• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

I.T Coursework

Extracts from this document...


I.T Coursework File naming convections (Filename=JMWDfilename) My filename convection is my initials and the initials of the document I have been working in E.G word WD. So if I wanted to save a file on the internet and I produced it in word it would save it as JMWDinternet. This is how I would save all of my documents in the school year, the reason for this is because you can then find all of your documents and other saved items, very quickly and simply. Backups (Filename=JMWDfilename) Backups: A backup is a is a file that has been saved in more than one place, it's a good idea to do this in case of a robbery, fire or any other ways you can lose your data. ...read more.


If a hacker is to get access to your computer you should disconnect from the internet, this will stop the connection between your computer and the hackers. Hardware It is important not to tamper with any internal/external connections on the pc unless you are a qualified too; doing so without proper qualification can cause damage to your pc or damage yourself even causing death in some cases. If your worried that your computer could be stolen there is lots of cables or other protective materials you can use to stop theft. By Jason Moore 11h COPYWRIGHT ISSUES Copyright - Definition A copyright is a form of intellectual property that grants its holder the sole legal right to copy their works of original expression, such as a literary work, movie, musical work or sound recording, painting, computer program, or industrial design, for a defined period of time. ...read more.


Additionally most computer viruses have a destructive payload that is activated under certain conditions. Example: The Chernobyl virus overwrites the beginning of the hard disk on certain dates. (QUOTED FROM: www.ibas.com/about/dictionary) Viruses are over the internet and a lot of people can now get a virus without even knowing it, it is important for people to have antivirus software like "ZONEALARM", "NORTON" an lots of over antivirus software. Viruses unfortunately are not the only threat to our computers, spy ware, ad ware, and many other nasty content can enter your computer without your consent, they can do this by entering through a website. There are many ways to prevent all these threats to your computer by updating your computer anti-virus software this could save you lots of time, money and a huge waste of your time. By Jason Moore 11h ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Hardware section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Hardware essays

  1. Make a website.

    as it lets you input data into a computer, it very similar to what a typewriter does however it put all that you have typed up on the monitor not on paper. There are many buttons so you ar3e able to control a lot from the keyboard sometimes can act like the mouse in some cases.

  2. The organisation I have chosen to investigate is Europes leading specialist retailer of computer ...

    The GAME store also boasts about its reliability and loyalty to the customers. This is mainly due to the sophisticated and strategic board of directors. The board of directors consists of three chief executives. These directors are; John Steinbrecher who is group chief executive for the company; Martin Long who

  1. Choosing hardware and input devices.

    There are a few different types of validations to help reduce the number of errors made by a user: Type check, range check, picture or format check, check digit, field length checks etc. Verification The validation can be used to make sure that when a user types data in the

  2. I will describe the hardware I have used in my system, the way they ...

    18.For this type of data, a number data type would be suitable. If the data type is set as number then only numbers could be entered and a person will be prevented form typing in letters and words. If size 'ten' or 'eleven' was entered, then it would be rejected and '10' or '11' would need to be entered.

  1. It design

    able to change when the system is running as they are constantly used and buttons have to be able to edit when the website does as well. For moving around the site there are also three devices available. First of all there is the mouse, it allows you to move around the computer, and click on different types of things.

  2. ICT Storage Media Coursework

    DAT (Digital Audio Tape) Drives This type of storage was invented by Sony for music storage use, but it is now often used as backing storage. It uses DDS (Digital Data Storage) technology to store up to 160GB of data with DDS-5.

  1. Input Peripherals Coursework

    Magnetic Ink Character Recognition Magnetic ink character recognition is the common machine language for the paper based payment transfer system. Essentially, it is the language used for processing cheques. MICR works by using magnetic ink printed characters of a special design which can be recognized by high speed magnetic recognition equipment.

  2. Computer Hardware, uses, advantages and disadvantages.

    Device Speed Errors that can be made Way to correct errors Keyboard The speed of the keyboard depends on the typ The errors that can be made is that when someone is typing too fast or normally then they can press the wrong buttons and then the word becomes the

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work