You are on page 1of 2

R001 Work Booklet

Resources in the shared area: Student


Shared/ICT/George/R001/Revision

Communication

3G and 4G
Email
File sharing
Smart Phone
Pager

Methods by which data may be collected

Data Capture methods paper


Data Capture methods - online
Optical Character Recognition (OCR)
Data capture design (Drop down menus, tick boxes, data validation, input masks, large
writing, easy to fill in boxes, screen enlarger, language options, verification points, support and tips, use of
examples, etc)
Data Protection Act (1998)

The use of a database including forms, queries and reports

Database definition
Forms
Queries
Reports

Possible risks to data

Computer virus
Worm
Trojan Horse
Phishing
Adware
Hacking
Denial of Service Attack
Physical Threats

Methods by which laptop


unauthorised access
computers can be protected from

Log in and password


USB security key
Access rights and permissions
Timed screen saver locks
WEP and WPA
Internet and Network logs
Key logging
Encryption

The hardware and software

Diary Management Software


Desktop computers
Laptops

Possible impacts of providing access to Wi-Fi within an organisation


that holds sensitive data

Internet usage
Hacking
Illegal activity
Intranet

The use of the defragmentation tool, and other system tools, to


perform routine maintenance tasks on computers

Utility programs: Defragmentation tool


Utility programs: System restore
Utility programs: Scandisk
Backups

The range of devices and media for storing data and the benefits and
drawbacks of each.

Optical disks (e.g. CD and DVD for data storage)


Magnetic media (e.g. internal and external hard disk drives
(HDD), tape)
Solid State Drives (SSD)
Memory cards, i.e. flash memory devices
Cloud storage

You might also like