• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

information systems assignment 2

Extracts from this document...


Legislation Data Protection Act The Data Protection Act gives individuals the right to know what information is held about them. It provides a framework to ensure that personal information is handled properly. The Act works in two ways. Firstly, it states that anyone who processes personal information must comply with eight principles, which make sure that personal information is: * Fairly and lawfully processed * Processed for limited purposes * Adequate, relevant and not excessive * Accurate and up to date * Not kept for longer than is necessary * Processed in line with your rights * Secure * Not transferred to other countries without adequate protection The second area covered by the Act provides individuals with important rights, including the right to find out what personal information is held on computer and most paper records. Should an individual or organisation feel they're being denied access to personal information they're entitled to, or feel their information has not been handled according to the eight principles, they can contact the Information Commissioner's Office for help. Complaints are usually dealt with informally, but if this isn't possible, enforcement action can be taken. The Data Protection Act (DPA) is a United Kingdom Act of Parliament. It defines a legal basis for handling in the United Kingdom of information relating to people living within. It is the main/only piece of legislation that governs protection of personal data in the UK. Although the Act does not mention privacy, in practice it provides a way in which individuals can enforce the control of information about themselves. Most of the Act does not apply to domestic use, for example keeping a personal address book. Organisations in the UK are legally obliged to comply with this Act, subject to some exemptions. Compliance with the Act is enforced by an independent government authority, the Information Commissioner's Office (ICO). The ICO maintains guidance relating to the Act. ...read more.


There are many different types of databases available for use; the three most common ones are, * Flat file database * Relational database * Hierarchical database I will now explain each database listing the advantages and disadvantages of each. Flat File Databases A Flat File Database is a text file commonly only containing a record for each line in the file. This sort of database would be used for a simple phonebook sort database, showing peoples names with there telephone numbers and possibly addresses. This could also be used to keep track of friends. An example of a flat file database is a personal phonebook storing names and telephone numbers Advantages The advantages of a flat file database are, * It is a very simple database which is easy to use and understand, very little training will be needed to create and use one of these. * Easy to understand. * These are cheap to both create and to run as they are usually just simple text files. * Uses a small number of resources Relational databases A relational database is a database which conforms to a relational model and refers to the data and the structure of how it is arranged. A relational database is a selection of tables of fields related by relationships. For example, a data set containing all the real estate transactions in a town can be grouped by the year the transaction occurred; or it can be grouped by the sale price of the transaction; or it can be grouped by the buyer's last name; and so on. Advantages The advantages of a relational database are, * This database will use relationships to link different fields in the tables and this will make things easier to understand due to the layout of the information. * Security features, passwords can be used and fields are then locked after being used meaning other users can not change data entered. ...read more.


This can also help the supermarket see when certain products are bought by customers. For example in the summer more sunglasses and sun cream are bought, this means the supermarket should buy more of these in the summer to increase profits and buy less in winter as they are not on demand as much and the supermarket will loose money. The sale of beer is a good example, the supermarket will know more alcohol is sold on special occasions such as Easter, Christmas, new year. So the supermarket should purchase more alcohol and maybe have special offers, this will increase profits. Predictive Modelling Predictive modelling Is the process of a model being created or simply chosen. This model tries to predict the probability of an outcome of certain areas as best it can. In many cases the model is chosen on the basis of detection theory to try to guess the probability of a signal given a set amount of input data, for example given an email determining how likely that it is spam. Predictive modeling can involve figuring out and predicting certain information and relationships within data. this can be used to predict which customer would buy which products from the store, and why. Predictive modelling is used a lot to analyse customer relationship management ant with data mining. This produces models for the customer level, this describes the likelihood of customers taking particular actions. The actions are usually sales, marketing and customer related. Predictive modeling can help the supermarkets detect and protect themselves against the supermarket. How many sales have been recorded and the area they have been take is a good example of how the supermarket can develop based on the custom If the supermarket would like to increase their profits predictive modeling should be used to increase the accuracy of the pricing and the sales of stock. ?? ?? ?? ?? National Diploma for IT Practitioners Unit: 3 - Information Systems Assignment: 2 Candidate Number: Z051677 Centre Number: 47303 Name: Neil Gibson Page: 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a star student thought of this essay

4 star(s)

Response to the question

Given the headers, it is evident that this report focuses mainly on IT legislation and ethics, the student provides a detailed analysis of existing laws and what they cover. Key acts of legislation are defined along with an outline of ...

Read full review

Response to the question

Given the headers, it is evident that this report focuses mainly on IT legislation and ethics, the student provides a detailed analysis of existing laws and what they cover. Key acts of legislation are defined along with an outline of common office applications and systems that are primarily used to store and retrieve information.

The student has essentially responded to each section in great detail.

Level of analysis

The writer demonstrates an outstanding level of analytical skills for this level of qualification and has made evaluative judgements as evidenced by the IT legislation discussed. However, the writer should have included references for further reading and to confirm examples and findings in the report.

The report lacks a main conclusion or summary which would have been helpful given the length and number of sections contained within. The report also lacks an introduction explaining what is to be discussed and outlined. Again, this would have been helpful due to the broad range of topics.

Quality of writing

The report does not include a table of contents, which given the length, makes it difficult to navigate the document – particularly so if the reader wishes to only view certain topics. The report does however include page numbers which is helpful when referencing different sections and the writer has indeed surpassed the technical terms expected at this level of qualification.

Minor grammatical errors are present in certain parts of the document.

Did you find this review helpful? Join our team of reviewers and help other students learn

Reviewed by finalfantasy 01/03/2012

Read less
Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. System Analysis The aim of the Jewellery store system is to make the work ...

    The feasibility study determines the best method of achieve the objectives of new information system that would solve the problems. The outcome of the feasibility study is the recommendation of a new system proposal. This new information system proposal is to be sanctioned by the higher management in consultation with department managers.

  2. 140 Computing A-Level Revision Questions

    Describe, with examples, a linear and a binary search. Give an advantage of each. 36. Explain, with an example, master file and transaction file. 37. Explain real-time processing, giving two different examples with different response times. 38. Explain multi-access processing and how it is controlled. 39. Explain serial and parallel transmission of data.

  1. Video Rental System

    Since a purchase order can contain more than one item, each purchase order will have multiple entries. Similarly the Purchase order has "VEND_NAME" and "VEND_ID". Each Vendor can place more than one purchase order. There will be repetition of the "VEND_NAME" and other vendor related details.

  2. What are the principle advantages and disadvantages of the Airbus A380 in respect of ...

    A380 due to its increased size and width (nearly 8m compared to the 747-400's 6.5m) airlines can have more freedom to design new and interesting cabins or introduce new products that will benefit the passenger. On the down side for airlines; they will be required to train staff on the

  1. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    The more pixels there are, the better the picture will be, this is known as the screen resolution. These notes can be typed using a very low resolution, monochrome screen. If you consider the contents, there is no reason for any further sophistication to be necessary.

  2. Different ways of data capture

    Check Digit Check - Extra digit is at the end of a code number which has been calculated from the digits of the code e.g bar codes, ISBN. Batch Header Checks - Total no. of records should be calculated by comp and compared with figure on the batch header also includes has and control totals.

  1. GCSE I.T Security Case Study - Riverside Leisure Centre

    The processing must safeguard the rights and freedoms of the data subjects. It must be limited to members or persons in regular contact with the organisation and it must not disclose any personal data to others without the data subject's consent.

  2. Free essay

    Hardware and Functions of a Micro Processor

    * NOR - The NOR gate is again a reversal of the previous gate, the NAND. In this circumstance when inputs contain a high voltage the output will definitely be a low voltage. If both inputs are low then the output will be high * EOR - EOR is standardised form for saying exclusive disjunction.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work