• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  • Level: GCSE
  • Subject: ICT
  • Word count: 3963

Planning and Deadlines

Extracts from this document...


1.1 PLANNING AND DEADLINES Purpose of planning For an information technology project to go smoothly, it must be planned well. Without such planning the project might not be completed in the time available or it might be over budget. To be able to plan a project successfully, it is necessary to break it down into a series of smaller tasks and determine the order of which these smaller tasks need to be done. The time and resources needed for each of these smaller tasks also need to be estimated. The tasks then need to be divided among the other team members. Deadlines A deadline is a date set by the senior management of a company, by which the project should be completed or reach a certain predetermined milestone. The milestones or mileposts mark the end of logical stages in the project, and their main purpose is to establish whether the project is on time or not. In business deadlines are very important and everyone involved in the project needs to be constantly aware of them. Planning activities should be centred on achieving the preset deadlines. 1.2 Consistent layout, spaces, tabs and indents Consistent layout and spacing It is possible to alter the way a document looks by formatting all or part of it. Most documents are typed with single spacing, which has no blank lines between the lines of typed texts. Double spacing is often used if a document needs to be sent for another person's comments or for editing as it leaves a line of space between each line of text for the reader to insert comments. Tabs Most packages have default tab positions and if these are not suitable, tab functions can be set manually in advanced you can move text to the present position simply by pressing the tab key rather than pressing the space bar repeatedly and hoping that you can align text accurately. ...read more.


2.5 Legal & Moral aspects of data being held by companies and organisations. Rights of the individual. Legal reasons Under the Data Protection Act 1984, individuals are given rights to access the data held about them on the computer systems. If this data has been passed on another person and as a result the individual incurs some damage, then they are able to claim compensation through the courts. Moral reasons As people become more dependent on computer systems, the designers, makers and operators of these systems have a moral responsibility to make sure that computers are used properly. For example, they must make sure that the data stored or passing along communication lines is secure. Data being held by companies and organisations Organisations need to hold data in order to operate and only a small amount of the data held would be classed as personal data. The data held by organisations could be placed in the following categories: Commercial data Commercial organisations hold data in order to trade and, hopefully, make a profit. Organisations can be divided into those that provide a service and those that sell a product. Financial data Organisations need to keep financial details relating to sales, purchases and general ledgers, cashbooks, cash flow predictions, payroll and final accounts. Again all these details need to be kept secure on the computer and there should be stringent security procedures in place to prevent anyone from tampering with them. Financial records are also required to ensure that the correct tax and VAT are paid. Legal data There is a variety of legal data held by most organisations, and again this information is often confidential. The sort of legal data held includes documents for the registration of the business if it is a limited company, contracts of employments of employees, contracts made between suppliers and purchasers, copies of all acts pertaining to the business and so on. ...read more.


If the building is secure then the computer systems will be secure. This involves investigations of: * Access to the building * Automatic access control * Access to computers * Holding sensitive data only on removal able disks * Locking computer when not in use * Borrowing procedures Logical access controls are used to prevent unauthorised access to data files and software. There are several logical access controls, including: * Use of passwords * Restricting the creation of user identities * Use of encryption techniques * Restricting access to the operating system Viruses A virus is a mischievous program whose purpose is to disrupt the use of computers. Many viruses do more than just display messages (usually insulting), on the screen, but some are designed to act after a certain period of time and do such things as make the characters start to drop off the screen or even erase the entire content. Most people see viruses as trouble some but few would consider that you could be killed by one! This has not happened yet, but there was a life-threatening situation recently. Most viruses, after detection can be removed without harming the data. The process of removing a virus from a disk is often referred to as disinfecting the disk. This is a sheet to show how many problems I had during this assignment, and how I overcame the problem. PROBLEM HOW I SOLVED IT Couldn't log on my user name Restarted the computer and re entered the data Space bar wasn't working Saved my work and moved computers Wouldn't print my work Saved it on my disk and transferred it to the printer The following things helped me in this assignment these are as follows: * Internet I found some information related to my work by going to various websites. * GNVQ IT book I got most of my information from this book. I got hold of this book from the library. * Safety in IT (own book) This is my own book brought from the shop. I found some pieces of work from this book. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. The legislation that protects individuals and groups from the misuse of ICT

    Because Mr. Clements is a solicitor, he knows that he has to follow the law, and that if he didn't, there would be severe consequences, e.g. loose his job along with the law society banning him from practicing as a solicitor.


    * Some games only work if a code is typed in; this code changes each time the program is run and can be found by looking in the manual or using a special code-wheel which comes with the software. * Some programs will only run if the CD-ROM is in the CD drive.

  1. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    company's to share any information of a person who has not been asked. If the person has been told that the information is going to be shared and he agrees to it than it is legal for company's to share his information.

  2. The Data Protection Act 1998 - questions and answers

    notice by the Data Protection Commissioner, fails to comply with such a notice, an offence will be committed in terms of the Act. Where the offence is committed by a body corporate and is proved to have been committed with the consent or connivance of or to be attributable to

  1. Car Safety

    Air bags are of limited benefit in side impact (unless they are side air bags), rear impact or roll-over crashes, or in crashes where there is more than one collision. A safety belt can protect an occupant in all of these crashes.

  2. Data Protection Act

    If personal data have been recorded because of a relationship between the data controller and the data subject the need to keep the information should be considered when the relationship ceases to exist. The act provides that personal data processed only for historical, statistical or research purposes in compliance with

  1. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    This is where the Data Protection Act comes in. It ensures that the school keeps this information exactly how it is-private. The Data Protection Act is extremely important in this case. Children are extremely vulnerable to various dangers in this world. Abuse of children is a major problem. If someone dangerous got a hold of these children's information, they can be in danger or threatened in various ways.

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    Overall, the advantages outweigh the disadvantages because the law keeps the necessary data which needs storage by any organisation secure in some way. This is extremely important because without this specific law, the information which I pass through to organisations can be accessed and used by anyone for many different purposes which can cause many problems for me.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work