• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The impact of ICT on an adult in full-time employment and the effects on his/her working style

Extracts from this document...

Introduction

The impact of ICT on an adult in full-time employment and the effects on his/her working style The person that I interviewed is a recent graduate, he has been living in Stafford for less than a year and works for the County Council in the financial area of Social Services. Work His work wholly revolves around I.T, mainly using financial system's, the Internet of which the majority is e-mail, Microsoft Word, Excel and Outlook Express. All the computers are run off servers which are most probably similar to the ones used in our school and the Internet is run through an Intranet (the Internet run through a network) which also runs the website which is used for people to find out about everything the council does from charity funding to social care for fostering and domiciliary patients, it also contains phone numbers etc. ...read more.

Middle

Although he works in finance he does not have access to credit details or handle actual payments, he only works this out and these other details (the collection or paying out of money) is handled by the treasurers. He regularly uses a phone that is connected to a main switchboard and every employee bar the cleaners have there own telephone number which is a four digit code and this allows swift contact between employers. As with every other company the councils has to adhere to the Health and Safety at Work Act and as most people suffer with computer related injuries the council has its own department in most buildings to help with this and this graduate has tendonitis in his wrist so he has to have a special cordless mouse which involves all the roller-ball movement being done by his hand, although people who suffer to the extremities have been known to be given voice-recognition software and with this every employee is given flat-screen monitors and anti-glare screen. ...read more.

Conclusion

Home At home he uses a P.c with a 566mhz processor, 64mb RAM, a cd-rw and a 1mb video card, which is used to download mpeg's and mp3's, used as a word processor and to play low-level graphic games. He also has an mp3 player which he brought when mp3 players where relatively new and expensive so 64mb was a lot of songs when they first started. He has a Playstation 2 game console with an eye toy which allows the user to appear in the games and control it with their body movement and it can also be used as a webcam for sending video messages. Unit 3b shows that somebody who grew up when computers where just developing (1970's and 80's) can still be computer literate when they are in a full-time job and this gives him valuable experience against the older generation who are not so experienced. Simon Oldfield ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Policy, Strategy & Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Policy, Strategy & Systems essays

  1. Download services

    Shareware can separate into 2 different kind of version which is trial version and full version. Trial version is "try before buy" so it only has the basic function of software, if people would like the full function of software, they need to register or purchase it.

  2. Threats to Organisations and Systems. Describe the countermeasures available to an organisation that ...

    Viruses could be sent via e-mail, the same software if decent enough should wipe out any junk mail before opened. The main problem for Teign and Tow is that if one computer gets infected with one particular bug then being that the computers are networked; all the computer will breakdown one by one of not secured properly.

  1. implementation of an ITC system

    because of their large number of clients. It also specialises in real time data base development which is one of the key features needed by BlackBurry's Ltd. Suitable specifications for a desktop for this business, taking in account that a large percentage of their systems will only be used for

  2. Building Local Area Networks

    This adapter supports high-speed wireless networking of up to 54Mbps, while providing seamless interoperability with all existing 802.11b and 802.11b+ wireless equipment. Together with better security, this adapter is the ideal wireless solution that offers an upgrade to a fast, new technology while protecting your past investments through interoperability with your current network equipment.

  1. Formal Specification, Verification, and Automatic Test Generation of ATM Routing Protocol: PNNI

    The Hello protocol operates on a per link basis. 2.2 Database Synchronization and Flooding The Database Synchronization protocol's purpose is to distribute the currently known routing information between two neighboring nodes that are in the same peer group. When the database synchronization process is complete both neighboring nodes will have exactly the same routing information.

  2. Produce a report for the Managing Director of Animal World Magazine outlining different ways ...

    Its expensive because of the large number of cables and connections required o Complicated o Difficult to install o Difficult to manage o Difficult to troubleshoot Details of Mesh Topology Topology Cable Connector Hardware Software Protocol Single Point Failure Mesh CAT5 RJ45 - C/S Ethernet - Ethernet Cable Summary Specification

  1. The Use of Big IP in Gamer.TV.

    They also host their own Website and maintain it whilst monitoring their parent company's Website and a few minor companies along with it. They direct and produce a game review program, that is aired once a week on a Wednesday, this basically gives true gamers an insight into new games and cheats that are available.

  2. Local area networks (LANs).

    but are susceptible to obstructions such as rain, fog, dust, and of course, walls. Radio frequency systems use low power spread spectrum transmission that, in many cases, can penetrate walls. Because they are radio frequencies they can be detected by someone with sensitive equipment and can be interfered with.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work