• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Report to the management of Prices snacks reviewing working practices and identify any areas that could be improved or developed with the use of IT in order to maximise the efficiency of the company.

Extracts from this document...

Introduction

Prices snacks Matt Densham Monday 11th November 2001 Report to the management of Prices snacks reviewing working practices and identify any areas that could be improved or developed with the use of IT in order to maximise the efficiency of the company. Input, output, and processing devices used in the modern food manufacturing industry. Before IT was introduced to the workplace After IT was introduced to the workplace Difference Letters to employers were either hand written or done on a type - writer. Word processing devices for writing letters to employers including mail merge Time writing letters would be reduced due to templates and mail merges. Pack design was designed on drawing boards Pack design now drawn up on multimedia graphic programs Designs would take less time to draw and changes could be made to designs more easily. Staff records were kept in large filling cabinets and were awkward to use. Staff records now kept on a database, on a computer. The data stored can be accessed much quicker and you can do searches about all employees Company finances were sorted by expensive accountant. Company finances can now be kept a record of on computers Cheaper then hiring an accountant and also means you can predict future losses/profits etc. Temperature control of oven was done manually and took a while to change the temperature accordingly Computers manage all ovens' controls without any help from people. ...read more.

Middle

The hours worked by each employee is input to disk in preparation of running the payroll program. At the front of the data, in a batch header record, several extra pieces of information can be included. These enable the computer program to check the data being entered and report any errors. These checks help ensure that the program processes the payroll accurately and that none of your employees are left out or are paid incorrectly. Security of data stored Security of data is very important. The computer can make sure that the data is secure by saving the data onto a floppy disk or a compact disk. This means that if the computer is damaged in any way then the data hasn't been lost. Big companies download all of their information onto disk and then take them to a secure location. For example in the world trade centre they didn't lose any data because it had been saved outside the building. Data on a computer can be destroyed in the following ways: * The breakdown of hardware * Poor office practice e.g. not backing up files * Hackers gaining access to the system * Computer fraud. Where data is changed to benefit individuals * The theft of equipment * The physical damage to computer harware Data Protection Act The data protection act was passed in 1984. The act was passed so people could be sure that their personal details, such as sex, age and medical details would be kept confidentially. ...read more.

Conclusion

9 Security of data/information. (How can we ensure data held on computers cannot be lost or destroyed? Include reference to hacking, passwords, back-ups etc). 10 What laws are there related to computers? (Data Protection Act, Computer Misuse Act (1990), The Copyright, Designs and Patents Act (1989) 11 As a 'recap', state what you understand to be the problem that Price's Snacks plc is currently experiencing. 12 Give details of three things Price's Snacks plc could be making better use of to make them more efficient and more productive, thus eliminating the problem you have identified. 13 Evaluate the three solutions discussing the advantages and disadvantages of each. 14 Select the most appropriate and recommend this to Price's Snacks plc in the form of a conclusion. 1. Input, output, and processing devices used in the modern food manufacturing industry. 2. Identify how data and information is collected, stored, processed and communicated within such a company. 3. Identify new technological advances in the use of IT and Information Systems (IS), including it's effect on working practices. Explain how more recent technology has affected industrial practices, particularly social and economic issues. 4. Research and demonstrate what you understand about the importance of validity, accuracy, and security of data when using IT. 5. From the information in the introductory text above, identify and explain your understanding of the business problem that Price's Snacks is experiencing. 6. Recommend three different suitable 'IT based' courses of action to rectify the problem. Evaluate each, and select the most appropriate of these, giving reasons for your choice. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    * Compared to a star topology it performs a lot better under heavy load. * Network server is not required to manage the network. Token Passing Token passing is the method used by nodes to send and receive data in a network.

  2. I have been given the task to design a database for a company called ...

    * With tables you cannot have buttons, where as, you can with forms. Over all forms are better for this type of system as they are more user friendly because they look less intimidating than tables and require less work on behalf of the user as they can have buttons

  1. Coursework 1 (c)Install Apache Web Server on Unix ...

    " to perform the Nessus plugin feed update Step 6: Update Nessus Server Plugins Type "nessus-update-plugins" to perform Nessus plugins up today Fine Tune The Vulnerability Scan Session Properties Step 1: Create Session Host Perform Vulnerability Scan Open Nessus

  2. Flexible Architectures in Communication Security Application

    We can leverage this property to better utilize the processor clock cycle by combining arithmetic and logical operations within a single cycle. Figure 12. CryptoManiac ISA in CNF form. bundle := <inst><inst><inst><inst> inst := <op pair><dest><operand1><operand2><operand3> operation pair := <short><tiny>|<tiny><short>|<tiny><tiny>|<long><nop> tiny := <xor>|<and>|<inc>|<signext>|<nop> short := <add>|<sub>|<rot>|<sbox>|<nop> long := <mul>|<mulmod> Examples:

  1. System I designed in order to produce a promotion package for her newly formed ...

    I will show this by doing the following: - * Do printouts to show an exploration of data in a computer database to obtain specific information. * Do printouts that I have thoroughly checked and edited the databases. (I.e., correct errors, add and delete records, fields).

  2. Smart Card System

    Pt.: None Input Format: 50(45) Output Format: 50(45) Default value: 50 [ ] Continuous or [ ] Discrete [ ] Alphabetic [?] Alphanumeric [ ] Date [ ] Numeric [ ] Base or [ ] Derived Validation Criteria Continuous: Upper Limit: Lower Limit: Discrete: Upper Limit: Lower Limit: Comments: Student can take only one programme at one time

  1. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    The port authorities used to find the shape of the bottom of the harbour, so that ships could navigate more safely. It certainly wasn't possible to drain the harbour and take a photograph of it, so what they did instead was send out a boat which travelled slowly across the harbour.

  2. Computer Aided Design Package

    design would mean either rubbing pats of the old one out, which gets rid of that design or drawing a totally new one. This took a lot more time and now they can just open the old file up, resave it as some thing different and make changes to the design.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work