• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer Systems Assignment 3

Extracts from this document...


Computer Systems Assignment 3 Task 1 Regarding the Data Protection Act: a) Fairly and lawfully processed data is data which has been obtained without duress and with the permission of the person who has provided that information. As a qualified IT expert, I have embarked on a verbal contract with my client to keep the information he provides safe and use reasonable protection methods, e.g., for medium sensitive data, it is not necessary to have extreme security measures in place, such as for online banking. As part of this promise, I am obliged to use the information provided by the client only for the purpose for which it was stated at the time of receipt. It would be fair for me to ask my client for their name, address, contact details, age, date of birth and whether they would require a filtering system to protect their children, to keep inappropriate sites away from them. It would also be necessary to ask for bank details (for the purposes of payment of this service) which would require higher security measures which would need to be implemented into my firm's data base. Some of the ways of securing data is encryption and making sure no one person knows the encryption code in full or having security firms protecting the premises at night. b) Accurate and up to date data is data which is correct at this moment in time which is data that is continuously modified as data changes, e.g., when someone turns 18, they are put on the electoral register automatically. ...read more.


There are such things as Firewalls, encryption, data tampering detection programmes and there are physical things you can do, such as 24 hour security, making sure every person in your organisation knows the face of every other person who works there, so no stranger could be there, having gait recognition which identifies a person from their walk, and you can have iris protection, finger-print scanners, number locks and good old-fashioned ordinary locks and within all this protection, you can have pressure-sensored floors and whatever they have in the real world that you see in Hollywood, like laser beam protection. You can have hard-drives bolted to the floor, you can have hard-drives encrypted and ones that will self-destruct if they are moved out of a certain area, eg, if they lose blu-tooth signal. Obviously, domestic homes and small businesses would not be able to afford such sophisticated and expensive deterents. Regarding the Computer Misuse Act: a) A hacker may want to access my computer without my permission to steal information for his financial gain and knows that I would not give this information willingly and knowingly. People do this because it is easy and may have large financial rewards. Some people are only good at this or may not have had opportunities to do anything else, so, therefore, they may be stuck in this job and may want to get out of it, but can't. b) There are crimes that outrage people which can be committed on a computer and you can organise criminal gangs, or terrorist groups online. ...read more.


was failed by the educational system, leaving school without qualifications and this was the only way he could see to make money. By closing all private schools and telling the parents of those pupils prepared to pay private fees, to pay the government instead to improve the state education system or improve run-down schools. Data theft Mint.com has thousands of people's bank details from all banks but not any more due to the thefts of data The situation occurred by someone paying off security guards and someone who had the encryption code, and then they got in and stole the hard drives. This could be prevented by giving bonuses to staff members who do good deeds or a good job so they feel valued and avoid turning to the dark side. Hacking The US State official website has been defaced This situation arose after America alienated some people who then got revenge by indulging in some eGraffiti This could be prevented by stopping Americans alienating anybody, but this is not probable. More likely, would be to improve the US State Firewall Media failure On the 6th May at 10pm, so many people log onto the BBC's website to see who won the election that it crashes. This problem started when everyone wanted to see who won the election and the website couldn't cope with 60 million people at once. This could be prevented by increasing the BBC's bandwidth on special occasions like the election. ?? ?? ?? ?? Joe Alt Saturday, 30 October 2010 Computer Systems Assignment 3 Page 1 of 4 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE ICT Systems and Application section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE ICT Systems and Application essays

  1. Computer Systems Assignment 2

    There is a button on the task bar just near the clock to show the desktop. You can customise your PC in such ways so that you can automatically change your background from once every 10 seconds to once a day.

  2. task2-report-template 3

    * Customer details * Laptop details * Missing data The users need to be able to find laptop details when it needed for any reason easily. The users need to see a list of this information: * Model * Brand * Processor Type * Memory Size * Memory Type *

  1. Uses of ICTY in the NewVIc College

    * Free access to the internet for students and staff. * Nursery at our Stratford site, with staff discounts * Staff area with catering facilities. * One of the largest sports halls in east London and a multi-gym. It's Location(s): 1.

  2. Why is accuracy so important on a website?

    This is a speedy method in the long term as it stops you having to look through all your data for one error when you have typed an incorrect piece of data you alerted straight away. Format Check This checks that the value that has been entered is of a certain arrangement which is required.

  1. IT Coursework~The importing of clothing are too slow at the moment, especially jeans.

    The shop assistance has made mistakes with the calculations in the past and he has lost valuable revenue, there are data validations in the system, this will stop any wrong input data. Analysis Results of discussion with user Output Requirements Shop name/ Address of the shop/ Telephone Customer Name (First/Surname)

  2. This system is to be used by members of staff to access information about ...

    If the membership rates were included in the data then you could use the spreadsheet to automatically calculate their monthly or annual bill for their membership to the club. Another solution is to use database software to store the details of the club's members and staff.

  1. Creating a computer system for Divine foods

    Problems with filing Mrs. Rachel operates on the manual file based system; therefore she finds it very difficult to keep her customer's details. She finds it very difficult to make quick reference to her customer's details. Sometimes she misplaces her customer files or she forgets where she keeps them due to the large amount of work involved in her business.

  2. Creating a computer system for a video rental shop

    Also I contacted Abdullah by telephone and e-mail to pick up certain points. Topics for discussion: * The reasons for requiring the new information system * The problems with the current manual system * The methods currently used to record data * The information that needs to be kept in

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work