Pages in this set

Page 1

Preview of page 1
Chapter notes and key terms AS ICT

Chapter 1:
Data, information, knowledge and processing

Data information knowledge

Data is made up of alpha numeric characters
Information = data + structure +context + meaning
Knowledge is the application and use of information

Representation methods

Text (writing)
Graphics (pictures)
Sound (voice)
Animation…

Page 2

Preview of page 2
Validation and verification-neither can ensure accuracy of data

Validation ensures that the entered data is reasonable, complete, sensible and within
acceptable boundaries this is achieved by:
Range check, type check, presence check, lookup check, check digit, length check,
and picture check
Verification ensures that the source and object are the…

Page 3

Preview of page 3
Input, output and storage devices

Input: getting data external to the system into the system
Eg: keyboard, mouse, graphics tablet, scanner, digitiser, microphone etc

Output: getting data within the system out of the system
Eg: printer, plotter, monitor, speakers etc

Storage: holding/storing data
Eg: internal and external hard drives, CD/DVD,…

Page 4

Preview of page 4

Standard application/generic software

Word processing; letters, memos, reports
Desktop publishing (DTP): flyers, brochures, posters
Spreadsheet: graphs, modelling data- mathematical and objects forecasting
Database: handling data- searching and sorting
Web authoring: producing web pages
Presentation: creating slides- acetates or electronic

Systems

Personnel, stock control, invoicing, booking, timetabling, route finding, training.

Characteristics…

Page 5

Preview of page 5
Used to model objects; virtual presentation, use of layers, questions can be asked
Used for financial modelling: based on functions and formulae, variables and
constants can be used, `what-if?' questions can be asked

Variables, formulae, rules and functions

In a spreadsheet:
A variable is an identifier associated with a particular…

Page 6

Preview of page 6
Primary key-single field, unique identifier for the record
Composite primary key- where two or more fields joined together to make a
unique identifier for the record
Foreign key- primary key in one table, field in another table, used to join
tables together
Secondary key-used to index a field

Entities

Single…

Page 7

Preview of page 7
Problems with historic calculations

Data dictionary

Database about a database
Contains design details about the database
Includes table name, field name, data type, length, validation, relationships, security

Data types

Text/string: anything not requiring a calculation
Integer: whole numbers only, not telephone number
Real: numbers and decimal places
Boolean: one of…

Page 8

Preview of page 8
Create template document
Insert merge fields from data source
Checks merge fields with data
Complete merge.

Formatting documents

Page size, settings and orientation
Text position, size and style

Images and graphics

Bitmap images:
Made up of pixels
Quality is lost on re-sizing
File sizes very large
Deal well with complex…

Page 9

Preview of page 9
Computer and projector

Presentation navigation methods

Manual and automatic

Structure of a presentation

Non-linear
Hierarchal


Chapter 7:
The role and impact of ICT

Data protection act

1. Right to subject access
2. Right to prevent processing for direct marketing
3. Right to prevent if likely to cause distress or damage…

Page 10

Preview of page 10































Describe methods for combating ICT crimes

Physical
Locked rooms
Cameras
Biometric (fingerprint, iris scanner etc.)
Logical
Firewalls
Passwords-(minimum amount of characters/alphanumeric/change regularly)
User IDs
Up-to-date software
Education of users

Understand the advantages and disadvantages of networking computers

Advantages:
Work sharing
Resource sharing
10
Dovi Richman ICT AS
Notes

Comments

_Rukhsana

thankyouuuuuu

Similar ICT resources:

See all ICT resources »See all resources »