Professional Documents
Culture Documents
DATA
IN A
COMPUTER SYSTEM
LEARNER GUIDE
Maintain Data In a Computer System
Learner Information
Details Please Complete details
Name of Learner
Name of Assessor
Site Name
Name of Facilitator
Date started
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003
2
3
Table of Contents
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 4
5
Keys to Icons
The following icons are used throughout the study guide to indicate specific
functions:
FOLDER ENCLOSURES
This includes all examples, handouts, checklists, etc.
DON'T FORGET/NOTE
This icon indicates information of particular importance.
VIDEOS
ACTIVITY TIPS
PRACTICAL TASKS
EXERCISES
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 5
6
Introduction
Purpose In order to achieve the credits and qualify for this appropriate
registered standard, determined by the Sector of Education
Training Authority, you are expected to have demonstrated
specific learning outcomes.
Assessment The only way to establish whether a learner is competent and has
Criteria accomplished the specific outcome is through the assessment
process. Assessment involves collecting and interpreting evidence
about the learners’ ability to perform a task.
This module includes assessments in the form of self-
assessments, group exercises, quizzes, projects and a practical
training programme whereby you are required to perform tasks on
the job and collect as portfolio of evidence, proof signed by your
supervisor that you have successfully performed these tasks.
Related Units – It would make sense to learn and assess this unit in conjunction
Structuring the with all or part of the following units (if they are relevant to the
Learning Learnership in question:
XX04 Operate a Computer
XX38 Maintain Supply Levels
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 6
7
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 7
8
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 8
9
Practical Tasks
As part of this module you will be required to complete the following tasks.
An assessor must be present to observe you, as you complete the tasks OR you can
provide a portfolio of evidence proving your competence.
Credits The Unit Standard XX10: Maintain data in a computer system has
a total credit value of 4.
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 9
10
Specific Explain how computer equipment and data are protected against
Outcomes damage.
Safeguard equipment and data against damage.
Computer These computer applications programs can tell the computer how to
System perform certain tasks, such as:
Food and beverage stock control procedures.
Budgets.
Hotel front office and guest reservations operations.
Writing letters or memo’s to guests/customers and other
departments.
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 10
11
Illustrated below is the process of how the computer takes input and transforms
it into output:
Central
Data Input Output Information
Processing
Unit
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 11
12
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 12
13
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 13
14
Advantages
Transfers of stock within the establishment are often
provided for in two distinct categories:
Transfers where goods do not change their form
Transfers where goods do alter their form.
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 14
15
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 15
16
The virus will replicate itself on every disk that is inserted in to the
computer’s disk drive. It may remain inactive for a period of time
before activating itself.
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 16
17
Sudden changes in the size of program files could indicate the presence of
a virus.
Failed program execution. The system does not recognise the command
given.
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 17
18
Tips to The following are tips on how to reduce the chances of infecting your
reduce computer with a virus:
viruses Never install illegal copies of software onto your computer.
Avoid inserting disks, from a dubious in origin into your computer.
Never run programs across a network or the Internet if you are
unsure of their origins.
Write-protect your disks (if possible) to contain the spread of
viruses to these disks.
Use antivirus programs to detect and delete/repair any viruses
found on your computer.
Never use the file server computer as a general workstation if a
network is utilised.
Back up your data religiously, and don’t discard or overwrite all of
your older backups. It may take you days or weeks to notice and
diagnose a virus, and many of your files may be damaged in the
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 18
19
meantime.
Dangers Lightning can totally wipe out all the information and data on your
computer, or seriously disable your computer. Always ensure that
your computer is not situated right next to a window where it might
be struck by lightning.
Food and Drink spilled onto a computer can seriously damage the
sensitive mechanisms of your computer system. It is therefore
advisable never to eat or drink when working on your computer.
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 19
20
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 20
21
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 21
22
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 22
23
Self-Assessment 01
Instructions In the following test you will be required to answer all questions.
You are required to obtain 100% to pass.
Obtain feedback from your Assessor on the accuracy of your
answer.
If you do not obtain the pass mark, revise the learning material
and redo the questions.
Question 1
What are the signs of virus infections on your computer system?
Question 2
What are the tips to reduce virus infections on your computer system?
Question 3
How would you safeguard your computer equipment against lightning and food and
drink spillage?
Question 4
List the possible threats to data.
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 23
24
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 24
25
Booting up Locate the power switch on the system unit. The switch may be a
regular looking switch located on the front of the unit – that you
press in. Most monitors also switch on with a button on the front of
the screen.
Once the operating system has completed loading, you will see what
is known as the Desktop or program menu of the particular program
your organisation uses. You may be requested to “log in” using a
specific code allocated to you by your supervisor. This must be
entered together with your password.
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 25
26
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 26
27
If you have a lot of data, you want some way to ensure it accuracy.
Many database programs let you prevent simple data entry errors
by defining rules for what data is acceptable in a field by specifying
an allowable numeric range for a field, or a list of valid entries.
Importance Database programs do not share a similar look. They don’t allow you
to just jot down whatever information you want on each guest,
customer or inventory item. Instead, they make you decide in
advance, exactly which items of information you are going to collect.
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 27
28
Method Every organisation has it own procedures to search for data and
information on their computer systems. Different procedures might
also exist in the various departments of the organisation as the
functions differ in the various departments.
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 28
29
Search for Using the menu in Windows Using the program you are
Documents Explorer working in (e.g. Word,
WordPerfect)
You can refine your search if The computer will search
you know the type of file, for the file / document
dates, etc. and will provide you with a
Left click on Find Now list of likely files /
The computer will search for documents.
the file / document and will
provide you with a list of
likely files / documents.
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 29
30
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 30
31
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 31
32
Data It is vital that a document is saved regularly whilst being worked on,
as the contents of the computer’s memory will be erased should the
computer be turned off unexpectedly. This means that if you
accidentally kick your computer’s power cord in the midst of typing
a letter, for example, everything you have typed is lost.
Data is also erased from memory whenever you leave an application
program, because the CPU assumes you’ll need to use the space for
the next task you choose to tackle.
If you are using a spreadsheet program, for example, the CPU
erases the spreadsheet you were using from memory as soon as you
exit that program.
In order to protect your work and to store it for use in future work
sessions, you need to copy it from memory to the hard drive. This is
known as saving your data.
You should save your data whenever:
You are done working with it and are ready to start on
another project (if you finish typing one letter and want to
start another one, for example)
You are ready to leave an application program.
Most programs automatically ask you if you want to save the
changes, when you give the command to exit or to close a program.
You should also save to disk whenever you have been working for a
while and want to protect the work you have done so far. This
protects your data against power failures, kicked power cords, or
drastic mistakes.
How often you should save depends on what you are doing and how
easy it would be to do over. A good rule of thumb is that you should
save your work every time you’d be unhappy if you had to do it over
again.
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 32
33
Try to open the files, key in the data and save it.
Exit the system being sure that all the data was
processed and saved. Practice this exercise daily until
you are familiar with the procedure.
Request an observer to watch and give you testimony.
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 33
34
Importance It is important that you can identify any capture errors that have
been made, either by yourself or by someone else that uses the
same system.
2.12 Troubleshooting
Guidelines Sometimes problems arise while you are working on a specific
task and you are unsure whether to call in the Systems
Information Manager. Most occasions the problem is small and
can be solved yourself without calling in a professional. Be
careful not to put yourself in any danger whilst doing so.
Problem Remedy
Work has disappeared from Have you not accidentally scrolled down the page?
the screen.
Computer gives an error Have you not left a disk in the floppy drive?
message when it starts up.
Work won’t print. Have you got enough paper? Is there a paper
jam, enough toner/ink? If on a network are you
printing to the correct printer? Have you got
enough memory left on your hard disk for printing
to occur? When hard disks get full, failure to
print is sometimes the first warning you get.
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 34
35
Once something is stored on disk, you can always copy it back into
memory when you want to use it again. As soon as the data is copied
back into memory, the data reappears on your screen and you can
modify it if you like.
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 35
36
If data is lost from your computer, you will need to restore it from
the backup disks. This recovery operation can be full or partial.
A full restore process would copy all the backed files to your
computer. For a partial restore the backup utility software will
enable you to select the specific files or folders you wish to
recover.
You have to select what you wish to restore and know where you
want to restore it to before you start the procedure.
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 36
37
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 37
38
A full backup:
A backup copy is made of every file and folder on your
computer. This procedure will ensure that your complete
data/software is available for transfer to another computer
in the event of fire/theft.
It is a good idea to keep a diary of the backup disks used to
remember which disks contain what.
File copy:
This method is when files are individually saved. The
advantage is that because of the moderate amount of data
being saved the costs of back-up media is reduced and less
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 38
39
Magnetic tape:
This is considered reliable if properly cared for and can hold a
large amount of data.
Floppy disks:
These are used for immediate copying and longer-term back up of
data. However there capacity is low and speed of access is slow.
Floppy disks can also become corrupt and data can be lost in this
way.
Videotape:
This has not been exploited as yet. They are able to hold large
amounts of data and are relatively cheap.
Optical disks:
These are capable of holding large amounts of data. They are
often referred to as CD-ROM or CD’s and can be written to by
users. Two types of CD’s are available: the one you can copy files
to only once and the other is a re-writable CD, which means you
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 39
40
can erase old data and copy new data onto the CD.
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 40
41
Step Procedure
1. Back up the information you wish to save onto a disk.
2. Clearly mark the disk with a previously designated number or colour
code so that you know what information is on which disk.
3. Complete the backup dairy as follows:
Fill in which department the backup disks belong to.
Fill in which computer the backup is for.
Note the date that the backup was made.
Note the time that the backup was started and the time it
was finished.
Note whether the backup was a partial or a full backup.
Note the contents of the backed up data. A document name
or information on the disk, this will make it easier to
remember what information is on the specific disk.
Note the disk colour for easy recognition.
Note the number of disks that was used to make up the
backup.
BACKUP DIARY
Department: Computer:
Backup Start Finish Type of Content Disk No of
Date Time Time backup Colour Disks
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 41
42
Importance It is important to save any data you wish to keep before you close
the file you have worked on and exit the program. Most programs
will ask you whether you wish to save the information or not. You
should be familiar with the specific methods used to complete these
two functions.
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 42
43
Always give your unit manager or supervisor the reasons for the
delay as it might impact on the project as a whole if problems are
being experienced.
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 43
44
Storage To avoid cluttering the memory with too much data and at the same
Methods time to ensure you save a copy of it, data you are not immediately
working with should be transferred to a section- storing device,
such as a disc. The disc is for long-term storage of data.
Archive data that you don’t use regularly (and therefore don’t want
taking up space on your hard drive), but that you don’t want to
discard altogether.
Self-Assessment 02
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 44
45
Instructions In the following test you will be required to answer all questions.
You are required to obtain 100% to pass.
Obtain feedback from your Assessor on the accuracy of your
answers
If you do not obtain the pass mark revise the learning material
and redo the questions
Question 1
Why is it important to save data regularly?
Question 2
What are the troubleshooting problems and remedies?
Question 3
Why is it important to back up data?
Question 4
Discuss the importance of notification of deadline delays.
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 45
46
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 46
47
No Guidelines
1. It is important to remember never to write down your password as
an unauthorised person might use it to gain access to your computer
and programmes.
2. Use a password that is not unique to you but which is easy for you
to remember. Never use something from your personal life for a
password, such as your dog, child or husbands’ name. Remember
that a hacker (someone who breaks into computer systems to steal
information or to alter information) may gain access to your
personal records and from this personal data might be able to guess
your password.
3. The best passwords are ones that are reasonably long as they will
be difficult to guess or to discover.
4. Always be on the alert when typing in your password, as someone
might see what you are typing and then gain access to your
programmes/computer at a later stage.
5. Change your password regularly as someone might just discover
what your password is and use it to gain access to your
programmes/computer.
6. Never e-mail your password to anyone who claims that they need it
for some important sounding reason.
7. Never e-mail your password to anyone as someone else may
intercept it and use it to gain entry to your computer/programmes.
8. Never leave your computer unattended while you are still logged on,
as someone might access it.
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 47
48
Confidentiality A measure that can be used to ensure that staff members adhere
undertaking to the security and confidentiality code of the organisation is for
each staff member to sign a document, whereby the staff
member undertakes to adhere to the computer security and
confidentiality policy of the organisation.
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 48
49
UNDERTAKING
OF COMPUTER CONFIDENTIALITYAND SECURITY
Company: Department:
Full name: Department Tel Ext:
I, the undersigned hereby undertake as a terminal user, to adhere and to
execute the following instructions, namely that I:
1. Will not reveal my access code to any other person or organisation.
2. Will ensure that my access code is renewed every 30 days.
3. Will not allow my access code to be used by anybody other than myself or, via
my access, make the system available to any other person.
4. Will not reveal to any unauthorised person, either within or outside the
organisation, information pertaining to the following:
Computer hardware used in the organisation.
Computer system procedures.
Computer software.
Information contained in the computer system.
5. Will sign off from the terminal whenever I am not working thereon or
whenever I leave my office.
6. Will, in the event of leaving my office, ensure that the office is always locked.
7. When not in use, will handle and safeguard the computer disks in my possession
according to organisational policy.
8. Will position the screen of my terminal in such a manner, so that it cannot be
observed from a door or a window.
9. Will allow no unauthorised person into the area where the terminal is located
whilst such terminal is in operation.
10. Acknowledge that a breach of this undertaking can lead to disciplinary steps
being taken against me.
SIGNATURE WITNESS
SIGNATURE
PLACE DATE
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 49
50
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 50
51
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 51
52
Controls The specific policies and manual procedures for protecting the
confidentiality and security of data are called control. These
controls can be applied to the overall running of the computer
systems in your organisation as illustrated below:
Control Example
Hardware Restricting access to machines/terminals; checking for
equipment malfunction.
Software Requiring logs of operating system activities, restricting
unauthorised access to software programs.
Data security Using passwords; restricting access to terminals to limit
access to data files.
Operations Establishing procedures for running computer task
correctly, establishing backup and recovery procedures
for abnormal or disrupted processing.
Staff Adhering to established formal written policies and
procedures.
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 52
53
Self-Assessment 03
Instructions In the following test you will be required to answer all questions.
You are required to obtain 100% to pass.
Obtain feedback from your Assessor on the accuracy of your
answers
If you do not obtain the pass mark revise the learning material
and redo the questions
Question 1
What are the guidelines for computer security?
Question 2
What are the guidelines for confidential information?
Question 3
What control can an organisation use to protect computer systems?
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 53
54
General
comments
& review
by
Assessor
General
comments
from
Learner
_______________________ _________________________
SIGNATURE ASSESSOR SIGNATURE LEARNER
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 54
55
Acknowledgements
Additional research and information has been extracted from the following
resource books.
Title Author
Hotel-keeping and catering H. van Huyssteen/R. Nanny
T. Diedericks/M. Steyn/M Steynberg
First step in retail management Mark Wrice
Information Systems Kenneth. C. Laudon/Jane Price Laudon
© Tourism, Hospitality and Sport Education and Training Authority (THETA), 2003 55