• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  • Level: GCSE
  • Subject: ICT
  • Word count: 5122

Examining safety and security - accuracy checks

Extracts from this document...


ELEMENT C4 IS TO EXAMINE SAFETY AND SECURITY ISSUES Accuracy Checks Accuracy checks must be applied to data handling activities. All data that is entered into ANY computer is useless if it is incorrect or inaccurate. A common phrase used in the computer world is 'garbage in, garbage out'. Manual systems lack accuracy checks that are available on computerised systems and so rely heavily on the operator to proof-read and check visually. The purpose of "Accuracy checks", such as a spell-checker on MS WORD is to reduce errors, Although errors are not eliminated completely. Validation "Valid" is another word for suitable. Certain things must be suitable or valid for their purposes. If you insert a Tesco club card into a cash withdrawal machine you will not get a response because it is not VALID for its purpose. So what is the relevance for a computer system? Two very important validation checks are type and range: Type Check In a data base, such as the ones we can use in MS Access, if a field has been designed for numbers, the computer will not accept letters in that field. If a field has been designed to accept a choice of colours - red, blue, green, yellow - it will not accept any other colour in that field. Clearly, it is still possible for the data entry clerk to make errors but some errors will be immediately apparent: Data to be entered Data actually entered Data correct 156 156 156 red red red 156 516 1q red blue purple ( ( but is Accepted because it's of the correct type. Computer immediately signals an error, because 'q' is not a no. ( ( but the choice of blue is accepted because it is included in the list of options - i.e. the correct type. Computer immediately signals an error, because none of the colours listed in the choice above starts with a 'p'. ...read more.


The main worries relate to: * Backache. * Eyestrain. * Headaches and migraine. * RSI - repetitive strain injury. * Radiation, especially if using VDUs when pregnant. These problems can generally be avoided if sensible precautions are taken. Backache This can usually be prevented by suitable seating, good posture and taking a break from time to time. Chairs should: * Be capable of swivelling. * Have a movable base, i.e. castors. * Have an adjustable back rest to give support where needed. In addition an operator should not be expected to sit working at a VDU for hours without a break, and indeed should take responsibility for changing his or her posture - perhaps taking a walk in the lunchbreak to exercise and relieve the muscles. Eye strain/headaches/migraine Problems with eye strain or headaches are likely to occur only if the VDU is fuzzy, flickers or is in a poorly lit position. The EU directives require that: * The screen should not flicker, nor reflect light. * The angle, brightness and contrast of the screen must be adjustable. * Desks and keyboards should have a matt finish to prevent reflection of light and to avoid glare. * Lighting should ensure correct contrast between the screen and the general background. * VDU operators must have the right to a free eye test before commencing VDU work and regularly afterwards. Repetitive strain injury (RSI) RSI is caused by making the same or awkward movements continuously. This problem affects any operators constantly hitting computer keys for long periods. The tendon sheaths in the hand, wrist or arm become inflamed, causing pain, numbness and swelling, which, if untreated, can result in permanent disability. Ironically it is believed that the light touch required by the modern keyboard, compared to the much heavier keys of old-fashioned typewriters, may aggravate the problem. To prevent or reduce the risk of RSI, keyboards should: * Be separate from the VDU. ...read more.


4. This task provides evidence for Communication Core Skills Element 2.1 - take part in discussions. You must prepare for this discussion by researching the following questions: * Why do you think giving away copies of software breaks the copyright law? * Why do you think it is not acceptable to pretend work generated on a computer is yours, even if you do not sell it? * Do you feel the cost of purchasing software, which is often very expensive, has any effect on illegal copying of programs? * Do you feel the copyright laws are too strict, too easy, should be changed in any way? Look for relevant information in computer textbooks, newspaper articles or magazines, making notes which should be handed in to your lecturer after the discussion. Working in pairs: * Explain what information you have obtained. * Explain whether you agree or disagree with the present copyright laws and why. * Be prepared to answer questions. * Note any points raised by your partner which are different from your own, and hand in these notes as well as your original notes. Scenario The manager of 3L (Loose Limbs Leisure) has realised that computerising the system has implications for staff, apart from knowing how to use it. She has asked Computer Consultants Ltd. for advice. In the past such requests were handled simply by giving out a free leaflet with the most basic details, but the company has realised that it could provide a much better service to its clients and also charge fort the information. You and a small team have been asked to prepare a presentation for 3L which, if successful, will be used in future. The presentation must cover the health and safety issues for information technology users and also the obligations of those users (see the range for Element 3.4). You and your colleague are anxious to impress your boss with this project, and take a great deal of trouble with handouts and overhead transparencies. Joanna Giles - 1 - ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Assets table - recording the copyright information on the logos and pictures I used.

    Still movie A tea leaf farmer image S N/A Image that will be used in my still movie For this image I have cropped it and then I have enlarged it so that the target audience can see clearly what it is that I want them to, also this picture

  2. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    example someone tries to hack my computer without me wanting to he could do anything but because of the act he is not lawfully allowed to do this and if he does not follow the law he could be caught.

  1. The Data Protection Act 1998 - questions and answers

    What rights do individuals have? Individuals are given various rights by the 1998 Act in respect of personal data held about them by others. These are: the right to have access to the information (this is known as subject access); the right to prevent processing likely to cause damage or distress; the right to prevent

  2. Car Safety

    The headrest should be at least as high as eye level and as close to the back of the head as possible to provide the best support. Seat Height Adjustment allows the driver to gain the best possible field of vision, safe and easy access to the vehicle's controls and can improve driver comfort resulting in better concentration.

  1. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    Usually, these are kept extremely secure by well-known sites and this is maintained by the Data Protection Act. But shady sites can often steal this information and use it to steal Mr Ajaib's identity, use his details to make their own purchases and other such fraudulent behaviours.

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    This is extremely important because without this specific law, the information which Mr. Obrien communicates through to the organisation he is working at can be retrieved and used by anyone for a lot of diverse purposes which can cause many problems for him.

  1. Data Protection Act

    Compliance with the second Principle cannot be established simply by notification of the purposes for which personal data are processed. The commissioner takes a strict view of the concept of compatibility of processing of personal data. Part II of Schedule I of the Act provides guidance in interpreting the Second Principle.

  2. Critically evaluate the extent to which it can be said that copyright law gives ...

    Although 'artistic quality' was considered an important qualitative necessity in this case, no conclusion was made of a workable test. What was agreed however in this case was that the work must be viewed in a detached an objective manner.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work