Verification & Validation

Slides:



Advertisements
Similar presentations
Backing up and Archiving Data Chapter 1. Introduction This presentation covers the following: – What is backing up – What is archiving – Why are both.
Advertisements

Chapter 16: Recovery System
2.2 Validation & Verification
Backup Strategy. An Exam question will ask you to describe a backup strategy. Be able to explain: Safe, secure place in different location. Why? – For.
Commercial Data Processing Lesson 3: Data Validation.
INFORMATION TECHNOLOGY
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
Validation and Verification Today will look at: The difference between accuracy and validity Explaining sources of errors and how they could be overcome.
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
Processing Integrity and Availability Controls
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
Software Development Unit 2 Databases What is a database? A collection of data organised in a manner that allows access, retrieval and use of that data.
Validation and Verification
RNJ 10/02/091 3 Computing System Fundamentals 3.6 Errors Prevention and Detection.
Records Survey and Retention Schedule Recertification 2011.
Topics Covered: Data preparation Data preparation Data capturing Data capturing Data verification and validation Data verification and validation Data.
Microsoft Access 2000 Creating Tables and Relationships.
Chapter 8: Systems analysis and design
Encoding, Validation and Verification Chapter 1. Introduction This presentation covers the following: – Data encoding – Data validation – Data verification.
15 Maintaining a Web Site Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section.
Chapter 16 Designing Effective Output. E – 2 Before H000 Produce Hardware Investment Report HI000 Produce Hardware Investment Lines H100 Read Hardware.
3.2 Data Checking.
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
Data and its manifestations. Storage and Retrieval techniques.
CDP Standard Grade1 Commercial Data Processing Standard Grade Computing Studies.
MATSEC Past Papers May 2010 Paper 1 Paper 2A. What is the difference between each of the following pairs of items? Syntax Error Caused by forgetting certain.
Checking data GCSE ICT.
Checking data Chapter 7 Prepared by:Sir Mazhar Javed.
I.Information Building & Retrieval Learning Objectives: the process of Information building the responsibilities and interaction of each data managing.
Manipulating data Data management: validation and verification.
System Development Lifecycle Verification and Validation.
Systems Life Cycle. Know the elements of the system that are created Understand the need for thorough testing Be able to describe the different tests.
Test and Review chapter State the differences between archive and back-up data. Answer: Archive data is a copy of data which is no longer in regular.
McLean HIGHER COMPUTER NETWORKING Lesson 15 (a) Disaster Avoidance Description of disaster avoidance: use of anti-virus software use of fault tolerance.
AS Computing Verification. Once sensible data has been entered, the second of method of ensuing data integrity can be employed. Verification is the process.
AS computing Validation and verification. Introduction It is important to maintain the integrity of any database of information. Any data item must always.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Verification & Validation F451 AS Computing. Why check data? It’s useless if inaccurate. Also, wrong data: Can be annoying Can cost a fortune Can be dangerous.
Security and Backup. Introduction A back-up strategy must cover all eventualities: Accidental damage Equipment failure Deliberate damage It must consider:
Verification & Validation. Batch processing In a batch processing system, documents such as sales orders are collected into batches of typically 50 documents.
Review of Data Capture. Input Devices What input devices are suitable for data entry? Keyboard Voice Bar Code MICR OMR Smart Cards / Magnetic Stripe cards.
20/12/20151 Data Structures Backing up and Archiving Data.
1 3 Computing System Fundamentals 3.6 Errors Prevention and Recovery.
Errors!. Where do errors occur? Anywhere data is transferred, processed, stored, etc. Input user error Storage magnetic hard drive errors physical tampering.
Data Collection. Data Capture This is the first stage involved in getting data into a computer Various input devices are used when getting data to the.
Data Verification and Validation
Data Validation.
Flat Files Relational Databases
Chapter 3 Data Control Ensure the Accurate and Complete data is entering into the data processing system.
The aim of producing a backup strategy is to make sure that a computer system can be returned to its original state if data has been lost or corrupted.
Managing Data & Information Procedures & Techniques.
Validation & Verification Today will look at: The difference between accuracy and validity Explaining sources of errors and how they could be overcome.
Input, Output and Processing.. What data needs to be input into the system? Identify the sources – i.e. where does the data come from? What is the volume.
 At the end of the class students should:  distinguish between data and information.  explain the characteristics and forms of Information Processing.
Validation and verification 1.2
DATA TYPES.
Database recovery contd…
AS ICT Module 2 Objectives: Security of Data
Processing Integrity and Availability Controls
Validation Bury College.
Backup your Data © EIT, Author Gay Robertson, 2017.
Databases.
Objectives TO UNDERSTAND THAT CAPTURING DATA IS VALIDATED AND VERIFIED TO CHECK THAT IT IS REASONABLE AND CORRECT.
How can errors in data occur when using an ICT system?
Backup and restoration of data, redundancy
Verification and Validation
Systems Development Lifecycle
Presentation transcript:

Verification & Validation F451 AS Computing

X Why check data? It’s useless if inaccurate. Also, wrong data: Can be annoying Can cost a fortune Can be dangerous X £45.67 £297.99

How do data errors happen? Speeling Mitsakes Typing the the same thing twice Leaving an important field blank Typing wrong numbers – 19/38/05

How can you check data? VALIDATION …Is it valid or allowed? Computers use software to check data 2 types of data check: VALIDATION …Is it valid or allowed? VERIFICATION …Is it the same?

Verification Data entered twice, then compared What common data is verified? Passwords

Data Entry - Verification Where data is entered into a system often 2 data entry operators will enter the same data and the data is compared to verify it. This ensure data is correctly inputted and spots human errors.

Validation Range checks Format Check Type/Character Checks Ensures data entered complies with allowable data Many different types of validation include: Range checks Format Check Type/Character Checks Presence Checks Length Check Lookup/Existence Check Check Digits

Class Activity - Are these dates possible?   19/12/78 12/19/90 3rd June 1999 30th Feb 2003 31st September 2001 29th Feb 2004 01/01/2003 ?    

Range check and Type check Range checks i.e. is between 1 and 100 Type checks i.e is numeric and not text Please type in your age: 6000 Please type in your age: old

Length & Presence checks Length check Checks to see if input data contains certain numbers of characters Presence check Ensures values have actually been entered in to the data store Certain key fields are compulsory Please type in your screen name (min 4 characters) JON Please type in your age:

Coding data Human data input error is common Coded values can prevent this S, M, L can represent small, medium and large Head Size Small - S Medium - M Large - L F

Look-up Check Sometimes, a list box or combo box displays allowable items, so input is selected from a list

Existence Check

Class Exam Question Chan D4n 132 Accounts 572 Wendy 123 Training 467 Surname Forename Dept Number Dept Name Ext Number Chan D4n 132 Accounts 572 Wendy 123 Training 467 Jones Sarah 121 468 Dan Patel Paul 573 The records in this file have been input with the validation checking turned off. Referring to the records above, state four problems that have occurred. (4) (b) Name and describe three different validation checks that would have prevented these problems. (6)

Backups Making copy of important files on a portable medium Store the media away from originals If the original file is corrupted it can be replaced quickly ALWAYS BACKUP YOUR FILES!

Backup Strategy Frequency of Backup – Eg Weekly Medium used – eg Memory Stick Where the medium is stored? On or off site. Full Backup Copies every file fully Incremental Backup Only copies files that have been altered since last backup

Back-up & Disaster Planning Organisations must plan for computer failure Large companies have comprehensive plans Back up and running within days of major catastrophe Smaller companies can survive with less sophisticated systems Back up system is still vital

Back-up & Disaster Recovery The following factors need to be considered when establishing a backup strategy: The frequency of backup The medium of storage Location of the media Number of generations to keep The use of full or incremental backups Trained staff to implement strategy Effective recovery procedure. Process should be documented.

Back Up Hardware Zip Disk Tape Cartridge DVD-Rom/CD-Rom RAID

Archiving Not the same as backup Storing old/unused data Taking it from server/mainframe Transferring onto storage medium Stored “off-line” Unlikely to be used again, but still available

Archiving Storing data files on a portable storage device and keep them in a secure location. Data is stored offline. It can be recovered in an emergency/disaster recovery situation.

Practical Exercise Create 3 types of validation checks within Delphi Range check Length check Password verification