Create your own awesome maps

Even on the go

with our free apps for iPhone, iPad and Android

Get Started

Already have an account?
Log In

Unit 1: Understanding Computer Systems by Mind Map: Unit 1: Understanding
Computer Systems
0.0 stars - reviews range from 0 to 5

Unit 1: Understanding Computer Systems

LO1: ICT systems meeting business needs

Click on the link to visit BBC Biteize

Features & Purposes

Device Types, Smartphone, Tablet, Desktop, Netbook, Laptop

Input devices

Output devices

Storage, Optical disks, Magnetic media, External hard disk drives (HDD), Memory cards, Cloud storage, Network devices, Solid state device (SSD)

Configuration, Typical office configuration, Specific needs, Physical impairment, Remote working

Software, Operating systems, Utility software, Application software, Word processing, Spreadsheet, Database, Multimedia, Presentation software, Web-browsing, Apps for portable devicces, Photo editing, Video editing, Graphics manipulation, Communication Software, email, Social media, file transfer, Instant chat

Factors accecting choices

Cost

Availability

User needs

Data security

Connecting periferals

Wired, USB, firewire

Wireless, Wi-fi, Bluetooth, Infrared

Connecting computing devices to networks

Network name (SSID)

Security keys

Firewall settings(public / private networks)

Monitoring employees, GPS location tracking, Monitoring internet use, Monitoring communications

LO2: Working with information and data

Data capture methods

On-line forms

Paper based forms

Automated data capture systmes, Methods, NFC - Near Field Communication, Sensor, barcode reader, RFID - Radio Frequency ID, Factors affecting choice, Cost, Availability, Date security, Ease of use, Nature of data collected, Location of data, Environmental conditions

Data validation

Also look at visit bbc bitesizehttp://www.bbc.co.uk/schools/gcsebitesize/ict/databases/3datavalidation_act.shtml

Check digit

Format check

Length check

Lookup table

Presence check

Range check

Data verification

Double entry

Proofreading

Email verification

Coding information for spreadsheet / database

Design of capture forms

Data storage technologies

local and remote media

Remote sorage, Offsite locaion, Cloud storage

Factore affecting choice of method

Security for data storage

Document Security, Passwords, Restricting access, Encryption

Network / computer, Usernames & passwords, Access rights / permissions

Physical security

Data transferring technologies

Wired / wireless methods

Mobile data transmission (3G, 4G, etc

Remote methods, email, Internet / cloud, Peer to peer sharing

Security e.g. encryption

Factors affecting choices, File size, Transfer speeds, Future-proofing, Data security, User needs

Optimisation of fiels

Backup / Recovery systems, Storage medium, Backup frequency, Archiving, Automated / manual systems, Factors affecting choices, Cost, Availability, Ease of use, Data security

File formates

Proprietry formats, .doc / .docx, .als / .xlsx, .ppt / .pptx, .fla, .wma, .aac

Open formats, .rtf, .pdf, .csv, .exe, .txt, .mp3, .wav

LO3: Supporting business working practices

Communicating with employees

Diary management systems

Appointments / meetings

Inviting participants

Tasks

To-do lists

Reminders

Collaborative document creation

LO4: Legal, ethical, safety & security

Laws affecting business

Health & safety

Data protection

Copyright

Computer misuse

Business morals & ethics

Data loss

Threats to data security

Software updates