Chapter 01 - Data, Information, Knowledge and Processing
Chapter 01 - Data, Information, Knowledge and Processing
Chapter 01 - Data, Information, Knowledge and Processing
Information
When data items are given context and meaning, they become information. A
person reading the information will then know what it means.
Data is given context by identifying what sort of data it is. This still does not
make it information but it is a step on the way to it becoming information as
shown in the next example.
Example
Data Context Comment
P952BR A product This is a product code but it is still not known
code what it is a product code for so it is still data.
@bbcclick A Twitter This is an address used for Twitter but it is not
handle information unless it is known to be a Twitter
handle or used within Twitter software. It’s also
not known whose address it is.
359 Price in This is a currency value but it is not known
Pakistani what the price is for, so it is still data.
Rupees
1.01 – Data, Information and Knowledge
2 – Sources 3 – Quality of 4 – Coding, Encoding 5 – Data
1 – D, I and K Questions Page 2
of Data Information & Encryption Accuracy
Advantages and disadvantages of gathering data from direct and indirect data sources
The general rule is that data collected directly for the purpose for which it is intended is more
likely to be accurate and relevant than data that is obtained from existing data (indirect
source).
Direct data source Indirect data source
The data will be relevant because what is needed Additional data that is not required will exist that
has been collected. may take time to sort through and some data
that is required may not exist.
The original source is known and so can be trusted. The original source may not be known and so it
can’t be assumed that it is reliable.
It can take a long time to gather original data rather The data is immediately available.
than use data that already exists.
A large sample of statistical data can be difficult to If statistical analysis is required, then there are
collect for one-off purposes. more likely to be large samples available.
The data is likely to be up to date because it has Data may be out of date because it was
been collected recently. collected at a different time.
Bias can be eliminated by asking specific Original data may be biased due to its source.
questions.
The data can be collected and presented in the The data is unlikely to be in the format required,
format required. which may make extracting the data difficult.
Table 1.02 - Direct and indirect data sources.
1.03 – Quality of Information
2 – Sources 3 – Quality of 4 – Coding, Encoding 5 – Data
1 – D, I and K Questions Page 6
of Data Information & Encryption Accuracy
Relevance Example
Information must be relevant Examples of irrelevant information include:
to its purpose. Having being given a bus timetable when you
additional information that is want to catch a train
not required means that the being told the rental price of a car when
user has to search through you want to buy the car
the data to find what is a user guide for a mobile phone that
actually required. includes instructions on how to assemble
a plug.
Age
Information must be up to Example
date in order to be useful. Examples of out of date information include:
Old information is likely to be the number of residents in a town based
out of date and therefore no on a census from 2011, but 500 new
longer useful. homes have been built in the town since
When using indirect data then
sources, always check when a rugby score that has not been updated
the information was for 5 minutes during which time a player
produced. scored.
1.03 – Quality of Information
2 – Sources 3 – Quality of 4 – Coding, Encoding 5 – Data
1 – D, I and K Questions Page 7
of Data Information & Encryption Accuracy
Completeness Task
All information that is
required must be provided
in order for it to be of good
quality. Not having all the
information required means
it cannot be used properly.
Example
Encryption
One specific type of encoding is encryption. This is when data is scrambled
so that it cannot be understood. The purpose of encryption is to make the
data difficult or impossible to read if it is accessed by an unauthorised user.
Data can be encrypted when it is stored on disks or other storage media, or
it can be encrypted when it is sent across a network such as a local area
network or the internet. Accessing encrypted data legitimately is known as
decryption.
Caesar cipher
A cipher is a secret way of writing. In other words it is a code. Ciphers are
used to convert a message into an encrypted message. It is a special type
of algorithm which defines the set of rules to follow to encrypt a message.
Roman Emperor Julius Caesar created the Caesar cipher so that he could
communicate in secret with his generals.
The Caesar cipher is sometimes known as a shift cipher because it selects
replacement letters by shifting along the alphabet.
1.04 – Coding, Encoding & Encrypting Data
2 – Sources 3 – Quality of 4 – Coding, Encoding 5 – Data
1 – D, I and K Questions Page 14
of Data Information & Encryption Accuracy
Discussion Point
!
Figure 1.13 - The Enigma machine.
The Germans used encrypted messages during World War II
using the Enigma machine. An operator would type in a
message and then scramble it by using three to five notched
wheels. The recipient would need to know the exact settings
of the wheels in order to decipher the message. There were
159 x 1018 possible combinations.
Encrypted messages from the Lorenz cipher machine led to
the development of the world’s first electric programmable computer,
Colossus, which helped British code breakers read encrypted German
messages.
The first major encryption algorithm for computers was the Data
Encryption Standard (DES) used in the 1970s. It used a 56-bit (1’s and 0’s)
key. This offered 70 x 1015 possible combinations, but the development of
computers meant that it eventually became possible to ‘crack’ the code.
This was replaced by the Advanced Encryption Standard (AES) which
uses up to 256-bit keys. This can offer 300 x 10n possible combinations.
1.04 – Coding, Encoding & Encrypting Data
2 – Sources 3 – Quality of 4 – Coding, Encoding 5 – Data
1 – D, I and K Questions Page 14
of Data Information & Encryption Accuracy
Task Example
1. Using the Caesar cipher +3 In this example the alphabet is to
example previously, write an be shifted by three (+3) letters so
encrypted message to a friend. that A =D, B = E and so on:
Ask your friend to decipher it.
2. Choose how many letters you
are going to shift by and write So to encrypt the word ‘Hello’, we
another encrypted message to would use:
a friend. Don’t tell your friend H = K, E=H,L = 0,0 = R
how many letters you shifted which gives KHOOR.
by. Your friend should try to
decipher the code by working
out which letters appear most
commonly.
3. Click here to create a cipher
wheel and use it to encrypt and
decrypt messages.
1.04 – Coding, Encoding & Encrypting Data
2 – Sources 3 – Quality of 4 – Coding, Encoding 5 – Data
1 – D, I and K Questions Page 14
of Data Information & Encryption Accuracy