E-Booking at London International Airport
|
|
|
- Irene Higgins
- 5 years ago
- Views:
Transcription
1 Standard Grade Computing Studies Commercial Data Processing Frank Frame
2 Acknowledgement Thanks to Dorothy Tedman for her contribution to the review of the content. First published This publication may be reproduced in whole or in part for educational purposes by schools and colleges in Scotland provided that no profit accrues at any stage. ISBN ii
3 Contents Introduction The Reasons for Using Commercial Data 1 Processing Systems Management Information 2 Data and Information 3 The Data Processing Cycle 3 E-commerce 11 Electronic Funds Transfer at Point of Sale 12 Costs 14 Computer Crime and Fraud 14 Data Security 14 Questions on the CDP Programme 16 Answers to CDP Questions 18 iv iii
4 Introduction This publication is part of a series of publications to support Standard Grade Arrangements in Computing Studies (March 2004). The titles in the series are: General Purpose Packages Communications and Networks Computer Systems Automated Systems Commercial Data Processing. The first two packs, General Purpose Packages and Communications and Networks, provide complete coverage of the content as specified in the updated arrangements for Standard Grade Computing Studies. The other three packs, Computer Systems, Automated Systems, and Commercial Data Processing have been produced to support the three programmes featured on the DVD. The content of these materials has been written to relate directly to the programmes on the DVD and may not cover all the content as specified in the course arrangements. Commercial Data Processing The materials contained in this pack support the programme on the DVD entitled International Airport. The main focus of the materials is to describe the way in which data is collected and processed by a variety of different companies and organisations at Glasgow International Airport. The materials cover the following content as specified in the course arrangements. iv
5 Commercial Data Processing Content covered in support materials Main aspect F/G/C G/C Need volume of management documents information speed of processing speed of access repetitive tasks Data-processing data collection difference between cycle data preparation, data and input, processing information and storage output Data collection, bar codes magnetic ink smart cards preparation and magnetic stripes character validation input recognition verification (MICR) check digit types of check (e.g. length, range) Processing and update interactive sequential storage backup processing random/direct access multi-user databases Output paper, screen file C Hardware and software basic hardware: mainframe computer system terminals Implications social effects on business job types and computer crime, careers: fraud programmer systems analyst engineer network manager technical e-commerce online shopping electronic funds transfer (EFT) point of sale (POS) economic security and initial costs accuracy of running costs physical and privacy information software security Advantages comparison with maintaining single-entry manual system contact with and multiple use information about a large number of customers v
6 vi
7 The Reasons for Using Commercial Data Processing Systems Commercial Data Processing is the use of powerful computer systems to collect and process large volumes of data at high speed. The programme on the DVD takes us to Glasgow Airport and to the British Airport Authority s billing centre at Hillington where they process all the accounts for the airport. In the programme we get an opportunity to see how powerful computer systems are used to process the large amounts of data that are needed to manage the airport and the businesses that operate there. The Data Processing System that is used to run the airport is called the Airport Operating System, AOS. Once you have seen the programme the reasons for using CDP systems will be clear. They are set out in this table. Reason for using CDP They process lots of data. They handle repetitive tasks easily. They process data at high speeds. They ensure very accurate data. Examples from the programme The BA computer system processes thousands of pieces of data every second. At peak periods the BA computer systems check in thousands of passengers each day, repeating the same process over and over again. Bags are checked in immediately the bar code is entered. Aircraft positions and times are accurately recorded by the computer system. They offer instant access to the data. Many authorised staff members in the airport can see the data instantly. The data on arrivals and departures is displayed to the public on the large display screens. 1
8 The computer system makes it possible for: the airport to cope with the thousands of people who travel on the planes the movement of the planes all the needs of the planes such as food and fuel dozens of airlines to use the airport. Without the computer systems, the airport would simply not be able to cope. In the words of the airport staff, the airport without the computer system would be a nightmare to organise. Management Information One of the advantages of Commercial Data Processing is that it makes it easier for managers to control and process the information that is central to the operation of their businesses. A good example of this in action in the airport is the Airport Operating System. This is a computer system designed to capture information about the scheduling of landings and departures as well as operational flight information. This information is then used to manage the resources in the airport such as the allocation of aircraft stands, boarding gates and check-in desks. It is used to alert the crews who fuel and maintain the aircraft as well as the caterers. The AOS is then used to inform staff and the public about flight times using the large Flight Information Display Systems. It even feeds the information directly to Teletext/Ceefax and the British Airport Authority s website at: Single-entry multiple use of data The operation of the AOS gives us a clear example of single-entry multiple use of data. Once details about the progress of a flight are entered into the system, its landing time is confirmed. Immediately the system makes this information available to a whole host of people: the baggage handlers the caterers the crews who refuel and maintain the aircraft the public, through the display monitors the airline ground staff at the receiving airport Hillington billing centre staff who will bill the airline for the landing charges. 2
9 Data and Information Data and Information Data can be defined as pieces of information that have not been collated or processed. Information is data that have been processed and, once part of a recognisable pattern, have meaning and value. Example from the programme Individual passenger bookings are pieces of data. Once processed the BA managers can get information about passenger numbers and movements and the popularity of flights to each destination. The Data Processing Cycle Commercial data processing is organised around the following stages known as the data processing cycle. 1. Collecting, preparing, entering and checking the data 2. Processing and storing the data 3. Information output Collecting, preparing, entering and checking the data Magnetic stripes On the back of bank and credit cards there is a stripe of a magnetic material that can be used to hold information. When the card is inserted into the cash dispenser the bank s computer can read the information in the magnetic stripe. These are used by shops and Cashline machines throughout the airport. Magnetic stripes are simple to operate. Using cards with magnetic stripes is a quick and accurate way to enter account details into the system. They have one major disadvantage: they are relatively easy to forge. Criminals use forged magnetic strip cards to carry out fraud. In order to counter this people have developed the smartcard. 3
10 Smartcards Smartcards have a microchip and on-board memory instead of a magnetic stripe to hold information. The microchips can hold a lot more data and are much more difficult to forge. Because of this they are already beginning to replace the magnetic stripes on bank cards and credit cards (although many for now have both storage methods). Smartcards are in use in shops throughout the airport. Smartcards and security Because smartcards can hold information that can be regularly updated and are difficult to forge, they have many potential security uses throughout the airport helping the authorities make sure that only authorised personnel access sensitive areas around the airport. Magnetic ink character recognition (MICR) MICR is the system of using magnetic ink to print information on cheques. MICR is used by banks to speed up the processing of cheques by passing them through an automatic MICR reader that can process thousands of cheques in an hour. It has the added advantage of making cheque forgery difficult for criminals. The shops around the airport accept cheques in payment for goods. Bar codes All of the shops in the airport have goods with bar codes on them. Bar codes consist of a series of lines that represent numbers. These codes are read into the computer, using laser light scanners, and converted into binary form before being sent for processing. Using bar codes is a very fast and accurate way of entering data into a computer system. Once an item has been given a bar code it enables a computer system to instantly identify it. British Airways uses bar codes to identify passengers baggage. A bar code is printed for each piece of baggage that enables BA s computer systems to track baggage all around the world. Checking the data Data must be checked to make sure they have been entered properly and are accurate. The two main ways of doing this are verification and validation. 4
11 Verification A common verification procedure is for an operator at a keyboard to be asked to confirm the details of the data displayed on the screen by a simple Is this correct Y/N? message. At the BA check-in desk the operator checks each passenger s details using the documents they bring with them and by asking them questions where necessary. Validation Validation checks are made by the software in the computer system. Validation checks make sure that the correct type of data is entered properly at the correct point in the input process. British Airport Authority s airport billing centre at Hillington carries out validation on all the data about landings and departures that are entered into the system. Here are some examples of checks that can be made on data being entered into computer systems at the airport. Presence check This checks to make sure that a data item has not been completely left out. Range check This ensures the data entered are within given limits, for example the hour of the flight departure is between 0 and 23 inclusive, and the minute of the flight departure is between 0 and 59 inclusive. Field length check This checks that the correct amount of numbers or characters has been entered. The BA system will check that the correct number of digits has been entered for the ticket number, and the flight number. Field or data type check This makes sure the correct type of data is entered. It makes sure, for example, that numbers are not entered into the passenger name field. Check digits This is a number calculated by the computer to make sure that the other numbers in a sequence have been entered properly. It is used to make sure that the PIN that people use with their credit cards to pay for their seats on the aircraft has been entered correctly. 5
12 Processing and storing the data Processing the data Interactive processing The computer systems at the airport rely on interactive processing. This means the computer systems process the data immediately they are entered and all the files are updated. The results are then fed back to the users immediately. The Airport Operating System uses interactive processing. When details of a flight landing time are received they are immediately processed and: the staff members who handle baggage are informed the information is displayed on the public notice boards staff members who fuel the aircraft are informed so that they can get prepared details about the landing are sent to the airport billing centre in Hillington. The British Airways booking system uses interactive processing. When passengers book a ticket their details are immediately available to all authorised BA staff members and are used to update the passenger list file. When passengers check in their baggage the details about the destination and weight of the baggage are immediately entered on file and are available to the baggage handing staff. 6
13 Storing the data files The computer systems throughout the airport store thousands of pieces of data every hour. This data is stored in files held on hard disks on various computer systems. The British Airways computer has files containing passenger information. The Airport Operating System has files with data on landings and departures, flight times, staff employed at the airport and costs and billing information. Updating the information The data in these files are continuously being updated 24 hours a day to make sure that they are accurate. Without the latest up-to-date and accurate information, planes would not get their correct landing times, fuel or their catering supplies. The airport simply would not be able to function safely or efficiently. Backing up the data If the computer system has a problem and data are lost it is vital that they can be recovered immediately. That is why the computers in the airport have an effective backup system. As data are stored on the hard disks attached to the airport s computer systems they are also immediately copied on to a second set of hard disks. If there is a problem with the first set of hard disks the second set kicks in and the data are instantly available. Multi-user database A multi-user database is a database that allows many users access at the same time and if a user has the authorisation, he or she will be able to update the data for the other users. At Glasgow Airport there are several multi-user databases in use. British Airways uses several multi-user databases containing files on passenger information, files on baggage and files on flight movements. These files are constantly being updated as people and their baggage are checked in at airports around the world. The databases are accessible simultaneously to many authorised BA staff members not just at Glasgow Airport but around the world. The public can even access a BA multi-user database through the internet in order to check flight details, costs and even to book a seat online. 7
14 At the airports there are e-booking kiosks where people can check themselves in. These e-booking kiosks are connected to the passenger information files held on a multi-user database and update the files as people check themselves in. Why does BA use multi-user databases? To enable many staff members, as well as passengers, to enter and check data on flights and bookings. To enable the staff around the world to trace baggage and make sure that it gets to the correct destination. To provide online internet access to the public on flight availability, times and costs. At the heart of the Airport Operating System is a multi-user database containing information about times, landings and departures. Many people around the airport have access to this vital information: the baggage handlers; the ground crew: cleaners, caterers, crews who refuel and maintain the aircraft; the public; the airline companies and the staff managing the airport. Sequential access or random/direct access Sequential access When a system uses sequential access to data it goes to each record in a file one after another in sequence. Sequential access is commonly used when recovering data from taped backup systems. Random/direct access A system using random/direct access goes directly to the data it requires. As we have seen, the computer systems at the airport use interactive processing, which means that data is processed immediately. This requires direct/random access to the data held on backing storage and is used throughout the airport computer system. 8
15 Output of information The airport uses a number of ways to output information. Staff members manning the airport check-in desks have data displayed on their terminals and use laser printers to produce bar codes for baggage and to print out boarding cards. The data about aircraft arrivals and departures are output from the Airport Operating System to the many display screens that are dotted all round the airport. Hardware CDP systems use very powerful computer systems, known as mainframes. These have very powerful processors, lots of internal memory and high capacity backing storage. In the airport, these powerful computer systems have terminals attached to them so that operators can enter and update information. A good example is the BA check-in terminals that are all linked to their central computer system. 9
16 What is the effect of the use of these Commercial Data Processing systems on the running of Glasgow Airport? Keeping a nightmare at bay! As Marianne Watt says on the programme, without the computer systems, running the airport and the businesses that operate there would be a nightmare. Everything, from passenger bookings and check-ins to making out the bills, would have to be done manually using paper, pens and filing cabinets. Staff workload would increase, as would costs, since a greater staff would be needed. There would be delays because everything would take that much longer to organise and process: a nightmare for staff and passengers alike. 10
17 What jobs have the CDP systems brought to the airport? Systems analysts Programmers Engineers Network manager British airways has an ICT team that includes systems analysts who: map out the work that the computer system needs to carry out select the hardware that is needed such as the computer systems, monitors and hard drives select and in some cases actually design the software needed to make the system run properly oversee the installation and testing of the entire system. Programmers take the software designs that that the systems analyst has produced, and write and test the programs. Engineers install all the hardware and cabling and are called in to carry out maintenance. The network manager carries out very important functions such as: controlling who has access to the system by giving users their unique identity codes and by giving users permissions to access and/or change data files held on the system controlling the installation of software and hardware. E-commerce E-commerce is the use of computer networks to allow people to buy and sell goods. As we have seen in the programme, people can now book and pay for their seats on an aircraft using an online booking system. The British Airways e- booking system not only lets people book and pay for their seats, but even enables them to check-in at the airport by themselves. 11
18 The advantages of booking and paying online Passengers can enquire about seat availability and then book their seats without having to leave the house and visit a travel agent. As for the airline the advantages are clear: they can cut out the travel agencies, keeping costs and prices to a minimum by offering this service across the internet they can contact passengers all around the world by enabling people to pay online using bank and credit cards they save the cost of having staff process cheques or cash. Electronic Funds Transfer at Point of Sale Electronic funds transfer Electronic funds transfer (EFT) transfers money directly between bank accounts using computer systems. When people use their bank debit card they are using EFT. Where is EFT used in the airport? In the airport shops people use EFT to pay for goods. In the car park people can use EFT to pay for the rather expensive parking charges. People can use EFT to pay for airline tickets. When a customer uses EFT to pay for something the debit card is passed through a reader. This authenticates the card and then contacts the customer s bank computer to find out if there are funds available. If there are funds available, the transaction is carried out, a receipt is printed and the funds are transferred electronically to the account of the shop, car park company or airline. 12
19 Who benefits Customers can pay for goods and services such as airline tickets and parking charges without having to carry large amounts of cash or use cheque books. Companies such as British Airways get the payments for their products transferred straight into their bank accounts. This also cuts down on costs since they do not have to pay staff to count the cash and then bank it. Point of sale terminal Shops use point of sale (POS) terminals to enter data about the goods being purchased by customers. The POS terminal reads in the data using bar codes. It then totals the cost before printing the receipt. The information about purchases is sent to the stock control system that monitors stock levels and automatically generates orders to keep stock levels topped up. Businesses benefit from using POS terminals linked to computer systems because: stock control is carried out by the computer system saving staff time and cutting costs customer bills are calculated accurately making accounting easier using bar codes with the POS system means customers purchases are processed quicker, enabling greater business throughput prices can be adjusted using the computer system the shelves should always be well stocked. As for customers, their bills are accurate, their transactions should take less time and the shelves should always be stocked with the goods they want. 13
20 Costs The costs of setting up and maintaining the computer systems in the airport involve spending enormous sums of money. Initial costs Running costs These costs involve: buying the equipment, such as computer systems, the monitors, the printers and the large display units around the airport, etc. installing all the cables that connect the computers employing the systems analysts, the programmers, etc. training courses. These are the day-to-day costs of keeping the computer systems running efficiently by paying for: the wages of the ICT staff members whose job it is to make changes to the software, maintain the hardware and install new equipment the consumables, such as printer toner and paper, writable CDs, DVDs and backup tapes the power and telecommunications bills. Computer Crime and Fraud If criminals could break the security systems surrounding the data held on the airports computers they could commit a whole range of crimes including: copying the IDs and passwords that allow access to the computer systems in the airport copying sensitive data about the running of the airport installing viruses stealing money from the accounts of the businesses in the airport. The result would be that the running of both the airport and the businesses that operate there would be totally disrupted. Data Security Data security at the airport is vital because: the Data Protection Act states that, by law, all data must be guarded by effective security the businesses that operate at the airport want to keep their business information on topics such as staffing, costs, profits and computers to themselves there are criminals and terrorist organisations that could do lots of damage if they gained access to key information. 14
21 What sort of security systems can they choose from? 1. There is a range of software-based security measures available to the airport authorities such as: a system of IDs and passwords All authorised users are given unique ID codes and then select their own passwords. using smartcards Smartcards can be used to hold advanced ID information such as eye scans. encryption Data items held on the system can be encoded so that anyone who hacks in will not be able to understand them. 2. There is also a range of physical security measures available to them such as: allowing only authorised personnel who are registered with security staff to enter rooms with computer terminals limiting the number of terminals that can access removable backing storage such as CD writers or USB flash memory. 15
22 Questions on the CDP Programme 1. Give five reasons, with examples, why commercial data processing systems are used in the airport. 2. Give an example of how the airport operating system (AOS) helps manage the information that is needed to keep the airport running smoothly. 3. An obvious benefit of a commercial data processing system is that data, once entered into the system, can be used by many people throughout an organisation. Describe how data, once entered into the AOS is accessible to many people. 4. Describe the difference between data and information using the BA system as an example. 5. Describe the locations in the airport where the following forms of input are found: magnetic stripe cards smartcards MICR bar codes. 6. What type of check would be made on data entered into the AOS to prevent a flight departure time of 25:10 being entered? 7. The airport billing system validates data being input to the system. What is validation? 8. Describe the data verification being carried out at the BA check-in desk. 9. Why does the airport operating system need to use interactive processing? 10. Give two examples of situations where the British Airways computer uses interactive processing. 11. Why do the systems used by British Airways to check in their passengers need direct/random access to their backing storage? 16
23 12. The database at the heart of the airport operating system is a multi-user database. (a) List as many of the people who access this database as you can. (b) How do passengers benefit from the use of this database? (c) How does this database help the ground crews and the baggage handlers? 13. What files does British Airways have on its multi-user databases? 14. Why does British Airways use multi-user databases? 15. Why would it be a nightmare to try and run the airport without its data processing systems? 16. CDP systems have created the following jobs in the airport. Give a description of what each of these jobs involves at the airport. Systems analysts Programmers Engineers Network Manager 17. What are the advantages of having an online system for booking and paying for seats to: (a) the airlines (b) the passengers. 18. Where in the airport is EFT used? 19. How does using EFT benefit both (a) airlines and (b) passengers? 20. How does using POS benefit both (a) businesses and (b) customers? 21. The initial costs and running costs involved in setting up computer systems like those in the airport are very high. Why is it worth all the expense? 22. Outline the opportunities for crime that could occur if the security systems around the airport s computers were to be breached. 23. Describe the software security measures that are mentioned in the programme as being used to protect the airport s computer system. 24. Describe the physical security used to protect the airport s computer system and data. 17
24 Answers to CDP Questions 1. This table contains five reasons with examples. Reason for using CDP They process lots of data every second. They handle repetitive work easily. They work at high speeds. They are very accurate. They offer instant access to the data. Examples from the programme The BA computer system processes thousands of pieces of data every second. At peak periods the BA computer systems check in thousands of passengers each day, repeating the same process over and over again. Bags are checked in immediately the bar code is entered. Aircraft positions and times are accurately recorded by the computer system. Many authorised staff members in the airport can see the data instantly. The data on arrivals and departures is displayed to the public on the large display screens. You may find other examples in the programme. 2. This airport operating system (AOS) is used to manage the resources in the airport such as the allocation of aircraft stands, boarding gates and check-in desks. It is used to alert the crews who fuel and maintain the aircraft as well as the caterers. 3. Once details about the progress of a flight is entered into the system its landing time is confirmed. Immediately the system makes this information available to a whole host of people: the baggage handlers the caterers the crews, who refuel and maintain the aircraft the public, through the display monitors the airline ground staff at the receiving airport Hillington billing centre staff members, who will bill the airline for the landing charges. 18
25 4. Data can be defined as pieces of information that have not been collated or processed. Information is data that have been processed and, once part of a recognisable pattern, have more meaning and value. Data Individual passenger bookings are pieces of data. Information Once processed the BA managers can get information about passenger numbers and movements and the popularity of flights to each destination. 5. Four examples are: magnetic stripe cards: in the shops and the inline booking systems smartcards: in the shops and the inline booking systems MICR: when paying buy cheque in the shops bar codes: when checking baggage. You may spot others in the programme or come up with other examples after discussion with your teacher. 6. A range check to prevent the hour being >23 7. Validation checks are made by the software in the computer system. Validation checks make sure that the correct type of data is entered properly at the correct point in the input process. 8. At the BA check-in desk the operator checks each passenger s details using the documents they bring with them and by asking them questions where necessary. 9. Because the flight information needs to be processed immediately and passed on to those who need to access it. 10. When passengers book a ticket their details are immediately available to all authorised BA staff members and are used to update the passenger list file. When passengers check in their baggage the details about the destination and weight of the baggage are immediately entered on file, and are available to the baggage handing staff. 11. Because this is an interactive system that needs to access and update the data in the system immediately. 19
26 12. (a) Many people around the airport have access to this vital information: the baggage handlers; the ground crew: cleaners, caterers and crews who refuel and maintain the aircraft; the public; the airline companies and the staff managing the airport. (b) Passengers get up-to-date flight information on the displays in the airport and from the airline websites as well as Ceefax. (c) They get accurate information about flight arrivals and departures that enables them to plan ahead and get the staff and supplies ready to service the aircraft. 13. British Airways use several multi-user databases containing, for example, files on passenger information, files on baggage and files on flight movements. 14. To have lots of staff members, as well as passengers, entering and checking data on flights and bookings. To enable the staff around the world to trace baggage and make sure that it gets to the correct destination. To provide online internet access to flight availability, times and costs to the public. 15. Everything, from passenger bookings and check-ins to making out the bills, would have to be done manually using paper, pens and filing cabinets. Staff workload would increase as would costs since a greater staff would be needed. There would be delays because everything would take that much longer to organise and process: a nightmare for staff and passengers alike. 16. Systems analysts: map out the work that the computer system needs to carry out select the hardware that is needed such as the computer systems, monitors and hard drives select and in some cases actually design the software needed to make the system run properly oversee the installation and testing of the entire system. Programmers Programmers take the software designs that the systems analyst has produced and write and test the programs. Engineers Engineers install all the hardware and cabling and are called in to carry out maintenance. 20
27 Network manager: controls who has access to the system by giving users their unique identity codes and by giving users permissions to access and/or change data files held on the system controls the installation of software and hardware. 17. (a) For the airline the advantages are clear: they can cut out the travel agencies, keeping costs and prices to a minimum by offering this service across the internet they can contact passengers right around the world by enabling people to pay online using bank and credit cards they save the cost of having staff process cheques or cash. (b) Passengers can enquire about seat availability and then book their seats without having to leave the house and visit a travel agency. 18. In the shops when people pay using their bank cards. 19. (a) Airlines such as British Airways get the payments for their goods made straight into their bank accounts. This cuts their costs since they do not have to pay staff to count the cash and then bank it. (b) Customers can pay for goods and services such as airline tickets and parking charges without having to carry large amounts of cash or use cheque books. 20. (a) Businesses benefit as follows. Stock control is carried out by the computer system saving staff time and cutting costs. Customer bills are calculated accurately making accounting easier. Using bar codes with the POS system means customers purchases are processed quicker enabling greater business throughput. Prices can be adjusted using the computer system. (b) Customers benefit because their bills are accurate, their transactions should take less time and the shelves should always be stocked with the goods they want. 21. It is worth all the expense because without the computer systems the airport would be very difficult to run. Without their computer systems the airlines would not be able to compete and would soon go out of business. 21
28 22. Without proper security the following types of crime could be committed: copying the IDs and passwords that allow access to the computer systems in the airport copying sensitive data about the running of the airport installing viruses stealing money from the accounts of the businesses in the airport. 23. (a) In the programme ID and password systems are mentioned. (b) The following security measures could be used. Using smartcards Smartcards can be used to hold advanced ID information such as eye scans. Encryption Data items held on the system can be encoded so that anyone who hacks in will not be able to understand them. 24. There is also available a range of physical security measures: allowing only authorised personnel who are registered with security staff to enter rooms with computer terminals limiting the number of terminals that can access removeable backing storage, such as CD writers or USB flash memory. 22
ZIMBABWE SCHOOL EXAMINATIONS COUNCIL. COMPUTER STUDIES 7014/01 PAPER 1 Multiple Choice SPECIMEN PAPER
ZIMBABWE SCHOOL EXAMINATIONS COUNCIL General Certificate of Education Ordinary Level COMPUTER STUDIES 7014/01 PAPER 1 Multiple Choice SPECIMEN PAPER Candidates answer on the question paper Additional materials:
IT in the Supermarket
IT in the Supermarket Information systems are used widely in shops and in the distribution of goods and one area in which their use is particularly important is supermarkets. Computer systems are used
GCSE BITESIZE Examinations. General Certificate of Secondary Education ICT FOUNDATION TIER. Time allowed 1 hour 30 minutes Total marks: 90
GCSE BITESIZE Examinations General Certificate of Secondary Education ICT FOUNDATION TIER Time allowed 1 hour 30 minutes Total marks: 90 Answer all questions in the spaces provided 1. Information can be
TH2. Input devices, processing and output devices
TH2. Input devices, processing and output devices http://www.bbc.co.uk/schools/gcsebitesize/ict/ Input devices allow us to enter raw data into a computer. The computer processes the data and then produces
GCSE BITESIZE Examinations. General Certificate of Secondary Education ICT HIGHER TIER. Time allowed 1 hour 30 minutes
GCSE BITESIZE Examinations General Certificate of Secondary Education ICT HIGHER TIER Time allowed 1 hour 30 minutes Total marks: 90 Answer all questions in the spaces provided 1. The advert below is used
Customer Service Plan. (Issued in Compliance with 14 CFR Part 259)
Customer Service Plan (Issued in Compliance with 14 CFR Part 259) Fiji Airways, in compliance with 14 CFR Part 259, has adopted this customer service plan to monitor the effects of irregular flight operations
Introduction to Information System
Introduction to Information System Information Systems The Role of Information Systems in a Business Data versus Information Information Systems Definition Computer-Based Information System Business Information
Materna Integrated Passenger Services (Materna ips)
Materna Integrated Passenger Services (Materna ips) Materna ips accompanies airline passengers throughout their whole journey: from web check-in at home, through all the handling points at their departure
Chapter 5 Understanding Input. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 5 Understanding Input Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define input and differentiate among a program, command, and user response Identify
The Comprehensive, Yet Concise Guide to Credit Card Processing
The Comprehensive, Yet Concise Guide to Credit Card Processing Written by David Rodwell CreditCardProcessing.net Terms of Use This ebook was created to provide educational information regarding payment
Saudi Arabian Airlines Customer Service Plan
Saudi Arabian Airlines Customer Service Plan This Plan is adopted for all scheduled and public charter flights operated by Saudi Arabian Airlines. Our goal is to make every flight a safe and pleasant experience
COMPUTER AND COMPUTERISED ACCOUNTING SYSTEM
MODULE - 2 Computer and Computerised Accounting System 12 COMPUTER AND COMPUTERISED ACCOUNTING SYSTEM With the expansion of business the number of transactions increased. The manual method of keeping and
Data Security 2. Implement Network Controls
UNIT 19 Data Security 2 STARTER Consider these examples of computer disasters. How could you prevent them or limit their effects? Compare answers within your group. 1 You open an email attachment which
THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP
THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP WHERE IS THE U.S. PAYMENT CARD INDUSTRY NOW? WHERE IS IT GOING? Today, payment and identification cards of all types (credit
AFRAA AIRLINE PASSENGER SERVICE COMMITMENT
AFRAA AIRLINE PASSENGER SERVICE COMMITMENT PREAMBLE African Airlines members of African Airlines Association (AFRAA) have developed the Airline Passenger Service Commitment following consultation with
Graphic Communication
Graphic Communication St Pauls RC Academy Computer Hardware CDT Department Hardware Devices Hardware is the name given to any piece of equipment that is used along side a computer (including the main computer
Cambridge International Examinations Cambridge International General Certificate of Secondary Education
Cambridge International Examinations Cambridge International General Certificate of Secondary Education *0123456789* INFORMATION AND COMMUNICATION TECHNOLOGY 0417/01 Paper 1 Theory For Examination from
The transition imperative: from project to operations
The transition imperative: from project to operations Dr Andy Davies* Breakfast Seminar, Friday 17 th June 2011 BI, Norwegian Business School * Innovation and Entrepreneurship Group Imperial College Business
DEVELOPMENT OF A SAFEGUARD MODEL FOR E-TICKETING ABSTRACT
DEVELOPMENT OF A SAFEGUARD MODEL FOR E-TICKETING June Wei College of Business University of West Florida 11000 University Parkway, Pensacola FL 32514 (850) 474-2771 [email protected] Meiga Loho-Noya College
WineWeb: Point-of-Sale Planning Guide
WineWeb: Point-of-Sale Planning Guide This document provides information on options to consider when establishing a point-of-sale environment for your winery, or when thinking about expanding your winery
ICT THEORY 4 MAIN AREAS
ICT THEORY RE- CAP & REVISION (SUMMARY OF THE THEORY HANDOUT) 4 MAIN AREAS 1. HARDWARE 2. SOFTWARE 3. NETWORKS, CONNECTIVITY, COMMUNICATION & THE INTERNET. 4. USE/MISUSE AND CARE OF COMPUTERS 1 Hardware
MULTIPLE CHOICE FREE RESPONSE QUESTIONS
MULTIPLE CHOICE FREE RESPONSE QUESTIONS World ORT Union I n p u t d e v i c e s Where would you find the letters QUERTY? A. Mouse B. Keyboard C.Numeric Keypad How did the computer mouse get its name? A.
The e-payment Systems
The e-payment Systems Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing, sales, payment, fulfillment, customer service Electronic
ONLINE GROUP BOOKING SERVICE
WELCOME TO LIME S ONLINE GROUP BOOKING SERVICE MANAGING YOUR GROUPS JUST GOT EASIER WITH OUR ONLINE GROUP BOOKING SERVICE LIME are a full service management company, operating within the travel industry.
Checking in at an airport check-in machine. Checking in at an airport check-in machine
Would you like to check in for your flight at the airport? Then why not use the Lufthansa check-in machines? You will be able to obtain boarding passes for yourself and any travelling companions quickly
Credit card: permits consumers to purchase items while deferring payment
General Payment Systems Cash: portable, no authentication, instant purchasing power, allows for micropayments, no transaction fee for using it, anonymous But Easily stolen, no float time, can t easily
10.1 FUNCTIONS OF INPUT AND OUTPUT DEVICES
FORM 4 COMPUTER STUDIES Chapter 10: Input and Output Devices March, 01 10.1 FUNCTIONS OF INPUT AND OUTPUT DEVICES The main function of an input device is to The main function of an output device is to
Chapter 8: Security Measures Test your knowledge
Security Equipment Chapter 8: Security Measures Test your knowledge 1. How does biometric security differ from using password security? Biometric security is the use of human physical characteristics (such
Plastic Fraud. Debit Cards Debit cards, unlike credit cards, automatically withdraw funds from your account at the time you make a transaction.
Getting a Handle on Debit and Credit Cards Plastic Fraud State-of-the-art thieves are concentrating on plastic cards. In the past, this type of fraud was not very common. Today, it is a big business for
The future of airline management software is in the cloud.
The future of airline management software is in the cloud. Simple. Powerful. Flexible. Zapways hosted airline reservation and management software provides a comprehensive, low-cost solution for all aspects
SAMPLE EXAMINATION PAPER SAMPLE ANSWERS
EXAMINATION PAPER: ACADEMIC SESSION 2003/2004 Campus School Department Level TITLE OF PAPER COURSE CODE Maritime Computing and Mathematical Sciences Information Systems and Multimedia Three ecommerce COMP1308
Track Your Bag. Introduction. Objectives. March 15, 2013
March 15, 2013 Inside This Issue Introduction... 1 Objectives... 1 Accessing the Application... 2 Baggage Information... 4 Delayed Baggage... 5 Error Messages... 6 Customer Interaction... 7 Your Role...
Topic 2(d) Bank accounts
Topic 2(d) Bank accounts Storing money in a bank or building society If you have money you don t want to spend immediately, the best thing you can do with it is put it in a bank account. This will keep
AIR PASSENGER RIGHTS EU COMPLAINT FORM
AIR PASSENGER RIGHTS EU COMPLAINT FORM THIS FORM CAN BE USED TO LODGE A COMPLAINT WITH AN AIRLINE AND/OR A NATIONAL ENFORCEMENT BODY. Passenger rights in case of denied boarding, downgrading, cancellation
Walt Disney World Walt Disney World Walt Disney World Walt Disney World Walt Disney World Walt Disney World Walt Disney World
Disney s Magical Express is a complimentary service that includes round-trip motor coach transportation and baggage handling between Orlando International Airport and Walt Disney World Resort for guests
Payment Card Industry (PCI) Policy Manual. Network and Computer Services
Payment Card Industry (PCI) Policy Manual Network and Computer Services Forward This policy manual outlines acceptable use Black Hills State University (BHSU) or University herein, Information Technology
AIRLINE PASSENGER SERVICE COMMITMENT 28 March 2001
AIRLINE PASSENGER SERVICE COMMITMENT 28 March 2001 PREAMBLE Airlines in Europe have developed the Airline Passenger Service Commitment following consultation with representatives of Air Travellers, European
COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name
COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name Introduction Removable Media and Mobile Device Policy Removable media and mobile devices are increasingly used to enable information access
VIAMILANO SERVICE CONDITIONS. Baggage handling service regulation
VIAMILANO SERVICE CONDITIONS The free ViaMilano service, offered by SEA Aeroporti di Milano, provides use of facilities during a stopover at Milan Malpensa Airport. In particular, with ViaMilano it is
Customer Service Plan
Customer Service Plan Concesionaria Vuela Compañía de Aviación, S.A.P.I. de C.V., d/b/a Volaris, seeks to reach our Customers satisfaction and offer them a unique flight experience. This is the reason
ATM FRAUD AND COUNTER MEASURES
ATM FRAUD AND COUNTER MEASURES GENESIS OF ATMs An automated teller machine was first introduced in 1960 by City Bank of New York on a trial basis. The concept of this machine was for customers to pay utility
0418/01 Paper 1 Specimen Paper 2007
UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Secondary Education INFORMATION TECHNOLOGY 048/0 Paper Specimen Paper 007 Candidates answer on the Question Paper.
Final. Mark Scheme ICT INFO2. (Specification 2520) Unit 2: Living in the digital world. General Certificate of Education (A-level) June 2013
Version 1.0 General Certificate of Education (A-level) June 2013 ICT INFO2 (Specification 2520) Unit 2: Living in the digital world Final Mark Scheme Mark schemes are prepared by the Principal Examiner
UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Secondary Education. Paper 1 October/November 2011 2 hours
www.xtremepapers.com UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Secondary Education *2238279192* INFORMATION AND COMMUNICATION TECHNOLOGY 0417/12 Paper 1 October/November
Travel & Accommodation Arrangements
Travel Arrangements Travel & Accommodation Arrangements Who is responsible for organising travel arrangements? The TRAVEL ADMINISTRATOR (sometimes known as a Travel Co-ordinator). Many businesses also
TENDER FOR IT INTEGRATION AT THE BVI AIRPORTS AUTHORITY
TENDER FOR IT INTEGRATION AT THE BVI AIRPORTS AUTHORITY Background BVI Airport Authority is presently owns and operates 3 airports in British Virgin Islands by providing passengers a safe and secure gateway
SUMMARIES OF VIDEOS GRADE 11 SYSTEMS TECHNOLOGIES
SUMMARIES OF VIDEOS GRADE 11 SYSTEMS TECHNOLOGIES 1. Case Study - Understanding Computers and Computing A computer is an electronic device that can accept, process and store data by following instructions
1 PERSONAL COMPUTERS
PERSONAL COMPUTERS 1 2 Personal computer a desktop computer a laptop a tablet PC or a handheld PC Software applications for personal computers include word processing spreadsheets databases web browsers
How to Select a Receipt Printer for Mobile POS
ebook How to Select a Receipt Printer for Mobile POS Is your restaurant or retail store ahead of the technology curve? Be honest is it even close? In this day and age, customers expect to see their favorite
Banking Solutions for Nonprofits 101. Four Money Saving Strategies for Nonprofits with Bank Products
Banking Solutions for Nonprofits 101 Four Money Saving Strategies for Nonprofits with Bank Products Understanding Bank Options for Nonprofit Organizations What type of accounts are available for Nonprofits
The Drug Quality & Security Act
The Drug Quality & Security Act Drug Traceability & Interoperable Exchange of Transaction Information, History & Statement Mujadala Abdul-Majid 3E Company February 20, 2014 About 3E Company About 3E Supply
POS Checklist: Getting Started
v POS Checklist: Getting Started BarcodesInc www.barcodesinc.com 1.800.351.9962 What You'll Learn in this ebook The 7 core components of an effective and profitable POS system How a complete POS system
Local Government Cyber Security:
Local Government Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Elected Officials Administrative Officials Business Managers Multi-State Information Sharing and
Patch Management. FITS OM Directory Services Administration Contents. Key
Patch Management FITS OM Directory Services Administration Contents PM 1 Overview........................................................................1 PM 2 Implementation guide...........................................................3
This SAS Plan is adopted for all scheduled flights operated by SAS to and from the US.
SAS Customer Service Plan - 02-02 2012 Scandinavian Airlines System (SAS) s Customer Service Plan describes SAS s customer service commitments consistent with US Department of Transportation regulations.
Protection of Computer Data and Software
April 2011 Country of Origin: United Kingdom Protection of Computer Data and Software Introduction... 1 Responsibilities...2 User Control... 2 Storage of Data and Software... 3 Printed Data... 4 Personal
POS software: Microsoft Dynamics - Point of Sale FAQ
POS software: Microsoft Dynamics - Point of Sale FAQ Q: I only have one retail store. I'd like to use a computer and software, but don't know if Microsoft Dynamics Point of Sale is a good fit. A: Point
MANAGEMENT TECHNOLOGY CENTER STUDENT GUIDE TO COMPUTING SERVICES
MANAGEMENT TECHNOLOGY CENTER STUDENT GUIDE TO COMPUTING SERVICES This document describes the computing facilities that are available to the students of the Freeman School. Computing labs, access, software,
Airline Disruption Management
Airline Disruption Management In a world of crowded planes and crowded skies, and where operational problems are quickly magnified by tight systemic constraints, one of the few ways airlines can truly
Beginner s Guide to Point of Sale
Beginner s Guide to Point of Sale Are you looking to purchase your first restaurant POS system? Interested in switching to a new restaurant POS? Enjoy reading online guides with informative graphics? Our
CIS Mid Semester Examinations
CIS Mid Semester Examinations Candidate must answer all questions. Multiple Choice questions are to be answered on the answer sheet. 1. A computer is an electronic device, operating under the control of
Cambridge International Examinations Cambridge International General Certificate of Secondary Education. Paper 1 May/June 2014 2 hours
*3483070646* Cambridge International Examinations Cambridge International General Certificate of Secondary Education INFORMATION AND COMMUNICATION TECHNOLOGY 047/ Paper May/June 04 hours Candidates answer
Payment Power for Merchants
Create the right customer payment solution for your business today. For more information, call 1-800-363-1163, visit any TD Canada Trust branch or visit us online at www.tdmerchantservices.com Payment
MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER
MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER GENERAL The MIFARE contactless smart card and MIFARE card reader/writer were developed to handle payment transactions for public transportation systems.
www.xtremepapers.net
UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Secondary Education *83455669* INFORMATION AND COMMUNICATION TECHNOLOGY 047/0 Paper May/June 2009 2 hours Candidates
COMPUTER - INPUT DEVICES
COMPUTER - INPUT DEVICES http://www.tutorialspoint.com/computer_fundamentals/computer_input_devices.htm Copyright tutorialspoint.com Following are few of the important input devices which are used in a
Cyber Security: Guidelines for Backing Up Information. A Non-Technical Guide
Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Executives, Business Managers Administrative & Operations Managers This appendix is a supplement to the Cyber Security:
09/11/2015. ACS 3907 E-Commerce. Payment Methods. General Payment Systems. Instructor: Kerry Augustine November 10 th 2015
ACS 3907 E-Commerce Instructor: Kerry Augustine November 10 th 2015 Payment Methods General Payment Systems Cash no authentication, no transaction fee, anonymous Easily stolen, no float time, hard for
Trends in Finger Vein Authentication and Deployment in Europe
Hitachi Review Vol. 64 (2015), No. 5 275 Featured Articles Trends in Finger Vein Authentication and Deployment in Europe Yuji Nakamaru Makiko Oshina Shuichi Murakami Ben Edgington Ravi Ahluwalia OVERVIEW:
POSITION PAPER. The Application of Biometrics at Airports PUBLISHED BY ACI WORLD HEADQUARTERS GENEVA SWITZERLAND
POSITION PAPER The Application of Biometrics at Airports PUBLISHED BY ACI WORLD HEADQUARTERS GENEVA SWITZERLAND Dear ACI Members and World Business Partners, With the increasing need for secure personal
Bank of Scotland Private Banking Savings Accounts
Bank of Scotland Private Banking Savings Accounts Terms and Conditions Applicable to: Premier Investment Account Premier Reserve Account (for Personal Customers) Premier Reserve Account (for Trusts) 3
COMPUTER BASICS. Seema Sirpal Delhi University Computer Centre
COMPUTER BASICS Seema Sirpal Delhi University Computer Centre What is a Computer? An electronic device that stores, retrieves, and processes data, and can be programmed with instructions. A computer is
ELECTRONIC COMMERCE WORKED EXAMPLES
MODULE 13 ELECTRONIC COMMERCE WORKED EXAMPLES 13.1 Explain B2B e-commerce using an example of a book distributor who stocks a large number of books, which he distributes via a large network of book sellers.
UNIT 1 INTRODUCTION TO NC MACHINE TOOLS
UNIT 1 INTRODUCTION TO NC MACHINE TOOLS Structure 1.1 Introduction Objectives 1.2 NC Machines 1.2.1 Types of NC Machine 1.2.2 Controlled Axes 1.2.3 Basic Components of NC Machines 1.2.4 Problems with Conventional
Understand the Business Impact of EMV Chip Cards
Understand the Business Impact of EMV Chip Cards 3 What About Mail/Telephone Order and ecommerce? 3 What Is EMV 3 How Chip Cards Work 3 Contactless Technology 4 Background: Behind the Curve 4 Liability
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
TOP TRUMPS Comparisons of how to pay for goods and services online
Cash Cash is legal tender in the form of bank notes and coins Small value purchases e.g. cafes, shops Pocket money Repaying friends Cash is physically transferred from one person to the next, usually face-to-face
CHAPTER 10: COMPUTER SECURITY AND RISKS
CHAPTER 10: COMPUTER SECURITY AND RISKS Multiple Choice: 1. In a survey of more than 500 companies and government agencies, percent detected computer security breaches. A. 20 B. 75 C. 85 D. 99 Answer:
How To Run Island Fly
*CUP/T47890* ADVANCED GCE APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY Unit 15: Software Development INSTRUCTIONS FOR CANDIDATES JANUARY 2008 Pre-release Materials and Tasks Candidates Instructions
ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION DATA PROCESSING OPERATIONS SERIES CLASS TITLE POSITION CODE EFFECTIVE
ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION DATA PROCESSING OPERATIONS SERIES CLASS TITLE POSITION CODE EFFECTIVE DATA PROCESSING OPERATOR 11425 4-16-89 DATA PROCESSING ASSISTANT
Room for growth DÜSSELDORF INTERNATIONAL AIRPORT CUSTOMER STORY
Room for growth DÜSSELDORF INTERNATIONAL AIRPORT CUSTOMER STORY Düsseldorf International Airport is the third-largest airport in Germany. In 2009, it transported nearly 18 million passengers and managed
Credit Card Conditions of Use. Credit Guide.
Credit Card Conditions of Use. Credit Guide. Effective Date: 20 May 2016 This document does not contain all the terms of this agreement or all of the information we are required by law to give you before
Bank Account Conditions.
Personal Banking Bank Account Conditions. Applicable from 30 July 2015. Bank Account Conditions. This booklet contains the general conditions that apply to our personal bank accounts and some related services.
Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR
Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR Information and Resources for Small Medical Offices Introduction The Personal Health Information Protection Act, 2004 (PHIPA) is Ontario s health-specific
StandardBankAccounts in association with
Introducing StandardBankAccounts in association with What is a standard bank account? A standard bank account is a new type of account designed to help you manage your money. If you have been put off opening
YOUR BANKING RELATIONSHIP WITH US. Personal Banking terms and conditions
YOUR BANKING RELATIONSHIP WITH US Personal Banking terms and conditions April 2014 This booklet contains the general conditions that apply to our personal bank accounts and some related services. Please
Notes. Business Management. Higher Still. Higher. www.hsn.uk.net. HSN81200 Unit 1 Outcome 2. Contents. Information and Information Technology 1
Higher Business Management Unit 1 Outcome 2 Contents Information and Information Technology 1 Data and Information 1 Information Sources 1 Information Types 2 The Value of Information 3 The Use of Information
Policy Document. Communications and Operation Management Policy
Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author
Synergy POS. Straightforward, easy to use business software for New Zealand retailers
Synergy POS Straightforward, easy to use business software for New Zealand retailers Most regular functions available from the simple quick menu screen Increase turnover Have the tools to improve profitability
Economy Class: One bag 22x15x8 inches (55x38x20 cm) weighing not more than 15 lbs(7kg).
CHECK-IN TIMES Emirates check-in counters worldwide open no less than 3 hours prior to departure. First and Business Class passengers should report to Emirates check-in desks not later than 1 hour prior
Information and Communication Technology
Centre Number Candidate Number General Certificate of Secondary Education 2011 Information and Communication Technology TIME 1 hour 30 minutes. Short Course Paper 1 Higher Tier [G5302] MONDAY 13 JUNE,
Introduction to Information Technology
Introduction to Information Technology Career Cluster Information Technology Course Code 10009 Prerequisite(s) Recommended that a student has taken from the Foundation Courses Computer Applications. Credit.5
Chap-02, Hardware and Software. Hardware Model
Philadelphia University School of Business Administration INFO-101 Information Systems Prof London Chap-02, Hardware and Software Hardware Components Central processing unit (CPU) Arithmetic/logic unit
