You are on page 1of 34

Information Processing

Data vs. Information


⚫ Data is raw facts and figures that is, it is meaningless. E.g.
45,John, Mayfield, 23

⚫ Information is processed data that is, it is meaningful.


E.g.: name: John Age: 23 Address: 45 Mayfield
Data vs Information
⚫ Data doesn’t just appear out of nowhere in the computer,
capturing data is really the first step.

Input Output
Raw Data Processing Information
Data Vs Information
Sources of information
⚫ People
⚫ Textbooks
⚫ Magazine
⚫ Dictionaries
⚫ Atlas
⚫ News paper
⚫ Journals
⚫ Fiction Books
⚫ Online
Characteristics of information
⚫ Relevant - it must be what the user needs to know and up-to-date
⚫ Accurate- it must be as correct as possible
⚫ Timely – information should be provide for the period in which it is
needed.
⚫ Complete – it must represent a ‘whole’ picture of a problem or
solution.
⚫ Currency – must be up-to-date
⚫ Cost-effective – the value of the information should be more than
the cost involved in its collection.
⚫ In an appropriate medium- it should be delivered using an
appropriate communication medium, whether by printed or
electronic material or storage device.
Uses of information
⚫ As a commodity
⚫ As a decision making tool
Evaluation of information from
online sources
Criteria for rejecting or accepting a piece of information
⚫ Authenticity
⚫ Currency
⚫ Relevance
⚫ Bias
What is information processing?
⚫ Information processing is when a machine or processor
interacts with outside world and acts on the input it
receives.
⚫ An example of this is an automatic electric kettle which
senses when the water temperature reaches boiling point
and switches off.
Advantages and disadvantages of
information processing

Advantages Disadvantages
⚫ Tasks can be completed faster ⚫ It may need high initial
because data and information can investment in equipment and
be processed at amazing speeds. training.
⚫ Computers can process large ⚫ More money may be needed to
amounts of data and generate employ specialized staff to
error-free results, provided that operate and design the
the data is entered correctly. information system.
⚫ Computing storage devices can ⚫ Some jobs may be lost as a
store large amounts of data and result of computerization,
information for future use. which may lower the morale of
staff members.
Documents used for Information
Processing
⚫ Source documents
⚫ A source document is one that contains data that is going
to be input into a computer system.
⚫ When an employee takes a document and enters the data
into a computer system, the document is referred to as a
source document. Once the data has been entered it
should be filed away safely, and not thrown away. That is
because the data may have to be checked again.
Documents used for Information
Processing
Human-readable document
⚫ A human –readable document is any document that
needs to be read by humans.
⚫ Many forms are filled in by hand and the employee has to
read them before entering the data on a keyboard. These
are called human-readable documents.
⚫ NB: Softcopy – this is not a permanent copy(ie. sounds,
display on a monitor, electrical signals from a modem)
⚫ Hardcopy – this is a permanent copy(ie. Printed
document)
Documents used for Information
Processing
Machine-readable document
Machine-readable document is one on which the data can
be ‘read’ by an input device, such as a scanner or
Character reader.
Documents used for Information
Processing
Turnaround document
A turnaround document is a machine-readable document
that has some information printed on it by a computer but
has more information added to it by a human. It is then fed
back into a computer to transfer this newly added
information. These documents serve two purposes. They
are used to:
⚫ Verify the accuracy and completeness of information that
has already been entered.
⚫ Update information already entered with additional data
Validation and Verification
⚫ A common problem with computer systems is that it is
very easy to input incorrect data. Examples include users
mistyping a name or address in to a database, so that letter
is sent to the wrong person.
Errors

⚫ Errors are part of any computer information system.


There are several approaches to dealing with the problems
that errors cause, specifically detecting when errors occur
(so that they can be corrected) and preventing errors (so
that they do not occur).
Data entry

⚫ Sometimes data cannot be automatically scanned into the system for


storage, so a common way is to type the data directly into the computer
system. Data entry errors would then occur when an operator enters data
using a keyboard and mixes up digits and/or letters. Example, the number
32 may be entered as 23.

⚫ Accidental errors occur unintentionally: data is entered or a command is


issued by mistake, in good faith but in error.

⚫ Deliberate: If errors are made deliberately then the user probably knows
enough to get round any validation checks. Examples include a disgruntled
employee entering fictitious data into a company’s database. Possible
solutions to this problem include file access permission imposed by the
operating system, vigilances of the administrator and cross referencing data
to other supposedly reliable sources.
Software and hardware errors

⚫ There are two types of errors here. Software might


malfunction, erasing or corrupting previously entered data,
Hardware may develop a fault that corrupts data;
examples of such faults are bad sectors on hard disk or bad
memory, or a power surge. The application may appear to
accept data correctly but when that data is retrieved it is
corrupt.
Software and hardware errors
Transmission errors
⚫ Transmission errors occur when data is sent from one
computer to another. The data received by one system is
the not the same as that by the sender.
Data validation
⚫ Data validation is the computerized checking of input
data for errors (data that may be unreasonable or
incomplete) before it is processed. There are many
different methods of validation. The most appropriate
method(s) to use will depend upon what data is being
entered
Methods of Data validation
⚫ Presence check
⚫ Data type check
⚫ Range check
⚫ Consistency check
⚫ Reasonable check
⚫ Check digit
⚫ Format check
⚫ Length check
Consistency check

⚫ This check compares the contents of two or more fields to


make sure that they make sense. There are occasions when
some data fields are related. This check compares new
data with previous data.
Presence check

⚫ This type of check ensures that the data is actually entered


and can be used on any field in a database. For example,
everyone in a particular database must be given a job title.
Therefore a presence check could be carried out on the
form field in each employee’s record to ensure that a job
title is entered in the form.
Data type check

⚫ This is also known as character or alphanumeric check.


When a database is created each field in the database is
given a data type. Whenever data is entered into a field the
database will check that it is of the correct type, e.g.
alphabetic or numeric. If it if not, then an error message
will be displayed and the data will have to be re-entered.
Range check
⚫ Range check ensures that the data entered is within a
certain range. For example, when you enter a number
corresponding to a month of the year, the range of
acceptable numbers is 1 to 12.
Reasonable check
⚫ This check tests whether the data obeys specified criteria.
For example, the age of a child at preschool could be
about 5 years old, but not 15 years. Reasonableness checks
are therefore used to detect doubtful data.
Check digit

⚫ This is an extra digit added to the end of a code. It is used


to detect errors arising from transcription and also to
ensure that codes originally produced by a computer are
re-entered into another computer correctly. It is calculated
from the other digits in the number. Check digits are
included in barcode numbers.
Format check

⚫ This check verifies that the data has been entered in the
correct format. For example a TRN number may have the
format 99Y-999-999 where 9 represents a number and Y
represents an alphanumeric character.
Length check

⚫ This check verifies that the data entered is the correct


length. For example a password for a debit card is
four-digit long, therefore entering five or six digits may
result in an error.
Data verification
⚫ Data verification is the checking for mistakes such as
transcription errors and transpositional
⚫ errors when data is copied from one medium or device to
another. Verification checks do not guarantee that entered
data is correct. You should be aware that if the original
form was completed incorrectly, then the entered data may
pass some verification checks despite being incorrect.
Errors that can detected by Data
Verification
⚫ Transcription errors
⚫ Transpositional errors
Methods of Data verification
⚫ Visual check or Proof-reading
⚫ Double entry
Visual check or Proof-reading

⚫ One verification method is to use on-screen prompts.


After a set of data is entered, it is redisplayed on the
screen. The user is prompted to read it and confirm that it
has been entered correctly. If the user has entered any data
incorrectly, it is re-entered. This method of verification is
not very reliable since many data entry personnel will not
read the information that is redisplayed or check it
carefully against the source document. However, the
method is relatively cheap to use.
Double entry

⚫ One way to guarantee that the data is entered accurately, a


procedure called double (data) entry. Double entry is
where the same data is entered twice, sometimes by
different people. If the data differs between the two
entries, it does not get processed. It can be expensive and
time-consuming to use this method but it does ensure very
accurate data capture.

You might also like