• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

AS and A Level: Information Systems and Communication

Browse by

Currently browsing by:

Word count:
fewer than 1000 (6)
1000-1999 (6)
3000+ (3)

Meet our team of inspirational teachers

find out about the team

Get help from 80+ teachers and hundreds of thousands of student written documents

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    On occasion, the business also serves the self-moving industry by providing them with large vehicles for transporting heavy items to new destinations, such as when people are moving house. The offices and garages of the business are situated in Portadown, and they have been providing a vehicle rental service to the town and surrounding areas since 1985. The business is open from 9am to 5pm from Monday to Thursday, and it closes at 1pm on Fridays. On Saturdays it's open from 11am until 4pm, and it is closed on Sundays.

    • Word count: 15099
  2. Marked by a teacher

    E-Commerce Laws and Legislation - The Data Protection Act

    4 star(s)

    6. Processed in accordance with the “data subject’s” (the individual’s) rights. 7. Securely kept. 8. Not transferred to any other country without adequate protection in situ. This has an impact on businesses because they must ensure anyone involved in collecting or accessing personal data is fully aware of the laws and legislations and they must be monitored to ensure the Act is being followed. If the Data Protection Act is breached in any way the Information Commissioner’s Office has the power to issue fines of up to £500,000 to small businesses. For many start-up companies this would be devastating.

    • Word count: 1594
  3. Marked by a teacher

    Investigating a Transactional Website (www.latestdvd9.com)

    4 star(s)

    Structure and Navigation Site Structure The website is structured in a very simple way. From the main homepage there are the further five subpages, which you can see in the screenshot below. These pages are subordinated to the homepage. When going to a DVD, this opens a new page that shows only the DVD and its information. Using this navigation bar customers can mainly find out information about the purchase of DVDs or find the most popular DVDs of the week.

    • Word count: 7231
  4. Peer reviewed

    Computer Crime

    5 star(s)

    Botnets are created to be rented out for their combined computing power to send SPAM, host phishing sites, or sell fake anti-virus software (see appendix - figure 1 for scam estimates). (Peter Guerra 2009) New and emerging technologies and their impact on personal privacy protection I-Phone Released June 19, 2009, the Apple I-Phone 3GS, third generation , is a 'smart phone' with inbuilt GPS, voice recognition system, 156, 650 downloadable applets, touch screen, iPod and the list goes on (Wikipedia Contributors 2010).

    • Word count: 4447
  5. Peer reviewed

    One of the 15 largest law firms in the world, Kirkland & Ellis LLP, supports nearly 1400 lawyers in 15 cities around the world (Kirkland & Ellis, 2011). Hardware and software are used by most of the lawyers in the company and many more people who help su

    4 star(s)

    Having each office use the same hardware and software in every office makes supporting them easy for the company. Kirkland & Ellis LLP deploys standard set of hardware and software to each employee based on his or her position. Every employee uses either a Dell desktop and monitor or a Dell Laptop. These pieces of hardware allow the employee to connect to Kirkland & Ellis LLP's network and function as a corporation. The workstations use the Windows operating system, Windows XP. Windows XP, a Microsoft product, released its first edition in 2001 (Microsoft, 2011). While this operating system is no longer sold or supported, Kirkland & Ellis LLP decided to hold off on upgrading to Windows 7.

    • Word count: 715
  6. Peer reviewed

    Risks of Having a Facebook Account. Immediately after the discussion in class regarding Facebook privacy, the first thing I did when I got home from school was to check the limitedness of my Facebook profile to people whom I have no connections with.

    4 star(s)

    I clicked my name and realized that only a larger version of the thumbnail of my current profile picture is further revealed upon clicking my name. I checked some of my friends' profiles and theirs disclosed a few of their friends. This revelation is already quite jeopardous since spammers and people who are up to no good can collect information and also be able to verify assumptions through one's set of friends. Also, the friends who are revealed, especially those who have weak privacy settings, are put in a risk.

    • Word count: 1012
  7. Peer reviewed

    Testing Database

    4 star(s)

    This is done using the test plan below and will be done and documented once the whole system in complete. * End-use testing - getting the end user to test the system for a day. Done by the end user to detect any errors/problems and to establish whether the system meets the user requirements Testing plan Test Number What to test How to test it Expected Outcome 1 Test switchboard and switchboard options Manually click all the buttons on the switchboard Switch board should load on database startup.

    • Word count: 780
  8. Peer reviewed

    Colorwarepc.com is entirely an online E-commerce business, therefore the website needs to ensure that their customers information will remain 100% safe from the time which it is submitted.

    4 star(s)

    They will frequently test the security systems and if a problem arises they can resolve it quickly. Furthermore it is important that Colorwarepc.com image doesn't get duplicated as this leads customers to sign up to Colorwarepc.com mimic, meaning that the customers personal information and financial information will be use for fraud and other internet crime. Physical security Physical security falls varies from anything like protecting a company's information on their computers to a simply locked door to more complex methods of security.

    • Word count: 493
  9. Peer reviewed

    Unit 3 - Impact on Information Availability

    4 star(s)

    All of these websites listed are everyday sites which I use as helpful aids in my life, but I also use the internet for my interests and hobbies. I frequently visit sites such as Skysports to check all the latest football news and fixtures as well as visiting online forums to discuss a variety of issues. Forums allow discussion between select groups of people who share common interests from A-level forums to Golf forums; it is easy to find one relevant to your interests.

    • Word count: 1627
  10. Peer reviewed

    Ecommerce (M) BETC IT

    4 star(s)

    For example an business have their own management way, policy and security protection etc and it works very well before they committed to an e-commerce system, they set their tasks and they finished it perfectly without anything to do with ICT, but after they committed to an e-commerce system, it's a completely different story. These management ways they had are become useless, basically the whole thing is different to their traditional way: products needs convert to meet online consumer's perspective, new technologies need to be investigated, new policy and security needs to be setup etc.

    • Word count: 956
  11. Peer reviewed

    Verbal and Non - verbal Communication

    4 star(s)

    In a face to face conversation or verbal exchange, the words take only 7% of the effectiveness of delivering the proper message, where as the tone of voice and non - verbal communication consists of 38% and 55% respectively (Bradbury, 2003). The aim of this presentation is to examine how communication of messages could be carried out effectively with the maneuvering of both, verbal and non - verbal cues, in the absolute correct way. Some methods to ensure proper communication would be to listen attentively to the speaker, keep eye contact, keep an open attitude to both the speaker and the listener, body language and feed back.

    • Word count: 999
  12. Peer reviewed

    Computer Science Info-Age & Ethics

    4 star(s)

    Forgery (of E-mail) 2. Assault (on your Web site, E-mail box, or computer system) 3. Fraud (cyber scams) and 4. Robbery (theft of valuable information) Various types of people commit computer crimes. The two most familiar being hackers and crackers. A hacker is a person who enjoys exploring the details of a programmable system and how to stretch their capabilities. A cracker is one who breaks security on a system. Although hackers and crackers both break into computer systems, their motives are different. Hackers seem to break into computer systems for the intellectual challenge. Crackers are considered malicious with the intention of harming or causing damage to a computer system.

    • Word count: 1175
  13. Peer reviewed

    Mobile phones: a blessing or a hazard?

    4 star(s)

    Also businesses are already taking full advantage from the invention. It helps them keep in touch with potential customers and business partners. It means for them being in touch all the time with a moving and competitive environment. A painful experience Mobile phones may offer security and may even save your life. A personal experience I had was when I was travelling from Coventry to Heathrow airport with my husband to catch a flight. On the way the car suddenly broke down on the motorway.

    • Word count: 737

Marked by a teacher

This document has been marked by one of our great teachers. You can read the full teachers notes when you download the document.

Peer reviewed

This document has been reviewed by one of our specialist student essay reviewing squad. Read the full review on the document page.

Peer reviewed

This document has been reviewed by one of our specialist student document reviewing squad. Read the full review under the document preview on this page.