• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The impact of ICT on an adult in full-time employment and the effects on his/her working style

Extracts from this document...

Introduction

The impact of ICT on an adult in full-time employment and the effects on his/her working style The person that I interviewed is a recent graduate, he has been living in Stafford for less than a year and works for the County Council in the financial area of Social Services. Work His work wholly revolves around I.T, mainly using financial system's, the Internet of which the majority is e-mail, Microsoft Word, Excel and Outlook Express. All the computers are run off servers which are most probably similar to the ones used in our school and the Internet is run through an Intranet (the Internet run through a network) which also runs the website which is used for people to find out about everything the council does from charity funding to social care for fostering and domiciliary patients, it also contains phone numbers etc. ...read more.

Middle

Although he works in finance he does not have access to credit details or handle actual payments, he only works this out and these other details (the collection or paying out of money) is handled by the treasurers. He regularly uses a phone that is connected to a main switchboard and every employee bar the cleaners have there own telephone number which is a four digit code and this allows swift contact between employers. As with every other company the councils has to adhere to the Health and Safety at Work Act and as most people suffer with computer related injuries the council has its own department in most buildings to help with this and this graduate has tendonitis in his wrist so he has to have a special cordless mouse which involves all the roller-ball movement being done by his hand, although people who suffer to the extremities have been known to be given voice-recognition software and with this every employee is given flat-screen monitors and anti-glare screen. ...read more.

Conclusion

Home At home he uses a P.c with a 566mhz processor, 64mb RAM, a cd-rw and a 1mb video card, which is used to download mpeg's and mp3's, used as a word processor and to play low-level graphic games. He also has an mp3 player which he brought when mp3 players where relatively new and expensive so 64mb was a lot of songs when they first started. He has a Playstation 2 game console with an eye toy which allows the user to appear in the games and control it with their body movement and it can also be used as a webcam for sending video messages. Unit 3b shows that somebody who grew up when computers where just developing (1970's and 80's) can still be computer literate when they are in a full-time job and this gives him valuable experience against the older generation who are not so experienced. Simon Oldfield ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Policy, Strategy & Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Policy, Strategy & Systems essays

  1. Threats to Organisations and Systems. Describe the countermeasures available to an organisation that ...

    Viruses could be sent via e-mail, the same software if decent enough should wipe out any junk mail before opened. The main problem for Teign and Tow is that if one computer gets infected with one particular bug then being that the computers are networked; all the computer will breakdown one by one of not secured properly.

  2. Intrusions from the Unknown: Importance of Network Security in Today's Environment and Security Issues ...

    The Proxy is basically made for anonymous or "safe" Internet browsing. It works by holding the most commonly accessed and recently viewed website in order to provide quicker downloads for users as pages are stored on the network. This also increase server security as less requests will have to be

  1. Download services

    Shareware - Shareware is a marketing method for commercial software, whereby a trial version is distributed in advance and without payment, as is common for proprietary software (so basically is "try before you buy" software.). Shareware software is obtained free of charge, so people can either getting it by downloading from the Internet or on magazine cover-disks.

  2. Produce a report for the Managing Director of Animal World Magazine outlining different ways ...

    spread quickly across the network to computers * Security fears, hackers might hack into personal details of the company or unauthorised access. * Setting up network is expensive because you need cables, interface cards, server etc * If the cable or interface breaks the whole network will be effected or

  1. The Use of Big IP in Gamer.TV.

    do much more than just maintaining the website, if a problem occurs with the mailing part of the company, such as the weekly newsletter then these four will go and repair it, it depends on how big the job is and how long it will take and if they are already busy.

  2. implementation of an ITC system

    Also a mail merge feature would be extremely useful as they wont have to hand write all the letters them selves, and they can send the same letters to multiple clients. There are many advantages of using ICT methods as appose to manual methods.

  1. Formal Specification, Verification, and Automatic Test Generation of ATM Routing Protocol: PNNI

    Private Network-Network Interface 1.0 The Private Network-Network Interface (PNNI) is a set of protocols that define the dynamic distribution of routing information and the signaling used, once the routing information is complete. These routing protocols are a derivation of protocols used in the Internet.

  2. Building Local Area Networks

    As the shelving system consists mainly of older wooden racks with a few newer steel framed ones, the laptops should have no problem communicating with the server. Blackspots may be a problem at the ends of the shelving racks to the left, mainly because the signal strength will be slightly weaker at that point.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work