1 Assignment 2 LO2 34c 4 5 6 7 891011 9c LO2: How to work with information and data to meet specific business needs SWS events would like you to create.

Slides:



Advertisements
Similar presentations
The Electronic Office & The Internet Chapters 22 & 26 Information Systems for You.
Advertisements

GCSE ICT Networks & Security..
Introduction to Computers Lecture By K. Ezirim. What is a Computer? An electronic device –Desktops, Notebooks, Mobile Devices, Calculators etc. Require.
                      Digital Audio 1.
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall
File Management Chapter 3
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Lesson 13 PROTECTING AND SHARING DOCUMENTS
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
COMPUTER BACKUP A disaster will happen to you one day…an accidentally deleted file, a new program that caused problems or a virus that wreaked havoc, wiping.
Back Up and Recovery Sue Kayton February 2013.
C AMBRIDGE N ATIONALS - BP2 How Information and data can be stored on portable devices.
Validation and Verification
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Data Security GCSE ICT.
Standard Grade Computing COMMERCIAL DATA PROCESSING CHAPTER 13.
Intro to R001 Understanding Computer Systems
Chapter 7 Working with Files.
OCR GCSE ICT DATA CAPTURE METHODS. LESSON OVERVIEW In this lesson you will learn about the various methods of capturing data.
Module Designing Computer-based Information Systems
Unit 1 Living in the Digital WorldChapter 1 Let’s Communicate This presentation will cover the following topic: Which kind of computer?
How FACILITY CMIS and E-Portal are used within the organisation
Designing Data Capture Forms LO2: How to work with information and data to meet specific business needs IR Photography would like you to create a document.
Security and backups GCSE ICT.
BACKUP AND ARCHIVING DATA BACKUP AND RECOVERY OF DATA.
INFO1 – Practical problem solving in the digital world
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
OCR Cambridge National ICT Mr Conti 10X 25 th April 2014.
Cloud Computing Characteristics A service provided by large internet-based specialised data centres that offers storage, processing and computer resources.
CDP Standard Grade1 Commercial Data Processing Standard Grade Computing Studies.
1. MAGNETIC HARD DRIVES 2. SOLID STATE DRIVES 3. OPTICAL DISKS 4. FLASH MEMORY 5. CLOUD STORAGE 6. CONNECTIVITY DEVICES Storage and connectivity devices.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Collecting Data Types, coding, accuracy, file formats and the effect of data loss.
Networks.
Verification & Validation. Batch processing In a batch processing system, documents such as sales orders are collected into batches of typically 50 documents.
Review of Data Capture. Input Devices What input devices are suitable for data entry? Keyboard Voice Bar Code MICR OMR Smart Cards / Magnetic Stripe cards.
OCR CAMBRIDGE NATIONALS UNIT 1 - UNDERSTANDING COMPUTER SYSTEMS DATA CAPTURE METHODS.
1 3 Computing System Fundamentals 3.6 Errors Prevention and Recovery.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
OCR CAMBRIDGE NATIONALS UNIT 1 - UNDERSTANDING COMPUTER SYSTEMS DATA CAPTURE METHODS.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
The Online World ONLINE DOCUMENTS. Online documents Online documents (such as text documents, spreadsheets, presentations, graphics and forms) are any.
ROO1REVISION LO1 How ICT can be used to meet business needs LO3 Know how ICT can be used to support business working practices LO2 Know how to work with.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
Unit 1 Understanding computer systems: How to work with information and data to meet specific business needs OCR Cambridge Nationals in ICT Level 1/2 ©
Enw / Name. What is a on-line / paper based data capture form Can you give an example where each are used? Automated data capture systems are used around.
Unit 12 – IT Technical Support – Anne Sewell Aims of the lesson: To carry out a back-up of files to a USB or desktop. This is a build-up exercise towards.
What is a Computer An electronic, digital device that stores and processes information. A machine that accepts input, processes it according to specified.
Scientific data storage: How are computers involved in the following?
Input, Output and Processing.. What data needs to be input into the system? Identify the sources – i.e. where does the data come from? What is the volume.
( ) 1 Chapter # 8 How Data is stored DATABASE.
Dial-In Number: 1 (631) Webinar ID: FHC Tech Talk Automation and Efficiency Series Talk #1 Carbonite automated backup.
Lesson 13 PROTECTING AND SHARING DOCUMENTS
Network and hardware revision
Data security OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013.
Software and file types
Effectiveness of data transfer over wired and wireless media
Lesson 13 PROTECTING AND SHARING DOCUMENTS
OCR GCSE ICT Data capture methods.
OCR GCSE ICT Data capture methods.
File Stream and Team Drives
Fun gym Cambridge Nationals R001.
Working with Information and Data
Fun gym Cambridge Nationals R001.
Security of People, Property and Information
Back Up and Recovery Sue Kayton October 2015.
Communicating in the IT Industry
Presentation transcript:

1 Assignment 2 LO2 34c c LO2: How to work with information and data to meet specific business needs SWS events would like you to create a document to discuss the features and purposes of computing devices. Designing Data Capture Forms Things to consider when designing Data Capture Forms: Include examples of the data and spaces for the answers on paper-based forms. Include the right amount of spaces to help ensure that the correct data is collected. Include the type of data to be entered to reduce errors. Data like temperature should be collected as numbers and names as text. The form on the left is not as good as the one on the right as the one on the right forces the user to separate their letters and numbers so that they are easier to read. It also provides set spaces for post codes, telephone area codes and tick boxes for male and female as there are limited answers and therefore easier to just tick.

1 Assignment 2 LO2 34c c LO2: How to work with information and data to meet specific business needs SWS events would like you to create a document to discuss the features and purposes of computing devices. Designing Data Capture Forms – Improving Online Forms Online Data Capture Forms can be improved even more in the following ways: Include drop-down menus to force the user to select from a pre-set selection of choices. Use tick boxes to simplify the input of data – especially if there are multiple answers. Use radio buttons to ensure that users can only select one answer. When online do not use separate boxes for each letter like on an offline form. Use pre-set formats – for example all dates are entered as DD/MM/YYYY. Break information into smaller data – E.g. Address is: Number, Street, Town, County and Postcode. Use validation rules to make sure that data entered is correct. Validation rules reduce errors when entering information as they check if the data entered is correctly according to a set rules, such as the right number of letters, numbers, no spaces, etc. For example, it will not allow date that are not in the format DD/MM/YYYY or telephone numbers that are not (00000) This ensures that data is entered correctly

1 Assignment 2 LO2 34c c LO2: How to work with information and data to meet specific business needs SWS events would like you to create a document to discuss the features and purposes of computing devices. What to AVOID when Designing Online Forms Things NOT to do when designing online data forms: Do not make the font too small so that it cannot be read. Do not make input boxes too small – E.g. 4 spaces for post code when 8-10 are needed. Do not ask vague questions like “what do you like best?” Not specifying the input format as an empty line for date of birth could typed in many ways. Do not use ranges that overlap as this is confusing – E.g. 0-5, 5-10,

1 Assignment 2 LO2 34c c LO2: How to work with information and data to meet specific business needs SWS events would like you to create a document to discuss the features and purposes of computing devices. Automatically Collecting Physical Data TemperatureMeasuring the temperature in a room or controlling the heat of a swimming pool can all be done through sensors. pHTo keep water clean data such as PH readings can be automatically collected in water quality control systems. LightLighting systems can collect data automatically so that lights can be managed effectively and efficiently. PressurePressure sensors are often used to find out if someone is in a specific area, such as those used in alarm systems.

1 Assignment 2 LO2 34c c LO2: How to work with information and data to meet specific business needs SWS events would like you to create a document to discuss the features and purposes of computing devices. Choice of Data Collection Methods Nature of data to be captured The nature of the information that you are going to be collecting will influence the data needed. For example Names, Addresses and Postcodes are all text and height and weight will be collected as a number data type. On top of this, sometimes online is better than offline (paper based) methods. For example, collecting information for new members joining a large retail store would be easier online, but collecting information for new gym members at a local leisure centre, would be easier through offline (paper based) methods. Location of informationIf data collection is in extreme locations then automatic could be better than paper-based. For example readings of a volcano could be done automatically. Sometimes automatic is also better just to free up employees so that they can do other work. Cost and availabilityCost also affects data collection as paper based methods are cheaper than setting up websites, etc. Therefore some companies will go paper based for this reason.

1 Assignment 2 LO2 34c c LO2: How to work with information and data to meet specific business needs SWS events would like you to create a document to discuss the features and purposes of computing devices. Choice of Data Collection Methods Ease of usePaper based is easy to use for many people, but bad handwriting could make it difficult to read. Data on the sheet could also be left incomplete and errors made when entering the information. Online forms are much easier to use in these respects as it is easy to read and data entered can limited through rules and check and tick boxes. Analogue to digital convertor When sensors record information (heat, light, pH, etc) they can change it from analogue to digital so that computers can understand the information. This is done with a analogue to digital convertor. Data securityInformation about people must be kept secure. This means that it cannot be lost, damaged, changed so that it is inaccurate or used for the wrong reasons (such as fraud). Rules covering this are in the Data Protection Act. To protect data backups should be made, passwords should be used and encryption enabled to prevent unauthorised people accessing the information.

1 Assignment 2 LO2 34c c LO2: How to work with information and data to meet specific business needs SWS events would like you to create a document to discuss the features and purposes of computing devices. Data TypeDescriptionExampleTypical Use TextAny 123Names of people, address, telephone numbers (this is text as it can have spaces!) Integer NumberWhole Numbers1234Number of items in stock or items sold Real NumberAny number with or without decimal places 10.50Prices, height, weight DateStores a date in various formats 10/08/2012For dates in various formats, e.g. 10/08/12 or 10 August 2012, etc BooleanTrue or FalseWhen there are choices between two options, Y/N, True or False Enter whether customers have paid or if they are vegetarian ImageA graphic fileA photographA customer membership photo

1 Assignment 2 LO2 34c c LO2: How to work with information and data to meet specific business needs SWS events would like you to create a document to discuss the features and purposes of computing devices. Data Verification Methods VerificationVerification is used to ensure that data entered into the system is the same as that on the form. For small amounts of data a visual check is enough, but for large amounts two people can enter the same data and the computer can check this and report any problems to the people entering the data. Other ways of doing this is by using double input – for example, entering a password, where the user is asked twice to enter the data to insure it is correct.

1 Assignment 2 LO2 34c c LO2: How to work with information and data to meet specific business needs SWS events would like you to create a document to discuss the features and purposes of computing devices. Data Validation Methods ValidationValidation checks to see if the data entered is correct as the user enters it into the system. Validation rules are used in spreadsheets and databases to check that data is entered correctly. There are various types of validation checks: 1.Presence check – This checks to see that all required data is entered and not left blank. 2.Data type check – This checks that if numbers are required, then only numbers are entered. 3.Format check – This ensures that data is entered correctly, for example: DD/MM/YYYY 4.Range check – This checks that data is in a set range, for example age > 18 and < 60 5.Character check – This checks that incorrect characters are not entered, for example there are or ! in a post code.

1 Assignment 2 LO2 34c c LO2: How to work with information and data to meet specific business needs SWS events would like you to create a document to discuss the features and purposes of computing devices. Data Security Methods Network and computer security: Usernames and Passwords Access Rights and Permissions All staff need to be given appropriate usernames and passwords so that they cannot access sensitive data. Along with this each member should also have different access rights and permissions so that employees will not have access to data unless granted clearance. Files and folders can also be protected by making them read-only so that information is not deleted.

1 Assignment 2 LO2 34c c LO2: How to work with information and data to meet specific business needs SWS events would like you to create a document to discuss the features and purposes of computing devices. Data Security Methods Document security: Passwords Sensitive documents on computers can also be password protected so that they cannot be accessed. Read-only passwords allow users with the correct password to only view and not edit the files. Open/Modify passwords allow uses to edit the files. In files like spreadsheets sheet protection can also be used to stop people editing data in the spreadsheet.

1 Assignment 2 LO2 34c c LO2: How to work with information and data to meet specific business needs SWS events would like you to create a document to discuss the features and purposes of computing devices. Data Security Methods Document security: Data Encryption Sometimes passwords for documents can be found and in these cases data encryption is necessary. Data encryption uses an encryption code/key to encrypt the document and then the receiver will use the same code/key to decrypt the file. If the wrong key is used then the data is meaningless. Businesses should always use encryption to secure details about customers and the business. On the internet encryption is also used when you enter your address, passwords, payment details, etc. This is usually shown by https and a small padlock at the top of your web browser.

1 Assignment 2 LO2 34c c LO2: How to work with information and data to meet specific business needs SWS events would like you to create a document to discuss the features and purposes of computing devices. Data Security Methods Physical security: Security Badges Locking doors, window security bars, etc. Offices uses security guards to monitor data security and prevent unauthorised access. RFID tags can also be placed into security badges and cards which allow staff to enter areas only if they have the appropriate clearance. Other security includes not having computers on the ground floor where they are easily accessed. Ensuring that windows have bars, or strengthened glass and doors are thick and strong, etc.

1 Assignment 2 LO2 34c c LO2: How to work with information and data to meet specific business needs SWS events would like you to create a document to discuss the features and purposes of computing devices. Data Transferring Technologies Wired MethodsWired methods connect computers together with cables and are therefore faster and reliable. They are also more difficult for hackers to access but are, however, more expensive and difficult to install. Wireless MethodsWireless methods use WAPs to connect wireless devices such as smartphones, laptops, tablets, etc. They allow portable data transfer but not as secure as wired connections. Mobile Data Transmission3G and 4G communication allows mobile phones to connect to the Internet. 4G has a high bandwidth is faster than 3G. Mobile transmission is expensive as tariffs are high.

1 Assignment 2 LO2 34c c LO2: How to work with information and data to meet specific business needs SWS events would like you to create a document to discuss the features and purposes of computing devices. Data Transferring Technologies Remote Methods – this is used by employees to transfer data no matter where they are. s are unsecure though and hackers can access information and files sent. File Sharing – Also know as peer-to-peer, this allows people to upload and share files with each other on the Internet. This does however allow illegal sharing of files. Cloud – This stores company files on the Internet to be accessed anywhere. The company offering the cloud storage is also responsible for the data security which is good, but you pay a lot of money for Internet space. File CompressionFile compression allows you to “shrink” (compress) the size or the file so that it can be easily transferred by or over the Internet. This also helps devices such as mobiles which have to transfer files over a low bandwidth. Compressing audio and video files can help save space and make file transfer quicker, but the more compressed they are the lower the sound and video quality.

1 Assignment 2 LO2 34c c LO2: How to work with information and data to meet specific business needs SWS events would like you to create a document to discuss the features and purposes of computing devices. Data Transferring Technologies Factors affecting the Choice of Method USB flash drives are usually affordable and quick for transferring files between computers, work and home. Unfortunately they can be easily lost so data is unsecure. CDs and DVDs are not as big as flash drives and it takes a long time to write data to them using a CD/DVD writer. s are useful for transferring small files, but not secure and therefore files should be encrypted. For wired and wireless data transfer, speed and bandwidth are important, especially when transferring large files such as videos. Wired methods are therefore usually quicker more suited to large files. 3G and 4G wireless data transfer for mobiles can stream videos, but it usually takes long to process big files.

1 Assignment 2 LO2 34c c LO2: How to work with information and data to meet specific business needs SWS events would like you to create a document to discuss the features and purposes of computing devices. Data Backup and Recovery Data Storage MediaIf you need to backup huge amounts of data then CDs/DVDs and USBs are not suitable. CDs and DVDs also have the problem that you will need many of them and therefore piles of CD/DVD backups is usually a problem. CDs/DVDs and USBs have the advantage that they can be kept away from the computer in case of fire, etc. In cases of large amounts of data companies can use tape drives or extra hard disks. Tape systems have large amounts of space but are expensive whereas hard drives are not as expensive. Cloud storage on the other hand is very useful for smaller companies that do not have much money. Cloud storage providers can also charge customers to provide security and data backup, but can be cheaper than doing it themselves.

1 Assignment 2 LO2 34c c LO2: How to work with information and data to meet specific business needs SWS events would like you to create a document to discuss the features and purposes of computing devices. Data Backup and Recovery Backup FrequencyMost businesses will backup data after every work day, usually at night when staff are not using the system. Bigger businesses will even backup more often, like banks that backup every few minutes. Backup RecoveryA lost file can usually be recovered from a backup. A disk image can restore a whole hard disk but today most backup software can also allow you to select the specific file you are missing. How up-to-date the files you recover are, will all depend on the frequency of your backups. ArchivingCollections of data that are backed up or “archived” as they are no longer needed in day-to-day operations. Once archives are made they can usually be deleted off the hard disk as they will be stored separately. Examples of archives, could be the sales and financial reports from last year, or student work from 2 years ago.

1 Assignment 2 LO2 34c c LO2: How to work with information and data to meet specific business needs SWS events would like you to create a document to discuss the features and purposes of computing devices. Data Backup and Recovery Automated versus Manual Systems Most companies will backup frequently, such as the end of each day. To speed up the process they can choose to do this automatically, for example at 1am each morning. At other times due to how difficult the backup is it might require technical knowledge and so IT specialists would need to back each system up manually. Manual backups can also be useful if backup times change regularly or if backups are rarely made (for example in a small store).

1 Assignment 2 LO2 34c c LO2: How to work with information and data to meet specific business needs SWS events would like you to create a document to discuss the features and purposes of computing devices. Factors affecting Choice of Method TypeCostEase of UseSecurity TapeExpensive device and media Tapes need to be replaced after each backup Tapes are easily damaged, e.g. fire Data is encrypted Small so easily stolen External Hard Disks Relatively cheap for large amounts of space, e.g. 1TB Connects via USB so easy to use if the devices have USB Data can be encrypted Small so easily stolen CDs and DVDs Cheap unless large amounts of backups are needed Small amount of space and therefore needs to be changed during backups Data can be encrypted Small so easily stolen USB Flash Drive Very cheap to buyWill work on any device with a USB Most smartphones and tablets do not have USB Most USBs have software that will secure the drive with a password Small so easily stolen Cloud Storage Expensive for small amounts of space Easy to use once setup and can be accessed from anywhere with the Internet Data security is the responsibility of the cloud provider and therefore helps smaller businesses.