Wednesday, 5 July 2017

Lo2. Codes of practice

Activity: Codes of practice 


Find example of computer codes of practice, either from your college or by carrying out internet research.

Identity

Don’t allow anyone else to use your login details, don’t disguise your online identity and don’t attempt to obtain or use anyone else’s.

Sheffield, U. (2017). Code of Practice - CiCS - The University of Sheffield. [online] Sheffield.ac.uk. Available at: https://www.sheffield.ac.uk/cics/codeofpractice [Accessed 5 Jul. 2017].


Produce a code of practice for a top secret military or government establishment.

  • The high ranking officer can access more secret information than any lower rank can access.
  • The high ranking officer can only one that access private file.
  • Top secret nuclear can be known by only certain trusted people.

Produce a code of practice for a small web design or computer consultancy company.

  • Information

    Safeguard personal data, respect other people’s information and don’t abuse copyright material.

  • Governance

    Don’t break the law, do abide regulations and policies, and do observe the regulations of any third parties whose facilities you access.
  • Do keep your files organized.

List the areas in which these codes are similar. List the areas in which they differ significantly. Explain the reasons for the areas where they differ.


  • The different between the military and computer consultancy 
  • Military work is more strict and specific.
  • web design are more to secure their customer and their personal files.



No comments:

Post a Comment

Project scope (Research Activity)

Project Scope  This scope is just all the work that needs to be done to achieve the project objectives. In other words, scope involve...