Personal Calendar and Group Scheduling
Contacts and Address Book
Integration with Microsoft Exchange
Reliability, Data Recovery, and Security
Another key goal for Outlook version 2002 was to enable users to spend time working rather than worrying about their software. With the reliability features in the newest version of Outlook, users can continue to work even in the unlikely event of an error. Furthermore, a variety of security enhancements have been included in Outlook version 2002 to help users feel more secure when working with e-mail. Note: See the Office XP Product Guide for additional functionality in this area that spans across the Office applications.
Sources of Information
I intend to speak to the ICT coordinator to gain as much information as I can. But some more technical information may have to come form the ICT technician. I understand that the ICT Coordinator, Mr James, is a full-time teacher and so negotiating a date for a visit must be planned carefully to ensure that the full benefits from the visit can be achieved. As Mr James may not know all the information that I require I may need to step up the management structure and ask the ICT technician.
Prior to my visit and this report I sent sample questions so Mr James could prepare responses, below is a list of answers given along with the questions asked in the interview.
Yeo Moor Junior School
1. When was the current IT suite installed?
6 / 10 / 99
2. Brief History a) Ist Computers + 15
b) Extra Computers + 3
3. The configuration of the ‘typical’ computer
Manufacturer - Viglen
Processor Speed - 450Mhz – 800Mhz
Hard Drive - 10Gb
CD Rom Speed - 40
Monitor size - 15 Inches
Operating System - Windows 98
Printer Ink-jet / Bubble-jet / Laser-jet / Other:
Epson / Hewlett Packard / Other:
4. How often are the printer cartridges and paper replaced
One cartridge used per term
One pack of paper every 3-4 weeks
5. How often is data backed up weekly How DAT drive on server
6. Security? Physical alarmed room, reflective glass, locked server cupboard
7. What is the knowledge of users on a 1-5 scale, five being expert. 1-3
8. Misuse of software on computers, the internet for example?
Banned from software for period. Pupils kept on Yahooligans sites or given URL’s. Search button has been erased and there is some local blacklisiting.
9. Can the administrator log users and the programs they use?
Yes
10. Any virus protection?
Sophos Anti-Virus, monthly upgrades
11. The knowledge of the system from a users point of view?
Know the basics to perform general tasks
12. Is there any needed for IT staff and users
LEA provide this, training under ‘New Opportunities Fund (NOF).
13. How many computers upgraded and how often?
2 per year
14. When was the last upgrade and what was upgraded?
Slower machines in suite – Pentium 800 Mhz (II)
Proposed Structure of Report
Brief History
A brief history of the suite, when is was installed or any upgrades or extra computers
ICT Network Description
A short description of what the network has on it and the peripherals attached.
System Configurations
The configurations of the ‘typical’ computer in the network.
Application
Its uses and training and information have been discussed earlier in the report
Training Procedures
What training the staff need to be able to cope with the system
Security Issues
Physical, firewalls. An explanation of the security Yeo Moor employees
Back-up procedures
How data is backed up and how often
Monitoring Misuse
Logging users, talking misuse and ways to prevent it
Support and help procedures
How problems tackled, in-built help facilities
History of information Gathering
+
The Report
Brief History
The current ICT suite was installed on the 6th of October 1999 in which 15 networked computers were installed. The configuration will be explained later on. Since the first installation 3 more terminals have been added to the network taking the networked total to 18.
ICT Network Description
There are 18 PC’s each linked to the server running a GT network, all of which have been installed in one room. There are two printers, an Ink-jet and Laser-jet, of which all terminals are linked. The printer supplier is HP.
System Configurations
As described earlier the network houses 15 original computers and 3 upgraded ones. With configuration as follows:
Manufacturer - Viglen
Processor Speed - 450Mhz – 800Mhz
Hard Drive - 10Gb
CD Rom Speed - 40
Monitor size - 15 Inches
With the exception of the 3 upgraded terminals with have the 800Mhz processor speed.
Training Procedures
There is training available during inset days; LEA provide this, training under ‘New Opportunities Fund (NOF). ICT staff teach the general staff who in-turn pass on the knowledge to the pupils.
Back-up Procedures
A 3 generation procedure is used where data is fully backed up every Friday afternoon and stored off the premises.
Support procedures
There are many help facilities with windows and its accompanying software to help with minor problems and the on-site ICT Coordinator can help with any problems the pupils cant handle. If the problem needs fixing immediately and is a major one the ICT Coordinator cant handle then the ICT Technician is on call to fix ASAP.
Social, Moral, Ethical and Legal issues surrounding the institution
The working environment has been affected by the introduction of the network into the school, lesson plans and the curriculum itself has been altered to keep up with the times. Pupils have benefited from clearer lessons when it comes to printed sheets done by the teacher rather than photocopied from a book. An OHP’s, and computer based boards are readily used as they are easier to use and clearer teach.
However, the classroom is losing its traditional feel and pupils are misusing the software and system to their own benefit promoting serious misuse i.e. fraud etc in the future. Staff have been pressured to use these benefits where in some cases they may want to stick to the old routine.
Misuse to not only apparent in pupils but staff as well and management need to make sure the correct judgement is made when making decisions, on one, whether to punish the pupil / member of staff, and two, by how much.
Since the ICT network was installed there was been stress to staff relating to major issues such as ability to teach using the computers and the ability to use them in the first. Society has pressured schools into keeping up with the times and in-turn ha pressurised the teachers. There are many implications a application like Microsoft outlook puts on a school like Yeo Moor. Each pupil is expected to respect the program and use it accordingly. Notices of guidance and punishment are placed around the suite itself and are visible to all.
There are also many legal implications to the school, money needs to be spent on licenses and a decision needs to be made on what one to get and make sure all are obtained to avoid prosecution. The company also needs to make sure it doesn’t legally ‘abuse’ the child to the extent that police are called in, whether it be for the advantage for improper conduct to disadvantage concerning misuse.
Evaluating the social implications of ICT in Yeo Moor means evaluating how it affects society. It will help by increasing the knowledge of ICT systems and ICT basics for both staff and pupils, but a disadvantage would be the strain of work.
Evaluating moral implications of the system means looking at whether all the aspects of the ICT system are fair to everyone in society. This means looking at the behaviour of everyone involved with the ICT system and judging whether the behaviour or result of their behaviour is fair to others in society.
Discussing the ethical implications of the ICT system means evaluating whether all aspects of an ICT system are fair to everyone in society. The only difference between ethical and moral is the fact that ethically wrong is easily explainable for why it is wrong whereas morally wrong is said to be down to a subjective judgement and is usually not easily justified or well backed-up.
Legal implications of the ICT system at Yeo Moor means making sure, or evaluating whether it is complying with current laws. The main laws that ICT systems must conform to are;
1984 Data Protection Act
- 1974 Health and Safety at Work Act
- 1989 Copyright, Designs and Patents Act
- 1990 Computer Misuse Act
1984 Data Protection Act
- All holders of personal data must register their use of data with a Registrar appointed by the Home Secretary.
- Data should be regarded as being held for a specific purpose and should not be used, without authorisation, for other purposes.
- Only specific people should have access to the data and there should be security methods which deny others access.
- Access should be monitored so that illegal access can be detected
- Generally a person has the right to see the data held about themselves
- Data files and software should be designed to include a date after which the data should not be retained
- Data held should be accurate, there must be procedures for ensuring its accuracy.
1974 Health and Safety at Work Act
∙ Perform an analysis of workstations in order to evaluate the safety and health conditions to which they give rise;
∙ Provide training to employees in the use of workstation components;
∙ Ensure employees take regular breaks or changes in activity;
∙ Provide regular eye tests for workstation users and pay for glasses;
Employees have a responsibility to:
∙ Use workstations and equipment correctly, in accordance with training provided by employees;
∙ Bring problems to the attendance of their employer immediately and co-operate in the correction of these problems
Manufacturers are required to:
- Ensure that their products comply with the Act. For example, screens must tilt and swivel, keyboards must be separate and moveable.
The following shows the health and safety factors organizations using computer equipment should consider.
The screen
Swivel and tilt facility
Brightness / contrast control
Free from glare / reflection
Free from flicker / swim
Clearly defined images
Cleanliness
The keyboard
Separate from screen
Tilt facility
Clear, clean symbols
Non-reflective keys and surround
Considerations also need to be made for the chair, the desk and the local environment.
Analysis and Evaluation
The company has coped well with the changes but needs to keep with the times in terms of computer software, the computers are becoming quickly outdated and methods of practice are becoming less and less used in the classroom structure. A fine judgement and balance needs to be made between the use of computers and the traditional way of teaching. This is to ensure both staff and pupils are happy, most of the time. The way the school deals with misuse is fine, but they need to make sure they are updated with new software / hardware.
The school provides students with a wide range of advanced computer hardware and software designed to meet all the study requirements of a ‘typical’ student. The ICT faculties are available throughout the working day and open to all students who wish to use the system. They are regularly maintained and a considerable amount of money is invested to keep the system up-to-date and in working order. Therefore its vital that all students comply with the ‘Computer Users’ Code of Practice’ and ‘Guidelines for the use of the Internet’ available in the appendix at the end of the report.