Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
ICT INFO 2
Transcript of ICT INFO 2
directly to a human Question 3(a) Describe, using examples, how data can arise. Transaction, taking money from a bank account, from phishing, making an online purchase; e.g. booking a seat on an plane.
Questionaire such as a shopping survey
Direct source e.g. counting cars as they enter a carpark
Indirect sounce e.g. using sales data from a credit card to do marketing Question 3(b) Give reasons why coded airport names are used in ICT systems. Saves time when entering data
Search times are reduced
Takes up less storage space
Easier to validate Question 4 Describe the characteristics of local area networks and wide area networks. LAN covers a small geographical area such as a building
WAN covers a wide geographical area such as a continent
LANs can be connected physically
WANs can use satellites, microwave links and under sea cables Section B Section A Question 5(a) The physical characteristics of the user would have to be considered for example if the user was very heavy, the interface would have to support him without collapsing.
The age of the user would have to be considered. Older users may have poor eyesight.
The environment of use would need to be considered. For example if theinterface were to be used outside it would have to be weather-proofed.
The task to be undertaken for example does the user need to step on and off the interface. Explain what the designers of the different types of interface would have to consider to enable players with different characteristics to interact with game consoles. Question 5(c) Discuss the possible consequences of playing computer games for individuals and society. There are positive and negative health risks to consider. People who spend too much time playing computer games can become obese through lack of exercise but if they make use of the fitness games then their health may improve.
There is the view that some games are not suitable for people below a certain age and that they can promote violence in the real world.
Playing these games prevents people from going out and meeting friends that could lead to a loss of social skills.
Also playing games rather than doing schoolwork could mean that children underachieve at school.
It is possible that using a games console may improve a person's keyboard skills/typing. Discuss the relationship between ICT systems and the enviroment Question 6 Candidate discusses relevant issues. Candidate shows a clear
understanding of the relationship between ICT systems and the environment. EXAMPLÉ ICT systems mean paperless offices - helping the enviroment, PDF files have become the de facto standard for communicating across different platforms - recent intro from Microsoft office 2007 of a 'Save file as PDF command'
Software companies provide a quick start guide and an online/electronic user guide rather than a user manual made of paper with 1oos of pages - saving resources, toner and printer ink as well as transportation costs of moving paper to the office.
New trend with online purchases show sending an email with a PDF file as confirmation of a purchase - Advantage, the file can be saved online, rather than having to print it out and having to file it away/store it.
Hardware facilities imporiving, need to recycle old equipment increasing so as to be replaced with new equipment; especially old CRT monitors, as new flat screens take up less desk space and less energy.
Manufacturing is now being made to take up less energy, but sometimes using scarce resources (disadvantage); and it's also bad that sometimes batteries are put into land fill - poisons ground, wildlife etc. Also has deangers of computer waste, i.e. chemicals getting into the water supply. The things that people use ICT for are changing all the time. Legislation and regulations have to keep up with these changes.
Discuss, using examples, how ICT legislation and/or regulations affect your life and suggest, with reasons, future improvements to legislation and/or regulations that could be needed. Question 7 (20 marks) High mark range
Candidate analyses how current legislation and/or regulations affect them and the changes that might be
needed in the future, clearly demonstrating an in depth understanding of these effects and changes.
Meaning is clear. The candidate has selected and used a form and style of writing appropriate to purpose
and has expressed complex ideas clearly and fluently. Sentences and paragraphs follow on from one
another clearly and coherently. Specialist vocabulary has been used appropriately. There are few if any
errors of spelling, punctuation and grammar. Text is legible. Discussion may include reference to the following or any other appropriate legislation/regulations:
• Data Protection Act
• Copyright Designs and Patents Act
• Regulation of Investigatory Powers Act
• Computer Misuse Act
• Health and Safety legislation
• Waste electrical and electronic equipment (WEEE) Data Protection Act Personal data shall be processed fairly and lawfully and, in particular, shall not be processed unless –
(a) at least one of the conditions in Schedule 2 is met, and
(b) in the case of sensitive personal data, at least one of the conditions in Schedule 3 is also met.
Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes.
Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed.
Personal data shall be accurate and, where necessary, kept up to date.
Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes.
Personal data shall be processed in accordance with the rights of data subjects under this Act.
Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.
Personal data shall not be transferred to a country or territory outside the European Economic Area unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data. Copyright Designs and Patents Act 1988 Introduced to protect the intellectual property of individuals and organisations that create and produce materials based on their own individual ideas. The act includes a wide variety of things such as Books, Articals, Music, Film, Games and software.
As the ICT industry has grown tremendously in recent years and copyright legislation is usefull in protecting some aspects of ICT such as... Software Piracy "This is the illegal copying of software for either personal use or making bulk copies for selling illegally. There is tremendous profit in this illegal activity as software that might cost hundreds of pounds can be copied onto a £1.00 DVD and sold at car boot sales or on the Internet. This activity has been reduced as outlets like eBay have tried to outlaw this activity on their auction sites."
ZigZag Education 2008 Theft "Of hardware and software ideas and innovations. In an industry that moves so fast there is seldom time to patent your invention before you release it on the open market. Many organisations purchase their rivals' products with the express purpose of copying their ideas, which save them considerable expense on research and development."
ZigZag Education 2008 Copying and downloading "materials such as music, video and text-based files for either personal or commercial reasons. Simular to software piracy where mostly domestic users copy their latest videos and music for personal use."
ZigZag Education 2008 Computer Misuse Act 1990 1. Unauthorised access to computer material.
2. Unauthorised access to a computer system with intent to commit or facilitate teh commission of a serious crime.
3. Unauthorised modification of computer material. 1. Unauthorised Access to Computer Material Examples:
- Using anothers person's identifier (ID) and password without proper authority in order to use data or a program, or to alter, copy or move a program or data, or simply to output a program or data
- Laying a trap to obtain a password
- In the educational context this could mean reading examination papers or examination results and in the commercial context it could be reading details of a Bank or Building Society's financial figures 2. Unauthorised access to a computer system with the intent to commit or facilitate the commission of a serious crime Includes using a computer to gain access to the finacial or administrative records of an organisation with the intention of committing a serious crime, such as fraud. It is difficult to get a successful prosecution in this offence as intent has to be proven. 3. Unauthorised Modifications of Computer Material Includes using a computer with the purpose of:
- Destroying another user's files
- Modifying system files
- The creation of a virus
- The introduction of a local or networked virus
- Changing financial information
- Deliberately generating information to cause a complete system malfunction