Class notes
Class notes
She has entered data from a source document into the database. There was an error in record 3
and an error in record 4 in the source document. The secretary also made an error when
copying record 1.
Using this data, explain, in detail, the need for verification and validation when entering data
into a database.
2. Maria wants to use information about the families in her town for a study. She will get the
information from an indirect data source, the town’s electoral register. This is kept at the local
council office. She has decided not to use a questionnaire, which is a direct data source, to
gather the information she needs.
Describe the suitability of using the electoral register rather than a questionnaire.
3. When data is sent across the internet, it is usually encrypted.
Discuss the benefits and drawbacks of encrypting data which is transmitted over the internet
4. Using a numerical example, explain the differences between data and information.[4]
5. A bank stores a database of all its customers. The first field in the database is the account
number. The account numbers are different for each customer and consist of 10 digits, for
example 7382690643.
New accounts are opened in branches of the bank on a regular daily basis.
(a) Describe three errors that a person entering the account numbers of new customers might
make. For each one describe an appropriate validation check that would trap the error. A
range check or limit check would not be suitable. Each validation check must be different.[6]
When customers open new accounts, the details are gathered together in a transaction file. At
the end of the day a branch transmits the transaction file to head office, using the internet.
(b) The transmission of the transaction file is verified using a hash total.
Describe this process, explaining why a hash total is used rather than a control total.
6. The manager of the payroll department within a company has commissioned a computer
programmer to write software to run the payroll.
Justify this decision to use custom written software.[8]
7. Two methods of checking the accuracy of data are validation and verification.
Describe the differences between validation and verification.[3]
8. A company receives orders which are entered into a computer system. The company has
decided to use online processing to process these orders so employees enter orders as they are
received. Discuss the advantages and disadvantages of using online processing compared to
using batch processing in this scenario.
9. There are different types of processing including batch processing and real-time processing
a) Without referring to master files and transaction files, describe what is meant by batch
processing.[3]
b) Rocket guidance systems are used in space exploration. Explain why a rocket guidance system is
an example of the use of real-time processing.[3]
10. Most companies use transaction files to update master files in their payroll systems. One part of
the updating process is to calculate weekly or monthly pay. Another part is to update workers’
personal and work details.
Without referring to the calculation of pay, describe the three types of transaction that would
take place when workers’ details are being updated. You must give an example for each type of
transaction.
11.
14. Before companies make planning decisions, they need to collect a lot of data. The decisions they
make will depend on the quality of the resulting information. Apart from its age and its level of
detail, describe the other factors which affect the quality of information.[6]
15. A microprocessor controlled air conditioning system uses real-time processing. Explain what is
meant by real-time processing in this scenario.[5]
16. Back-up software and anti-virus software are both types of utilities that are often provided with
operating systems.
(a) Without detailing the different methods of detection, describe the features of anti-virus
software.
(b) Without referring to the different types of back-up, describe the features of back-up
software[3]
17. The processing of customer orders is an example of batch processing. Describe, using customer
orders as an example, what is meant by batch processing.[4]
18. Flight simulators are used to train pilots to fly modern jet aircraft. Describe a typical flight
simulator.[4]
19. When personal data is sent across the internet, it is often encrypted. Analyse the encryption of
personal data when it is sent across the internet.[8]
20. Ruritania has just passed a law which will allow supermarkets to purchase customer information
from banks, providing they anonymise it. Joanne, the owner of a supermarket, wishes to analyse
the spending habits of people in the area very near to the supermarket. She can either use
direct data sources or obtain the information indirectly from local banks.
Discuss the advantages and disadvantages to Joanne of obtaining the information indirectly
from local banks
21. A gesture based interface is a type of user interface. Describe the advantages of using a gesture
based interface rather than other types of interface
22. Some students have been asked by their teacher to carry out a study. They will collect data
about the families living in five streets close to their school. They will carry out the study using
direct data sources and will not use records from the 2020 census which are kept at the city hall.
Describe the suitability of using direct data sources rather than the census data for the study. [5]
23. Julia is setting up a hairdressing business. She has recruited several staff. She is creating a
database of all her staff and has written down all their details ready for entering into a
computer. She will need to verify the data when it is entered.
She has been told that she cannot use a parity check but should use visual verification and
double data entry.
(a) By describing what is meant by a parity check, explain why it might not be suitable in this
scenario.
(b) Compare the similarities and differences between the visual checking and double data entry
methods of verification.[4]
24. Many companies use computers to process their payroll
A transaction file is produced once a week. It consists of the WorkerID and HoursWorked fields. The
master file contains the WorkerID, RateOfPay and WagesSoFar fields as well as other details. The
WagesSoFar field represents how much each worker has earned so far this year.
Each worker’s wage is calculated by multiplying the HoursWorked by the RateOfPay. When the wage
for that week is calculated, it is added on to the WagesSoFar field.
Every week the master file has to be updated to include the new wage earned so far this year.
(a) Complete the following pseudocode algorithm which shows the process of updating the master
file. You can assume no other transactions are being carried out.
(b) Updating a master file in a payroll system is an example of batch processing. Discuss the
advantages and disadvantages of using batch processing, compared to other types of
processing, for a payroll system.[8]
25. Paulo is carrying out a study on the level of noise caused by traffic in the streets around his
home. He will need data for his study.
(a) Describe what is meant by direct data.[1]
Data that is collected for a specific purpose or task/ for that purpose only/gives us data that is
often called ‘original source data
(b) Describe how Paulo could use direct data sources for his study.[4]
Four from: Questionnaires could be distributed amongst neighbours/local people asking about
the level of noise Interviews could be carried out with neighbours/local people (asking about the
level of noise) He could observe traffic, keeping a count of traffic coming down each street He
could use sensors to detect the flow of traffic going down each street He could use sensors to
measure the level of noise in each street.
(a) Explain, by defining the term ‘data’, why this is just a collection of data and is not
information.
(b) Select three of these items of data. Explain what information each item might represent
and how it could be used.
27. A school secretary is updating a database by copying data from some hard copy records. Here
are three of the records:
The Student_number will be stored as text, with the first two characters representing the year group
the student belongs to.
The Student_number and Date_of_birth are the only data that need to be validated as they are
entered. A range check, limit check or presence check would not be appropriate for validating these
data.
(a) Describe, in precise detail, three appropriate validation checks that could be used to validate the
data. Each validation check must be different.[6]
(b) As well as validation, verification will need to be carried out. Explain why verification is needed
in addition to validation. Use examples from your answers to part (a).[6]
28.
(b) Tick the most accurate statement regarding the relationship between data and information.[1]
Phoebe will use sensors as direct data sources to collect the data. She will place sensors in the river and
collect the readings from a computer.
(c) Describe the benefits of gathering data from direct data sources in this scenario.[4]
(d) Describe the drawbacks of gathering data from direct data sources in this scenario.[4]