The uses of ICT for an adult in employment

The uses of ICT for an adult in employment Susan Wright is a school secretary. As a secretary, she is required to take care of the schools finances, absences, take and make phone calls and write important letters. Excel: work related A popular computer program that allows you to create and edit spreadsheets, which are used to store information in columns and rows that can then be organized and/or processed. Spreadsheets are designed to work well with numbers meaning that Susan can use this program to manage any of the schools finances. Microsoft word: work related Microsoft word is a basic word processing program that allows the user to create letters, brochures, flyers and leaflets, even make simple WebPages. Susan can use this to write letter out to everyone quickly and efficiently, and doesn't have to waste time writing out a letter for each different

  • Word count: 148
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay

Logue's Homer, War Music "The theme of respect for the warrior code"

Sam Acton Upper Canada College 0838 World Literature Assignment #2 Commentary Logue's Homer, War Music "The theme of respect for the warrior code" Word count: 1495 This is my own unaided work except as outlined below. Sam Acton This commentary will focus primarily on the theme of respect for the warrior code, while also examining how Logue's diction at specific points aids in developing not only the aforementioned theme, but the plot and the flow of the epic poem itself. I have chosen a passage (from page 95 "Dear Ek" to page 97 "Agreed")1 that I feel accentuates the theme of respect for the warrior code; it also features speeches by both Menelaos and Paris which serve as useful points of comparison in order to learn more about the warrior code. Before I begin, I feel it necessary to attempt to define this code by stating some key features of it: a warrior takes responsibility for his actions, he has an almighty respect for the gods and their superiority, a respect for combat as a way of settling a conflict, a respect for rank and seniority, a respect for ancestry and older generations, and a respect for an opponent. This warrior code is universal and is held sacred by all warriors and heroes alike. The theme of respect for the warrior code is developed by the behaviors, words, and attitudes of Paris and Menelaos throughout this passage. The first instance of

  • Word count: 1554
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay

Data privacy is the relationship between collection and distribution of data and the public expectation of privacy and the legal issues surrounding them. There are many policies and ordinance that protect our data, but the big question is who is in contro

Who will be responsible for your personal data and will you have any control over how it will be used? What is privacy? Privacy is the ability of individual and groups to determine for themselves when, how and to what extend information about themselves is shared with others. In today's world where the rapid growth of technology is questioning the privacy of our personal and sensitive data, how do we make sure our data is secure? Data privacy is the relationship between collection and distribution of data and the public expectation of privacy and the legal issues surrounding them. There are many policies and ordinance that protect our data, but the big question is who is in control of these rules and regulations? Privacy issues arise wherever personally restricted information is collected and stored. In this 21st century, most of us use databases to store information, and make our life easier. Data privacy issues can arise in response to information from a wide range of sources, such as: Hospitals storing health records, social networking sites like Face book, introduction of biometrics, identity cards and internet databases. Databases provide us with many benefits. They make our life easier; they are less time-consuming and also quite cheap in the longer run. In the hospitals and medical centers technology has enhanced medical care through electronic medical and genetic

  • Ranking:
  • Word count: 698
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay

Computer Maintainance - anti-virus, cookie deletion, drive scanning

Assignment 3: Computer Maintenance * Security: . Virus protection: PCs can be attacked by viruses, worms and Trojans arriving with emails and access to the internet. Antivirus software checks for intruders. It attempts to trace viruses by spotting the virus signature. Hackers try and adopt cloaking techniques such as polymorphing. As soon as hackers write new viruses, so do anti-virus companies produce updates for their software. The anti-virus software companies maintain a database of information about viruses, their profiles and signatures. Users can subscribe to an annual subscription which can be downloaded from the internet or a CD can also be brought from local stores. This subscription offers new updates automatically each time the computer starts. Having the most up to date virus information file, scanning your system frequently and avoiding opening emails that may contain viruses is the best advice. The main defence against viruses is to subscribe to a reliable anti-virus software company. If the software detects a virus it may automatically stop the corrupt file and quarantine it and ask the user what steps to take. The user can then decide if they would like to delete it or send it to the company for further analysis. 2. Firewall: Firewall builds a protective barrier around computers that are connected to internet network, so that only authorised programs

  • Word count: 1755
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay

File Management - Operating Systems

Ricki Lambert Operating Systems File Management Introduction Within this assignment I shall be looking at the processes contained within the file management system of the operating system. Task In the picture below we can see the process being undertaken by the file management system. The two core functions that it must do are; * Naming the files * Storing the files The file manager will interact with the input output subsystem and will result in the locating of the files. Normally the files are stored on an output device. From here the memory management is used to apply the dynamic linking which in turn provides us with a file to be run. It is then the process management that will undertake the completion of opening the file. From reading this it is evident that the four main stages of the operating system need to combine in order for a file to be run. This is a basic summary; there are many more features that need to be talked about for file management and they will be outlined further. When a user creates a file it is stored on the hard drive, or removable media. This is given a human name, for example ricki.doc. From here the programme is run by the operating system searching for a particular attribute. How does it do this? Well, it needs a SFID. An SFID is system file identification. Every file or folder is given one of these when created on the system. This

  • Word count: 912
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay

Global Positioning Systems.

GLOBAL POSITIONING SYSTEMS NAVSTAR system (Navigation Satellite and Timing and Ranging) is the official US Department of Defence name for GPS. The Global positioning system, known as GPS, is a satellite based navigation system made up of a network of 24 satellites placed into orbit by the United States Department of Defence. It was originally intended for military purposes but by in the 1980s the US government made the system available for civilian use. There are no subscription fees or set-up charges to use the GPS but a receiver must be purchased in order to use the system. The satellite, which is built to last 10 years, weighs approximately 100 kg and is 5 m across with the solar panels extended. It was first launched in 1978 through defence technology and a full constellation of 24 satellites was achieved in 1994, which made possible a variety of commercial applications. Technological advancements also contributed to the development of GPS, among them satellite launching and control, microchips, correlation circuity, time-difference of arrival technology, microwave communication, radionavigation and atomic clocks. GPS satellites circle the Earth twice a day at elevations of about 17 600 km and are held in accurate geostationary (the satellites are always over the same location relative to the surface of the earth and rotate with the same speed as the earth's rotation)

  • Word count: 1474
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay

This system is designed for the monitoring of post examination re-marks for any test papers that a centre has requested to be re-marked.

Contents Page. Requirement of Brief Evidence Page Reference Design Definition of data requirements Top down design. Data relationships. Inputs Processes Outputs. 2 3 3 3 3 User interface design including outputs, forms and reports. Software choices. Report design. Visual basic interface. Letter design. 4 5 5 6 Method of data entry, including validation Validation checks. Error messages 6 7 Record structure, file organisation and processing Candidate table. Fields in tables Links between tables. 7 8 8 Security and integrity of data Security. 9 System design Flow chart. Links between interface 0 1 Implementation / Testing Hard copy output to prove the correct working of the system. Design of queries Design of reports Test data. Test runs - print screens. 2 3 4 5,16,17 Hard copy solution. Visual Basic codes. 8,19,20,21 Appendix A - Printouts of test data runs. Reports for UKAB Letter to exam centre. 22 This system is designed for the monitoring of post examination re-marks for any test papers that a centre has requested to be re-marked. The top down design helps to clarify the problem and separate it out into smaller working units. Diagram 1 Top Down Design. Diagram 2 helps to show the relationship between the different units identified in the top down design. Data Requirements Diagram 3 Data Relationship. .

  • Word count: 3773
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay

'Describe the organisation and work of the people at Bletchley Park.' Bletchley Park, also known as Station 'X', was setup in 1938 with two main aims. One was to decode the hundreds

History Coursework Year 10 'Describe the organisation and work of the people at Bletchley Park.' Bletchley Park, also known as Station 'X', was setup in 1938 with two main aims. One was to decode the hundreds of signals and messages sent by Germany and its allies, which used simple codes. And the other was to crack the Enigma; the most important aim of Bletchley Park. Station X was set up in Milton Keynes, which is about 50 miles north of London. It was not set up in London for security reasons, and because of the risk of bombing, if war was to break out. Also as it was a rural area, it increased the secrecy, and also allowed it to expand. During 1939, there were less than one hundred people working at Bletchley Park, yet four years later there were over 7,000. To break the Enigma, there was a need for a range of different specialists, as well as for 'common' workers. The academics (code breakers) were used to cracking codes with pencil and paper, yet the Enigma was a mathematical machine and needed mainly mathematicians to break it. Therefore many of the recruits were trained in mathematics as well as in code breaking. Allistair Dennistion, the head of GC & CS (Government Code & Cipher School) hired many recruits, mainly mathematicians. However they also needed linguists, and people with a wide range of general knowledge as well as logic (even Chess Champions were

  • Word count: 918
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay

Membership System For "Abbey Court Leisure health and fitness" - computer system design

MEMBERSHIP SYSTEM FOR "ABBEY COURT LEISURE HEALTH AND FITNESS" LEICESTER USER GUIDE MANUAL BY Nikita Kevat 25th April 2004 Contents . Introduction 2. Starting up the system 3. Maintaining the membership data (for example) 4. 5. 6. On Screen Help 7. Troubleshooting 8. Security 9. Back-up procedures 0. Installation 1. Glossary of technical terms 2. Index USER MANUAL INTRODUCTION This software is designed to help keep track of customers and their membership at Abbey Court Leisure and Fitness in Leicester. It will help you as the user to overcome any problems and get used to the system to use regularly. This user guide is designed to help you use the Abbey Court Leisure system to add member's details and print letters out to charge them the annual fee. It will also show you the hardware and the software that is required to use the system. This user guide is a systematic guide showing you how to manage the system and how to install it on your own computer. This user guide also tells you how to avoid common errors. It has been designed to run on a PC running Windows 98 or above and needs Microsoft Access 98 or above and Microsoft Word 98 or above to be installed on the computer before usage. If these programs are not installed on the computer then the system will therefore not be able to load itself. The system also needs about 1Mb of disk space to

  • Word count: 2246
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay

Time and Cost Estimating Techniques

Time and Cost Estimating Techniques Estimating work times provides several benefits for the project manager. It gives an idea of the level of effort required to complete a project. This information then enables the project manager to produce a realistic plan based upon that effort. Estimating also helps the project manager anticipate the budget for the project. There are many formal techniques available to estimate time and cost for activities. Please refer to the Project Management Reference Section for more details on these techniques. Anyone reviewing these estimates should understand that they are approximations, not accuracies. Although the formal techniques are very specific, most of them have the following tasks in common: * Break activities down into small pieces for easier and more accurate estimation. (WBS) * Review historical information and compare to current activities. * Include a contingency buffer for potential risks. * Solicit advice from others that have previously completed similar activities. * Identify and document the assumptions and parameters used to derive the estimates. Microsoft Project Microsoft Project is project management software. Project management software assists project managers by providing a means for organizing project information. A project manager uses the software to enter and maintain a workplan that organizes

  • Word count: 1247
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay