Lesson 1 – Data Processing and Information
1.1 Data and Information
• Data: Raw facts and figures with no meaning on their own. Examples: numbers, characters,
symbols, images, audio, video.
• Information: Data that has been processed and given meaning in context. Example: Postal codes
become information when identified as location codes.
■ Data = meaningless by itself. Information = processed data with meaning.
1.1.1 Data Processing
• Data is input, stored, and processed by a computer, then output as information.
• Stored in binary (0s and 1s). Processing includes calculations, comparisons, sorting,
summarising.
1.1.2 Direct and Indirect Data
• Direct Data: Collected first-hand for a specific purpose (e.g., questionnaires, interviews,
observations, data logging).
• Indirect Data: Obtained from third parties, used for other purposes (e.g., electoral register,
commercial data).
1.2 Quality of Information
For information to be useful, it must be:
• Accurate – correct and error-free
• Relevant – related to the task
• Up-to-date – reflects current situation
• Complete – covers all necessary details
• Understandable – clear presentation
1.3 Encryption
• Protects data so only authorised users can read it.
• Symmetric encryption: Same key for encryption and decryption.
• Asymmetric encryption: Public key to encrypt, private key to decrypt.
• Common uses: emails, online banking, secure websites (HTTPS).
1.4 Accuracy of Data – Validation & Verification
• Validation: Automated checks ensuring data is reasonable (e.g., range, format, length).
• Verification: Ensures data entered matches the source (e.g., double entry, proofreading).
1.5 Data Processing Methods
Method Description Examples
Batch Data collected and processed later in groups Payroll, utility bills
Online Data processed almost immediately with slight Supermarket
delay checkout, online banking
Real-time Data processed instantly without delay Airbag systems, missile guidance
Quick Review Questions
1. Define data and information.
2. Give two examples of direct data sources.
3. Explain encryption and why it is important.
4. Differentiate between validation and verification.
5. Compare batch, online, and real-time processing with examples.