• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Safe use of ICT in a Business environment (OCR Nationals Unit 1 Skills for Business Task 1)

Extracts from this document...


Safe use of ICT in a Business environment Protecting Health * Make sure all employees' adopt the correct posture and have an adequate lower back support. This reduces the risk of tension strain headaches and musculoskeletal problems like neck pain, Chronic back pain and upper limb disorders such as Repetitive Strain Injury. - Repetitive Strain Injury can be stopped by using a wrist support along with an ergonomic keyboard, and keeping forearm's horizontal. * Make sure all employees' take regular breaks from their computers. This reduces the danger of eye strain, headaches and discomfort. - This can be reduced by making sure eyes are level with the monitor and making sure there is good background lighting and a monitor filter to reduce glare. ...read more.


trailing cables. This can reduce the danger of employees' tripping and harming themselves. - This can be reduced by taping cables to the wall or keeping wires in wire surrounds on the wall. * Make sure the electrical safety is upheld, e.g. electric checks (PAT), no water by the machines, not overloading sockets. This can reduce the danger of being electrocuted by the computers. - This can be reduced by making sure the company has regular electric checks, make sure no employees' take water near the machines, and make sure the sockets are not * Make sure there is safety equipment to avoid machinery falling. This can reduce the danger of employees' getting hurt by falling equipment. ...read more.


Protecting files from unauthorised access Passwords * Passwords to open files. - This makes sure that no-one that is not authorised can open files. * Passwords to Modify documents/files. - This makes sure that no-one that is not authorised can modify files. * Passwords to protect the contents of the Documents. - This makes sure that no-one can delete all the contents of documents, or steal all the contents. * Choose a STRONG Password - Choosing a strong password is essential. If a weak password is chosen, then there is next-to-no point having a password because it can be easily hacked. Use numbers, uppercase letters, mixed with lowercase letters, and mixed with symbols. This will make your password strong, and VERY hard to crack! ?? ?? ?? ?? OCR Nationals Unit 1 ICT Skills for Business Task 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE ICT Systems and Application section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE ICT Systems and Application essays

  1. Advantages and disadvantages of using ICT for a business.

    sending them to a college you can make a pay for an expert staff to come in and teach them. The Third way is that if you have 7+ employees then you have a separate training department and do a test at the end and whoever passes the test them make them be your employees.

  2. Different types of technology How I use ICT at home and at school

    This is extremely useful for someone who watches a lot of TV or keeps up with a certain programme but can't be there at its running time. For someone like me who keeps up with weekly dramas which make the plot hard to understand if missed, it helps out a lot.

  1. A02 Skills for Business

    Forwarding an email Tick the e-mail you want to forward then click 'forward' (I6)Appropriate subject and message text in all emails My e-mail is about a football result so I subsequently named the subject 'Football' A02 Attachments (J1) Sending a single attachment I clicked browse and found the file I wanted to 'attach' then clicked 'add' (J2)

  2. Ict Unit 2b

    A bar code scanner can either have the Decoder built into it, or be "undecoded". Undecoded bar code scanner requires a separate box called an interface or keyboard wedge. Bar code readers come in either "keyboard wedge" output or RS232 output.

  1. Method of Communicating through Business

    all his salespeople a sales summary and they all get the same copy. Sending an attachment can be a cheaper and speed up the communication rather than sending it by the post meaning it saved the company money. � Putting a password on an email is so it will stay confidential.

  2. OCR Nationals Unit 21 - Task 8

    Then I added Layers onto the Timeline as each layer will contain different content that are different from each other, and that will be doing something in particular. As you can see I have added 3 layers to the timeline.

  1. gcse ict unit 2b

    There is also a digital camera which is always kept in the manager's office. The main file server has an excellent broadband internet connection that serves all of the computers in the finance department. This internet is supplied by BT as internet service provider (ISP).

  2. gcse ict unit 2a

    In addition Asda announced plans to build a minimum of 18 stores across the whole UK and it is expected to create 2000 new jobs. Also, there are twenty four distribution centres and also a Head Office. Aims * To comprehensively be recognised as the best supermarket in the UK and also be known all around the world.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work