AS Level ICT Data entry: Problems with errors. Garbage in; Garbage out If incorrect data is entered into a data management system, the results of any.

Slides:



Advertisements
Similar presentations
WORD PROCESSING.
Advertisements

Task 8 Design and create a business presentation on Safe Working Practices when using ICT.
2.2 Validation & Verification
FAIRTRADE FOUNDATION OCR Nationals in ICT Unit 1 ICT Skills for Business AO4.
Commercial Data Processing Lesson 3: Data Validation.
Validation and Verification Today will look at: The difference between accuracy and validity Explaining sources of errors and how they could be overcome.
AS Level ICT Capturing data. Data can be captured (or collected) for processing from a variety of sources. These sources can include: –Data capture forms,
Validation and Verification
Wizards, Templates, Styles & Macros Chapter 3. Contents This presentation covers the following: – Purpose, Characteristics, Advantages and Disadvantages.
RNJ 10/02/091 3 Computing System Fundamentals 3.6 Errors Prevention and Detection.
Microsoft Office 2003: Advanced 1 ADVANCED MICROSOFT ACCESS Lesson 7 – Modifying Table Design.
Before I stated the database I had to save it into My Documents> ICT> You can do it> D201EPORTFOLIO> Evidence For the field group food item, I set the.
 By the end of this, you should be able to state the difference between DATE and INFORMAITON.
Chapter 8: Systems analysis and design
Encoding, Validation and Verification Chapter 1. Introduction This presentation covers the following: – Data encoding – Data validation – Data verification.
1 DoD Cardholder Self Registration November 21, 2008.
OCAN College Access Program Data Submissions Vonetta Woods HEI Analyst, Ohio Board of Regents
* DIDA gave a brief of designing a database that would be able to store details of endangered species. The purpose of the database was so that members.
GCSE ICT Checking data. Why do errors happen? Computers do not make mistakes. However if incorrect data is put in errors happen. In ICT this is called.
AS Level ICT Evaluation of ICT-related solutions.
Data entry: Validation
Checking data GCSE ICT.
Checking data Chapter 7 Prepared by:Sir Mazhar Javed.
Information Processing and Presentation by Rico Yu.
Creating a Database Designing Structure, Capturing and Presenting Data.
Collecting Data Types, coding, accuracy, file formats and the effect of data loss.
Systems Life Cycle. Know the elements of the system that are created Understand the need for thorough testing Be able to describe the different tests.
AS Computing Verification. Once sensible data has been entered, the second of method of ensuing data integrity can be employed. Verification is the process.
AS computing Validation and verification. Introduction It is important to maintain the integrity of any database of information. Any data item must always.
DATA ERRORS. Introduction The processing of incorrect data can produce ridiculous and embarrassing output. Errors can take time to sort out and can be.
E.g.: MS-DOS interface. DIR C: /W /A:D will list all the directories in the root directory of drive C in wide list format. Disadvantage is that commands.
©M Robinson (All Saints College) Replace this with your full name OCR Unit 1 ICT Skills for Business b1 AO4 Select and use tools and facilities in word.
Verification & Validation. Batch processing In a batch processing system, documents such as sales orders are collected into batches of typically 50 documents.
Learning Intentions: To understand what is required to achieve a Pass, Merit or Distinction for Task 7.
1 3 Computing System Fundamentals 3.6 Errors Prevention and Recovery.
Data Verification and Validation
1 AQA ICT AS Level © Nelson Thornes 2008 Good quality data and information Data terms.
Data Validation.
AS Level ICT Data entry: Creating validation checks.
Chapter 3 Data Control Ensure the Accurate and Complete data is entering into the data processing system.
10 Chapter 101 Using Menus and Validating Input Programming Logic and Design, Second Edition, Comprehensive 10.
Validation & Verification Today will look at: The difference between accuracy and validity Explaining sources of errors and how they could be overcome.
13.4 Information and Data. Characteristics and Classifications of Information There are many ways in which information can be classified, this can be.
 At the end of the class students should:  distinguish between data and information.  explain the characteristics and forms of Information Processing.
Data Capture Forms What are they?. Example 1 Example 2.
GCSE ICT LESSON 5 Booklet Sections: 6 & 7 Data Capture & Checking Data.
Validation and verification 1.2
DATA TYPES.
WORD PROCESSING.
DATA COLLECTION Data Collection Data Verification and Validation.
DATA INPUT AND OUTPUT.
GCE Applied ICT G040: Lesson 09 Business Letter Briefing Notes
Handling Data Designing Structure, Capturing and Presenting Data
Validation Bury College.
GCE Applied ICT G040: Lesson 08 Planning and Drafting Communications
OPERATE A WORD PROCESSING APPLICATION (BASIC)
Databases.
Databases.
Setting up an online account
IT Applications Theory Slideshows
Objectives TO UNDERSTAND THAT CAPTURING DATA IS VALIDATED AND VERIFIED TO CHECK THAT IT IS REASONABLE AND CORRECT.
How can errors in data occur when using an ICT system?
Handling Data Designing Structure, Capturing and Presenting Data
Verification and Validation
Introduction to Databases
Entering Records.
Presentation transcript:

AS Level ICT Data entry: Problems with errors

Garbage in; Garbage out If incorrect data is entered into a data management system, the results of any processing that takes place will be invalid Hence the use of the expression GIGO – ‘Garbage in; Garbage out’ It therefore follows that it is a major concern for anyone who has to design and solve a problem to ensure that any data that is inputted into a data management system is correct

Validity and correctness For data to be valid, it must match certain rules For example, if a field in a database is a numeric or number field, only numbers can be inputted into that field; letters would not be valid data for that field However if the field – for example a field for client’s surnames – was an alphanumeric or text field (i.e. it can have both numbers and letters inputted into it) it would accept both Jones and J0nes as valid, even though only of one these entries is correct

Validity and correctness It follows, therefore that data must be both valid and correct (i.e. free from errors) The number of errors can be reduced by the use of: –Verification –Validation

Verification Verification is the process of checking that the data entered into an ICT system matches the source of the data For example, does the personal data someone has written on an application form for a job match the data that has been inputted by a keyboard operator into a data management system

Verification Two methods can be used to check data entered in such a way: –Proof reading –Double data entry

Verification Proof reading: This involves someone checking and matching each data entry visually – it is not fool-proof! Double data entry: This involves two keyboard operators entering the same data, which is then compared and checked automatically to ensure that the data entries are identical – this is both expensive and not fool-proof (e.g. both keyboard operators might have made the same mistake)

Verification A further method of verifying data is to make the data entry process include a degree of self- checking For example, individuals who are using the Internet to purchase items from an online retailer will have to complete an online order form and use some form of automatic payment system Because they are entering their own personal details (e.g. name, address, postcode, credit card details) and because they are only making one data entry, they are less likely to make mistakes

Verification Furthermore, this will also save the online retailer money as they will not need to employ staff as keyboard operators do mundane data entries Using such a system does not eliminate errors, but can go some way to reducing the number that occur

Verification The most common errors that occur are: –Transcription errors –Transposition errors

Transcription errors Transcription errors are errors that are made when data is being entered using documents or audio responses as the data source and a keyboard as the method of entry The most common errors occur because of: –Problems understanding speech –Unusual spellings of words or names –Poor handwriting –Misinterpretation –Typing errors (typos)

Transposition errors Transposition errors are errors that are made when characters (i.e. letters and number) in data are entered in the wrong order Examples of common transposition errors are: –Typing ‘form’ rather than ‘from’ –Reversing numbers in a sequence (e.g. ‘10078’ entered as ‘10087’) –Reversing letters in a sequence (e.g. ‘BD04NTJ’ entered as ‘DB04NTJ’)

Verifying and validating content Not all data used in ICT is entered into a data management system For example, a website contains many different items of data, but is not a data management system The data on the website still needs to be verified and validated, otherwise it cannot be trusted In particular, are their any types of websites that might contain unverified and invalidated data?

Verifying and validating content Examples of methods of verification and validation of the content of a website are: –Checking the accuracy of content against a variety of other sources (e.g. checking it against other online and available printed sources) –Checking the readability of the content (e.g. is it suitable for the audience?) –Spellchecking all text –Grammar checking all text

Verifying and validating content Examples of methods of verification and validation of the content of a website are: –Ensuring that images that should appear do appear – avoid the dreaded ‘x’ in a box! –Checking that all content is present – proof reading should ensure that missing text and images are spotted before the website is uploaded to the Internet –Ensuring that content is not duplicated – proof reading should also ensure that this problem is avoided

Verifying and validating content Examples of methods of verification and validation of the content of a website are: –Using standard or consistent layouts and colour schemes –Ensuring that images are the correct size and resolution – too large an image takes too long to download; if the image resolution is too low the image will be blurred and indistinct

Verifying and validating content Examples of methods of verification and validation of the content of a website are: –Ensuring that the font style and font size are appropriate for the audience –Checking that any images used are appropriate and suitable for use with the text they are used to illustrate

AS Level ICT Data entry: Problems with errors