Exam Questions Flashcards
Holders of information 1.1
Exam Question
PhWSSE organise world sport tour events
(A) Identify the category of information holders that PhWSSE Would be included in
Either
Business (1 mark)
Organisation (1 mark)
3.2 & 3.3 Information categories
(B)
PhWSSE create an itinerary for each event tour. The Itinerary would be included. In the planning category of information
Explain why the itinerary would be included in the planing category of information? (4 marks)
Planning:
Itinerary needs to be planed in advance (1) , the planning includes dates or countries (1 mark)
If Itinerary is not planned (1) the event tour will be disorganised (1)
Knowledge Management & Creation
The Itinerary is used by shipping companies (1 mark)
In country journeys need to be advised (1) to local haulage companies (1)
The Itinerary needs to be planned in advance (1) the planning includes countries and dates (1)
Management information system
Details are held (1) about future events (1)
WWW Technologies 1.5
The Air Freight distribution company can access the itinerary created by PhWSSE
Identify and describe the World Wide Web (WWW) technology which is used by the distribution company to access the itinerary
What technology and provide a description (4 marks)
Extranet (1 mark)
A website (1) provides restricted access (private) (1)
To resources for authorised users (1) from outside PhWSSE (1)
It is an intranet (1) accessed via internet (1)
Identify one characteristic of this technology (Extranet) (1 mark)
Private (1 mark)
Shared access (1 mark)
Secure (1 mark)
LO6 Security and protection
6.4 Protection Measures
6.1 Security Principles
4.1 Legislation in terms of staff
The Security of the tracking team is maintained through the use of log-in details which are valid for any given tour
Discuss, using examples, how policies can be used by PhWSSE to maintain the security of the tracking information during the tour (10 Marks)
HINT
Disaster & Recovery planning plays a role in this question
Staff access rights to information (Availability)
Only those staff who need access are authorised
Limited number of staff have the tour log-in
Responsibilities of staff for security information
Log-in details must not be written down
Staff who have log-in details must not give the details to anyone else - either staff or someone else
Correct Log out process must take place
Staff Training
Staff trained about basic cyber security principles and procedures
Staff who are authorised too access the details should be trained in the procedures
Training provided as to how to handle the tacking details and who these should be communicated to
1.6 Information Formats
During each event, the results of each sports competition are uploaded to the event webpage on the PhWSSE website. Schools can access the results using an RSS Feed
What is the purpose of the RSS Feed? (2 Marks)
1.6 Information Formats
During each event, the results of each sports competition are uploaded to the event webpage on the PhWSSE website. Schools can access the results using an RSS Feed
What is the purpose of the RSS Feed? (2 Marks)
1.6 Information Formats
Describe one advantage to the competing schools of using RSS Feeds (2 marks)
Those staff and students who are not at the event (1) can have instant access to results (1)
Schools can keep a total of the number of points (1) hey have scored (1)
(SCHOOLS ARE PARTICIPATING IN THE EVENT)
Schools do not have to constantly update or refresh the feeds (1) so the RSS feed shows the most up-to-date details (1)
1.6 Information Formats
Describe one disadvantage to PhWSSE of using RSS Feeds (2 Marks)
A connection is needed (1) to upload the results (1)
Time consuming (1) to update the RSS feeds (1)
Staff may need to be trained (1) to upload the results (1)
One member of staff (1) will need to be designated to upload the RSS Feeds (1)
If an incorrect update is made (1) then this Will be published on the RSS feed (1)
Some browsers do not support RSS Feeds (1) so limiting accessibility to some schools \ events \ counties (1)
5.1 Data Types & Sources
When the tour has finished the results are collated. The PhWSSE website is uploaded to shown the points and ranking for all schools in each sport across all events
Identify the type of information source of the results used by PhWSSE, justifying your choice (3 marks)
Could either choose
Internal (1)
Primary (1)
Primary (1)
The results are held by PhWSSE (1) and are not being provided by an external business (organisation) (1)
Internal (1)
PhWSSE already have \ collected \ collate (1) the results of each competition \ event on the tour (1)
3.2 & 3.3 Categories of information for individuals
A crime prevention charity provides help and assistance to people who have been the victims of crime. The Charity also collects and collates crime statistics for publication on neighbourhood websites.
The charity collects some statistics from big data sets
Explain, using an example, what is meant by the term big data. (4 Marks)
HINT
An organisation can be a charity don’t be thrown off
Data that is either too large (1) or too complex (1) For traditional analysis techniques to be used (1)
E.g UK Wide crime statistics (1)
2.2 Information Classification
(B) Some of the statistics can be classified as sensitive
Explain using an example, what is meant by the term sensitive data (3 Marks)
Information that should not be generally available (1)
Information that could cause harm if released (1)
Information that is protected from unwarranted disclosure (1)
Access should be safeguarded (1)
Example
Medical conditions (1)
Disability of victims of crime (1)
4.1 UK Legislation
(C)* Some of the statistics are collected from local police forces
Discuss, using examples, how The Protection Of Freedoms Act (2012) should be considered by police forces when they are carrying out criminal investigations. (10 Marks)
Biometric data
Must be deleted for suspects who are not convicted of any offence
Only the data of those convicted of the most serious offences is subject to ‘indefinite’ retention
Schools and colleges to obtain consent of one parent of a child under 18 for acquiring and processing the child’s biometric information
Child has the right to stop the processing of their biometric information regardless of any parental consent
The processing of biometric information must be discontinued if any parent of the child objects
The length of time is reduced for which biometric data can be retained
Safeguarding the vulnerable and criminal records
Criminal records disclosure is required for anyone working or involved in activities with vulnerable groups
Data Protection and Freedom of information
Certain data should be provided in an electronic form suitable for re-use
This includes widening the rules on applying for and receiving datasets from public authorities to re-use
Surveillance, counter-terrorism, trafficking can also be credited marks but the following which are on this Flashcard are relatively straightforward
2.1 Information Styles
(7)
When the statistics have been collected, they are collected and analysed
(A) identify and describe two advantages of using a spreadsheet when collating the statistics (6 marks)
HINT
Collate = To analyse data
Automatic recalculation (1) can reduce the errors (1) when collating large amounts of statistics (1)
Use of calculations (1) for accurate (1) analysis (1)
Use of functions or formulas (1) can reduce errors (1) when collating large amount of statistics (1)
Different worksheets can be used (1) for the different types of statistics (1) e.g different areas (1)
3.4 Stages of Data Analysis
2.1 Information styles
(B) when the statistics have been collected and analysed the visualisation of data analysis tool is used to present the data
Justify the use of visualisation of data analysis tool to present the data (4 Marks)
Visualisation includes the use of charts and graphs (1) which can show the analysed data in a clear and easily understandable way (1)
Data presented visually (1) can clearly show trends and patterns (1)
Correlations (1) between different data can be seen (1)
Different graphs and charts (1) can be used to show data in an appropriate way (1)
6.2 Risks
Statistics are stored securely but need to conform to the information security principle of availability
One information security risk to the stored data is intentional tampering with the data
Identify and describe one other information security risk to the stored statistics (3 marks)
Accidental loss of data (1)
The data is lost unintentionally (1) such as someone deleting the file containing the data or the file corrupting with no backup (1)
Unauthorised \ unintended access to data \ hacking (1)
Data is seen or used by those (1) who should not see or use it (1)
Intentional destruction of data (1)
The data is destroyed by a deliberate act (1) usually as the result of a virus or hacking attack (1)
6.1 Security Principles
Explain what is meant by the information security principle of availability (3 Marks)
Information is always available to (1) and usable (1) by the individuals \ groups \ processes that need it (1)
Information is accessible (1) when needed (1)
2.1 Information Styles
The results of collation and analysis of the statistics are presented on neighbourhood websites
Explain how information style of audio can be used during the presentation of the statistics on the websites (3 Marks)
Accessibility of information (1) for the visually impaired (1)
Presenter speaking (1) to provide further details about the analysis (1)
Used in a video or presentation software (1) to describe the results of the analysis (1)
In separate files (1) to provide more in-depth analysis of the statistics (1)
1.6 Information Formats
Owners and customers renting their cottage communicate by email
Discuss the benefits and limitations of using this communication method (10 Marks)
Benefits
Emails can be sent to one person or a group
Emails are delivered extremely fast when compared to traditional post
Attachments can be sent
Cheaper than using traditional post
An audit trail can be kept
Emails can be sent 24 hours a day, 365 days a year
Limitations
Recipient needs access to the internet to receive the mail
Viruses are easily spread via email attachments
Phishing
No guarantee the mail will be read until the user logs on and checks their email
Email may go into junk folder and be deleted without being seen
1.6 Information Formats
Customers can view a 360 degree virtual tour of some of the cottages
The file is streamed from the PHHC Server
Describe one advantage and one disadvantage to the customers of the 360 degree virtual tours being streamed (4 marks)
Advantages
Files do not have to be downloaded (1) so the tour file will not take up space on a digital device as the file is stored on PHHC server (1)
Customers can check the cottage meets their requirements (1) before booking (1)
Instant playback (1) customers can start viewing the cottage quickly (1)
Disadvantages
Customers need (1) broadband access to stream the tours (1)
Customers device may not be able to run the software (1) required to stream the tour (1)
Buffering may occur (1) if the broadband speed is not high enough (1)
5.1 Data Types & Sources
The PHHC website has an external link to a web-based currency converter
The link is included in the external information source category
Explain why the web-based currency converter would be included in the external information source category (3 Marks)
HINT
“Link” and “External”
External is the key word
The converter is not part (1) of the PHHC website (1)
When the link is activated by the customer (1) a different browsing window is available (1)
The converter is outside of PHHC (1) with the figures being sent back to the customer (1) through the PHHC website (1)
User is directed (1) to an external website (1)
4.1 UK Legislation
When the customers are booking a cottage they can choose to opt out of receiving marketing communication from PHHC
Identify the regulation that relates to customers being able to opt out of marketing communication (1 Mark)
GDPR or DPA (1 Mark)
Privacy and electronic communications regulation (1)
4.1 UK Legislation
Explain two actions that PHCC should take to comply with this regulation
(DPR, GDPR, Privacy and Electronic Communications Regulations)
HINT
Focus on Privacy and Electronic Communication regulation as it links with the scenario
To only contact a customer (1) if box has been ticked (1)
Not to contact a customer (1) if a box has not been ticked (1)
To only use (1) the methods (1) that have been selected by a customer (1)
To Display (1) their telephone number (1) if contacting a customer by phone (1)
If cookies (1) are set on the websites (1), explaining what they will do and why (1)