• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20
  21. 21
    21
  22. 22
    22
  23. 23
    23
  24. 24
    24
  25. 25
    25
  26. 26
    26
  27. 27
    27

Information: G061 - Systems and Communication

Extracts from this document...

Introduction

ICT Theory Revision Guide 3.1.1 Data, Information, Knowledge and Processing a) Data is the raw facts and figures (alphanumeric characters), without meaning. For example, 211210 is the data entered in when entering the date 21/12/2010. b) Information is processed data with a meaning (and sometimes context and structure): Information = Data + [Context] + [Structure] + Meaning c) Representation Advantages Disadvantages Text * Clear to understand * Lots of detail * Need to be able to read * Need to understand language * Can be confusing - level of language * Lots of text cannot be read quickly - road signs Graphics * Multilingual - do not need language to understand * Can match what you see - physical shapes * Can be confusing if you don't know the symbols - road signs * Some symbols mean different things in different cultures and countries Sound * No fixed position * No line of site required * Good for visually impaired people * No good in large areas - distortion of sound * Usually language based * May not know the sound * Need to be able to hear Moving pictures * Lots of information conveyed * Not language dependent * Can exemplify text * Linear - if you do not see the beginning you may not understand * Problems if sound LED * Can allow data to be kept secure * Can be used in noisy places * Similar to graphics * Need to be able to see the lights * Combinations of lights may need to be known to be understood d) Information is processed data with a meaning, structure and context. Knowledge is the application of that information to a situation. e) Data type Description Boolean * Can contain one of only two values, e.g. male/female, true/false Real * Contains numbers which will have decimal places Integer * Contains whole numbers with no decimal places Text/string * Any alphanumeric character, including numbers, text and symbols, e.g. ...read more.

Middle

Mathematical modelling: - based on a layout of rows and columns (spreadsheet) assisting in a logical format - replication of a cell horizontally/vertically (including formulae, with cell references being updated automatically) - can be based on functions and formulae (allowing variables to be edited and for automatic recalculation of any cell based on those variables) - "What if...?" questions can be asked (changing variables); goal seek can also be used - cells and ranges can be given specific names to reference (e.g. VAT_RATE for the cell containing the rate of VAT) - use of multiple different worksheets in the spreadsheet - use of graphs and graphical representation of data Modelling is used because: - it is less risky (safer and cheaper) to test a model of a design than to create it in reality and test it - only one model needs to be created on a computer; a real model would need to be recreated every time a different variable was changed - costing time and money - models can be backed up and shared - models can be sped up/slowed down to see effects in the short run/long run (not possible in reality) b) A model can recalculate values when numbers change, predict what will happen as an effect, and test different scenarios. There are four features involved in this. Variables: a variable is an identifier associated with a particular cell - within the cell, there will be a value Formulae: a formula is a calculation which uses numbers, addresses of cells and mathematical operators Rules: rules are a set of procedures that must be followed and can also be the sequence of events required for the calculation to work Functions: a function represents a complex formula that uses reserved words c) "What if...?" questions are an attempt to find out what will happen in the future. They require a value to be changed so that other values can be re-calculated. ...read more.

Conclusion

seen as a breach of trust - Many people like to 'cling on' to their privacy - Concerns about what controls there are on organisations who monitor communications The Electronic Communications Act (2000) The Electronic Communications Act: - government wanted 'to make the UK the best place in the world for e-commerce' and to 'create a legal framework so that people can be sure about the origin and integrity of communications' The Electronic Communications Act has two make parts: 1. Cryptography service providers - this allows the government to set up a register of approved cryptography suppliers 2. Facilitation of electronic commerce, data storage - this recognises digital signatures, which are now admissible in law Benefits of Electronic Communications Act Problems with Electronic Communications Act - contracts signed over the Internet have the same legality as those signed by hand (increasing security of e-commerce and ensures legal backing for contracts) - lots of legislation against digital signatures, so there's now legislation to remove laws preventing digital signatures, but this takes time - always a security risk The Freedom of Information Act (2000) The Freedom of Information Act: - deals with access to information on any topic from any public authority (including government, the health service, schools and police) - allows anyone to make a request, giving their name, address and a description of what they want Benefits of Freedom of Information Act Problems with Freedom of Information Act - information that wasn't accessible to the general public is now available - increased accountability (public authority cannot hide decisions they make) - any information can be requested, however it may be withheld to protect various interests/may come under an exception - public authority doesn't have to confirm or deny the existence of the information that you have requested - doesn't have to provide information if an exemption applies, if the request is too vague, if it's similar to a previous request, or if the cost of collating and producing the information exceeds an appropriate limit ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    This can lead to incorrect readings of the data, and thus incorrect decisions being made as a consequence, as Fred's anecdote regarding the telephone illustrates. In a computerised system, data is stored in a uniform, universal textual style of great clarity, perfectly comprehensible for any reader of the English language.

  2. Marked by a teacher

    Investigating a Transactional Website (www.latestdvd9.com)

    4 star(s)

    Apart from that I think there is nothing the website could improve in the accessibility, because it does not use many features and can therefore be used by anybody on any kind of browser. What sort of customer experience does it offer?

  1. ict as level coursework

    If the user needs to find a particular customers detail then they have to type in the customer number and their details should be found on the customer details spreadsheet. As you can see here are only 3 buttons on this user form, this is because I wanted it to be as simple as possible.

  2. Threats to Data

    Well known firewalls like Norton are extremely good at identifying unfriendly access and provide a great deal of protection. It will recognise dangerous threats but it sometimes depends on you to set what is friendly and what is unfriendly. It is possible to allow access to something dangerous because you don't know what it is.

  1. ICT - Definition of scope

    For example 100 CD's will only cost around �3-5. Implementation Implementing our product shouldn't be hard, since as it stands we don't an existing replacement, so far when the customers have need advice they have rung Mr McCann, but now they will be able to take a disk with them

  2. Discuss the Causes and Effects of the Digital Divide

    that required knowledge and that discouraged many women from using these newer technology but now as the old fashioned ideology has been demolished the divide between men and women has been closed. Technology does not only mean computers, mobile phones, mp3 players, laptops, games consoles and televisions are also hardware that people use.

  1. Communication & Employability Skills for IT. OCR Cambridge Technicals Unit 1 LO1-P1

    Big businesses should also have an IT department which may be responsible for looking after the businesses systems so that the professionals can prevent any unauthorised access to their computer systems. Copyright Act- Detail This act gives the creators of media rights to control how their work is used and distributed.

  2. Explain the function of computer hardware components

    once, this ensures it doesn?t get over heated, if it did overhead the system would get damaged and would effect the computers performance. After the heat has been conducted from the processor through the heat sink it?s the fans job to move that heat out of the computer.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work