SlideShare a Scribd company logo
2.7 What ICT Can Provide
   Tweet your responses #ictdbs12
1.    ICT provides what 6 features?
2.    Discuss ‘Fast, repetitive processing’
3.    Discuss ‘Vast storage capacity’
4.    Discuss ‘Improved search facilities’
5.    Discuss ‘Improved presentation of information’
6.    Discuss ‘Improved accessibility of information and services’
7.    Discuss ‘Improved security of data and processes’
8.    What limitations are there for what ICT can be used for?
9.    What limitations are there for what ICT systems can produce in terms of
      information?
10.   Why else might ICT not provide the appropriate solution?
11.   What 3 types of processing exist?
12.   Explain Batch Processing and give an appropriate example of when it might be
      used.
13.   Explain interactive Processing and give an appropriate example of when it
      might be used.
14.   Explain transaction Processing and give an appropriate example of when it
      might be used.
15.   What words could be used to distinguish between the 3 types of processing?
1.   Fast, repetitive processing
2.   Vast storage capacity
3.   Improved search facilities
4.   Improved presentation of information
5.   Improved accessibility of information and
     services
6.   Improved security of data and processes
 Can perform calculations quickly
 Process repetitive calculations
     Mapping DNA
     Financial management
     Rendering 3D
 Smaller storage space required
 Shared access to digital storage
   Search on multiple criteria
   Speed of search results
   Multimedia
    ◦   Animations
    ◦   Video
    ◦   Audio
    ◦   Images
   Websites
   Podcasts
   Online polls
   World Wide Web provides us with access to
    up-to-date, world wide news and information
   Blogs
   Social Networks
   Micro-blogging
   Instant messaging
   Chat rooms
   Forums
   Podcasts
   Encryption
   Biometrics
   Usernames and Passwords
   Privileges
   Issues with over spending, failure to produce
    solution, lateness
   Humans can still do many things better:
    ◦ Reasoning
    ◦ Opinions
    ◦ Speech
   GIGO
   Validation
   Verification
   Valued Judgments
   Digital from analogue
   Personal touch might be needed
   Quick pencil and paper notes might be more
    accessible than logging on setting up a
    document etc.
   Interpersonal communication (see doctor
    instead of NHS Direct)
INPUT            PROCESS           OUTPUT


What do we know   What do we know   What do we know
  about this?       about this?       about this?

    ENTER                               PRESENT
    DATA                             INFORMATION
   All computers work on a basis of
    INPUT, PROCESS, OUTPUT

   The PROCESSING element can be treated differently
    depending on the circumstances.

   There are 3 modes of processing to consider
    ◦ Batch
    ◦ Transaction
    ◦ Interactive (Real Time)

   NOTE: There is some overlap between them; most
    transaction processing applications are also
    interactive
   What is it?
    ◦ Where data is collected together in a group (batch) before processing
      takes place.

   Characteristics
    ◦ When processing takes place there is no interaction between computer and
      user
    ◦ Usually performed overnight
    ◦ Large volumes of data can be processed efficiently
    ◦ Backing up is simple and can be done after each new job
    ◦ Tends to have strong error checking features built in (information
      produced is often accurate)
    ◦ Uses fewer system resources

   Appropriate contexts for use:
    ◦ Suited to regular jobs that happen at scheduled times and involve large
      quantities of data e.g.
       A payroll system
       Power Supply bills for customers
       Processing cheques
Each time one person requires a parcel to be delivered to another
country it is not processed.

You wait until several people require postal's to that country

You then get all the packages together, organise them and deliver
them on one plane journey
STEP 1                 STEP 2
Single transactions    Each transaction is collected and
are made               stored in a transaction file.
                       Transactions are sorted into same
                       order as the records in the master
                       file

                                                            STEP 3
Transaction
              Cheque
              Ac No.               BATCH                    When the processing is
               124
                                                            scheduled to run e.g.
              Cheque                                        overnight. Each record
Transaction   Ac No.
                                Transaction File            in the transaction file is
               123
                                  Cheque                    read with the
              Cheque
                                  Ac No.                    corresponding record of
                                   123
Transaction   Ac No.                                        the master file. An
                                      Cheque
               127
                                      Ac No.
                                                            updated Master file is
                                       124                  then created
                                           Cheque
                                           Ac No.
                                            127

                                                                  Master File
                                                                      (e.g. All
                                                                     customers
                                                                  details including
                                                                     name, add.
                                                                    Balance etc.)
   What is it?
    ◦ There is interaction between the ICT system and the
      user. The user reacts to prompts from the system and
      system uses these prompts to process the data

   Characteristics
    ◦ Real time (immediate)
    ◦ input-, process, output controlled by the user

   Appropriate contexts for use:
    ◦ Flight control – automatic pilot using sensors to control
      the plane
    ◦ Games – high speed action games where an immediate
      response is needed
   What is it?
    ◦ Allows many users to access and update a system at apparently the same time. Each
      transaction must be completed before the next transaction begins.

   Characteristics
    ◦   Aims to work quickly with a large amount of different transactions
    ◦   Works with multiple users
    ◦   Master file is updates immediately
    ◦   Only one record of the master file is accessed
    ◦   Master file is always kept up-to-date
    ◦   Backing up is a problem

   Appropriate contexts for use
    ◦ Booking a flight
           Requires multi-access as many travel agents need access to the same file but must be
            up-to-date as transactions are made so as not to double book
    ◦ Booking seats at a cinema
    ◦ Buying a shirt at a till in Topman
           Many tills updating the same system but a new transaction at your till can not take place
            until your transaction has been completed
   Page 99 and 100 of the McNee and Spencer Text
    Book.

   Read both Case Studies and answer the ‘End of
    sub-Topic Questions’ 4, 5 and 6 (Page 100)

   For tomorrow’s lesson (This must be printed out
    prior to lesson NOT on your arrival to the lesson)

    ◦ Thursday detention if failure to complete OR failure to
      have printed out before the lesson

More Related Content

What's hot

The buyers' guide to virtual + physical data protection
The buyers' guide to virtual + physical data protectionThe buyers' guide to virtual + physical data protection
The buyers' guide to virtual + physical data protection
Kingfin Enterprises Limited
 
Backup policy template julie bozzi oregon
Backup policy template   julie bozzi oregonBackup policy template   julie bozzi oregon
Backup policy template julie bozzi oregon
Julie Bozzi, PfPM, PMP
 
Continuous data protection
Continuous data protectionContinuous data protection
Continuous data protection
ssuser1eca7d
 
Enterprise data protection meeting
Enterprise data protection meetingEnterprise data protection meeting
Enterprise data protection meeting
csandit
 
Backup Exec 21
Backup Exec 21Backup Exec 21
Backup Exec 21
Ayman Seyam
 
Backup and recovery_redesign
Backup and recovery_redesignBackup and recovery_redesign
Backup and recovery_redesigngeorgegaudi
 
Data Recovery
Data RecoveryData Recovery
Data Recovery
usmankhanin
 
Business Continuity 2009
Business Continuity 2009Business Continuity 2009
Business Continuity 2009
OS-Cubed, Inc.
 
2010 data protection best practices
2010 data protection best practices2010 data protection best practices
2010 data protection best practices
Mario Tabuada Mussio
 
Omniback for the system administrator
Omniback for the system administratorOmniback for the system administrator
Omniback for the system administrator
Laxman J
 
Harris Bdr
Harris BdrHarris Bdr
Harris Bdr
wericsmith
 
Small Business Backup & Disaster Recovery
Small Business Backup & Disaster RecoverySmall Business Backup & Disaster Recovery
Small Business Backup & Disaster Recovery
Exigent Technologies LLC
 
HP Autonomy - Three Ways to Preserve and Protect your Virtual Infrastructure
HP Autonomy - Three Ways to Preserve and Protect your Virtual InfrastructureHP Autonomy - Three Ways to Preserve and Protect your Virtual Infrastructure
HP Autonomy - Three Ways to Preserve and Protect your Virtual Infrastructure
VMUG IT
 
ProStore Remote Backup Solution
ProStore Remote Backup SolutionProStore Remote Backup Solution
ProStore Remote Backup Solution
Procom Professional Services Limited
 
The economics of backup 5 ways disk backup can help your business
The economics of backup 5 ways disk backup can help your businessThe economics of backup 5 ways disk backup can help your business
The economics of backup 5 ways disk backup can help your businessServium
 
Dp%20 fudamentals%20%28ch1%29
Dp%20 fudamentals%20%28ch1%29Dp%20 fudamentals%20%28ch1%29
Dp%20 fudamentals%20%28ch1%29
Navid Abbaspour
 
Business Continuity Presentation
Business Continuity PresentationBusiness Continuity Presentation
Business Continuity Presentation
perry57123
 
Cost, Risk, Loss and other fun things
Cost, Risk, Loss and other fun things Cost, Risk, Loss and other fun things
Cost, Risk, Loss and other fun things
PrestoCentre
 
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyPresentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyTehmina Gulfam
 

What's hot (20)

The buyers' guide to virtual + physical data protection
The buyers' guide to virtual + physical data protectionThe buyers' guide to virtual + physical data protection
The buyers' guide to virtual + physical data protection
 
Backup policy template julie bozzi oregon
Backup policy template   julie bozzi oregonBackup policy template   julie bozzi oregon
Backup policy template julie bozzi oregon
 
Continuous data protection
Continuous data protectionContinuous data protection
Continuous data protection
 
Enterprise data protection meeting
Enterprise data protection meetingEnterprise data protection meeting
Enterprise data protection meeting
 
Backup Exec 21
Backup Exec 21Backup Exec 21
Backup Exec 21
 
Backup and recovery_redesign
Backup and recovery_redesignBackup and recovery_redesign
Backup and recovery_redesign
 
Data Recovery
Data RecoveryData Recovery
Data Recovery
 
Business Continuity 2009
Business Continuity 2009Business Continuity 2009
Business Continuity 2009
 
2010 data protection best practices
2010 data protection best practices2010 data protection best practices
2010 data protection best practices
 
Omniback for the system administrator
Omniback for the system administratorOmniback for the system administrator
Omniback for the system administrator
 
Harris Bdr
Harris BdrHarris Bdr
Harris Bdr
 
Small Business Backup & Disaster Recovery
Small Business Backup & Disaster RecoverySmall Business Backup & Disaster Recovery
Small Business Backup & Disaster Recovery
 
HP Autonomy - Three Ways to Preserve and Protect your Virtual Infrastructure
HP Autonomy - Three Ways to Preserve and Protect your Virtual InfrastructureHP Autonomy - Three Ways to Preserve and Protect your Virtual Infrastructure
HP Autonomy - Three Ways to Preserve and Protect your Virtual Infrastructure
 
ProStore Remote Backup Solution
ProStore Remote Backup SolutionProStore Remote Backup Solution
ProStore Remote Backup Solution
 
The economics of backup 5 ways disk backup can help your business
The economics of backup 5 ways disk backup can help your businessThe economics of backup 5 ways disk backup can help your business
The economics of backup 5 ways disk backup can help your business
 
Dp%20 fudamentals%20%28ch1%29
Dp%20 fudamentals%20%28ch1%29Dp%20 fudamentals%20%28ch1%29
Dp%20 fudamentals%20%28ch1%29
 
Business Continuity Presentation
Business Continuity PresentationBusiness Continuity Presentation
Business Continuity Presentation
 
What if
What ifWhat if
What if
 
Cost, Risk, Loss and other fun things
Cost, Risk, Loss and other fun things Cost, Risk, Loss and other fun things
Cost, Risk, Loss and other fun things
 
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyPresentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyy
 

Viewers also liked

2.9 The consequences of the use of ict
2.9 The consequences of the use of ict2.9 The consequences of the use of ict
2.9 The consequences of the use of ictmrmwood
 
2.8 factors affecting the use of ict
2.8 factors affecting the use of ict2.8 factors affecting the use of ict
2.8 factors affecting the use of ictmrmwood
 
3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisations3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisationsmrmwood
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11mrmwood
 
Computer misuse act new 13 12-11
Computer misuse act new 13 12-11Computer misuse act new 13 12-11
Computer misuse act new 13 12-11mrmwood
 
Copyright designs and patents act new 13 12-11
Copyright designs and patents act new 13 12-11Copyright designs and patents act new 13 12-11
Copyright designs and patents act new 13 12-11mrmwood
 
3.8 development methods
3.8 development methods3.8 development methods
3.8 development methodsmrmwood
 
3.7 developing ict solutions
3.7 developing ict solutions3.7 developing ict solutions
3.7 developing ict solutionsmrmwood
 
2.1 ict systems and components
2.1 ict systems and components2.1 ict systems and components
2.1 ict systems and componentsmrmwood
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11mrmwood
 
3.11 training and supporting users
3.11 training and supporting users3.11 training and supporting users
3.11 training and supporting usersmrmwood
 
3.12 external and internal resources
3.12 external and internal resources3.12 external and internal resources
3.12 external and internal resourcesmrmwood
 
Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents actmrmwood
 
2.3 people and ict systems
2.3 people and ict systems2.3 people and ict systems
2.3 people and ict systemsmrmwood
 
Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents actmrmwood
 
Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents actmrmwood
 
2.2 data and information
2.2 data and information2.2 data and information
2.2 data and informationmrmwood
 
3.9 techniques and tools for systems development
3.9 techniques and tools for systems development3.9 techniques and tools for systems development
3.9 techniques and tools for systems developmentmrmwood
 
3.6 legislation and regulations
3.6 legislation and regulations3.6 legislation and regulations
3.6 legislation and regulationsmrmwood
 
3.4 ict strategy
3.4 ict strategy3.4 ict strategy
3.4 ict strategymrmwood
 

Viewers also liked (20)

2.9 The consequences of the use of ict
2.9 The consequences of the use of ict2.9 The consequences of the use of ict
2.9 The consequences of the use of ict
 
2.8 factors affecting the use of ict
2.8 factors affecting the use of ict2.8 factors affecting the use of ict
2.8 factors affecting the use of ict
 
3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisations3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisations
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
 
Computer misuse act new 13 12-11
Computer misuse act new 13 12-11Computer misuse act new 13 12-11
Computer misuse act new 13 12-11
 
Copyright designs and patents act new 13 12-11
Copyright designs and patents act new 13 12-11Copyright designs and patents act new 13 12-11
Copyright designs and patents act new 13 12-11
 
3.8 development methods
3.8 development methods3.8 development methods
3.8 development methods
 
3.7 developing ict solutions
3.7 developing ict solutions3.7 developing ict solutions
3.7 developing ict solutions
 
2.1 ict systems and components
2.1 ict systems and components2.1 ict systems and components
2.1 ict systems and components
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11
 
3.11 training and supporting users
3.11 training and supporting users3.11 training and supporting users
3.11 training and supporting users
 
3.12 external and internal resources
3.12 external and internal resources3.12 external and internal resources
3.12 external and internal resources
 
Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents act
 
2.3 people and ict systems
2.3 people and ict systems2.3 people and ict systems
2.3 people and ict systems
 
Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents act
 
Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents act
 
2.2 data and information
2.2 data and information2.2 data and information
2.2 data and information
 
3.9 techniques and tools for systems development
3.9 techniques and tools for systems development3.9 techniques and tools for systems development
3.9 techniques and tools for systems development
 
3.6 legislation and regulations
3.6 legislation and regulations3.6 legislation and regulations
3.6 legislation and regulations
 
3.4 ict strategy
3.4 ict strategy3.4 ict strategy
3.4 ict strategy
 

Similar to 2.7 what ict can provide

Thick Client Testing Basics
Thick Client Testing BasicsThick Client Testing Basics
Thick Client Testing Basics
NSConclave
 
Best Practices for Building Robust Data Platform with Apache Spark and Delta
Best Practices for Building Robust Data Platform with Apache Spark and DeltaBest Practices for Building Robust Data Platform with Apache Spark and Delta
Best Practices for Building Robust Data Platform with Apache Spark and Delta
Databricks
 
AWSome day 2018 - database in cloud
AWSome day 2018 -  database in cloudAWSome day 2018 -  database in cloud
AWSome day 2018 - database in cloud
Corley S.r.l.
 
transactions-advanced for automatic payment.pptx
transactions-advanced for automatic payment.pptxtransactions-advanced for automatic payment.pptx
transactions-advanced for automatic payment.pptx
ssusereced02
 
What is Database Backup? The 3 Important Recovery Techniques from transaction...
What is Database Backup? The 3 Important Recovery Techniques from transaction...What is Database Backup? The 3 Important Recovery Techniques from transaction...
What is Database Backup? The 3 Important Recovery Techniques from transaction...
Raj vardhan
 
Transaction processing systems
Transaction processing systems Transaction processing systems
Transaction processing systems greg robertson
 
Transaction ps
Transaction psTransaction ps
Transaction psMR Z
 
Data Grids with Oracle Coherence
Data Grids with Oracle CoherenceData Grids with Oracle Coherence
Data Grids with Oracle Coherence
Ben Stopford
 
Openstack on Fedora, Fedora on Openstack: An Introduction to cloud IaaS
Openstack on Fedora, Fedora on Openstack: An Introduction to cloud IaaSOpenstack on Fedora, Fedora on Openstack: An Introduction to cloud IaaS
Openstack on Fedora, Fedora on Openstack: An Introduction to cloud IaaS
Sadique Puthen
 
20.project inventry management system
20.project inventry management system20.project inventry management system
20.project inventry management systemLapi Mics
 
Ahmed Jassat South African Oracle User Group Presentation 2012
Ahmed Jassat South African Oracle User Group Presentation 2012Ahmed Jassat South African Oracle User Group Presentation 2012
Ahmed Jassat South African Oracle User Group Presentation 2012
Zahid02
 
HSC Transaction processing systems
HSC Transaction processing systemsHSC Transaction processing systems
HSC Transaction processing systems
greg robertson
 
DatEngConf SF16 - Apache Kudu: Fast Analytics on Fast Data
DatEngConf SF16 - Apache Kudu: Fast Analytics on Fast DataDatEngConf SF16 - Apache Kudu: Fast Analytics on Fast Data
DatEngConf SF16 - Apache Kudu: Fast Analytics on Fast Data
Hakka Labs
 
Business Continuity Presentation[1]
Business Continuity Presentation[1]Business Continuity Presentation[1]
Business Continuity Presentation[1]
jrm1224
 
Datafoucs 2014 on line digital forensic investigations damir delija 2
Datafoucs 2014 on line digital forensic investigations damir delija 2Datafoucs 2014 on line digital forensic investigations damir delija 2
Datafoucs 2014 on line digital forensic investigations damir delija 2
Damir Delija
 
Why 2015 is the Year of Copy Data - What are the requirements?
Why 2015 is the Year of Copy Data - What are the requirements?Why 2015 is the Year of Copy Data - What are the requirements?
Why 2015 is the Year of Copy Data - What are the requirements?
Storage Switzerland
 
Production debugging web applications
Production debugging web applicationsProduction debugging web applications
Production debugging web applications
Ido Flatow
 
Apache flink
Apache flinkApache flink
Apache flink
pranay kumar
 
DM Radio Webinar: Adopting a Streaming-Enabled Architecture
DM Radio Webinar: Adopting a Streaming-Enabled ArchitectureDM Radio Webinar: Adopting a Streaming-Enabled Architecture
DM Radio Webinar: Adopting a Streaming-Enabled Architecture
DATAVERSITY
 

Similar to 2.7 what ict can provide (20)

Thick Client Testing Basics
Thick Client Testing BasicsThick Client Testing Basics
Thick Client Testing Basics
 
Best Practices for Building Robust Data Platform with Apache Spark and Delta
Best Practices for Building Robust Data Platform with Apache Spark and DeltaBest Practices for Building Robust Data Platform with Apache Spark and Delta
Best Practices for Building Robust Data Platform with Apache Spark and Delta
 
AWSome day 2018 - database in cloud
AWSome day 2018 -  database in cloudAWSome day 2018 -  database in cloud
AWSome day 2018 - database in cloud
 
transactions-advanced for automatic payment.pptx
transactions-advanced for automatic payment.pptxtransactions-advanced for automatic payment.pptx
transactions-advanced for automatic payment.pptx
 
What is Database Backup? The 3 Important Recovery Techniques from transaction...
What is Database Backup? The 3 Important Recovery Techniques from transaction...What is Database Backup? The 3 Important Recovery Techniques from transaction...
What is Database Backup? The 3 Important Recovery Techniques from transaction...
 
Transaction processing systems
Transaction processing systems Transaction processing systems
Transaction processing systems
 
Transaction ps
Transaction psTransaction ps
Transaction ps
 
Data Grids with Oracle Coherence
Data Grids with Oracle CoherenceData Grids with Oracle Coherence
Data Grids with Oracle Coherence
 
Openstack on Fedora, Fedora on Openstack: An Introduction to cloud IaaS
Openstack on Fedora, Fedora on Openstack: An Introduction to cloud IaaSOpenstack on Fedora, Fedora on Openstack: An Introduction to cloud IaaS
Openstack on Fedora, Fedora on Openstack: An Introduction to cloud IaaS
 
20.project inventry management system
20.project inventry management system20.project inventry management system
20.project inventry management system
 
Ahmed Jassat South African Oracle User Group Presentation 2012
Ahmed Jassat South African Oracle User Group Presentation 2012Ahmed Jassat South African Oracle User Group Presentation 2012
Ahmed Jassat South African Oracle User Group Presentation 2012
 
HSC Transaction processing systems
HSC Transaction processing systemsHSC Transaction processing systems
HSC Transaction processing systems
 
DatEngConf SF16 - Apache Kudu: Fast Analytics on Fast Data
DatEngConf SF16 - Apache Kudu: Fast Analytics on Fast DataDatEngConf SF16 - Apache Kudu: Fast Analytics on Fast Data
DatEngConf SF16 - Apache Kudu: Fast Analytics on Fast Data
 
Business Continuity Presentation[1]
Business Continuity Presentation[1]Business Continuity Presentation[1]
Business Continuity Presentation[1]
 
Lecture 5 process concept
Lecture 5   process conceptLecture 5   process concept
Lecture 5 process concept
 
Datafoucs 2014 on line digital forensic investigations damir delija 2
Datafoucs 2014 on line digital forensic investigations damir delija 2Datafoucs 2014 on line digital forensic investigations damir delija 2
Datafoucs 2014 on line digital forensic investigations damir delija 2
 
Why 2015 is the Year of Copy Data - What are the requirements?
Why 2015 is the Year of Copy Data - What are the requirements?Why 2015 is the Year of Copy Data - What are the requirements?
Why 2015 is the Year of Copy Data - What are the requirements?
 
Production debugging web applications
Production debugging web applicationsProduction debugging web applications
Production debugging web applications
 
Apache flink
Apache flinkApache flink
Apache flink
 
DM Radio Webinar: Adopting a Streaming-Enabled Architecture
DM Radio Webinar: Adopting a Streaming-Enabled ArchitectureDM Radio Webinar: Adopting a Streaming-Enabled Architecture
DM Radio Webinar: Adopting a Streaming-Enabled Architecture
 

More from mrmwood

Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Act
mrmwood
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Actmrmwood
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
mrmwood
 
3.5 ICT Policies
3.5 ICT Policies3.5 ICT Policies
3.5 ICT Policies
mrmwood
 
3.3 managing ict 3
3.3 managing ict 33.3 managing ict 3
3.3 managing ict 3mrmwood
 
3.2 information and systems
3.2 information and systems3.2 information and systems
3.2 information and systemsmrmwood
 
1.10 evaluation
1.10 evaluation1.10 evaluation
1.10 evaluationmrmwood
 
Validation and Verification
Validation and VerificationValidation and Verification
Validation and Verificationmrmwood
 
1.7 selection and use of appropriate software
1.7 selection and use of appropriate software1.7 selection and use of appropriate software
1.7 selection and use of appropriate softwaremrmwood
 

More from mrmwood (9)

Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Act
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
3.5 ICT Policies
3.5 ICT Policies3.5 ICT Policies
3.5 ICT Policies
 
3.3 managing ict 3
3.3 managing ict 33.3 managing ict 3
3.3 managing ict 3
 
3.2 information and systems
3.2 information and systems3.2 information and systems
3.2 information and systems
 
1.10 evaluation
1.10 evaluation1.10 evaluation
1.10 evaluation
 
Validation and Verification
Validation and VerificationValidation and Verification
Validation and Verification
 
1.7 selection and use of appropriate software
1.7 selection and use of appropriate software1.7 selection and use of appropriate software
1.7 selection and use of appropriate software
 

Recently uploaded

A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Ashish Kohli
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 

Recently uploaded (20)

A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 

2.7 what ict can provide

  • 1. 2.7 What ICT Can Provide
  • 2. Tweet your responses #ictdbs12
  • 3.
  • 4. 1. ICT provides what 6 features? 2. Discuss ‘Fast, repetitive processing’ 3. Discuss ‘Vast storage capacity’ 4. Discuss ‘Improved search facilities’ 5. Discuss ‘Improved presentation of information’ 6. Discuss ‘Improved accessibility of information and services’ 7. Discuss ‘Improved security of data and processes’ 8. What limitations are there for what ICT can be used for? 9. What limitations are there for what ICT systems can produce in terms of information? 10. Why else might ICT not provide the appropriate solution? 11. What 3 types of processing exist? 12. Explain Batch Processing and give an appropriate example of when it might be used. 13. Explain interactive Processing and give an appropriate example of when it might be used. 14. Explain transaction Processing and give an appropriate example of when it might be used. 15. What words could be used to distinguish between the 3 types of processing?
  • 5. 1. Fast, repetitive processing 2. Vast storage capacity 3. Improved search facilities 4. Improved presentation of information 5. Improved accessibility of information and services 6. Improved security of data and processes
  • 6.  Can perform calculations quickly  Process repetitive calculations  Mapping DNA  Financial management  Rendering 3D
  • 7.  Smaller storage space required  Shared access to digital storage
  • 8. Search on multiple criteria  Speed of search results
  • 9. Multimedia ◦ Animations ◦ Video ◦ Audio ◦ Images  Websites  Podcasts  Online polls
  • 10. World Wide Web provides us with access to up-to-date, world wide news and information  Blogs  Social Networks  Micro-blogging  Instant messaging  Chat rooms  Forums  Podcasts
  • 11. Encryption  Biometrics  Usernames and Passwords  Privileges
  • 12. Issues with over spending, failure to produce solution, lateness  Humans can still do many things better: ◦ Reasoning ◦ Opinions ◦ Speech
  • 13. GIGO  Validation  Verification  Valued Judgments  Digital from analogue
  • 14. Personal touch might be needed  Quick pencil and paper notes might be more accessible than logging on setting up a document etc.  Interpersonal communication (see doctor instead of NHS Direct)
  • 15. INPUT PROCESS OUTPUT What do we know What do we know What do we know about this? about this? about this? ENTER PRESENT DATA INFORMATION
  • 16. All computers work on a basis of INPUT, PROCESS, OUTPUT  The PROCESSING element can be treated differently depending on the circumstances.  There are 3 modes of processing to consider ◦ Batch ◦ Transaction ◦ Interactive (Real Time)  NOTE: There is some overlap between them; most transaction processing applications are also interactive
  • 17. What is it? ◦ Where data is collected together in a group (batch) before processing takes place.  Characteristics ◦ When processing takes place there is no interaction between computer and user ◦ Usually performed overnight ◦ Large volumes of data can be processed efficiently ◦ Backing up is simple and can be done after each new job ◦ Tends to have strong error checking features built in (information produced is often accurate) ◦ Uses fewer system resources  Appropriate contexts for use: ◦ Suited to regular jobs that happen at scheduled times and involve large quantities of data e.g.  A payroll system  Power Supply bills for customers  Processing cheques
  • 18. Each time one person requires a parcel to be delivered to another country it is not processed. You wait until several people require postal's to that country You then get all the packages together, organise them and deliver them on one plane journey
  • 19. STEP 1 STEP 2 Single transactions Each transaction is collected and are made stored in a transaction file. Transactions are sorted into same order as the records in the master file STEP 3 Transaction Cheque Ac No. BATCH When the processing is 124 scheduled to run e.g. Cheque overnight. Each record Transaction Ac No. Transaction File in the transaction file is 123 Cheque read with the Cheque Ac No. corresponding record of 123 Transaction Ac No. the master file. An Cheque 127 Ac No. updated Master file is 124 then created Cheque Ac No. 127 Master File (e.g. All customers details including name, add. Balance etc.)
  • 20. What is it? ◦ There is interaction between the ICT system and the user. The user reacts to prompts from the system and system uses these prompts to process the data  Characteristics ◦ Real time (immediate) ◦ input-, process, output controlled by the user  Appropriate contexts for use: ◦ Flight control – automatic pilot using sensors to control the plane ◦ Games – high speed action games where an immediate response is needed
  • 21. What is it? ◦ Allows many users to access and update a system at apparently the same time. Each transaction must be completed before the next transaction begins.  Characteristics ◦ Aims to work quickly with a large amount of different transactions ◦ Works with multiple users ◦ Master file is updates immediately ◦ Only one record of the master file is accessed ◦ Master file is always kept up-to-date ◦ Backing up is a problem  Appropriate contexts for use ◦ Booking a flight  Requires multi-access as many travel agents need access to the same file but must be up-to-date as transactions are made so as not to double book ◦ Booking seats at a cinema ◦ Buying a shirt at a till in Topman  Many tills updating the same system but a new transaction at your till can not take place until your transaction has been completed
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32. Page 99 and 100 of the McNee and Spencer Text Book.  Read both Case Studies and answer the ‘End of sub-Topic Questions’ 4, 5 and 6 (Page 100)  For tomorrow’s lesson (This must be printed out prior to lesson NOT on your arrival to the lesson) ◦ Thursday detention if failure to complete OR failure to have printed out before the lesson