Data Flashcards

1
Q

What is BCD?

A

Binary coded decimal which is a way to represent decimal numbers in binary, where each digit is represented by a nibble(4-bit sequence). eg 364 would be 0011 0110 0100

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How would you represent a negative number in binary?

A

Using either sign and magnitude or twos complement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is sign and magnitude?

A

A form of binary that shows both positive and negative, with the first bit representing the sign of the number. 0 is positive, 1 is negative. eg. 1001 = -1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is twos complement?

A

A form of binary that shows both positive and negative numbers, where digits from bit 0 to the start of the set is written as it is and all others are inverted. eg. -12 = 11111100 in twos complement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an overflow error?

A

Where the result of operation is outside of the defined range. eg In binary addition where the addition of two number each in a single byte is larger than a byte and therefore two bytes are needed to store the result.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What disadvantage has sign and magnitude got?

A

You can’t add + and - symbols together, therefore you end up with a wrong number during binary addition or subtraction using sign and magnitude.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How would you perform a binary subtraction?

A

Convert the number you’re taking away to the opposite sign using twos compliment. Then add the two together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do you do when a carry occurs with two’s compliment arithmetic?

A
  1. When you add a positive to a negative you ignore the carry. 2. When adding two negative numbers you will always get a carry. Only ignore it if bit 7 is 0. 3. When adding two positive numbers you shouldn’t get a carry. You check whether your answer is valid using bit 7.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are subscripts used for in numbers?

A

The subscript shows what base the number is in.

eg. 10001010 is a denary number but 1000102 is binary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a nibble?

A

half a byte

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name the order for bits to petabytes.

A

bits

bytes

kilobytes

megabyte

gigabytes

terabytes

petabytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How many bits are in a byte?

A

8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How many bytes are in a kilobyte?

A

1024

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a character set?

A

A defined list of characters recognized by the computer hardwareand software. Each character is represented by a unique binary number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is ASCII?

A

The American Standard Code for Information Interchange.

This is one of the two main recognised character sets, which is used on many personal computers.

Each character is represented by a byte.

7 bits are used for all the common characters used on a keyboard (128)

The 8th bit can be used as a check digit or used to further represent another 128 characters meaning ther character set would then have 256 characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is EBCDIC?

A

The Extended Binary Code Decimal Interchange Code.

This is a character set used by older mainframe computers. This set uses different code to ASCII and therefore can’t ‘talk’ directly to another PC.

This is only really used in big businesses and they are generally the only ones that use mainframes these days.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Unicode?

A

This is one of the two main recognised character sets, which is used on many personal computers.

It uses the same binary code as ASCII does for the 256 characters that ASCII covers, however unicode uses 16 bits, which allows it to cover many other symbols including that of other languages all around the world.

18
Q

What is structured data?

A

Data that has a structure using paragraphs and indentation.

The purpose of the structured data is to make it easier to understand, however the more it is formatted the large the file size becomes.

19
Q

What is free text?

A

Free text is a type of text that has no formatting applied to it. The only information is data and some spacing information.

This is useful for emails as it keeps the file size small and therefore is sent quickly.

20
Q

What is transaction data?

A

Data that is collected automatically as it is generated and stored in a file, to be later processed.

21
Q

What does data prepared offline mean?

A

It means that data is typed into a file and later on a process is run that uses the data in the file.

eg. forms with submit buttons

22
Q

Describe a keyboard that would be used for manual input of data.

A

All keyboards have QWERTY keyboards and so are very efficient if the user has had relevant training.

A lot of work goes into designing keyboards ergonomically, which means they are designed in way that takes into account the limitations of human beings.

There also has to be consideration for health and safety due to Repetitive Strain Injury becoming more common.

23
Q

Describe touch sensitive keyboards and concept keyboards that would be used for manual input of data.

A

Both concept and touch senstive keyboards have keys which are made up of touch sensitive areas on a plastic cover.

They also are easy to use for individuals that aren’t computer literate as they keys can simply be images. The use of images can also speed up data input and reduce need of training.

The plastic cover can also be useful in settings where there is an excess amount of dust or dirt as it can stop it getting under keyboard keys and jamming the keys.

24
Q

Describe touch screens that would be used for manual input of data.

A

A touch screen enables a user to touch their VDU screen to make selections.

This could be used in places where people need to find out information but may have no computer skills. They could also be used where fast decision have to be made.

25
Q

Describe graphics tablets that would be used for manual input of data.

A

These are touch-sensitive pads that allow a user to draw on then with a stylus.

These are generally used by designers as they are more natural thatn using a keyboard and mouse to draw.

26
Q

Describe mice that would be used for manual input of data.

A

A mouse is a pointing and selecting device used with a graphical user interfaces.

There are different mice around such as:

  • standard 2/3 button mice
  • mice with a scrolling wheel
  • optical mice that dont collect fluff and dust
  • mice that use radiowaves to connect to the computer instead
  • ergonomically desgined mice
  • mice that can work with a serial port
27
Q

Describe data logging as a method for automatic input of data.

A

The process of using a computer to collect datathrough sensors, analyse the data and save and output the results of the collection and analysis.

28
Q

What is an analogue-to-digital converter used for?

A

It is used as an interface between sensors used in data logging and the computer system.

It may perform other functions such as:

  • converting analogue signals to digital
  • acting as a switch
  • providing compatible physical connections.
29
Q

Describe optical mark readers as a method for automatic input of data.

A

Data sheets are prepared and marks are put in set places to indicate choices. Once the sheets are completed they can be scanned in automatically and the results produced straight away.

30
Q

Describe optical character recognition as a method for automatic input of data.

A

A page is first scanned on a scanner. A very bright light is shone on the text and the white and dark space cause by the letters on the page reflet different amounts of light back.This is measured and used to produce a bit map picture of the writing. It is not yet a word processing document. Some OCR software is then run on the picture. This scans the picture looking for patterns that represent characters on a keyboard. As it finds these patterns, it transfers them to a text file. When the whole picture has been scanned, a text file will have been produced that can then be opened in a word processor. Although software is becoming ever more powerful, OCR is still only reliable for typed work. It still struggles to recognise handwriting.

31
Q

Describe barcodes as a method of automatic data input.

A

The lines in a barcode represent data in coded form. This data held can be retrieved by using a laser scanner. The data obtained can then be used to look up further information held on computer.

32
Q

Describe magnetic stripe cards as a method of automatic data input.

A

The magnetic stripe holds coded information that can be retrieved by swiping the card through a magnetic card reader.

They are quick to read and can be use many times.

They can be read but not written to.

33
Q

Describe smart cards as a method of automatic data input.

A

Smart cards have an electronic chip in them.

This can be used to record each time a transaction occurs.

Smart cards can be written to as well as read from

34
Q

Describe voice recognition as a method of automatic data input.

A

Using a microphone and some appropriate software, it is possible to input data into a computer.

The software is not perfect. You often have to teach it to recognise your voice accurately. If you have a cold, it may reduce the accuracy of input. Nevertheless, it is a fast way of inputting textual data and can greatly help someone with limited typing skills!

35
Q

What is meant by validation.

A

Validation is the term used to ensure that only ‘sensible’ data is entered into a database. Sensible data means that it follows any validation rules set up for that field.

36
Q

What is meant by verification.

A

Verification is checking that the sensible data you entered (which passed the validation rules set up fpr that data) is actually the data you meant to enter.

37
Q

What are the six types of validation?

A
38
Q

Name some data verification techniques.

A
  • re-typing values
  • re-typing whole data files
  • reading back
  • tick the box and click proceed
39
Q

What should a back up policy include?

A
  1. The hardware/software that will be used to back-up a system.
  2. The person responsible for back-ups.
  3. The frequency that back-ups will be done.
  4. When they will be done.
  5. Where back-up copies will be kept.
  6. How back-up copies will be labelled.
  7. How the company will know the back-up system is working as it should.

A back-up strategy will also include details about when a full back-up of all files is to occur, and when an incremental back-up is to occur

40
Q

What is an incremental back-up?

A

An incremental back-up is when the system only backs up files which have changed since the last back-up.

41
Q

What media should data be backed up onto?

A

Magnetic tape is often used for backing-up networks because gigabytes of data can be stored on them. Servers often have a special piece of hardware in them that holds a number of magnetic tapes. The software that comes with it can be configured to automatically back-up data in the middle of the night and eject the tape ready for the network manager to put in the fire safe first thing in the morning.

42
Q

What is archiving?

A

This is where data that is unlikely to be needed again but you cannot be deleted for legal purposes or other reasons is stored on a separate storage medium.