GPP Revision General Credit

825 views

Published on

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
825
On SlideShare
0
From Embeds
0
Number of Embeds
19
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

GPP Revision General Credit

  1. 1. General Purpose Packages Revision
  2. 2. Why GPPs? <ul><li>Information </li></ul><ul><ul><li>Accurate </li></ul></ul><ul><ul><li>complete </li></ul></ul><ul><ul><li>up-to-date </li></ul></ul><ul><li>Share information </li></ul>
  3. 3. HCI <ul><li>Command Driven </li></ul><ul><li>Online Help </li></ul><ul><li>Online Tutorials </li></ul><ul><li>GUI </li></ul><ul><ul><li>WIMP </li></ul></ul>
  4. 4. Common Features <ul><li>Alter HCI parameters </li></ul><ul><li>Header/Footer </li></ul><ul><li>Printer Drivers </li></ul>
  5. 5. Types <ul><li>Word processing </li></ul><ul><ul><li>Standard Letter </li></ul></ul><ul><li>Databases </li></ul><ul><ul><li>Computed Field </li></ul></ul><ul><ul><li>Alter screen Input Format </li></ul></ul><ul><ul><li>Alter Output Format </li></ul></ul><ul><ul><li>Keywords </li></ul></ul><ul><ul><li>Sort Multiple Field </li></ul></ul>
  6. 6. Types <ul><li>Spread Sheet </li></ul><ul><ul><li>IF Conditions </li></ul></ul><ul><ul><li>Relative Reference </li></ul></ul><ul><ul><li>Absolute Reference </li></ul></ul><ul><ul><li>Cell protection </li></ul></ul><ul><li>Graphics </li></ul><ul><ul><li>Scale, rotate </li></ul></ul>
  7. 8. General Purpose Packages Revision
  8. 9. Hardware/Software <ul><li>Knowledge Systems </li></ul><ul><ul><li>Knowledge base </li></ul></ul><ul><ul><li>Rule base </li></ul></ul><ul><ul><li>HCI </li></ul></ul><ul><ul><li>Search engine </li></ul></ul>
  9. 10. Communication <ul><li>Multi-Access </li></ul><ul><li>Reliable Data Link </li></ul>
  10. 11. Storage <ul><li>Storage Capacity </li></ul><ul><ul><li>1 Kilobyte </li></ul></ul><ul><ul><ul><li>1024 bytes </li></ul></ul></ul><ul><ul><li>1 Megabyte – </li></ul></ul><ul><ul><ul><li>1024 x 1024 = 1048576 bytes </li></ul></ul></ul><ul><ul><li>1 Gigabyte </li></ul></ul><ul><ul><ul><li>1024 x 1048576 </li></ul></ul></ul>
  11. 12. Software Integration <ul><li>Static Data Linkage </li></ul><ul><li>Dynamic Data Linkage </li></ul>
  12. 13. Dear Mr Tightwad, You will be pleased to note that our sales figures have increased as shown below:- I hope that you will reconsider my request for a pay rise. Your sincerely I.M. Poor Dear Mr Tightwad, You will be pleased to note that our sales figures have increased as shown below:- I hope that you will reconsider my request for a pay rise. Your sincerely I.M. Poor Static (change not included) Dynamic (Change included)
  13. 14. Package Selection <ul><li>Appropriate Package </li></ul><ul><ul><li>Hardware/software availability </li></ul></ul><ul><ul><li>Nature of Job </li></ul></ul>
  14. 16. General Purpose Packages Revision
  15. 17. Advantages <ul><li>Increased Productivity </li></ul><ul><li>Layout Flexibility </li></ul><ul><li>Availability of Information </li></ul>
  16. 18. Implications <ul><li>Economic </li></ul><ul><ul><li>Staff Costs (training) </li></ul></ul><ul><li>Social </li></ul><ul><ul><li>Increased Paper </li></ul></ul><ul><ul><li>Effects of employment and conditions </li></ul></ul>
  17. 19. Security & Privacy <ul><li>Data Protection Registrar </li></ul><ul><li>Data Protection Register </li></ul><ul><li>Data User </li></ul><ul><li>Data Subject </li></ul>
  18. 20. Data Protection Principles <ul><li>Obtained Lawfully & Fairly </li></ul><ul><li>Held for reasons listed by data user </li></ul><ul><li>Used for reasons listed by data user </li></ul><ul><li>Adequate, relevant & not excessive </li></ul><ul><li>Accurate & up-to-date </li></ul><ul><li>Kept no longer than necessary </li></ul><ul><li>Made available to data subject on request </li></ul><ul><li>Protected against unauthorised use. </li></ul>
  19. 21. Computer Misuse Act 1990 <ul><li>It is illegal to: </li></ul><ul><ul><li>access computer material without authorisation </li></ul></ul><ul><ul><li>Unauthorised access with intent to commit other offences </li></ul></ul><ul><ul><li>Unauthorised modification of computer material </li></ul></ul>

×