• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  • Level: GCSE
  • Subject: ICT
  • Word count: 3963

Planning and Deadlines

Extracts from this document...

Introduction

1.1 PLANNING AND DEADLINES Purpose of planning For an information technology project to go smoothly, it must be planned well. Without such planning the project might not be completed in the time available or it might be over budget. To be able to plan a project successfully, it is necessary to break it down into a series of smaller tasks and determine the order of which these smaller tasks need to be done. The time and resources needed for each of these smaller tasks also need to be estimated. The tasks then need to be divided among the other team members. Deadlines A deadline is a date set by the senior management of a company, by which the project should be completed or reach a certain predetermined milestone. The milestones or mileposts mark the end of logical stages in the project, and their main purpose is to establish whether the project is on time or not. In business deadlines are very important and everyone involved in the project needs to be constantly aware of them. Planning activities should be centred on achieving the preset deadlines. 1.2 Consistent layout, spaces, tabs and indents Consistent layout and spacing It is possible to alter the way a document looks by formatting all or part of it. Most documents are typed with single spacing, which has no blank lines between the lines of typed texts. Double spacing is often used if a document needs to be sent for another person's comments or for editing as it leaves a line of space between each line of text for the reader to insert comments. Tabs Most packages have default tab positions and if these are not suitable, tab functions can be set manually in advanced you can move text to the present position simply by pressing the tab key rather than pressing the space bar repeatedly and hoping that you can align text accurately. ...read more.

Middle

2.5 Legal & Moral aspects of data being held by companies and organisations. Rights of the individual. Legal reasons Under the Data Protection Act 1984, individuals are given rights to access the data held about them on the computer systems. If this data has been passed on another person and as a result the individual incurs some damage, then they are able to claim compensation through the courts. Moral reasons As people become more dependent on computer systems, the designers, makers and operators of these systems have a moral responsibility to make sure that computers are used properly. For example, they must make sure that the data stored or passing along communication lines is secure. Data being held by companies and organisations Organisations need to hold data in order to operate and only a small amount of the data held would be classed as personal data. The data held by organisations could be placed in the following categories: Commercial data Commercial organisations hold data in order to trade and, hopefully, make a profit. Organisations can be divided into those that provide a service and those that sell a product. Financial data Organisations need to keep financial details relating to sales, purchases and general ledgers, cashbooks, cash flow predictions, payroll and final accounts. Again all these details need to be kept secure on the computer and there should be stringent security procedures in place to prevent anyone from tampering with them. Financial records are also required to ensure that the correct tax and VAT are paid. Legal data There is a variety of legal data held by most organisations, and again this information is often confidential. The sort of legal data held includes documents for the registration of the business if it is a limited company, contracts of employments of employees, contracts made between suppliers and purchasers, copies of all acts pertaining to the business and so on. ...read more.

Conclusion

If the building is secure then the computer systems will be secure. This involves investigations of: * Access to the building * Automatic access control * Access to computers * Holding sensitive data only on removal able disks * Locking computer when not in use * Borrowing procedures Logical access controls are used to prevent unauthorised access to data files and software. There are several logical access controls, including: * Use of passwords * Restricting the creation of user identities * Use of encryption techniques * Restricting access to the operating system Viruses A virus is a mischievous program whose purpose is to disrupt the use of computers. Many viruses do more than just display messages (usually insulting), on the screen, but some are designed to act after a certain period of time and do such things as make the characters start to drop off the screen or even erase the entire content. Most people see viruses as trouble some but few would consider that you could be killed by one! This has not happened yet, but there was a life-threatening situation recently. Most viruses, after detection can be removed without harming the data. The process of removing a virus from a disk is often referred to as disinfecting the disk. This is a sheet to show how many problems I had during this assignment, and how I overcame the problem. PROBLEM HOW I SOLVED IT Couldn't log on my user name Restarted the computer and re entered the data Space bar wasn't working Saved my work and moved computers Wouldn't print my work Saved it on my disk and transferred it to the printer The following things helped me in this assignment these are as follows: * Internet I found some information related to my work by going to various websites. * GNVQ IT book I got most of my information from this book. I got hold of this book from the library. * Safety in IT (own book) This is my own book brought from the shop. I found some pieces of work from this book. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. ICT LAWS

    * Some games only work if a code is typed in; this code changes each time the program is run and can be found by looking in the manual or using a special code-wheel which comes with the software. * Some programs will only run if the CD-ROM is in the CD drive.

  2. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    company's to share any information of a person who has not been asked. If the person has been told that the information is going to be shared and he agrees to it than it is legal for company's to share his information.

  1. Data Protection Act

    ensures an adequate level of protection of the rights and freedoms of data subjects in relation to the processing of personal data". The commissioners suggest 'good practice approach' to assessing adequacy. This principle refers to the guidance entitled, 'International Transfers of Personal Data'.

  2. The Data Protection Act 1998 - questions and answers

    notice by the Data Protection Commissioner, fails to comply with such a notice, an offence will be committed in terms of the Act. Where the offence is committed by a body corporate and is proved to have been committed with the consent or connivance of or to be attributable to

  1. The legislation that protects individuals and groups from the misuse of ICT

    It is the responsibility of Mr. Wojcik's company to provide an eye test if required, it is often common that eye strain is caused by working at the computer for long periods of time or having glare from the sun shining onto his screen making it harder for his eyes to interpret what is before him.

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    Conversely, to investigate this matter in depth, Mr. Obrien can go over his personal data and observe any changes or deletion made. Under the act, if Mr. Obrien finds any changes he can easily sue the organisation and take the matter up in court. Thus the legislation protects Mr.

  1. Leaflet design for Finding Nemo.

    * The layout is hard to move certain things around and to use. * The programme is anticipated for letters and reports, and not for leaflets or posters. Programme Advantages Disadvantages Publisher * The programme is unique enabling easy resizing and movement of frames.

  2. Privacy and Data Protection: IT Law

    Overview of the transposition in the member states Concerning the 1995 Directive, implementation was a slow process. The Commission had to act against some of the member states before the Court to force them to implement the Directive23. The first report from the Commission on the implementation of the

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work