• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

I.T Coursework

Extracts from this document...

Introduction

I.T Coursework File naming convections (Filename=JMWDfilename) My filename convection is my initials and the initials of the document I have been working in E.G word WD. So if I wanted to save a file on the internet and I produced it in word it would save it as JMWDinternet. This is how I would save all of my documents in the school year, the reason for this is because you can then find all of your documents and other saved items, very quickly and simply. Backups (Filename=JMWDfilename) Backups: A backup is a is a file that has been saved in more than one place, it's a good idea to do this in case of a robbery, fire or any other ways you can lose your data. ...read more.

Middle

If a hacker is to get access to your computer you should disconnect from the internet, this will stop the connection between your computer and the hackers. Hardware It is important not to tamper with any internal/external connections on the pc unless you are a qualified too; doing so without proper qualification can cause damage to your pc or damage yourself even causing death in some cases. If your worried that your computer could be stolen there is lots of cables or other protective materials you can use to stop theft. By Jason Moore 11h COPYWRIGHT ISSUES Copyright - Definition A copyright is a form of intellectual property that grants its holder the sole legal right to copy their works of original expression, such as a literary work, movie, musical work or sound recording, painting, computer program, or industrial design, for a defined period of time. ...read more.

Conclusion

Additionally most computer viruses have a destructive payload that is activated under certain conditions. Example: The Chernobyl virus overwrites the beginning of the hard disk on certain dates. (QUOTED FROM: www.ibas.com/about/dictionary) Viruses are over the internet and a lot of people can now get a virus without even knowing it, it is important for people to have antivirus software like "ZONEALARM", "NORTON" an lots of over antivirus software. Viruses unfortunately are not the only threat to our computers, spy ware, ad ware, and many other nasty content can enter your computer without your consent, they can do this by entering through a website. There are many ways to prevent all these threats to your computer by updating your computer anti-virus software this could save you lots of time, money and a huge waste of your time. By Jason Moore 11h ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Hardware section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Hardware essays

  1. Computer Hardware, uses, advantages and disadvantages.

    wrong spelling which can lead to problems such as, if you spell the name wrong then the ticket can be addressed to the wrong person and also if you enter the address wrong then the ticket will be sent to a different address. This will cause a lot of hassle.

  2. Choosing hardware and input devices.

    over it wouldn't get damaged too much because it is built large and strong. It can handle a multiple resolution whereas a TFT cant. It creates to much heat which people don't like.

  1. ICT Coursework Report: Spreadsheet System

    MS Word>Hyperlink * I entered into MS Word (you click it) * I typed the questionnaire in 'Times New Roman' font * I enlarged the font size to '36' to capture the whole page * The language was of course 'English (UK)'

  2. Input Peripherals Coursework

    Magnetic Ink Character Recognition Magnetic ink character recognition is the common machine language for the paper based payment transfer system. Essentially, it is the language used for processing cheques. MICR works by using magnetic ink printed characters of a special design which can be recognized by high speed magnetic recognition equipment.

  1. I will describe the hardware I have used in my system, the way they ...

    TFT monitors are more expensive than CRT monitors. The difference it will make is that you will feel more comfortable because it gives out less heat and you will have to pay for less electricity because it is small. The graphics are much better than CRT monitors.

  2. The organisation I have chosen to investigate is Europes leading specialist retailer of computer ...

    training opportunities for all their staff, and developing their management teams in the UK and Europe. * Stores - The controlled expansion of their store base in Europe, including the refurbishment of their French stores, and the store-opening programme in the UK, Spain and Sweden, will ensure customers have easy access to their stores, in all territories.

  1. It design

    However, the microphone might have not have great results because there might be background noise interference and the computer may not understand what they are saying or there may be many words the computer does not know and therefore can be a problem.

  2. ICT Storage Media Coursework

    If a tape drive with a 50MB/sec (mega bytes per second) write speed is fed a data stream at only 25MB/s, it fills up a buffer memory and then writes at 50MB/s for a few seconds, rewinds and then writes at 50MB/s again.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work