• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Report to the management of Prices snacks reviewing working practices and identify any areas that could be improved or developed with the use of IT in order to maximise the efficiency of the company.

Extracts from this document...


Prices snacks Matt Densham Monday 11th November 2001 Report to the management of Prices snacks reviewing working practices and identify any areas that could be improved or developed with the use of IT in order to maximise the efficiency of the company. Input, output, and processing devices used in the modern food manufacturing industry. Before IT was introduced to the workplace After IT was introduced to the workplace Difference Letters to employers were either hand written or done on a type - writer. Word processing devices for writing letters to employers including mail merge Time writing letters would be reduced due to templates and mail merges. Pack design was designed on drawing boards Pack design now drawn up on multimedia graphic programs Designs would take less time to draw and changes could be made to designs more easily. Staff records were kept in large filling cabinets and were awkward to use. Staff records now kept on a database, on a computer. The data stored can be accessed much quicker and you can do searches about all employees Company finances were sorted by expensive accountant. Company finances can now be kept a record of on computers Cheaper then hiring an accountant and also means you can predict future losses/profits etc. Temperature control of oven was done manually and took a while to change the temperature accordingly Computers manage all ovens' controls without any help from people. ...read more.


The hours worked by each employee is input to disk in preparation of running the payroll program. At the front of the data, in a batch header record, several extra pieces of information can be included. These enable the computer program to check the data being entered and report any errors. These checks help ensure that the program processes the payroll accurately and that none of your employees are left out or are paid incorrectly. Security of data stored Security of data is very important. The computer can make sure that the data is secure by saving the data onto a floppy disk or a compact disk. This means that if the computer is damaged in any way then the data hasn't been lost. Big companies download all of their information onto disk and then take them to a secure location. For example in the world trade centre they didn't lose any data because it had been saved outside the building. Data on a computer can be destroyed in the following ways: * The breakdown of hardware * Poor office practice e.g. not backing up files * Hackers gaining access to the system * Computer fraud. Where data is changed to benefit individuals * The theft of equipment * The physical damage to computer harware Data Protection Act The data protection act was passed in 1984. The act was passed so people could be sure that their personal details, such as sex, age and medical details would be kept confidentially. ...read more.


9 Security of data/information. (How can we ensure data held on computers cannot be lost or destroyed? Include reference to hacking, passwords, back-ups etc). 10 What laws are there related to computers? (Data Protection Act, Computer Misuse Act (1990), The Copyright, Designs and Patents Act (1989) 11 As a 'recap', state what you understand to be the problem that Price's Snacks plc is currently experiencing. 12 Give details of three things Price's Snacks plc could be making better use of to make them more efficient and more productive, thus eliminating the problem you have identified. 13 Evaluate the three solutions discussing the advantages and disadvantages of each. 14 Select the most appropriate and recommend this to Price's Snacks plc in the form of a conclusion. 1. Input, output, and processing devices used in the modern food manufacturing industry. 2. Identify how data and information is collected, stored, processed and communicated within such a company. 3. Identify new technological advances in the use of IT and Information Systems (IS), including it's effect on working practices. Explain how more recent technology has affected industrial practices, particularly social and economic issues. 4. Research and demonstrate what you understand about the importance of validity, accuracy, and security of data when using IT. 5. From the information in the introductory text above, identify and explain your understanding of the business problem that Price's Snacks is experiencing. 6. Recommend three different suitable 'IT based' courses of action to rectify the problem. Evaluate each, and select the most appropriate of these, giving reasons for your choice. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    Each of the nodes has the ability to take control of the transmission rate. * Extremely high transmission rate can be achieved. Typically speed of transmission is around 10 Mbps which is quite quick. For e.g. it will take around 2 minutes to send a 100MB file which is pretty quick.

  2. Coursework 1 (c)Install Apache Web Server on Unix ...

    console in the NessusWx tools bar click "session" > "new", enter the session name for report reference and click "Create" as the figure. (In this coursework, my target host for vulnerability scanning is Cisco 1814 Router of Asiaworld-expo) Step 2: Fine Tune Session Properties In session properties screen of Nessus

  1. I have been given the task to design a database for a company called ...

    Query outputs: The results of my queries could either be displayed in a table or in a form created by a wizard. The presentation of the results would better in a form this is because of a number of reasons, which include: * It is easier to read from forms than tables.

  2. Flexible Architectures in Communication Security Application

    We can leverage this property to better utilize the processor clock cycle by combining arithmetic and logical operations within a single cycle. Figure 12. CryptoManiac ISA in CNF form. bundle := <inst><inst><inst><inst> inst := <op pair><dest><operand1><operand2><operand3> operation pair := <short><tiny>|<tiny><short>|<tiny><tiny>|<long><nop> tiny := <xor>|<and>|<inc>|<signext>|<nop> short := <add>|<sub>|<rot>|<sbox>|<nop> long := <mul>|<mulmod> Examples:

  1. System I designed in order to produce a promotion package for her newly formed ...

    I will show this by doing the following: - * Do printouts to show an exploration of data in a computer database to obtain specific information. * Do printouts that I have thoroughly checked and edited the databases. (I.e., correct errors, add and delete records, fields).

  2. Smart Card System

    Screen [ ] Report [ ] Form [?] Internal Data Structure traveling with the flow: lab usage information Volume / Time: 1 / Each Use Time Comments: Lab computer usage was retrieved from server database to create report. Relation Description Form Name: Requested Information Description: This data flow carries the

  1. Stace & Dunphy (2001) identify five dilemmas of change

    Even cultural norms that dictate behaviour, opinions style and attitudes, etc., can be brought to the surface, discussed and altered by cultural change initiatives. Experience of corporate consulting work, has revealed it helpful to have all group members (generally in a cultural change workshop setting)

  2. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    when you will need it. These twisted pair comes with each pair uniquely colour coded when it is packaged in multiple pairs. Different uses such as analogue, digital, and Ethernet require different pair multiples. Although twisted pair is often associated with home use, with a higher grade of twisted pair

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work