SlideShare ist ein Scribd-Unternehmen logo
1 von 32
2.7 What ICT Can Provide
   Tweet your responses #ictdbs12
1.    ICT provides what 6 features?
2.    Discuss ‘Fast, repetitive processing’
3.    Discuss ‘Vast storage capacity’
4.    Discuss ‘Improved search facilities’
5.    Discuss ‘Improved presentation of information’
6.    Discuss ‘Improved accessibility of information and services’
7.    Discuss ‘Improved security of data and processes’
8.    What limitations are there for what ICT can be used for?
9.    What limitations are there for what ICT systems can produce in terms of
      information?
10.   Why else might ICT not provide the appropriate solution?
11.   What 3 types of processing exist?
12.   Explain Batch Processing and give an appropriate example of when it might be
      used.
13.   Explain interactive Processing and give an appropriate example of when it
      might be used.
14.   Explain transaction Processing and give an appropriate example of when it
      might be used.
15.   What words could be used to distinguish between the 3 types of processing?
1.   Fast, repetitive processing
2.   Vast storage capacity
3.   Improved search facilities
4.   Improved presentation of information
5.   Improved accessibility of information and
     services
6.   Improved security of data and processes
 Can perform calculations quickly
 Process repetitive calculations
     Mapping DNA
     Financial management
     Rendering 3D
 Smaller storage space required
 Shared access to digital storage
   Search on multiple criteria
   Speed of search results
   Multimedia
    ◦   Animations
    ◦   Video
    ◦   Audio
    ◦   Images
   Websites
   Podcasts
   Online polls
   World Wide Web provides us with access to
    up-to-date, world wide news and information
   Blogs
   Social Networks
   Micro-blogging
   Instant messaging
   Chat rooms
   Forums
   Podcasts
   Encryption
   Biometrics
   Usernames and Passwords
   Privileges
   Issues with over spending, failure to produce
    solution, lateness
   Humans can still do many things better:
    ◦ Reasoning
    ◦ Opinions
    ◦ Speech
   GIGO
   Validation
   Verification
   Valued Judgments
   Digital from analogue
   Personal touch might be needed
   Quick pencil and paper notes might be more
    accessible than logging on setting up a
    document etc.
   Interpersonal communication (see doctor
    instead of NHS Direct)
INPUT            PROCESS           OUTPUT


What do we know   What do we know   What do we know
  about this?       about this?       about this?

    ENTER                               PRESENT
    DATA                             INFORMATION
   All computers work on a basis of
    INPUT, PROCESS, OUTPUT

   The PROCESSING element can be treated differently
    depending on the circumstances.

   There are 3 modes of processing to consider
    ◦ Batch
    ◦ Transaction
    ◦ Interactive (Real Time)

   NOTE: There is some overlap between them; most
    transaction processing applications are also
    interactive
   What is it?
    ◦ Where data is collected together in a group (batch) before processing
      takes place.

   Characteristics
    ◦ When processing takes place there is no interaction between computer and
      user
    ◦ Usually performed overnight
    ◦ Large volumes of data can be processed efficiently
    ◦ Backing up is simple and can be done after each new job
    ◦ Tends to have strong error checking features built in (information
      produced is often accurate)
    ◦ Uses fewer system resources

   Appropriate contexts for use:
    ◦ Suited to regular jobs that happen at scheduled times and involve large
      quantities of data e.g.
       A payroll system
       Power Supply bills for customers
       Processing cheques
Each time one person requires a parcel to be delivered to another
country it is not processed.

You wait until several people require postal's to that country

You then get all the packages together, organise them and deliver
them on one plane journey
STEP 1                 STEP 2
Single transactions    Each transaction is collected and
are made               stored in a transaction file.
                       Transactions are sorted into same
                       order as the records in the master
                       file

                                                            STEP 3
Transaction
              Cheque
              Ac No.               BATCH                    When the processing is
               124
                                                            scheduled to run e.g.
              Cheque                                        overnight. Each record
Transaction   Ac No.
                                Transaction File            in the transaction file is
               123
                                  Cheque                    read with the
              Cheque
                                  Ac No.                    corresponding record of
                                   123
Transaction   Ac No.                                        the master file. An
                                      Cheque
               127
                                      Ac No.
                                                            updated Master file is
                                       124                  then created
                                           Cheque
                                           Ac No.
                                            127

                                                                  Master File
                                                                      (e.g. All
                                                                     customers
                                                                  details including
                                                                     name, add.
                                                                    Balance etc.)
   What is it?
    ◦ There is interaction between the ICT system and the
      user. The user reacts to prompts from the system and
      system uses these prompts to process the data

   Characteristics
    ◦ Real time (immediate)
    ◦ input-, process, output controlled by the user

   Appropriate contexts for use:
    ◦ Flight control – automatic pilot using sensors to control
      the plane
    ◦ Games – high speed action games where an immediate
      response is needed
   What is it?
    ◦ Allows many users to access and update a system at apparently the same time. Each
      transaction must be completed before the next transaction begins.

   Characteristics
    ◦   Aims to work quickly with a large amount of different transactions
    ◦   Works with multiple users
    ◦   Master file is updates immediately
    ◦   Only one record of the master file is accessed
    ◦   Master file is always kept up-to-date
    ◦   Backing up is a problem

   Appropriate contexts for use
    ◦ Booking a flight
           Requires multi-access as many travel agents need access to the same file but must be
            up-to-date as transactions are made so as not to double book
    ◦ Booking seats at a cinema
    ◦ Buying a shirt at a till in Topman
           Many tills updating the same system but a new transaction at your till can not take place
            until your transaction has been completed
   Page 99 and 100 of the McNee and Spencer Text
    Book.

   Read both Case Studies and answer the ‘End of
    sub-Topic Questions’ 4, 5 and 6 (Page 100)

   For tomorrow’s lesson (This must be printed out
    prior to lesson NOT on your arrival to the lesson)

    ◦ Thursday detention if failure to complete OR failure to
      have printed out before the lesson

Weitere ähnliche Inhalte

Was ist angesagt?

Backup and recovery_redesign
Backup and recovery_redesignBackup and recovery_redesign
Backup and recovery_redesign
georgegaudi
 
The economics of backup 5 ways disk backup can help your business
The economics of backup 5 ways disk backup can help your businessThe economics of backup 5 ways disk backup can help your business
The economics of backup 5 ways disk backup can help your business
Servium
 
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyPresentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyy
Tehmina Gulfam
 

Was ist angesagt? (20)

The buyers' guide to virtual + physical data protection
The buyers' guide to virtual + physical data protectionThe buyers' guide to virtual + physical data protection
The buyers' guide to virtual + physical data protection
 
Backup policy template julie bozzi oregon
Backup policy template   julie bozzi oregonBackup policy template   julie bozzi oregon
Backup policy template julie bozzi oregon
 
Continuous data protection
Continuous data protectionContinuous data protection
Continuous data protection
 
Enterprise data protection meeting
Enterprise data protection meetingEnterprise data protection meeting
Enterprise data protection meeting
 
Backup Exec 21
Backup Exec 21Backup Exec 21
Backup Exec 21
 
Backup and recovery_redesign
Backup and recovery_redesignBackup and recovery_redesign
Backup and recovery_redesign
 
Data Recovery
Data RecoveryData Recovery
Data Recovery
 
Business Continuity 2009
Business Continuity 2009Business Continuity 2009
Business Continuity 2009
 
2010 data protection best practices
2010 data protection best practices2010 data protection best practices
2010 data protection best practices
 
Omniback for the system administrator
Omniback for the system administratorOmniback for the system administrator
Omniback for the system administrator
 
Harris Bdr
Harris BdrHarris Bdr
Harris Bdr
 
Small Business Backup & Disaster Recovery
Small Business Backup & Disaster RecoverySmall Business Backup & Disaster Recovery
Small Business Backup & Disaster Recovery
 
HP Autonomy - Three Ways to Preserve and Protect your Virtual Infrastructure
HP Autonomy - Three Ways to Preserve and Protect your Virtual InfrastructureHP Autonomy - Three Ways to Preserve and Protect your Virtual Infrastructure
HP Autonomy - Three Ways to Preserve and Protect your Virtual Infrastructure
 
ProStore Remote Backup Solution
ProStore Remote Backup SolutionProStore Remote Backup Solution
ProStore Remote Backup Solution
 
The economics of backup 5 ways disk backup can help your business
The economics of backup 5 ways disk backup can help your businessThe economics of backup 5 ways disk backup can help your business
The economics of backup 5 ways disk backup can help your business
 
Dp%20 fudamentals%20%28ch1%29
Dp%20 fudamentals%20%28ch1%29Dp%20 fudamentals%20%28ch1%29
Dp%20 fudamentals%20%28ch1%29
 
Business Continuity Presentation
Business Continuity PresentationBusiness Continuity Presentation
Business Continuity Presentation
 
What if
What ifWhat if
What if
 
Cost, Risk, Loss and other fun things
Cost, Risk, Loss and other fun things Cost, Risk, Loss and other fun things
Cost, Risk, Loss and other fun things
 
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyPresentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyy
 

Andere mochten auch

2.9 The consequences of the use of ict
2.9 The consequences of the use of ict2.9 The consequences of the use of ict
2.9 The consequences of the use of ict
mrmwood
 
2.8 factors affecting the use of ict
2.8 factors affecting the use of ict2.8 factors affecting the use of ict
2.8 factors affecting the use of ict
mrmwood
 
3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisations3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisations
mrmwood
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
mrmwood
 
Computer misuse act new 13 12-11
Computer misuse act new 13 12-11Computer misuse act new 13 12-11
Computer misuse act new 13 12-11
mrmwood
 
Copyright designs and patents act new 13 12-11
Copyright designs and patents act new 13 12-11Copyright designs and patents act new 13 12-11
Copyright designs and patents act new 13 12-11
mrmwood
 
3.8 development methods
3.8 development methods3.8 development methods
3.8 development methods
mrmwood
 
3.7 developing ict solutions
3.7 developing ict solutions3.7 developing ict solutions
3.7 developing ict solutions
mrmwood
 
2.1 ict systems and components
2.1 ict systems and components2.1 ict systems and components
2.1 ict systems and components
mrmwood
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11
mrmwood
 
3.11 training and supporting users
3.11 training and supporting users3.11 training and supporting users
3.11 training and supporting users
mrmwood
 
3.12 external and internal resources
3.12 external and internal resources3.12 external and internal resources
3.12 external and internal resources
mrmwood
 
Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents act
mrmwood
 
2.3 people and ict systems
2.3 people and ict systems2.3 people and ict systems
2.3 people and ict systems
mrmwood
 
Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents act
mrmwood
 
Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents act
mrmwood
 
2.2 data and information
2.2 data and information2.2 data and information
2.2 data and information
mrmwood
 
3.9 techniques and tools for systems development
3.9 techniques and tools for systems development3.9 techniques and tools for systems development
3.9 techniques and tools for systems development
mrmwood
 
3.6 legislation and regulations
3.6 legislation and regulations3.6 legislation and regulations
3.6 legislation and regulations
mrmwood
 
3.4 ict strategy
3.4 ict strategy3.4 ict strategy
3.4 ict strategy
mrmwood
 

Andere mochten auch (20)

2.9 The consequences of the use of ict
2.9 The consequences of the use of ict2.9 The consequences of the use of ict
2.9 The consequences of the use of ict
 
2.8 factors affecting the use of ict
2.8 factors affecting the use of ict2.8 factors affecting the use of ict
2.8 factors affecting the use of ict
 
3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisations3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisations
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
 
Computer misuse act new 13 12-11
Computer misuse act new 13 12-11Computer misuse act new 13 12-11
Computer misuse act new 13 12-11
 
Copyright designs and patents act new 13 12-11
Copyright designs and patents act new 13 12-11Copyright designs and patents act new 13 12-11
Copyright designs and patents act new 13 12-11
 
3.8 development methods
3.8 development methods3.8 development methods
3.8 development methods
 
3.7 developing ict solutions
3.7 developing ict solutions3.7 developing ict solutions
3.7 developing ict solutions
 
2.1 ict systems and components
2.1 ict systems and components2.1 ict systems and components
2.1 ict systems and components
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11
 
3.11 training and supporting users
3.11 training and supporting users3.11 training and supporting users
3.11 training and supporting users
 
3.12 external and internal resources
3.12 external and internal resources3.12 external and internal resources
3.12 external and internal resources
 
Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents act
 
2.3 people and ict systems
2.3 people and ict systems2.3 people and ict systems
2.3 people and ict systems
 
Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents act
 
Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents act
 
2.2 data and information
2.2 data and information2.2 data and information
2.2 data and information
 
3.9 techniques and tools for systems development
3.9 techniques and tools for systems development3.9 techniques and tools for systems development
3.9 techniques and tools for systems development
 
3.6 legislation and regulations
3.6 legislation and regulations3.6 legislation and regulations
3.6 legislation and regulations
 
3.4 ict strategy
3.4 ict strategy3.4 ict strategy
3.4 ict strategy
 

Ähnlich wie 2.7 what ict can provide

Transaction processing systems
Transaction processing systems Transaction processing systems
Transaction processing systems
greg robertson
 
Transaction ps
Transaction psTransaction ps
Transaction ps
MR Z
 
20.project inventry management system
20.project inventry management system20.project inventry management system
20.project inventry management system
Lapi Mics
 

Ähnlich wie 2.7 what ict can provide (20)

Thick Client Testing Basics
Thick Client Testing BasicsThick Client Testing Basics
Thick Client Testing Basics
 
Best Practices for Building Robust Data Platform with Apache Spark and Delta
Best Practices for Building Robust Data Platform with Apache Spark and DeltaBest Practices for Building Robust Data Platform with Apache Spark and Delta
Best Practices for Building Robust Data Platform with Apache Spark and Delta
 
AWSome day 2018 - database in cloud
AWSome day 2018 -  database in cloudAWSome day 2018 -  database in cloud
AWSome day 2018 - database in cloud
 
transactions-advanced for automatic payment.pptx
transactions-advanced for automatic payment.pptxtransactions-advanced for automatic payment.pptx
transactions-advanced for automatic payment.pptx
 
What is Database Backup? The 3 Important Recovery Techniques from transaction...
What is Database Backup? The 3 Important Recovery Techniques from transaction...What is Database Backup? The 3 Important Recovery Techniques from transaction...
What is Database Backup? The 3 Important Recovery Techniques from transaction...
 
Transaction processing systems
Transaction processing systems Transaction processing systems
Transaction processing systems
 
Transaction ps
Transaction psTransaction ps
Transaction ps
 
Data Grids with Oracle Coherence
Data Grids with Oracle CoherenceData Grids with Oracle Coherence
Data Grids with Oracle Coherence
 
Openstack on Fedora, Fedora on Openstack: An Introduction to cloud IaaS
Openstack on Fedora, Fedora on Openstack: An Introduction to cloud IaaSOpenstack on Fedora, Fedora on Openstack: An Introduction to cloud IaaS
Openstack on Fedora, Fedora on Openstack: An Introduction to cloud IaaS
 
20.project inventry management system
20.project inventry management system20.project inventry management system
20.project inventry management system
 
Ahmed Jassat South African Oracle User Group Presentation 2012
Ahmed Jassat South African Oracle User Group Presentation 2012Ahmed Jassat South African Oracle User Group Presentation 2012
Ahmed Jassat South African Oracle User Group Presentation 2012
 
HSC Transaction processing systems
HSC Transaction processing systemsHSC Transaction processing systems
HSC Transaction processing systems
 
DatEngConf SF16 - Apache Kudu: Fast Analytics on Fast Data
DatEngConf SF16 - Apache Kudu: Fast Analytics on Fast DataDatEngConf SF16 - Apache Kudu: Fast Analytics on Fast Data
DatEngConf SF16 - Apache Kudu: Fast Analytics on Fast Data
 
Business Continuity Presentation[1]
Business Continuity Presentation[1]Business Continuity Presentation[1]
Business Continuity Presentation[1]
 
Lecture 5 process concept
Lecture 5   process conceptLecture 5   process concept
Lecture 5 process concept
 
Datafoucs 2014 on line digital forensic investigations damir delija 2
Datafoucs 2014 on line digital forensic investigations damir delija 2Datafoucs 2014 on line digital forensic investigations damir delija 2
Datafoucs 2014 on line digital forensic investigations damir delija 2
 
Why 2015 is the Year of Copy Data - What are the requirements?
Why 2015 is the Year of Copy Data - What are the requirements?Why 2015 is the Year of Copy Data - What are the requirements?
Why 2015 is the Year of Copy Data - What are the requirements?
 
Production debugging web applications
Production debugging web applicationsProduction debugging web applications
Production debugging web applications
 
Apache flink
Apache flinkApache flink
Apache flink
 
DM Radio Webinar: Adopting a Streaming-Enabled Architecture
DM Radio Webinar: Adopting a Streaming-Enabled ArchitectureDM Radio Webinar: Adopting a Streaming-Enabled Architecture
DM Radio Webinar: Adopting a Streaming-Enabled Architecture
 

Mehr von mrmwood (9)

Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Act
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
3.5 ICT Policies
3.5 ICT Policies3.5 ICT Policies
3.5 ICT Policies
 
3.3 managing ict 3
3.3 managing ict 33.3 managing ict 3
3.3 managing ict 3
 
3.2 information and systems
3.2 information and systems3.2 information and systems
3.2 information and systems
 
1.10 evaluation
1.10 evaluation1.10 evaluation
1.10 evaluation
 
Validation and Verification
Validation and VerificationValidation and Verification
Validation and Verification
 
1.7 selection and use of appropriate software
1.7 selection and use of appropriate software1.7 selection and use of appropriate software
1.7 selection and use of appropriate software
 

Kürzlich hochgeladen

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Kürzlich hochgeladen (20)

Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 

2.7 what ict can provide

  • 1. 2.7 What ICT Can Provide
  • 2. Tweet your responses #ictdbs12
  • 3.
  • 4. 1. ICT provides what 6 features? 2. Discuss ‘Fast, repetitive processing’ 3. Discuss ‘Vast storage capacity’ 4. Discuss ‘Improved search facilities’ 5. Discuss ‘Improved presentation of information’ 6. Discuss ‘Improved accessibility of information and services’ 7. Discuss ‘Improved security of data and processes’ 8. What limitations are there for what ICT can be used for? 9. What limitations are there for what ICT systems can produce in terms of information? 10. Why else might ICT not provide the appropriate solution? 11. What 3 types of processing exist? 12. Explain Batch Processing and give an appropriate example of when it might be used. 13. Explain interactive Processing and give an appropriate example of when it might be used. 14. Explain transaction Processing and give an appropriate example of when it might be used. 15. What words could be used to distinguish between the 3 types of processing?
  • 5. 1. Fast, repetitive processing 2. Vast storage capacity 3. Improved search facilities 4. Improved presentation of information 5. Improved accessibility of information and services 6. Improved security of data and processes
  • 6.  Can perform calculations quickly  Process repetitive calculations  Mapping DNA  Financial management  Rendering 3D
  • 7.  Smaller storage space required  Shared access to digital storage
  • 8. Search on multiple criteria  Speed of search results
  • 9. Multimedia ◦ Animations ◦ Video ◦ Audio ◦ Images  Websites  Podcasts  Online polls
  • 10. World Wide Web provides us with access to up-to-date, world wide news and information  Blogs  Social Networks  Micro-blogging  Instant messaging  Chat rooms  Forums  Podcasts
  • 11. Encryption  Biometrics  Usernames and Passwords  Privileges
  • 12. Issues with over spending, failure to produce solution, lateness  Humans can still do many things better: ◦ Reasoning ◦ Opinions ◦ Speech
  • 13. GIGO  Validation  Verification  Valued Judgments  Digital from analogue
  • 14. Personal touch might be needed  Quick pencil and paper notes might be more accessible than logging on setting up a document etc.  Interpersonal communication (see doctor instead of NHS Direct)
  • 15. INPUT PROCESS OUTPUT What do we know What do we know What do we know about this? about this? about this? ENTER PRESENT DATA INFORMATION
  • 16. All computers work on a basis of INPUT, PROCESS, OUTPUT  The PROCESSING element can be treated differently depending on the circumstances.  There are 3 modes of processing to consider ◦ Batch ◦ Transaction ◦ Interactive (Real Time)  NOTE: There is some overlap between them; most transaction processing applications are also interactive
  • 17. What is it? ◦ Where data is collected together in a group (batch) before processing takes place.  Characteristics ◦ When processing takes place there is no interaction between computer and user ◦ Usually performed overnight ◦ Large volumes of data can be processed efficiently ◦ Backing up is simple and can be done after each new job ◦ Tends to have strong error checking features built in (information produced is often accurate) ◦ Uses fewer system resources  Appropriate contexts for use: ◦ Suited to regular jobs that happen at scheduled times and involve large quantities of data e.g.  A payroll system  Power Supply bills for customers  Processing cheques
  • 18. Each time one person requires a parcel to be delivered to another country it is not processed. You wait until several people require postal's to that country You then get all the packages together, organise them and deliver them on one plane journey
  • 19. STEP 1 STEP 2 Single transactions Each transaction is collected and are made stored in a transaction file. Transactions are sorted into same order as the records in the master file STEP 3 Transaction Cheque Ac No. BATCH When the processing is 124 scheduled to run e.g. Cheque overnight. Each record Transaction Ac No. Transaction File in the transaction file is 123 Cheque read with the Cheque Ac No. corresponding record of 123 Transaction Ac No. the master file. An Cheque 127 Ac No. updated Master file is 124 then created Cheque Ac No. 127 Master File (e.g. All customers details including name, add. Balance etc.)
  • 20. What is it? ◦ There is interaction between the ICT system and the user. The user reacts to prompts from the system and system uses these prompts to process the data  Characteristics ◦ Real time (immediate) ◦ input-, process, output controlled by the user  Appropriate contexts for use: ◦ Flight control – automatic pilot using sensors to control the plane ◦ Games – high speed action games where an immediate response is needed
  • 21. What is it? ◦ Allows many users to access and update a system at apparently the same time. Each transaction must be completed before the next transaction begins.  Characteristics ◦ Aims to work quickly with a large amount of different transactions ◦ Works with multiple users ◦ Master file is updates immediately ◦ Only one record of the master file is accessed ◦ Master file is always kept up-to-date ◦ Backing up is a problem  Appropriate contexts for use ◦ Booking a flight  Requires multi-access as many travel agents need access to the same file but must be up-to-date as transactions are made so as not to double book ◦ Booking seats at a cinema ◦ Buying a shirt at a till in Topman  Many tills updating the same system but a new transaction at your till can not take place until your transaction has been completed
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32. Page 99 and 100 of the McNee and Spencer Text Book.  Read both Case Studies and answer the ‘End of sub-Topic Questions’ 4, 5 and 6 (Page 100)  For tomorrow’s lesson (This must be printed out prior to lesson NOT on your arrival to the lesson) ◦ Thursday detention if failure to complete OR failure to have printed out before the lesson