Commercial Data Processing

Slides:



Advertisements
Similar presentations
Commercial Data Processing
Advertisements

COMPUTER CRIMES CREDIT CARD FRAUD “A BILLION DOLLAR PROBLEM”
ICT at Work Banking and Finance.
Commercial Data Processing Introduction. What is CDP Commercial Data Processing is the use of powerful computer systems to collect and process large volumes.
Commercial Data Processing Learning Objectives Use of computers in organisations Need for Commercial Data Processing Difference between data and information.
Commercial Data Processing Lesson 2: The Data Processing Cycle.
A guide to protecting your money and your identity KEEPING MONEY SAFE Keeping money safe Money Works: Level 1 Topic 3.
Data Capture Methods. In this topic, we will be looking at: Methods of data capture When it would be appropriate to use each method Advantages and disadvantages.
Commercial Data Processing Lesson 3: Data Validation.
 Transaction  It is a business event for example a sale of inventory “Hall 2009”
Commercial Data Processing
Input devices, processing and output devices Hardware Senior I.
AS Level ICT Selection and use of input devices and input media: Capturing transaction data.
Input, Output & Storage devices
GCSE Information Technology Input Devices and Methods Objectives:  To understand what input devices are.  Identify their individual uses  Be able to.
By: Piyumi Peiris 11 EDO. Swipe cards are a common type of security device used by many people. They are usually a business-card-sized plastic card with.
Standard Grade Computing COMMERCIAL DATA PROCESSING CHAPTER 13.
OCR GCSE ICT DATA CAPTURE METHODS. LESSON OVERVIEW In this lesson you will learn about the various methods of capturing data.
Topics Covered: Data preparation Data preparation Data capturing Data capturing Data verification and validation Data verification and validation Data.
 By the end of this, you should be able to state the difference between DATE and INFORMAITON.
Input Devices Manual and Automatic By Laura and Gracie.
Standard Grade Computing OPERATING SYSTEMS CHAPTER 20.
CDP Standard Grade1 Commercial Data Processing Standard Grade Computing Studies.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Standard Grade Computing Studies Commercial Data Processing START.
Data Capture.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Commercial Data Processing Credit. Management Information CDP makes it easier for managers to control and process the information that is needed in the.
Verification & Validation. Batch processing In a batch processing system, documents such as sales orders are collected into batches of typically 50 documents.
Review of Data Capture. Input Devices What input devices are suitable for data entry? Keyboard Voice Bar Code MICR OMR Smart Cards / Magnetic Stripe cards.
1 3 Computing System Fundamentals 3.6 Errors Prevention and Recovery.
Describe direct data entry and associated devices, e. g
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
DATA and INFORMATION DATA -raw numbers, words INFORMATION – data that has been turned into something we can understand
Computer Studies Today Chapter 17 1 Chapter 17. Computer Studies Today Chapter 17 2 »Input devices and output devices (I/O devices) are known as peripherals.
Input Devices. Input devices allow us to enter data into the computer system –Mouse –Keyboard –Graphics Tablet –TrackPad –Touch-sensitive screen - Scanner.
The Big Picture Things to think about What different ways are there to collect information automatically? What are the advantages and disadvantages of.
Standard Grade Commercial data Processing. What is CDP? Why use computers? How is the data processed? Commercial Data Processing Social Implications?
( ) 1 Chapter # 8 How Data is stored DATABASE.
 At the end of the class students should:  distinguish between data and information.  explain the characteristics and forms of Information Processing.
To understand how to recognise and avoid potential fraudulent situations To appreciate that being a victim of fraud may affect me emotionally as well.
Technical Implementation: Security Risks
Payment Card Industry (PCI) Rules and Standards
Payment Card Industry (PCI) Rules and Standards
Take Charge of your Finances
A device tat transfers data from the outside world into a computer
DATA COLLECTION Data Collection Data Verification and Validation.
MAGNETIC STRIPE READER
Accounts Receivable, Accounts Payable & Cash
Transaction processing systems
Take Charge of your Finances
UNIT 19 Data Security 2.
Validation Bury College.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
SECTION 5: INFORMATION PROCESSING
Five Unethical Uses of Computers
Depository Institution Essentials
OCR GCSE ICT Data capture methods.
OCR GCSE ICT Data capture methods.
Databases.
BCT 2.00 Analyze Technology Issues
Shopping experience! Avoiding online fraud Ian Ramsey C of E School
Databases.
Welcome To Money pad November 23, 2018 Sample footer.
Commercial Data Processing
There are different types of translator.
Data Capture F451 - AS Computing.
Take Charge of your Finances
Validation and Verification
Presentation transcript:

Commercial Data Processing Credit

Management Information CDP makes it easier for managers to control and process the information that is needed in the operation of their businesses. Examples: It will tell management how much stock they have, Details on cash flow (money in – money out), How employees are performing, When new stock is due to arrive, etc.

Single Entry Multiple Use Once details are entered into the computer system they are available to lots of different users. For example a hotel may enter details of bookings onto a computer system. Financial details will be available to the accounts department; details of vacancies will be available to reception and over the Internet to guests; the number of meals to be taken will be available to the chefs in the kitchen; etc.

Multi –User Database A multi-user database is a database that allows many users access at the same time and if a user has the authorisation, he or she will be able to update the data for the other users.

Smart Cards Smartcards have a microchip and on-board memory instead of a magnetic stripe to hold information. The microchips can hold a lot more data and are much more difficult to forge. The information held on the card can also be updated. Because of the increased security Chip and Pin is now much more common.

Optical Character Recognition OCR devices read characters directly from documents. Some OCR devices will even recognise carefully hand-written characters.

Optical Character Recognition They do this by scanning in the characters changing them to binary and comparing them to character sets stored in the computer.

Verification and Validation Verification is trying to check that the data entered is correct. Verification is usually done manually. Either a person will type in the data and check that it is displayed correctly on the screen or two people will enter the same data and the computer will indicated any differences which can then be corrected.

Validation Validation is making sure that the data being entered is sensible or acceptable e.g. if the teacher entered his date of birth on a form as 31/10/85 this would be a valid date so it would be accepted. Types of validation are presence checks, range checks, data type checks. Check digits can also be used.

Verification Verification = making sure the data has been entered correctly. This is usually done by having an operator check the input screen (It can be done by having 2 operators input data and letting the system check that each entry is identical.)

Sequential access When a system uses sequential access to data it goes to each record in a file one after another in sequence. Sequential access is commonly used when recovering data from taped backup systems.

Random/direct access A system using random/direct access goes directly to the data it requires. Any system which uses interactive processing, which means that data is processed immediately, requires direct/random access to the data held on backing storage and is used throughout the system. Examples would be a ticket booking service, ordering goods over the Internet and the checkout at the supermarket.

Computer Crime and Fraud If criminals could break the security systems surrounding the data held on computers they could commit a whole range of crimes including: - copying the IDs and passwords that allow access to the computer systems copying sensitive data about the running of the business - installing viruses - stealing money from bank accounts. The result would be that the running of businesses would be totally disrupted.

Data Protection Act