120 likes | 297 Views
Task 1 Safe working practices in a business environment . Understand how safe working practices are applied in a business environment . B. Wallington Unit 1 ICT Skills for Business. Getting started. Create a Task1 Safe Working Practices when using IT evidence PowerPoint
E N D
Task 1 Safe working practices in a business environment Understand how safe working practices are applied in a business environment B. Wallington Unit 1 ICT Skills for Business
Getting started • Create a Task1 Safe Working Practices when using IT evidence PowerPoint • Save the evidence PowerPoint in your Unit 1 Task 1 folder
Scenario iTunes want you to prepare a PowerPoint presentation on Safe Working Practices when using ICT This involves using the internet to • identify a safe working measure used: • 1P1 to protect health • 1P2 to protect physical safety • 1P3 to protect files from loss • 1P4 to protect files from unauthorised access and • 1M5 to protect files from modification (Merit only) • Give an example that explains the potential danger a measure is designed to addresses Tip: add web searches to your Task 2 Web Search log
Understand how safe working practices are applied in a business environment Pass Tasks (Do these to get a pass!)
SLIDE 1: protecting health • Use the internet to research ONE measure used to protect health whenusing IT in a business eg: • ergonomic designs of equipment and furniture • positioning of equipment • posture • taking regular breaks/ change of activity • eye sight checks • health and safety training • Give an example that explains the potential danger to health a measure is designed to addresses • Describe how the measure can reduce risk Tip: annotate images to show potential dangers and/or how a safe working practice can reduce risk. Expalin why is it important to do these things.
SLIDE 2: protecting physical safety • Use the internet to research ONE measure used to protect safety whenusing IT in a business eg: • trip hazards eg trailing cables • electrical safety: electrical checks (PAT); no water by machines; not overloading sockets • safely positioning equipment to avoid falls • observing health and safety rules • health and safety training • Give an example that explains the potential danger to physical safety a measure is designed to addresses • Describe how the measure can reduce risk Tip: annotate images to show potential dangers and/or how a safe working practice can reduce risk
SLIDE 3: protecting files from loss • Use the internet to research ONE measure used to protect files from loss whenusing IT in a business eg: • backup strategies: files to backup; frequency; destination/medium; storage • organising files: folder structure; meaningful file and folder names • Give an example that explains the potential danger to files a measure is designed to addresses eg hard disc failure, virus attack or accidental deletion • Describe how the measure can reduce risk
SLIDE 4unauthorised access protection • Use the internet to research ONE measure used to protect files from unauthorised access eg: • setting a password to open • choosing a strong password • Give an example that explains the potential danger from unauthorised access the measure is designed to addresses eg ensuring the safety of files • Describe how the measure can reduce risk
Pass Level Check list You have • ExplainedONE measure that protects • health • physical safety • file loss • against unauthorised access • Given reasons for each of the measures you have explained.
SLIDE 1to SLIDE 4 1M1 to 1M4: give detailedexplanations of each measure you have explained Describe at least TWOmeasures for • protecting health • protecting physical safety • File protecting files from loss Unauthorised Access from filesonly needs one measure described
SLIDE 4unauthorised access protection • Use the internet to research ONE measure used to protect files from modification eg: • setting a password to modify password • Give an example that explains the potential danger from unauthorised access the measure is designed to addresses eg colleagues editing files without permission • Describe how the measure can reduce risk