You have to explain how you have looked after the equipment and ensured its safety. You have shown how you have back up information. I have looked up my computer by starting it up

20th March 2006 GCSE Coursework Task You have to explain how you have looked after the equipment and ensured its safety. You have shown how you have back up information. I have looked up my computer by starting it up correctly, by turning on the hard drive and then turning on the monitor once the monitor has received signal. I log on using my correct username and password so it doesn't cause distress to the system. Whilst on the computer I do as asked and when on the Internet I don't open up too many windows to make the computer stay as fast as it is supposed to run at. When I am finished I shut down the computer and turn off the monitor. Then I place the keyboard on top of the monitor and place the mouse-mat on top, to protect the keys. Then I place the mouse on top of the mat. Ensuring the computer's and the person using its safety includes: * Inspections - desk's, chairs, computers. * Training - students are taught how to use equipment properly. * Job Design - Correct software and being designed to do the job. * Eye Tests - People using computers on regular occasions should have regular eye tests. Testing against any deficiencies the computer may cause. There are illnesses you can get from computers and problems that occur whilst using computers on regular occasions. Repetitive strain injury (RSI), backache, eyestrain, headaches and skin rashes are conditions that

  • Word count: 3588
  • Level: GCSE
  • Subject: ICT
Access this essay

Critically evaluate the extent to which it can be said that copyright law gives adequate and appropriate protection to contemporary works of art?

Intellectual Property Law Assessed Essay Student No: 001813779 Question 1. Critically evaluate the extent to which it can be said that copyright law gives adequate and appropriate protection to contemporary works of art? In this essay there are certain questions that need to be resolved in order to completely consider the protection to contemporary works of art under copyright law. In general it will be necessary to consider what exactly contemporary art is in order to understand the extent of the protection, and whether this is reasonable, or is there grounds for reform of the law? Perhaps the law is too strict in this area of litigation, or on the contrary is may be too easy to gain copyright for something that is considered a form of contemporary art? Looking back at the question, by saying to what extent does the law provide adequate and appropriate protection to contemporary works of art, there is an immediate suggestion that there is in fact a problem with the law. How far will the courts go in order to protect so-called contemporary art? In order for a contemporary art form to be considered for copyright there are certain statutory and common law obligations that need to be fulfilled. Firstly it is section 4 (1) of the Copyright, Designs and Patents Act 1988 that defines 'artistic work' as meaning: (a) a graphic work, photograph, sculpture, or collage.

  • Word count: 3584
  • Level: GCSE
  • Subject: ICT
Access this essay

The legislation that protects individuals and groups from the misuse of ICT

Unit 3E; the legislation that protects individuals and groups from the misuse of ICT Introduction; I am going to investigate different legislations that affect the use of ICT, and look at how they affect in particular the people that I have studied in unit 3, I will consider what they have to do to abide by the law, how the piece of legislation protects them and how and what impact it has upon them. Since the introduction of the new technologies, new problems have been created, to tackle these problems certain legislation has been introduced, to allow protection for companies and individuals and to give authorities the power to combat the problems and misuses and where applicable make arrests. Data Protection Act of 1998 As the amount of information about people and their lifestyles held on computers increased, a need became apparent to control the way in that it was collected and stored, the previous ability to access large databases of information led to the introduction of the Data protection act. The data protection act is made up of eight different principles, these are the different points of the law that state what can and can't be done with regards to data, the eight principles are; - Data must not be acquired and processed unless there is a lawful reason to do so. - Data must be processed within the rights of the person supplying the data. - Data must only

  • Word count: 3293
  • Level: GCSE
  • Subject: ICT
Access this essay

Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work act, Health & Safety.

Coursework 3E Legislation Explanation of the type of acts I am going to use in this coursework are Data Protection act, Copyright, Computer Misuse, Health and Safety at Work act, Health & Safety (Display Screen Equipment) Regulations Data Protection Act: Explanation: An Act to make new provision for the regulation of the processing of information relating to individuals, including the obtaining, holding, use or disclosure of such information The law gives people the right to find out what personal information is held about them in organisations. The organisations have to make sure that no one steals the information or it doesn't gets loss as if it does the organisation who break the data protection act can be fined and have to pay compensation to the data subject. The Copyright, Design and Patents Act (1989): Explanation: The copy right design and patents act makes it illegal to copy files without the permission of the owner or the copyright holder. The person who uses copyright files without the allowance can be fined at an unlimited price as well as the person who uses the copy knowing that it is copyright protected can also be fined. The Computer misuse act (1990): Explanation: The computer misuse act makes it illegal to do hacking or producing viruses and using them on someone. This act has been designed to cover problems such as hacking or even preventing

  • Word count: 3215
  • Level: GCSE
  • Subject: ICT
Access this essay

How has technology changed and affected shopping trends and the social behaviour of customers?

TECHNOLOGY & CHANGE CI1141 Individual Report Application Area 2 PESTLE analysis 2 Research topic question 2 Preface 2 Introduction 2 The ICT industry 2 The growth of ICT in the retailing industry over the years 2 Customer shopping habits/trends 3 How Has Technology Changed and Affected Shopping Trends? 3 ICT innovations 3 Types of cards 3 Credit/Debit cards 4 Bar Code Scanner 4 Touch Screen Tills 4 Loyalty/Store Cards 4 On-line shopping 5 Sales Figures 5 How has technology changed and affected the social behaviour of customers? 6 On-line shopping 6 Credit/Debit Cards 7 Environmental and transportation issues 7 Conclusion 8 Bibliography .1 Application Area Retail .2 PESTLE Perspective Social .3 Research Topic Question How has technology changed and affected shopping trends and the social behaviour of customers? 2.0 Preface/Abstract The purpose of this report is to analysis the PESTLE analysis; this report will contain one context of an Application Area, and then choose a research question based on both. In this case am talking about the social aspect and the retailing area. I will also being looking at how IT technology has changed shopping trends and

  • Word count: 3094
  • Level: GCSE
  • Subject: ICT
Access this essay

Legislation protecting people & groups.

LEGISLATION PROTECTING PEOPLE & GROUPS BY Mubarak Umerji Introduction With the advancement of computers and communications in the last thirty years the government has introduced various legislations to protect individuals as well as companies. This coursework details some of these legislations and gives examples of how each legislation protects the computer users and what effects it woul????????d have if the legislation was not introduced. The following lists of legislations are discussed in this coursework: - . Data Protection Act (1998) 2. Computer Misuse Act (1990) 3. Copyright Designs and Patents Act (1988) 4. Health and Safety at Work Act (1974) 5. Health and Safety Regulations (1992) 6. Regulation of Investigatory Powers Act (2000) 7. Internet Code of Practice (ICOP) Data Protection Act (1998) As more and more information came to be stored on computers, much of it personal data about individuals, there became the need for some sort of control over the way that it was collected and the way it could be used. The Data Protection Act 1998 replaces the earlier Data Protection Act 1984. The purpose of this Act is to deal with some of the things that weren't around when the older Act was introduced. These new things include the Internet, loyalty cards and use of huge customer databases for marketing purposes. The new Act also covers manually held data not covered

  • Word count: 3072
  • Level: GCSE
  • Subject: ICT
Access this essay

Right of privacy under Hong Kong's current laws

Right of privacy under Hong Kong's current laws There is a trend to recognize privacy as a human right that should be protected by law, yet, we can find no general right to privacy existing in Hong Kong nowadays. "The concept of privacy doesn't exist in both Hong Kong and UK common law systems, but it doesn't mean that common law doesn't protect people's privacy. Privacy protection is being provided indirectly"1 Prof. Johannes Chan2. However, such indirect protection is still far from being comprehensive. Whereas the right of freedom of speech and press enjoys clear legal protection3, only fragmented and narrow legal provisions can be spotted in separate branches of law, with their focus on an individual's interest in his person or property. Under the current law, our privacy rights are enforceable mainly against the government and corporations, like the the Bill of Rights Ordinance ("BORO") Article 144. Yet, such privacy rights are neither absolute nor all-embracing. The Telecommunications Ordinance and the Post Office Ordinance give government and its law enforcement agencies wide powers to intercept personal communications. As for the media, while there are legal provisions which would apply to journalists as set out in the next section, Hong Kong still counts quite a lot on the self-discipline of the media, in order to save from a possible detriment of freedom of

  • Word count: 2707
  • Level: GCSE
  • Subject: ICT
Access this essay

Leaflet design for Finding Nemo.

Analysis Problem The manager of the well-known cinema Showcase has approached me. He has explained to me that the leaflets produced for his cinema are lacking in quality. There is a film about to be shown at his cinema and I have been offered to design and produce a leaflet advertising this film. This leaflet must be suitable to the target audience, must appeal to people, must attract people to this cinema and be really eye catching to passers-by. What's the film? The film that I will be researching and developing a leaflet for, is Finding Nemo. The story behind this computer-generated masterpiece revolves around the retrieval of a missing loved one. A tiny clown fish named Nemo is literally plucked from his home in the Great Barrier Reef and imprisoned in a Sydney dentist's aquarium, forcing his overprotective father to overcome his fear of the unknown and come and rescue him. This film is based to children with its computer generated graphics and cute characters, but also appeals highly to adults with its 'older generation' humour and real-time situations. The film is for both sexes. The film also appeals to all types of people, as it is not directed at a certain group. This film is for all. Layout of report For the layout of my report, I will keep it simple but effective. All the writing will be in comic sans, and in size 14. The titles will also be in comic sans but

  • Word count: 2641
  • Level: GCSE
  • Subject: ICT
Access this essay

The data protection act

Dean Smith 11k LEGISLATION The data protection act was introduced in the UK in 1984. It gives rights to data subjects (i.e. people who have data about them stored on computer systems). The act was updated in 1998 to take the increasing use of computers, and changes in European Union law, into account. The 8 principles of the data protection act are: . Data must not be processed unless there is a specific lawful reason to do so. 2. Data must only be obtained and then used for a specified purposes. 3. Data should be adequate, relevant, and not excessive for the specified use. 4. Data must be accurate and where relevant, kept up to date. 5. Data should not be kept longer than is necessary for the specified purpose. 6. Data processing should meet the legal rights of the data subjects. 7. Data holders should protect the data against loss, theft, or corruption. 8. Data should not be transferred abroad, except to certain other European countries. Here are some useful bits of information to help protect your data: . To keep information is important and personal. People like to keep their own data to themselves. The main reason for this is to stop the breaching of their privacy from hackers. Their also like to keep their data classified from others as they can use their information to use for illegal purposes that can result in terrible issues. Some hackers even use

  • Word count: 2599
  • Level: GCSE
  • Subject: ICT
Access this essay

Car Safety

Car Safety - By Toni Bull 10APHT This is about features that improve your concentration on the roads. Safety design and features help to protect the occupants of a vehicle from serious injury in an accident. Important safety design features are those, which will help to avoid an accident, protect the occupants in a crash and assist the performance of the driver. Maintenance of your vehicles will ensure good running order and that all safety features are functioning well. Pay particular attention to the condition of your tyres and ensure brakes are functioning correctly with brake pad replacement occurring as necessary. Vehicles should be designed with good field of vision all around and with controls that are within safe and easy reach for the driver. A vehicle designed with good handling and control can improve performance in an emergency situation. Using your vehicle's safety features correctly can decrease the chances of serious injury in an accident. Seatbelts, Airbags and Anti-Lock Braking Systems (ABS) are considered the most important safety features a vehicle can have. There are many other features that can improve safety and should be considered, depending on the operational requirements of the vehicle. Many safety features can enhance the value of a vehicle on the used car market. Seatbelts provide the most important

  • Word count: 2429
  • Level: GCSE
  • Subject: ICT
Access this essay