• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20
  21. 21
    21
  22. 22
    22
  23. 23
    23
  24. 24
    24
  25. 25
    25
  26. 26
    26
  27. 27
    27

Information: G061 - Systems and Communication

Extracts from this document...

Introduction

ICT Theory Revision Guide 3.1.1 Data, Information, Knowledge and Processing a) Data is the raw facts and figures (alphanumeric characters), without meaning. For example, 211210 is the data entered in when entering the date 21/12/2010. b) Information is processed data with a meaning (and sometimes context and structure): Information = Data + [Context] + [Structure] + Meaning c) Representation Advantages Disadvantages Text * Clear to understand * Lots of detail * Need to be able to read * Need to understand language * Can be confusing - level of language * Lots of text cannot be read quickly - road signs Graphics * Multilingual - do not need language to understand * Can match what you see - physical shapes * Can be confusing if you don't know the symbols - road signs * Some symbols mean different things in different cultures and countries Sound * No fixed position * No line of site required * Good for visually impaired people * No good in large areas - distortion of sound * Usually language based * May not know the sound * Need to be able to hear Moving pictures * Lots of information conveyed * Not language dependent * Can exemplify text * Linear - if you do not see the beginning you may not understand * Problems if sound LED * Can allow data to be kept secure * Can be used in noisy places * Similar to graphics * Need to be able to see the lights * Combinations of lights may need to be known to be understood d) Information is processed data with a meaning, structure and context. Knowledge is the application of that information to a situation. e) Data type Description Boolean * Can contain one of only two values, e.g. male/female, true/false Real * Contains numbers which will have decimal places Integer * Contains whole numbers with no decimal places Text/string * Any alphanumeric character, including numbers, text and symbols, e.g. ...read more.

Middle

Mathematical modelling: - based on a layout of rows and columns (spreadsheet) assisting in a logical format - replication of a cell horizontally/vertically (including formulae, with cell references being updated automatically) - can be based on functions and formulae (allowing variables to be edited and for automatic recalculation of any cell based on those variables) - "What if...?" questions can be asked (changing variables); goal seek can also be used - cells and ranges can be given specific names to reference (e.g. VAT_RATE for the cell containing the rate of VAT) - use of multiple different worksheets in the spreadsheet - use of graphs and graphical representation of data Modelling is used because: - it is less risky (safer and cheaper) to test a model of a design than to create it in reality and test it - only one model needs to be created on a computer; a real model would need to be recreated every time a different variable was changed - costing time and money - models can be backed up and shared - models can be sped up/slowed down to see effects in the short run/long run (not possible in reality) b) A model can recalculate values when numbers change, predict what will happen as an effect, and test different scenarios. There are four features involved in this. Variables: a variable is an identifier associated with a particular cell - within the cell, there will be a value Formulae: a formula is a calculation which uses numbers, addresses of cells and mathematical operators Rules: rules are a set of procedures that must be followed and can also be the sequence of events required for the calculation to work Functions: a function represents a complex formula that uses reserved words c) "What if...?" questions are an attempt to find out what will happen in the future. They require a value to be changed so that other values can be re-calculated. ...read more.

Conclusion

seen as a breach of trust - Many people like to 'cling on' to their privacy - Concerns about what controls there are on organisations who monitor communications The Electronic Communications Act (2000) The Electronic Communications Act: - government wanted 'to make the UK the best place in the world for e-commerce' and to 'create a legal framework so that people can be sure about the origin and integrity of communications' The Electronic Communications Act has two make parts: 1. Cryptography service providers - this allows the government to set up a register of approved cryptography suppliers 2. Facilitation of electronic commerce, data storage - this recognises digital signatures, which are now admissible in law Benefits of Electronic Communications Act Problems with Electronic Communications Act - contracts signed over the Internet have the same legality as those signed by hand (increasing security of e-commerce and ensures legal backing for contracts) - lots of legislation against digital signatures, so there's now legislation to remove laws preventing digital signatures, but this takes time - always a security risk The Freedom of Information Act (2000) The Freedom of Information Act: - deals with access to information on any topic from any public authority (including government, the health service, schools and police) - allows anyone to make a request, giving their name, address and a description of what they want Benefits of Freedom of Information Act Problems with Freedom of Information Act - information that wasn't accessible to the general public is now available - increased accountability (public authority cannot hide decisions they make) - any information can be requested, however it may be withheld to protect various interests/may come under an exception - public authority doesn't have to confirm or deny the existence of the information that you have requested - doesn't have to provide information if an exemption applies, if the request is too vague, if it's similar to a previous request, or if the cost of collating and producing the information exceeds an appropriate limit ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    This can take upwards of ten seconds each time, which may not sound like a lot but if we feed this into the equation 10*n*365, n being the number of times a record is searched for every day, we discover that large numbers of hours are wasted per year simply searching for records!

  2. Marked by a teacher

    Evaluation. In this unit of controlled assessment I have developed a website using multimedia ...

    I used the cloning tool to make a copy of part of my original graphic so that it could make a smooth animation. The grouping tool was used to assemble certain images together into one cluster. This enabled me to move a group of images in one movement, which saved time.

  1. ICT - Definition of scope

    For example 100 CD's will only cost around �3-5. Implementation Implementing our product shouldn't be hard, since as it stands we don't an existing replacement, so far when the customers have need advice they have rung Mr McCann, but now they will be able to take a disk with them

  2. Threats to Data

    The key is a series of zeroes and ones known as bits. The more bits you have for your key the more difficult it is to know which one you are using. Secure Electronic Transfer (SET) When you browse a transactional web site you are not at that time providing any sensitive data.

  1. ict as level coursework

    Therefore in the control source it will show: I must link each combo box to each cell I want it to go on to the invoice this will follow a sequence of A14, A15, A16 etc. In the same way I will link the text boxes and list boxes to the invoices.

  2. A2 ICT CouseWork

    "All the web pages on the website should be linked together" this test will be done simply by testing if each link in the website works properly. The testing method may differ during the client requirement testing as we shall complete a series of different test's when examining each point,

  1. Discuss the Causes and Effects of the Digital Divide

    that required knowledge and that discouraged many women from using these newer technology but now as the old fashioned ideology has been demolished the divide between men and women has been closed. Technology does not only mean computers, mobile phones, mp3 players, laptops, games consoles and televisions are also hardware that people use.

  2. Explain the function of computer hardware components

    RAM RAM stands for random access memory. It is a computer storage location that allows information to be stored and accessed quickly from random locations and can access the data much faster. Unlike ROM, RAM is a volatile and needs power in order to keep the data accessible, if power is lost all data in memory lost.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work