Verification & Validation F451 AS Computing. Why check data? It’s useless if inaccurate. Also, wrong data: Can be annoying Can cost a fortune Can be dangerous.

Slides:



Advertisements
Similar presentations
Verification & Validation
Advertisements

Backing up and Archiving Data Chapter 1. Introduction This presentation covers the following: – What is backing up – What is archiving – Why are both.
Choose and Book Archive New functionality from November 2012.
Chapter 16: Recovery System
2.2 Validation & Verification
1 Software Engineering Lecture 11 Software Testing.
Backup Strategy. An Exam question will ask you to describe a backup strategy. Be able to explain: Safe, secure place in different location. Why? – For.
Commercial Data Processing Lesson 3: Data Validation.
INFORMATION TECHNOLOGY
Pertemuan 16 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Lesson 11 – NETWORK DISASTER RECOVERY Disaster recovery plans Network backup and restoration OVERVIEW.
Validation and Verification Today will look at: The difference between accuracy and validity Explaining sources of errors and how they could be overcome.
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
Processing Integrity and Availability Controls
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
Software Development Unit 2 Databases What is a database? A collection of data organised in a manner that allows access, retrieval and use of that data.
Validation and Verification
RNJ 10/02/091 3 Computing System Fundamentals 3.6 Errors Prevention and Detection.
Records Survey and Retention Schedule Recertification 2011.
Topics Covered: Data preparation Data preparation Data capturing Data capturing Data verification and validation Data verification and validation Data.
Microsoft Access 2000 Creating Tables and Relationships.
Chapter 8: Systems analysis and design
1 Chapter 12 File Management Systems. 2 Systems Architecture Chapter 12.
Encoding, Validation and Verification Chapter 1. Introduction This presentation covers the following: – Data encoding – Data validation – Data verification.
15 Maintaining a Web Site Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section.
Chapter 16 Designing Effective Output. E – 2 Before H000 Produce Hardware Investment Report HI000 Produce Hardware Investment Lines H100 Read Hardware.
3.2 Data Checking.
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
Data and its manifestations. Storage and Retrieval techniques.
CDP Standard Grade1 Commercial Data Processing Standard Grade Computing Studies.
MATSEC Past Papers May 2010 Paper 1 Paper 2A. What is the difference between each of the following pairs of items? Syntax Error Caused by forgetting certain.
Checking data Chapter 7 Prepared by:Sir Mazhar Javed.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
I.Information Building & Retrieval Learning Objectives: the process of Information building the responsibilities and interaction of each data managing.
Manipulating data Data management: validation and verification.
System Development Lifecycle Verification and Validation.
Systems Life Cycle. Know the elements of the system that are created Understand the need for thorough testing Be able to describe the different tests.
Test and Review chapter State the differences between archive and back-up data. Answer: Archive data is a copy of data which is no longer in regular.
McLean HIGHER COMPUTER NETWORKING Lesson 15 (a) Disaster Avoidance Description of disaster avoidance: use of anti-virus software use of fault tolerance.
AS computing Validation and verification. Introduction It is important to maintain the integrity of any database of information. Any data item must always.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Verification & Validation. Batch processing In a batch processing system, documents such as sales orders are collected into batches of typically 50 documents.
Review of Data Capture. Input Devices What input devices are suitable for data entry? Keyboard Voice Bar Code MICR OMR Smart Cards / Magnetic Stripe cards.
HalFILE 2.1 Network Protection & Disaster Recovery.
20/12/20151 Data Structures Backing up and Archiving Data.
1 3 Computing System Fundamentals 3.6 Errors Prevention and Recovery.
Errors!. Where do errors occur? Anywhere data is transferred, processed, stored, etc. Input user error Storage magnetic hard drive errors physical tampering.
Data Verification and Validation
Flat Files Relational Databases
Chapter 3 Data Control Ensure the Accurate and Complete data is entering into the data processing system.
The aim of producing a backup strategy is to make sure that a computer system can be returned to its original state if data has been lost or corrupted.
Verification & Validation
Validation & Verification Today will look at: The difference between accuracy and validity Explaining sources of errors and how they could be overcome.
Input, Output and Processing.. What data needs to be input into the system? Identify the sources – i.e. where does the data come from? What is the volume.
BACKUP AND RESTORE. The main area to be consider when designing a backup strategy Which information should be backed up Which technology should be backed.
 At the end of the class students should:  distinguish between data and information.  explain the characteristics and forms of Information Processing.
Validation and verification 1.2
Database recovery contd…
AS ICT Module 2 Objectives: Security of Data
Processing Integrity and Availability Controls
ICT meeting Business needs
Validation Bury College.
Objectives TO UNDERSTAND THAT CAPTURING DATA IS VALIDATED AND VERIFIED TO CHECK THAT IT IS REASONABLE AND CORRECT.
How can errors in data occur when using an ICT system?
Implementation of security elements in database
Verification and Validation
Systems Development Lifecycle
Presentation transcript:

Verification & Validation F451 AS Computing

Why check data? It’s useless if inaccurate. Also, wrong data: Can be annoying Can cost a fortune Can be dangerous £45.67 £ X

How do data errors happen? Speeling Mitsakes Typing the the same thing twice Leaving an important field blank Typing wrong numbers – 19/38/05

How can you check data? Computers use software to check data 2 types of data check: VALIDATION …Is it valid or allowed? VERIFICATION …Is it the same?

Verification Data entered twice, then compared What common data is verified? Passwords

Validation Ensures data entered complies with allowable data Many different types of validation include: Range checks Format Check Type/Character Checks Presence Checks Length Check Lookup/Existence Check Check Digits

Class Activity - Are these dates possible? 1. 19/12/ /19/ rd June th Feb st September th Feb /01/2003   ?

Range check and Type check Range checks i.e. is between 1 and 100 Type checks i.e is numeric and not text Please type in your age: 6000 old

Length & Presence checks Length check Checks to see if input data contains certain numbers of characters Presence check Ensures values have actually been entered in to the data store Certain key fields are compulsory Please type in your age: Please type in your screen name (min 4 characters) JON

Coding data Human data input error is common Coded values can prevent this S, M, L can represent small, medium and large Head Size Small - S Medium - M Large - L F

Look-up Check Sometimes, a list box or combo box displays allowable items, so input is selected from a list

Existence Check

Class Exam Question SurnameForename Dept Number Dept Name Ext Number ChanD4n132Accounts572 Wendy123Training467 JonesSarah121Training468 ChanDan132Accounts572 PatelPaul132Accounts573 (a) (a) The records in this file have been input with the validation checking turned off. Referring to the records above, state four problems that have occurred. (4) (b) Name and describe three different validation checks that would have prevented these problems. (6)

Backups Making copy of important files on a portable medium Store the media away from originals If the original file is corrupted it can be replaced quickly ALWAYS BACKUP YOUR FILES!

Back-up & Disaster Planning Organisations must plan for computer failure Large companies have comprehensive plans Back up and running within days of major catastrophe Smaller companies can survive with less sophisticated systems Back up system is still vital

backup strategy The following factors need to be considered when establishing a backup strategy: Back-up & Disaster Recovery The frequency of backup The frequency of backup The medium of storage The medium of storage Location of the media Location of the media Number of generations to keep Number of generations to keep The use of full or incremental backups The use of full or incremental backups Trained staff to implement strategy Trained staff to implement strategy Effective recovery procedure. Effective recovery procedure. Process should be documented. Process should be documented.

Back Up Hardware Zip Disk Zip Disk Tape Cartridge Tape Cartridge DVD-Rom/CD-Rom DVD-Rom/CD-Rom RAID RAID

Archiving Not the same as backup Not the same as backup Storing old/unused data Storing old/unused data Taking it from server/mainframe Taking it from server/mainframe Transferring onto storage medium Transferring onto storage medium Stored “off-line” Stored “off-line” Unlikely to be used again, but still available Unlikely to be used again, but still available

Archiving Storing data files on a portable storage device and keep them in a secure location. Data is stored offline. It can be recovered in an emergency/disaster recovery situation.

Practical Exercise Create 3 types of validation checks within Delphi Range check Length check Password verification Create 3 types of validation checks within Delphi Range check Length check Password verification