Data. Where does data come from? Acquisition of information –The acquisition of information is how the data is provided to the system. –It can be done.

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

Computer Parts There are many parts that work together to make a computer work.
including File Management
INPUT-OUTPUT ORGANIZATION
                      Digital Audio 1.
INTRODUCTION OF COMPUTER
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Commercial Data Processing Lesson 2: The Data Processing Cycle.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
A. Frank - P. Weisberg Operating Systems Evolution of Operating Systems.
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
AS Level ICT Selection and use of input devices and input media: Capturing transaction data.
TRANSACTION PROCESSING SYSTEM Liew Woei Song Muhammad Hofiz Achoson.
The Operating System. Operating Systems (F) What you need to know about –operating system as a program; –directory/folder.
Standard Grade Computing COMMERCIAL DATA PROCESSING CHAPTER 13.
RNJ 10/02/091 3 Computing System Fundamentals 3.6 Errors Prevention and Detection.
Types of Operating System
Introduction to Computers Personal Computing 10. What is a computer? Electronic device Performs instructions in a program Performs four functions –Accepts.
Topics Covered: Data preparation Data preparation Data capturing Data capturing Data verification and validation Data verification and validation Data.
SOFTWARE.
Module Designing Computer-based Information Systems
Parts of a Computer.
 By the end of this, you should be able to state the difference between DATE and INFORMAITON.
Computers Are Your Future Tenth Edition Chapter 12: Databases & Information Systems Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Textbook  “Data Communications and Networking” 2 nd Edition by Behrouz A. Forouzan  “Data and Computer Communication” 6 th Edition by William Stallings.
INTRODUCTION TO COMPUTING
Input/OUTPUT [I/O Module structure].
Chapter 13 Sequential File Processing. Master Files Set of files used to store companies data in areas like payroll, inventory Usually processed by batch.
Chapter 16 Designing Effective Output. E – 2 Before H000 Produce Hardware Investment Report HI000 Produce Hardware Investment Lines H100 Read Hardware.
SYSTEM SOFTWARE Prepared by: Mrs. Careene McCallum-Rodney.
1 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Chapter 12 Designing Systems Interfaces, Controls, and Security.
Data and its manifestations. Storage and Retrieval techniques.
CDP Standard Grade1 Commercial Data Processing Standard Grade Computing Studies.
System Analysis and Design
Checking data Chapter 7 Prepared by:Sir Mazhar Javed.
1. MAGNETIC HARD DRIVES 2. SOLID STATE DRIVES 3. OPTICAL DISKS 4. FLASH MEMORY 5. CLOUD STORAGE 6. CONNECTIVITY DEVICES Storage and connectivity devices.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
I.Information Building & Retrieval Learning Objectives: the process of Information building the responsibilities and interaction of each data managing.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
System Development Lifecycle Verification and Validation.
Data and information. Information and data By the end of this, you should be able to state the difference between DATE and INFORMAITON.
COMPUTER ARCHITECTURE. Recommended Text 1Computer Organization and Architecture by William Stallings 2Structured Computer Organisation Andrew S. Tanenbaum.
Data Capture.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Verification & Validation F451 AS Computing. Why check data? It’s useless if inaccurate. Also, wrong data: Can be annoying Can cost a fortune Can be dangerous.
Commercial Data Processing Credit. Management Information CDP makes it easier for managers to control and process the information that is needed in the.
By Phileo Don - Okhuofu. DATA COLLECTION  Data can be collected by the use of questionnaires or data collection forms.  These could be printed out and.
Types of Processing of Data www. ICT-Teacher.com.
Verification & Validation. Batch processing In a batch processing system, documents such as sales orders are collected into batches of typically 50 documents.
Review of Data Capture. Input Devices What input devices are suitable for data entry? Keyboard Voice Bar Code MICR OMR Smart Cards / Magnetic Stripe cards.
1 3 Computing System Fundamentals 3.6 Errors Prevention and Recovery.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
Verification & Validation
 In this unit you will: impact  Assess the impact of TPS on participants.  Identify jobs  Identify jobs that have changed or have been created as a.
The Big Picture Things to think about What different ways are there to collect information automatically? What are the advantages and disadvantages of.
Scientific data storage: How are computers involved in the following?
( ) 1 Chapter # 8 How Data is stored DATABASE.
RECORDS MANAGEMENT Judith Read and Mary Lea Ginn Chapter 12 Electronic Media and Image Records 1 © 2016 Cengage Learning ®. May not be scanned, copied.
DATA COLLECTION Data Collection Data Verification and Validation.
Transaction processing systems
Types of Operating System
Technology Literacy Hardware.
UNIT 19 Data Security 2.
Computer Parts There are many parts that work together to make a computer work.
Computer Parts There are four main equipment functions of a computer system: Input, Processing, Storage and Output. Input: the transferring of information.
Databases.
Computer Parts There are four main equipment functions of a computer system: Input, Processing, Storage and Output. Input: the transferring of information.
DATA RECORDS & FILES By Sinkala.
Commercial Data Processing
Presentation transcript:

Data

Where does data come from? Acquisition of information –The acquisition of information is how the data is provided to the system. –It can be done either: In batch mode At source Electronically

Form filling Every time you fill in and return a form, you are preparing a batch data entry. Generally for batch data entry, form filling is used, where the information provider responds in a set way to a series of questions or prompts. The data is then entered by either key-to-disk or key-to- tape or some type of optical reader (e.g. bar-code reader (e.g. supermarkets, survey forms, etc), magnetic character recognizer (e.g. cheque validation) or voice recognizer (experimental only).

Preparing a form It is important in this situation to ensure that questionnaires are sufficiently unambiguous (e.g. multiple choice) and that the mechanism is in place for collecting the forms and entering them into the system.

Entry at source In a service situation, one of two things will happen: An employee will act as go-between between the customer and the machine or The customer will enter data directly.

Designing an interface for an employee Used where a member of the public will answer questions orally and an employee or representative of the company running the system will enter the details at source (e.g. airline reservations, banking transactions, etc.). The employee must be well-versed in the needs of the system and must be able to interpret less than precise answers to a form acceptable to the system. The response time of the system is also a big factor, as is availability of input devices.

Designing an interface for a member of the public Where the customer will enter the data directly over the internet or workstation. The format of questioning must be extremely precise. Quite often ‘localization’ software is required to enable the customer to interact with the system. –E.g. Enter ZIP code.

Analog devices Information may be provided to the system in response to other processes occurring - e.g. telephone systems, signalling systems, etc. This type of data acquisition is used where data is logged or monitored for billing or emergency interruption purposes. In this situation, the system response time is highly critical. Every source will be an input device. Trapping of communication failure is important. (e.g. parity and protocol checks). Up-time of input devices should also be monitored. Modern-day devices are electronic.

Examples of modern-day devices? What electronic devices are in use every day? How does the data get in to them? Does it stay in them? Do you ever transfer data?

Data sampling In some circumstances, data sampling is used. This is a technique where an analysis of data is done, taking only a sample of the data (e.g. polls). Various different algorithms are available to produce what could be interpreted as representative sample data. The algorithm will depend on the context. This is used where the volume of data is too large or is coming in too fast to be able to use all of it. It is also used for monitoring remote devices to see if they are on-line - i.e. spot checks.

Presentation of information The way in which information is represented to the users of the system can vary considerably: Screen / Print. Audio. Digital / Analog.

Screen/Print The most common output devices are screens and printers. Using these devices, information can be presented in report form, graph form, chart form or picture form.

Audio. Other output devices produce voice or sound. These can be –voice synthesizers or –digital to audio signals (as can be heard on a phone line using a modem). –Streamed audio signals.

Digital/Analog. Signals can be sent out by a system to cause –e.g. a traffic signal to change, –a clown to nod and speak or –a monitoring device to increase the heat in an air-conditioning system. Digital signals are now used for audio purposes, with digital music and streamed digital radio.

Storage of information Information can be stored: –Core memory –Secondary memory –On-line devices –Off-line devices

Core memory Allows for short-term (i.e. program load time) storage of information while a process is running. A memory management unit manages which data is held in core memory at any one time.

On-line magnetic/optical devices Disks (optical or magnetic), memory sticks or memory units. Used to store large volumes of information which must be readily accessible. These must be backed up regularly, to a well-defined schedule. The backup should be stored both on another disk and on serial magnetic or optical storage.

Off-line devices Magnetic serial devices, such as tapes, can be used on-line, but the response time is very slow, due their serial nature. They are, however, perfect for batch transaction storage and for backup of on-line devices. Due to the decrease in price of magnetic disks, they are currently in widespread use for backups. E.g. rw dvds. What do you need to worry about in relation to backup devices?

Data security and protection from error. Physical security Software security Protection from hardware error.

Physical Security In order to ensure that data is secure, then all input, storage and output devices must be secure. This may mean that computer rooms need to be properly air-conditioned and heat-controlled; tapes must be kept in a tape safe; disks must be kept in an appropriate environment –1980s CDs hailed as indestructible – damaged by their containers and rendered unusable! Remote devices must be kept free from tampering and out of danger from dust, smoke and other hazards (such as leaking roofs, etc).

Software security All sensitive information should be password protected, where the passwords are issued and controlled centrally and are monitored for possible break-in. Viruses or deliberate changes to data introduced by unauthorized users are undesirable and cannot be afforded. Firewalls must be in place to prevent harm. Protection from hardware error. –This is done by using protocols and parity bits, backups and journalling.

Data Validation –Edits on transaction data: Proper range of values Presence of required fields Proper types of values, e.g numeric, etc Accuracy of self-checking field values e.g. check digits, etc Presence of related fields (e.g. cannot add a record if no key field is present). Control totals for batches Counts of records Check sums on nonsensical fields (e.g. sum all employee numbers in batch to match input total)