3.1-3.3 COPY Flashcards
(10 cards)
Explain, using an example, what is meant by the term big data. [4]
Data that is either too large (1)
or
too complex (1)
for traditional data
analysis techniques to be used (1).
e.g. customer database
Using an example related to surveys, describe the difference between data and information. [3]
Information – 1 from
is data which is in context (1)
processed data (1)
has meaning (1)
understandable (1)
Data = raw unorganised facts that need
to be processed (1)
not in context (1)
has no meaning (1)
E.g. answers to
ranking question is data which
needs to be processed to provide
information
A small independent theatre After each event uses charts and graphs to analyse the sales of each type of seat.
The graphs and charts could be included in the marketing, promotion, and sales category of
information.
Explain why the graphs and charts would be included in the marketing, promotion, and sales category
of information. [4]
The sales (1) can be used to inform
(1) of the most popular / least
popular type of seat (1) which could
be used to change seat prices (1)
Graphs / charts showing sales (1)
can be used for future events of the
same type (1) to target marketing
(1)
Owners and customers renting their cottage communicate by email.
Discuss the benefits and limitations of using this communication method. [10]
Benefits
- Emails are delivered extremely fast
when compared to traditional post.
- Emails can be sent 24 hours a day,
365 days a year.
- Webmail means emails can be sent
and received from any device,
anywhere in the world, that has an
internet connection
-Cheaper than using traditional post
- Emails can be sent to one person
or a group
- Attachments can be sent
Limitations
- The recipient needs access to the
Internet to receive email.
- Viruses are easily spread via email
attachments
- Phishing
- No guarantee the mail will be read
until the user logs on and checks
their email.
- Possible incompatibility between
system for opening attachments
- Emails may go into junk/spam
folder and be deleted without being
seen
- Is not always guaranteed to be
delivered
What is the purpose of an MIS? [2]
a system which allows an organisation to organise/manage / evaluate/ analyse (1) (to
present) data/information (1)
Describe one difference between primary and secondary data. [2]
Primary data is collected by an
individual / organisation (1).
Secondary data is collected by a
3rd party (1).
Many organisations have employees who work remotely.
Identify two ways a secured online area could be used by employees to communicate. [2]
- instant messaging
- video conferencing
Explain two benefits of using a secured online area for communication. [6]
Security will be high (1) as only
people who have access
credentials (1) can access the
online area (1)
Documents / plans (1) can be
shared via the area (1) so that they
can be used during web
conferences / video calls (1)
Meetings can be scheduled (1) as
diaries (1) can be shared amongst
all employees (1)
Organisations use information to carry out financial analysis and modelling.
Explain one way in which an organisation could use financial analysis and modelling. [3]
To carry out ‘what if’ modelling of
scenarios (1) in the sales
department (1) in order to establish
the amount of increase in the sales
price to make a certain level of
profit (1); to obtain results to
analyse the effect of an decrease in
sales of certain products (1).
To analyse investment returns (1)
so that they can be evaluated and
decisions made accordingly (1) to
establish any trends or patterns in
investment returns over time (1).
Describe one benefit and one limitation to the dental practice of using a contact management system. [4]
Benefits:
- Patients’ details are stored (1) and
can be edited (1).
- Searches can be carried out (1) on
specified criteria/ example (1).
- Appointments can be made (1)
against the patients’ details (1).
- Search/Sort facility (1) speeds up
data finding (1)
Limitations
- If there is no back-up (1) then
patient’s details can be lost (1).
- Data must be correctly (1) input (1).
The DPA must be considered (1) as
holding personal details (1).