role of communication systems b internet hardware, software, serviceshardware, software, services...

37
Role of Communication Role of Communication Systems Systems INTERNET INTERNET Hardware, Software, Services Hardware, Software, Services Information searching, Publication of Information searching, Publication of information information Electronic Communication Systems Electronic Communication Systems Telephone, Fax Telephone, Fax e-mail, videoconferencing, e-mail, videoconferencing, teleconferencing teleconferencing teletext teletext remote databases remote databases

Upload: gervais-goodman

Post on 03-Jan-2016

214 views

Category:

Documents


0 download

TRANSCRIPT

Role of Communication Role of Communication SystemsSystems

INTERNETINTERNET• Hardware, Software, ServicesHardware, Software, Services• Information searching, Publication of Information searching, Publication of

informationinformation Electronic Communication SystemsElectronic Communication Systems

• Telephone, FaxTelephone, Fax• e-mail, videoconferencing, teleconferencinge-mail, videoconferencing, teleconferencing• teletextteletext• remote databasesremote databases

Question January 2002Question January 2002

What do the following features, available with most e-mail software, allow the user to do?

     (a)        Forward (2 marks)     (b)        Reply (2 marks)     (c)        Send/receive (2 marks)     (d)        Attach (2 marks)

(e) Prioritise (2 marks)

Part Question June 2003Part Question June 2003 A company that makes cricket bats

intends to set up a website to advertise its range of products, and to take orders on-line.(c) Describe two ways in which the company could use the facilitiesavailable on the Internet to encourage visitors to use their site.

(4 Marks)

Information & the Information & the ProfessionalProfessional

What is working in ICT like?What is working in ICT like?

What are typical jobs in ICT?What are typical jobs in ICT?

What skills do you need to be What skills do you need to be successful?successful?

What do you know from experience?What do you know from experience?

Look at personal qualities and Look at personal qualities and general characteristics NOT general characteristics NOT TECHNICAL SKILLSTECHNICAL SKILLS

Information & the Information & the ProfessionalProfessional

Personal Qualities requiredPersonal Qualities required

Willing to work flexible hours  Willing to work flexible hours  

Be able to communicate well orally  Be able to communicate well orally  

Good written communication skills  Good written communication skills  

Ability to work as part of a team  Ability to work as part of a team  

Organisational skills/work under pressureOrganisational skills/work under pressure

  Ability to listen/patience Ability to listen/patience

Perseverance/problem solvingPerseverance/problem solving

Question January 2002Question January 2002

Professionals involved with ICT systems often have to work with people who have little, or no, understanding of the ICT systems that they are using.

State two personal qualities that IT professionals should have that will enable them to help such people effectively, and give an example of when each quality would be needed.

(4 marks)

Question January 2001Question January 2001

A company is recruiting a new member of staff for their IT support desk. The head of personnel asks the manager of the support desk what personal qualities the new employee must have in order to carry out the job effectively. State, with reasons, four personal qualities that the manager would want a new employee to have.

(8 marks)

Information systems Information systems malpractice and crimemalpractice and crime

Explain the consequences of Explain the consequences of malpractice and crime on malpractice and crime on information systemsinformation systems

Describe the possible weak points Describe the possible weak points within information technology within information technology subsystemssubsystems

A sample AS questionA sample AS question

        Explain, using examples, the Explain, using examples, the difference between difference between malpractice and crime as malpractice and crime as applied to Information applied to Information Systems.Systems.

(4 marks)

Scenario AScenario AIf I add 1p to

every bill and then move it to my

account…

Scenario BScenario B

Let’s just look for cheap holidays

in Ibiza…

SIMILARITIES BETWEEN SIMILARITIES BETWEEN A and BA and B

BOTH INTENTIONALBOTH INTENTIONAL BOTH USING ICT SYSTEMSBOTH USING ICT SYSTEMS

DIFFERENCES BETWEENDIFFERENCES BETWEENA and BA and B

A•A CRIME – DEFRAUDING PEOPLE•PUNISHABLE BY COUNTRY’S

LEGAL SYSTEM•AGAINST THE LAW OF THE LAND•PENALTIES IMPOSED BY LEGAL

SYSTEM

DIFFERENCES BETWEEN DIFFERENCES BETWEEN A and BA and B

B•NOT AGAINST THE LAW•BUT IF IT IS AGAINST A CODE OF

PRACTICEI.E. THE ORGANISATION’S RULES THEN IT IS MALPRACTICE (BAD PRACTICE)AND IS PUNISHABLE BY THE ORGANISATION’S PENALTIES

JUST BECAUSE JUST BECAUSE SOMETHING IS SOMETHING IS UNINTENTIONAL DOES UNINTENTIONAL DOES NOT MEAN IT IS NOT A NOT MEAN IT IS NOT A CRIMECRIME

“ “ I DIDN’T MEAN TO BREAK THE I DIDN’T MEAN TO BREAK THE SPEED LIMIT, I WAS BUSY SPEED LIMIT, I WAS BUSY TALKING..”TALKING..”

““I ONLY VISITED THE WEBSITE BY I ONLY VISITED THE WEBSITE BY ACCIDENT..”ACCIDENT..”

Malpractice and CrimeMalpractice and Crime

Describe the measures that can be taken to protect information technology systems against internal and external threats

Sample QuestionSample Question

Describe, with reasons, three measures, other than passwords, that may be taken to maintain the integrity of data against malicious or accidental damage.

(6 Marks)

Malpractice and CrimeMalpractice and Crime

Describe the particular issues Describe the particular issues surrounding access to, and use of, surrounding access to, and use of, the Internet, the Internet, e.g. censorship, security and e.g. censorship, security and ethics.ethics.

INTERNET ISSUESINTERNET ISSUES

What Information Is Available on the What Information Is Available on the Internet?Internet?

How Do You Know If It Is Genuine and How Do You Know If It Is Genuine and Reliable?Reliable?

How can you be sure any details you give How can you be sure any details you give are secure?are secure?

What should be allowed to be published What should be allowed to be published on the Internet?on the Internet?

Does, or should, anyone control what Does, or should, anyone control what information is available?information is available?

INTERNET ISSUESINTERNET ISSUES

What information should we put on the What information should we put on the Internet?Internet?

How can we make sure people know it is How can we make sure people know it is reliable and genuine?reliable and genuine?

Is there anything we must make sure Is there anything we must make sure doesn’t go on our website?doesn’t go on our website?

Are there any regulations we need to Are there any regulations we need to follow? And should we have someone to follow? And should we have someone to control what goes on our own site and control what goes on our own site and procedures to follow?procedures to follow?

Software and Data misuseSoftware and Data misuse

Describe the provisions of the Describe the provisions of the Computer Misuse ActComputer Misuse Act

Describe the principles of software Describe the principles of software copyright and licensing copyright and licensing agreementsagreements

MisuseMisuse

What is it really about?What is it really about? Why was the legislation introduced?Why was the legislation introduced? How effective is the legislation?How effective is the legislation? Search websites for stories – e.g. Search websites for stories – e.g.

http://www.vnunet.com Why have there not been more Why have there not been more

prosecutions?prosecutions?

MisuseMisuse

Do not just learn the sections Do not just learn the sections parrot fashion-parrot fashion-

Make sure that you actually Make sure that you actually understand what they meanunderstand what they mean

E.g just what does unauthorised E.g just what does unauthorised mean?mean?

Where do viruses come in?Where do viruses come in?

Question Question Jan 2004Jan 2004

The Computer Misuse Act was introduced to allow The Computer Misuse Act was introduced to allow the prosecution of people who accessed computer the prosecution of people who accessed computer systems without authorisation.systems without authorisation.

(a)State and give an example of, each of the three (a)State and give an example of, each of the three sections of the Computer Misuse Act.sections of the Computer Misuse Act.

(6 marks)(6 marks)(b)(b) Explain why few companies ever prosecute Explain why few companies ever prosecute people under the Computer Misuse Act.people under the Computer Misuse Act.

(2 marks)(2 marks)

Question June 2001Question June 2001

DescribeDescribe what is meant by a what is meant by a software licensing agreement.software licensing agreement.

(2 marks)(2 marks)

Question June 2001Question June 2001

Mr Patel has a single user software Mr Patel has a single user software licensing agreement for a word licensing agreement for a word processing package, which specifies processing package, which specifies that there must only be one copy in use that there must only be one copy in use at any one time. Would he be guilty of at any one time. Would he be guilty of breaking the agreement if he installed breaking the agreement if he installed the package on his laptop PC, as well the package on his laptop PC, as well as on his stand-alone PC at work? as on his stand-alone PC at work? ExplainExplain your answer. your answer. (2 marks)(2 marks)

Question June 2001Question June 2001

A college network has a server and A college network has a server and 20 stations. 20 stations. What typeWhat type of licensing of licensing agreement would be suitable for a agreement would be suitable for a word processing package that may word processing package that may be used at the same time on all 20 be used at the same time on all 20 stations?stations?

(2 marks)(2 marks)

Data Protection LegislationData Protection Legislation

Recall the nature, purpose and provisions of the current data protection legislation and the Public Register.

Data Protection LegislationData Protection Legislation

RecallRecall the the type type of data covered of data covered and and variousvarious exemptionsexemptions from from the legislationthe legislation

Recall the Recall the definitionsdefinitions of of processing and consent to processing and consent to processprocess

Data Protection LegislationData Protection Legislation

ExplainExplain how the requirements of how the requirements of the legislation the legislation impact onimpact on data data collection and usecollection and use

DescribeDescribe the the obligationsobligations of of data users under the legislationdata users under the legislation

Recall Recall the the rightsrights of individuals of individuals under the legislationunder the legislation

Data Protection LegislationData Protection Legislation

RecallRecall the role of the the role of the Commissioner Commissioner in encouraging in encouraging good practice, acting as good practice, acting as OmbudsmanOmbudsman and enforcing and enforcing legislation.legislation.

They are now called the Information They are now called the Information Commissioner – why?Commissioner – why?

Freedom of Information Act 2002Freedom of Information Act 2002

Question January 2002Question January 2002

A company wishes to collect data from A company wishes to collect data from order forms submitted by its customers to order forms submitted by its customers to sell to other companies. sell to other companies.

State State twotwo actions that the company must actions that the company must take so that they can legally collect and sell take so that they can legally collect and sell that data.that data.

((2 marks)2 marks)

Health and SafetyHealth and Safety

Risks associated with using Risks associated with using

ICT ICT equipmentequipment

Workstations/hardwareWorkstations/hardware No general points e.g. No general points e.g. comfortablecomfortable

chairschairs The importance of explainingThe importance of explaining

Health and SafetyHealth and Safety

Risks associated with softwareRisks associated with software• what are they?what are they?• how can they be avoided/reduced?how can they be avoided/reduced?• Making software more useableMaking software more useable• More important in some situations More important in some situations

than othersthan others– Clerk taking orders all day every dayClerk taking orders all day every day– Manager checking e-mailsManager checking e-mails

Health and SafetyHealth and Safety Part Question Part Question

A company provides all new employees with an induction booklet including guidelines for working with ICT.

State, giving a reason for each one:

     (a)  Three health and safety guidelines

(6 marks)

IMPORTANCE TO IMPORTANCE TO YOUYOU YOUR RIGHTS UNDER YOUR RIGHTS UNDER

• DATA PROTECTION LEGISLATIONDATA PROTECTION LEGISLATION• HEALTH AND SAFETY LEGISLATIONHEALTH AND SAFETY LEGISLATION

YOUR RESPONSIBILITIES YOUR RESPONSIBILITIES REGARDING REGARDING • COPYRIGHTCOPYRIGHT• AUDITAUDIT• MISUSEMISUSE

Make sure you get every Make sure you get every mark!!mark!!

Answer ALL the questions on the paper