Enw / Name. What is a on-line / paper based data capture form Can you give an example where each are used? Automated data capture systems are used around.

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

Cambridge Nationals R001 Revision Guide – June 2014.
Backing up and Archiving Data Chapter 1. Introduction This presentation covers the following: – What is backing up – What is archiving – Why are both.
1 Back Up Your Computer. 2 Back up your files  Avoid losing photos, files, data  Schedule backups – store backups away from home in case of fire, flood,
Lesson 01: The Digital Experience  Transition from traditional devices to multipurpose digital devices. Wired phones move to cell phones and now smart.
1 of 13 Inputs and Outputs Using ICT. 2 of 13 You need to know about a range of computing devices including: Desktop computers Laptops Tablets Netbooks.
Understanding Storage Discovering Computers 2012: Chapter
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Basic Data Safety Practices That Can Prevent Malpractice Claims & Ethics Violations Grant County Bar Association June 14, 2011 Kim J. Brand PresidentFounder.
ICT SYSTEMS Inputs / Processing / Outputs. Input e.g. Data Input Any Computer System Feedback e.g. a printer problem Process e.g. A computer program Output.
Back Up and Recovery Sue Kayton February 2013.
STORING YOUR DATA ……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………......…... RESEARCH DATA MANAGEMENT TEAM UK DATA.
1 Back Up Your Files. 2 Back up your files Avoid losing photos, important files, data Schedule backups – store backups away from home/school in case of.
C AMBRIDGE N ATIONALS - BP2 How Information and data can be stored on portable devices.
New Data Regulation Law 201 CMR TJX Video.
Backup Strategy. Backup strategy Backup copy is a second copy saved to another location, usually on a backup device e.g. USB stick.Backup copy is a second.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Protecting ICT Systems
For more notes and topics visit:
Networks. What is a Network? Two or more computers linked together so they can send and receive data. We use them for sending s, downloading files,
Storage Devices. Internal / External Hard Drive Also known as hard disks Internal drive stores the operating system software, application software and.
1.1 System Performance Security Module 1 Version 5.
Cambridge University Library Back-up, Storage and Sharing Helping you put into practice what you know you ought to be doing… Cambridge University Library.
Networking Two or more computers linked together so that it is capable of sending messages between them. Network Stand Alone Computer.
Security and backups GCSE ICT.
BACKUP AND ARCHIVING DATA BACKUP AND RECOVERY OF DATA.
CMPTR Chapter 2 – Part 2 (Storage). Storage – Punch Cards Player Piano Roll Punch Cards were used before disk drives.
 Information technology is defined as the use of computer hardware and software to manage information.  Six functions of data management: Convert.
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
Storage & Connectivity Devices. Internal / External Hard Drive Also known as hard disks Internal drive stores the operating system software, application.
OCR Cambridge National ICT Mr Conti 10X 25 th April 2014.
1. MAGNETIC HARD DRIVES 2. SOLID STATE DRIVES 3. OPTICAL DISKS 4. FLASH MEMORY 5. CLOUD STORAGE 6. CONNECTIVITY DEVICES Storage and connectivity devices.
ITGS Types of network.
Networks.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
NetworksNetworks. What is a network? Standard Grade Computing Studies.
Communications & Networks National 4 & 5 Computing Science.
CLOUD BASED STORAGE Amy. Cloud Based Storage Cloud based storage is “the storage of data online in the cloud”
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
ROO1REVISION LO1 How ICT can be used to meet business needs LO3 Know how ICT can be used to support business working practices LO2 Know how to work with.
FILE MANAGEMENT Computer Basics 1.3. FILE EXTENSIONS.txt.pdf.jpg.bmp.png.zip.wav.mp3.doc.docx.xls.xlsx.ppt.pptx.accdb.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
Starter Question for WB What is an output device? Why is it needed?
1 Assignment 2 LO2 34c c LO2: How to work with information and data to meet specific business needs SWS events would like you to create.
Accessing active files Keeping track of files, both paper and electronic, requires all employees to adhere strictly to procedures outlined in the OPPM.
Information Systems Design and Development Technical Implications (Storage) Computing Science.
Enw / Name. Advantages and Disadvantages of this type of network Draw / insert a drawing of a RING network What type of network would you recommend a.
Chapter 11 Analysis Methodology Spring Incident Response & Computer Forensics.
Computer Security Sample security policy Dr Alexei Vernitski.
Cloud Computing 10 Cloud Computing 10. Cloud Computing 10 You’ll have heard about the ‘Cloud’ Lots of you will use it! But you need to be clear about.
Google Apps for Education Account Overview for Staff.
Unit 3—Part B Computer Storage Computer Technology (S1 Obj 2-3 and S3 Obj 1-1) Unit 3—Part B Computer Storage Computer Technology (S1 Obj 2-3 and S3 Obj.
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
WHAT IS CLOUD COMPUTING? Pierce County Library System.
1.4 wired and wireless networks lesson 1
3 - STORAGE: CHOICE OF STORAGE MEDIA/DEVICE
Networks.
Networks Intro to Digital Technology
Computing in the Modern World Unit 4
Working with Information and Data
Back Up and Recovery Sue Kayton October 2015.
Ian Ramsey C of E School GCSE ICT On the move How can we connect?
GCSE OCR 4 Storage Computer Science J276 Unit 1
Computer Application Waseem Gulsher
Part C Computer Storage
1.2 Types of information storage media
Where/what is this place?
BTEC level 3 Learning Aim D.
Presentation transcript:

Enw / Name

What is a on-line / paper based data capture form Can you give an example where each are used? Automated data capture systems are used around us on a day to day basis, can you give examples for the following: Radio Frequency Identification Device (RFID) How the following factors can affect the choice of method: Nature of information to be collected e.g. environmental conditions, location of information Online Data Capture Form Paper Based Data Capture Form Barcode readers Radio Frequency Identification Device (RFID) Cost Availability Ease of use Data security

Data Capture forms Why is it important to effectively design data capture forms? Hilton hotel has asked you to create a new online booking form for customers. On the right hand side, design your data capture form based on the following requirements of the hotel: What is validation and can you give an example where its important to use validation in data capture forms Remember to note any validation methods e.g. Dropdown box Date range Input Mask Validation rules First name Middle Name Surname Date of Arrival Date of departure Number of rooms Number of guests Address 1 Address 2 Town City County Post Code Type of room

Different file formats are used in everyday computing. Are you able to identify the different file types and their uses? Proprietary formats: Why would you use this program? Program Name: Why would you use this program? Program Name: Why would you use this program? Program Name: Why would you use this program? Program Name: Why would you use this program? Program Name: Why would you use this program? Program Name:.XLS /.XLSX.fla

Different file formats are used in everyday computing. Are you able to identify the different file types and their uses? Open Source formats: Why would you use this program? Program Name: Why would you use this program? Program Name: Why would you use this program? Program Name: Why would you use this program? Program Name: Why would you use this program? Program Name: Why would you use this program? Program Name:

Data storage technologies Local and removable media Advantages of this method Disadvantages of this method USB hard drive (large and portable) Optical Disks (DVD’s, CD’S Local Hard disks and Solid State Drives (SSD) Network Attached Storage (NAS) Advantages of this method Disadvantages of this method Advantages of this method Disadvantages of this method Advantages of this method Disadvantages of this method

Data storage technologies Remote Storage Advantages of this method Disadvantages of this method Offsite data storage (Wide Area Network) Cloud Storage e.g. Sky Drive, Dropbox Advantages of this method Disadvantages of this method Cloud Storage

Security measures to be used when storing data (e.g. individual files or folders) Access Rights / Permissions Encrypting files Usernames and Passwords Measures to secure Physical Methods to prevent loss

Comparing the advantages and disadvantages of data transfer methods Wireless Wired Data transferring methods

Comparing the advantages and disadvantages of data transfer methods 4g 3g Mobile Data Transition

With new technologies that are being created, it means users can remotely access information. Explain why the following would be an advantage to a office worker or a salesman who travels as part of their work. Peer to peer file sharing has been in the media a lot recently. Outline below what is peer to peer file sharing and the impact this has had to the music industry in particular. What are the risks of connecting to your data outside a Local Area Network (LAN)? Internet & cloud based storage What devices can this person use to access their ? What devices can this person use to access their internet & cloud based storage? Give examples of how to avoid these issues (data encryption?)

How can the following factors affect the choice of method: File sizeTransfer speed User needsFuture- proofing and data security

How can the following affect data transfer speed BandwidthRouter Technology

How can the following affect the appropriate optimization of electronic files Download SpeedsQuality of product

Different Backup Methods of different users needs. A home user needs to backup his files on his laptop. A large family needs to backup their work which is on 3 different laptops and 1 laptop. A small company which employees 5 members of staff needs to preform regular backups weekly. Each computer only has internet access and no network. A school with over a 1000 pupils needs to preform a daily backup. Method: USB Stick Memory: 4gb Cost: £10 Method: Large external hard drive Memory: 1000gb (1TB) Cost: £60 Method: Cloud based storage Memory: 1000gb Cost: £50 PER 1000GB/ Month Method: Large Network Attached Storage (NAS) Memory: 1000gb Cost £300

Back-up frequency Why is backup frequency so important? What are the disadvantages of backing up a large organisation's files every night? Automated versus manual systems What are the advantages of a automated backup system What are the risks when a company uses manual backup systems? Archiving Why do organisations archive someone’s files once they leave the company? What are the disadvantages of archiving someone's work every time they leave the company? Tip: Use each of the following operating systems only ONCE! Windows, OS X, Android, Linux

How do the following factors can affect the choice of method: Cost Ease of use Availability Data security