0% found this document useful (0 votes)
26 views14 pages

ITtextbookforCSECBLAD Web

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views14 pages

ITtextbookforCSECBLAD Web

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Oxford excellence for the Caribbean

Instil confidence and support success in

Information
Information Technology
Oxford Information Technology for CSEC® is the market leading textbook for Information
Technology providing comprehensive coverage of the updated CSEC® syllabus and essential

Technology
support for the School-Based Assessment. The third edition focuses on developing students’
problem solving skills through the use of ICT tools, helping them to embrace new technologies
and fully preparing them with the knowledge and expertise to achieve in the exam.

 Up-to-date content with Caribbean examples makes learning more relatable.

 opic discussions, worked examples, and a wide range of questions including exam-style
 T
THIRD EDITION
questions provide extensive support and practice to prepare students for the exam.

 Comprehensive support for the School-Based Assessment with hints and guidance,
and practice questions makes this practical aspect of the qualification more accessible to
®

students, boosting their confidence.


CSEC

FOR THE
NEW
SYLLABUS HA
PTE
2.1 Data and information

2
information retrieval systems such as abstracting

R
C
in an appropriate medium: it should be delivered

and indexing services


using an appropriate communication medium, such as


full text databases and reference materials
whether by printed material or storage device

be encyclopaedias
cost-effective: the value of information should
INFORMAT ION PROCESSIN G other, less formal, publications such as subject-

more than the cost involved in its collection.



cases may
specialised bulletin boards, which in some
Information as a commodity replace the more traditional journals.
2.1 Data and information An information commodity is an item of
information
online
that can be bought or sold. For example, with Questions
every time
information you may have to pay a charge 1 Explain what is meant when data is
said to be
research,
the publications: hurricane-preparedness tips, that you access that information.
Data is raw, unprocessed facts. For example,

in relevant.
do not daily newspapers, media reports and trends 2 Name two characteristics of data, other
than
numbers 26, 29 and 30 represent data. We The major types of information for sale are:
they could chronic diseases relevance, that would determine if it is useful.
know what the three numbers represent –
mean just about anything – such as the temperature
◆ questionnaires: opinion polls and market
research
◆ databases, especially banking and other financial 3 What is the term given to an item of
information End of topic questions
sports products: labels containing ingredients, quantities, information that give demographic, tracking
and that can be bought or sold?
in degrees Celsius, the dates of interschool

events or even the number of students in three


classes.
numbers can
contents origin and dosage.
of
buying trends encourage students to reflect
Information is processed data. The three The value of information can include the cost
therefore indicate what type of clothing to
wear to keep
the exams are,
production, the cost of distribution and the
value to
the purchaser. The more valuable the information
is to
on what they have read.
cool based on the temperature, how close
class. charge for
or how many exam papers to print for each the customer, the more the organisation can
to get
to obtain it. Also, customers may be willing to pay more
Data processing is the manipulation of data
above, information quickly.
information. So, taking one of the examples
gives an With the rise of the Internet, two elements
in this
finding the average of the three numbers
indication of how warm the days have been. value chain have changed. The cost of distributing
for web
any record- information has been reduced dramatically
The term information system is given to additional
systems providers. Also, ‘free’ information may have
keeping system. We come across information graphs 2 Information processing
information value. An online newspaper story may include
all the time. Common examples of manual same
or pictures and links to other stories on the 2.2 Validation and verification
systems are dictionaries and telephone directories. digits in the number. Check digits are included in
delete files the computer may ask ‘Are you sure [y/n]?’
that data topic.
What these examples have in common is barcode numbers.
or it may display a summary of input data and ask for
who found the file (in the filing cabinet!) made use of
displayed
has been collected (input), processed and Once information is collected, it is often verification of its validity before the data is stored.
it; the other person waited until the first returned the
wishes to
(output) in order to provide useful information. communicated directly to the person who file to the drawer. Computers and networks mean not
must be:
use it. In order for it to be useful, information only that neither person has to search through a drawer
Information is collected for the purposes
of Interpretation of coded data to locate the file, but also that both persons may access
life. In relevant: it must be what the user needs to
know,
culture, leisure, work, research and everyday ◆
Before the responses to questionnaires can be analysed, the data file at the same time. At least, it may appear in
planning
organisations, however, it is mainly used for and be up-to-date Fig 2.2 A barcode showing a check digit they must be edited and coded before the data entry that way. Is this a good way to access data files?
of
and decision making. There are many sources accurate: it must be as correct as possible

s

process. The person coding these responses should have
information, including, for example: timely: information should be provided for Let us suppose that two teachers were both accessing
Verification no doubt as to what should be entered. This may sound

e

reached
problem-solving before a critical stage is a data record for the student Amerra Taitt (Fig 2.4).
measurement: sales, productivity output, cash simple, but consider the following case (Fig 2.3).

g
Data verification is the checking for mistakes such One teacher wishes to adjust the mark received in IT
and opportunities are lost

receipts of a as transcription errors when data is copied from one

a
of complete: it must represent a ‘whole’ picture from the original 69% to 96%. The second teacher
formal and informal communication: word

medium or device to another. Verification checks do not wishes to adjust the mark received in Geography from

p
problem or solution

mouth, meetings, announcements, interviews guarantee that the entered data is correct, it only checks 18% to 81% (typo errors in both subjects!). What

e
that the data entered matches the source data. Therefore, 41
Fig 2.3 Coding involves assigning a label to each question happens when the records are saved to the main

l
Fig 2.4 What happens if two people want to change data at the
you should be aware that if the original form was database? Will both changes be accepted?
same time?
Coding involves assigning a label to each response, such

p
40 completed incorrectly, then the entered data may pass
as 1 for ‘yes’ and 2 for ‘no’. Sometimes, people will write Data-sharing in this manner can lead to problems of
21/12/2018 09:36
some verification checks despite being incorrect.

Sam
843716_CSEC_IT_CH02.indd 41
21/12/2018 09:36 in a response such as ‘can’t remember’ or ‘unsure’, and data accuracy when the data records are saved. The
843716_CSEC_IT_CH02.indd 40
One way to guarantee that the data entered matches you must decide what to do. It could either be ignored, teacher who saves the changes first will have the marks
the source data is a procedure called double (data) or a new code and value could be added to the question. overwritten by the teacher who saves the changes last,
entry. Data is entered twice using a program that which of course will erase the changes made by the
As another example, consider a library database where
checks each second entry against the first. For example, first teacher. How can this problem be avoided? Fig 2.5 A well-structured database will prevent simultaneous access
books are classified as being Fiction, Non-fiction or to the
some applications require users to enter their password same database record
Reference. This information could be stored as text in Good databases avoid this problem by allowing only
twice. The application compares the two passwords to own usernames and passwords for the login process.
a database where the corresponding field length would one user or system to access a data record at a time.
confirm that they are the same. In other applications There are also access privileges depending on the
be 11 to store the longest classification, ‘Non-fiction’. When an attempt is made by a second person to access
where there is more data to be entered, the program user’s level. For example, a student at the school
Alternatively, the classifications could be coded like this: the same record, a message may be provided (Fig 2.5).
produces a list with the pairs of data that do not match will be allowed access to certain software such as
so that the correct values can be re-entered. Classification Code Computer systems that provide shared access to data word processing, perhaps email facilities and limited
Fiction F must have security features in place. This prevents Internet access. A clerk will have access to student
Visual checks Non-fiction N users from gaining access to data which they are records, personnel records, Internet access, email,
Another verification method is to use on-screen Reference R not authorised to view or modify. The users of the and payroll programs. The network administrator
prompts. After a set of data is entered, it is redisplayed computer system should be provided with their will have the highest level of access, including data
Coding information reduces the amount of storage
on the screen. The user is prompted to read it and records of usernames and passwords and the network
space required and speeds up the process of typing the
confirm that it has been entered correctly. If the user Questions administration and security software.
information in. For coding to work properly everyone
has entered any data incorrectly, it is re-entered.
needs to know what the correct codes are. 1 Explain the difference between data validation and
data verification.
This method of verification is not very reliable 2 Give an example of a data-related hardware error.
since many data entry personnel will not read the Problems associated with 3 Copy and complete the table below by giving an
example of valid data for each item:
information that is redisplayed or check it carefully shared data Field name Acceptable values Example of valid data
against the source document. Accidental errors a Opening hours 8 am to 4 pm
In organisations, information is constantly sent and
can also be prevented by verification in asking for b Bulk orders >250
received among various departments. Traditionally, if
confirmation of instructions. For example, if you try to c Standard shipping

with online support


3 to 5 days
two people need to use the same file, the first person d Centre number 999999 where 9 represents a digit
44

45
843716_CSEC_IT_CH02.indd 44

Glenda Gay
21/12/2018 09:36 843716_CSEC_IT_CH02.indd 45

Sample pages from IT for CSEC© 21/12/2018 09:36

Student Book, Unit 2


Ronald Blades

21/12/2018 08:26
Contents
9.3 Pseudocode 235 Programming with Visual Basic for
12
9.4 Flowcharts 246 Applications
1 Fundamentals of hardware and software 5.4 Reviewing your work 116 9.5 Arithmetic, relational and logical operators 252 12.1 Introduction to Visual Basic for
1.1 Basic computer components 6 5.5 Combining files and importing data 120 9.6 Testing algorithms 256 Applications 283
1.2 Input devices and media 8 5.6 Table of contents 122 End of chapter exam-style questions 258 12.2 Writing in VBA 287
1.3 Output devices 15 5.7 Mail merge 124
1.4 Primary memory 19 5.8 Printing the document 129 10 Program implementation Appendix
1.5 Secondary storage 21 5.9 Fillable electronic forms 130 10.1 Programming languages 260 1 Information Technology School-Based
1.6 System software 26 End of chapter exam-style questions 136 10.2 Writing a program 262 Assessment guidelines 292
1.7 Data processing 27 10.3 Running a program 266 2 Teacher guidelines for the School-Based
1.8 Application software 29 6 Web page design 10.4 Testing and debugging techniques 268 Assessment 295
1.9 User interfaces 31 6.1 Introduction to web page design 138 10.5 Program documentation 270 3 Guidelines for problem solving and
1.10 Types of computer systems 34 6.2 Designing a web page 141 End of chapter exam-style questions 272 program design 296
1.11 Common computer hardware problems 36 6.3 Creating a web page 147
End of chapter exam-style questions 38 End of chapter exam-style questions 150 11 Programming with Pascal Answers to end of topic questions 298
11.1 Introduction to Pascal 274 Index 305
2 Information processing 7 Spreadsheets 11.2 Structure of a Pascal program 277
2.1 Data and information 40 7.1 Introduction to spreadsheets 152 11.3 Formatting the output of Pascal programs 280
2.2 Validation and verification 42 7.2 Common spreadsheet features 154
2.3 Automated methods of data capture 46 7.3 Developing a simple spreadsheet 160
2.4 File organisation and access 49 7.4 Formatting a spreadsheet 170
2.5 Information processing 54 7.5 Searching for records 172
End of chapter exam-style questions 60 7.6 Charts 180
7.7 Printing a spreadsheet 185
3 Computer networks and web technologies 7.8 Importing files and linking data 186
3.1 Computer networks 62 End of chapter exam-style questions 188
3.2 Web technologies 70
End of chapter exam-style questions 77 8 Databases What's on the website?
8.1 Introduction to database management 191 ♦ Answers to all End of Chapter Exam-style
4 Implications of misuse and cyber security 8.2 Common database management features 193 Questions in this book.
4.1 Computer vulnerability 79 8.3 Joining multiple database tables 200 ♦ Additional Exam-style Questions for
4.2 Misuse of information 81 8.4 Capturing and entering data 203 each chapter with sample answers and
4.3 Data protection 84 8.5 Searching and sorting 209 examiner analysis.
4.4 Impact of IT in the workplace 89 8.6 Calculated fields 217 ♦ Interactive Paper 1 multiple choice test,
4.5 Personnel in computer-related fields 94 8.7 Report formats 220 Practice Paper 2, worked SBA Paper 3
4.6 Implications of ICT 95 8.8 Importing and linking data 225 with advice on online marking, SBA
End of chapter exam-style questions 101 8.9 Developing database applications 227 alternative Paper 3
End of chapter exam-style questions 228 ♦ Answers to all Workbook questions
5 Word processing ♦ Comprehensive glossary of terms used in
5.1 Introduction to word processing 103
9 Problem solving and program design this book.
5.2 Document organisation 110 9.1 Introduction to problem solving 231 www.oxfordsecondary.com/9780198437161
5.3 Tables and columns 112 9.2 Algorithm design 233
P
HA TE 2.1 Data and information

R
◆ in an appropriate medium: it should be delivered ◆ information retrieval systems such as abstracting
using an appropriate communication medium, and indexing services
whether by printed material or storage device ◆ full text databases and reference materials such as
INFORMATION PROCESSING ◆ cost-effective: the value of information should be encyclopaedias
more than the cost involved in its collection. ◆ other, less formal, publications such as subject-
specialised bulletin boards, which in some cases may
2.1 Data and information Information as a commodity replace the more traditional journals.
An information commodity is an item of information
that can be bought or sold. For example, with online
Questions
Data is raw, unprocessed facts. For example, the ◆ publications: hurricane-preparedness tips, research, information you may have to pay a charge every time
that you access that information. 1 Explain what is meant when data is said to be
numbers 26, 29 and 30 represent data. We do not daily newspapers, media reports and trends in
relevant.
know what the three numbers represent – they could chronic diseases
The major types of information for sale are: 2 Name two characteristics of data, other than
mean just about anything – such as the temperature ◆ questionnaires: opinion polls and market research
relevance, that would determine if it is useful.
in degrees Celsius, the dates of interschool sports ◆ products: labels containing ingredients, quantities, ◆ databases, especially banking and other financial
3 What is the term given to an item of information
events or even the number of students in three classes. contents origin and dosage. information that give demographic, tracking and
that can be bought or sold?
Information is processed data. The three numbers can buying trends
The value of information can include the cost of
therefore indicate what type of clothing to wear to keep
production, the cost of distribution and the value to
cool based on the temperature, how close the exams are,
the purchaser. The more valuable the information is to
or how many exam papers to print for each class.
the customer, the more the organisation can charge for
Data processing is the manipulation of data to obtain it. Also, customers may be willing to pay more to get
information. So, taking one of the examples above, information quickly.
finding the average of the three numbers gives an
With the rise of the Internet, two elements in this
indication of how warm the days have been.
value chain have changed. The cost of distributing
The term information system is given to any record- information has been reduced dramatically for web
keeping system. We come across information systems providers. Also, ‘free’ information may have additional
all the time. Common examples of manual information value. An online newspaper story may include graphs
systems are dictionaries and telephone directories. or pictures and links to other stories on the same
What these examples have in common is that data topic.
has been collected (input), processed and displayed
Once information is collected, it is often
(output) in order to provide useful information.
communicated directly to the person who wishes to
Information is collected for the purposes of use it. In order for it to be useful, information must be:
culture, leisure, work, research and everyday life. In
◆ relevant: it must be what the user needs to know,
organisations, however, it is mainly used for planning
and be up-to-date
and decision making. There are many sources of
◆ accurate: it must be as correct as possible
information, including, for example:
◆ timely: information should be provided for
◆ measurement: sales, productivity output, cash problem-solving before a critical stage is reached
receipts and opportunities are lost
◆ formal and informal communication: word of ◆ complete: it must represent a ‘whole’ picture of a
mouth, meetings, announcements, interviews problem or solution

40 41

843716_CSEC_IT_CH02.indd 40 21/12/2018 09:36 843716_CSEC_IT_CH02.indd 41 21/12/2018 09:36


2.2
2.2 Validation
Validationand
andverification
verification 2.2 Validation and verification

accept a specific type of data. Whenever data is entered It would be useful to have a consistency check to cross-
into a field the database will check that it is of the check the information in the ‘Are you unemployed?’
AAcommon
commonproblem
problemwith withmanually
manuallyentering enteringdata data Software
Softwareand
andhardware
hardwareerrors
errors correct type, for example alphabetic or numeric. If it is and ‘Unemployment benefits claimed?’ fields, since you
into
intoa computer
a computersystem
systemis isthat
thatit itis isvery
veryeasy
easytotoinput
input There
Therearearetwo
twotypes
typesofoferror
errorhere.
here. Software
Softwaremight
might not, then an error message will be displayed, and the should not claim for unemployment benefits if you are
incorrect
incorrectdata.
data.
Examples
Examplesinclude
includeusers usersmistyping
mistypinga a malfunction,
malfunction, erasing
erasingororcorrupting
corruptingpreviously
previously data will have to be re-entered. still working. In this example, therefore, either an error
name
nameororaddress
addressinina database
a databasesosothat thatletters
lettersarearesent
sent entered
entereddata.
data.Hardware
Hardwaremay maydevelop
developa fault
a fault(often
(often has been made on input or this is a deliberate attempt
totothe
thewrong
wrongperson.
person. However,
However, it itis isalso
alsopossible
possibleforfora a intermittent)
intermittent)thatthatcorrupts
corruptsdata.
data. Examples
Examplesinclude
includebad
bad Table 2.1 Examples of valid and invalid data types
to claim benefits while still working. Other examples
device
devicetotomisread
misreada barcode
a barcodeand andtherefore
thereforenot notprovide
provide sectors
sectorsonona hard
a harddisk,disk,
bad
badmemory
memoryorora power a powersurge.
surge. Field name Type Valid data Invalid data of consistency checks are:
any
anyinformation
informationtotothe theuser.
user. The
Theapplication
applicationmay mayappear
appeartotoacceptacceptdata
datacorrectly
correctlybut
but Date of birth Date 19/10/1994 19/19/94, or 23
when
whenthat
thatdata
datais isretrieved
retrievedit itis iscorrupt.
corrupt. Percentage Numeric 56, 99 A+, Pass, 125, –15 ◆ Single mothers with children can claim for
Errors
Errors mark childcare allowance. Check that the number of
Errors
Errorsoccur
occurininany
anycomputer
computerinformation
informationsystem.
system. Transmission
Transmissionerrors errors children is not zero.
Notice that a type check is not a very good validation Only full-time employees are paid overtime. Check
There
Thereareareseveral
severalapproaches
approachestotodealing
dealingwith
withthe
the Transmission
Transmission errors
errorsoccur
occurwhen whendata
datareceived
receivedis isnot
not ◆
check. There are many entries you could put in the that these fields correspond.
problems
problemsthat thaterrors
errorscause,
cause,specifically
specificallypreventing
preventing thethesamesameasasthat thattransmitted
transmittedbybythe thesender
sender(Fig
(Fig2.1).
2.1).
‘Valid data’ column in Table 2.1 that would pass the
errors
errors(so(sothat
thatthey
theydodonotnotoccur)
occur)and
anddetecting
detectingwhen
when
type check but are clearly incorrect. Presence check
errors
errorsdodooccur
occur(so(sothat
thatthey
theycan
canbebecorrected).
corrected).Below
Belowa a
few
fewapproaches
approachesareareconsidered.
considered. The data type check is particularly important if a fixed This type of check ensures that the data is actually
FigFig
2.12.1
Illustration
Illustration
of transmission
of transmission
errors
errors
length field is defined to store the data. Any extra entered. It can be used on any field in a database. For
Data
Dataentry
entryerrors
errors characters that exceed the maximum length would example, every person in a particular database must
Validation
Validation be assigned to a department. Therefore, a presence
Sometimes
Sometimesdata datacannot
cannotbebeautomatically
automaticallyscanned
scannedinto into be lost. Length checks are usually only performed on
Data
Data validation
validationis isthethecomputerised
computerisedchecking
checkingofof check on each employee’s record could ensure that a
the
thesystem
systemforforstorage,
storage, sosoa common
a commonway wayis istototype
type alphabetic or alphanumeric data.
input
inputdata
dataforforerrors
errors(data
(datathat
thatmay
maybebeunreasonable
unreasonableoror department is entered in the form.
the
thedata
datadirectly
directlyinto
intothe
thecomputer
computersystem.
system.DataDataentry
entry incomplete)
incomplete)before
beforeit itis isprocessed.
processed.
ItItdoes
doesnot
notconfirm
confirm Table 2.2 Examples of valid field lengths
errors,
errors,
such
suchasastransposition
transpositionerrors,
errors,
would
wouldthenthenoccur
occur the
theaccuracy
accuracyofofdata.
data.
There
Therearearedifferent
differentmethods
methodsofof Field name Maximum length Valid data Invalid data Format check
when
whenananoperator
operatorenters
entersdata
datausing
usinga keyboard
a keyboardand and validation.
validation.
TheThemostmostappropriate
appropriatemethod(s)
method(s)totouseusewill
will Student ID 6 826025 82–60–45
mixes
mixesupupdigits
digitsand/or
and/orletters.
letters.
For
Forexample,
example, thethenumber
number This check verifies that the data has been entered
depend
dependupon
uponwhat whatdata
datais isbeing
beingentered.
entered. Grade 2 B+, C A++, Fail
in the correct format. For example, a national ID
3232may
maybebeentered
enteredasas23. 23.Other
Othererrors
errorsoccur
occurwhenwhen
number may have the format 999-9999-X999, where
data
dataentry
entryrequirements
requirementsarearenot notclear.
clear.
DoDoyouyouinterpret
interpret Range
Rangecheck
check Consistency check
07/01/2019
07/01/2019asasJuly July1 12019
2019oror7 7January
January2019?
2019?TheseThese 9 represents a number and X represents an alphabetic
Range
Rangecheck
checkensures
ensuresthat
thatthethedata
dataentered
enteredis iswithin
withina a character.
data
dataentry
entryerrors
errorscancanbebeeither
eitheraccidental
accidentalorordeliberate.
deliberate. A consistency check compares the contents of two
certain
certainrange.
range.
For
Forexample,
example, when
whenyou youenter
entera number
a number
or more fields to make sure that they make sense. It
Accidental
Accidentalerrorserrorsoccur
occurunintentionally:
unintentionally:data datais is corresponding
correspondingtotoa month
a monthofofthe theyear,
year,
the
therange
rangeofof Length check
◆ ◆
is also called an inconsistency check, since it mostly
entered
enteredorora command
a commandis isissued
issuedbybymistake,
mistake, iningood
good acceptable
acceptablenumbers
numbersis is1 1toto12.
12.
identifies errors and discrepancies in the data. This This check verifies that the data entered is the correct
faith,
faith,but
butininerror.
error. check compares new data with previously entered length. For example, a password for a credit card may
◆ ◆Deliberate:
Deliberate:if iferrors
errorsarearemade
madedeliberately,
deliberately, then
then
Reasonableness
Reasonablenesscheck
check
data. For example, checking that the age entered be four digits long, therefore entering three or five
thetheuser
userprobably
probablyknows
knowsenough
enoughtotogetgetaround
aroundany any This
Thischeck
checktests
testswhether
whetherthe thedata
dataobeys
obeysspecified
specifiedcriteria.
criteria. digits may result in an error.
corresponds to the age calculation from the date of
validation
validationchecks.
checks.Examples
Examplesinclude
includea disgruntled
a disgruntled For
Forexample,
example, the
theage
ageofofa child
a childatatpreschool
preschoolcould
couldbebe
birth. Consider the following employee record:
employee
employeeentering
enteringfictitious
fictitiousdata
datainto
intoa company’s
a company’s about
about4 4years
yearsold,
old,
but
butnot
not1414years.
years.Reasonableness
Reasonableness Check digit
database.
database. Possible
Possiblesolutions
solutionstotothis
thisproblem
probleminclude
include checks
checksarearetherefore
thereforeused
usedtotodetect
detectdoubtful
doubtfuldata.
data. Employment Status Form A check digit is an extra digit added to the end
file
fileaccess
accesspermissions
permissionsimposed
imposedbybythe theoperating
operating Are you unemployed? No
of a code. It is used to detect errors arising from
system,
system, better
bettervigilance
vigilanceofofthe
theadministrator
administratorand and Data
Datatype
typecheck
check Unemployment benefits claimed? Yes
transcription and also to ensure that codes originally
thethecross-referencing
cross-referencingofofdata datawith
withother
othersupposedly
supposedly This
Thisis isalso
alsoknown
knownasasa character
a characterororalphanumeric
alphanumeric Number of years working 12
produced by a computer are re-entered into another
reliable
reliablesources.
sources. check.
check. WhenWhena database
a databaseis iscreated,
created,
each
eachfield
fieldwill
will Current occupation Foreman
computer correctly. It is calculated from the other

4242 43

843716_CSEC_IT_CH02.indd
843716_CSEC_IT_CH02.indd
42 42 21/12/2018
21/12/2018
09:36
09:36 843716_CSEC_IT_CH02.indd 43 21/12/2018 09:36
2 Information processing 2.2 Validation and verification

digits in the number. Check digits are included in delete files the computer may ask ‘Are you sure [y/n]?’ who found the file (in the filing cabinet!) made use of
barcode numbers. or it may display a summary of input data and ask for it; the other person waited until the first returned the
verification of its validity before the data is stored. file to the drawer. Computers and networks mean not
only that neither person has to search through a drawer
Interpretation of coded data to locate the file, but also that both persons may access
the data file at the same time. At least, it may appear in
Before the responses to questionnaires can be analysed,
that way. Is this a good way to access data files?
Fig 2.2 A barcode showing a check digit
they must be edited and coded before the data entry
process. The person coding these responses should have Let us suppose that two teachers were both accessing
no doubt as to what should be entered. This may sound a data record for the student Amerra Taitt (Fig 2.4).
Verification simple, but consider the following case (Fig 2.3). One teacher wishes to adjust the mark received in IT
Data verification is the checking for mistakes such from the original 69% to 96%. The second teacher
as transcription errors when data is copied from one wishes to adjust the mark received in Geography from
medium or device to another. Verification checks do not 18% to 81% (typo errors in both subjects!). What
guarantee that the entered data is correct, it only checks happens when the records are saved to the main Fig 2.4 What happens if two people want to change data at the same time?
Fig 2.3 Coding involves assigning a label to each question
that the data entered matches the source data. Therefore, database? Will both changes be accepted?
you should be aware that if the original form was Coding involves assigning a label to each response, such
completed incorrectly, then the entered data may pass as 1 for ‘yes’ and 2 for ‘no’. Sometimes, people will write Data-sharing in this manner can lead to problems of
some verification checks despite being incorrect. in a response such as ‘can’t remember’ or ‘unsure’, and data accuracy when the data records are saved. The
you must decide what to do. It could either be ignored, teacher who saves the changes first will have the marks
One way to guarantee that the data entered matches overwritten by the teacher who saves the changes last,
the source data is a procedure called double (data) or a new code and value could be added to the question.
which of course will erase the changes made by the
entry. Data is entered twice using a program that As another example, consider a library database where first teacher. How can this problem be avoided? Fig 2.5 A well-structured database will prevent simultaneous access to the
checks each second entry against the first. For example, same database record
books are classified as being Fiction, Non-fiction or
some applications require users to enter their password Reference. This information could be stored as text in Good databases avoid this problem by allowing only own usernames and passwords for the login process.
twice. The application compares the two passwords to a database where the corresponding field length would one user or system to access a data record at a time. There are also access privileges depending on the
confirm that they are the same. In other applications be 11 to store the longest classification, ‘Non-fiction’. When an attempt is made by a second person to access user’s level. For example, a student at the school
where there is more data to be entered, the program Alternatively, the classifications could be coded like this: the same record, a message may be provided (Fig 2.5). will be allowed access to certain software such as
produces a list with the pairs of data that do not match word processing, perhaps email facilities and limited
Classification Code Computer systems that provide shared access to data
so that the correct values can be re-entered. Internet access. A clerk will have access to student
Fiction F must have security features in place. This prevents
records, personnel records, Internet access, email,
Non-fiction N users from gaining access to data which they are
Visual checks and payroll programs. The network administrator
Reference R not authorised to view or modify. The users of the
Another verification method is to use on-screen will have the highest level of access, including data
computer system should be provided with their
prompts. After a set of data is entered, it is redisplayed records of usernames and passwords and the network
Coding information reduces the amount of storage
on the screen. The user is prompted to read it and administration and security software.
space required and speeds up the process of typing the Questions
confirm that it has been entered correctly. If the user information in. For coding to work properly everyone
1 Explain the difference between data validation and data verification.
has entered any data incorrectly, it is re-entered. needs to know what the correct codes are.
2 Give an example of a data-related hardware error.
This method of verification is not very reliable 3 Copy and complete the table below by giving an example of valid data for each item:
since many data entry personnel will not read the Problems associated with Field name Acceptable values Example of valid data
information that is redisplayed or check it carefully shared data a Opening hours 8 am to 4 pm
against the source document. Accidental errors In organisations, information is constantly sent and b Bulk orders >250
can also be prevented by verification in asking for received among various departments. Traditionally, if c Standard shipping 3 to 5 days
confirmation of instructions. For example, if you try to two people need to use the same file, the first person d Centre number 999999 where 9 represents a digit

44 45

843716_CSEC_IT_CH02.indd 44 21/12/2018 09:36 843716_CSEC_IT_CH02.indd 45 21/12/2018 09:36


2.3 Automated methods of data capture 2.3 Automated methods of data capture

Optical character recognition (OCR) is used Data logging


to read the student’s pre-printed information
Many of the output devices discussed in Chapter 1 Optical mark recognition and optical character Computers are often used by companies and scientists
from the form, whereas optical mark recognition
are human-readable, meaning that a hard copy of the recognition are often used together in a turnaround to automatically measure and record changes in
(OMR) is used to read the answers that have been
output is printed as reports, graphs, charts and so on. document. Figure 2.6 shows an example of a conditions such as the temperature, the speed at which
added. All the information can be read into the
Other devices are machine-readable, meaning that the turnaround document used to record the reading on an a ball is travelling in sports such as cricket and baseball,
computer automatically. The sheet is marked, and the
output is in a form that only a computer can process. electricity meter. the amount of light or oxygen in a room or even the
total mark is printed without any need for human
An example is output to a monitor. This is called soft- level of noise being made by vehicular traffic near a
intervention.
copy output since it is not printed on paper or other hospital.
physical material. Turnaround documents allow cheap, fast input of
Data logging is a method of automatic data capture
information into a computer system. Data can also be
where a reading from a sensor is input at regular
Data-capture forms printed on turnaround documents in barcode format.
intervals. This data can then be processed to provide
These forms must be designed so that their analysis of the environment (Fig 2.9).
instructions are clear and concise, leaving no doubt as
Alternatives to turnaround documents
to how to enter the data onto the form. For example, In some industries, turnaround documents are being
the format for dates could be specified as ‘dd/mm/yyyy’ replaced by small handheld computers, including
Fig 2.6 The meter reader has marked the reading as 7618 on this turnaround
so that the format ‘mm/dd/yy’ is not used in error. mobile devices. These pocket-sized devices have a
document
display screen and touchscreen keyboard. For example,
The responses from the forms are called human- many local utility companies now issue their meter
Another example of a turnaround document is
readable since data entry personnel manually enter the readers with handheld computers. At the start of the
the multiple-choice sheets used in examinations.
responses written on the forms. This method of data day the names and addresses of the customers to be
Information such as the candidate number, subject
capture is liable to transcription and other errors when visited are downloaded into the computer. As the meter
and school code is printed on the multiple-choice
the data is entered into the computer. One method reader visits customers’ homes, he or she types the
answer sheet by the computer. The student takes the
of avoiding transcription errors is double (data) entry, meter readings into the computer. At the end of the
test and fills in the answer grid by making marks in the
where the data is entered twice by two different people day the readings can be transferred automatically onto
appropriate boxes using a pencil or ballpoint pen. The
and the computer will only accept the data if the two the main computer to issue bills. Another example
form is then returned to the examination council to be
versions are identical. involves courier services that equip drivers with
fed into a special reader.
these devices. As the courier delivers a package, the
Turnaround document recipient uses a stylus to sign the delivery document
A turnaround document is a machine-readable on the device. This signature is captured digitally and
document that has some information printed on it by uploaded to the database as proof of delivery.
a computer but has more information added to it by a
human. It is then fed back into a computer to transfer
this newly added information. These documents serve
two purposes. They are used to:
◆ verify the accuracy and completeness of information
that has already been entered
◆ update information already entered with additional
data.
Fig 2.9 This student is checking water quality using a sensor connected to a
data logger. This data can then be processed to provide analysis of chemicals
Fig 2.7 Multiple-choice exam sheet Fig 2.8 Turnaround documents are being replaced by small handheld in the water
computers

46 47

843716_CSEC_IT_CH02.indd 46 21/12/2018 09:36 843716_CSEC_IT_CH02.indd 47 21/12/2018 09:36


2 Information processing
File
Fileorganisation
organisationand access 2.4
andaccess 2.4

Temperature
sensor File
Fileorganisation
organisationand andaccess
accessrelates
relatestotothe
theuse
useofof ◆ ◆add:
add:put
puta new
a newrecord
recordinto
intothe
themaster
masterfile
file
Input
connections
Output
connections
records,
records,fields
fieldsand
andfiles.
files. ◆ ◆update:
update:change
changethethecontents
contentsofofa record
a recordorora field
a field
that
thatalready
alreadyexists
exists
◆ ◆AAfield
fieldcontains
containsa single
a singledata
dataitem,
item,and
andmany
manyfields
fields
◆ ◆delete:
delete:remove
removea record
a recordfrom
fromthethemaster
masterfile.
file.
INTERFACE comprise
comprisea record.
a record. Each
Eachfield
fieldhashasa name
a nameand andone
oneis is
the
thekeykeyfield
fieldused usedtotoidentify
identifythe therecord.
record. Record
Recordmatching
matching
◆ ◆AA record
recordis isa collection
a collectionofofrelated
relateddatadatafields
fields
AAprimary
primary keykeyis isnormally
normallyused usedtotoidentify
identifythetherecord
record
Light
Computer (possibly
(possiblyofofdifferent
differentdata
datatypes)
types)and andtreated
treatedasasa a
you
youwant
wanttotoupdate
updateorordelete.
delete.ItItis isa field
a fieldininthe
therecord
record
sensor single
singleitem
itemforforprocessing.
processing.
whose
whosevalue
valueis isunique
uniquetotothatthatrecord.
record. For
Forinstance,
instance,inina a
Fig 2.10 Components of a data logging system ◆ ◆AA data
datafile
fileis isa collection
a collectionofofrecords
recordsholding
holdingthe the
student
studentrecord,
record, the
theStudent
StudentIDIDis isnormally
normallyused usedasasthe
the
same
sametypetypeofofinformation
informationbut butabout
aboutdifferent
differentobjects
objects
key
keyfield.
field.
Without
Withouta key a keyfield
fieldtotoidentify
identifythe therecord
recordyou you
A data logging system consists of sensors connected into small amounts of microfilm or microfiche with ororindividuals.
individuals.
want
wantyouyoucannot
cannotdeletedeleteororupdate
updaterecords.
records.
via an interface to a computer and some data no special programming. The drawback of computer
AAfile
filehas
hasthree
threeimportant
importantcharacteristics:
characteristics:
logging software (Fig 2.10). The sensors will take output microfilm or microfiche (COM) is that it takes ToTodelete
deleteororupdate
updaterecords
recordsinina master
a masterfile,file,
compare
compare
measurements and at required intervals the software a special device to print the microfilm and a special 1 1ItItcan
canbebepermanent
permanentorortemporary.
temporary. the
theprimary
primarykey keyininthe
thetransaction
transactionrecord recordwith
withthat that
will record the data. The results can then be displayed viewer to read it. 2 2The
Therecords
recordsofofthe
thefile
filearearespecially
speciallyorganised
organisedonon ininthethemaster
masterfilefilerecord.
record.IfIfthere
thereis isa match,
a match, you youcancan
as a graph or a table. the
thesecondary
secondarystorage
storagedevice.
device. This
Thisis iscalled
calledfile
file update
updateorordelete
deletethe themaster
masterfilefilerecord.
record. IfIfboth
bothfilesfiles
organisation.
organisation. areareordered
ordered(sorted)
(sorted)ononthe thekey
keyfield,
field, then
thenthis
thisrecord
record
Microfilm Questions 3 3Records
Recordsareareaccessed
accessed(or(orlocated)
located)using
usingdifferent
different matching
matchingoperation
operationfunctions
functionscorrectly,
correctly, butbutif ifeither
either
Microfilm is often used as an alternative to the printer. 1 State which of the following output is hard-copy methods.
methods. the
thetransaction
transactionororthe themaster
masterfilefileis isunordered,
unordered, record
record
The output is ‘printed’ on a roll of film (computer output or soft-copy output: matching
matchingcannotcannotwork.work.
output microfilm) or sheet of film (computer output
a human-readable
b machine-readable.
Master
Masterand
andtransaction
transactionfiles
files
microfiche) rather than paper. In addition to being Many
Manybusinesses
businessesandandorganisations
organisationsregularly
regularlyaccess,
access,
2 Give an example of a document that is machine-
faster, this method also condenses large stacks of paper modify
modifyand andstore
storelarge
largeamounts
amountsofoffiles.
files.
These
Thesefiles
filesareare
readable.
given
givenspecial
specialnames
namestotoidentify
identifytheir
theirpurpose.
purpose. AAmaster
master
file
fileis isa permanent
a permanentfile filewhich
whichis iskept
keptup-to-date.
up-to-date. ItIt
stores
storesthe themain
maininformation,
information, summary
summarydata dataandandkeykey
fields
fieldsininthe thedata.
data.

The
Themaster
masterfile
filecontains
containstwo
twotypes
typesofofdata:
data:
◆ ◆permanent
permanentdata,data,
such
suchasasemployee
employeepersonal
personaldata,
data,
payroll
payrolldata
dataemployee
employeestatus
statusandandjob
jobtitle
title
◆ ◆temporary
temporarydata,
data,
which
whichis isupdated
updatedonona regular
a regularbasis,
basis,
FigFig
2.11
2.11
Updating
Updating
a master
a master
filefile
withwith
a transaction
a transaction
filefile
such
suchasashours
hoursworked
workedand andtaxes
taxesdeducted.
deducted.
There
Therearearethree
threepossibilities
possibilitieswhen
whenupdating
updatinga master
a master
AAtransaction
transaction file
fileis isa temporary
a temporaryfile filewhich
whichis isused
used
file:
file:
totoupdate
updatethe
themaster
masterfile fileafter
aftera certain
a certaintime
time(at(atthe
the
endendofofeach
eachdaydayororweek,
week, forforexample).
example). The
Thetransaction
transaction 1 1Transaction
Transactionrecord
recordkey
keyis islesslessthan
thanthe
themaster
masterfile
file
file
fileupdates
updatesthe
themaster
masterfile. file.
TheTherecords
recordsininthe
the record
recordkey.
key.
transaction
transactionfilefileareareused
usedtotoperform
performthree
threeimportant
important The
Thetransaction
transactionrecord
recordis isadded
addedtotothe themaster
masterfile.
file.
operations:
operations: Next
Nexttransaction
transactionrecord
recordis isread.
read.

48 4949

843716_CSEC_IT_CH02.indd 48 21/12/2018 09:36 843716_CSEC_IT_CH02.indd


843716_CSEC_IT_CH02.indd
49 49 21/12/2018
21/12/2018
09:36
09:36
2 Information processing 2.4 File organisation and access

2 Transaction record key is equal to the master file is, they have not been sorted into any particular order. Summary of reading, writing and sorting the same order improves the efficiency of the updating
record key. Examples of serial files (also called unordered files) for sequential files process.
The master record is deleted or updated. include unsorted invoices for customers for the day,
Read access To amend a record in a sequential file:
Next transaction record is read. and a typical shopping list. Serial files can be stored
◆ Records are read from the beginning of the file until
3 Transaction record key is greater than the master on tape, disk or in memory. A serial file is used mainly 1 All the records with a key value less than the record to
the desired item is found
record key. for backup purposes. Recording data in the order in be amended are read and then written to the new file.
◆ If accessing a record, access time is increased to read
No more transactions for this master record. which transactions are made is also useful if you need the entire file or many records but decreased if few 2 The record to be updated is read, any changes are
Write master record to new master file. to restore transactions that have been lost from the records are to be accessed applied to it and the updated record is written to
Read next master file record. master file through hardware or other problems. Write access the new file.
◆ Adding records to the end of the file is easy (may re- 3 Finally, all the remaining records are written to the
Processing errors Unordered file Ordered file
quire sorting). However, it is difficult to add or delete new file.
Record M Record A
Table 2.3 lists some errors or situations which can data in the middle of the file.
Record H Record B Deleting a record
occur during processing. Sorting
Record B Record G With both types of files, the only way to delete records
Table 2.3 Error messages during file processing
◆ Sequential files are often sorted on the record key to
Record N Record H is to create a new file which omits the records marked
make processing simpler. However, sorting can be
Situation Error time consuming for large files. for deletion.
If the master file encounters No data found A sequential file is one in which the records are stored
an ‘end of file’ marker in the in sorted order on one or more key fields. Examples of To delete a record in a serial file:
transaction file, then there is sequential files include invoices for customers sorted Adding a record
1 Compare each record with a key value of the record
no data on which to update on customer number, and class registers sorted on last For serial files, you simply add the new record to
the master file to be deleted (since the transaction file is not sorted).
name. Magnetic tape is sequential by its very nature, the end of the file. However, the major purpose of
If you are searching for a Record does not exist or 2 If it is not the record to be deleted, then write that
just like listening to a cassette tape or watching a sequential files is to preserve the ordering of the file.
record to update or delete in invalid primary key in the record to the new file.
movie. To access a particular section or continue from This means that the record must be inserted into the file
the master file, and it is not transaction record. If you 3 When the record to be deleted is encountered it is
where you left off, you must start at the beginning and in the correct position and not at the end of the file as
found reach the end of the master not written to the new file.
file before the end of the scan forward until you reach the specific one. with serial files. Also, you cannot just insert all changes
4 Finally, all the remaining records are written to the
transaction file, then either to records in sequential files into the existing file – you
Searching for a record new file.
you are adding new records must create a new file that contains the inserted records.
in the transaction file to the To search for a particular record, all the preceding To delete a record in a sequential file:
master file, or you are not The algorithm for adding a record is:
records must be read. The main drawback to inserting,
updating the most current 1 All the records with a key value less than the record
deleting or amending records in both serial and 1 All the records with a key value less than the record to
master file, or your master file to be deleted are written to the new file.
may be corrupt sequential files is that the entire file must be read and be inserted are read and then written to the new file.
2 When the record to be deleted is encountered it is
If you are searching for a Trying to add a record that then the records written to a new file. Since disk access 2 The record to be inserted is written to the new file.
not written to the new file.
location to add a record in already exists is slow, computer time is wasted even if only a few 3 Finally, the remaining records are written to the
3 Finally, all the remaining records are written to the
the master file, and you find records are involved. For instance, if 10 records are to new file.
new file.
the record be added into a 1000-record file, then 1000 records will
have to be read from the old master file and after the Updating a record

Serial and sequential file 10 insertions from the transaction file, 1010 records are Updates are normally done using magnetic tape in Direct access file organisation
written to the new master file. It therefore takes a long batch mode. All the updates are gathered together into A direct access file, also called a random access file,
organisation time to insert a new record with serial organisation. a transaction file, and then applied to the master file allows access to a particular record in the file using
Serial file organisation is the simplest type of file To maximise efficiency of processing, use sequential together. Updating, therefore, is again accomplished by a key. This makes it much easier to find, read, delete,
organisation. The records are arranged one after organisation, where the records are arranged in order by creating a new file which contains the updated records. update and insert records. The file is organised like a
another, in the order in which they were added. That the value of the key field common to all records. Sorting the master file and transaction file records in one-dimensional table on disk where each record is a

50 51

843716_CSEC_IT_CH02.indd 50 21/12/2018 09:36 843716_CSEC_IT_CH02.indd 51 21/12/2018 09:36


2 Information processing 2.4 File organisation and access

part of the table. The record number acts like a table organised in ascending order and stored on disk. The In spite of the double file access (index + data) needed Summary of index sequential access file
index to allow you to find the records. primary key in the table is used as an index to the by this kind of search, the decrease in access time with organisation
record. It is just like the index of a book where the key respect to a sequential file is significant. Instead of having an index entry for each record,
You can access a record directly or randomly by ◆
value (topic) has a pointer to the storage location (page have an entry for each block of records starting
calculating its location using a mathematical formula
number) where the information is stored. 12 Apples from the lowest or highest record.
and going directly to the record. For example, when
you input an ID number, the mathematical formula Many applications require a mix of sequential and Index Highest key
13 Bananas ◆ Leave spaces in each block to allow for easy
uses it to produce a value that points to the storage direct processing of records. Consider a file containing 1 15
15 Cherries insertions.
location on disk where the record can be found. customer accounts with three fields: ‘Account Number’, 2 18
Table 2.4 summarises methods of access to a record for
‘Credit limit’ and ‘Balance’. Every time a customer 3 24
a variety of file structures.
Direct access files also support sequential access by 19 Cups
wants to make a purchase, his or her credit limit and 4 30
allowing the records to be read one after another. 21 Forks Table 2.4 Searching for a record can be achieved through
balance must be checked; this requires individual
The records in a direct access file are not sorted in 23 Plates various file organisations
access to his or her record. Every month, a statement
ascending or descending order, but are stored in File structure Structure Access method
must be produced for each customer; this requires Fig 2.12 Index sequential file access
random order. name details
sequential access to the whole file.
Serial file Unordered Sequential access
With hard disks, direct access is possible. With an
An index is a special file of records with two records
audio compact disk, for example, you can play the Sequential file Ordered Sequential access
attributes: record key and the storage address of the
songs in random order or go directly to the track you records
corresponding record in the indexed file. A partial
want to hear. However, not only must the medium Partially Ordered Sequential access to index,
index containing the highest or the lowest key
allow for random access to records, but the file itself indexed file records followed by direct access to
value in each block of records is useful when the
must be organised so that you can go directly to the first record in the group, then
index itself is organised sequentially. Ideally, you want sequential access to find the
record you want to retrieve. This can be compared to
to have the index in main memory. Then you can desired record
sequential organisation, as on a magnetic tape. You
search the index quickly to obtain the storage address, Fully indexed Unordered Sequential access to the index,
have to start at the beginning and run the tape forward
and then retrieve the required record in a single disk file records followed by direct access to the
until you get to the song you want to hear.
access. data file
Direct access Unordered A calculation provides the address
Summary of direct access file organisation Searching for a record file or ordered (location) of a record, followed by
Fig 2.13 Supermarket aisle signs are similar to index sequential searches records direct access to the record
This organisation is best for: The search key is compared with the index keys to find
◆ files which seldom change in size the highest index key that comes before the one you
◆ files which require frequent updates are searching for. Then a linear search is performed
◆ single record enquiries and updates from there onward, until the search key is matched or
◆ processes which require fast access to records until the record pointed to by the next index entry is Questions
◆ storage of master file records on direct access media reached. 1 Write the connection between a field, record and file. 4 State the type of file organisation for each of the
only (such as hard disks) 2 Why are master and transaction files needed in most following descriptions:
For example, suppose you are in a supermarket where
accessing disk file records sequentially or directly. businesses? a records arranged one after another, in the order

the items are stored on the shelves in alphabetical
3 What is the special name given to the field that in which they were added
If processed directly, they need not be processed in order. order (Fig 2.12). You wish to find forks. Instead of b records stored in sorted order
normally identifies a record?
walking up and down each aisle, you look up at the c records stored in random order
listing (index) of what is in each aisle. This tells you d records stored with directory-type listings to
Index sequential file organisation which aisle to walk down to find the forks. You know denote location.
An indexed file is used to speed up the key search to stop looking once you have found forks on the
in a file. You can think of it as a one-column table listing (Fig 2.13).

52 53

843716_CSEC_IT_CH02.indd 52 21/12/2018 09:36 843716_CSEC_IT_CH02.indd 53 09/01/2019 13:10


2.5
2.5 Information
Informationprocessing
processing 2.5 Information processing

Banking
The
Theprocessing
processingofofdata dataintointoinformation
informationoccursoccurswhenwhen forforgoods
goodsand
andservices,
services,
communication,
communication, and
andthe
the Computers are used to keep track of all bank
a machine
a machineororprocessor
processoracts actsononthe
theinput
inputit itreceives.
receives. exchange
exchangeofofinformation
informationwithwithother
otherpeople
peoplearound
aroundthe
the transactions. Customer accounts need to be updated
AnAnexample
exampleofofthis thisis isananelectric
electrickettle
kettlewhich
whichsenses
senses world.
world. every time a payment transaction is made whether by
when
whenthe thewater
watertemperature
temperaturereaches reachesboiling
boilingpoint
pointand
and cheque, card or EFT (electronic funds transfer) at the
Table
Table
2.52.5
Advantages
Advantages
and
and
disadvantages
disadvantages
ofof
information
information
switches
switchesoff.off.
AAcarcarproduction
productionline linecan
cansense
sensewhenwhen point of sale (EFTPOS) is useful for customers in a
processing
processing
a car
a carbody
bodyis isinina certain
a certainposition
positionand andthen
thenactacttoto shop. The bank card is inserted into a reader attached
Advantages
Advantages Disadvantages
Disadvantages
weld
weldtogether
togetherthe therelevant
relevantpartspartsofofa car.
a car.
Information
Information to the point of sale (POS) terminal. The payment is
◆ ◆Tasks
Taskscan can
bebecompleted
completed ◆ ◆It may It may need
need a high
a highinitial
initial
processing
processingis isonly onlyvaluable
valuableif ifthetheinformation
informationcan canbebe then made directly from the customer’s bank account
faster
fasterbecause
because data
data investment
investment in in
equipment
equipment
stored
storedandandretrieved
retrievedquickly,quickly,accurately
accuratelyand andefficiently
efficiently andandinformation
information cancanbebe and
and training.
training. to that of the shop. The procedure is as follows:
and
andcannot
cannotbebechanged
changedaccidentally.
accidentally. processed
processed at at
amazing
amazing ◆ ◆More
More money
money maymaybebe
1 The cost of all of the items to be purchased is added
Fig 2.14 Using a bank card in a reader attached to a point of sale terminal
speeds.
speeds. needed
needed totoemploy
employ
up, usually on a computerised cash register.
Setting
Settingupupananinformation
information ◆ ◆Computer
Computer storage
storage devices
devices specialised
specialised staff
staff
toto
2 The customer presents his or her debit or credit card
Payroll example
processing
processingsystem
system cancanstore
store
enormous
enormous operate
operate andanddesign
design thethe
to the shop assistant.
Input: This may come from a database of employees’
amounts
amounts ofof
datadataand
and information
information processing
processing
Before
Beforesetting
settingupupananinformation
informationprocessing
processingsystem,
system,
aa details, such as salaries, pay rates, bonus rates if
information
information forfor
future
futureuse.
use. system.
system. 3 The card is inserted so the chip can be read or
business
businessshould
shouldconsider
considerthe
thefollowing
followingquestions:
questions: employees are paid by the hour, then timesheets would
◆ ◆Automation
Automation cancanbebe ◆ ◆Some
Some jobs
jobsmaymay bebe swiped through a magnetic strip reader to input the
introduced.
introduced. That
Thatis,is,
tasks
tasks lost
lost
asas a result
a resultofof be used to input and validate the number of hours
◆ ◆Will
Willcomputerisation
computerisationreally reallysolve
solvethetheparticular
particular card number and expiry date to a computer.
cancanbebe completed
completed with
with computerisation,
computerisation, which
which worked and number of hours overtime, possibly using
problem?
problem? 4 The card number, payment amount and identity of
little
little
human
human intervention.
intervention. may
may lower
lower thethe
morale
moraleofof OMR or OCR techniques.
◆ ◆IsIs
it itcost-effective
cost-effectiveininthe thelong
longterm?
term? the company that has sold the goods are sent to the
◆ ◆Management
Management cancananalyse
analyse staff
staffmembers.
members.
◆ ◆How
Howlarge largeis isthe
theamount
amountofofdata datatotobebehandled?
handled? newnew information
information and
and ◆ ◆Some
Some staff
staff
mustmustbebe bank’s computer using a modem and telephone line. Processing: Using a software application such as a
◆ ◆IsIs
high
highprocessing
processingspeed speedreally
reallyimportant?
important? trends
trends more
more quickly.
quickly. trained
trained ororretrained.
retrained. 5 The customer types a four-digit personal spreadsheet or more complex accounting software the
◆ ◆Can
Canthe thepresent
presentstaffstaffmanage
managethe thesystem?
system? ◆ ◆Data
Data andandinformation
information ◆ ◆Face-to-face
Face-to-face interaction
interaction identification number (PIN) on the keypad and computer then needs to calculate the gross amount
◆ ◆Will
Willthe thechanges
changescaused causedbybycomputerisation
computerisationlowerlower
cancanbebe shared
shared with
with other
other between
between staff
staff
maymaybebe presses the enter key to continue the process. earned by each employee, any bonuses, any deductions
computers.
computers. reduced.
reduced. 6 The bank’s computer looks up the customer’s
the
themorale
moraleofofstaff staff
?? such as tax, national insurance, etc. and hence the net
◆ ◆How
Howcan canthetheloss
lossofofjobs
jobsbebehandled
handledproperly?
properly? account details in an accounts database. amount earned by each employee.
◆ ◆What
Whatcan canbebedonedonetotohelphelpstaff
staffadapt
adapttoto Health
Healthcare
care 7 If the card is valid and the customer has enough
money in his or her account then the payment is Output: The computer would need to print pay-slips.
computerisation?
computerisation? Information
Informationprocessing
processingininhealth
healthcare
caremay
maybebeused
usedto:to:
approved. Use an impact printer if the pay-slip is required in
maintain
maintainpatient
patientrecords
recordsininhospitals
hospitalsandandclinics
clinics
Examples
Examplesofofinformation
information ◆ ◆
8 The money is transferred electronically from the duplicate for the employee’s signature, or a non-impact
◆ ◆monitor
monitorpatients’
patients’
vital
vitalsigns
signsininhospital,
hospital,andandatat customer’s bank account to the company’s bank printer otherwise. Update the employee database using
processing
processing home
home account. a database integrated with the accounting software.
Information
Informationprocessing
processingcan canbebedonedoneininalmost
almostallall ◆ ◆perform
performcomputer-assisted
computer-assistedmedical medicaltests
tests Output details of payments to a banker’s automated
sectors
sectorsofofbusiness.
business.
ItItis isalso
alsobecoming
becomingincreasingly
increasingly ◆ ◆research
researchand anddiagnose
diagnosemedical
medicalconditions
conditions Sometimes the magnetic strip reader cannot clearing service to pay money directly into employees’
popular
popularatathome
homewhere
wherebills billscancanbebepaid
paideither
either ◆ ◆operate
operateimplanted
implanteddevices
devicessuch suchasaspacemakers
pacemakers automatically read the card number from the card. If the bank accounts using electronic commerce. Print
bybyphone
phoneororononthe
theInternet.
Internet. Other
Otherpeople
peopleuseuse which
whichallow
allowpatients
patientstotolive livelonger
longer magnetic strip has been damaged, then the sales assistant summary reports.
information
informationprocessing
processingforforresearch
researchand andeducation
education ◆ ◆control
controlsurgical
surgicalinstruments
instrumentsduring duringoperations
operationsthat that can enter the card number using a small keypad.
through
throughonline
onlineclasses
classeswherewhereassignments
assignmentsand andreports
reports require
requiregreat
greatprecision,
precision, forforexample
examplelaser
lasereye
eyesurgery
surgery Library
can
canbebesubmitted
submittedelectronically.
electronically. InInfact,
fact,
anyone
anyone and
andheart
heartsurgery
surgery Payroll While travelling to a library to borrow books may be a
can
canuse
usethe
theInternet
Internettotofindfinda wealth
a wealthofofinformation
information ◆ ◆enable
enable‘telemedicine’
‘telemedicine’ through
throughcomputers
computerswith withvideo
video A payroll system uses an information processing regular activity for many students, libraries have been
such
suchasascurrent
currentaffairs
affairsnews,
news, stock
stockprices,
prices,educational
educational conferencing
conferencingcapabilities
capabilities system to calculate the wages of each employee, adjusting their collections, services and environments
materials,
materials, online
onlinebanking
bankingand andinvestments,
investments, shopping
shopping ◆ ◆train
trainsurgeons
surgeonsbefore
beforetheytheyperform
performsurgery.
surgery. print out pay-slips and record the information for for the digital world. Most university libraries provide
accounting purposes. online access for their staff and students via an

5454 55

843716_CSEC_IT_CH02.indd
843716_CSEC_IT_CH02.indd
54 54 21/12/2018
21/12/2018
09:36
09:36 843716_CSEC_IT_CH02.indd 55 21/12/2018 09:36
2 Information processing 2.5 Information processing

e-information portal. This allows users to search online a button. In the sitting room, remote-control work the output devices. The purpose of the interface is to The number of people needed in such areas of work
databases for e-journals, e-books, and articles in the televisions, video recorders and audio systems have make all parts of the system work with each other. has changed and usually been reduced. The skills the
online, digital or e-library. In some cases, users can also built-in control systems. workers need have also changed. Rather than doing
The processing unit in a control system may be a
search for and request a paper-based version of the ◆ All modern cars have a management system which the repetitive tasks themselves, they now keep the
computer which has a program built into it. It will
article and then travel to collect it if it is available. tells the engine what to do. This can control the flow machinery running and monitor activities.
usually not be like the computers that you use, where
of fuel to the engine and stops the engine from going you change the program by loading a new program
Library example too fast. Remote-control locks respond to a signal Industry example
Input: After logging in to the online library, the user from disk. The processing unit has a resident program Input: Sensors take readings at regular time intervals
from the key to operate the locks on the doors. in its electronic circuits. Such a system is called an
can search for an article in an online database by ◆ Buildings with air conditioning have sensors which and send the readings to the computer. Sensors may be
entering information such as a subject, the name of an embedded controller. Embedded controllers have only measuring temperature, pressure, liquid flow rate and
detect the temperature and humidity inside the one program in their electronics to do the job they
author or the title of a journal or article. buildings and turn the heating or air conditioning on so on.
were designed to do. This makes them much cheaper
Processing: The library’s online databases would have or off when needed. to make because they do not need disk storage devices, Processing: The computer analyses the readings and
files (tables) containing details about the books, a keyboard, a mouse or a screen. Once the system has decides whether action needs to be taken.
magazines and journals in the library. The system uses been tested to make sure that it behaves as it should,
Output: The computer sends output signals to devices
the key terms entered to conduct the search. these elements are not needed. The outputs will be the
which manage the process to increase pressure or
things that are being controlled, not a screen.
Output: The e-library may show different options to temperature, for example. Some systems use an
view the texts. For example, if a book is available for Status display actuator, which is a device that reacts to a computer
Micro processor
online reading, then you may be able to download it as board O
signal and operates a simple device such as a tap, motor
I
a PDF document or read it in your browser, with special N
U or switch to regulate liquid flow.
T
e-reader software or a Kindle device. Some online P CPU P
U RAM
ON Most of these systems use feedback, where the output
content offers audio features for the visually impaired or T
U
S
OFF T affects the input.
is formatted to deliver book page images. Some online ROM PAUSE S
Automatic door
libraries also provide links to other e-libraries and may
Program stored here Weather forecasting
indicate if a hard copy is available. Fig 2.15 Control systems are around us all the time Sensors to detect approaching Some of the world’s most powerful computers are used
people (inside and outside)
Control systems In these examples many of the sensors have digital to forecast the weather, which improves the accuracy
Sensor to detect people
outputs. In the traffic lights example, the embedded of forecasts. People who rely on these forecasts include
You are surrounded by computer control systems but between doors
sensor that detects an approaching vehicle needs only television companies, shipping companies, farmers, the
probably do not know it. Here are some examples of Door control motor
to know whether a vehicle is there or not. So an military and outdoor sports organisations. Computer
control systems. Fig 2.16 A typical control system looks like this. Note that it does not have a
on/off digital sensor is adequate. A digital temperature screen, disk or keyboard. The program is stored in ROM systems are also used to track hurricanes and tornados,
◆ Traffic lights are triggered by movement sensors or sensor would only be able to tell the system that the monitor global warming, and monitor the ocean for
the vehicle interacting with the sensor embedded environment is hot or cold. It would not be able to tell Industry systems of currents such as El Niño. Automatic data
in the road (Fig 2.15). A traffic light control system the system how hot or how cold it is. Sometimes, in industry, a whole manufacturing process recording for weather forecasting has several advantages:
would not be very useful or safe if it did not respond The processing of information is usually integrated into is controlled automatically by a computer system. ◆ It is more accurate than manual data collection.
adequately to the oncoming vehicles and stop a control system which has sensors to input information, Computer manufacturing systems do many tedious and ◆ Computer data can be collected continuously
the traffic! To do this, there has to be a computer a processing unit (computer) which decides how to repetitive tasks. In electronic circuit production, the whereas humans may get tired, and it can also be
program which is constantly looking at the data respond to the inputs, and output devices which do what components are automatically put in the right place on collected in situations not safe for humans.
from the sensors and making decisions about what is required. A control system also needs an interface unit the circuit boards and then automatically soldered into ◆ It is extremely fast. Computers can easily take
the output device (the traffic lights) should do. between the computer and the input sensors and the position. The speed and accuracy at which these machines thousands of measurements in a second. This means
◆ In the kitchen, microwave ovens, washing machines output devices. This unit turns the signals from the sensors work are greater than those of skilled workers. The danger that events which could not be measured by a
and tumble dryers all have control systems inside into something that the computer can understand, and to the workers from the heat generated by soldering is person can now be recorded for analysis later.
them to make them do their job at the press of the signals from the computer into something that will removed by having automatic soldering systems.

56 57

843716_CSEC_IT_CH02.indd 56 21/12/2018 09:36 843716_CSEC_IT_CH02.indd 57 21/12/2018 09:36


2 Information processing 2.5 Information processing

Table 2.6 Sensors and their applications finished goods they make. The task of recording and ◆ Goods must not be overstocked. By keeping stocks
Sensor Quantity measured Application maintaining stock levels is called stock control. to a minimum, a business can limit the amount of
Temperature sensor How hot/cold it is Monitoring the temperature in an oven money invested in stock and also reduce the risk of
Light sensor How light/dark it is Turning street lights on when it is dark stock deteriorating before it can be sold. Minimum
pH sensor The acidity of a liquid Monitoring water pollution stock levels also reduce storage costs such as
Proximity sensor Detects how close an object is to Detecting how close a vehicle is when its driver is warehousing, heating, lighting and security.
another object reversing near to a wall
Pressure pad If a pad is being pressed Detecting cars arriving at traffic lights A real-time stock control system
Button If the button is being pressed Obtaining a ticket to a paid car park Input: The operator at a POS terminal only needs
Light gate Detects an object passing through the gate Measuring the speed or acceleration of objects to pass the barcode on each item past a laser scanner.
Passive infrared (PIR) Detects when a warm object moves into an area Activating a burglar alarm if someone enters a room The scanner reads the code number stored in the
barcode and sends it directly to a computer. The
Weather forecasting example balloons, aircraft, radar, weather ships and automatic computer checks the code and, if it is valid, looks
Input: Millions of pieces of data (observations such weather buoys. All these readings are sent to the up the product’s name and price in data files held on
as temperature, pressure, humidity, infrared radiation) respective meteorological office’s computer systems. disk. The name and price are sent back to the POS
are collected from satellites, weather stations, weather terminal.

In this way the POS terminal can print out an


itemised receipt. Note that with POS systems,
Two-way
prices are usually only marked on shelves and not on
Hubble Space communications individual items, which can cause customer confusion.
Telescope Tracking and data
relay satellite Each terminal has a keypad or keyboard that can be
used if a barcode cannot be read.
Two-way
communications
Processing: As each item is sold, the stock files are
TDRS space
updated so that customer service can be much quicker,
to ground link
Two-way reducing queues. Few mistakes can be made in charging
communications customers. Prices can be changed easily. A fully itemised
White Sands
complex bill can be provided for the customer. No staff are
in New Mexico needed for counting stock on shelves.
Fig 2.18 A point of sale terminal
Output: Orders are printed when stock levels reach a
A stock control system must keep an up-to-date
International re-order point. Customer receipts are printed using
Space Station record of all the stock held and place orders for fresh
thermal printers.
deliveries if stock runs low. Large shops, supermarkets
Fig 2.17 Data is collected from satellites orbiting the earth and factories use computerised stock control systems.

Stock control is important as: Questions


Processing: The data is stored in a large database. The Output: The forecasts are normally produced as global 1 Give an example of the processing required to
first task is to perform a quality control check on the and local charts of weather information. ◆ Adequate stocks must be maintained to supply determine if a customer’s bill is overdue.
data (validation) and to reject all invalid readings. a customer with goods with minimum delay. If 2 Give three examples of data that sensors can be
Supermarket stock control customers find goods are regularly out of stock they used to measure.
The data is formatted to fit in with a numerical model will go elsewhere.
Most businesses need to hold stocks of goods.
of readings. From this computer model, forecasts can
Shops need to hold stocks of goods they sell, and
be made. The bulk of processing is ‘number-crunching’
manufacturers need to hold stocks of raw materials and
and solving thousands of inter-related equations.

58 59

843716_CSEC_IT_CH02.indd 58 21/12/2018 09:36 843716_CSEC_IT_CH02.indd 59 21/12/2018 09:36


22 End
Endofofchapter
chapterexam-style
exam-stylequestions
questions 2 End of chapter exam-style questions

12 Aaron uses a login screen as shown below: d The four statements below show the different
descriptions during the experiment when
Multiple
Multiplechoice
choicequestions
questions 7 7A A__________
__________ filefile
is is
a temporary
a temporary filefile
which
which
is is
used
used
toto completing the sheet. Match each of the
1 1The
Themanipulation
manipulation
ofof
data
data
toto
obtain
obtain
information
information
is is __________data
__________data ininthethe
main
main
file.
file. descriptions with the most suitable term from
called:
called: i itransaction,
transaction,
delete
delete the list below:
a a input
input ii iitransaction,
transaction,
update
update Terms: source document/turnaround document/
b boutput
output iiiiiimaster,
master,
delete
delete machine-readable document/soft copy/hard copy
c c processing
processing ivivmaster,
master,
update.
update. Statements:
d dstorage.
storage. i The blank sheet before the student writes in
8 8ToTo
find
finda record
a record
inin
a file
a file
using
usinga sequential
a sequential search,
search, results from the experiment.
2 2Information
Information that
that
represents
represents
a ‘whole’
a ‘whole’
picture
picture
ofof
aa repeatedly
repeatedly __________
__________ a record
a recorduntil
until
the
the
required
required ii The sheet is scanned and saved as a PDF file.
problem
problem oror
solution
solutionis:is: record
record is is
found.
found. a Give two types of applications that would require iii Results from the data on the sheet are used to
a a accurate
accurate a a read
read a user to log on. produce a set of charts which are viewed on a
b bcomplete
complete b bsavesave b Describe two security measures used on the monitor.
c c relevant
relevant c c write
write screen displayed. iv The completed sheet and charts are printed.
d dtimely.
timely. d dupdate.
update. c Explain why the password must be entered twice. e A teacher needs to print 70 copies of the sheet for
d Explain whether re-entering the password twice is the next class.
3 3A A
__________
__________ check
check
compares
compares the
the
contents
contents
ofof
twotwo 9 9A A
fully
fully
indexed
indexed filefile
contains
contains
the
the
record
record
key
key
and
and
the
the an example of verification or validation. i Explain which type of printer would be
oror
more
morefields
fields
toto
make
makesure
sure
that
that
they
theymake
makesense.
sense. storage
storage address
address ofof the:
the: e Explain two messages that the system could show suitable for this task.
a a consistency
consistency a a average
average key
keyvalue
value based on the information entered by the user. ii No pages are being printed, even if the
b brange
range b bexact
exact keykeyvalue
value f After Aaron has entered his username and teacher selects the print icon repeatedly.
c c data
data
type
type c c highest
highest keykeyvalue
value password, he needs to press one of the two Explain two possible causes of this problem.
d dformat.
format. d dlowest
lowest keykey
value.
value. buttons on the screen to continue. What type of 14 Consider the following illustration of a supermarket,
screen is Aaron using? where items are placed in aisles:
4 4Hardware
Hardware errors
errors
can
can bebe
caused
causedbyby
any
any
ofof
thethe 1010TheThe access
accessmethod
method that
thatcalculates
calculates
the
the
exact
exact
address
address 13 A student enters the following data from an Aisle Locator Item #
following,
following,
except:
except: (location)
(location) ofof
a record
a record
is is
most suitable
most suitable
forfor
which
which
type
type experiment on a sheet that contains the headings
ofoffilefile
structure?
structure? 1 35 25 – Carrots
a a bad
bad
sectors
sectors
onon a hard
a hard
disk
disk and instructions on what to enter: 27 – Cucumber
b bcorrupt
corruptRAM
RAM a a serialserial
Results sheet 29 – Lettuce
c c power
power surge
surge b bsequential
sequential
32 – Sweet pepper
c c fully fully
indexed
indexed Experiment Start End Temperature
d dprogram
program malfunction.
malfunction. 2 50 38 – Disinfectant
d ddirect directaccess.
access. number temperature temperature difference
40 – Liquid soap
1 40 50 110
5 5Which
Which ofof
the
the
following
following
checks
checks
is is
used
used
toto
detect
detect Short
Shortanswer
answerquestions
questions 43 – Scrub buds
doubtful
doubtful data?
data? b 50 65 15 47 – Sponges
1111A A
data
data
logging
logging system
system is is
used
used totorecord,
record, atat
specific
specific 3 52 68 Yes
a a length
length intervals,
intervals,the
the
temperature
temperature ofof
thethewater
water inin
anan a State the path taken to locate the:
b brange
range aquarium.
aquarium. a Three errors were made in the results sheet. i lettuce ii sponges.
c c data
datatype
type a a State
State one
oneitem
itemofof
hardware
hardware that
thatcancanbebe
used
usedtoto Explain these errors. b Suppose you were looking for item #30 (ginger).
d dreasonableness.
reasonableness. capture
capture the
thetemperature
temperature readings.
readings. b Explain each of the following checks as it relates i State the aisle and locator that you would
b bExplain
Explain what
what the
the
logging
logging system
system could
couldoutput
output if if to the results sheet above: choose and the item # that would indicate
6 6AnAnarea
area
code
codemust
mustcontain
containthree
three
digits
digits
only.
only.
The
The the
the
temperature
temperature ofofthethewater
water is is
tootoohigh.
high. i data type check whether it is there or not.
following
followingchecks
checks
areare
suitable,
suitable,
except:
except: c c Describe
Describe oneone advantage
advantage ofofmonitoring
monitoring the
the
water
water ii range check. ii What does the number of the locator
a a data
data
type
type using
using this
this
data
datalogging
logging system.
system. c Describe how the student could confirm that the represent?
b bformat
format data from the table is equivalent to the data on c Explain whether this is an example of direct,
c c length
length the sheet. sequential or index-sequential file organisation.
d drange.
range.

6060 61

843716_CSEC_IT_CH02.indd
843716_CSEC_IT_CH02.indd
60 60 21/12/2018
21/12/2018
09:36
09:36 843716_CSEC_IT_CH02.indd 61 21/12/2018 09:36
Reinforce learning with the Workbook View a copy of the book or place your order

2
What’s on the Contact your local bookstore:
Information processing online support?
Data and information l Answers to the End of
1. Consider the following comparison of readings. Chapter Exam-style questions
26°C
29°C 30°C
l Additional Exam-style questions with
sample answers and examiner analysis
l Interactive Paper 1 multiple choice test,
Practice Paper 2, worked SBA Paper 3,
with advice on online marking, SBA
a. What is the general name of the three objects in the figure? alternative Paper 3
b. Explain the difference between data and information.
l Answers to Workbook questions
c. Write two examples of data.
d. Describe a source of data shown in the figure. l Comprehensive glossary of terms
e. Write a statement of information based on the figure.

2. The object shown here is used to represent information about


Student
Available in the series
a product. This barcode data is read and the information is
recorded and interpreted by a device each time a product is
purchased. The manager receives a weekly report on the sales of Book and Study
the products from the computer system.
a. State the name of the object. Guide also
b. Give two examples of products that could have this object on them. Information processing
Information Technology CSEC® - Third Edition available as
c. Describe a hardware device used to extract the data from this object. Methods of data capture eBooks
1. A student shades certain areas on a sheet to represent his responses to a set of
d. Explain whether the object represents direct data input or manual data input at the questions.
point of sale.

e. State two items of information the object may store. NEW


f. State two items of information that the weekly sales report may contain.

10

9780198437208_Ch02.indd 10 27/12/18 3:00 PM

a. Indicate which of the following terms matches the descriptions:

Additional practice in the human readable document turnaround document source document
machine readable document
Workbook extends the skills
i. A sheet that has not yet been shaded is an example of a
students have learnt in class.
ii. The sheet after the student has marked his responses is an example of a

iii. The sheet with responses marked, submitted to the machine, is an example of a Student Book Workbook Study Guide
iv. The machine prints the numbers as a table and plots them on a chart. These 978 019 843716 1 978 019 843720 8 978 019 843721 5
results are examples of a

Student Book eBook Study Guide eBook


b. State the input device that is used with this type of sheet.
c. Describe how the student could confirm that the data from the printout is equivalent 978 019 843719 2 978 019 843724 6
to the data on the sheet.

d. Describe an error that the student could have made when shading the answers on
the sheet.

K45260

11

9780198437208_Ch02.indd 11
Sample pages from IT for CSEC© WorkBook, Unit 2
27/12/18 3:00 PM
Web www.oup.com/caribbean Oxford Caribbean Education

You might also like