Cart
Free US shipping over $10
Proud to be B-Corp

'A2' ICT P M Heathcote

'A2' ICT By P M Heathcote

'A2' ICT by P M Heathcote


$10.00
Condition - Very Good
Only 1 left
SeriesGCE ICT

Summary

This 'A2' Level textbook for AQA ICT modules comprises modules 4 and 5 of 'A' Level ICT.

'A2' ICT Summary

'A2' ICT by P M Heathcote

This 'A2' textbook covers Modules 4 and 5 of the AQA Information and Communications Technology 'A' Level course and is suitable for a wide range of IT courses including 'A' Level, GNVQ, HNC, first year degree courses in Information Technology and numerous other courses having an ICT element or module. Case studies are used throughout to illustrate the concepts as they are explained, and questions from past examination papers are included to give plenty of practice at written work. Additional resources for teachers and students are available from the publisher's website (http://www.payne-gallway.co.uk).

'A2' ICT Reviews

think they are wicked! 3 May, 2002 Reviewer: Miss Fozia Akram a student from Wakefield College, England I would like to thank you for publishing such great books, I have purchased the A2 ICT and Access books and I think they are wicked. Thank you Payne-Gallway and thank you Pat Heathcote, lets just hope my revision pays off.

About P M Heathcote

Pat Heathcote has worked as a programmer and systems analyst, and has many years of experience in teaching Computing and Information Technology. She has served as an Assistant Examiner with AQA and is on the Subject Committee for Computing. She is now a full-time author and publisher.

Table of Contents

Chapter 36 - Organisational Structure How organisations work Ingredients for success Focus on people Focus on organisation External pressures on an organisation Case study: Preservation vs. the people Focus on technology Organisations and information systems Data processing systems Knowledge work systems Management information systems Chapter 37 - Management Information Systems Introduction Information systems vs. data processing systems Internal and external information Information flow The role of a management information system What managers do Types of decision Stages of decision-making Case study: Buying a new car Desirable characteristics of a MIS Factors influencing success or failure of MIS Chapter 38 - The Information Systems Life Cycle Overview of the systems life cycle The waterfall model What prompts a new system? Feasibility study Requirements analysis Case study: Computer-dating the customer System design Implementation Methods of conversion Post-implementation review System maintenance Prototyping Benefits of prototyping Chapter 39 - Implementation of Information Systems What is implementation? Successful implementation Why do information systems fail? Case study: Tiptree Book Distributors Factors in successful implementation Chapter 40 - Information Systems Strategy Introduction Formulating an information system strategy End-user computing ICT for competitive advantage Case study: Just-in-time at Wal-Mart's Chapter 41 - Expert Systems Definition Uses of expert systems Benefits of expert systems in organisations Limitations of expert systems Chapter 42 - Information Sources of information Levels of information Quality of information Case study: Clearing off to College Channels of communication Case study: Guides need information Presenting management information The intended audience Graphs and charts Guidelines for presentations Keeping everyone informed Marketing information Chapter 43 - Data Data capture Using bar codes Other uses of bar codes Magnetic stripe cards Linking customers and suppliers through EDI Smart cards Case study: A smarter way to pay Keying in data Case study: Bradford & Bingley Chapter 44 - The Management of Change Outcomes from ICT investments Valuing the workforce Reasons why ICT systems fail Case study: London Ambulance Service Managing change successfully Case study: Pindar Implications of change Chapter 45 - Security Policies Threats to security and integrity Risk analysis Layers of control Building and equipment security Authorisation software Communications security Operational security Audit trail Case study: Harold Shipman, GP and serial killer Personnel safeguards Corporate ICT security policy Case study: War on the Web Chapter 46 - Disaster Recovery Effects of negligence Stages in disaster planning Contents of a security plan Disaster recovery plan Case study: Trust in the Virtual World Criteria used to select a contingency plan Chapter 47 - Implementation of Legislation Laws relating to ICT The Data Protection Act A data protection policy Software copyright Health and Safety Encouraging 'ownership' of workspace Taking regular breaks Providing the right equipment The employer's responsibility Chapter 48 - User Support The need for support The help desk Technical support Help desk software Case study: Call centres Bulletin boards User booklets Newsletters and support articles On-line help Documentation Chapter 49 - Training The need for training Training in the use of information technology Training for senior managers Training for middle managers Training for users Methods of training Computer-based training Instructor-led courses Skills updating Corporate training strategy Chapter 50 - Project Management Introduction Selection of a project manager The tasks of a project manager The project team Project planning and scheduling Project reviews Characteristics of a good team Chapter 51 - Codes of Practice Ethics and computing Factors in ethical decision-making Formal guidelines in the computing industry Codes of practice Employee code of conduct Using informal guidelines to make ethical decisions Case study 1 Case study 2 Case study 3 ICT4 - Sample Questions and Answers Chapter 52 - Policy and Strategy The challenge of information management Consistency with business priorities Centralisation vs. decentralisation Different user needs Hardware and software choices Emulation software Upgrading hardware and software Future proofing Offers from TIME computer systems: Future proof? Chapter 53 - Security and Backup Policies Introduction Backup strategies Full backup Incremental backup Hardware for backups Grandfather-father-son backups Chapter 54 - Software Evaluation Introduction Choosing software Tailoring the software Upgradability Other evaluation criteria Benchmark tests Checking out the manufacturer Evaluation report Chapter 55 - Data Modelling Traditional file approach The database approach The Database Management System (DBMS) The conceptual data model Types of relationship Entity-relationship diagrams Chapter 56 - Relational Database Design What is a relational database? Linking database tables Normalisation First normal form Second normal form - Partial key dependence test Dealing with a Many-to-Many relationship Third normal form - Non-key dependence test Comparing a flat-file system with a relational database Chapter 57 - Database Management Database Administration (DBA) The data dictionary The Database Management System (DBMS) Querying the database Using SQL Client-server database Chapter 58 - Communication and Information Systems Centralised processing systems Dispersed systems Local area networks (LANs) Client-server and peer-to-peer networks Wide area networks (WANs) Distributed processing Case study: Pubs get a new round of touch tills Distributed databases Advantages and limitations of distributed databases Using telecommunications for competitive advantage Case study: United Parcel Service (UPS) The Internet and the World Wide Web The role of servers and routers Chapter 59 - Network Security and Accounting Introduction Training users about security Access privileges Access control Firewalls Audit controls Performance management Data encryption Accounting software Chapter 60 - Data Communications and Standards Communications software Speed of transmission Modems Serial and parallel transmission Telecommunications standards and protocols The development of de facto standards Case study: Microsoft's MS-DOS Internet protocol Addressing mechanisms on the World Wide Web Chapter 61 - Human-Computer Interaction Computers in the workplace Psychological factors Short-term memory Long-term memory Designing good software Text versus graphics Chapter 62 - Software Acquisition and Testing Make or buy? End-user-written software Writing software in-house External consultants Buying a package Leasing software Modifying existing packages Criteria for selecting a software solution Software testing Alpha testing Beta testing Failure of software testing Software maintenance Maintenance releases ICT5 - Sample Questions and Answers

Additional information

GOR006754134
9781903112205
1903112206
'A2' ICT by P M Heathcote
Used - Very Good
Paperback
Pearson Education Limited
2005-04-04
208
N/A
Book picture is for illustrative purposes only, actual binding, cover or edition may vary.
This is a used book - there is no escaping the fact it has been read by someone else and it will show signs of wear and previous use. Overall we expect it to be in very good condition, but if you are not entirely satisfied please get in touch with us

Customer Reviews - 'A2' ICT