Free Essay

Information Techonogy

In:

Submitted By zxcvbnj
Words 1570
Pages 7
Stack Exchange Inbox Reputation and Badges sign up log in tour help -------------------------------------------------
Top of Form

Bottom of Form

Stack Overflow * Questions * Jobs * Tags * Users * Badges * Ask Question
_
Stack Overflow is a community of 4.7 million programmers, just like you, helping each other.

Join them; it only takes a minute:

Sign up
Join the Stack Overflow community to: 1. Ask programming questions 2. Answer and help your peers 3. Get recognized for your expertise
Setting focus to a row in a JTable when using custom ResultSetTableModel up vote0down votefavorite | I have a JTable which is being fed from a database. I have a custom model for the table - ResultSetTableModel. The model is as follows: public class ResultSetTableModel extends AbstractTableModel { private String[] columnNames; private Class[] columnClasses; private List<List<Object>> cells = new ArrayList<List<Object>>(); public ResultSetTableModel() { columnNames = new String[1]; columnNames[0] = "Result Set"; List<Object> row = new ArrayList<Object>(); row.add("No data"); cells.add(row); } public ResultSetTableModel(ResultSet rs) throws SQLException { ResultSetMetaData rsmd = rs.getMetaData(); // SOMETHING TO KEEP AN EYE ON! It looks like the ResultSetMetaData // object screws up once the ResultSet itself has been read (ie by // rs.next() ). Putting any rsmd.XXXX commands after the "while" loop at // the bottom throws a nasty exception. A bug on the SQLite side I // think. columnNames = new String[rsmd.getColumnCount()]; for (int i = 1; i <= rsmd.getColumnCount(); i++) { columnNames[i - 1] = rsmd.getColumnName(i); } columnClasses = new Class[rsmd.getColumnCount()]; for (int i = 1; i <= rsmd.getColumnCount(); i++) { int columnType = rsmd.getColumnType(i); switch (columnType) { case java.sql.Types.INTEGER: case java.sql.Types.NUMERIC: columnClasses[i - 1] = Integer.class; break; case java.sql.Types.VARCHAR: case java.sql.Types.CHAR: case java.sql.Types.DATE: columnClasses[i - 1] = String.class; break; case java.sql.Types.DECIMAL: case java.sql.Types.FLOAT: columnClasses[i - 1] = Float.class; default: columnClasses[i - 1] = Object.class; break; } } while (rs.next()) { List<Object> row = new ArrayList<Object>(); for (int i = 1; i <= rsmd.getColumnCount(); i++) { row.add(rs.getString(i)); } cells.add(row); } } public int getRowCount() { return cells.size(); } public int getColumnCount() { return columnNames.length; } @Override public Class getColumnClass(int columnIndex) { if (columnClasses != null) { return columnClasses[columnIndex]; } else { return Object.class; } } public boolean isEmpty() { return cells.isEmpty(); } public Object getValueAt(int rowIndex, int columnIndex) { return cells.get(rowIndex).get(columnIndex); } @Override public String getColumnName(int columnIndex) { return columnNames[columnIndex]; } public void deleteRowDisplay(int index){ this.cells.remove(index); } public void deleteRow(String username, String query,int indexOndisplay) { try { Class.forName("com.mysql.jdbc.Driver"); Connection connection = DriverManager .getConnection("jdbc:mysql://localhost:3306/duno", "root", "3498"); Statement statement = connection.createStatement(); statement.executeUpdate(query); } catch (ClassNotFoundException | SQLException e) { System.out.println(e.getMessage()); } this.deleteRowDisplay(indexOndisplay); this.fireTableRowsDeleted(indexOndisplay, indexOndisplay); } }Now my data is displayed correctly.Problem: The only problem is that when the table is being displayed none of the rows has focus. Below is the image showing this (showing test data).I have tried to use table.setRowSelectionInterval(0, 0); to set focus/selection to the first row and it worked.However, I have a delete button which when I click will delete the row both from the database and the display. Once the row is removed from display the focus is lost again.Question How do I set the focus/selection to the first row in the display even after deleting a row?Below is the code to delete a row. this.delete .addActionListener((ActionEvent) -> { if(!this.rm.isEmpty()){ String username = this.table.getValueAt( this.table.getSelectedRow(), 2).toString(); String query="DELETE FROM users WHERE username='" + username + "'"; int index=this.table.convertRowIndexToModel(this.table.getSelectedRow()); int selection = JOptionPane.showConfirmDialog(null, "Do you want to remove :\t " + username + "\t in the System?", "Warning", JOptionPane.OK_CANCEL_OPTION); if (selection == JOptionPane.OK_OPTION) { rm.deleteRow(username,query,index); JOptionPane.showMessageDialog(parent, "Record Deleted!"); this.table.requestDefaultFocus();//I have tried this but nothing happens this.table.changeSelection(0, 0, false, false); } else { // do nothing }}else{ JOptionPane.showMessageDialog(parent, "No Record To Deleted!"); } });java swing jtable resultset shareimprove this question | asked Apr 10 '15 at 11:26Giovanrich19215 | | | 1 | | | You need to write an implementation of the ListSelectionListener, which makes the first row selected, when selection is empty. Use table.getSelectionModel().addListSelectionListener() to attach your listener to your table. – Sergiy Medvynskyy Apr 10 '15 at 11:35 | | | | @SergiyMedvynskyy Well I have tried this ` public void valueChanged(ListSelectionEvent e) { ListSelectionModel lsm = (ListSelectionModel)e.getSource(); if(lsm.isSelectionEmpty()){ lsm.setSelectionInterval(0,0); } }` but only the first row is selected at first when displaying the table. Once the delete a row focus is lost again. You may provide a sample code to assist me. – Giovanrich Apr 10 '15 at 12:18 | 1 | | | For better help sooner, post an MCVE (Minimal Complete Verifiable Example) or SSCCE (Short, Self Contained, Correct Example). And don't put code snippets in comments where they are unreadable.. – Andrew Thompson Apr 10 '15 at 12:22 | | | | @Giovanrich Just type in Google "ListSelectionListener tutorial". – Guillaume Polet Apr 10 '15 at 12:34 | | | | Well I got it through following Luna's answer here. At first I made a mistake of using it on another table instead of the one that I wanted - hence the comment above. – Giovanrich Apr 10 '15 at 12:53 | show 1 more comment |
Know someone who can answer? Share a link to this question via email, Google+, Twitter, orFacebook.
-------------------------------------------------
Top of Form
Your Answer * * * * * * * * * * * * * * *

Sign up or log in
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest NameEmail |

By posting your answer, you agree to the privacy policy and terms of service.
Bottom of Form
Browse other questions tagged java swing jtable resultset or ask your own question. asked | 1 year ago | viewed | 84 times |
Linked

6 How to set Focus to the first row in a JTable which is inside a JScrollPane
Related

1
Swing JTable how to update it? and fill it?

0
Modifying Records into Database Through Jtable

-1
How to Add ResultSet Data To JTable with out changing Default Colomn names of jTable

-1
ResultSet returns only last row into JTable

0
Jtable and MySql

0
Resultset to Jtable in Netbeans

1
JTable not being populated from resultset with DButils

0
How to disable cell editing of a Jtable displayed from a result set

0
JTable simple code when a row is selected?

0
Inserting a row into a ResultTableModel as well as Database
Hot Network Questions * How to properly dispose of sensitive documents without a shredding machine? * A (440 Hz) and A (880 Hz) are completely different sounds to me. Does this mean I'm tone deaf? * Why does my Xbox One controller not work on Dark Souls 3 PC? * Find the program that prints this integer sequence (Cops' thread) * Debt collector has wrong person and is contacting my employer * Making len() work with instance methods * Did Voldemort ever find out how Regulus Black died? * How to cut an object along a curve? * Is it okay to grow root vegetables in soil enriched by manure? * Long road trips in Iceland - where to relieve ourselves? * When requesting a donation, is it better to have a prefilled button or enter their own value? * Can I activate a DLC on Steam without owning the base game? * BAT file opens Default Browser instead of Firefox * What is the true circuit behind an opamp? * Can I block viruses from a device by scanning it before opening its folder? * I am a victim of the Petya ransomware. Is there a solution to decrypt my disk? * How to draw all paths from (1,1) to (n,n) by move (+1, 0) or (0, +1)? * Concatenating Primes * Why does everyone use Git in a centralized manner? * How can I tell if my website visitors are using LastPass or other password managers? * What do math majors (actually) do after graduation? * How is the complexity of recursive algorithms calculated and do they admit better complexity than non-recursive algorithms? * Who are humans' closest relatives, after primates? * What are the drawbacks of making a multi-threaded Node.js runtime implementation? question feed about us tour help blog chat data legal privacy policy work here advertising info mobile contact us feedback TECHNOLOGY | LIFE / ARTS | CULTURE / RECREATION | SCIENCE | OTHER | 1. Stack Overflow 2. Server Fault 3. Super User 4. Web Applications 5. Ask Ubuntu 6. Webmasters 7. Game Development 8. TeX - LaTeX | 1. Programmers 2. Unix & Linux 3. Ask Different (Apple) 4. WordPress Development 5. Geographic Information Systems 6. Electrical Engineering 7. Android Enthusiasts 8. Information Security | 1. Database Administrators 2. Drupal Answers 3. SharePoint 4. User Experience 5. Mathematica 6. Salesforce 7. ExpressionEngine® Answers 8. more (13) | 1. Photography 2. Science Fiction & Fantasy 3. Graphic Design 4. Movies & TV 5. Seasoned Advice (cooking) 6. Home Improvement 7. Personal Finance & Money 8. Academia 9. more (9) | 1. English Language & Usage 2. Skeptics 3. Mi Yodeya (Judaism) 4. Travel 5. Christianity 6. Arqade (gaming) 7. Bicycles 8. Role-playing Games 9. more (21) | 1. Mathematics 2. Cross Validated (stats) 3. Theoretical Computer Science 4. Physics 5. MathOverflow 6. Chemistry 7. Biology 8. more (5) | 1. Stack Apps 2. Meta Stack Exchange 3. Area 51 4. Stack Overflow Careers | site design / logo © 2016 Stack Exchange Inc; user contributions licensed under cc by-sa 3.0 with attribution required rev 2016.4.12.3451

Similar Documents

Free Essay

Information Techonogy Acts

...Information Technology Acts As Information Technology advances on a daily basis major ethical issues arise along with it. Information technology improves ways of communication in both business settings, and personal life settings. Information technology advances are resulting to major ethical issues which include: easy access to sensitive information, and privacy (Vandenbosch, 2004). The Telephone Consumer Protection Act of 1991 and the Do Not Call Implementation Act of 2003 are acts that were created as direct results of information technology advancements. I believe the advancement of communicational devices has created new ethical issues for the society which necessitated the creation of both the Telephone Consumer Protection Act of 1991, and the Do Not Call Implementation Act of 2003. Both acts prohibit blocked unsolicited advertising via communicational devices. Getting a phone call at odd hours from a telemarketer can be very annoying; this is one of the ethical issues that came up. It is unethical to call someone to try and sell something they are not interested in, and to make matters worse you get the phone call around 6.00 AM in the morning or at 10.00 PM. Despite wanting to advertise or sell to consumers; this is not ethical. Consumers are protected from receiving unwanted phone calls from telemarketers. The Telephone Consumer Act was implemented to stop the telemarketers and to regulate the selling of personal information, and to restrict calling residential...

Words: 407 - Pages: 2

Free Essay

Information Flow Within an Organization

...Information Flow in an Organization , information is created for meaning, decision making and sharing of knowledge. Just like a river flowing information flows from one place to another, into every house, school or organization. The flow begins with the creation of the data at a terminal; this is the beginning of the information flow. From there the information flows down the pipeline through the network which is like a pipeline. Within this network of pipes you have the switching and routing of the information flow, like the valves used to push water from one location to another. From there the information flows to storage facilities like large storage facilities, these facilities in a data network are the servers, mainframes are used in conjunction with software to store, collate, and share the data just waiting to be accessed and shared. Once a person turns on the faucet or access the information the flow starts again, from the storage facility to another set of switches/routers or valves. This information is accessed like getting a drink of water. Information flow within an organization is an ever evolving process; it is circular in nature according to its activities. Chesapeake Energy’s information flow starts with the design of the information network or pipeline, network circuits include cell modems, T1 and fiber circuits. From here the routers and switches are put in place to send the information to the right storage facility or server. Software is created to determine...

Words: 729 - Pages: 3

Premium Essay

Communication Self Assessment

...Home Page »Business and Management Communications Self-Assessment In: Business and Management Communications Self-Assessment Communication style can be summed up as, the way one is perceived by others vs. how one perceives themselves and the way one interacts with others. The text “Interpersonal skills in Organizations” talks about how behaviour, personality and attitude are key factors in determining communication style. Before reading chapter 1 of the above text, I would have said that my communication skills could be heavily worked on. I am generally very shy and nervous when it comes to talking to people I don’t know and am worried about what others will think about my own thoughts and ideas. Although I am very open to others ideas and am able to see how one idea would work the same as another would, I tend to be afraid of how one might take my own interpretation. After reading the text and doing exercise 1-A and 1-B I realised that my self- evaluation of myself was not far off at all. Scoring moderately in “emotional stability” and “extroversion” shows that, although I am rather shy I am also able to work with others, even if I prefer to do solo work and am well rounded when it comes to my opinions and the options of others. My high ratings in “open to experience” and “agreeableness,” back up my theory that I am much more reserved, although I like to learn new things and look at situations from many perspectives. Having a more low or “flexible” score in “conscientiousness”...

Words: 376 - Pages: 2

Premium Essay

Check Point Information System Business Problem Dimensions

...are lack of training, difficulties of evaluating performance, compliance, work environment, lack of overall company support, indecisive and poor management. In order to have a successful business, I believe that finding solutions to these problems will improve the practice is important. What I have seen in the company I work for now is not everyone is vested in the tasks at hand so the attitudes of some people are poor. If the company can get involvement and interest in the Information System by all members of the company that will eliminate some of the problems and possible create ideas on how to financial fund a good system. 2. What is the difference between IT and information systems? Describe some functions of the information system. Information Technology or IT is the actually hardware and the software that is used for the information system that is utilized by a company. This includes everything from the computer to MS Office applications that will increase the productivity of staff. Information systems can be described as a link that brings people, business data, and computers together. Some of the functions that are noted in the text are the...

Words: 387 - Pages: 2

Free Essay

Communication Plan

...Monthly Status Meeting | -Will be face-to-face or conference call-Report the status to upper management-Well occur monthly | Monthly Reports Meeting | -Channel will be thru email, fax, or memos-Will go over reports such as; cost, issues, and progress | 2. Identify the potential barriers to effective communication and strategies for overcoming the barriers. Potential Communication Barriers | Strategies to Overcoming Barriers | Information Overload | -Listed above are a lot of meetings and employees will get overwhelmed with information that is important? - A solution for this is to have an employee take notes for each department and send them in an email for referencing. | Communication Apprehension | -Some employees may not be comfortable in a face-to-face or with written information. -A solution for this barrier would be to have a mixture of face-to-face, conference calls, and emails. This will allow for everyone to communicate their thoughts and ideas. | Filtering Information | -There will be employees that will filter information to fit the needs of the organization or team.-This will be minimized by reviewing data monthly and holding everyone accountable for their work.-Also keeping...

Words: 389 - Pages: 2

Premium Essay

Chip Positioning

...A Potato Chip Brand Positioning Exercise Frito-Lay, a division of PepsiCo, based in Dallas, Texas, plans to reposition its brand. You, as the marketing director, are responsible for such endeavour. Please present your plan. To facilitate your analysis, the results of the attitudinal survey based on an assumed representative sample of 30 kids has been stored in sheet Chip Preference.xls. These data consists of observations on the following four variables: Crunchy: Crunchiness perception (1-5 scale: 1=Low and 5=High) Salty: Saltiness perception (1-5 scale: 1=Low and 5=High Fun: Fun of eating perception (1-5 scale: 1=Low and 5=High Brand: Index of company brand (1=Brand 1, 2=Brand 2) Pref: Overall preference (1-5 scale: 1=Low and 5=High) a) First use the data to establish the relative importance and significance of each perceptual variable in explaining overall brand preference. Which two variables are the most important? (Explain). b) Develop a perceptual map by plotting the mean perceptions for both Brand 1 and Brand 2 on a two-dimensional map defined by the two independent variables found most important in your analysis in a) above). c) It is known that the Ideal point has average coordinates of 3 and 5 on the dimensions of Crunchiness and Fun of Eating respectively. Based on the ideal point perceptual values, which brand (Brand 1 or Brand 2) is closest to consumer Ideal perceptions? d) Based on your analysis, suggest how you would...

Words: 277 - Pages: 2

Premium Essay

Ups Information System

...Case summary: UPS has created its own information system with Delivery Information Acquisition Device (DIAD) and Web-based Post-Sales Order Management System (OMS) globally by using developed information technology. These special systems help the company to reduce the cost of transaction greatly. By building its efficient order information management system, UPS can make optimal routing strategy, place orders online, and track shipments to meet customer needs. These information systems guarantee the possibility of two-day delivery nationwide as well as lower warehousing and inventory costs for the company. Questions: 1. What are the inputs, processing and outputs of UPS’s package tracking system? Inputs: the inputs include package information, customer signatures, pickups, delivery and timecard information, and locations on each route. Processing: in the process of transactions, the data is transmitted to the information center and stored for retrieval. During the whole process, the data of shipped packages is available to be checked by drivers and tracked by customers. Outputs: mostly the same data as the inputs, including pickups, delivery times, locations of routes and package recipients. In addition, the outputs also include calculations of shipping rates to enable UPS customers to embed UPS functions, such as cost calculations, to their own websites. 2. What technologies are used by UPS? How are these technologies related to UPS’s business strategy? Technologies include...

Words: 494 - Pages: 2

Free Essay

3rai

...Protection Act controls how your personal information is used by organisations, business or the government. Everyone who is responsible for using data has to follow strict rules called ‘data protection principals’. They must make sure the information is: * used fairly and lawfully * used for limited, specifically stated purposes * used in a way that is adequate, relevant and not excessive * accurate * kept for no longer than is absolutely necessary * handled according to people’s data protection rights * kept safe and secure * not transferred outside the UK without adequate protection There is stronger legal protection for more sensitive information, such as: * ethnic background * political opinions * religious beliefs * health * sexual health * criminal records Source: https://www.gov.uk/data-protection/the-data-protection-act Freedom of Information Act 2000 The Freedom of Information Act gives you a wide-ranging right to see all kinds of information held by the government and public authorities. You can use the Act to find out about a problem affecting your local community and to check whether an authority is doing enough to deal with it; to see how effective a policy has been; to find out about the authorities spending; to check whether an authority is doing what it says and to learn more about reasonable decisions. Authorities will only be able to withhold information if an exemption in the Act allows them...

Words: 572 - Pages: 3

Premium Essay

Perception

...Perception The literal meaning of perception is ‘Perception is the organization, identification, and interpretation of sensory information in order to fabricate a mental representation’. The best personal encounter I had was between my newly appointed Manager & Team Lead. We used to take daily calls with our client for gathering the requirement for a new banking project. Their followed a systematic way of approach towards gathering, analyzing, and constantly discussing on the issues at hand and finally documenting and getting a written sign off on the requirement. This process was to be completed in a span of 3 months. Around the third month, the client started pushing and rushing with more requirements and there was less time to already accommodate the existing assignments at hand and on top more was coming in. As the manager was new to the project and he also wanted to establish himself, he compromised employees excessive workload by accepting and saying ‘Yes’ to whatever the client was demanding. He missed the fact that he can’t infer or perceive even without knowing what the employees had difficulties about. And secondly all this were falling into a process where the Quality of output was being compromised. The process was falling apart, then my Team Lead stepped in and had a discussion about this with the manger and made him realize that saying ‘yes’ to all what client is saying would further aggravate the issue. Accepting the requirement now and unable to cater...

Words: 366 - Pages: 2

Free Essay

Business

...and demerits. The investigator has to choose a particular method to collect the information. The choice to a large extent depends on the preliminaries to data collection some of the commonly used methods are discussed below. 1. Direct Personal observation: This is a very general method of collecting primary data. Here the investigator directly contacts the informants, solicits their cooperation and enumerates the data. The information are collected by direct personal interviews. The novelty of this method is its simplicity. It is neither difficult for the enumerator nor the informants. Because both are present at the spot of data collection. This method provides most accurate information as the investigator collects them personally. But as the investigator alone is involved in the process, his personal bias may influence the accuracy of the data. So it is necessary that the investigator should be honest, unbiased and experienced. In such cases the data collected may be fairly accurate. However, the method is quite costly and time-consuming. So the method should be used when the scope of enquiry is small. 2. Indirect Oral Interviews : This is an indirect method of collecting primary data. Here information are not collected directly from the source but by interviewing persons closely related with the problem. This method is applied to apprehend culprits in case of theft, murder etc. The informations relating to one's personal life...

Words: 1115 - Pages: 5

Premium Essay

Transforming Data Into Information

...into Information What is Data? What is information? Data is facts; numbers; statistics; readings from a device or machine. It depends on what the context is. Data is what is used to make up information. Information could be considered to be the same characteristics I just described as data. In the context of transforming data into information, you could assume data is needed to produce information. So information there for is the meaningful translation of a set of or clusters of data that’s produces an output of meaningful information. So data is a bunch of meaningless pieces of information that needs to be composed; analyzed; formed; and so forth to form a meaningful piece of information. Transforming Data Let’s pick a context such as computer programming. You need pieces of data to be structured and formed into something that will result in an output of something; a message, a graph, or a process, in which a machine can perform some sort of action. Well now we could say that information is used to make a product, make a computer produce something, or present statistical information. That would be the output of that data. The data would be numbers, words, or symbols. The information would be a message, a graph, or a process, in which a machine can perform some sort of action. Information Information could be looked at as data as well. Let’s say we need a chart showing the cost of a business expenses in relation to employee salaries. The data for showing the information is...

Words: 315 - Pages: 2

Premium Essay

Petrie's Electronic Week 3

...Petrie's Electronics Case, Chapter 5, Questions 1, 3, and 5. 1. What do you think are the sources of the information Jim and his team collected? How do you think they collected all of that information? Jim collected informations by having interviews inside the company with stakeholders. He also worked with the marketing department to get some information from loyal customers. Jim and his team gathered some information about the current system. 3. If you were looking for alternative approaches for Petrie’s customer loyalty program, where would you look for information? Where would you start? How would you know when you were done? An alternative approach could be researching many different sources. If it were me I would do my research through the internet and compare what I find to the current system used by the customers. I guess the obvious reason to know when you are done is because you can’t find or come up with any new information about the loyalty systems. 5. Why shouldn’t Petrie’s staff build their own unique system in-house? I think it would cost much more and will be much more time consuming. The better thing to do is use an outsource instead of building in-house, that way they are saving money and getting what they want a lot faster. Petrie's Electronics Case, Chapter 6, Questions 1 and 5 1. Are the DFDs in PE Figures 6-1 and 6-2 balanced? Show that they are, or are not. If they are not balanced, how can they be fixed? It looks like they are balanced...

Words: 338 - Pages: 2

Premium Essay

Storing Information

...updating the old data storage system with the new storage procedures that should be put in place in the laboratories of the new build. You need to justify why the funds from the budget should be given to implement the new data storage system. Grading Criteria * P4:Describe the procedure for storing scientific information in a laboratory information management system * M4:Explain the processes involved in storing information in a scientific workplace * D3: Discuss the advantages gained by keeping data and records on a laboratory management information system * Grading Criteria * P4:Describe the procedure for storing scientific information in a laboratory information management system * M4:Explain the processes involved in storing information in a scientific workplace * D3: Discuss the advantages gained by keeping data and records on a laboratory management information system * How Do I Do It? 1. For P4, learners must describe the procedures for storing scientific information in a laboratory information management system (LIMS). A prepared list of scientific data is provided below. Learners must decide which sets of information could be stored on a workplace record system. 2. For M4, learners must explain how scientific data and records are stored....

Words: 1219 - Pages: 5

Premium Essay

Meredith Knows Women - Case Study

...Chapter 4 Case Study Meredith: Thanks to Good Marketing Information, Meredith Knows Women 1. Meredith’s marketing information system really focuses on women. Their target market is women and it is obvious in the way they cater towards women. Some of their strengths include they cater to a woman’s progression throughout life, they have studied their customers so greatly that they have over 700 data points on each one, and they have even segmented each individuals interests in order to better serve them. Not only that, but they have so much data on their customers that they can now sell their information to other businesses. As print is a declining business, Meredith has also ventured into the online and television world and is making their presence known. They are not simply looking at the present but are also setting themselves up for the future. A weakness of Meredith is that preferences can change over time. They need to keep up with the changing interests of their customers and make sure their data points are not just a storage bin full of outdated information. Another weakness is that it is only providing to women through magazines and television shows. With all of the information they have gathered, they should be able to reach out to women in other forms such as clothing, exercise equipment, gardening tools, or even cookware. The information that they have accumulated could be used for another business venture. 2.Through impersonal...

Words: 330 - Pages: 2

Free Essay

Data

...Data & Information Define Data: Data is just raw facts and figures it does not have any meaning until it is processed into information turning it into something useful. DATA Information 01237444444 Telephone Number 1739 Pin Number A,C,D,B,A* Grades Achieved At GCSE Define Information: Information is data that has been processed in a way that is meaningful to a person who receives it. There is an equation for Information which is: INFORMATION= DATA + CONTEXT + MEANING DATA 14101066 Has no meaning or context. CONTEXT A British Date (D/M/YEAR) We now know it says 14th of October 1066. Unfortunately we don’t know it’s meaning so it’s still not information yet. MEANING The Battle Of Hastings We now know everything so it can now be defined as information. How Is Data Protected? You’re data is protected by a law called the Data Protection Act this controls how your personal information is used by organisations, businesses or the government. This means legally everyone responsible for using data has to follow strict rules called ‘data protection principles’ there are eight principles. How Your Data Is Protected Use strong an multiple passwords. Too many of us use simple passwords that are easy for hackers to guess. When we have complicated passwords, a simple “brute force attack”—an attack by a hacker using an automated tool that uses a combination of dictionary words and numbers to crack passwords using strong passwords doesn’t mean this can’t happen it just means...

Words: 904 - Pages: 4