• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

information systems assignment 2

Extracts from this document...


Legislation Data Protection Act The Data Protection Act gives individuals the right to know what information is held about them. It provides a framework to ensure that personal information is handled properly. The Act works in two ways. Firstly, it states that anyone who processes personal information must comply with eight principles, which make sure that personal information is: * Fairly and lawfully processed * Processed for limited purposes * Adequate, relevant and not excessive * Accurate and up to date * Not kept for longer than is necessary * Processed in line with your rights * Secure * Not transferred to other countries without adequate protection The second area covered by the Act provides individuals with important rights, including the right to find out what personal information is held on computer and most paper records. Should an individual or organisation feel they're being denied access to personal information they're entitled to, or feel their information has not been handled according to the eight principles, they can contact the Information Commissioner's Office for help. Complaints are usually dealt with informally, but if this isn't possible, enforcement action can be taken. The Data Protection Act (DPA) is a United Kingdom Act of Parliament. It defines a legal basis for handling in the United Kingdom of information relating to people living within. It is the main/only piece of legislation that governs protection of personal data in the UK. Although the Act does not mention privacy, in practice it provides a way in which individuals can enforce the control of information about themselves. Most of the Act does not apply to domestic use, for example keeping a personal address book. Organisations in the UK are legally obliged to comply with this Act, subject to some exemptions. Compliance with the Act is enforced by an independent government authority, the Information Commissioner's Office (ICO). The ICO maintains guidance relating to the Act. ...read more.


There are many different types of databases available for use; the three most common ones are, * Flat file database * Relational database * Hierarchical database I will now explain each database listing the advantages and disadvantages of each. Flat File Databases A Flat File Database is a text file commonly only containing a record for each line in the file. This sort of database would be used for a simple phonebook sort database, showing peoples names with there telephone numbers and possibly addresses. This could also be used to keep track of friends. An example of a flat file database is a personal phonebook storing names and telephone numbers Advantages The advantages of a flat file database are, * It is a very simple database which is easy to use and understand, very little training will be needed to create and use one of these. * Easy to understand. * These are cheap to both create and to run as they are usually just simple text files. * Uses a small number of resources Relational databases A relational database is a database which conforms to a relational model and refers to the data and the structure of how it is arranged. A relational database is a selection of tables of fields related by relationships. For example, a data set containing all the real estate transactions in a town can be grouped by the year the transaction occurred; or it can be grouped by the sale price of the transaction; or it can be grouped by the buyer's last name; and so on. Advantages The advantages of a relational database are, * This database will use relationships to link different fields in the tables and this will make things easier to understand due to the layout of the information. * Security features, passwords can be used and fields are then locked after being used meaning other users can not change data entered. ...read more.


This can also help the supermarket see when certain products are bought by customers. For example in the summer more sunglasses and sun cream are bought, this means the supermarket should buy more of these in the summer to increase profits and buy less in winter as they are not on demand as much and the supermarket will loose money. The sale of beer is a good example, the supermarket will know more alcohol is sold on special occasions such as Easter, Christmas, new year. So the supermarket should purchase more alcohol and maybe have special offers, this will increase profits. Predictive Modelling Predictive modelling Is the process of a model being created or simply chosen. This model tries to predict the probability of an outcome of certain areas as best it can. In many cases the model is chosen on the basis of detection theory to try to guess the probability of a signal given a set amount of input data, for example given an email determining how likely that it is spam. Predictive modeling can involve figuring out and predicting certain information and relationships within data. this can be used to predict which customer would buy which products from the store, and why. Predictive modelling is used a lot to analyse customer relationship management ant with data mining. This produces models for the customer level, this describes the likelihood of customers taking particular actions. The actions are usually sales, marketing and customer related. Predictive modeling can help the supermarkets detect and protect themselves against the supermarket. How many sales have been recorded and the area they have been take is a good example of how the supermarket can develop based on the custom If the supermarket would like to increase their profits predictive modeling should be used to increase the accuracy of the pricing and the sales of stock. ?? ?? ?? ?? National Diploma for IT Practitioners Unit: 3 - Information Systems Assignment: 2 Candidate Number: Z051677 Centre Number: 47303 Name: Neil Gibson Page: 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a star student thought of this essay

4 star(s)

Response to the question

Given the headers, it is evident that this report focuses mainly on IT legislation and ethics, the student provides a detailed analysis of existing laws and what they cover. Key acts of legislation are defined along with an outline of ...

Read full review

Response to the question

Given the headers, it is evident that this report focuses mainly on IT legislation and ethics, the student provides a detailed analysis of existing laws and what they cover. Key acts of legislation are defined along with an outline of common office applications and systems that are primarily used to store and retrieve information.

The student has essentially responded to each section in great detail.

Level of analysis

The writer demonstrates an outstanding level of analytical skills for this level of qualification and has made evaluative judgements as evidenced by the IT legislation discussed. However, the writer should have included references for further reading and to confirm examples and findings in the report.

The report lacks a main conclusion or summary which would have been helpful given the length and number of sections contained within. The report also lacks an introduction explaining what is to be discussed and outlined. Again, this would have been helpful due to the broad range of topics.

Quality of writing

The report does not include a table of contents, which given the length, makes it difficult to navigate the document – particularly so if the reader wishes to only view certain topics. The report does however include page numbers which is helpful when referencing different sections and the writer has indeed surpassed the technical terms expected at this level of qualification.

Minor grammatical errors are present in certain parts of the document.

Did you find this review helpful? Join our team of reviewers and help other students learn

Reviewed by finalfantasy 01/03/2012

Read less
Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    Designing a data system for a vintage clothes business.

    3 star(s)

    Define the current system The current system to manage all the data is a manual system of which involves writing the buyer and design data on multiple forms, and storing the forms in folders which contain all the other data - this includes the price of the products.

  2. Marked by a teacher

    Case Study. LEGAL ISSUES-: Data Protection Act. Whiteman Leisure must ensure that the information ...

    WLC can achieve this by filtering specific sites which can cause harm to a system, or enable a keystroke logging, (tracks any information that is entered into the system) and many more which I will list below; Use of E-Mail-: E-mail has become a necessity to virtually every human being

  1. Peer reviewed

    Equipment needed for a Graphic PC

    4 star(s)

    Hard drive The industry standard for hard drives is 500GB. The more memory on the hard drive the more data it can store.

  2. Hardware and software ICT revision notes

    DOS was difficult to work with because commands had to be entered in an exact way and there were a lot of different codes for the ordinary everyday user to remember. Windows was first introduced in 1985 and is now the most popular PC operating system.

  1. Data Representation

    the equivalent number is '75BCD15' is 7 characters long. Hex is used for a many different things, such as memory addresses, and colours (hex values of them) also URL encoding. The reason hex is used instead of decimal is the value which can be stored in a number of characters in hex is much greater than that of decimal.

  2. Review of the article "Supply Chain Analysis at Volkswagen of America".

    So, the system would increase first-choice sales, be timely, and reduce inventory costs. However, Volkswagen had no effective way to test this system for feasibility. The team of the study was concerned about integrating such a system with the existing seaport-based distribution centers.

  1. BTEC National in IT Organisational systems security - Policies and guidelines for IT security ...

    how your company operates based on the information provided in the risk assessment. Or you can be proactive, by updating security policies and procedures reflecting the potential risks outlined in the risk assessment and reducing the chance of these risk coming into effect.

  2. Growth and Influence of Computers and Computing

    This means that it will be almost impossible to get a well paid job if you do not have any qualifications based around computers. But with fridges that can order milk, iPods that can buy cars and phones that talk to you and recognise your face, what else could the future possibly hold for the computing industry?

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work