Data vs Information

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which statement best describes the role of ICT in contemporary business?

  • ICT is mainly used for storing data, with limited impact on business strategy.
  • ICT primarily supports traditional business operations without significant innovation.
  • ICT is now largely about disruptive changes and innovation, focusing on data and big data. (correct)
  • ICT is focused on reducing costs and maintaining existing infrastructure

What is the primary distinction between data and information?

  • Data and information are interchangeable terms describing the same concept.
  • Data is processed and meaningful, while information is raw and without context.
  • Data is raw and without inherent value, while information is processed and meaningful. (correct)
  • Data is analyzed in a visual format, while information is stored as raw numeric digits.

In the context of ICT, what is 'Big Data' primarily characterized by?

  • A specific set of statistical facts used for reporting.
  • Data that is structured, small, and easily managed.
  • Data that can be easily stored and consumed.
  • Massive amounts of data that are impossible to store and consume. (correct)

Which of the following examples provides evidence of information, rather than data?

<p>A sales forecast derived from processed sales figures. (D)</p> Signup and view all the answers

What defines information in the context of business ICT systems?

<p>Data that has been processed to be meaningful and purposeful for the user. (A)</p> Signup and view all the answers

Why is having clearly defined interfaces important for information and business systems?

<p>To ensure subsystems can interact effectively by exchanging information reliably. (D)</p> Signup and view all the answers

What does the concept of 'interdependence' signify within a system of interrelated components?

<p>Changes in one part of the system lead to changes in other parts. (B)</p> Signup and view all the answers

Which activity exemplifies formal communication in an organization?

<p>Presenting information in a structured and consistent manner. (B)</p> Signup and view all the answers

What is knowledge in the context of ICT for business?

<p>The combined result of a person's experiences and the information they possess. (B)</p> Signup and view all the answers

What does the 'DIKW' model represent?

<p>A hierarchical arrangement of data, information, knowledge, and wisdom. (B)</p> Signup and view all the answers

According to the DIKW model, what differentiates information from data?

<p>Information is processed and contextualized; data is raw and unorganized. (A)</p> Signup and view all the answers

Which of the following describes the transformation from information to knowledge within the DIKW hierarchy?

<p>Interpreting information through experiences and insights to gain understanding. (D)</p> Signup and view all the answers

In the DIKW pyramid, what is the role of Wisdom?

<p>Applying accumulated knowledge to make informed decisions. (D)</p> Signup and view all the answers

What is the primary aim of 'Data Protection and Privacy Policies' within an organization?

<p>To govern the collection, storage, processing, and sharing of personal data. (D)</p> Signup and view all the answers

What is the main purpose of a Cybersecurity Policy?

<p>To protect IT infrastructure, systems, and networks from cyber threats. (B)</p> Signup and view all the answers

What does an 'Acceptable Use Policy' (AUP) primarily outline?

<p>How employees can and cannot use company IT resources. (A)</p> Signup and view all the answers

Which scenario best demonstrates a violation of an Acceptable Use Policy (AUP)?

<p>An employee streams films during lunch break using the company's internet connection. (A)</p> Signup and view all the answers

What is the system's objective?

<p>The components of a system work towards a collective goal. (B)</p> Signup and view all the answers

What does an 'open system' describe in systems characteristics?

<p>A system that interacts with elements beyond the system boundary in the environment. (A)</p> Signup and view all the answers

Which of the following falls outside the boundary as part of the business environment?

<p>Customers. (C)</p> Signup and view all the answers

What action is essential for ensuring confidential information is handled correctly?

<p>Sending information only to authorized personnel. (B)</p> Signup and view all the answers

Which document describes what the user does with the system and what activities need to be performed?

<p>User Requirement Document (URD). (D)</p> Signup and view all the answers

What benefits can Businesses gain from ICT policies?

<p>All of the above. (D)</p> Signup and view all the answers

What is a Business Information System?

<p>A business information system is a group of interrelated components that convert data into information products (C)</p> Signup and view all the answers

Which is a resource that supports BIS (Business Information System)

<p>All of the above. (D)</p> Signup and view all the answers

What can the ability to modify the software do?

<p>Provides a high degree of flexibility. (C)</p> Signup and view all the answers

What can computers not do?

<p>All of the above. (D)</p> Signup and view all the answers

What is 'Hardware'?

<p>Part of your computer that has a physical structure. (C)</p> Signup and view all the answers

What can 'System Software' do?

<p>Controls access to the hardware. (D)</p> Signup and view all the answers

What can 'develop their own software' do?

<p>Using processing languages, in order to carry out processing tasks. (B)</p> Signup and view all the answers

What does 'Provides additional functionality to the operating system' refer to?

<p>Utility Software (D)</p> Signup and view all the answers

PC (personal computer) operate on which system?

<p>Microsoft Windows operating system. (D)</p> Signup and view all the answers

Mac computer operate on which system?

<p>Mac OS X (D)</p> Signup and view all the answers

What is password cracking?

<p>It one of the most important methods used by hackers in order to circumvent the standard authentication. (A)</p> Signup and view all the answers

Which example below is ethical hacking?

<p>System penetration testing (D)</p> Signup and view all the answers

What methods protect from viruses?

<p>All of the above (D)</p> Signup and view all the answers

A program that seems to be designed to do something useful, or at least acceptable, but in fact performs undisclosed malicious functions is known as what?

<p>A trojan. (C)</p> Signup and view all the answers

What software packages that support Office Automation & the daily work activities of individuals & groups is known as what?

<p>Desktop Productivity Tools. (A)</p> Signup and view all the answers

Signup and view all the answers

Flashcards

What is data?

Raw facts or observations with little to no value until processed.

What is information?

Data that has been processed to be meaningful; used for a purpose and understood.

What is a system?

A collection of interrelated components working together for a goal, receiving inputs and transforming them into outputs.

What are subsystems?

Large systems composed of smaller systems.

Signup and view all the flashcards

What is a suprasystem?

A larger system composed of one or more smaller systems.

Signup and view all the flashcards

What are open systems?

Systems that interact with elements beyond their boundary.

Signup and view all the flashcards

What are closed systems?

Systems with no or limited interaction with the environment.

Signup and view all the flashcards

What is an interface?

Ways subsystems interact in an information system via the exchanging of information.

Signup and view all the flashcards

What is system interdependence?

Parts of a system being dependent on one another.

Signup and view all the flashcards

What is formal communication?

Involves presenting information in a structured and consistent manner.

Signup and view all the flashcards

What is informal communication?

Information transmitted by less structured means, like conversations.

Signup and view all the flashcards

What is ICT?

Stands for information and communication technology.

Signup and view all the flashcards

What is Information?

Allows a business to make informed decisions by presenting data well.

Signup and view all the flashcards

What is business communication?

Exchanging information between internal and external parties.

Signup and view all the flashcards

What is Data Protection?

Policies that governs data collection, storage, and sharing.

Signup and view all the flashcards

What is Cybersecurity Policy?

Protect IT from threats like hacking.

Signup and view all the flashcards

What is Acceptable Use Policy (AUP)?

How employees can use ICT resources.

Signup and view all the flashcards

What is Wisdom?

Insights derived from information to make strategic decisions.

Signup and view all the flashcards

What is Knowledge?

Combined result of a person's experiences and information.

Signup and view all the flashcards

What is information?

Data arranged in a meaningful context.

Signup and view all the flashcards

What is Data?

Collection of raw symbols without context.

Signup and view all the flashcards

What is classification?

Categorizing data.

Signup and view all the flashcards

What is rearranging/sorting?

Arranging and sorting of data.

Signup and view all the flashcards

What is Aggregating?

Combining data.

Signup and view all the flashcards

Systems Characteristics

Can be complex, made of smaller systems.

Signup and view all the flashcards

What are ICT policies?

ICT guides e-business, e-commerce and ERP.

Signup and view all the flashcards

What is a computer?

Electronic device; stores, retrieves, processes data.

Signup and view all the flashcards

What is a computer system?

Interrelated components converting data into information.

Signup and view all the flashcards

What is hardware?

Physical parts of a computer system.

Signup and view all the flashcards

What are output devices?

Translates processing results that makes computers readable.

Signup and view all the flashcards

What is a CPU?

Controls computer functions and executes programs.

Signup and view all the flashcards

What is memory?

Data awaiting processing.

Signup and view all the flashcards

What are storage devices?

Data and program storage that is permanent.

Signup and view all the flashcards

What is system software?

Provides basic computer hardware control.

Signup and view all the flashcards

What is an Operating system (OS)?

Supports apps and hardware.

Signup and view all the flashcards

What is Application Software?

Can perform a variety of tasks.

Signup and view all the flashcards

What are Viruses?

Cause harm to a computer.

Signup and view all the flashcards

What is Hacking?

Procedure of obtaining unauthorized access to a system.

Signup and view all the flashcards

What is a trojan?

Looks useful, but is malcious.

Signup and view all the flashcards

Study Notes

  • ICT is now focused on disruptive changes and innovation
  • It is centered more around data, especially Big Data
  • Big Data refers to massive amounts of data that are impossibly to store and consume

Data vs Information

  • Data are raw facts or observations with little to no value until processed
  • Information is data that has been processed to be meaningful
  • Information is data processed for a purpose
  • Information is data interpreted and understood by the recipient

Data

  • Data consists of a series of non-random symbols, numbers, values, or words
  • The information consists of facts obtained by observation or research and recorded
  • It is a collection of non-random facts
  • Examples include Today's Date, and Records of a business transaction like a website visit

Information:

  • Examples include a sales forecast and a telephone directory
  • ICT stands for information and communication technology
  • Information allows a business to make informed decisions by clearly presenting data
  • Business communication is the exchange of information between employees and external parties
  • Information and communication within a business can be facilitated by optimized Technology systems

Systems Theory

  • A system is defined as a collection of interrelated components that work together towards a collective goal
  • The function of a system is to receive inputs and transform them into outputs

ICT's Business Goal

  • The primary objective is to optimize revenues
  • Information systems enable 21st-century businesses
  • Most information systems deliver data stored in databases
  • Computers are essential for data collection, storage, retrieval, processing, and output

Key Features of Information Systems:

  • Store and Analyse Information
  • Simplify Business Processes
  • Facilitate Decision-Making
  • Access to Full Data Control

Systems Characteristics 3

  • Large systems are composed of one or more smaller systems (subsystems)
  • A larger system made up of one or more subsystems is a suprasystem
  • Open systems interact with elements beyond the system boundary
  • Closed systems have no or limited interaction with the environment

Systems Characteristics 4

  • Subsystems in an information system interact by exchanging information
  • This exchange is the interface between systems
  • For efficient organizations, information and business systems need well-defined interfaces
  • Sales orders, for example, must be passed from the sales subsystem to the finance and distribution subsystems in a clear, repeatable way
  • Failure to do so may result in lost or delayed orders which may cause problems with customer service

Systems Characteristics 5

  • Systems are hierarchical and comprised of subsystems
  • Parts of a system are dependent on one another; this is known as Independence
  • Interdependence means that a change to one part of a system affects other parts

Sources of Information

  • Formal communication presents information in a structured way
  • Informal communication transmits less structured information through informal channels

Attributes of Information Quality

  • Time: Includes timelines, frequency and time period
  • Content: Consists of accuracy, relevance, and currency
  • Form: Consists of completness and clarity

Knowledge, Information, Data

  • Knowledge is the result of a person's combines experiences and information
  • Examples of data processes include classification, rearranging/sorting and aggregating and selection
  • Information is the amount a decision maker is able to pay for the information prior to making a decision

Value:

  • Tangible value is the value of information, minus the cost of gathering information
  • Intangible Value, improvements in decision behavior, minus cost of gathering information

Systems Characteristics 3 (continued)

  • Systems can be complex and made up of other, smaller systems and are known as subsystems
  • One or more subsystems are known as suprasystems
  • Marketing and finance would lie within the system's boundary
  • Whereas customers, sales channels/distributors, suppliers. competitors, partners, government and legislation and the economy, would lie outside as part of the business environment
  • Organisations will interact with elements beyond the system boundary and are referred to as open systems

ICT Policies and DIKW Model

  • ICT policies guide e-business, e-commerce
  • Policies identify strategies and methods for competitive advantage using BIS
  • Wisdom is insights derived from information for strategic decisions
  • Knowledge is data structured and analyzed to generate useful information
  • Information has raw transaction logs and customer details and purchase history
  • Data contains raw transaction logs and customer details

ICT Policies

  • Data Protection and Privacy Policy governs the collection, storage, processing, and sharing of personal or sensitive data within an organization (GDPR)
  • Cybersecurity Policy, is defined as measures to protect IT infrastructure, systems, and networks from cyber threats like hacking and malware or phishing attacks etc
  • Acceptable Use Policy (AUP) outlines how employees, customers, or third parties should use the organization's ICT resources
  • An AUP prevents misuse of company resources for personal use, illegal activities, or security risks

DIKW (Data, Information, Knowledge, Wisdom) Model

  • Wisdom is applied knowledge allowing one to make a decision
  • Context means Information is placed in context to make it useful
  • Data is unprocessed

ICT Concept for Business

  • DIKW model, or Russell Ackoffs' DIKW model
  • Progression from one level to the next, Data becomes information, information becomes knowledge, knowledge ultimately becomes wisdom
  • The amount a decision maker would be willing to pay for information to enable a tangible value
  • Tangible value is the "value of info - cost of gathering info"

Organisations

  • The role of information in organisations consists of data, information, knowledge, communications, decision-making, record keeping and applications
  • Creation, storage, destruction, amendment, deletion, copying, backup etc
  • Data Management Policy and/or Guidelines

Information Handling

  • Includes avoiding unauthorized viewing
  • Managing risk of confidence associated with copying
  • Retention and destruction of information in accordance with policy
  • Avoids sensitive information from being stored or transferred entirely

User Requirements

  • Describe what the user uses with the system including accessibility, accuracy, audit, and security

Business Requirements

  • Business requirements have different categories such as accessibility, accuracy, audit, and control, and reporting, availability, etc
  • There are several different policies consisting of data protection internet and email
  • Also consists of network access and social media, physical security incidents and passwords

ICT Policies

  • Policies guide e-business, e-commerce, and ERP
  • They help evaluate organisation relevance
  • Policies identify basic strategies and methods to gain a competitive advantage

Systems Characteristics

  • Components of a system work towards a collective goal known as the system's objective
  • The objective of a system is can often be expressed in a single sentence
  • A car's objective = transportation of passengers and goods
  • All components of us system should have a related a common objective
  • Systems do not operate in complete isolation, but reside in an environment with other systems and agencies
  • The system's boundary defines its scope
  • Outside the boundary is the environment; inside is part of the system itself
  • The boundary marks the interface between the system and environment

ERPS

  • Enterprise Resource Planning applications are used for business areas such as distribution, sales, finance and human resources
  • Example modules include sales and distribution, financials, controlling, materials management, project system, time sheet, payroll, HR and asset accounting

Data Systems

  • Hardware is any part of your computer that has a physical structure, such as, the keyboard or mouse. It also includes all of the computer's internal parts
  • Computer software describes the programs and inner coding which tell a computer how to perform operations

BIS (Business Information System)

  • BIS is 'A business information system is a group of interrelated components that work collectively to carry out input, processing, output, storage and control actions in order to convert data into information products that can be used to support forecasting, planning, control, coordination, decision making and operational activities in an organisation."
  • Resources that support BIS include People Resources
  • Consists of the users of information system
  • Hardware resources refer to all types of machines, not just computers
  • Communication resources also enable systems to transfer data

Computer Limitations

  • Computer-based information systems lack judgement/experience
  • They are incapable of solving problems with their own judgement
  • Generally, computer-based information systems are unable to react to unexpected situations
  • They lack human creativity

Computer Processors

  • Electronic commerce (e-commerce): All electronically mediated information exchanges between an organisation and its external stakeholders
  • Electronic business (e-business): All electronically mediated information exchanges both within an organisation and stakeholders supporting range of business processes

Management Support System

  • Supports managerial decision-making and data-driven insights
  • Helps optimize business performance, via tools like performance management and strategic planning tools
  • Business analytic software is also included

Transaction Processing System (TPS)

  • Processes business transactions efficiently involving data collection, storage, and retrieval
  • Bank transactions (ATM, Online Banking)
  • Point of Sale (POS) systems in retail and Order Processing Systems

Management Information System (MIS)

  • Provides summarized reports for middle management decision-making
  • Functions primarily for data processing analysis and reporting
  • Includes sales forecasting, inventory management, and financial reporting

Characteristics of MIS

  • Supports structured decision-making and generates periodic reports
  • Uses data from TPS and Improves efficiency in management

Enterprise Collaboration Systems (ECS)

  • Facilitates teamwork and communication for document sharing and project management, enhancing efficiency in collaborative work
  • Examples consist of Microsoft Teams and Google Workspace

Executive Information Systems (EIS)

  • Executive dashboards and financial forecasting and monitors KPI reports
  • Monitors the latest trends
  • It is designed for senior executives and uses summary data and uses summarized data and key performance indicators

General Characteristics of Transaction Processing Systems (TPS)

  • High transaction speed, including Accuracy and Reliability, Large volume processing including real time or batch processing

Process Control Systems

  • Controls industrial and manufacturing processes
  • Monitors Realtime productions Activities
  • Examples inlcude Supervisory Control and Data Aquisition and industrial automation software

Operations Support System

  • Supports business operations, facilitates day-to-day transactions and ensures smooth workflow and efficiency
  • Order processing systems and inventory control systems and point of sale (POS) systems
  • Product Innovation
  • New or significantly improved goods or services
  • Process Innovation
  • New or improved production or delivery methods

How BIS Influences Marketing

  • New marketing method involving significant changes in product packaging, product placement, product promotion or pricing
  • Organizational Innovation: new organizational method in business practices and workplace external relations
  • A Computer is an electronic device that manipulates information or data
  • Has the ability to store, retrieve, and process data

Computing

  • Input is Hardware to enter data
  • The Central Processing Unit (CPU) is a processor to execute control computer functions
  • Memory temporarily enables processors to store data
  • While storage devices enable data and programs persistly

Hardware & Software

  • Hardware and software is an interrelated computer system works together with the aim of converting data and information
  • Key hardware concepts have an electronic device and is Computer the same as Computer Systems?
  • System software controls hardware and controls how tools work together
  • System software has operating including development and Utility programs
  • An application software can perform a variety of tasks to aid the user specific and specific information.
  • A Chrome device is a system.
  • Computer viruses or programs that make harms that are transfer over communication channels
  • Another type of viruses (called macro viruses) infect by inserting unwanted phrases into document

Hacking

  • Hacking means unauthorized access to a system
  • Legal ethical hacking or system is perfect legal or system pentration is conducted by information security specialist
  • Also to circumvent standards methods by hackers that is password hacking

Virus

  • Anti protection software needs regular updates
  • Some Care should be taken or software applied or monitor computer and suspicious behavior (or manual instructions)
  • Malware, such as worms, trojans, spyware and adware

Protection

  • Safe computing like not opening attachments (.exe) and doing regular back ups
  • Use antiviruses software the most way removes identify removes computer programs
  • Open software are available and that worms

Worns

  • A worm isn't tecnially a virus but do harm to the computer
  • They are self replicating over networks over internet without user intervention
  • Viruses Corrupting the modifying file to affect the computer
  • Computer can be gained by safe computing and setting up protections

Virus Protection

  • Defines a limits user access prevent unauthorized action and can apply role-based access controls
  • Encryption converts to into data such data confidentiality AES or SSL/TLS
  • Virus the detect remove malware antiviuses the software firewall

Hardware Breakdown

  • Keyboard, trackball, and scanner
  • Printer, the motor The different the type computers
  • Desktop Portable Handheld or smartphone or server computers and notebook

Different Classifications of Computers

  • Analog computers process continuous data, while digital computers use data in binary code
  • Supercomputers handle complex calculations, while mainframe computers manage transactions
  • Minicomputers have medium-scale computing, macrocomputers are smaller in scale and servers provide a network of services

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Use Quizgecko on...
Browser
Browser