jcdubaidataandinformation.blogspot.com
Data and Information: Questions
http://jcdubaidataandinformation.blogspot.com/2008/11/questions.html
Tuesday, November 25, 2008. What is a disadvantage and an advantage of coding? What are binary numbers? Give some examples of what information is? Coding is when data is saved into a shortened version. An advantage of coding is that it takes up less memory when storing in the computer because it is in an shortened form. A disadvantage od coding is that you can not understand what is it about if you do not have the code. November 26, 2008 at 11:59 PM. November 30, 2008 at 11:29 PM. A1) Coding makes it eas...
jcdubaidataandinformation.blogspot.com
Data and Information
http://jcdubaidataandinformation.blogspot.com/2008/11/encoding-and-coding-data-encoding-needs.html
Monday, November 24, 2008. Encoding and coding data. Encoding needs to happen when data is collected. An example would be for fields on a paper-based document. A way of encoding text is by using ASCII to represent each character as a binary number. Data can sometimes be coded before storage this changes the data into a shortened version by assigning a code. Data is coded essentially to keep it short, which saves storage space but also speeds the process up. Some condings that you may be familiar with are:.
jcdubaidataandinformation.blogspot.com
Data and Information: Quality of information
http://jcdubaidataandinformation.blogspot.com/2008/11/quality-of-information.html
Tuesday, November 25, 2008. What makes information valuable? Information is a commidity, which means that it can be bought and sold, and therefore it potentially has value. Information has increased value when some or all of the following are applied:. To make sure decisions will be accurate the information on a sales report must be accurate to the exact monetary value. This is extremely important as organisations need accurate information to stay in business. If the information proceded about a househol...
ict-systems-and-their-components.blogspot.com
:: ICT systems and their components - Alicia ::: ICT systems and their components
http://ict-systems-and-their-components.blogspot.com/2008/11/ict-systems-and-their-components.html
Monday, November 24, 2008. ICT systems and their components. ICT stands for Information Communication Technology. ICT is the use of technology for input, processing, storage and transfer of data and output of information. ICT is concerned with the storage, retrieval, manipulation, transmission or receipt of digital data. More notes available at:. Http:/ tutor2u.net/business/ict/intro what is ict.htm. What is a system? All systems have the three basic stages of input, processing and output. More productiv...
ict-systems-and-their-components.blogspot.com
:: ICT systems and their components - Alicia ::: November 2008
http://ict-systems-and-their-components.blogspot.com/2008_11_01_archive.html
Tuesday, November 25, 2008. Monday, November 24, 2008. ICT systems and their components. ICT stands for Information Communication Technology. ICT is the use of technology for input, processing, storage and transfer of data and output of information. ICT is concerned with the storage, retrieval, manipulation, transmission or receipt of digital data. More notes available at:. Http:/ tutor2u.net/business/ict/intro what is ict.htm. What is a system? For example, when using a database;. What is an ICT system?
ict-giniya.blogspot.com
Legislation to protect ICT systems: Data Protection Act
http://ict-giniya.blogspot.com/2008/11/legislation-to-protect-ict-systems.html
Monday, November 24, 2008. Data Protection Act 1998. The Data Protection Act regulates how personal data is used and protects data subjects from the misuse of their personal data. If a data user wishes to store personal data, they must first register with the Information Commission. This should state the following things:. What data they want to hold. How long they intend to keep it for. What they intend to do with it. Who they might pass it on to. Data subjects have the following rights:. The act with s...
jcdubaidataandinformation.blogspot.com
Data and Information: Data and Information
http://jcdubaidataandinformation.blogspot.com/2008/11/data-and-information.html
Monday, November 24, 2008. Data represents raw facts and figures or a set of values. Other subjects may also gather data e.g Geogoraphy where data may be collected using a questionnaire. A set of data might consist of 2, 4 , 3, 5, 6. Another more familiar set of data which will be collected is examination results, such as 23, 45, 67, 98, 78. Data doesnt always have to come in the form of text as numbers it can also take the form as moving images, or sound. One character, for example:. Examples of informa...
jcdubaicollege.blogspot.com
JC Dubai: Security in ICT
http://jcdubaicollege.blogspot.com/2008/11/security-in-ict.html
Monday, November 10, 2008. What are the main threats regarding ICT security? Back ups have the potential to be lost of stolen. Print outs might not be detroyed properly. Individuals or organistations can use the computers illegally. November 10, 2008 at 1:23 PM. Malpractice- when a employee goes against the company ICT code of practice,e.g. leaving a computer unprotected from unauthorised users. Selling information for personal gain. Data could be lost or passed on carelessly. November 10, 2008 at 1:38 PM.
ict-giniya.blogspot.com
Legislation to protect ICT systems: Computer Misuse Act
http://ict-giniya.blogspot.com/2008/11/legislation-to-protect-ict-systems_25.html
Tuesday, November 25, 2008. The Computer Misuse Act became law in August 1990. The Act identifies three specific offences:. 1 unauthorised access to computer material; for e.g. a program or data. 2 unauthorised access with intent to commit or facilitate commission of further offences for e.g. obtaining personal data such as Internet banking passwords. 3 unauthorised modification of computer material. What can happen to individuals under the law? Example 1: Unauthorized access to computer material. This w...