The Impact of ICT on Society

The Impact of ICT on Society I will talk about how ICT has effected people from all walks of life, how it has effected jobs and living conditions. The impact of ICT on society is great. As more and more people begin to work from home, or jobs become de-skilled, computer based, the social implications are going to be very serious. The most important issue is increased leisure time, and as more work is done in less time, the result should mean more leisure time. In some rare cases this does happen. Take for example small businesses, or larger teleworker companies where people are allowed to work from home. Leisure time does not always increase, the managers and the companies require the workers the same amount of time spent on the job, so people should become more productive and a lot more work will be done. A bonus of this would be that as leisure time increases, the leisure industry will grow, and more people would use the leisure time, which would improve the workers morale. Another effect of ICT on the society is the introduction of home shopping over the Internet, this aspect could possibly result in people never leaving their homes, doing everything from home, possibly resulting in house bound individuals who could not leave their houses even if they wanted to. Continuing on this vein, talking about working at home, the amount of required offices may be reduced.

  • Word count: 875
  • Level: GCSE
  • Subject: ICT
Access this essay

mail merge

Identification My granddad, Sam Screen, runs a local video and game rent or buy shop and he is finding it hard to update all the customers about returning late videos or games, because of the large amount of customers he has received over the years he has had the shop. The customers who have not sent back the video/game will get a notification letter of a continuous 6 hour fee, if a customer is abroad it will be a daily fee. One of our customers name is called Adam Sate, his phone number is 07658548358 and he lives in 117 Edgware Road, London, Middlesex, I17 H1O One way I could help him is to just write out the letters by hand and then send them out to the customers, another way I can help him by using mail merge so he could write 1 letter but when completed he would have (if needed) 10 letters ready for printing then mailing. Using mail merge this will also help him by keeping a documentation of all his customers, addresses and phone numbers for future reference. The advantage of using ICT over manual methods is that you can write out the letter you want, copy it and paste, it for however many letters you want then you can type in all the addresses, names and also prices. Another advantage of using ICT is that instead of typing out the letter and copying and pasting then typing in the names, addresses, phone numbers ect... it is that you can type up a letter use mail

  • Word count: 1859
  • Level: GCSE
  • Subject: ICT
Access this essay

Lancre Festival

Task 2 Design Software Features Software Features Needed Why is this needed? . I must be able to input text. I have been asked to create a text based spreadsheet, so that I can enter descriptions for income and expenditure items. 2. I must be able to copy and paste. I need to insert two tables from shared resources on to my spreadsheet. Copy and paste functions make this task easier and less prone to error. 3. I must be able to make a system that works out all the totals every time someone changes the information. Stuart told me there must be a system that works out all the totals every time someone changes the information. It will make it easier and quicker if someone wants to add more information so they will not have to manually calculate the new totals, with the risk of errors. 4. I must be able to validate cells. I have been told that to create a system so no one can change the table so there are more than 50 floats in the float parade. Validation can be set up to automatically prevent this. 5. I must be able to save and open the spreadsheet. I will need to save it after I finish working and I will need to open the spread sheet when I wish to review it or update it. 6. I must be able to change the font and style of text. I will need to make parts of text stand out. 7. I will need to be able to change the size of some of the cells. I will need to make

  • Word count: 2091
  • Level: GCSE
  • Subject: ICT
Access this essay

Legislation and ICT

Legislation and ICT Briefly summarise the key points regarding the 4 Acts of Parliament The Health and Safety Act of 1974 was set up as a means to protect employees, the public, management and stop safety hazards at work. This is achieved by enforcing strict guide lines that all it may affect must abide by. Failure to do so can result in punishment and fines. The Copyright, Designs and Patents Act 1989 makes it illegal to copy or steal software in order to protect the designer's prophets. This is done by placing a (c) symbol on all products protected by this act. Breaking this can result in legal action and possible imprisonment. The Data Protection Act of 1998 was developed to give protection and lay down rules about how data about people can be used for example criminal records and other such information. Breach of this act has serious consequences and can again result in imprisonment. The Computer Misuse Act 1990 stops the misuse of computers and communications systems for example: Hacking, Data misuse and unauthorised transfer or copying, Email and chat room abuses, Pornography and Viruses. Obviously this act is computer based so it is enforced by means of blocking and monitoring certain websites for breaches of the act. Doing so can result in a fine or imprisonment. How each Act protects each group Group Health and Safety at Work Act 1974 Copyright, Designs

  • Word count: 1202
  • Level: GCSE
  • Subject: ICT
Access this essay

The data protection act

Dean Smith 11k LEGISLATION The data protection act was introduced in the UK in 1984. It gives rights to data subjects (i.e. people who have data about them stored on computer systems). The act was updated in 1998 to take the increasing use of computers, and changes in European Union law, into account. The 8 principles of the data protection act are: . Data must not be processed unless there is a specific lawful reason to do so. 2. Data must only be obtained and then used for a specified purposes. 3. Data should be adequate, relevant, and not excessive for the specified use. 4. Data must be accurate and where relevant, kept up to date. 5. Data should not be kept longer than is necessary for the specified purpose. 6. Data processing should meet the legal rights of the data subjects. 7. Data holders should protect the data against loss, theft, or corruption. 8. Data should not be transferred abroad, except to certain other European countries. Here are some useful bits of information to help protect your data: . To keep information is important and personal. People like to keep their own data to themselves. The main reason for this is to stop the breaching of their privacy from hackers. Their also like to keep their data classified from others as they can use their information to use for illegal purposes that can result in terrible issues. Some hackers even use

  • Word count: 2599
  • Level: GCSE
  • Subject: ICT
Access this essay

The data protection act

Confidentiality A key component for relationship building and sustaining relationships is confidentiality. Confidentiality in any workplace is of utmost importance. It is an important right for every individual. Confidentiality creates trust, respect and shows sensitivity. These qualities are especially important in school as parents, staff and children need to feel safe and secure. Safety and security can only occur where trust, respect and sensitivity are present. Individuals may not feel valued or able to hold their self esteem if private details are passed onto others. Important information may not be passed on if a breach of confidentiality is made. A professional practice would maintain confidentiality at all times. It is a legal requirement to keep individuals details confidential. This is governed by the Data Protection Act 1984 and 1998, the Access to Health Records Act 1990 and the Health Records Act 1990. The Data Protection Act 1998 enforces eight principles of good practice concerning data: . Personal data shall be processed fairly and lawfully; 2. Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes; 3. Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are

  • Word count: 1696
  • Level: GCSE
  • Subject: ICT
Access this essay

The computer misuse act

The Computer Misuse Act (1990) The 1990 Computer Misuse Act was introduced by Parliament to prevent misuse of computers. It was introduced due to a number of reasons. Hackers were able to gain access past security and see data stored on other computers using an Internet connection. Copying can also be quick and easy using online computers and large storage devices such as hard disks. Personal data and written work, such as textbooks, can all be copied without permission. Copies of music tracks from music CDs could be distributed on the Internet using computer equipment. This misuse of computers and the Internet breaks copyright regulations. Spam is another abuse with millions of e-mails being sent to advertise both legal and illegal products. Viruses are also being made which are designed to cause damage to other computers. The Act introduced three new offences: . Accessing computer material without permission (e.g. viewing someone else's files) 2. Accessing computer material without permission with intent to commit further criminal offences (e.g. hacking into a bank's computer as a result of wanting to increase the amount in your account) 3. Altering computer data without permission (e.g. writing a virus to destroy someone else's data) A breach of the 1990 Computer Misuse Act would be if a student hacked into the school database, and altered information without

  • Word count: 823
  • Level: GCSE
  • Subject: ICT
Access this essay

Me Myself and ICT

Me myself and ICT Computer Applications: Word, PowerPoint, Excel, Calc. Internet: Information, Games, Viruses, Key loggers, Internet Banking, MSN, E-mail, Forums, Add-ons: Printers, Scanners, Modems Multimedia: DVDs, games, music, Computers are used for many things around the home and in business they have allowed for very fast transfer of information and can find almost any information in the world in seconds. I use my computer for mainly gaming, this meets my entertainment needs it's a Dell so it was built specifically for my needs and priorities. When playing online I use a free online program called mumble which allows me to talk to other people in the same "room" as me this allows for greater communication and teamwork. This meets my need to communicate. I also use it for homework as it's faster and more up to date than books and libraries however it's not always as reliable for finding information as some sites have incorrect information sites like Wikipedia can be added to by anyone so are unreliable. This meets my need for finding information. However if you don't have a fire wall then there is the possibility of viruses and key loggers which can be very dangerous if you use internet banking. I use Norton Internet Security, which protects my computer and meets my need to be safe online. The computer meets my needs as it allows me to do research on the internet

  • Word count: 2067
  • Level: GCSE
  • Subject: ICT
Access this essay

Microsoft Word

How does Russell show the difference between the two mothers in the play, to affect the audience's response? At the beginning of the play Russell introduces us to the characters of Mrs Jhonstone and Mrs Lyons. Mrs Jhonstone has got a job, but Mrs Lyons has a very well paid husband who works away. Mrs Jhonstone has got 7 children and another 2 on the way. Mrs Lyons can't have children so Mrs Jhonstone sells one of her babies she is having so that both mother can be happy, because Mrs Jhonstone is all ready getting threaded with the welther officer. A quite from the play "I could manage with one more but not two." Her husband used to say "all we had to do is share hands and you would be pregnant" with mrs jhonstone having all her children it seems like she didn't plan her family, but on the other hand mrs lyons wanted a big family but as she couldn't have a child "I wanted to adopted but Mr lyons all ways wanted a son of this own." That is a quite from the play, this means Mrs Lyons is lonely. Mrs Lyons is lonely because she is on her own she hasn't got a child and her husband works away, we get the impression that she hasn't got many friends. Mrs Jhonstone has fears when she finds out she is having twins. But when she tells mrs lyons she says give one of them to me at first mrs Jhonstone says "Oh, Mrs lyons you can't be serious" mrs lyons says your 4 months pregnant but only

  • Word count: 1269
  • Level: GCSE
  • Subject: ICT
Access this essay

Task Analysis.

Task Analysis. There are numerous ways I could solve the given problem of producing a home-based travel agency. Each method has its advantages as well as disadvantages, however some of these outweigh the others. The company could perhaps set up a system themselves, keeping records on paper in a cabinet. This could prove to be an effective way to store and file customer information. Records could be accessed easily with little effort whilst kept secure, without worry of third parties obtaining customer's personal information. As helpful as this may be, there are many disadvantages to this method of storing personal details. A container to store the files in securely, could take up a lot of valuable space and be time consuming to set up as assembly of the container would have to be considered as well as the time it takes to write out each file, print and sort for storage in a logical manner such as alphabetically. Also, time would be consumed when new records are created, printed and stored. The loss of a file or record due to a number of factors including misplacement and destruction of data could become a hindrance as money and time would be lost. Another method would be for the company to perhaps set up their own database system. Again, there are many advantages and disadvantages to this technique. The system would possibly be less efficient compared to a professionally

  • Word count: 733
  • Level: GCSE
  • Subject: ICT
Access this essay