Encoding, Validation and Verification Chapter 1. Introduction This presentation covers the following: – Data encoding – Data validation – Data verification.

Slides:



Advertisements
Similar presentations
©G. Millbery 2003Data, Information, Knowledge and Processing Slide 1 Validation  Making sure that the data value entered is sensible and reasonable 
Advertisements

Course Web Site – Also linked from Blackboard Course Materials – Excel Tutorials – Access Tutorials – PPT.
2.2 Validation & Verification
The Binary Numbering Systems
Commercial Data Processing Lesson 3: Data Validation.
Database Design Concepts INFO1408 Term 2 week 1 Data validation and Referential integrity.
MAT 1000 Mathematics in Today's World Winter 2015.
Validation and Verification Today will look at: The difference between accuracy and validity Explaining sources of errors and how they could be overcome.
Word Processing. ► This is using a computer for:  Writing  EditingTEXT  Printing  Used to write letters, books, memos and produce posters etc.  A.
Barcodes and ISBN numbers: which are better at detecting errors? Virtually all packaged products have a barcode on so that optical readers can recognise.
Validation and Verification
Wizards, Templates, Styles & Macros Chapter 3. Contents This presentation covers the following: – Purpose, Characteristics, Advantages and Disadvantages.
RNJ 10/02/091 3 Computing System Fundamentals 3.6 Errors Prevention and Detection.
 By the end of this, you should be able to state the difference between DATE and INFORMAITON.
Chapter 8: Systems analysis and design
 We already know the saying “Garbage in = Garbage out”  We know that bad data entering a system can have strange results on the data leaving the system.
IT253: Computer Organization
GCSE ICT Checking data. Why do errors happen? Computers do not make mistakes. However if incorrect data is put in errors happen. In ICT this is called.
3.2 Data Checking.
CS212: DATA STRUCTURES Lecture 10:Hashing 1. Outline 2  Map Abstract Data type  Map Abstract Data type methods  What is hash  Hash tables  Bucket.
Data entry: Validation
Checking data GCSE ICT.
Checking data Chapter 7 Prepared by:Sir Mazhar Javed.
Objectives of Control The objectives of control are:  To ensure that all data are processed  To preserve the integrity of maintained data  To detect,
System Development Lifecycle Verification and Validation.
Collecting Data Types, coding, accuracy, file formats and the effect of data loss.
Data and information. Information and data By the end of this, you should be able to state the difference between DATE and INFORMAITON.
Systems Life Cycle. Know the elements of the system that are created Understand the need for thorough testing Be able to describe the different tests.
What is data? Chapter 1. Introduction This presentation covers the following: – What is data? – What is information? – Representing data – What is knowledge?
AS computing Validation and verification. Introduction It is important to maintain the integrity of any database of information. Any data item must always.
DATA ERRORS. Introduction The processing of incorrect data can produce ridiculous and embarrassing output. Errors can take time to sort out and can be.
Verification & Validation F451 AS Computing. Why check data? It’s useless if inaccurate. Also, wrong data: Can be annoying Can cost a fortune Can be dangerous.
AS Level ICT Data entry: Problems with errors. Garbage in; Garbage out If incorrect data is entered into a data management system, the results of any.
By Phileo Don - Okhuofu. DATA COLLECTION  Data can be collected by the use of questionnaires or data collection forms.  These could be printed out and.
Verification & Validation. Batch processing In a batch processing system, documents such as sales orders are collected into batches of typically 50 documents.
Review of Data Capture. Input Devices What input devices are suitable for data entry? Keyboard Voice Bar Code MICR OMR Smart Cards / Magnetic Stripe cards.
OCR CAMBRIDGE NATIONALS UNIT 1 - UNDERSTANDING COMPUTER SYSTEMS DATA CAPTURE METHODS.
Data Verification and Validation
1 AQA ICT AS Level © Nelson Thornes 2008 Good quality data and information Data terms.
Data Validation.
1 Using Conditional Formatting & Data Validation Applications of Spreadsheets.
OCR CAMBRIDGE NATIONALS UNIT 1 - UNDERSTANDING COMPUTER SYSTEMS DATA CAPTURE METHODS.
Chapter 3 Data Control Ensure the Accurate and Complete data is entering into the data processing system.
How to answer Section B (May 2012 example) YEAR 12 REVISION.
Verification & Validation
Validation & Verification Today will look at: The difference between accuracy and validity Explaining sources of errors and how they could be overcome.
Chapter 11 Data Input and Output. Input Data Capture Forms Data can be collected using a data capture form or questionnaire that is printed on a piece.
Input, Output and Processing.. What data needs to be input into the system? Identify the sources – i.e. where does the data come from? What is the volume.
Part 1 Learning Objectives To understand that variables are a temporary named location to store data and that programmers work with different data types.
Data Capture Forms What are they?. Example 1 Example 2.
GCSE ICT LESSON 5 Booklet Sections: 6 & 7 Data Capture & Checking Data.
N5 Databases Notes Information Systems Design & Development: Structures and links.
Validation and verification 1.2
3.1.1 Data, Information, knowledge and processing
DATA TYPES.
DATA COLLECTION Data Collection Data Verification and Validation.
DATA INPUT AND OUTPUT.
Validation Bury College.
Databases.
Representation and Summary of Data - Location.
Setting up an online account
IT Applications Theory Slideshows
Objectives TO UNDERSTAND THAT CAPTURING DATA IS VALIDATED AND VERIFIED TO CHECK THAT IT IS REASONABLE AND CORRECT.
How can errors in data occur when using an ICT system?
Database Theory.
Verification and Validation
Encoding Data.
Presentation transcript:

Encoding, Validation and Verification Chapter 1

Introduction This presentation covers the following: – Data encoding – Data validation – Data verification

Data encoding This is a method of changing the way we represent data. We do this to standardise the data we are dealing with. The original data is not stored...only the representation of it.

Data encoding Some codes are easier to work out than others: MONTUEWEDJANFEBMAR For some, you will need a key. VXCORBLA FDFOCGRE VX = VauxhallFD = Ford COR = CorsaFOC = Focus BLA = BlackGRE = Green

Take note: Create your own encoded data with a key so someone else will understand how it works. Looking at someone else’s, are there any limitations with their code? Could it cause any problems or confusion? Explain to that person why you think it is either fine or needs some improvement.

Problems with encoding If you encode data it may become less accurate. You may end up limiting the possible number of data entries. For example, cars come in lots of different colours, but if you limit the choices to Red, Blue, Black, Silver, etc, you prevent the actual colours being entered. – Star Silver and Lightning Silver are different...but encoding may regard them both as silver. – This would be inaccurate and the validity of your data could be questioned.

Problems with encoding Asking questions to people often returns different responses. – “Did you enjoy the race?” – “It was good” – “It was alright...got a bit boring in places” – “Fantastic...I am glad he won”. Responses can be similar but not always the same. This means that we sometimes have to apply a judgement on how best to collect the response. If we had a scale from 1-4 (1=good, 4=rubbish) then where would we put the comments? Again, if more than one person is collecting the data we their judgements be the same?

Problems with encoding Another problem occurs when you come across some data that wont fit in with your encoding system. This means that you have to re-encode your data again which takes time and can also lead to some mistakes being made. If inaccuracies do occur how do you know if that data is incorrect? People might still assume the data is fine which could lead to more problems!

Encoding = Good Stuff! Computers have a limited storage capacity. If you encode data you can reduce the amount of storage space needed. When you are dealing with thousands of records the space saved is huge! Also, it can be quicker to enter coded data. It doesn’t have to be less accurate either. – For example, M = Male, F = Female. A computer can also carry out validation checks on the encoded data to make sure it is valid. – For example, if it is not M or F then there must be a mistake.

Take note: What is meant by encoding data? Describe three advantages of encoding data. Describe three disadvantages of encoding data. Give an example of how data can be encoded. Give two situations where the encoding of data is appropriate. For each situation, explain why data needs to be encoded.

Validation Validating data can be done using the following methods: – Range check – Type check – Presence check – Length check – Lookup check – Picture check – Check digit

Range Check Range is very simple. This involves a lower and an upper boundary for which a value can be entered. For instance, The number 50 would be accepted as it falls within the boundaries, but the number 101 would exceed the boundary and thus be rejected.

Type Check This check prevents incorrect data types to be submitted. For example, entering the word “two” into a field which was expecting a numerical value would return an error as “two” is in text format.

Presence Check You come across these all the time on websites which ask for certain information to be included. The system will insist that you enter these pieces of data before proceeding to the next section.

Length Check Length checks prevent more characters being entered than is allowed. The word “shoe” has a length of 4. If we set the limit to 4 then “shoes” wouldn’t be allowed.

Lookup Check A lookup check takes a value and compares it to a set of values in another table. If a match is made then a result is returned. If no match is made then an error is returned. An example of this would be entering a student’s test score into a field and the system returning the student’s grade.

Picture Check Also known as an Input Mask or Format Check. This type of check ensures data is entered in a predefined way. A good example of this is when dealing with dates. There are many ways to submit a date: – 01/Jan/2008 – 01/01/2008 – 1/1/08 – Etc A Picture check will define how the date must be entered.

Check Digit A check digit is a value which is worked out by performing a calculation on a number and then is added to the end of that number. ISBN numbers have check digits. The ISBN for the text book is: – The check digit is 5. Before 2007, when ISBN numbers had 10 numbers, the check digit was calculated using Modulus-11. New ISBN numbers are calculated using the modulus 10 method.

Modulus-10 ISBN Code ISBN Code Remove the check digit. Then write out the numbers in a table like this. The code starts at 2, and increments by 1, going from right to left. Multiply the number by the code below. Add up all the numbers = 192 Divide the number by /11 = 17 remainder 5 Take the remainder from 11.Check Digit = = 6 If the remainder is 0 the check digit is 0. If the remainder is 1 then the check digit is X.

Modulus-13 ISBN Code ISBN Code Remove the check digit. Then write out the numbers in a table like this. From right to left, alternate the weighting code from 3 and 1. Multiply the number by the code below. Add up all the numbers = 135 Divide the number by /10 = 13 remainder 5 Take the remainder from 10.Check Digit = = 5 If the remainder is 0 the check digit is 0. If the remainder is 1 then the check digit is X.

Take note: In a spreadsheet, try creating a working Check Digit Checker. The spreadsheet should be able to calculate a check digit using the ISBN number and then compare the result with the actual check digit. It should say whether it is valid or not. To work out a remainder use the =MOD() function.

Take note: Use modulus-11 on these ISBN numbers. For numbers with incorrect digits replace them with correct ones. – – X – – X –

Verification Verification is not making sure that data is correct, but rather making sure data hasn’t been changed in any way. There are two ways of carrying out verification checks: – Double Entry – Manual verification

Double Entry Basically, entering in data twice. For example, some websites ask you to type in your address twice. This lowers the risk of entering in an address incorrectly. If the s do not match the website will ask you to check them. However, if you enter the address incorrectly both times and make the same mistake, then the website will miss the mistake!

Manual verification This is like proof reading. A person may read data from a paper source and then type them into a computer system. Humans aren’t very reliable and often make mistakes. Common mistakes include: – Transcription errors – Transposition errors

Transcription Errors This may involve pressing the wrong key accidently. For example, – Surname: MouseMowse or Mouce

Transposition Errors This is where two characters have been accidently reversed. For example: – Surname: MouseMuose or Moues

Accuracy Just because we have use of validation and verification checks doesn’t mean data is accurate. For example, a number entered could still pass a range check, or a presence check can be validated because someone pressed the space bar in the field.

Take note: Describe two methods of verification. Give two disadvantages of double entry verification. Give one advantage of manual verification. Explain why verification and validation can not ensure that data is entered accurately but do explain why they are useful despite these problems.