SlideShare a Scribd company logo
COMPUTER DATA PROCESSING AND REPRESENTATION Data- Data is a collection of numbers, characters, alphabets, and special symbols  etc. that can be processed to produce some meaningful information. The word data is a plural of datum, though data is commonly used to represent both the singular form and plural form. Now before proceeding further lets have a look to the definition of data. “Data is commonly defined as raw facts or observations” These facts can be from physical processes, business transactions, surveys, investigations etc. For example if a person went to mount Everest then when he will return back, he will provide lot of data for the next person going to the mount Everest. Data are the objective measurements of the attributes of entities such as place, people, things, and events. These measurements are usually represented by symbols such as numbers and words or by codes composed of a mixture of numerical, alphabetical, and other characters. However, data commonly takes a variety of forms including numeric data, text, voice and images. At this point I will like to tell you that data and information are often used interchangeably. But it is helpful to view data as raw material. But this data when processed then it got converted into finished information product. represented by an electrical circuit that is either conducting or not conducting electricity.
Data Hierarchy Listed here in ascending order of complexity are the components of the data hierarchy in an information system. Bit :-  The term is bit is short form for binary digit. It can assume either of two possible states and therefore can represent either 0 or 1. In secondary storage a bit is used to represent data through positive or negative polarity of an electrical charge on a magnetic recording medium such as tape or disk. Semi conductor storage is usually used for primary storage. In semiconductor storage a bit is represented by an electrical circuit that is either conducting or not conducting electricity.
Byte: The ability to represent only binary digits bits in a computer system is not sufficient for business information processing. Numeric and alphabetic characters as well as wide variety of special characters such as dollar signs, question marks, and quotation marks, must be stored. In a computer system a character of information is called a byte. A byte of information is stored by using several bits in  specified combination called bit patterns. One widely used bit pattern for personal computers and data communications is the American Standard Code for Information Interchange (ASCII). ASCII uses seven bits to represent one character. Each 1 or 0 corresponds to a single bit.
Field or Item: The next level in the data hierarchy is a field or Item of data. A field or item of data is one or more bytes that contain data about an attribute of an entity in the information system. An entity in a payroll system is an individual employee. Attributes are the employee’s name, pay rate, and so on. The basic pay is a field or item of data.
Record: A record is a collection of fields relating to a specific entity. For example, a payroll record contains fields of data relating to a specific employee. An analogy can be made between a computer-based record and an individual folder in a manual file. A folder in a payroll file may contain much the same information as a record in a computer-based payroll file. The field that identifies a record from all other records in a file is the record key. For example, the record key in a payroll record is usually the employee’s provident fund number or social security number because it is different for each employee.
File:   A file is a collection of related records. For example, the collection of payroll records for all employees in a company is   a payroll file. The concept of a computer file is very similar to a manual file in a filing cabinet. Data Base:   A database consists of all the files of an organization, structured and integrated to facilitate update of the files and retrieval of information from them. The term has often been used rather loosely. Technically a database consists of those files that are part of a data base management system. However, database is often used to refer to all the files of an organization.  All this is called as data hierarchy because databases are composed of files, files are composed of records, records are composed of filed, fields composed of data bytes, and finally data bytes are a group of bits. This is very well a hierarchical structure.
Data Access Methods There are basically three types of file organization, which allow  sequential access to the data  in a file and which allow direct access   to the data in  a file. · Sequential:  With a sequential access file, records must be read in the same order as they were written to the storage media. The computer begins searching for a record in the file and then sequentially examining the next record and so on until the required record is located. Certain storage media magnetic tape will allow only sequential access to data. In order for a record to be found on a reel of magnetic tape, the tape must be read sequentially , beginning with the first record. · Direct Access File:  Direct - access file on the other hand, a direct-access file allows  mmediate direct access to individual records in a file. There are several techniques used to accomplish direct-access file organization. Magnetic disks, such as floppy disks, are by far the most commonly used devices for storing direct-access files. Direct access file organization must be used whenever the application requires immediate access to individual records. It is widely used today whenever the computer configuration  includes CRT (Cathode Ray Tube) terminals that display  management information on demand.
Indexed Sequential Access File: The most common technique for accessing disk records directly is with the use of an index. During the creation of records, the computer uses file-handling programmed routines to establish an index on the disk itself. The index indicates where each record is located. The concept is similar to that of the index found at the end of book, which specifies the page where each item of information can be located. The disk index indicates the locations (i.e. track and sector) of each record and where a particular record can be found. A key data field in each record must be indicated by the programmer, which is used by the computer as the basis for establishing, address information in the index. For example, if a payroll file is stored on a disk. To access any articular record, the user need only supply a particular key data field, such as EMPLOYEE CODE or  whatever has been defined at the time of programming. The computer then looks up the corresponding disk location for that particular record in the  index and seeks that record directly.
Introduction to Data Processing Data Processing embraces the techniques of sorting, relating, interpreting and computing items of data in order to provide meaningful and useful information. It will be evident that to arrive at certain figures, the data must be processed according to predefined procedures and rules arranged in a specific order.In simple terms, the steps by which data can be converted into useful information, which can be usable by either by an individual or by any number of users, can be labeled as data  processing mechanism. For data  processing, following steps are  generally followed:
Preparation of Source Document:  The first step is to obtain the relevant facts and  figures and to set these out on source documents, for example, in a population survey, the name, address, age, sex, occupation, etc., must be first written down on to a survey sheet or some other document. These documents may be so designed that information is recorded in the required order. Input of Data:  Once the data has been extracted from the source document, it must then be transferred into some form suitable for data entry into the computer so that  processing can take place. The  method will depend upon the input  media and the devices.
Manipulation of Data:  Information, inputs for processing may have to be classified or sorted. It is This form of operation, or data manipulation, rather than pure computation, with which data processing is mainly concerned. For example, in the population survey we may want to classify people by occupation or by age. We may wish to sort lists on alphabetical order or in any other order. We may require employees to be grouped by departments for a pay roll program. All these forms of data manipulation will produce results, which can be organized in the form of summaries. Output of Information:  The objective of results or summaries is to provide meaningful information to Managers, Accountants, etc., and careful consideration, therefore, should be given to the  presentation of results so that they can be  understandable easily and quickly.
Data Storage:  In most cases, the results of processing are retained for future use or reference. In many cases, it may be necessary after updating, to compare the latest figures with the previous figures, perhaps, over different periods of time. This means that data processing installations require a great deal of secondary storage space to store all the programs and the different sets of data.
Types of Data Processing Basically there are two types of data processing Batch Processing -  With batch processing, changes and queries to file are stored for a period of time, and then a processing run is made periodically to update the file and to produce responses to the queries. Batch runs can be made on a scheduled basis, such as daily, weekly, or-monthly, or they can be made on an as required basis. Examples of batch processing include generation of mark-sheets of students. Mark-sheets and results of school examinations  are given to students only at the end of  an academic year. So, a programmer  can develop a program for this and the  results can he printed at the required  time.
Online or Immediate Processing In immediate processing, transactions are processed to update  the file immediately or shortly after a real-world event occurs. Information processing applications that use immediate processing are often called real time application. A real time application can immediately capture data about ongoing events or processes and provide the information necessary to manage them. An airline-reservation system is an example of a real time application. Real time systems must have real time files that are updated immediately after the event occurs. Consequently, at any point in time, the data in real time files should accurately reflect the status of the real world variables they represent. For example, when a customer reserves a seat on an airline flight, the  reservations agent keys in that fact and the inventory of non reserved seats on the flight is immediately changed to reflect one less available seat. Immediate processing requires direct-access files, since immediate processing with sequential files would be impractical because of the time required to search for  individual records. Batch processing, on the other  hand, can occur with either sequential or direct  access files.

More Related Content

What's hot (20)

Computer system bus
Computer system busComputer system bus
Computer system bus
Goran W. Hama Ali
 
generation of computer
generation of computergeneration of computer
generation of computer
Muhammed Nihal
 
COMPUTER NETWORKING (1).pdf
COMPUTER NETWORKING (1).pdfCOMPUTER NETWORKING (1).pdf
COMPUTER NETWORKING (1).pdf
BeulahJayarani
 
Chapter 1 Introduction Data Communication and Networking
Chapter 1 Introduction Data Communication and NetworkingChapter 1 Introduction Data Communication and Networking
Chapter 1 Introduction Data Communication and Networking
TakiTajwaruzzamanKha
 
Computer hardware
Computer hardwareComputer hardware
Computer hardware
Chinmoy Jena
 
Computer Concepts PPT
Computer Concepts PPTComputer Concepts PPT
Computer Concepts PPT
okmomwalking
 
Intro to Bits, Bytes, and Storage
Intro to Bits, Bytes, and StorageIntro to Bits, Bytes, and Storage
Intro to Bits, Bytes, and Storage
John Goldsworthy
 
Plan and Prepare for Configuration
Plan and Prepare for Configuration Plan and Prepare for Configuration
Plan and Prepare for Configuration
nanette sansano
 
Basic computer configuration setup
Basic computer configuration setupBasic computer configuration setup
Basic computer configuration setup
Rachel Espino
 
What is a static ip address
What is a static ip addressWhat is a static ip address
What is a static ip address
Hexa Howe
 
Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11
Sehrish Rafiq
 
Metropolitan area network
Metropolitan area networkMetropolitan area network
Metropolitan area network
Faizan Rasool
 
Control Panel - By Sandeep Mahey
Control Panel - By Sandeep MaheyControl Panel - By Sandeep Mahey
Control Panel - By Sandeep Mahey
Sandeep Mahey
 
EVOLUTION OF COMPUTER pdf
EVOLUTION OF COMPUTER pdfEVOLUTION OF COMPUTER pdf
EVOLUTION OF COMPUTER pdf
Dlwnsghek Ina
 
Networking (2)
Networking (2)Networking (2)
Networking (2)
LALIT MAHATO
 
Grade 8 COMPUTER
Grade 8 COMPUTERGrade 8 COMPUTER
Grade 8 COMPUTER
Joel Linquico
 
Lesson 1 data processing
Lesson 1   data processing Lesson 1   data processing
Lesson 1 data processing
guevarra_2000
 
Generations of computer
Generations of computerGenerations of computer
Generations of computer
BESOR ACADEMY
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
Manjit Chavda
 
Accessing information
Accessing informationAccessing information
Accessing information
Fiona Beals
 
generation of computer
generation of computergeneration of computer
generation of computer
Muhammed Nihal
 
COMPUTER NETWORKING (1).pdf
COMPUTER NETWORKING (1).pdfCOMPUTER NETWORKING (1).pdf
COMPUTER NETWORKING (1).pdf
BeulahJayarani
 
Chapter 1 Introduction Data Communication and Networking
Chapter 1 Introduction Data Communication and NetworkingChapter 1 Introduction Data Communication and Networking
Chapter 1 Introduction Data Communication and Networking
TakiTajwaruzzamanKha
 
Computer Concepts PPT
Computer Concepts PPTComputer Concepts PPT
Computer Concepts PPT
okmomwalking
 
Intro to Bits, Bytes, and Storage
Intro to Bits, Bytes, and StorageIntro to Bits, Bytes, and Storage
Intro to Bits, Bytes, and Storage
John Goldsworthy
 
Plan and Prepare for Configuration
Plan and Prepare for Configuration Plan and Prepare for Configuration
Plan and Prepare for Configuration
nanette sansano
 
Basic computer configuration setup
Basic computer configuration setupBasic computer configuration setup
Basic computer configuration setup
Rachel Espino
 
What is a static ip address
What is a static ip addressWhat is a static ip address
What is a static ip address
Hexa Howe
 
Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11
Sehrish Rafiq
 
Metropolitan area network
Metropolitan area networkMetropolitan area network
Metropolitan area network
Faizan Rasool
 
Control Panel - By Sandeep Mahey
Control Panel - By Sandeep MaheyControl Panel - By Sandeep Mahey
Control Panel - By Sandeep Mahey
Sandeep Mahey
 
EVOLUTION OF COMPUTER pdf
EVOLUTION OF COMPUTER pdfEVOLUTION OF COMPUTER pdf
EVOLUTION OF COMPUTER pdf
Dlwnsghek Ina
 
Lesson 1 data processing
Lesson 1   data processing Lesson 1   data processing
Lesson 1 data processing
guevarra_2000
 
Generations of computer
Generations of computerGenerations of computer
Generations of computer
BESOR ACADEMY
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
Manjit Chavda
 
Accessing information
Accessing informationAccessing information
Accessing information
Fiona Beals
 

Viewers also liked (20)

Database management systems cs403 power point slides lecture 01
Database management systems   cs403 power point slides lecture 01Database management systems   cs403 power point slides lecture 01
Database management systems cs403 power point slides lecture 01
Md.Abu Sayed
 
Skinny Jeans Styling
Skinny Jeans Styling Skinny Jeans Styling
Skinny Jeans Styling
Jessica Chang
 
Mcom 341 week 7 summary
Mcom 341 week 7 summaryMcom 341 week 7 summary
Mcom 341 week 7 summary
schaferv
 
15000713
1500071315000713
15000713
Wm. Jason Flatt
 
Dbms
DbmsDbms
Dbms
harleenmahajan
 
Lesson 4 data processing
Lesson 4   data processingLesson 4   data processing
Lesson 4 data processing
guevarra_2000
 
Sequential logics
Sequential logicsSequential logics
Sequential logics
faiqikhan
 
Chapter4 Data Processing
Chapter4 Data ProcessingChapter4 Data Processing
Chapter4 Data Processing
Muhammad Waqas
 
module 1 computer architecture diploma
 module 1 computer architecture diploma   module 1 computer architecture diploma
module 1 computer architecture diploma
Manoharan Ragavan
 
Number Systems
Number  SystemsNumber  Systems
Number Systems
Nasir Jumani
 
intel 8086 introduction
intel 8086 introductionintel 8086 introduction
intel 8086 introduction
Homoud Alsohaibi
 
Computer Data Processing And Representation 4
Computer Data Processing And Representation   4Computer Data Processing And Representation   4
Computer Data Processing And Representation 4
guestb912a3d
 
Sequential circuits
Sequential circuitsSequential circuits
Sequential circuits
DrSonali Vyas
 
DATA PROCESSING
DATA PROCESSINGDATA PROCESSING
DATA PROCESSING
GLOBAL TECHNOLOGY CONSULTANCY
 
File organization
File organizationFile organization
File organization
Gokul017
 
Truth tables presentation
Truth tables presentationTruth tables presentation
Truth tables presentation
MujtaBa Khan
 
OCR GCSE Computing - Binary logic and Truth Tables
OCR GCSE Computing - Binary logic and Truth TablesOCR GCSE Computing - Binary logic and Truth Tables
OCR GCSE Computing - Binary logic and Truth Tables
northernkiwi
 
microcontroller based temperature sensor
microcontroller based temperature sensormicrocontroller based temperature sensor
microcontroller based temperature sensor
Derrick D'souza
 
Truth tables
Truth tablesTruth tables
Truth tables
walkerlj
 
Flag registers, addressing modes, instruction set
Flag registers, addressing modes, instruction setFlag registers, addressing modes, instruction set
Flag registers, addressing modes, instruction set
aviban
 
Database management systems cs403 power point slides lecture 01
Database management systems   cs403 power point slides lecture 01Database management systems   cs403 power point slides lecture 01
Database management systems cs403 power point slides lecture 01
Md.Abu Sayed
 
Skinny Jeans Styling
Skinny Jeans Styling Skinny Jeans Styling
Skinny Jeans Styling
Jessica Chang
 
Mcom 341 week 7 summary
Mcom 341 week 7 summaryMcom 341 week 7 summary
Mcom 341 week 7 summary
schaferv
 
Lesson 4 data processing
Lesson 4   data processingLesson 4   data processing
Lesson 4 data processing
guevarra_2000
 
Sequential logics
Sequential logicsSequential logics
Sequential logics
faiqikhan
 
Chapter4 Data Processing
Chapter4 Data ProcessingChapter4 Data Processing
Chapter4 Data Processing
Muhammad Waqas
 
module 1 computer architecture diploma
 module 1 computer architecture diploma   module 1 computer architecture diploma
module 1 computer architecture diploma
Manoharan Ragavan
 
Computer Data Processing And Representation 4
Computer Data Processing And Representation   4Computer Data Processing And Representation   4
Computer Data Processing And Representation 4
guestb912a3d
 
File organization
File organizationFile organization
File organization
Gokul017
 
Truth tables presentation
Truth tables presentationTruth tables presentation
Truth tables presentation
MujtaBa Khan
 
OCR GCSE Computing - Binary logic and Truth Tables
OCR GCSE Computing - Binary logic and Truth TablesOCR GCSE Computing - Binary logic and Truth Tables
OCR GCSE Computing - Binary logic and Truth Tables
northernkiwi
 
microcontroller based temperature sensor
microcontroller based temperature sensormicrocontroller based temperature sensor
microcontroller based temperature sensor
Derrick D'souza
 
Truth tables
Truth tablesTruth tables
Truth tables
walkerlj
 
Flag registers, addressing modes, instruction set
Flag registers, addressing modes, instruction setFlag registers, addressing modes, instruction set
Flag registers, addressing modes, instruction set
aviban
 

Similar to Computer Data Processing And Representation 4 (20)

Information Systems
Information SystemsInformation Systems
Information Systems
Ian Jasper Mangampo
 
Understanding EDP (Electronic Data Processing) Environment
Understanding EDP (Electronic Data Processing) EnvironmentUnderstanding EDP (Electronic Data Processing) Environment
Understanding EDP (Electronic Data Processing) Environment
Adetula Bunmi
 
the study of data to extract meaningful insights for business
the study of data to extract meaningful insights for businessthe study of data to extract meaningful insights for business
the study of data to extract meaningful insights for business
EyobTemesgen3
 
rdbms-notes
rdbms-notesrdbms-notes
rdbms-notes
Mohit Saini
 
ITFT- Dbms
ITFT- DbmsITFT- Dbms
ITFT- Dbms
Blossom Sood
 
Chapter 2 - Intro to Data Sciences[2].pptx
Chapter 2 - Intro to Data Sciences[2].pptxChapter 2 - Intro to Data Sciences[2].pptx
Chapter 2 - Intro to Data Sciences[2].pptx
JethroDignadice2
 
chapter 1 HARDWARE AND NETWORKING SERVICE.pptx
chapter 1 HARDWARE AND NETWORKING SERVICE.pptxchapter 1 HARDWARE AND NETWORKING SERVICE.pptx
chapter 1 HARDWARE AND NETWORKING SERVICE.pptx
sufiyanhussein798
 
8.DBMS.pptx
8.DBMS.pptx8.DBMS.pptx
8.DBMS.pptx
CallplanetsDeveloper
 
Emerging Technology Chapter 2 Data Science
Emerging Technology Chapter 2 Data ScienceEmerging Technology Chapter 2 Data Science
Emerging Technology Chapter 2 Data Science
SolomonEndalu
 
Sulthan's DBMS for_Computer_Science
Sulthan's DBMS for_Computer_ScienceSulthan's DBMS for_Computer_Science
Sulthan's DBMS for_Computer_Science
SULTHAN BASHA
 
Unit3rd
Unit3rdUnit3rd
Unit3rd
Anshumali Singh
 
Database, Lecture-1.ppt
Database, Lecture-1.pptDatabase, Lecture-1.ppt
Database, Lecture-1.ppt
MatshushimaSumaya
 
Chapter 2- Data Science and big data.pptx
Chapter 2- Data Science and big data.pptxChapter 2- Data Science and big data.pptx
Chapter 2- Data Science and big data.pptx
HailieeyesusKindie
 
Dbms
DbmsDbms
Dbms
Lakshmi Sarvani Videla
 
INTRODUCTION TO DATA STRUCTURE & ABSTRACT DATA TYPE.pptx
INTRODUCTION TO  DATA STRUCTURE & ABSTRACT DATA TYPE.pptxINTRODUCTION TO  DATA STRUCTURE & ABSTRACT DATA TYPE.pptx
INTRODUCTION TO DATA STRUCTURE & ABSTRACT DATA TYPE.pptx
talhaarif554
 
Dbms
DbmsDbms
Dbms
07Deeps
 
Data base
Data baseData base
Data base
Gc university faisalabad
 
Introduction to data structure
Introduction to data structureIntroduction to data structure
Introduction to data structure
sunilchute1
 
Introduction to data structure
Introduction to data structureIntroduction to data structure
Introduction to data structure
sunilchute1
 
Database
DatabaseDatabase
Database
sumit621
 
Understanding EDP (Electronic Data Processing) Environment
Understanding EDP (Electronic Data Processing) EnvironmentUnderstanding EDP (Electronic Data Processing) Environment
Understanding EDP (Electronic Data Processing) Environment
Adetula Bunmi
 
the study of data to extract meaningful insights for business
the study of data to extract meaningful insights for businessthe study of data to extract meaningful insights for business
the study of data to extract meaningful insights for business
EyobTemesgen3
 
Chapter 2 - Intro to Data Sciences[2].pptx
Chapter 2 - Intro to Data Sciences[2].pptxChapter 2 - Intro to Data Sciences[2].pptx
Chapter 2 - Intro to Data Sciences[2].pptx
JethroDignadice2
 
chapter 1 HARDWARE AND NETWORKING SERVICE.pptx
chapter 1 HARDWARE AND NETWORKING SERVICE.pptxchapter 1 HARDWARE AND NETWORKING SERVICE.pptx
chapter 1 HARDWARE AND NETWORKING SERVICE.pptx
sufiyanhussein798
 
Emerging Technology Chapter 2 Data Science
Emerging Technology Chapter 2 Data ScienceEmerging Technology Chapter 2 Data Science
Emerging Technology Chapter 2 Data Science
SolomonEndalu
 
Sulthan's DBMS for_Computer_Science
Sulthan's DBMS for_Computer_ScienceSulthan's DBMS for_Computer_Science
Sulthan's DBMS for_Computer_Science
SULTHAN BASHA
 
Chapter 2- Data Science and big data.pptx
Chapter 2- Data Science and big data.pptxChapter 2- Data Science and big data.pptx
Chapter 2- Data Science and big data.pptx
HailieeyesusKindie
 
INTRODUCTION TO DATA STRUCTURE & ABSTRACT DATA TYPE.pptx
INTRODUCTION TO  DATA STRUCTURE & ABSTRACT DATA TYPE.pptxINTRODUCTION TO  DATA STRUCTURE & ABSTRACT DATA TYPE.pptx
INTRODUCTION TO DATA STRUCTURE & ABSTRACT DATA TYPE.pptx
talhaarif554
 
Introduction to data structure
Introduction to data structureIntroduction to data structure
Introduction to data structure
sunilchute1
 
Introduction to data structure
Introduction to data structureIntroduction to data structure
Introduction to data structure
sunilchute1
 

More from Amit Chandra (10)

Introduction To Computer 1
Introduction To Computer  1Introduction To Computer  1
Introduction To Computer 1
Amit Chandra
 
01.Number Systems
01.Number Systems01.Number Systems
01.Number Systems
Amit Chandra
 
Introduction To Computer 1
Introduction To Computer  1Introduction To Computer  1
Introduction To Computer 1
Amit Chandra
 
Data Base System Application - Unit 7
Data Base System Application - Unit 7Data Base System Application - Unit 7
Data Base System Application - Unit 7
Amit Chandra
 
Introduction To Internet And Www 6
Introduction To Internet And Www   6Introduction To Internet And Www   6
Introduction To Internet And Www 6
Amit Chandra
 
Data Communication 5
Data Communication 5Data Communication 5
Data Communication 5
Amit Chandra
 
Software 3
Software 3Software 3
Software 3
Amit Chandra
 
Components Of Computer unit-2
Components Of Computer  unit-2Components Of Computer  unit-2
Components Of Computer unit-2
Amit Chandra
 
Role of IT in Mangement by Prof. Amit Chandra - GSBA College
Role of IT in Mangement by Prof. Amit Chandra - GSBA CollegeRole of IT in Mangement by Prof. Amit Chandra - GSBA College
Role of IT in Mangement by Prof. Amit Chandra - GSBA College
Amit Chandra
 
GSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit ChandraGSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit Chandra
Amit Chandra
 
Introduction To Computer 1
Introduction To Computer  1Introduction To Computer  1
Introduction To Computer 1
Amit Chandra
 
Introduction To Computer 1
Introduction To Computer  1Introduction To Computer  1
Introduction To Computer 1
Amit Chandra
 
Data Base System Application - Unit 7
Data Base System Application - Unit 7Data Base System Application - Unit 7
Data Base System Application - Unit 7
Amit Chandra
 
Introduction To Internet And Www 6
Introduction To Internet And Www   6Introduction To Internet And Www   6
Introduction To Internet And Www 6
Amit Chandra
 
Data Communication 5
Data Communication 5Data Communication 5
Data Communication 5
Amit Chandra
 
Components Of Computer unit-2
Components Of Computer  unit-2Components Of Computer  unit-2
Components Of Computer unit-2
Amit Chandra
 
Role of IT in Mangement by Prof. Amit Chandra - GSBA College
Role of IT in Mangement by Prof. Amit Chandra - GSBA CollegeRole of IT in Mangement by Prof. Amit Chandra - GSBA College
Role of IT in Mangement by Prof. Amit Chandra - GSBA College
Amit Chandra
 
GSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit ChandraGSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit Chandra
Amit Chandra
 

Recently uploaded (20)

AI Trends - Mary Meeker
AI Trends - Mary MeekerAI Trends - Mary Meeker
AI Trends - Mary Meeker
Razin Mustafiz
 
Introducing Ensemble Cloudlet vRouter
Introducing Ensemble  Cloudlet vRouterIntroducing Ensemble  Cloudlet vRouter
Introducing Ensemble Cloudlet vRouter
Adtran
 
Splunk Leadership Forum Wien - 20.05.2025
Splunk Leadership Forum Wien - 20.05.2025Splunk Leadership Forum Wien - 20.05.2025
Splunk Leadership Forum Wien - 20.05.2025
Splunk
 
Introducing FME Realize: A New Era of Spatial Computing and AR
Introducing FME Realize: A New Era of Spatial Computing and ARIntroducing FME Realize: A New Era of Spatial Computing and AR
Introducing FME Realize: A New Era of Spatial Computing and AR
Safe Software
 
AI Emotional Actors: “When Machines Learn to Feel and Perform"
AI Emotional Actors:  “When Machines Learn to Feel and Perform"AI Emotional Actors:  “When Machines Learn to Feel and Perform"
AI Emotional Actors: “When Machines Learn to Feel and Perform"
AkashKumar809858
 
Talk: On an adventure into the depths of Maven - Kaya Weers
Talk: On an adventure into the depths of Maven - Kaya WeersTalk: On an adventure into the depths of Maven - Kaya Weers
Talk: On an adventure into the depths of Maven - Kaya Weers
Kaya Weers
 
A Comprehensive Guide on Integrating Monoova Payment Gateway
A Comprehensive Guide on Integrating Monoova Payment GatewayA Comprehensive Guide on Integrating Monoova Payment Gateway
A Comprehensive Guide on Integrating Monoova Payment Gateway
danielle hunter
 
Cyber security cyber security cyber security cyber security cyber security cy...
Cyber security cyber security cyber security cyber security cyber security cy...Cyber security cyber security cyber security cyber security cyber security cy...
Cyber security cyber security cyber security cyber security cyber security cy...
pranavbodhak
 
Fully Open-Source Private Clouds: Freedom, Security, and Control
Fully Open-Source Private Clouds: Freedom, Security, and ControlFully Open-Source Private Clouds: Freedom, Security, and Control
Fully Open-Source Private Clouds: Freedom, Security, and Control
ShapeBlue
 
Cognitive Chasms - A Typology of GenAI Failure Failure Modes
Cognitive Chasms - A Typology of GenAI Failure Failure ModesCognitive Chasms - A Typology of GenAI Failure Failure Modes
Cognitive Chasms - A Typology of GenAI Failure Failure Modes
Dr. Tathagat Varma
 
Building Agents with LangGraph & Gemini
Building Agents with LangGraph &  GeminiBuilding Agents with LangGraph &  Gemini
Building Agents with LangGraph & Gemini
HusseinMalikMammadli
 
MCP Dev Summit - Pragmatic Scaling of Enterprise GenAI with MCP
MCP Dev Summit - Pragmatic Scaling of Enterprise GenAI with MCPMCP Dev Summit - Pragmatic Scaling of Enterprise GenAI with MCP
MCP Dev Summit - Pragmatic Scaling of Enterprise GenAI with MCP
Sambhav Kothari
 
Protecting Your Sensitive Data with Microsoft Purview - IRMS 2025
Protecting Your Sensitive Data with Microsoft Purview - IRMS 2025Protecting Your Sensitive Data with Microsoft Purview - IRMS 2025
Protecting Your Sensitive Data with Microsoft Purview - IRMS 2025
Nikki Chapple
 
TrustArc Webinar: Mastering Privacy Contracting
TrustArc Webinar: Mastering Privacy ContractingTrustArc Webinar: Mastering Privacy Contracting
TrustArc Webinar: Mastering Privacy Contracting
TrustArc
 
Introducing the OSA 3200 SP and OSA 3250 ePRC
Introducing the OSA 3200 SP and OSA 3250 ePRCIntroducing the OSA 3200 SP and OSA 3250 ePRC
Introducing the OSA 3200 SP and OSA 3250 ePRC
Adtran
 
GDG Cloud Southlake #43: Tommy Todd: The Quantum Apocalypse: A Looming Threat...
GDG Cloud Southlake #43: Tommy Todd: The Quantum Apocalypse: A Looming Threat...GDG Cloud Southlake #43: Tommy Todd: The Quantum Apocalypse: A Looming Threat...
GDG Cloud Southlake #43: Tommy Todd: The Quantum Apocalypse: A Looming Threat...
James Anderson
 
What is DePIN? The Hottest Trend in Web3 Right Now!
What is DePIN? The Hottest Trend in Web3 Right Now!What is DePIN? The Hottest Trend in Web3 Right Now!
What is DePIN? The Hottest Trend in Web3 Right Now!
cryptouniversityoffi
 
From Legacy to Cloud-Native: A Guide to AWS Modernization.pptx
From Legacy to Cloud-Native: A Guide to AWS Modernization.pptxFrom Legacy to Cloud-Native: A Guide to AWS Modernization.pptx
From Legacy to Cloud-Native: A Guide to AWS Modernization.pptx
Mohammad Jomaa
 
System Card: Claude Opus 4 & Claude Sonnet 4
System Card: Claude Opus 4 & Claude Sonnet 4System Card: Claude Opus 4 & Claude Sonnet 4
System Card: Claude Opus 4 & Claude Sonnet 4
Razin Mustafiz
 
ECS25 - The adventures of a Microsoft 365 Platform Owner - Website.pptx
ECS25 - The adventures of a Microsoft 365 Platform Owner - Website.pptxECS25 - The adventures of a Microsoft 365 Platform Owner - Website.pptx
ECS25 - The adventures of a Microsoft 365 Platform Owner - Website.pptx
Jasper Oosterveld
 
AI Trends - Mary Meeker
AI Trends - Mary MeekerAI Trends - Mary Meeker
AI Trends - Mary Meeker
Razin Mustafiz
 
Introducing Ensemble Cloudlet vRouter
Introducing Ensemble  Cloudlet vRouterIntroducing Ensemble  Cloudlet vRouter
Introducing Ensemble Cloudlet vRouter
Adtran
 
Splunk Leadership Forum Wien - 20.05.2025
Splunk Leadership Forum Wien - 20.05.2025Splunk Leadership Forum Wien - 20.05.2025
Splunk Leadership Forum Wien - 20.05.2025
Splunk
 
Introducing FME Realize: A New Era of Spatial Computing and AR
Introducing FME Realize: A New Era of Spatial Computing and ARIntroducing FME Realize: A New Era of Spatial Computing and AR
Introducing FME Realize: A New Era of Spatial Computing and AR
Safe Software
 
AI Emotional Actors: “When Machines Learn to Feel and Perform"
AI Emotional Actors:  “When Machines Learn to Feel and Perform"AI Emotional Actors:  “When Machines Learn to Feel and Perform"
AI Emotional Actors: “When Machines Learn to Feel and Perform"
AkashKumar809858
 
Talk: On an adventure into the depths of Maven - Kaya Weers
Talk: On an adventure into the depths of Maven - Kaya WeersTalk: On an adventure into the depths of Maven - Kaya Weers
Talk: On an adventure into the depths of Maven - Kaya Weers
Kaya Weers
 
A Comprehensive Guide on Integrating Monoova Payment Gateway
A Comprehensive Guide on Integrating Monoova Payment GatewayA Comprehensive Guide on Integrating Monoova Payment Gateway
A Comprehensive Guide on Integrating Monoova Payment Gateway
danielle hunter
 
Cyber security cyber security cyber security cyber security cyber security cy...
Cyber security cyber security cyber security cyber security cyber security cy...Cyber security cyber security cyber security cyber security cyber security cy...
Cyber security cyber security cyber security cyber security cyber security cy...
pranavbodhak
 
Fully Open-Source Private Clouds: Freedom, Security, and Control
Fully Open-Source Private Clouds: Freedom, Security, and ControlFully Open-Source Private Clouds: Freedom, Security, and Control
Fully Open-Source Private Clouds: Freedom, Security, and Control
ShapeBlue
 
Cognitive Chasms - A Typology of GenAI Failure Failure Modes
Cognitive Chasms - A Typology of GenAI Failure Failure ModesCognitive Chasms - A Typology of GenAI Failure Failure Modes
Cognitive Chasms - A Typology of GenAI Failure Failure Modes
Dr. Tathagat Varma
 
Building Agents with LangGraph & Gemini
Building Agents with LangGraph &  GeminiBuilding Agents with LangGraph &  Gemini
Building Agents with LangGraph & Gemini
HusseinMalikMammadli
 
MCP Dev Summit - Pragmatic Scaling of Enterprise GenAI with MCP
MCP Dev Summit - Pragmatic Scaling of Enterprise GenAI with MCPMCP Dev Summit - Pragmatic Scaling of Enterprise GenAI with MCP
MCP Dev Summit - Pragmatic Scaling of Enterprise GenAI with MCP
Sambhav Kothari
 
Protecting Your Sensitive Data with Microsoft Purview - IRMS 2025
Protecting Your Sensitive Data with Microsoft Purview - IRMS 2025Protecting Your Sensitive Data with Microsoft Purview - IRMS 2025
Protecting Your Sensitive Data with Microsoft Purview - IRMS 2025
Nikki Chapple
 
TrustArc Webinar: Mastering Privacy Contracting
TrustArc Webinar: Mastering Privacy ContractingTrustArc Webinar: Mastering Privacy Contracting
TrustArc Webinar: Mastering Privacy Contracting
TrustArc
 
Introducing the OSA 3200 SP and OSA 3250 ePRC
Introducing the OSA 3200 SP and OSA 3250 ePRCIntroducing the OSA 3200 SP and OSA 3250 ePRC
Introducing the OSA 3200 SP and OSA 3250 ePRC
Adtran
 
GDG Cloud Southlake #43: Tommy Todd: The Quantum Apocalypse: A Looming Threat...
GDG Cloud Southlake #43: Tommy Todd: The Quantum Apocalypse: A Looming Threat...GDG Cloud Southlake #43: Tommy Todd: The Quantum Apocalypse: A Looming Threat...
GDG Cloud Southlake #43: Tommy Todd: The Quantum Apocalypse: A Looming Threat...
James Anderson
 
What is DePIN? The Hottest Trend in Web3 Right Now!
What is DePIN? The Hottest Trend in Web3 Right Now!What is DePIN? The Hottest Trend in Web3 Right Now!
What is DePIN? The Hottest Trend in Web3 Right Now!
cryptouniversityoffi
 
From Legacy to Cloud-Native: A Guide to AWS Modernization.pptx
From Legacy to Cloud-Native: A Guide to AWS Modernization.pptxFrom Legacy to Cloud-Native: A Guide to AWS Modernization.pptx
From Legacy to Cloud-Native: A Guide to AWS Modernization.pptx
Mohammad Jomaa
 
System Card: Claude Opus 4 & Claude Sonnet 4
System Card: Claude Opus 4 & Claude Sonnet 4System Card: Claude Opus 4 & Claude Sonnet 4
System Card: Claude Opus 4 & Claude Sonnet 4
Razin Mustafiz
 
ECS25 - The adventures of a Microsoft 365 Platform Owner - Website.pptx
ECS25 - The adventures of a Microsoft 365 Platform Owner - Website.pptxECS25 - The adventures of a Microsoft 365 Platform Owner - Website.pptx
ECS25 - The adventures of a Microsoft 365 Platform Owner - Website.pptx
Jasper Oosterveld
 

Computer Data Processing And Representation 4

  • 1. COMPUTER DATA PROCESSING AND REPRESENTATION Data- Data is a collection of numbers, characters, alphabets, and special symbols etc. that can be processed to produce some meaningful information. The word data is a plural of datum, though data is commonly used to represent both the singular form and plural form. Now before proceeding further lets have a look to the definition of data. “Data is commonly defined as raw facts or observations” These facts can be from physical processes, business transactions, surveys, investigations etc. For example if a person went to mount Everest then when he will return back, he will provide lot of data for the next person going to the mount Everest. Data are the objective measurements of the attributes of entities such as place, people, things, and events. These measurements are usually represented by symbols such as numbers and words or by codes composed of a mixture of numerical, alphabetical, and other characters. However, data commonly takes a variety of forms including numeric data, text, voice and images. At this point I will like to tell you that data and information are often used interchangeably. But it is helpful to view data as raw material. But this data when processed then it got converted into finished information product. represented by an electrical circuit that is either conducting or not conducting electricity.
  • 2. Data Hierarchy Listed here in ascending order of complexity are the components of the data hierarchy in an information system. Bit :- The term is bit is short form for binary digit. It can assume either of two possible states and therefore can represent either 0 or 1. In secondary storage a bit is used to represent data through positive or negative polarity of an electrical charge on a magnetic recording medium such as tape or disk. Semi conductor storage is usually used for primary storage. In semiconductor storage a bit is represented by an electrical circuit that is either conducting or not conducting electricity.
  • 3. Byte: The ability to represent only binary digits bits in a computer system is not sufficient for business information processing. Numeric and alphabetic characters as well as wide variety of special characters such as dollar signs, question marks, and quotation marks, must be stored. In a computer system a character of information is called a byte. A byte of information is stored by using several bits in specified combination called bit patterns. One widely used bit pattern for personal computers and data communications is the American Standard Code for Information Interchange (ASCII). ASCII uses seven bits to represent one character. Each 1 or 0 corresponds to a single bit.
  • 4. Field or Item: The next level in the data hierarchy is a field or Item of data. A field or item of data is one or more bytes that contain data about an attribute of an entity in the information system. An entity in a payroll system is an individual employee. Attributes are the employee’s name, pay rate, and so on. The basic pay is a field or item of data.
  • 5. Record: A record is a collection of fields relating to a specific entity. For example, a payroll record contains fields of data relating to a specific employee. An analogy can be made between a computer-based record and an individual folder in a manual file. A folder in a payroll file may contain much the same information as a record in a computer-based payroll file. The field that identifies a record from all other records in a file is the record key. For example, the record key in a payroll record is usually the employee’s provident fund number or social security number because it is different for each employee.
  • 6. File: A file is a collection of related records. For example, the collection of payroll records for all employees in a company is a payroll file. The concept of a computer file is very similar to a manual file in a filing cabinet. Data Base: A database consists of all the files of an organization, structured and integrated to facilitate update of the files and retrieval of information from them. The term has often been used rather loosely. Technically a database consists of those files that are part of a data base management system. However, database is often used to refer to all the files of an organization. All this is called as data hierarchy because databases are composed of files, files are composed of records, records are composed of filed, fields composed of data bytes, and finally data bytes are a group of bits. This is very well a hierarchical structure.
  • 7. Data Access Methods There are basically three types of file organization, which allow sequential access to the data in a file and which allow direct access to the data in a file. · Sequential: With a sequential access file, records must be read in the same order as they were written to the storage media. The computer begins searching for a record in the file and then sequentially examining the next record and so on until the required record is located. Certain storage media magnetic tape will allow only sequential access to data. In order for a record to be found on a reel of magnetic tape, the tape must be read sequentially , beginning with the first record. · Direct Access File: Direct - access file on the other hand, a direct-access file allows mmediate direct access to individual records in a file. There are several techniques used to accomplish direct-access file organization. Magnetic disks, such as floppy disks, are by far the most commonly used devices for storing direct-access files. Direct access file organization must be used whenever the application requires immediate access to individual records. It is widely used today whenever the computer configuration includes CRT (Cathode Ray Tube) terminals that display management information on demand.
  • 8. Indexed Sequential Access File: The most common technique for accessing disk records directly is with the use of an index. During the creation of records, the computer uses file-handling programmed routines to establish an index on the disk itself. The index indicates where each record is located. The concept is similar to that of the index found at the end of book, which specifies the page where each item of information can be located. The disk index indicates the locations (i.e. track and sector) of each record and where a particular record can be found. A key data field in each record must be indicated by the programmer, which is used by the computer as the basis for establishing, address information in the index. For example, if a payroll file is stored on a disk. To access any articular record, the user need only supply a particular key data field, such as EMPLOYEE CODE or whatever has been defined at the time of programming. The computer then looks up the corresponding disk location for that particular record in the index and seeks that record directly.
  • 9. Introduction to Data Processing Data Processing embraces the techniques of sorting, relating, interpreting and computing items of data in order to provide meaningful and useful information. It will be evident that to arrive at certain figures, the data must be processed according to predefined procedures and rules arranged in a specific order.In simple terms, the steps by which data can be converted into useful information, which can be usable by either by an individual or by any number of users, can be labeled as data processing mechanism. For data processing, following steps are generally followed:
  • 10. Preparation of Source Document: The first step is to obtain the relevant facts and figures and to set these out on source documents, for example, in a population survey, the name, address, age, sex, occupation, etc., must be first written down on to a survey sheet or some other document. These documents may be so designed that information is recorded in the required order. Input of Data: Once the data has been extracted from the source document, it must then be transferred into some form suitable for data entry into the computer so that processing can take place. The method will depend upon the input media and the devices.
  • 11. Manipulation of Data: Information, inputs for processing may have to be classified or sorted. It is This form of operation, or data manipulation, rather than pure computation, with which data processing is mainly concerned. For example, in the population survey we may want to classify people by occupation or by age. We may wish to sort lists on alphabetical order or in any other order. We may require employees to be grouped by departments for a pay roll program. All these forms of data manipulation will produce results, which can be organized in the form of summaries. Output of Information: The objective of results or summaries is to provide meaningful information to Managers, Accountants, etc., and careful consideration, therefore, should be given to the presentation of results so that they can be understandable easily and quickly.
  • 12. Data Storage: In most cases, the results of processing are retained for future use or reference. In many cases, it may be necessary after updating, to compare the latest figures with the previous figures, perhaps, over different periods of time. This means that data processing installations require a great deal of secondary storage space to store all the programs and the different sets of data.
  • 13. Types of Data Processing Basically there are two types of data processing Batch Processing - With batch processing, changes and queries to file are stored for a period of time, and then a processing run is made periodically to update the file and to produce responses to the queries. Batch runs can be made on a scheduled basis, such as daily, weekly, or-monthly, or they can be made on an as required basis. Examples of batch processing include generation of mark-sheets of students. Mark-sheets and results of school examinations are given to students only at the end of an academic year. So, a programmer can develop a program for this and the results can he printed at the required time.
  • 14. Online or Immediate Processing In immediate processing, transactions are processed to update the file immediately or shortly after a real-world event occurs. Information processing applications that use immediate processing are often called real time application. A real time application can immediately capture data about ongoing events or processes and provide the information necessary to manage them. An airline-reservation system is an example of a real time application. Real time systems must have real time files that are updated immediately after the event occurs. Consequently, at any point in time, the data in real time files should accurately reflect the status of the real world variables they represent. For example, when a customer reserves a seat on an airline flight, the reservations agent keys in that fact and the inventory of non reserved seats on the flight is immediately changed to reflect one less available seat. Immediate processing requires direct-access files, since immediate processing with sequential files would be impractical because of the time required to search for individual records. Batch processing, on the other hand, can occur with either sequential or direct access files.