Professional Documents
Culture Documents
Data Basics, Data Processing, Data Security and Document Management
Data Basics, Data Processing, Data Security and Document Management
Data Basics, Data Processing, Data Security and Document Management
Structured Unstructured
A) Structured data
Data which is organized and can be recorded in a well defined
format is called structured data.
Structured data is usually stored in computer in a tabular (in
rows and columns) format where each column represents
different data for a particular parameter called attribute/
characteristic/variable and each row represents data of an
observation for different attributes.
B) Unstructured Data
Data which are not in the traditional row and column structure is called
unstructured data.
Examples:
A newspaper contains various types of news items which are also called
data. But there is no fixed pattern that a newspaper follows in placing news
articles. One day there might be three images of different sizes on a page
along with five news items and one or more advertisements. While on
another day, there might be one big image with three textual news items.
So there is no particular format nor any fixed structure for printing news.
Another example is the content of an email. There is no fixed structure
about how many lines or paragraphs one has to write in an email or how
many files are to be attached with an email.
Examples of unstructured data include web pages consisting of text as well
as multimedia contents (image, graphics, audio/video). Other examples
include text documents, business reports, books, audio/video files, social
media messages.
Data is a collection of raw, unorganized facts and details like text,
observations, figures, symbols and descriptions of things etc. In other
words, data does not carry any specific purpose and has no significance
by itself. Moreover, data is measured in terms of bits and bytes – which
are basic units of information in the context of computer storage and
processing.
Input
Processing
Output
1. INPUT
It is the process through which collected data is transformed into a form that computer can
understand. It is very important step because correct output result totally depends on the input
data. In input step, following activities can be performed.
i) Verification
ii) Coding
The verified data is coded or converted into machine readable form so that it can be processed
through computer.
iii) Storing
The data is stored on the secondary storage into a file. The stored data on the storage media will be
given to the program as input for processing.
2.PROCESSING
The term processing denotes the actual data manipulation techniques such as classifying, sorting,
calculating, summarizing, comparing, etc. that convert data into information.
i) Classification
The data is classified into different groups and subgroups, so that each group or sub-group of data
can be handled separately.
ii) Sorting
The data is arranged into an order so that it can be accessed very quickly as and when required.
iii) Calculations
The arithmetic operations are performed on the numeric data to get the required results. For
example, total marks of each student are calculated.
iv) Summarizing
The data is processed to represent it in a summarized form. It means that the summary of data is
prepared for top management.
3. OUTPUT
After completing the processing step, output is generated. The main purpose of data
processing is to get the required result. Mostly, the output is stored on the storage
media for later user. In output step, following activities can be performed.
i) Retrieval
Output stored on the storage media can be retrieved at any time. For example, result of
students is prepared and stored in the disk. This result can be retrieved when required
for different purposes.
ii) Conversion
iii) Communication
KEYLOGGER WORMS
MALWARES
RANSOMWARE
ADWARE
SPYWARE TROJAN
MALWARE
Malware is a short term used for MALicious softWARE.
It is any software developed with an intention to damage
hardware devices, steal data, or cause any other trouble to the
user. Various types of malware have been created from time-
to-time, and large-scale damages have been inflicted. Many of
these malware programs have been identified and counter
measures have been initiated. However, different types of
malware keep on coming on a regular basis that compromise
the security of computer systems and cause intangible
damages. Besides, each year, malware incur financial
damages worth billions of dollars worldwide. Viruses, Worms,
Ransomware, Trojans, and Spyware are some of the kinds of
malware.
VIRUS
The term computer virus was coined by Fred Cohen in 1985 and has
been borrowed from biological science with almost similar meaning
and behavior, the only difference is that the victim is a computer
system and the virus is a malicious software.
A virus is a piece of software code created to perform malicious
activities and hamper resources of a computer system like memory,
personal files, or sensitive information. Mimicking the behavior of a
biological virus, the computer virus spreads on contact with another
system, i.e. a computer virus infects other computer systems that it
comes into contact with by copying or inserting its code into the
computer programs or software (executable files).
A virus remains dormant on a system and is activated as soon as
the infected file is opened (executed) by a user.
Some of the most common objectives behind viruses
include stealing passwords or data, corrupting files,
spamming the user’s email contacts, and even taking
control of the user’s machine.
WORM
The Worm is also a malware that incurs unexpected or
damaging behavior on an infected computer system. The
major difference between a worm and a virus is that unlike a
virus, a worm does not need a host program or software to
insert its code into. Worms are standalone programs that are
capable of working on its own. Also, a virus needs human
triggering for replication (i.e. when a user opens/executes the
infected file), while a worm replicates on its own and can
spread to other computers through the network.
RANSOMWARE
HACKER