• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

I had to find the best way to get data into the database because I wanted to turn information into data on the computers. To successfully capture data I must follow a two-part process.

Extracts from this document...

Introduction

Design Data Capture Form I had to find the best way to get data into the database because I wanted to turn information into data on the computers. To successfully capture data I must follow a two-part process. > The information has to be obtained. Information has to be recorded, and then converted into a form suitable for use with the computer system. > The data has to be entered onto the computer using an input device such as a keyboard. Manual methods of obtaining the data include data-capture forms and questionnaires. These are paper-based forms that need someone to write down information in a preset way. This information is then put into the computers exactly as it is on the form. The Questionnaires usually need a human operator to key in the results by hand. ...read more.

Middle

An Automatic Data Capture System is faster and can be more accurate than a manual system. Also humans don't have to be present so this means that this type of data capture is useful in dangerous or inaccessible places, (e.g. nuclear reactors) A Manual Data Capture System is sometimes necessary as information such as personal details can only be obtained when using a Manual Data Capture Systems. It is also cheaper than Automatic Data Capture Systems as less hardware and software is needed to obtain and input the information. Designing my form. Data capture forms need careful designing as badly designed data capture forms can cause problems for the company it is being used for, however following the simple rules below a well designed form can be made: - > Keep It Simple - Keep the layout simple and uncluttered, but leave enough space to write the answers that you require, and don't put answer boxes too close together or the answers could get put in the wrong box by mistake. ...read more.

Conclusion

Also the form should be pre-tested with a small sample of respondents to make sure it provides accurate information and then if necessary the form should be amended and re-tested. Data Verification Data Verification ensures that the data is accurate and there are two main verification techniques, these are: - > Proof-Reading - this is when a person reads the data that has been entered onto the system and compares it with the original. Any incorrectly entered data will be edited and then resaved and printed off correct. > Double Entry - this is when twice two different people enter the data. The computer then compares the two versions and any errors found are amended. Bearing all of the above in mind I set to work creating my data capture form. And as you can see throughout the next few pages it took a few attempts to get it right. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    LAN & Topologies & Data Flow

    3 star(s)

    This means that the internet is the largest type of mesh topology. When the data is transmitted it will automatically know where the data is to be sent and it will take the shortest route. Advantages * Even if there is a fault in the cable the traffic will still

  2. I have been given the task to design a database for a company called ...

    Country * Postcode This table, like the customer table, has mainly text data types and only the key field is different, as it has to be a key field. Order Table: This table includes the following fields: * Order ID * Customer ID * Parcel ID * Date Ordered *

  1. Programming Techniques

    Begin Average := (A + B + C) /3; End; The main program could include statements such as: Result := 0 Readln(num1); Readln(num2); Readln(num3); Calculateaverage(Num1, num2, num3, result); {call statement} Writeln('The average is ', result) Num1, num2, num3 and result are parameters passed to the procedure calculateaverage. The statement used to transfer execution to the procedure is referred

  2. The development of the computer - Mainframes, Midrange Computers, Personal Computers, Palmtops (Personal Digital ...

    The x86 architecture has been responsible for the PC as it is today. The instructions are the same as they were back in the 1980's, with the exception that they have evolved into the form used today. Virtual Storage also plays a large part on Personal Computers.

  1. Different ways of data capture

    ADVANTAGES: Hard to forge the characters *Characters can be read even if cheque is crumpled or dirty *Characters = readable by humans unlike barcodes. 7.Magnetic Stripe - Credit cards, debit cards, Railway tickets, Phone cards have them the strip encodes up to 220 characters of data.

  2. Spare Parts Database Project

    Customer details This form will be used for several purposes so it needs facilities to * Check to see whether a Customer is already on the database. * Add a new Customer. * Look though all the existing records for the current Customer and bring up more details if necessary.

  1. Smart Card System

    The following process describes the lock-and-key access operation: 1. A user opens a Telnet session to a border (firewall) router configured for lock-and-key. The user connects via the virtual terminal port on the router. 2. The Cisco IOS software receives the Telnet packet, opens a Telnet session, prompts for a password, and performs a user authentication process.

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    Integer 10 Preferred contact method String 5 Availability file This file holds the information on the apartment's availability. It will be separate to the contact file because having bother files together will make matters confusing and difficult to code the program.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work