• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Batch Processing

Extracts from this document...

Introduction

Batch Processing Using batch processing input data is grouped together into batches. No data is processed until a complete batch has been put together. Then all the data in a batch is processed in one go. There may be a long time delay between data being input into the system and the data being processed. In this type of system the important data that the computer stores all the time is kept in a file called the master file. The data in the master file is sorted into order using one of the fields in the records in the file, known as the primary key field. The primary key field must uniquely identify each record in the file. Each piece of input data (which will update the contents of the master file) is known as a transaction. All the input data is put together into a batch in a file called the transaction file. There are three different types of transaction that any processing system will have to cope with. They are: * Add a new record to the master file. * Delete a record from the master file. * Amend / update an existing record in the master file. At some predetermined time (e.g. the end of the day or week) the computer system will process the data stored in the transaction file and make any changes that are necessary to the master file as a result of the transactions. This will produce an updated master file and an error report detailing any transactions that could not be processed for some reason. ...read more.

Middle

At the end of the week the transaction file would be processed. Before processing it would have to be sorted into the same order as the master file, i.e. records in order of employee number. The computer would then process the transactions, using the information about how many hours each employee has worked this week (from the transaction file) and their rates of pay (from the master file) to calculate the employee's wages for the week. Payslips can then be printed and the master file can be updated to increase the amount paid so far this year by the wages paid this week. An error report will also be produced. Transaction Processing (or Interactive or On-Line or Pseudo Real Time Processing) For some applications the master file needs to be kept up to date all of the time. For example in a travel agents whenever a seat is booked on a flight the number of seats that remain available on the flight must be reduced by one immediately. If this update was not done until the end of a day (as might happen in a batch processing system) then the flight could become overbooked. Transaction processing systems are used whenever the master file must be kept up to date. A transaction processing system operates like this: When a transaction is entered it is placed in a queue of transactions waiting to be made. The transactions are processed in the order that they are placed into the queue. ...read more.

Conclusion

There is a real world time limit on how long the computer system can take to process data without having terrible consequences. Therefore a missile control system has to be a real time system. Most real time systems are control systems. Other examples include the cooling system in a nuclear reactor, which prevents the reactor overheating, or any system, which must control a dangerous chemical reaction. Real time systems are very fast but they do not process data instantly. Any processing will take some time. However real time systems will process data very quickly. To ensure that any input data can be processed sufficiently quickly real time systems must incorporate a lot of redundancy. This means having much more hardware than is required to process the expected amount of input data. The extra hardware is known as redundant hardware because it is not normally used. Under normal circumstances only a small fraction of the hardware is required. In extreme circumstances when there is an unusually large amount of input data to process the redundant hardware can be used. Therefore the system will not slow down and will still be capable of meeting deadlines. Having to incorporate lots of redundant hardware makes real time systems very expensive. They are usually only used in safety critical situations. Advantage of Real-time Systems Disadvantage of Real-time Systems If real-time systems were not available we would not be able to do certain jobs. E.g. missile guidance. Real-time systems are very expensive to produce and require lots of development time and backup hardware (redundancy). EMMA MOORE - 1 - ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. What is transaction processing?

    This is the forward progression of technology. Transactional processing also involved the use of the internet to order and purchase good again at a time convenient to the customer making it easier for them to shop. The advantages are that purchases can be made without leaving your home or workplace.

  2. Smart Card System

    However, it also has some risks when the lock-and-key method is used. When lock-and-key is triggered, it creates a dynamic opening in the firewall by temporarily reconfiguring an interface to allow user access. While this opening exists, another host might spoof the authenticated user's address to gain access behind the firewall.

  1. System I designed in order to produce a promotion package for her newly formed ...

    and then opens the data file. If you don't want to start the source program, you can use ODBC or file converters instead of DDE to read the data file directly. To do this, insert the database information, or attach it as a mail merge data source as usual.

  2. Flexible Architectures in Communication Security Application

    Each algorithm is generally considered a strong algorithm, having undergone review and aggressive cryptanalysis. A strong cipher has high resilience to the efforts of an unrelated party attempting to determine the original content of an encrypted message. Four of the ciphers, i.e., 3DES [13], Blowfish [11], IDEA [23], and RC4 [34], are algorithms used in popular software packages.

  1. Internal Operations

    Describe the IEEE floating point definition. 68 - 01000100 112 - 01110000 Adding and subtracting: 112 - 68 = 112 + (-68) to find -68 in 2's comp: invert 01000100 = 10111011 1 + 1 10111100 - 2's compliment so 01110000 ( +112)

  2. White Soul System Designs - creating a computer system.

    If a customer wants to use this discount their file must be found. One of the members of staff will look in the filing cabinet for the customers file. All customers' records are stored in alphabetical order in our files.

  1. Machine Shack Management System.

    I need new ones, it should keep track of sales and print receipts, I would also l protect and keep my sales information in a separate place every month. I would also like the system to order stock that is low automatically from the suppliers using something like the internet.

  2. IT in a supermarket.

    f) The till operator knows if the item has been read correctly, because the till makes a beeping sound. If the beep doesn't sound, the till operator puts the item through the till again. g) The till scales are linked to the branch computer.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work