featured/random

Read more

Show more

5 Phases of Data Life Cycle

The data life cycle is the full process that data goes through in its lifetime, beginning at its creation and end…

UK Legislation on IT Usage

The UK has a multitude of legislation regulating the use of  data, IT resources and the treatment of employees. The fol…

3.6 - Information System Structure

3.6 - Information System Structure

Information system structures can be   open systems   or   closed systems . Open Systems:  Information systems that can…

3.5 - Data Analysis Tools

3.5 - Data Analysis Tools

There are a multitude of tools one can use to analyse data. These include: Data Tables:  A two-way grid which holds dat…

3.1 - Data vs Information

3.1 - Data vs Information

While the terms 'data' and 'information' are often used to mean the same thing, they do have slightly d…

2.4 - Information Management

2.4 - Information Management

It is important to manage information well as it allows organisations and individuals to make better decisions and work…

2.3 - Information Quality

2.3 - Information Quality

When information is used and collected, it must be good quality. Should it not be good quality, a multitude of negative…

2.2 - Information Classification

2.2 - Information Classification

Information classification is the level of protection it should have. There are a multitude of different classification…

2.1 - Information Styles

2.1 - Information Styles

Information styles are forms that information can be presented in. There are a multitude of different information style…

1.8 - Disadvantages of Internet

1.8 - Disadvantages of Internet

While the internet can be a great force for good, there are many negative aspects to it, for both individuals and orga…

1.7 - Advantages of Internet

1.7 - Advantages of Internet

The internet has revolutionised the way the world words. There are a multitude of advantages to the internet, both for …

1.6 - Information Formats

1.6 - Information Formats

Information formats are ways in which information can be viewed online. There are a multitude of different information …

1.5 - World Wide Web Technologies

1.5 - World Wide Web Technologies

The World Wide Web is a system on the internet used to connect web pages to viewers. There are three world wide web tec…

3.3 - Organisation's Information Catagories

3.3 - Organisation's Information Catagories

There are a multitude of different categories of information used by organisations. These include: Knowledge Management…

3.2 - Individual Information Catagories

3.2 - Individual Information Catagories

There are a multitude of different categories of information used by individuals: Communication: Information that allow…

1.4 - Networks and Internet Connections

1.4 - Networks and Internet Connections

The internet is a global network of other interconnected networks. Different connection methods have different characte…

1.3 - Storage Devices and Access

1.3 - Storage Devices and Access

There are many types of information access and storage devices. Handheld Device: Handheld devices are light, small an…

1.2 - Storage Media

1.2 - Storage Media

There is a multitude of different storage media that can be used to store data: Paper: Information can be written, draw…

1.1 - Holders of Information

1.1 - Holders of Information

Information can be held by organisations. There are many types of organisation that can hold data: Individual Citizens:…

5.6 - Safe Disposal of Data

5.6 - Safe Disposal of Data

There are various pieces of legislation to be aware of that regulate the disposal of data: Waste Electronic and Electri…

5.5 - Digital Security

5.5 - Digital Security

There are many ways people can protect themselves online. These involve digital security measures: Anti-Virus: Software…

5.4 - Physical Security

5.4 - Physical Security

Physical security methods are tangible ways of protecting a computer system. There are many types of physical security…

5.3 - Threats

5.3 - Threats

There are seven main computer threats: Phishing: When scammers trick people into telling them their personal informatio…

5.2 - Operational Issues

5.2 - Operational Issues

Operational issues are problems that could occur which lead to a reduction in productivity. There are many types of op…

5.1 - Ethical Issues

5.1 - Ethical Issues

An ethical issue is something that is morally wrong. There are many ethical issues to be aware of in the workplace: Whi…

4.7 - Industry Certification

4.7 - Industry Certification

Professional bodies provide industry certification. Industry certification is a type of qualification that certifies t…

4.6 - Professional Bodies

4.6 - Professional Bodies

Professional bodies are organisations that build skills and provide certification in specific sectors. Professional bod…

Job Roles in IT

Job Roles in IT

There are many different IT jobs in a company, each with different personal attributes and communication skills that …

4.4 - Ready for Work

4.4 - Ready for Work

There are ways an employee can present themselves that show they are ready to work: Dress code: Most companies have a d…

4.3 - Personal Attributes

4.3 - Personal Attributes

Personal attributes are traits and characteristics of an employee that ensure they are working well: Self-Motivation: E…

4.2 - Communication Technology

4.2 - Communication Technology

There is a multitude of digital ways for businesses to communicate: See Communication Methods for physical forms of co…

4. 1 - Communication Skills

4. 1 - Communication Skills

There are many important communication skills to have when getting a job: Interpersonal Skills ​: Behaviour and non-ve…

3.5 - Business Systems

3.5 - Business Systems

Business systems are techniques businesses use to read, write and understand data. There are many types of business sys…

3.4 - Methods of Connection

3.4 - Methods of Connection

There are many methods to connect to a network. Each for different ranges and proximities : Ranged connection methods: …

3.3 - Network Topologies

3.3 - Network Topologies

A topology is the arrangement and layout of a network. There are many types of topologies: Client-Server Topology: Whe…

3.2 - Virtualisation

3.2 - Virtualisation

Virtualisation is the creation of a virtual version of a device. There are many pros and cons to virtualisation: Virtua…

3.1 - Types of Server

3.1 - Types of Server

Servers are powerful computers designed to assist processes within a network. There are many different types of server,…

2.7 - Protocols

2.7 - Protocols

Protocols are rules that a network system follows. There are many different types of protocol: TCP: Organises data so …

2.6 - Software Troubleshooting

2.6 - Software Troubleshooting

When errors occur within software, troubleshooting can be done to try and resolve the issues. There are many different …

2.5 - Communication Methods

2.5 - Communication Methods

There is a multitude of ways for businesses to communicate. These include text, video and audio communication. Letter: …

2.4 - Operating Systems

2.4 - Operating Systems

Operating systems are pieces of software that control the processes within a computer Operating systems have many diffe…