• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

File management and standard ways of working.

Extracts from this document...


Keep information secure, e.g. from theft, loss, viruses, fire You should keep information secured from theft on hard disc failures; you can also keep your information safe from viruses that can wipe all your files off the computer. The way to keep the information safe is to have a BACK-UP file. A back-up file is a file that has all saved work on it and can be saved under a different name in a different folder or can be saved onto a disc. A floppy disc can also transfer up to 1.44 megabytes of data between computers. You can use hard discs for back-ups because the surface of the disc stores data digitally, CD-ROMs are read only optical discs, DVD's can hold up to 17 gigabytes of data, Magnetic Tapes are the most common used for back-up devices and Zip or Jaz disc the common removable media all these be used as back-up devices. We do back-ups so that any lost information that is important we can have a mirror copy of the document saved somewhere else so that nothing will happen to it. The backups should be used with passwords, username. I think backup are helpful because if the computer had a power failure and I haven't saved my work then it means I would have to do all the again, which means it would take longer then what it would have been if I had saved it in the fist place. ...read more.


You should save work under different file names because when you go to open up your work up, you know what folder it is in and what the name of the document you need is called. If you know what the name of the document is and what folder it is in you will soon be able to call that work up that is need faster, than having to look at though your folders and every piece of work you have to find out what it is you need. Keep dated backup copies of files in another location You should keep backup copies in other locations to prevent them from being destroyed, as you would have lost the main and the back up copies of the document you have been doing. By keeping dated backup copies of files in other locations, if anything did go wrong you will have the back up document spare to work from instead. Manage your work effectively, e.g. use appropriate filenames and locations By using appropriate filenames when saving your work, you will have effectively put it into a different location. Most operating systems such as Windows XP, divide a backing storage device up into directories. A directory can also be known as a ROOT DIRECTORY. ...read more.


* Data should not be transferred around, except to certain other European countries. Copyright, Design and patents act This act makes the copying of computer software, or software piracy, a criminal offence. The act covers the following activities:- ==> Stealing software ==> Using illegally copied software and manuals ==> Running purchased software on two or more machines at the same time, without an appropriate licence bought from the software supplier. The Regulation of Investigatory power act 2000 The Regulation of Investigatory power act 2000 is also called RIPA for short. The RIPA allows the government to access a person's electronic communications in a very unrestricted manner. Though infringing in the privacy of their Correspondence in a manner many would not tolerate regarding their postal communications. The act is:- * Enables the government to demand that an ISP provides access to a customer's communications with out them knowing. * Enables mass surveillance of communications in transit. * Enables the government to demand ISP's fit the equipment to facilitate surveillance. * Enables to demand that someone hands over keys to protected information. * Allows government to monitor people's internet activities. * Prevents the existence of interception warrants and any data collected with them from being revealed in court. Health and Safety This act relates to what I have said on page 4 under Work safely, e.g. use the correct position for the monitor and chair, Avoid trailing cables, and take regular breaks. 1 Nicola Bryant 10B 10/2 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Peer reviewed

    The Main Features and Difficulties Regarding the Regulation of E-Commerce

    4 star(s)

    However, the enactment of this directive is left upon member states. Moreover, there is no working mechanism on how to ensure the enforcement of this directive. European Union's attempt to create legislation regulating the protection of data requires international co-operation.

  2. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    Evaluation: These laws affect the community in many ways such as if the library decides to use a software without a license or even decides to share the software with other people or onto other computers even knowing that it should be used for one computer the library will face trouble as it is not following the law.

  1. Data Protection Act

    as a public body, hold that information and if so, be supplied with it. 'Public authorities' are defined in the Act and include universities, further education colleges, maintained schools and nurseries. The Freedom of Information Act promotes greater openness and accountability across the public sector.

  2. The Data Protection Act 1998 - questions and answers

    the recipient country ensures an adequate level of protection for the rights and freedoms of Data Subjects in relation to the processing of Personal Data.

  1. 3E-The legislation that protects individuals and groups from the misuse of ICT

    Highly sophisticated encryption shall be needed for the data which are crucial and important. Therefore not all data will need to be highly secured and is something that should be mentioned in this specific law. Overall, I strongly believe that the pros prevail over the cons because the law keeps

  2. Leaflet design for Finding Nemo.

    longer, cannot be mass produces easily, the manufacture may not be a great artist, it may not look smarter, and mainly it doesn't look as professional. I have looked at my information and came to these concluded points; I will use publisher for my leaflet, as it had no disadvantages

  1. Privacy and Data Protection: IT Law

    Negotiations on the drafting of the Safe Harbor principles lasted nearly two years and were the subject of bitter criticism by privacy and consumer advocates67. Although the EU Parliament voted for re-negotiation68, the Commission approved the agreement69. The Commission did, however, promise to re-open negotiations on the arrangement if the remedies available to European citizens proved inadequate.

  2. Legal Aspects of Using Information Technology

    Although the Act prevents offenders copying software, more and more people are violating the law and are getting away with it. As a result, there are two organisations that aim to stop software being copied. The two organisations are: * The Federation Against Software Theft (FAST)- this is a non-profit

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work