ICT Unit 3 Revision

  • Created by: deieso
  • Created on: 17-06-16 13:25
Just in time manufacturing
Uses computer systems to ensure raw process and stock levels are kept to a minimum.
1 of 77
EDI (electronic data interchange)
Sends data in agreed formats between computer applications in different organisations.
2 of 77
BACS (bankers automated clearing service)
A method of processing financial transactions electronically.
3 of 77
Critical success factors (CSF)
The essential areas of activity that must be performed well if the objectives or goals of an organisation or project are to be achieved.
4 of 77
The administration of wages and salaries.
5 of 77
Human resources
The department that deals with the management of the people who work for an organisation. Sometimes called the personnel department.
6 of 77
Data portability
The ability to transfer data between different software packages or systems.
7 of 77
Data transferability
The ability to import data from an old ICT system to a new one when one is being installed.
8 of 77
Back office systems
The ICT systems that run the internal operations of an organisation and are not accessible or visible to the general public.
9 of 77
Transaction processing systems
These carry out day-to-day activities of most organisations at operation level.
10 of 77
Workflow management system
Software that helps organisations analyse and manage their business process by using a computer model to represent the logic of the workflow.
11 of 77
Data about data. It provides information about the content of documents using key words, descriptions and dates.
12 of 77
Management information system (MIS)
Takes data from internal and external sources and process it to provide information that can be used by manager at different levels to aid effective decision making.
13 of 77
Decision support systems:
Computer-based systems that analyse data to provide information to help managers make decisions.
14 of 77
Enterprise systems
Those that serve the enterprise as a whole rather than any individual department.
15 of 77
Data mining
The extraction of previously unknown and potentially useful information from data.
16 of 77
Data warehouse
A storage facility for large quantities of data.
17 of 77
E-commerce system
Designed to support the buying and selling of goods and services, usually over the WWW.
18 of 77
A long term plan for achieving a goal.
19 of 77
A statement which defines the organisation’s position on a particular issue and may determine decisions, actions and other matters.
20 of 77
The transfer of an organisational function to another country, regardless of whether the work is outsourced or stays within the same corporation.
21 of 77
A standard set of rules.
22 of 77
OSI (open systems interconnection)
A set of protocols allowing computers of different origins to be linked together.
23 of 77
TCP/IP (transmission control protocol/internet protocol)
The set working practices that allow internet users and providers to communicate with each other no matter what type of equipment they are using.
24 of 77
Hypertext transfer protocol (HTTP)
The set of rules used on the WWW for communicating between sites.
25 of 77
A secure version of HTTP
26 of 77
File transfer protocol (FTP)
The set of rules that govern hardware and software settings when transferring files over the internet.
27 of 77
IP address
Uniquely identifies a physical computer linked to the internet.
28 of 77
Contract of employment
The legal agreement between an employer and employee.
29 of 77
Disciplinary procedures
Lay down the penalties for breaking company policies. These may include verbal and written warnings, fines, suspension and even instant dismissal for cases of gross misconduct.
30 of 77
Security of data
Involves making sure that an organisation’s data is correct, is kept confidential and is safe.
31 of 77
Privacy of data
Involves ensuring that data is not seen or accessed by anyone who is not authorised to view it.
32 of 77
Documents or systems that must be produced during the various stages of the systems life cycle.
33 of 77
Approval to proceed
A signed agreement from the client that they are happy for the next stage of the life cycle to commence.
34 of 77
Data decomposition diagram
A diagram that represents the processes within a system.
35 of 77
Data flow diagram
A diagram that shows how data moves through a system, showing where the data comes from, what processes it passes through and where it goes to within the organisation.
36 of 77
Systems flow chart
A diagram used to define the flow of data through a system.
37 of 77
White box testing
Checks the details of the processing code and algorithms.
38 of 77
Black box testing
Checks that a given input procedures the correct output, rather than the details of the processing involved.
39 of 77
The process of testing program code to isolate and remove errors.
40 of 77
Corrective maintenance
Involves putting right any errors that remain in the system after testing.
41 of 77
Adaptive maintenance
Involves making alterations to respond to changes in the organisation or external changes.
42 of 77
Perfective maintenance
Involves improve the software to enhance performance.
43 of 77
Describes the link between two entities.
44 of 77
In databases, they are things that have data stored about them.
45 of 77
Describes an individual data item within the entity.
46 of 77
A combination of hardware and software, in particular operating system software that allows applications software to run.
47 of 77
Test case
A set of test data and its expected outcomes.
48 of 77
Disaster recovery strategy
Makes plans to avoid data loss and reinstate a working system within an acceptable period of time.
49 of 77
Risk analysis
Identifies each element of a successful information system and to place a value to the business on that element. It then identifies any potential threats to that element, predicting the likelihood of the threat occurring, calculating a overall risk.
50 of 77
Recovery time objective
The length of time that it will take to get a system fully operational after a crisis.
51 of 77
Data recovery point
The last point at which data can be recovered.
52 of 77
Failover systems
Used to provide continuous service for mission critical systems. If the main system fails, they immediately switch to standby services to maintain continuity.
53 of 77
A section of organisation’s intranet that is available for external use, for example by suppliers or customers.
54 of 77
Induction training
The training carried out when a new employee joins an organisation.
55 of 77
Task-based training
Trains the user to carry out a specific routine activity,
56 of 77
Skills-based training
Aims to give the user transferable skills that can be used in a variety of ways to perform a range of functions.
57 of 77
Natural language interface
Allows the user to ask questions in normal words rather than using technical terms.
58 of 77
Context-sensitive help
Gives information based on what the user was doing when they pressed the help button.
59 of 77
Third-party manuals
Provided by publishers, other than the software house that produced the software.
60 of 77
The transfer of a function of an organisation to an external company that provides this service.
61 of 77
A framework to enable services to be sourced from more than one service company.
62 of 77
Involves making computer resources available to the client organisation as and when needed.
63 of 77
Utility computing
A computing service that the customer pays for according to how much they use.
64 of 77
GPS technology
Global positioning system technology tracks the position of objects using satellites.
65 of 77
Mainframe computers that are amongst the most powerful computers at any particular time.
66 of 77
Platform as a service- A category of cloud computing services that provides a platform allowing customers to develop, run and manage applications without the complicity of building and maintaining the infrastructure typically associated with apps.
67 of 77
Software as a service- A software licensing and delivery model in which software is licensed basics and is centrally hosted. Sometimes referred to as an ‘on demand software’.
68 of 77
Advantages/disadvantages for PAAS
Adv- Quick testing and deployment, dynamic allocation, increased focus on business. Dis- Limited flexibility, customer captivity, data security.
69 of 77
Advantages/disadvantages for SAAS
Adv- Scalable and flexible, anywhere access, resilience, less internal responsibility. Dis- Security concerns, compliance, and performance.
70 of 77
Bring your own device (BYOD) advantages/disadvantages
Adv- Lower costs for a business, technology familiarity for users. Dis- Costs for the employees to get their own device, may not suit the businesses functions, security levels won’t be as good.
71 of 77
Advantages JIT
Adv- Lower stock holding meaning a reduction in storage space which saves rent and insurance costs, less working capital is tied up in stock, stops stock becoming obsolete/perish or become out of date.
72 of 77
Disadvantages JIT
Dis- There is little room for mistakes as minimal stock is kept, no spare products available to meet unexpected orders. The links between raw materials from which products are made and the customers who purchase them.
73 of 77
Advantages/disadvantages of bespoke software
Adv- Tailored to you, more flexible, gives you a competitive advantage. Dis- Higher initial costs, takes longer to produce.
74 of 77
Advantages/disadvantages of off the shelf software
Adv- Cheaper to get, available immediately, lower training costs, community support. Dis- May be overly complicated, may have to compromise on your requirements- unlikely there will be a software that does everything you need.
75 of 77
Advantages/disadvantages of outsourcing
Adv- Increased quality (professionals), reduced costs (no training or recruitment), allows you to focus on other areas of the business. Dis- Risk of exposing data, communication errors.
76 of 77
What is the system life cyle?
Analysis, design, constructing, testing, installation and conversion, review and maintenance.
77 of 77

Other cards in this set

Card 2


EDI (electronic data interchange)


Sends data in agreed formats between computer applications in different organisations.

Card 3


BACS (bankers automated clearing service)


Preview of the front of card 3

Card 4


Critical success factors (CSF)


Preview of the front of card 4

Card 5




Preview of the front of card 5
View more cards


No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Backup and Recovery resources »