null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
847730
ICT - Scenario 1
Description
Facts about Scenario 1. Comment below if this helps you :)
No tags specified
ict
scenario 1
gcse
ict
gsce
Mind Map by
Evangeline Taylor
, updated more than 1 year ago
More
Less
Created by
Evangeline Taylor
almost 11 years ago
56
2
0
Resource summary
ICT - Scenario 1
Smart Phones
Better at communication (More ways of communication)
SMS
Video calls
Phone calls
Portable (easy to carry around)
Instance
AUP (Acceptable Use Policy)
Sign an agreement with the Terms and Condition with there equipment
Agreement of rule of using
Benefit of the employee
Stopping them from getting detracted
Benefit of the employer
Insure that they can't downloading illegal apps
Can't download they want
If they go against the AUP the employer as something against them
Apps
App use internet for updates
Internet charges the company. Company of pay for the apps they have load.
Diary management:
Help organized staff and business
Allow the staff to work away from the office
Allows employee to check update schedules at home and about.
Synchronising schedules:
Allow commutation between the office controller and technicians
Priority costumer
Positive
Better reputation for the company (getting to special customer quicker)
Negative
Change in schedules may clash with other previous work schedule (before priority)
Types of computer systems (best for portable) for working remotely
Tablet
Laptops/Netbook
Smart phone
Mobile phone
Connectivity:
Wifi
USB
Bluetooth
Inferred
Storage device
Cloud
DVD/CD
External Hardive
Internal memory
Memory card/stick
Communication method
Voice telephone
Social Networking
Blogs
Emails
SMS
Collaborative working
Shared access inserting comments tracking changes and ability to view others input
Monitoring employees
Positive
Make sure that employees are working at the right place and the right time (GPS)
Negative
Unethical
Data secured methods
Password – changing regularly– if they are known it can’t be access by unauthorised people(hackers)
Encryption – To hide personal data
Preventing data lose and corruption and theft (all above)
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
Networks
Will8324
Types and Components of Computer Systems
Jess Peason
Input Devices
Jess Peason
Output Devices
Jess Peason
User Interfaces
Skeletor
FLAT FILE VS RELATIONAL DATABASE
rosiejones
Virus
Lucy Lesport-Hall
Weimar Revision
Tom Mitchell
Biology Revision - Y10 Mock
Tom Mitchell
Biology- Genes and Variation
Laura Perry
Enzymes and Respiration
I Turner
Browse Library