1 Data Processing and Information
1 Data Processing and Information
direct data is data that has been collected from the source for a specific purpose and
used for only that purpose
indirect data is data that is obtained from a third party and used for a different purpose
than that which it is was originally collected for
electoral registers: It’s a record of citizens that are eligible to vote in an election, it
contains a list of their personal data such as legal name, address, contact information,
etc. Some of the is data removed from open version of the register which is accessible
to organizations and public for certain use depending on the local laws.
businesses collecting info when used by third parties: Businesses sell the information
that they collect from their customers. For example when someone purchases
something online they are often asked to tick a box authorising the business to share
this with other organisations. Customers often provide personal information that has a
commercial value. Businesses use this information to create mailing lists that can be
purchased by any other organisation/individual to send emails or even brochures
through the post.
Note: business collect the data from customers as direct data for shipping their
products/providing services etc, this data can be purchased by third parties hence
considered as indirect data now, it can be used to for targeting required audience
(customers) / analyzing buying trends etc.
It can take a long time to gather data than to acquire data from already existing indirect
data source
Larger samples can be difficult to collect.
Can be more expensive than indirect data due to the preparation and gathering of
required data; such as producing questionnaires or buying additional equipment such
data loggers
Data might be out of data when the project is completed
accuracy:
If the data collected is inaccurate, the information after processing will be inaccurate
and hence of bad quality. Misspelling words or misplacing characters could lead to
inaccuracy, i.e 10:30 am for 10 o clock at night
relevance:
Data must be relevant to the purpose, irrelevant data needs to be removed before
processing for better quality information, i.e; being given a bus timetable when train
timetable is required
age:
Information must be upto date, old information will be irrelevant and inaccurate and
hence of bad quality, i.e, not updating family registers will make the emergency contacts
incase of emergency useless due to outdated information
level of detail:
Information must be of required level of detail. Too much detail will make it difficult to
extract necessary information and too little detail will not provide the information
needed
completeness:
Information must be complete and have all required information to be of good quality,
if not it can’t be used properly for a particular purpose, i.e not having the venue of an
event mentioned in its advert poster makes it incomplete. (note: information can have
higher level of detail and be complete)
1.3 Encryption
encryption: It’s the process of converting plain text into cipher text which makes the
original data unintelligible
Encryption is important when sending or storing sensitive data such as personal data or
a company’s sale figure
Data being sent across a network or the internet can be easily intercepted by hackers
Data stored on storage media could be stolen or lost
Hence the purpose of encryption is to scramble the data in order to make it difficult or
impossible to read if it is accessed by an unauthorized user
Methods Of Encryption:-
Symmetric:
A method of encryption which requires the use of the same private key in order to
encrypt and decrypt data. The sender and receiver both require the same key, hence it
needs to be agreed on before transmission of data or sent along with the files.
Asymmetric:
A method on encryption that requires the use of a public key (available to anyone) to
encrypt data and private key (known only to recipient) to decrypt data. The same key
can’t be used to decrypt if it is used for encryption and vice versa.
Encryption Protocols:
An encryption protocol is a set of rules setting out how the algorithms should be used to secure
information. There are several protocols including:
It is the most popular protocol used when accessing web pages securely. TLS is an improved
version of SSL and has now, more or less, taken over from it.
Uses of encryption:
Validation is always carried out by a computer whereas verification can be carried out
by a human or a computer
Validation is checking that the data entered is reasonable and sensible
Verification is checking that the data has been entered, copied or transmitted correctly
but it doesn’t tell if its sensible or not
(add example how with verification and validation a data can be still incorrect if the
original data is incorrect or swapped but in correct format etc)
Verification is a way of ensuring that the user doesn’t make a mistake when inputting
data whereas validation is checking that the data input conforms with what the system
considers to be sensible and reasonable
By using both the chances of entry data incorrect can be reduced
Batch Processing
In a batch processing system, the individual operations or transactions that need to be
performed on the data are collected together into a batch and then processed at a later date
instead of being worked on one by one by an operator in real time. The data is searched using
sequential access
Examples:
automated backups
the processing of employees wages
customer orders
stock control
master file: It stores important data that doesn’t change often such as a person name,
number and address and is sorted in order of keyfield
transaction file: It stores data that requires frequent changes that could be weekly or
daily changes such as hours worked, items sold today, number of visitors
In order to update the master file, a new blank file will be created and used as the new master
file. The following basic algorithm is used.
Use of batch processing in payroll:
Use of batch processing with customer orders:
Advantages of Batch Processing:
Only data of same type can be processed since an identical, automated process is
being applied to all the data
Errors cannot be corrected until the batch process is complete
Information is not upto date unless until the master file has been updated by the
transaction file
Online Processing
Process if sending money from one bank account to another using computer software and
without the involvement of banks staff, eg; ATM, online banking.
Electronic Funds Transfer at Point of Sale (EFTPOS):
Customer going to a point of sale, i.e; going to the counter for checking out / waiter bringing
the card machine to table for payment, is considered a Point Of Sale.
An automated system which manages stock control with little human input.
Electronic Data Exchange:
Electronic data exchange or electronic data interchange (EDI) is a method of exchanging data
and documents without the use of paper. The documents can take any form such as invoice or
order with the electronic exchange through computers using a standard format.
1. A company decides to buy some goods, creates an order and does not print it
2. EDI software creates an electronic version of the order and sends it automatically to the
supplier
3. Supplier’s computer system receives the order and updates its system
4. Supplier’s computer system automatically sends a message back to the company,
confirming receipt of the order
Online Stores:
Online stores are websites for a certain shop/chain to sell their products and services
online.
Orders are placed by like how its done in real life by browsing the online catalogue and
adding selected items in a virtual cart and hence checking out online.
Customers can look at a wide range of shops online and compare prices
Customers don’t need to spend extra money on travelling making the shopping online
cheaper and faster
Items are usually cheaper since no on street store is required and wages for staff is
cheaper
Shopping can be done at convenience without being rushed
Reviews for services and products can be found instantly online
Easier to maintain and upgrade as banks, etc have less busy times so it can be shutdown
for maintenance
Errors are revealed immediately allowing it to be worked on immediately
Useful for online money transactions
Useful in online shopping
Support and stability
Lots of online requests can be difficult to manage as some are spam which can cause
system to crash
May require specialized staff to manage the online systems which increases costs
Failure of network can cause the system to go down
Requires entry of information immediately, making it expensive to run the system
Real Time Processing
Real time processing system is where data is processed as soon as it has been processed and
output is generated immediately. The processing takes places continuously and only stops
when system is turned off by user.
Examples:
computer games
traffic lights
green houses
Some real time systems use a feedback loop where the output directly affects the input. It
makes use of a microprocessor and sensors, sensors measure physical variables and send it to
the microprocessors which compare it with a stored value. If its greater than stored value then
microprocessors sends control signals to an actuator which turns off/on the [ any device ] . This
immediatly affects the new readings sensors picks up. i.e air conditioning systems. Feedback is
basically when the output of the system affects the new input, increasing ac temp will increase
the temp of room and hence the new inputs will differ.
A rocket guidance system makes use of real time processing. As the rocket is launched it could
veer off course ( divert from path) and hence crash. This is where the sensors come in and
measure the respective variable and send it back to the microprocessor which compares it
against stores values. The microprocessor sends appropriate control commands to actuator
immediately to rotate the rocket back to course. Here the output (rotating rocket) affects the
new input (rocket back at path) to the control system. As the rocket moves, its position also
constantly changes so the processing is done continuously to ensure rockets stays in path or
readjusts paths according to the situation, any delay in receiving instruction can cause the
rocket to veer off or crash. This guidance system hence provides stability for the rocket and
controls its movement.
occupies the CPU constantly, hence it can be expensive (uses constant power)
requires expensive and complex computer systems
difficult to maintain as it has no down time