Data Validation.

Slides:



Advertisements
Similar presentations
©G. Millbery 2003Data, Information, Knowledge and Processing Slide 1 Validation  Making sure that the data value entered is sensible and reasonable 
Advertisements

2.2 Validation & Verification
Commercial Data Processing Lesson 2: The Data Processing Cycle.
Commercial Data Processing Lesson 3: Data Validation.
Processing Integrity and Availability Controls
Validation and Verification Today will look at: The difference between accuracy and validity Explaining sources of errors and how they could be overcome.
Systems Analysis Chapter 8 P 94 to P 101
Validation and Verification
RNJ 10/02/091 3 Computing System Fundamentals 3.6 Errors Prevention and Detection.
© 1999, by Que Education and Training, Chapter 5, pages of Introduction to Computer Programming with Visual Basic 6: A Problem-Solving Approach.
 By the end of this, you should be able to state the difference between DATE and INFORMAITON.
Chapter 8: Systems analysis and design
Encoding, Validation and Verification Chapter 1. Introduction This presentation covers the following: – Data encoding – Data validation – Data verification.
GCSE ICT Checking data. Why do errors happen? Computers do not make mistakes. However if incorrect data is put in errors happen. In ICT this is called.
3.2 Data Checking.
Data entry: Validation
Checking data GCSE ICT.
Checking data Chapter 7 Prepared by:Sir Mazhar Javed.
Information Processing and Presentation by Rico Yu.
Objectives of Control The objectives of control are:  To ensure that all data are processed  To preserve the integrity of maintained data  To detect,
I.Information Building & Retrieval Learning Objectives: the process of Information building the responsibilities and interaction of each data managing.
Creating a Database Designing Structure, Capturing and Presenting Data.
System Development Lifecycle Verification and Validation.
Data and information. Information and data By the end of this, you should be able to state the difference between DATE and INFORMAITON.
Systems Life Cycle. Know the elements of the system that are created Understand the need for thorough testing Be able to describe the different tests.
AS Computing Verification. Once sensible data has been entered, the second of method of ensuing data integrity can be employed. Verification is the process.
AS computing Validation and verification. Introduction It is important to maintain the integrity of any database of information. Any data item must always.
DATA ERRORS. Introduction The processing of incorrect data can produce ridiculous and embarrassing output. Errors can take time to sort out and can be.
AS Level ICT Data entry: Problems with errors. Garbage in; Garbage out If incorrect data is entered into a data management system, the results of any.
Verification & Validation. Batch processing In a batch processing system, documents such as sales orders are collected into batches of typically 50 documents.
Review of Data Capture. Input Devices What input devices are suitable for data entry? Keyboard Voice Bar Code MICR OMR Smart Cards / Magnetic Stripe cards.
OCR CAMBRIDGE NATIONALS UNIT 1 - UNDERSTANDING COMPUTER SYSTEMS DATA CAPTURE METHODS.
Data Collection. Data Capture This is the first stage involved in getting data into a computer Various input devices are used when getting data to the.
Copyright © 2010 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Starting Out with Programming Logic & Design Second Edition by Tony Gaddis.
Data Verification and Validation
Chapter 11 Data Validation. Question Should your program assume the data is correct, or should your program edit the data to ensure it is correct?
1 AQA ICT AS Level © Nelson Thornes 2008 Good quality data and information Data terms.
AS Level ICT Data entry: Creating validation checks.
Mr C Johnston ICT Teacher
Data Management Data Verification Data Validation.
OCR CAMBRIDGE NATIONALS UNIT 1 - UNDERSTANDING COMPUTER SYSTEMS DATA CAPTURE METHODS.
Chapter 3 Data Control Ensure the Accurate and Complete data is entering into the data processing system.
Verification & Validation
Validation & Verification Today will look at: The difference between accuracy and validity Explaining sources of errors and how they could be overcome.
Input, Output and Processing.. What data needs to be input into the system? Identify the sources – i.e. where does the data come from? What is the volume.
Data Capture Forms What are they?. Example 1 Example 2.
GCSE ICT LESSON 5 Booklet Sections: 6 & 7 Data Capture & Checking Data.
Validation and verification 1.2
3.1.1 Data, Information, knowledge and processing
DATA TYPES.
DATA COLLECTION Data Collection Data Verification and Validation.
Highcliffe ICT Department
Databases.
DATA INPUT AND OUTPUT.
Handling Data Designing Structure, Capturing and Presenting Data
Unit 2.3 Robust Programs Lesson 2 - Testing Programs
Validation Bury College.
IT Applications Theory Slideshows
Objectives TO UNDERSTAND THAT CAPTURING DATA IS VALIDATED AND VERIFIED TO CHECK THAT IT IS REASONABLE AND CORRECT.
How can errors in data occur when using an ICT system?
G063 - Testing.
Designing data capture forms
Handling Data Designing Structure, Capturing and Presenting Data
Chapter 7: Input Validation
Verification and Validation
Validation and Verification
Presentation transcript:

Data Validation

Data Validation and Verification Validation –the checks a computer carries out when data is input, it checks that the data is sensible. Verification – Ensures the data is accurate

Data Validation It is important to ensure that only correct data is stored and processed. It may not be possible to ensure the data is correct, but we can make sure it is sensible. Unfortunately, data that is sensible could still be flawed. This process is called data validation; it takes place on input, on process and on output. Various methods that can be used to validate data these include;

List Check This checks the data to see if it is a possible value in a drop down box. For examples are validating gender Male, Female

Range Check This checks that numbers lie between two delimiting values or a specified range. An example is the hours in a 24-hour clock, the lower value would be 00 (meaning midnight), the upper value would be 23 (the hour before midnight).

Presence Check Missing key data means a record cannot be processed. Check data has been entered in the field. The field cannot be left empty. In a patients record it is important that the patients name is on their details.

Ensures that information is of the same type Data Type Check Ensures that information is of the same type Not allowing a DATE to be entered into a NUMBER field for example, an error message should be displayed

Check Digits Check digit(s) are calculated and placed at the end of the number. Many Key fields use check digits for example;

Coding Information It is sometimes useful to code information in database fields. E.g. Entering subjects for lessons: MA – Maths EN - English FR – French DT – Design and Technology

Advantages of Coding Data Quicker to enter. Less typing required. Less likely to make spelling mistakes. Uses less computer memory.

Data Verification (Accuracy) Ensures that the data that has been inputted is the same as the original data Proof reading – Physically checking the data with the naked eye Double Entry – Re-enter data to doubly ensure data is correct

Data Verification (Accuracy) Parity Check – Checks to make that data sent is the same as the data received when data is transmitted from one computer to another.

Testing Normal Data – information that is expected by the system and is within tolerances and validation Extreme – information that is outside of tolerances e.g. entering 100 when the system will only allow between 1 and 100 Erroneous (false) – entering names into a date field

Boolean Logic AND OR NOT

Inaccurate Information Consequences Garbage in Garbage Out – GIGO Wrong decision making Profit Loss Legal Ramifications (DPA) Data Crash

Exam Paper 6 – Questions 6, 11, 15 Exam Paper 5 – Questions 3,7,12, 14