• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

AS and A Level: Information Systems and Communication

Browse by
4 star+ (15)
3 star+ (32)
Word count:
fewer than 1000 (154)
1000-1999 (175)
2000-2999 (65)
3000+ (109)
Submitted within:
last month (35)
last 3 months (35)
last 6 months (37)
last 12 months (37)

Meet our team of inspirational teachers

find out about the team

Get help from 80+ teachers and hundreds of thousands of student written documents

  1. 1
  2. 15
  3. 16
  4. 17
  5. 18
  6. 19
  1. Hydraulic / Pneumatic systems Work Plan

    Mainly because of its fire resistant properties but it also has a very good operating temperature range. This fluid is used mainly on modern aircraft because of these reasons, which is why I have also chosen this type. Synthetic hydraulic fluid, also known as Phosphate ester based fluid, is identified by its green, purple or amber colouring and must only be used with butyl rubber, ethylene or Teflon seals and flexible hoses. Although it has many benefits there are also some drawbacks, which include the fact that it is classed as an extreme irritant to the skin and eyes so extreme care must be taken when handling synthetic fluid.

    • Word count: 1076
  2. Computer Hacking

    This caused a big problem to the people whose files they were "hacking" into, because it is a violation of the people's rights, the right to privacy. Now people all over the world are trying to discover new technology to protect themselves from hackers, but all efforts, so far, have been in vain, because there are still hackers and they still are able to access files. Criterion B: IT Background on the issue The early history of hackers is centered on MIT in the 1950's and 1960's.

    • Word count: 943
  3. The History of The Cell Phone

    Because the signal traveled through the air, Marconi called it 'Wireless'. So, since Bell's telephone wires could carry the human voice, naturally scientists began to search for ways Macron's Wireless could broadcast speech too. And in 1906, Reginald Fessenden did it by changing sound waves into signals through a process called amplitude modulation, or AM for short. It was mobile, but just barely. American engineer Edwin Armstrong took the next big step, and in 1935, introduced FM (frequency modulation) radio waves. Because FM used less power, and smaller, lighter receivers, wireless was on the move.

    • Word count: 1529
  4. Think about a time when you had to identify the key cause of a problem and come up with a workable solution. How did you gather the relevant information?

    How did you analyse the data collected? The focus in the analysis of the data collected was to make a decision on which was the best route for solving the problem that I had. The important factors that were important to my needs software needs were clearly established. I needed the communication problem to be solved in the simplest way possible and cater for my exact needs. For example, I disregarded using Java RMI because it was Java specific whereas I needed something that worked with programs in different languages.

    • Word count: 982
  5. Using examples, discuss the advantages/disadvantages of proportional representation systems compared to the ‘first past the post’ system as used in parliamentary elections in the UK.

    Whether or not plurality is the best system has long been debated. By 1920 Britain was the only democratic country in Western Europe not to have adopted some form of PR (Hain 1986). Advocates of the plurality system, including Peter Hain (1986), besides arguing that the plurality system is the simplest system, maintain that it's preferable to alternative systems for other reasons. Without needing to put down multiple choices, the ballot paper is easy to fill in. The ability for voters to make decisions about clear political policy programmes means elections revolving around the candidates' personalities are discouraged.

    • Word count: 2127
  6. An Investigation into the Use of Control Technology in the Car Industry

    This process requires the unit to be dipped into a tank holding 90,000 gallons of the electro-coat primer; an electric current is applied to the paint and the unit is connected to the opposite electrical polarity. This creates an attraction which causes the paint to flow deep into all the joints and interior surfaces of the unit. Sealer Application Sealers are applied to all the welded seams on the unit to eliminate the possibility of water leaking into the unit from the exterior.

    • Word count: 6266
  7. Consider five models of communication – Linear, Circular, Argyles, Hargies and Hartleys

    Hartley (1999) page 32 What follows next are five models of communication. The Linear model of communication is a method of passing information from one individual to another through a channel where noise may be present. The information flows in one direction only. As a result the receiver cannot respond to the transmitter. E.g. Instructions on a dictaphone. Hartley (1999) page 23 This method puts a great emphasis on the transmitters ability to convey the information in a logical manner whereby misinterpretation is minimal. This in turn puts equal emphasis on the listeners ability to understand the conveyed information.

    • Word count: 1154
  8. Describe how you would set up and maintain a wireless LAN alongside an existing wire-based system in a closely defined organization of your choice’

    Another popular one is Bluetooth, operating over 2.4 GHz and data rates of 1Mbps. Wireless LAN's use electromagnetic airwaves (radio in this case) to communicate network information from node to node without relying on a physical (wired) connection. The various manufacturers of wireless LAN's have a range of technologies to choose from. The common ones include narrowband (NB), spread spectrum (SS), frequency hopping spread spectrum (FHSS), direct sequence spread spectrum (DSSS) and infrared technology (IR). The principal one used in our solution is FHSS.

    • Word count: 2132
  9. Relations between Taeko and Galeano’s Systems

    Taeko attempts to bring about a modern change, and every time she was penalized by society. "The System 1" describes how the modern government and political 'system' fails to operate correctly. The system does not work, and everything is a lie. Money rules everything, and laws cease to exist. "Nothing is worthwhile when the people are at the service of things" (131). In "The System Two", Galeano implies that image is always changing, and people try to fit into groups. "It's the age of the chameleon" (178) and people have more than one image that they present to others.

    • Word count: 1118
  10. Making reference to different systems and countries, discuss the respective advantages and disadvantages of majoritarian and proportional systems

    However there are disadvantages. Although it does provide wide representation, it over represents the winning party creating an element of disproportionality. The winning party also rarely wins an out right majority making them the minority's choice. It also under represents parties receiving less then 35% of the vote. Some votes matter more than others especially in marginal seats creating the problem of wasted votes. The system also creates regional imbalance, in 1997 the conservatives didn't receive any votes in Scotland.

    • Word count: 873
  11. The Development of Information Technology

    Presper Eckert built the ENIAC (Electronic Numerical Integrator and Computer) for the US military and went on to market the UNIVAC 1 in 1949. * 1552 - UNIVAC predicted Eisenhower's victory with 5% of vote. Grace Hopper and symbolic notation, making programming easier. * 1958 - Transistors * 1958 to 1964 - US computer population went from 2,500 to 18,000 * Mid 1960's Integrated Circuits (IC's)

    • Word count: 468
  12. The Advantages and Disadvantages of the First Past the Post Voting System

    The simplicity of this system means that voting is open to everyone who wants to vote. The First Past the Post System suits parties with significant socio-economic support nationally. Parties like Labour and the Conservatives gain an advantage from it as they win the largest majorities of seats for example in 1992 the Conservatives and Labour gained 93.2% of the seats even though they had only 76.3% of the vote between them. This happens because support for other parties such as the Liberals and SNP tend to be more thinly spread.

    • Word count: 743
  13. What are the most effective ways that you the teacher can benefit from feedback from the students and their parents? Advantages and disadvantages of various approaches. Suggestions for improvements?

    An example of one such approach is being implemented in Mountainview Elementary School. In Mountainview Elementary School, West Virginia, the entire reporting system was revised and replaced with a more parent involved approach. Parents were fully informed about the new reporting system before implementation and several questions and answer seminars were held to attend to any queries or concerns that parents may have had. Progress reports were sent home but opportunities for parent and teacher conferences, both before and after the issue of the reports, were strongly encouraged so as teachers could use the feedback constructively.

    • Word count: 868
  14. The Impact of Mobile Phones on social Interaction

    Literature Search ........................................................................15 3.1 Impact of mobile phones on social interaction ................................15 3.2 Impact of mobile phones on young people aged 13-18 ......................18 4. Growth of mobile phones ...............................................................20 4.1 Changing Culture ..................................................................22 4.2 Increased accessibility, freedom and safety ....................................23 4.3 Decreasing costs and increased choice ..........................................24 4.4 Growth of pre-paid phones .......................................................25 4.5 Lack of fixed networks ............................................................26 4.6 WAP and personalisation .........................................................26 5. Results and discussion: The effect of mobile phones on social interaction ...30 5.1 Profile of people interviewed ......................................................30 5.2 Society's perception of mobile phones ..........................................30 5.3 Positive Impact on social interaction ............................................31 5.4 Negative Impact on social interaction ...........................................33 5.5 Conclusion ............................................................................35 6.

    • Word count: 13153
  15. Telecommuting. According to The Teleworker magazine, in 1997 4% of the total number of employees in Britain classed themselves as teleworkers.

    You can also view statistics on telecommuting in the USA and find the results of surveys conducted on the employees. According to The Teleworker magazine, in 1997 4% of the total number of employees in Britain classed themselves as teleworkers. Powys in Mid Wales has its own website where people can write in their success stories, and where both prospective employers and employees can advertise. Information is provided on what equipment you will need if you want to work from home in this way, together with a helpline.

    • Word count: 1099
  16. 'Murmuring Judges’ and ‘In Cold Blood’

    This struggle against the system is a struggle that we the audience can have empathy with. This puts Gerard on the same level as the audience, which will invoke sympathy itself. "She's not my wife actually. But we have two children. One of them has Down's.... and I'm not sure how they'll keep their heads above water." Through juxtaposition of characters on stage David hare reveals how brittle the system is and how it relies on prisons to feed the system so that the profession can be paid. Gerard particularly points this out. What the judges do at works has no effect on them but it can change one person's life.

    • Word count: 1052
  17. Analysis of a Virtual Reality system to train surgeons.

    screen -Screen capture must be done before any surgery was performed -Then, follow the audio instruction to start the training -To perform surgery, move the hand and grip the instrument needed in the simulation. Your view can be move 360 degree to expand the view if necessary -After the surgery is done, save the recording. The recording may be upload to the university server or the cloud. -The video then will be downloaded and analyse by senior surgeons and fellow trainees to provide feedback of your operation 2b)

    • Word count: 1189
  18. My Experience of IT Procedures and Policies in a large company

    But, this information needs to be secure so I also adopted security and confidentiality procedures to ensure that the data is kept safe. SharePoint requires a password in order to gain access to the data and I had to sign a confidentiality contract to ensure I didn?t pass any of the information to other people outside the business. I also was advised by my team to always lock my computer when I left it and to not leave papers on desks that someone could easily read and see confidential information.

    • Word count: 978
  19. Plan an installation and an upgrade of security software.

    I will also need to select the most appropriate location for the application to be installed as this could be the main hard drive or an external one. Lastly, I will define a suitable procedure for the installation. This will involve checking contents, performing virus scans, backing up data or configuring the software. Also I will consider timing. Installations or upgrades perform at different rates depending on the time that I complete them. I will complete the installation in the evening because it will run faster and more efficiently due to no traffic on the servers.

    • Word count: 766
  20. In this report I will justify reasons for upgrading Microsoft Office 2013 to Microsoft Office 2016.

    Not only that but thanks to Skype you can now have in-app integration, instant messaging, screen share, talk or video chat right in your docs. This is great for an IT company to ensure that all staff are working together as a team on different tasks, encouraging communication amongst the company. There are other skype benefits. There is now HD Video and co-authoring, Office 365 Groups that are now available as part of Outlook and on iOS, Android, and Windows and the ability to set of Office mobile apps across Windows, Android, and iOS. Additionally, there are benefits to Outlook.

    • Word count: 780
  21. Explain the requirements in preparing for a software installation and upgrade

    You will also need to select the most appropriate location for the application to be installed as this could be the main hard drive or an external one. Lastly, you need to define a suitable procedure for the installation. It will usually involve checking contents, performing virus scans, backing up data or configuring the software. Also timing is an important thing to consider. Installations or upgrades perform at different rates depending on the time that you complete them. If you doing it during the day, it will take a long time because there is high demand at this time.

    • Word count: 905
  22. Explain the importance of the user acceptance process for software

    There are other licences you can get, OEM (Original equipment manufacturer) license which is for software that is purchased by a hardware supplier and comes with your computer system. Also there is a site license which is unrestricted license that allows you to install the software as many times within your organisation as you need to. Open source license is a license that not only gives you access to the software but also lets you view, modify and share changes to the source.

    • Word count: 513
  23. Describe the potential risks of installing or upgrading software and evaluate the risks involved in the installation or upgrade of software and explain how the risks could be minimised.

    They have asked me to look at their current computer systems and advise on any new software installations or upgrades that may have been necessary. In this report I will describe the potential risks when downloading or updating software. When installing and upgrading software it?s important to be aware of the risks involved. It?s important to plan how the changes will affect the computer before you start so that you are prepared if the worst should happen.

    • Word count: 515
  24. Describe the potential prompts that initiate the installation of new or upgraded software

    There are many different reasons for why you would want to prompt an install or upgrade software. Perhaps it was because a bug was identified or upgrading would make the device run faster and more efficiently. It?s important to be aware of the prompts so that you can act on them quickly as they could be vital such as the security of the device. The first reason for upgrading or installation of software is problems with the existing system.

    • Word count: 505
  25. Explain the user side and server side factors that influence the performance of a website

    The modem converts received data to digital and vice versa. Because dial-up uses telephone lines the quality of the connection is not reliable and data rates are limited. A dial-up has an average speed from 2400bps to 56Kbps. It isn?t used widely today as it has been replaced with more efficient options like DSL and Broadband. ISDN is another internet connection. It stands for Integrated Services Digital Network. It is an international communications standard for sending voice, video and other data over digital telephone lines or normal telephone wires. The average speed ranges from 64kbps to 128kbs.

    • Word count: 1308

Marked by a teacher

This document has been marked by one of our great teachers. You can read the full teachers notes when you download the document.

Peer reviewed

This document has been reviewed by one of our specialist student essay reviewing squad. Read the full review on the document page.

Peer reviewed

This document has been reviewed by one of our specialist student document reviewing squad. Read the full review under the document preview on this page.