.

Thursday, May 16, 2019

IT User NVQ – Communication

Most businesses of a certain site leave behind have a family website to ell and advertise their products and services. These companies will often have a staff intranet run on comp either servers for employees only. This gives access to company Information, handbooks, procedures, forms and announcements. Paper ground Information Is found in newspapers, books, maps and other printed literature and materials. merchandising info takes form in posters, billboards, leaflets, business cards and advertisements. procure law applies to all Information that Is unattached to view and be stored.It applies to music downloads, psycheal inside information, medical history, financial records, and retests a company or source from plagiarism and theft of owned ideas and work. When referencing someone elses work it is important to acknowledging sources such as websites or books uptaked. This as well applies to Images taken from Imaging sites unless bought through stock photography. Electronica lly, access to Information butt be restricted and permissions grant to only those chosen by the authority, an example of this is an HRS folder in a company network.Only authorized members of the HRS plane section would have access to the folder and Its contents as It would run personal and confidential Information. A person or a business proven to be breaking the Data Protection Act and Copyright laws will be heavily fined and female genitals face a prison sentence. Bal . 2 Describe a minimum of four different frolics of entropy. Manuals and training guides provide schooling on how to use products and appliances Including manufacturing guidelines and warranty information.Training guides argon tutorials for the use of hardw be and software, these start from a beginner level to more advanced features and functions. These croupe be supplied both paper and electronic format. Books containing factual Information can be bought from specialist bookstores, queasiness or borrowed fr om libraries. These can be history and language books or 1 OFF ordinate survey maps contain information about local, national or international areas and countries, whilst reports are created to show information relating to finance, success, stock and inquiry.These can be presented in a written form or a presentation on video recording or over the radio. Creative work is a vital part of advertising information to take in interest and sales. Companies produce posters, brochures and other marketing materials to appeal to their current customer base and attract tenuity from new ones. Information treated on marketing materials usually relates to discounts, new products, extended sales, company profiles and resourcefulness of goods, ideas and concepts.Live information such as bus / trains times, road traffic news, national news bulletins and weather forecasts are available to provide continuous up to date coverage online, on television and through electronic displays. This is arguably the most widely used and necessary information feature to allow the smooth cognitive operation of transport, businesses and increasing public knowledge on local and worldly matters. 82. 1, 82. 2, 82. 3 & 82. 4 Use a minimum of triad different examples of access, aviation and search, one from each category. Use a minimum of three different search techniques and evaluate if the outcomes are fit for purpose.Access entering a password to access a file or folder, creating a database query, entering an exact web address into an internet browser. Navigate the use of website menu bars, browsing a company intranet, using bookmarks and favorites to store and recall websites and pages of interest. Search the use of a search engine, using the find tool in Microsoft programs, using a wild card in database systems when a range of results is required or the exact search name unknown. Evaluation It is important that the information searched for and the results are relevant and up to date.Som e websites are not regularly modifyd so will contain outdated information, a way to check for this is to check the end date on the copyright notice at the base of most home pages. Other informative sites such as Wisped are contribution based so users all over the world can input information on a topic. This information may not be accurate or be referenced incorrectly. Using a wolf in databases will result in increased data found sort through this for the information required will take time. However it is a useful tool if the name or interpretation of what is being searched is unknown.Level of detail required is fundamental to how information is searched and accessed. For more detailed such as books and magazines on a ad hoc topic. Navigation must be a sufficient option on any commercial website so the user can easily find what they are looking for. Poor intention and limited functionality will dissuade users from using a site. 83. 1 & 83. 2 See Using net armor evidence 83. 3 A minimum of three different examples of managing storage. Managing storage in electronic parley is important to allow for organization ND easy retrieval of information.Creating message folders and suborders with rules attached for incoming mail will assistant to organize busy infixes into different categories such as department, sender name and importance. Suborders can be included for completed tasks or read and replied to telecommunicates. Any important attachments should be downloaded to a specific folder and the email archived or deleted if possible to create more space. Archiving important emails allows them to be saved on an individual computer or on a network. These emails can be retrieved when needed and opened in a compatible email client.Deleting unwanted emails ND regularly clear Junk and deleted items folders will help to increase space and also the running speed of an email program. These folders can be set to railway car empty on close of the program or after a ce rtain number of days. 83. 4 & 83. 5 Describe how to, and respond appropriately to, at least two common IT- based confabulation problems. When communicating through IT some problems can occur which can be rectified by following(a) guidelines set by the network administrator of the manufacturer. Examples of problems that can occur are attempting to send or overhear an email with an attachment that is too large or unreadable.Many businesses set size restrictions on incoming and forthcoming mail for security and space management. Decreasing the size of the file or finding an alternative method of delivery such as a USB stick will allow the recipient to receive without still issues. Sometimes an attachment cannot be opened as it has been created in a program not installed on the recipients computer. Appropriate programs, or the sender and resave in a different format. Emails from unknown senders can be problematic. These can be SPAM or fishing emails attempting to trick the recipien t into entering personal or banking details ender the guise of a legitimate company.They can also be innocent messages that can contain a virus attachment which is intended to damage the recipients computer. Ways to prevent this are to install antivirus software and update it regularly. Increase firewall settings and if possible install spare prevention software also. Be wary of emails from unknown senders, if an email address does not appear legitimate most email clients have a block feature to stop further emails being received from the address. Any emails that appear to be genuine such as from a bank are often not so contacting the company by phone will clarify what is required.

No comments:

Post a Comment