• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

AS and A Level: Information Systems and Communication

Browse by

Currently browsing by:

4 star+ (6)
3 star+ (10)
Submitted within:
last month (7)
last 3 months (7)
last 6 months (8)
last 12 months (8)

Meet our team of inspirational teachers

find out about the team

Get help from 80+ teachers and hundreds of thousands of student written documents

  • Marked by Teachers essays 15
  • Peer Reviewed essays 25
  1. 1
  2. 2
  3. 3
  4. 4
  5. 7
  1. Marked by a teacher

    E-Commerce Laws and Legislation - The Data Protection Act

    4 star(s)

    6. Processed in accordance with the “data subject’s” (the individual’s) rights. 7. Securely kept. 8. Not transferred to any other country without adequate protection in situ. This has an impact on businesses because they must ensure anyone involved in collecting or accessing personal data is fully aware of the laws and legislations and they must be monitored to ensure the Act is being followed. If the Data Protection Act is breached in any way the Information Commissioner’s Office has the power to issue fines of up to £500,000 to small businesses. For many start-up companies this would be devastating.

    • Word count: 1594
  2. Marked by a teacher

    Compare the effectiveness of different transmission methods.

    so that it gets to the right location with a estimated time and they make sure that nothing goes wrong. Also the electromagnetic waves that the radio sends might be interfaced either the location been too far or a mountain thus inhabiting the radio signal to be sent or received. MICROWAVE: effectiveness of different transmission microwave is a wireless data transmission which enables information or data to travel through it using two methods, method 1 is a famous terrestrial method which uses two microwave transmission towers with a very clear line of sight and with no interfaces like mountains etc.

    • Word count: 1396
  3. Marked by a teacher

    Evaluation. In this unit of controlled assessment I have developed a website using multimedia software. The website provides guidance for new pupils starting secondary school.

    During the completion of the assessment, I ensured that I was constantly saving my files and producing back-up files. I did this by using a USB stick to save my work. It is important to make back-up copies of work, because if a file was to become corrupted or accidentally deleted, the back-up copy would be able to replace this. Description of the suitability and effectiveness of the features analysed At the beginning of the assignment, I analysed two existing websites; which was part of the research I carried out. The website I chose offered a variety of features, as a result I was able to analyse what made a website effective.

    • Word count: 1897
  4. Marked by a teacher

    Social Implications of E-Commerce

    Twenty years ago location was the most important factor for businesses. Shops placed on busy streets had the highest flow of customers and therefore the highest profits. Similarly if there was only one butchers shop in a small town the owner would be guaranteed frequent repeat customers, regardless of price or quality, due to the lack of choice or information available to customers. With the popularisation of online shopping businesses can be extremely successful without ever having a high street presence.

    • Word count: 1976
  5. Peer reviewed

    Risks of Having a Facebook Account. Immediately after the discussion in class regarding Facebook privacy, the first thing I did when I got home from school was to check the limitedness of my Facebook profile to people whom I have no connections with.

    4 star(s)

    I clicked my name and realized that only a larger version of the thumbnail of my current profile picture is further revealed upon clicking my name. I checked some of my friends' profiles and theirs disclosed a few of their friends. This revelation is already quite jeopardous since spammers and people who are up to no good can collect information and also be able to verify assumptions through one's set of friends. Also, the friends who are revealed, especially those who have weak privacy settings, are put in a risk.

    • Word count: 1012
  6. Peer reviewed

    Unit 3 - Impact on Information Availability

    4 star(s)

    All of these websites listed are everyday sites which I use as helpful aids in my life, but I also use the internet for my interests and hobbies. I frequently visit sites such as Skysports to check all the latest football news and fixtures as well as visiting online forums to discuss a variety of issues. Forums allow discussion between select groups of people who share common interests from A-level forums to Golf forums; it is easy to find one relevant to your interests.

    • Word count: 1627
  7. Peer reviewed

    Computer Science Info-Age & Ethics

    4 star(s)

    Forgery (of E-mail) 2. Assault (on your Web site, E-mail box, or computer system) 3. Fraud (cyber scams) and 4. Robbery (theft of valuable information) Various types of people commit computer crimes. The two most familiar being hackers and crackers. A hacker is a person who enjoys exploring the details of a programmable system and how to stretch their capabilities. A cracker is one who breaks security on a system. Although hackers and crackers both break into computer systems, their motives are different. Hackers seem to break into computer systems for the intellectual challenge. Crackers are considered malicious with the intention of harming or causing damage to a computer system.

    • Word count: 1175
  8. Peer reviewed

    Networking Systems. Network Cabling, Network Interface Cards,Network Connectivity

    3 star(s)

    Linux is a classic example of a client-based server. * What is meant by network planning? This is where a network is planned out, where access points and servers are located. It is usually aimed at ensuring that the latest network meets the needs of the subscriber. Task 2 * How does the physical size affect the design? Well obviously the bigger the physical size the bigger the network will need to be. The transmission medium will be affected most by the physical scale.

    • Word count: 1682
  9. Peer reviewed

    e commerce

    3 star(s)

    and look at it in different angles and close up to see the details of the item., when shopping for CDs it is possible to look at the track list, Table of contents etc. shopping online is a useful service for people who don't have time to go out to the shops and walking around, they can browse among a huge choice of goods in their own time. One main disadvantage of shopping online is giving your credit or debit card details on the internet.

    • Word count: 1275
  10. Peer reviewed

    Different types of E-commerce.

    3 star(s)

    Disadvantages of ecommerce for the customers are: * Security concerns with personal and credit card details. * You can't check the quality when purchasing like you could in a shop. * Things might look different online to what you get e.g. slightly different colours. * The shop might not send exactly what you ordered, you might get a substitute. * You need to be at home to receive large or valuable parcels. * If the item doesn't arrive, you might still get charged for it. The advantages of using of ecommerce for the seller are * Powerful tool for building good customer relationships because no questions are usually if you want to return the product and they will send you a new one.

    • Word count: 1369
  11. IT Security Threats to Users and Businesses.

    There is also hacking where people try to access your PC and get information usually when the network traffic is corrupted, and piggybacking can usually be performed when there is a save communication but with that is a harmful virus that will try to attack. Identity theft is where another e-mail could be sent to you e.g. from your bank saying you need to update your details and you will have to click a link to type in your details.

    • Word count: 1950
  12. ICT in Retail and the advantages to the shop and the customer.

    However, if the system/database grows bugs/glitches then it may lead to the wrong prices being outputted. This means that you may be losing money as you're selling goods for much cheaper than originally proposed. Just-in-time stock is where you can re-order stock just before it has all been sold. This is good because it improves cash flow as you don't have order large quantities of stock, and keep it in a store room. You are buying and selling with low risk, for example, you can order 15 new bottles of Coca Cola if there is low demand, however, if there has been a high demand for it recently as it has become hotter, then the company can quickly order 50 more bottles.

    • Word count: 1536
  13. Signal Theory - Communications Technology. Analogue signals are converted to digital using sampling, basically at least two samples are made per cycle, and the more samples the higher quality of the digital output.

    Amplitude Amplitude is the difference between the top peak and the bottom peak on a Sine Wave, the difference is measured in Volts. Wavelength The Wavelength is the length of a cycle; this is usually measured in mm, �m and nm. How Analogue Signals are converted to Digital Signals Analogue signals are converted to digital using sampling, basically at least two samples are made per cycle, and the more samples the higher quality of the digital output. This is called quantisation; this maps the continuous range of signals and breaks down the bits into a digital signal.

    • Word count: 1644
  14. Possible Future Developments of the Internet. Pervasive Networking and Mobile, Wireless and Senor Network Access

    Using the existing RFID tags used for security in shops, we as consumers will be able to scan the bar codes of food products to alert us with any allergy risks or excess sugar for the likes of diabetics - this clearly saves time for people with allergies or other medical problems who have to extensively check food products. Alternatively, we can have our own RFID tags that have personal settings in them, such as your clothing sizes and preferred colours or materials, so when you are out shopping along the clothes rails, the items which match your preferences will be drawn out, for example, by a small flashing LED light.

    • Word count: 1099
  15. Topic 8 - Development Methods

    * Reducing the number of part deliveries by having a much more efficient and accurate stock control system. Cost Benefit Analysis: Being able to create a new system with stated aims and objectives at reasonable cost, this is called a feasibility report, where the costs and benefits are weighed up. Initial Fact Find: Will give information on what is required from the project. Investigation: Will be taken into the technical, legal, economic, operational and schedule implications. Analysis Looks in to detail of the current system or requirements, this person is called a system analyst who also investigates new requirements.

    • Word count: 1173
  16. Information systems assignment 1

    I certify that the learner named above has met the deadline date stated for this assignment Signed: Date : Content * Leisure organisational chart and description of characteristics P1 * Table of internal and external flows P2 * Information Flow Diagram P3 * Explain the importance of the data processing cycle M1 * Comparison tables M2 * Report of initial findings D1 Characteristics and sources of information Characteristics of information are reliability, accessibility, validity and fit in for purpose. These are the main characteristics of information that define them.

    • Word count: 1081
  17. Input, process, output

    Members details are looked up: details will be displayed on screen or printed out if letter needs to be sent to customer who are overdue or need to be contacted for other reasons. DVD 1. New DVD is brought: information for the new DVD is provided by the supplier and it will be added using a DVD entry form. 2. An existing DVD's details change: This will be amended using the data entry form. 3. Existing DVD is returned to supplier or sold: these DVDs are selected by using a query which picks out DVDs that haven't been rented out over a certain period.

    • Word count: 1002
  18. Proposed system

    Lastly the table form which has all current customers holds the ability to categories customers. For example the user will be able to rearrange the customers in alphabetical order or they can rearrange them according to there location which will help with tasks where an employee doesn't know the customers name or id and has to search for them manually. This searching method can be replicated if a user wishes to search for a specific DVD or rental. In the current system deleting existing customer if they do not wish to be a member anymore involves searching through customer membership forms manually, still carrying the problems stated above.

    • Word count: 1468
  19. Background and Information -ICT Coursework

    Stock levels would have to increase and therefore purchase invoices would need to be managed more effectively. They are currently written in a ledger by hand, and would need to be managed by computer. The number of employees would need to be increased as each new store is created. The main problem is the organisation and storage of information such as; customer details, employee details, credit/debit card details, film details, purchases and rental dates. * In order for the staff to be able to identify the correct price for any given item and length of time rented, they have to find the correct list of DVDs and read this until they find the items code.

    • Word count: 1304
  20. Computer Network

    Client Server: Used in an environment with more than 10 users where a dedicated SERVER is used. Provides centralised control of administration and the sharing and resources. Metropolitan Area Network (MAN): A MAN is data network designed for a town or city. In terms of geographic breadth, MANs are larger than local-area networks (LANs), but smaller than wide-area networks (WANs). MANs are usually characterized by very high-speed connections using fiber optical cable or other digital media. Wide Are Network (WAN): WAN is a computer network that spans a relatively large geographical area. A WAN consists of two or more local-area networks LANs.

    • Word count: 1609
  21. Growth of cybercrime and how_society can deal with it

    fully aware of this Section 2: A person will be found guilty if they do anything within section 1 with intent to commit a further offence such as blackmail, theft of any other offence. These offences have a minimum penalty of at least 5 years. The person will also be guilty if they have an accomplice/get someone else to commit the offences for them. Section 3: The maximum sentence is 5 years. A person will be guilty if they: * Disrupt the operation of a computer system * Disrupt or prevent access to any programs or data * Disrupt the

    • Word count: 1960
  22. The Growth of Cybercrime

    The hacker had sent e-mails to his contacts telling them that he had been robbed at gun point when travelling abroad, he/she then asked for some money to help him get home. Of course Mr. Rutberg was fine but his friends didn't know it was not him and there was no way of telling them. This incident left one of Bryan's friends sending $1,200 to a bank account that wasn't really his. The issue is very common due to the mass of Facebook users and can prove to be even more serious than this story.

    • Word count: 1607
  23. Explain in your own words the main components / features of an Management Information System and how it supports these functional areas

    This controls the effectiveness of the system. The system needs to be accurate, sustainable, have consistent timelines and it needs to give confidence to the user, making sure its information meets all the criteria above. An information system has 6 functions: input, storage, processing, output, control and feedback loops and closed and open systems. Input: This is divided into two different segments, which are inputting the data into the system accurately. It then needs to be stored and summarised in a useful way. The other segment is done by the user.

    • Word count: 1268
  24. Hands-On Glove Makers is a retails company wanting to know whether to sell on the online market. In this report I look at the positives and negatives. I look at the competition they will face from globally competitors. Laws which will also affect Hands-On

    Introduction Hands-On Glove Makers is a retail company which is based in Watford. Over time the reputation has increased through word of mouth. Orders are being taken through telephone or in their premises. They are know considering to began to sell online and I will analyse the idea of selling online for Hands-On Glove Makers. Main body If Hands on Glove Makers are to go online the must ensure they will be able to compete with the already present online market. One main leader in the online market is direct golf they manage to sell their products for as little as �4.99 to �14.99 and therefore Hands on Glove Makers must see weather they will be able to offer a similar price to what the other companies are offering.

    • Word count: 1869

Conclusion analysis

Good conclusions usually refer back to the question or title and address it directly - for example by using key words from the title.
How well do you think these conclusions address the title or question? Answering these questions should help you find out.

  1. Do they use key words from the title or question?
  2. Do they answer the question directly?
  3. Can you work out the question or title just by reading the conclusion?
  • To what extent does research support a link between stress and the immune system?

    "In conclusion to the experiments it is seen that stress is almost a definite cause of a suppressed immune system although it may not be the only reason that the immune system is suppressed. As it is not entirely sure whether stress causes the suppression of the immune system or the suppressed immune system leads to stress."

  • To What Extent Was the Poor Law a New Poor Law?

    "The new poor law was a new poor law. Due to social, political, and economical circumstances, it was necessary for the time, as the old system was ineffective, inefficient, and bad for the poor. The new laws meant that there were tighter controls over the parishes and the poor; this made less chance of uprisings and rebellions. I agree similarly to the ideas of Digby; recent investigations on the Old Poor Law have produced convergent conclusions. They emphasise that relief under the Old Poor Law was essentially a response to population growth, under-employment, and low wages, rather than their causes as the Royal Commission's report alleged."

  • This research that I've done will discuss about the effectiveness of the Light Railway Transit (LRT) in Kuala Lumpur.

    "10.5 CONCLUSION In a nutshell, Hong Kong's Mass Transit Railway and Malaysia's Mass Transit have some similarity in term of technology and facilities. However, Hong Kong's Mass Transit Railway is more advanced than Malaysia's Mass Transit as they had started very early in the late 60's. Effectiveness of Malaysia's Mass Transit can be improved gradually and hopefully they can be as good as Hong Kong's Mass Transit Railway. APPENDIX 1. Map showing Hong Kong mass transit routes. Source: www.mtr.com.hk"

Marked by a teacher

This document has been marked by one of our great teachers. You can read the full teachers notes when you download the document.

Peer reviewed

This document has been reviewed by one of our specialist student essay reviewing squad. Read the full review on the document page.

Peer reviewed

This document has been reviewed by one of our specialist student document reviewing squad. Read the full review under the document preview on this page.