Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Advanced Level ICT

1.5 Data Processing Life Cycle (DPLC)


DPLC is concerned with how the computer accepts data, process under different requirements, and
generates and stores the output.

The following steps can be identified in the Data Processing Life Cycle.

1. ………………………………………………………………………………….

2. ………………………………………………………………………………….

3. ………………………………………………………………………………….

4. ………………………………………………………………………………….

5. ………………………………………………………………………………….

6. ………………………………………………………………………………….

1. Data Gathering
In this step, data is collected from different sources. There are two methods of gathering data.

 manual Method
 Semi-automated / Automated methods.

Manual Method

Data required for processing is entered into the computer using equipment like keyboard, mouse and other
manual input devices by humans.

Ex: Manually entering the product code in a point of sales system.

Semi-automatic / Automatic Methods.

Special equipment is used to enter data into the computer with less involvement of humans.
Eg:
 ……………………………………………………………………………………………………
 ……………………………………………………………………………………………………
 ……………………………………………………………………………………………………
 ……………………………………………………………………………………………………
 ……………………………………………………………………………………………………
 ……………………………………………………………………………………………………
 ……………………………………………………………………………………………………

Prasanna Silva | www.ictprasanna.edu.lk 1


Advanced Level ICT

2. Data Validation
……………………………………………………………………………………………………………….

……………………………………………………………………………………………………………….

It uses routines, often called "validation rules", that check for correctness, meaningfulness, and security of
data that are input to the system.

Data Validation Methods

1. ……………………………………………………….

Checks the data type of the input and gives an error message if the input data does not
match with the chosen data type
e.g., in an input box accepting numeric data, if the letter 'O' was typed instead of
the number zero, an error message would appear.

2. ……………………………………………………….

Checks that important data are actually present and have not been missed out,
e.g., customers may be required to have their telephone numbers listed.

3. ……………………………………………………….

Checks that the data lie within a specified range of values,


e.g., the month of a person's date of birth should lie between 1 and 12.

Check digit

…………………………………………………………………………………………………….

…………………………………………………………………………………………………….

…………………………………………………………………………………………………….

These check digits can detect the following types of errors which occur while entering data.

 single digit errors, such as 1 → 2


 transposition errors, such as 12 → 21
 twin errors, such as 11 → 22
 jump transpositions errors, such as 132 → 231
 jump twin errors, such as 131 → 232
 phonetic errors, such as 60 → 16 ("sixty" to "sixteen")

Prasanna Silva | www.ictprasanna.edu.lk 2


Advanced Level ICT

3. Data Verification
Verification is the checking of data that has been copied from one place to another to ensure that it
replaces the original one.

Methods used for data verification

1. ………………………………………………………………………………

2. ………………………………………………………………………………

3. ………………………………………………………………………………

4. ………………………………………………………………………………

Modes of data input

Direct vs. Remote data input


The process of entering data from source documents into the computer's memory is known as data entry.
The data fed into the computer from the source document can be performed in two ways

Direct & Remote

 Direct Data Entry


The data entered within the computer premises is referred as direct data entry

 Remote Data Entry


The data entered from a remote location to a server is known as remote data entry.

Online & Offline

 Online Data Entry


The data entered using a network / Internet to a remote server.

 Offline Data Entry


The data entered to a computer which is not connected to a network (stand-alone).

Prasanna Silva | www.ictprasanna.edu.lk 3


Advanced Level ICT

4. Data Processing
…………………………………………………………………………………………………….

…………………………………………………………………………………………………….

…………………………………………………………………………………………………….

Data Processing can be done in two ways

 ………………………………………………………………………………

 ………………………………………………………………………………

Batch Processing

…………………………………………………………………………………………………….

…………………………………………………………………………………………………….

…………………………………………………………………………………………………….

Applications are run in batches, often overnight due to limited system resources. For example,
bank transaction processing is database intensive, so processing will be done when the system is
less busy.

Real-time Processing

…………………………………………………………………………………………………….

…………………………………………………………………………………………………….

…………………………………………………………………………………………………….

Examples include rocket telemetry processing, ATM systems, flight systems

Online Processing
Processing is done instantly with the command of the user. Usually the processing is done at the
remote computer (Usually a server)

e.g. Reservation of an air ticket.

Prasanna Silva | www.ictprasanna.edu.lk 4


Advanced Level ICT

5. Data Storage
…………………………………………………………………………………………………….

…………………………………………………………………………………………………….

Storage types based on where data is stored.

 ……………………………………………….

Data/Information stored in the local computer. These might be permanently fixed onto
the computer such as the Hard Disk & SSDs or removable storage media such as Flash
drives, CDs, BluRays etc.

 ……………………………………………….

Storing data on a cloud based service.

Storage types based on the duration of data storage

 ……………………………………………….

Storage media/methods that are used to store data/files temporarily until the data is transferred to
another location or a permanent storage.

Eg: Flash drives, Memory cards

 ……………………………………………….

Storage media/methods where data is stored on a long term basis. These mainly include backups
and archives.

Eg: CD, DVD, Bluray, Magnetic Tapes

Prasanna Silva | www.ictprasanna.edu.lk 5


Advanced Level ICT

6. Output Information
…………………………………………………………………………………………………….

…………………………………………………………………………………………………….

The intention of producing an output can be either one of the following

1. ……………………………………………..…………………………………………………

 Information should be in the form that is required by the decision maker.


o Hard copy : is a printed copy of information from a computer.
o Soft copy : A soft copy is a document saved on a computer. It is the electronic version of
a document
 Information should be produced at the time it is needed.
 Information must be easily accessible.
 Information should be given to the correct person who has the most relevancies.

2. ……………………………………………..…………………………………………………

Information may still be processed to generate more summarized versions of information, allowing
decision making to be done at higher management levels.

Prasanna Silva | www.ictprasanna.edu.lk 6

You might also like