• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

I had to find the best way to get data into the database because I wanted to turn information into data on the computers. To successfully capture data I must follow a two-part process.

Extracts from this document...

Introduction

Design Data Capture Form I had to find the best way to get data into the database because I wanted to turn information into data on the computers. To successfully capture data I must follow a two-part process. > The information has to be obtained. Information has to be recorded, and then converted into a form suitable for use with the computer system. > The data has to be entered onto the computer using an input device such as a keyboard. Manual methods of obtaining the data include data-capture forms and questionnaires. These are paper-based forms that need someone to write down information in a preset way. This information is then put into the computers exactly as it is on the form. The Questionnaires usually need a human operator to key in the results by hand. ...read more.

Middle

An Automatic Data Capture System is faster and can be more accurate than a manual system. Also humans don't have to be present so this means that this type of data capture is useful in dangerous or inaccessible places, (e.g. nuclear reactors) A Manual Data Capture System is sometimes necessary as information such as personal details can only be obtained when using a Manual Data Capture Systems. It is also cheaper than Automatic Data Capture Systems as less hardware and software is needed to obtain and input the information. Designing my form. Data capture forms need careful designing as badly designed data capture forms can cause problems for the company it is being used for, however following the simple rules below a well designed form can be made: - > Keep It Simple - Keep the layout simple and uncluttered, but leave enough space to write the answers that you require, and don't put answer boxes too close together or the answers could get put in the wrong box by mistake. ...read more.

Conclusion

Also the form should be pre-tested with a small sample of respondents to make sure it provides accurate information and then if necessary the form should be amended and re-tested. Data Verification Data Verification ensures that the data is accurate and there are two main verification techniques, these are: - > Proof-Reading - this is when a person reads the data that has been entered onto the system and compares it with the original. Any incorrectly entered data will be edited and then resaved and printed off correct. > Double Entry - this is when twice two different people enter the data. The computer then compares the two versions and any errors found are amended. Bearing all of the above in mind I set to work creating my data capture form. And as you can see throughout the next few pages it took a few attempts to get it right. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    LAN & Topologies & Data Flow

    3 star(s)

    * Centralization can be a drawback if it there is high utilizing of the network because it will result in performance drop in the traffic on the network. Mesh Topology - In this type of topology each of the nodes are connected with each other.

  2. I have been given the task to design a database for a company called ...

    information as they will just have to drop the box down and choose the category they want. Menu There will be three menus: the first one will be a general welcome menu giving the user the option the go into either the existing or new customer menu.

  1. Programming Techniques

    There are two main types of loop: * While/Repeat - used when the number of loops to be taken is unknown on entry (conditional loop) * For - used when the number of loops is known in advance (unconditional loop)

  2. Explain the different techniques of gathering information to answer an IT Technical problem or ...

    Normally a fault log would be organised therefore make your search a lot easier meaning easy access. This would result in the problem being answered because of the previous fault logs which notes down how to resolve certain problems. In order for you to obtain information from an Internet source

  1. ICT Sample Work India Red

    The form should have data validation and should be a GUI reduce data entry mistakes and reduce the amount of typing. * Each of the data entry should have India Red's log and in terms of the colours/interface it should have India Red's colour black background and red text.

  2. In the spreadsheet I am going to design I am going to use the ...

    Although the key of the workbook design is functionality I will also have to think about the aesthetics of the design. The aspects that I will have to look at are things like font size and colour, continuity of the colour scheme and the layout and spacing of control buttons within the individual pages.

  1. The main areas that will be focused upon in the interview are - Security ...

    Items not returned within the warranty period? (Any others?) Ask for other comments. 1st Interview SECURITY Has security been a problem in the past for you? Only restricting the data from any other user apart from myself. The most important data is the Customer Details. I feel I have an obligation to the public for the privacy and confidentiality of this data, for obvious reasons.

  2. Basic Database Building

    is an area for the user to access all of the relevant information. This information will be all the user can see and is customisable to suit. This then means they couldn't access or tamper with any other areas of the database as everything else would be locked.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work