Use Computer Systems example essay topic
A major reason this new equipment has been introduced is because of the far greater efficiency resulting from the enhanced speed and accuracy of document production. On a typewriter, the correction of errors is quite difficult and generally leaves some evidence behind. However, with the use of word processors, editing is simple and the final document is not printed out until all the corrections have been made, resulting in a perfect copy. The documents can also be saved and used again if needed. This chapter has also helped me understand the argued disadvantages. The system required for word processing will require a personal computer with software and a printer which will cost far more than a standard typewriter.
However, it is also argued that this investment will enable you to do other tasks too - by using other applications and software. Another disadvantage is that the user has to be trained into using the specific applications before he can make full use of the system, which could take a lot of time. This chapter also explains about copyright issues. I have learnt from this chapter that computer software is copyright material. Copyright means that the specific product or material is protected in the UK by the Copyright, Designs and Patents Act 1988. This act outlines that the product or material belongs to the software producer and it is illegal to make unauthorised copies.
From this chapter I have studied that on many occasions data is also copyrighted. For example, not everyone has the ability or opportunity to draw or take photographs and you often want to include copies of someone else's work. These images or documents may be copyrighted so it is illegal to use them in your own work unless you have gained written permission from the owner. This chapter has also discussed issues relating to security and theft.
Organisations must realise that it is a necessity to consider broad security issues with the aim of protecting against the theft of their computer equipment: o Many organisations employ security staff or CCTV systems to observe access to their facilities. o Staff and visitors may be given ID Cards to track their movements within the organisations building. This is particularly useful in the event of an evacuation, where it would be straightforward to know who is on site at the time. o Doors could also be secured for entry through the use of a code entered by pressing a certain sequence of buttons on a keypad. Only authorised personnel are given the code. Health and safety is another important issue in the use of IT.
This chapter points out some of the problems that occur through the use computer systems. Eyestrain and repetitive strain injury (RSI) can be common among many computer users. It was thought that these "fantastic machines" would result in human work hours being reduced. However, it has turned out that people are working harder than ever before to manage the output of their computers.
Too much given information is also referred to as "information overload". Stress is also an often major factor in work-related illnesses. For some people, just thinking about computers can be enough to cause stress. RSI is the general name given to a combination of disorders affecting the neck, shoulders and upper limbs. Computer users are also prone to eyestrain from spending long hours in front of a screen.
However, fortunately there is no evidence that long hours of computer use causes permanent damage to eyes, but only temporary eyestrain at times. Employers are responsible for ensuring that the employees take regular breaks and that they take notice of any problems that an employee may occur during the use of a computer and provide regular eye tests for workstation users. Employees must ensure that they use the computer equipment correctly. I have learnt that ergonomics refers to the design and functionality of the environment, and covers the complete range of environmental issues. o Lighting.
The office or work room must be well lit as possible. Computers should NOT be placed in front of windows as the users will have to cope with the sun reflecting onto the eyes. However, adjustable blinds should be provided for workstation users. o Furniture. The height of chairs should be completely adjustable, and the backrest should support the user at work and rest. o Work space.
The combination of chair, desk, computer accessories (such as document holders, mouse and mouse mats, paper trays and so on), lighting, heating and ventilation all contribute to the users work space. o Noise. Noisy equipment such as printers, for example, should be given covers to reduce the noise level or placed in another room. o Hardware. The computer screen / monitor must swivel and be flicker-free, the keyboard must be separately attached. o Software. The software used should make the tasks easier for the user to complete. Also, software must be easy to use and must be adaptable to the user's previous experience.
Computer systems are secured so that only authorised personnel have access to applications and confidential data. The most popular method is using passwords. By using passwords, only authorised personnel can gain access to a computer system. However, further passwords can be set, so that only certain people have access to certain applications. Using virus scanning software, you can keep data free from viruses and corruption. Viruses are generally developed to cause damage to computer files and critical system files.
However, most viruses definitely cause annoyance to computer. To keep data safe, its essential keep regular back-ups of the data. Back-ups can be stored on CD ROMs, Zip Drives and many other media. Back-ups should ideally be stored on another location so that in the incident of a fire, the back-ups will be safe and reusable. In the early 1980's in the UK, hacking was not an illegal offence.
However, some universities took hacking as an offence, especially when damage was done to computer programs or data. Soon, the Computer Misuse Act of 1990 declared Hacking as a criminal offence and had prosecution procedures for computer crime. This chapter has also taught me about the Data Protection Act of 1998, which came into force on 1 March 2000. It outlines some rules for processing personal information and applies to paper records and as well as those held on computers. The Data Protection Act of 1998 is a replacement for the Data Protection Act of 1984. The eight rules that must be complied with are: o Data must be fairly and lawfully processed; o Processed for limited purposes; o Adequate, relevant and not excessive; o Accurate; o Not kept longer than necessary; o Processed in accordance with the data subject's rights; o Secure; o Not transferred to countries without adequate protection.