Commercial Data Processing Credit. Management Information CDP makes it easier for managers to control and process the information that is needed in the.

Slides:



Advertisements
Similar presentations
GCSE ICT By the end of this session, you will be able to: Explain main features of ATM machines Identify features of credit cards, debit cards, smart cards.
Advertisements

Commercial Data Processing
Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
COMPUTER CRIMES CREDIT CARD FRAUD “A BILLION DOLLAR PROBLEM”
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
ICT at Work Banking and Finance.
Commercial Data Processing Introduction. What is CDP Commercial Data Processing is the use of powerful computer systems to collect and process large volumes.
Commercial Data Processing Learning Objectives Use of computers in organisations Need for Commercial Data Processing Difference between data and information.
Commercial Data Processing Lesson 2: The Data Processing Cycle.
A guide to protecting your money and your identity KEEPING MONEY SAFE Keeping money safe Money Works: Level 1 Topic 3.
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Commercial Data Processing Lesson 3: Data Validation.
 Transaction  It is a business event for example a sale of inventory “Hall 2009”
Information for students Welcome to the S 3 P system. Login to the system by entering your User ID and password. The User ID is the same as your normal.
Commercial Data Processing
Input devices, processing and output devices Hardware Senior I.
AS Level ICT Selection and use of input devices and input media: Capturing transaction data.
Input, Output & Storage devices
Electronic Payment. Amounts transferred through accounts Money transfer instructions Bank’s computer system Other banks / Businesses.
GCSE Information Technology Input Devices and Methods Objectives:  To understand what input devices are.  Identify their individual uses  Be able to.
By: Piyumi Peiris 11 EDO. Swipe cards are a common type of security device used by many people. They are usually a business-card-sized plastic card with.
Standard Grade Computing COMMERCIAL DATA PROCESSING CHAPTER 13.
OCR GCSE ICT DATA CAPTURE METHODS. LESSON OVERVIEW In this lesson you will learn about the various methods of capturing data.
Topics Covered: Data preparation Data preparation Data capturing Data capturing Data verification and validation Data verification and validation Data.
 By the end of this, you should be able to state the difference between DATE and INFORMAITON.
AS Module 2 Information; Management and Management and Manipulation or what to do with data, how to do it, and……... ensure it provides useful information.
Input Devices Manual and Automatic By Laura and Gracie.
Standard Grade Computing OPERATING SYSTEMS CHAPTER 20.
CDP Standard Grade1 Commercial Data Processing Standard Grade Computing Studies.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Standard Grade Computing Studies Commercial Data Processing START.
AS Computing Verification. Once sensible data has been entered, the second of method of ensuing data integrity can be employed. Verification is the process.
Data Capture.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Relational Databases. Relational database  data stored in tables  must put data into the correct tables  define relationship between tables  primary.
Types of Processing of Data www. ICT-Teacher.com.
Verification & Validation. Batch processing In a batch processing system, documents such as sales orders are collected into batches of typically 50 documents.
By: Asfa Khan and Huda Mukhtar
Review of Data Capture. Input Devices What input devices are suitable for data entry? Keyboard Voice Bar Code MICR OMR Smart Cards / Magnetic Stripe cards.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
1 3 Computing System Fundamentals 3.6 Errors Prevention and Recovery.
Describe direct data entry and associated devices, e. g
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Computers Storage and Input/Output Devices Input and Output Devices Input device – converts our commands and data into a form a computer can understand.
Electronic Payment. Amounts transferred through accounts Money transfer instructions Bank’s computer system Other banks / Businesses.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
DATA and INFORMATION DATA -raw numbers, words INFORMATION – data that has been turned into something we can understand
Computer Studies Today Chapter 17 1 Chapter 17. Computer Studies Today Chapter 17 2 »Input devices and output devices (I/O devices) are known as peripherals.
Input Devices. Input devices allow us to enter data into the computer system –Mouse –Keyboard –Graphics Tablet –TrackPad –Touch-sensitive screen - Scanner.
The Big Picture Things to think about What different ways are there to collect information automatically? What are the advantages and disadvantages of.
Standard Grade Commercial data Processing. What is CDP? Why use computers? How is the data processed? Commercial Data Processing Social Implications?
( ) 1 Chapter # 8 How Data is stored DATABASE.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Introduction What would our society be like now if we did not have ATm’s? Not able to access money when we urgently want it. You will have to go to the.
 At the end of the class students should:  distinguish between data and information.  explain the characteristics and forms of Information Processing.
To understand how to recognise and avoid potential fraudulent situations To appreciate that being a victim of fraud may affect me emotionally as well.
Payment Card Industry (PCI) Rules and Standards
DATA COLLECTION Data Collection Data Verification and Validation.
MAGNETIC STRIPE READER
Five Unethical Uses of Computers
OCR GCSE ICT Data capture methods.
OCR GCSE ICT Data capture methods.
Databases.
Shopping experience! Avoiding online fraud Ian Ramsey C of E School
Databases.
Commercial Data Processing
Data Capture F451 - AS Computing.
Commercial Data Processing
Presentation transcript:

Commercial Data Processing Credit

Management Information CDP makes it easier for managers to control and process the information that is needed in the operation of their businesses. Examples: -It will tell management how much stock they have, -Details on cash flow (money in – money out), -How employees are performing, -When new stock is due to arrive, etc.

Single Entry Multiple Use Once details are entered into the computer system they are available to lots of different users. For example a hotel may enter details of bookings onto a computer system. Financial details will be available to the accounts department; details of vacancies will be available to reception and over the Internet to guests; the number of meals to be taken will be available to the chefs in the kitchen; etc.

Multi –User Database A multi-user database is a database that allows many users access at the same time and if a user has the authorisation, he or she will be able to update the data for the other users.

Smart Cards Smartcards have a microchip and on- board memory instead of a magnetic stripe to hold information. The microchips can hold a lot more data and are much more difficult to forge. The information held on the card can also be updated. Because of the increased security Chip and Pin is now much more common.

Optical Character Recognition OCR devices read characters directly from documents. Some OCR devices will even recognise carefully hand- written characters.

Optical Character Recognition They do this by scanning in the characters changing them to binary and comparing them to character sets stored in the computer.

Verification and Validation Verification is trying to check that the data entered is correct. Verification is usually done manually. Either a person will type in the data and check that it is displayed correctly on the screen or two people will enter the same data and the computer will indicated any differences which can then be corrected.

Validation Validation is making sure that the data being entered is sensible or acceptable e.g. if the teacher entered his date of birth on a form as 31/10/85 this would be a valid date so it would be accepted. Types of validation are presence checks, range checks, data type checks. Check digits can also be used.

Verification Verification = making sure the data has been entered correctly. This is usually done by having an operator check the input screen (It can be done by having 2 operators input data and letting the system check that each entry is identical.)

Sequential access When a system uses sequential access to data it goes to each record in a file one after another in sequence. Sequential access is commonly used when recovering data from taped backup systems.

Random/direct access A system using random/direct access goes directly to the data it requires. Any system which uses interactive processing, which means that data is processed immediately, requires direct/random access to the data held on backing storage and is used throughout the system. Examples would be a ticket booking service, ordering goods over the Internet and the checkout at the supermarket.

Computer Crime and Fraud If criminals could break the security systems surrounding the data held on computers they could commit a whole range of crimes including: - copying the IDs and passwords that allow access to the computer systems -copying sensitive data about the running -of the business - installing viruses - stealing money from bank accounts. The result would be that the running of businesses would be totally disrupted.

Data Protection Act