







Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Definitions and explanations of various terms related to data protection and network security. Topics include the data protection act, personal data, rights of data subjects, computer misuse act, network security, physical security, software security, and user access. Learn about the importance of data protection and the measures to ensure data security.
What you will learn
Typology: Quizzes
1 / 13
This page cannot be seen from the preview
Don't miss anything!
TERM 2
DEFINITION 2
TERM 3
DEFINITION 3
TERM 4
DEFINITION 4 Software that allows the user to enter a variety of information about the start and destination of a journey. Route can be requested and printed out prior to the journey and from the organisations website or through the use of a satnav. With an in-car system, it is possible to change the route mid journey. Some systems can automatically receive the traffic information. TERM 5
DEFINITION 5 Will find a route from an origin to a destination Will offer alternative routes for the user to choose from. Software produces information on: suggested route Suggested Travel time Distance to destination Toll Charges Estimated fuel costs Alternative routes
Modifying standard software to suit a particular application or user Usually Involves adding form controls Advantages: -Application is simplified Less mistakes made by novice users Faster to enter data & make choices Disadvantages: Level of knowledge required to create & test the interface Time taken to modify the interface Simplified interface may restrict advanced users TERM 7
DEFINITION 7 A set of rules followed on all documents The public will become familiar with an organisations house style House Style Features Fonts to be used The different paragraph styles the layout of documents any graphics that can be used the company's colour scheme may be utilised Logos are part of a companies house style TERM 8
DEFINITION 8 Layout of the screen - Uncluttered
DEFINITION 9
TERM 10
DEFINITION 10 A slideshow presentation 'Style sheet' - created by an employee/organisation Identifies: The theme to be used for the presentation - background colour.. position of graphics to be shown on each slide - E.g.company logo The position of information to appear on each slide - Header/footer, date, slide number Text formatting - font type, size, colour
TERM 17
DEFINITION 17
TERM 18
DEFINITION 18 A model usually consists of a series of rules-The rules usually written as mathematical expressions-The rules determine how the model will behave in various situations-The rules work on data fed into the model The model should behave in the same way as the situation that it represents The designer uses the model to predict how whatever it is modelling will behave in reality TERM 19
DEFINITION 19 Most organisations already own spreadsheet software-Not likely to be any cost in purchasing spreadsheet software-Less training will be required Can enter variable (Text and Numbers)into a cell Formulae & Functions perform calculations on the variables Graphs can be used to present the data Conditional formatting can be used to highlight outcomes What-If analysis can be used to answer what-if questions TERM 20
DEFINITION 20
TERM 22
DEFINITION 22 Records A record is a row in a database table Contains all the data about a single item or event Records are made up of a number of fields Each Record contains individual items of data Fields Aka: An attribute An individual data item within a record A column in a database record TERM 23
DEFINITION 23 Primary Key Primary key is field that identifies a record uniquely Used to create a relationship between tables Used to prevent data duplication Standard Notation Entities are written in capital letters Attributes are written with an initial capital Primary keys are underlined Foreign keys are over lined TERM 24
DEFINITION 24 Referential Integrity Every foreign key must have a related primary key value-If a customer record is deleted then all 'hires' by the deleted customers are removed Ensures no redundant data is stored Duplicate Data More than 1 copy of a data record Data taking up more storage space than necessary Possible data inconsistency TERM 25
DEFINITION 25
TERM 32
DEFINITION 32 The right to privacy is a right we all expect We do not expect personal details such as our age, medical records, personal family details, political and religious beliefs to be freely available to everybody With the growth of ICT, large databases are able to hold huge quantities of information Global networks are able to share and distribute this information around the world in seconds TERM 33
DEFINITION 33 In order to control this development and to protect peoples right to privacy, the data protection act was introduced. The first act became law in 1984 but has been updated by the 1998 act If any person, organisation, company or business wishes to hold personal information about people, they must register wit the office of the information commissionrt TERM 34
DEFINITION 34 To place regulations on the use of personal data To allow individuals to access data held about them To protect individuals from misuse of their own personal data To meet EU regulations To allow UK citizens to access data held on them in other EU countries To allow prosecution off companies that break the DPA TERM 35
DEFINITION 35 To be processed fairly and lawfully To be obtained and specific and lawful purposes To be adequate, relevant and not excessive for the purpose To be accurate and up-to-date Not to be kept longer than necessary Be processed within the rights of data subjects To be kept secure against loss, damage and unauthorised and unlawful processing Not to be transferred to countries outside the European economic area
TERM 37
DEFINITION 37 Be given a copy of data held-You're allowed to see what information is being held about you by a company-You will need to pay an administrative charge Prevent processing of the data if it is likely to cause damage or distress Prevent the data being used for direct marketing- junk mail Have data corrected, blocked and erased if inaccurate TERM 38
DEFINITION 38 To deter unauthorised access To allow prosecution and punishment for offenders Three offences were defined: Unauthorised computer access Unauthorised modification or deletion of data Unauthorised access with intent to commit further offenses Penalties Hacking - Maximum fine of 2000 & 6 months prison sentence Spreading Viruses - Unlimited fine and a maximum five year prison sentence TERM 39
DEFINITION 39
TERM 40
DEFINITION 40
TERM 47
DEFINITION 47 Corrects loopholes & bugs in software Must regularly update virus data files-So new viruses can be detected Regular security patches to operating systems & Applications Viruses A virus is a piece of software that is designed to: -Cause deliberate harm to data stored on a computer Removable media used in an infected system can then carry a virus to another machine Programs downloaded from the internet can also spread virus TERM 48
DEFINITION 48
TERM 49
DEFINITION 49 Data is commercially valuable - could be stolen May want to restrict access to data Different users are given different access rights to data Legal restrictions on the access to personal data NONE- User cannot obtain info nor change dataREAD ONLY-User can obtain Information but not change the dataREAD/WRITE-User can change data as well as obtain informationAPPEND ONLY-User cannot change existing data but can add new dataFULL-Can perform all operations TERM 50
DEFINITION 50
TERM 52
DEFINITION 52
TERM 53
DEFINITION 53 If trailing cables are near where somebody walks then they are a trip hazard Also possible that somebody could disconnect the wrong equipment Cables should not be stretched across desks, doorways or thoroughfares Cable management used to keep cables out of the way:-Floor Trunking-False floors and ceilings -Desk portholes -Spiral cable covers TERM 54
DEFINITION 54 Overloaded sockets can use too much current -Which can lead to overheating and potentially a fire Electrical equipment can develop faults over time Avoiding Risk of Fire Electrical sockets should not be overloaded Electrical equipment should be regularly tested for safety Rooms should be well ventilated to prevent overheating Equipment turned off when nobody is in attendance Computers should be kept away from heat Air conditioning should be used TERM 55
DEFINITION 55 Electrical equipment which has not been safety tested can lead to electrocution if parts become faulty If somebody trips over a trailing wire and it exposes the copper cables then that could also cause electrocution Water that is split onto electric equipment will not only damage the equipment but could also cause an electric shock Proximity to Water Equipment near water can be damaged, catch fire or electrocute Electric sockets near pipe joints could get wet due to leaks