• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

File management and standard ways of working.

Extracts from this document...


Keep information secure, e.g. from theft, loss, viruses, fire You should keep information secured from theft on hard disc failures; you can also keep your information safe from viruses that can wipe all your files off the computer. The way to keep the information safe is to have a BACK-UP file. A back-up file is a file that has all saved work on it and can be saved under a different name in a different folder or can be saved onto a disc. A floppy disc can also transfer up to 1.44 megabytes of data between computers. You can use hard discs for back-ups because the surface of the disc stores data digitally, CD-ROMs are read only optical discs, DVD's can hold up to 17 gigabytes of data, Magnetic Tapes are the most common used for back-up devices and Zip or Jaz disc the common removable media all these be used as back-up devices. We do back-ups so that any lost information that is important we can have a mirror copy of the document saved somewhere else so that nothing will happen to it. The backups should be used with passwords, username. I think backup are helpful because if the computer had a power failure and I haven't saved my work then it means I would have to do all the again, which means it would take longer then what it would have been if I had saved it in the fist place. ...read more.


You should save work under different file names because when you go to open up your work up, you know what folder it is in and what the name of the document you need is called. If you know what the name of the document is and what folder it is in you will soon be able to call that work up that is need faster, than having to look at though your folders and every piece of work you have to find out what it is you need. Keep dated backup copies of files in another location You should keep backup copies in other locations to prevent them from being destroyed, as you would have lost the main and the back up copies of the document you have been doing. By keeping dated backup copies of files in other locations, if anything did go wrong you will have the back up document spare to work from instead. Manage your work effectively, e.g. use appropriate filenames and locations By using appropriate filenames when saving your work, you will have effectively put it into a different location. Most operating systems such as Windows XP, divide a backing storage device up into directories. A directory can also be known as a ROOT DIRECTORY. ...read more.


* Data should not be transferred around, except to certain other European countries. Copyright, Design and patents act This act makes the copying of computer software, or software piracy, a criminal offence. The act covers the following activities:- ==> Stealing software ==> Using illegally copied software and manuals ==> Running purchased software on two or more machines at the same time, without an appropriate licence bought from the software supplier. The Regulation of Investigatory power act 2000 The Regulation of Investigatory power act 2000 is also called RIPA for short. The RIPA allows the government to access a person's electronic communications in a very unrestricted manner. Though infringing in the privacy of their Correspondence in a manner many would not tolerate regarding their postal communications. The act is:- * Enables the government to demand that an ISP provides access to a customer's communications with out them knowing. * Enables mass surveillance of communications in transit. * Enables the government to demand ISP's fit the equipment to facilitate surveillance. * Enables to demand that someone hands over keys to protected information. * Allows government to monitor people's internet activities. * Prevents the existence of interception warrants and any data collected with them from being revealed in court. Health and Safety This act relates to what I have said on page 4 under Work safely, e.g. use the correct position for the monitor and chair, Avoid trailing cables, and take regular breaks. 1 Nicola Bryant 10B 10/2 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    Evaluation: These laws affect the community in many ways such as if the library decides to use a software without a license or even decides to share the software with other people or onto other computers even knowing that it should be used for one computer the library will face trouble as it is not following the law.

  2. The Data Protection Act 1998 - questions and answers

    the recipient country ensures an adequate level of protection for the rights and freedoms of Data Subjects in relation to the processing of Personal Data.

  1. Car Safety

    Although safety belts cannot stop forward movement completely, new technology designed as part of the vehicle's frontal impact protection system can further improve their effectiveness at restraining occupants. * Webbing clamps grab the safety belt webbing to prevent more of the safety belt reeling out as it tightens on the spool in a crash.

  2. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    This is a good way to avoid viruses. Hotmail also virus scans every attachment before sending them off. However, some can still go through. I have to use my personal judgement to realise what's real and what's not. While this may not be efficient, it is quite helpful for me

  1. 3E-The legislation that protects individuals and groups from the misuse of ICT

    Consequently, the law has a drawback upon the protection of Maria's personal data. The money that she has kept in her bank account can be extorted by a clever PC worker from her credit car details without living a trace or proof for Maria to identify how and when this specific event has occurred.

  2. Data Protection Act

    The information obtained from either the data subject or a third party they had done all they could reasonably have done to ensure the accuracy of the data at the time. The second part of the principle which refers to keeping data up to date is qualified.

  1. Right of privacy under Hong Kong's current laws

    A claimant can establish a cause of action for nuisance against a journalist who disturbs the free use of his/her property. Examples are the act of harassing telephone calls or prolonged encampment outside a private residence. Breach of contract is another branch of common law enforceable against a journalist who discloses information against his/her contractual agreement with another party.

  2. You have to explain how you have looked after the equipment and ensured its ...

    Obvious names should also not be used. Many large systems use software to limit each user's access to only those files that are needed for the performance of their particular job; just like the system we have in our school.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work