• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

File management and standard ways of working.

Extracts from this document...


Keep information secure, e.g. from theft, loss, viruses, fire You should keep information secured from theft on hard disc failures; you can also keep your information safe from viruses that can wipe all your files off the computer. The way to keep the information safe is to have a BACK-UP file. A back-up file is a file that has all saved work on it and can be saved under a different name in a different folder or can be saved onto a disc. A floppy disc can also transfer up to 1.44 megabytes of data between computers. You can use hard discs for back-ups because the surface of the disc stores data digitally, CD-ROMs are read only optical discs, DVD's can hold up to 17 gigabytes of data, Magnetic Tapes are the most common used for back-up devices and Zip or Jaz disc the common removable media all these be used as back-up devices. We do back-ups so that any lost information that is important we can have a mirror copy of the document saved somewhere else so that nothing will happen to it. The backups should be used with passwords, username. I think backup are helpful because if the computer had a power failure and I haven't saved my work then it means I would have to do all the again, which means it would take longer then what it would have been if I had saved it in the fist place. ...read more.


You should save work under different file names because when you go to open up your work up, you know what folder it is in and what the name of the document you need is called. If you know what the name of the document is and what folder it is in you will soon be able to call that work up that is need faster, than having to look at though your folders and every piece of work you have to find out what it is you need. Keep dated backup copies of files in another location You should keep backup copies in other locations to prevent them from being destroyed, as you would have lost the main and the back up copies of the document you have been doing. By keeping dated backup copies of files in other locations, if anything did go wrong you will have the back up document spare to work from instead. Manage your work effectively, e.g. use appropriate filenames and locations By using appropriate filenames when saving your work, you will have effectively put it into a different location. Most operating systems such as Windows XP, divide a backing storage device up into directories. A directory can also be known as a ROOT DIRECTORY. ...read more.


* Data should not be transferred around, except to certain other European countries. Copyright, Design and patents act This act makes the copying of computer software, or software piracy, a criminal offence. The act covers the following activities:- ==> Stealing software ==> Using illegally copied software and manuals ==> Running purchased software on two or more machines at the same time, without an appropriate licence bought from the software supplier. The Regulation of Investigatory power act 2000 The Regulation of Investigatory power act 2000 is also called RIPA for short. The RIPA allows the government to access a person's electronic communications in a very unrestricted manner. Though infringing in the privacy of their Correspondence in a manner many would not tolerate regarding their postal communications. The act is:- * Enables the government to demand that an ISP provides access to a customer's communications with out them knowing. * Enables mass surveillance of communications in transit. * Enables the government to demand ISP's fit the equipment to facilitate surveillance. * Enables to demand that someone hands over keys to protected information. * Allows government to monitor people's internet activities. * Prevents the existence of interception warrants and any data collected with them from being revealed in court. Health and Safety This act relates to what I have said on page 4 under Work safely, e.g. use the correct position for the monitor and chair, Avoid trailing cables, and take regular breaks. 1 Nicola Bryant 10B 10/2 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    as it becomes clear after becoming used to emails which ones are manufactured by viruses and which emails are legit. However, sometimes a virus does manage to go through. When this happens, my anti-virus kicks in. Kaspersky is extremely perceptive.

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    The act should state the protection type needed for all the different data types that can be stored. Some of these data may be highly crucial, which may need to be highly secured and some of them maybe minimally vital, which may need less protection.

  1. Right of privacy under Hong Kong's current laws

    In many circumstances, both the number of legal factors and information subjects can be very large. Those contemplations and inquiries would be not only hard, but impractical, not to mention the application of consent for future personal defence required under the proposal.

  2. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    The Data Misuse act also affects me as if I have my coursework on my computer and don't want to share it and someone and someone hacks my computer and transfers my videos or coursework's without me wanting to I would also be able to deal with the issue because

  1. You have to explain how you have looked after the equipment and ensured its ...

    Obvious names should also not be used. Many large systems use software to limit each user's access to only those files that are needed for the performance of their particular job; just like the system we have in our school.

  2. Legal Aspects of Using Information Technology

    being passed to third parties and who those third parties likely to be * find out where the data about them came from * prevent processing about them which is likely to, "cause damage or stress" * prevent the processing of data for the purpose of direct marketing * ensure

  1. The data protection act

    superior computer knowledge, make false claims on the particular person who is a victim of this particular situation, or even make the victim end up having a county court judgment. The way these people make this. 3. Copyright is a serious issue with computers.

  2. Data Protection Act

    For example, it maybe information held about a loan that a person has taken out as a check on their credit rating. The act gives people the right to see personal file, for example one held by a bank on a customer's creditworthiness.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work