It applies to music downloads, personal details, medical history, financial records, and retests a company or creator from plagiarism and theft of owned ideas and work. When referencing someone else's work it is important to acknowledging sources such as websites or books used. This also applies to Images taken from Imaging sites unless bought through stock photography. Electronically, access to Information can be restricted and permissions granted to only those chosen by the authority, an example of this is an HRS folder in a company network.
Only authorized members of the HRS department would have access to the folder and Its contents as It would contain personal and confidential Information. A person or a business proven to be breaking the Data Protection Act and Copyright laws will be heavily fined and can face a prison sentence. Bal . 2 Describe a minimum of four different features of information. Manuals and training guides provide information on how to use products and appliances Including manufacturing guidelines and warranty information.
Training guides are tutorials for the use of hardware and software, these start from a beginner level to more advanced features and functions. These can be supplied both paper and electronic format. Books containing factual Information can be bought from specialist bookstores, queasiness or borrowed from libraries. These can be history and language books or 1 OFF ordinate survey maps contain information about local, national or international areas and countries, whilst reports are created to show information relating to finance, success, stock and inquiry.
These can be presented in a written form or a presentation on television or over the radio. Creative work is a vital part of advertising information to attract interest and sales. Companies produce posters, brochures and other marketing materials to appeal to their current customer base and attract curiosity from new ones. Information treated on marketing materials usually relates to discounts, new products, extended sales, company profiles and imagery of goods, ideas and concepts.
Live information such as bus / trains times, road traffic news, national news bulletins and weather forecasts are available to provide continuous up to date coverage online, on television and through electronic displays. This is arguably the most widely used and necessary information feature to allow the smooth operation of transport, businesses and increasing public knowledge on local and worldly matters. 82. 1, 82. 2, 82. 3 & 82. 4 Use a minimum of three different examples of access, aviation and search, one from each category. Use a minimum of three different search techniques and evaluate if the outcomes are fit for purpose.
Access - entering a password to access a file or folder, creating a database query, entering an exact web address into an internet browser. Navigate - the use of website menu bars, browsing a company intranet, using bookmarks and favorites to store and recall websites and pages of interest. Search - the use of a search engine, using the find tool in Microsoft programs, using a wild card in database systems when a range of results is required or the exact search name unknown. Evaluation: - It is important that the information searched for and the results are relevant and up to date.
Some websites are not regularly updated so will contain outdated information, a way to check for this is to check the end date on the copyright notice at the base of most home pages. Other informative sites such as Wisped are contribution based so users all over the world can input information on a topic. This information may not be accurate or be referenced incorrectly. Using a wildcat in databases will result in increased data found; sort through this for the information required will take time. However it is a useful tool if the name or description of what is being searched is unknown.
Level of detail required is fundamental to how information is searched and accessed. For more detailed such as books and magazines on a specific topic. Navigation must be a sufficient option on any commercial website so the user can easily find what they are looking for. Poor design and limited functionality will dissuade users from using a site. 83. 1 & 83. 2 - See Using Email evidence 83. 3 A minimum of three different examples of managing storage. Managing storage in electronic communication is important to allow for organization ND easy retrieval of information.
Creating message folders and suborders with rules attached for incoming mail will help to organize busy infixes into different categories such as department, sender name and importance. Suborders can be included for completed tasks or read and replied to emails. Any important attachments should be downloaded to a specific folder and the email archived or deleted if possible to create more space. Archiving important emails allows them to be saved on an individual computer or on a network. These emails can be retrieved when needed and opened in a compatible email client.
Deleting unwanted emails ND regularly clear Junk and deleted items folders will help to increase space and also the running speed of an email program. These folders can be set to auto empty on close of the program or after a certain number of days. 83. 4 & 83. 5 Describe how to, and respond appropriately to, at least two common IT- based communication problems. When communicating through IT some problems can occur which can be rectified by following guidelines set by the network administrator of the manufacturer. Examples of problems that can occur are attempting to send or receive an email with an attachment that is too large or unreadable.
Many businesses set size restrictions on incoming and outgoing mail for security and space management. Decreasing the size of the file or finding an alternative method of delivery such as a USB stick will allow the recipient to receive without further issues. Sometimes an attachment cannot be opened as it has been created in a program not installed on the recipient's computer. Appropriate programs, or the sender and resave in a different format. Emails from unknown senders can be problematic. These can be SPAM or fishing emails attempting to trick the recipient into entering personal or banking details ender the guise of a legitimate company.
They can also be innocent messages that can contain a virus attachment which is intended to damage the recipient's computer. Ways to prevent this are to install antivirus software and update it regularly. Increase firewall settings and if possible install spare prevention software also. Be wary of emails from unknown senders, if an email address does not appear legitimate most email clients have a block feature to stop further emails being received from the address. Any emails that appear to be genuine such as from a bank are often not so contacting the company by phone will clarify what is required.