Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.
A2 ICT Revision
Transcript of A2 ICT Revision
3.4 The User Interface
Image by Tom Mooring
3.3 Software Development
A2 ICT Revision
3.2 Networked Systems
is when data is consistent and there is not more than two entries.
refers to the completeness and accuracy of the data.
storing multiple times in multiple locations.
is the type of data transparency that matters for a centralised DBMS.
What is a database?
A database is an organised, structured collection of relevant data. Main features (Tables, Forms, Queries, Reports)
The process of refining the structure of a database to
Entity-Relationships Diagrams (ERDs)
A diagrammatic representation of the relationship between entities.
Databases are designed using ERDs where tables store entities that share attributes.
Database Management Systems (DBMS)
The software used to manage the operation of databases.
Provide an interface between programs
Enable data protection- levels of access, passwords
Facilitate maintenance of data dictionary
Database Administrator (DBA)
A DBA will:
Decide how data is stored and organised.
Ensure data is secure
Ensure new users are given access to appropriate data
A DBMS must allow users to:
Maintain or update tables
Allow users to print information
Management Information Systems (MIS)
This is a system which is designed to provide managers with all the information they need in order to run their organisation effectively.
Factors affecting quality of information:
Up to Date
Importance of information
decision making on a daily basis.
responding to market forces and the actions of competitors
medium and long term planning
Purpose of a typical MIS:
Convert data into information
Ensure information is communicated appropriately
Sources of Information
This is data whose source and destination are within a single organisation.
Data created within an organisation then outputted to an external destination
Decision Support Systems
Supports a variety of decision making processes and styles
Assists decision making within dynamic business conditions.
A set of integrated tools designed to help in problem solving
An application that carries out a task near the skill level of the expert.
Limited to a certain area
Capable of learning from experience
Based around rules, facts and principals
a source of facts, rules and principals from a given field
solves a problem by applying the rules and knowledge already in the system to the facts that are entered concerning the problem.
includes menus, graphics and facilities for explaining the systems reasoning
Threats to Data Security
Threats from the internet
Unauthorised access to premises
Managing security in a DBMS
User ID/ Passwords
Access Rights and locking
Auditing and accounting:
software automatically maintains a log of all database activity. Changes can be undone to restore the original data.
Disaster Recovery Planning
Def:A self contained section of a security policy that describes how all data can be recovered in the event of a natural or man-made catastrophe
Ensure all files are backed up at intervals
State how long backups are held
State how and where
State the media used
Full Periodic Backup
All data files being copied to a separate portable storage device at regular intervals
Time consuming recovery
Transaction Logging and the Grandfather- Father-Son Cycle
A continuous record of all transactions made on a particular day
Involves backing up of all files that have changed at set intervals
Saving work on a primary and a secondary server to provide duplicate storage.
Cannot recover data when it has been lost
A field that is used to uniquely define a particular record in a table.
A field in one table which is the primary key of another.
Used to establish a relationship between the tables.
A disaster recovery strategy should:
state the key business functions to be recovered.
state the contact details appointed to help
state the hardware, software, communications, data, personnel, essential for the business
state the procedures to be followed before, during ,after a disaster
state how parts of the network and files will be restored
Types of Network
A client is a program or hardware device that requests a service from a server
a computer program which depends heavily on some other computer to fulfil a role.
as much software is held on client PCs and a central server is concerned with data storage
initiates data requests from a server
waits for a response + acts on it
connects to several servers simultaneously
waits for clients to request data
may accept connections from many clients simultaneously
doesn't interact with end users
Made up of nodes that are considered to have equal status
A P2P system:
the requesting peer (RP) sends a request for data to it's neighbours
the request is flooded through network + info about suitable peers is returned to RP
the RP initiates transfer directly from selected peers
downloaded files are held on the RP.
Easier to maintain
less expensive to install
if a single database fails data may become inaccessible
if someone gains unauthorised access to a central server they gain access to the entire database
a centralised database is useful to firms based on only one site
in a distributed database computers may be needed at headquarters to maintain sensitive data
Problems associated with remote access:
network response slows when WAN traffic is heavy
data is unavailable when a failure occurs on the network
Mobile and Wireless Communication
Open Systems Interconnection (OSI)
Detecting and correcting data transmission
Methods of ensuring data security
3.5 User Support and Training
Communication partners identified
Transforms data into a form the application will accept
Establishes, manages and terminates connections between applications
Transfer of data between end systems or hosts
Provides switching and routing technologies
Data packets are encoded and decoded
Provides the hardware means of sending and receiving data on a carrier.
defines a networking framework for implementing protocols
In each byte, 7 bits=data, 8th bit is parity bit.
At receiving end a check on each byte is performed and if parity has changed the receiver knows an error occurred.
Received data is transmitted back to the sender where it is checked against the original document
No way of knowing how and where the error occurred.
Access rights and Locking
Username and Passwords
Log on restrictions
Terminal locking and Password
prevents users from accessing data they don’t need to access.
form the most invisible part of many systems security.
restricts where the users can log on.
restricting login within working hours.
terminal can be locked. If forgotten a protected screensaver should activate.
make a PC or a network appear to not exist to unauthorised users to gain access through the Internet.
is used to store data that cant be decoded without a password.
The end user is involved in:
It is a linear model
Minimal resources required to implement
Documentation produced at each stage
Cant go back
Until the final stage of development cycle is complete a working model doesn’t lie in the hands of the client
prototype is built to understand the requirements.
Prototype is developed based on the currently known requirements.
Development of the prototype undergoes design, coding and testing
Rapid Application Development (RAD)
combines elements of the systems planning and analysis phases of the SDLC
a project must be planned + broken into smaller work tasks with time estimates.
must outline the risks: scenarios that could lead to project failing.
Staff availability :
will the right people be available to carry out the tasks?
project must be profitable, all spending must be justified+ development costs under control
team members must remain motivated and focused on the objective.
Computer Aided Software Engineering (CASE)
Normally contain components for:
Modelling a system: graphics tools can be used to construct DFDs + ERDs
Data dictionary development and control: data dictionary is a file containing a description of data structure
Interface generator: this allows the automatic creation of a user interface such as a menu, dialogue box and report
Developing new software
Errors can be detected earlier
Quicker user feedback
May increase complexity of the system
use a combination of JAD techniques and CASE tools
programming, application development, coding and system testing
SDLC implementation phase
Will be aimed at non-ICT specialists- is often used to refer to the user guide
A process of review must be undertaken to ensure its free of jargon.
Will rarely leave the developers unless it's been distributed to a partner firm
The Waterfall Model
Calculated by adding together all the bytes in a packet of data which is sent as part of the data.
It is then recalculated, if checksum is incorrect the data is likely an error
This connects computers over a small geographical area.
All network computers are equipped with wireless network interface cards (WNIC).
Radio frequency waves are used for communication information.
When a mobile connects to a network it communicates with the nearest base station.
records each event within a system
If a hacker enters a system everything they do is logged
Log files show what someone has did and when – if a person damages data they can be apprehended.
To meet formal or legal audit requirements
For billing purposes
For maintenance reasons
For security reasons
Improves software quality by performing error checking
Will automatically produce documentation
People who use computer systems on a daily basis.
European Computer Driving License (ECDL)
Training courses may be specific to the software they are using.
Software licences are often for a set length of time. If a company wants to continue using the package, regular fees must be paid.
Upgrade costs may be unavoidable
Server software upgrades may be required to permit the full functionality of modern applications for effective data sharing via a network.
A company has programmers on its staff and develops software internally
Satisfy unique business requirements
Require less technical development staff
Customising a Software Package
Purchase a basic package vendors will customise
Paying for the changes
Make your own modifications
software testing continues until agreement reached between developer + purchaser.
final stage before system is accepted. Testing system with data supplied by system purchaser.
package distributed to potential users who test and report faults