RNJ 10/02/091 3 Computing System Fundamentals 3.6 Errors 3.6.2 Prevention and Detection.

Slides:



Advertisements
Similar presentations
©G. Millbery 2003Data, Information, Knowledge and Processing Slide 1 Validation  Making sure that the data value entered is sensible and reasonable 
Advertisements

2.2 Validation & Verification
Commercial Data Processing Lesson 3: Data Validation.
3.1 Data and Information –The rapid development of technology exposes us to a lot of facts and figures every day. –Some of these facts are not very meaningful.
Using Binary Coding Information Remember  Bit = 0 or 1, Binary Digit  Byte = the number of bits used to represent letters, numbers and special characters.
Using Binary Coding Information Remember  Bit = 0 or 1, Binary Digit  Byte = the number of bits used to represent letters, numbers and special characters.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Validation and Verification Today will look at: The difference between accuracy and validity Explaining sources of errors and how they could be overcome.
Synchronous - Asynchronous Data Transmission. Asynchronous ► The sender and receiver are not Synchronised. ► The sender sends only one character at a.
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
Processing Integrity and Availability Controls
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
Validation and Verification
GCSE ICT Checking data. Why do errors happen? Computers do not make mistakes. However if incorrect data is put in errors happen. In ICT this is called.
3.2 Data Checking.
Error Detection and Correction
Copyright © 2007 Pearson Education Canada 1 Chapter 13: Audit of the Sales and Collection Cycle: Tests of Controls.
Data entry: Validation
Checking data GCSE ICT.
Checking data Chapter 7 Prepared by:Sir Mazhar Javed.
Information Processing and Presentation by Rico Yu.
Objectives of Control The objectives of control are:  To ensure that all data are processed  To preserve the integrity of maintained data  To detect,
Manipulating data Data management: validation and verification.
System Development Lifecycle Verification and Validation.
Information Processing Content covered  Data and information  Information Qualities  Data/Information Processing  Commercial Information Processing.
Part 2: Packet Transmission Packets, frames Local area networks (LANs) Wide area networks (LANs) Hardware addresses Bridges and switches Routing and protocols.
Data and Computer Communications by William Stallings Eighth Edition Digital Data Communications Techniques Digital Data Communications Techniques Click.
AS computing Validation and verification. Introduction It is important to maintain the integrity of any database of information. Any data item must always.
AS Computing Data Transmission and Networks. Transmission error Detecting errors in data transmission is very important for data integrity. There are.
Communication Systems 3.1) Characteristics of a Communication System.
DATA ERRORS. Introduction The processing of incorrect data can produce ridiculous and embarrassing output. Errors can take time to sort out and can be.
CIT PowerPoint presentation Group 4. Unit 1, Chapter 2 Basic Concept on Data DATA AND INFORMATION What is data? Data consists of all sorts of unorganised.
Verification & Validation F451 AS Computing. Why check data? It’s useless if inaccurate. Also, wrong data: Can be annoying Can cost a fortune Can be dangerous.
Week 1 Theory 2 B usiness I nformation S ystems Batch Processing Assignment 6 - Batch Processing 1 Batch Processing Method.
Verification & Validation. Batch processing In a batch processing system, documents such as sales orders are collected into batches of typically 50 documents.
Review of Data Capture. Input Devices What input devices are suitable for data entry? Keyboard Voice Bar Code MICR OMR Smart Cards / Magnetic Stripe cards.
1 3 Computing System Fundamentals 3.6 Errors Prevention and Recovery.
Errors!. Where do errors occur? Anywhere data is transferred, processed, stored, etc. Input user error Storage magnetic hard drive errors physical tampering.
Data Verification and Validation
1 AQA ICT AS Level © Nelson Thornes 2008 Good quality data and information Data terms.
Data Validation.
MECH1500 Chapter 3.
Chapter 3 Data Control Ensure the Accurate and Complete data is entering into the data processing system.
Verification & Validation
Validation & Verification Today will look at: The difference between accuracy and validity Explaining sources of errors and how they could be overcome.
ERROR DETECTION AND CORRECTION Chapter 8 Data Communications & Networking ERROR DETECTION AND CORRECTION Chapter 8 First Semester 2007/2008.
Data Transmission and Networks Transmission error checking & correcting.
Input, Output and Processing.. What data needs to be input into the system? Identify the sources – i.e. where does the data come from? What is the volume.
Data Capture Forms What are they?. Example 1 Example 2.
GCSE ICT LESSON 5 Booklet Sections: 6 & 7 Data Capture & Checking Data.
Validation and verification 1.2
Simple Parity Check The simplest form of error detection is the parity check used with ASCII codes, originally on asynchronous modem links Each 7 bit ASCII.
ERROR DETECTION AND CORRECTION
ERROR CORRECTING CODES
Data and Information.
OCR AS Level F451: Data transmission
Processing Integrity and Availability Controls
Validation Bury College.
Error Detection Bit Error Rate(BER): It is the ratio of number Ne of errors appearing over a certain time interval t to the number Nt of 1 and 0 pulses.
Packetizing Error Detection
Databases.
Packetizing Error Detection
Objectives TO UNDERSTAND THAT CAPTURING DATA IS VALIDATED AND VERIFIED TO CHECK THAT IT IS REASONABLE AND CORRECT.
How can errors in data occur when using an ICT system?
Fundamentals of Data Representation
Packetizing Error Detection
Verification and Validation
Presentation transcript:

RNJ 10/02/091 3 Computing System Fundamentals 3.6 Errors Prevention and Detection

RNJ 10/02/092 Verification – checking the data on the source document are Exactly the same as those being entered Validation - checking the data input into the system are Acceptable (make sense). Methods

RNJ 10/02/093 is it exact? is it equal? is it accurate? has to involve humans. Verification

RNJ 10/02/094 Visual verification i.e. proof-reading Double entry verification - the data from the source document are entered twice, the keyboard may lock and the computer sound an alarm if the second item is not the same as the first. Verification methods

RNJ 10/02/095 is it reasonable? is it possible? is it acceptable? computers can be programmed to validate. Validation

RNJ 10/02/096 Presence check - some fields are required (must contain data) e.g. customer account number on a sales order. Range check - do the data fall within a certain range e.g. an age outside the range 0 to 120 cannot be entered Validation methods

RNJ 10/02/097 Character count e.g. a French postcode must have 5 characters. Format check e.g. a UK postcode has the pattern TTN NTT, where T is a letter and N is a number. Validation methods

RNJ 10/02/098 Digit calculated from a data item number, then tagged onto that number and entered into the computer, the latter can then calculate back to validate it. Check digits

RNJ 10/02/099 Product code: Add digits: = 41 Divide by 10: 41 div 10 = 4 mod 1 Use 1 as the check digit, product code becomes Check digits - example

RNJ 10/02/0910 Checks if a byte is complete, typically during data transmission 128 ASCII characters, so only 7 bits of a byte are needed, the 8th bit can be used as the parity bit Parity

RNJ 10/02/0911 Under even parity, the parity bit is set so there are an even number of 1's in the byte ( would have the parity bit 0 and would have 1) ‏ Receiving device checks each byte for correct parity Parity

RNJ 10/02/0912 If the system is using odd parity, must be an odd number of 1's Sender and the receiver must both be using the same parity (odd or even) - this is part of the network protocol. Parity

RNJ 10/02/0913 With groups of records, a batch total (number of records) and control total (sum of a particular field from each record) may be added to the file when the batch of records is transmitted to ensure that all are received correctly. Batch and control totals

RNJ 10/02/0914 When software is transmitted, a check sum is generated (the sum of all the instructions when treated as numbers), which gets checked before the software is executed. Check sum