Resources
Organisations require fewer external memory devices as their data is stored on third party networks but they still require the ICT resources to gather, maintain and use their data
The third party is responsible for security of the stored data so the organisations do not need to purchase or licence this software for themselves
The organisations depend on reliable high speed broadband connections to the Internet to save and retrieve their data quickly and accurately so that it is available for their day to day operations
DP Legislation
Organisations depend on the third party complying with DP legislation but this can be difficult to ensure An organisation’s data may be stored globally which makes enforcement of DP legislation difficult, for example restricting data to EU
Data users find it even more difficult to discover the data held about them, where it is being held and by whom
marlinbito answered the question on July 2, 2018 at 05:12
- A manufacturer uses robots to assemble touch screens for computers. Describe the main features of touch screen technology.(Solved)
A manufacturer uses robots to assemble touch screens for computers. Describe the main features of touch screen technology.
Date posted: July 2, 2018. Answers (1)
- Describe the main features of an interactive DVD which make it suitable for training users(Solved)
Describe the main features of an interactive DVD which make it suitable for training users
Date posted: July 1, 2018. Answers (1)
- Computer users can get support and training in various ways. Explain how users could get support from a user group.(Solved)
Computer users can get support and training in various ways. Explain how users could get support from a user group.
Date posted: July 1, 2018. Answers (1)
- Name and describe two psychological factors which can influence how humans interact with a computer.(Solved)
Name and describe two psychological factors which can influence how humans interact with a computer.
Date posted: July 1, 2018. Answers (1)
- Describe one method of ensuring that data transmitted over a network is secure.(Solved)
Describe one method of ensuring that data transmitted over a network is secure.
Date posted: July 1, 2018. Answers (1)
- It is important that data on a network is kept secure. Describe one method of ensuring that access to data on a network is restricted(Solved)
It is important that data on a network is kept secure. Describe one method of ensuring that access to data on a network is restricted
Date posted: July 1, 2018. Answers (1)
- Name and describe one other method of detecting data transmission errors(Solved)
Name and describe one other method of detecting data transmission errors
Date posted: July 1, 2018. Answers (1)
- Parity bits can be used to detect errors. Evaluate the use of parity bits in detecting data transmission errors.(Solved)
Parity bits can be used to detect errors. Evaluate the use of parity bits in detecting data transmission errors.
Date posted: July 1, 2018. Answers (1)
- The organisation uses the DBMS to process real-time transactions. Describe a suitable backup and recovery strategy for the DBMS.(Solved)
The organisation uses the DBMS to process real-time transactions. Describe a suitable backup and recovery strategy for the DBMS.
Date posted: July 1, 2018. Answers (1)
- An organisation uses a Database Management System (DBMS) and a decision support system. Explain the role of the Database Administrator (DBA).(Solved)
An organisation uses a Database Management System (DBMS) and a decision support system. Explain the role of the Database Administrator (DBA).
Date posted: July 1, 2018. Answers (1)
- Describe two benefits of developing a system in-house(Solved)
Describe two benefits of developing a system in-house
Date posted: July 1, 2018. Answers (1)
- The information system was developed in-house using RAD.
Describe the main features of RAD.
(Solved)
The information system was developed in-house using RAD.
Describe the main features of RAD.
Date posted: July 1, 2018. Answers (1)
- Describe the main features of a disaster recovery plan.(Solved)
Describe the main features of a disaster recovery plan.
Date posted: July 1, 2018. Answers (1)
- The website was developed using HTML. Explain how a web page is created using HTML.
(Solved)
The website was developed using HTML. Explain how a web page is created using HTML.
Date posted: July 1, 2018. Answers (1)
- The retailer also sells its products using a website.
Describe two advantages to the retailer of selling its products on the Internet compared to selling them...(Solved)
The retailer also sells its products using a website.
Describe two advantages to the retailer of selling its products on the Internet compared to selling them in its shops.
Date posted: July 1, 2018. Answers (1)
- Describe the main features of EFTPOS.(Solved)
Describe the main features of EFTPOS.
Date posted: July 1, 2018. Answers (1)
- Describe the main features of network communication technology which enable two mobile phone users to talk to each other.
(Solved)
Describe the main features of network communication technology which enable two mobile phone users to talk to each other.
Date posted: July 1, 2018. Answers (1)
- Describe the main features of Bluetooth.
(Solved)
Describe the main features of Bluetooth.
Date posted: July 1, 2018. Answers (1)
- Explain the purpose of the TCP layer(Solved)
Explain the purpose of the TCP layer
Date posted: July 1, 2018. Answers (1)
- Explain why a communications protocol is needed when data is transferred over a network.(Solved)
Explain why a communications protocol is needed when data is transferred over a network.
Date posted: July 1, 2018. Answers (1)