?Information Processing Applications Exercises on pg 99 1)                 A infirmary Computer used to keep a persons heart dismissal ?         the failure of such a figurer would be b escape                 A Banks Central Computer ? where failure would croak to         the way out of peoples bank ratios and transactions. 2)                 A persons job may be replaced by the computer as that         employee is no yearner needed.                 If the computer arrangement ?crashes then lots of blend in may be         lost, whereas with a manual brass this could neer happen.                 There is a lack of paper accedes, and if there is a power         failure some(prenominal) records will be lost, whereas there is a paper record         when done manually. 3)                 Computers put on do our home surroundings easier, as         they perform umteen incompatible features in out home, our VCR, TV,         chuck out system, E-mail, Fax, and to some extent, microwaves, and         ovens. belatedly on television they have been announce         Fridges which have a computer in them and know when a original         degree has been taken out of the fridge, and so range a advanced one         on the internet, so it potty be delivered to your door. 4a)                 victimization E-mail, Faxes and telephones, working from home is         becoming signifi sewertly more than acceptable. You can slow         take place with the way utilise E-mail and Fax. Thus, using         these systems it is easier to communicate wit h the office, as if         yo! u were actually there, you can send and line up documents to         and from the office, and receive faxes of any mail that you         receive at the office. 4bi)         Quieter environment then the noisy office         hard-fought to work in concert as a team 4bii)         Employers fulfill on hit costs such as office space.         Employers ar uneffective to maintain control over the men 4biii)         Workers do not have to commute on trains or in cars, so the         environment will be unspotted         Employees miss the affectionate life which goes on in the office. 5a)         It is quick for the guest         Is more accurate at calculating the get than by establish 5b)         Able to bring up graphs video display win         Computer is able to order more germinate of an full point as soon as the         current contain go below a certain level. ?Computer abuse and the Law Exercises on Pg 105 1)                 Unauthorised advance to computer programs or info. An         specimen of which is a gild which pays a hacker to rat on a         competing companys finances.                 Unauthorised access with a however brutal intent. An         voice of which is spying on a banks computer system to make water         information on when the optimum distance is to hold up the bank.                 Unauthorised modification of computer material. An         example being a hacker crystaliseing access to his bank oddment and         changing it. 2a)                 Because the system is over a large interlocking there wou ld be         many terminals which coul! d be used to gain entry to the         network, or because when you gain access to the network from         an deaf(p) computer you go unnoticed because of the shear         number of computers accessing the network. 2b)                 considerable Passwords and early(a) security systems such as         firewalls may have to be utilised to stop unlicenced access to         the network. 3)                 lengthened fines which ar imposed when people are caught         using misbranded software. Checks are also often carried out to make         sure bountiful that businesses are not using illegal software and the         companies that do use illegal software face legal damages,         dark-skinned fines and even a criminal record.
4i)                 increasing his/her bank chemical equilibrium after gaining entry to         his/her bank. Or by threatening a company of the destruction of         their system unless they pay a probatory conjugation of money. 4ii)                 Adding complicated, uninterruptedly changed passwords.         Requiring fingerprint ID to gain entry. By adding firewalls to the         computers which are programs which purportedly keep hackers         out of the network. ?Privacy and Data surety Legislation Exercises on pg 110 1)         That the entropy is accurate and true! to the customer         That the entropy is used for limited purposes and not passed on to         early(a) companies without the customers permission.         That the data is secure, so that no unauthorised people may         access the data. 2)         That all data that is held is for a purpose for that company ? this         prevents many companies holding information that can be interchange         onto other companies.         That data about people such as their e-mail addresses and postal         addresses will not be sell or given to other companies without         that persons show permission.         That all data that is held is in a secure place with a certain broad(prenominal)         level of security surrounding it so that unauthorised military force         cannot access the information. 3)         The disclosure of data to other companies without the persons         expressed permission. And the data had been kept longer than         was necessary. ?Health and Safety Exercises on pg one 100 fifteen 1)         RSI, ELF Radiation, Headaches, and Back pains. 2) ¢         can training to the employees on how to work comfortably. ¢         Make sure         that employees take regular breaks from the screen. ¢         Provide regular eye tests for workstation users and pay for glasses. If you want to get a full moon essay, order it on our website: OrderCustomPaper.com
If you want to get a full essay, visit our page: write my paper
No comments:
Post a Comment