Professional Documents
Culture Documents
Lecture Notes Book (Patterson Is Using Information)
Lecture Notes Book (Patterson Is Using Information)
Using Information
[INTERMEDIATE 2;
HIGHER]
Alan Patterson
abc
The Scottish Qualifications Authority regularly reviews
the arrangements for National Qualifications. Users of all
NQ support materials, whether published by LT Scotland
or others, are reminded that it is their responsibility to
check that the support materials correspond to the
requirements of the current arrangements.
Acknowledgement
Learning and Teaching Scotland gratefully acknowledge this contribution to the National
Qualifications support programme for Information Systems.
Tutor introduction 5
Student introduction 8
Target audience
While entry is at the discretion of the centre, candidates for the Higher
level would normally be expected to have attained one of the following
qualifications (or equivalent experience):
The shaded margins alongside of the text indicate material for the
Higher. A range of suitable questions and activities is provided at various
points throughout the notes, and tutors should direct students to these
activities as they see fit. A wholly Higher class would be expected to
study the Intermediate 2 and Higher units but would probably only be
expected to undertake activities relating to the Higher Outcome 2
assessment and any others the tutor sees fit to use to enhance the
course. The questions should also provide a means of diagnostic
assessment as part of the learning and teaching of the unit.
This unit requires that the student has regular use of a computer system,
which can be used throughout the unit for research on the World Wide
Web and for completing the software tasks. At the time of going to
print, the minimum specification for such a system would be:
• Internet access
• Word Processing, Spreadsheet and Presentation Software including
PIM software such as Microsoft Office 97 at least (Office 95 on a Mac)
but Office 2000 at least is recommended with Outlook.
• Desk Top Publishing and Web Authoring Software
• Project Management Software is optional and may be demonstrated
by the tutor. (Although Project is expensive, an evaluation package
can be downloaded and used for 30 days free of charge; either
SmartDraw or Microsoft Project can be used.)
Practical work
The tutor should supplement this pack with a suitable range of practical
activities using a range of software applications, in order to develop and
consolidate the learner’s experience and understanding, and to provide
evidence to support the checklist of practical skills for Outcome 2.
Advice on appropriate levels of treatment of practical skills is included in
the NABs provided by SQA.
PowerPoint presentation
Student introduction
SECTION 1
The figures 36.41 will be held as binary data on some media such as a
hard disk. It is the software which accesses this data and displays it in its
context. It may also have some structure, if it is held in a program like a
database for example, and a database will also give it structure. So, it is
the software which turns the figures from data into information and
gives them meaning.
1. Look at this list and decide whether the following are data or
information:
Total marks 14
Knowledge
Metadata
Categorisation of information
Sources of information
Primary information
A primary source of information is one that provides data from an
original source document. This may be as simple as an invoice
sent to a business or a cheque received. It may be more complex,
such as a set of sales figures for a range of goods for a tinned food
manufacturer for one week, or it may be a set of sales figures over
several weeks and several locations. There are many examples of
primary sources in many walks of life, but generally a primary
source is defined as being where a piece of information appears for
the first time.
Secondary information
A secondary source of information is one that provides information
from a source other than the original. Secondary sources are
processed primary sources, second-hand versions. Examples of
secondary sources could be an accounts book detailing invoices
received, a bank statement that shows details of cheques paid in
and out. Where statistical information is gathered, such as in
surveys or polls, the survey data or polling data is the primary
source and the conclusions reached from the survey or the results
of the poll are secondary sources.
Internal information
All organisations generate a substantial amount of information
relating to their operation. This internal information is vital to the
successful management of the organisation. The information may
be available from a number of sources within the organisation, for
example:
External information
An external source of information is concerned with what is
happening beyond the boundaries of the organisation. This covers
Nature of information
Formal information
This involves presenting information in a structured and consistent
manner. It is usually defined, within an organisation, as the main
way of communicating between and within parts of the
organisation. It is also usually the main way of communicating
externally from an organisation. The main methods of formal
communication are still the formal letter, properly structured
reports, writing of training materials, etc. Formal information is
communicated in cogent, coherent, well-structured language.
Informal information
This describes less well-structured information that is transmitted
within an organisation or between individuals who usually know
each other. It tends to be categorised as ‘unofficial’ information,
and is communicated by casual conversations, e-mails, or text
messages between colleagues. The language used is less well
structured than formal communication and tends to include
colloquialisms and shorthand; and spelling is less important.
Quantitative information
This is information that is represented numerically. Any event or
object that can be represented as a set of numbers is an example of
quantitative information.
Qualitative information
This is information that is represented using words. Any event or
object that is represented using words to describe its attributes is
an example of qualitative information.
Levels of information
Strategic information
Strategic information is used at the very top level of management
within an organisation. These are chief executives or directors who
have to make decisions for the long term.
Tactical information
The next level down is the tactical level, and tactical planning and
decision-making takes place within the guidelines set by the
strategic plan.
These plans have medium scope and will address details at the
operational level. They will generally have specific objectives and
be geared towards implementation by operational level employees.
Operational information
The lowest level is operational and operational planning takes
place based on the tactical plans.
Time
Historic information
This is information gathered and stored over a period of time. It
allows decision makers to draw comparisons between previous and
present activities. Historic information can be used to identify
trends over a period of time.
Present
This is information created from activities during the current work-
window (day, week or month). In real-time systems this
information would be created instantly from the data gathered (for
example, the temperature in a nuclear power plant turbine), giving
accurate and up-to-date information.
Future
This is information that is created using present and historic
information to try to predict the future activities, trends and events
relating to the operation of an organisation. An example would be
sales figures for a company: if the sales figures are up 10% from
those recorded this time last year it might be anticipated that next
month’s sales figures will also be up by 10%.
Frequency of information
Continuous
This is information created from data gathered several times a
second. It is the type of information created by a real-time system.
For example, sensors may be set up to collect temperature and
humidity readings in a large commercial greenhouse. It will be
important for that information to be collected constantly because
any variation in either the temperature or the humidity could
point to the failure of some machinery and an alarm could be
sounded to alert the staff. A very important system exists on
modern aircraft where the navigation and flight-control systems are
continuously monitoring and making adjustments; another is on a
computerised production line where constant monitoring allows
the system to correct faults. Obviously many other types of real-
time systems exist but a feature of them all will be that they check
data continuously.
Periodic
This is information created at regular timely intervals (hourly,
daily, monthly, annually). Different examples of information
generated by an organisation are needed at specific periods of
time.
Use of information
Planning
Planning is the process of deciding, in advance, what has to be
done and how it is to be done. Planning should be based on good
information. Planning is not an end in itself; its primary purpose is
to provide the necessary structure for decision-making and
resulting actions, throughout the organisation.
Control
Control can be defined as the monitoring and evaluation of current
progress against the steps of a pre-defined plan or standard. If
these tasks are not proceeding in line with expectations then
action is taken to bring the project back in line with what had been
planned.
At higher levels, planning and control are more closely linked, with
management being concerned with the monitoring of progress
against the plan, assessing the suitability of the plan itself and
predicting future conditions.
Decision-making
Decision-making is the process of selecting an action or actions
from those possible based on the information available. Decision-
making involves determining and examining the available actions
and then selecting the most appropriate actions in order to
achieve the required results.
Forms of information
Written
The vast majority of information created within an organisation is
in the written form. This can include hand-written or word-
processed information and information in e-mails as well as reports
produced from different classes of software, both general-purpose
packages and bespoke software solutions. Examples of written
information are reports, memos and tables, receipts, invoices,
statements, and summary accounting information. The list is
almost endless and different businesses will produce their own
type of written information.
Aural
Another common form of information is aural, which is
information presented as sound. The commonest form of aural
information is of course speech and examples of this would be
formal meetings (where minutes are taken), informal meetings,
talking on the phone and voice-mail messages. Nowadays many
organisations will have employees giving a presentation or talk to a
group where there may be use made of music and sound effects as
well as speech.
Visual
This form of information includes when pictures, charts and graphs
are used to communicate information. Again, many presentations
will make use of data projectors and presentation software that will
include text, graphics and animations. Full video can also be
projected via a data projector, and presentations can use video
filmed with a digital video camera and then edited on a computer
and distributed via CD or DVD now that DVD writers are quite
common.
Types of information
Detailed
Detailed information might be an inventory list showing stock
levels, actual costs to the penny of goods, detailed operating
instructions, and so on. This information is most often used at the
operational level within an organisation.
Sampled
This information usually refers only to selected records from a
database: for example, only selected customers from a company’s
full customer list. In a supermarket this may be product and sales
summaries given to departmental managers (bakery, fruit and
vegetables, etc.). Sampled information is often used at a tactical
level within an organisation. Depending on the size of the
organisation it may also be relevant at a strategic level.
Aggregated
This is information that consists of totals created when detailed
information is collated. An example of aggregated information is
the details of all purchases made by customers totalled each month
and displayed in a chart showing total sales for each month over a
year.
Characteristics of information
Availability/accessibility
Information should be easy to obtain or access. Information kept
in a book of some kind is only available and easy to access if you
have the book to hand. A good example of availability is a
telephone directory, as every home has one for its local area. It is
probably the first place you look for a local number. But nobody
keeps the whole country’s telephone books so for numbers further
afield you probably phone a directory enquiry number. For
business premises, say for a hotel in London, you would probably
use the Internet.
Accuracy
Information needs to be accurate enough for the use to which it is
going to be put. To obtain information that is 100% accurate is
usually unrealistic as it is likely to be too expensive to produce on
time. The degree of accuracy depends upon the circumstances. At
operational levels information may need to be accurate to the
nearest penny – on a supermarket till receipt, for example. At
tactical level department heads may see weekly summaries correct
to the nearest £100, whereas at strategic level directors may look at
comparing stores’ performances over several months to the
nearest £100,000 per month.
Reliability or objectivity
Reliability deals with the truth of information or the objectivity
with which it is presented. You can only really use information
confidently if you are sure of its reliability and objectivity.
the library has purchased, is reliable and (in the case of factual
information) objective. The book has been written and the
author’s name is usually printed for all to see. The publisher
should have employed an editor and an expert in the field to edit
the book and question any factual doubts they may have. In short,
much time and energy goes into publishing a book and for that
reason we can be reasonably confident that the information is
reliable and objective.
Relevance/appropriateness
Information should be relevant to the purpose for which it is
required. It must be suitable. What is relevant for one manager
may not be relevant for another. The user will become frustrated if
information contains data irrelevant to the task in hand.
Completeness
Information should contain all the details required by the user.
Otherwise, it may not be useful as the basis for making a decision.
For example, if an organisation is supplied with information
regarding the costs of supplying a fleet of cars for the sales force,
and servicing and maintenance costs are not included, then a
costing based on the information supplied will be considerably
underestimated.
Level of detail/conciseness
Information should be in a form that is short enough to allow for
its examination and use. There should be no extraneous
information. For example, it is very common practice to
summarise financial data and present this information, both in the
form of figures and by using a chart or graph. We would say that
the graph is more concise than the tables of figures as there is little
or no extraneous information in the graph or chart. Clearly there
is a trade-off between level of detail and conciseness.
Presentation
The presentation of information is important to the user.
Information can be more easily assimilated if it is aesthetically
pleasing. For example, a marketing report that includes graphs of
statistics will be more concise as well as more aesthetically pleasing
to the users within the organisation. Many organisations use
presentation software and show summary information via a data
projector. These presentations have usually been well thought out
to be visually attractive and to convey the correct amount of detail.
Timing
Information must be on time for the purpose for which it is
required. Information received too late will be irrelevant. For
example, if you receive a brochure from a theatre and notice there
was a concert by your favourite band yesterday, then the
information is too late to be of use.
Value of information
Cost of information
Information should be available within set cost levels that may vary
dependent on situation. If costs are too high to obtain information
an organisation may decide to seek slightly less comprehensive
information elsewhere. For example, an organisation wants to
Many students in the past few years have confused the definitions
of value and cost. Information gained or used by an organisation
may have a great deal of value even if it may not have cost a lot.
An example would be bookshops, who have used technology for
many years now, with microfiche giving way to computers in the
mid to late 1990s. Microfiche was quite expensive and what the
bookshops received was essentially a list of books in print. By
searching their microfiche by publisher they could tell you if a
particular book was in print. Eventually this information became
available on CD-ROM. Obviously this information has value to the
bookshops in that they can tell you whether or not you can get the
book. The cost of subscribing to microfiche was fairly high;
subscribing to the CD-ROM version only slightly less so.
Much more valuable is a stock system which can tell you instantly
whether or not the book is in stock, linked to an on-line system
which can tell you if the book exists, where it is available from, the
cost and delivery time. This information has far more value than
the other two systems, but probably actually costs quite a bit less.
It is always up-to-date and stock levels are accurate.
• historically 1
• in the present time 1
• in the future 1
• planning 1
• control 1
• decision-making. 1
availability or accessibility
accuracy
completeness
reliability or objectivity
timing
conciseness
presentation
value 8
Imagine that a friend of yours would like you to use the Internet to
find out about university courses that he or she is interested in.
They would like you to find out which universities offer
Information Systems as a degree course in Scotland. But before
doing this you could use your knowledge of Information Systems
to make up a checklist of criteria you want to use in your search.
There are two websites you want to check out, the UCAS site
(www.ucas.ac.uk) and the Heriot Watt University site
(www.macs.hw.ac.uk). Complete the pro-forma below giving an
example in each case of either the information you supply or that
the website supplies to you.
Data supplied
Information received
Knowledge gained
Any metadata?
Categorisation of
information in terms of:
(a) Source
(b) Nature
(c) Level
(d) Time
(e) Frequency
(f) Use
(g) Form
(h) Type
(a) Relevance
(b) Accuracy
(c) Completeness
(d) Reliability
(e) Timing
(f) Conciseness
(g) Presentation
(h) Availability
SECTION 2
This table shows how they fit into the categories of strategic,
tactical, and operational information systems:
These systems are generally not very flexible and have little
analytical capability. Most MIS use simple routines such as
summaries and comparisons as opposed to sophisticated
mathematical models or statistical techniques.
EIS allow the user to look at specific data that has been
summarised from lower levels within the organisation and then
drill down to increase the level of detail, which is provided by the
information systems in different areas. This is an example of data
warehouse analysis, which we will discuss later.
EIS
V
V
V
MIS DSS
V
V
V
DPS
Expert systems
The knowledge base stores all of the facts, rules and information
needed to represent the knowledge of the expert. The inference
engine is the part of the expert system that interprets the rules and
facts using backward and forward chaining to find solutions to user
queries. The user interface allows the user to enter new
knowledge and query the system.
Total marks 22
Speed
Computers at the heart of information systems are capable of processing
data very quickly. Although the computer is able to access data from
backing storage at very high speeds this is one of the slowest aspects of
data processing. The processor is able to carry out millions of
calculations per second and some processors are optimised for speed of
calculations.
Accuracy
For most practical purposes computers store and process numbers to a
high degree of accuracy, but the accuracy also depends on the software
written and, of course, on human accuracy. Much financial software is
accurate to 3 decimal places rounded to 2. Once the accuracy of a
calculation has been verified the software and hardware combined will
perform the calculation correctly every time.
Volume
The number of transactions handled by an Information System in a
period of time is referred to as the volume or number of transactions. A
commercial data system often has to handle millions of transactions
every week. For example, take a bank with 5 million customers. If each
customer makes an average of 2 transactions (cash withdrawals or
deposits, cheques written, direct debits or standing orders), then the
system has dealt with 10 million transactions. The average for a bank of
that size is probably far higher so as you can see the volume of data is
huge. This has big implications for the size of backing storage,
processing power and output capabilities of the system.
Efficiency
The efficiency of an Information System is really a combination of the
speed, accuracy and volume of the data processed. It could be
measured as the number of accurate transactions carried out per
minute. In relation to human processing, it is substantially more efficient
to carry out processing on an information system. Information systems
are capable of running without interruption 24 hours a day and 7 days a
week.
Gathering data
In the past there was a wide range of methods for capturing data before
bar codes became almost universal on goods for sale. Many large
companies employed large teams of data-processing staff often entering
data from turnaround documents (like utility bills filled in and returned
with a cheque).
In shops there were several different ways of recording sales and stock
control. Some large shops used kimball tags, which were strips of
cards with holes punched in them. These cards were fed into a reader
at the end of the day and the reader interpreted the sequences of holes
as stock numbers and stored the data on a type of disk. The disk was
sent to head office for processing and at the end of a week sales figures
and stock levels could be calculated. A similar system was employed
with metallic stripes on the cards, which were similarly read and used.
The main disadvantage of these methods is the time delay between the
goods being ordered, dispatched (remember ‘please allow 28 days for
delivery’) and the company banking the money; also shops were forever
either overstocking or running out of stock.
Bar codes
Bar codes are small labels printed on food, books, newspapers and
magazines and nearly all product packages. They are made of lines,
which represent numbers. A bar code stores four pieces of information:
• country of origin
• manufacturer’s code
• item code
• check digit.
The bar code is scanned (the numbers can be entered manually as well if
they won’t scan). The bar code data is then used by the point-of-sale
terminal to search a database of products for the name and prices. It
then prints an itemised bill and uses the data to update stock levels and
a sales file which can be used there and then to calculate all sorts of
statistics (daily sales by department, hourly sales, etc.).
Ordering goods
What are the other methods of gathering data in common use? Mail
order has all but disappeared and has been replaced by telephone and
Internet ordering. Companies now rely on customers telephoning an
order and paying over the phone with a credit or debit card. The goods
are ordered instantly, the stock position can be given to the customer
instantly, the money is transferred to the company’s account almost
instantly, and the goods are usually despatched within a few hours and
received usually within 48 hours by the customer.
When goods are ordered over the Internet a similar situation occurs
except that even more of the process is automated. The customer
orders the goods from the Internet site, pays by credit or debit card and
the goods often arrive either at a prearranged delivery time
(supermarkets), or within a day or two.
The advantages of these methods to the company are that they are paid
instantly in advance for goods ordered and hopefully increase their
business. To the customer, goods are received very quickly and often at
the customer’s convenience and of course the customer does not need
to leave their home (especially advantageous when young children are
around and / or the weather is very bad). The customer also has
protection from their credit-card company if something goes wrong.
the reader either the strip or the chip is read and the account details
transferred to the point-of-sale terminal (POS).
With a magnetic strip card a bill is printed out, signed and retained by
the retailer and a receipt is printed out for the customer.
With chip and pin the customer types a pin number into a device
attached to the till. The PIN number verifies the sale and the receipt is
printed out for the customer. It is generally quicker to use chip and PIN
and much less open to fraud as there is no piece of paper for a thief to
copy the number from.
Storing information
Information can be stored on a variety of media such as magnetic tape,
hard disk, CD-ROM and DVD. These fall into two categories, those where
data can be written to, re-written and amended, and those where data
can only be written once and read many times. Generally speaking all of
the data input from any of the above methods of data input will be
stored on hard disks. These have very fast access allowing records on
the disk to be accessed very quickly. The access is also random or direct
meaning the disk heads can go to any part of the disk without starting at
the beginning and working through towards the end, as with magnetic
tape.
Generally tape is only used for backing up large hard disks and usually
only file-servers on a network. It is totally unsuitable for most modern
data-processing applications. When fitted to a computer, CD-ROM and
DVD drives that can be written to are usually used for backing up data
from the hard disk of a personal computer.
Processing data
There are several types of processing that can be applied to data to turn
it into information, as follows:
• searching/selection
• sorting/rearranging
• aggregating
• performing calculations.
Sorting involves arranging the data into some form of order. The
choices are usually alphabetical or numeric, and then ascending or
descending. Large commercial organisations usually have their data
sorted or indexed in some way. It is common to have the customer file
permanently sorted in customer number order and when transactions
are made over the course of a day (orders and payments usually), the
transaction file is also sorted by customer number. The files are then
merged and a new file created with the transactions attached to the
correct customers. A bank will sort its customers firstly into branches
and then by account number within the branch.
So the total bill is calculated in three stages with the VAT finally being
added. The same principles apply for electricity, gas and phone bills,
although the phone bill has many more sub-sections and performs many
more calculations.
Outputting information
Paper
The most popular output method is printing information onto paper.
The list of examples of paper output is almost endless, but tying them in
Screen
Often in a large data processing operation the operator is only allowed
to see their input screen and maybe some customer details. Managers
and directors are more likely to see reports and progress checks on
screen. However, with rise of web-based and web-aware software,
management reports can be viewed on screen in an interesting and
visually stimulating manner, as with with intranet pages (an intranet is
like an internal internet for an organisation).
File
Once a database file has been updated with new information it will be
saved to backing storage for future reference. In some situations reports
or filtered data will be selected from the file and saved as a separate file.
This allows the data to pass to another part of an information system
that deals with the subset of data. Files can be e-mailed to managers and
viewed on-screen to save paper.
Network strategy
An organisation needs a network strategy initially to plan how to set up
the network in general to manage effectively its distribution of data and
information to assist its decision-making and general operation. The
network strategy should be based on sound fundamentals so that no
matter the advances in technology the network will be able to adapt and
still deliver the services the organisation requires.
Security strategy
An organisation needs a security strategy to ensure that staff or
competitors do not steal important operational data. The security
strategy will also deal with those areas of the network that staff can
access (you cannot have data entry clerks accessing reports meant for
senior management). Nowadays security must also deal with keeping
unauthorised people from remotely accessing business networks; and,
of course, it must protect against virus attacks.
Upgrade strategy
An organisation needs an upgrade strategy to ensure its information
systems can continue to support the core business as the organisation
grows and changes over time. There are likely to be advances in the
hardware technology such as faster cabling systems, faster and more
secure communications hardware and computers. Advances are also
likely to be found in the software used with faster and more secure
operating systems and greater functionality in the application software.
Organisations need to decide whether and when to upgrade, usually
when it appears cost effective to do so.
Software strategy
Initially the organisation will decide whether it needs bespoke or
specially written software. The latter is common for large organisations
like banks, insurance companies, supermarkets, and companies like call
centres and modern mail-order companies. The organisation contacts a
software house that will create the bespoke software. This is always
expensive and many organisations will try and configure off-the-shelf
application packages to suit their purposes. Often there is a mixture of
bespoke and off-the-shelf packages in use, with managers often
manipulating and analysing in spreadsheets figures produced in bespoke
systems.
Intermediate 2 questions
Concepts in relation to Organisational Information Systems
Total marks 32
Network strategy
Topologies
LAN
This stands for Local Area Network and it is a network that is
restricted to one room, building or site. The cabling and hardware
(infrastructure) that defines the network are usually owned by the
organisation. LANs allow users to share data and peripherals like
printers, often they are able to log on anywhere on the network
and access their own data from any computer. The network
manager is able to control access through the use of usernames
and passwords and ensure that data is kept secure and backups
made.
WAN
This stands for Wide Area Network and is a network that uses some
form of external communications for computers to communicate
with each other. Some large companies, local authorities and
government departments operate WANs. Their regional and
district offices can be connected via leased lines and their
computers will all operate as if they were workstations on a LAN.
More common nowadays is for these organisations to use
telephone lines and run a web-based service or Intranet. By far the
biggest WAN in the world is the World Wide Web running the
Internet.
Distributed networks
Distributed networks have been made possible on LANs by the use
of modern networking software and by having multiple servers
around the network. Each server can run a mini network within a
sub-group of switches and this can reduce network traffic
significantly. Users’ data can be kept on the server they are most
likely to access although their user area should be transparent
from any station on the network. A distributed network can make
the working of a network like a school or college much more
efficient, and in a business environment much more secure as well.
Server failure at one node is unlikely to render the entire network
useless.
Network hardware
Client-server network
This type of network has a central computer called a server,
although large LANs may have more than one server. Data files and
software are usually stored on the server but can be accessed from
the network stations (nodes). Some software is installed centrally
so that it only has to be installed once, although applications are
usually installed on each workstation and this software can often be
installed remotely to several stations at once. All files are stored
centrally, providing a pool of data that is accessible to all
workstations on the network. The network can support computers
of differing types and usually different versions of the same
operating system. Backup is easy to perform and there is no need
to rely on users backing up their own files.
Peer-to-peer network
This type of network has no central server, as all workstations on
the network are equal. Installing software takes more time, as it has
to be installed on each computer. Workstations on a peer-to-peer
network can access work stored on other computers on the
network. This type of network is less secure as access to and from
workstations needs to be open.
Structured cabling
Cables are the commonest form of transmission media used to
build a network. They are usually made from copper wire, such as
co-axial and twisted pair. Fibre-optic cables are also used for fast,
large-capacity networks or to connect sections of a network in a
large building like a school or college.
Network software
Security strategy
Data security means keeping data safe from physical loss. This
could be due to accidental damage to the computer systems, such
as a fire or flood. It might be caused by electronic problems such
as hardware failure or the data becoming altered due to magnetic
influences. We call this data corruption. This might be intentional:
for example, theft by a competitor, malicious unauthorised access
deleting or altering data, or it might be destruction of the data by
viruses.
Password guidelines
Virus protection
Prevention
A virus can, like any form of data, copy itself onto a computer via
portable backing storage or across the network. There are various
different ways of preventing a computer system from being
infected by a virus.
You can, as in some schools and colleges, prevent users from using
floppy disks to transfer data. Several organisations buy PCs without
a built-in floppy disk to reduce the risk of virus infection.
Detection
If a user does not have any anti-virus software installed on their
computer system, they may not detect a virus until it causes
damage to their computer or someone else receives an infected e-
mail or file from them.
Repair
It is generally a good idea to scan the hard disk of the computer
system on a regular basis to ensure no viruses have managed to
infect the system. If a virus is discovered the anti-virus software can
offer to quarantine or repair the files. Quarantining involves
coping the files into a secure sub-directory on the hard disk.
Repairing a file involves the anti-virus software deleting the part of
the file that it believes contains the virus infection.
Firewall
Encryption
Access rights
• Read – relates to files and the user can read the file. Files can be
made ‘read only’, which means users cannot save changes made
to them.
• Write – Usually refers to folders where users have the right to
write or save files to that folder.
• Create – Again in folders groups of users have the right to create
files.
• Erase – Similarly groups of users may be able to erase files.
• Modify – Groups of users can be given rights to modify files.
Backup strategy
Every computer user and certainly every network and MIS should
have a strategy in place to back up their (often irreplaceable) data.
Backing up is the process of making a copy of data stored on fixed
hard disks to some other media. This can be tape, external
portable hard disks, writeable CD-ROM or DVD. The purpose of
backing up data is to ensure that the most recent copy of the data
can be recovered and restored in the event of data loss.
What can cause this data loss that so many companies worry about?
Firstly, there are the natural perils of fire, flood, and building
collapse. Secondly, there are electronic disasters. A simple
example of the latter is when the hard disk becomes corrupted by
a disk-head crash; this is usually due to the computer being
suddenly moved when the disk is rotating, causing the disk head to
crash into the surface of the disk and can render the whole disk
instantly useless. Another example is when files are accidentally
erased, or whole areas of the disk are attacked by a virus. This list
is not exhaustive but identifies some of the main worries of a
computer user.
Archive
Archiving data is the process of copying data from hard disk drives
to tape or other media for long-term storage. This is often used to
free hard disk space by off-loading seldom-used data to backup
tape or other media. An example of this would be to archive last
year’s accounts when they had been finalised. This year’s accounts
have already been started with carry-forward figures and it is only
accountants and VAT inspectors, for example, who wish to see last
year’s. They can usually be easily recovered for that purpose. But
accounts for the previous 10 years are usually archived and
Recovery
Storage methods
Most servers have built-in tape drives to allow backup to take place
easily. The mention of tape does not mean large reel-to-reel tape
machines with ½-inch data tape moving from reel to reel. Such
tapes were essentially analogue tapes (like VHS video and audio
tapes) and nowadays we use digital tapes called DAT tapes. The
older ones store around 2 or 4 GB of data and are like an audio
cassette, but the modern ones can store around 20 or 40 GB and
are more like a short video cassette in size and shape. Some
organisations backup onto USB hard drives which plug into the
computer’s USB port (USB2 is very fast). The advantage of these is
that they are often the same capacity as the drive they are backing
up.
A version of a week’s work will then be the full backup set plus the
incremental tapes made during the week. It is important that
these tapes are kept together and clearly labelled. If using the
Grandfather, Father, Son method then a set of tapes is required for
each generation. A generation may last longer than a week; a
month is quite common, with weekly incrementals. A school may
keep four generations of a full backup and then weekly
incrementals and that way a pupil’s work can be recovered right
back to the start of the year when they accidentally deleted the
most important essay they have ever written. When the rotation
period is complete then the rotation starts again.
Upgrade strategy
Future proofing
you are into a cycle and the only option is to upgrade. It is not
possible to predict the future other than to say it is unpredictable.
Software strategy
Software evaluation
Usability – This can be simply the look and feel of the software,
whether tabs or buttons are used and whether standard menus or
specific menus are used. Usability can also mean what choices one
has in the menus (e.g. you expect to find cut, copy and paste in
the edit menu and no other) and also whether the software does
what you expect it to.
Training
User support
Manuals
There are several types of manuals available for application
software:
Help desk – There are two types of help desk: internal and
external. They both provide support information on how to use
the information system or software. Sometimes the company that is
the end user of the software and focuses on solving low-level user
problems operates an internal help desk. These problems can
usually be solved very simply and do not require a complex
understanding of the information system.
Data files, which may be more valuable than the computer system,
must be compatible with upgraded software, and upgraded
software must be compatible with the current hardware, or else
that will need to be upgraded also; and so the cycle continues.
As you can imagine with data files with different structures, users
wanting different reports from their data, some users wanting to
use archived data for analysis and other users only being interested
in the immediate transactions, different techniques for archiving
and interrogating the data have been developed. These are data
warehousing and data mining.
Data warehouse
Data warehousing has been around since the 1990s. The idea
behind data warehousing is that historical data, mainly from past
transactions and orders that the company has carried out, are
separated out from the business.
Data mining
Data mining has been defined as ‘The non-trivial extraction of
implicit, previously unknown, and potentially useful information
from data’. It uses machine learning, and statistical and
visualisation techniques to discover and present knowledge in a
form that is easily comprehensible to humans.
30. What does data warehousing mean and why may a company
decide to warehouse data? 2
Total marks 76
SECTION 3
Word processing
Spreadsheet
Database
Graphics design
Browsers
Browsers are programs that allow users to retrieve information from the
Internet. You may think it strange that we use the plural when the only
browser you may ever have seen is Explorer, but there are others. A
browser’s main use is to display and navigate the World Wide Web by
displaying web pages as text, graphics, animations and hyperlinks, all of
them written in code (actually HTML and XTML). Browsers support
other functions such as allowing the user to bookmark favourite web
pages for quick retrieval at a later time and they also maintain a history
of websites visited. There are also navigation functions such as forward
and back buttons, and a stop and refresh buttons.
Originally the dominant web browser was Netscape (where terms like
‘bookmark’ as opposed to ‘favourite’ originated), which eventually lost
E-mail client
This is a program which allows a user to write, send, receive and read e-
mail messages.
There are in fact two different ways of using e-mail, on-line and off-line.
In an off-line e-mail program like Outlook Express you can compose and
read e-mails without connecting to the web, but in order to send and
receive messages you need to log on. The messages are then sent and
any new messages are downloaded into the mailbox where the user can
read them after disconnecting from the web. The disadvantage of this
method is that there is usually not much security and viruses can be
downloaded along with the e-mails. The advantage is the low cost of
connection time.
Chat client
This is a program which allows users who are connected to the Internet
to send and receive messages interactively. There are several
generations of chat client. The first allowed written conversations in
which participants entered their comments using the keyboard and read
the replies in a window on their screen. A development on this
generation was the introduction of Instant Messaging; allowing users to
be informed immediately when a friend on their chat list logged on to
the Internet. Another development of chat clients was the introduction
of voice-based messaging. This allowed users to communicate through
the chat client in a similar way to using the telephone.
Presentation
This is software which allows the user to create slide shows that can be
shown on a large screen via a data projector. Current versions of the
software can incorporate text, graphics (real photos, clip art, etc.),
sound clips and animations. Slides can be printed onto paper with 3 or
6 to a page so that the audience can have a copy of the presentation.
The slides can also be printed A4 size onto acetate slides for use on an
overhead projector. If you wanted to create a graphic slide presentation
you might buy Microsoft PowerPoint or Apple’s Keynote.
Reference
Financial
Web authoring
This type of program allows users to create web pages very easily
without needing to know how to use the programming language HTML.
It has developed to a level where whole websites (sometimes involving
hundreds of pages) can be managed and designed very quickly and
simply. Web pages and sites can incorporate text, graphics, animations,
audio files and full video. However, one problem is that new file formats
can be introduced and the web-authoring software cannot recognise
them. An example of this was when MP3 overtook Real Player format
audio files and all the packages had to release new versions with support
for MP3, which also tidied up lots of other loose ends. Examples of web-
authoring software are DreamWeaver from Macromedia, Adobe Go-Live
and FrontPage from Microsoft.
4. What type of software would allow the user to create and store
information? 1
15. What type of software allows the user to create and maintain
customer and supplier accounts? 1
Total marks 30
• Database
• Word Processor
• Desk Top Publisher
• Presentation Software
• Web Authoring Software
• Spreadsheet
There is nothing to stop you learning how to use all the packages and
then make your mind up which one to use.
Choose at least one task from List A and at least one from List B.
For the two tasks you have to submit for marking, hard-copy evidence in
the form of printouts should be included.
List A
Task 1
Make up one A4-sized page which is a newsletter about your favourite
celebrity, sporting hero or team. Your page should have three columns,
a suitable heading or title, and at least one graphic. Use the Internet to
help gather your information and graphics. After your graphic has been
placed on the page ensure that it is resized (either larger or smaller).
Plan out your page on paper before you start looking for information.
Task 2
You have been given the task of setting up a database to track and
analyse customer details for a large mail-order store. Here is some
sample data:
The next tasks are probably quite difficult to perform using database
software and you may wish to try the entire task in a spreadsheet and
compare the functionality of the two packages.
• Calculate the total and average order value for each branch and
overall.
Task 3
Make up a small website of between three and five pages on a topic that
interests you. Include as many graphics as you need and try to
manipulate at least one graphic using graphics software (change the
brightness and contrast or apply a filter or texture to the graphic).
If you are going to submit this task for assessment please print out your
finished pages.
List B
Task 4
Using presentation software, create a presentation of several slides using
text and graphics and, if possible, sound. Some ideas are:
Task 5
Create a spreadsheet to track a small league of eight teams over three
weeks. You will also need to make a small table to show the results of
each week’s games.
Each week the league must be updated with the points and goals scored
and sorted in order of points and goal difference.
The headings you need are: Team Name, Games Played, Wins (3 points),
Draws (1 point), Losses, Goals For, Goals Against, Goal Difference,
Points.
Again, if you wish to submit this task for evidence then include a
printout of each week sorted as evidence that you have completed the
task.
Classes of software
The real differences between the two are that WP tends to be used
mainly for generating text, while DTP tends to use pre-prepared
text. Although a package like Word has very good graphics
facilities and can handle a mixture of text and graphics reasonably
well, DTP manages to handle text and graphics far more easily. WP
can deal with multi-page documents but when working with a large
document it can take a while to move between pages and text
tends to spill onto pages when you don’t want it to. DTP handles
multi-page documents far better with a display whereby a click
takes you to a page and what is placed on that page stays there
until you decide to move it. DTP files tend to be very large
especially if real pictures are used.
Mostly the reasons are to do with cost and availability in that the
cost of data projectors, used to project presentations on a screen,
has tumbled dramatically in recent years to the extent that
electrical retailers are aiming them at the domestic market.
When it comes to web authoring software, not only has the choice
of packages increased and the cost dropped but many more people
Project management
Once all the activities have been defined, the software can output
the project plan in a variety of formats. Two of the most common
are Gantt and PERT.
Document-processing software
Word processing deals with the basic entering and editing of text and
the data objects associated with a word processor are characters,
words, paragraphs (between two return characters) and graphic objects
embedded in the text.
Operations
Formatting functions are found mostly in the Format menu and also on
the icons on the menu line with B I U on it. You can format the text by
changing its font, size, colour and style. Paragraphs can be centred, left
or right ranged, or fully justified and numbered, and bullet lists can be
created.
Desk-top publishing
As you can see we now have the basic File, Edit, View, Window and
Help menus, which contain very similar functions to Word.
However we now have Layout, Type, Element and Utility menus,
which contain most of the formatting functions. There is also a
Toolbox with the very important arrow and Text tools as well as
basic drawing tools, and a colour palette.
Page layout – deals first with the size and aspect of the page and
the size of page margins. Within a document it then deals with
setting margins, inserting headers and footers, and the number of
columns of text on a page. This can be global (affecting the whole
document) or local to a particular page.
There are different ways in which the graphic can behave on the
page. It can sit all by itself with white space above, below and to
either side, but sometimes that is not the desired effect.
This effect is called ‘text wrapping’. The graphic below has been
formatted with ‘Tight’ selected from the Layout Tab in the Format
Picture box in Word. The text then flows around the graphic and
allows us to describe what is happening in the picture around it or
down the side.
Style sheets – The style-sheet feature allows the user to vary font
styles, which can then very quickly and easily be applied to sections
of the document. Usually some styles (such as headings and body
text) are predefined, but users should be able to amend these
styles and add their own.
Size of text can vary depending on the context of its use. If you
need a heading or headline you want your text to be large and eye-
catching. If you have a document, such as a newspaper, which has
multiple columns, then you need to reduce the font size slightly to
allow enough words to fit on each line, to make it legible and easy
for the reader to absorb.
Font selection – Two basic categories of font are serif and sans
serif. Serif fonts are typefaces characterised by short marks
stemming from the upper and lower strokes of the letters; for
example, the thin-to-thick stroke transitions that can be seen on a
Times font. Sans-serif fonts do not have this feature: the stroke of
each character is of an equal thickness, as seen on a font like Arial
or Helvetica.
Page structure
Incorporation of graphics
Web authoring – Good web pages rely on graphics for their impact
and to exemplify the text. However, the author has to be careful
that the graphic is not included simply because there is an area of
the page or screen that is empty. It is best to avoid this temptation.
The rule to follow is only to insert a graphic if it adds to the
meaning of your web page. Do not be tempted to include silly clip-
art. Graphics cannot be placed directly on a web page. Space
needs to be set aside by whatever method the software requires
and a link established to the graphic. All graphics in web pages are
linked to that page and you cannot copy and paste them in. For
this very reason it is also possible to link to sound, animation and
video files, although care must be taken with these too, as they can
be very large and for many Internet users low bandwidth is still a
problem (e.g. dial-up as opposed to Broadband). Because the files
are linked to the website, it is important to keep them in the same
relative position, for example keep the pages and all files in the
same folder, if they are then to be put onto the Internet as a
website.
Presentation style
Navigation – Web pages can be linked together and when they are
displayed in a browser the main method of moving between pages
(or different parts of a page) is by hyperlinking. When you are on
the web you can set yourself a home page to which your browser
returns when you click on the icon for home. You can also use the
forward and back buttons on the browser and favourites
(bookmarks) and history icons to help navigate. (It is good
practice to include a home link on every page of a website to take
the reader back to the home page of the site.) Presentation
software usually lets you move on to the next slide by clicking the
mouse. You can also use the navigation button to select a slide to
go directly to. Depending on whether transitions have been used
the mouse click will usually invoke the transition.
Spreadsheets
Spreadsheets deal with the basic entering of numbers and text into cells
or groups of cells. Formulae can be applied to cells or groups of cells
and the data objects associated with a spreadsheet are cells which can
contain text, numbers or a formula.
Operations
If we look at the menu options in Microsoft Excel then we can see where
we are going to find the operations that can be performed.
View menu – the ways in which you can view the file, including headers
and footers.
Insert menu – rows, columns, worksheet and most importantly
functions.
Format menu – contains options whereby you can format cells including
numeric formatting like currency.
Tools menu – Spelling, Protection Macros and of course options and
customise.
Data menu – Sort, Filter and Pivot Tables.
Window and Help menus – much as in other Windows applications.
Formatting functions are found mostly in the format menu and also on
the icons on the menu line with B I U on it. You can format the text by
changing its font, size, colour and style. Cell contents can be aligned
left, right or centred and one of the most powerful menu functions, the
autosum, is one of the icons. Numeric cells can be formatted in a wide
variety of styles to do with numbers (percentages, currency, fractions,
etc).
Advanced functions
Count – This counts the number of cells that contain numbers and
numbers within the list of arguments. We can use COUNT to get
the number of entries in a number field in a range or array of
numbers.
they pass a practical test with 15 or more out of 30. This will give
us:
=IF(exam mark>=35,IF(practical mark>15,pass,fail),fail)
Project management
May 2003 April 2005 May 2006 Jan 2007 April 2007
Design Build Fitting out Decorating Occupation
and
furnishing
Resource allocation – There are software tools that help users find
the best way to allocate scarce resources. The resources may be
raw materials, machine time or people time, money, or anything
else in limited supply. The ‘best’ or optimal solution may mean
maximising profits, minimising costs, or achieving the best possible
quality.
The tools are generally called a resource allocation solver and are
found with a good project management package. To use a
resource allocation solver, the user must build a model that
specifies the resources to be used using decision variables, the
limits on resource usage called constraints, and the measure to
optimise called the objective. The solver will find values for the
decision variables that satisfy the constraints while optimising
(maximising or minimising) the objective.
Task Duration 1 2 3 4 5 6 7 8 9 10
Define the Problem
Feasibility Study
Gather Data
Analyse Data and Develop
Logical Design
Write systems analysis report
Contacts – This part of the PIM software lets the user record all the
important details that allow him/her to contact a person. It can be
thought of as a very comprehensive address book.
Calendar – This part of the PIM application lets the user keep a
diary of events, meetings, appointments and activities.
Task list – This is also called a ‘To-do list’. It keeps a list of all the
tasks that require to be carried out and reminds the user when
each task is due to be completed.
Evaluation of software
Range of data objects – Each type of software will deal with different
objects as we have seen already above. But even with a word processor
or database one may be interested in the type of graphics files that can
be used in documents or records. Graphics programs would need to
support bit-mapped, JPEG, GIF and even animated graphics files. Web
design software would have to support graphics and then audio and
video with formats such as MP3 and QuickTime video needing to be
considered.
On-line help and tutorials – On-line help and tutorials are nowadays
found in most packages. Paradoxically enough, on-line here does not
mean on the Internet; it means within the program and contained on
the computer. The picture is clouded somewhat with much on-line help
now being displayed as web pages in your browser but locally on the
computer and not on the Internet. Both help and the tutorial should be
examined closely to see how good they are. Some manufacturers
effectively provide the software manual as a help file, which is
searchable. This can save you having to buy a manual.
(a) Timelining 1
(b) Resource allocation 1
(c) Gant and PERT charts 2
(d) Critical path analysis and optimisation 2
(a) Communication 2
(b) Contacts 2
(c) Calendar 2
(d) Task lists 2
Total marks 52
• Word processor
• Desktop publisher
• Presentation software
• Web authoring software
• Spreadsheet
There is nothing to stop you learning how to use all the packages
and then make your mind up which ones to use.
Complete all three tasks below but only provide printed evidence
of one of them. This could be the entire document for task 1; or a
printout of web pages or slides (6 to a page would be adequate) in
task 2; or in task 3 two printouts of your spreadsheet showing the
data in one and the formulas in the other. Your tutor may give you
alternative or equivalent tasks instead of the suggested tasks below.
Using the criteria below, evaluate either Word Processor and DTP,
Presentation and Web Design, or Database and Spreadsheet, comparing
the two chosen packages to find out which was better for the task
chosen above.
Criteria
Use the Software Evaluation sheet that your tutor will give you to help
you complete this task. You may be asked to write your evaluations by
hand or the form may be made available to you electronically so you can
fill it in on your computer.
SECTION 4
Implications of ICT
Social implications
We can have access to the Internet in our social lives as well with
libraries having Internet access points and Internet cafes still being
popular. Bars often have Internet access points and if you have stayed
in a ‘big’ hotel lately you will find that the rooms have Internet access
points for your laptop to plug into.
Many people expect Internet access when they go on holiday and many
hotels and apartment complexes advertise Internet access as a desirable
feature, but many of us think that we go on holiday to get away from it
all and are willing to let the e-mails pile up until we get home.
An interesting fact emerged in the late 1990s that ‘there are more
telephones in the city of New York than in the entire continent of
Africa’. After a little research it was found that now the gap has not
narrowed but widened, presumably because of mobile phones.
buy the latest products through on-line shopping. They are able to
follow computer-based learning and skills training courses at home, and
look for jobs that are advertised solely on the Internet. They tend to
find it easier to get well-paid jobs and will enjoy a more comfortable and
secure life-style.
The information poor don’t have easy access to computers and don’t
have the IT skills and confidence to take part in teleshopping,
telebanking, Internet chat and news groups. As corporations like the
BBC seek public opinion on current matters increasingly via the
Internet, the voices of the information poor may not be heard. The jobs
on offer to them will be less skilled, paid less and much more insecure.
The information poor will have to work longer hours just to survive and
will have less leisure time. Gradually the difference in access to
information may create a real social divide between the materially rich
and materially poor.
One effect of high levels of unemployment has been that families feel
more secure with two wages coming into the family. This has meant that
more and more mothers have careers. As a result, they may not have
any children till they are thirty or older and even then they may only
have one child because they do not want, or are afraid, to interrupt their
careers.
Although this change in family patterns may only be indirectly and partly
caused by computerisation, are there any risks to the family and to
society as a whole from this development?
There have been qualifications in computing since the early 1960s, but
these were solely in universities and colleges. And it was well into the
1980s before there was enough content to teach computing degrees that
were able to concentrate on computing subjects and not need lots of
Maths, Physics and totally unrelated courses like Philosophy and Law to
fill out the degree course. It was not until the mid-1980s that computing
was available in schools and not until 1999 that the two strands of
software and hardware divided into Computing and Information
Systems. Now there are many different courses offered at degree and
NC level all related to ICT.
Knowledge workers
Of course there is not always a clear dividing line between the two, but
the distinction can be a useful one when starting out. It can be
particularly useful in helping people to understand that everyone is a
knowledge worker to some degree, and knowledge work is everyone’s
responsibility, not just that of a few people with ‘information’ or
‘knowledge’ in their job title.
Online retail
For many of you reading this, Internet shopping is already here. When
eighty 16–18 year olds were sampled recently, sixty of them (that is
75%) admitted to buying something online. In the same survey eighty
adults (aged 24–60) were sampled and only 17 admitted to buying
something online. The young people went for music, DVDs and the top
buy was hair straighteners. The adults’ top buy was holiday-related
items.
Regular and repeat orders were for grocery shopping and books among
the adults whereas the young people tended to make one-off purchases
(apart from some games and skateboard-related merchandise).
The price shot up and he then sold his own shares at a huge
profit, but the US financial authorities were not happy,
claiming Jonathan had manipulated the market. Jonathan
eventually settled out of court with the authorities – he paid
back $300,000 of the money he had made, but kept half a
million dollars.
Legal eagle
Privacy
In fact they do have the power, and the security services generally
do scan our e-mails, text messages and mobile phone calls, by
using computers which look for the digital patterns representing
key phrases used in terrorist and criminal activities, thus allowing
the police to apprehend suspects based on these calls and mails.
When the FBI announced that they had found over one thousand
paedophiles living in Britain because they had accessed Internet
sites in the USA and traced them by tying in their computer’s IP
address with the phone number that had been dialled from, there
was general disbelief that they had managed to do that, and then
delight that such people could be caught in this way.
The original Data Protection Act was introduced in 1984 to set out key
principles (rules) to regulate the collection, storage and use of personal
data. This law was introduced to protect and give rights to individuals
who might feel their personal data was either incorrect or being
misused. The law was updated in 1998 to cover some of the
inadequacies of the original act and in the light of new technology and
political circumstances relating to European legislation.
The Act contains eight principles, which apply to all personal data
processed by data controllers (the people who hold the data).
There are some types of data that were and still are exempt from
Registration. These are known as conditional exemptions and are:
• Mailing lists (names and addresses) that allow the data subject to
receive information
• Data used for calculating and paying wages
• Information used for club memberships
• Data used by a data subject at home.
Rights of data subjects – As well as the eight principles, the Act gives
rights to individuals (data subjects) in relation to personal data which is
held about them by data controllers. An individual has the right to see
any personal data stored either electronically or manually about them.
The data controller may ask that a small fee be paid to cover their costs
in providing the data. As well as the right to see their personal data, data
subjects have the right to have their data corrected if it is inaccurate.
They also have the right to prevent their data being used by companies
to send them junk mail.
Changes from 1984 Act – The 1984 DPA had certain shortcomings
that unscrupulous companies exploited. For example it only
covered data in electronic form and companies used printed
mailing lists and photocopied names and addresses onto labels to
circumvent the DPA. It also had no European or worldwide
dimension and there was no obligation on any data user to tell the
data subject that they held any data about them. The 1998 Act
covers the transmission of data in electronic form, which was not
really an issue in 1984, and harmonised the European Union data
protection legislation. It also made it a requirement of the Act to
ask for the prior consent of data subjects to have data held about
them, and that included paper-based records.
The first section deals with ‘basic hacking’, which is getting access to a
computer system, data or a program without permission. If for example
a pupil finds the teacher’s password and uses it to access the school
computer system, even though no damage to files or data has been
done, that is still a crime. This section of the Act only covers
The third section of the Act covers ‘expert hacking’, which is the
modification of data on a computer system without permission. It is this
section that covers the deliberate planting of viruses on a computer
system. It also covers the deletion or modification of another user’s file.
It could also apply to a person who changes the system setup files on a
computer, without permission.
Earlier in this pack the issue of software copyright was introduced. The
copyright laws also apply to other published materials as well, whether
in the form of music, film, pictures or books, etc. so this is actually a very
large and complex act. We only really need to concern ourselves here
with a part of the Copyright section of the Act.
There is software available which allows the user to capture and save
complete websites. It must be borne in mind that to use that web
content for any purpose at all may be illegal.
This Act provides for, and regulates the use of, a range of
investigative powers by a variety of public authorities, such as the
Police, Special Branch, GCHQ and MI5. It updates the law on the
interception of communications to take account of technological
change such as the growth of the Internet. It allows organisations
to monitor employees, e-mail and web usage. It also provides
powers to help combat the threat posed by rising criminal use of
strong encryption to try to break into electronic transactions.
Needless to say the regulations relating to health and safety are vast and
cover every conceivable work situation, but we are only concerned here
with issues such as seating, lighting, RSI and radiation as well as
employers’ responsibilities.
The Health and Safety at Work Act 1974 has been updated to include the
Management of Health and Safety at Work Regulations 1999.
By the 1980s computer monitors were smaller and working with much
lower power consumption and output. The trend has increased until
nowadays, and there have been shields built into the monitors so that
now radiation does not escape. A common point of escape was from the
back of the monitor, the screen acting as a shield; but people who faced
the back of a monitor for prolonged periods (all day, every working day)
could suffer from problems. The routes of escape have now been sealed
on modern monitors and there should be no danger of illness caused by
radiation when using modern equipment.
Jobs in ICT
Most jobs in ICT require that some further education and training is
carried out after leaving school. The minimum qualification for
professional jobs is probably at HND level although an IT-related degree
gives access to the best jobs. There are development personnel such as
systems analysts and programmers and operational personnel such as
operators and support staff who keep the systems running.
Generally a cost accountant would work out just how much more
profitable an employee became after using ICT and as we have seen this
can be a combination of earning more money (telesales as opposed to
mail order), saving the company money (producing accounting
information) and doing jobs that could not be done before (statements
and letters). All these factors build up a picture of productivity and
profitability of an individual.
It would have been a huge step for the first computerised but-
paper based mail-order company to move over to a call centre and
telephone ordering tied in with an ‘intelligent warehouse’. They
would have made an exhaustive economic feasibility study to see if
they would gain a competitive advantage over their rivals. Maybe
they did, but was it an even bigger leap of faith to be among the
first companies to introduce Internet ordering?
Business costs
These initial costs can be very high but the pace of competition in
the marketplace can often dictate that companies invest the money
needed.
Netiquette
This is a user’s guide to the polite way you use the web and e-mail,
whether on the Internet or an Intranet. It should be relevant for both
personal and business users, and the more public the forum (an e-group
or office internal e-forum), the more the user should be aware of and
follow basic netiquette. It comes in the form of general and then some
particular recommendations.
2. Do not leave the Subject field blank. Always fill in the Subject field
with a brief and concise description of the content of your e-mail.
This is very important in helping those you communicate with to
organise and manage their e-mails.
7. Do not use Return Receipt Request (RR) for each and every
personal e-mail you send because you like ‘knowing’ when
someone opens your e-mail. Not only is this annoying to the
recipient, this feature is intrusive especially in an on-line discussion
forum or e-group where hundreds of people can get that RR.
Censorship
Your tutor will tell you if and when s/he wants you to undertake these
tasks (maybe after the questions). The tasks are suitable for
Intermediate 2 and Higher candidates, but a greater depth of coverage
of the topic is expected from Higher candidates.
Task
Higher – Either on your own or in a small group make up a
presentation or website. Aim to produce about 20 to 30 slides or 5 to 9
web pages and give examples.
6. Under the terms of the Data Protection Act 1998 explain what is
meant by:
7. What are the three misuses covered by the Computer Misuse Act?
(Do not answer in terms of ‘hacking’, etc.) 3
11. Explain how new ICT in a business can affect the productivity
and profitability of individuals and the company. You may need
to write a paragraph about this. 4
13. Explain why intellectual property rights are important and give
an example of where this is important. 2
Total marks 33
Total marks 32
SECTION 5
Web links
www.bsa.org
The Business Software Alliance provides reports and information on
international software piracy.
http://cyberethics.cbi.msstate.edu
Cyberethics: A good selection of resources on computer ethics,
including case studies.
www.nd.edu/~rbarger/cases.html
A large selection of case studies regarding ethics, posing some excellent
questions and discussion points.
http://library.thinkquest.org/26658
An interactive guide to computer ethics.
http://www.school.za/teachers/index.htm
The ten commandments of computer ethics.
www.legislation.hmso.gov.uk/acts/acts1998/19980029.htm
The text of the Data Protection Act 1998.
www.hmso.gov.uk/acts/acts1997/1997050.htm
The Police Act 1997. Describes the role of the National Criminal
Intelligence Service, which is entitled to authorise activities such as
tapping telephone lines.
http://www.hmso.gov.uk/acts/acts2000/20000007.htm
Information on the Regulation of Investigatory Powers Act.
http://www.legislation.hmso.gov.uk/acts/acts1996/1996031.htm
The Defamation Act 1996.
http://www.hmso.gov.uk/acts/acts2000/20000007.htm
The Electronic Communications Act 2000.
http://www.bcs.org/
The British Computer Society’s code of conduct and practice.
www.cio.com/forums/ec
CIO Magazine: An e-commerce resource centre.
www.ecommerce.ac.uk
E-commerce innovation centre at Cardiff University provides interesting
case studies and basic explanations of concepts and terms.
www.ft.com/ftit
Financial Times IT surveys: An excellent set of monthly articles based on
case studies.
http://ecommerce.about.com
About.com is a portal for all aspects of e-commerce.
http://www.faqs.org/faqs/
Internet FAQ Archive. This archive contains Usenet Frequently Asked
Questions (FAQ) postings in HTML format and in text format.
Bibliography
Recommended texts
Class of software:
Range of operations
Formatting functions
On-line help
On-line tutorials
ANSWERS
Total marks 22
8. (a) Explain why a hard disk is the preferred storage medium for
data processing applications.
It provides fast random access to data.
1 mark
(b) If users wish to carry quite large files from work to home,
what backing storage device are they likely to use?
A memory stick (or flash memory).
1 mark
11. Explain why an organisation needs a network strategy and state the
five areas it needs to address.
It needs a strategy for planning how to set up a network and to
manage effectively its distribution of data.
The five areas are Data Transfer; Distribution/coverage; Access;
Security; Facilities.
1 mark to explain why strategy needed and 1 mark for listing
all five areas. 2 marks in total
Total marks 33
30. What does data warehousing mean and why may a company
decide to warehouse data?
Historical data is removed from the main company’s
activities to free up disk space and make the system more
efficient.
1 mark for description, 1 mark for reason
Total marks 76
1. What type of software would you use for editing and manipulating
text on a page?
Word processing. 1 mark
4. What type of software would allow the user to create and store
information?
Database. 1 mark
15. What type of software allows the user to create and maintain
customer and supplier accounts?
Financial. 1 mark
Total marks 30
Total marks 52
5. Give one advantage and one disadvantage both to the retailer and
to the customer of on-line shopping.
From bullet points in notes.
1 for each advantage or disadvantage
6. Under the terms of the Data Protection Act 1998 explain what is
meant by:
(a) Data protection principles
These are basically meant to protect individuals from IT
abuses. 1 mark
(b) The rights of the data subject
These are to see data about themselves, and have it corrected
if untrue. 1 mark
(c) The responsibilities of the data controller
These are to register data, allow inspection by data subjects.
1 mark
(d) The role of the Information Commissioner
To enforce the terms of the Data Protection Act. 1 mark
7. What are the three misuses covered by the Computer Misuse Act?
(Do not answer in terms of ‘hacking’, etc.)
Unauthorised access; modification of data; use of computer data
to help commit a crime. 1 mark for each point (3 in total)
11. Explain how new ICT in a business can affect the productivity and
profitability of individuals and the company. You may need to
write a paragraph about this.
Expect a short paragraph summarising the notes covering
productivity and profitability from both individual and company
viewpoint. 1 mark each (4 in total)
13. Explain why intellectual property rights are important and in ICT
give an example of where this is important.
To protect the producers of music, journals, etc. (1 mark)
published on the web (1 mark).
Total marks 33
Total marks 32