ICT Info 3

?
  • Created by: Zystra
  • Created on: 04-12-17 14:03
Sound Card
Converts digital sound to analogue so it can be heard
1 of 247
Digital Divide
As ICT is used more people who don't have access are at an increasing disadvantage
2 of 247
Digital Rights Management (DRM)
Set of technologies that allow copyright owners to get paid for use of their property (using encryption)
3 of 247
ISP
Internet Service Provider - Provides internet for individuals and firms.
4 of 247
Division of Labour
Allows workers to specialise and develop expertise
5 of 247
Span of Control
Too wide a control - lack of effiency... Too narrow a control wastes staff
6 of 247
Problems of big chains of command?
Take longer time and messages can be distorted.
7 of 247
Pyramid/Hierarchical structure
Everyone has a small span of control and is very centralised.
8 of 247
Advantages of hierarchical structure
Individuals responsibility are defined. Specialist managers are encouraged. Employees are loyal to their department.
9 of 247
Problem with hierarchical structure
Decisions take time to be made and implement. Communication can be poor. Senior staff remote to lower levels.
10 of 247
Flat structure
Fewer layers and span of control are wider. Employees have more responsibility
11 of 247
Advantages of the flat structure
More communication between management and workers. Less bureaucracy -decision making is easier. Lower costs with fewer managers.
12 of 247
Problems with flat structure
As departments are specialised, there may be poor communication between them. Managers can be responsible for several departments that they aren't familiar with. Top management have to wide a control (weak structure). Less prospects of promotion.
13 of 247
How has ICT has affected structures?
ICT give information on staff performance, making it easy for managers. Less data entry is needed. Middle manages have eroded because computers can do their jobs instead through systems.
14 of 247
What decides firms information needs?
Size of firm, Nature of firm (healthcare, banks etc) Management style (Autocratic vs Democratic)
15 of 247
Activities within a system
Order management system - allow businesses to manage distribution of goods in anautomated way. Allows them to track orders and control promotions. Provides reports on orders. Customer support - Can get extra sales so there shoiuld be focus.
16 of 247
Strategic Level
Highest level - consists of senior management and are decisions in the long term. Needs an overview of operation. Not much detail, big decision.
17 of 247
Tactical level
Middle management decisions who have operational managers reporting to them. Performance of organisation for monitoring purposes. Generally use graphs from MIS. Needs good forecasting etc.
18 of 247
Operational level
Lowest level done by workforce, usually done with data processing. Operational mamnagers need information on stock levels, working hours etc. Need lists and charts, usually done with computers. High detail, low value.
19 of 247
Extranet
an intranet that can be partially accessed by authorized outside users, enabling businesses to exchange information over the Internet in a secure way.
20 of 247
EDI
Electronic data interchange - Electronic data interchange (EDI) is the concept of businesses communicating electronically certain information that was traditionally communicated on paper such as invoices
21 of 247
Legacy system
Existing system of the organisation
22 of 247
Payroll system
Consists of records and calculations to work out payments and deductions for every employee of the business including tax etc. Needs to be known for Inland Revenue.
23 of 247
How can payroll be done?
Outsourced(Done by a specialist company), Inhouse (using specialist software), inhouse (hiring somone)
24 of 247
Human resources
Deals with employees, absences and employee history - helps produce statistics
25 of 247
Why don't people replace legacy systems
Expensive,disruptive to business, new system might not improve it.
26 of 247
Supply chain managment software
Streamlines all activities in its supply chain and efficienly uses transport labour to keep costs to a minimum.
27 of 247
Transaction-processing system
Deals with routine day-to-day transactions of an organisation (repetitive tasks such as sales, withdrawals from ATMs). Involve large quantities of data capture and updates quickly
28 of 247
Workflow
How a document moves in an organisation
29 of 247
Document approval workflow
A dcument passed between staff to be reviewed and approved (Such as in insurance)
30 of 247
Document managment system
Helps manage workflow (track, manage and store documents ) usually done by scanning.
31 of 247
Advantages of Document management system (3 reasons)
Can cross reference documents, Saves paper, saves time looking for documents.
32 of 247
Disadvantages of Document Management system (3 reasons)
Need to upgrade storage a lot, needs to be secure, can be complex to manage
33 of 247
Collaborative working system
People can work on the same document or file at the same time
34 of 247
Managment information system (MIS)
Uses operational-level data to provide management level information - combining internal and external sources into an easy to read format like tables and graphs. Helps manager make decisions.
35 of 247
Executive Information System (EIS)
Provides info for senior managers. Extremely user friendly and can 'drill down' on hot spots to help make decisions.
36 of 247
Enterprise Resource Planning system (ERP)
Integrated suite of software that supports and automates processes in big businesses. Deals w/inventory,shipping etc. Updates in real time. Improves efficiency of business as you can easily find loss making areas etc.
37 of 247
Customer Relationship Management (CRM)
allows a business to collect, update and maintain all of its customer data in one centralised location. This means the business acts as one- every past contact detail is held so service is personalised.
38 of 247
Decision support system (DSS)
Converts raw data into information which is used to make high quality decisions and solve problems. Outputs easy to understand info and can find negativ trends and allocate resources. Can drill down or use models to make decisions like giving a loan
39 of 247
E-commerce system advantages (3 reasons)
Cut costs on staff, no double booking, accessed from anywhere
40 of 247
E-commerce disadvantages (2 reasons)
Can't physically inspect items, Higher costs due to postage
41 of 247
Accounting
Formal record of all financial transactions
42 of 247
List the types of systems (12)
Payroll, Supply chain management, transaction processing, legacy system, Document managment, Collab working, MIS, EIS, enterprise resource planning, Customer relationship managment(CRM), Decision support system (DSS), Ecommerce
43 of 247
Back office system
System that runs a company's business administration processes behind the scenes (no customer contact)
44 of 247
Formal organisation system
Planned in advance, strictly adhered to. Management structure clearly defined and specific ICT technicians etc. Established project teams..
45 of 247
Methods of Formal Information Flow (5)
Formal meetings, Internal memos, noticeboards, presentations, intranet
46 of 247
Advantages of formal information flow
Quick communication, Use as reference (as it is recorded by org), Less prone to errors
47 of 247
What is formal information flow
Official ways of doing something such as an application, or a meeting.
48 of 247
What is informal information flow
It isn't structured and naturally arises from within the organisation
49 of 247
How can informal information flow occour (4)
Grapevine, phone calls, stories in press, conversations
50 of 247
Problem with informal information flow
Less accurate and reliable
51 of 247
How do you improve information flow (3 reasons)
Less bureucracy (to increase accuracy and speed), flatter structure, less employees.
52 of 247
How does nature of data have affect on data flow
More important info will be done formally in meetings or letters
53 of 247
How can email cause a data flow problem
People could forward too many emails or send emails to big groups which causes information overload.
54 of 247
What is a CIO
A chief information officer is a member of the executive board and acts as a ridge between business goals of org and implementation of goals using ICT
55 of 247
What do CIOs do
Manage IT resources, mapping out ICT strategy and policy such as procurement and future proofing as well as standards. Details how ICT is utilised.
56 of 247
Internal Factors which influence ICT strategy (6)
Business goals, Finance, Legacy systems, Geography of clients, Business fulfilment, structure of org.
57 of 247
External Factors which influence ICT strategy (2)
Compliance, Legal issues
58 of 247
How do Business Goals affect strategy
If Org wants to cut costs the strat might include replacing systems into more efficient ones. Supermarket might increase customers using POS tills. ICT strat might be to decrease volume of data input by employees etc.
59 of 247
How does finance affect ICT strategy
Small charities wont be able to afford big systems. Big businesses may have to phase the purchases over several years
60 of 247
How do legacy systems affect ict strategy
ICT system should read existing data files and software should be compatable with old software. Changing things makes users anxious and need training so it needs to work easily with old system
61 of 247
How does geography of clients affect ICT strategy
Small businesses wont have many sales in local areas however with ICT they can reach anyone with ecommerce.
62 of 247
How does business fulfilment affect ICT strategy
Business fulfilment is achieving businesses goals. Touchscreen systems can be used to quicken appointments or systems built to improve efficency
63 of 247
How does structure of org affect ICT strategy
Departments and how information is used need to be studied carefully. They might have regional managers which need dif info. Formal hierarchal structures req a method for speed. Design must account info flow such as email system
64 of 247
How does compliance affect ICT strategy
Officers of company need to comply w law. Laws might need companies to make new systems. They may need a CIO. Licesnsing issues, FOI act + computer misuse. Company need to train and improve security.
65 of 247
Legal issues
Auditors need proof businesses protect against ict misuse. They need to meet req of a auditor which means they need to store important info. Management need to check employees meet policies with audit trails but it can be expensive and slow processes
66 of 247
Why do orgs need to manage information assets over time (3 reasons)
Businesses grow, bigger volume of data, legal reasons
67 of 247
How can orgs manage older data (3 reasons)
Delete records, Archive Records, Expand storage space
68 of 247
Archiving
Storing records that aren't in day-to-day use offline in case it is needed in the future.
69 of 247
Why shouldn't you delete old records (4 reasons)
Customer might need it, To produce reports, Auditing purposes, Legal purposes
70 of 247
How can information be managed better
Using a filing system and folders. Automatically archive old records to have more data.
71 of 247
Procurement
Acquisation of hardware at the best price for the org - it can be purchased or leased to help achieve orgs objectives.
72 of 247
Future-proofing
Makes sure system has reasonable life and doesn't need to be replaced soon. Systems designed to cope with predicted growth. Networks need to cater to future traffic as improvements might effect productivity
73 of 247
Reasons to upgrade hardware/software (8 reasons)
Improvement of technology, Required changes in software needs better specs, old pc made redundant and slow, new tasks possible, makes company look modern, new procedures, cost effective
74 of 247
Reasons not to upgrade software/hardware (5 reasons)
Expensive, More resource requirement (RAM), incompatability with other PCs, need training (causes confusion), productivity slows
75 of 247
Why would an org wait to buy new technology (2 reasons)
Cheaper to buy and bugs have been sorted out
76 of 247
Standards
A predetermined way of doing something
77 of 247
How standards effect strategy (3 reasons)
Portability helps speed up time needed to do something. Data sharing needed to improve effiency, Using standards in business leads to bulk buying - cheaper costs
78 of 247
CPD
Continuing professional development - allows staff to acquire skills to progress and enhances career progression
79 of 247
Why would a org train employees (4 reasons)
New hardware/software, new staff, new legislation, employees want better skills
80 of 247
What should a training policy include (6 reasons)
Review skills gaps, review an individuals needs, encourage ICT learning, replace skills of employees who have left, help for new employees, consider training costs
81 of 247
The 3 security questions on data
Who sees the data? Has the data been corrupted? Can I access data when I need it?
82 of 247
How can security be breached of an org
Hackers, viruses, incompetence - failing to encrypt, easy passwords, bad firewalls + protection, and unhappy employees.
83 of 247
Role of ICT security policy
Lays down procedures, guidlines and practices to keep data safe from theft misuse and unauthorised access.
84 of 247
Aims of security policy (6 reasons)
Prevent misuse, detect misuse, investigate misuse (with audits), prevent unauthorised access, lay down staff responsibilities, lay down discipline procedures.
85 of 247
How to improve awareness of a security policy (6 reasons)
Meetings, training to individuals, leaflets, intranet, posters, emails
86 of 247
Examples of disciplinary measures (4 reasons)
Network usage monitored, access rights restricted, verbal/written warning, termination
87 of 247
What laws relate to ICT (8)
Data protection, Computer misuse, Copyright designs and patents, Health and safety at work, RIPA, Electronic comerce, FoI act, copyright and rights in databases regulations
88 of 247
Regulatory of Investigatory powers act (RIPA)
RIPA allows public bodies to use survelliance and intercept communications. It also allows businesses to investigate unauthorised use of systems and deter crimes under certain conditions
89 of 247
Electronic Commerce Act
All commercial websites must provide certain minimum information about the supplier, its products and services. If it has online transactions it must provide info on ordering process.
90 of 247
Freedom of Information act
Gives individuals right to request from any public body information on any subject - org has to release it unless theres a good reason not to. Businesses should maintain publicatoin schemes to release info reguarly.
91 of 247
Copyright and rightse in databases act
Designed to protect the investment of money time and effort into making a database. Regulations prevents unauthorised extraction of whole or a part of a database.
92 of 247
Impact of legislation on procedures.
May need to centralise software purchases to have licenses, may need to train on laws and managers need to ensure legislation is enforced
93 of 247
Data protection act.
Provides individuals with rights that protect them against misuse of personal data about them. Data has to be secure, accurate and used for the purpose provided. They can ask to see data about them.
94 of 247
Methods of enforcing data protection act
Appoint data protection officer who monitors practices, data destroyed after certain amount of time. Data subject should be allowed access. Data protected with firewall, password etc. operational procedures set up and disciplinary procedures
95 of 247
Data subject
Person whos data is being held by the org.
96 of 247
Computer misuse act enforcement
Train employees about the act. Establish procedures such as banning USB sticks. No installing software. Spot checks on PCs. Dividing jobs up to not allow access to all info.
97 of 247
Copyright designs and patent act enforcement.
Use software to track how many pe using software at one point. Spot checks on employees. Laptops checked reguarly.Software purchasing centralised.
98 of 247
Piracy
When mroe copies are made than number of licenses purchased (Some people don't know it's illegal)
99 of 247
Counterfeiting
Software is illegally copied, usually comes without user guides. Could carry a virus.
100 of 247
Health and safety officer
Checks that laws are complied with, reviews health and safety issues and discusses safety matters reguarly with managers and unions.
101 of 247
Enforcement of health and safety
Inspections on work inspections. Procedures to replace faulty equipment. 'Safety incentive schemes' to reward alert staff. Establish requirements for software installed.
102 of 247
Freedom of information act enforcement.
Org needs a system to ensure requests are dealt with promptly. Publication scheme reguarly reviewed and updated.
103 of 247
Factors that contribute to successful development (3 reasons)
Management Involvement, End user involvement, Effective ICT teamwork
104 of 247
What is a successful Ict project?
Does what the org intended, on time and within project and enables business to perform better.
105 of 247
How does management involvement lead to successful development (5)
They need to understand the problems solved, cost-benefit analysis, have input on design, knowledge of ICT, regular updates
106 of 247
How does end user involvement lead to successful development? (3)
The users will feel ownership of the system and want it to succeed, the can suggest modifications, They feel valued and want it to work
107 of 247
How does effective ICT team work lead to successful development? (4)
ICT projects cant be done alone, breaking into subtasks make it more managable. Milestones lead to feeling accomplished, Leader makes tough decisions and has good management
108 of 247
What characteristics does a successful team have? (5)
Good leadership, balance of skills and good allocation, adequete planning, standards, good commnication with users and team
109 of 247
Factors which contribute to unsuccessful development(5)
Inadequete analysis, Unrealistic project plan, Insufficient monitoring, Lack of standards, Loss of control.
110 of 247
How does inadequete analysis lead to an unsuccessful development (3)
Important factors may be missed, Solution unworkable, not enough observation leads to incomplete picture of requirements.
111 of 247
How can you avoid inadequete analysis?
Follow accepted methodology in a standard way so no steps are missed.
112 of 247
Deliverable
Something that has to be produced by the project team for the user (and has been tested and meets requriements
113 of 247
Milestone
A stage in the project when the management must give approval for the project to go further
114 of 247
How can unrealistic project plan lead to unsuccessful development? (3)
Unclear timescales which can't be monitored with deadlines. Bad scheduling/ delays. Bad planning (over budget or over time)
115 of 247
Scheduling
Allocating resources and facilities so they are avaible when required.
116 of 247
How does insufficient monitoring lead to an unsuccessful development (5)
Leader must make sure members are working at correct pace. Project sticks to specification. Money must be used right and stick to budget. Good team monitors project well and budget. Members get reviewed.
117 of 247
How does lack of standards lead to an unsuccessful development (3)
Team members might be unclear on what tasks colleagues have completed. Testing might be done wrong. With same standards people work quicker and more efficiently
118 of 247
What can lead to loss of control in a project (8)
Poor initial planning, wrong mix of skills, bad resource allocation, bad leadership, bad coordination, workplace inflexibility, lack of trust, poor communication between members, mngment and users, bad monitoring
119 of 247
Stages of system development lifestyle in order (8)
Preliminary study, Feasability study, Analysis, Design, Construction, Testing, Installation, Review and Maintenance
120 of 247
What is a preliminary study
Finds out whether a new system is needed
121 of 247
What is a feasability study
Looks at existing system and alternatives to help management decide to approve system or not.
122 of 247
Factors of Feasibility study (5)
TELOS - Technical, Economic, Legal, Operational, Schedule
123 of 247
How do you analyse the current system
Interview staff, Send questionairres, Observations, Examining existing documents
124 of 247
What is analysis of the problem and proposed solution
Finding out about the current system and investigating the requirements. Find out deliverables
125 of 247
Why is it important for deliverables to be in place (4)
They agree the content, ensure work is done with standards, agree the requirements and agree the documents provided.
126 of 247
What is design in the systems development cycle
Determines how the requirements specification is implemented and breaks problem down into smaller sub-problems. Makes timescales too
127 of 247
What is the construction of the soltion
System is produced using programs, and documentation is done. Hardware installed and cabling done
128 of 247
What testing is done in the systems development cycle
Extreme data is tested, errenous data is tested and mistakes are investigated and corrected.
129 of 247
Types of testing (5)
Module (part of system) functional (black box) system testing(whether it meets requirement) user testing (users test software) operational testing (testing in normal enviroment)
130 of 247
Advantages of beta testing (4)
Testers are independant and impartial. Tested in the real world and users may do something not intended. Users provide valuable feedback before release. More testers than devs.
131 of 247
Why would someone want to beta test?
Rewarding to be in a important part of production - they might even pay
132 of 247
How can systems be converted? (4)
Direct Changeover, Phased Conversion, Parallel running, Pilot testing
133 of 247
Direct Changeover
Scrapping the old system and replacing it immedietly.
134 of 247
1 advantage and disadvantage of Direct changeovers
Very risky as something could go wrong. It can be done over night though.
135 of 247
Parallel running
Old system and new system run together - when the new system is running smoothly the old system is stopped.
136 of 247
Advantages of parallel running (2)
Safe method of conversion as backups availible. Users can learn system at own pace.
137 of 247
Disadvantages of parallel running (2)
Can be costy as you are running 2 systems at once. Can lead to confusion.
138 of 247
Phased conversion
Changeover occurs in stages, usually appropriate for systems that are broken down into seperate sections.
139 of 247
Pilot conversion
The system is implemented in one department or location.
140 of 247
Advantages of pilot conversion (2)
Bugs can be cleared up and users reactions taken into account before whole system is implemented. Training can also be modified.
141 of 247
Disadvantage of pilot conversion. (3)
ICT workers have to support several systems. Systems aren't compatible with eachother. Costly.
142 of 247
What is review and maintenance in systems development lifecycle?
Once a system is operational, the system should be maintained. The project should be reviewed, possible by discussing with managers and users.
143 of 247
How can you review the system when complete? (3)
Surveys, talking to managers and users, doing speed tests.
144 of 247
Systematic formal methods (5)
Agreeing deliverables, Gaining approval to proceed, creating a project plan, setting milestones and achieving signoff.
145 of 247
Linear Metholodgy - Development
Stages completed in a fixed order and the next stage cannot start until the previous has occured
146 of 247
What is the linear metholodgy of development also called?
Waterfall model
147 of 247
What is the 'motto' of ICT use
ICT should only be used for two reasons. To do things better, or to do better things.
148 of 247
What is the criticism of the linear metholodgy
It's too rigid for a world as complex as ours.
149 of 247
Iterative methodology (Development)
Repeating a task over and over until the solution is right. Developers will go back and redesign after user feedback
150 of 247
Disadvantage of the iterative methodology
It is time consuming.
151 of 247
How to investigate how a system works at present (4)
Interviews, questionanaires, observation, document analysis
152 of 247
Why are diagrams used to model business processes
Quicker and easier to understand than text.
153 of 247
What does BPMN stand for?
Business process modelling notation
154 of 247
What does a BPMN do
Represents workflow in a business (complex processes)
155 of 247
What does SSADM stand for
Structured systems analysis and design methodology
156 of 247
What is SSADM
A standard methodolgy of using developing UK government IT projects.
157 of 247
What is Prince2
Methodology aimed at the successful managment of a project to manage budget, time, risk and quality.
158 of 247
What is an ER model
An entity relationship diagram shows the relationships between data in a different tables.
159 of 247
Data flow diagram
Shows how data moves through a system.
160 of 247
Techniques for testing (6)
Test harness, Volume testing, Scalability, Prototyping, Multiplatform testing, Simulated Enviroment
161 of 247
Test harness
A colllection of software and test data configured to perform specific tests on modules - running it under different conditions and comparing output to the expected one
162 of 247
Volume testing
Tests that systems can work with large volumes of data as over a long time files become large. Tests that it doesn't affect performance.
163 of 247
Scalability testing
Tests that a system will perform even if theres an increased workload such as higher number of users
164 of 247
Prototyping
A scaled down simple version of the software to show how the new system will work
165 of 247
Multiplatform testing
Ensures that software can be used with different hardware and operating systems.
166 of 247
Simulated Enviroments
Various inputs and outputs can be used to test software as realistcally as possible.
167 of 247
Distributed systems
a Large ICT system used across multiple small organisations all of which which carry out similar functions
168 of 247
Code walkthrough
Formal testing technique where code is worked through - checks all variables
169 of 247
What type of testing is code walkthrough
White-box
170 of 247
Blackbox testing
Based on what software should do rather than how it is done
171 of 247
Functional testing
Type of blackbox testing that checks that features and operations of software adhere to specification and it handles erroneous actions correctly
172 of 247
Automated testing
Employs software tools which execute tests without intervention
173 of 247
What should large systems be able to manage?
Unusual events without loss of data or functionality.
174 of 247
Compatability testing
Done to ensure that software is compatible with other parts of system
175 of 247
UAT
User acceptence testing - done by the client to figure out whether to accept a product. They use real data. It focuses on functionality and usability.
176 of 247
What must be monitored with network based systems (2)
Effect of new system on running of the network and the effect of the network strucutre on the running of the application.
177 of 247
Why shouldn't direct conversion be done on large ICT system
Logistics hard and its extremely complex to install all at once
178 of 247
System documentation
Produced for programmars who maintain the system. Includes structure, program code annotations and testing records.
179 of 247
User documentation
Designed to help users operate the system - consisting of manuals to perform business tasks, tutorials etc. It is mostly produced online.
180 of 247
What factors affect the cost of maintenance (5)
How well structured the programs are, how many users of the system, number of undiscovered errors, quality of documentation and skills of maintenance team.
181 of 247
What could delay the maintenance team from fixing a system
Bad structure of code and bad documentation.
182 of 247
What types of maintenance are there?
Adaptive, Corrective, Perfective
183 of 247
Adaptive maintenance
Done when circumstances change such as modifications in hardware, or legislation such as taxation.
184 of 247
Corrective maintenance
When an unexpected error occurs due to bugs etc. Takes time for investigation to find source of the error
185 of 247
Perfective maintenance
Involves the addition of new and enhanced functions to the software, or deletions to the system. If the system is successful they might want an upgrade.
186 of 247
Maintenance release
Include changes to original version of software.
187 of 247
Software patch
A small program which overcomes a specific problem in software. Usually automatically done.
188 of 247
What are the corporate consequences of system failures (2)
If transaction systems go down it leads to loss of trade and customers go to competittors. Customers lose confidence (Reputation loss)
189 of 247
List threats to information systems (7)
Physical failure, Hardware failure, Software failure, Telecommunications failure, Computer crime and abuse, Invalid data, system design failure
190 of 247
List types of physical failure
Natural disaster like fires, floods. Terrorist attacks, Viruses, thiefs, hackers.
191 of 247
List types of hardware failure
Processor failure, disk head crash, power cut
192 of 247
Software failure
Errors such as bugs which could lead to system breakdown. Hard to find.
193 of 247
Types of software failure. (2)
If its unsuitable for the task or volume of data is too large for system to deal with
194 of 247
Telecommunication failure
As networks have grown theres a bigger chance of faulty cables etc.
195 of 247
List types of computer crime (threats)
Hacking, viruses, theft, non encryption in public hotspots.
196 of 247
Invalid data (threats)
User entry can be wrong or corrupt data which can be problematic if not noticed
197 of 247
System design failures
Poor system design which doesn't build in appropriate measures to deal with all situations.
198 of 247
What does a backup & recovery strategy include? (8)
When to backup, how often, which type, whose responsibility, what media to backup, where backup is kept, log of backups, testing recovery of backup
199 of 247
What does RTO stand for
Recovery time objective
200 of 247
What is RTO
The recovery time objective is the ideal period of time after an outage which the systems and data must be restored.
201 of 247
Archiving
Removes old, no longer used data and stores it on removable media (stored online). Can be brought back when required.
202 of 247
When is the best time to backup?
Overnight when noone is working.
203 of 247
Online backup advantage
Unlike magnetic tape, you won't lose as much operational time while recovering as you dont need to restore it in order.
204 of 247
Disk mirroring
Storing identical data on two different disks. If the main disk fails there is identical data on the second. Held in another building incase of disaster.
205 of 247
What does RAID stand for
Redundant Array of Inexpensive Disks.
206 of 247
What is RAID
A fault tolerant system which uses 2 or more disks to store data. If one disk is damaged they can use other ones.
207 of 247
How are risks calculated
Likelihood of an event and the seriousness if it occurs
208 of 247
Why is tape backup not good enough for large scale systems
Tapes are harder to encrpyt and expensive.
209 of 247
Levels of recovery (4)
Partial or full loss of data, loss of data and software, loss of data software and operating system, loss of everything including hardware.
210 of 247
What features does a fault tolerant computer have
Extra hardware such as memory chips, processors and disk storage in parallel. Software detects errors.
211 of 247
How can you avoid disasters? (5)
Stop fires- CO2 extinguishers. Flooding by putting computers on second floor. Install a uninterrupitable power supply (UPS). Have strict rules and good security.
212 of 247
What does the contigency plan depend on (6)
Size of organisation and ICT System. Method of processing, length of time for alt system to be set up. Financial losses. Cost of backup. Likelihood of disaster.
213 of 247
Contents of a contigency plan (5)
Alternative computer hardware, backup procedures, recovery procedures, staff responsibilities, Alternative working location.
214 of 247
What is an alternative working location
If a total loss occurs, the employees need somewhere to carry on their work.
215 of 247
Options for disaster recovery (3)
In house provision, Subscription service, Reciprocal arrangements.
216 of 247
In house provision
Organisation duplicates hardware and software on different site. Allows full continuity
217 of 247
Hot site
A building with electricity and the same software and hardware as the org. Disks are mirrored, however it can be expensive with a subscription.
218 of 247
Cold site.
Building with electricity but no installed equipment. When disaster occurs org needs to set up equipment and restore backups which takes time.
219 of 247
Reciprocal arrangments
Arrangment between two orgs that they will support eachother in a disruption. They have similar processing requirements. It's cheap but you need to make sure they have the ability to hold new capacity.
220 of 247
What should be considered when deciding to train
The level and pace of the training is right for the user and task.
221 of 247
Types of training (3)
Skills-based training, task-based training, skills-refreshing training.
222 of 247
Why is skill based training useful
Can lead to qualifications that are highly regarded and could be valuable as staff knowledge will transfer.
223 of 247
Why is skills refreshing done
If they get a promotion they might need training in new ICT skills needed in the role.
224 of 247
Training methods (7)
On the job training, In house courses, External courses, E learning, On screen help, Paper based, Interactive video
225 of 247
Advantages of face to face training
Allows students to interact with eachother and share ideas and information
226 of 247
Disadvantage of face to face training (2)
Training is usually planned a lot in advance so it lacks flexibility. If it isn't practiced immedietly it could be forgotten.
227 of 247
Advantage of in house traininers
The trainers have an understanding of th organisation and can tailor the training to meet employees needs
228 of 247
Disadvantage of in house trainers.
The cost.
229 of 247
Advantage of online tutorials for training
Trainees can study what they want at their own pace for cheap.
230 of 247
Advantage of On screen help for training.
Cheap and user friendly.
231 of 247
Support for application software (7)
On site help, Call out support, Help desks, email support, user manuals, on screen help, online support
232 of 247
Why would on site support be used?
If a new software is used employees might need help
233 of 247
Call out support disadvantage and advantage
Expensive but quick
234 of 247
Telephone help desk advantages
Cheaper and they are tracked in performance so will be good..
235 of 247
Telephone desk disadvantages (2)
They are usually outsourced and different accents could confuse users. Also complex problems can't be answered on the spot
236 of 247
Email support
If a problem isn't time critical this is used. Avoids wasted time on telephone.
237 of 247
User guides
Aimed at first time users and managers who need to be able to interpret reports.
238 of 247
On screen help
Wizards can be used to make complex procedures easy to use. This is very robust.
239 of 247
Online support
Information is kept up to date, usually on forums specific to the software.
240 of 247
How does support help a business?
Provision of support reassures customer when they buy it,, making them more likely to buy it. Help desk retains customers.
241 of 247
FAQ
Frequently asked questions - user can search through questions that have been asked and will most likely find their problems solution.
242 of 247
Technical documentation
Installation instructions, memory requirements and devices etc. Has explanation of error messages.
243 of 247
Factors to consider when selecting support.
Skill level, similarity from old system, how critical system is, number of employees, pattern of work.
244 of 247
How does pattern of work affect support
They wont be able to use callout support if its nighttime.
245 of 247
What do experienced and inexperienced users need in terms of support
Experienced need complex manuals and online support as they're quicker whilst inexperienced might need one to one.
246 of 247
What should be considered when selecting support options (5)
Skill level of employees,
247 of 247

Other cards in this set

Card 2

Front

Digital Divide

Back

As ICT is used more people who don't have access are at an increasing disadvantage

Card 3

Front

Digital Rights Management (DRM)

Back

Preview of the front of card 3

Card 4

Front

ISP

Back

Preview of the front of card 4

Card 5

Front

Division of Labour

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Everything resources »