• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

The Value of Data and the Use of Databases

Extracts from this document...


The Value of Data and the Use of Databases Data is valuable for a number of reasons: * It takes time to compile. * It takes time to input the data into the computer. * Its historical value * It can be analysed, accurate, and up-to-date. Data can be very valuable to an organisation providing it can be clearly analysed. An example of the value of data is the use of stock control systems. As the data about stock can be updated each time a stock item is sold, the stock situation is always up-to-date. This means that, as soon as the amount in stock falls below a reorder level, an order can be placed. Indeed, many systems trigger the reordering automatically as soon as the number in stock falls below its reorder level. This is often done by the system sending the order to the supplier using electronic data interchange (EDI). This automatic stock reordering has two cost effects. First it means that the organisation should rarely run out of stock which causes a loss of sales and, hence, loss of income. It also means that the organisation should not need to store large quantities of stock which leads to high inventory costs. If the organisation also keeps data showing the rates of sales of products, the system can recognise changes in these rates and so change its ordering patterns. Thus, data about products in stock and rates of sales is valuable as they improve the profitability of the organisation. In order for data to be of value they must be accurate and up-to-date. Often data are inaccurate due to them not being frequently updated. If the sales figures are only used once a week to update the stock database, the stock levels are soon out of date and the data have little value. These days banks offer services other than banking. ...read more.


voltage) drops as the distance increases. Repeaters can be used to connect two segments of a network. It repeats data from one segment to another, enhancing the signal, as shown below. Repeaters do not segment a network and do not partition a network into sub-networks. They simply extend a network. 2) Hub. These are used to connect many computers to one computer. For example, in a star network, all the cables from each individual computer go back and connect to a hub. The hub then connects to the server. Hubs can also boost signal strength if needs be. 3) Switch. A switch is a more 'intelligent' hub. It can set up communication paths between different clients and different servers, for example, at the same time. If a user has large files to transmit, or a large volume of data, then switches would be more appropriate than hubs. Newer technology replaces hubs with switches. This allows greater speed because each station is switched in and thus has full network speed. Switches 'learn' which connections are required and join the corresponding ends. If, at the same time, Station 1 wishes to communicate with Print Server , Station 2 with Web Server, Station 3 with File Server and Station 4 with Mail server, this is possible as the switch will set up four independent paths. This means that data can flow at maximum speed along each as the system will be treated as four independent circuits. 4) Bridge. A bridge connects two similar LANs together. Users think it is logically one LAN even though it is physically two. Bridges enable the users of one network to use the resources of the other. 5) Modem A modem provides a 'dial-up connection' for a computer. It is used typically to allow a computer (which is a digital device) to communicate with other computers using the public telephone system (which is largely an analogue system). ...read more.


This has reduced the need for paperwork, has meant that work cannot get lost; there is an audit trail of when work was handed in, marked and returned and the lecturer can retrieve, mark and return work from anywhere. Supermarkets' stock is now monitored and re-ordered automatically using computerised stock control systems. This has removed some of the tasks that used to be done by workers, for example, making a decision about when to reorder. The collection of sales information has also led to the growth of data mining and data warehousing. These industries have helped companies maximise their profits. Kitchen designers now design kitchens using sophisticated 3D design software. You take in your kitchen measurements, they tap them in to their software and you can then get a very good picture of what your final kitchen would look like from a variety of angles. This has decreased the likelihood of misunderstandings between sales staff and customer and has helped the customer to picture exactly what they will be getting. The use of automated speed traps to catch speeding motorists has helped reduce the number of police hours tackling this particular problem. Improved quality Computerised technology has not only bought about changes in the way people work but also in the quality of work produced. The flat-pack kitchen manufacturing process has improved over the years. Sophisticated computer technology has meant that self-assembly furniture is now manufactured very accurately. This means not only greater customer satisfaction but also less time and money spent. The increasing use of robots in the car manufacturing industry has meant that less time needs to be spent correcting human errors. Robots can produce work to a much higher standard than humans. They can work to finer tolerances and can produce higher quality work consistently. The quality of animation used for entertainment has improved considerably. If you compare the animation in Jurassic Park or Toy Story, for example, with that from films made a few decades ago there is a world of difference. Use of systems & Data James Leong Mook Seng 1 A2 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    An introduction to Identity Theft

    4 star(s)

    In some cases the criminal will have a website set up which will require the input of banking/personal information; it will also enable the victim to view fictitious "bank accounts" with seemingly large available balances ready to transfer to him/her.

  2. System Analysis The aim of the Jewellery store system is to make the work ...

    When the results are found satisfactory then only other parts are implemented. This strategy builds the confidence and the errors are traced easily. Phase 8: Maintenance Maintenance is necessary to eliminate errors in the system during its working life and to tune the system to any variations in its working environment.

  1. Computing Project

    The program will be saved onto the hard drive so that the user doesn't have to load the CD every time he wants to use the program which is better off. 5. Identification of processes and algorithms for data transformation Login button on the Login Form: Begin If EdUsername.text =

  2. Hardware and software ICT revision notes

    Macros can be used to automate a variety of user actions. You will learn how to use macros to: * replace multiple key strokes * insert graphics, text, tables, lines and borders * adjust the page layout (margins, columns, headers, footers)

  1. What is transaction processing?

    Other functions are available within a database program such as a graphic user interface. This makes it easier to use and look more attractive. Command buttons can be added to the user interface via the use of VBA or Macros (which is a form of application produce visual basic programming as well as the incorporation of graphics.

  2. Business blue print document for the implementation of SAP R/3 (4.6B) payroll at Mastek ...

    For Mastek, Indian payroll, they will be Basic Pay, HRA, Sp. Allowance, India Allowance, Conveyance Allowance, Lunch Allowance and Adhoc Allowance. * Bank Details infotype (0009) in which you specify the main bank and, if required, other bank details for your employees The term Bank details therefore has a broader

  1. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    This is an example of the diagram shown below: Example Two: Another example is mobile phone, which is used to transmit and receive voice signals this is before the voice signals can be transmitted, it must be changed into a form that is suitable for transmissions.

  2. Describe the hardware and software used to create and edit graphic images and compare ...

    Scanners are also relatively slow, so companies. Automatic feeders can help to speed production, but it can still take a great deal of time to scan a stack of documents. It is not unusual for pages to stick together when going through the automatic document feeder, so operators will need to be trained to watch for these problems.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work