Podcast
Questions and Answers
Which of the following best describes 'data' in the context of data processing?
Which of the following best describes 'data' in the context of data processing?
- Context-rich details ready for interpretation
- Information presented in a structured format
- Processed information with a clear meaning
- Raw, unorganized facts or figures (correct)
Data always has intrinsic meaning and can be directly used for decision-making without further processing.
Data always has intrinsic meaning and can be directly used for decision-making without further processing.
False (B)
Describe the key difference between 'data' and 'information'.
Describe the key difference between 'data' and 'information'.
Data is raw and lacks context, while information is data that has been processed to have meaning and is useful for interpretation or decision-making.
________ is data that has been structured and given context to be meaningful and useful.
________ is data that has been structured and given context to be meaningful and useful.
Match each scenario with the appropriate type of data source:
Match each scenario with the appropriate type of data source:
What is a key advantage of using a direct data source?
What is a key advantage of using a direct data source?
Indirect data sources are always less reliable than direct data sources.
Indirect data sources are always less reliable than direct data sources.
Give an example of an indirect data source and explain how it might be used for a purpose different from its original intention.
Give an example of an indirect data source and explain how it might be used for a purpose different from its original intention.
Data collected from an electoral register for marketing purposes is an example of a(n) _______ data source.
Data collected from an electoral register for marketing purposes is an example of a(n) _______ data source.
Match each data source characteristic with the suitable data source type:
Match each data source characteristic with the suitable data source type:
Which of the following is an example of inaccurate information?
Which of the following is an example of inaccurate information?
Information is relevant if it contains data that is not required for the user's specific purpose.
Information is relevant if it contains data that is not required for the user's specific purpose.
Describe a scenario where information is complete but lacks detail, and explain how this could lead to problems.
Describe a scenario where information is complete but lacks detail, and explain how this could lead to problems.
Information about resident numbers for 2011 when 500 new home have been built since then is an example of _______________.
Information about resident numbers for 2011 when 500 new home have been built since then is an example of _______________.
Match each characteristic with the type of quality of information:
Match each characteristic with the type of quality of information:
What is the primary purpose of encryption?
What is the primary purpose of encryption?
Decryption is the unauthorized process of accessing encrypted data.
Decryption is the unauthorized process of accessing encrypted data.
Explain why encrypting sensitive data, like a company's sales figures, is important.
Explain why encrypting sensitive data, like a company's sales figures, is important.
The Caesar cipher is a type of _______________ cipher that works by shifting letters in the alphabet.
The Caesar cipher is a type of _______________ cipher that works by shifting letters in the alphabet.
Match each description with the type of encryption:
Match each description with the type of encryption:
According to the information, what does a digital certificate help to do?
According to the information, what does a digital certificate help to do?
During asymmetric encryption, the decryption key must be transmitted to ensure secure communication.
During asymmetric encryption, the decryption key must be transmitted to ensure secure communication.
Explain how HTTPS helps secure online transactions.
Explain how HTTPS helps secure online transactions.
When sending sensitive data over the internet, ________ is the encryption standard used to secure web pages.
When sending sensitive data over the internet, ________ is the encryption standard used to secure web pages.
Match each characteristic with the most suitable type of encryption:
Match each characteristic with the most suitable type of encryption:
Which of the following best describes 'validation' in the context of data processing?
Which of the following best describes 'validation' in the context of data processing?
A presence check is a validation technique that ensures data is within a specified range.
A presence check is a validation technique that ensures data is within a specified range.
Give examples of what a presence check prevents in data entry, and describe the action the system takes when data is not present.
Give examples of what a presence check prevents in data entry, and describe the action the system takes when data is not present.
A(n) ________ check ensures that the data entered into a field is of the correct data type.
A(n) ________ check ensures that the data entered into a field is of the correct data type.
Match each validation method with its function:
Match each validation method with its function:
Which of the following best describes 'verification' in the context of data accuracy?
Which of the following best describes 'verification' in the context of data accuracy?
Visual checking guarantees that all data entered is correct, even if the original data is wrong.
Visual checking guarantees that all data entered is correct, even if the original data is wrong.
Why is it important to perform Double data entry?
Why is it important to perform Double data entry?
The process of inputting data twice and comparing the two entries is known as ___________.
The process of inputting data twice and comparing the two entries is known as ___________.
Match each type of data validation with its function
Match each type of data validation with its function
What is the main purpose of data processing?
What is the main purpose of data processing?
Online processing involves collecting individual operations into a batch for later execution.
Online processing involves collecting individual operations into a batch for later execution.
Explain how batch processing is used in processing employees' wages.
Explain how batch processing is used in processing employees' wages.
When data is processed all at one time without user interaction, this is called ________
When data is processed all at one time without user interaction, this is called ________
Match the definition to the name:
Match the definition to the name:
In an online airline ticket booking system, what type of data processing is employed?
In an online airline ticket booking system, what type of data processing is employed?
Electronic Funds Transfer (EFT) only includes direct payments between bank accounts.
Electronic Funds Transfer (EFT) only includes direct payments between bank accounts.
Describe what it means to send payment to someone else with electronic funds transfer
Describe what it means to send payment to someone else with electronic funds transfer
Flashcards
What is Data?
What is Data?
Raw numbers letters, symbols, sounds or images without meaning. Meaningless without context.
What is Information?
What is Information?
Data with context and meaning. Allows a person to understand its significance.
What is a direct data source?
What is a direct data source?
Data collected for a specific purpose, used directly by the collector.
What is an indirect data source?
What is an indirect data source?
Signup and view all the flashcards
What is Accuracy?
What is Accuracy?
Signup and view all the flashcards
What is Relevance?
What is Relevance?
Signup and view all the flashcards
What is Level of Detail?
What is Level of Detail?
Signup and view all the flashcards
What is Completeness?
What is Completeness?
Signup and view all the flashcards
What is Encryption?
What is Encryption?
Signup and view all the flashcards
What is Symmetric Encryption?
What is Symmetric Encryption?
Signup and view all the flashcards
What is Asymmetric Encryption?
What is Asymmetric Encryption?
Signup and view all the flashcards
What is Validation?
What is Validation?
Signup and view all the flashcards
What is a Presence Check?
What is a Presence Check?
Signup and view all the flashcards
What is a Range Check?
What is a Range Check?
Signup and view all the flashcards
What is a Limit Check?
What is a Limit Check?
Signup and view all the flashcards
What is a Type Check?
What is a Type Check?
Signup and view all the flashcards
What is a Length Check?
What is a Length Check?
Signup and view all the flashcards
What is a Format Check?
What is a Format Check?
Signup and view all the flashcards
What is a Lookup Check?
What is a Lookup Check?
Signup and view all the flashcards
What is a Consistency Check?
What is a Consistency Check?
Signup and view all the flashcards
What is a Check Digit?
What is a Check Digit?
Signup and view all the flashcards
What is Verification?
What is Verification?
Signup and view all the flashcards
What is Visual Checking?
What is Visual Checking?
Signup and view all the flashcards
What is Double Data Entry?
What is Double Data Entry?
Signup and view all the flashcards
What is a Hash Total?
What is a Hash Total?
Signup and view all the flashcards
What is a Control Total?
What is a Control Total?
Signup and view all the flashcards
What is a Parity Check?
What is a Parity Check?
Signup and view all the flashcards
What is a Checksum?
What is a Checksum?
Signup and view all the flashcards
What is data processing?
What is data processing?
Signup and view all the flashcards
What is batch processing?
What is batch processing?
Signup and view all the flashcards
What is online processing?
What is online processing?
Signup and view all the flashcards
What is real time processing?
What is real time processing?
Signup and view all the flashcards
Study Notes
Data and Information
- Data is raw, meaningless numbers, letters, symbols, sounds, or images without context
- Information is data with context and meaning
Data Sources
- Direct data sources collect data for a specific purpose, used by the collector
- Surveys of customers who purchased trainers from other shops are also considered indirect sources, with prices potentially discounted or changed
- Visiting other shops and noting prices or visiting websites to note prices are ways of using direct sources
- Indirect data sources use data collected for a different purpose
- Electoral registers contain names and addresses, aiding election processes
- Credit reference agencies use electoral registers to verify addresses; marketing agencies use them for direct marketing, with options to hide entries from public view
- Businesses purchase email lists or phone numbers for marketing, enabling targeted campaigns like IT textbook sales to IT teachers
Data Source Examples
- Names and email addresses of a political party member are collected so the party can contact them; they are then used to ask for donations
- Employee attendance dates/times are collected to calculate wages; they are then used to check an employee's alibi
Direct Data Sources
- Data relevance is high
- Original source is known and trustworthy
- Data is generally up-to-date
- Bias can be eliminated through specific questions
- Data format can be customized
Indirect Data Sources
- Data is immediately available
- Large samples enable statistical analysis
- Data may be outdated
- Original source might be biased
- Data format may be unsuitable, complicating extraction
Quality of Information: Overview
- Data must be accurate for good quality, for example a decimal point must be in the correct place
- Relevance is key; unnecessary information complicates the search for what is needed
- Information should be up-to-date, otherwise it isn't useful
Level of Detail
- Good quality information has the right amount of detail
- Completeness involves providing all necessary information for usability
Encryption
- Scrambles data, rendering it unreadable without a decryption key
- The purpose of it is to make data unreadable if an unauthorised user intercepts it
Why Encrypt?
- Encryption is important, as data stored on disks can be stolen/lost
- Data transmitted over networks can be intercepted by hackers
Caesar Cipher
- Ciphers convert text messages into encrypted messages
- It is a shift cipher and it replaces letters by shifting along the alphabet
- Using a shift of +3, "Hello" becomes "KHOOR"
Symmetric Encryption
- It requires sender and recipient to have a private encryption/decryption key that must be transmitted, making it interceptable
Asymmetric Encryption
- Public-key cryptography includes a public key available to anyone and a private key only known to the recipient
- Digital certificates help find the public key, identifying the user/server
- During encryption, the computer requests the digital certificate, which contains the public key
- It is used for SSL/TLS providing security for websites and it requires more processing power
- It is more secure, as the decryption key does not need transmission
Asymmetric Encryption Applications: Hard Disk
- Encryption of every bit of data on a disk using specialized software
- Benefit: automatic encryption on saving
- If the OS becomes corrupted, all data is lost permanently
- Encryption keys must be in a safe place
- Booting up the computer is slower
Single File Encryption
- This process requires the encryption key
- USBs and backup tapes should be encrypted
- Data is accessed by entering a password or a fingerprint
Applications: HTTPS
- Hypertext Transfer Protocol Secure (HTTPS) encrypts sensitive data (e.g., credit card numbers) on web pages using SSL/TLS
- Banks use TLS when users log onto online banking
- A secure page starts with "https://" and has a padlock symbol
- When a browser requests a secure page, it checks the digital certificate
- The browser uses the public key to encrypt a new symmetric key and send it to the web server
- The browser and server talk through symmetric encryption, which is faster
Applications: Email
- Achieved through public key cryptography/asymmetric encryption
- The recipient has to use a private key
- The sender and recipient have to send each other digitally-signed messages
- Encrypting an email also encrypts its attachments
How Encryption Protects Data
- Encryption protects data by scrambling it
- 256-bit AES encryption makes it virtually impossible to decrypt data, effectively protecting it
Data Validation
- Validation ensures data matches acceptable rules
- Presence Check: if the data hasn't been entered then the user is asked to enter data
- Range Check: To ensure that data is within a defined range
- Limit Check: Has a single boundary as the highest possible value or the lowest possible value
Type check
- A type check ensures that data must be of a defined data type
- Example of type check is to enter an age as an integer
Length check
- It ensures data is of a defined length or within a range of lengths
- For example it could be used to set a password
Checking data accuracy methods
Format check
- A format check ensures that data matches a defined format or pattern. For example, a student ID may need four numbers followed by two letters
Lookup check
- A lookup check tests to see if data exists, for example only 'X', 'P', 'M' or 'D' are entered
Consistency check
- A way to compare data in one field with data in another field that already exists within a record, to see whether both are consistent with each other
- For example, products scheduled to be dispatched can't be marked without packaging first
Check Digit
- A number/letter added to the end/beginning of a code to ensure the data is accurate
- The number is input then and algorithm is run to validate it
Data Verification
- Involves checking that the data entered into the computer system matches the original source
- Visual checking allows a user to visually check that the data entered matches the original source. done by the user
Double Data Entry
- This is where data the entered twice and compared, and if the data is different then the data must have been entered wrong the first time
Hash Total
- Used when inputting a set of data. It is calculated by adding together values from an input field
- Before input, the user manually adds up the values
- Post-input, the computer calculates the total for comparison
Control Total
- Very similar to a has total, as data is also summed, but the figures inputted have meaning
Parity Check
- It is used to find errors during data transmission.
- There are two types of parity check: either "even parity" or "odd parity."
Checksum
- They are a follow-on from the use of parity checks in that they are used to check that data/contents of a file has been transmitted accurately
Important note on validation
- It is possible to enter valid data that is still incorrect. For example verifying incorrect data
- By using both validation and verification, the chances of entering incorrect data are reduced
Data Processing
- Data processing is any activity that manipulates or carries out operations on data.
- Includes actions like collection/storage, editing, sorting, output
Batch Processing
- Batch Processing collects individual operations/. transactions that need to be performed on the data together into a batch
- Examples of where batch processing can be used is on automated backups and in the processing of wages or stock control
Files
- Master file - Used to store data for examples customers personal information
Transaction File
- A file where product order data is recorded
Algorithm example of the process
- At the start of the process, the transaction file is validated and any transactions that are invalid will be moved to an errors file
- The transaction file is sorted so that it is in the same order as the master file
Batch Processing: Advantages
- Single, automated process reduces human costs
- Can be scheduled during low-demand times
- Reduces transcription/update errors
- Fewer repetitive tasks for humans
Batch Processing: Disadvantages
- Data processing is delayed until a specific time period.
- Only data of the same type can be processed since an identical, automated process is being applied to all the data.
- Errors can't be corrected until the batch is complete
Automation example
- We can give each type of update a letter. • Changing an existing record in the master file will be C • Deleting a record from the master file will be D • Adding a new record to the master file will be A
Online data processing
- A real-time system uses a feedback loop to process inputs and generate outputs immediately
- System data flow requires feedback to monitor something like data temperature
Real Time: Example algorithm
- The system would have to go through each transaction file record and using the hourly rate (Rate) from the matching master file record, calculate that employee's wages for the week. This would be added to the employee's wages paid so far this year and replace the Wages_to_date value
Electronic Funds Transfer (EFT)
- It's the electronic transfer of funds to or from a bank account
- Direct payments enable bank-to-bank transfers
- ATMs allow cash withdrawals
- Debit cards facilitate payments for goods/services
- Direct debits authorize regular payments automatically
Online purchases: Example algorithm
- Log on by entering username and password
- Select card type, enter the card number
- An email address can be used notify the customer, and a delivery can be used so the store knows where the goods will be sent to
Automatic Stock control
- To ensure that shop always has enough stock, a database is needed
- The computer searches for this barcode number, it looks up the re-order quantity of that product and sends the order automatically to the supplier using the supplier's contact details
Electronic Data Exchange
- It is a standardised format for exchanging data between organisations
- Application Program Interfaces (APIs) are used to provide a standard interface for importing and exporting data between different software.
EDI usage example
- the buyer can create a purchase order, the software will transmit the order using EDI directly to the supplier's ordering system. the supplier can create an electronic invoice which will be transmitted by their software to the buyer's software
Real Time Feedback Example
- A central heating system that is constantly monitoring the temperature of its surroundings
algorithm example
- the boiler is switched off by the microprocessor, which then results in a drop in temperature and the boiler has to come back on again and so the sequence is repeated
- This requires input from a pre-set, and an on/off switch
Algorithm variation example
- It is more sophisticated than central-heating systems and involve units such as valves, compressors, condensing units and evaporating units, which together form a system
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.