Professional Documents
Culture Documents
INTRODUCTION TO COMPUTERS
Objective
Familiarize the student with the basics of computers. This should give the student a
stepping stone to use when learning more specific details about computer hardware.
Definition of a computer
A computer is an electronic device that takes input such as raw data which can be
numbers, text, sound, image, animations, video, etc., processes it, and converts it into
meaningful information that could be understood, presenting the changed input
(processed input) as output. All numbers, text, sound, images, animations, and video
used as input are called data, and all numbers, text, sound, images, animations, and
video returned as output are called information.
The data consists of numbers, text, sound, images, animations, and video.
The process converts numbers, text, sound, images, animations, and video
(data) into usable data, which is called information.
The information consists of numbers, text, sound, images, animations, and video
that has been converted by the process.
A storage device is an apparatus for storing data and information. A basic computer
consists of 4 components: an input device , a CPU, output devices, and memory.
One of the most common input devices is the keyboard, used to enter text.
A computer will process data differently based on the kind of data being handled,
using a set of instructions called a program or routine.
Computer Case[edit]
The CPU and Memory are put into a computer case/ housing.
Fujitsu-Siemens Celvin-1
Monitor[
A computer monitor is the most commonly used output device, for the information
processed by the CPU.
Data comes in through an Input Device, and is sent to the CPU by Memory.
The CPU processes the data, based on the input data and the program which is
installed in the computer memory.
When the CPU has finished processing the data, it is presented through the output
device as information.
The information can be stored in the computer memory or presented through an Output
Device.
Following list demonstrates various applications of computers in today's arena.
Business
A computer has high speed of calculation, diligence, accuracy, reliability, or versatility
which made it an integrated part in all business organisations.
Computer is used in business organisations for:
Payroll calculations
Budgeting
Sales analysis
Financial forecasting
Banking
Insurance
Insurance companies are keeping all records up-to-date with the help of computers.
The insurance companies, finance houses and stock broking firms are widely using
computers for their concerns.
Insurance companies are maintaining a database of all clients with information showing
maturity date
interests due
survival benefits
bonus
Education
The computer has provided a lot of facilities in the education system.
The computer provides a tool in the education system known as CBE (Computer
Based Education).
CBE involves control, delivery, and evaluation of learning.
The computer education is rapidly increasing the graph of number of computer
students.
There are number of methods in which educational institutions can use computer
to educate the students.
It is used to prepare a database about performance of a student and analysis is
carried out on this basis.
Marketing
In marketing, uses of computer are following:
Advertising - With computers, advertising professionals create art and graphics,
write and revise copy, and print and disseminate ads with the goal of selling
more products.
At Home Shopping - Home shopping has been made possible through use of
computerised catalogues that provide access to product information and permit
direct entry of orders to be filled by the customers.
Health Care
Computers have become important part in hospitals, labs, and dispensaries. The
computers are being used in hospitals to keep the record of patients and medicines. It
is also used in scanning and diagnosing different diseases. ECG, EEG, Ultrasounds
and CT Scans etc., are also done by computerised machines.
Some major fields of health care in which computers are used are:
Diagnostic System - Computers are used to collect data and identify cause of
illness.
Lab-diagnostic System - All tests can be done and reports are prepared by
computer.
Patient Monitoring System - These are used to check patient's signs for
abnormality such as in Cardiac Arrest, ECG etc.
Pharma Information System - Computer checks Drug-Labels, Expiry dates,
harmful drugs side effects etc.
Surgery : Nowadays, computers are also used in performing surgery.
Engineering Design
Computers are widely used in Engineering purpose.
One of major areas is CAD (Computer aided design). That provides creation and
modification of images. Some fields are:
Structural Engineering - Requires stress and strain analysis for design of
Ships, Buildings, Budgets, Airplanes etc.
Industrial Engineering - Computers deal with design, implementation and
improvement of integrated systems of people, materials and equipments.
Architectural Engineering - Computers help in planning towns, designing
buildings, determining a range of buildings on a site using both 2D and 3D
drawings.
Military
Computers are largely used in defence. Modern tanks, missiles, weapons etc. Military
also employs computerised control systems. Some military areas where a computer
has been used are:
Missile Control
Military Communication
Smart Weapons
Communication
Communication means to convey a message, an idea, a picture or speech that is
received and understood clearly and correctly by the person for whom it is meant for.
Some main areas in this category are:
Chatting
Usenet
FTP
Telnet
Video-conferencing
Government
Computers play an important role in government. Some major fields in this category
are:
Budgets
Male/Female ratio
Weather forecasting
Improved access to education, e.g. distance learning and on-line tutorials. New
ways of learning, e.g. interactive multi-media and virtual reality. New job
opportunities, e.g. flexible and mobile working, virtual offices and jobs in the
communications industry.
New tools, new opportunities: The second big effect of ICT is that it gives
access to new tools that did not previously exist. A lot of these are tied into the
access to information mentioned above, but there are many examples of standalone ICT systems as well:
a)
ICT can be used for processes that had previously been out of the reach of most
individuals, e.g. photography, where digital cameras, photo-editing software and high
quality printers have enabled people to produce results that would previously required a
photographic studio.
b)
ICT can be used to help people overcome disabilities. e.g. screen magnification or
screen reading software enables partially sighted or blind people to work with ordinary
text rather than Braille.
NEGATIVE IMPACTS OF ICT ON PEOPLE
Job loss: One of the largest negative effects of ICT can be the loss of a persons
job. This has both economic consequences, loss of income, and social
consequences, loss of status and self esteem. Job losses may occur for several
reasons, including: Manual operations being replaced by automation. e.g. robots
replacing people on an assembly line.Jobexport. e.g. Data processing work being
sent to other countries where operating costs are lower. Multiple workers being
replaced by a smaller number who are able to do the same amount of work. e.g. A
worker on a supermarket checkout can serve more customers per hour if a bar-code
scanner linked to a computerized till is used to detect goods instead of the worker
having to enter the item and price manually
Reduced physical activity: A third negative effect of ICT is that users may
adopt a more sedentary lifestyle. This can lead to health problems such as obesity,
heart disease, and diabetes. Many countries have workplace regulations to prevent
problems such as repetitive strain injury or eyestrain, but lack of physical exercise is
rarely addressed as a specific health hazard.
ICT CAN HAVE A POSITIVE EFFECT ON ORGANIZATIONS
There are three main areas in which organisations are affected by the use of ICT,
communications, information management, and security. The three areas have
considerable overlap.
Security: Although the use of ICT can bring its own security issues, see next
section, it can also solve or reduce some security problems, e.g. Encryption
methods can keep data safe from unauthorized people, both while it is being stored
or while it is being sent electronically. This is important for reasons such as data
protection legislation or commercial secrecy. ICT enables physical security systems
such as fingerprint, iris or facial recognition.
NEGATIVE IMPACTS OF ICT ON ORGANIZATIONS
a)
Cost: the cost of using ICT may cause a number of problems for organisations. A
lot of ICT hardware and software is expensive, both to purchase and to maintain. An ICT
system usually requires specialist staff to run it and there is also the challenge of
keeping up with ever-changing technology. These extra costs should be offset by the
poitive effects of using ICT, but if an organisation gets its cost-benefit analysis wrong it
may lose money.
b)
Competition: this is usually thought of as being a good thing, but for some
organisations being exposed to greater competition can be a problem. If the
organisation is competing for customers, donations, or other means of funding
nationally or even internationally, they may lose out to other organisations that can offer
the same service for less money.
c)
Security: this is always a problem for any organisation that uses ICT. Data must
be kept secure, Internet connections must be protected from attack, new viruses and
other forms of malware are released nearly every day.
Organisations will usually have legal obligations to protect data such as customer
information. Even if the organisation does not have to comply with a specific data
protection law it will usually be in the organisations interest to protect data from rivals.
political or religious reasons, the use of ICT in education becomes less effective and
may even be seen as a threat to those in power and thus actively discouraged
NEGATIVE IMPACT OF ICT ON SOCIETY
Probably the largest effect that ICT use has on on society is allowing members of
society to have greatly increased access to information. This can have numerous
negative effects, such as: causing a digital divide between those who can access
information and those who cannot, reducing levels of education and understanding due
to the vast amount of incorrect and misleading information that is available causing
moral and ethical problems due to the nature of some of the material available.
With faster processors the clock speed becomes more important. Compared to some
of the first computers which operated at below 30 megahertz (MHz) the Pentium chips
began at 75 MHz in the late 1990's. Speeds now exceed 3000+ MHz or
3 gigahertz(GHz) and different chip manufacturers use different measuring standards
(check your local computer store for the latest speed). It depends on the circuit
boardthat the chip is housed in, or the motherboard, as to whether you are able to
upgrade to a faster chip. The motherboard contains the circuitry and connections that
allow the various component to communicate with each other.
Though there were many computers using many different processors previous to this I
call the 80286 processor the advent of home computers as these were the processors
that made computers available for the average person. Using a processor before the
286 involved learning a proprietary system and software. Most new software are being
developed for the newest and fastest processors so it can be difficult to use an older
computer system.
Keyboard - The keyboard is used to type information into the computer
or inputinformation. There are many different keyboard layouts and sizes with the most
common for Latin based languages being the QWERTY layout (named for the first 6
keys). The standard keyboard has 101 keys. Notebooks have embedded keys
accessible by special keys or by pressing key combinations (CTRL or Command and P
for example). Ergonomically designed keyboards are designed to make typing easier.
Hand held devices have various and different keyboard configurations and touch
screens.
Some of the keys have a special use. They are referred to as command keys. The 3
most common are the Control or CTRL, Alternate or Alt and the Shift keys though there
can be more (the Windows key for example or the Command key). Each key on a
standard keyboard has one or two characters. Press the key to get the lower character
and hold Shift to get the upper.
Removable Storage and/or Disk Drives - All disks need a drive to get information off
- or read - and put information on the disk - or write. Each drive is designed for a
specific type of disk whether it is a CD, DVD, hard disk or floppy. Often the term 'disk'
and 'drive' are used to describe the same thing but it helps to understand that the disk is
the storage device which contains computer files - or software - and the drive is the
mechanism that runs the disk.
Digital flash drives work slightly differently as they use memory
cards to store information so there are no moving parts. Digital cameras
also use Flash memory cards to store information, in this case
photographs. Hand held devices use digital drives and many also use
removable or built in memory cards.
Mouse - Most modern computers today are run using a mouse controlled pointer.
Generally if the mouse has two buttons the left one is used to select objects and text
and the right one is used to access menus. If the mouse has one button (Mac for
instance) it controls all the activity and a mouse with a third button can be used by
specific software programs.
One type of mouse has a round ball under the bottom of the mouse that rolls and turns
two wheels which control the direction of the pointer on the screen. Another type of
mouse uses an optical system to track the movement of the mouse. Laptop computers
use touch pads, buttons and other devices to control the pointer. Hand helds use a
combination of devices to control the pointer, including touch screens.
Note: It is important to clean the mouse periodically, particularly if it becomes sluggish.
A ball type mouse has a small circular panel that can be opened, allowing you to
remove the ball. Lint can be removed carefully with a tooth pick or tweezers and the ball
can be washed with mild detergent. A build up will accumulate on the small wheels in
the mouse. Use a small instrument or finger nail to scrape it off taking care not to
scratch the wheels. Track balls can be cleaned much like a mouse and touch-pad can
be wiped with a clean, damp cloth. An optical mouse can accumulate material from the
surface that it is in contact with which can be removed with a finger nail or small
instrument.
Monitors - The monitor shows information on the screen when you type. This is
called outputting information. When the computer needs more information it will display
a message on the screen, usually through a dialog box. Monitors come in many types
and sizes. The resolution of the monitor determines the sharpness of the screen. The
resolution can be adjusted to control the screen's display.
Most desktop computers use a monitor with a cathode tube or liquid crystal display.
Most notebooks use a liquid crystal display monitor.
To get the full benefit of today's software with full colour graphics and animation,
computers need a color monitor with a display or graphics card.
Printers - The printer takes the information on your screen and transfers it to paper or
a hard copy. There are many different types of printers with various levels of quality.
The three basic types of printer are; dot matrix, inkjet, andlaser.
Dot matrix printers work like a typewriter transferring ink from a ribbon to paper
with a series or 'matrix' of tiny pins.
Ink jet printers work like dot matrix printers but fires a stream of ink from a
cartridge directly onto the paper.
Laser printers use the same technology as a photocopier using heat to transfer
toner onto paper.
Modem - A modem is used to translate information transferred through telephone lines,
cable, satellite or line-of-sight wireless.
The term stands for modulate and demodulate which changes the signal fromdigital,
which computers use, to analog, which telephones use and then back again. Digital
modems transfer digital information directly without changing to analog.
Modems are measured by the speed that the information is transferred. The measuring
tool is called the baud rate. Originally modems worked at speeds below 2400 baud but
today analog speeds of 56,000 are standard. Cable, wireless or digital subscriber lines
can transfer information much faster with rates of 300,000 baud and up.
Modems also use Error Correction which corrects for transmission errors by constantly
checking whether the information was received properly or not andCompression which
allows for faster data transfer rates. Information is transferred in packets. Each packet
is checked for errors and is re-sent if there is an error.
Anyone who has used the Internet has noticed that at times the information travels at
different speeds. Depending on the amount of information that is being transferred, the
information will arrive at it's destination at different times. The amount of information that
can travel through a line is limited. This limit is calledbandwidth.
There are many more variables involved in communication technology using computers,
much of which is covered in the section on the Internet.
Scanners- Scanners allow you to transfer pictures and photographs to your computer. A
scanner 'scans' the image from the top to the bottom, one line at a time and transfers it
to the computer as a series of bits or a bitmap. You can then take that image and use it
in a paint program, send it out as a fax or print it. With optional Optical Character
Recognition (OCR) software you can convert printed documents such as newspaper
articles to text that can be used in your word processor. Most scanners
use TWAIN software that makes the scanner accessable by other software applications.
Digital cameras allow you to take digital photographs. The images are stored on a
memory chip or disk that can be transferred to your computer. Some cameras can also
capture sound and video.
Case - The case houses the microchips and circuitry that run the computer. Desktop
models usually sit under the monitor and tower models beside. They come in many
sizes, including desktop, mini, midi, and full tower. There is usually room inside to
expand or add components at a later time. By removing the cover off the case you may
find plate covered, empty slots that allow you to add cards. There are various types of
slots including IDE, ASI, USB, PCI and Firewire slots.
Depending on the type notebook computers may have room to expand . Most
Notebooks also have connections or ports that allows expansion or connection to
exterior, peripheral devices such as monitor, portable hard-drives or other devices.
Cards - Cards are components added to computers to increase their capability. When
adding a peripheral device make sure that your computer has a slot of the type needed
by the device.
Sound cards allow computers to produce sound like music and voice. The older sound
cards were 8 bit then 16 bit then 32 bit. Though the human ear can't distinguish the fine
difference between sounds produced by the more powerful sound card they allow for
more complex music and music production.
Graphic cards allow computers to produce colour (with a colour monitor of course).
The first colour cards were 2 bit which produced 4 colours [CGA]. It was amazing what
could be done with those 4 colours. Next came 4 bit allowing for 16 [EGA and VGA ]
colours. Then came 16 bit allowing for 1064 colours and then 24 bit which allows for
almost 17 million colours and now 32 bit and higher allow monitors to display almost a
billion separate colours.
Video cards allow computers to display video and animation. Some video cards allow
computers to display television as well as capture frames from video. A video card with
a digital video camera allows computers users to produce live video. A high speed
connection is required for effective video transmission.
Network cards allow computers to connect together to
communicate with each other. Network cards have connections
for cable, thin wire or wireless networks. For more
information see the section on Networks.
Cables connect internal components to the Motherboard, which is a board with series
of electronic path ways and connections allowing the CPU to communicate with the
other components of the computer.
Memory - Memory can be very confusing but is usually one of the easiest pieces of
hardware to add to your computer. It is common to confuse chip memorywith disk
storage. An example of the difference between memory and storage would be the
difference between a table where the actual work is done (memory) and a filing cabinet
where the finished product is stored (disk). To add a bit more confusion, the computer's
hard disk can be used as temporary memory when the program needs more than the
chips can provide.
Random Access Memory or RAM is the memory that the computer uses to temporarily
store the information as it is being processed. The more information being processed
the more RAM the computer needs.
One of the first home computers used 64 kilobytes of RAM memory (Commodore 64).
Today's modern computers need a minimum of 64 Mb (recommended 128 Mb or more)
to run Windows or OS 10 with modern software.
RAM memory chips come in many different sizes and speeds and can usually
beexpanded. Older computers came with 512 Kb of memory which could be
expanded to a maximum of 640 Kb. In most modern computers the memory can be
expanded by adding or replacing the memory chips depending on the processor you
have and the type of memory your computer uses. Memory chips range in size from 1
Mb to 4 Gb. As computer technology changes the type of memory changes as well
making old memory chips obsolete. Check your computer manual to find out what kind
of memory your computer uses before purchasing new memory chips.
Software
The software is the information that the computer uses to get the job done. Software
needs to be accessed before it can be used. There are many terms used for process of
accessing software including running, executing, starting up,opening, and others.
Computer programs allow users to complete tasks. A program can also be referred to
as an application and the two words are used interchangeably.
As you already know, all computers require software in order to operate and perform
basic tasks. For instance, software is needed to translate your commands into a form
the computer can understand, to open and close other software programs, to manage
your stored files, and to locate and set up new hardware as it is added to a computer.
The type of software used to perform these tasks is system softwarethe focus of this
chapter. System software runs in the background at all times, launching other software
when needed and making it possible for you to use your computer.
Computers run two types of software: system software and application software.
System software consists of the operating system and utility programs that control a
computer system and allow you to use your computer. These programs enable the
computer to boot, to launch application programs, and to facilitate important jobs, such
as transferring files from one storage medium to another, configuring your computer to
work with the hardware connected to it, managing files on your hard drive, and
protecting your computer system from unauthorized use.
Application software includes all the programs that allow you to perform specific
tasks on your computer, such as writing a letter, preparing an invoice, viewing a Web
page, listening to a music file, checking the inventory of a particular product, playing a
game, preparing financial statements, designing a home, and so forth.
In practice, the difference between system and application software is not always
straightforward. Some programs, such as those used to burn DVDs, were originally
viewed as utility programs. Today, these programs typically contain a variety of
additional features, such as the ability to organize and play music and other media files,
transfer videos and digital photos to a computer, edit videos and photos, create DVD
movies, copy CDs and DVDs, and create slide shows. Consequently, these programs
now fit the definition of application programs more closely. On the other hand, system
software today typically contains several application software components. For
As well any document that you create, graphic you design, sound you compose, file
you make, letter you write, email you send or anything that you create on your computer
is referred to as software. All software is stored in files.
Software is stored on a disk, card, tape or one of the dozens of
other storage devices available.
There are millions of different pieces of software available for almost every conceivable
need. Software is available commercially through stores and mail order and also
available on the Internet. Software is also available through an Open Source license
which allows anyone to use the Open Source software free of charge as long as the
license is maintained. If you can't find the application that you need software
development companies can custom design software for you.
The largest software companies offer packages of software or suites that include many
of the programs that the average person or business needs. Software packages or
suites contain programs that work together and share information, making it easier to
combine that information in versatile ways. For example when writing a letter you can
get the mailing address from an address book, include a letterhead from a graphics
program and included a financial chart from a spreadsheet and combine this collection
of information in the body of the letter.
The four basic types of software are; commercial, shareware, open
sourceand freeware.
Commercial software comes prepackaged and is available from software stores and
through the Internet.
Shareware is software developed by individual and small companies that cannot afford
to market their software world wide or by a company that wants to release a
demonstration version of their commercial product. You will have an evaluation period in
which you can decide whether to purchase the product or not. Shareware software often
is disabled in some way and has a notice attached to explain the legal requirements for
using the product.
Open Source software is created by a collaboration of programmers working together.
Open source programs are often open for anyone to contribute to and the end products
of open source projects are commonly released for public use. Open Source software is
not public domain in that the company or individual that develops the software retains
ownership of the program but the software can be used freely. Many popular Open
Source applications are being developed and upgraded regularly by individuals and
companies that believe in the Open Source concept. There is usually a copyright notice
that must remain with the software product and is similar to freeware.
Freeware is created by generous programmers and developers and released is
distributed freely, usually accompanied a copyright notice and terms of service that must
remain with the software product. Freeware is generally free for anyone to use and
distribute so long as the copyright notice and terms of service remain with the software.
Operating Systems
All computers need some sort of Operating System (OS). The majority of modern
home computers use some form of Microsoft's operating systems. The original Microsoft
operating system was called DOS (Disk Operating System) though most computers use
Windows. Windows comes in various versions beginning with version 3.x then 95, 98,
ME, XP, Vista and currently version 7. A few computers use IBM's O/S2. Apple's Mac
use their own operating system beginning with OS 1 through to OS 10.x. In the past
large companies and institutions would have an operating system design exclusively for
them but as the commercial operating systems become more sophisticated the benefits
of this practice is becoming less apparent. Some computer professionals, Internet
Service Providers (ISP) andmainframe computer users use an operating system such
as UNIX (or a variant such as Linux), Windows NT or 2000 (Win2k) or one of the other
network or server based operating systems.
There are many smaller operating systems out there. The problem is that software is
currently being developed only for the main operating systems and only the newest
versions of these OS. Many older computers with unique operating systems have lots of
software already developed for them but there is very little new software being
developed for the older computers. The older operating systems are less likely to
offer technical support than the more modern operating systems.
The operating system controls the input and output or directs the flow of information to
and from the CPU. Much of this is done automatically by the system but it is possible to
modify and control your system if you need to.
When you turn your computer on it first needs to load the operating system sometimes
referred to a booting up. Basically the computer starts from scratch every time you turn
the power on.
It checks all its components and will usually display a message if there is a problem.
Loading the system is usually automatic.
Once the system is loaded the user can start the application or program that they are
going to use.
Most computer users will run Microsoft Windows, Mac OS or Linux as their operating
system. These OS are Graphic User Interface (GUI) which allows the user to control
or run the computer using a Mouse and Icons. The user simply moves the mouse on a
flat surface, rolls the trackball, or moves their hand over the touchpad to control a
pointer. They then choose the option they want by pressing a button or tapping the pad.
Without a GUI the user controls the computer using the keys on the keyboard. This is
referred to as a Command Line Interface (CLI)
USER INTERFACE
Visual part of computer application or operating system through which a user interacts
with a computer or a software. It determines how commands are given to the computer
or the program and how information is displayed on the screen. Three main types of
user interfaces are (1) Command language: the user must know the machine and
program-specific instructions or codes. (2) Menus: user chooses the commands from
lists displayed on the screen. (3) Graphical user interface (GUI): user gives commands
by selecting and clicking on icons displayed on the screen.
Read more: http://www.businessdictionary.com/definition/userinterface.html#ixzz3vVvIRTb4
Disk and Storage
Disks and cards are used to store information. All information on computers is stored
in files. The size of a file is measured in bytes.
A byte is approximately one character (letter 'a', number '1', symbol '?' etc....).
A byte is made up of 8 bits. A bit is simply an on or an off signal which passes through
the computers circuitry. Every piece of software can be broken down into a series of on
or off signals or it's Binary Code.
Solid-state drives, Flash drives or Memory cards range in size. Unlike disk drives
there are no moving parts.
Floppy disk or diskette comes in two basic sizes; 5.25 inch and 3.5 inch. Both have a
low and high density versions though 3.5 inch high density disks are the most common.
Due to low storage capacity most modern computers do not come wth a floppy disk
drive.
Disk size
Amount of storage
Approximate printed
8.5 x 11 inch pages
3.5 high
density
1.44 MB
720 pages
CD
650 MB
a small library
DVD
4.5 GB
There are many other storage devices including tape, portable disk drives and many
others. Innovation in storage technology is advancing rapidly and some technologies
have become obsolete.
Information is stored in an electromagnetic form much like a cassette or video tape.
Note: Keep electromagnetic storage devices away from strong electric or magnetic
fields including x-rays. Be aware of high electromagnetic areas in the room such as
televisions, speakers, high tension wires, etc... Use disks only at room temperature and
keep them out of direct sunlight. If possible avoid passing electromagnetic storage
devices through airport x-rays. In theory information stored on a disk will last indefinitely
but the physical storage device will wear out with usage and time so be sure to back
up (copy) your important files to a second storage device.
Basic Computer Operations
The first is called Touch Typing. The Touch Typist uses the Home Keys (asdf for the
left hand and jkl; for the right) and all the fingers on both hands as well as the thumbs
for the Space Bar while typing. There are many commercial and public domain
programs that are designed to teach this method.
The other method is some times called 'Hunt and Peck' or depending on finger strength
'Search and Destroy'. This involves using one or more fingers on one or two hands to
type. It is a perfectly acceptable way of using a computer and many people get along
fine with this technique.
Properly used, a computer can help you to become more organized, work more
efficiently, and accomplish many tasks. You'll need a variety of information in
order to accurately assess the technology requirements for your small business.
COMPUTER HARDWARE & SOFTWARE SELECTION
Perhaps you've been able to make do with using a personal computer for business
tasks, but find that as your business grows you need a computer set-up to meet your
business needs. Or maybe you've added employees to your business and you would
like to set up a network of computers in your workplace.
Your first step should be determining how you specifically intend to use a computer to
aid your business. Otherwise, you may find that you've tied up excess capital in a
system that does far more than you really need or, even worse, that you've acquired a
system that doesn't accomplish what you expected.
You will want to list which tasks you believe would be more efficiently performed if
computerized. Labor-intensive tasks such as recordkeeping, computing payroll,
invoicing, analyzing financial projections, writing letters, and preparing advertisements
and promotional materials are prime candidates. It's a good idea to speak with other
business owners to find out how they are using computers to assist their business and
to leverage their time. You may also have industry specific requirements to consider.
What steps should you take next?
management programs. For example, you can use these programs to keep track of
your customers, suppliers, or inventory levels.
Accounting and bookkeeping programs. These programs run the gamut from
those that merely assist you in maintaining your financial records to those that assist
you with managing your payroll or accounts receivable or payable to those that
assist you in completing your tax returns.
Desktop publishing programs. You can use these types of programs to help
you produce professional-quality layouts for your own catalogs, newsletters,
brochures, forms, and other documents.
Complete software packages. If you expect that you'll be using more than one of
these programs, you may want to consider these options:
In seeking answers to your software questions, your best source may be other business
operators. (This is not to say that competent salespeople and company reps are not
valuable information sources, only that they're not in a business similar to yours, and
they may have a financial interest in influencing your purchasing decision.)
Go online for information from sources such as industry and technology websites and
blogs. Consult with other business owners to learn which tasks they've effectively
computerized and which applications software they're running. Are they happy with their
software? What do they like and dislike about the software? How easy was it to put the
software to work? How much training was required?
processing unit, a monitor, a keyboard, the hard drive, and a printer. Other common
business components include DVD drives, modems, and scanners.
Other than the mandatory components, Which of the following you'll actually need will
depend largely on the types of software programs you choose to run and the types of
tasks you want to accomplish.
Central Processing Unit (CPU). The CPU controls the speed at which the
computer processes information. The primary factor in this speed is the CPU's
processing chip. Another important factor in a computer's speed is the amount of
its random access memory (RAM). RAM is where your computer temporarily
stores information being used by programs it's currently running.
Monitor. This is the screen at which you'll be staring for countless hours as you
do your work. As you compare monitors, the key is to find a monitor that you can
read without undue eyestrain. The size of the monitor is also important. Generally,
the larger the monitor, the easier it is to read.
Keyboard.As is the case with the monitor, the key issue in comparing keyboards
is your comfort in using them. Ergonomic keyboards that place the keys in what is
believed to be a more natural alignment for your fingers to access are available. A
supplement to the keyboard for entering work and executing commands is the
mouse. These also come in various styles, so you should look for one that's
comfortable and easy to use. You can choose a wireless keyboard and mouse and
avoid all those cords and cables.
Hard drives. The hard drive is where your computer stores programs and other
information on a somewhat permanent basis. With software applications continuing
to grow in size, you're usually best off getting as large a hard drive as you can afford.
Printers. Your options for a printer range from rather slow and inexpensive (inkjet
printers) to fast and more expensive (laser printers). In comparing the costs of
different printers, it's important to look beyond just the initial purchase price. For
example, if a particular printer requires special paper, find out how much that paper
costs. Also consider how much it will cost to replace the printer's ink supply and how
frequently you'll be incurring that cost.
Apart from cost and features (including the ability to print in color; the ability to print
on different paper sizes; the ability to print checks, labels, envelopes, photos and
other special documents, etc.), an important factor in deciding what type of printer
your business needs is who will be seeing the documents you print out. For example,
if your business calls for sending computer-generated materials to customers,
suppliers, or creditors, then you'll probably want a high quality color printer.
CD-ROM and DVD drives. A CD-ROM drive runs applications and retrieves
information stored on compact discs, which are capable of holding data. CD-ROM
drives are also able to store information to CDs. CD-ROMs now often have RW (read
and write) capabilities. If you will be keeping financial or other records that must be
retained in electronic format, some sort of backup should be used to safeguard your
information. You can use your CD-ROM drive as a tool for backing up the computer's
hard drive. (For backing up larger quantities of data, an external hard drive is a better
choice). DVDs also store information and are particularly useful for storing photos
and the like.
Flash drives. Also known as jump drives, these very small devices are inserted
into a port (a standard feature) on your computer to store data from your computer.
Their convenient small size, rewrite capability, sturdiness, and the ability to hold very
large amounts of data has resulted in flash drives usurping the use of disks for data
storage.
External hard drives. External hard drives allow you to duplicate information
you have stored on your computer's hard drive. They easily connect to your
computer and their size varies from larger (more expensive) models that are faster
and hold more data, (usually used to regularly back up data on a desktop computer)
to smaller, more portable versions that travel easier. What you need will depend on
your personal situation.
Modems, broadband, and wireless connectivity. The dial-up modem enables
your computer to communicate with other computers over the telephone lines, but
your phone line is tied up. For a modem, the main feature is its transmission rate
because that determines how quickly a file can be transmitted and how long your
phone line will be tied up. Today, the dial-up modem is the dinosaur of choices.
Higher transmission speed alternatives other than regular phone lines are offered by
telephone companies through digital subscriber lines (DSL) and cable modem
companies. These "broadband" alternatives have become quite common.
Wireless connections to the Internet work through wireless routers. The router (an
electronic box-like device) connects to your modem or cable Internet connection and
broadcasts a signal. Your computer, whether it is a desktop or a notebook must be
able to pick up the wireless signal (through, for example, a WiFi card or other built in
feature) in order to go online.
With most modems currently on the market, you can also use your computer to send
and receive computer documents by fax.
Scanners. A scanner is used to quickly input an existing written document or
photograph into your computer. The scanner converts the item into a digital file that
you can then edit or manipulate.
Notebooks/Laptops. Today's notebook computers are almost as powerful as
desktop computers, so you may find that it's best to choose this option. Some
notebooks can function as desktops, by adding separate screens and keyboards.
Netbooks and tablets (for example, the iPad) perform functions such as surfing the
net and reading email. However, they don't perform all the functions of desktop and
notebook computers, so they are best used as an added technology rather than the
primary computer equipment for business owners.
Smart phones. While "smart" phones (for example, the iPhone or the
Blackberry) make and receive phone calls, they have more in common with
computers than they do with phones. Using wireless networks (the 4G network is
one example), these phones can offer almost unlimited connectivity for business
owners and their workers. They can be used to access email accounts, download
applications, surf the Internet, and be set up to access computers and devices such
as printers in the physical office. There are many options available, so make sure
that you chose the phone and wireless service plan that best fit your daily mobility
requirements. Also, like netbooks and tablets, a smart phone is not a complete
replacement for a computer.
Networks. Even those working solo can benefit from computer networking-basically connecting two or more computers through a router (wired or wireless) so
that they can share tasks and applications. For work purposes, accessing files on
other computers on your network and using one printer for all the computers are the
main purposes for having a computer network. A wireless network is great when you
want access to your desktop computer files on your laptop and vice-versa. If you
have employees, you can all be on the network, and you have the option to share
only the information you choose to--it's not an all or nothing choice. The complexity
of your needs will likely determine whether you set up your business computer
network or enlist outside assistance.
Still unsure of what you need? One small office technology expert with years of
experience offers this general advice: Unless you plan to work on large presentations or
manipulate graphics, a high-performance computer is really not needed.
What is needed is a mid-range computer with an office automation suite (work
processor, spread sheet, presentation, email client). Because computer outages often
equate to a stop in productivity (depending of course, on your particular business), it's in
your best interest to purchase the computer with an extended warranty complete with
on-site repair service.
You will also need Internet connectivity and the main choices available today are forms
of cable or DSL access. Speed should be at least 768 kilobits per second (kbps)
inbound to your office and 265 kbps outbound.
Finally, keep in mind that Internet connectivity, telephone service and even wireless
service is available as a "bundle" from some service providers which can save you
serious money!
(including some that specialize in just computers), department and discount stores, and
local shops that assemble their own systems. Open a computer magazine or go online,
and you'll find a number of manufacturers and retailers that will sell to you by mail.
As you shop around, request specification sheets for the systems you like. These
sheets should identify the price, the components, and the service and support policies
for the systems. As you compare systems, adopt the assumption that you're going to get
what you pay for. If one system is significantly cheaper than another, try to find out why
that's the case. Are less reliable parts being used? Is it backed by a short warranty or an
unfavorable service and support policy? There's a saying to the effect that "a computer
is only as good as its weakest component." Try to identify what that may be for each
system you compare. Rarely will the lowest priced system be the best overall value.
Other points to keep in mind as you shop around include the following:
Try to look for a system that can easily be upgraded with new components as
your needs change.
Be prepared to accept trade-offs among your desired components. The idea here
is to be willing to make concessions with respect to those items that can easily be
upgraded or added later if that enables you to get a better overall system under your
initial cost limitations.
If you decide to go with a locally assembled system, try to find a shop that has
been in business for a few years and that has established a track record with respect
to reliability and service.
If you're contemplating a mail-order purchase, proceed with caution. The system
that shows up at your door will essentially arrive "sight unseen," so you need to be
sure that you're dealing with a reputable company.
Carefully read through each seller's return policy. The best policies are those that
will allow you to return the system within a specified period with no questions asked
and no restocking or other fee being charged.
Compare service and warranty agreements. If you run into problems, will you
have to take the system in or will someone come out to your business to perform onsite repairs? Is there a toll-free number that you can call at any time, including
weekends and evenings, for help or advice? How long does the warranty agreement
run? Is an extended service contract available and, if so, is its cost worth the added
protection?
Consider using your credit card even if this means losing a cash discount. Your
credit card company can be an invaluable ally in helping you resolve post-sale
problems with the seller and getting you a refund if the system doesn't do what was
promised.
Don't delay in setting up your system once you've purchased it. Make sure you've
received everything you bargained for and that the system functions properly. If a
vendor offers a delivery and set-up service, take advantage of it and don't let the
service person leave your premises until your system is up and running.
Run all of your computer equipment through a surge suppressor rather than
directly through a wall outlet. Abrupt changes in electrical flow can instantly damage
sensitive components and corrupt files. Surge suppressors ensure that the electrical
flow to your system remains constant. If you're in an area that suffers frequent
blackouts or brownouts, you should probably look into acquiring a unit that provides
both surge suppression as well as back-up battery power.
Dust is another enemy. When feasible, keep your computer and printer covered
when they are not being used, and store your CDs and DVDs in enclosed cases.
Avoid allowing dust to accumulate on open and uncovered equipment.
Make two backup copies of all your software and important work files. Keep one
set of the copies at your work site (where they'll be readily available if needed) and
safely store the other set off site.
If you want to limit access to the computer, look for a system that's equipped with
a lock to prevent it from being turned on without a key. Another option is to install
password protection, which can be configured to allow specific individuals varying
degrees of access to data residing on the computer. This allows you to keep
sensitive information on the computer without fear of someone unauthorized reading
it.
Get a program that detects and removes computer viruses. Be careful about
what you download from the Internet, and check all CDs, DVDs, etc. that you receive
from others for viruses before you transfer the information to your computer. Also get
in the habit of regularly running a virus check on your hard drive. Remember, it takes
only one unchecked virus to cause a potentially devastating loss of both information
and the use of your valuable computer equipment.
Install a firewall program. A Firewall is software or hardware that stops
unauthorized access from the Internet to your computer. Spyware is a growing threat
that must be dealt with because it threatens the security of information on your
computer as well as others if you are on a computer network. A firewall should be
used in conjunction with an anti-virus protection program in case something harmful
does get past the firewall (for example, you click on a link that infects your
computer).
Data processing is simply the conversion of raw data to meaningful information through
a process. Data is manipulated to produce results that lead to a resolution of a problem
or improvement of an existing situation. Similar to a production process, it follows a
cycle where inputs (raw data) are fed to a process (computer systems, software, etc.) to
produce output (information and insights).
Generally, organizations employ computer systems to carry out a series of operations
on the data in order to present, interpret, or obtain information. The process includes
activities like data entry, summary, calculation, storage, etc. Useful and informative
output is presented in various appropriate forms such as diagrams, reports, graphics,
etc.
Stages of the Data Processing Cycle
1) Collection is the first stage of the cycle, and is very crucial, since the quality of data
collected will impact heavily on the output. The collection process needs to ensure that
the data gathered are both defined and accurate, so that subsequent decisions based
on the findings are valid. This stage provides both the baseline from which to measure,
and a target on what to improve.
Some types of data collection include census (data collection about everything in a
group or statistical population), sample survey (collection method that includes only part
of the total population), and administrative by-product (data collection is a byproduct of
an organizations day-to-day operations).
2) Preparation is the manipulation of data into a form suitable for further analysis and
processing. Raw data cannot be processed and must be checked for accuracy.
Preparation is about constructing a dataset from one or more data sources to be used
for further exploration and processing. Analyzing data that has not been carefully
screened for problems can produce highly misleading results that are heavily dependent
on the quality of data prepared.
3) Input is the task where verified data is coded or converted into machine readable
form so that it can be processed through a computer. Data entry is done through the
use of a keyboard, digitizer, scanner, or data entry from an existing source. This timeconsuming process requires speed and accuracy. Most data need to follow a formal and
strict syntax since a great deal of processing power is required to breakdown the
complex data at this stage. Due to the costs, many businesses are resorting to
outsource this stage.
4) Processing is when the data is subjected to various means and methods of
manipulation, the point where a computer program is being executed, and it contains
the program code and its current activity. The process may be made up of
multiple threads of execution that simultaneously execute instructions, depending on
the operating system. While a computer program is a passive collection of instructions,
a process is the actual execution of those instructions. Many software programs are
available for processing large volumes of data within very short periods.
5) Output and interpretation is the stage where processed information is now
transmitted to the user. Output is presented to users in various report formats like
printed report, audio, video, or on monitor. Output need to be interpreted so that it can
provide meaningful information that will guide future decisions of the company.
6) Storage is the last stage in the data processing cycle, where data, instruction and
information are held for future use. The importance of this cycle is that it allows quick
access and retrieval of the processed information, allowing it to be passed on to the
next stage directly, when needed. Every computer uses storage to hold system and
application software.
The Data Processing Cycle is a series of steps carried out to extract information from
raw data. Although each step must be taken in order, the order is cyclic. The output and
storage stage can lead to the repeat of the data collection stage, resulting in another
cycle of data processing. The cycle provides a view on how the data travels and
transforms from collection to interpretation, and ultimately, used in effective business
decisions.
Hierarchy of Data [Figure 6.1][Slide 6-4]
Data are the principal resources of an organization. Data stored in computer systems
form a hierarchy extending from a single bit to a database, the major record-keeping
entity of a firm. Each higher rung of this hierarchy is organized from the components
below it.
Data are logically organized into:
1. Bits (characters)
2. Fields
3. Records
4. Files
5. Databases
Bit (Character) - a bit is the smallest unit of data representation (value of a bit may be a
0 or 1). Eight bits make a byte which can represent a character or a special symbol in a
character code.
Field - a field consists of a grouping of characters. A data field represents an attribute (a
characteristic or quality) of some entity (object, person, place, or event).
Record - a record represents a collection of attributes that describe a real-world entity.
A record consists of fields, with each field describing an attribute of the entity.
File - a group of related records. Files are frequently classified by the application for
which they are primarily used (employee file). A primary key in a file is the field (or
fields) whose value identifies a record among others in a data file.
Database - is an integrated collection of logically related records or files. A database
consolidates records previously stored in separate files into a common pool of data
records that provides data for many applications. The data is managed by systems
software called database management systems (DBMS). The data stored in a database
is independent of the application programs using it and of the types of secondary
storage devices on which it is stored.
6.2 File Environment and its Limitations
There are three principal methods of organizing files, of which only two provide the
direct access necessary in on-line systems.
File Organization [Figure 6.2 & 6.3]
Data files are organized so as to facilitate access to records and to ensure their efficient
storage. A tradeoff between these two requirements generally exists: if rapid access is
required, more storage is required to make it possible.
Access to a record for reading it is the essential operation on data. There are two types
of access:
1. Sequential access - is performed when records are accessed in the order they are
stored. Sequential access is the main access mode only in batch systems, where files
are used and updated at regular intervals.
2. Direct access - on-line processing requires direct access, whereby a record can be
accessed without accessing the records between it and the beginning of the file. The
primary key serves to identify the needed record.
A DBMS provides the language, called data definition language (DDL), for defining the
database objects on the three levels. It also provides a language for manipulating the
data, called the data manipulation language (DML), which makes it possible to access
records, change values of attributes, and delete or insert records.
6.5 Data Models or How to Represent Relationships between Data
A data model is a method for organizing databases on the logical level, the level of the
schema and subschemas. The main concern in such a model is how to represent
relationships among database records. The relationships among the many individual
records in databases are based on one of several logical data structures or models.
DBMS are designed to provide end users with quick, easy access to information stored
in databases. Three principal models include:
1. Hierarchical Structure
2. Network Structure
3. Relational Structure
Hierarchical:
Early mainframe DBMS packages used the hierarchical structure, in which:
1. Relationships between records form a hierarchy or tree like structure.
2. Records are dependent and arranged in multilevel structures, consisting of
one rootrecord & any number of subordinate levels.
3. Relationships among the records are one-to-many, since each data element is
related only to one element above it.
4. Data element or record at the highest level of the hierarchy is called the root element.
Any data element can be accessed by moving progressively downward from the root
and along the branches of the tree until the desired record is located.
Network Structure:
The network structure:
1. Can represent more complex logical relationships, and is still used by many
mainframe DBMS packages.
2. Allows many-to-many relationship among records. That is, the network model can
access a data element by following one of several paths, because any data element or
record can be related to any number of other data elements.
Relational Structure:
The relational structure:
1. Most popular of the three database structures.
2. Used by most microcomputer DBMS packages, as well as many minicomputer and
mainframe systems.
3. Data elements within the database are stored in the form of simple tables. Tables are
related if they contain common fields.
4. DBMS packages based on the relational model can link data elements from various
tables to provide information to users.
Evaluation of Database Structures
MODEL
ADVANTAGES
DISADVANTAGES
Hierarchical Data
Structure
Network Structure
Routine types of
transaction processing
is fast and efficiently.
Network many-to-many
relationships must be specified in
advance
Ability to provide
sophisticated logical
relationships among the
records
Requires knowledge of a
programming language.
Relational
Structure
3. Cross-reference information, such as which programs use what data and which users
receive what reports
4. Where individual data elements originate, and who is responsible for maintaining the
data
5. What the standard naming conventions is for database entities.
6. What the integrity rules is for the data
7. Where the data are stored in geographically distributed databases.
A data dictionary:
1. Contains all the data definitions, and the information necessary to identify data
ownership
2. Ensures security and privacy of the data, as well as the information used during the
development and maintenance of applications which rely on the database.
3. Organizational functions
- data administration and database administration
Database Administration and Database Administration [Figure 6.18]
The functional units responsible for managing the data are:
1. Data administrator (DA)
2. Database administrator (DBA)
Data administrator - the person who has the central responsibility for an organizations
data.
Responsibilities include:
1. Establishing the policies and specific procedures for collecting, validating, sharing,
and inventorying data to be stored in databases and for making information accessible
to the members of the organization and, possibly, to persons outside of it.
2. Data administration is a policy making function and the DA should have access to
senior corporate management.
3. Key person involved in the strategic planning of the data resource.
4. Often defines the principal data entities, their attributes, and the relationships among
them.
Database Administrator - is a specialist responsible for maintaining standards for the
development, maintenance, and security of an organization's databases.
Responsibilities include:
1. Creating the databases and carrying out the policies laid down by the data
administrator.
2. In large organizations, the DBA function is actually performed by a group of
professionals. In a small firm, a programmer/analyst may perform the DBA function,
while one of the managers acts as the DA.
3. Schema and subschemas of the database are most often defined by the DBA, who
has the requisite technical knowledge. They also define the physical layout of the
databases, with a view toward optimizing system performance for the expected pattern
of database usage.
Choosing a file organization is a design decision, hence it must be done having in mind
the achievement of good performance with respect to the most likely usage of the file.
The criteria usually considered important are:
1. Fast access to single record or collection of related recors.
2. Easy record adding/update/removal, without disrupting (1).
3. Storage efficiency.
4. Redundance as a warranty against data corruption.
Needless to say, these requirements are in contrast with each other for all but the most
trivial situations, and it's the designer job to find a good compromise among them,
yielding and adequate solution to the problem at hand. For example, easiness of
adding/etc. is not an issue when defining the data organization of a CD-ROM product,
whereas fast access is, given the huge amount of data that this media can store.
However, as it will become apparent shortly, fast access techniques are based on the
use of additional information about the records, which in turn competes with the high
volumes of data to be stored.
Logical data organization is indeed the subject of whole shelves of books, in the
``Database'' section of your library. Here we'll briefly address some of the simpler used
techniques, mainly because of their relevance to data management from the lower-level
(with respect to a database's) point of view of an OS. Five organization models will be
considered:
Pile.
Sequential.
Indexed-sequential.
Indexed.
Hashed.
Pile
It's the simplest possible organization: the data are collected in the file in the order in
which they arrive, and it's not even required that the records have a common format
across the file (different fields/sizes, same fields in different orders, etc.are possible).
This implies that each record/field must be self-describing. Despite the obvious storage
efficiency and the easy update, it's quite clear that this ``structure'' is not suited for easy
data retireval, since retrieving a datum basically requires detailed analysis of the file
content. It makes sense only as temporary storage for data to be later structured in
some way.
Sequential
This is the most common structure for large files that are typically processed in their
entirety, and it's at the heart of the more complex schemes. In this scheme, all the
records have the same size and the same field format, with the fields having fixed size
as well. The records are sorted in the file according to the content of a field of a scalar
type, called ``key''. The key must identify uniquely a records, hence different record
have diferent keys. This organization is well suited for batch processing of the entire file,
without adding or deleting items: this kind of operation can take advantage of the fixed
size of records and file; moreover, this organization is easily stored both on disk and
tape. The key ordering, along with the fixed record size, makes this organization
amenable to dicotomic search However, adding and deleting records to this kind of
file is a tricky process: the logical sequence of records tipycally matches their physical
layout on the media storage, so to ease file navigation, hence adding a record and
maintaining the key order requires a reorganization of the whole file. The usual solution
is to make use of a ``log file'' (also called ``transaction file''), structured as a pile, to
perform this kind of modification, and periodically perform a batch update on the master
file.
Indexed sequential
An index file can be used to effectively overcome the above mentioned problem, and to
speed up the key search as well. The simplest indexing structure is the single-level one:
a file whose records are pairs key-pointer, where the pointer is the position in the data
file of the record with the given key. Only a subset of data records, evenly spaced along
the data file, are indexed, so to mark intervals of data records.
A key search then proceeds as follows: the search key is compared with the index ones
to find the highest index key preceding the search one, and a linear search is performed
from the record the index key points onward, until the search key is matched or until the
record pointed by the next index entry is reached. In spite of the double file access
(index + data) needed by this kind of search, the decrease in access time with respect
to a sequential file is significant.
Consider, for example, the case of simple linear search on a file with 1,000 records.
With the sequential organization, an average of 500 key comparisons are necessary
(assuming uniformly distributed search key among the data ones). However, using and
evenly spaced index with 100 entries, the number of comparisons is reduced to 50 in
the index file plus 50 in the data file: a 5:1 reduction in the number of operations.
This scheme can obviously be hyerarchically extended: an index is a sequential file in
itself, amenable to be indexed in turn by a second-level index, and so on, thus exploiting
more and more the hyerarchical decomposition of the searches to decrease the access
time. Obviously, if the layering of indexes is pushed too far, a point is reached when the
advantages of indexing are hampered by the increased storage costs, and by the index
access times as well.
Indexed
Why using a single index for a certain key field of a data record? Indexes can be
obviously built for each field that uniquely identifies a record (or set of records within the
file), and whose type is amenable to ordering. Multiple indexes hence provide a high
degree of flexibility for accessing the data via search on various attributes; this
organization also allows the use of variable length records (containing different fields).
It should be noted that when multiple indexes are are used the concept of sequentiality
of the records within the file is useless: each attribute (field) used to construct an index
typically imposes an ordering of its own. For this very reason is typicaly not possible to
use the ``sparse'' (or ``spaced'') type of indexing previously described. Two types of
indexes are usually found in the applications: the exhaustive type, which contains an
entry for each record in the main file, in the order given by the indexed key, and the
partial type, which contain an entry for all those records that contain the chosen key
field (for variable records only).
Hashed
As with sequential or indexed files, a key field is required for this organization, as well
as fixed record length. However, no explicit ordering in the keys is used for the hash
search, other than the one implicitly determined by a hash function.
DATA CAPTURE METHODS
1. Introduction
Any database or information system needs data entered into it, in order for it to be of any use.
There are many methods which can be used to collect and enter data, some manual, some
automatic.
2. Automatic Data Capture
Here are some of the methods that can be used to capture data directly.
Barcode reader
A bar code reader uses visible red light to scan and 'read' the barcode. The scanner converts
the the lighter and darker bands of the barcode into data.
The digital data is then input into the computer. The computer may display the results on a
screen and also input it into the correct fields in the database.
Typical uses:
Library - record the ISBN number of the book and the borrower's card number
Warehouse - to check the lables on boxes delivered against what is recorded on the
delivery sheet.
Challenge see if you can find out one extra fact on this topic that we haven't already
told you
Click on this link: Barcode Reader
Optical Character Recognition (OCR) enables the computer to identify written or printed
characters.
An OCR system consists of a normal scanner and some special software. The scanner is used
to scan the text from a document into the computer. The software then examines the page and
extracts the text from it, storing it in a form that can be edited or processed by normal word
processing software.
The ability to scan the characters accurately depends on how clear the writing is. Scanners
have been improved to be able to read different styles and sizes of text as well as neat
handwriting. Although they are often up to 95% accurate, any text scanned with OCR needs
careful checking because some letters can be misread.
OCR is also used to automatically recognise postcodes on letters at sorting offices.
Speech Recognition
The user talks into a microphone. The computer 'listens' to the speaker, then translates that
information to written words and phrases. It then displays the text on to the monitor.
This process happens immediately, so as you say the words, they appear on the screen. The
software often needs some "training" in order for it to get used to your voice, but after that it is
simple to use.
An Optical Mark Reader is a scanning device that reads carefully placed pencil marks on a
It can be read by a special machine called a Magnetic Ink Character Reader (MICR).
5. Manual Data Capture
Although there are many methods of capturing data automatically, many businesses prefer to
capture it manually.
Paper Form
People are given a form to fill in with their personal details, e.g. name, address, telephone
number, date of birth etc.
Once the form is completed, it is given to a member of staff who will enter the data from it, into a
database or information system
6. Data Entry
Whilst the customer is present or on the telephone, a member of staff asks questions which they
enter on the data entry form they have on screen.
Once saved, this data will then be stored in the appropriate database table.
If paper-based data capture forms are used (previous page) then the member of staff can take
the information from the data capture form and manually type it into the data entry form.
If staff are doing this, it is important that the fields on both forms are laid out in the same order to
speed up the process of entering the data.
7. Design Techniques 1
Data capture forms are simple enough to design aren't they? Don't you just open up a word
processing document and put a few headings and a few boxes?
Not quite, we will look at techniques that you can use to improve the design of your data capture
Have a careful look at the diagrams on this page and make note of the features used to improve
the design of this data capture form:
Which fields are compulsory to fill in - you could indicate this with a * and then
put a code at the bottom of the form
Commentary
A very familiar input device. Typically used to input data into personal computer
applications such as databases and spreadsheets
Touch-sensitive
screens
Optical mark
reading (OMR)
Optical Mark Reading (OMR) uses paper based forms which users simply mark
(using a dash) to answer a question. OMR needs no special equipment to mark a
form other than a pen/pencil. Data can be processed very quickly and with very
low error rates. An OMR scanner then processes the forms directly into the
required database. An example you are probably familiar with is the National
Lottery entry forms, or answer sheets for those dreaded multiple choice exam
papers!
Optical character
recognition (OCR)
and scanners
Intelligent
Character
Recognition (ICR)
Intelligent Character Recognition (ICR) again uses paper based forms which
respondees can enter handprinted text such as names, dates etc. as well as dash
marks with no special equipment needed other than a pen/pencil. An ICR scanner
then processes the forms, which are then verified and stored the required
database.
EFTPOS
EFTPOS stands for Electronic Funds Transfer at Point Of Sale. You will find
EFTPOS terminals at the till in certain shops. An EFTPOS terminal electronically
prints out details of a plastic card transaction. The computer in the terminal gets
authorisation for the payment amount (to make sure it's within the credit limit) and
checks the card against a list of lost and stolen cards.
Magnetic stripe
cards
A card (plastic or paper) with a magnetic strip of recording material on which the
magnetic tracks of an identification card are recorded. Magnetic stripe cards are
in widespread use as a way of controlling access (e.g. swipe cards for doors,
ticket barriers) and confirming identity (e.g. use in bank and cash cards).
Smart cards
A smart card (sometime also called a "chip card") is a plastic card with an
embedded microchip. it is widely expected that smart crads will eventually
replace magnetic stripe cards in many applications. The smart chip provides
significantly more memory than the magnetic stripe. The chip is also capable of
processing information. The added memory and processing capabilities are what
enable a smart card to offer more services and increased security. Some smart
cards can also run multiple applications on one card, this reducing the number of
cards required by any one person.
One of the key functions of the smart card is its ability to act as a stored value
card, such as Mondex and Visa cash. This enables the card to be used as
electronic cash. Smart cards can also allow secure information storage, making
them ideal as ID cards and security keys.
Voice recognition
Web data capture use electronic forms on either on an Intranet or Internet. They
are becoming increasingly popular and have the advantage of being accessible
by any user having access to a computer. Users complete the questions online
and the returned data is then imported in electronic format to the required
database.
Most computer processing systems require some input from the user. The way this processing
is to be carried out is determined at the system design stage of the System Life Cycle.
This is called the 'processing mode'. The ones you need to understand are
Batch mode
Interactive mode
1. Batch Processing
It is often not desirable to deal with a set of data inputs until a certain number have occurred or
a set time has passed. So they are stored until the system comes online to process the data in
one 'batch'.
For example
An online competition stores all the entries until it is time to find the winner.
Electricity, gas and telephone bills are usually calculated on a monthly basis.
After loading the data into the system, batch processing does not usually require any further
interaction on the part of the user. Therefore the user interface is often code-based. The user
enters the parameters of the batch run then leaves it to carry on.
Disadvantage
The main disadvantage of batch processing is the time delay between collecting the input data
and getting an output. It can also be frustrating to find out only later that a batch run has failed
due to a data input problem.
Booking a holiday
happening every thousandth of a second so a very fast computer is needed to do this -but both
the traffic-light and the car engine computers are carrying out 'real-time' processing.
Examples:
Traffic lights
Aircraft control
Computer games
Controlling robots
The user interface of a real-time system may use specialist input devices to provide data input..
For example, a car driver will be providing input data to the onboard computer with throttle and
brake pedals. A gamer may be using a joystick or hand held control to interact with the real-time
game. A traffic light system may sense the car at the lights using a buried inductive loop.
This isn't just about running more than one application at the
same time. Multi-tasking allows multiple tasks to run concurrently,
taking turns using the resources of the computer.
This can mean running a couple of applications, sending a
document to the printer and downloading a web page.
Multi-access or multi-user
All the calculations on data are performed manually. This is a slow method and errors may
occur. This is an old method. It was used before the invention of calculators. But data is still
processed manually in many small shops.
Example: A book seller ( a small book shop ) records his daily transactions manually. He
prepares bills by pen,paper and carbon paper ( no doubt, brain is the main data processor
in this case ). At the end of day he will use carbon copies made on a particular date to know
In mechanical data processing data is processed with the help of devices or machines.
These machines that help the people in data processing may be calculators and type
writers etc. Obviously, this method is faster easier and more accurate than manual data
processing.
Example: Book seller can use a calculator to speed up his data processing system. There
will be a less chance of errors in calculations. Bill calculations will be much more faster with
a calculator and easier too.
ntroduction
An information system is integrated and co-ordinate network of components, which combine
together to convert data into information.
In an organization, data input is done by the end user which is processed to generate
information products i.e. reports, which are utilized by internal and or external users.
Such a system is called operation support system.
The purpose of the operation support system is to facilitate business transaction, control
production, support internal as well as external communication and update organization
central database. The operation support system is further divided into a transactionprocessing system, processing control system and enterprise collaboration system.
Further Classification
An information system can be categorized based upon activity into strategic planning system,
tactical information system and operational information system.