Tuesday 1 May 2012


Health and Safety working practices


When working in a computer environment you have to make sure that the health and safety rules apply such as,
·         Chairs:  The chairs in the work place need to be adjustable so the worker does not be uncomfortable while doing his job.
·         Another safety feature is the minimum amount of plugs plugged in to save from heating up and melting.
·         Also take regular breaks, every 45 minute take a 5 minute break just so your eyes do not become sore.
·         More health and safety feature is the lighting, so to make sure the sun light is not coming in and hitting your eyes and your screen to stop from strain eyes.
·         Another rule is all bags to be placed under the desk to prevent people from falling.
·         Another one is the perversion of repetitive straining injuries this is just so your wrists don’t get sore you can adjust the height of you seat to make it more comfortable and easier to fulfill your duties.



When connecting peripherals

When connecting all the peripherals below make sure that all plugs are turned off and taking out, then plug in the peripherals making sure they go in right and are connected then when this has been completed you can now turn on the plugs and plug it back in. when you have that step done turn on the computer and check if all the software has being installed and is working correctly, then your computer and peripherals should be working.
·         Printer
·         Speakers
·         Scanner
·         Digital Camera
·         Microphone



Connecting peripherals a PC





This is me turning the computer off at the plug. The computer is turned of because of health and safety because if it was left on you have a risk getting a shock.



This is before I connected the speaker cable. When I was plugging in the speakers I was on my knees for health and safety reasons.






This is me connecting the speakers to the computer. I connected the green lead into the green port on the back of the hard drive







This is the computer connected to the speakers. The speakers are connected correctly to the back of the hard drive because I turned the computer on and played music at it worked.



This is me connecting the usb to the computer. I connected this in the front because the lead was not long enough to reach from the back to the top of the table. So therefore I would have had to reach over the table so it was a health and safety precaution.



This is me connecting the camera to the computer



When we connected the camera this icon popped up to let you know that the camera is connected properly.  







Then we whet to  my computer on the desktop this icon appeared saying that a portable device was connected.



When we clicked on the icon of the camera and went into the images folder we found all the images that we took.

End Result

At the end I tested the speakers and the camera to see if they were working. I played music to see if the speakers were working and they were then I connected the usb lead to the computer and the camera and as you can see above I have the pictures so therefore it worked.


Monday 26 March 2012

Assigment 4

In this assignment I have been asked to evaluate a network from the security threats and provide solutions. The network manager has giving me a list of all the problems


He has asked me to help resolve all these problems. There is no security at all on the network or even in the building, so therefore any one can access the information stored on the network. There is also no log on names required so therefore it is very easy to access a piece of information. There are many ways to solve these problems such as first getting security on the building by putting up gates and fences with keypads, CCTV and alarms and on the computers to protect it from people entering the system. The other way of making the information safe is by putting usernames and passwords on the server so only some people can have access to the higher levels of information so the newly employed just can’t jump into all the important information.  


There are also other problems on it like there is no restricted access on the internet so there for the employers can be sitting on websites when they should be doing work and costing the employee money. The staff are also allowed to install and remove software this is dangerous because they can destroy your computer when adding software because they could install virus or Trojans. A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the owner and A Trojan is a program with a secret purpose - usually malicious. Trojans enter your computer disguised as an email or free program you have downloaded from the Internet. Once installed a Trojan attempts to broadcast information to its author each time you connect to the Internet



Other problems are that the information is only backed up once a month when it should be backed up ever day and stored in a secure building incase of fires of flooding but in this case there stored in a plastic box in the same building. This can be resolved by storing them in a fire prove safe in a different building. 


The information that they store is all personal information such as purchases account numbers, bank details, customer names and addresses and purchase history. All the staff in the company has access to this information so there for you are breaking the data Protection Act 1998.

The Computer Misuse Act became law in August 1990. Under the Act hacking and the introduction of viruses are criminal offences. Universities and colleges need to co-operate to take action under the Act as the offences are likely to be committed by members of universities and colleges, students in particular, and are often perpetrated on machines or networks within the sector.


The downloads are also not monitored so there for they could be sitting all day downloading nonrelated content on the computer and also a risk of getting virus.