• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16

information systems assignment 2

Extracts from this document...

Introduction

Legislation Data Protection Act The Data Protection Act gives individuals the right to know what information is held about them. It provides a framework to ensure that personal information is handled properly. The Act works in two ways. Firstly, it states that anyone who processes personal information must comply with eight principles, which make sure that personal information is: * Fairly and lawfully processed * Processed for limited purposes * Adequate, relevant and not excessive * Accurate and up to date * Not kept for longer than is necessary * Processed in line with your rights * Secure * Not transferred to other countries without adequate protection The second area covered by the Act provides individuals with important rights, including the right to find out what personal information is held on computer and most paper records. Should an individual or organisation feel they're being denied access to personal information they're entitled to, or feel their information has not been handled according to the eight principles, they can contact the Information Commissioner's Office for help. Complaints are usually dealt with informally, but if this isn't possible, enforcement action can be taken. The Data Protection Act (DPA) is a United Kingdom Act of Parliament. It defines a legal basis for handling in the United Kingdom of information relating to people living within. It is the main/only piece of legislation that governs protection of personal data in the UK. Although the Act does not mention privacy, in practice it provides a way in which individuals can enforce the control of information about themselves. Most of the Act does not apply to domestic use, for example keeping a personal address book. Organisations in the UK are legally obliged to comply with this Act, subject to some exemptions. Compliance with the Act is enforced by an independent government authority, the Information Commissioner's Office (ICO). The ICO maintains guidance relating to the Act. ...read more.

Middle

There are many different types of databases available for use; the three most common ones are, * Flat file database * Relational database * Hierarchical database I will now explain each database listing the advantages and disadvantages of each. Flat File Databases A Flat File Database is a text file commonly only containing a record for each line in the file. This sort of database would be used for a simple phonebook sort database, showing peoples names with there telephone numbers and possibly addresses. This could also be used to keep track of friends. An example of a flat file database is a personal phonebook storing names and telephone numbers Advantages The advantages of a flat file database are, * It is a very simple database which is easy to use and understand, very little training will be needed to create and use one of these. * Easy to understand. * These are cheap to both create and to run as they are usually just simple text files. * Uses a small number of resources Relational databases A relational database is a database which conforms to a relational model and refers to the data and the structure of how it is arranged. A relational database is a selection of tables of fields related by relationships. For example, a data set containing all the real estate transactions in a town can be grouped by the year the transaction occurred; or it can be grouped by the sale price of the transaction; or it can be grouped by the buyer's last name; and so on. Advantages The advantages of a relational database are, * This database will use relationships to link different fields in the tables and this will make things easier to understand due to the layout of the information. * Security features, passwords can be used and fields are then locked after being used meaning other users can not change data entered. ...read more.

Conclusion

This can also help the supermarket see when certain products are bought by customers. For example in the summer more sunglasses and sun cream are bought, this means the supermarket should buy more of these in the summer to increase profits and buy less in winter as they are not on demand as much and the supermarket will loose money. The sale of beer is a good example, the supermarket will know more alcohol is sold on special occasions such as Easter, Christmas, new year. So the supermarket should purchase more alcohol and maybe have special offers, this will increase profits. Predictive Modelling Predictive modelling Is the process of a model being created or simply chosen. This model tries to predict the probability of an outcome of certain areas as best it can. In many cases the model is chosen on the basis of detection theory to try to guess the probability of a signal given a set amount of input data, for example given an email determining how likely that it is spam. Predictive modeling can involve figuring out and predicting certain information and relationships within data. this can be used to predict which customer would buy which products from the store, and why. Predictive modelling is used a lot to analyse customer relationship management ant with data mining. This produces models for the customer level, this describes the likelihood of customers taking particular actions. The actions are usually sales, marketing and customer related. Predictive modeling can help the supermarkets detect and protect themselves against the supermarket. How many sales have been recorded and the area they have been take is a good example of how the supermarket can develop based on the custom If the supermarket would like to increase their profits predictive modeling should be used to increase the accuracy of the pricing and the sales of stock. ?? ?? ?? ?? National Diploma for IT Practitioners Unit: 3 - Information Systems Assignment: 2 Candidate Number: Z051677 Centre Number: 47303 Name: Neil Gibson Page: 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a star student thought of this essay

4 star(s)

Response to the question

Given the headers, it is evident that this report focuses mainly on IT legislation and ethics, the student provides a detailed analysis of existing laws and what they cover. Key acts of legislation are defined along with an outline of ...

Read full review

Response to the question

Given the headers, it is evident that this report focuses mainly on IT legislation and ethics, the student provides a detailed analysis of existing laws and what they cover. Key acts of legislation are defined along with an outline of common office applications and systems that are primarily used to store and retrieve information.

The student has essentially responded to each section in great detail.

Level of analysis

The writer demonstrates an outstanding level of analytical skills for this level of qualification and has made evaluative judgements as evidenced by the IT legislation discussed. However, the writer should have included references for further reading and to confirm examples and findings in the report.

The report lacks a main conclusion or summary which would have been helpful given the length and number of sections contained within. The report also lacks an introduction explaining what is to be discussed and outlined. Again, this would have been helpful due to the broad range of topics.

Quality of writing

The report does not include a table of contents, which given the length, makes it difficult to navigate the document – particularly so if the reader wishes to only view certain topics. The report does however include page numbers which is helpful when referencing different sections and the writer has indeed surpassed the technical terms expected at this level of qualification.

Minor grammatical errors are present in certain parts of the document.


Did you find this review helpful? Join our team of reviewers and help other students learn

Reviewed by finalfantasy 01/03/2012

Read less
Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. 140 Computing A-Level Revision Questions

    Describe, with examples, a linear and a binary search. Give an advantage of each. 36. Explain, with an example, master file and transaction file. 37. Explain real-time processing, giving two different examples with different response times. 38. Explain multi-access processing and how it is controlled. 39. Explain serial and parallel transmission of data.

  2. What are the principle advantages and disadvantages of the Airbus A380 in respect of ...

    operation of the A380 for example cabin crew, this is a cost not usually discussed by Airbus and should be considered by airlines. The A380 will also require more cabin crew to operate under JAA and FAA regulations; one wonders if this cost is included in the operating cost provided by Airbus.

  1. System Analysis The aim of the Jewellery store system is to make the work ...

    Phases of the SDLC Phase 1: Problem Definition This phase provides a broad statement of user requirements, in user world terms - or what the user expect the system do - and thus sets the direction for the whole project.

  2. Video Rental System

    Since a purchase order can contain more than one item, each purchase order will have multiple entries. Similarly the Purchase order has "VEND_NAME" and "VEND_ID". Each Vendor can place more than one purchase order. There will be repetition of the "VEND_NAME" and other vendor related details.

  1. GCSE I.T Security Case Study - Riverside Leisure Centre

    By informing the data subject or, By notifying the Data Protection Commissioner. This is in addition to notification (registration). All controllers must notify and pay the notification fee. 3/Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed.

  2. Signal Theory

    On a separate segment they store the MAC addressing table of all nodes. Basically it takes the incoming frames and checks the destined MAC address and lookups it up against the store MAC addressing table and decides what to do.

  1. Identify the constituent parts of a total computer system.

    Computers that run in real time have to be very fast and have a lot of processing power. Computers operating in real time are often dedicated to the control of systems such as industrial processes, planes and space flights. The computer has to react immediately to input data by issuing output signals to the systems being controlled.

  2. Computer systems assignment 1

    * HDD- hard disk drive is a storage device. It stores the operating systems and all sorts of Data such as music, word files, films...pretty much anything. It does not lose the data as a computer switches off like RAM.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work