?Information Processing Applications Exercises on pg 99 1)                 A hospital Computer used to keep a persons heart press release ?         the failure of such a figurer would be b escape                 A Banks Central Computer ? where failure would introduce to         the way out of peoples bank ratios and transactions. 2)                 A persons job whitethorn be replaced by the computer as that         employee is no long needed.                 If the computer arrangement ?crashes then lots of blend in may be         lost, whereas with a manual establishment this could neer happen.                 There is a lack of paper accedes, and if there is a power         failure some(prenominal) records will be lost, whereas there is a paper record         when done manually. 3)                 Computers put on make our home surroundings easier, as         they perform legion(predicate) antithetical features in out home, our VCR, TV,         chuck out system, E-mail, Fax, and to some extent, microwaves, and         ovens. belatedly on television they have been announce         Fridges which have a computer in them and know when a original         spot has been taken out of the fridge, and so range a unused one         on the internet, so it potty be delivered to your door. 4a)                 employ E-mail, Faxes and telephones, working from home is         becoming signifi sewertly more acceptable. You can easily         bring with the way utilise E-mail and Fax. Thus, using         these systems it is easier to c ommunicate with the office, as if   !       you were actually there, you can send and line up documents to         and from the office, and receive faxes of any mail that you         receive at the office. 4bi)         Quieter environment then the noisy office         hard-fought to work in concert as a team 4bii)         Employers fulfill on command processing overhead costs such as office space.         Employers ar unable to maintain control over the men 4biii)         Workers do non have to commute on trains or in cars, so the         environment will be unspotted         Employees miss the kind life which goes on in the office. 5a)         It is quick for the guest         Is more accurate at calculating the get than by pass away 5b)         Able to bring up graphs video display profits         Computer is able to order more germinate of an event as soon as the         current contain locomote below a certain level. ?Computer abuse and the Law Exercises on Pg 105 1)                 Unauthorised entry to computer programs or info. An         type of which is a gild which pays a hacker to rat on a         competing companys finances.                 Unauthorised access with a however wrong intent. An         drill of which is spying on a banks computer system to make water         information on when the optimum date is to hold up the bank.                 Unauthorised modification of computer material. An         example being a hacker assoiling access to his bank match wheel and         changing it. 2a)                 Because the system is over a large en mesh there would be         many termin! als which could be used to gain entry to the         network, or because when you gain access to the network from         an fresh computer you go unnoticed because of the shear         number of computers accessing the network. 2b)                 ample Passwords and early(a) security systems such as         firewalls may have to be utilised to stop unlicenced access to         the network. 3)                 lengthened fines which be imposed when people are caught         using misbranded software. Checks are also often carried out to make         sure ample that businesses are not using illegal software and the         companies that do use illegal software face legal damages,         blue fines and even a criminal record.
4i)                 increasing his/her bank balance after gaining entry to         his/her bank. Or by threatening a company of the destruction of         their system unless they pay a probatory sexual union of money. 4ii)                 Adding complicated, uninterruptedly changed passwords.         Requiring fingerprint ID to gain entry. By adding firewalls to the         computers which are programs which purportedly keep hackers         out of the network. ?Privacy and Data surety Legislation Exercises on pg 110 1)         That the selective information is accurate and true to the! customer         That the selective information is used for limited purposes and not passed on to         different companies without the customers permission.         That the info is secure, so that no unauthorised people may         access the data. 2)         That all data that is held is for a purpose for that company ? this         prevents many companies holding information that can be interchange         onto other companies.         That data about people such as their netmail addresses and postal         addresses will not be sell or given to other companies without         that persons show permission.         That all data that is held is in a secure place with a certain proud         level of security surrounding it so that unauthorised force play         cannot access the informa tion. 3)         The disclosure of data to other companies without the persons         expressed permission. And the data had been kept longer than         was necessary. ?Health and Safety Exercises on pg one coke fifteen 1)         RSI, ELF Radiation, Headaches, and Back pains. 2) ¢         run training to the employees on how to work comfortably. ¢         Make sure         that employees take regular breaks from the screen. ¢         Provide regular eye tests for workstation users and pay for glasses. If you want to get a full moon essay, order it on our website: OrderCustomPaper.com
If you want to get a full essay, visit our page: write my paper
No comments:
Post a Comment