Unit 2 Flashcards

1
Q

what are the categories of information holder

A

business, individual, charities, healthcare, government, education, community

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is magnetic storage

A

stores data by storing 1s and 0s in the disk. the 1s are magnetised so the computer reads this data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is optical disk storage

A

uses laser to project beams of light onto spinning disk, allowing it to read data from DVD, BLU-RAY, CD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is solid state storage

A

data is stored in electronic memory cells

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is the intranet

A

private network only accessible to authorised users, users have closed access and commonly used by schools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is extranet

A

private network accessible by internet only to authorised users, private and users have shared access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is a management information system (MIS)

A

used to collect, store, analyse and present data for organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are the 8 stages of data analysis

A

1- identify need
2- define scope
3- identify potential sources
4- source and select information
5- select appropriate tools
6- process and analyse data
7- record and store information
8- share results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what are open information systems

A

can interact with other information systems, more open to hacking and data loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what are closed information systems

A

private and cant exchange data with other systems and access is limited but is more secure than open system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is the data protection act (2018)

A

protects data of individuals data that’s stored on computers and processed by organisations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is the computer misuse act (1990)

A

stops and punishes those who use computers incorrectly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is regulations of investigatory power act (2000)

A

used to monitor and access online communication of suspected criminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is freedom of information act (2000)

A

allows people to request public authorities to release information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is copyright, designs and patent act (1988)

A

makes it criminal offence to copy work that isn’t yours without permission of creator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is privacy and electronic communications regulations (2003)

A

regulates how organisations can communicate with individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what are RSS feeds- rich site summary

A

allows users to subscribe for updates from websites

18
Q

advantages of internet for individuals

A

increased communication speed, easy access to information, 24/7 access to services, social interaction

19
Q

disadvantages of internet for individuals

A

identity theft, cost of connection, source of distraction, cyber bullying, misinformation

20
Q

advantages of internet for businesses

A

share data quickly globally, online services always available, easy internal communication, staff can work from home

21
Q

disadvantage of internet for businesses

A

malicious attacks, cost of maintaining services, reputation and controversies

22
Q

what is sensitive information

A

should be protected from being publicly released as could harm someones safety or privacy

23
Q

what is non-sensitive information

A

can be released publicly with no negative consequences

24
Q

what is private information

A

relates to individual and shouldn’t be shared without permission

25
Q

what is public information

A

released to public and can be seen by anyone. public info is non-sensitive

26
Q

what is personal information

A

identifiable data about an individual

27
Q

confidential information

A

private data thats more restricted than sensitive information

28
Q

what is anonymised information

A

removes personally identifiable data from information so that an individual cant be identified

29
Q

what steps are involved in the management of information

A

collecting, storing, retrieving, manipulating and processing, analysing, securing, transmitting

30
Q

categories of information for individuals

A

communication, education and training, entertainment, planning, financial, research, location dependent

31
Q

categories of information for organisations

A

knowledge management and creation, MIS, marketing, promotion and sales, financial analysis and modelling, contact management, decision making, internal and external information, big data

32
Q

what information formats are used by PHBC

A

static website
streamed video
document store

33
Q

what information styles are used by PHBC

A

text- includes phone number
video- showing activities
audio- video would have audio
numerical- DOB
Boolean- allergy
tables- online form

34
Q

what information classifications are used by PHBC

A

sensitive- allergies
non-sensitive- availability
private- DOB
personal- name, DOB, emergency contact

35
Q

why is good quality information important for PHBC

A

inaccurate data leads to bad reputation and reviews, inaccurate information leads to allergies not being known, reliable information means camp can call parents if needed

36
Q

what legislation is important for PHBC

A

data protection act, privacy and electronic communications regulations, computer misuse act, equality act, information commissions office codes of practice

37
Q

what logical protection does PHBC use

A

usernames and passwords, encryption in transit, encryption at rest

38
Q

what physical protection does PHBC use

A

locks, timber building for storing equipment, biometrics for tablets

39
Q

what information and storage devices does PHBC use

A

handheld device, portable device, shared device

40
Q

what improvements should PHBC use

A

backup system, security staff, shredding old paper records, firewalls, anti-malware applications (protection measures)

upgrade to cloud (storage device)

41
Q
A