• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16

information systems assignment 2

Extracts from this document...

Introduction

Legislation Data Protection Act The Data Protection Act gives individuals the right to know what information is held about them. It provides a framework to ensure that personal information is handled properly. The Act works in two ways. Firstly, it states that anyone who processes personal information must comply with eight principles, which make sure that personal information is: * Fairly and lawfully processed * Processed for limited purposes * Adequate, relevant and not excessive * Accurate and up to date * Not kept for longer than is necessary * Processed in line with your rights * Secure * Not transferred to other countries without adequate protection The second area covered by the Act provides individuals with important rights, including the right to find out what personal information is held on computer and most paper records. Should an individual or organisation feel they're being denied access to personal information they're entitled to, or feel their information has not been handled according to the eight principles, they can contact the Information Commissioner's Office for help. Complaints are usually dealt with informally, but if this isn't possible, enforcement action can be taken. The Data Protection Act (DPA) is a United Kingdom Act of Parliament. It defines a legal basis for handling in the United Kingdom of information relating to people living within. It is the main/only piece of legislation that governs protection of personal data in the UK. Although the Act does not mention privacy, in practice it provides a way in which individuals can enforce the control of information about themselves. Most of the Act does not apply to domestic use, for example keeping a personal address book. Organisations in the UK are legally obliged to comply with this Act, subject to some exemptions. Compliance with the Act is enforced by an independent government authority, the Information Commissioner's Office (ICO). The ICO maintains guidance relating to the Act. ...read more.

Middle

There are many different types of databases available for use; the three most common ones are, * Flat file database * Relational database * Hierarchical database I will now explain each database listing the advantages and disadvantages of each. Flat File Databases A Flat File Database is a text file commonly only containing a record for each line in the file. This sort of database would be used for a simple phonebook sort database, showing peoples names with there telephone numbers and possibly addresses. This could also be used to keep track of friends. An example of a flat file database is a personal phonebook storing names and telephone numbers Advantages The advantages of a flat file database are, * It is a very simple database which is easy to use and understand, very little training will be needed to create and use one of these. * Easy to understand. * These are cheap to both create and to run as they are usually just simple text files. * Uses a small number of resources Relational databases A relational database is a database which conforms to a relational model and refers to the data and the structure of how it is arranged. A relational database is a selection of tables of fields related by relationships. For example, a data set containing all the real estate transactions in a town can be grouped by the year the transaction occurred; or it can be grouped by the sale price of the transaction; or it can be grouped by the buyer's last name; and so on. Advantages The advantages of a relational database are, * This database will use relationships to link different fields in the tables and this will make things easier to understand due to the layout of the information. * Security features, passwords can be used and fields are then locked after being used meaning other users can not change data entered. ...read more.

Conclusion

This can also help the supermarket see when certain products are bought by customers. For example in the summer more sunglasses and sun cream are bought, this means the supermarket should buy more of these in the summer to increase profits and buy less in winter as they are not on demand as much and the supermarket will loose money. The sale of beer is a good example, the supermarket will know more alcohol is sold on special occasions such as Easter, Christmas, new year. So the supermarket should purchase more alcohol and maybe have special offers, this will increase profits. Predictive Modelling Predictive modelling Is the process of a model being created or simply chosen. This model tries to predict the probability of an outcome of certain areas as best it can. In many cases the model is chosen on the basis of detection theory to try to guess the probability of a signal given a set amount of input data, for example given an email determining how likely that it is spam. Predictive modeling can involve figuring out and predicting certain information and relationships within data. this can be used to predict which customer would buy which products from the store, and why. Predictive modelling is used a lot to analyse customer relationship management ant with data mining. This produces models for the customer level, this describes the likelihood of customers taking particular actions. The actions are usually sales, marketing and customer related. Predictive modeling can help the supermarkets detect and protect themselves against the supermarket. How many sales have been recorded and the area they have been take is a good example of how the supermarket can develop based on the custom If the supermarket would like to increase their profits predictive modeling should be used to increase the accuracy of the pricing and the sales of stock. ?? ?? ?? ?? National Diploma for IT Practitioners Unit: 3 - Information Systems Assignment: 2 Candidate Number: Z051677 Centre Number: 47303 Name: Neil Gibson Page: 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a star student thought of this essay

4 star(s)

Response to the question

Given the headers, it is evident that this report focuses mainly on IT legislation and ethics, the student provides a detailed analysis of existing laws and what they cover. Key acts of legislation are defined along with an outline of ...

Read full review

Response to the question

Given the headers, it is evident that this report focuses mainly on IT legislation and ethics, the student provides a detailed analysis of existing laws and what they cover. Key acts of legislation are defined along with an outline of common office applications and systems that are primarily used to store and retrieve information.

The student has essentially responded to each section in great detail.

Level of analysis

The writer demonstrates an outstanding level of analytical skills for this level of qualification and has made evaluative judgements as evidenced by the IT legislation discussed. However, the writer should have included references for further reading and to confirm examples and findings in the report.

The report lacks a main conclusion or summary which would have been helpful given the length and number of sections contained within. The report also lacks an introduction explaining what is to be discussed and outlined. Again, this would have been helpful due to the broad range of topics.

Quality of writing

The report does not include a table of contents, which given the length, makes it difficult to navigate the document – particularly so if the reader wishes to only view certain topics. The report does however include page numbers which is helpful when referencing different sections and the writer has indeed surpassed the technical terms expected at this level of qualification.

Minor grammatical errors are present in certain parts of the document.


Did you find this review helpful? Join our team of reviewers and help other students learn

Reviewed by finalfantasy 01/03/2012

Read less
Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    Business & IT Department BTEC. Organisational System Security - Describe the various types of ...

    3 star(s)

    This can severely effect bandwidth and damage company productivity. Piggybacking could result in systems lagging and becoming slow, this would result in workers being unable to do there job efficiently and at an optimised pace. There is also a threat posed by people using a companies network to browse illegal content to which the company would have to take responsibility.

  2. Marked by a teacher

    Case Study. LEGAL ISSUES-: Data Protection Act. Whiteman Leisure must ensure that the information ...

    This can lead on to disciplinary action that can be taken against a member of staff which does not follow the rules. Firewall-: A firewall blocks access to information that Whiteman Leisure hold, from external sources and so on. WLC need to constantly check if any anti-virus applications are up to date.

  1. System Analysis The aim of the Jewellery store system is to make the work ...

    This phase also sets the project bounds, which define what part of the system can be changed by the project and what parts are to remain the same. The resources to be made available to the system are also specified in this phase.

  2. 140 Computing A-Level Revision Questions

    Describe, with examples, a linear and a binary search. Give an advantage of each. 36. Explain, with an example, master file and transaction file. 37. Explain real-time processing, giving two different examples with different response times. 38. Explain multi-access processing and how it is controlled. 39. Explain serial and parallel transmission of data.

  1. Video Rental System

    Since a purchase order can contain more than one item, each purchase order will have multiple entries. Similarly the Purchase order has "VEND_NAME" and "VEND_ID". Each Vendor can place more than one purchase order. There will be repetition of the "VEND_NAME" and other vendor related details.

  2. Different ways of data capture

    DETECTING TRANSMISSION ERRORS In order to prevent transmitting errors between hardware components a PARITY CHECK is added to each character. In an even parity check the total number of 'on' bits in every byte (including the parity number) must be an even number.

  1. Discuss the relationship that exists in the UK between the legal rules that govern ...

    seen in the 1970s 1980s and 1990s such as Leeson bringing down Barings bank, Maxwell helping himself to the pension funds, the collapse of Polly Peck and Tiny Rowland running Lonrho as though it was his own. Examples can also be seen across the water in the US with the collapse of Enron.

  2. Assess the relative advantages of Quantitative research data and Qualitative

    Validity is a problem with official statistics. There may be bias or error on the part of the person taking report. Official statistics take a long time to analyse and put together. Structured interviews are questionnaires which are read out by the interviewer who then records the respondent's answers.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work