Data and Information Sources

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which of the following best describes 'data' in the context of data processing?

  • Context-rich details ready for interpretation
  • Information presented in a structured format
  • Processed information with a clear meaning
  • Raw, unorganized facts or figures (correct)

Data always has intrinsic meaning and can be directly used for decision-making without further processing.

False (B)

Describe the key difference between 'data' and 'information'.

Data is raw and lacks context, while information is data that has been processed to have meaning and is useful for interpretation or decision-making.

________ is data that has been structured and given context to be meaningful and useful.

<p>information</p> Signup and view all the answers

Match each scenario with the appropriate type of data source:

<p>A marketing company purchases a list of email addresses. = Indirect data source A researcher conducts interviews to gather opinions. = Direct data source</p> Signup and view all the answers

What is a key advantage of using a direct data source?

<p>Data is collected specifically for the intended purpose. (A)</p> Signup and view all the answers

Indirect data sources are always less reliable than direct data sources.

<p>False (B)</p> Signup and view all the answers

Give an example of an indirect data source and explain how it might be used for a purpose different from its original intention.

<p>An electoral register, originally intended for elections, may be used by marketing companies for direct marketing.</p> Signup and view all the answers

Data collected from an electoral register for marketing purposes is an example of a(n) _______ data source.

<p>indirect</p> Signup and view all the answers

Match each data source characteristic with the suitable data source type:

<p>Data relevance is high. = Direct data source Data is readily available. = Indirect data source</p> Signup and view all the answers

Which of the following is an example of inaccurate information?

<p>Decimal point in the wrong place changing $903.00 to $90.30 (C)</p> Signup and view all the answers

Information is relevant if it contains data that is not required for the user's specific purpose.

<p>False (B)</p> Signup and view all the answers

Describe a scenario where information is complete but lacks detail, and explain how this could lead to problems.

<p>A delivery service provides the name of the street for a delivery but omits the house number. This lack of detail makes it impossible to complete the delivery effectively.</p> Signup and view all the answers

Information about resident numbers for 2011 when 500 new home have been built since then is an example of _______________.

<p>out of date information</p> Signup and view all the answers

Match each characteristic with the type of quality of information:

<p>Must be up to date = Age Is free from errors = Accuracy</p> Signup and view all the answers

What is the primary purpose of encryption?

<p>To make data unreadable without a decryption key (A)</p> Signup and view all the answers

Decryption is the unauthorized process of accessing encrypted data.

<p>False (B)</p> Signup and view all the answers

Explain why encrypting sensitive data, like a company's sales figures, is important.

<p>Encryption is important for sensitive data because it protects the data from being read if the storage media is stolen or lost.</p> Signup and view all the answers

The Caesar cipher is a type of _______________ cipher that works by shifting letters in the alphabet.

<p>shift</p> Signup and view all the answers

Match each description with the type of encryption:

<p>Requires both sender and recipient to possess a secret encryption and decryption key. = Symmetric Encryption It includes a public key available to anybody wanting to send data, and a private key known only to the recipient. = Asymmetric Encryption</p> Signup and view all the answers

According to the information, what does a digital certificate help to do?

<p>To find the public key used in asymmetric encryption (D)</p> Signup and view all the answers

During asymmetric encryption, the decryption key must be transmitted to ensure secure communication.

<p>False (B)</p> Signup and view all the answers

Explain how HTTPS helps secure online transactions.

<p>HTTPS encrypts data sent between the user's browser and the web server, protecting sensitive information such as credit card details and passwords. It is the encryption standard used for secure web pages.</p> Signup and view all the answers

When sending sensitive data over the internet, ________ is the encryption standard used to secure web pages.

<p>HTTPS</p> Signup and view all the answers

Match each characteristic with the most suitable type of encryption:

<p>Encrypts every single bit of data stored on a disk. = Hard Disk Encryption Works through public key cryptography and asymmetric encryption = Email Encryption</p> Signup and view all the answers

Which of the following best describes 'validation' in the context of data processing?

<p>The process of checking data against acceptable rules (A)</p> Signup and view all the answers

A presence check is a validation technique that ensures data is within a specified range.

<p>False (B)</p> Signup and view all the answers

Give examples of what a presence check prevents in data entry, and describe the action the system takes when data is not present.

<p>A presence check prevents users from leaving required fields empty. If data is not entered, the system typically displays an error message prompting the user to enter the missing data.</p> Signup and view all the answers

A(n) ________ check ensures that the data entered into a field is of the correct data type.

<p>type</p> Signup and view all the answers

Match each validation method with its function:

<p>Ensures data matches a defined format or pattern. = Format check/Picture check Tests if data exists in a list. = Lookup check</p> Signup and view all the answers

Which of the following best describes 'verification' in the context of data accuracy?

<p>Checking that the data entered into the computer system matches the original source (A)</p> Signup and view all the answers

Visual checking guarantees that all data entered is correct, even if the original data is wrong.

<p>False (B)</p> Signup and view all the answers

Why is it important to perform Double data entry?

<p>Double data entry is important because the two items of data are compared by the computer system and, if they match, then they are verified. If there are any differences, then one of the inputs must have been incorrect.</p> Signup and view all the answers

The process of inputting data twice and comparing the two entries is known as ___________.

<p>Double data entry</p> Signup and view all the answers

Match each type of data validation with its function

<p>Calculated by adding up values from an input field = Hash total Confirmation that all of the amounts were entered correctly = Control total</p> Signup and view all the answers

What is the main purpose of data processing?

<p>To manipulate or carry out operations on data (D)</p> Signup and view all the answers

Online processing involves collecting individual operations into a batch for later execution.

<p>False (B)</p> Signup and view all the answers

Explain how batch processing is used in processing employees' wages.

<p>In batch processing, all the wage-related data (hours worked, pay rate, deductions) for all employees are collected over a period. Then, at a specific time, the system processes all these transactions together to calculate and issue payments.</p> Signup and view all the answers

When data is processed all at one time without user interaction, this is called ________

<p>Batch Processing</p> Signup and view all the answers

Match the definition to the name:

<p>A file in a database containing information about one set of items = Master file Data is used to update a master file. = Transaction file</p> Signup and view all the answers

In an online airline ticket booking system, what type of data processing is employed?

<p>Real-time processing (B)</p> Signup and view all the answers

Electronic Funds Transfer (EFT) only includes direct payments between bank accounts.

<p>False (B)</p> Signup and view all the answers

Describe what it means to send payment to someone else with electronic funds transfer

<p>Log into our online bank account Select options for transfer money Select the account you’d wish to transfer money from Select new payee &amp; asks to type in Sort code, account number, payee name &amp; amount to transfer</p> Signup and view all the answers

Flashcards

What is Data?

Raw numbers letters, symbols, sounds or images without meaning. Meaningless without context.

What is Information?

Data with context and meaning. Allows a person to understand its significance.

What is a direct data source?

Data collected for a specific purpose, used directly by the collector.

What is an indirect data source?

Data collected for a different purpose and reused. Also known as a secondary source.

Signup and view all the flashcards

What is Accuracy?

Ensuring data is accurate for good quality. Prevents errors and misinterpretations.

Signup and view all the flashcards

What is Relevance?

Ensuring information is relevant to its purpose. Filters out unnecessary data.

Signup and view all the flashcards

What is Level of Detail?

Having the right amount of detail. Avoids overwhelming or insufficient information.

Signup and view all the flashcards

What is Completeness?

Ensuring all required information is present. Prevents missing pieces of data.

Signup and view all the flashcards

What is Encryption?

Scrambling data using a key so it cannot be understood without decryption.

Signup and view all the flashcards

What is Symmetric Encryption?

Both sender and receiver use the same key to encrypt and decrypt data.

Signup and view all the flashcards

What is Asymmetric Encryption?

Uses public and private keys. The public key encrypts, and the private key decrypts.

Signup and view all the flashcards

What is Validation?

Checking data to ensure it meets acceptable rules and formats.

Signup and view all the flashcards

What is a Presence Check?

Ensuring data is entered. An error message appears if blank.

Signup and view all the flashcards

What is a Range Check?

Ensuring data is within specified high and low limits.

Signup and view all the flashcards

What is a Limit Check?

Ensuring data does not exceed or fall below a single boundary value.

Signup and view all the flashcards

What is a Type Check?

Ensuring data is the correct kind (e.g., text, number, date).

Signup and view all the flashcards

What is a Length Check?

Ensuring data has a defined number of characters.

Signup and view all the flashcards

What is a Format Check?

Ensuring data matches a defined pattern.

Signup and view all the flashcards

What is a Lookup Check?

Ensuring that the data exists in a predefined list.

Signup and view all the flashcards

What is a Consistency Check?

Confirming related fields align logically.

Signup and view all the flashcards

What is a Check Digit?

An additional digit to check the integrity of entered data.

Signup and view all the flashcards

What is Verification?

Checking that the data entered matches the original source, often performed by a human.

Signup and view all the flashcards

What is Visual Checking?

Visually comparing entered data with the original source.

Signup and view all the flashcards

What is Double Data Entry?

Entering data twice and comparing the entries.

Signup and view all the flashcards

What is a Hash Total?

Adding up values from a field to check the total against a pre-calculated total.

Signup and view all the flashcards

What is a Control Total?

Similar to hash totals, but the data is meaningfully summed.

Signup and view all the flashcards

What is a Parity Check?

Detects errors during data transmission by checking each byte or word individually.

Signup and view all the flashcards

What is a Checksum?

Confirms data transfer accuracy by comparing file content before and after.

Signup and view all the flashcards

What is data processing?

Activity that manipulates or carries out operations on data.

Signup and view all the flashcards

What is batch processing?

Processing data in groups at a scheduled time.

Signup and view all the flashcards

What is online processing?

Real time processing of data.

Signup and view all the flashcards

What is real time processing?

Data processed instantly wth outputs generated immeditaly.

Signup and view all the flashcards

Study Notes

Data and Information

  • Data is raw, meaningless numbers, letters, symbols, sounds, or images without context
  • Information is data with context and meaning

Data Sources

  • Direct data sources collect data for a specific purpose, used by the collector
  • Surveys of customers who purchased trainers from other shops are also considered indirect sources, with prices potentially discounted or changed
  • Visiting other shops and noting prices or visiting websites to note prices are ways of using direct sources
  • Indirect data sources use data collected for a different purpose
  • Electoral registers contain names and addresses, aiding election processes
  • Credit reference agencies use electoral registers to verify addresses; marketing agencies use them for direct marketing, with options to hide entries from public view
  • Businesses purchase email lists or phone numbers for marketing, enabling targeted campaigns like IT textbook sales to IT teachers

Data Source Examples

  • Names and email addresses of a political party member are collected so the party can contact them; they are then used to ask for donations
  • Employee attendance dates/times are collected to calculate wages; they are then used to check an employee's alibi

Direct Data Sources

  • Data relevance is high
  • Original source is known and trustworthy
  • Data is generally up-to-date
  • Bias can be eliminated through specific questions
  • Data format can be customized

Indirect Data Sources

  • Data is immediately available
  • Large samples enable statistical analysis
  • Data may be outdated
  • Original source might be biased
  • Data format may be unsuitable, complicating extraction

Quality of Information: Overview

  • Data must be accurate for good quality, for example a decimal point must be in the correct place
  • Relevance is key; unnecessary information complicates the search for what is needed
  • Information should be up-to-date, otherwise it isn't useful

Level of Detail

  • Good quality information has the right amount of detail
  • Completeness involves providing all necessary information for usability

Encryption

  • Scrambles data, rendering it unreadable without a decryption key
  • The purpose of it is to make data unreadable if an unauthorised user intercepts it

Why Encrypt?

  • Encryption is important, as data stored on disks can be stolen/lost
  • Data transmitted over networks can be intercepted by hackers

Caesar Cipher

  • Ciphers convert text messages into encrypted messages
  • It is a shift cipher and it replaces letters by shifting along the alphabet
  • Using a shift of +3, "Hello" becomes "KHOOR"

Symmetric Encryption

  • It requires sender and recipient to have a private encryption/decryption key that must be transmitted, making it interceptable

Asymmetric Encryption

  • Public-key cryptography includes a public key available to anyone and a private key only known to the recipient
  • Digital certificates help find the public key, identifying the user/server
  • During encryption, the computer requests the digital certificate, which contains the public key
  • It is used for SSL/TLS providing security for websites and it requires more processing power
  • It is more secure, as the decryption key does not need transmission

Asymmetric Encryption Applications: Hard Disk

  • Encryption of every bit of data on a disk using specialized software
  • Benefit: automatic encryption on saving
  • If the OS becomes corrupted, all data is lost permanently
  • Encryption keys must be in a safe place
  • Booting up the computer is slower

Single File Encryption

  • This process requires the encryption key
  • USBs and backup tapes should be encrypted
  • Data is accessed by entering a password or a fingerprint

Applications: HTTPS

  • Hypertext Transfer Protocol Secure (HTTPS) encrypts sensitive data (e.g., credit card numbers) on web pages using SSL/TLS
  • Banks use TLS when users log onto online banking
  • A secure page starts with "https://" and has a padlock symbol
  • When a browser requests a secure page, it checks the digital certificate
  • The browser uses the public key to encrypt a new symmetric key and send it to the web server
  • The browser and server talk through symmetric encryption, which is faster

Applications: Email

  • Achieved through public key cryptography/asymmetric encryption
  • The recipient has to use a private key
  • The sender and recipient have to send each other digitally-signed messages
  • Encrypting an email also encrypts its attachments

How Encryption Protects Data

  • Encryption protects data by scrambling it
  • 256-bit AES encryption makes it virtually impossible to decrypt data, effectively protecting it

Data Validation

  • Validation ensures data matches acceptable rules
  • Presence Check: if the data hasn't been entered then the user is asked to enter data
  • Range Check: To ensure that data is within a defined range
  • Limit Check: Has a single boundary as the highest possible value or the lowest possible value

Type check

  • A type check ensures that data must be of a defined data type
  • Example of type check is to enter an age as an integer

Length check

  • It ensures data is of a defined length or within a range of lengths
  • For example it could be used to set a password

Checking data accuracy methods

Format check

  • A format check ensures that data matches a defined format or pattern. For example, a student ID may need four numbers followed by two letters

Lookup check

  • A lookup check tests to see if data exists, for example only 'X', 'P', 'M' or 'D' are entered

Consistency check

  • A way to compare data in one field with data in another field that already exists within a record, to see whether both are consistent with each other
  • For example, products scheduled to be dispatched can't be marked without packaging first

Check Digit

  • A number/letter added to the end/beginning of a code to ensure the data is accurate
  • The number is input then and algorithm is run to validate it

Data Verification

  • Involves checking that the data entered into the computer system matches the original source
  • Visual checking allows a user to visually check that the data entered matches the original source. done by the user

Double Data Entry

  • This is where data the entered twice and compared, and if the data is different then the data must have been entered wrong the first time

Hash Total

  • Used when inputting a set of data. It is calculated by adding together values from an input field
  • Before input, the user manually adds up the values
  • Post-input, the computer calculates the total for comparison

Control Total

  • Very similar to a has total, as data is also summed, but the figures inputted have meaning

Parity Check

  • It is used to find errors during data transmission.
  • There are two types of parity check: either "even parity" or "odd parity."

Checksum

  • They are a follow-on from the use of parity checks in that they are used to check that data/contents of a file has been transmitted accurately

Important note on validation

  • It is possible to enter valid data that is still incorrect. For example verifying incorrect data
  • By using both validation and verification, the chances of entering incorrect data are reduced

Data Processing

  • Data processing is any activity that manipulates or carries out operations on data.
  • Includes actions like collection/storage, editing, sorting, output

Batch Processing

  • Batch Processing collects individual operations/. transactions that need to be performed on the data together into a batch
  • Examples of where batch processing can be used is on automated backups and in the processing of wages or stock control

Files

  • Master file - Used to store data for examples customers personal information

Transaction File

  • A file where product order data is recorded

Algorithm example of the process

  • At the start of the process, the transaction file is validated and any transactions that are invalid will be moved to an errors file
  • The transaction file is sorted so that it is in the same order as the master file

Batch Processing: Advantages

  • Single, automated process reduces human costs
  • Can be scheduled during low-demand times
  • Reduces transcription/update errors
  • Fewer repetitive tasks for humans

Batch Processing: Disadvantages

  • Data processing is delayed until a specific time period.
  • Only data of the same type can be processed since an identical, automated process is being applied to all the data.
  • Errors can't be corrected until the batch is complete

Automation example

  • We can give each type of update a letter. • Changing an existing record in the master file will be C • Deleting a record from the master file will be D • Adding a new record to the master file will be A

Online data processing

  • A real-time system uses a feedback loop to process inputs and generate outputs immediately
  • System data flow requires feedback to monitor something like data temperature

Real Time: Example algorithm

  • The system would have to go through each transaction file record and using the hourly rate (Rate) from the matching master file record, calculate that employee's wages for the week. This would be added to the employee's wages paid so far this year and replace the Wages_to_date value

Electronic Funds Transfer (EFT)

  • It's the electronic transfer of funds to or from a bank account
  • Direct payments enable bank-to-bank transfers
  • ATMs allow cash withdrawals
  • Debit cards facilitate payments for goods/services
  • Direct debits authorize regular payments automatically

Online purchases: Example algorithm

  • Log on by entering username and password
  • Select card type, enter the card number
  • An email address can be used notify the customer, and a delivery can be used so the store knows where the goods will be sent to

Automatic Stock control

  • To ensure that shop always has enough stock, a database is needed
  • The computer searches for this barcode number, it looks up the re-order quantity of that product and sends the order automatically to the supplier using the supplier's contact details

Electronic Data Exchange

  • It is a standardised format for exchanging data between organisations
  • Application Program Interfaces (APIs) are used to provide a standard interface for importing and exporting data between different software.

EDI usage example

  • the buyer can create a purchase order, the software will transmit the order using EDI directly to the supplier's ordering system. the supplier can create an electronic invoice which will be transmitted by their software to the buyer's software

Real Time Feedback Example

  • A central heating system that is constantly monitoring the temperature of its surroundings

algorithm example

  • the boiler is switched off by the microprocessor, which then results in a drop in temperature and the boiler has to come back on again and so the sequence is repeated
  • This requires input from a pre-set, and an on/off switch

Algorithm variation example

  • It is more sophisticated than central-heating systems and involve units such as valves, compressors, condensing units and evaporating units, which together form a system

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Exploring Data Sources
10 questions

Exploring Data Sources

EndearingHippopotamus avatar
EndearingHippopotamus
Importance of Data Sources Quiz
15 questions
Data Sources Overview
10 questions

Data Sources Overview

DextrousMountRushmore avatar
DextrousMountRushmore
Data Sources and Raster Data in GIS
48 questions
Use Quizgecko on...
Browser
Browser