Académique Documents
Professionnel Documents
Culture Documents
Introduction
Data can be entered into a computer in a variety of different ways. Users might designate position or direction by pointing at a display. Users might enter numbers, letters, or more extended textual material by keyed inputs or in some applications by spoken inputs. Data might be keyed into displayed forms or tables, into constrained message formats, or as free text. In graphic interaction users might draw pictures or manipulate displayed graphic elements. The computer will also play a role in the data entry process, guiding users who need help, checking data entries to detect errors, and providing other kinds of data processing aids. A designer of user interface software must be concerned about computer processing logic as well as data input by the user. In this unit, you will understand the meaning and methods of data entry, methods of storing and retrieving data, validation and verification of data, estimation of time and cost and data entry turnaround time. ou will also understand the document intake and scanning, data transcription and comparison with source documents, working with data forms and graphics and storing and backing up data files.
Objectives
After completing this unit, you will be able to! Understand the data entry and types of data "xplain the methods of data entry Discuss the methods of storing and retrieving data #now the data validation and verification "xplain data entry estimation of time and cost $earn data entry turnaround time Discuss document intake Understand document scanning Discuss data transcription and comparison with source documents Identify working with data forms and graphics Discuss storing and backing up data files
Data entry refers to user actions involving input of data to a computer, and computer responses to such inputs. The simplest kind of data entry consists merely of pointing at something selecting an item or designating a position on a computer%generated display. In more complicated modes of data entry, a user may have to control the format of data inputs as well as their contents. Thus &uestions of format control in text entry'editing and graphic interaction may properly be considered &uestions of data entry. (ote, however, that user inputs which initiate or interrupt transactions such as command entries, or control entries selected from a displayed menu or by function keys pose rather different &uestions of design. Data entry is heavily emphasi)ed in clerical *obs, and many other *obs involve data entry to some degree. +ecause data entry is so common, and because inefficiencies caused by poorly designed data entry transactions are so apparent, many published recommendations for good user interface design deal with data entry &uestions. ,uman factors specialists can probably give better advice about data entry than about any other functional area of user interface design. Data entry re&uires hardware, and the proper design of input devices has received considerable attention, including concern for standardi)ation of keyboard layouts. -uture advances in hardware design may well influence data entry tasks, as suggested by current advocacy of voice input. .ontext should also be preserved to speed correction of input errors. /ne significant advantage of on%line data entry is the opportunity for immediate computer validation of user inputs, with timely feedback so that a user can correct errors while the data are still fresh in mind and while documented source data are still at hand. ,ere the computer should preserve the context of each data entry transaction, saving correct items so that the user does not have to enter those again while changing incorrect items. Data entry is the act of transcribing some form of information into another medium, usually through input into a computer program. -orms of data that people might transcribe include handwritten documents, information off spreadsheets, and se&uences of numbers, as well as computer code and even names and addresses. 0ome careers are exclusively involved in data entry, while certain workers, like programmers, might have to occasionally enter data while performing other tasks. Anyone interested in this career should be cautious, however, as there are many online 1opportunities1 that are actually scams and not legitimate *obs. 2ood typists, especially those who are also excellent at 34%key typing, are often &ualified for data entry positions. 34%key typing uses the 4%5 keys often found on the right side of a computer keyboard, also called the number keypad. 6ost companies that hire people for this work have re&uirements for #eystrokes 7er 6inute 8#769, with a high degree of accuracy. These numbers can vary from one business to another, but are based on individual keys rather than words. 0ome companies use audio input, which a person listens to while entering data into a computer or similar system. The typist needs to be able to follow along as the recording goes, so that pauses are kept to a minimum. Accuracy is vital in applications like programming, since the wrong letter, number, or symbol can throw off an entire command function within computer code. -or spreadsheets and published or printed documents, typos can result in misinformation or embarrassing errors. Qualifications Required for a Data Entry Operator
A degree or particular type of education is not usually re&uired for this field. 7eople can gain fast and accurate typing skills through classes or other methods, such as extensive practice. .ertain speciali)ed fields may re&uire training in particular software programs or knowledge of sub*ects like medicine and anatomy. These opportunities usually pay better than general entry positions, but may re&uire certification, education, or previous experience. Telecommuting Opportunities :ith a number of computer systems re&uiring new information on an almost constant basis, data entry does not necessarily have to take place in an office. 6any people work out of their homes entering data, transcribing medical information, or updating websites. 0ome of these opportunities can be found online, though many companies re&uire that applicants come into a location for testing and training. /nce this is complete, the typist might work onsite at that location, or may be eligible to work from his or her home. cam Offers Anyone who wishes to enter the data entry field should be careful to avoid ;scam< offers, which promise work in exchange for a fee. The ma*ority of legitimate sites do not re&uire a fee be paid, since the entire purpose of such a *ob is for someone to enter information in exchange for payment. 6any of these sites prey on people who want to work from home and often seem too good to be true. "xtreme caution should be used by anyone approaching a company selling a book or other service to 1help1 him or her find data entry *obs, as many such offers are scams. !uture "#anges and $utomation In some cases, computers can perform data entry by scanning documents and converting information for different programs. This method and others may ultimately eliminate some *obs. -or example, sufficiently accurate voice recognition software might reduce the need for medical transcriptionists. Anyone working in this field should look for ways to gain additional skills, such as knowledge of computer programming languages, to become more attractive as *ob opportunities become limited. %#ysical Toll Data entry re&uires focus and concentration, which can be mentally exhausting and physically challenging. It is important for people sitting and typing all day to pay attention to maintaining good posture, type in an ergonomically sound position, and take breaks for their eyes and hands. 6ost experts in workplace ergonomics suggest that people sitting at a computer for extended periods of time should take a break at least once an hour and move away from their computer screens. ,and and body%stretching exercises can help prevent health problems like carpal tunnel syndrome.
Integers An integer is a whole number % it has no decimal or fractional parts. Integers can be either positive or negative. Examples ! 3=, >?, 3=@>, 3444444, %A, %?@A? Real &umbers Any number that you could place on a number line is a real number. Beal numbers include whole numbers 8integers9 and numbers with decimal'fractional parts. Beal numbers can be positive or negative. Examples ! 3, 3.>?A>, 5>C.?, %4.444A, A.3>= "urrency .urrency refers to real numbers that are formatted in a specific way. Usually currency is shown with a currency symbol and 8usually9 two decimal places. Examples ! D3=.>?, %D4.43, E555.44, F??44 %ercentage 7ercentage refers to fractional real numbers that are formatted in a specific way % out of 344, with a percent symbol. 0o, the real value 4.? would be shown as ?4G, the value 4.43 would be shown as 3G and the number 3.=? would be shown as 3=?G. Examples ! 344G, =?G, 3=44G , %?G Inside the computer the ?4G is stored as a real number! 4.?, +ut when it is displayed it is shown formatted as a percentage $lp#anumeric 'Te(t) Data Alphanumeric 8often simply called HtextH9 data refers to data made up of letters 8alphabet9 and numbers 8numeric9. Usually symbols 8FGIJK, etc.9 and spaces are also allowed. Examples ! D/2, ;A little mouse<, A+.3=A. en&uiriesKnavneetmehra.com Text data is often input to a computer with speech marks 81. . .19 around it! "MONKEY" These tell the computer that this is text data and not some special command. Date and Time Data Date 8and time9 data is usually formatted in a specific way. The format depends upon the setup of the computer, the software in use and the userLs preferences. Date Examples ! =?'34'=43>, 3= 6ar =43=, 34%4C%34
Time Examples ! 33am, 3?!44, A!44pm. 3@!4?!>? The date 4C'45'4M refers to Cth 0eptember =44M in the international system, but would be 5th Nune =44M in AmericaO *oolean '+ogical) Data +oolean data is sometimes called HlogicalH data 8or in some software, Hyes'noH data9. +oolean data can only have two values! TBU" or -A$0". Examples : TBU", -A$0", /(, /--, "0, (/ (ote that TBU" and -A$0" can also be shown as boxes 8ticked ' unticked9 electing Data Types :hen we are presented with data to be input into a computer system, we must analyse it and select appropriate data types for each value. e.g. -or the following data, we might use the date types shown! "0 ' (/, /( ' /--, or even graphically as tick
Data &ame (ame ,eight Date of +irth 7hone (o. 7ay Bate Tax Bate
E(ample Data 1(avneet 6ehra 1 3.M4 > Nan 35M5 433 ======== D=?.@? =?G
(ote that the telephone number in the example to the left has a data type of alphanumeric. ou might think that it should be numeric, however phone numbers often have spaces, dashes, etc. which numeric data cannot have.
The ultimate goal of a business enterprise is to uncover consumer demands and ways to fulfill those demands. In this respect, effective data collection, storage and retrieval are important tools to gain insights about consumer desires, as well as to better understand business processes. The ability to effectively store, gather and analy)e internal business data can deliver important information that can help a company develop competitive advantages. Data 0ining Data mining is the process of extracting data from large databases with the aim of finding data patterns that can be useful to business goals. Data mining information can identify loyal customers, and this information can be used in customer loyalty marketing strategies. It also may reveal sales patterns that signal market trends. Dormant computer data generally is the source of most data mining, which may exist for a number of reasons, such as a companyHs decentrali)ed database management. Data mining, also called knowledge or data discovery, can become the basis for multichannel distribution strategies and customer relationship management initiatives. Data 3are#ousing Data warehousing is a centrali)ed reporting database. It is a business intelligence tool developed by extracting data from various operational systems, removing data redundancies and formatting missing data fields in order to develop a central data reporting database. Its capability to retrieve and manage data from multiple sources is used to perform activities such as data mining, market research, online analytical processing and statistical modeling. All of the data associated with a single item 8such as a person9 is stored as a record in the database. In most database software programs, each row of data is a record. The columns in a database are usually the data elements or data variable names 8see below9.
Different Types of "ommercial Data torage 0et#ods These methods assume that you will create your /:( data storage mechanism. There are also "60'"60. products that are already created for collecting the standard national data variables.
Database programs 'e.g4 0icrosoft $ccess4 Oracle4 Q+ erver) Advantages: Information is stored as a complete record. ou can easily &uery the data and create new variables or data subsets. In many applications, you can create a user interface for entering the data. Disadvantages: Be&uires time and technical skill to initally design the database and to set up variables correctly preads#eet programs 'e.g.4 0icrosoft E(cel) Advantages: "asy to structure spreadsheets for input. 0imple view of the data. Disadvantages: Data types are not explicitly defined. Data are not stored as a record 8this is keyO9. 6anipulation of data 8for analyses, etc.9 can be error%prone and time consuming with no record of changes tatistical programs 5it# database options 'e.g.4 % Advantages: Data entry and analysis are completed in the same software. 0imilar to database programs, you can easily &uery the data and create new variables or data subsets. Disadvantages: 0preadsheet'database options for statistical applications vary widely. The most powerful tools can be very time consuming to learn and re&uire advanced knowledge. 4 $ )
1.6.1 Data 1alidation Data validation deals with making sure the data is valid 8clean, correct and useful9. Data validation procedures use data validation rules 8or check routines9 to ensure the validity 8mostly correctness and meaningfulness9 of data. It also ensures the validity of input data to maintain the security of the system. These rules are automatically implemented through data dictionaries. Data validation can also be implemented through declaring data integrity rules or procedures enforcing business rules 8especially in business applications9. These business rules are usually captured during the initial business re&uirements analysis conducted by the business analysts. It is very important to implement business rules at the beginning of the process, because wrongly validated data usually have a negative impact on the execution of the business process. The simplest form of validation is checking the input to make sure they are made up of characters from the ;valid< set. -or example, a validation process for telephone directory application should validate the input telephone numbers to make sure that they contain only numbers, plus'minus symbols and brackets 8and nothing else9. A little more advanced validation processes could also check the country code field to check if they are legitimate country codes. 1.6./ Data 1erification Data verification is the process of checking a copy of data to make sure that it is exactly e&ual to the original copy of the data. Data verification is usually re&uired when you have backed up your data. 6ost modern backup software have in%built verification functionality. "ven, disc burning software allows you to perform verification at the end of the burning process. If the data on the burned disc is verified then you are fine. +ut if not, you have to throw away that disc and burn again. Data verification is a very important process as it makes you feel safe because you will be confident that you can actually use the backed up data in case the original data gets lost or corrupted. Qerification software usually makes sure the copy is readable as well as the content is matched exactly with the original content. 0o, it takes more time than a simple backup, but it is well worth the trouble. +ut typically large enterprises perform the automatic backups at night, so the lengthening of time due to the verification process is not a serious problem. Difference bet5een Data 1alidation and Data 1erification Data validation is usually performed on the original copy or the inputs to the system, while data verification is carried out on the copies 8or backups9 of data. .hecking the validity of inputs is very &uick compared to the lengthy verification processes that occur after backing up. Qalidation can be used to protect data from the mistakes made by the users, while verification can be used to protect data from the problems that occur due to system faults.
"#ec, -our %rogress 6 !ill in t#e blan,s. 3. PPPPPP.is the process of checking a copy of data to make sure that it is exactly e&ual to the original copy of the data.
=. PPPPPP.makes sure that the data is clean, correct and meaningful, while data verification ensures that all copies of the data are as good as the original.
=. Use a word%processing program on your computer to open a new document in which you can type text. ou can also use the (otepad accessory that is included with 6icrosoft :indows. A. 0tart the timer on your stopwatch. "nter text from your document until you have reached the end of the document, then stop the timer on the stopwatch. >. Add up every character that you have typed, including spaces. Divide this total number of characters by the number of seconds recorded on your stopwatch. -or example, if you typed =,444 characters in 54 seconds, your rate would be ==.== characters per second. ?. 6ultiply your result by C4 to calculate how many keystrokes you can make in a minute. In this example, you would multiply ==.== times C4 for a total of 3,AAA.= keystrokes per minute.
-or the ma*ority of the pro*ects companies work on, fees range from Bs. 4.34 to Bs. ? per data record. A ;record< is generally comprised of all the fields identified by the client as representing a complete, identifiable 8and billable9 string of information. In some cases, all the information on each source document represents a ;record<8e.g. enrollment forms9, and in others each entry in a listing can constitute a record. :hat follows is a discussion of the factors affecting the cost of each of these steps. Document Inta,e Document Intake refers to the process of receiving the source documents and preparing them for scanning. ,ow this is done and the amount of document preparation is re&uired to perform can greatly affect the cost. In some cases, the client will have you set up a 7/ +ox for a pro*ect. 0ource documents 8e.g. product registration cards, medical insurance enrollment forms, loyalty card enrollment forms, etc.9 are either mailed directly by the person filling out the form 8i.e. one%at%a%time 9, or are mailed in small batches from multiple client stores or offices. .ompanies picks up the mail daily, opens the envelopes and prepares the documents for scanning. (ext is to remove staples, paper clips, and post%it notes, and arrange all documents right%side%up and facing the same direction prior to scanning. In other cases cases, clients collect the documents centrally and perform all document preparation prior to sending them to companies. They then ship them in large batches. This minimi)es the document preparation cost, but increases the turnaround time. Data Entry Turnaround Time The general rule is the faster the re&uired turnaround time, the higher the fee. This is to compensate for having to work staff longer and harder during short periods of time, as well as the added administrative burden to &uickly get a *ob done. Document canning In most cases, clients send hard copy forms. :hen you are using your own system to capture data from the forms, you will found the most efficient method is to key from scanned image, or use a combination of key%from%image 8#-I9 plus various recognition technologies 8e.g. /ptical .haracter Becognition for machine print 8/.B9, Intelligent .haracter Becognition for hand print 8I.B9, barcode scanning, etc.9. ,igh%speed scanners scan up to M4 pages per minute. The factors affecting scanning cost include!
Document si8e % This affects throughput. Also, too small or too big cannot be scanned. Document uniformity % Are they all the same si)eS Are there differences in shadingS %aper type % is the paper real thin, have a sticker attachedS Document condition %% 7oor &uality documents will re&uire extra time.
Document arrangement % To be scanned efficiently, all documents must be right side up and facing the same direction. There can be no staples, paper clips, etc., and the documents must all be flat 8unfolded9. The cost of document preparation usually exceeds the actual cost of scanning. *atc# integrity % .an we scan continuously, or do we have to retain client batch integrityS
0canning costs can differs depending on the above factors. %rogramming /nce documents have been scanned, the images and are imported into data entry system. -or each pro*ect, a 1template1 is developed within companies data entry system, programmed for the specific fields on the form. "ach field can be programmed to restrict data entry to acceptable values. Any business rules a client defines for specific fields or forms can be programmed into each template. The factors affecting the cost of programming include the following!
Document complexity %%si)e, number of pages, number of fields per page, number of records per page Document uniformity %% are there multiple versions of the source documentS "dits re&uired %% for example, integrating client%provided lookup tables, address correction, etc. -ormat of output file re&uired
7rogramming is a one%time cost 8unless the source document changes9. Data Entry 9 :ey !rom Image;O"R Using the data entry template developed for a specific pro*ect, data entry operators key the re&uired data from scanned image. All work is performed on production servers. Data entry operator workstations connected to production server function merely as ;dumb terminals<. All data and images remain on the server. Using a split screen, the operators view 1snippets1 of the scanned image in one part of the screen, and the data entry fields in the other part of the screen. The factors affecting the amount of time it will take to process a document, and hence the cost includes the following!
(umber of fields to be keyed (umber of characters in each field Type of data % numeric, alpha, alphanumeric -orm Design % this is often overlooked but can have a huge impact on data entry efficiency and cost!
o
;.onstrained< forms improve legibility and potentially allow for successful hand%print recognition 8a constrained form re&uires that each character be printed in a separate boxR for example!
Uniformity of document layout %% are the fields to be keyed always in the same place Are answers standardi)ed using number or alpha%numeric values and displayed on the formS -or example! <ig#est Education +evel.
+egibility % handwritten vs. typedR also, using a 1constrained1 form with each handwritten character printed in a separate box improves legibilityR also, the &uality of the source document may affect the &uality of the scan and hence legibility. Required accuracy % -or single%key data entry, our U0 workers generally achieve accuracy ranging from 5?%5@G, depending on the type of data 8see above9. If greater levels of accuracy are re&uired, the client may opt for having us double key the entire document or selected fields. >se of Offs#ore labor force % in some cases the data to be processed is well suited for keying by our offshore subcontractors. This can reduce cost in many circumstances, but may affect &uality 8unless the forms are double%keyed9 and turnaround time.
This is the hardest one to estimate, and most vendors will be reluctant to provide a firm fee &uote without seeing an actual source document, The above factors will greatly affect the amount of time. In addition, issues affecting the document 8layout, legibility9 and the type of data 8numeric vs. alphanumeric9 will affect the keying rate 8can range from and average of >,444 keystrokes per hour 8#07,9 to 34,444J #07,9. /ne other factor will affect fee, and that is the si)e of the pro*ect. -or large, ongoing pro*ects, one can provide more aggressive pricing than one can for small, one%time pro*ects. .ompanies typically try to
achieve a gross margin ranging from A4G for very large pro*ects 8millions of records9, to >?G for smaller, one%time pro*ects. +ecause every pro*ect is uni&ue, and each client has different goals and ob*ectives, it is not practical to take a Hcookie%cutterH approach to data entry pricing. The only good measure is to let the companies take a look at pro*ect. That way one can give a reasonable fee estimate based on the factors discussed above.
only involves a lot of time but it is also a daunting task. This has increased the demand for corporate transcription services and companies offer customi)ed solutions to large, medium and small enterprises.
This bad data form display violates in some degree several design guidelines which will be discussed in following sections "ombined Entry of Related Data In a form%filling dialogue, when a user is entering logically related items, re&uire *ust one explicit entry action at the end of the transaction se&uence, rather than separate entry of each item. Depending on form design, this practice might involve entering the entire form, or entry by page or section of a longer form. -orm design should indicate to users *ust where explicit entry is re&uired. 0ingle entry of grouped data will generally permit faster input than item%by%item entry, and should prove more accurate as well. This practice permits user review and possible data correction prior to entry, and also helps the user understand at what point grouped data are processed. It will also permit efficient cross validation of related data items by the computer. !le(ible Interrupt :hen multiple data items are entered as a single transaction, as in form filling, allow the user to B"QI":, .A(."$, or +A.#U7 and change any item before taking a final "(T"B action. 0inimal >se of Delimiters
:henever possible, allow entry of multiple data items without keying special separator or delimiter characters, e.g., hyphens, dollar signs, etc. This can be accomplished either by keying into predefined entry fields or by separating se&uentially keyed items with blank spaces. In this context, tabbing from field to field is not considered to be keying a special delimiter character. :hen data items contain internal blanks, design the entry fields with a predefined structure so that users will not have to key any internal delimiters. tandard Delimiter "#aracter :hen a field delimiter must be used for data entry, adopt a standard character to be employed consistently for that purpose. E(ample A slash 8'9 may be a good choice. .hoose a special delimiter character that does not re&uire shift keying. It will also be necessary to choose a character that does not occur as part of any data entry 8except possibly for entry of running text where its occurrence would not be ambiguous9. Data !ield +abels -or each data field, display an associated label to help users understand what entries can be made. E(ample
.hoose a standard symbol for input prompting and reserve that symbol only for that use. .onsistent use of a symbol for input prompting in data entry forms, in menus, in command entry lines, etc., will help to cue users that an input is re&uired. A standard symbol used in addition to other formatting cues will help to alert a user to differences between labels and displayed data, between messages re&uiring input and messages for information only. 0ar,ing !ield *oundaries Display special characters or other consistent means of highlighting to clearly delineate each data field. E(ample An underscore might be used for this purpose, perhaps broken to indicate the number of symbols re&uired in an entry. %rompting !ield +engt# 7rovide cues in field delineation to indicate when a fixed or maximum length is specified for a data entry. 7rompting by delineation is more effective than simply telling the user how long an entry should be. In the example cited here, underscoring gives a direct visual cue as to the number of characters to be entered, and the user does not have to count them. 0ar,ing Required and Optional Data !ields In designing form displays, distinguish clearly and consistently between re&uired and optional entry fields. Informative +abels In labeling data fields, employ descriptive wording, or else standard, predefined terms, codes and'or abbreviationsR avoid arbitrary codes. E(ample "mploy descriptive labels such as 0TA(DABD and 6/DI-I"D, rather than abstract codes such as 0"T A and 0"T +R 6A$" and -"6A$", rather than 2B/U7 3 and 2B/U7 =. !orm "ompatible 5it# ource Documents :hen data entry involves transcription from source documents, ensure that form%filling displays match 8or are compatible with9 those documents, in terms of item ordering, data grouping, etc. If paper forms are not optimal for data entry, consider revising the layout of the paper form. If data entries must follow an arbitrary se&uence of external information 8e.g., keying telephoned reservation data9, employ some form of command language dialogue instead of form filling, to identify each item as it is entered so that the user does not have to remember and re%order items.
<ig#lig#ting elected Elements :hen a user has selected 8i.e., pointed at9 a displayed graphic element, highlight that element in some way so that the user can anticipate the conse&uences of any proposed action involving that selection. E(ample A dotted border might be displayed around a selected element, or perhaps a selected element might be displayed with video inversion to distinguish it from other elements. electing from Displayed $ttributes During graphic data entry, allow users to specify attributes for displayed elements %% e.g., text font, plotting symbol, line type, color %% by selecting from displayed samples illustrating the available options. E(ample -or line drawing a user might select from displayed samples of thick or thin, solid or broken, etc. electing "olors If users may select colors as an attribute of graphic elements, allow them to specify colors directly by pointing at displayed samples, rather than re&uiring them to name the colors. Arap#ics 9 %lotting Data 7lotting data to show their relations in various graphic formats can be aided greatly by appropriate software. $utomated Data %lotting :hen complex graphic data must be entered &uickly, provide computer aids to automate that process. 7restored geographic data and background maps, along with automated entry 81posting19 of flight plan data and track data, will permit fast and accurate generation of graphic displays for air traffic control, far beyond the capabilities of manual entry by a user. %lotting tored Data 7rovide automated plotting of computer%stored data at user re&uest, with provision for subse&uent editing by a user. A computer might plot the data values from two arrays in a line graph, or three%dimensional data in V W coordinates. %redefined Arap#ic !ormats :hen graphic data must be plotted in predefined standard formats, provide templates or skeletal displays for those formats to aid data entry. Arap#ics 9 Dra5ing
Drawing lines and figures to produce pictorial data of various kinds can be aided greatly by appropriate software. Dra5ing +ines :hen line drawing is re&uired, provide users with aids for drawing straight line segments. Rubber banding :hen lines must be drawn at arbitrary positions, lengths and angles, provide a rubberbanding capability, in which the computer displays a tentative line extending from a designated start point to whatever is the currently proposed end point.
A granting agency may re&uire that you retain data for a given period and may ask you to explain in a data plan how you will store and back it up. 0toring and backing up your data ensures that it will be there when you need to use it for publications, theses, or grant proposals. 2ood preservation practices help make your data available to researchers in your lab'research group, department, or discipline in the future.
ou can store and backup your research data on! &et5or,ed drives
These are managed by IT staff centrally or within your 0chool or .ollege. It is highly recommended to store your research data on regularly backed%up networked drives such as!
-ile servers managed by your research group or school. -ile servers managed by Information 0ervices, such as ".D-(A0 and the .ollege -ile 0ervers.
This way you will ensure that your data will be!
0tored in a single place and backed up regularly. Available to you as and when re&uired. 0tored securely minimising the risk of loss, theft or unauthorised use.
%ersonal computers and laptops $ocal drives may fail or 7.s and laptops may be lost or stolen leading to an inevitable loss of your data. These are convenient for storing your data temporarily but should not be used for storing master copies of your data. E(ternal storage devices "xternal storage devices such as hard drives, U0+ flash drives, .Ds and DQDs, can seem an attractive option for storing your data due to their low cost and portability. ,owever, they are not recommended for the long term storage of your data, particularly your master copies as!
Their longevity is not guaranteed, especially if they are not stored correctly. -or example, .Ds degrade and tapes shrink in the long term. They can be easily damaged, misplaced or lost. "rrors with writing to .Ds and DQDs are common. They may not be big enough for all the research data, so multiple disks or drives may be needed. They pose a security risk.
If you choose to use .Ds, DQDs and U0+ flash drives 8for example, for working data or extra backup copies9, you should!
.hoose high &uality products from reputable manufacturers. -ollow the instructions provided by the manufacturer for care and handling, including environmental conditions and labelling. Begularly check the media to make sure that they are not failing, and periodically HrefreshH the data 8that is, copy to a new disk or new U0+ flash drive9. "nsure that any private or confidential data are password%protected and'or encrypted.
Remote or online bac,9up services These provide users with an online system for storing and backing%up computer files e.g. Dropbox, 6o)y, A%Drive. Typically, they!
Allow users to store and synchronise data files online and between computers. "mploy cloud computing storage facilities. 7rovide the first few gigabytes free and users pay for more facilities including space.
:hether all data, or only changed data, will be backed up. A backup of changed data is known as an 1incremental backup1, while a backup of all data is known as a 1full backup1. ,ow often full and incremental backups will be made. ,ow long backups will be stored. ,ow much hard%drive space or number of DQDs will be re&uired to maintain this backup schedule. If the dataset is sensitive, how will it be secured and 8possibly9 destroyed. :hat backup services are available that meet these needs and, if none, what will be done about it. :ho will be responsible for ensuring backups are available.
3. PPPPPPrefers to preserving your data files in a secure location you can access readily. =. PPPPPP.preserves older copies so you can restore your data if accidental deletion'alteration or a disaster such as fire, flood, or hardware malfunction damages your data in storage
ummary
Data entry refers to user actions involving input of data to a computer, and computer responses to such inputs. The simplest kind of data entry consists merely of pointing at something selecting an item or designating a position on a computer%generated display.
Data entry re&uires hardware, and the proper design of input devices has received considerable attention, including concern for standardi)ation of keyboard layouts. There are different methods of entering the data. They are! 6anual Typing, 0canning and Qoice Becognition. The ultimate goal of a business enterprise is to uncover consumer demands and ways to fulfill those demands. In this respect, effective data collection, storage and retrieval are important tools to gain insights about consumer desires, as well as to better understand business processes. Data are the most important asset to any organi)ation. Therefore, it must be made sure that data is valid and useable at all costs. Data Qalidation and Data Qerification are two important processes of making sure that data possesses these two &ualities. Data entry can be purely numerical, using a 34%key keypad, or it can include alphanumeric characters, using a traditional keypad. Data "ntry 0ervices companies takes a cost%based approach to developing a fee for data entry services. Transcription in the linguistic sense is the systematic representation of language in written form. Transcription should not be confused with translation, which means representing the meaning of a source language text in a target language. Data forms permit entry of predefined items into labeled fields of specially formatted displays. 2raphics permit entry of data specially formatted to show spatial, temporal, or other relations among data sets. 0torage refers to preserving your data files in a secure location you can access readily. +ackup refers to preserving additional copies of your data in a separate physical location from data files in storage.
:ey5ords
Data entry: Data entry refers to user actions involving input of data to a computer, and computer responses to such inputs. Numeric Data: (umeric data means numbers. Integers. An integer is a whole numberR it has no decimal or fractional parts. Real Numbers: Any number that you could place on a number line is a real number. "urrency. .urrency refers to real numbers that are formatted in a specific way. Percentage: 7ercentage refers to fractional real numbers that are formatted in a specific way % out of 344, with a percent symbol. Data Mining: Data mining is the process of extracting data from large databases with the aim of finding data patterns that can be useful to business goals.
Data Warehousing: Data warehousing is a centrali)ed reporting database. It is a business intelligence tool developed by extracting data from various operational systems, removing data redundancies and formatting missing data fields in order to develop a central data reporting database. Data Validation: Data validation deals with making sure the data is valid 8clean, correct and useful9. Data Verification: Data verification is the process of checking a copy of data to make sure that it is exactly e&ual to the original copy of the data. Document Intake: Document Intake refers to the process of receiving the source documents and preparing them for scanning.
$ns5ers to "#ec, -our %rogress "-% 1 3. (umbers =. .urrency "-% / 3. /ptical character recognition =. Transcribing "-% 2
3. Data warehousing =. Data mining "-% 6 3. Data verification =. Data validation "-% 7 3. Document Intake =. Becord "-% ? 3. Transcription =. Daunting "-% @ 3. 0tandard character =. 0tandard symbol "-% B 3. .ursor =. 7lotting data "-% D 3. 0torage =. +ackup !urt#er Readings