College of Alameda Copyright © 2007 Patrick McDermott Vincent van Gogh (1853-1890) The Langlois Bridge March 1888.

Slides:



Advertisements
Similar presentations
Service and Dispatch Updates Presented by: Derek Kratz.
Advertisements

CSCI 6962: Server-side Design and Programming Input Validation and Error Handling.
2-May-15 GUI Design. 2 HMI design There are entire college courses taught on HMI (Human-Machine Interface) design This is just a very brief presentation.
Top Reasons why users call ECCA. Agenda Reason for the call: What is the question or problem? Reason for the call: What is the question or problem? Answer.
Homework 1 Hints. Homework Tips (General) Go through and do the ENTIRE homework in the same time period – You will use all of the material from chap 1.
Java Programming, 3e Concepts and Techniques Chapter 4 Decision Making and Repetition with Reusable Objects.
Debugging Introduction to Computing Science and Programming I.
Maintenance Modifying the data –Add records –Delete records –Update records Modifying the design –Add fields into tables –Remove fields from a table –Change.
Video Rental Store M.S. Access Module CAS 133 Basic Computer Skills/MS Office Russ Erdman.
PowerPoint Presentation for Dennis, Wixom & Tegarden Systems Analysis and Design Copyright 2001 © John Wiley & Sons, Inc. All rights reserved. Slide 1.
Troy Eversen | 19 May 2015 Data Integrity Workshop.
Lesson 32: Designing a Relational Database. 2 Lesson Objectives After studying this lesson, you will be able to:  Identify and apply principles for good.
COMPREHENSIVE Excel Tutorial 8 Developing an Excel Application.
Peter Andreae Computer Science Victoria University of Wellington Copyright: Peter Andreae, Victoria University of Wellington Java Programs COMP 102 #3.
Testing. What is Testing? Definition: exercising a program under controlled conditions and verifying the results Purpose is to detect program defects.
Primary & Foreign Keys. PK & FK 1.Primary key is required 2.The PK must be unique 3.If the primary key from one table is related to a field in another.
What is Sure BDCs? BDC stands for Batch Data Communication and is also known as Batch Input. It is a technique for mass input of data into SAP by simulating.
Verify your data entry You could use data types and field properties for adding any validation on your date: EX: Data type: number : allow the user to.
WEB PRICING SYSTEM User Manual. Click here to Log In The Defense Commissary Agency Vendor Price Change system is located at
DAY 20: ACCESS CHAPTER 5 Tazin Afrin October 29,
Cycles & Life Cycles College of Alameda Copyright © 2007 Patrick McDermott.
Microsoft Access 2013 Design and Create Tables to Store Data Chapter 2.
Lesson 2.  To help ensure accurate data, rules that check entries against specified values can be applied to a field. A validation rule is applied to.
Data entry: Validation
Chapter 4 Selection Structures: Making Decisions.
Office Management Tools II Ms Saima Gul.  When you create your tables, you should assign each table a primary key—one or more fields whose contents are.
Creating a Database Designing Structure, Capturing and Presenting Data.
Systems Life Cycle. Know the elements of the system that are created Understand the need for thorough testing Be able to describe the different tests.
Chapter 10 THE ACQUISITION CYCLE— PURCHASE INVOICES AND PAYMENTS.
More on Tables Open your table in design view Click here!
Creating Databases Local storage. join & split Classwork: show 1 table application. Share designs for oscars application. Adaptive select. Homework: [Catch.
1 User Interface Design Components Chapter Key Definitions The navigation mechanism provides the way for users to tell the system what to do The.
BMTRY 789 Lecture 11: Debugging Readings – Chapter 10 (3 rd Ed) from “The Little SAS Book” Lab Problems – None Homework Due – None Final Project Presentations.
Verification & Validation. Batch processing In a batch processing system, documents such as sales orders are collected into batches of typically 50 documents.
Java Programming, 2E Introductory Concepts and Techniques Chapter 4 Decision Making and Repetition with Reusable Objects.
William H. Bowers – Improving Data Entry Cooper 17.
OCR CAMBRIDGE NATIONALS UNIT 1 - UNDERSTANDING COMPUTER SYSTEMS DATA CAPTURE METHODS.
Copyright © 2010 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Starting Out with Programming Logic & Design Second Edition by Tony Gaddis.
Lesson 4.  After a table has been created, you may need to modify it. You can make many changes to a table—or other database object—using its property.
AS Level ICT Data entry: Creating validation checks.
Transportation Agenda 77. Transportation About Columns Each file in a library and item in a list has properties For example, a Word document can have.
10 Chapter 101 Using Menus and Validating Input Programming Logic and Design, Second Edition, Comprehensive 10.
1 CA202 Spreadsheet Application Focusing on Specific Data using Filters Lecture # 5.
1 Work Orders. 2 Generating a Work Order There are two methods to generating a Work Order in the WYNNE STSTEM. First method: Option 11 – 12 – 13 * Open.
Chapter 5 Introduction To Form Builder. Lesson C Objectives  Use sequences to automatically generate primary key values in a form  Create lists of values.
Sequential Processing to Update a File Please use speaker notes for additional information!
Learning Aim C.  In this section we will look at how text, tables, forms and frames can be used in web pages.
Access Lessons 1, 2 and 3 ©2009 M and K Solutions, LLC – All Rights Reserved.
How To Make Easysite Forms By Joshua Crawley Contact:
1 Chapter 6: Creating Oracle Data Block Forms. 2 Forms  Application with a graphical user interface that looks like a paper form  Used to insert, update,
Microsoft Access 2016 Design and Create Tables to Store Data
[The Design of Everyday Things, Don Norman, Ch 7]
Excel Tutorial 8 Developing an Excel Application
Creating a database table
Microsoft Office Access 2010 Lab 2
Building a User Interface with Forms
Handling Data Designing Structure, Capturing and Presenting Data
Inside Module 10 Editing TurboIMAGE Datasets Page
Microsoft Access 2013 Design and Create Tables to Store Data
Bulk update E. Camelback Road #559, Phoenix, AZ Phone: Fax:
Conditions and Ifs BIS1523 – Lecture 8.
Cooper Part II Making Well-Behaved Products Data Entry
Norman 7 B: Improving Data Entry
Handling Data Designing Structure, Capturing and Presenting Data
GUI Design 24-Feb-19.
Please use speaker notes for additional information!
Chapter 7: Input Validation
User-Centered Design Data Entry CS 4640 Programming Languages for Web Applications [The Design of Everyday Things, Don Norman, Ch 7]
User-Centered Design Data Entry CS 4640 Programming Languages for Web Applications [The Design of Everyday Things, Don Norman, Ch 7]
Presentation transcript:

College of Alameda Copyright © 2007 Patrick McDermott Vincent van Gogh ( ) The Langlois Bridge March 1888

Do Them All! Every Last Stinkin’ one! Try to Get a Rhythm Bargehaulers on the Volga Ilya Repin, c O E O!

Kinds of Garbage The Quality of system output is no better than the Quality of the input Problems of Type: Wrong type of data –Putting Phone Number in Credit Card –Text in a Numeric field Problems of Quality: Defective data –Wrong phone number –“Dirty Data”

Keeping Your Data Clean Restricting the Type of Data in a Field Restricting the Amount of Data in a Field Specifying the Format of Data in a Field Restricting Data by Using Validation Rules Creating a Simple Lookup List Creating a Multi-Column Lookup List Updating Information in a Table Deleting Information from a Table Preventing Database Problems

Program Structure Check all at Top of Module –Defensive Programming? –If Error, Report & return Violates Single-Entry-Single-Exit Rule Make Exception to 1E,1X Make a Big if Have Validation Function()

How Many Messages  Just One, or Many? Make the Message Clear –Avd Mystrs Abrvtns –Word from User’s Viewpoint Suggest Correction –Numbered, with Reference? Abused children can become abusers –Abused programmers write bad messages Joan Brown ( ) The Message, ca. 1977

Poka Yoke The Best Way to fix an Error is to not make it Mistake Prevention –Prevent the Errors Mistake Proofing –If you can’t prevent all errors, at least catch them

Warnings? Compilers: I nformation, W arning, E rror, F atal Warn vs. Block vs. Audit trails Provide an Override –MoU: Master of Universe –POG: Power of a god Warning! Extreme Danger!

Error Prevention Don’t Let In –Menu, Radio Button, List –Look-Up Table –The Choice isn’t there –You need to know all choices Let in, then Edit (Don’t store) Correct Later –Report –Batch

Edit It If no direct use, gets dirty (good econ strategy—it don’t matter) Warn versus forbid Once good, now bad (allow old to remain?) Flexible versus accurate Type I Type II

Complex Check Crosscheck Fields If Gender == Male, NOT Pregnant If Status == In Default, Credit Limit = 0 Stop Error, or Correct it?

Table Maintenance If Item Removed –Are those on DB invalid or “Grandfathered” –If Updated, it will Fail Edit If Item Added –Is it a split of an existing category? Validation Table –Are Values in Code, Table, or in UI? –Does User or Programmer Update Table? How Stable is The List? Christo & Jeanne-Claude Wrapped Table, 1961