- Join over 1.2 million students every month
- Accelerate your learning by 29%
- Unlimited access from just £6.99 per month
AS and A Level: Information Systems and Communication
Meet our team of inspirational teachers
- Marked by Teachers essays 15
- Peer Reviewed essays 25
But, this information needs to be secure so I also adopted security and confidentiality procedures to ensure that the data is kept safe. SharePoint requires a password in order to gain access to the data and I had to sign a confidentiality contract to ensure I didn?t pass any of the information to other people outside the business. I also was advised by my team to always lock my computer when I left it and to not leave papers on desks that someone could easily read and see confidential information.
- Word count: 978
I will also need to select the most appropriate location for the application to be installed as this could be the main hard drive or an external one. Lastly, I will define a suitable procedure for the installation. This will involve checking contents, performing virus scans, backing up data or configuring the software. Also I will consider timing. Installations or upgrades perform at different rates depending on the time that I complete them. I will complete the installation in the evening because it will run faster and more efficiently due to no traffic on the servers.
- Word count: 766
Not only that but thanks to Skype you can now have in-app integration, instant messaging, screen share, talk or video chat right in your docs. This is great for an IT company to ensure that all staff are working together as a team on different tasks, encouraging communication amongst the company. There are other skype benefits. There is now HD Video and co-authoring, Office 365 Groups that are now available as part of Outlook and on iOS, Android, and Windows and the ability to set of Office mobile apps across Windows, Android, and iOS. Additionally, there are benefits to Outlook.
- Word count: 780
You will also need to select the most appropriate location for the application to be installed as this could be the main hard drive or an external one. Lastly, you need to define a suitable procedure for the installation. It will usually involve checking contents, performing virus scans, backing up data or configuring the software. Also timing is an important thing to consider. Installations or upgrades perform at different rates depending on the time that you complete them. If you doing it during the day, it will take a long time because there is high demand at this time.
- Word count: 905
There are other licences you can get, OEM (Original equipment manufacturer) license which is for software that is purchased by a hardware supplier and comes with your computer system. Also there is a site license which is unrestricted license that allows you to install the software as many times within your organisation as you need to. Open source license is a license that not only gives you access to the software but also lets you view, modify and share changes to the source.
- Word count: 513
Describe the potential risks of installing or upgrading software and evaluate the risks involved in the installation or upgrade of software and explain how the risks could be minimised.
They have asked me to look at their current computer systems and advise on any new software installations or upgrades that may have been necessary. In this report I will describe the potential risks when downloading or updating software. When installing and upgrading software it?s important to be aware of the risks involved. It?s important to plan how the changes will affect the computer before you start so that you are prepared if the worst should happen.
- Word count: 515
There are many different reasons for why you would want to prompt an install or upgrade software. Perhaps it was because a bug was identified or upgrading would make the device run faster and more efficiently. It?s important to be aware of the prompts so that you can act on them quickly as they could be vital such as the security of the device. The first reason for upgrading or installation of software is problems with the existing system.
- Word count: 505
Many banks are the target of phishing. Banks such as Santander, HSBC and NatWest. Customers of their banks will receive an email claiming to be from their bank saying there is a problem and they need personal private information in order to fix it like bank account details and pin numbers; if successful they can steal lots of money from people?s accounts. Identity theft is a fraudulent practice of using somebody else?s name and personal information in order to obtain credit. Hypertext Transfer protocol is the data transfer protocol used on the World Wide Web which can help prevent identity theft.
- Word count: 777
Example: Procedural programs give the computer a series of instructions for example for a calculator program. Then carry out the task and calculations according to what the user specifies. Modular Design breaks down complex procedures into simple steps which can be turned into computer code much more easily. You can fit modules together very well so the interfaces are very important. For example, what data is passed into modules (parameters) and what data is passed out (return values). There are many advantages to modular programming. Firstly, modular programming is good because you can work on each module independently which means it?s easier as you are working on a small part.
- Word count: 695
Functions Functions are similar to procedures but return using a value. Functions are a named section of a program that performs a specific task. A function is a type of procedure or routine. Some programming languages make a distinction between a function, which returns a value, and a procedure, which performs some operation but does not return a value. Most programming languages come with a prewritten set of functions that are kept in a library. You can also write your own functions to perform specialized tasks. Pre-defined functions A pre-defined function is sequence of instructions that are identified by name in a computer program but is built in high level programming language.
- Word count: 550
This is because Amazon sell products from different suppliers but do not sell their own brand of products. Manufacturers Manufacturers create and sell their own products online. They do not allow other retailers to sell their products nor sell in traditional shops. They can provide lower costs or special offers to customers because they do not need to pay for retail rentals and overhead for a traditional shop. Dell is an example of a manufacturer because they make the computers and dell them online, not through shops like PC World. Existing Retailers Existing retailers are businesses who were originally a traditional shop (bricks)
- Word count: 505
You will be able to find a frequently asked questions on a newsgroup, which is helpful for those who are not sure of anything. It is not a quick as some other methods like direct marketing. Information submitted may be submitted by people who do not know what they are talking about. I recommend that Sharron doesn?t make use of forums or newsgroups because there are better methods out there. Newsgroups and Forums are not quick and effective compared to other promotional methods like Direct Marketing or Search Engines.
- Word count: 995
To prevent hacking from occurring, specialist software can be used to look at the ports of the computer and to identify what ones are open as this is the way hackers can enter. Therefore the best way to stop hacking is to make sure all unused ports are closed by a firewall. A firewall is a network security system that acts as a barrier to protect the system from unauthorised access. Viruses are another key risk in e-commerce. A virus is a piece of code which is capable of corrupting the system or destroying data.
- Word count: 827
E-commerce has everything online and customers may see this as a disadvantage because they might prefer human contact which you cannot have when shopping online. Customers who live in far distances the company may find it hard to deliver the products to them. Also you need to wait for the item which you do not have to do when buying in a traditional store.
- Word count: 531
A disadvantage of using electronic cheques means there is not ?float? time. This is the time before the money is debited. Money is instant through electronic cheques which means the customer doesn?t have any time to get funds in their bank account. Due to insufficient funds in an account e-cheques are usually ?bounced?. This causes delays in payment which then delays the time the product is provided by the business. As computers process the electronic cheques. Hackers can gain access to your banking information. Some fraudulent businesses also offer electronic banking which also means they can gain baking information.
- Word count: 599
There is also high protection. Card payments provide a guard against counterfeit money. Similarly, payments by card reduce the amount of cash on the premise. There is higher average sales amounts. Credit card payments enable card holders to make purchases and pay for them at a later date which often leads to higher total spending at the point of sale. Similarly, accepting card payments will encourage impulse shopping in customers as the purchase amount is no longer limited by the amount of cash they have. Adding on to impulse shopping is that card holders often benefit from various incentive programs offered by the card issuers encouraging frequent usage of the card which can in turn into impulse buying.
- Word count: 912
Illustrate the information flow between different functional areas and explain the issues related to the use of information
They may have campaigns to get the businesses products well known or rebrand the business. Finance ? Finance are involved with money and future plans. They will prepare accounts like invoices, management accounts, and financial accounts for shareholders. They will also prepare wages and salaries for the employees and obtain capital and resources such as money for expansion or to pay for resources such as equipment and materials. They will also create budgets for every other department. Personnel ? Personnel is the part of an organization concerned with the appointment, training, and welfare of employees.
- Word count: 732
? Management information systems is the decision support of the business and will be used by management. The features of MIS include an input of queries and a response is then determined and is used to ask the same questions continually. The key elements are, data, people, hardware, software and telecommunications. The data in MIS must be stored in a logical way and is stored different to the input. It also needs to be summarised in order to create useful information and must be accurate. The people must be able to obtain the data and extract the information; it?s also important for the people to realise the importance of the data to the business.
- Word count: 643
Generate valid, accurate and useful information and justify the information selected to support a business decision-making process.
However, the information I got was only for the average annual income for the UK only. It would have been more reliable if I had data from more areas of the world to make my findings more detailed and reliable. In addition, the ages were only specific and therefore having wider data would also allow to have more in depth rich detail to make my findings more specific. It?s also vital for information to be relevant. Relevant information is information that is specifically related to your business needs.
- Word count: 596
They will use EPOS which stands for electronic point of sale; it is an automated till system used in many shops and restaurants. Tesco will use tills to monitor how many products are sold and if they need restock or reorder more items. When monitoring and controlling its activities Tesco can make immediate use of information from its operational support systems. When a customer purchases an item the EPOS system will track this and the data will be stored and keeps track of how much stock should now be in their store.
- Word count: 566
Describe the features and functions of information systems and explain how an organisation could improve the quality of its business information
Processing - Processing is the method that turns data into information. There is simple and complex processing. Simple processing is adding all the items sold by a supermarket and producing totals. Complex processing is a computer program that does complex calculations and makes assumptions about missing data. Output ? outputs can be in two formats, graphical and textual. A graphical output is used for seeing the bigger picture, usually presented as charts, diagrams or pictures. Textual is used when data needs to be analysed in detail; it?s often presented in text and numbers.
- Word count: 558
A bank must back up files every week in case of a disaster. This is because millions of people around the world will rely on the bank for the access of their money. The backup file should be away from the original system so if there is a disaster both do not get destroyed. Health and safety There are health and safety issues regarding information systems. The screens, monitors and the way they are positioned all have strict regulations. Keyboards, mice, chairs and the desk must be positioned in a suitable and comfortable position for employees.
- Word count: 924
Data Management Data management allows you to keep track of all the data stored on the computer or other storage devices. The application programs deals with the data by file name and location. The operating system?s file system knows where the data is stored and interacts with the application program. When data needs to be retrieved or saved, the application system cooperates with the operating system which opens, reads, writes and closes files. User interface Interface is commands which a user sets when communicating with the computer.
- Word count: 828
(e.g. improved confidence, actually being able to apply the skill) Target Date Review dates and final target date for meeting needs Progress Review / Key Learning Points Consider the best methods to suit your preferred learning style Log all progress. Comment on key points To develop my Excel knowledge on formulas and other skills within the program such as pivot tables. I need to work on this area because when completing spreadsheets in the past, it has been difficult because I am not aware of all the formulas and skills to make it easy to create a database.
- Word count: 512
Therefore, due to these issues it became more difficult to communicate effectively. Background Noise Background noise in the workplace became a large barrier of effective communication at BP. We had meetings in the break area which meant that people were talking all around us. Although the meetings were informal it was still difficult to communicate to each other. Loud background noise can cause people to not be heard and would then have to shout to be able for them to hear which an unprofessional way to communicate in the workplace is.
- Word count: 712