B1.1 & B1.3 Use a minimum of three examples of information: two from IT based and one from another source. Minimum of three different examples of copyright.
There are many examples of electronic and paper based information on their sources. Internet news sites such as BBC provide daily global information whilst reference and research sites such as Wikipedia and GOV (UK government) offer information on a range of topics, from general interest to education, finance, legislation and law. Most businesses of a certain site will have a company website to sell and advertise their products and services. These companies will often have a staff intranet run on company servers for employees only. This gives access to company information, handbooks, procedures, forms and announcements. Paper based information is found in newspapers, books, maps and other printed literature and materials. Marketing information takes form in posters, billboards, leaflets, business cards and advertisements.
Copyright law applies to all information that is available to view and be stored. It applies to music downloads, personal details, medical history, financial records, and protects a company or creator from plagiarism and theft of owned ideas and work. When referencing someone else’s work it is important to acknowledging sources such as websites or books used. This also applies to images taken from imaging sites unless bought through stock photography. Electronically, access to information can be restricted and permissions granted to only those chosen by the authority, an example of this is an HR folder in a company network. Only authorised members of the HR department would have access to the folder and its contents as it would contain personal and confidential information. A person or a business proven to be breaking the Data Protection Act and Copyright laws will be heavily fined and can face a prison sentence.
B1.2 Describe a minimum of four different features of information.
Manuals and training guides provide information on how to use products and appliances including manufacturing guidelines and warranty information. Training guides are tutorials for the use of hardware and software, these start from a beginner level to more advanced features and functions. These can be supplied both paper and electronic format.
Books containing factual information can be bought from specialist bookstores, businesses or borrowed from libraries. These can be history and language books or dedicated to an interest or skill, for example carpentry or photography. Road and ordinate survey maps contain information about local, national or international areas and countries, whilst reports are created to show information relating to finance, success, stock and inquiry. These can be presented in a written form or a presentation on television or over the radio.
Creative work is a vital part of advertising information to attract interest and sales. Companies produce posters, brochures and other marketing materials to appeal to their current customer base and attract curiosity from new ones. Information featured on marketing materials usually relates to discounts, new products, extended sales, company profiles and imagery of goods, ideas and concepts.
Live information such as bus / trains times, road traffic news, national news bulletins and weather forecasts are available to provide continuous up to date coverage online, on television and through electronic displays. This is arguably the most widely used and necessary information feature to allow the smooth operation of transport, businesses and increasing public knowledge on local and worldly matters.
B2.1, B2.2, B2.3 & B2.4 Use a minimum of three different examples of access, navigation and search, one from each category. Use a minimum of three different search techniques and evaluate if the outcomes are fit for purpose.
Access – entering a password to access a file or folder, creating a database query, entering an exact web address into an internet browser.
Navigate – the use of website menu bars, browsing a company intranet, using bookmarks and favourites to store and recall websites and pages of interest.
Search – the use of a search engine, using the find tool in Microsoft programs, using a wild card in database systems when a range of results is required or the exact search name unknown.
Evaluation: – It is important that the information searched for and the results are relevant and up to date. Some websites are not regularly updated so will contain outdated information, a way to check for this is to check the end date on the copyright notice at the base of most home pages. Other informative sites such as Wikipedia are contribution based so users all over the world can input information on a topic. This information may not be accurate or be referenced incorrectly. Using a wildcard in databases will result in increased data found; sort through this for the information required will take time. However it is a useful tool if the name or description of what is being searched is unknown. Level of detail required is fundamental to how information is searched and accessed. For more detailed information, documents are often password protected or found through other means such as books and magazines on a specific topic. Navigation must be a sufficient option on any commercial website so the user can easily find what they are looking for. Poor design and limited functionality will dissuade users from using a site.
B3.1 & B3.2 – See Using Email evidence
B3.3 A minimum of three different examples of managing storage.
Managing storage in electronic communication is important to allow for organisation and easy retrieval of information. Creating message folders and subfolders with rules attached for incoming mail will help to organise busy inboxes into different categories such as department, sender name and importance. Subfolders can be included for completed tasks or read and replied to emails. Any important attachments should be downloaded to a specific folder and the email archived or deleted if possible to create more space. Archiving important emails allows them to be saved on an individual computer or on a network. These emails can be retrieved when needed and opened in a compatible email client. Deleting unwanted emails and regularly clear junk and deleted items folders will help to increase space and also the running speed of an email program. These folders can be set to auto empty on close of the program or after a certain number of days.
B3.4 & B3.5 Describe how to, and respond appropriately to, at least two common IT-based communication problems.
When communicating through IT some problems can occur which can be rectified by following guidelines set by the network administrator of the manufacturer. Examples of problems that can occur are attempting to send or receive an email with an attachment that is too large or unreadable. Many businesses set size restrictions on incoming and outgoing mail for security and space management. Decreasing the size of the file or finding an alternative method of delivery such as a USB stick will allow the recipient to receive without further issues. Sometimes an attachment cannot be opened as it has been created in a program not installed on the recipient’s computer. In this case either an alternative can be downloaded, Windows will recommend appropriate programs, or the sender and resave in a different format.
Emails from unknown senders can be problematic. These can be SPAM or phishing emails attempting to trick the recipient into entering personal or banking details under the guise of a legitimate company. They can also be innocent messages that can contain a virus attachment which is intended to damage the recipient’s computer. Ways to prevent this are to install antivirus software and update it regularly. Increase firewall settings and if possible install spyware prevention software also. Be wary of emails from unknown senders, if an email address does not appear legitimate most email clients have a block feature to stop further emails being received from the address. Any emails that appear to be genuine such as from a bank are often not so contacting the company by phone will clarify what is required.
You May Also Find These Documents Helpful
-
1.4 Confidential business information should be properly secured. If it isn't, data can potentially be misused. For instance, making sure the files you are using have a password put in place to…
- 449 Words
- 2 Pages
Good Essays -
Information that is stored in an organisation has to follow the security and confidentiality procedures. For example finances, customer’s and employee’s details should be secured and only certain members of staff should be able to access physical and electronic data unless you have been given authorisation. If information gets into the wrong hands it could have serious consequences and might lead to legal action.…
- 777 Words
- 3 Pages
Good Essays -
Information comes from a wide variety of sources and an effective business will research information from a range of sources before making decisions. These types of information consist of Verbal, Written, On-screen, Multimedia and Web based.…
- 390 Words
- 2 Pages
Satisfactory Essays -
Finally, do not plagiarize. Your sources are our text book, PowerPoint lectures, documentary films, and in-class discussions.…
- 308 Words
- 2 Pages
Satisfactory Essays -
Some legislation relates to security and confidentiality, for example: • • The Data Protection Act 1998 ensures that all employers who process data on individuals are listed in the register of data controllers The Copyright, Designs and Patents Act 1988 protects the rights of people who create original works.…
- 564 Words
- 3 Pages
Satisfactory Essays -
Organisations have a duty to ensure the security and confidentiality of information under their control. Most organisations have policies on information security and confidentiality which go beyond the requirements of the Data Protection Act. They also have quality control procedures which staff must follow in order to keep information systems secure, accurate and updated.…
- 501 Words
- 3 Pages
Good Essays -
1.1Review the range of groups and individuals whose communication needs must be addressed in their own job role.…
- 2018 Words
- 9 Pages
Powerful Essays -
In order to perform within LSG and to develop my skills listening is one the most important skills I should obtain. As it will portray the quality of my relationship with my team and clients. Listening is important as I need to often obtain information from others to learn new things.…
- 559 Words
- 2 Pages
Satisfactory Essays -
Data Protection: Data Protection Act 1998 which restricts the use of personal data and under the act employees are entitled to see any information that is held about them by an employer.…
- 4046 Words
- 17 Pages
Good Essays -
The purpose of communication is for human beings to be able to understand each other in different ways and for several reasons. It can be any means, not just verbal and in order to achieve that I have to develop my communicative skills. That way I can use this skill to help me learn or explain something to someone or help others learn and let others explain things to me. We also communicate in a business environment to listen to each others' problems, and solve difficulties we face in day to day operations in our work and personal life. It helps us find solutions to hindrances that may come into our lives.…
- 3759 Words
- 16 Pages
Good Essays -
Question: Define restrictive intervention, when it may be used and who needs to be informed of actions taken. Explain why the least restrictive interventions should be employed.…
- 560 Words
- 5 Pages
Satisfactory Essays -
Bibliography: Dames, K. Matthew. "Understanding Plagiarism and How It Differs From Copyright Infringement." Computers In Libraries 27.6 (2007): 24-27. Professional Development Collection. Web. 8 Mar. 2012.…
- 1293 Words
- 6 Pages
Satisfactory Essays -
Effective communication is very important in the work setting especially in health and social care in order that the care worker can develop positive caring relationship with the service users in a manner that individual can feel valued and appreciated. Effective communication is also important for us to give and seek information in the work…
- 56 Words
- 1 Page
Satisfactory Essays -
Verbal communication within the organisation includes, Team Meetings, handovers, telephone calls, staff supervision, line management and training events.…
- 3317 Words
- 14 Pages
Powerful Essays -
References: Lilienfeld, S. O., Waldman, I. D., Landfield, K., Watts, A. L., Rubenzer, S., &…
- 1420 Words
- 5 Pages
Powerful Essays