All posts by Deleted User

Info 2: Topic 7 What Can ICT Provide

What can ICT provide:

  1. Fast Repetitive Processing: Due to the introcudtion of ICT many business transactions can be performed quickly by the processors in computers.

Examples of where fast repetitive processing would be required:

  • Processing of credit card accounts
  • Producing itemized phone bills
  • Production of accurate weather forecasts
  • Production of Utility Bills
  • Processing transactions in e commerce system

2.  Vast Storage Capacity: The storage now offered by ICT systems are now at a stage were they are almost limitless and cheaper than it used to be. Vast storage capacity can be available in these forms:

  • ROM and RAM which allow many applications to be run together
  • Optical Media such as DVD-RW are ideal for the storage of photographs, videos and multimedia programs
  • Flash/Pen Drives which allow data to be transferred from one computer to another quickly.

3.  The facility to search and combine data in many different ways that would otherwise be impossible. Communication technologies such as networks and the internet mean that data can be obtained quickly from different sources and combined together such as CCTV footage to solve a crime.

4. Improved presentation of information: Nowadays it’s very easy to obtain images due to being able to copy them from the internet and using digital cameras. This is similar with video and audio files. This can enable materials such as video files and images to be incorporated into material such as brochures and presentations.

5. Improved accessibility to Information and services: In the modern era, it is possible to shop for groceries and other items from home which is hugely beneficial to elderly and disabled people. Due to an improved access to information an individual is able to access these services and information:

  • Latest News
  • Reviews for books, films and holiday destinations
  • Opening times for stores
  • Content on any subject imaginable

 

6. Improved security of data and processes: Data can now be kept more securely in ICT systems. For  example:

  • Logs can be kept to show and enable user permissions to only allow certain people to access particular information.
  • Bio-metric Security which can be used to check that only authorized people have access to ICT systems
  • Processes such as the transfer of data can be secured by using encryption technology so that if the data was obtained illegally the security of the data wouldn’t be compromised as the thief wouldn’t be able to understand the data.

In regards to networks, security can be centralized by:

  • A single backup being taken to back up all files on the network
  • Someone being given responsibility for taking the backup copies of information and data

 

However, there are limitations with ICT which are usually caused by hardware limitations, software limitations, communications limitations, current legislation and inappropriate design for systems and poor data control mechanisms.

Hardware limitations

  1. Amount of main memory: The more memory, the more data that can be held for immediate access it from disk which takes time.
  2. Large amounts of memory are needed for multi tasking in which the more programs an individual is working on the more demand they’re putting on the memory.
  3. Printers have some memory known as buffer memory. Buffer memory allows the computer to get on with other work whilst the printer prints. However, a disadvantage of buffer memory is that it would restrict a user from carrying on working during large print sessions

 

Communication Limitations

Most computers are now networked. There are two main communications limitations:

  1. Network topology: The network topology is the way in which the computers are linked together. Certain topologies can only contain a certain maximum number of terminals.
  2. Network has grown too big: If terminals keep getting added to a network without any other changes the whole network will start to run slow in which file transfer will take a long time which may frustrate users.

 

Software Limitations

There are a number of software limitations such as:

  1. Ability to transfer data as data is frequently passed from one piece of software to another. If one piece of software is unable to read the data produced by a different piece of software, it would be a serious limitation.
  2. Poorly designed software causes user frustration and stress and can also cause RSI if excess keyboard input is unnecessarily needed.
  3. Software often come with bugs which cause systems to crash.

 

Fitting in with current legislation

The data protection act 1998 covers the way personal data can be processed. This means that organizations cannot simply process this personal data in the way they’d have liked to but instead have to obey the law.

An example of a limitation of the Data Protection Act (1998) is that if theres a development of a huge database which is to be used by the government and some private organizations where by they’ll be able to access the same set of information will not be able to occur. This is due to the Data Protection Act (1998) stating that data collection of one or specified purposes can’t be used for different purposes. Without a change in the law this would limit the use of the database.

 

In appropriate system design

In appropriate system design is usually caused by inexperienced project development, lack of management and a lack of control which may lead to stress, frustration and RSI.

 

Poor or inappropriate data control mechanisms

Data control mechanisms should be put in place by individuals or organizations to protect data.  Ways this is done:

  1. No proper verification or validation: Data control mechanisms ensure that the data entered into and processed by the ICT system are correct and that human errors have been avoided. Appropriate verification and validation checks must be in place to prevent, as far as possible, introducing errors during the data input stage. A database containing incorrect information cannot be relied upon and places serious limitations on the systems’d usefulness.
  2. No proper limits to access: There may no longer be no proper access controls in place to limit access to personal data, which may cause the Data Protection Act (1998) to be breached.
  3. No backup procedures: There may be no backup procedures in place and this can cause the loss of important data.

 

Limitations in the information ICT produces:

If an ICT system is developed without proper analysis and consultation with the clients and users, then when it is first used the users will soon identify things that the system should have produced but doesn’t.  The perfect ICT system is almost impossible to produce, because you would need infinite time and money and these are always restricted.

ICT systems don’t always provide the most appropriate solutions

There are many different ways to solve a problem and some use ICT and some don’t. An artist or designer may like to use an art package or computer aided design software to produce a drawing or design. Some artists may feel that they can be more creative simply by using pencil and paper for their initial designs.

 

Types of processing

ICT systems take data and processes it to produce information
INPUT -> PROCESS -> OUTPUT

Processing can be divided into the following three types:

  1. Batch
  2. Transaction
  3. Real-time

Batch Processing is when all the inputs needed are collected, batched together, inputted and processed in one go. The main features of batch processing include:

  • Once the input data has been entered,the processing takes place automatically in which there is no human intervention during processing.
  • Data builds up over time and it’s then processed periodically (e.g every month or week)
  • Used for large volumes of transactions
  • Transactions are processed as a group and not processed individually

Examples of batch processing:

  • Marking and processing of multiple choice examination/ test papers.
  • Cheque clearing in banks
  • Preparing a company’s monthly payroll using input time data collected from time sheets/clock cards

 

Transaction processing is a form of processing each transaction as it arises such as:

  • An order being taken
  • A customer making a payment

A flight being booked
A theatre seat being reserved

Features of a transaction processing system include:

  • It’s an example of an interactive system as there is constant communication between the user and the computer
  • A transaction is dealt with as soon as it occurs in which each transaction is completed before the next transaction is begun.
  • Ideal for booking systems as it’ll be impossible to book the same seat twice

Examples of transaction processing:

  • Booking systems for holidays , concerts and sports events
  • Insurance quotes/ renewals
  • Taking or orders for goods over the telephone

Real-time processing is the processing where the input data is processed immediately as it arrives in which the results have a direct effect on the next sets of data.

Examples of real time processing:

  • Flight control where automatic pilot or fly-by-wire computer system takes over flying the plane using the input data such as from the computer containing the flight plan and data from the sensors on the plane.
  • In high speed action games where an immediate response is needed.