Saturday, January 19, 2008

METHODS OF PROCESSING DATA

Different methods are now used in data processing employing quick response digital computer systems. These methods have been developed to increase the timeless, effectiveness, and availability of information. They allow users to react more rapidly to changing conditions, reduce waste in the use of time and other resources, and permit quick follow-up o creative ideas.

1. Batch Processing. Batch processing is a technique in which data to be processed or programs to be executed are collected into groups to permit convenient, efficient, and serial processing. It is the simplest form of data processing. With this method, data is entered into the information flow in a large volumes, or batches.

Advantages of Batch Processing

a. Economical when a large volume of data must be processed
b. the most appropriate methods for those application( e.g. payroll) where the delay caused by accumulating data into batches does not reduce the value of the information.

Limitations of batch processing

a. It requires sorting prior to processing.
b. reduces timeless in some instances it takes a fixed time interval before current data is added, and requires cannot be effectively made between processing intervals
c. requires sequential file organization this may prove to be handicap if the current status of a record near the end of a file needs to be determined.

2. On-line Processing. The term on-line refers to equipment or devices under the direct control of the central processing unit(CPU) of a computer. An on-line operation, then is one which uses devises directly connected to the CPU either for data entry or inquiry purposes. That is, with a terminal we can either enter data or inquire about the status of some record or file that is stored by the computer.

On-line processing has been developed for certain uses as an answer to the batch processing deficiencies. Information contained in any record is accessible to the user without the necessity of a sequential search of the file and with a fraction of a second after the inquiry message has been transmitted. Thus, on-line processing systems may feature random and rapid input of transactions and immediate and direct access to record contents as needed. However, on-line processing and direct access to records require unique hardware ans software. It will also require software security provisions to prevent confidential information from falling into unauthorized hands and prevent deliberate or accidental tampering with data and program files.

3. Real-time Processing. Real-time processing is a method of data processing which has the capability of a fast response to obtain data from an activity or a physical process, perform computations, and return response rapidly enough to effect the outcome of the activity or process.

4. Distributed Processing. The most complex level of computer processing, distributed processing, generally consists of remote terminals linked to a large central computer system to help the user conduct inquiries about accounts, process jobs, or other data processing operations.
In distributed processing network a large number of computers and significant software resources is being shared among a large number of users. It may be used of be used by a single organizations.

Advantages of distributed systems are:

1. Central processor idle time is reduced.
2. sophisticated computers and growing library of applications programs may be immediately available to end-users whenever needed.
3. skilled professionals are available to help users developed their own specialized applications.
4. managers maybe able to react more rapidly to new developments and interact with the system i order to seek solutions to unusual problems.

Disadvantages

1. the reliability and cost of the data communications facilities used, and the cost and quality of the computing service received, may e disappointing in some cases.
2. input/output terminals are often rather slow and inefficient.
3. provisions for protecting the confidentiality and integrity and integrity of user programs and data files are generally ineffective against a skilled penetrator.





No comments: