• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

I will try to encourage middle aged adults to ride bikes as a frequent form of transport or leisure. I intend persuade my audience in form of a leaflet. In this I will explain the environmental issues and the safety that is involved while cycling.

Extracts from this document...


It coursework project 1a Introduction In this coursework I will try to encourage middle aged adults to ride bikes as a frequent form of transport or leisure. I intend persuade my audience in form of a leaflet. In this I will explain the environmental issues and the safety that is involved while cycling. Microsoft Publisher 97 will be the software that will help me create this leaflet. I will be saving my coursework in a specially allocated area for me, within my school's Local Area Network (LAN). My Network Area This shows the directories and sub-directories where I will save my work, in the form of a tree diagram. This screenshot proves where I will be saving the work for this coursework. For my internet search I will be using a very good and popular search engine, google. It can found at http://www.google.com I will start by searching for "cycling" With the single keyword "cycling" I got 3,390,000 results, which is too much to manually look through. I will use more keywords to narrow down the results that I get. As you can see, I got 3,390,000 results, which is too much to manually look through. By using more keywords, I will narrow my search down and filter unwanted results. Just by adding a few more keywords, my search has narrowed down to a more realistic number, but it is still not practical to search through 3,220 webpage's. The "+" sign in front of the keywords, tell the search engine that the results must include these results. The "-" sign in front if the keywords tell the search engine to filter results with these words. It's illegal to copy, distribute or alter the contents of copyright material without the owner's permission. ...read more.


This prevents what is called a "Dictionary attack". Programs are made to try out every word in the dictionary, as your password. > They should be made longer than 6 characters There are programs which try every possible combination of numbers, letters and symbols as the password. It will take longer this way, but eventually it will work. To prevent this from happening, our school automatically prevents access to an account whereby the password has been incorrectly entered, a certain number of times. Advantages > Word -Processors such as Microsoft word, allow us to edit documents without typing it all out again, which could be very time consuming. > There are many graphic tools available, which are especially useful for presentations, and have effects that cannot be done by an unskilled hand. > Some word- processors offer many very useful features such as spell check and word count. > Large amounts of text and pictures can be easily and quickly copied. > Files can be easily backed up in case of data loss. > The internet has lots of information on a wide range on topics. This information can be quickly and easily found. Disadvantages: > Computer games can be addictive and very time consuming. > A computer has become so useful that many people spend most of their day on a computer, which prevents them from doing any exercise or socialising. In the future this can lead to an increased number of obese children. > Data published on the net may be of adult content ands therefore not be suitable for children. Although there are some programs that can monitor activities on the net, programs of reasonable quality are usually expensive, and cannot substitute a human supervisor. ...read more.


> Never tamper with the wires behind the computer. > Don't switch off or disconnect the machine if you have a problem. Call a teacher or I.T technition. > Don't switch off the pc until you get this message: "It is now safe to switch off" > Don't place unshielded equipment not supplied to the pc near to it. A radio or mobile phone near to the monitor,, for example, may cause a distorted picture. > Don't get scratches on compact disks. This may result in them being unusable. > Don't leave applications open when not in use. Too man applications open at any one time can slow down the operation of the pc. > Don't delete files that you have not created. Programs have their own data files and deleting these files will stop the computer from working. Errors Errors occur when something goes wrong or something unexpected happens. Errors can occur in hardware and software. Hardware errors: Hardware errors usually occurs when the computer boots up. The following hardware error occurs when a computer boots up while floppy disk is present in its floppy disk drive. Invalid system disk Replace the disk, and then press any key. This happened to me many times. It required me to remove the floppy disk and then press any key. Software errors: Any error that occurs in the operating system or programs within it is a software error. The following error occurred to me, while I was using "Microsoft Internet Explorer", and I had entered a web page that either could not be found or was invalid. Help: From the screenshot above, you can see that "Internet Explorer" offers some help on the error. Usually by pressing F1, a help menu can be accessed. Newer software offer online help, either in the form of guidance from a web page or a professional. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    An introduction to Identity Theft

    4 star(s)

    court action, seizure of goods and the attendance of bogus debt collectors to the business premises. * Network Invasion This is potentially the most insidious tool for corporate identity theft. The following is an example as to how the criminal can access the network; A telephone call is made by

  2. Peer reviewed

    HCI shortened for Human Computer Interaction is the study of the human and computer ...

    3 star(s)

    Behaviour Models; Behaviour models are models that predict the ways in which interfaces behave when it's being used and how users behave to interfaces. There are different types of behavioural model such as; Predictive Modelling and Descriptive Modelling. * Predictive Modelling: Predictive models provide guidance for when designing an interface.

  1. Computing Project

    procedure is to exit the form and return back to the main menu. Return DVD Form procedure TFmReturnedDvds.BtnRentClick(Sender: TObject); This procedure retrns the DVD and deletes the record in the Loans Table procedure TFmReturnedDvds.Button1Click(Sender: TObject); This procedure closes the form and returns back to the main menu form procedure TFmReturnedDvds.dblkcbxmembersClick(Sender:

  2. GCSE I.T Security Case Study - Riverside Leisure Centre

    Other organisations carry out similar checks at regular intervals. This task costs the organisation money for clerical staff to print out the details, collect them in again and edit the records to bring them up-to-date but is necessary by law.

  1. Hardware and Software

    Graphic designers will like this version of PhotoShop CS for its introduction of text on a path, with which you can create and edit text running at angles and along curves. You can also work on images up to 300,000 pixels square; large enough for billboard design, and develop multiple versions of graphics using layers to hold the version differences.

  2. I have been given the task to design a database for a company called ...

    The following diagram shows the criteria formula. Total Dimensions This query speeds up the entering of the parcel data by calculating the total dimensions of the parcel by adding up the width, length and height. This both saves time for the user and helps to prevent human error when calculating the total.

  1. Security Issues of E-Commerce

    Unauthorized use of credit cards The problems with the use of unauthorised credit cards are in fact as costly to the customer as they are to the business. With this form of theft/fraud, the customer's card is being charged and they will in fact get the bill even when they didn't spend any of the money.

  2. Spare Parts Database Project

    stDocName = "customerfile" DoCmd.OpenForm stDocName, , , stLinkCriteria Form_customerfile.Add_record.SetFocus Form_customerfile.Save_record.Enabled = False Form_customerfile.Add_record.Enabled = True Exit_Customer_File_Click: Exit Sub Err_Customer_File_Click: MsgBox Err.Description Resume Exit_Customer_File_Click End Sub Private Sub Detail_Click() End Sub Private Sub item_file_Click() On Error GoTo Err_item_file_Click Dim stDocName As String Dim stLinkCriteria As String stDocName = "itemfile" DoCmd.OpenForm stDocName,

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work