• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

I.T Coursework

Extracts from this document...


I.T Coursework File naming convections (Filename=JMWDfilename) My filename convection is my initials and the initials of the document I have been working in E.G word WD. So if I wanted to save a file on the internet and I produced it in word it would save it as JMWDinternet. This is how I would save all of my documents in the school year, the reason for this is because you can then find all of your documents and other saved items, very quickly and simply. Backups (Filename=JMWDfilename) Backups: A backup is a is a file that has been saved in more than one place, it's a good idea to do this in case of a robbery, fire or any other ways you can lose your data. ...read more.


If a hacker is to get access to your computer you should disconnect from the internet, this will stop the connection between your computer and the hackers. Hardware It is important not to tamper with any internal/external connections on the pc unless you are a qualified too; doing so without proper qualification can cause damage to your pc or damage yourself even causing death in some cases. If your worried that your computer could be stolen there is lots of cables or other protective materials you can use to stop theft. By Jason Moore 11h COPYWRIGHT ISSUES Copyright - Definition A copyright is a form of intellectual property that grants its holder the sole legal right to copy their works of original expression, such as a literary work, movie, musical work or sound recording, painting, computer program, or industrial design, for a defined period of time. ...read more.


Additionally most computer viruses have a destructive payload that is activated under certain conditions. Example: The Chernobyl virus overwrites the beginning of the hard disk on certain dates. (QUOTED FROM: www.ibas.com/about/dictionary) Viruses are over the internet and a lot of people can now get a virus without even knowing it, it is important for people to have antivirus software like "ZONEALARM", "NORTON" an lots of over antivirus software. Viruses unfortunately are not the only threat to our computers, spy ware, ad ware, and many other nasty content can enter your computer without your consent, they can do this by entering through a website. There are many ways to prevent all these threats to your computer by updating your computer anti-virus software this could save you lots of time, money and a huge waste of your time. By Jason Moore 11h ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Hardware section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Hardware essays

  1. Computer Hardware, uses, advantages and disadvantages.

    Fire fox Is free. Not all sites are compatible with it. Fire fox size is very small compare to internet explorer. There aren't many fonts you can do of paint. Microsoft Word Microsoft Access Internet Explorer Paint Input The input devices that I am going to use are keyboard, mouse and scanner because these help me to create a database.

  2. Choosing hardware and input devices.

    There are a few different types of validations to help reduce the number of errors made by a user: Type check, range check, picture or format check, check digit, field length checks etc. Verification The validation can be used to make sure that when a user types data in the

  1. I will describe the hardware I have used in my system, the way they ...

    An example of this method is; * In shops and super markets, barcode readers use check digits. 3. Type check This checks that of a certain type is entered into a field. An example of this method is; * In a clothes shop, dress sizes may range from 8 to

  2. It design

    Input data needed for the system to keep running is changes and updates for information on website and also data inputted by customers on booking page need to be able to change while the system is running. There are also buttons and hyperlinks which are inputs that need to be

  1. ICT Storage Media Coursework

    DAT (Digital Audio Tape) Drives This type of storage was invented by Sony for music storage use, but it is now often used as backing storage. It uses DDS (Digital Data Storage) technology to store up to 160GB of data with DDS-5.

  2. Input Peripherals Coursework

    Magnetic Ink Character Recognition Magnetic ink character recognition is the common machine language for the paper based payment transfer system. Essentially, it is the language used for processing cheques. MICR works by using magnetic ink printed characters of a special design which can be recognized by high speed magnetic recognition equipment.

  1. Powerpoint ICT

    Process Once I have input all of my data that I am using, I need to think about what I can do to make my presentation the greatest. I have to think about the text, graphics, pictures, backgrounds, colour schemes, action buttons, hyperlinks etc.

  2. Make a website.

    Disadvantages * Can be very expensive to buy. * It quite hard to learn to how to use it/ get the hang of it. * The balls on occasions can fall out. Keyboards- The keyboards will be used to input information on the website A keyboard is an input device

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work