Information Processing & Device Interface
Information Processing & Device Interface
The function of the interface is translation – one side of the interface communicates with the device while the
other side communicates with the computer.
Floating point data type is the same as Real data type – numbers with a decimal point.
Characteristics of an algorithm:
Truth Table/Trace Table – a table listing all possible combinations of inputs and the corresponding output.
Syntax errors – errors generated because of improper use of the programming language.
2
Logic errors – errors in the sequencing/order of instructions in a program.
Run-time error – an error in a computer program that is not detected until the program is executed, and then
causes a processing error to occur.
Information Processing:
3
Data processing: the manipulation of data to obtain information.
Sources of information:
1. Measurements
2. Informal communication (word-of-mouth)
3. Publications
4. questionnaires
Information as a commodity:
4
An information commodity - is an item of information that can be bought or sold, e.g. with online information you
may have to pay a fee every time you access it.
1. Operational level – (lowest level) supervisors or foremen, for example, ensure that specific tasks are
planned and properly carried out within a factory or office.
The use of computers at this level is mainly for preparing reports, payroll sheets, files and so on.
2. Tactical level – (middle level) middle management will decide how the resources of the organization
should be employed/used to achieve the goals set at the lower strategic level.
There is more reliance on computers for error reporting, investigation and analysis of information than at
the operational level.
3. Strategic level – (highest level) the highest levels of decisions are made concerning the long-term
objectives of the organization.
At this level executive information systems provide access to reports so that decisions can be made on the
organization’s past performances, market trends and projections for the future.
Good databases avoid this problem by allowing only one user or system to access the data record at a time.
Data verification and validation is used to evaluate whether data has been generated according to specifications,
satisfy acceptance criteria, and are appropriate and consistent with their intended use.
Data Validation: a checking process aimed at finding out if the data is genuine and is of the correct data type.
Data Verification: the process of checking to ensure that the data has been entered correctly and matches what’s
on the source document.
Verification is normally performed by human while validation can be carried out by the Information Processing
System or computer. Examples of validation checks are that a month be between 1 and 12 (1 and 12 included) or
that a gender be either male or female.
Common Error:
1. Typographical error – a typing error where there might be a missing letter or an extra
letter e.g. Guyaana instead of Guyana.
2. Transposition error – error where two letters are mixed up e.g. Guayna instead of
Guyana.
One way to eliminate these two types of errors is to have two different persons enter the data.
The computer then compares the two versions. If the both versions are identical then no error
was made.
When data is entered twice and compared by the computer double-entry verification has been
performed.
A simpler method of verification is visual verification where one person enters the data and
another person looks at the data on the computer as well as the original source document
checking to ensure they are the same.
6
1. Control Systems: regulates themselves or other devices. Examples of devices/appliances
using control systems include microwaves and washing machines. The control system
tells them when to start/stop and how to operate.
Other examples would include: traffic lights, alarm systems which uses heat and motion
sensors, and thermostats which senses when the temperature is below a set value and
switch the heating on.
2. Electronic Banking: allows you to conduct different financial transactions over the
internet, including Electronic Funds Transfer (EFT).
3. Scientific Information Processing: these help scientists process data. Examples include,
weather forecasting systems, health-care professional automated processing system,
Laboratories machines that can analyze a blood sample.
4. Commercial information processing: these are used to keep track of transactions and
keep records. Examples include Point Of Sale (POS) systems which uses barcode readers
and computers to read prices and keep track of stock.
Range checks – this method ensures that numbers entered fall within a specific range e.g. the
value for hours in a day cannot go higher than 24.
Reasonableness checks – ensures that data is reasonable – not completely unrealistic e.g. a
salary does not have extra zeros by mistake.
Data type checks (also called character checks) – ensures that the right type of data has been
entered. For example, a field that captures the age of a person may have a character check that
rejects the input of letters or symbols.
Consistency checks – compares data you have entered against other data you have entered to
ensure that they correspond with each other.
Presence checks – documents and forms tend to have required fields and optional fields. A
required field must contain a value while an optional field can be left blank. A presence check is
used to ensure that the required fields contain data.
7
Length checks – it determines whether the entered data is the correct length or the right
number of digits. If a number is entered that is longer or shorter than the required length, the
program will return an error.