• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

File management and standard ways of working.

Extracts from this document...


Keep information secure, e.g. from theft, loss, viruses, fire You should keep information secured from theft on hard disc failures; you can also keep your information safe from viruses that can wipe all your files off the computer. The way to keep the information safe is to have a BACK-UP file. A back-up file is a file that has all saved work on it and can be saved under a different name in a different folder or can be saved onto a disc. A floppy disc can also transfer up to 1.44 megabytes of data between computers. You can use hard discs for back-ups because the surface of the disc stores data digitally, CD-ROMs are read only optical discs, DVD's can hold up to 17 gigabytes of data, Magnetic Tapes are the most common used for back-up devices and Zip or Jaz disc the common removable media all these be used as back-up devices. We do back-ups so that any lost information that is important we can have a mirror copy of the document saved somewhere else so that nothing will happen to it. The backups should be used with passwords, username. I think backup are helpful because if the computer had a power failure and I haven't saved my work then it means I would have to do all the again, which means it would take longer then what it would have been if I had saved it in the fist place. ...read more.


You should save work under different file names because when you go to open up your work up, you know what folder it is in and what the name of the document you need is called. If you know what the name of the document is and what folder it is in you will soon be able to call that work up that is need faster, than having to look at though your folders and every piece of work you have to find out what it is you need. Keep dated backup copies of files in another location You should keep backup copies in other locations to prevent them from being destroyed, as you would have lost the main and the back up copies of the document you have been doing. By keeping dated backup copies of files in other locations, if anything did go wrong you will have the back up document spare to work from instead. Manage your work effectively, e.g. use appropriate filenames and locations By using appropriate filenames when saving your work, you will have effectively put it into a different location. Most operating systems such as Windows XP, divide a backing storage device up into directories. A directory can also be known as a ROOT DIRECTORY. ...read more.


* Data should not be transferred around, except to certain other European countries. Copyright, Design and patents act This act makes the copying of computer software, or software piracy, a criminal offence. The act covers the following activities:- ==> Stealing software ==> Using illegally copied software and manuals ==> Running purchased software on two or more machines at the same time, without an appropriate licence bought from the software supplier. The Regulation of Investigatory power act 2000 The Regulation of Investigatory power act 2000 is also called RIPA for short. The RIPA allows the government to access a person's electronic communications in a very unrestricted manner. Though infringing in the privacy of their Correspondence in a manner many would not tolerate regarding their postal communications. The act is:- * Enables the government to demand that an ISP provides access to a customer's communications with out them knowing. * Enables mass surveillance of communications in transit. * Enables the government to demand ISP's fit the equipment to facilitate surveillance. * Enables to demand that someone hands over keys to protected information. * Allows government to monitor people's internet activities. * Prevents the existence of interception warrants and any data collected with them from being revealed in court. Health and Safety This act relates to what I have said on page 4 under Work safely, e.g. use the correct position for the monitor and chair, Avoid trailing cables, and take regular breaks. 1 Nicola Bryant 10B 10/2 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. The Data Protection Act 1998 - questions and answers

    the recipient country ensures an adequate level of protection for the rights and freedoms of Data Subjects in relation to the processing of Personal Data.

  2. Data Protection Act

    as a public body, hold that information and if so, be supplied with it. 'Public authorities' are defined in the Act and include universities, further education colleges, maintained schools and nurseries. The Freedom of Information Act promotes greater openness and accountability across the public sector.

  1. Car Safety

    * Pretensioners use a spring, compressed gas or small explosive charge that activates on impact to pull the safety belt tight before the occupant starts to move. * Unloaders allow the safety belt to slacken in a controlled way so the wearer can slow progressively while still being safely restrained.

  2. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    * Downloading text or images from the internet and using them without permission or acknowledgement * Copying a computer program * Copying music * Sharing music files that you have copied * Downloading files from file sharing services (such as Kazzaa)

  1. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    How does it affect: 3A - Technology used by myself Internet I use the internet almost every day. While the internet is quite safe to use nowadays with updated security in browsers and notifications on phishing sites, sites holding any potential threat or risk or sites with a bad reputation.

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    of hackers as this is mentioned in this specific law and need to be pursued by any organisation. Conversely, if she finds that her credit card details was unable to be kept private; she can sue the company that she is purchasing her product from i.e.

  1. The legislation that protects individuals and groups from the misuse of ICT

    So that Mr. Wojcik is protected by the law he must regularly undergo and health and safety at work review, he informs his line manager of any needs, an example of this might be that he asks for a footrest, it is then the responsibility of his employee to act upon his request, if however this request is not met, Mr.

  2. Right of privacy under Hong Kong's current laws

    law branches namely trespass to land, nuisance, breach of contract, breach of confidence, defamation and conversion. Journalists will be deemed to be trespassers, like the one in the Gigi Leung case14, if they enter one's property or install camera or microphone on one's premise without permission or under false pretenses.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work