NowtAdminCase Studiesmodule1Module2Module3Module4Module5Module6Glossary

 
nowtKnowledge,Data,informationValue of InformationControl of informationLimits of InformationSocial ImpactCommunicationsProfessionalsCrimeThe LawHealth and Safetynowt
endKnowledge, Inforation and DataProcessing DataData qualityEncoding DataQuestionsend
 

Questions

ww2 dogtag

British World War II dog tags

  1. Pseudo military dog tags have become a rapper bling assesory. As far as I know the original metal tags were sold in the American civil war, "in case the worst happened". In the second world war most troops had standard tags. The information on them was necessarily short. On a modern Briish tag it in clude names MOD serial number blood type and religion. The space available was small so a code was developed to indicate religion. CH for christian, JW for jewish belief, MO for muslim and so on.
    The use of codes of this sort is common in computer records. What are the advantages and disadvantages of using codes like this in a computer? [4]
  2. Define Data, Information, and Knowledge using a suitable examples to illustrate your understanding. [6]
  3. GIGO is an abreviation often used in computer circles. What does it mean? - Use a suitable example to explain. [6]
  4. When ordering goods by telephone many companies ask the purchaser for his or her postcode. They then use this to confirm the address of the purchaser by looking up the postcode in a database of codes.
    Explain two reasons why companies prefer to buy a database ojpostcodes rather than to collect the data from the purchasers. [4]
  5. Many supermarkets now operate loyalty-card schemes. The main purpose of these is to create a data warehouse relating to customers. Data in these warehouses comes from (at least) two sources. Some comes from the a questionaire that the customer completes in order to get the card. The rest comes from the point of sale data collection.
    1. Describe at least 3 issues relating to the quality of data that is likely to come from the questionaire. [6]
    2. What issues arise for the quantity of data coming from the POS. [4]
    3. Explain how the granularity of the data from the POS can be adjusted and the effects of this. [4]
    4. List the methods of data gathering that occur at an EFTPOS [6]
   

© LEV