You are on page 1of 4

Using Information: Content Checklist

Topic 01: Data and Information


1. Explain and describe the following terms in the context of an information
system, and also the relationships between them:
1. data (raw facts and figures),
2. information (processed data with structure, organisation, context or
meaning)
3. knowledge (derived from information).
2. Describe metadata (data describing data), using examples.
3. Categorise information in terms of its
1. source (primary, secondary, internal, external),
2. nature (formal, informal, quantitative, qualitative),
3. level (strategic, tactical, operational),
4. time (historic, present, future),
5. frequency (continuous, hourly, daily, monthly, annually),
6. use (planning, control, decision making),
7. form (written, aural, visual) and
8. type (detailed, sampled, aggregated).
4. Identify and describe characteristics which affect the quality of information, in
terms of its:
1. relevance (or appropriateness),
2. accuracy,
3. completeness,
4. reliability (or objectivity),
5. timing,
6. level of detail (or conciseness),
7. presentation and
8. availability.
5. Understand the relationship between the characteristics of information and its
value, and of the distinction between its cost and value.

Computing Studies Department : Information Systems Higher


Using Information: Content Checklist
Topic 02: Organisational Information Systems
6. Define, describe and give examples of data processing (DP) systems.
7. Define, describe and give examples of Management Information Systems (MIS):
Decision Support Systems (DSS) and Executive Information Systems (EIS).
8. Define, describe and give examples of Expert Systems.
9. Identify organisational information system management strategies: network
strategy, security strategy, backup strategy, upgrade strategy and software
strategy.
10. Describe, give examples and apply network strategy:
1. identify and describe network topologies, including LANs, WANs,
distributed networks
2. identify and describe hardware, client/server, network adapter,
structured cabling
3. identify and describe software, including network operating system,
network accounts
4. describe audit and monitoring procedures and software
11. Describe, give examples of, and apply security strategy:
1. distinguish between security, integrity and privacy of data
2. describe the security risks to information systems, including viruses,
hacking, denial of service
3. describe and give examples of policies and procedures for implementing
data security, including codes of conduct, password guidelines
4. describe and give examples of methods of implementing data security,
including virus protection, firewalls, encryption
5. describe and give examples of access rights on a network system
12. Describe, give examples and apply a backup strategy:
1. identify and describe archive, recovery and storage methods
2. describe a rotation method for regular back-up, in terms of frequency and
version control
13. Describe, give examples of and apply an upgrade strategy:
1. understand the need for ‘future proofing’, and of difficulties regarding
hardware and software compatibility
2. understand the requirement to maintain legacy systems, and of methods
of doing so, including emulation
14. Describe , give examples and application of software strategy:
1. identify and describe the criteria for evaluation of software, in terms of
functionality, performance, usability, compatibility, data migration,
reliability, resource requirements, portability and support
2. describe the methods of providing training in using information systems
software, including on-the-job training, in-house and external courses
3. identify and describe of the means of obtaining user support, including
manuals, online help/tutorials, help desk, newsgroups, and FAQs
4. identify and describe of the issues affecting decisions to upgrade
software : lack of functionality in current software, new hardware needs
updated software, application software and operating system versions
must be compatible, updates needed to have bug-free software
15. Describe distributed databases; data warehouses and data mining within an
organisation.

Computing Studies Department : Information Systems Higher


Using Information: Content Checklist
Topic 03: Information Management Systems
16. Identify, describe and apply the following classes of software:
1. word processing/desktop publishing (presenting information for print
media);
2. presentation/web authoring (presenting information for online media);
3. spreadsheet (data handling);
4. project management;
5. personal information management.
17. Describe and give examples of the main features of word processing/desktop
publishing software, including:
1. multi-page layout (including use of columns, header and footer,
pagination),
2. contents/index,
3. incorporation of graphics with text wrapping,
4. use of stylesheets to implement a ‘house style’,
5. including selection of fonts (serif/sans-serif),
6. use of colour
7. formatting of text (font, size, style, alignment).
18. Describe and give examples of the main features of presentation/web authoring
software, including:
1. structure of pages/slides,
2. incorporating graphics and animation,
3. consider presentational style including selection of fonts and use of
colour,
4. navigation including hyperlinks, home links and page transitions,
5. use templates/masters to implement ‘house style’
19. Descrbe and give examples of the main features of spreadsheet software,
including:
1. goal seeking/forecasting,
2. lookup tables,
3. advanced functions (nested if, count),
4. use of macros.
20. Descrbe and give examples of the main features of project management
software, including:
1. timelining,
2. resource allocation,
3. Gantt, PERT (and others) charts,
4. optimisation and
5. critical path analysis.
21. Descrbe and give examples of the main features of personal information
management software, including:
1. communication,
2. contacts,
3. calendar,
4. task lists.

Computing Studies Department : Information Systems Higher


Using Information: Content Checklist
Topic 04: Implications of ICT
22. Describe and give examples of the social implications of ICT in the following
contexts:
1. globalisation and the impact of IS on business and societies
2. the impact on business organisations of an IS driven business model
3. e-commerce and the changing relationship between businesses and
customers brought about by the internet
4. the development of individuals’ identities and persona when
communicating on the internet
5. the right to private communications across the internet
23. Identify and describe the application and implications of current legislation
applying to information systems, including:
1. Data Protection Act (1998):
1. inadequacies of the 1984 Act;
2. changes from the 1984 Act, including coverage of data in
electronic transmission;
3. requirement for prior consent of data subject;
4. harmonization of EU Data Protection legislation;
5. export of data;
6. paper based records
2. Copyright, Designs and Patents Act (1988):
1. application of copyright to computer software,
2. computer databases,
3. web content, and digital media;
4. software piracy
3. Regulation of Investigatory Powers Act 2000 (including Lawful Business
Practice regulations):
1. purpose of the legislation,
2. implications for electronic communication,
3. monitoring of employees
4. Freedom of Information (Scotland) Act (2002):
1. organisations covered,
2. right of access to information,
3. exemptions
5. Health & Safety regulations:
1. employers’ responsibilities
24. Describe and give examples of the economic implications of ICT in terms of:
1. the impact on business organisations in relation to competitive
advantage,
2. business costs including initial/running and investment cost.
25. Describe and give examples of the ethical implications of ICT in terms of:
1. censorship and freedom of speech,
2. privacy and encryption,
3. global citizenship.

Computing Studies Department : Information Systems Higher

You might also like