• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  • Level: GCSE
  • Subject: ICT
  • Word count: 3963

Planning and Deadlines

Extracts from this document...


1.1 PLANNING AND DEADLINES Purpose of planning For an information technology project to go smoothly, it must be planned well. Without such planning the project might not be completed in the time available or it might be over budget. To be able to plan a project successfully, it is necessary to break it down into a series of smaller tasks and determine the order of which these smaller tasks need to be done. The time and resources needed for each of these smaller tasks also need to be estimated. The tasks then need to be divided among the other team members. Deadlines A deadline is a date set by the senior management of a company, by which the project should be completed or reach a certain predetermined milestone. The milestones or mileposts mark the end of logical stages in the project, and their main purpose is to establish whether the project is on time or not. In business deadlines are very important and everyone involved in the project needs to be constantly aware of them. Planning activities should be centred on achieving the preset deadlines. 1.2 Consistent layout, spaces, tabs and indents Consistent layout and spacing It is possible to alter the way a document looks by formatting all or part of it. Most documents are typed with single spacing, which has no blank lines between the lines of typed texts. Double spacing is often used if a document needs to be sent for another person's comments or for editing as it leaves a line of space between each line of text for the reader to insert comments. Tabs Most packages have default tab positions and if these are not suitable, tab functions can be set manually in advanced you can move text to the present position simply by pressing the tab key rather than pressing the space bar repeatedly and hoping that you can align text accurately. ...read more.


2.5 Legal & Moral aspects of data being held by companies and organisations. Rights of the individual. Legal reasons Under the Data Protection Act 1984, individuals are given rights to access the data held about them on the computer systems. If this data has been passed on another person and as a result the individual incurs some damage, then they are able to claim compensation through the courts. Moral reasons As people become more dependent on computer systems, the designers, makers and operators of these systems have a moral responsibility to make sure that computers are used properly. For example, they must make sure that the data stored or passing along communication lines is secure. Data being held by companies and organisations Organisations need to hold data in order to operate and only a small amount of the data held would be classed as personal data. The data held by organisations could be placed in the following categories: Commercial data Commercial organisations hold data in order to trade and, hopefully, make a profit. Organisations can be divided into those that provide a service and those that sell a product. Financial data Organisations need to keep financial details relating to sales, purchases and general ledgers, cashbooks, cash flow predictions, payroll and final accounts. Again all these details need to be kept secure on the computer and there should be stringent security procedures in place to prevent anyone from tampering with them. Financial records are also required to ensure that the correct tax and VAT are paid. Legal data There is a variety of legal data held by most organisations, and again this information is often confidential. The sort of legal data held includes documents for the registration of the business if it is a limited company, contracts of employments of employees, contracts made between suppliers and purchasers, copies of all acts pertaining to the business and so on. ...read more.


If the building is secure then the computer systems will be secure. This involves investigations of: * Access to the building * Automatic access control * Access to computers * Holding sensitive data only on removal able disks * Locking computer when not in use * Borrowing procedures Logical access controls are used to prevent unauthorised access to data files and software. There are several logical access controls, including: * Use of passwords * Restricting the creation of user identities * Use of encryption techniques * Restricting access to the operating system Viruses A virus is a mischievous program whose purpose is to disrupt the use of computers. Many viruses do more than just display messages (usually insulting), on the screen, but some are designed to act after a certain period of time and do such things as make the characters start to drop off the screen or even erase the entire content. Most people see viruses as trouble some but few would consider that you could be killed by one! This has not happened yet, but there was a life-threatening situation recently. Most viruses, after detection can be removed without harming the data. The process of removing a virus from a disk is often referred to as disinfecting the disk. This is a sheet to show how many problems I had during this assignment, and how I overcame the problem. PROBLEM HOW I SOLVED IT Couldn't log on my user name Restarted the computer and re entered the data Space bar wasn't working Saved my work and moved computers Wouldn't print my work Saved it on my disk and transferred it to the printer The following things helped me in this assignment these are as follows: * Internet I found some information related to my work by going to various websites. * GNVQ IT book I got most of my information from this book. I got hold of this book from the library. * Safety in IT (own book) This is my own book brought from the shop. I found some pieces of work from this book. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Peer reviewed

    E-commerce - the legal considerations

    3 star(s)

    sufficient for you to comply with legal requirements. Online processing of payment How are these handled? Does the company already have credit card facilities or will this need setting up from scratch. What additionally needs to be done to allow for online payments and validations? Compliance with regulators and industry bodies Is the company part of a regulatory


    their houses without anybody knowing, another problem with this law is that people import software's like DVD's from other countries very cheaply and distribute it in the UK. So to attempt to reduce breach of Copy Right Law, software companies have taken certain measures to stop software piracy: * The licence agreement is usually clearly printed on the packaging.

  1. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    company's to share any information of a person who has not been asked. If the person has been told that the information is going to be shared and he agrees to it than it is legal for company's to share his information.

  2. Data Protection Act

    ensures an adequate level of protection of the rights and freedoms of data subjects in relation to the processing of personal data". The commissioners suggest 'good practice approach' to assessing adequacy. This principle refers to the guidance entitled, 'International Transfers of Personal Data'.

  1. The Data Protection Act 1998 - questions and answers

    notice by the Data Protection Commissioner, fails to comply with such a notice, an offence will be committed in terms of the Act. Where the offence is committed by a body corporate and is proved to have been committed with the consent or connivance of or to be attributable to

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    Thus the legislation protects Mr. Obrien from the misuse of he's personal data. In order to abide by the law, Mr. Obrien shall agree on the condition stated by the organisation and give his personal data. This condition is that the data will be used in accordance to the law and as an individual; Mr.

  1. Privacy and Data Protection: IT Law

    This includes a right to privacy from government surveillance into an area where a person has a "reasonable expectation of privacy".30 But the right to information privacy does not seem to be included.31 The case Whalen v. Roe, in which the Supreme Court upheld a statute asking physicians to submit

  2. The legislation that protects individuals and groups from the misuse of ICT

    the work, for this reason it is apparent that individuals who own the copyrights for pieces of work are not protected to a full extent. To improve the overall impact and effect of the Copyright, designs and Patent Act, certain improvements need to be made to

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work