information systems assignment 2

Legislation Data Protection Act The Data Protection Act gives individuals the right to know what information is held about them. It provides a framework to ensure that personal information is handled properly. The Act works in two ways. Firstly, it states that anyone who processes personal information must comply with eight principles, which make sure that personal information is: * Fairly and lawfully processed * Processed for limited purposes * Adequate, relevant and not excessive * Accurate and up to date * Not kept for longer than is necessary * Processed in line with your rights * Secure * Not transferred to other countries without adequate protection The second area covered by the Act provides individuals with important rights, including the right to find out what personal information is held on computer and most paper records. Should an individual or organisation feel they're being denied access to personal information they're entitled to, or feel their information has not been handled according to the eight principles, they can contact the Information Commissioner's Office for help. Complaints are usually dealt with informally, but if this isn't possible, enforcement action can be taken. The Data Protection Act (DPA) is a United Kingdom Act of Parliament. It defines a legal basis for handling in the United Kingdom of information relating to people

  • Ranking:
  • Word count: 4456
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay

Equipment needed for a Graphic PC

Let's Help Jakub List . R.A.M Random Access Memory (RAM) is a form of computer data storage. The industry standard is around 4GB. RAM is important for graphic computers because if you have a low RAM it will not be able to cope with high resolution pictures and so you need more RAM. 2. HD Monitor A HD monitor has a high resolution, 1920 x 1080 pixels. It is important to graphic design because on a normal monitor you would not be able to see the picture properly. With a HD monitor the picture would be more clear and easy to see. 3. Graphic Card A Graphic card is an expansion card which generates output images to a display. The graphic card is responsible for generating all the text and pictures that are displayed on your screen. It is important to have a good Graphic card because so it can display high resolution images. A really good graphics card is easy to spot. It has lots of memory and a fast processor. 4. Processor The processor acts like the brain of the computer. It carries out the instructions of a computer program and it also performs the input/output operations of an operating system. You need a good processor for a graphics PC because it can process the images faster. 5. Hard drive The hard drive is needed to store images on the computer. A graphics PC needs a relatively big hard drive to store all the images. You would need at least 500 GB. 6.

  • Ranking:
  • Word count: 1832
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay

An introduction to Identity Theft

An Introduction to IDENTITY THEFT Created By Ruth Sutton P06003790 INDEX Introduction Page 3 What is Identity Theft? 4 Prevalence and Statistics 5 The Criminal, Your Personal Information, Methodology & Tools 7 Card Skimming 7 Bin Raiding 7 Useful Documents 8 Shoulder Surfing 8 Spoof Means 8 Advance Fee & 419 Fraud 9 Corporate Identity Theft 10 Corporate Scams 10 Telesales Scam 10 Bogus Invoice Scam 10 Network Invasion 11 Affects on the Victim 12 Preventative Measures 13 The Victims Recovery 14 Conclusion 15 Bibliography 16 INTRODUCTION The purpose of this document is to explore and explain "Identity Theft", it will document some of the available statistics. It will report the sources of information, methodology and tools used by the criminal to carry out the offence, the affects on the victim, preventative measures, and finally the steps of recovery for the victims of Identity Theft. What is "Identity Theft" Identity Theft is the use of another persons, living or deceased or a company's (and its directors) personal and private information which is then used for the purposes of; * Assuming another's identity in all aspects

  • Ranking:
  • Word count: 2563
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay

Compilers and Interpreters

Compilers and Interpreters There are two types of translator for converting a high-level language such as Pascal into machine code; compilers and interpreters. These relieve programmers of the tedium and complexity of low-level programming and hence make programming considerably easier and less error prone. Compiler This type of translator takes the whole source code and compiles it into object code. The object code (sometimes called machine code) can then be run. Pascal is an example of a programming language that uses compilation. Interpreter This type of translator takes the source code and translates the first line of the program, and then executes it. It then does the second line, and the third line, until it gets to the end of the code. BASIC, LISP, Prolog and APL are examples of programming languages that uses interpretation. Compilers plus Interpreters. Some programs written in languages such as JAVA are both compiled and interpreted! A program is firstly compiled into an 'intermediate code'. It is then distributed to users who use a wide range of computers such as Mac or PCs. These computers then run their own 'interpreter' to convert the compiled code into a code they can use. Languages such as JAVA are said to be platform-independent, because any program written in that language can run on any machine. These types of languages are ideal for use on the

  • Ranking:
  • Word count: 3673
  • Level: AS and A Level
  • Subject: Computer Science
Access this essay