Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
You can change this under Settings & Account at any time.
Transcript of R001 Revision
Remember the VLE has lots of useful links and resources for you to research words/terms you are unsure of LO2: How to work with information and data to meet specified business needs Cambridge Nationals R001 LO1: How ICT can be used to meet Business Needs Features and Purposes of: Data Capture Methods: Data Protection Act LO4: Understand how legal, ethical,
safety and security issues affect how
computers should be used LO3: Know how ICT can be used to
support business working practices How do businesses communicate? Desktop & Portable Devices
Software (Operating Systems, Utility and Applications)
Configurations (Typical office and customised) How some factors can affect the choice of system: cost, availability, user needs, data security Types of Connections: Wired and Wireless How to connect a computing device to an existing wireless network: network name, i.e. Service Set Identifier (SSID)
the use of security keys
appropriate firewall settings for public and
private networks How organisations can monitor employees i.e. GPS location tracking, monitoring internet use, monitoring communications (email). Manual and Automatic What needs to be considered when choosing Manual or Automatic nature of information to be collected (e.g.
environmental conditions (i.e. location)
ease of use
data security What to consider when designing Data Capture forms Easy to understand, quick, colours/logos, easy to collect data How to code information in Databases and Spreadsheets i.e. Data Encryption Data Validation E.g.
Validation Rules File Formats .wav .ppt .xls .doc .avi .mp3 .wmv Data Storage Removable and Remote Data Security DPA and DMA Data Transfer Speeds, Data Download Speeds Data Backup & Recovery What factors affect the above? Remote technology: SMS, voice telephones, instant messaging, email, chatrooms, video conferencing, webcams, blogs, social networking Using features on these technologies appropriately: cc/bcc, subject, appropriate content etc.
Benefits and Drawbacks of these (emotional and moral implications) How diary management software can be used to organise work schedules: creating appointments/meetings
creating to-do lists
setting reminders Working Collaboratively documents in shared access locations, i.e.:– network shared areas (e.g. read/write access)
– cloud-based services (e.g. providing
open – or restricted – access to services enabling the creating/editing of documents on-line)
inserting comments into an existing draft
editing drafts, tracking changes made
reviewing facilities: accepting or rejecting changes made Legislation & Businesses Computer Misuse Act Health & Safety Copyright Moral & Ethical Issues Abuse
Use of personal data Implications of Data Use on a Business Legal Action Impact on Customers (loss of confidence) Impact on employees (disciplinary action/dismissal) Impact on the Company (increased costs, loss of income/profit) Threats to Data Security Virus
How do you minimise these risks? Updating Operating Systems and Security Software Manual and Automatic