Welcome to the World of Data and Information!

Welcome! Whether you are a tech-wiz or someone who finds computers a bit confusing, these notes are for you. In this chapter, we are going to explore how raw facts (data) are turned into something useful (information). Think of it like cooking: data is your raw ingredients, and information is the delicious meal you make from them. Let’s dive in!

1.1 Data and Information

At first glance, these two words might seem like they mean the same thing, but in IT, they are very different!

What is the difference?

Data consists of raw facts and figures that have no context. On its own, data is pretty useless.
Example: 39, 42, 38. (These are just numbers).

Information is data that has been processed and given context and meaning.
Example: "The daily high temperatures for the last three days were 39°C, 42°C, and 38°C." Now those numbers make sense!

Key Concept: Data + Context + Meaning = Information.

Direct vs. Indirect Data

Data can be collected in two main ways:

1. Direct Data: This is "D-I-Y" data. You (or your organization) collect it specifically for the task at hand.
Sources: Questionnaires, Interviews, Observations, or Data Logging (like a sensor recording temperature).

2. Indirect Data: This is "second-hand" data. It was originally collected for one purpose but is now being used for something else.
Sources: Electoral registers, Census data, Weather records, or information bought from other businesses.

Pros and Cons

Direct Data:
(+) Very relevant because you chose what to ask.
(-) Can be expensive and slow to collect.

Indirect Data:
(+) Usually faster and cheaper to get (it's already there!).
(-) Might be out of date or not exactly what you need.

Quick Review: Data is raw facts. Information is data with meaning. Direct data is collected by you; indirect data is collected by others.

1.2 Quality of Information

Not all information is good information! To be useful, information needs to be of high quality. Don’t worry if this seems like a lot to remember—just think of the ARADC rule:

1. Accuracy: Is it correct? If a weather report says it's 50°C in London in December, it’s probably not accurate!
2. Relevance: Is it what you actually need? A list of car prices isn't helpful if you're trying to buy a house.
3. Age: Is it up to date? A 2010 map is no good for a road built in 2022.
4. Level of Detail: Is there enough (or too much) info? A boss needs a summary, not a 500-page list of every single sale.
5. Completeness: Is anything missing? A phone number is useless if it's missing the last two digits.

Key Takeaway: High-quality information must be accurate, relevant, recent, detailed enough, and complete.

1.3 Encryption

Encryption is the process of scrambling data so that unauthorized people cannot understand it. It's like writing a secret note in a code that only your best friend knows how to read.

Methods of Encryption

1. Symmetric Encryption: Uses the same key to encrypt (lock) and decrypt (unlock) the data.
Analogy: A house key. You use the same key to lock the door and to open it later.

2. Asymmetric Encryption: Uses a pair of keys—a Public Key (which anyone can use to encrypt data) and a Private Key (which only the owner has to decrypt data).
Analogy: A mailbox. Anyone can put mail through the slot (Public), but only the owner has the key to open the box and read it (Private).

Protocols (The Rules of the Web)

When you see "https" and a padlock icon in your browser, you are using SSL (Secure Socket Layer) or TLS (Transport Layer Security). These protect data as it travels between your computer (client) and the website (server). IPsec is another protocol often used in VPNs to secure Internet Protocol communications.

Did you know? TLS is basically the newer, more secure version of SSL!

1.4 Checking the Accuracy of Data

Before we process data, we need to make sure it’s "clean." We do this using Validation and Verification. These sound similar, but they are different!

Validation (Is it reasonable?)

Validation is a computer check to see if data follows certain rules.
- Presence Check: Did you leave the box empty?
- Range Check: Is the number between 1 and 100?
- Type Check: Did you type letters where numbers should be?
- Format Check: Does the postcode look like "AB1 2CD"?
- Check Digit: A calculation on a code (like an ISBN) to make sure the numbers are correct.

Verification (Is it what you intended?)

Verification checks if the data matches the original source.
- Visual Check: Comparing the screen to the paper form.
- Double Data Entry: Entering the same password twice (if they don't match, you made a typo!).

Other technical checks:

- Parity Check: Checking if the number of 1s in a binary string is even or odd to spot errors in transmission.
- Checksum/Hash Total: Calculating a value based on the data and comparing it at the other end to ensure nothing changed.

Common Mistake to Avoid: Validation cannot tell if data is 100% correct. If you validly type "19" for your age but you are actually "18", the computer won't know you lied, but it will accept it because it's a "reasonable" number!

1.5 Data Processing

How does the computer handle the data? There are three main ways:

1. Batch Processing

Data is collected over time and processed all at once, usually during "off-peak" hours (like at night). No human intervention is needed once it starts.
Examples: Utility bills (electricity), Payroll (paying staff), Credit card statements.
Key Terms: Master File (the main permanent data) and Transaction File (the daily changes that are applied to the master file later).

2. Online Processing

The user interacts with the system, and data is processed almost immediately.
Examples: Online shopping, Booking a flight, Electronic Funds Transfer (EFT).

3. Real-Time Processing

This is for systems that need to respond instantly because the output affects the next input. This is often used in Control Systems.
- Microprocessor-controlled: Burglar alarms, Air conditioning, Traffic lights.
- Wireless Sensor Networks: Smart homes, Autonomous vehicles (self-driving cars), Guidance systems for rockets.

Example: The Greenhouse

1. Sensors measure the light/temperature.
2. Data is sent to the Microprocessor.
3. The computer compares it to "preset" values.
4. If it's too cold, the computer sends a signal to an Actuator to turn on the heater.
5. This changes the temperature (input), and the cycle repeats!

Quick Review: Batch = later. Online = now. Real-time = instant response to save a life or control a machine.

Final Encouragement

Don't worry if all these terms feel like a lot to take in right now! The best way to learn IT is to think about how you use it every day. Every time you log into a website (Encryption), type a password twice (Verification), or wait for a monthly phone bill (Batch Processing), you are using these concepts! Keep at it!