Sei sulla pagina 1di 48

c 



› ›
› › ›
› › g 
  
’  

c  
›    ››


›    ››
››    ››

 ›
  ›››  ›   ››

 ›
  ››› ›   › ›

 ›
  ››
›› ›››  ›  › ›

 ›
›    ››

 ›    ››
  ›    ››
 ›    ››
 
 
› › ›   › ›

 ›    ››

›    ››
 
 ›    ››
  ›    › ›
 ›    › ›
›› ›    ››
 
›  ›   ›    ››
› ›    ››

 
› ›  ›  
 ›   ››

 
› ›  
›  
 ›   › ›
››    › ›
 
›
 ›    › ›
  › 
›
 ›   › ›
 
› 
›
 ›   › ›
 ›  › ›    › ›
 
›
 ›
› › 
›  ›   › ›
››    › ›
  ›    › ›

 ›    › ›
Task›    ››
User Training Plan›    ››
› ›    ››

›
International College of Business and Technology
›
› › ›
› › g 
  
 ›› ›
›  ›   ››
›
› 
:›    › ›
 ›
:›    › ›
 ›
: ›    ››
Compliance with Law and Policy:›   ››
› ›    › ›

››
›    › ›
  ›  ››  
›   › ›
   ›    › ›
      ››
c ›    › ›


› ›
›› ›   › ›


› ››  ›    › ›
!

› 
›    ››
›

› ›


International College of Business and Technology
›
› › ›
› › g 
  

M


›

The purpose of this project is to make a proposal for converting manual system into a
computerized system to a power distribution company. This proposal has been categorized
into main seven parts, which give detailed description about this proposal in different ways.

This power distribution company has been allocated in an area of 5-10 kilometers radius.
There are 100,000 of customers for this power distribution company. This company consists
of many bill centers in the area. Each bill collecting center looks after ten thousand customers
per month. Managing records of 100,000 customers is a huge task. There for an automated
system will give relief to the staffs of this power distribution. Their requirement is store
payment records of all the customers along with the payment history and customers detail to
the head office where they have the central computer.

Further in this proposal it describes the components required for the network, operating
systems used for server and client computers, security policy and health and safety policy in
detail.


International College of Business and Technology
›
› › ›
› › g 
  

’  
›

In Task 1 the components required for this network are identified, such as computer input,
output and storage devices. It gives a clear view of how those components are going to be
used in this network in network diagram.

a
       

The above diagram shows the network diagram of a branch of the power supply distribution
company. Since there are ten thousand customers for a branch per month, four computers are
used for billing purposes. Each computer has a printer. All the computers and printers are
connected to a switch directly using network cable. This is to avoid inconvenience when a
computer or a printer stopped functioning. That switch is connected to a router. The router is
connected to the internet (public network). There is a scanner in a branch connected to the
switch directly as well.


International College of Business and Technology
›
› › ›
› › g 
  
a
        

The above diagram shows the network diagram of the head office. Even though this is the
head office, here also billing computers are available. Just like other branches, in the head
office there are four computers used for billing purposes. Each computer has a printer. All
computers and printers are connected to the switch directly using a network cable. The switch
is connected the main computer, which is the server computer. We can get all the details
about other branches. That main server is connected to the router. From the router the
network is connecting to the internet

›
International College of Business and Technology
›
› › ›
› › g 
  
a
    
        

The above diagram shows the network diagram between a branch and the head office. Both
the head office and branch are connecting through the internet (public network). Since the
internet is a public network, anyone can access. The system going to be implemented is a
billing transaction system. Customers are allowed to make their payments using credit cards.
When there is a valuable transaction it should be secured network. The connection between
the head office and the branch should be secure. VPN (Virtual Private Network) is used to
make the network more secure which is also provided by the ISP (Internet Service Provider).

›
International College of Business and Technology
›
› › ›
› › g 
  
½ 
 

System unit is the main part of a microcomputer. A system unit consists of a board called
motherboard which holds a microprocessor chip, memory chips and expansion slots. The
microprocessor and primary storage and other parts are connected by the electronic circuitry
which is printed on the motherboard.

A system unit consists following parts:

À› Motherboard
À› Microprocessor
À› Memory Chips
À› System Clock
À› Buses
À› Ports
À› Expansion Slots and Cards


International College of Business and Technology
›
› › ›
› › g 
  



This is one of the main output devices in a computer. LCD monitors or in other word we can
call it Liquid Crystal Display monitor. It¶s a thin and flat device made out of many number of
colors or neutral pixels arranged in front of a reflector. This kind of displays was used in
laptops before they introduce it to desktop computers. An LCD monitor made by five
different layers. As a first layer it has a backlight then as a second layer has a sheet of
polarized glass, the third layer will be the color pixels. The fourth layer is the liquid crystal
which is followed by the second layer of polarized sheet of glass. With the help of varied
electrical charges and different rates of voltages they manipulate the orientations. These
crystals act has tiny shutters, either opening or closing as a response to those different
electrical powers and the crystals create pictures with the use of lights that have passed
through these pixels.


International College of Business and Technology
›
› › ›
› › g 
  
0  

Keyboard is one of the main input devices in a computer and also we can state it as a primary
text input device. The arrangement of keys order in both keyboard of a computer and
electronic typewriter are same. The keyboard can be called by the name of QWERTY
keyboard, because of the arrangement of the keys representing the alphabetic letters in the
upper left of the alphabetic keys.

The keyboard also have particular standard function keys with alphabetic and number keys,
such as tab key, which helps you to move cursor, escape key, control key and shift key.

›
International College of Business and Technology
›
› › ›
› › g 
  
 

The mouse is another input device in a computer. These days we rather use optical mouse
than the mouse which we used few years back. In an optical mouse user can get exact
performance what he is expecting and reduces maintenance work where we have to clean the
roller which is inside the old mouse.

There is a LED under the mouse helps to the camera which is inside the each and every
optical mouse by providing a light to capture thousands of shot pictures in each and every
second. That light of LED helps to identify the surface under the mouse. Once it identifies the
different surfaces, those will reflect back to the camera. Then the digital process within in
mouse identifies movement. This method is different to the old method where the roller on
the mouse rolls on mouse pad to show the movement.

Elimination of the mouse ball is the benefit for optical mouse over the old mouse, where we
have to clean the mouse ball frequently for it roll on the mouse pad smoothly for us to get the
proper movement of the mouse in the monitor. Since the optical mouse doesn¶t have any
moving part, we don¶t have to clean anything on it, so maintaining an optical mouse is much
easier than the old mouse.

›
International College of Business and Technology
›
› › ›
› › g 
  

 
  ½ 

An uninterruptible power supply (UPS) is a device which allows the computer to stay alive
for a period of time when there is an interruption in primary power source. It also protects the
computer from the power surges. The battery which is inside the UPS gets life when it loses
receiving the power from the primary source. So that if we are on a middle of doing a work in
a computer, we can save all the data we want before the battery in the UPS turn off.

 ›
International College of Business and Technology
›
› › ›
› › g 
  
^


The router is specially designed for networking purposes. The router directs data packet to
the suitable locations, moving data packets from one network to another network, rejecting
data packets and dealing many other similar actions.

In an internet connection, a router is the device that decides which data packet should forward
to which network. Router will maintain a table for accessible routes and the details about the
data packets sent earlier to find the best path to send a particular data packet without creating
much network traffic. At the same time data packet will through many number of networks
before reaching the destination. The router should at least connect to two networks for it to do
its duty properly. A router has the ability to work more efficiently than hub or a switch.

There are few other types of routers are available

À› Bridge router
À› Core router
À› Edge router
À› Virtual router
À› Wireless router

›
International College of Business and Technology
›
› › ›
› › g 
  

½


In a network or in a local area network (LAN) Switch is the device which is used to connect
all the computers in it. A switch almost has the same features of a Hub, but a Switch is
considered as the intelligent device than a Hub. In a network, a data will be transferred from
one computer to another computer as data packets. Switch is the device which has capability
to check the source computer and the destination computer of that data. That is from which
computer the data was sent and to which computer it should forward. Hub in a network to
connect computers doesn¶t have this ability, so that¶s why a switch is considered as an
intelligent device.

There are different types of switches are available. We can name them as four port, eight port
or sixteen port switches. That is the number of device we can connect to a switch. We also
can connect a switch to another switch in order to connect more devices to the network.

›
International College of Business and Technology
›
› › ›
› › g 
  

 
 

Printer is the device which accepts text or graphical output from a computer in order to
produce that output as information to a sheet of paper. Printers can be categories in various
ways, according to their size, printing speed and also their cost. Printers which used to print
high quality images are more expensive comparing to other printers.

There are two types of printers available; they are impact printers and non-impact printers. In
early days impact printers shared same method like a typewriter, where each character printed
by a key hitting the paper. Later dot-matrix printers were introduced where it print an entire
line at a time in the paper which is also an impact printer. Inkjet printers and laser printers are
examples for non-impact computers. In inkjet printer it sprays ink from a cartridge to the
paper when it rolls to print on it. Laser printer uses a laser beam to print on the paper.

There are few things we have to consider when buying a printer:

À› Color
À› Resolution
À› Speed
À› Memory

›
International College of Business and Technology
›
› › ›
› › g 
  
½  

A scanner is the device used to capture images from a printed media such as posters,
magazine pages to convert them as digital images, which later can edit using a computer.

There are many types of scanners available. Flatbed scanner, sheet-fed scanner and drum
scanner. Flatbed scanners are mostly used by home users. Sheet-fed scanners are same as
flatbed scanner but it can scan many pages at the same time. Sheet-fed scanners are mostly
used for business purposes. Using drum scanner we can get high quality scanned images.
This is the most expensive scanner type among other scanners.

There are few things we have to consider when buying a scanner:

À› Resolution
À› Color depth
À› Speed

 ›
International College of Business and Technology
›
› › ›
› › g 
  

g 

›
Network cable is the medium which is used to transfer information from one computer to
another computer. It is used to connect all the devices with each other in a network. In a
network mostly one type of a cable will be used. In some network many types of cables are
used. The type for a particular cable used for the network depends on the topology used in the
network, procedure and size.

There are few categories of cables are available:

À› Category 1
À› Category 2
À› Category 3
À› Category 4
À› Category 5
À› Category 5e
À› Category 6

 ›
International College of Business and Technology
›
› › ›
› › g 
  

^  

RJ 45 is used in network to connect a cable to a device. Without this pin the network cable
will not be able to transfer data from within a network.

g 
 

In a business environment credit card machine is an important device. Most of the people
these days are using credit or debit cards for their day today transactions. It is used for single
transaction. That is when a customer purchases something, to pay for what he/ she bought can
use the credit card instead of paying by cash.

The credit card machine has a magnetic strip reader to read the magnetic strip in the credit
card machine. It consists of a small display and a keypad to type amount of transaction.
›
›

›
International College of Business and Technology
›
› › ›
› › g 
  

’  

 
     


À› Core i3 Intel

It delivers a revolutionary new architecture for an unparallel computer


experience. It considered as the perfect entry point for a fast,
responsive PC experience.

À› DDR3 4 GB Kingston RAM

The DDR3 4GB kit comes with two 2GB modules that pair for dual
channel performance. This will provide a large space for primary
storage for a computer.

À› ››
› 

This hard disk is very useful for a mass storing purposes. It has 3.5-
inch internal hard drive. Whisper Drive technology will minimize
noise.

À› ›  › 


›
Ñ    
         


            

 
      
  
    


!  


›
International College of Business and Technology
›
› › ›
› › g 
  

 
  
 


À› 2.8 Intel Core

The Intel Core 2 Duo processor-based desktop PC was designed from


the ground up for energy efficiency, letting you enjoy higher
performing, and ultra-quiet, sleek, and low power desktop PC designs.

À› LCD Monitor
LCDs use only one-third to one-half the electricity of their CRT
counterparts. They are much easier on the eyes, take up 90% less
space, and only weigh a few pounds. They also emit far less low-
frequency radiation than CRTs. This makes LCDs a great choice for
nearly everyone, and ideal for people who work all day in front of the
screen.

À› Epson LX 300
The EPSON LX-300 prints up to 330 characters per second in high-
speed draft mode and handles up to 5-part forms with ease. With its
narrow format and powerful 9-pin technology, this printer handles your
inventory reports, spreadsheets, receipts, invoices, packing slips, check
runs and customer shipping labels.

À› LiDE 100 Canon Scanner

Convenient Features for Easy Scanning up to 2400dpi.This is simple,


high-performance scanning at its best.


International College of Business and Technology
›
› › ›
› › g 
  

’  


 ½ 


An operating system is the most important program in a computer. It considered as the


backbone of a computer. It is a program which is designed to run other programs of a
computer. Operating system handles the hardware and software components of the computer.
It controls and allocates memory for recognized input from devices and delivers output to the
computer. Operating system manages the hard drives of the computer and also controls
external hardware devices such as printers and scanners.

In a large computer system an operating system has large number of works to do. Such as
looking after different types of programs whether they are running smoothly when there are
so many users, and also managing the devices to perform simultaneously. Operating system
is responsible for security of the computer system. It should prevent unauthorized users to
access the computer system.

Examples for operating systems are:

À› Windows 7
À› Windows Vista
À› Windows XP (Experienced)
À› Windows 2000
À› Windows NT
À› UNIX
À› LINUX
À› Macintosh OS
À› OS/2


International College of Business and Technology
›
› › ›
› › g 
  

½  
  



We can consider a server operating system as a multi user system. Server operating system
was specially implemented to serve as dedicated program for other computer programs those
are in a network.

We should consider few things when we selecting an operating system. The main
consideration will be the money that one can spend on implementing an operating system.
The next will be the hardware devices requirement for the system, software we going to store
in that operating system and security. Maintaining a server operating system is a huge task. It
is not easy as using a client server operating system.

When there are number of client machines making request at a same time, a very high power
full server is needed with high capacity of storage with multiple processor to fulfill its
requirements. With these specifications we can prevent downtime of a computer system.
Security is the next important point when choosing to work with a server operating system.
We can reduce failures if we assign separate servers for different purposes which receive one
type of request from client computers.

Examples for server operating systems are:

À› Windows 2008
À› Windows 2003
À› Windows NT

› ›

›
International College of Business and Technology
›
› › ›
› › g 
  
g

  


The desktop computer is separate processing unit. Client operating system is used in desktop
computers and portable devices. A desktop computer does not require a network for it to
operate. The main different between a server operating system and a client operating system
is number of users. In a server operating system we can connect many number of user, where
in a client operating system we can have only one user.

Client operating systems are used in smart phones and small computer devices too. Monitor,
printer and cameras are the few devices which are managed by this operating system. Each
computer contains a specific operating system. There are many client operating systems are
designed to function on certain hardware. When selecting a client operating system for a
desktop this hardware compatibility will be the primary consideration.

Examples for client operating systems are:

À› Windows 7
À› Windows Vista
À› Windows XP
À› Linux
À› Mac OS


International College of Business and Technology
›
›
›
›
› g       ›

Ñ  



i  itl Mi  t i  li  ti


 tMt
iill  l  t     i     i t  ti

 tl Mi  tt i   i  iilti

i   l  iiiilt  i   itB tt !
  ti  t i       i   it     t 
itt  ti lit 

i     i  t lil ti


  t Mt i t t
t  ti

 t i
 t  t
t t t ! liti     i i  t t Mt
ll t lii "#i ii tl  til B t
ilt"i   itli ti  t l
 i      t ilit  t  l  t
 t!i t tili ti  t i ililit 

i   i #t i   tti  t t !t  t
i  ittitt 
 ti
 t it i ti ! ll t 
 tti !ti
t  
 t l  it l   i   t ll 
   i i      t  t    i    

i t  t l#il    l i   lt    t  ti l   
liti $i ti  t 

i     i i $i t   %&'( )*   +  %,&'( )*,
  +!-%MB R M!%&B illi!. &/)#+
i
 lti  it !    /tl$i t   
t t i
ti  tliti  tltt i tll


M t ti l C ll B i   l

›
› › ›
› › g 
  

 ½ 
 
  g
½ 

Ñ  
 

Microsoft Windows XP is a generally used and supported operating system. It was created by
Microsoft to give user a modernized interface, add new features and provide a stronger
platform. The interface of Windows XP is different than the interface of Windows 95. The
Windows XP interface is designed to be more sensitive and to keep the screen clutter free.
The standards icons such as My Computer and My Document can be found in start menu
option. When the user needs a clearer desktop without many icons in it, this will be the
greatest option. Remote desktop and remote assistance are the new features Windows XP
contains when comparing to older version operating systems. Remote desktop is log into a pc
which runs Windows XP operating system from another pc which is also runs with Windows
XP. Remote assistance is inviting someone to connect to the pc and get help through the
network, or can control the computer if it is choose to allow it.

Windows XP minimum requirements are a 233MHz processor, 64MB of RAM, 1.5GB of


available hard drive space, and an SVGA-capable video card. University Information
Technology Service (UITS) has found that computers not exceeding those requirements run
Windows XP poorly or not at all. UITS strongly recommends that any system running XP
have a CPU faster than 400MHz and at least 256MB of RAM.


International College of Business and Technology
›
› › ›
› › g 
  

’  
›

 

À› Processor

All processors before the Pentium 4 were measured in Megahertz and after Pentium 4 the
processor measure by Giga Hertz. The above diagram shows processor performance of
windows XP

À› RAM

RAMs are measured in Bytes. It can be megabytes or gigabytes. The above diagram shows
the performance in RAM in Windows XP.

›
International College of Business and Technology
›
› › ›
› › g 
  

À› Hard Disk














Hard Disks are measured in bytes. It can be megabytes, gigabytes or terabytes. The above
diagram shows the performance of Hard disk in Windows XP.

Cache memory

Cache memory are measured in Mega byte, now days it¶s measured in Giga Byte as well. The
above diagram shows performance of cache memory of Windows XP.

›
International College of Business and Technology
›
› › ›
› › g 
  
½
  ›

Ñ ’


White box testing normally involves in identifying the possible execution paths through the
code and finding out what input values would force the execution paths. Simple technique
carried out by the tester who wrote the code to work on smallest paths important to test all the
code. The same job can be done with very quickly and reliably with the use of static analysis
tools.

White box testing has the ability to identify the design weaknesses in the code. It cannot
identify the problems created by mismatches between the exact or actual requirements and
the code which wrote by the tester. Static analysis tools also find these kinds of problems, but
it does not help tester to understand the error like how white box testing does.

   
Ñ  


À› White box testing helps in optimizing the code


À› White box testing helps to remove extra lines of coding, which can bring in hidden
defects.
À› Since the knowledge of internal coding is required, it becomes very easy to find out
which type of input can help in testing the application effectively.


  
Ñ  


À› A skilled tester is needed to carry out this type of testing, which also increases the
cost.
À› It is very hard to find out hidden errors of the code, which may result failure on the
system.

 


International College of Business and Technology
›
› › ›
› › g 
  
  


In other words we can call black box testing as ³Opaque testing´, function testing or closed
box testing. Knowledge of internal logic or coding logic is not needed.

For a tester to implement a black box testing, the tester is needed to have thorough
knowledge about requirement specification of the system. He should understand how the
system should behave in response to the accomplishment.

These days, testing are given to the third party as the tester of the system knows too much
about the internal logic and coding of the system, which lead to not to do a proper testing to
the tester.
There are various types of testing are falls under black box testing such as functional testing,
stress testing, recovery testing, volume testing, user acceptance testing, system testing, sanity
testing, load testing, usability testing, exploratory testing, alpha testing and many more.
These testing types are divided into two groups as testing which user play a role as a tester
and the user not required.

   
  


À› It is easier to create test cases by simply working through the application, as would an
end user. Testers do not have to concern themselves with the inner workings of an
application.
À› Testers need only concern themselves with the various paths through the GUI that a
user may take. Because testers only concern themselves with the GUI, they do not
need to spend time identifying all of the internal paths that may be involved in a
specific process.
À› Where large, highly complex applications or systems exist black-box testing offers a
means of simplifying the testing process by focusing on valid and invalid inputs and
ensuring the correct outputs are received.


International College of Business and Technology
›
› › ›
› › g 
  

  
  


À› Since the black box tools are reliant on the method of input being known, when there
is constantly change in user interface it will makes script maintenance very hard
À› Interacting with the GUI can also make test scripts fragile. This is because the GUI
may not be rendered consistently from time-to-time on different platforms or
machines. Unless the tool is capable of dealing with differences in GUI rendering, it is
likely that test scripts will fail to execute properly on a consistent basis.

› ›

›
International College of Business and Technology
›
› › ›
› › g 
  

’
 


’   

  ›
›
››
›  
› › ›

›  ›
 ›
› ››

›
› ›
›
 ›› ›› ›
› › 
› ›  ›
› ›
 ›
 ›  ›››


›
 
›

 ›

›› " ›  
› › ›
› ›

› › 
 
›› ›
››
› 
 
›
›
› › 
 
›

›› 
› 
›   › 
›
›

››
›  
 ›
 ›

››
›  ›

›› c 
›
›
 ›  ›
››
›

 ›

›› 
 
›

›
 › 
› ›
 ›
››
› ›

›
 › › 
 
›


›
 ›
›

’  ! 

       
 
›
International College of Business and Technology
›
› › ›
› › g 
  
Companies are considering security programs that forge closer ties between the physical and
logical security realms protecting against the wide range of internal and external threats such
as DDOs attacks, viruses, worms and many more.

Forrester Research analyst, Jonathan Penn states that. ³Today¶s enterprise security market,
support physical security products like door access-control systems and closed-circuit
cameras often relying on TCP/IP, not running proprietary Operating Systems anymore´.

0 › ›
 

-  › 
À› Appropriate software security patches must be available in proportion with the
identified level of acceptable risk.
À› Installations allowing unrestricted access to resources must be configured with extra
concern to minimize security risks.
À› Authentication and authorization functions must be provided along with appropriate
use and managed risks.
À› The size of the computer system whether large or small must not be comprised from
its security threat awareness.

ü  

There are two types of firewalls available. Hardware firewall and software firewall. Software
firewalls work as the same as the hardware firewalls. It will monitor and block information
 ›
International College of Business and Technology
›
› › ›
› › g 
  
that a computer receives through internet. Software firewalls should be installed as a program
to the computer, or should download over the internet. Software firewalls are widely used
these days comparing to hardware firewalls.
›
›
A firewall helps to avoid computer hackers from accessing the computer through the internet,
and it prevent stealing sensitive information or infecting computer system with the help of
computer viruses. A hacker can get access to the computer by open ports which are connected
to the internet from the computer. Because of the firewalls in place these ports are blocked
from inbound traffic. There for having a firewall is really good.

Generally, data that comes in is analyzed by the firewall to verify the IP address it is coming
from and the content that it contains. Then the firewall will check to see if the information is
compliant rules that are able to configure. After that the firewall will decide whether to
receive or to reject the data.
›

Firewall programs are important not only to protect the computer systems, but also to
personal information of an individual. These days¶ anti-virus guards are come with firewall
program.

Having a firewall program will be a huge logical security for computer system.

 

›
International College of Business and Technology
›
› › ›
› › g 
  
à   › 

À› physical access to resources must be protected using suitable controls for tolerable
risks
À› The physicalcontrols may range according to scope and complexity from security
installations depending on either a server room or a desktop user.

       

In harmony with applicable laws and policies, various types of electronic data must be
protected both with privacy and confidentiality aspects of the application

Law or policies require a level of protection that must be ensured by users who are authorized
to collect data.

À› If sensitive data is transferred from a well-secured mainframe system to a user's


location, sufficient security measures must be in place at the destination computer to
protect this "downstream data".
À› Any scanning of network traffic to detect intrusive activities must follow established
university guidelines or organizational procedures to ensure agreement with laws and
policies protecting the privacy of the information.

      

À› security guidelines, standards, or procedures must be established with the organization


or company for specific activities under their supervision accordingly
À› Electronic information resources used in support of business administrations ideally
should comply with the provisions of BFB IS-3 and its companion "Implementing IS-
3 Electronic Information Security".
À› Federal and state laws prohibit theft or abuse of computers and other electronic
resources.

›
International College of Business and Technology
›
› › ›
› › g 
  
The following activities are specifically prohibited under the above suggested Policy:

o› interfering with, tampering with, or disrupting resources;


o› intentionally transmitting any computer viruses, worms, or other malicious software;
o› attempting to access, accessing, or exploiting resources you are not authorized to
access;
o› knowingly enabling inappropriate levels of access or exploitation of resources by
others;
o› downloading sensitive or confidential electronic information/data to computers that
are not adequately configured to protect it from unauthorized access;
o› Disclosing any electronic information/data you do not have a right to disclose.

›
International College of Business and Technology
›
› › ›
› › g 
  

’  "

 
  ½ 


According to the ³c  


         

  the modern office


environment presents many potential hazards, therefore it can be avoided by taking simple
precautions. There are standards for the office environment, keyboard equipment, rest breaks
and basic occupational health and safety.

Employers must ensure the health safety and welfare of their employees in the company,
therefore to meet the terms employers must:

À› Provide or maintain equipment and systems of work that are safe and without risks to
health.
À› Ensure that equipment and substances are used, stored and transported safely and
without risks to health.
À› Provide information, instruction, training and supervision that ensures the health and
safety of employees
À› Maintain their workplace in a safe condition including entrances and exits.
À› Provide adequate information about any research and tests of substances used at work

Source: ACT Occupational Health and Safety Office booklet


› ›

 ›
International College of Business and Technology
›
› › ›
› › g 
  
      

The following exercise should follow before commencing work
›

"› › 
››   ›
› ›
 › ›  › ›
 › 
›
›
› ›
› 
› ››
›

› ›

›  ›› ›  ››
›
› ››  



› › ›
› › 
›› ›
› › ›
 
› ›
 ››  › ›#  › 
› › ›››
› ›

 ›› › ›  ›   › 
› ››
›

› ›

› 
›› ›  ››
›
› ›› ›

Tuck your chin down onto your chest and gently turn your head
from side to side, keeping your chin on your chest. Do this ten
times.

Turn your head slowly from side to side ten times

› ›

 ›
International College of Business and Technology
›
› › ›
› › g 
  
ÿ
 
 


› As stated by c 
     

 there are seven exercises


for the rest break.

’ 
 Interlock fingers, palms up. Stretch arms above the head until they are straight.
Do not arch the back.

’    Place feet shoulder-width apart, heels on the floor. Swing toes in, then out.

 Roll the shoulders - raise them, pull them back, then drop them and relax.
Repeat in the opposite direction.

› ›

›
International College of Business and Technology
›
› › ›
› › g 
  

 Drop left shoulder, reaching left hand towards the floor. Return to starting
position. Repeat on right side.

 Grasp shin, lift leg off the floor. Bend forward curling the back, with nose
towards the knee. Note: This exercise should be avoided in pre- or post-natal conditions.

Hold one foot off the floor, leg straight. Flex ankle (pointing toes up) and extend
(pointing toes toward the floor).

  Sit forward on the chair and place feet on the floor. With a straight leg, lift one foot
a few centimeters off the floor. Hold for a second and then return it to the floor. Repeat with
the other leg

› ›

›
International College of Business and Technology
›
› › ›
› › g 
  
r !   

As stated by Berry.C (2009) safety is not a typical concern for the office worker because the
office is not generally perceived as a hazardous environment.

There are many types of accidents; the most common office is falling such as, when workers
lean back to tilt their chairs, place their feet on a desk, sit down without looking, and rise
from or move around in a chair. Slips, trips and falls can result from poor housekeeping such
as wet surfaces, electrical cords improperly placed and walkways obstructed by trash.
Infectious cuts are caused by sharp objects normally found in office environments, such as
staples and pens. Fingers can get caught under the knife edge of a paper cutter.

Electrical equipments should be equipped with electrical plugs that will have ground prongs
marked as ³double insulated´ by the manufacturer.

When electrical extension cords are a temporary necessity, they should be taped down,
clipped to the back of desks or covered with a rubber passageway if they cross the floor.

Electrical equipments can become sources of fire or electrical shock.

›
International College of Business and Technology
›
› › ›
› › g 
  
ÿ  

Employers should develop an emergency action plan to address emergencies that the
employer can expect in the workplace. Examples of such foreseeable emergencies are fire,
toxic chemical releases, hurricanes, tornadoes, blizzards and floods.

As stated by Berry.C (2009) the key components of an emergency action plan are the
following:

À› Emergency escape procedures and escape routes for employees


À› How to account for all employees following evacuation.
À› The rescue and medical duties for those employees, if any, who are to perform them?
À› The preferred means of reporting fires and other emergencies.
À› Names or regular job titles of people responsible for the emergency action plan.

Source: Berry.C (2009)

› ›

›
International College of Business and Technology
›
› › ›
› › g 
  

g  
›

›
›

 ›
International College of Business and Technology
›
› › ›
› › g 
  

^  
›

American Computer Services. 2006. Ã


    

 

 . [ONLINE] Available at: http://www.newportbeach.pro/newport-beach-
Computer-Network-IT-Support-Services.aspx. [Accessed 10 November 10].

Top Bits. 2010.


 Ã
. [ONLINE] Available at: http://www.tech-
faq.com/cpu.html. [Accessed 18 November 10].

wisegeek. 2005.   !"



. [ONLINE] Available
at: http://www.wisegeek.com/what-is-a-lcd-monitor.htm. [Accessed 20 November 10].

PCWorld Communications. 2000.



# !"

. [ONLINE] Available
at:http://www.pcworld.com/article/15112/how_it_works_lcd_monitors.html. [Accessed 23
November 10].

TechTarget . 2007.  


 . [ONLINE] Available at: http://searchcio-
midmarket.techtarget.com/sDefinition/0,,sid183_gci212440,00.html. [Accessed 26 November
10].

wisegeek. 2005.   


  $
. [ONLINE] Available
at: http://www.wisegeek.com/what-is-an-optical-mouse.htm. [Accessed 20 November 10].

TechTarget . 2007. Uninterruptible power supply. [ONLINE] Available


at: http://searchdatacenter.techtarget.com/definition/uninterruptible-power-supply. [Accessed
26 November 10].

Computer Hope. 2010. %


 . [ONLINE] Available
at: http://www.computerhope.com/jargon/r/router.htm. [Accessed 29 November 10].

About.com. 2010.  & 


 '. [ONLINE] Available
at:http://compnetworking.about.com/od/hardwarenetworkgear/g/bldef_switch.htm. [Accessed
23 November 10].

  
   Ñ ›› 
   $›c  





 
 
   
 %  
 c › ›
  ›$

Quinn.C. 2007. ! 




$   . [ONLINE] Available
at:http://www.ehow.com/about_5232376_definition -computer-scanner.html. [Accessed 23
November 10]

›
International College of Business and Technology
›
› › ›
› › g 
  

›
International College of Business and Technology
›
› › ›
› › g 
  
University of South Florida. 2009.  
  ? [ONLINE] Available
at:http://fcit.usf.edu/network/chap4/chap4.htm. [Accessed 25 November 10].

LoveToKnow Corp. 2006.    " . [ONLINE] Available


at:http://creditcards.lovetoknow.com/Credit_Card_Machines. [Accessed 01 December 10].

Ferguson.G. 2010.


! 
    " %$
#



! 
    " . [ONLINE] Available
at: http://www.ehow.com/how_6156637_connect -dsl-credit-card-machines.html. [Accessed
02 December 10].

wisegeek. 2005.   


  $. [ONLINE] Available
at: http://www.wisegeek.com/what-is-an-operating-system.htm . [Accessed 20 November
10].

wisegeek. 2005.    


  $. [ONLINE] Available
at: http://www.wisegeek.com/what-is-a-server-operating-system.htm. [Accessed 20
November 10].

wisegeek. 2005.    


  $. [ONLINE] Available
at: http://www.wisegeek.com/what-is-a-client-operating-system.htm . [Accessed 20
November 10].

Microsoft Corporation. 2007.  


  ())*$%+ $ . [ONLINE]
Available at:http://msdn.microsoft.com/en-us/windowsserver/cc196364.aspx. [Accessed 03
December 10].

The Trustees of Indiana University. 2006.   


,Ã. [ONLINE] Available
at:http://kb.iu.edu/data/akma.html. [Accessed 04 December 10].

TechTarget . 2005.     


   
 . [ONLINE] Available
at:http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1241956,00.html.
[Accessed 05 December 10].

ACT Occupational . 2006. -c  c!c.-/ -.. -. [ONLINE] Available


at:http://www.scribd.com/doc/17566119/Health-and-Safety-in-the-Office. [Accessed 02
December 10].

›
International College of Business and Technology
›
› › ›
› › g 
  

c#

$ 

 
    

 ›
International College of Business and Technology
›
› › ›
› › g 
  
$ 

    

 ›
International College of Business and Technology
›
› › ›
› › g 
  

r 

›
International College of Business and Technology
›