Millennium Conservatories - Company overview and recommendations that have been suggested which will improve the quality of the company's security of their offices and the security of their computer systems.

Authors Avatar

  1. Abstract

Organisations all over the world use various methods to send and receive information as well as many types of software applications to process information and data. This report follows on from the first report and is an in depth look at the computing resources of a chosen business, the telecommunications methods it utilises, the software application it uses if any and the security measure the business uses.

In a meeting with the Mr Medi Ghafarian, the proprietor of Millennium Conservatories which this assignment is based on, many questions where asked about the business and its information systems, software applications and methods of sending and receiving information.

It was found that they use few and simple methods of security but utilise good application software. Their information accuracy and security criteria is very high for if it was not there would be many problems.

The security of the sales shop is somewhat lacking in up to date methods, with simple filing cabinets to hold important documents. And a small box for back up floppy disks. Recommendations have been suggested which will improve the quality of the company’s security of their offices and the security of their computer systems.

  1. Table of Contents

1        Abstract        

2        Table of Contents        

3        Terms of Reference        

4        Main Body        

4.1        Computer Resources within the Company        

4.2        Value of Accurate Information        

4.3        Measures Taken to keep Information Secure        

4.4        Current application Software        

4.5        How the Company uses Methods of Telecommunications        

4.6        Common Applications Software        

4.7        Security and Accuracy Criteria for Information        

4.8        Telecommunications and Associated Development Tools        

5        Conclusion        

6        Recommendations        

7        References        

  1. Terms of Reference

Janet Jones has set this report as part of the HND Computing course at Wakefield College this is the second assignment of the computer solutions unit.

The aim of the report is to look at methods of telecommunications and the computer resources the chosen company has. This report follows on from the first assignment but looks at the security and accuracy criteria for all of the companies’ information and data as well as an in-depth view of their current software applications and how they utilise other methods of telecommunications.

Also in this paper is a description on how the company utilises different methods of telecommunications, how the company utilises common software applications such as Microsoft Office etc and what security measures the company utilise to make sure all of their information and data remains safe and secure. The company that has been used for this report is Millennium Conservatories, They manufacture and install PVC windows and conservatories.

  1. Main Body

  1. Computer Resources within the Company

The sales office that the first report was based on has two computers, one for the proprietor Mr Medi Ghaffrian and one for the personal secretary. These two computers are very good computers, they have 256Mb of Ram and 40GB Hard Drives which is ample storage space. The Processor is a AMD 1.6Ghz Atholon.

Join now!

In the factory and warehouse there are four computers all top of the range There Specifications are 512Mb of Ram 80GB Hard Drives and a Intel Pentium 4 2.0Ghz

Most of the day to day running of the company is done at the computers in the sales shop. Orders are put onto these computers and designs are made and sent to the factory, invoices and delivery dates are made on them as well.

The General Manager has a top of the range laptop computer that he takes with him when he needs to go visit a computer or ...

This is a preview of the whole essay