• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer Systems Assignment 3

Extracts from this document...

Introduction

Computer Systems Assignment 3 Task 1 Regarding the Data Protection Act: a) Fairly and lawfully processed data is data which has been obtained without duress and with the permission of the person who has provided that information. As a qualified IT expert, I have embarked on a verbal contract with my client to keep the information he provides safe and use reasonable protection methods, e.g., for medium sensitive data, it is not necessary to have extreme security measures in place, such as for online banking. As part of this promise, I am obliged to use the information provided by the client only for the purpose for which it was stated at the time of receipt. It would be fair for me to ask my client for their name, address, contact details, age, date of birth and whether they would require a filtering system to protect their children, to keep inappropriate sites away from them. It would also be necessary to ask for bank details (for the purposes of payment of this service) which would require higher security measures which would need to be implemented into my firm's data base. Some of the ways of securing data is encryption and making sure no one person knows the encryption code in full or having security firms protecting the premises at night. b) Accurate and up to date data is data which is correct at this moment in time which is data that is continuously modified as data changes, e.g., when someone turns 18, they are put on the electoral register automatically. ...read more.

Middle

There are such things as Firewalls, encryption, data tampering detection programmes and there are physical things you can do, such as 24 hour security, making sure every person in your organisation knows the face of every other person who works there, so no stranger could be there, having gait recognition which identifies a person from their walk, and you can have iris protection, finger-print scanners, number locks and good old-fashioned ordinary locks and within all this protection, you can have pressure-sensored floors and whatever they have in the real world that you see in Hollywood, like laser beam protection. You can have hard-drives bolted to the floor, you can have hard-drives encrypted and ones that will self-destruct if they are moved out of a certain area, eg, if they lose blu-tooth signal. Obviously, domestic homes and small businesses would not be able to afford such sophisticated and expensive deterents. Regarding the Computer Misuse Act: a) A hacker may want to access my computer without my permission to steal information for his financial gain and knows that I would not give this information willingly and knowingly. People do this because it is easy and may have large financial rewards. Some people are only good at this or may not have had opportunities to do anything else, so, therefore, they may be stuck in this job and may want to get out of it, but can't. b) There are crimes that outrage people which can be committed on a computer and you can organise criminal gangs, or terrorist groups online. ...read more.

Conclusion

was failed by the educational system, leaving school without qualifications and this was the only way he could see to make money. By closing all private schools and telling the parents of those pupils prepared to pay private fees, to pay the government instead to improve the state education system or improve run-down schools. Data theft Mint.com has thousands of people's bank details from all banks but not any more due to the thefts of data The situation occurred by someone paying off security guards and someone who had the encryption code, and then they got in and stole the hard drives. This could be prevented by giving bonuses to staff members who do good deeds or a good job so they feel valued and avoid turning to the dark side. Hacking The US State official website has been defaced This situation arose after America alienated some people who then got revenge by indulging in some eGraffiti This could be prevented by stopping Americans alienating anybody, but this is not probable. More likely, would be to improve the US State Firewall Media failure On the 6th May at 10pm, so many people log onto the BBC's website to see who won the election that it crashes. This problem started when everyone wanted to see who won the election and the website couldn't cope with 60 million people at once. This could be prevented by increasing the BBC's bandwidth on special occasions like the election. ?? ?? ?? ?? Joe Alt Saturday, 30 October 2010 Computer Systems Assignment 3 Page 1 of 4 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE ICT Systems and Application section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE ICT Systems and Application essays

  1. Creating a computer system for a video rental shop

    * Digital scales (for weighing parcels) - so weights have been calculated accurately * Computer mouse - to select different function options. * Screen Touch Screen - to speed up the input of data and other functions within the database system.

  2. Use of IT in schools

    * The possibility of distance learning exists. Students can do their work online, and send it to their teacher. * Through the use of private networks, schools are able to share resources, and communication links are improved. * There are many benefits to the administration side of the school - all data can be stored on computer,

  1. Computer Systems Assignment 2

    There is a button on the task bar just near the clock to show the desktop. You can customise your PC in such ways so that you can automatically change your background from once every 10 seconds to once a day.

  2. task2-report-template 3

    index box and written be hand to the letter along with the laptop details. In actual fact this takes a long time and as letters are written by hand it is difficult to read it which sometime can lead to mistakes.

  1. Uses of ICTY in the NewVIc College

    * Free access to the internet for students and staff. * Nursery at our Stratford site, with staff discounts * Staff area with catering facilities. * One of the largest sports halls in east London and a multi-gym. It's Location(s): 1.

  2. Why is accuracy so important on a website?

    This is a speedy method in the long term as it stops you having to look through all your data for one error when you have typed an incorrect piece of data you alerted straight away. Format Check This checks that the value that has been entered is of a certain arrangement which is required.

  1. IT Coursework~The importing of clothing are too slow at the moment, especially jeans.

    The shop assistance has made mistakes with the calculations in the past and he has lost valuable revenue, there are data validations in the system, this will stop any wrong input data. Analysis Results of discussion with user Output Requirements Shop name/ Address of the shop/ Telephone Customer Name (First/Surname)

  2. This system is to be used by members of staff to access information about ...

    The new member or trainer could fill out a form when joining which will then be copied and saved under files in the office/reception at the gym. Possible IT Solutions An alternative solution would be to use spreadsheet software to log all the members and trainers' details.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work