• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  • Level: GCSE
  • Subject: ICT
  • Word count: 3963

Planning and Deadlines

Extracts from this document...


1.1 PLANNING AND DEADLINES Purpose of planning For an information technology project to go smoothly, it must be planned well. Without such planning the project might not be completed in the time available or it might be over budget. To be able to plan a project successfully, it is necessary to break it down into a series of smaller tasks and determine the order of which these smaller tasks need to be done. The time and resources needed for each of these smaller tasks also need to be estimated. The tasks then need to be divided among the other team members. Deadlines A deadline is a date set by the senior management of a company, by which the project should be completed or reach a certain predetermined milestone. The milestones or mileposts mark the end of logical stages in the project, and their main purpose is to establish whether the project is on time or not. In business deadlines are very important and everyone involved in the project needs to be constantly aware of them. Planning activities should be centred on achieving the preset deadlines. 1.2 Consistent layout, spaces, tabs and indents Consistent layout and spacing It is possible to alter the way a document looks by formatting all or part of it. Most documents are typed with single spacing, which has no blank lines between the lines of typed texts. Double spacing is often used if a document needs to be sent for another person's comments or for editing as it leaves a line of space between each line of text for the reader to insert comments. Tabs Most packages have default tab positions and if these are not suitable, tab functions can be set manually in advanced you can move text to the present position simply by pressing the tab key rather than pressing the space bar repeatedly and hoping that you can align text accurately. ...read more.


2.5 Legal & Moral aspects of data being held by companies and organisations. Rights of the individual. Legal reasons Under the Data Protection Act 1984, individuals are given rights to access the data held about them on the computer systems. If this data has been passed on another person and as a result the individual incurs some damage, then they are able to claim compensation through the courts. Moral reasons As people become more dependent on computer systems, the designers, makers and operators of these systems have a moral responsibility to make sure that computers are used properly. For example, they must make sure that the data stored or passing along communication lines is secure. Data being held by companies and organisations Organisations need to hold data in order to operate and only a small amount of the data held would be classed as personal data. The data held by organisations could be placed in the following categories: Commercial data Commercial organisations hold data in order to trade and, hopefully, make a profit. Organisations can be divided into those that provide a service and those that sell a product. Financial data Organisations need to keep financial details relating to sales, purchases and general ledgers, cashbooks, cash flow predictions, payroll and final accounts. Again all these details need to be kept secure on the computer and there should be stringent security procedures in place to prevent anyone from tampering with them. Financial records are also required to ensure that the correct tax and VAT are paid. Legal data There is a variety of legal data held by most organisations, and again this information is often confidential. The sort of legal data held includes documents for the registration of the business if it is a limited company, contracts of employments of employees, contracts made between suppliers and purchasers, copies of all acts pertaining to the business and so on. ...read more.


If the building is secure then the computer systems will be secure. This involves investigations of: * Access to the building * Automatic access control * Access to computers * Holding sensitive data only on removal able disks * Locking computer when not in use * Borrowing procedures Logical access controls are used to prevent unauthorised access to data files and software. There are several logical access controls, including: * Use of passwords * Restricting the creation of user identities * Use of encryption techniques * Restricting access to the operating system Viruses A virus is a mischievous program whose purpose is to disrupt the use of computers. Many viruses do more than just display messages (usually insulting), on the screen, but some are designed to act after a certain period of time and do such things as make the characters start to drop off the screen or even erase the entire content. Most people see viruses as trouble some but few would consider that you could be killed by one! This has not happened yet, but there was a life-threatening situation recently. Most viruses, after detection can be removed without harming the data. The process of removing a virus from a disk is often referred to as disinfecting the disk. This is a sheet to show how many problems I had during this assignment, and how I overcame the problem. PROBLEM HOW I SOLVED IT Couldn't log on my user name Restarted the computer and re entered the data Space bar wasn't working Saved my work and moved computers Wouldn't print my work Saved it on my disk and transferred it to the printer The following things helped me in this assignment these are as follows: * Internet I found some information related to my work by going to various websites. * GNVQ IT book I got most of my information from this book. I got hold of this book from the library. * Safety in IT (own book) This is my own book brought from the shop. I found some pieces of work from this book. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays


    * Some games only work if a code is typed in; this code changes each time the program is run and can be found by looking in the manual or using a special code-wheel which comes with the software. * Some programs will only run if the CD-ROM is in the CD drive.

  2. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    company's to share any information of a person who has not been asked. If the person has been told that the information is going to be shared and he agrees to it than it is legal for company's to share his information.

  1. The Data Protection Act 1998 - questions and answers

    If the organisation commits an offence in terms of the Act - the processing of Data other than in accordance with the organisation's registration - or in contravention of one of the Data Protection Principles, and, having been served with an enforcement notice, an information notice, or a special information

  2. Car Safety

    * There is a large surface area to restrain the occupant's forward movement compared to a safety belt alone, so compression of the occupant's chest is reduced. Air bags are designed to supplement safety belts, not replace them. Some air bags will only deploy in crashes severe enough to threaten safety-belted occupants.

  1. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    Sites usually require an email, a name, data of birth and other personal data, sometimes even including an address. These aren't too harmless when breaking the Data Protection Act. For example, the most that can happen would be that Mr Ajaib's e-mail address would be given out to the sponsors

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    use of others without he's individual permission and which ensures that he's data is not being used for a range of purpose which could cause problems for him i.e. increase in income tax. Conversely, to investigate this matter in depth, Mr.

  1. Data Protection Act

    Compliance with the second Principle cannot be established simply by notification of the purposes for which personal data are processed. The commissioner takes a strict view of the concept of compatibility of processing of personal data. Part II of Schedule I of the Act provides guidance in interpreting the Second Principle.

  2. Critically evaluate the extent to which it can be said that copyright law gives ...

    The fact that not everybody shares the same opinions makes it very difficult to make a definitive guideline in determining artistic craftsmanship and for this purpose contemporary art. Another profoundly stated comment made by Lord Reid in this case proves of great importance.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work