Our site uses cookies. Some of the cookies we use are essential for parts of the site to operate and have already been set. You may delete and block all cookies from this site, but parts of the site will not work. To find out more about cookies on this website, see our Cookie Policy
Accept
© eRevision.uk and ZigZag Education 2025
This test is run by .
Note that your final mark will not be saved in the system.

Data analysis and information system structure GapFill

Target Level
Pass
Running Total
0
0%
Attempt
1 of 3

You must fill all the gaps before clicking ‘Check Answers!’

 An openA closedA dependentAn independent information system is where all of the information can be accessed between the different departments within a company, and also with  abstractexternalunconnectedinternal partners such as marketing organisations (and also suppliers and customers). The system has access to the  printerMacPCInternet, and information flows in and out from many different sources.

This is very  usefulpoorunhelpfullimiting because lots of new information can be added, seen by lots of people who can use the data and add their own ideas, and there is no  delayweek day availablesurveyaccess in accessing the data.

However, this can only be used for projects or situations with a  robusthighlowstrong level of commercial sensitivity – more people have access to the information, and because the system has access to the Internet, the information could be stolen by hackers. The data from  incorrectinternalclosedexternal sources may be inaccurate as there is less control over where some of the data is sourced from.

The opposite is  an operatingan opena dependenta closed information system. There is no  employeeexternalmanagerinternal access to the system, and there is unlikely to be information sharing between the internal departments. This system is used where the project is very  openinsecurecurrentsecretive or commercially sensitive – for example, developing a new product ahead of the competition. This system is very secure with much less risk of the system being  hackedopendisusedused and data stolen by the attacker, but this is a very  openinflexibleabstractflexible system with delays in data transfer.

This is your 1st attempt! You get 3 marks for each one you get right. Good luck!

Pass Mark
72%