Cambridge Technical Introductory Diploma in IT

(Unit 2 - Exam Preparation 17th May 2017)

Global Information.

Further research suggestions

The examiner has made some suggestions for study related to this pre-release.

How different types of information access and storage devices can be used in Progress BikeSafe.

Types of information access and storage devices can be found here. Media for storage devices can be found here.

Types of information access
Hand-held Device   A piece of computing equipment that can be used in the hand, such as a smart-phone or tablet computer.
Wearable Device   Wearable technology is a category of technology devices that can be worn by a consumer and often include tracking information related to health and fitness
Portable Device   A portable communications device is a hand-held or wearable device. For example, the walkie-talkie is a device that is hand-held when in use, and wearable (just) when not in use
Fixed Device   A fixed device is not portable either because it is physically not possible (too bulky or heavy) or it is wired to devices that are fixed; i.e. the connection is not portable. Fixed wireless is the operation of wireless devices or systems used to connect two fixed locations
Shared Device   In computing, a shared resource, or network share, is a computer resource made available from one host to other hosts on a computer network. It can be accessed by one or more authorised (we hope) users.

Characteristics and purpose

Examples of devices Purpose Characteristics Advantages Disadvantages
Hand-held devices: Small tablet, smart phone,
wearable device,
eBook readers
A small portable device which has a touch screen and can perform many functions of a traditional PC (as well as phone based communication in some cases). A small
touch screen based device that can access the internet; not very heavy; has some data processing capability.
Portable as it is small and lightweight; can perform many functions of a traditional PC. It is fragile so can break easily; it is expensive and can be easily lost or stolen.
Smart-phone An electronic device that can resemble a cell phone which can run applications. Small; touch screen; can get applications; can access the internet; has some data processing capability.

Small and lightweight therefore portable; enables you to do everyday life tasks such as phone calls, messaging and emails; low power consumption.

Over time, battery life fades; fragile so it can break easily; frequently updated version are on the market; limited range of "serious" software.
A wearable device such as a smart-watch A device that is worn on the body which incorporates some of the functions and features of a small tablet in particular the data collection features - accelerometer and heart rate monitor.

Small with a touch screen; worn on a wrist or round the neck or arm; usually paired to a lager device such as a smart-phone; health trackers have additional sensors.

Convenient as it's always with you; provides short-cuts instead of getting the smart-phone out.

Less versatile; small so can hardly see the screen; usually paired to a lager device such as a smart-phone

and large tablet
Fully functional computers that have portability and convenience; battery powered. More expansive then a PC for the same performance. Sub-notebooks are all solid state. Less weight and smaller size than a desktop; keyboard (on screen for a tablet); large screen. Very convenient. Portable; can take it places when work needs to be done; lightweight; increasing battery life. Usually incorporate a touch screen. It does not support expansion or upgrade; fragile; currently short battery life; limited range of "serious" software.
Large tablet A large portable device which is touch screen and solid state based and can perform many functions of a traditional PC. Big; large screen; thin and lightweight; can access the internet. Portable as it is easy to take places rather than a taking a desktop system; can perform many functions of the traditional PC They are expensive and can break easily.
Fixed devices Desktop computer
Smart TV
Games Consoles
A general purpose computer that is based in a single location. Separate device, keyboard mouse and screen; most powerful system; usually room for expansion. Most powerful system; easily upgraded; largest range of "serious" software; possibility of a huge screen or multiple screens. Large size; not portable.

Different types of www technology networks and the characteristics that make them suitable for Progress BikeSafe including how email communication can be used.

Types of www technology can be found here. Consider the characteristics that Progress BikeSafe have that makes particular www technologies more suited to their issues than other technologies.

Do they need an open or closed system?

The only traffic entering or leaving the system is the email traffic and the information sourced from the Justice system. The police system is in effect a closed system in that all their data is contained within their system (my opinion!) Would the communication between the BikeSafe system and the Police be organised by the Police to ensure that their system remained closed? Might the transfer of data be by non-electronic means such as a weekly CD? It depends what extra information you get in the examination.

Is their information private, or sensitive or confidential? Types of information classification can be found here.

How and why different information styles are used in a database.

Information on information styles can be found here, although you will have to select the styles that suit a database. Text, numbers, dates and boolean values are the styles in evidence in the example. However a modern database can include almost any data style, graphics, animation, video and sound can be added to a database table. You must select suitable styles and you must give appropriate reasons for your selection.

The legislation relevant to the storage of data and the actions required to comply with the legislation.

The detail of all of the legislation can be found here. However what specific legislation applies to Progress BikeSafe and how might it apply? IF the question is for more than a single mark then you need to include an example or hypothetical event where the legislation may or may not apply.

The Data Protection Act 1998 (DPA) - will prevent people's information getting spread around the world, preventing the likeliness of crimes toward said person.

Clearly Progress BikeSafe is storing customer data (personal data) and provision 7 of the Act says that this must be kept safely. In addition some of the data is confidential (see types of data here) and so extra care must be taken not only with the data but data requests under other laws may have consequences. The adequacy provision (3) means that Progress BikeSafe collect more data than is necessary for their purposes (provision 2) so the collection of police sourced data must be limited to include only that data necessary to conduct the re-training course. Provision 7 also has procedural implications for Progress BikeSafe as not only must technical precautions be taken but organisational measures too; these would be outlined in the ICO guidance.

The Regulation of Investigatory Powers Act 2000 (RIPA)- covers central and local government looking at workers' email security etc.

At first glance this might not appear to apply to Progress BikeSafe but as they have access to police information (for those bikers attending speed awareness courses) this information could be communicated to a third party via email and this would be an activity subject to the act, investigation of email to detect or prevent a crime.

The Protection of Freedoms Act 2012 - strengthens the FOI Act with respect to DNA, fingerprints and footprints.

Part 6 (Data protection and freedom of information) may apply only in terms of clarification of a public company which Progress BikeSafe probably is not and the role of the ICO which is incorporated into the ICO guidance anyway.

The Privacy and Electronic Communications Regulations 2003 (amended 2011) - covers unsolicited phone calls and emails.

This is an implementation of the EU directive relating to cookies but also includes reference to keeping communication secure which could apply to Progress BikeSafe with respect to their email communication. Again the ICO guidance will apply in this instance.

The Freedom of information Act 2000 (FOI) - covers the right to access information on activities carried out by public bodies.

It can be debated that Progress BikeSafe is not a public body and therefore has no responsibility under the FOI, however there is the police connection again and there may be some compulsion tempered with their responsibilities and possible exclusions under the DPA.

The Computer Misuse Act 1990 (CMA) - covers hacking.

While the CMA covers the hacker more than the hacked there is an assumption that a business will make it as difficult as is practicable for a hacker to gain access to their system.

The Information Commissioner's Office (ICO) code of practice - covers how an organisation should behave.

The ICO code of practice on data sharing identifies two types of data sharing; systematic and exceptional. In the case of Progress BikeSafe it is the systematic sharing with the police that will be considered. What data is to be shared? It must be sufficient but not excessive (DPA) so a speeding conviction will be shared but another case involving the same person would not. How often and when it should be shared? Crucially how it is to be shared so that security of the data is maintained. Have the risks of data sharing been given sufficient consideration? Would the data sharing still work if the data was annonymised? - clearly not.

The Copyright, Designs and Patents Act 1988 - covers copyright.

There may be issues about reproducing the Highway code which is Crown copyright

The Equality Act 2011 (EQA) - is a consolidation act that covers protecting UK citizens from discrimination.

This act aims to prevent discrimination and applies only if Progress BikeSafe undertakes a discriminatory activity.

The Communications Act 2003 is often used when people send offensive emails etc.

Section 127 of this complex act may apply in the case of Progress BikeSafe in that it relates to the use of email. We are assuming that the emails that are sent on behalf of the business are not going to be offensive.

The Digital Economy Act 2010 - covers software piracy.

It is unclear how this act may apply to Progress BikeSafe.

The Malicious Communication Act 1988 (MCA) - covers Internet trolls and other formats of digital and non-digital harassment.

This should not impact on Progress BikeSafe.

Different types of logical protection methods and how these can be used by Progress BikeSafe.

The detail of all of the types of protection can be found here.

In addition the ICO suggests: