• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

A2Z Travel UK Ltd A2Z Travel Uk Ltd Company Structure structure of the company, considering where the computing function is situated ] Page 1

Extracts from this document...

Introduction

Organisation and Control of Computer Operations A2Z Travel UK Ltd Contents Page A2Z Travel Uk Ltd Company Structure Page 1 Description of the organisational structure of the company, considering where the computing function is situated Page 2 - 3 Structuring of Computing Jobs Page 4 - 6 Privacy Page 6 Privacy Software Page 6 - 7 Security Page 7 - 8 References Page 9 A description of the organisational structure of the company, considering where the computing function is situated. A2z Travel Uk Ltd is a medium Sized Travel coach company. The present fleet consists of: * 8 coaches (53 seaters), * 3 Mini Coaches (16 Seaters) and * 3 Minibuses (8 Seaters). A2z Travel Uk Ltd is based in Phoenix Business Park; it is situated in an area called Walsall The organisational structure of the company is quite straight forward and to the point and easy to understand. The company is split into two departments the computing department and Contracts team. Taira Zeb is the overall is the director of the company. Martin Gates is the Transport Manager of the daily operations team. He liaises with other companies to A2z Travel Uk Ltd can offer when they book with them. He explains to companies what special rates they can offer them if they book association or company booking outings. If the Company's or associations are happy to sign any contract or booking with A2z Travel Uk Ltd he passes the contact details to the contract manager make them sign a contact or booking. ...read more.

Middle

(Every evening) These back ups are stored at the main site location. Weekly back ups are also taken from the system, these back ups are taken to a secure location off site. This is done so that if data is lost or corrupt at the main site, only a weeks worth of data is lost. Backup Assistant - Frank Dean Frank Dean is responsible for backing up data on a daily basis, and ensuring all security procedures are met. Database Administrator - Wajid Gahni As the database administrator Wajid Gahni has the responsibility and the role of: - - Co-ordinating the use of data in database management systems. - Providing support to the other departments. - Any changes made to the database must be approved by DBA. - Controlling access, performance, monitoring and tuning of the database. - Working with other computing team members to make sure the database is working to the highest performance. - This DBA gives different users different access rights to the system - The DBA resolves disputes that can occur with the Database. Privacy and Security Privacy "Privacy is the claim for individuals to be left alone, free from surveillance or interference from other individuals, organisations or the state". (P59 lauden and lauden.) A2Z Travel.org has about 10 computers, which they use to keep personal data about all drivers, coaches, routes and customers. Therefore all access to customers and staff information within the company is restricted to those authorised to see it. There are formal procedures that are followed for the allocation of access rights to users such as using a secure password, never telling anyone your password, changing passwords regularly and making sure that no staff members write their passwords down, such data should be memorised. ...read more.

Conclusion

There are a number of ways in which it is possible to contract a virus including the use of floppy disks, downloading data from the Internet or email. To reduce these risks it is the role of the I.T security manager to have an up to date anti virus software subscription. Even more important is the task of regularly updating this software as new viruses are regularly generated. Another security step taken by the organisation is to implement firewalls on all of the P.Cs used within the company. This helps to protect data and filter out any harmful files. The role of the technician includes updating all of this software and carrying out regular checks on all of the computers. Another precaution taken by the company involves completing regular windows updates on all machines used within the company. This keeps all Microsoft software up to date so that there is less risk of contracting any viruses or experiencing any problems with any software. Technical Security - This considers the security requirements, which are related to the technology within A2Z Travel.org in particular IT networks, systems and equipment. Topics that are involved include: Hacking - This is an act to penetrate computer systems to gain knowledge about the system and how it works. A hacker is someone who is interested in computer programming and things that are related to the technical side of a computer. The damage a hacker can do is change a password so legitimate users are denied access, can smuggle another program onto the P.C, can steal credit numbers to obtain goods and services and can crash a system. A2Z Travel.org uses up to data virus protection and Microsoft firewall applications to prevent any unauthorised access to the system. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    An introduction to Identity Theft

    4 star(s)

    companies, committed other crimes in the victims name and may owe taxes to the government, the opportunities for the criminal having obtained the victims identity are extensive and surprisingly easy to accomplish. Where companies are the victim of Identity Theft they may after the fact, discover that vast amount of

  2. Peer reviewed

    information systems assignment 2

    4 star(s)

    Spreadsheets can contain text, numeric values and formulas. Spreadsheets are frequently used for financial information because of their ability to re-calculate the entire sheet automatically after a change to a single cell is made. Spreadsheets can display information and data in numerous ways due to the function which allows charts and graphs to be created.

  1. 140 Computing A-Level Revision Questions

    Mention three different validation checks which might be employed. 56. Describe three ways in which a programmer may make programs 'user-friendly' 57. Describe the use of a 'Turnaround document' that uses OCR. 58. Define systems software, giving two different examples.

  2. Bill Gates Biography

    Microsoft said that a graphic user interface (GUI) was not their idea. If anything it was Xerox's idea that first came out with GUI for their copiers in the late 1970's.

  1. Business blue print document for the implementation of SAP R/3 (4.6B) payroll at Mastek ...

    Labour Welfare Fund Reports Payroll-India caters to Labour Welfare Fund reports for the following states: - 1. Gujarat (Half-Yearly) - Not applicable for Mastek 2. Maharashtra (Half-Yearly) - Applicable for Mastek 3. West Bengal (Half-Yearly) - Applicable for Mastek 4. Karnataka (Annual) - Applicable for Mastek 5. Tamil Nadu (Annual)

  2. Computing Project

    user to add DVD's to the catalogue Rent Out A DVD Form This form will be used by the user to rent out a DVD to a member and a record will be created in the loans table identifying who has rented what DVD out.

  1. Form and Function In Design Technology

    government and the University of Pennsylvania. Consisting of 18,000 vacuum tubes, 70,000 resistors and 5 million soldered joints, the computer was such a massive piece of machinery that it consumed 160 kilowatts of electrical power, enough energy to dim the lights in an entire section of Philadelphia First generation computers

  2. GCSE I.T Security Case Study - Riverside Leisure Centre

    However, if the computer is stolen then the next user can carry on encrypting or decoding messages and this would prove not very secure. To overcome this problem you could either: * Make sure the computer is surrounded by physical security and therefore cannot be stolen.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work