• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The impact of ICT on an adult in full-time employment and the effects on his/her working style

Extracts from this document...


The impact of ICT on an adult in full-time employment and the effects on his/her working style The person that I interviewed is a recent graduate, he has been living in Stafford for less than a year and works for the County Council in the financial area of Social Services. Work His work wholly revolves around I.T, mainly using financial system's, the Internet of which the majority is e-mail, Microsoft Word, Excel and Outlook Express. All the computers are run off servers which are most probably similar to the ones used in our school and the Internet is run through an Intranet (the Internet run through a network) which also runs the website which is used for people to find out about everything the council does from charity funding to social care for fostering and domiciliary patients, it also contains phone numbers etc. ...read more.


Although he works in finance he does not have access to credit details or handle actual payments, he only works this out and these other details (the collection or paying out of money) is handled by the treasurers. He regularly uses a phone that is connected to a main switchboard and every employee bar the cleaners have there own telephone number which is a four digit code and this allows swift contact between employers. As with every other company the councils has to adhere to the Health and Safety at Work Act and as most people suffer with computer related injuries the council has its own department in most buildings to help with this and this graduate has tendonitis in his wrist so he has to have a special cordless mouse which involves all the roller-ball movement being done by his hand, although people who suffer to the extremities have been known to be given voice-recognition software and with this every employee is given flat-screen monitors and anti-glare screen. ...read more.


Home At home he uses a P.c with a 566mhz processor, 64mb RAM, a cd-rw and a 1mb video card, which is used to download mpeg's and mp3's, used as a word processor and to play low-level graphic games. He also has an mp3 player which he brought when mp3 players where relatively new and expensive so 64mb was a lot of songs when they first started. He has a Playstation 2 game console with an eye toy which allows the user to appear in the games and control it with their body movement and it can also be used as a webcam for sending video messages. Unit 3b shows that somebody who grew up when computers where just developing (1970's and 80's) can still be computer literate when they are in a full-time job and this gives him valuable experience against the older generation who are not so experienced. Simon Oldfield ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Policy, Strategy & Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Policy, Strategy & Systems essays

  1. Threats to Organisations and Systems. Describe the countermeasures available to an organisation that ...

    Viruses could be sent via e-mail, the same software if decent enough should wipe out any junk mail before opened. The main problem for Teign and Tow is that if one computer gets infected with one particular bug then being that the computers are networked; all the computer will breakdown one by one of not secured properly.

  2. Download services

    The software which let users can tries it before they buy are also been known as demoware and trialware. But most of the software's license will expire on limit of 30day or not contain all the function of the software should have.

  1. Produce a report for the Managing Director of Animal World Magazine outlining different ways ...

    Limited functionality * Limited security and encryption * Performance limited by hardware Circuit switching Circuit switched is a type of network that is dedicated for a single connection. It creates an end-to-end circuit between the sending and receiving computers. It allows you to communicate one at a time because circuit switched is a single line connection.

  2. Intrusions from the Unknown: Importance of Network Security in Today's Environment and Security Issues ...

    On the other side you have the private network such as a corporate network that must be protected against any damaging action. There are a number of different types of firewalls such as packet filters, application proxy (application gateway), Dual-Homed and Tri-Homed firewalls.

  1. The Use of Big IP in Gamer.TV.

    Systems Administrator I followed was Dave, but there are more Systems Administrators in the company who look after everything they also advise on what software could solve particular problems within the company. The four Systems Administrators who look after the Website (Dave, Gary, Reece and Amy)

  2. Formal Specification, Verification, and Automatic Test Generation of ATM Routing Protocol: PNNI

    Private Network-Network Interface 1.0 The Private Network-Network Interface (PNNI) is a set of protocols that define the dynamic distribution of routing information and the signaling used, once the routing information is complete. These routing protocols are a derivation of protocols used in the Internet.

  1. implementation of an ITC system

    Only the persons sending and receiving the information have the key and this makes it unreadable to anyone except the intended recipient.) I have suggested a real time database development, in which they can all work on a database, and save it to the same location, or save a local copy and merge it at a later time.

  2. Building Local Area Networks

    The presence of blackspots could potentially cause irreversible data loss, as users roam within the WLAN infrastructure. The signal strength of an individual waveform will diminish according to the distance traveled. The loss of signal strength should follow the 1/d2 law, where d is the distance between the transmitter and the receiver.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work