• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

information systems assignment 2

Extracts from this document...


Legislation Data Protection Act The Data Protection Act gives individuals the right to know what information is held about them. It provides a framework to ensure that personal information is handled properly. The Act works in two ways. Firstly, it states that anyone who processes personal information must comply with eight principles, which make sure that personal information is: * Fairly and lawfully processed * Processed for limited purposes * Adequate, relevant and not excessive * Accurate and up to date * Not kept for longer than is necessary * Processed in line with your rights * Secure * Not transferred to other countries without adequate protection The second area covered by the Act provides individuals with important rights, including the right to find out what personal information is held on computer and most paper records. Should an individual or organisation feel they're being denied access to personal information they're entitled to, or feel their information has not been handled according to the eight principles, they can contact the Information Commissioner's Office for help. Complaints are usually dealt with informally, but if this isn't possible, enforcement action can be taken. The Data Protection Act (DPA) is a United Kingdom Act of Parliament. It defines a legal basis for handling in the United Kingdom of information relating to people living within. It is the main/only piece of legislation that governs protection of personal data in the UK. Although the Act does not mention privacy, in practice it provides a way in which individuals can enforce the control of information about themselves. Most of the Act does not apply to domestic use, for example keeping a personal address book. Organisations in the UK are legally obliged to comply with this Act, subject to some exemptions. Compliance with the Act is enforced by an independent government authority, the Information Commissioner's Office (ICO). The ICO maintains guidance relating to the Act. ...read more.


There are many different types of databases available for use; the three most common ones are, * Flat file database * Relational database * Hierarchical database I will now explain each database listing the advantages and disadvantages of each. Flat File Databases A Flat File Database is a text file commonly only containing a record for each line in the file. This sort of database would be used for a simple phonebook sort database, showing peoples names with there telephone numbers and possibly addresses. This could also be used to keep track of friends. An example of a flat file database is a personal phonebook storing names and telephone numbers Advantages The advantages of a flat file database are, * It is a very simple database which is easy to use and understand, very little training will be needed to create and use one of these. * Easy to understand. * These are cheap to both create and to run as they are usually just simple text files. * Uses a small number of resources Relational databases A relational database is a database which conforms to a relational model and refers to the data and the structure of how it is arranged. A relational database is a selection of tables of fields related by relationships. For example, a data set containing all the real estate transactions in a town can be grouped by the year the transaction occurred; or it can be grouped by the sale price of the transaction; or it can be grouped by the buyer's last name; and so on. Advantages The advantages of a relational database are, * This database will use relationships to link different fields in the tables and this will make things easier to understand due to the layout of the information. * Security features, passwords can be used and fields are then locked after being used meaning other users can not change data entered. ...read more.


This can also help the supermarket see when certain products are bought by customers. For example in the summer more sunglasses and sun cream are bought, this means the supermarket should buy more of these in the summer to increase profits and buy less in winter as they are not on demand as much and the supermarket will loose money. The sale of beer is a good example, the supermarket will know more alcohol is sold on special occasions such as Easter, Christmas, new year. So the supermarket should purchase more alcohol and maybe have special offers, this will increase profits. Predictive Modelling Predictive modelling Is the process of a model being created or simply chosen. This model tries to predict the probability of an outcome of certain areas as best it can. In many cases the model is chosen on the basis of detection theory to try to guess the probability of a signal given a set amount of input data, for example given an email determining how likely that it is spam. Predictive modeling can involve figuring out and predicting certain information and relationships within data. this can be used to predict which customer would buy which products from the store, and why. Predictive modelling is used a lot to analyse customer relationship management ant with data mining. This produces models for the customer level, this describes the likelihood of customers taking particular actions. The actions are usually sales, marketing and customer related. Predictive modeling can help the supermarkets detect and protect themselves against the supermarket. How many sales have been recorded and the area they have been take is a good example of how the supermarket can develop based on the custom If the supermarket would like to increase their profits predictive modeling should be used to increase the accuracy of the pricing and the sales of stock. ?? ?? ?? ?? National Diploma for IT Practitioners Unit: 3 - Information Systems Assignment: 2 Candidate Number: Z051677 Centre Number: 47303 Name: Neil Gibson Page: 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a star student thought of this essay

4 star(s)

Response to the question

Given the headers, it is evident that this report focuses mainly on IT legislation and ethics, the student provides a detailed analysis of existing laws and what they cover. Key acts of legislation are defined along with an outline of ...

Read full review

Response to the question

Given the headers, it is evident that this report focuses mainly on IT legislation and ethics, the student provides a detailed analysis of existing laws and what they cover. Key acts of legislation are defined along with an outline of common office applications and systems that are primarily used to store and retrieve information.

The student has essentially responded to each section in great detail.

Level of analysis

The writer demonstrates an outstanding level of analytical skills for this level of qualification and has made evaluative judgements as evidenced by the IT legislation discussed. However, the writer should have included references for further reading and to confirm examples and findings in the report.

The report lacks a main conclusion or summary which would have been helpful given the length and number of sections contained within. The report also lacks an introduction explaining what is to be discussed and outlined. Again, this would have been helpful due to the broad range of topics.

Quality of writing

The report does not include a table of contents, which given the length, makes it difficult to navigate the document – particularly so if the reader wishes to only view certain topics. The report does however include page numbers which is helpful when referencing different sections and the writer has indeed surpassed the technical terms expected at this level of qualification.

Minor grammatical errors are present in certain parts of the document.

Did you find this review helpful? Join our team of reviewers and help other students learn

Reviewed by finalfantasy 01/03/2012

Read less
Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    Business & IT Department BTEC. Organisational System Security - Describe the various types of ...

    3 star(s)

    This could then result in the company getting a bad reputation or being taken to court for breaching data protection. The man in the middle could also waste company time and as a result; money. Countermeasures Implemented to reduce risk of damage to systems - p3 & p4 Countermeasures Vermason

  2. Computer systems assignment 1

    Motherboard allows them to communicate via BUSes which. They are little cables or printed Circuits which computer components share In order to exchange communication. There are various amounts of data that can be carried by a bus at once. They usually range from 16 to 64 bits and this is called a width of the bus.

  1. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    A particular type of VDU, called a touchscreen, acts as both an input device and an output device. Information is output by the system onto the screen and the user is invited to answer questions or make choices by pointing at a particular area of the screen.

  2. 140 Computing A-Level Revision Questions

    Describe, with examples, a linear and a binary search. Give an advantage of each. 36. Explain, with an example, master file and transaction file. 37. Explain real-time processing, giving two different examples with different response times. 38. Explain multi-access processing and how it is controlled. 39. Explain serial and parallel transmission of data.

  1. James. T. Russell and the Invention of the Compact Disc.

    of the CD; thanks to the CD, we are able to bring a variety of music with us while relaxing or on the go, without taking up a lot of space.

  2. Free essay

    Hardware and Functions of a Micro Processor

    This type of logic gate will give a high output either, but not if both of its two inputs are high. To show this operation the following symbol is used, . Here is the truth table for the EOR logic gate.

  1. The impact of the availability of electric information on individuals and society

    quite slow and sometimes even inaccurate, while availability of electronic information has made this process much faster and left less space for inaccuracies and errors. The access of electronic information has had a huge impact to my parents' lives as well.

  2. BTEC National in IT Organisational systems security - Policies and guidelines for IT security ...

    Basically, you identify potential risks to your organisation and as a result put things in place to try and reduce the chance of these risks occurring and the effect of these risks if they come into being. There are several approaches to risk management, you may be reactive by changing

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work