0% found this document useful (0 votes)
37 views44 pages

CSEC IT PPT Notes-Information Processing - 012250

for school work only nothing else

Uploaded by

Danier Holness
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views44 pages

CSEC IT PPT Notes-Information Processing - 012250

for school work only nothing else

Uploaded by

Danier Holness
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 44

Presenter: R. L.

Whyte

Information Processing
Information Processing
Information and Data

• Data is raw, unprocessed facts. This may be facts


about persons, places, things or events that have
been collected through observation or measurement.
• Information is meaningful knowledge derived from
raw data. Data that has been processed, organised or
put into context so that it is meaningful to the user
may be regarded as information.
Sources of data

• ‘Sources of data’ has two different, but related,


meanings in Information Technology and we need to
be clear about the difference. The first meaning of
‘the source of data’ is: the thing that has been
measured.
• The second meaning of ‘the source of data’ is: the
person or organisation that provided the data from
observation.
Types of document

• A source document is a document that contains data


for input into an information processing system.
Document types used to collect, store and share data

• A document is printed or written, is usually paper-


based, and is used to collect, store and share data.
• Documents may be generated by hand or by a
machine such as a computer printer. Some
documents may be read and processed by humans
whereas others are read and processed by machines.
• A human-readable document is a document that may
be read by a human but may not be in a form that a
computer can automatically accept as input. An
example is a handwritten list of vehicle parts.
• A machine-readable document is a document that
can be read directly and understood by computer
systems. Examples are documents that include
barcodes and QR (scan) codes.
• QR codes are like barcodes but are made up of small
black and white squares instead of lines.
• Some documents can be both human-readable and
machine-readable, for example a product label that
contains text about the item and a barcode to
identify the item.
• A turnaround document is a printed document that has been
output from a computer system and that contains machine-
readable objects that will allow the same document to
subsequently provide input to a computer system.
• A turnaround document helps an organisation to increase
efficiency by reducing the time it takes for data entry and
helping to minimise and eliminate data entry errors.
• Remember that hard copy is permanent printed output from
the computer.
Evaluating the reliability of Information obtained from online
sources

• The quality of data and information available from


online sources will vary from one source to another.
This is because the different authors will have
differing motives for publishing the data and
information.
• Additionally, each author may have taken differing
levels of care to ensure that the information being
presented is accurate and unbiased.
• While there are different ways to judge the overall
quality of information, one generally accepted
measure is its reliability.
• Reliability is the degree or extent to which the
content of the information can be depended on to be
accurate. Reliability has four characteristics:
• Persons who retrieve data and information from any source, but
particularly online sources, should carefully evaluate the information
to determine whether it is reliable.
• You should use only highly reliable information. Here are four
questions you need to ask yourself:
1. Is the same data or information available from multiple independent
sources?
2. Is the information presented in an impartial manner?
3. Is the information up to date?
4. Is the information appropriate for the intended purpose?
Differentiate between verification and validation

• Verification is a process during which data that has


already been input or captured is checked to ensure
that it matches the data on the source document.
• Good verification significantly reduces the number of
typographical and transposition errors that occur
during data entry.
• A typographical error is a typing error that affects the
text, such as missing or additional characters.
Examples are: Guyyana and Britsh Virgins Islanbs.
• A transposition error is one caused by switching the
position of two adjacent characters in a number or
text string. Examples are typing $5,450 instead of
$5,540 or Gyuana instead of Guyana.
Methods of verification: double entry and proofreading

• Double entry is a data verification method that


requires that the data is entered twice; this should be
done by two different data entry clerks and both
entries are checked against each other to ensure that
they are identical.
• If the two copies are the same we can be sure the
data has been input without any errors.
• Some online forms utilise double entry to verify data items
such as passwords and email addresses, although this is not
as reliable as when two independent persons enter data.
• Proofreading is a manual method of verification during
which a data entry clerk visually checks the source
document against data that has already been input by
another data entry clerk.
• Proofreading is less reliable than double entry verification
but it is significantly quicker.
• Validation is a checking process in a program which is
aimed at finding out if the data is genuine.
• Validation ensures that data entered into a database
form, web form or computer program conforms to a
set of validation rules and may include a presence
check to check whether the data is present, or a
range check, for example to ensure that the data is
between 1 and 100.
Validation checks include:
• range check
• reasonableness check
• data type check
• consistency check
• presence check
• format check
• length check.
Methods of validation

• We have seen that validation is a process that


ensures that data entered into a computer system
conforms to a set of validation rules.
Validation checks include:
• range check: is the data value within the expected
range? (Example: number of passenger seats in a
vehicle must be in the range 4–68.)
• reasonableness check: is the data reasonable within the
context? (Example: it is unreasonable for an employee
without a driving licence to be allocated the role of driver.)
• data type check: is the data of the intended data type?
(Examples: ‘colour’ must be text; ‘length’ must be a
number.)
• consistency check: does the data relate correctly to other
data? (Example: if type is minibus then number of seats
must be less than 20.)
• presence check: is data present? (Example: all fields
that are marked ‘required’ must have data entered.)
• format check: does the data conform to the format
required? (Example: date must be in the format
dd/mm/yyyy.)
• length check: is the data of the correct length?
(Example: year of birth must be four digits, e.g. 2004.)
Validation methods
• The main difference between verification and
validation is that verification checks the data being
input to the system while validation authenticates the
data once it is in the system.
• Verification is carried out by humans; validation is
carried out by the computer.
File Organisation

• A file is a container in a computer system for storing


data, information or programs.
• Files usually exist permanently on a secondary
storage media. Disk drives (HDD and SSD), USB pen
drives and DVDs are all types of secondary storage
media.
File access methods
• The term ‘file access methods’ can have two meanings in
Information Technology:
1. How data is stored in the file.
2. How files are stored on the storage media. We need to be clear
about the similarities and differences.
The important words are:
• serial
• sequential
• random and direct.
• Serial access’ means to start at the beginning and
read to the end in one go. Serial access – reading in
the order in which the words were written.
• Sequential access’ requires the words to be ordered
in some way.
• Random and direct are the final methods of access.
Random and direct access allows us to jump straight
to the required data.
How data is stored in the file

• Serial file access is where the data is stored in the file


in the order in which the data was written to the file.
• sequential file access, data is stored in an ordered
way or in sequence.
• random access and direct access don’t usually refer
to how data is stored in a file.
How files are stored on storage media

Serial file access to files stored on a storage medium


• Files are stored on a storage medium in a serial way
when they are stored in the order in which they were
written.
• Backup is the copying of files to a separate,
removable storage device so that they can be
restored to the original location if the original data is
ever lost or destroyed.
• A system backup is a copy of all the files on a
computer system that can be used to restore the
whole computer after a case of hardware failure or
data loss.
• Archiving is storing files that are accessed only
infrequently, and modified even less frequently, on
another storage device.
Sequential file access to files stored on a storage medium
• Files are stored on storage media in a sequential way
when they are stored in some sort of sequence.
• Magnetic tapes can store files sequentially.
Random file access to files stored on a storage medium
• Random access and direct access are often used
interchangeably.
– Random access: the organisation of data in main
memory (random access memory or RAM).
– Direct access: the organisation of files on a disk
drive.
• In random access, data can be quickly accessed
wherever it occurs in main memory.
Direct file access to files stored on a storage medium
• Direct access storage media is secondary storage
where each file has a specific location or unique
address in the storage, allowing it to be accessed
quickly.
Choosing an appropriate file access method

• A real-time system is a computer system where


response time is critical.
• Example: computer systems controlling self-driving
cars have to be real-time systems.

You might also like