DATA PROCESSING AND INFORMATION It 1234567890
DATA PROCESSING AND INFORMATION It 1234567890
information
By Mujjuzi Yasin
Information.
Data and information • When data item are given context and
meaning.
Data • They become information a person
reading the information will then
•Data is raw numbers letters symbols know what it means .
letters, symbols, sound, all images with
no meaning, some. Some examples of • Data is given in context by identifying
data what sort of data it is.
•P95BR. • This still does not make it information,
but it is a step on the way to become
•@BBCclick information.
•359
•2355.99R
Questions
• A company a create website using style sheet.
1. Identify one item of data that will be used by the company this.
2. Describe how this item of data can become information.
Data sources
Direct data sources.
• Data collected from a direct data source (primary source ) must
be used for the same purpose for which it was collected .
• Direct data source data that is collected from the purpose for
which to be used.
• For example, a sport shop wants to find out what other shops
are charging For trainers, there are various direct resources
from which this data can be collected These could include :
• visiting the other shops and noting down the prices.
• Visiting other shops website and noting down the prices.
• carrying out a survey of other shop’s owners to ask their
prices .
Direct data collection methods
• Questionnaires, can be used to gather specific data such as opinions
about an invent that has taken place.
• Questioners are particularly useful when there are many respondents and
the statistical analysis. Will be carried out .
• question here need to be structured, carefully to:
• elicit the information required
• enable analysis of the data effectively
• gather enough information without putting people off from completing
the questionnaires.
• Online questionnaires enabled quicker analysis of data because the users fill
in the data online and then the data is entered into database .
• online questionnaires save time because no further data entry by a third
party is necessary.
Direct data collection
methods
• Interviews,are another direct source of
information . questions are asked directly to
respondent and the interviewer can ask the
respondent to elaborate on their answers.
• Interviews are used to collect data about a
topic and can be structured or unstructured .
• Observation, is the method of data collection
in which the data collectors watch what
happens in a given situation.
• The observer collects data by seeing for
themselves what happens rather than
depending on their answers from
interviewees or the accuracy of completed
the questions
Direct data collection
methods
Direct Indirect
The data will be relevant because what is Additional data that is not required will exist
needed has been collected. that may take time to sort through and some
data that is required may exist.
The original source is known and so can be The original source may not be known and so
trusted it can't be assumed that it is reliable.
It can take a long time to gather original data The data is immediately available.
rather that use data that already exist.
A large sample of statistical data can be If statistical analysis is required, then there are
difficult to collect for one-off purpose more likely to be large samples available.
Questions
Qualities of information 2. Relevance:
• Open-ended questions might lead to biased or • Being given a bus timetable when you want
ambiguous responses. to catch a train.
• Being told the rental price of car when you
want to by the car
Qualities of information
• The age of information impacts its quality and • Information should have the right level of detail
usefulness. for its purpose.
• Information needs to be up-to-date to reflect • Too much detail can make it hard to extract
current conditions. essential information.
• Outdated information can lead to inaccurate • Concise presentation enhances usefulness and
decisions and results. comprehension.
Examples include:
Encryption is a way of scrambling data so that only authorized people can understand the information.
This process is used whether the data is being transmitted across the internet or is just being stored.
It does not prevent cyber criminals intercepting sensitive information, but it does prevent them from understanding
it.
Employing data encryption is a safe way for companies to protect their confidential information and their reputation
with their clients, since the benefits of encryption do not just apply to the use of the internet.
Information should also be encrypted on computers, hard-disk drives, pen drives and portable devices, whether
they be laptops, tablets, or smartphones.
The misuse of the data on these devices will be prevented, should the device be hacked, lost or stolen.
The need for encryption
• Whenever you send personal information across the internet, whether it is credit card
information or personal details, there is a risk that it can be intercepted.
• Once it is intercepted the information can be changed or used for purposes such as identity
theft, cyber-fraud, or ransomed off.
• Data is scrambled or jumbled up so that it is completely unreadable.
• When a message/information is intercepted//accessed it is unreadable/ can't be understood
... (1)
• ... so, therefore, it is useless (1)
• ... to a hacker (accept alternative examples of 3rd party or just ‘third party’) (1)
• It protects customers when they bank/shop online/any other suitable
• example from any area of use (MUST BE protecting data) ... (1) ... as the data cannot be used
for identity theft (1)
• Data can only be decrypted by the receiving computer if it has the private/decryption key (1)
Methods of encryption
• Symmetric encryption, also known as 'secret key
encryption', involves both the sender and receiver
using the same key to encrypt and decrypt messages.
• This method is faster than asymmetric encryption but
faces the challenge of securely sharing the private key.
• The sender must transmit the encryption key to the
recipient prior to decryption, which raises security
concerns as the key could be intercepted and
misused.
• To address this issue, some companies employ
asymmetric encryption to share the secret key and
then use symmetric encryption for actual data
encryption.
Methods of encryption
• Asymmetric encryption
• Often called public-key encryption (1)
• Uses two different keys// one public and one private/secret (key)
(1)
• No need to transfer a key (with the message) (1)
• The public key/key held by the person doing the encryption is
used to encrypt the data (1)
• The corresponding private/secret key is used to decrypt the data
(1)
• The public key is published to everyone (1)
• The private key is kept secret (1)
• Anyone with a copy of the public key can encrypt information (1)
• Only the private key holder can read the information (1)
• It is not possible to deduce the private key from the public key (1)
Uses of encryption
Hard-disk encryption
• When a file is written to the disk, it can be automatically encrypted by encryption
software
• Full disk encryption is when the data is encrypted as soon as it is saved to the hard
disk
• When a file is read from the disk the decryption/encryption key/password is
needed to decrypt it
• When a file is read from the disk, the software automatically decrypts it… … while
in some types of hard disk encryption leaving all other data on the disk encrypted
• (All) the files on the disk are encrypted/ It’s the encryption of data on that disk…
• …except in some cases the operating system
• Whether the disk stays in the computer or moved to another computer it is still
encrypted
• Only the person/computer with the secret/decryption/encryption key/password
can understand the data on the disk/data can’t be read without the
• decryption/encryption key/unauthorised people cannot read the data
• You've provided a comprehensive overview of email encryption and its
importance in securing sensitive information during email communication. Let's
break down the key points you've mentioned:
1. Encryption of Connection:
• Encrypting the connection to the email provider's server using protocols like
SSL/TLS (Secure Sockets Layer/Transport Layer Security) ensures that hackers
cannot intercept login details and the content of messages as they travel between
your device and the server.
• This prevents eavesdropping and data theft during transit.
encryption • Encrypting the content of the email messages themselves ensures that even if a
hacker intercepts the message, they won't be able to understand its contents
without the decryption key.
• Asymmetric encryption is commonly used for this purpose, where the sender
uses the recipient's public key to encrypt the message, and the recipient uses
their private key to decrypt it.
3. Encryption of Saved or Archived Messages:
• Encrypting saved or archived messages on your device adds an extra layer of
protection, making it difficult for hackers to access your stored emails even if they
manage to breach your computer's security settings.
Encryption in HTTPS websites
• HTTPS (Hypertext Transfer Protocol Secure) is used to securely browse the internet, protecting
sensitive data from interception and fraud.
• Unlike regular HTTP, it employs SSL/TLS encryption to ensure security.
• Websites with HTTPS have digital certificates from trusted authorities, verifying their
authenticity.
• This prevents data tampering during transfer and encrypts information between clients and
servers.
• HTTPS enables secure transmission of confidential data like credit card info.
• Secure sites are identified by the HTTPS prefix and a padlock icon in the URL.
• HTTPS works by a handshake between the browser and server, creating a session key for further
communication.
• Asymmetric encryption creates the session key, while symmetric encryption encrypts data
afterward for efficiency.
• Each session uses a new session key. Benefits of HTTPS include data confidentiality and higher
search engine rankings. However, loading times can be longer due to certificate management
and expiration checks.
• Encryption is the scrambling of data… …it converts plaintext to ciphertext... …into
meaningless groups of symbols…
encrypted. • It does not prevent hackers intercepting personal data but it prevents them from
understanding it
Analyse the • Two types of encryption asymmetric and symmetric…
encryption of • …symmetric and asymmetric use a private key but asymmetric uses a public key as well
personal data /symmetric uses the same key to encrypt and decrypt but asymmetric uses different keys…
• …symmetric uses a private key to encrypt and decrypt /symmetric is where both sender and
when it is receiver use a private key…
sent across • …asymmetric uses a public key to encrypt and a private key to decrypt /sender uses a public
key and receiver uses a private key
the internet.
• Can only decrypt using a decryption key/only authorised users have the decryption key…
• … Symmetric is a faster method than asymmetric… … Symmetric is less secure than
asymmetric Data is encrypted using an encryption key
Advantages of Encryption:
Advantages and 1. Security: Encryption protects sensitive information from unauthorized
Disadvantages of access and cyber threats, ensuring data confidentiality and integrity.
IPsec: 1. Client Software Download: SSL/TLS may require extra software for non-
web applications, which could be hindered by firewalls.
2. Limited OS Support: Certain operating systems may not support
SSL/TLS VPN tunnels while supporting IPsec.
3. Weaker Security:Optional user authentication in SSL/TLS may weaken
security compared to IPsec.
Questions
1. Briefly describe what is meant by symmetric
encryption.
2. Write a sentence about each of the three
uses of encryption.
3. Explain the difference between HTTP and
HTTPS
Checking the accuracy of
data
• Validation takes place when data is
input into a computer system.
• The purpose is to ensure the data is
sensible and conforms to defined
rules.
• Accurate data input is crucial for
Validation obtaining precise outcomes during
data processing.
• Data entry, especially in computer
systems, can be time-consuming.
• Minimizing errors during data entry or
transfer is vital to avoid additional time
spent on corrections or re-entry.
Methods of
validation
• Presence check
• A presence check is used to
ensure that data is entered .
• If data is entered, then it is
accepted.
• If data is not entered, then
the user will be presented
with an error message asking
them to enter data
Range check
• A range check ensures that data is within a defined range.
• A limit check has a single boundary.
• This could be the highest possible value or the lowest possible value or
lowest possible value.
• A range check includes two boundaries, which would be the lower
boundary.
• These symbols are used when comparing with a boundary:
• > greater than
• < less than
• >= greater than or equal to
• <= less than or equal to
Type check
• A type check ensures that data
must ne of a defined datatype.
• Examples of type check
include:
• If an age is entered, it must be
an integer.
• If grade is entered, it must be
text with no numbers
• If price is entered, it must be
numerical.
• If date of birth is entered, it must be
a date.
Length check
• A check digit is utilized to validate data as it's being entered, particularly for numerical data
stored as alphanumeric strings.
• It's commonly used to verify the accuracy of data like ISBNs.
• The check digit is calculated based on a specific formula: for an ISBN, the first 12 digits are
multiplied by alternating values (1 for odd positions and 3 for even positions), the results
are summed and divided by 10.
• If the remainder is 0, it becomes the check digit; otherwise, the remainder is subtracted
from 10.
• The check digit is added to the end of the string, acting as a 13th digit.
• This calculation occurs before data is entered, like during ISBN allocation.
• If they don't match, it indicates an error, often due to digit transposition. For instance,
mistyping "9781447606189" instead of "9781474606189" would result in a recalculated
check digit of 5 instead of 9, leading to an error message.
Verification
• Is the process of checking that the data entered into
the computer system matches the original source.
Visual checking
• A method of verification can be for the user check
visually that the data entered matches the original
source.
• This can be done by reading the data displayed on
screen and comparing it with the original data.
• They can see the differences and then correct the
mistakes.
Verification
Double data
• It entry involves entering the same data
twice, with the first version being stored
initially.
• A computer then compares the second entry
to the first, identifying any discrepancies.
• The data entry person is notified by the
computer of any differences, allowing them
to review and correct errors if needed before
proceeding.
• This method is similar to visual verification,
as both ensure accurate data replication
rather than validating the accuracy of the
original data
• 2. Odd Parity: In odd parity, the total
number of set bits in the data group,
Verification including the parity bit, should always be
odd.
• Parity check • The parity bit is set to 0 if the count is odd,
and to 1 if the count is even.
• is a method of verification used in data transmission and
storage to detect errors. • Similar to even parity, if a single bit is
• It involves adding an extra bit, known as a parity bit, to a flipped, the parity check will identify the
group of bits (usually a byte) to ensure that the total error.
number of set (1) bits in the group is either even (even • Parity check is a simple and straightforward
parity) or odd (odd parity). error-detection technique, but it has
• This extra bit is calculated based on the existing data bits. limitations.
• Here's how it works: • It can only detect odd numbers of bit
• 1. Even Parity: In even parity, the total number of set bits errors. If two or more bits are flipped, the
(1s) in the data group, including the added parity bit, error might go undetected.
should always be even. • Additionally, parity check doesn't provide
• If the count of set bits is already even, the parity bit is set any means to correct errors; it only detects
to 0. If the count is odd, the parity bit is set to 1. their presence.
• This way, if a single bit gets flipped during transmission or
storage, the parity check will detect the error, as it will
result in an odd total count of set bits.
Verification
• Checksum
• However, such a checksum might not catch
• A checksum is a method used to verify the swapped bytes.
accuracy of data transmission between devices.
• Encryption algorithms, like hash functions, are
• It ensures that data received matches the data sometimes used to calculate more secure
sent. checksums, which are then compared by the
receiving device to the sent checksum.
• Unlike byte-by-byte parity checks, checksums
operate on entire files of data. • Common checksum algorithms include MD5 and
SHA-1, though newer ones like SHA-2 and SHA-3 are
• They are employed when transmitting data over more robust due to weaknesses in the older
networks or the internet. algorithms.
• Checksums are calculated using various • Checksum values are usually expressed in
algorithms. For instance, a basic checksum could hexadecimal format, a base-16 counting system.
be the file's byte count. This ensures data integrity during transmission.
Control total
• Control totals are very similar to hash to
total.
• Hash total can use any field and the sum of
the data used may not have any meaning.
Verification
• Control totals have some useful meaning.
• For example, a control total could be the
number of items in the batch that is to be
input, or the total of prices for individual
items on an order.
Common errors when copying data are transcription and
transposition errors .
Advantages Disadvantages
It is a single, automated process requiring There is a delay as data is not processed until
little human participation which can reduce the specific time period.
costs.
It can be scheduled to occur when there is Only data of the same type can be processed
little demand for computer resources, for since an identical, automated process is being
example at night. applied to all the data.
As it is an automated process there will be Errors cannot be corrected until the batch
none of the transcription and update errors process is complete.
that human operators would produce.
There are fewer repetitive tasks for the human
operators.
Question
• Describe how a
telephone company
might make use of both
batch and interactive
processing methods
including the use of
master and transaction
files.
• Online processing involves immediate data
processing compared to the delayed processing of
batch methods.
• While batch processing collects data for later use,
online processing is essential for tasks needing
instant results, like supermarket checkouts or real-
time database queries.
Online • Initially, online processing referred to direct user-
central computer communication, now expanded
processing to encompass any IT activity via the internet.
• A key difference between batch and online
processing is data retrieval method: batch uses
sequential access, while online relies on direct
access for quicker record retrieval.
• This approach is crucial for tasks requiring rapid
outcomes and is integral to internet-based IT
systems.
Uses of online
processing
• Electronic funds transfer (EFT) refers to the electronic
movement of money between bank accounts using
computer-based systems, without the need for direct
involvement of bank personnel.
• Common examples of EFT include:
• automated teller machine (ATM) transactions,
• person-to-person payments, and
• direct debits for goods or services.
• EFTs can also result from credit or debit card
transactions, whether in-store or online.
• Explain what happens after you have logged in to your
online bank account, although the process may differ
slightly from bank to bank, and assumes you are paying
someone new
Automatic stock control
• Automatic stock control is a method within IT for managing inventory
efficiently.
• It involves using automated systems controlled by computers to handle
stock with minimal human intervention.
• One common example is utilizing EFTPOS terminals in stores and
supermarkets for both payment and stock control purposes.
• During checkout, a barcode of an item is scanned by a checkout
operator, which updates the stock information in the computer system.
• These terminals include a screen, a barcode reader, a number pad, and
electronic scales, all connected to a computer network.
• The network's server contains a product file with records for each
product sold.
• Each record contains data fields such as the barcode number (unique
identifier), product details, price, size, current stock count, re-order
level, re-order quantity, and supplier details.
Electronic Data Exchange (EDI)
Advantages:
• Maintenance and Upgrades: Online systems are easier to maintain and upgrade since system downtime can be
scheduled during off-peak hours.
• Immediate Error Handling: Errors are immediately revealed and can be addressed, improving data accuracy and
preventing further issues.
Disadvantages:
• Higher Costs: Setting up and maintaining online systems can be more expensive due to additional hardware
requirements and constant connectivity.
• Continuous Connectivity: Users and employees must be connected at all times for data entry, increasing reliance on
network availability.
• Resource Demand: Online systems can strain computer resources during peak usage times, impacting overall system
performance.
Note: Each processing method has its own strengths and weaknesses, and the choice depends on the specific context,
user needs, and the nature of the tasks being performed.
Examination-style questions
1 A collection of data could be this: johan, Σ, $, ,, AND
Explain why these are regarded as just items of data. In your explanation give a possible context for each item
of data and describe how the items would then become information. [5]
2 A company uses computers to process its payroll, which involves updating a master file. a State what
processes must happen before the updating can begin. [2]
b Describe how a master file is updated using a transaction file in a payroll system. You may assume that the
only transaction being carried out is the calculation of the weekly pay before tax and other deductions. [6]
3 a Name and describe the purpose of three validation checks other than a presence check.
b Explain why a presence check is not necessary for all fields. [3]
4 A space agency controls rockets to be sent to the moon. Describe how real-time processing would be used
by the agency. [5]
5 Describe three different methods used to carry out verification. [3]
6 L12345 is an example of a student identification code. Describe two appropriate validation checks which
could be applied to this data. [2]
7 Describe three drawbacks of gathering data from direct data sources. [3]