• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Health and Safety in ICT

Extracts from this document...


ICT Coursework Health and Safety If an employer does not care about the health and safety of his employees, they could be sued up to 10,000 pounds. This includes supervision of inexperienced workers. Employees are entitled to safety equipment if it is needed. Employers have to make sure their employers can work machines properly because so they wont get hurt. Employers are responsible for providing their workers with safe and suitable equipment with which to do their job, training them in how to use it, inspecting and maintaining it, and ensuring that it is used correctly through training and supervision. They also need to set up emergency procedures, provide first aid facilities, taking precaution against electrical equipment, noise, temperature and radiation. And giving safety warnings (signs) For an example if office floors were left wet or cluttered with files or cables, on which employees slipped or tripped up. They would have the right to ask for compensation from their employers. Electrical sockets must not be overloaded. It is also important not to have food or drinks near. Section 2 of the Health and Safety at Work Act 1974 states that "It shall be the duty of every employee to ensure, so far as reasonably practicable, the health, safety and welfare at work of all his employees." Section 3 of the Act states that "It shall be the duty of every employer to conduct his undertaking in such a way as to ensure so far as is reasonably practicable, that persons not in his employment who may be affected thereby are not exposed to risks to their health or safety." ...read more.


It is also much more easier to search for information. Disadvantages of ICT. Its is difficult to understand a computer and some software/programs so you can need training. Some graphics are to difficult to achieve if done by a computer . As they are complex. When something is done by a computer people have high expectations. Saving and backing up a file can destroy the work and sometimes the computer also if there is a problem with your hardware. Viruses can get into your system and destroy everything . People rely on computers too much and get lazy . Using a computer damages your eyes. Monitors release harmful radiation. Using a computer too much can leads to strain injury , back problems and eye pain. ICT also contributes to global warming. How to safeguard your work - Storage and Backup. It is important that when you are naming a file or a folder that you use an appropriate name. Because if you forget where it is, you can search for it by clicking start and then clicking on search (window xp). If you want to rename a folder: you need to click on file and then rename. You cannot use any punctuation. It is good to make more than 1 folder to make it more easier find a file and it's more organized. It is important to regularly backup your files. Because your work can be destroyed by a technical problem or a virus. ...read more.


For an example Limewire is a popular program to download music . But because you are getting files directly from other people ( p2p program) you are prone to viruses . Also because Limewire doesn't scan the file you are downloading for a bug. When you receive an email from someone you don't know , do not open any attachments as they often have viruses. By wary of sharing usb sticks, floppies etc as these can store bugs too . Dealing with Errors and Copyright Laws. If you have a software problem it is best to contact the actual software company. And explain your problem :when it started , if you did anything different on your computer , what is the error message that arises etc. If there is a adware problem you should contact the company that made the computer e.g. Dell , IBM. Using their helpline. You could use your help and support centre that is already on your computer . Which is on the start menu. Or you could ring the help line, which is usually free. There are forums online and help sites that have qualified technicians there to help you to or you could just ring in for a technician and ask them to come in . You always as your teacher or friend to help you. There are often copyright laws on programs and software. These prevent people from making a copying or mimicking the product.(plagiarism). Copyright laws consist in a wide range of things e.g. poems, movies, drawings etc. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    * It can workout to be quite expensive to setup. Ring Topology - The node are interconnected with each other like mesh but each node is exactly connected to two other node, which result in a pathway for signal that are transmitted.

  2. GCSE I.T Security Case Study - Riverside Leisure Centre

    * Mostly manually operated or force operated. This is better than if it was automated because mistakes are rare and shifts are operated so workers are constantly awake and 'on the ball'. To every good system there is a downside.

  1. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    The shape of this graph represents both the changes in the electrical sound and the changes in the electrical signal that model it. Now if we add to this audio signal some random noise, this affects the shape of the signal, and this degrades the sound that your stereo reproduces (diagram 1b).

  2. Smart Card System

    A system provider receives money in advance from people and stores corresponding value onto their cards. During each of these three kinds of transactions, secured data representing value is exchanged for actual money or for goods and services. Card Types * Memory cards - The chip on this card consists

  1. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    Word processing software Advanced packages can contain features of the above system. Input of data by the user would be simple but the disadvantages severely outweigh the advantages. The user will have to operate the software with no clear guidance along the way.

  2. Computer Aided Design Package

    The price for a single licence of AutoCAD 2005 is �2,058 and for two licences of the product it will cost �4,116. For the low, medium and high solutions I will be using Microsoft Windows XP Professional as the operating system, the reason for

  1. Introduction to Viruses

    The virus simply may not have triggered its infection phase yet! Many viruses go resident in the memory of your PC just as a terminate and stay resident (TSR) program such as Sidekick(R) does. This means the virus can wait for some external event such as inserting a diskette, copying

  2. Future Developments in ICT

    So where?s the future development in all of this? Intel?s new Transactional Synchronization eXtensions (TSX). I?ll make use of an example to better describe these new instructions. Imagine a large database stored in to the computer?s memory. If a core wants to modify the data in the table, the entire

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work