• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20
  21. 21
    21
  22. 22
    22
  23. 23
    23
  24. 24
    24
  25. 25
    25
  26. 26
    26
  27. 27
    27

Information: G061 - Systems and Communication

Extracts from this document...

Introduction

ICT Theory Revision Guide 3.1.1 Data, Information, Knowledge and Processing a) Data is the raw facts and figures (alphanumeric characters), without meaning. For example, 211210 is the data entered in when entering the date 21/12/2010. b) Information is processed data with a meaning (and sometimes context and structure): Information = Data + [Context] + [Structure] + Meaning c) Representation Advantages Disadvantages Text * Clear to understand * Lots of detail * Need to be able to read * Need to understand language * Can be confusing - level of language * Lots of text cannot be read quickly - road signs Graphics * Multilingual - do not need language to understand * Can match what you see - physical shapes * Can be confusing if you don't know the symbols - road signs * Some symbols mean different things in different cultures and countries Sound * No fixed position * No line of site required * Good for visually impaired people * No good in large areas - distortion of sound * Usually language based * May not know the sound * Need to be able to hear Moving pictures * Lots of information conveyed * Not language dependent * Can exemplify text * Linear - if you do not see the beginning you may not understand * Problems if sound LED * Can allow data to be kept secure * Can be used in noisy places * Similar to graphics * Need to be able to see the lights * Combinations of lights may need to be known to be understood d) Information is processed data with a meaning, structure and context. Knowledge is the application of that information to a situation. e) Data type Description Boolean * Can contain one of only two values, e.g. male/female, true/false Real * Contains numbers which will have decimal places Integer * Contains whole numbers with no decimal places Text/string * Any alphanumeric character, including numbers, text and symbols, e.g. ...read more.

Middle

Mathematical modelling: - based on a layout of rows and columns (spreadsheet) assisting in a logical format - replication of a cell horizontally/vertically (including formulae, with cell references being updated automatically) - can be based on functions and formulae (allowing variables to be edited and for automatic recalculation of any cell based on those variables) - "What if...?" questions can be asked (changing variables); goal seek can also be used - cells and ranges can be given specific names to reference (e.g. VAT_RATE for the cell containing the rate of VAT) - use of multiple different worksheets in the spreadsheet - use of graphs and graphical representation of data Modelling is used because: - it is less risky (safer and cheaper) to test a model of a design than to create it in reality and test it - only one model needs to be created on a computer; a real model would need to be recreated every time a different variable was changed - costing time and money - models can be backed up and shared - models can be sped up/slowed down to see effects in the short run/long run (not possible in reality) b) A model can recalculate values when numbers change, predict what will happen as an effect, and test different scenarios. There are four features involved in this. Variables: a variable is an identifier associated with a particular cell - within the cell, there will be a value Formulae: a formula is a calculation which uses numbers, addresses of cells and mathematical operators Rules: rules are a set of procedures that must be followed and can also be the sequence of events required for the calculation to work Functions: a function represents a complex formula that uses reserved words c) "What if...?" questions are an attempt to find out what will happen in the future. They require a value to be changed so that other values can be re-calculated. ...read more.

Conclusion

seen as a breach of trust - Many people like to 'cling on' to their privacy - Concerns about what controls there are on organisations who monitor communications The Electronic Communications Act (2000) The Electronic Communications Act: - government wanted 'to make the UK the best place in the world for e-commerce' and to 'create a legal framework so that people can be sure about the origin and integrity of communications' The Electronic Communications Act has two make parts: 1. Cryptography service providers - this allows the government to set up a register of approved cryptography suppliers 2. Facilitation of electronic commerce, data storage - this recognises digital signatures, which are now admissible in law Benefits of Electronic Communications Act Problems with Electronic Communications Act - contracts signed over the Internet have the same legality as those signed by hand (increasing security of e-commerce and ensures legal backing for contracts) - lots of legislation against digital signatures, so there's now legislation to remove laws preventing digital signatures, but this takes time - always a security risk The Freedom of Information Act (2000) The Freedom of Information Act: - deals with access to information on any topic from any public authority (including government, the health service, schools and police) - allows anyone to make a request, giving their name, address and a description of what they want Benefits of Freedom of Information Act Problems with Freedom of Information Act - information that wasn't accessible to the general public is now available - increased accountability (public authority cannot hide decisions they make) - any information can be requested, however it may be withheld to protect various interests/may come under an exception - public authority doesn't have to confirm or deny the existence of the information that you have requested - doesn't have to provide information if an exemption applies, if the request is too vague, if it's similar to a previous request, or if the cost of collating and producing the information exceeds an appropriate limit ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    E-Commerce Laws and Legislation - The Data Protection Act

    4 star(s)

    For example: Computer Misuse Bypassing the security system for a company?s payroll information and copying the data onto a flash drive For example: Computer Abuse Reading the text messages on a friends phone without permission This affects businesses because they have to ensure that their systems are secure.

  2. Marked by a teacher

    Information Age

    3 star(s)

    think this website clearly meet the needs of the students as only the basic points are given here. Also the tests are really simple and are really easier in comparison to the level of the students so therefore might not help the students in relying on to this website only.

  1. Threats to Data

    Virus checkers can be scheduled to run automatically such as once a week and can be set to automatically check removable media and incoming e-mails. It has a database of known viruses which tells it how to recognise them and once it finds them it can either delete or repair the files concerned if it can.

  2. transmission of care values

    When communication is taking place, a service user may find it difficult to express their needs if they are uncomfortable speaking with other people about. This lack of privacy would be a barrier to effective communication (Moonie, 2005). Cultural and Race Factors "Most general, the term culture denotes whole product of an individual, group or society of intelligent beings.

  1. The Impact of Mobile Phones on social Interaction

    either agreed or strongly agreed to the statement that owning a mobile phone is essential for today's society. The basis for this opinion was largely due to the mobile phones capacity to increase accessibility to people, increase safety, being more personalised and therefore cost effective compared to fixed line phones

  2. System Analysis and Design Assignment

    * How Daily/Monthly/Statistic are Produced The learning centre may wish to produce statistics on a regular basis, for example how many books have been borrowed in a certain day/week/month, how many books are currently overdue. The process for producing these statistics is currently conducted manually.

  1. The data Processing Cycle and processing methods

    The validation stage will pick up on this and correct it. So the master database will be updated with the correct information. Let's say an employee of the company has worked 700 hours in a week this would be a clear mistake.

  2. Discuss the Causes and Effects of the Digital Divide

    have to use dial up connections to go on the internet which means that its not that they cant afford fast internet but the area they live in is acting like a barrier and stopping them from viewing fast multimedia, therefore its not how rich a person is it could

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work