• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Verification, validation and input masks

Extracts from this document...


Verification, validation and input masks Verification is when a human, through proofreading, checks data. You can do this in several ways: � Proof read the work on the monitor or on a print out � Check work on a monitor/print out with a manual copy � Get somebody else to check the work for you. � Two people typing in the same data, and if the data is the same it is accepted for processing. The only drawback to this is the unlikely event that the two people actually make the same mistake, and the wrong data is inputted. The advantages of verification are that data is less likely to be inaccurate. For many companies such as banks, data being accurate is crucial. However, it does take time to check all the data, and in cases such as having two people entering the data, this is using another person that could be doing other more important work, and two wages need to be paid which would lose money. ...read more.


For example, upon entering peoples ages, there are not likely to be any people older than 130, so you could set it up so that this anything higher than this number could not be inputted. � Presence check - When a code is entered that checks if there is actually something in the field. This would be used in a field which must have some data entered into it, such as a primary key field which would define each entry into the database. � List check - This only allows certain data to be entered. For example, "Title." We know that there are only a certain amount of titles which could be entered, Mr, Mrs, Miss, etc. So we could enter them all into the computer, and if anything else was entered an error message would be displayed and the data could not be entered. The advantages of validation: � There is less chance of making typing errors as the computer checks all your data for you, and you do not have to look through the document so carefully for errors, therefore this is a timesaver. ...read more.


The disadvantages of input masks are: � When entering names, you could set it up so that the first letter of the 1st name, and the 1st letter of the surname are capitalised. However when it comes to names such as McHugh, the check would not allow the third letter of this name to be capitalised. � Like validation rules, they can take a considerable amount of time to set up; time that could be better spent doing other things. The following characters can be used to set up input masks. 0 - A number required 9 - A number optional L - Letter must be entered ? - A letter optional. > - A capital letter < - A lowercase letter If you wanted to set an input mask up for a postcode, you would do so in the following manner: An example of a postcode may be CW5 6JY. The input mask for this would be LL09 0LL The "Ls" for capital letters, and the 9 would be there since some postcodes do have an extra number on the end, but not all therefore the number would be optional. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE ICT Systems and Application section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a star student thought of this essay

4 star(s)

Response to the question

In summary, the report shows clear understanding of the three methods of inputting data into an Microsoft Access file. However more could be said, regrading the reason why a user would implement the methods. The report states how verification is ...

Read full review

Response to the question

In summary, the report shows clear understanding of the three methods of inputting data into an Microsoft Access file. However more could be said, regrading the reason why a user would implement the methods. The report states how verification is undertaken, and the drawbacks to this approach. This section is quite good, as this shows the examiner that the work is detailed and this gives an accurate view of what 'Verification'. is. The report doesn't contain any screenshots, which would make the section 'Validation' more clear and this would enable the examiner to visualize the writing. On the flip side, the paragraph is well written, and detailed. If the student were to include a number of screenshots of Microsoft Access, this would re-enforce their background understanding of their written knowledge.

Level of analysis

The three different paragraph are well explained and the student clearly understands how all three methods work. Although for high marks, the student could include real examples of their own database, and explain why it's necessary to include these. There is little information on why the user needs to implemented the three methods, which would allow the student to evaluate their background knowledge.

Quality of writing

The presentation of the report is a block of text, which makes it quite difficult to read when going though the report. The report should contain line breaks, by splitting the report into three different sections. These would include 'Verification', 'Validation' and 'Input Masks'.

Did you find this review helpful? Join our team of reviewers and help other students learn

Reviewed by danielbeal 22/02/2012

Read less
Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE ICT Systems and Application essays

  1. Marked by a teacher

    The impact of ICT on the local community. I live in the borough of ...

    4 star(s)

    Anything you need to know is located on this site. You can learn about events, shops, clubs, schools and many more. People can use the site to find out all they want about the area they live in. People have access via this site to do things related to fines, taxes and other such things.

  2. Marked by a teacher

    Planning- design a memo, letter and webpage for Capital FM.

    4 star(s)

    List the current administration that takes place. * George Mulalay is the manager of Capital F.M. * It is a busy radio station with a lot of things to sort out. * There are seven employees that work there and he needs to make sure everyone is doing what they are meant to.

  1. Different types of technology How I use ICT at home and at school

    Using Facebook, I can organise events and parties and also be invited to them. I can find out what's going on and when. But it can be unreliable as people don't keep to their word if they're actually coming while being trigger happy in clicking the 'attend' button.

  2. Health and Safety Issues in ICT

    Ensure that the room is well ventilated by using air conditioning if available. Ideally, blinds should be provided to ensure that users do not suffer from glare. Screens should be regularly cleaned.

  1. Creating a computer system for a video rental shop

    There are many advantages to a computer based rather than a non-computerised system these advantages include: - * Computer systems can be backed up so that if there is a fire or the computers contract a virus, the files are not lost altogether.

  2. ICT Report 2b: ICT in Organisations

    As mentioned, I have researched and found out the technologies used in a typical Boots Plc branch (Kilburn). The following sections will stipulate the input devices used in the Sales department, accompanied by the processors, output devices, ports/cables, storage devices, and software applications.

  1. Explain the difference between primary and secondary sources of data, with examples.

    Some methods of data collection are seen as more reliable than others. For example on a questionnaire people will often lie or not tell the truth (e.g. ticking the box to say how much you earn). Whereas in an interview face-to-face people will tell the truth a lot more and

  2. Computer study project outline - library and book club database.

    Testing all the algorithms and debugging- 10 days. 9. Designing the software- 10 days. 10. Documentation and report making- around 18 days. Hardware used I am using a variety of different hardware for this project: 1. Laptop: I am using an HP Pavilion dv3 Series laptop.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work