Checking data GCSE ICT.

Slides:



Advertisements
Similar presentations
Debugging ACL Scripts.
Advertisements

Collecting data Chapter 6. What is data? Data is raw facts and figures. In order to process data it has to be collected. The method of collecting data.
2.2 Validation & Verification
Commercial Data Processing Lesson 3: Data Validation.
3.1 Data and Information –The rapid development of technology exposes us to a lot of facts and figures every day. –Some of these facts are not very meaningful.
INFORMATION TECHNOLOGY
The Voting Game How do we overcome transmission errors?
Using Binary Coding Information Remember  Bit = 0 or 1, Binary Digit  Byte = the number of bits used to represent letters, numbers and special characters.
PowerPoint Presentation by Charlie Cook Copyright © 2004 South-Western. All rights reserved. Chapter 9 Controlling Information Systems: Process Controls.
Validation and Verification Today will look at: The difference between accuracy and validity Explaining sources of errors and how they could be overcome.
Barcodes and ISBN numbers: which are better at detecting errors? Virtually all packaged products have a barcode on so that optical readers can recognise.
Systems Analysis Chapter 8 P 94 to P 101
Error Detection and Correction.  Corrupted files  Attachments that won’t open  Files that won’t download  Videos that won’t play Errors occur when.
Rutvi Shah1 ERROR CORRECTION & ERROR DETECTION Rutvi Shah2 Data can be corrupted during transmission. For reliable communication, errors must be detected.
Digital Logic Chapter 2 Number Conversions Digital Systems by Tocci.
Validation and Verification
RNJ 10/02/091 3 Computing System Fundamentals 3.6 Errors Prevention and Detection.
Wong Wai Ling, Lam Pui Ki Identification number  clearly identify a person or a thing Check digit  an extra digit for the purpose of error.
Encoding, Validation and Verification Chapter 1. Introduction This presentation covers the following: – Data encoding – Data validation – Data verification.
GCSE ICT Checking data. Why do errors happen? Computers do not make mistakes. However if incorrect data is put in errors happen. In ICT this is called.
3.2 Data Checking.
Navigation Sequences Proper navigation Poor navigation Poor Navigation.
Error Detection and Correction
Lecture 12.  The ISBN 10-digit uses a reverse weighting system: multiply the first digit by 10, the second by 9, the third by 8 and so on until the check.
Data entry: Validation
Checking data Chapter 7 Prepared by:Sir Mazhar Javed.
Information Processing and Presentation by Rico Yu.
Objectives of Control The objectives of control are:  To ensure that all data are processed  To preserve the integrity of maintained data  To detect,
Manipulating data Data management: validation and verification.
System Development Lifecycle Verification and Validation.
Data and information. Information and data By the end of this, you should be able to state the difference between DATE and INFORMAITON.
Systems Life Cycle. Know the elements of the system that are created Understand the need for thorough testing Be able to describe the different tests.
Unit 5 Lecture 2 Error Control Error Detection & Error Correction.
Chapter 9 Controlling Information Systems: Application Controls.
AS computing Validation and verification. Introduction It is important to maintain the integrity of any database of information. Any data item must always.
DATA ERRORS. Introduction The processing of incorrect data can produce ridiculous and embarrassing output. Errors can take time to sort out and can be.
CIT PowerPoint presentation Group 4. Unit 1, Chapter 2 Basic Concept on Data DATA AND INFORMATION What is data? Data consists of all sorts of unorganised.
BMTRY 789 Lecture 11: Debugging Readings – Chapter 10 (3 rd Ed) from “The Little SAS Book” Lab Problems – None Homework Due – None Final Project Presentations.
AS Level ICT Data entry: Problems with errors. Garbage in; Garbage out If incorrect data is entered into a data management system, the results of any.
Verification & Validation. Batch processing In a batch processing system, documents such as sales orders are collected into batches of typically 50 documents.
Review of Data Capture. Input Devices What input devices are suitable for data entry? Keyboard Voice Bar Code MICR OMR Smart Cards / Magnetic Stripe cards.
Error Detection.
1 3 Computing System Fundamentals 3.6 Errors Prevention and Recovery.
IGCSE ICT Stock Control.
Data Verification and Validation
1 AQA ICT AS Level © Nelson Thornes 2008 Good quality data and information Data terms.
Data Validation.
Chapter 3 Data Control Ensure the Accurate and Complete data is entering into the data processing system.
Errors and Uncertainties
Verification & Validation
Validation & Verification Today will look at: The difference between accuracy and validity Explaining sources of errors and how they could be overcome.
Input, Output and Processing.. What data needs to be input into the system? Identify the sources – i.e. where does the data come from? What is the volume.
 At the end of the class students should:  distinguish between data and information.  explain the characteristics and forms of Information Processing.
Data Capture Forms What are they?. Example 1 Example 2.
GCSE ICT LESSON 5 Booklet Sections: 6 & 7 Data Capture & Checking Data.
Validation and verification 1.2
DATA COLLECTION Data Collection Data Verification and Validation.
Error Correcting Code.
CIS 321 Data Communications & Networking
Validation Bury College.
Databases.
Objectives TO UNDERSTAND THAT CAPTURING DATA IS VALIDATED AND VERIFIED TO CHECK THAT IT IS REASONABLE AND CORRECT.
How can errors in data occur when using an ICT system?
Fundamentals of Data Representation
Verification and Validation
Validation and Verification
Presentation transcript:

Checking data GCSE ICT

Why do errors happen? Computers do not make mistakes. However if incorrect data is put in errors happen. In ICT this is called GIGO – Garbage in, garbage out! The way to avoid incorrect data being entered is to check it thoroughly.

Why do errors happen? There are two main methods of avoiding errors. These are: Verification Validation

Verification Verification is the process of checking data. This can be done visually (e.g. by comparing what is on a data capture sheet with what is on screen or with a print out of the data that has been entered). This has the disadvantage that the data on the data capture sheet may be incorrect, and a visual check will not spot this.

Verification This can be done by double data entry (i.e. two people enter the same data, and if it is identical the data is accepted). This has disadvantages that this is expensive (two people have to be paid to do the same work) and there is no guarantee that they will not make the same mistakes.

Validation Validation is the process of detecting inaccurate, incomplete, or unreasonable data. This can be done by the computer as the data is entered and as a result it is much less likely that errors will occur.

Validation There are several ways in which a computer can validate data as it is entered.

Validation These include: Character type checks Range checks Presence checks Hash totals Control total Check digits

Validation These include: Spelling checkers Custom dictionaries Length checks Lookup tables Parity errors

Character type checks Character type checks make sure that the correct type of character has been entered (e.g. that a number has not been entered where a letter should have been or that a letter have not been entered where a number should have been.

Range checks Range checks make sure that numerical data falls between pre-determined limits (i.e. within a certain range of numbers). For example, that the age of a pensioner who is a member of a pension scheme and who is 81 is not entered as 18. This is done by setting a bottom limit on the age range.

Range checks Range checks are not infallible. In the example of the pension scheme data, if the age of the pensioner had been 96 and it had been entered as 69, the mistake would not have been detected by a range check.

Presence checks Presence checks ensure that data that must be entered is entered. For example, the pension scheme would need a pensioner’s National Insurance number. If that was not entered the presence check would detect this and notify whoever was entering the data.

Hash totals A hash total is a meaningless total. It is often used on computer-generated invoices.

Hash totals The hash total totals the item numbers. When the details on the invoice are keyed into the computer, this total is also keyed in. When the computer adds up the item numbers the hash total acts as a check that everything has been entered correctly. Any difference between the computer’s result and the hash total would indicate that incorrect data had been entered. Hash total

Control total A control total is similar to a hash total except that the result has some meaning. For example, the total cost of each item on the invoice added together is a control total.

Control total Control total When the details on the invoice are keyed into the computer, the control total is also keyed in. When the computer adds up the individual cost of each item that has been ordered, the control total acts as a check that everything has been entered correctly. Any difference between the computer’s result and the control total would indicate that incorrect data had been entered. Control total

Check digits When large numbers are entered into a data system there is always a chance of error. To help to overcome this problem an additional number is often added to the end of the original number. This number is a check digit, and is calculated from the other numbers in the original number.

Check digits Check digits are often found on barcodes. When the barcode is scanned, the computer automatically removes the end number and uses the rest of the numbers to calculate what the check digit should be. If the result is the same, then the number has been entered correctly.

Check digits The first number (4) is the check digit. Starting from the left, the next number (7) is multiplied by 11, the second (8) by 10, and so on.

Check digits The total is then found: 7 x 11 + 8 x 10 + 0 x 9 + 8 x 8 + 3 x 7 + 2 x 6 + 1 x 5 + 8 x 4 + 1 x 3 + 6 x 2 + 9 x 1 = 315 315 is then divided by 11 (there are 11 numbers). 315 ÷ 11 = 28 with a remainder of 7.

Check digits The remainder is then deducted from 11 and the result should equal the check digit (11 – 7 = 4). As the check digit is 4, the barcode has been entered correctly.

Spelling checkers Although spellcheckers are usually found in word processing programs, they can also form part of data-handling programs. They can be ‘enabled’ (switched on) so that they check data as it is entered and automatically identify any mistakes.

Custom dictionaries If a spellchecker is used it will automatically identify any words that it does not recognise. In particular spellcheckers often fail to recognise proper names (i.e. the names of people or places) or specialist words or jargon.

Custom dictionaries It is possible to avoid this by setting up customised dictionaries to which words can be added. Once a word had been add to the customised dictionary, the spellchecker will recognised the new words as being spelt correctly.

Length checks Certain types of data are always the same length. For example, a National Insurance number will have 2 letters, followed by 6 numbers, followed by 1 letter (e.g. YY232425A). A length check will identify any NI numbers that have more or fewer characters.

Lookup tables A lookup table contains a list of valid codes that can be used to enter data. If a code that is not in the lookup table is entered. it is rejected. This prevents any incorrect data from being processed.

Parity errors Data is composed of 1s and 0s (or ‘bits’ of information). When data is transmitted from one computer to another it is important that does not become damaged or ‘corrupted’ during transmission. Parity checking is a means of doing this.

Parity errors Parity is the sum of the bits within a piece of data. A parity error occurs when one of the bits is changed. When this happens the parity calculated at the receiving computer is not the same as it was when the data was transmitted.

Parity errors The difference in parity alerts the computers to the fact that the data has been corrupted. However, if more than one error occurs they may balance each other out, and parity can appear to be correct even though the data has been corrupted.

Common errors Common types of error are: Transcription errors – these usually occur when people entering data misread what they are entering (e.g. mistaking 5 for S or O for 0). Transposition errors – these occur when people entering data get characters out of order or back to front (e.g. 619 instead of 916 or ‘form’ instead of ‘from’).