• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

IT-based solutions, embracing the newest IT developments throughout the whole organisation

Extracts from this document...


Introduction: This reports purpose is to act as a summary, highlighting the consequences that will come to Eden Farm, by them implementing IT-based solutions, embracing the newest IT developments throughout the whole organisation. Hardware Systems: Currently the business is using paper based systems. Three purposed hardware systems that can be used by the Eden Farm Organic Foods business are: * Upgrading and purchasing new computers: This will help the business with storing files and important information. It will also allow the company to communicate via e-mail and video conferencing. A good recommendation for the new systems would be to have at least 100GB Hard Drive to store all the relevant data also a RAM of at least 1GB to allow multiple functions to be used. * Increasing capacity Increasing the capacity of the business will speed up production and allow for more sales. Increasing the capacity of the computer systems will greatly increase the amount of functions the computer will be able to do. * Increasing Communications With the company expanding into different parts of the country there will be a need to easily communicate and advise any department of any needs or changes this can be done by creating a network where all the computer systems with in Eden Farm are connected to the same network allowing internal communications. Software Systems: * Application Software This is a single program that can only do a specific task. ...read more.


Also it will allow them to see what sort of produce people are most interested in. As the business is moving from paper based systems to computer based then up skilling of the staff will be essential. Otherwise the staff will become useless to Eden Farm and there may be cause for redundancies. As Burnley college allows for home and remote working then it is suggested that Eden Farm create a similar method to allow their staff to communicate and gain access to files This will benefit staff as they will be no need to have to go into work to contact or collect important documents and other things. Also it will allow for department interaction so that there is no more lack of communications. Eden Farm can increase their globalisation by setting up an online ordering system, which will allow anyone anywhere to purchase from them, instead of the customers having to call up or visit the shop they will simply use the website. This can increase sales figures and the customer range so that the business can keep on expanding possibly to other countries. A list of risks while using IT that Eden Farm may encounter and how they can be managed. Antivirus packages and Back Ups: A virus checker is a piece of software that prevents virus's wrecking a computer they do this by corrupting work, deleting files and changing settings. ...read more.


Copyright Act 2000- This gives the creator of an original piece work exclusive rights to it usually for a limited period. It generally gives the creator the right to allow others to copy the piece of work. It stops people claiming other peoples work as their own and benefitting from it in any way. Digital Millennium Copyright Act 2000 - This makes it illegal for anyone to access copyrighted work by any means necessary. This also protects technology, weapons, designs of ships and devices. Meaning that they too cannot be copied. Computer Misuse Act 1990- This prevents people going on inappropriate sites during work hours. It also protects the computer from any unauthorized entry via hackers who set their computers to decrypt passwords and security measures enabling them to access the data. It also prevents people from putting passwords or security on data that there do not have the right to encrypt like someone else's personal data or someone's personal computer. Firewalls This checks all network traffic and does not allow any file or application through if it decides it to be a potential risk. It is basically a barrier to keep hazard files away from a computer. The image shows the flow of a firewall. ?? ?? ?? ?? National Diploma For ICT Practitioners Unit 35: Impact of ICT on Business Systems Assignment: 4 Name: Connor Veitch Centre Number: 47303 Candidate Number: Page: 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    information systems assignment 2

    4 star(s)

    This information which is gathered must be stored in the best, effective and logical way; this then means the data can be accessed easier when necessary. There are many different ways to store the information gathered. The data then needs to be summarised to create information in a way that meets the needs of the system users.

  2. Hardware and Software

    As well as viewing thumbnails, you can preview in different sizes before loading. There's now a simple way to match colours between photo-objects, while leaving their underlying textures unchanged. This kind of colour replacement first appeared as a red-eye tool in PhotoShop Elements.

  1. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    Since there are no reflections, multi path distortion is eliminated and the data rate is much greater. There are several grades and types of fibre used in both single and multimode transmission, each suitable for a different wavelength of infrared light.

  2. Smart Card System

    to run the system, thus, this system is believed to be technically feasible as well. 6.4 Design Constraints 6.4.1 Hardware Limitation The proposed Computer Lab Management System that we had developed is mainly used in computer system with at least Pentium III processor and above.

  1. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    Section 3.2 - Modes of Operation Batch processing Batch processing involves holding large volumes of data which is received from a system. The data received will be held in a transaction file until it can be processed. When the transaction file is processed they are usually done so in batches.

  2. Introduction to Viruses

    01/14/2002 The "Donut" Virus: This is the first malicious program to infect .NET files."Donut" was developed by the notorious Czech hacker going by the pseudonym "Benny", who is a part of the "29A" virus-writers group. "Benny" is known to be the author of many proof-of-concept viruses, among which are "Stream"

  1. Statistics - How good are people's memory considering different factors?

    I might also investigate if six year olds remember the pictures better than 16 year olds. While this might be a longer way of achieving the results to verify the main hypothesis, it definitely provides a greater insight into the claim and to which way it sides.

  2. Future Developments in ICT

    The downsides to these higher clocks were incredible decreases in efficiency. Power consumption and heat soared to record numbers during this time and the performance returns were again diminishing. The realisation suddenly dawned on the company that they could not keep scaling their CPU?s up like this, and so their

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work