledge about the task here they will be engaging in and this is basically a technical knowledge (Sparrow, Brewster and Chung 2016). Hence, as this post is a very common one, and bound to invite various applicants who can go through an initial screening at first and then quality for the second round of interviews. Reliability and Validity Research In terms of content validity, the online screening method is one of the most useful methods of selection method. It has a reliability score of 0.75. Data Entry Team Leader Personality Profiling and Psychometric Testing For the given post a psychometric testing along with a personality profiling selection method will be accurate. Personality profiling is the chosen method because the post is that of a leader and the personality of a leader needs to be capable (Budhwar and Debrah 2013). The next is psychometric test which ere test the technical aspect of the candidate. For this post the company requires a talented leader who will have adequate knowledge about the area in which he is working in as well as have sufficient leadership skills. Hence, with personality profiling, the interviewers will came to know about the ability of the candidate` s capability as a team leader. Through psychometric testing, the candidate`s capability as a professional will be checked. Psychometric testing finds out the capability of the person in the particular field of knowledge. Reliability and Validity Research As state earlier, these methods have a reliability score of 0.7 and the given method reflects construct validity. Data entry operator Application form and short listing Since a lot of posts will be required to be filled up, application forms will be given to the candidates and the candidates will be asked to fill up the forms and the recruiters ill go through the form and fill in the requirements (Marler and Fisher 2014). The reason why this method was chosen because the number of potential candidates for the post was extremely high and that is why the application form screening was selected (?lusarczyk and Robert Golnik 2014). They will be required to fill up an application form with the same pattern and it will be scrutinized by the interviewers. The application forms which will be the most attractive one will be chosen for the next few rounds. Reliability and Validity Research Construct validity is reflected by the given method and the reliability score is 0.8. Methods most suitable for a particular job When it has to be determined which method has to be used during the selection phase of a particular job, it is extremely important to determine the correct method of selection. Many organizations tend to use the safe method of references for reliability and some tend to use the simple interview method. For this purpose, it is always suggested that the method should be kept relative to the job description and the type of organization (Storey et al. 2014). The above suggested methods are for the first round of the selection process. It is suggested that after all these rounds have been completed, it is better for the company to take a pre-joining interview in order to make the terms of employment clear. For inter-rater reliability scores the given steps were undertaken: The number of ratings was counted in agreement. The total number of ratings was counted. Divide the result of step 1 by step 2 Convert to a percentage. Evaluation Method: Measuring efficiency of the selection program Regardless of the various selection methods used, the outcomes of any project play a major role in determining the success of the program. In order to measure the worth of the selection process, the two areas need to be evaluated in order to test the efficiency of the selection process which was undertaken. In order to measure the efficiency of the program, the costs as well as the results of the program. The standard formula which will be used to calculate the selection program is the ROI. The Return on Investment is a percentage method which is used to evaluate the benefits of the efforts which was put behind the costs (Townley et al. 2014). The formula is monetary benefits- Selection Costs/ Selection Costs into 100. The ROI can be measured in terms of cost or time. Method to evaluate the costs: The primary method to evaluate the project of selection of the candidates is being done by finding out the Return on Investment. If the Return on Investments is greater than 25% then the plan is chosen. Establish Selection Costs The costs that will be incurred in the selection process shall need to be analyzed in order to determine the success of the program. This requires the collection of data by the various decision makers and helps the firm to analyze the costs and form a graph (DeNisi, Wilson and Biteman 2014). (Refer to the Appendix 1 for the Timeline and the Budget) The following costs are generally incurred during the selection process: Development costs- These costs are required for the people involved in the selection process. e.g., salaries, benefits of personnel, and equipment. In this case , as per the budget it will be 14000$ Direct implementation costs These costs are the costs that will be required to implement the selection process. The cost is $1000 e.g., selection material, technology costs, facilities, travel, communication and marketing of program, instructors salary, and benefits. Compensation for participants Very often the participants need to be paid for attending the section process. Hence, the benefits costs will be dedicated to the time spent on the selection process (Aksakal et al. 2013). None Lost productivity during selection The employees of the organization who are conducting the selection have not been contributing well to the organizations productivity. e.g., cost of time spent while not working. Measured in terms of money to be 10000$ Travelling expenses and fees- The recruiters will be required to travel from one place to another in search for new opportunities (Gatewood, Field and Barrick 2015). When a company seeks to hire a consultancy they have to pay a fees to the consultancy. This fee forms an integral part of the expenses incurred by the firm on recruitment. 2000$ Other expenses : $699500 Assess the Results In the given case, the results can be referred as to the outcome of the whole selection program. The outcomes of the selection program can be measured as follows: The changes in the productivity when the new employees are being hired. Change in the organizational process with reference to the method in which the present employees carry out their work (Ekwoaba, Ikeije, and Ufoma 2015). Workplace environment with respect to higher levels of motivation and the attitude of the people in the workplace. The quality of people present in the organization and the talent storehouse of the organization greatly tend to improve when new people are hired. There is increased morale in the organization which tends to lead to better results. Let it be assumed that the value will be 1000000$. Therefore, Total costs =14000+2000+699500+1000+10000=726500 Total benefits= 1000000 Hence, ROI= (1000000-726500)/726500*100 =37.6% Hence, after the given program is conducted, it becomes extremely important to check the ROI figure in order to determine or measure the efficiency of the give program which was conducted. If the ROI is at a good percentage then it can be estimated that the organization has been able to perform well and that it will be able to easily manage the employee relations (Hurn 2014). Better work environment, increased productivity and a good corporate culture help the firm to measure the outcome of their program and to analyze the fruits of their effort. Since the ROI is greater than 25%, the given program which shall be conducted is successful. Conclusion Therefore, from the above theories, it can be stated that the second procedure of the employee hiring system is one of the most crucial stages. In this state, the employees need to be chosen according to their capabilities which are relevant for the organization and they need to keep at ease. The report has thrown a light on the various selection methods which are available in an organization and how these selection methods are suitable for different posts and organizational types. The second section of the report concentrates on the different suitable methods available to be used for the different posts at Data Tech. An evaluation program for the various events of the organization has also been provided which shall help the company to measure the effectiveness of the program which as carried out and understand the outcomes. References Aksakal, Erdem, Metin Da?deviren, Ergn Eraslan, and ?hsan Yksel. "Personel selection based on talent management."Procedia-Social and Behavioral Sciences73 (2013): 68-72. Alfes, Kerstin, Catherine Truss, Emma C. Soane, Chris Rees, and Mark Gatenby. "The relationship between line manager behavior, perceived HRM practices, and individual performance: Examining the mediating role of engagement."Human resource management52, no. 6 (2013): 839-859. Bolander, Pernilla, and Jrgen Sandberg. "How employee selection decisions are made in practice."Organization Studies34, no. 3 (2013): 285-311. Brewster, Chris, and Ariane Hegewisch, eds.Policy and practice in European human resource management: The Price Waterhouse Cranfield survey. Taylor Francis, 2017. Bryson, Jane, Susan James, and Ewart Keep. "Recruitment and selection."Managing human resources. Human Resource Management in transition(2013): 125-149. Budhwar, Pawan S., and Yaw A. Debrah, eds.Human resource management in developing Cascio, Wayne.Managing human resources. McGraw-Hill Education, 2018. countries. Routledge, 2013. DeNisi, Angelo S., Michael S. Wilson, and James Biteman. "Research and practice in HRM: A historical perspective."Human Resource Management Review24, no. 3 (2014): 219-231. Ekwoaba, Joy O., Ugochukwu U. Ikeije, and Ndubuisi Ufoma. "The Impact of Recruitment and Selection Criteria on Organizational Performance." (2015). Foster, Elvis C. "Human resource management." InSoftware Engineering, pp. 253-269. Apress, Berkeley, CA, 2014. Gatewood, Robert, Hubert S. Feild, and Murray Barrick.Human resource selection. Nelson Education, 2015. Hendry, Chris.Human resource management. Routledge, 2012. Hurn, Brian. "The challenges facing international HRM in an increasingly globalised environment."Industrial and commercial training46, no. 7 (2014): 371-378. Marchington, Mick, Adrian Wilkinson, Rory Donnelly, and Anastasia Kynighou.Human resource management at work. Kogan Page Publishers, 2016. Marler, Janet H., and Sandra L. Fisher. "An evidence-based review of e-HRM and strategic human resource management."Human Resource Management Review23, no. 1 (2013): 18-36. Purce, John. "The impact of corporate strategy on human resource management."New Perspectives on Human Resource Management (Routledge Revivals)67 (2014). ?lusarczyk, B., and Robert Golnik. "The recruitment process in transnational corporations."Polish Journal of Management Studies10 (2014). Sparrow, Paul, Chris Brewster, and Chul Chung.Globalizing human resource management. Routledge, 2016. Storey, John.New Perspectives on Human Resource Management (Routledge Revivals). Routledge, 2014. Townley, Barbara. "Selection and appraisal: reconstituting."New Perspectives on Human Resource Management (Routledge Revivals)92 (2014).

Thursday, December 5, 2019

Full Adder Circuit System Free Sample

Questions: Task 1Construct a combinational full adder circuit from a digital arithmetic system. Using CMOS ICsTest the circuit taking into account all logic levels; compare your tests to circuit specifications using data sheets for the AND, exclusive OR, and OR gates. Use truth tables to complement your testing procedureCompare the operation of a combinational logic device and a sequential logic deviceTask 2Evaluate and suggest improvements to the circuit operation of a digital system with respect to the method of data acquisition and human interface employed.Take into account the alarm system you have used in Measurement Test and Fault Finding. Consider and evaluate how the system operates in terms of acquiring the data and presenting the outcomes within its operation , suggest improvements that could be made. Consider the human interaction with the circuit and suggest improvements. Answers: Digital logic circuits- Discrete voltage levels are used for the operation of digital logic circuits. Abstract circuit elements are used in digital circuits. Gates are known as abstract circuit elements. The output of the gate is the function of input. In analog circuits, noise distortion and signal attenuation are overcome by digital circuits. There are two types of digital circuits- Combinational logic circuits Digital logic circuits Combinational logic circuits- The output of a combinational logic circuit is a function of the present input. So, a state cannot be stored in a combinational logic circuit. Combinational logic circuits perform the arithmetic operations on stored data. There are various examples of combinational logic circuits like- multiplexers, demultiplexers, half adders, full adders, encoders and decoders. Implementation of combinational logic circuit is done in Sum of Products (SOP) and Products of Sum (POS) rules. There is no memory in combinational logic circuits. When a new input is applied to combinational logic circuit, information regarding the previous input is removed. Logic diagram, truth table and Boolean expression of the combinational logic circuit have been shown in the previous page. Sequential logic circuits- In sequential logic circuits, output depends on present and past inputs. In a digital circuit, the data is stored by sequential logic circuits and these circuits contain memory. Latch is the simplest element in the sequential logic circuits. Latches can be termed as flip flops. The combinational circuit in which one or more outputs are fed back as inputs, is known as latch. Commonly used flip flops are- SR (Set Reset), JK, T (Toggle) and D. In every time of memory elements, sequential logic circuits are used. Clock is used in sequential logic circuits. The operation of the flip flop is triggered by it. Combinational logic circuits Sequential logic circuits No memory elements are present in it. Memory elements are present in it. Present value of output depends on the present value of inputs. Present value of output depends on the present and the past value of the inputs. The data cannot be stored in the digital circuits. The data can be stored in the digital circuits. These are dependent on the clock. These are independent of the clock. Feedback circuits are not required in it. Feedback circuits are required in it. Alarm system used in Measurement Test and Fault Finding and required improvements- To manage abnormal situations, the support system is used. This support system is known as alarm system. It is the basic operator support system. The operator is warned regarding the abnormality of the system by it. The risk can be estimated by the alarm system. The alarm system is used to inform, alert and guide the operator regarding the abnormal situation. It should indicate the required response at the time. It should have a rate at which the operator can deal with the problems and it should be easy to understand. In all process conditions, the alarm system should be usable. It should be designed in a proper manner. Fault finder alarm is used to determine the fault. If a fault occurs in any line, then the location of the fault can be determined by the fault finder alarm. Alarm system is used to measure smoke also which is known as smoke detector also. Circuit of smoke detector has been shown in the above page. It is used to detect the smoke. Circuit diagram of underground cable fault distance locator has been shown below- If a fault occurs underground cable, then it is detected by the above circuit. It is very important to determine the location of the fault to repair it. The concept of Ohms law is used in it. 8051 microcontroller is used in it. The cable length (in KM.) is determined by the ADC device. Relay driver IC control the relays. It is used to check the cable lines. A LCD device is connected to the microcontroller. It is used to display the information. A process is used to measure various electrical or physical terms. This process is known as Data acquisition (DAQ). Current, voltage, pressure, sound and temperature are the terms which are measured by DAQ. Diagram of DAQ has been given below- From the above diagram, we can understand the measurement of the equipment. Various sensors are attached to device. These sensors are connected to computer by DAQ. The improvement in the circuit is acquired by DAQ. After testing of the device, the performance and the efficiency of the device is increased. The performance of the underground cable fault finder can also be increased by it. If DAQ circuit and alarm system are connected to the microcontroller, then by the alarm system, it will be easy to find the fault quickly and at the same time, the location of the fault will be displayed on LCD. It will improve the efficiency and accuracy of the system. The diagram of DAQ using 8051 microcontroller has been shown in the previous page. All the required devices are mentioned in the figure. A system should have all the compulsory devices to increase the performance of it. If DAQ circuit is connected to microcontroller, then it will be easy to acquire the data by the system. Human interaction plays a vital role in any system. There should be a proper interaction of the human with the device to increase the performance of the device. The connection of the other devices should be made possible by the human interfacing only. So, all the mandatory devices should be connected in a system to increase the performance of the system. References- Alarm Systems: A Guide To Design, Management and Procurement, The Engineering Equipment and Materials Users Association (EEMUA) publication No. 191 Requirement Specification for the HAMBO Alarm System, IFE/HR/F-2000/1141 Alarm-kravspesifikasjon for Amoco Norway Oil Company, Valhall CCR Upgrade Project, IFE/HR/F-99/1118. W. R. Leo (1994).Techniques for Nuclear and Particle Physics Experiments. Springer.ISBN3-540-57280-5. Buddy Fey (1996).Data Power: Using Racecar Data Acquisition. Towery Pub.ISBN1-881096-01-7. Charles D. Spencer (1990).Digital Design for Computer Data Acquisition. Cambridge University Press.ISBN0-521-37199-6.