• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The impact of ICT on an adult in full-time employment and the effects on his/her working style

Extracts from this document...


The impact of ICT on an adult in full-time employment and the effects on his/her working style The person that I interviewed is a recent graduate, he has been living in Stafford for less than a year and works for the County Council in the financial area of Social Services. Work His work wholly revolves around I.T, mainly using financial system's, the Internet of which the majority is e-mail, Microsoft Word, Excel and Outlook Express. All the computers are run off servers which are most probably similar to the ones used in our school and the Internet is run through an Intranet (the Internet run through a network) which also runs the website which is used for people to find out about everything the council does from charity funding to social care for fostering and domiciliary patients, it also contains phone numbers etc. ...read more.


Although he works in finance he does not have access to credit details or handle actual payments, he only works this out and these other details (the collection or paying out of money) is handled by the treasurers. He regularly uses a phone that is connected to a main switchboard and every employee bar the cleaners have there own telephone number which is a four digit code and this allows swift contact between employers. As with every other company the councils has to adhere to the Health and Safety at Work Act and as most people suffer with computer related injuries the council has its own department in most buildings to help with this and this graduate has tendonitis in his wrist so he has to have a special cordless mouse which involves all the roller-ball movement being done by his hand, although people who suffer to the extremities have been known to be given voice-recognition software and with this every employee is given flat-screen monitors and anti-glare screen. ...read more.


Home At home he uses a P.c with a 566mhz processor, 64mb RAM, a cd-rw and a 1mb video card, which is used to download mpeg's and mp3's, used as a word processor and to play low-level graphic games. He also has an mp3 player which he brought when mp3 players where relatively new and expensive so 64mb was a lot of songs when they first started. He has a Playstation 2 game console with an eye toy which allows the user to appear in the games and control it with their body movement and it can also be used as a webcam for sending video messages. Unit 3b shows that somebody who grew up when computers where just developing (1970's and 80's) can still be computer literate when they are in a full-time job and this gives him valuable experience against the older generation who are not so experienced. Simon Oldfield ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Policy, Strategy & Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Policy, Strategy & Systems essays

  1. Threats to Organisations and Systems. Describe the countermeasures available to an organisation that ...

    Viruses could be sent via e-mail, the same software if decent enough should wipe out any junk mail before opened. The main problem for Teign and Tow is that if one computer gets infected with one particular bug then being that the computers are networked; all the computer will breakdown one by one of not secured properly.

  2. Download services

    Shareware can separate into 2 different kind of version which is trial version and full version. Trial version is "try before buy" so it only has the basic function of software, if people would like the full function of software, they need to register or purchase it.

  1. The Use of Big IP in Gamer.TV.

    Application Function: The function of the software is to process users requests faster. It does this by the way it is set up, say the Systems Administrator sets the software up to allow users to go through the server with the most processing power left, out of all the servers

  2. implementation of an ITC system

    Capacity of DDR RAM. (for networking storage of programs and documents) * To install 3 Lexmark Z600 series Laser printers in the network * To implement a Firewall in to the servers * To install Anti-Virus protection throughout the network * To setup a couple of network bridges and Ethernet

  1. Building Local Area Networks

    network - Radio-Ethernet 1 x network - Ethernet 10Base-T/100Base-TX - RJ-45 Data Link Protocol Ethernet, Fast Ethernet, IEEE 802.11b, IEEE 802.11g Compliant Standards IEEE 802.3, IEEE 802.3U, IEEE 802.11b, IEEE 802.11g Data Transfer Rate 54 Mbps Encryption Algorithm 128-bit WEP, 40-bit WEP Frequency Band 2.4 GHz Research into the most

  2. Formal Specification, Verification, and Automatic Test Generation of ATM Routing Protocol: PNNI

    This process continues, thus building a hierarchy. There are three main protocols for accomplishing the task of routing. They are the Hello Protocol, the Database Synchronization Protocol including Flooding, and the Peer Group Leader Election (PGLE) Protocol. These protocols all interact.

  1. Produce a report for the Managing Director of Animal World Magazine outlining different ways ...

    No terminators required Disadvantages o Failure of one computer can affect the whole network o Adding and removing the nodes can disrupts network o Costly Wiring o Expensive Adaptor Cards o Lost of token means cant communicate Details of Token Ring Topology Topology Cable Connector Hardware Software Protocol Single Point

  2. Local area networks (LANs).

    but are susceptible to obstructions such as rain, fog, dust, and of course, walls. Radio frequency systems use low power spread spectrum transmission that, in many cases, can penetrate walls. Because they are radio frequencies they can be detected by someone with sensitive equipment and can be interfered with.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work