Data are raw, unprocessed facts or measurements. Information is data that have been organised, processed or interpreted so that they become meaningful to a user.
Example: A smart‑meter records the numbers 578, 582, 590. These are data. When the figures are summed and presented as “Your electricity consumption this month is 1 750 kWh”, the result is information.
| Source type | Direct examples | Indirect examples |
|---|---|---|
| Surveys / questionnaires | Customer‑satisfaction forms filled in‑person | National census data published by the statistics office |
| Sensors / instruments | Temperature‑sensor readings from a factory line | Web‑scraped price lists from competitor websites |
| Transactions | Point‑of‑sale receipts captured at checkout | Historical financial statements downloaded from a public register |
Information must meet five quality criteria. The table shows each criterion, how it can be assessed and a brief illustration.
| Criterion | How to assess | Illustration |
|---|---|---|
| Accuracy | Cross‑check with a trusted source; use validation rules. | A mis‑read meter gives a bill £20 too high. |
| Relevance | Ask whether the information answers the business question. | Using last year’s weather data to predict today’s flood risk is irrelevant. |
| Age (Timeliness) | Check timestamps or version numbers; define acceptable age limits. | Out‑of‑date stock levels cause a shop to sell items it no longer has. |
| Completeness | Verify that all mandatory fields are present; use “presence” validation. | Missing overtime entries lead to under‑payment of staff. |
| Consistency | Ensure uniform formats, units and coding across the whole data set. | One record uses “USD”, another “$”; this can cause calculation errors. |
Data provenance – recording where each data item originated, who collected it and when – helps to judge all five quality criteria.
Encryption protects data from unauthorised access by converting it into a coded form. It is essential when data are stored (at rest) or transmitted (in transit) over insecure networks.
| Protocol | Purpose | Typical use |
|---|---|---|
| TLS / SSL | Secure web traffic (HTTPS) | Online banking, e‑commerce |
| IPsec | Secure IP‑level communication | Virtual private networks (VPNs) |
| Advantage | Disadvantage |
|---|---|
| Confidentiality – data cannot be read without the key | Performance overhead – encryption/decryption consumes CPU cycles |
| Integrity – tampering can be detected (e.g., with MACs) | Key‑management complexity, especially for symmetric keys |
Both techniques ensure that data are correct before they are processed, but they address different stages.
| Check | Description |
|---|---|
| Presence | No mandatory field left blank. |
| Range | Values fall within acceptable limits (e.g., 0 ≤ hours ≤ 200). |
| Type | Numeric, text, date, etc. |
| Format | Correct number of digits, separators, or pattern (e.g., “A‑123”). |
| Consistency | Related fields agree (e.g., start ≤ end date). |
| Check | Description |
|---|---|
| Double‑entry | Two independent entries give the same result. |
| Checksum / hash | Totals match expected values (e.g., sum of gross pay). |
| Re‑calculation | Sample records are processed manually and compared. |
payroll.csv file.Test ID | Description | Input data | Expected result -------|---------------------------------|---------------------------|------------------------------ V01 | Check mandatory fields present | Row 12 of payroll.csv | No blank fields V02 | Verify numeric range for hours | Hours = ‑5 | Validation error V03 | Confirm tax‑code format | TaxCode = “B‑987” | Pass V04 | Verify checksum of gross totals | Whole file | Sum = 1 254 320.00
| Method | Typical response time | Key advantage | Key limitation |
|---|---|---|---|
| Batch | Minutes‑to‑hours (after run starts) | High throughput, low per‑transaction cost | No immediate feedback to user |
| Online | Seconds | Instant confirmation to user | Higher resource demand per transaction |
| Real‑time | Milliseconds or less | Deterministic, time‑critical response | Complex, costly hardware/software |
The Cambridge syllabus requires an algorithm (or flowchart) that decides which method to use based on business requirements.
Algorithm ChooseProcessingMethod
Input: dataVolume, requiredResponse, resourceBudget
Output: processingMethod
1. IF requiredResponse ≤ 0.1 seconds THEN
processingMethod ← “Real‑time”
ELSE IF requiredResponse ≤ 5 seconds THEN
processingMethod ← “Online”
ELSE
// response time is not critical
IF dataVolume > 10 000 records AND resourceBudget is limited THEN
processingMethod ← “Batch”
ELSE
processingMethod ← “Online” // small volume, interactive preferred
END IF
END IF
2. RETURN processingMethod
A batch is a collection of similar jobs that are processed together as a single unit, without manual intervention during execution. The typical batch cycle consists of four stages:
Utility companies must produce millions of bills each month. Batch processing guarantees consistency, speed and cost‑effectiveness.
Why batch? The data set is huge, the calculation rules are fixed, and the output is needed at a set time each month, making a single, automated run the most efficient solution.
Payroll systems calculate earnings, deductions and taxes for every employee in an organisation.
Why batch? Payroll must be processed for all staff at the same cut‑off date, guaranteeing uniformity, legal compliance and a clear audit trail.
| Application | Processing frequency | Typical data volume | Common software | Key processing steps |
|---|---|---|---|---|
| Utility Bills | Monthly | Hundreds of thousands to millions of records | Billing suites (e.g., SAP IS‑U, Oracle Utilities, IBM InfoSphere) | Data collection → Rate application → Bill generation → Distribution → Archiving |
| Payroll | Weekly, bi‑weekly or monthly | Dozens to tens of thousands of employee records | Payroll packages (e.g., ADP, Sage Payroll, SAP HR, QuickBooks Payroll) | Attendance capture → Earnings calculation → Deductions → Payslip & bank file → Archive |
Create an account or Login to take a Quiz
Log in to suggest improvements to this note.
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources, past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.