• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Verification, validation and input masks

Extracts from this document...


Verification, validation and input masks Verification is when a human, through proofreading, checks data. You can do this in several ways: � Proof read the work on the monitor or on a print out � Check work on a monitor/print out with a manual copy � Get somebody else to check the work for you. � Two people typing in the same data, and if the data is the same it is accepted for processing. The only drawback to this is the unlikely event that the two people actually make the same mistake, and the wrong data is inputted. The advantages of verification are that data is less likely to be inaccurate. For many companies such as banks, data being accurate is crucial. However, it does take time to check all the data, and in cases such as having two people entering the data, this is using another person that could be doing other more important work, and two wages need to be paid which would lose money. ...read more.


For example, upon entering peoples ages, there are not likely to be any people older than 130, so you could set it up so that this anything higher than this number could not be inputted. � Presence check - When a code is entered that checks if there is actually something in the field. This would be used in a field which must have some data entered into it, such as a primary key field which would define each entry into the database. � List check - This only allows certain data to be entered. For example, "Title." We know that there are only a certain amount of titles which could be entered, Mr, Mrs, Miss, etc. So we could enter them all into the computer, and if anything else was entered an error message would be displayed and the data could not be entered. The advantages of validation: � There is less chance of making typing errors as the computer checks all your data for you, and you do not have to look through the document so carefully for errors, therefore this is a timesaver. ...read more.


The disadvantages of input masks are: � When entering names, you could set it up so that the first letter of the 1st name, and the 1st letter of the surname are capitalised. However when it comes to names such as McHugh, the check would not allow the third letter of this name to be capitalised. � Like validation rules, they can take a considerable amount of time to set up; time that could be better spent doing other things. The following characters can be used to set up input masks. 0 - A number required 9 - A number optional L - Letter must be entered ? - A letter optional. > - A capital letter < - A lowercase letter If you wanted to set an input mask up for a postcode, you would do so in the following manner: An example of a postcode may be CW5 6JY. The input mask for this would be LL09 0LL The "Ls" for capital letters, and the 9 would be there since some postcodes do have an extra number on the end, but not all therefore the number would be optional. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE ICT Systems and Application section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a star student thought of this essay

4 star(s)

Response to the question

In summary, the report shows clear understanding of the three methods of inputting data into an Microsoft Access file. However more could be said, regrading the reason why a user would implement the methods. The report states how verification is ...

Read full review

Response to the question

In summary, the report shows clear understanding of the three methods of inputting data into an Microsoft Access file. However more could be said, regrading the reason why a user would implement the methods. The report states how verification is undertaken, and the drawbacks to this approach. This section is quite good, as this shows the examiner that the work is detailed and this gives an accurate view of what 'Verification'. is. The report doesn't contain any screenshots, which would make the section 'Validation' more clear and this would enable the examiner to visualize the writing. On the flip side, the paragraph is well written, and detailed. If the student were to include a number of screenshots of Microsoft Access, this would re-enforce their background understanding of their written knowledge.

Level of analysis

The three different paragraph are well explained and the student clearly understands how all three methods work. Although for high marks, the student could include real examples of their own database, and explain why it's necessary to include these. There is little information on why the user needs to implemented the three methods, which would allow the student to evaluate their background knowledge.

Quality of writing

The presentation of the report is a block of text, which makes it quite difficult to read when going though the report. The report should contain line breaks, by splitting the report into three different sections. These would include 'Verification', 'Validation' and 'Input Masks'.

Did you find this review helpful? Join our team of reviewers and help other students learn

Reviewed by danielbeal 22/02/2012

Read less
Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE ICT Systems and Application essays

  1. Different types of technology How I use ICT at home and at school

    It gives me the opportunity to have contact with people I usually wouldn't. Facebook has often been criticised as a place where privacy is too easy to be broken. However, I can limit what exactly Facebook can show of mine to my friends using the privacy options and thus stopping people from seeing things I don't want them to see.

  2. Fast-Food and Takeaway Names

    This is why I therefore decided to select my data randomly, to make it fairer. Analysis: Phonology: The data shows that a lot of phonological devices have been used as a tool in naming Restaurants and Fast-food shops. Alliteration has been used, e.g.

  1. This project is designed to help non-computerized library to easily keep track of their ...

    OUTPUT * The output shown is the date each shipment is received in the Blain City Library, the overall price, a checklist of each order to cross off received ones, and the resultant balance after the transaction has gone through.

  2. Computer Systems Assignment 2

    you what is wrong and with the new features of Windows 7, you can have your geeky friend who can fix your computer wirelessly. III. The automatic background changer - which is a nice feature. IV. Gadgets - some of the gadgets that are around, like the ones for Play.com

  1. GCSE Database Project ICT

    Select the primary key, as it is the reference point of the relationships Then we need to create a lookup field, we do this using the 'lookup wizard'. At the bottom of the drop down list is Lookup wizard, once clicked brings up this wizard menu box.

  2. GCSE Book DataBase Project

    I will purchase a 128mb memory stick as it is cheaper than the others and I don't need much memory to hold the work. The one I'm going to purchase is underneath. It costs �6.70 this is a cheap reliable alternative to saving work apart from using the unreliable school network.

  1. Health and Safety Issues in ICT

    It is generally considered that a maximum of 1,500 ANSI lumens is adequate for projection equipment in most classroom environments, except in the most extreme ambient lighting conditions, where it is advised that window blinds be used rather than increasing the brightness of the projector.

  2. Computer study project outline - library and book club database.

    Testing all the algorithms and debugging- 10 days. 9. Designing the software- 10 days. 10. Documentation and report making- around 18 days. Hardware used I am using a variety of different hardware for this project: 1. Laptop: I am using an HP Pavilion dv3 Series laptop.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work