Data input , Basic Computer Science

Assignment Help:

Data Input : There are several aspects of data input that need careful consideration. We shall assume that in a laboratory environment you are mainly concerned with entering data via a keyboard. There are other methods which, although not frequently used, you may encounter:

(1) Optical character recognition - scanners that read text from paper directly into a computer;

(2) Scanners, e.g. for reading bar code information;

(3) Paper tape systems - old equipment;

(4) Analogue-to-digital converters - reading experiment. data from photoelectric cells in, for example, spectrometers.

At first sight, entering data into a computer might not seem problematical. Indeed, the mechanics of data entry are well tried and straightforward. However, from a management point of view there are several considerations.

First of all, there is the problem of access. This is often an acute problem in educational establishments where there might be an abundant supply of computers for teaching but a desperate shortage for management and administration. Sharing a computer terminal does not really work satisfactorily, and if a computer is to be a really useful management tool, it must be on hand at all times.

Another point to consider is that of training. Whoever enters data into your system, must know what they are up to. Otherwise it will not be long before the GIGO principle is brought into play. Adequate training is the cornerstone of good computer systems.

Coupled to both access and training is the problem of the time taken to 'key in' data. Consider the case of card index system being transferred to a computer system. At some stage, every character in the card index needs to be keyed into the computer. The computer system will not be any use until the transfer is complete and it may take months of time for keying- in the data. Even then there will be a need to update the data regularly which will require more time at the keyboard. Never underestimate 'keying-in' time. Working conditions are especially important in computer work, particularly if it is for protracted periods. You cannot, for example, put a computer on someone's desk one day and expect everything to run smoothly. Operating computers can be particularly tiring and stressful and hence it is worthwhile investing in proper furniture, ensuring that lighting conditions are suitable, and that noise and heat levels are kept under review.


Related Discussions:- Data input

C programming, hello do have c programming experts

hello do have c programming experts

Frequency and bandwidth, Frequency and Bandwidth: Let us try to unders...

Frequency and Bandwidth: Let us try to understand a little about how information is transmitted. The information may be in the form of sound (human voice, music) or it may be

Description of external hardware interruptions, External interruptions are...

External interruptions are produced by peripheral devices, for example keyboards, printers, communication cards, etc. They are also produced by coprocessors. It is not achievable t

Digital design system, Manipulate the following Boolean expression in such ...

Manipulate the following Boolean expression in such a way so that it can be implemented using exclusive-OR and AND gates only. AB''CD'' + A ''BCD'' + AB''C''D + A''BC''D

Input Devices, Keyboards, microphones, and mice have generally been used as...

Keyboards, microphones, and mice have generally been used as the standard input devices for most computer systems. The popularity of video and computer games has led to the introdu

Assembly, can you help me to do my assembly program homework

can you help me to do my assembly program homework

Ip basics, IP provide connectionless service to upper layer IP protocol is ...

IP provide connectionless service to upper layer IP protocol is very simple could not guarantee the reliability of transportations IP protocol is Point to Point IP provide the unif

Cryptography, Question 1 Consider the one-time pad encryption scheme to e...

Question 1 Consider the one-time pad encryption scheme to encrypt a 1-bit message m, and assume m is chosen with uniform distribution from message space M={0,1}. Let E1 be the ev

Second generation of computers, THE SECOND GENERATION (1956-1965) ...

THE SECOND GENERATION (1956-1965) This generation of computers were characterized by:     Considerable reduction in physical size     Increased reliability

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd