New Semester
Started
Get
50% OFF
Study Help!
--h --m --s
Claim Now
Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Tutors
Online Tutors
Find a Tutor
Hire a Tutor
Become a Tutor
AI Tutor
AI Study Planner
NEW
Sell Books
Search
Search
Sign In
Register
study help
business
computer communications
AQA Information And Communication Technology For AQA AS 3rd Edition Julian Mott - Solutions
4. Describe two further reports that could be created from the database and explain how each could be used by the management?
3. What use would be made of the charts?
2. What would U-Fix-It need to do to ensure that the mail shot to customers who have purchased dog beds was produced legally?
1. What extra information needs to be kept about each product to enable the list of stock items that need to be re-ordered to be produced?
5. It is estimated that 25 per cent of companies do not have systematic backup procedures.a) State what is meant by systematic backup procedures. (2)b) Explain why it is necessary for companies to have systematic backup procedures. (2)c) In setting up these procedures, one item that has to be
4. A company selling camping equipment carries out its business over the Internet. It runs a database system on a network of PCs. The main tasks are the processing of customer orders and the logging of payments.a) Explain why it is essential that this company has backup procedures in place. (2)b)
3. A senior business executive says to his ICT team “As long as you take a copy of our database every few days, we’ll be OK”. Write a report for the executive explaining why this action would be inadequate. Your answer should describe the procedures that should be in place to ensure that
2. A student is working on an ICT project using the computers at her school and her own computer at home.Describe a suitable backup procedure that the student could use. (4)June 2004 ICT2
1. A company has procedures to back up the data files held on its computer system on a regular basis.a) Explain why recovery procedures should also be in place. (3)b) Discuss the elements necessary for a successful recovery procedure. (6)
whose responsibility it is to ensure that backups are taken and that the recovery procedures are tested.
what media will be used and where the backup media will be kept
how the backup will be carried out
when is the best time to back up and how it should be done
what is to be backed up
4. What are the drawbacks of using online backup?
3. What are the advantages of using online backup?
2. What is meant by online backup?
1. How could the manual swapping of tapes have led to error?
6. How should he log his backups?
5. Where should the backup medium be kept?
4. What backup medium should he use?
3. Should he back up every file every time it is used?
2. When is the best time to do it?
1. How often should he back up?
4. Explore the Veritas web site (www.veritas.com) to find out the functions offered by the BackupExec software.
3. Why is it important for one person to have the responsibility for backup?
2. Comment on the effectiveness of the college’s backup strategy.
1. What is the advantage of using an autoloader?
3. Find out more about remote backup athttp://www.backupdirect.net/.
2. List the benefits to an organisation of using a remote backup service.
1. Why is the data encrypted?
2. What could he have done to make sure that he did not lose his Australian holiday photos?
1. What should Matt have done prior to his holiday to ensure that he did not lose all his photographs?
3. Devise secure backup procedures that the students should follow.
2. What else could go wrong?
1. Discuss what would happen to each of the students’ work if:a. the project file on the hard disk became corruptedb. the hard disk crashedc. the memory stick was lost.
10. A file containing sensitive data is stored on a computer system. Access to this file is managed by the use of passwords entered at a keyboard and by setting levels of permitted access.a) Explain what is meant by i) password (2)ii) levels of permitted access. (2)b) Give two other possible
9. Discuss the relative advantages of hardware, software and procedural measures in preventing security breaches in ICT systems. In this question you will be marked on your ability to use good English, to organise information clearly and to use specialist vocabulary where appropriate. (14)AQA
8. All students at a university have a password to access the university’s computer network. State three rules that the students should follow to ensure the effective use of the password system. (3)
7. State three methods of preventing unauthorised access to data. (3)
6. Explain, with reasons, two levels of access that could be given to different categories of users of an online flight booking system. (4)
5. Information systems need to be protected from both internal and external threats.a) Explain the differences between an internal and an external threat to an ICT system. (4)b) Discuss the methods that a company could take to combat the threats. (8)
4. A company offering security services for ICT systems includes the following quotation in its advertisements“You are protected against hackers, viruses and worms, but what about the staff in the sales department?”a) Explain how the company could provide protection against viruses and worms.
3. John O’Neill takes his company laptop computer home at weekends so that he can do some work at home and so that his son may use the computer for his homework.Describe three threats to the data stored on John’s laptop caused by him taking the computer home at weekends. (6)
2. In 1990, an act was introduced to allow the prosecution of people who accessed computer systems without authorisation.a) Name the act. (1)b) State, with examples, each of the three sections of the act. (6)c) Few companies ever prosecute people under this act. Explain why this is so. (2)
1. Explain, using examples, the differences between malpractice and crime as applied to Information Systems. (4)
2. Discuss the potential internal and external threats to FastNews’ICT system.
1. Describe the user rights that are needed for each of the three categories of user: Mr Blyth, the shop assistants and the FastNews technician. You may need to consider different categories of data.
2. Was the act a crime or malpractice?
1. Was the woman’s act an internal or external threat?
2. Research other cases of Internet-based crime.
1. What is meant by identity theft?
10. When installing double glazing with a large national company, customers are asked if they object to the data they are giving to the company being passed on to other companies.a) Explain why the company must ask this question. (2)b) Describe what the double-glazing company could do with the
■ Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.For each of the principles stated above, describe what the company must do to comply with
■ Personal data shall be accurate and, where necessary, kept up to date.
■ Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed.
9. The personnel department of a large company keeps records on all the employees of the company. These records contain personal data and details of the employees’ position, training and medical history. The company is registered on the Data Protection Register and has to abide by the principles
8. An optician keeps records in a database of all its customers who have had eye tests. Eye-test reminders are sent out to customers when they are due. Customers who do not make appointments after two reminders have been sent out have their details deleted from the database. Describe two possible
7. Discuss how data can have a commercial value. (6)
6. Explain what is meant by the intrinsic value of data. (3)
5. The Data Protection Act 1998 is an act designed to regulate the processing of personal data.a) State what is meant by “personal data”. (1)b) State with whom a company should register if it stores personal data, (1)c) Explain the rights of a data subject who thinks that the data stored is
4. A company wishing to store customers’ personal data must register their use. In addition to details about the company, state three items of data that a company must include in their entry on the Data Register. (3)
3. Explain why it is necessary to have data protection legislation. (6)
2. Explain what is meant by the term “personal data”. (2)
1. The Data Protection Act of 1998 refers to an“Information Commissioner” and a “data subject”.Explain what is meant by these terms. (4)
3. Describe the measures PCGB would need to take to ensure that their database of customers is kept accurate and up to date.
2. Give three further products, other than cars, that might best be marketed in this way.
1. Give three reasons why PCGB use this method of promoting their cars rather than advertising on television as volume car manufacturers do.
3. Explain why it is worthwhile for the organisations listed above to buy the list of names and addresses from the supermarket.
2. List five types of company that would be interested in purchasing a list of names and addresses of people who regularly buy baby food.Explain why it would be important that the list should not be more than three months old.
1. List three other types of company that would be interested in purchasing the list of names and addresses of pet owners.
2. Explain the relevance of the Data Protection Act to the cases described in the case study?
1. Why is it a legal requirement to destroy data when a computer is disposed of?
7. Use the Internet to search for details of other breaches of the Data Protection Act. Use sites such as http://www.guardian.co.uk/ or http://www.independent.co.uk.
6. Which data protection principle did the utility companies break?
5. Which data protection principle did the mobile phone company break?
4. What should Mr Donner have done?
3. What did Mr Daniels do wrong?
2. Which data protection principle was Lloyds TSB accused of breaking?
1. Which data protection principle did Marks and Spencer break?
2. Who has broken the law, Danny or Betta Biscuit or both of them?
1. Suggest as many steps as you can that Betta Biscuit plc should take to improve their security.
■ How long will data be kept? As it is very easy to store vast amounts of data, will data about me be stored even if it is not needed? For example, if I apply for a job but don’t get it will the data be deleted?
■ Will the data be sold on to another company? For example, could my health records be sold to a company where I have applied for a job? Can my school records be sold on to someone else? Could my personal details, collected by my employer, be used by a commercial company for targeting junk mail?
■ Is the data accurate? If it is stored, processed and transmitted by computer, who will check that it is accurate?People often think it must be true if “it says so on the computer”. Inaccurate personal data that is stored could have an adverse effect on an individual. For example, if
■ Who will be able to access this data? There is a fear that personal data could be accessed by unauthorised people who could use it to defraud an individual. Will information about me be available remotely over a network and therefore vulnerable to being accessed, resulting in identity theft for
5. A worldwide company is installing videoconferencing facilities in its offices.a) Describe the hardware that is required for videoconferencing. (4)b) Describe the benefits to the company of installing videoconferencing facilities?
4. Discuss the benefits and limitations of communicating using email. (6)
3. A general-practice team of doctors, nurse, practice manager and receptionist currently uses a number of stand-alone computers to manage patient records, appointments, correspondence and all financial accounts.The practice manager is considering installing a network.a) Describe the advantages to
2. Many households in the UK have access to the Internet.a) Describe the different ways that a computer can be linked to the Internet. (6)b) Using examples, describe different uses of the Internet and how these uses could benefit individuals. (14)
1. Explain the difference between a LAN and a WAN. (2)
5. Use the Internet to research the latest 802.11 standards for WLANs.
4. What is the main disadvantage of standards such as 802.11?
3. Why is a standard such as 802.11 necessary?
2. Is Wi-Fi a de facto or a de jure standard?
1. What is a standard?
3. If you were wishing to link the two LANs today, in what other ways could you provide the link?
2. Why is the ability to back up files on a separate site seen to be an advantage?
1. What is the difference between a LAN and a WAN?
3. Describe the hardware that would be needed to enable lottery sales in a new store.+
Showing 100 - 200
of 975
1
2
3
4
5
6
7
8
9
10
Step by Step Answers