AS computing Validation and verification. Introduction It is important to maintain the integrity of any database of information. Any data item must always.

Slides:



Advertisements
Similar presentations
©G. Millbery 2003Data, Information, Knowledge and Processing Slide 1 Validation  Making sure that the data value entered is sensible and reasonable 
Advertisements

Validation Checks that the data entered is sensible.
Commercial Data Processing Lesson 3: Data Validation.
3.1 Data and Information –The rapid development of technology exposes us to a lot of facts and figures every day. –Some of these facts are not very meaningful.
Database Design Concepts INFO1408 Term 2 week 1 Data validation and Referential integrity.
Basic Input/Output and Variables Ethan Cerami New York
Validation and Verification Today will look at: The difference between accuracy and validity Explaining sources of errors and how they could be overcome.
Validation and Verification
1 Microsoft Access 2002 Tutorial 5 – Enhancing a Table’s Design, and Creating Advanced Queries and Custom Forms.
RNJ 10/02/091 3 Computing System Fundamentals 3.6 Errors Prevention and Detection.
Microsoft Office 2003: Advanced 1 ADVANCED MICROSOFT ACCESS Lesson 7 – Modifying Table Design.
Microsoft Access 2000 Creating Tables and Relationships.
Encoding, Validation and Verification Chapter 1. Introduction This presentation covers the following: – Data encoding – Data validation – Data verification.
Introduction to Python
What is Validation Understanding Validation (Different from Verification)
GCSE ICT Checking data. Why do errors happen? Computers do not make mistakes. However if incorrect data is put in errors happen. In ICT this is called.
3.2 Data Checking.
Data entry: Validation
Checking data GCSE ICT.
Checking data Chapter 7 Prepared by:Sir Mazhar Javed.
Information Processing and Presentation by Rico Yu.
Objectives of Control The objectives of control are:  To ensure that all data are processed  To preserve the integrity of maintained data  To detect,
Manipulating data Data management: validation and verification.
System Development Lifecycle Verification and Validation.
Principles of Database Design, Conclusions AIMS 2710 R. Nakatsu.
Systems Life Cycle. Know the elements of the system that are created Understand the need for thorough testing Be able to describe the different tests.
AS Computing Verification. Once sensible data has been entered, the second of method of ensuing data integrity can be employed. Verification is the process.
CIT PowerPoint presentation Group 4. Unit 1, Chapter 2 Basic Concept on Data DATA AND INFORMATION What is data? Data consists of all sorts of unorganised.
Introduction to Database using Microsoft Access 2013 Part 6.1 November 18, 2014.
Verification & Validation F451 AS Computing. Why check data? It’s useless if inaccurate. Also, wrong data: Can be annoying Can cost a fortune Can be dangerous.
Verification & Validation. Batch processing In a batch processing system, documents such as sales orders are collected into batches of typically 50 documents.
Review of Data Capture. Input Devices What input devices are suitable for data entry? Keyboard Voice Bar Code MICR OMR Smart Cards / Magnetic Stripe cards.
Chapter 4 Variables and constants. 4.1 Variables -Use of variables is good programming style -easier to modify -easier for a programmer to understand.
1 3 Computing System Fundamentals 3.6 Errors Prevention and Recovery.
Introduction to Python Dr. José M. Reyes Álamo. 2 Three Rules of Programming Rule 1: Think before you program Rule 2: A program is a human-readable set.
Lesson 13 Databases Unit 2—Using the Computer. Computer Concepts BASICS - 22 Objectives Define the purpose and function of database software. Identify.
Data Verification and Validation
1 AQA ICT AS Level © Nelson Thornes 2008 Good quality data and information Data terms.
Data Validation.
Chapter 3 Data Control Ensure the Accurate and Complete data is entering into the data processing system.
CS 141 Computer Programming 1 Branching Statements.
Programming Problems Intermediate 2 Computing SHOW YOUR TEACHER YOUR WORKING PROGRAM AND WRITING FRAME THEN SAVE IN YOUR PROGRAMMING FOLDER AND UPDATE.
Verification & Validation
Validation & Verification Today will look at: The difference between accuracy and validity Explaining sources of errors and how they could be overcome.
Unit 1 Understanding computer systems: How to work with information and data to meet specific business needs OCR Cambridge Nationals in ICT Level 1/2 ©
Learning Objectives Today we will Learn: The different types of test data.
Input, Output and Processing.. What data needs to be input into the system? Identify the sources – i.e. where does the data come from? What is the volume.
Part 1 Learning Objectives To understand that variables are a temporary named location to store data and that programmers work with different data types.
Data Capture Forms What are they?. Example 1 Example 2.
Validation and verification 1.2
DATA TYPES.
DATA COLLECTION Data Collection Data Verification and Validation.
Component 2 5G, H, I, J, K.
Databases.
DATA INPUT AND OUTPUT.
Validation Bury College.
Databases.
IT Applications Theory Slideshows
Objectives TO UNDERSTAND THAT CAPTURING DATA IS VALIDATED AND VERIFIED TO CHECK THAT IT IS REASONABLE AND CORRECT.
How can errors in data occur when using an ICT system?
Fundamentals of Data Representation
Database Theory.
Verification and Validation
Microsoft Access Validation Rules, Table Relationships And
Introduction to Databases
Validation and Verification
Presentation transcript:

AS computing Validation and verification

Introduction It is important to maintain the integrity of any database of information. Any data item must always be the correct data type and always follow the rules for that data. For example, you have a field in your database called ‘NAME’ that was a text data type and up the ten characters long. If you enter a name that was thirty characters long, the data integrity of the database would be lost. Validation and verification techniques are all about ensuing that the data integrity of a database is maintained by ensuring that only the sensible data that you want is stored in it.

Validation Validation is the term used to ensure that only ‘sensible’ data is entered into a database. Sensible data means that it is of the correct data type and it follows any validation rules set up for that field.

Range check You can set up rules to ensure that if someone enters a number it must follow some mathematical rules, for example, be greater then a number, or less than a number. If a value is entered outside of this range, then a helpful error message should be displayed.

Format check Sometimes, especially with ID and membership, the code is made up of a mixture of numbers and letters. For example, a membership ID card is made up of 2 letters, followed by 3 numbers, such as AB123. You can set up rules that look for patterns such as LETTER-LETTER-NUMBER-NUMBER-NUMBER. Wrong data will not get put in the database. It will be rejected and a helpful error message should be displayed.

Length check In text field, you can set up rules that only accept an entry if it is less than a certain number of characters. For example, a field in your database called ‘COLOUR’ is set to be less than 10 characters. If someone entered ‘Blue white and yellow’, it would get rejected because it doesn’t follow the validation rule.

Allowable value check You can set up fields to only accept certain values. For example, you might set up a text field called ‘When do you want to leave?’. So that it can only accept Morning, Afternoon, and Evening.

Check Digit Commonly used on bar code, it is a technique used to see if a number has been entered correctly. A number, called a check digit, is placed at the end of a code. The bar code is read and a maths formula is applied to it. If the result is the same as the check digit, then the code has been read correctly. A method is called ‘modulus 11’ and is used in ISBN numbers. Two special cases in check digit If the remainder is 0, the check digit is 0 If the remainder is 1, the the check digit is X

Check digit example Suppose you have a number 12162?. The question mark at the end is the check digit but what should it be? The check digit will be calculated using ‘modulus 11’ A number, staring at 2 on the right and then working upwards, multiplies each number in the scanned code The multiplied numbers are added, to give is then divided by 11. This equal 3 remainder 9. The remainder is now subtracted from 11 to give the check digit 11 –9 = 2. The check digit is 2.

Presence check Some fields are more important than others and must be filled in. For example, you have a database that stores car adverts. A customer rings up to place an advert and the operator types the advert into the database using a data input form. If the customer does not know the colour of the car, it is not a disaster and so it doesn’t need to be filled in immediately. If the customer ha forgotten his telephone number, how can anyone contact him to buy the car? This field cannot be left blank. If the operator presses ENTER to enter the whole advert without this field being filled in, a helpful error message should be displayed. This method is presence check.