Loading presentation...
Prezi is an interactive zooming presentation

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

R001 Revision

No description
by

Preet Bains

on 3 June 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of R001 Revision

!REVISION! Use these screen prompts to ensure you know the key points for the exam

Remember the VLE has lots of useful links and resources for you to research words/terms you are unsure of LO2: How to work with information and data to meet specified business needs Cambridge Nationals R001 LO1: How ICT can be used to meet Business Needs Features and Purposes of: Data Capture Methods: Data Protection Act LO4: Understand how legal, ethical,
safety and security issues affect how
computers should be used LO3: Know how ICT can be used to
support business working practices How do businesses communicate? Desktop & Portable Devices
Input Devices
Output Devices
Storage Devices
Software (Operating Systems, Utility and Applications)
Configurations (Typical office and customised) How some factors can affect the choice of system: cost, availability, user needs, data security Types of Connections: Wired and Wireless How to connect a computing device to an existing wireless network: network name, i.e. Service Set Identifier (SSID)
the use of security keys
appropriate firewall settings for public and
private networks How organisations can monitor employees i.e. GPS location tracking, monitoring internet use, monitoring communications (email). Manual and Automatic What needs to be considered when choosing Manual or Automatic nature of information to be collected (e.g.
environmental conditions (i.e. location)
cost
availability
ease of use
data security What to consider when designing Data Capture forms Easy to understand, quick, colours/logos, easy to collect data How to code information in Databases and Spreadsheets i.e. Data Encryption Data Validation E.g.
Field Size
Data Type
Input Masks
Required Field
Validation Rules File Formats .wav .ppt .xls .doc .avi .mp3 .wmv Data Storage Removable and Remote Data Security DPA and DMA Data Transfer Speeds, Data Download Speeds Data Backup & Recovery What factors affect the above? Remote technology: SMS, voice telephones, instant messaging, email, chatrooms, video conferencing, webcams, blogs, social networking Using features on these technologies appropriately: cc/bcc, subject, appropriate content etc.
Benefits and Drawbacks of these (emotional and moral implications) How diary management software can be used to organise work schedules: creating appointments/meetings
inviting participants
creating tasks
creating to-do lists
setting reminders Working Collaboratively documents in shared access locations, i.e.:– network shared areas (e.g. read/write access)
– cloud-based services (e.g. providing
open – or restricted – access to services enabling the creating/editing of documents on-line)
inserting comments into an existing draft
editing drafts, tracking changes made
reviewing facilities: accepting or rejecting changes made Legislation & Businesses Computer Misuse Act Health & Safety Copyright Moral & Ethical Issues Abuse
Safety
Cyberbullying
Monitoring
Use of personal data Implications of Data Use on a Business Legal Action Impact on Customers (loss of confidence) Impact on employees (disciplinary action/dismissal) Impact on the Company (increased costs, loss of income/profit) Threats to Data Security Virus
Worms
Trojan
Phishing
Spyware
Adware
Hacking
DoS attacks
Physical Threats
How do you minimise these risks? Updating Operating Systems and Security Software Manual and Automatic
Full transcript