Holders of information

?
Name the different categories of holders?
Indivdual citizens, Business organisations, government, health care services, Charities and commununity organisations.
1 of 63
What are the different types of locations data can be held?
Developing and developed countries, urban and rural.
2 of 63
What is the digital divide?
The difference in access to digital resources in different areas of the world.
3 of 63
What are the different types of storage media?
Paper, optical media, magnetic media, solid state media.
4 of 63
What is optical media?
Music and film storage. Data is writen and read by a laser.
5 of 63
What is solid state media?
Stores sata and information in a circuitry.
6 of 63
What are the different characeristics of storage media?
Mutability, Robustness, Access to data, Cost, Storage capacity.
7 of 63
What are the different types information access and storage devices?
Handheld devices, portable devices, fixed devices, shared devices.
8 of 63
What are the additional characteristics of informmation access and storage devices?
Processing power, versatility and storage capacity.
9 of 63
What are the different types of internet connections?
Copper cable, Optical fibre
10 of 63
What are characteristics of internet connection types?
Speed of data transfer, range and data differences.
11 of 63
What are the different types of internet access?
Dial-up, broadband, fixed broadband, fixed wireless, satellite, wireless hotspots, mobile phones.
12 of 63
What are types of www technologies?
Internet, Intranet, Extranet.
13 of 63
What is the intenet?
Worldwide network of interconnected networks.
14 of 63
What is the intranet?
A network that is connected to the internet but only available to those within an organisation.
15 of 63
What is the extranet?
A website that provides restricted access to resources for an authorised set of users from outside the organisation.
16 of 63
What are the characteristics of the internet?
Public and open access.
17 of 63
What are the characteristics of the intranet?
Private and closed access
18 of 63
What are the characteristics?
Private and shared access.
19 of 63
What are the different types of information formats?
Web pages, Blogs, Podcasts, Streamed audio and video, social media channels, documents RSS feeds.
20 of 63
What are the different of information styles?
Text, Graphic, video, animated graphic, audio, numerical, braille, tactile images, subtitles, boolean ( yes or no), tables aand spreadsheets, charts and graphs.
21 of 63
Information classification
Sensitive, non senesitive, private, public, personal, business, confidential, classified , Partially and completely anonymised.
22 of 63
What are the quality of information characteristics?
Valid information, biased information and comparable information.
23 of 63
What is the importance of good quality information to stakeholders?
Help make informed strategic decisions?
24 of 63
Consequences of poor quality information on stakeholders?
Can lead to bad decisions.
25 of 63
What is the information management process?
Collect - store- retrieve- manipulation- processinng- analysis.
26 of 63
What is information?
Information is context.
27 of 63
What is data?
Data is information that has been coded and structured in some way, ready for processing storage or transmission.
28 of 63
What are the categories of information used by individuals?
Communication, education and training, entertainment, planning, financial, research, location dependent, benefits and limitations.
29 of 63
What are the cateogories of information used by organisations?
Knowledge management and creation, management information systems, marketing promotion and sales, financial analysis and modelling, contact management, decision making, internal and external communication, Big data
30 of 63
What are the stages of data analysis?
1. Identify the need, 2. define scope, 3. identify potential sources, 4. sources and select information, 5. select the most appropriate tools, 6. process and analyse data, 7. record and store information, 8. share results.
31 of 63
What are the different types of data analysis tools?
Data tables, visulisation of data, trend and pattern identification, data cleaning and geographic information system/ location mapping.
32 of 63
What are open and closed system characteristics, benefits and limitations?
An open system can interact with other systems to exchange information even if they have different platforms. A closed system cannot. A disadvantage of an open system is that it is not as secure as a closed system.
33 of 63
What are the different UK legislation and regulatory framework governing the storage and use of global information?
Data protection act, protection of freedoms act, privacy and electronic communications regulations, freedom of information act, computer misuese act, information commissioners office, copyright designs and patents act, equality act.
34 of 63
How is data protected outisde the UK?
Data sent from outside the UK must be sent to a countrie covered by the UK data protection act. In the USA they have the safe harbour scheme which if followed provides protection for UK data organisations have to sign up to this to transfered.
35 of 63
What is the UN Convention on the rights of persons with disabilities?
Information systems must be able to be accessed by disabled people.
36 of 63
What is Green IT?
An attempt to make computing more eco friendly.
37 of 63
What are the different types of information sources and data types?
Internal source, external source, primary data, secondary data, qualitative data and quantitative data
38 of 63
Whats the difference between qualitative data and quantitative data.
Quantitative data is data that has been gathered by measurement while qualitative is data that describes.
39 of 63
What is a data flow diagram
Data flow diagrams model how data flows through a system.
40 of 63
What is a Level 0 DFD?
Show data system in little detail but allow the user to get an understanding how data flows through a system.
41 of 63
What is a level 1 DFD?
Focus on one system and are therefore in more detail than a level 0 DFD.
42 of 63
What are the components that make up a DFD?
External entities, Processes, Data stores, Data flows, standard symobls used.
43 of 63
What are external entities?
Sources of the data that is inputed into the system and those whom data that is output is sent to,.
44 of 63
What is processes?
The ways in which data in a system is collected.
45 of 63
What are data stores?
Any real world store of data held in the system can be computerised database but could also be an inbox on someones desk.
46 of 63
What is data flow?
The flows of data between the entities and the processes.
47 of 63
What symbols are used?
Rectangle (EXTERNAL ENTITY), Smooth corner rectangle (PROCESS), Arrow (DATA FLOW), Box with line near the end (DATA STORE)
48 of 63
Rule 1
At least one input and output for each external entity.
49 of 63
Rule 2
Data flows in only one direction
50 of 63
Rule 3
Every data flow is labelled
51 of 63
Rule 4
Every data flow connects to at least one process
52 of 63
Rules 5
At least one input data flow and/or at least one output data flow for each process.
53 of 63
Impacts affecting the flow of information in information systems.
Human error, delays and breakdown in working relationships.
54 of 63
What are the three principles of information security?
Confidentiality, Integrity, Availability
55 of 63
What is confidentiality?
Information can only be accessed by those authorised to do so.
56 of 63
What is integrity?
Information is maintained so it is kept up to date, complete and fit for purpose.
57 of 63
What is availability?
Information is always available to and usable for those that need to use it.
58 of 63
What are risks for information security?
Unauthorised or unintended access to data, Accidental loss of data,Intentional destruction of data and intentional tampering with data.
59 of 63
Impacts if these risks were to occur.
Loss of intellectual property, loss of service and access, failure inj security of confidential information, loss of information owned by a third party, loss of reputation, threat to national security.
60 of 63
What are protection measures?
Having policies that allow data to be protected e.g. staff access limits only certain staff can access sensitive information
61 of 63
What are forms of physical protection?
Locks, keypads, biometrics, placing computers above flood level,backup systems in other locations,security staff and shedding old paper based records.
62 of 63
Logical protection methods?
final level of protection, e.g. tires levels of access to data ( e.g. only authorised staff), Firewalls, anti-malware apps, obfuscation, Encryption of data at rest and in transit and password protection.
63 of 63

Other cards in this set

Card 2

Front

What are the different types of locations data can be held?

Back

Developing and developed countries, urban and rural.

Card 3

Front

What is the digital divide?

Back

Preview of the front of card 3

Card 4

Front

What are the different types of storage media?

Back

Preview of the front of card 4

Card 5

Front

What is optical media?

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Global Information resources »