• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

AS and A Level: Information Systems and Communication

Browse by

Currently browsing by:

Rating:
4 star+ (6)
3 star+ (17)
Submitted within:
last month (27)
last 3 months (27)
last 6 months (27)
last 12 months (27)

Meet our team of inspirational teachers

find out about the team

Get help from 80+ teachers and hundreds of thousands of student written documents

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  1. Explain the importance of the user acceptance process for software

    There are other licences you can get, OEM (Original equipment manufacturer) license which is for software that is purchased by a hardware supplier and comes with your computer system. Also there is a site license which is unrestricted license that allows you to install the software as many times within your organisation as you need to. Open source license is a license that not only gives you access to the software but also lets you view, modify and share changes to the source.

    • Word count: 513
  2. Describe the potential risks of installing or upgrading software and evaluate the risks involved in the installation or upgrade of software and explain how the risks could be minimised.

    They have asked me to look at their current computer systems and advise on any new software installations or upgrades that may have been necessary. In this report I will describe the potential risks when downloading or updating software. When installing and upgrading software it?s important to be aware of the risks involved. It?s important to plan how the changes will affect the computer before you start so that you are prepared if the worst should happen.

    • Word count: 515
  3. Describe the potential prompts that initiate the installation of new or upgraded software

    There are many different reasons for why you would want to prompt an install or upgrade software. Perhaps it was because a bug was identified or upgrading would make the device run faster and more efficiently. It?s important to be aware of the prompts so that you can act on them quickly as they could be vital such as the security of the device. The first reason for upgrading or installation of software is problems with the existing system.

    • Word count: 505
  4. Explain the security risks and protection mechanisms involved in website performance.

    Many banks are the target of phishing. Banks such as Santander, HSBC and NatWest. Customers of their banks will receive an email claiming to be from their bank saying there is a problem and they need personal private information in order to fix it like bank account details and pin numbers; if successful they can steal lots of money from people?s accounts. Identity theft is a fraudulent practice of using somebody else?s name and personal information in order to obtain credit. Hypertext Transfer protocol is the data transfer protocol used on the World Wide Web which can help prevent identity theft.

    • Word count: 777
  5. Explain why modular elements are important for procedural programming

    Example: Procedural programs give the computer a series of instructions for example for a calculator program. Then carry out the task and calculations according to what the user specifies. Modular Design breaks down complex procedures into simple steps which can be turned into computer code much more easily. You can fit modules together very well so the interfaces are very important. For example, what data is passed into modules (parameters) and what data is passed out (return values). There are many advantages to modular programming. Firstly, modular programming is good because you can work on each module independently which means it?s easier as you are working on a small part.

    • Word count: 695
  6. Explain the key features of procedural programs

    Functions Functions are similar to procedures but return using a value. Functions are a named section of a program that performs a specific task. A function is a type of procedure or routine. Some programming languages make a distinction between a function, which returns a value, and a procedure, which performs some operation but does not return a value. Most programming languages come with a prewritten set of functions that are kept in a library. You can also write your own functions to perform specialized tasks. Pre-defined functions A pre-defined function is sequence of instructions that are identified by name in a computer program but is built in high level programming language.

    • Word count: 550
  7. Types of E-commerce

    This is because Amazon sell products from different suppliers but do not sell their own brand of products. Manufacturers Manufacturers create and sell their own products online. They do not allow other retailers to sell their products nor sell in traditional shops. They can provide lower costs or special offers to customers because they do not need to pay for retail rentals and overhead for a traditional shop. Dell is an example of a manufacturer because they make the computers and dell them online, not through shops like PC World. Existing Retailers Existing retailers are businesses who were originally a traditional shop (bricks)

    • Word count: 505
  8. Recommend methods to promote an e-commerce system for a local business.

    You will be able to find a frequently asked questions on a newsgroup, which is helpful for those who are not sure of anything. It is not a quick as some other methods like direct marketing. Information submitted may be submitted by people who do not know what they are talking about. I recommend that Sharron doesn?t make use of forums or newsgroups because there are better methods out there. Newsgroups and Forums are not quick and effective compared to other promotional methods like Direct Marketing or Search Engines.

    • Word count: 995
  9. Explain the potential risks to an organisation of committing to an e-commerce system

    To prevent hacking from occurring, specialist software can be used to look at the ports of the computer and to identify what ones are open as this is the way hackers can enter. Therefore the best way to stop hacking is to make sure all unused ports are closed by a firewall. A firewall is a network security system that acts as a barrier to protect the system from unauthorised access. Viruses are another key risk in e-commerce. A virus is a piece of code which is capable of corrupting the system or destroying data.

    • Word count: 827
  10. Explain the drawbacks of introducing an e-commerce system to an organisation

    E-commerce has everything online and customers may see this as a disadvantage because they might prefer human contact which you cannot have when shopping online. Customers who live in far distances the company may find it hard to deliver the products to them. Also you need to wait for the item which you do not have to do when buying in a traditional store.

    • Word count: 531
  11. Compare Electronic Cheques and Digital Payment services payment systems used by e-commerce systems.

    A disadvantage of using electronic cheques means there is not ?float? time. This is the time before the money is debited. Money is instant through electronic cheques which means the customer doesn?t have any time to get funds in their bank account. Due to insufficient funds in an account e-cheques are usually ?bounced?. This causes delays in payment which then delays the time the product is provided by the business. As computers process the electronic cheques. Hackers can gain access to your banking information. Some fraudulent businesses also offer electronic banking which also means they can gain baking information.

    • Word count: 599
  12. Compare different payment systems used by e-commerce systems.

    There is also high protection. Card payments provide a guard against counterfeit money. Similarly, payments by card reduce the amount of cash on the premise. There is higher average sales amounts. Credit card payments enable card holders to make purchases and pay for them at a later date which often leads to higher total spending at the point of sale. Similarly, accepting card payments will encourage impulse shopping in customers as the purchase amount is no longer limited by the amount of cash they have. Adding on to impulse shopping is that card holders often benefit from various incentive programs offered by the card issuers encouraging frequent usage of the card which can in turn into impulse buying.

    • Word count: 912
  13. Illustrate the information flow between different functional areas and explain the issues related to the use of information

    They may have campaigns to get the businesses products well known or rebrand the business. Finance ? Finance are involved with money and future plans. They will prepare accounts like invoices, management accounts, and financial accounts for shareholders. They will also prepare wages and salaries for the employees and obtain capital and resources such as money for expansion or to pay for resources such as equipment and materials. They will also create budgets for every other department. Personnel ? Personnel is the part of an organization concerned with the appointment, training, and welfare of employees.

    • Word count: 732
  14. Identify the information systems used in a specified organisation

    ? Management information systems is the decision support of the business and will be used by management. The features of MIS include an input of queries and a response is then determined and is used to ask the same questions continually. The key elements are, data, people, hardware, software and telecommunications. The data in MIS must be stored in a logical way and is stored different to the input. It also needs to be summarised in order to create useful information and must be accurate. The people must be able to obtain the data and extract the information; it?s also important for the people to realise the importance of the data to the business.

    • Word count: 643
  15. Generate valid, accurate and useful information and justify the information selected to support a business decision-making process.

    However, the information I got was only for the average annual income for the UK only. It would have been more reliable if I had data from more areas of the world to make my findings more detailed and reliable. In addition, the ages were only specific and therefore having wider data would also allow to have more in depth rich detail to make my findings more specific. It?s also vital for information to be relevant. Relevant information is information that is specifically related to your business needs.

    • Word count: 596
  16. Explain how Tescos use information

    They will use EPOS which stands for electronic point of sale; it is an automated till system used in many shops and restaurants. Tesco will use tills to monitor how many products are sold and if they need restock or reorder more items. When monitoring and controlling its activities Tesco can make immediate use of information from its operational support systems. When a customer purchases an item the EPOS system will track this and the data will be stored and keeps track of how much stock should now be in their store.

    • Word count: 566
  17. Describe the features and functions of information systems and explain how an organisation could improve the quality of its business information

    Processing - Processing is the method that turns data into information. There is simple and complex processing. Simple processing is adding all the items sold by a supermarket and producing totals. Complex processing is a computer program that does complex calculations and makes assumptions about missing data. Output ? outputs can be in two formats, graphical and textual. A graphical output is used for seeing the bigger picture, usually presented as charts, diagrams or pictures. Textual is used when data needs to be analysed in detail; it?s often presented in text and numbers.

    • Word count: 558
  18. Assess how issues related to the use of information affect an organisation

    A bank must back up files every week in case of a disaster. This is because millions of people around the world will rely on the bank for the access of their money. The backup file should be away from the original system so if there is a disaster both do not get destroyed. Health and safety There are health and safety issues regarding information systems. The screens, monitors and the way they are positioned all have strict regulations. Keyboards, mice, chairs and the desk must be positioned in a suitable and comfortable position for employees.

    • Word count: 924
  19. Explain the purpose of operating systems

    Data Management Data management allows you to keep track of all the data stored on the computer or other storage devices. The application programs deals with the data by file name and location. The operating system?s file system knows where the data is stored and interacts with the application program. When data needs to be retrieved or saved, the application system cooperates with the operating system which opens, reads, writes and closes files. User interface Interface is commands which a user sets when communicating with the computer.

    • Word count: 828
  20. Produce a Personal Development Plan

    (e.g. improved confidence, actually being able to apply the skill) Target Date Review dates and final target date for meeting needs Progress Review / Key Learning Points Consider the best methods to suit your preferred learning style Log all progress. Comment on key points To develop my Excel knowledge on formulas and other skills within the program such as pivot tables. I need to work on this area because when completing spreadsheets in the past, it has been difficult because I am not aware of all the formulas and skills to make it easy to create a database.

    • Word count: 512
  21. Discuss potential barriers to effective communication in the workplace.

    Therefore, due to these issues it became more difficult to communicate effectively. Background Noise Background noise in the workplace became a large barrier of effective communication at BP. We had meetings in the break area which meant that people were talking all around us. Although the meetings were informal it was still difficult to communicate to each other. Loud background noise can cause people to not be heard and would then have to shout to be able for them to hear which an unprofessional way to communicate in the workplace is.

    • Word count: 712
  22. Explain the principles of effective communication in the workplace.

    When answering questions even when not sure about the answer it?s important to speak confidently as if you know exactly what to say, if you do it will seem that you know extensive knowledge about the subject. During my internship I had to do presentations and after questions were asked. I made sure I was comfortable with the topic I chose so that when I was asked questions Engaging the audience It?s important to keep your audience interested throughout a presentation.

    • Word count: 513
  23. Explain the personal attributes valued by employers of IT personnel.

    This allowed me to complete more work in the time frame I was given which was very useful to my team. Independence Independence is also a very important soft skill to have in the workplace. Employees will be expected to complete tasks on their own without any help from others. Employees need to think for themselves and not rely on other people to tell them what they have to do next. At BP I showed independence by making meetings with people I needed specific information rather than waiting for someone to come to me.

    • Word count: 692
  24. Selecting Hardware For A User With Special Needs

    Because it is All-in-one PC therefore it doesn?t need monitor so it will take less space in the work station therefore Damian can able to organise his work station much quicker and better. It also including keyboard and mouse, it gives the user the full set of the computer that they need for the business. The mouse is two handed mouse therefore it suitable for Damian to control the computer also the computer is touch screen therefore he can be able to user the computer must better than with mouse.

    • Word count: 757
  25. Popularity of Social networking sites: The reasons and how to exploit for good purposes

    Sometime, peer pressure can act in this case. The trend of being ?cool? if one has a latest gadget or use more technology compared to others will mean that the less technologically dependant person will gradually yield to the mental pressure and slowly, everyone will be using that gadget or technology in few days. What are the good outcomes of this tech culture? How can we use this trend to the benefit of the society? First advantage is education. With the global popularity of micro blogging and social media site Twitter, it can mean that the ?Conversation? feature can be used after class among students as well as teachers to instruct, guide, discuss and inform.

    • Word count: 999

Marked by a teacher

This document has been marked by one of our great teachers. You can read the full teachers notes when you download the document.

Peer reviewed

This document has been reviewed by one of our specialist student essay reviewing squad. Read the full review on the document page.

Peer reviewed

This document has been reviewed by one of our specialist student document reviewing squad. Read the full review under the document preview on this page.