Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

5/15/2022

Data and Information


• Data is raw unprocessed facts
such as characters and
numbers whereas information
Information Processing is processed data.
• Information processing is using
the computer to process data
into information.

Data can be processed to become


Sources of data and information
information by
• carrying out calculations in a • People
spreadsheet
• Places
• printing a document or image
• Things
• searching a database for a
particular item of data
• sorting data into alphabetical
order

Machine readable document


• is one on which the data can be ‘read’ by an input device such as a
scanner or mark reader.
• E.g. multiple choice exams, barcodes on labels of products sold in
shops.

Document Types:

1
5/15/2022

Human readable document Source document


• is any document that needs to be read by
humans. Handwriting can be very difficult to • is one that
read. contains data that
• Sometimes a series of boxes are placed on a is going to be
form to try to force the writer to separate input into a
out the letters to make them clearer. computer system.

Turnaround document
• is a machine readable document that has some information printed
on it by a computer but has more information added to it by a
human. It is then fed back into a computer to transfer this newly
added information.
• They are used to
a. Verify the accuracy and completeness of information that
has already been entered
b. Update information already entered with additional data.
• OCR and OMR are used together in a turnaround document
• They allow cheap, fast input of information into a computer system.

Online Information
Reliability
Not all information is reliable or true, nor will all
information be suitable for your needs.

Information retrieved electronically should be


evaluated based on the following:

2
5/15/2022

Authenticity
Currency
• This is the quality of being real,
genuine, true and accurate. • This is the timeliness of the
information, that is, when the
• There is a lot of false information information was posted or
online due to both honest mistakes published.
and malicious intent.
• Depending on the topic, the
• The Internet allows anyone currency is important.
anywhere to publish anything
everywhere.

Bias
Relevance • This is an inclination or prejudice
for or against someone or
• This is the degree to something.
which the information
found applies to the • It is important to take note of
problem or situation and the tone of the writing (is it
meets the real need of selling you something,
the user. informing, persuading etc.) and
whether the information is
supported by evidence that can
be verified independently of the
source.

Data Verification and Data


Validation

3
5/15/2022

Validation and verification are two ways to


check that the data entered into a computer
is correct.

Data entered incorrectly is of little use.

• Validation and verification checks are used


to minimise or eliminate errors that occur when
inputting data into a computer system. • Verification is performed by a human
• It is important to understand that these checks whereas validation is carried out by a
cannot eliminate all mistakes, they just try and computer.
ensure that the data is as accurate as is
reasonably possible for the purpose it is being
collected for.

Data Verification Types of Errors


• This process ensures that the • Errors may occur when employees are keying in data from a
data entered exactly matches
the original source. source document. Two types of errors are:
• It checks for mistakes such as • Typographical errors – are the typing errors that we all make
transcript errors when data is when we hit the wrong key.
copied form one medium or
• E.g. I sent down the street and saw my friends playing cricket.
device to another.
• This process is carried out by • Transposition errors – happen when we enter numbers or
humans but it does not characters in the wrong order.
guarantee that the entered data
• E.g. I wnet down the street and was my friends playing cricket.
is correct.
• Data verification is used to reduce these types of errors.

4
5/15/2022

Data Verification Types/Checks Data Validation


• Proofreading/Visual verification – this method involves • This is the computerised checking of input data for
someone checking the data entered against the original errors (data that may be unreasonable or incomplete)
document. It is not efficient for large amounts of data
because it is time-consuming. before it is processed.
• Double entry verification – is when the data is keyed in a • It cannot check the accuracy of data but ensures that it
second time, and the first entry is checked against the conforms to a set of validation rules.
second. A warning message is displayed if the entries do not • The method of validation used depends upon what data
match. The employee then has to check whether the error
was made in the first entry or the second and confirm which
is being entered.
is correct.

Validation checks • Data type check – This is also


known as a character or
alphanumeric check. When a
• Range check – ensures database is created each field
that the data entered is in the database is given a type.
within a certain range. Whenever data is entered into
E.g. when you enter a a field the database will check
number corresponding to a that it is of the correct type, if it
month of the year, the range is not, then an error message
of acceptable numbers is 1 – will be displayed and the data
12. will have to be re-entered.

• Inconsistency/Consistency • Reasonableness check – this compares an input


check – This checks one value with expected reasonable values.
piece of data against another. E.g. the current reading is reasonably expected to be
E.g. the data may include greater than the previous reading. A current reading
both gender [M or F] and title that is less than or equal to the current reading will
[Mr, Mrs, Miss]. If someone result in an error.
has entered M and Mrs, then
the two data items are
inconsistent.

5
5/15/2022

• Presence check – ensures • Format check – ensures the


that a critical field cannot data is in the correct format.
be left blank, it must be
filled in. E.g. a school will E.g. A national Insurance
always want to know an number must be in the form of
emergency contact number
XX 99 99 99 X. The first two
or a wedding dress shop
might always want a record and the last characters must
of the brides wedding date. be letters. The other six
characters are numbers. Any
format entered differently to
this will be rejected.

• Length check -
checks the data isn't
too short or too long.
E.g. a password that File Organisation and Access
requires a minimum
number of 6
characters.

Types of File Access


File Organisation Direct Access Sequential Access
• Allows the computer to go • Data has to be read in
• refers to the way data is stored in a file. directly to a specific piece of sequence, from the start to the
• is very important because it determines the methods of access, data on the storage media end. It is impossible to jump
efficiency, flexibility and storage devices to use. without having to access any into the middle of the storage
other data. media to find a particular item.
• There are four methods of file organisation: serial, sequential, index-
sequential and random.
• There are two types of file access: sequential and direct.

6
5/15/2022

1. Serial file organisation


• This is the simplest file
organisation method.
• Records in a file are stored and
accessed in the order of their
creation.
Methods of File Organisation • The data is read from the file in
the order it was written to the
file.
• Type of access – sequential and
direct

2. Sequential file organisation


3. Index-Sequential file organisation
• uses an index file to speed up searches on a sequential file. This
makes it possible to search large sequential files very quickly.
• It cannot be used on sequential access media but can only be used
• Records are stored and accessed in a particular order, with direct access media.
sorted using a key field (sort key). • The main sequential file containing all the records could be stored
• Retrieval requires searching sequentially through the on a hard disk (which is a random access device). Each position is
entire file, record by record to the end. given a numerical address. The index file will also be stored on the
hard disk alongside the main file of records. In the index file the
• That means that if you want to find a record in a position field will hold the address of a position on the disk.
sequential file you have to start at the beginning and
work your way through until you find it. • Type of access – direct
• Type of access – sequential

4. Random file organisation


• uses a formula to find the position of a record on a direct access
medium. It is the most efficient way of storing extremely large files.
• Each position will have its own specific address on the disk. The
position allocated to each record is calculated by a special formula.
This formula will use some of the data in the record then convert in
into the address of a position on the disk. When someone wants to
search for a record, once again the formula will work out where it is.
• Type of access – direct

7
5/15/2022

Record –
Hey! Position –
H32
Method Storage media type Example of storage media
Sequential Sequential access Magnetic tape

Special Index-sequential Direct access Optical media, magnetic


Formula disk, flash memory
Position Record Random
A1 5
B45 GTA Serial Sequential access Magnetic tape
X20 Jake
V63 $5000
Direct access Optical media, magnetic
H32 - Hey! disk, flash memory
K79
K32 June 03, 2020

Application Areas
Archiving Serial

Payroll file Sequential

Real time system Random file organisation

You might also like