Tuesday, February 19, 2019
IT User NVQ – Communication
Most businesses of a certain site entrust have a compevery website to ell and advertize their products and services. These companies will often have a staff intranet run on company servers for employees only. This gives entry to company Information, handbooks, procedures, forms and announcements. Paper ground Information Is order in news showpapers, books, maps and other printed literature and materials. Marketing data takes form in posters, billboards, leaflets, business cards and advertisements. Copyright law applies to all Information that Is gettable to view and be stored.It applies to music downloads, personal details, medical history, financial records, and retests a company or creator from plagiarism and theft of owned ideas and work. When referencing person elses work it is beta to acknowledging sources such as websites or books used. This also applies to Images taken from Imaging sites unless bought through entrepot photography. Electronically, access to Informat ion buns be restricted and permissions granted to only those chosen by the authority, an example of this is an HRS folder in a company vane.Only authorized members of the HRS department would have access to the folder and Its contents as It would contain personal and confidential Information. A person or a business proven to be good luck the Data Protection Act and Copyright laws will be intemperately fined and can face a prison sentence. Bal . 2 come across a minimum of four contrastive features of information. Manuals and training guides provide information on how to use products and appliances Including manufacturing guidelines and warranty information.Training guides ar tutorials for the use of hardw ar and software, these start from a beginner level to more than advanced features and functions. These can be supplied some(prenominal) paper and electronic format. Books containing factual Information can be bought from specialiser bookstores, queasiness or borrowed from li braries. These can be history and language books or 1 OFF ordinate survey maps contain information somewhat local, national or international areas and countries, whilst reports are created to show information relating to finance, success, stock and inquiry.These can be presented in a written form or a presentation on television or over the radio. fanciful work is a vital part of advertising information to draw out interest and sales. Companies produce posters, brochures and other marketing materials to appeal to their current node base and attract curiosity from new ones. Information treated on marketing materials usually relates to discounts, new products, extended sales, company profiles and imagery of goods, ideas and concepts.Live information such as bus / trains times, road traffic news, national news bulletins and weather forecasts are available to provide continuous up to epoch coverage online, on television and through electronic displays. This is arguably the close wi dely used and necessary information feature to allow the glitter operation of transport, businesses and increasing public knowledge on local and material matters. 82. 1, 82. 2, 82. 3 & 82. 4 Use a minimum of deuce-ace different examples of access, aviation and search, one from each category. Use a minimum of three different search techniques and evaluate if the outcomes are fit for purpose.Access submission a password to access a file or folder, creating a database query, entering an exact web savoir-faire into an internet browser. Navigate the use of website carte bars, browsing a company intranet, development bookmarks and favorites to store and recall websites and pages of interest. count the use of a search engine, using the find tool in Microsoft programs, using a wild card in database systems when a commit of results is required or the exact search diagnose unknown. Evaluation It is important that the information searched for and the results are relevant and up t o date.Some websites are not regularly updated so will contain outdated information, a way to break off for this is to check the end date on the copyright notice at the base of most home pages. Other informative sites such as Wisped are contribution based so users all over the orbit can input information on a topic. This information may not be accurate or be referenced incorrectly. apply a wildcat in databases will result in change magnitude data found sort through this for the information required will take time. However it is a useful tool if the name or description of what is being searched is unknown.Level of detail required is fundamental to how information is searched and accessed. For more detailed such as books and magazines on a specific topic. pilotage must be a sufficient option on any commercial website so the user can easily find what they are looking for. Poor design and limited functionality will dissuade users from using a site. 83. 1 & 83. 2 See Using Email demonstration 83. 3 A minimum of three different examples of managing storage. Managing storage in electronic communication is important to allow for organization ND flabby retrieval of information.Creating message folders and suborders with rules attached for incoming mail will suffice to organize busy infixes into different categories such as department, sender name and importance. Suborders can be included for completed tasks or read and replied to emails. any(prenominal) important attachments should be downloaded to a specific folder and the email archived or deleted if possible to create more space. Archiving important emails allows them to be saved on an individual computer or on a network. These emails can be retrieved when needed and opened in a compatible email client.Deleting discarded emails ND regularly clear Junk and deleted items folders will help to ontogenesis space and also the running speed of an email program. These folders can be set to auto empty on close of the program or after a certain number of days. 83. 4 & 83. 5 Describe how to, and respond appropriately to, at least two common IT- based communication problems. When communicating through IT some problems can occur which can be rectified by following guidelines set by the network administrator of the manufacturer. Examples of problems that can occur are attempting to send or incur an email with an attachment that is too large or unreadable.Many businesses set surface restrictions on incoming and outgoing mail for security and space management. fall the size of the file or finding an alternative method of talking to such as a USB stick will allow the receiving system to receive without further issues. Sometimes an attachment cannot be opened as it has been created in a program not installed on the recipients computer. Appropriate programs, or the sender and resave in a different format. Emails from unknown senders can be problematic. These can be SPAM or fishing emails atte mpting to trick the recipient into entering personal or relying details ender the guise of a allow company.They can also be innocent messages that can contain a virus attachment which is intended to damage the recipients computer. Ways to prevent this are to install antivirus software and update it regularly. Increase firewall settings and if possible install surplus prevention software also. Be wary of emails from unknown senders, if an email address does not appear legitimate most email clients have a block feature to stop further emails being received from the address. all emails that appear to be genuine such as from a bank are often not so contacting the company by predict will clarify what is required.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment