Data Preparation Steps
Data Preparation Steps
Validation and verification are two ways to check that the data entered into a computer is
correct. Data entered incorrectly is of little use.
Validation is an automatic computer check to ensure that the data entered is sensible
and reasonable. It does not check the accuracy of data.
For example, a secondary school student is likely to be aged between 11 and 16. The
computer can be programmed only to accept numbers between 11 and 16. This is
a range check.
However, this does not guarantee that the number typed in is correct. For example, a student's
age might be 14, but if 11 is entered it will be valid but incorrect.
Types of validation
There are a number of validation types that can be used to check the data that is being
entered.
Validation
How it works Example usage
type
Lookup Looks up acceptable values in a There are only seven possible days of the
table table week
Presence Checks that data has been entered In most databases a key field cannot be left
check into a field blank
Checks that a value falls within the Number of hours worked must be less than
Range check
specified range 50 and more than 0
Verification is performed to ensure that the data entered exactly matches the original
source.
There are two main methods of verification:
1. Double entry - entering the data twice and comparing the two copies. This effectively
doubles the workload, and as most people are paid by the hour, it costs more too.
2. Proofreading data - this method involves someone checking the data entered against
the original document. This is also time-consuming and costly.
Data security
Data security is about keeping data safe and affects anyone relying on a computer system. If
the data on a computer system is damaged, lost, or stolen, it can lead to disaster.
• lost or damaged during a system crash - especially one affecting the hard disk
• corrupted as a result of faulty disks, disk drives, or power failures
• lost by accidentally deleting or overwriting files
• lost or become corrupted by computer viruses
• hacked into by unauthorised users and deleted or altered
• destroyed by natural disasters, acts of terrorism, or war
• deleted or altered by employees wishing to make money or take revenge on their employer
Keeping data secure
• making regular backups of files (backup copies should be stored in fireproof safes or in
another building)
• protecting yourself against viruses by running anti-virus software
• using a system of passwords so that access to data is restricted
• safe storage of important files stored on removable disks, eg locked away in a fireproof and
waterproof safe
• allowing only authorised staff into certain computer areas, eg by controlling entry to these
areas by means of ID cards or magnetic swipe cards
• always logging off or turning terminals off and if possible locking them
• avoiding accidental deletion of files by write-protecting disks
• using data encryption techniques to code data so that it makes no apparent sense
Online banking
When you bank online, after you’ve logged in, you will notice that the http in the address bar
has changed to https. This indicates that a secure connection between your computer and the
bank's computer has been established. Data sent between the two computers is encrypted so
that anyone trying to intercept your data will receive meaningless data. The data can only be
decrypted into readable data by using a key that is known only to the two computers - yours
and the bank's.
Data transfer
Data transfer files have standards so they can be transferred to any computer, hardware or
application. Graphics, text, sound or numbers don’t need to be transferred on physical media
anymore.
Data file types
Data files are stored in a number of formats, the formats depend on which application created
the file to begin with. For example, Microsoft Word stores files as *.doc but Adobe
Photoshop stores files in a different format - *.psd. The file extension identifies the file's
format.
When data is transferred from one computer to another, the computer receiving the data file
may not be able to read the format without the right application installed. For example, an
image created in Adobe Photoshop and saved as a *.psd file (Photoshop's format) would not
be readable by Microsoft Paint.
This is becoming less of a problem as standardisation matures and applications expand the
list of file types they're able to read.
Files can be easily transferred and shared across the globe using the internet. A file could be:
• emailed as an attachment
• sent over instant messenger
• downloaded from a website/web server
• accessed over a private network
Documents, eg a spreadsheet, can be stored on a web server and then accessed via any
computer with an internet connection and a web browser. Collaborative working is possible
too, where multiple people contribute to the same document.
This makes the world very small as far as transfer of data is concerned. It has allowed many
companies to outsource some or all of their operations. This is where companies transfer
activities such as ticket processing for airlines or telephone banking queries to workers in a
country where wages and running costs are relatively low. Often the time difference between
the two countries gives even greater convenience.
DATA TRANSMISSION
Data transmission is a means of transmitting digital or analog data over a communication
medium to one or more devices. It allows the transmission and communication of devices in
different environments: point-to-point, point-to-multipoint, or multipoint-to-multipoint.
Data transmission can either be analog or digital, but is mostly earmarked for sending and
receiving digital data. As such, data transmission is also referred to as digital transmission or
digital communications.
It works when a device aims to transmit a data object or file to one or multiple recipient
devices. The digital data comes from the source device in the form of digital bit
streams. These data streams are positioned over a communication medium for transmission
to the destination device. An outward signal can either be baseband or passband.
Aside from external communication, data transmission may be done internally, between
different parts of the same device. The sending of data to a processor from the random access
memory (RAM) or hard disk is a form of data transmission.
There are two types of serial transmission – synchronous and asynchronous. Both of these
transmission methods use bit synchronisation.
Bit synchronisation is necessary to identify the beginning and end of the data transmission.
Bit synchronisation supports the receiving computer to recognise when data begins and ends
during a transmission. Therefore, bit synchronisation offers timing control.
Asynchronous
Point of Comparison Synchronous Transmission
Transmission
Transmits data in the form Transmits 1 byte or
Definition
of chunks or frames character at a time
Speed of Transmission Quick Slow
Cost Expensive Cost-effective
Time Interval Constant Random
Are there gaps between the
Yes No
data?
Chat Rooms, Telephonic
Examples Conversations, Video Email, Forums, Letters
Conferencing
REFERENCES
https://teachcomputerscience.com/data-transmission/
https://www.bbc.co.uk/bitesize/guides/zdvrd2p/revision/1