• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20
  21. 21
    21
  22. 22
    22
  23. 23
    23
  24. 24
    24
  25. 25
    25
  26. 26
    26
  27. 27
    27

Information: G061 - Systems and Communication

Extracts from this document...

Introduction

ICT Theory Revision Guide 3.1.1 Data, Information, Knowledge and Processing a) Data is the raw facts and figures (alphanumeric characters), without meaning. For example, 211210 is the data entered in when entering the date 21/12/2010. b) Information is processed data with a meaning (and sometimes context and structure): Information = Data + [Context] + [Structure] + Meaning c) Representation Advantages Disadvantages Text * Clear to understand * Lots of detail * Need to be able to read * Need to understand language * Can be confusing - level of language * Lots of text cannot be read quickly - road signs Graphics * Multilingual - do not need language to understand * Can match what you see - physical shapes * Can be confusing if you don't know the symbols - road signs * Some symbols mean different things in different cultures and countries Sound * No fixed position * No line of site required * Good for visually impaired people * No good in large areas - distortion of sound * Usually language based * May not know the sound * Need to be able to hear Moving pictures * Lots of information conveyed * Not language dependent * Can exemplify text * Linear - if you do not see the beginning you may not understand * Problems if sound LED * Can allow data to be kept secure * Can be used in noisy places * Similar to graphics * Need to be able to see the lights * Combinations of lights may need to be known to be understood d) Information is processed data with a meaning, structure and context. Knowledge is the application of that information to a situation. e) Data type Description Boolean * Can contain one of only two values, e.g. male/female, true/false Real * Contains numbers which will have decimal places Integer * Contains whole numbers with no decimal places Text/string * Any alphanumeric character, including numbers, text and symbols, e.g. ...read more.

Middle

Mathematical modelling: - based on a layout of rows and columns (spreadsheet) assisting in a logical format - replication of a cell horizontally/vertically (including formulae, with cell references being updated automatically) - can be based on functions and formulae (allowing variables to be edited and for automatic recalculation of any cell based on those variables) - "What if...?" questions can be asked (changing variables); goal seek can also be used - cells and ranges can be given specific names to reference (e.g. VAT_RATE for the cell containing the rate of VAT) - use of multiple different worksheets in the spreadsheet - use of graphs and graphical representation of data Modelling is used because: - it is less risky (safer and cheaper) to test a model of a design than to create it in reality and test it - only one model needs to be created on a computer; a real model would need to be recreated every time a different variable was changed - costing time and money - models can be backed up and shared - models can be sped up/slowed down to see effects in the short run/long run (not possible in reality) b) A model can recalculate values when numbers change, predict what will happen as an effect, and test different scenarios. There are four features involved in this. Variables: a variable is an identifier associated with a particular cell - within the cell, there will be a value Formulae: a formula is a calculation which uses numbers, addresses of cells and mathematical operators Rules: rules are a set of procedures that must be followed and can also be the sequence of events required for the calculation to work Functions: a function represents a complex formula that uses reserved words c) "What if...?" questions are an attempt to find out what will happen in the future. They require a value to be changed so that other values can be re-calculated. ...read more.

Conclusion

seen as a breach of trust - Many people like to 'cling on' to their privacy - Concerns about what controls there are on organisations who monitor communications The Electronic Communications Act (2000) The Electronic Communications Act: - government wanted 'to make the UK the best place in the world for e-commerce' and to 'create a legal framework so that people can be sure about the origin and integrity of communications' The Electronic Communications Act has two make parts: 1. Cryptography service providers - this allows the government to set up a register of approved cryptography suppliers 2. Facilitation of electronic commerce, data storage - this recognises digital signatures, which are now admissible in law Benefits of Electronic Communications Act Problems with Electronic Communications Act - contracts signed over the Internet have the same legality as those signed by hand (increasing security of e-commerce and ensures legal backing for contracts) - lots of legislation against digital signatures, so there's now legislation to remove laws preventing digital signatures, but this takes time - always a security risk The Freedom of Information Act (2000) The Freedom of Information Act: - deals with access to information on any topic from any public authority (including government, the health service, schools and police) - allows anyone to make a request, giving their name, address and a description of what they want Benefits of Freedom of Information Act Problems with Freedom of Information Act - information that wasn't accessible to the general public is now available - increased accountability (public authority cannot hide decisions they make) - any information can be requested, however it may be withheld to protect various interests/may come under an exception - public authority doesn't have to confirm or deny the existence of the information that you have requested - doesn't have to provide information if an exemption applies, if the request is too vague, if it's similar to a previous request, or if the cost of collating and producing the information exceeds an appropriate limit ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    Lastly, backing-up all of the data with photocopies is just plain wasteful of paper and ink. In a computerised system, back-ups would be stored electronically on a memory stick, USB pen or on a separate computer at the manager's home.

  2. Marked by a teacher

    Evaluation. In this unit of controlled assessment I have developed a website using multimedia ...

    The sound sets the mood of the website thus also makes it seem rather appealing. Moreover, I ensured that I used suitable file extensions of my files as well as optimisation. This is so that my website would be able to be displayed on the web without taking a long time to download.

  1. transmission of care values

    When communication is taking place, a service user may find it difficult to express their needs if they are uncomfortable speaking with other people about. This lack of privacy would be a barrier to effective communication (Moonie, 2005). Cultural and Race Factors "Most general, the term culture denotes whole product of an individual, group or society of intelligent beings.

  2. Threats to Data

    This not only reduces the number of opportunities for someone to use the data illegally but reduces the number of suspects should the worse happen. It makes sense therefore to restrict the access to the machines holding the data to those people who need it to do their jobs.

  1. System Analysis and Design Assignment

    He or she may then wish to reserve that book, so that when it is returned he or she can borrow it for themselves. The process for reserving a book involves the learning centre staff taking a note of the member's name, the details of the book, and writing this on a Post-It note.

  2. A2 ICT CouseWork

    But the client requirements are very important, as there act as guidelines for me and have to be followed extensively and have to be met when finished creating the website, or the client may not pay for the website. But to test my client requirements I would have to firstly analyse each individual point e.g.

  1. Communication & Employability Skills for IT. OCR Cambridge Technicals Unit 1 LO1-P1

    In summary the Computer Misuse Act prevents hackers and people from accessing data and gaining access to computer without permission, this could also include stealing, changing or causing damage to data and computers. The Act protects companies because it stops hackers from gaining unauthorised access to computers.

  2. Discuss the Causes and Effects of the Digital Divide

    have to use dial up connections to go on the internet which means that its not that they cant afford fast internet but the area they live in is acting like a barrier and stopping them from viewing fast multimedia, therefore its not how rich a person is it could

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work