• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Report to the management of Prices snacks reviewing working practices and identify any areas that could be improved or developed with the use of IT in order to maximise the efficiency of the company.

Extracts from this document...

Introduction

Prices snacks Matt Densham Monday 11th November 2001 Report to the management of Prices snacks reviewing working practices and identify any areas that could be improved or developed with the use of IT in order to maximise the efficiency of the company. Input, output, and processing devices used in the modern food manufacturing industry. Before IT was introduced to the workplace After IT was introduced to the workplace Difference Letters to employers were either hand written or done on a type - writer. Word processing devices for writing letters to employers including mail merge Time writing letters would be reduced due to templates and mail merges. Pack design was designed on drawing boards Pack design now drawn up on multimedia graphic programs Designs would take less time to draw and changes could be made to designs more easily. Staff records were kept in large filling cabinets and were awkward to use. Staff records now kept on a database, on a computer. The data stored can be accessed much quicker and you can do searches about all employees Company finances were sorted by expensive accountant. Company finances can now be kept a record of on computers Cheaper then hiring an accountant and also means you can predict future losses/profits etc. Temperature control of oven was done manually and took a while to change the temperature accordingly Computers manage all ovens' controls without any help from people. ...read more.

Middle

The hours worked by each employee is input to disk in preparation of running the payroll program. At the front of the data, in a batch header record, several extra pieces of information can be included. These enable the computer program to check the data being entered and report any errors. These checks help ensure that the program processes the payroll accurately and that none of your employees are left out or are paid incorrectly. Security of data stored Security of data is very important. The computer can make sure that the data is secure by saving the data onto a floppy disk or a compact disk. This means that if the computer is damaged in any way then the data hasn't been lost. Big companies download all of their information onto disk and then take them to a secure location. For example in the world trade centre they didn't lose any data because it had been saved outside the building. Data on a computer can be destroyed in the following ways: * The breakdown of hardware * Poor office practice e.g. not backing up files * Hackers gaining access to the system * Computer fraud. Where data is changed to benefit individuals * The theft of equipment * The physical damage to computer harware Data Protection Act The data protection act was passed in 1984. The act was passed so people could be sure that their personal details, such as sex, age and medical details would be kept confidentially. ...read more.

Conclusion

9 Security of data/information. (How can we ensure data held on computers cannot be lost or destroyed? Include reference to hacking, passwords, back-ups etc). 10 What laws are there related to computers? (Data Protection Act, Computer Misuse Act (1990), The Copyright, Designs and Patents Act (1989) 11 As a 'recap', state what you understand to be the problem that Price's Snacks plc is currently experiencing. 12 Give details of three things Price's Snacks plc could be making better use of to make them more efficient and more productive, thus eliminating the problem you have identified. 13 Evaluate the three solutions discussing the advantages and disadvantages of each. 14 Select the most appropriate and recommend this to Price's Snacks plc in the form of a conclusion. 1. Input, output, and processing devices used in the modern food manufacturing industry. 2. Identify how data and information is collected, stored, processed and communicated within such a company. 3. Identify new technological advances in the use of IT and Information Systems (IS), including it's effect on working practices. Explain how more recent technology has affected industrial practices, particularly social and economic issues. 4. Research and demonstrate what you understand about the importance of validity, accuracy, and security of data when using IT. 5. From the information in the introductory text above, identify and explain your understanding of the business problem that Price's Snacks is experiencing. 6. Recommend three different suitable 'IT based' courses of action to rectify the problem. Evaluate each, and select the most appropriate of these, giving reasons for your choice. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    This is the maximum jam-time. Since the time a data station transmits a jam signal it has to wait before it can send that frame again. CSMA performance is increase by using Collision Detection. When a collision is detected Collision detection will terminate the transmission and this will also stop the probability of second collision on retry.

  2. Coursework 1 (c)Install Apache Web Server on Unix ...

    Info Port is open ssh (22/tcp) Info Port is open ssh (22/tcp) Medium The remote SSH daemon supports connections made using the version 1.33 and/or 1.5 of the SSH protocol. These protocols are not completely cryptographically safe so they should not be used. Solution : If you use OpenSSH, set the option 'Protocol' to '2' If

  1. Flexible Architectures in Communication Security Application

    To gauge the cycle time of the design, a Verilog hardware model was built. The execution stage of the VLIW machine, along with full-crossbar bypass logic, and input/output queues was written in Verilog HDL. We used Synopsys logic synthesis tools [38] to evaluate design timing, area, and power.

  2. System I designed in order to produce a promotion package for her newly formed ...

    QAMAR NAFISA F 19/07/85 WALSALL 12 MANN HARBAJAN M 11/04/65 GLASGOW 13 GINOLA DAVID M 03/05/68 TOTTENHAM 14 DEL PIERO ALESSANDRO M 10/11/75 ROME 15 BATISTUTA GABRIEL M 02/04/69 ROME 16 KLINSMANN JURGEN M 25/12/67 MUNICH 17 REBROV SERGEI M 12/12/75 WALSALL 18 ARMSTRONG CHRIS M 03/04/71 TOTTENHAM 19 CAMPBELL

  1. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    A long-distance cable is available with a bandwidth allotment of three megahertz (3 MHz). This is 3,000 kHz, so in theory, it is possible to place 1,000 signals, each 3 kHz wide, into the long-distance channel. The circuit that does this is known as a multiplexer.

  2. Free essay

    Setting up and E-Commerce Site

    Also however we have the option of expanding our campaign in the future dependant on whether we think it would be a good idea or not when our income / revenue have increased. Search engine optimisation is the most key point here, for a small price we can pay a

  1. Smart Card System

    b) Better Control The administration control in the system let the supervisor have the better control of the student computer. c) Access Control As compared with the existing access control methods in the college laboratory, that is the user needs to login manually.

  2. Introduction to spreadsheets

    It did take me to Main Menu page. 2 Send - Button Clicking on the button This does send the information. Test No. Purpose of test Method of testing and test data Expected result of test and result Testing the formulas and macros on the entry spread sheet Month sales:-

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work