Chapter 01 - Data Information Knowledge and Processing - NV
Chapter 01 - Data Information Knowledge and Processing - NV
2017-20
Year 12
As a teacher, you will refer to these concepts again and again to help unify
the subject and make sense of IT. If mastered, learners can use the
concepts to solve problems or to understand unfamiliar subject-related
material.
Impact of Information Technology
Information Technology (IT) is the application of technology to process
information.
The impact of IT on all aspects of everyday life is immense. The enormity
of the impact can be seen in industry and commerce, transport, leisure,
medicine and the home. The impact on the work force is a very important
factor to consider and communications using new technologies have
made the World seem smaller.
Hardware and software
Many hardware components and software applications are used in IT
systems. It is important to understand how these work, and how they
interact with each other and within our environment.
Network
Computer systems can be connected together to form networks allowing
them to share resources.
1 – Key Concepts 2
1 2–– Sources
Sources 3
3–– Quality
Quality of
of 4
4–– Coding,
Coding, Encoding
Encoding 5
5–– Data
Data
1–– D,
D, II and
and K
K of
Questions
Questions
of Data
Data Information
Information &
& Encryption
Encryption Accuracy
Accuracy
The internet
The internet is a global communications network that allows computers worldwide
to connect and share information in many different forms. Examples include email,
web pages, and audio and video files. The impact of the internet on our lives is
profound. While it provides huge benefits to society, security of data is an issue,
both in the work place and for personal data.
System life cycle
Information systems are developed within a planned continuous cycle that covers
the initial development of the system through to its scheduled updating or
redevelopment. Each phase of development is organised into separate stages.
New technologies
As the information industry changes so rapidly, it is important to keep track of new
and emerging technologies and consider how they might affect everyday life.
Guided learning hours
Guided learning hours give an indication of the amount of contact time teachers
need to have with learners to deliver a particular course. Our syllabuses are
designed around 180 guided learning hours for Cambridge International AS Level,
and around 360 guided learning hours for Cambridge International A Level.
These figures are for guidance only. The number of hours needed to gain the
qualification may vary depending on local practice and the learners’ previous
experience of the subject.
2 – Assessment Structure
2
1 2–– Sources
Sources 3
3–– Quality
Quality of
of 4
4–– Coding,
Coding, Encoding
Encoding 5
5–– Data
Data
1–– D,
D, II and
and K
K of
Questions
Questions
of Data
Data Information
Information &
& Encryption
Encryption Accuracy
Accuracy
Component Weighting
AS Level A Level
Paper 1 Theory 1 hour 45 minutes 50% 25%
This written paper tests sections 1–10 of the syllabus
content.
Candidates answer each question in the spaces
provided on the question paper. All questions are
compulsory.
90 marks
Component Weighting
AS Level A Level
Paper 3 Advanced Theory 1 hour 45 minutes - 25%
This written paper tests sections 11–19 of the syllabus
content. The content of sections 1–10 is assumed
knowledge.
Candidates answer each question in the spaces provided
on the question paper. All questions are compulsory.
90 marks
Information
When data items are given context and meaning, they become information. A
person reading the information will then know what it means.
Data is given context by identifying what sort of data it is. This still does not
make it information but it is a step on the way to it becoming information as
shown in the next example.
Example
Data Context Comment
P952BR A product This is a product code but it is still not known
code what it is a product code for so it is still data.
@bbcclick A Twitter This is an address used for Twitter but it is not
handle information unless it is known to be a Twitter
handle or used within Twitter software. It’s also
not known whose address it is.
359 Price in This is a currency value but it is not known
Pakistani what the price is for, so it is still data.
Rupees
1.01 – Data, Information and Knowledge
2
2–– Sources
Sources 3
3–– Quality
Quality of
of 4
4–– Coding,
Coding, Encoding
Encoding 5
5–– Data
Data
1
1–– D,
D, II and
and K
K Questions
Questions Page
Page 2
2
of
of Data
Data Information
Information &
& Encryption
Encryption Accuracy
Accuracy
Knowledge Example
Knowledge is basically what a person Information Knowledge
knows. This is known as their knowledge
l00km/h is the Travelling at
base. A knowledge base gets larger
speed limit on 120km/h on
overtime as a person gains experience or expressways in expressways in
learning. Pakistan. Pakistan is
Knowledge requires a person to understand illegal.
what information is, based on their
experience and Knowledge base. A red traffic
Crown Prince Salman was appointed Crown light means a
car should stop.
Prince of Saudi Arabia on 18 June 2012.
This is information. Knowing that he had
been Crown Prince for 2 years on 1 August Figure 1.02 - A
2014 is knowledge. red traffic light.
Knowledge allows data to be interpreted. In
359 Pakistani The price of a
computing terms, Knowledge is also what a
rupees is the mobile phone
machine knows through the use of a price of a mobile cover is more
knowledge base consisting of rules and phone cover. expensive than
facts, often found in knowledge-based a cup of coffee.
systems, modelling and simulation software.
1.01 – Data, Information and Knowledge
2
2–– Sources
Sources 3
3–– Quality
Quality of
of 4
4–– Coding,
Coding, Encoding
Encoding 5
5–– Data
Data
1
1–– D,
D, II and
and K
K Questions
Questions Page
Page 3
3
of
of Data
Data Information
Information &
& Encryption
Encryption Accuracy
Accuracy
Questions Example
Information Knowledge
A company creates l00km/h is the Travelling at
websites using style sheets. speed limit on 120km/h on
expressways in expressways in
1. Identify one item of data Pakistan. Pakistan is
illegal.
that will be used by the
A red traffic
company. light means a
car should stop.
2. Describe how this item
of data can become Figure 1.02 - A
red traffic light.
information.
359 Pakistani The price of a
3. Describe the term rupees is the mobile phone
knowledge. price of a mobile
phone cover.
cover is more
expensive than
a cup of coffee.
1.01 – Data, Information and Knowledge
2
2–– Sources
Sources 3
3–– Quality
Quality of
of 4
4–– Coding,
Coding, Encoding
Encoding 5
5–– Data
Data
1
1–– D,
D, II and
and K
K Questions
Questions Page
Page 3
3
of
of Data
Data Information
Information &
& Encryption
Encryption Accuracy
Accuracy
Answers
1. For example 00000000 (there must be
no explanation, just the data)
2. For example, context is added to
00000000 because we are told it is a
colour code. Meaning is added by telling
us it is the colour code for black.
3. Knowledge is applying experience to
information so that the information can
be interpreted.
1.02 – Sources of Data
2
2–– Sources
Sources 3
3–– Quality
Quality of
of 4
4–– Coding,
Coding, Encoding
Encoding 5
5–– Data
Data
1
1–– D,
D, II and
and K
K Questions
Questions Page
Page 3
3
of
of Data
Data Information
Information &
& Encryption
Encryption Accuracy
Accuracy
Advantages and disadvantages of gathering data from direct and indirect data sources
The general rule is that data collected directly for the purpose for which it is intended is more
likely to be accurate and relevant than data that is obtained from existing data (indirect
source).
Direct data source Indirect data source
The data will be relevant because what is needed Additional data that is not required will exist that
has been collected. may take time to sort through and some data
that is required may not exist.
The original source is known and so can be trusted. The original source may not be known and so it
can’t be assumed that it is reliable.
It can take a long time to gather original data rather The data is immediately available.
than use data that already exists.
A large sample of statistical data can be difficult to If statistical analysis is required, then there are
collect for one-off purposes. more likely to be large samples available.
The data is likely to be up to date because it has Data may be out of date because it was
been collected recently. collected at a different time.
Bias can be eliminated by asking specific Original data may be biased due to its source.
questions.
The data can be collected and presented in the The data is unlikely to be in the format required,
format required. which may make extracting the data difficult.
Table 1.02 - Direct and indirect data sources.
1.02 – Sources of Data
2
2–– Sources
Sources 3
3–– Quality
Quality of
of 4
4–– Coding,
Coding, Encoding
Encoding 5
5–– Data
Data
1
1–– D,
D, II and
and K
K Questions
Questions Page
Page 6
6
of
of Data
Data Information
Information &
& Encryption
Encryption Accuracy
Accuracy
Task
Which of the following are direct data sources and which are indirect data sources?
Data Reason Collected Reason Used
Names and email To record their membership To contact members by email
addresses of members and to be able to contact to see if they will donate some
of a political party them. money.
Employee attendance To identify when employees To allow a police officer to
dates and times attended work and to check an employee’s alibi if a
calculate their wages. crime has been committed.
Flight times and prices To compare the prices and To decide the best flight to use
from airline websites times for a trip to Florida. for a trip to Florida.
Names, ages and Fora national census. To allow a marketing company
addresses of people to find out which areas have
the highest population of
children.
Weather To record the current To show the current
measurements from a weather. temperature and rainfall on a
weather station website.
1.02 – Sources of Data
2
2–– Sources
Sources 3
3–– Quality
Quality of
of 4
4–– Coding,
Coding, Encoding
Encoding 5
5–– Data
Data
1
1–– D,
D, II and
and K
K Questions
Questions Page
Page 6
6
of
of Data
Data Information
Information &
& Encryption
Encryption Accuracy
Accuracy
Questions
Relevance Example
Information must be relevant Examples of irrelevant information include:
to its purpose. Having being given a bus timetable when you
additional information that is want to catch a train
not required means that the being told the rental price of a car when
user has to search through you want to buy the car
the data to find what is a user guide for a mobile phone that
actually required. includes instructions on how to assemble
a plug.
Age
Information must be up to Example
date in order to be useful. Examples of out of date information include:
Old information is likely to be the number of residents in a town based
out of date and therefore no on a census from 2011, but 500 new
longer useful. homes have been built in the town since
When using indirect data then
sources, always check when a rugby score that has not been updated
the information was for 5 minutes during which time a player
produced. scored.
1.03 – Quality of Information
2
2–– Sources
Sources 3
3–– Quality
Quality of
of 4
4–– Coding,
Coding, Encoding
Encoding 5
5–– Data
Data
1
1–– D,
D, II and
and K
K Questions
Questions Page
Page 7
7
of
of Data
Data Information
Information &
& Encryption
Encryption Accuracy
Accuracy
Completeness Task
All information that is
required must be provided
in order for it to be of good
quality. Not having all the
information required means
it cannot be used properly.
Example
Questions
Answers
Key Terms
!
Coding data
Coding: representing
You are probably very familiar with data by assigning a code
coding data already. When you to it for classification or
send a text message or instant identification
Encoding: storing data in
message you probably code your a specific format
data. You might use codes like: Encryption: scrambling
data so it cannot be
LOL = laugh out loud understood without a
ROFL = roll on floor laughing decryption key to make it
FYI = for your information unreadable if intercepted
SSL: Secure Sockets
BTW = by the way Layer
2 = to TLS: Transport Layer
4 = for Security HTTPS:
hypertext transfer
BRB = be right back. protocol secure
1.04 – Coding, Encoding & Encrypting Data
2
2–– Sources
Sources 3
3–– Quality
Quality of
of 4
4–– Coding,
Coding, Encoding
Encoding 5
5–– Data
Data
1
1–– D,
D, II and
and K
K Questions
Questions Page
Page 8
8
of
of Data
Data Information
Information &
& Encryption
Encryption Accuracy
Accuracy
Coding data
In a similar way, data stored on a
computer can be coded. Coding is the
process of representing data by
assigning a code to it for classification or
identification.
Often genders are coded as M for male
and F for female. Clothing can be coded
by the type, size and colour:
DR = dress Figure 1.09 – Text
2XL = extra extra large message on a
mobile phone
BL = b!ue
DR2XLBL = a dress in size extra extra
large and colour blue.
1.04 – Coding, Encoding & Encrypting Data
2
2–– Sources
Sources 3
3–– Quality
Quality of
of 4
4–– Coding,
Coding, Encoding
Encoding 5
5–– Data
Data
1
1–– D,
D, II and
and K
K Questions
Questions Page
Page 8
8
of
of Data
Data Information
Information &
& Encryption
Encryption Accuracy
Accuracy
Example
Using abbreviations
Using numbers for for international
international dialling vehicle registration
codes: plates:
44 = Great Britain GB = Great Britain
33 = France F = France
49 = Germany D = Germany
34 = Spain (Deutschland)
93 = Afghanistan E = Spain (Esparia)
971 = United Arab AFG = Afghanistan
1.04 – Coding, Encoding & Encrypting Data
2
2–– Sources
Sources 3
3–– Quality
Quality of
of 4
4–– Coding,
Coding, Encoding
Encoding 5
5–– Data
Data
1
1–– D,
D, II and
and K
K Questions
Questions Page
Page 9
9
of
of Data
Data Information
Information &
& Encryption
Encryption Accuracy
Accuracy
Limited There may not be enough codes available to use, meaning that more letters
codes or numbers need to be added. E.g., with international vehicle registration
codes, E is already used for Spain and so Egypt has to use ET and Ecuador
has to use EC. Now that Egypt has taken ET, Ethiopia can’t use it and so has
to use ETH.
Interpretation Codes may be difficult to interpret. For example, with international vehicle
registration codes, somebody might look at ET and assume it is Ethiopia or
look at S and assume it is Spain. It’s even more difficult when considering
international dialling codes that are represented by numbers.
Similarity Some letters and numbers can be difficult to distinguish such as 0 and 0 or Z
and 2, especially if handwritten. With codes, it’s difficult to guess what the
value might be and so mistakes can occur. At least with words it’s possible to
guess what the badly written letter might be.
Efficiency If a user inputting codes does not know what code to use, then they will not
be able to enter the data efficiently. Instead they will have to look up the code.
Missing It’s possible that some information gets lost during the process of coding.
information E.g., if devices on a network are coded as L for laptop, P for printer, D for
desktop computer and M for mobile phone, then information about whether or
not the mobile phone or laptop is touch screen is lost.
Images
Encoding is also used to store images. At the most basic level,
images are encoded as bitmaps. A Microsoft Windows bitmap
includes the following data when encoding an image (this is not
the complete list):
width of bitmap
height of bitmap
bit count which represents number of colours:
o 1 = monochrome 4 = 16 colours 8=
256 colours
16 = 65536 colours 24 = 16 million colours
compression type (no compression, eight-bit run-length
encoding or four-bit run-length encoding)
horizontal resolution in pixels per metre
vertical resolution in pixels per metre
raster data (the actual shape of the image in pixels).
1.04 – Coding, Encoding & Encrypting Data
2
2–– Sources
Sources 3
3–– Quality
Quality of
of 4
4–– Coding,
Coding, Encoding
Encoding 5
5–– Data
Data
1
1–– D,
D, II and
and K
K Questions
Questions Page
Page 10
10
of
of Data
Data Information
Information &
& Encryption
Encryption Accuracy
Accuracy
Images
For the raster data, we will assume a monochrome image (black and
white). Each bit will represent either a black or white pixel. A byte
consists of eight bits and so will represent eight pixels. The encoding
starts from the bottom left of the image, works to the right-hand side
and then up to the next row and again from left to right hand side.
Example
The following image is 16 pixels wide and 6 pixels high. Its bit count (colour
depth) is 1 so it is monochrome. There is no compression. The pixels in the
image look like this:
Figure 1.11 – Filled Raster Grid
Imagine at 1 each time there is a black pixel and a zero each time there is a
white pixel, but remember the encoding starts at the bottom left.
Example
This time we are going to use a bit count (colour depth) of 4 so the image can
have up to 16 colours. Each byte stores two pixels. The byte consists of two
bit patterns such as 1100 1010. The first but pattern is the first pixel and the
second bit pattern is the second pixel. Each bit pattern represents the colour
to be used for the pixel.
The following image is 16 pixels wide and 6 pixels high. Its bit count (colour
depth) is 4 so it has up to 16 colours. It uses four bits to store each pixel.
There is no compression. The pixels in the image look like this:
Example
Example
Sound Task
When sound is encoded, the sample rate, Images can be encoded
bit depth and bit rate are stored. When into a variety of different
sound is recorded, it is converted from its file types. Find out what
original analogue format into a digital the purpose of each of
format, which is broken down into the following file types is:
thousands of samples per second. JPEG/JPG (Joint
The sample rate, also known as the Photographic Experts
frequency, is the number of audio samples Group)
per second. The higher the sample rate, the GIF (Graphics
higher the quality of the music, but also the Interchange Format)
PNG (Portable
more storage that is required.
Each sample is stored as binary data. The Network Graphics)
SVG (Scalable Vector
sample rate is measured in hertz (Hz).
Graphics)
Typically, music on a CD will use a sample
rate of 44.1 kHz (kilohertz) whereas a
simple telephone call would find 8 kHz
sufficient.
1.04 – Coding, Encoding & Encrypting Data
2
2–– Sources
Sources 3
3–– Quality
Quality of
of 4
4–– Coding,
Coding, Encoding
Encoding 5
5–– Data
Data
1
1–– D,
D, II and
and K
K Questions
Questions Page
Page 11
11
of
of Data
Data Information
Information &
& Encryption
Encryption Accuracy
Accuracy
Sound Example
The bit depth is the number of A CD sound file has a sample rate of 44.1 kHz
bits (1’s and 0’s) used for each (44100 Hz), a bit depth of 16 bits and two
sound clip. A higher bit depth channels (left and right for stereo).
bit rate = 44100 x 16 x 2 = 1411200 bps = 1.4
will give a higher quality
mbps (megabits per second)
sound. CDs use a bit depth of That means that 1.4 megabits are required to
16 which means 16 bits (0’s store every second of audio. Therefore, we
and 1’s) are used. 16 bits can multiply the bit rate by the number of
seconds to find the file size. So for a 3 minute
gives 65536 combinations of 30 second audio file (210 seconds):
binary storage. file size (in bits) = 1,411,200 x 210 = 296,352,000
The bit rate is the number of (296 megabits)
bits that are processed every There are eight bits in a byte and we use
bytes to measure storage, so the file size in
second. It is measured in bits is divided by eight:
kilobits per second (kbps). The file size (in bytes) = 296,352,000 + 8 =
bit rate is calculated using this 37,044,000 bytes = 37 MB (megabytes)
calculation:
bit rate = sample rate x bit
depth x number of channels
1.04 – Coding, Encoding & Encrypting Data
2
2–– Sources
Sources 3
3–– Quality
Quality of
of 4
4–– Coding,
Coding, Encoding
Encoding 5
5–– Data
Data
1
1–– D,
D, II and
and K
K Questions
Questions Page
Page 12
12
of
of Data
Data Information
Information &
& Encryption
Encryption Accuracy
Accuracy
Sound Task
The encoding method above does not Calculate the file
compress the file and a typical storage size of a sound file
format is WAV (Waveform Audio File with the following
properties:
Format), which is used on PCs. sample rate =
However, music files are often compressed 8000bps
to allow for efficient streaming across the bit depth = 16
internet and to enable lots of music files to channels = 1
be stored on a single storage medium.
Compression reduces the file size.
There are two types of compression: lossy
compression and lossless compression.
Lossless compression reduces the file size
Click Here
without losing any quality, but it can only
reduce the file size by about 50%.
1.04 – Coding, Encoding & Encrypting Data
2
2–– Sources
Sources 3
3–– Quality
Quality of
of 4
4–– Coding,
Coding, Encoding
Encoding 5
5–– Data
Data
1
1–– D,
D, II and
and K
K Questions
Questions Page
Page 12
12
of
of Data
Data Information
Information &
& Encryption
Encryption Accuracy
Accuracy
Sound Example
Lossy compression reduces A CD file originally has a bit
rate of 1.4 Mbps (1411200
the file size by reducing the bit
bps). This is reduced to 128
rate, which means that some kbps (128,000 kbps). The
of the quality is lost. Most original file size was 37 MB.
human ears won’t be able to To calculate the change in
file size, divide by the
detect the loss in quality, but original bit rate and multiply
an experienced musician by the new bit rate.
would notice. Compressed file size = 37
When compressing an audio + 1,411,200 x 128,000
= 3.36 MB.
file, it is possible to choose In this example, the file size
the bit rate. A bit rate of 128 has been reduced to
approximately 10% of the
kbps is equivalent to what
original size.
would be heard on the radio.
1.04 – Coding, Encoding & Encrypting Data
2
2–– Sources
Sources 3
3–– Quality
Quality of
of 4
4–– Coding,
Coding, Encoding
Encoding 5
5–– Data
Data
1
1–– D,
D, II and
and K
K Questions
Questions Page
Page 12
12
of
of Data
Data Information
Information &
& Encryption
Encryption Accuracy
Accuracy
Video
When video is encoded it needs to store images as well as sound.
Images are stored as frames. A standard quality video would normally
have 24 frames per second (fps). High definition (HD) uses 50fps and
60fps. The higher the number of frames per second, the more storage
that is required, but the higher quality the video will be.
The size of the image is also important. A HD video will have an image
size of 1920 pixels wide and 1080 pixels high. The higher the image
size, the more storage that is required. Other common resolutions
include:
7680 x 4320 (8K/ ultra high definition) Click Here
3840 x 2160 (4K/ ultra high definition)
1024 x 768 (Extended Graphics Array (XGA) - often used with digital
projectors)
1280 x 720 (Wide Extended Graphics Array (WXGA) - wide screen)
800 x 600 (Super Video Graphics Array (SVGA))
480 x 320 (useful for mobile phones where the screen is smaller and
internet bandwidth could be low).
1.04 – Coding, Encoding & Encrypting Data
2
2–– Sources
Sources 3
3–– Quality
Quality of
of 4
4–– Coding,
Coding, Encoding
Encoding 5
5–– Data
Data
1
1–– D,
D, II and
and K
K Questions
Questions Page
Page 12
12
of
of Data
Data Information
Information &
& Encryption
Encryption Accuracy
Accuracy
Video
The bit rate for videos combines both the audio and frames that need to be
processed every second. The bit rate is the number of bits that need to be
processed every second. A higher frame rate requires a higher bit rate.
A one hour, eight-bit HD video with 24fps
would require 334GB (gigabytes) of storage.
This would be far too much data to download
or even broadcast. Therefore, compression is
required. Compression usually involves
reducing the:
resolution
image size or
bit rate. Estimated file size: 58.14 MB per
These all result in lossy compression. A minute of video
common lossy compression format is MP4, Figure 1.12 - Video and audio
which is a codec created by MPEG (Moving settings.
Pictures Expert Group). There are also
lossless compression methods such as digital
video (DV).
1.04 – Coding, Encoding & Encrypting Data
2
2–– Sources
Sources 3
3–– Quality
Quality of
of 4
4–– Coding,
Coding, Encoding
Encoding 5
5–– Data
Data
1
1–– D,
D, II and
and K
K Questions
Questions Page
Page 13
13
of
of Data
Data Information
Information &
& Encryption
Encryption Accuracy
Accuracy
Encryption
One specific type of encoding is encryption. This is when data is scrambled
so that it cannot be understood. The purpose of encryption is to make the
data difficult or impossible to read if it is accessed by an unauthorised user.
Data can be encrypted when it is stored on disks or other storage media, or
it can be encrypted when it is sent across a network such as a local area
network or the internet. Accessing encrypted data legitimately is known as
decryption.
Caesar cipher
A cipher is a secret way of writing. In other words it is a code. Ciphers are
used to convert a message into an encrypted message. It is a special type
of algorithm which defines the set of rules to follow to encrypt a message.
Roman Emperor Julius Caesar created the Caesar cipher so that he could
communicate in secret with his generals.
The Caesar cipher is sometimes known as a shift cipher because it selects
replacement letters by shifting along the alphabet.
1.04 – Coding, Encoding & Encrypting Data
2
2–– Sources
Sources 3
3–– Quality
Quality of
of 4
4–– Coding,
Coding, Encoding
Encoding 5
5–– Data
Data
1
1–– D,
D, II and
and K
K Questions
Questions Page
Page 14
14
of
of Data
Data Information
Information &
& Encryption
Encryption Accuracy
Accuracy
Discussion Point
!
Figure 1.13 - The Enigma machine.
The Germans used encrypted messages during World War II
using the Enigma machine. An operator would type in a
message and then scramble it by using three to five notched
wheels. The recipient would need to know the exact settings
of the wheels in order to decipher the message. There were
159 x 1018 possible combinations.
Encrypted messages from the Lorenz cipher machine led to
the development of the world’s first electric programmable computer,
Colossus, which helped British code breakers read encrypted German
messages.
The first major encryption algorithm for computers was the Data
Encryption Standard (DES) used in the 1970s. It used a 56-bit (1’s and 0’s)
key. This offered 70 x 1015 possible combinations, but the development of
computers meant that it eventually became possible to ‘crack’ the code.
This was replaced by the Advanced Encryption Standard (AES) which
uses up to 256-bit keys. This can offer 300 x 10n possible combinations.
1.04 – Coding, Encoding & Encrypting Data
2
2–– Sources
Sources 3
3–– Quality
Quality of
of 4
4–– Coding,
Coding, Encoding
Encoding 5
5–– Data
Data
1
1–– D,
D, II and
and K
K Questions
Questions Page
Page 14
14
of
of Data
Data Information
Information &
& Encryption
Encryption Accuracy
Accuracy
Task Example
1. Using the Caesar cipher +3 In this example the alphabet is to
example previously, write an be shifted by three (+3) letters so
encrypted message to a friend. that A =D, B = E and so on:
Ask your friend to decipher it.
2. Choose how many letters you
are going to shift by and write So to encrypt the word ‘Hello’, we
another encrypted message to would use:
a friend. Don’t tell your friend H = K, E=H,L = 0,0 = R which
how many letters you shifted gives KHOOR.
by. Your friend should try to
decipher the code by working
out which letters appear most
commonly.
3. Click here to create a cipher
wheel and use it to encrypt and
decrypt messages.
1.04 – Coding, Encoding & Encrypting Data
2
2–– Sources
Sources 3
3–– Quality
Quality of
of 4
4–– Coding,
Coding, Encoding
Encoding 5
5–– Data
Data
1
1–– D,
D, II and
and K
K Questions
Questions Page
Page 14
14
of
of Data
Data Information
Information &
& Encryption
Encryption Accuracy
Accuracy
Hard disk
Disk encryption will encrypt every single bit of data stored on a disk. This
is different to encrypting single files. In order to access any file on the
disk, the encryption key will be required. This type of encryption is not
limited to disks and can be used on other storage media such as backup
tapes and Universal Serial Bus (USB) flash memory.
It is particularly important that USB flash memory and backup tapes are
encrypted because these are portable storage media and so are
susceptible to being lost or stolen. If the whole medium is encrypted,
then anybody trying to access the data will not be able to understand it.
The data is usually accessed
by entering a password
or using a fingerprint to
unlock the encryption.
1.04 – Coding, Encoding & Encrypting Data
2
2–– Sources
Sources 3
3–– Quality
Quality of
of 4
4–– Coding,
Coding, Encoding
Encoding 5
5–– Data
Data
1
1–– D,
D, II and
and K
K Questions
Questions Page
Page 15
15
of
of Data
Data Information
Information &
& Encryption
Encryption Accuracy
Accuracy
HTTPS
Normal web pages that are not encrypted are fetched and transmitted
using Hypertext Transfer Protocol (HTTP). Anybody who intercepts web
pages or data being sent over HTTP would be able to read the contents of
the web page or the data. This is particularly a problem when sending
sensitive data, such as credit card information or usernames and
passwords.
Hypertext Transfer Protocol Secure (HTTPS) is the encryption standard
used for secure web pages. It uses Secure Sockets Layer (SSL) or
Transport Layer Security (TLS) to encrypt and decrypt pages and
information sent and received by web users. This is the encryption method
that is used by banks when a user logs onto online banking. A secure web
page can be spotted by its address beginning with https://and in addition
some browsers display a small padlock.
Figure 1.17 - The ‘s’ after ‘http’ and the padlock indicate that this is a secure website.
1.04 – Coding, Encoding & Encrypting Data
2
2–– Sources
Sources 3
3–– Quality
Quality of
of 4
4–– Coding,
Coding, Encoding
Encoding 5
5–– Data
Data
1
1–– D,
D, II and
and K
K Questions
Questions Page
Page 15
15
of
of Data
Data Information
Information &
& Encryption
Encryption Accuracy
Accuracy
HTTPS
When a browser requests a
secure page, it will check the
digital certificate to ensure that it is
trusted, valid and that the
certificate is related to the site
from which it is coming. Click Here
Skip the first 55 seconds
The browser then uses the public
key to encrypt a new symmetric
key that is sent to the web server.
The browser and web server can
then communicate using a
symmetric encryption key, which is
much faster than asymmetric
encryption.
1.04 – Coding, Encoding & Encrypting Data
2
2–– Sources
Sources 3
3–– Quality
Quality of
of 4
4–– Coding,
Coding, Encoding
Encoding 5
5–– Data
Data
1
1–– D,
D, II and
and K
K Questions
Questions Page
Page 16
16
of
of Data
Data Information
Information &
& Encryption
Encryption Accuracy
Accuracy
Example
The web browser requests the
certificate from the web server.
1 Browser
requests
certificate
Web Web
Browser Server
Email
Email encryption uses asymmetric encryption.
This means that recipients of emails must have
the private key that matches the public key
used to encrypt the original email. In order for
this to work, both the sender and recipient need
to send each other a digitally signed message
that will add the person’s digital certificate to
the contact for that person. Encrypting an email
will also encrypt any attachments.
How encryption protects data
Encryption only scrambles the data so that if it
is found, it cannot be understood. It does not
stop the data from being intercepted, stolen or
lost. However, with strong. 256-bit AES
encryption it is virtually impossible for
somebody to decrypt the data and so it is
effectively protected from prying eyes
1.04 – Coding, Encoding & Encrypting Data
2
2–– Sources
Sources 3
3–– Quality
Quality of
of 4
4–– Coding,
Coding, Encoding
Encoding 5
5–– Data
Data
1
1–– D,
D, II and
and K
K Questions
Questions Page
Page 16
16
of
of Data
Data Information
Information &
& Encryption
Encryption Accuracy
Accuracy
Discussion Point
!
Most Wi-Fi access points and Wi-Fi routers use encryption. This serves two
purposes. The first is to only allow people who know the ‘key’ (usually a
password) to access the network, so that any unauthorised users cannot
gain access. The second is to encrypt the data, so that it cannot be
understood by somebody ‘snooping’ on the Wi-Fi network.
Wi-Fi networks are particularly susceptible to ‘snooping’ because no wires
are required to connect to the network. It is possible to sit in a car outside
somebody’s house and see the Wi-Fi network. The ‘key’ stops that person
from accessing the network and also stops that person from understanding
the data that is moving around the network.
Did you know that if you access a public
Wi-Fi hotspot that is ‘open’ and therefore
not encrypted that anybody with the right
software can see what you are sending
over the network, including your emails?
This applies to laptops, tablets and
mobile phones or any other device using public Wi-Fi.
1.04 – Coding, Encoding & Encrypting Data
2
2–– Sources
Sources 3
3–– Quality
Quality of
of 4
4–– Coding,
Coding, Encoding
Encoding 5
5–– Data
Data
1
1–– D,
D, II and
and K
K Questions
Questions Page
Page 16
16
of
of Data
Data Information
Information &
& Encryption
Encryption Accuracy
Accuracy
Questions
11. Give two reasons for encoding data.
12. Explain why encoding is necessary for
text.
13. Identify two factors that affect the size
of a sound file.
14. Decipher the following text that has
been encrypted using the Caesar
cipher with a shift of +4.
AIPPHSRI
1.04 – Coding, Encoding & Encrypting Data
2
2–– Sources
Sources 3
3–– Quality
Quality of
of 4
4–– Coding,
Coding, Encoding
Encoding 5
5–– Data
Data
1
1–– D,
D, II and
and K
K Questions
Questions Page
Page 16
16
of
of Data
Data Information
Information &
& Encryption
Encryption Accuracy
Accuracy
Answers
11. Saving storage space, enables validation,
can help with presentation of lists, speed of
input, speed of processing, confidentiality.
12. Computers can only understand on and off
(1 and 0), so text needs to be encoded into
a standard character set that uses numbers
represented by binary.
13. Sample rate, bit depth, number of
channels.
14. WELL DONE.
1.05 – Checking the Accuracy of Data
2
2–– Sources
Sources 3
3–– Quality
Quality of
of 4
4–– Coding,
Coding, Encoding
Encoding 5
5–– Data
Data
1
1–– D,
D, II and
and K
K Questions
Questions Page
Page 17
17
of
of Data
Data Information
Information &
& Encryption
Encryption Accuracy
Accuracy
Presence check
A presence check is used to ensure that data
is entered. If data is entered, then it is
accepted. If data is not entered, then the user
will be presented with an error message
asking them to enter data.
Example
When filling in a ‘contact us’ form on a website,
it is essential that an email address is entered. Figure 1.21 - Required data on a
website.
The following would be valid if only a presence
check is carried out:
a
a@b
[email protected]
@
372823
Notice that none of these are correct but they
pass the rule that data must be present.
1.05 – Checking the Accuracy of Data
2
2–– Sources
Sources 3
3–– Quality
Quality of
of 4
4–– Coding,
Coding, Encoding
Encoding 5
5–– Data
Data
1
1–– D,
D, II and
and K
K Questions
Questions Page
Page 17
17
of
of Data
Data Information
Information &
& Encryption
Encryption Accuracy
Accuracy
Example
Valid example
In this example, the International Standard Book
Number (ISBN) is 978095734041-1 where the last
1 is the check digit. To calculate the check digit, the
following algorithm is performed on the ISBN
(excluding check digit): Figure 1.23 - Unique
1. Add all the digits in even numbered positions Product Code check digit.
together (978095734041) : 7 + 0 + 5 + 3 + 0+ 1 = 16.
2. Multiply result (1) above by 3 : 16 x 3 = 48.
3. Add all the digits in odd numbered positions together (978095734041) :
9 + 8 + 9 + 7 + 4 + 4 = 41.
4. Add results (2) and (3) together: 48 + 41 = 89.
5. Divide the result (4) above by 10 : 89 ÷ 10 = 8.9.
6. Calculate the remainder (modulo 10) of result (5) above: 89 MOD 10 =
9.
7. Subtract (6) above from 10 : 10-9 = 1.
8. The result of the algorithm is 1.
1.05 – Checking the Accuracy of Data
2
2–– Sources
Sources 3
3–– Quality
Quality of
of 4
4–– Coding,
Coding, Encoding
Encoding 5
5–– Data
Data
1
1–– D,
D, II and
and K
K Questions
Questions Page
Page 20
20
of
of Data
Data Information
Information &
& Encryption
Encryption Accuracy
Accuracy
Example
Invalid example
In this example, the ISBN has been entered
incorrectly as two numbers have been transposed
(7 and 3) accidentally: 978095374041-1.
1. Add all the digits in even numbered positions
together(978095374041) :7+0+5+7+0+1 = 20. Figure 1.23 - Unique
2. Multiply result (1) above by 3 : 20 x 3 = 60. Product Code check digit.
3. Add all the digits in odd numbered positions together (978095374041) :
9 + 8 + 9 + 3 + 4 + 4 = 37.
4. Add results (2) and (3) together: 60 + 37 = 97.
5. Divide the result (4) above by 10 : 97 ÷ 10 = 9.7.
6. Calculate the remainder (modulo 10) of result (5) above: 97 MOD 10 =
7.
7. Subtract (6) above from 10 : 10-7 = 3.
The result of the algorithm is 3. The result 3 is compared with the check
digit of 1 that was entered. They do not match. The ISBN entered is invalid.
1.05 – Checking the Accuracy of Data
2
2–– Sources
Sources 3
3–– Quality
Quality of
of 4
4–– Coding,
Coding, Encoding
Encoding 5
5–– Data
Data
1
1–– D,
D, II and
and K
K Questions
Questions Page
Page 20
20
of
of Data
Data Information
Information &
& Encryption
Encryption Accuracy
Accuracy
Questions
Answers
15. To ensure that data that is input matches the source
data.
16. Presence, range, type, length, format, check digit,
lookup.
17. Data can match the rules but still be incorrect (e.g.
date of birth of 29/1/13 matches the rule of a data type
but it may be that the date should have been 29/1/03)
Data can be checked against the source, but the source
may be incorrect (e.g. the name ‘Siobhan’ is written on the
original source and is visually checked to have been
entered as ‘Siohan’,but the actual spelling should have
been ‘Siobhan’.
1.06 – Summary
2
2–– Sources
Sources 3
3–– Quality
Quality of
of 4
4–– Coding,
Coding, Encoding
Encoding 5
5–– Data
Data
1
1–– D,
D, II and
and K
K Questions
Questions Page
Page 21
21
of
of Data
Data Information
Information &
& Encryption
Encryption Accuracy
Accuracy
Information has context and meaning so a person knows what it means. The
quality of information can be affected by the accuracy, relevance, age, level of
detail and completeness of the information. Proofreading is the process of
checking information.
Data are raw numbers, letters, symbols, sounds or images without meaning.
Knowledge allows data to be interpreted and is based on rules and facts.
Static data does not normally change. Dynamic data updates as a result of the
source data changing. Data collected from a direct data source (primary
source) must be used for the same purpose for which it was collected. Data
collected from an indirect source (secondary source) already existed for
another purpose.
Coding is the process of representing data by assigning a code to it for
classification or identification. Encoding is the process of storing data in a
specific format. Encryption is when data is scrambled so that it cannot be
understood.
Validation ensures that data is sensible and allowed. Validation checks include
a presence check, range check, type check, length check, format check and
check digit. Verification is the process of checking data has been transferred
correctly. Verification can be done visually or by double data entry.
Chapter 01 – Review Questoins
2
2–– Sources
Sources 3
3–– Quality
Quality of
of 4
4–– Coding,
Coding, Encoding
Encoding 5
5–– Data
Data
1
1–– D,
D, II and
and K
K Questions
Questions Page
Page 22
22
of
of Data
Data Information
Information &
& Encryption
Encryption Accuracy
Accuracy
Users can pay for premium services on the website using their
credit card.
4. a Explain why the website uses https at the beginning of the
website address instead of http. [4] ?
b Describe symmetric encryption. [1]
The journalists working for the website encrypt their emails.
c Describe how asymmetric encryption is used with emails. [2]
When the users subscribe to premium features, they have to
choose a password.
d Describe how verification can be used when entering the
password. [1]
There is a form on the website that can be used to submit news
stories. When data is entered onto the form, it is validated.
5. a Describe the purpose of validation. [1]
b Using an example related to submitting a news story, identify
and describe one method of validation. [3]