SlideShare a Scribd company logo
1 of 6
Sources of Data
Direct & Indirect Data 
• Direct Data is collected from an original 
source, interviews, questionnaires or 
observations 
• Indirect Data is collected by someone else 
and you are using for something else
Direct: Pros & Cons 
http://www.teach-ict.com/as_a2_ict_new/ocr/AS_G061/311_data_info_knowledge/sources_of_data/miniweb/pg5.htm
Indirect: Pros & Cons 
http://www.teach-ict.com/as_a2_ict_new/ocr/AS_G061/311_data_info_knowledge/sources_of_data/miniweb/pg8.htm
Archived Data 
• Archived data is not immediately available online. 
It has been removed and stores safely offline. 
• Pros 
– A permanent copy is also available 
– Computer storage system is unused as archived data is 
removed on to removal hardrive 
• Cons: 
– When needed in hurry, not always received on time 
– If there is a fire, may be lost, or may be stolen
Archived Data 
• Archived data is not immediately available online. 
It has been removed and stores safely offline. 
• Pros 
– A permanent copy is also available 
– Computer storage system is unused as archived data is 
removed on to removal hardrive 
• Cons: 
– When needed in hurry, not always received on time 
– If there is a fire, may be lost, or may be stolen

More Related Content

Similar to Pp3 sources of data

Data Management 101 (2015)
Data Management 101 (2015)Data Management 101 (2015)
Data Management 101 (2015)Kristin Briney
 
Data Management Crash Course
Data Management Crash CourseData Management Crash Course
Data Management Crash CourseKristin Briney
 
Responsible Conduct of Research: Data Management
Responsible Conduct of Research: Data ManagementResponsible Conduct of Research: Data Management
Responsible Conduct of Research: Data ManagementKristin Briney
 
Privacy: The New Software Development Dilemma
Privacy: The New Software Development DilemmaPrivacy: The New Software Development Dilemma
Privacy: The New Software Development DilemmaSecurity Innovation
 
Storing Your Research Data
Storing Your Research DataStoring Your Research Data
Storing Your Research DataKristin Briney
 
Essential Layers of IBM i Security: Security Monitoring and Auditing
Essential Layers of IBM i Security: Security Monitoring and AuditingEssential Layers of IBM i Security: Security Monitoring and Auditing
Essential Layers of IBM i Security: Security Monitoring and AuditingPrecisely
 
research_data_management.pptx
research_data_management.pptxresearch_data_management.pptx
research_data_management.pptxSanjayPatel767445
 
Ch 2 maintenance and safety
Ch 2 maintenance and safetyCh 2 maintenance and safety
Ch 2 maintenance and safetymekashaw tizazu
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber Security Infotech
 
Backing up your data
Backing up your dataBacking up your data
Backing up your dataaaberra
 
eFolder Webinar_Expert Series_Six Best Practices for Complete Laptop Protection
eFolder Webinar_Expert Series_Six Best Practices for Complete Laptop ProtectioneFolder Webinar_Expert Series_Six Best Practices for Complete Laptop Protection
eFolder Webinar_Expert Series_Six Best Practices for Complete Laptop ProtectionDropbox
 
CERN 5 Things you should know about Data Protection
CERN 5 Things you should know about Data ProtectionCERN 5 Things you should know about Data Protection
CERN 5 Things you should know about Data ProtectionEUDAT
 
Data Analytics-Unit 1 , this Is ppt for student help
Data Analytics-Unit 1 , this Is ppt for student helpData Analytics-Unit 1 , this Is ppt for student help
Data Analytics-Unit 1 , this Is ppt for student helpSaurabhJaiswal790114
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are ComingErnest Staats
 
Machine learning and big data
Machine learning and big dataMachine learning and big data
Machine learning and big dataPoo Kuan Hoong
 
5 Möglichkeiten zur Verbesserung Ihrer Security
5 Möglichkeiten zur Verbesserung Ihrer Security5 Möglichkeiten zur Verbesserung Ihrer Security
5 Möglichkeiten zur Verbesserung Ihrer SecurityGeorg Knon
 

Similar to Pp3 sources of data (20)

Data Management 101 (2015)
Data Management 101 (2015)Data Management 101 (2015)
Data Management 101 (2015)
 
Data Management Crash Course
Data Management Crash CourseData Management Crash Course
Data Management Crash Course
 
Responsible Conduct of Research: Data Management
Responsible Conduct of Research: Data ManagementResponsible Conduct of Research: Data Management
Responsible Conduct of Research: Data Management
 
Privacy: The New Software Development Dilemma
Privacy: The New Software Development DilemmaPrivacy: The New Software Development Dilemma
Privacy: The New Software Development Dilemma
 
Storing Your Research Data
Storing Your Research DataStoring Your Research Data
Storing Your Research Data
 
Data Management 101
Data Management 101Data Management 101
Data Management 101
 
Essential Layers of IBM i Security: Security Monitoring and Auditing
Essential Layers of IBM i Security: Security Monitoring and AuditingEssential Layers of IBM i Security: Security Monitoring and Auditing
Essential Layers of IBM i Security: Security Monitoring and Auditing
 
research_data_management.pptx
research_data_management.pptxresearch_data_management.pptx
research_data_management.pptx
 
Ch 2 maintenance and safety
Ch 2 maintenance and safetyCh 2 maintenance and safety
Ch 2 maintenance and safety
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
Escaping Datageddon
Escaping DatageddonEscaping Datageddon
Escaping Datageddon
 
Data Management 101
Data Management 101Data Management 101
Data Management 101
 
Backing up your data
Backing up your dataBacking up your data
Backing up your data
 
eFolder Webinar_Expert Series_Six Best Practices for Complete Laptop Protection
eFolder Webinar_Expert Series_Six Best Practices for Complete Laptop ProtectioneFolder Webinar_Expert Series_Six Best Practices for Complete Laptop Protection
eFolder Webinar_Expert Series_Six Best Practices for Complete Laptop Protection
 
CERN 5 Things you should know about Data Protection
CERN 5 Things you should know about Data ProtectionCERN 5 Things you should know about Data Protection
CERN 5 Things you should know about Data Protection
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
Data Analytics-Unit 1 , this Is ppt for student help
Data Analytics-Unit 1 , this Is ppt for student helpData Analytics-Unit 1 , this Is ppt for student help
Data Analytics-Unit 1 , this Is ppt for student help
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are Coming
 
Machine learning and big data
Machine learning and big dataMachine learning and big data
Machine learning and big data
 
5 Möglichkeiten zur Verbesserung Ihrer Security
5 Möglichkeiten zur Verbesserung Ihrer Security5 Möglichkeiten zur Verbesserung Ihrer Security
5 Möglichkeiten zur Verbesserung Ihrer Security
 

Pp3 sources of data

  • 2. Direct & Indirect Data • Direct Data is collected from an original source, interviews, questionnaires or observations • Indirect Data is collected by someone else and you are using for something else
  • 3. Direct: Pros & Cons http://www.teach-ict.com/as_a2_ict_new/ocr/AS_G061/311_data_info_knowledge/sources_of_data/miniweb/pg5.htm
  • 4. Indirect: Pros & Cons http://www.teach-ict.com/as_a2_ict_new/ocr/AS_G061/311_data_info_knowledge/sources_of_data/miniweb/pg8.htm
  • 5. Archived Data • Archived data is not immediately available online. It has been removed and stores safely offline. • Pros – A permanent copy is also available – Computer storage system is unused as archived data is removed on to removal hardrive • Cons: – When needed in hurry, not always received on time – If there is a fire, may be lost, or may be stolen
  • 6. Archived Data • Archived data is not immediately available online. It has been removed and stores safely offline. • Pros – A permanent copy is also available – Computer storage system is unused as archived data is removed on to removal hardrive • Cons: – When needed in hurry, not always received on time – If there is a fire, may be lost, or may be stolen