Presentation is loading. Please wait.

Presentation is loading. Please wait.

Role of Communication Systems b INTERNET Hardware, Software, ServicesHardware, Software, Services Information searching, Publication of informationInformation.

Similar presentations


Presentation on theme: "Role of Communication Systems b INTERNET Hardware, Software, ServicesHardware, Software, Services Information searching, Publication of informationInformation."— Presentation transcript:

1 Role of Communication Systems b INTERNET Hardware, Software, ServicesHardware, Software, Services Information searching, Publication of informationInformation searching, Publication of information b Electronic Communication Systems Telephone, FaxTelephone, Fax e-mail, videoconferencing, teleconferencinge-mail, videoconferencing, teleconferencing teletextteletext remote databasesremote databases

2 Question January 2002 What do the following features, available with most e-mail software, allow the user to do? (a) Forward(2 marks) (b) Reply(2 marks) (c) Send/receive(2 marks) (d) Attach(2 marks) (e) Prioritise(2 marks)

3 Part Question June 2003 A company that makes cricket bats intends to set up a website to advertise its range of products, and to take orders on-line. (c) Describe two ways in which the company could use the facilities available on the Internet to encourage visitors to use their site. (4 Marks)

4 Information & the Professional What is working in ICT like? What are typical jobs in ICT? What skills do you need to be successful? What do you know from experience? Look at personal qualities and general characteristics NOT TECHNICAL SKILLS

5 Information & the Professional Personal Qualities required Willing to work flexible hours Willing to work flexible hours Be able to communicate well orally Be able to communicate well orally Good written communication skills Good written communication skills Ability to work as part of a team Ability to work as part of a team Organisational skills/work under pressure Ability to listen/patience Ability to listen/patience Perseverance/problem solving Perseverance/problem solving

6 Question January 2002 Professionals involved with ICT systems often have to work with people who have little, or no, understanding of the ICT systems that they are using. State two personal qualities that IT professionals should have that will enable them to help such people effectively, and give an example of when each quality would be needed. (4 marks)

7 Question January 2001 A company is recruiting a new member of staff for their IT support desk. The head of personnel asks the manager of the support desk what personal qualities the new employee must have in order to carry out the job effectively. State, with reasons, four personal qualities that the manager would want a new employee to have. (8 marks)

8 Information systems malpractice and crime b Explain the consequences of malpractice and crime on information systems b Describe the possible weak points within information technology subsystems

9 A sample AS question Explain, using examples, the difference between malpractice and crime as applied to Information Systems. Explain, using examples, the difference between malpractice and crime as applied to Information Systems. (4 marks)

10 Scenario A If I add 1p to every bill and then move it to my account…

11 Scenario B Let’s just look for cheap holidays in Ibiza…

12 SIMILARITIES BETWEEN A and B b BOTH INTENTIONAL b BOTH USING ICT SYSTEMS

13 DIFFERENCES BETWEEN A and B bbAbbA A CRIME – DEFRAUDING PEOPLE PUNISHABLE BY COUNTRY’S LEGAL SYSTEM AGAINST THE LAW OF THE LAND PENALTIES IMPOSED BY LEGAL SYSTEM

14 DIFFERENCES BETWEEN A and B bbBbbB NOT AGAINST THE LAW BUT IF IT IS AGAINST A CODE OF PRACTICE I.E. THE ORGANISATION’S RULES THEN IT IS MALPRACTICE (BAD PRACTICE) AND IS PUNISHABLE BY THE ORGANISATION’S PENALTIES

15 JUST BECAUSE SOMETHING IS UNINTENTIONAL DOES NOT MEAN IT IS NOT A CRIME b “ I DIDN’T MEAN TO BREAK THE SPEED LIMIT, I WAS BUSY TALKING..” b “I ONLY VISITED THE WEBSITE BY ACCIDENT..”

16 Malpractice and Crime Describe the measures that can be taken to protect information technology systems against internal and external threats

17 Sample Question Describe, with reasons, three measures, other than passwords, that may be taken to maintain the integrity of data against malicious or accidental damage. (6 Marks)

18 Malpractice and Crime b Describe the particular issues surrounding access to, and use of, the Internet, e.g. censorship, security and ethics.

19 INTERNET ISSUES b What Information Is Available on the Internet? b How Do You Know If It Is Genuine and Reliable? b How can you be sure any details you give are secure? b What should be allowed to be published on the Internet? b Does, or should, anyone control what information is available?

20 INTERNET ISSUES b What information should we put on the Internet? b How can we make sure people know it is reliable and genuine? b Is there anything we must make sure doesn’t go on our website? b Are there any regulations we need to follow? And should we have someone to control what goes on our own site and procedures to follow?

21 Software and Data misuse b Describe the provisions of the Computer Misuse Act b Describe the principles of software copyright and licensing agreements

22 Misuse b What is it really about? b Why was the legislation introduced? b How effective is the legislation? b Search websites for stories – e.g. b Search websites for stories – e.g. http://www.vnunet.com http://www.vnunet.com b Why have there not been more prosecutions?

23 Misuse b Do not just learn the sections parrot fashion- b Make sure that you actually understand what they mean b E.g just what does unauthorised mean? b Where do viruses come in?

24 Question Jan 2004 The Computer Misuse Act was introduced to allow the prosecution of people who accessed computer systems without authorisation. (a)State and give an example of, each of the three sections of the Computer Misuse Act.(6 marks) (a)State and give an example of, each of the three sections of the Computer Misuse Act.(6 marks) (b) Explain why few companies ever prosecute people under the Computer Misuse Act.(2 marks)

25 Question June 2001 Describe what is meant by a software licensing agreement. (2 marks)

26 Question June 2001 Mr Patel has a single user software licensing agreement for a word processing package, which specifies that there must only be one copy in use at any one time. Would he be guilty of breaking the agreement if he installed the package on his laptop PC, as well as on his stand-alone PC at work? Explain your answer. (2 marks)

27 Question June 2001 A college network has a server and 20 stations. What type of licensing agreement would be suitable for a word processing package that may be used at the same time on all 20 stations? A college network has a server and 20 stations. What type of licensing agreement would be suitable for a word processing package that may be used at the same time on all 20 stations? (2 marks)

28 Data Protection Legislation Recall the nature, purpose and provisions of the current data protection legislation and the Public Register.

29 Data Protection Legislation b Recall the type of data covered and various exemptions from the legislation b Recall the definitions of processing and consent to process

30 Data Protection Legislation b Explain how the requirements of the legislation impact on data collection and use b Describe the obligations of data users under the legislation b Recall the rights of individuals under the legislation

31 Data Protection Legislation b Recall the role of the Commissioner in encouraging good practice, acting as Ombudsman and enforcing legislation. b They are now called the Information Commissioner – why? b Freedom of Information Act 2002

32 Question January 2002 A company wishes to collect data from order forms submitted by its customers to sell to other companies. State two actions that the company must take so that they can legally collect and sell that data. (2 marks)

33 Health and Safety b Risks associated with using ICT equipment b Workstations/hardware b No general points e.g. comfortable chairs b The importance of explaining

34 Health and Safety b Risks associated with software what are they?what are they? how can they be avoided/reduced?how can they be avoided/reduced? Making software more useableMaking software more useable More important in some situations than othersMore important in some situations than others –Clerk taking orders all day every day –Manager checking e-mails

35 Health and Safety Part Question A company provides all new employees with an induction booklet including guidelines for working with ICT. State, giving a reason for each one: (a) Three health and safety guidelines (6 marks)

36 IMPORTANCE TO YOU b YOUR RIGHTS UNDER DATA PROTECTION LEGISLATIONDATA PROTECTION LEGISLATION HEALTH AND SAFETY LEGISLATIONHEALTH AND SAFETY LEGISLATION b YOUR RESPONSIBILITIES REGARDING COPYRIGHTCOPYRIGHT AUDITAUDIT MISUSEMISUSE

37 Make sure you get every mark!! Answer ALL the questions on the paper


Download ppt "Role of Communication Systems b INTERNET Hardware, Software, ServicesHardware, Software, Services Information searching, Publication of informationInformation."

Similar presentations


Ads by Google