The process of identifying, modeling and documenting how data moves around an information system. Data flow modeling examines processes (activities that transform data from one form to another), data stores (the holding areas for data), external entities (what sends data into a system or receives data from a system, and data flows (routes by which data can flow).
Data flow modeling is one of the foundations of the Structured Systems Analysis and Design Method.
Data flow modeling also is called data flow diagramming
- data glove
A glove equipped with sensors that sense the movements of the hand and interfaces those movements with a computer. Data gloves are commonly used in virtual reality environments where the user sees an image of the data glove and can manipulate the movements of the virtual environment using the glove.
- Data Independence
The separation of data from the programs that use the data. Nearly all modern applications are based on the principle of data independence. In fact, the whole concept of a database management system (DBMS) supports the notion of data independence since it represents a system for managing data separately from the programs that use the […]
- Data Integrity
Refers to the validity of data. Data integrity can be compromised in a number of ways: Human errors when data is entered Errors that occur when data is transmitted from one computer to another Software bugs or viruses Hardware malfunctions, such as disk crashes Natural disasters, such as fires and floods There are many ways […]
- Data Logging
(dā´t& log-ing) (n.) The process of using a computer to collect data through sensors, analyze the data and save and output the results of the collection and analysis. Data logging also implies the control of how the computer collects and analyzes the data. Data logging is commonly used in scientific experiments and in monitoring systems […]
- data marshalling
The process of gathering data and transforming it into a standard format before it is transmitted over a network so that the data can transcend network boundaries. In order for an object to be moved around a network, it must be converted into a data stream that corresponds with the packet structure of the network […]