• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer Systems Assignment 3

Extracts from this document...


Computer Systems Assignment 3 Task 1 Regarding the Data Protection Act: a) Fairly and lawfully processed data is data which has been obtained without duress and with the permission of the person who has provided that information. As a qualified IT expert, I have embarked on a verbal contract with my client to keep the information he provides safe and use reasonable protection methods, e.g., for medium sensitive data, it is not necessary to have extreme security measures in place, such as for online banking. As part of this promise, I am obliged to use the information provided by the client only for the purpose for which it was stated at the time of receipt. It would be fair for me to ask my client for their name, address, contact details, age, date of birth and whether they would require a filtering system to protect their children, to keep inappropriate sites away from them. It would also be necessary to ask for bank details (for the purposes of payment of this service) which would require higher security measures which would need to be implemented into my firm's data base. Some of the ways of securing data is encryption and making sure no one person knows the encryption code in full or having security firms protecting the premises at night. b) Accurate and up to date data is data which is correct at this moment in time which is data that is continuously modified as data changes, e.g., when someone turns 18, they are put on the electoral register automatically. ...read more.


There are such things as Firewalls, encryption, data tampering detection programmes and there are physical things you can do, such as 24 hour security, making sure every person in your organisation knows the face of every other person who works there, so no stranger could be there, having gait recognition which identifies a person from their walk, and you can have iris protection, finger-print scanners, number locks and good old-fashioned ordinary locks and within all this protection, you can have pressure-sensored floors and whatever they have in the real world that you see in Hollywood, like laser beam protection. You can have hard-drives bolted to the floor, you can have hard-drives encrypted and ones that will self-destruct if they are moved out of a certain area, eg, if they lose blu-tooth signal. Obviously, domestic homes and small businesses would not be able to afford such sophisticated and expensive deterents. Regarding the Computer Misuse Act: a) A hacker may want to access my computer without my permission to steal information for his financial gain and knows that I would not give this information willingly and knowingly. People do this because it is easy and may have large financial rewards. Some people are only good at this or may not have had opportunities to do anything else, so, therefore, they may be stuck in this job and may want to get out of it, but can't. b) There are crimes that outrage people which can be committed on a computer and you can organise criminal gangs, or terrorist groups online. ...read more.


was failed by the educational system, leaving school without qualifications and this was the only way he could see to make money. By closing all private schools and telling the parents of those pupils prepared to pay private fees, to pay the government instead to improve the state education system or improve run-down schools. Data theft Mint.com has thousands of people's bank details from all banks but not any more due to the thefts of data The situation occurred by someone paying off security guards and someone who had the encryption code, and then they got in and stole the hard drives. This could be prevented by giving bonuses to staff members who do good deeds or a good job so they feel valued and avoid turning to the dark side. Hacking The US State official website has been defaced This situation arose after America alienated some people who then got revenge by indulging in some eGraffiti This could be prevented by stopping Americans alienating anybody, but this is not probable. More likely, would be to improve the US State Firewall Media failure On the 6th May at 10pm, so many people log onto the BBC's website to see who won the election that it crashes. This problem started when everyone wanted to see who won the election and the website couldn't cope with 60 million people at once. This could be prevented by increasing the BBC's bandwidth on special occasions like the election. ?? ?? ?? ?? Joe Alt Saturday, 30 October 2010 Computer Systems Assignment 3 Page 1 of 4 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE ICT Systems and Application section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE ICT Systems and Application essays

  1. Use of IT in schools

    When writing a report about the use of ICT in education, I believe it imperative to firstly consider why ICT is used in education. Therefore, this is my first angle of approach. To consider this angle of approach, I must first think about the educational system before any ICT systems were introduced.

  2. Creating a computer system for a video rental shop

    Problem Definition - the problem will be defined by the user 2. Feasibility Study - investigate the system and decide if there is need for a new system 3. Analysis - analyse the requirements and produce a specification 4.

  1. Computer Systems Assignment 2

    There is a button on the task bar just near the clock to show the desktop. You can customise your PC in such ways so that you can automatically change your background from once every 10 seconds to once a day.

  2. task2-report-template 3

    For each customer they need to see a list of information about customers: * Title * Name * Address * Home telephone * Mobile telephone * Order date * Laptop ordered 2.2 Use Methods of Collecting Information [4 Marks] 2.2.1 Information Collected [1] This is the letter I sent to

  1. Creating a computer system.

    This disadvantage is that it might be difficult to read the writing afterwards and there is a greater chance of human error. All the invoices (produced by hand), which are given to the customers are copied, and filed in a ring binder for the business's use.

  2. Why is accuracy so important on a website?

    The user is encouraged to read the data and confirm that it has been entered correctly. If the user has entered any data incorrectly they will respond by retyping the incorrect data and correcting it. This is an accurate method as most of the time most people do not read

  1. Creating a computer system for a mobile phone shop.

    It will have to aid the user with input by providing "masks" that make it easier to enter data. For example when entering a customer's post code... 6. Needs to create reports which show:- * All the customer's details * A specific customers details (for the Data Protection Act)

  2. Solving the reprographics problem at St.Mary's College.

    > Macros should make it a click of a button to produce printouts of record sheets. > Possible to update books using macros in less than a second. -Calculations ? > Accuracy of the totals when it comes to complicated calculation such as adding the total spent for each month

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work