• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Verification, validation and input masks

Extracts from this document...

Introduction

Verification, validation and input masks Verification is when a human, through proofreading, checks data. You can do this in several ways: � Proof read the work on the monitor or on a print out � Check work on a monitor/print out with a manual copy � Get somebody else to check the work for you. � Two people typing in the same data, and if the data is the same it is accepted for processing. The only drawback to this is the unlikely event that the two people actually make the same mistake, and the wrong data is inputted. The advantages of verification are that data is less likely to be inaccurate. For many companies such as banks, data being accurate is crucial. However, it does take time to check all the data, and in cases such as having two people entering the data, this is using another person that could be doing other more important work, and two wages need to be paid which would lose money. ...read more.

Middle

For example, upon entering peoples ages, there are not likely to be any people older than 130, so you could set it up so that this anything higher than this number could not be inputted. � Presence check - When a code is entered that checks if there is actually something in the field. This would be used in a field which must have some data entered into it, such as a primary key field which would define each entry into the database. � List check - This only allows certain data to be entered. For example, "Title." We know that there are only a certain amount of titles which could be entered, Mr, Mrs, Miss, etc. So we could enter them all into the computer, and if anything else was entered an error message would be displayed and the data could not be entered. The advantages of validation: � There is less chance of making typing errors as the computer checks all your data for you, and you do not have to look through the document so carefully for errors, therefore this is a timesaver. ...read more.

Conclusion

The disadvantages of input masks are: � When entering names, you could set it up so that the first letter of the 1st name, and the 1st letter of the surname are capitalised. However when it comes to names such as McHugh, the check would not allow the third letter of this name to be capitalised. � Like validation rules, they can take a considerable amount of time to set up; time that could be better spent doing other things. The following characters can be used to set up input masks. 0 - A number required 9 - A number optional L - Letter must be entered ? - A letter optional. > - A capital letter < - A lowercase letter If you wanted to set an input mask up for a postcode, you would do so in the following manner: An example of a postcode may be CW5 6JY. The input mask for this would be LL09 0LL The "Ls" for capital letters, and the 9 would be there since some postcodes do have an extra number on the end, but not all therefore the number would be optional. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE ICT Systems and Application section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a star student thought of this essay

4 star(s)

Response to the question

In summary, the report shows clear understanding of the three methods of inputting data into an Microsoft Access file. However more could be said, regrading the reason why a user would implement the methods. The report states how verification is ...

Read full review

Response to the question

In summary, the report shows clear understanding of the three methods of inputting data into an Microsoft Access file. However more could be said, regrading the reason why a user would implement the methods. The report states how verification is undertaken, and the drawbacks to this approach. This section is quite good, as this shows the examiner that the work is detailed and this gives an accurate view of what 'Verification'. is. The report doesn't contain any screenshots, which would make the section 'Validation' more clear and this would enable the examiner to visualize the writing. On the flip side, the paragraph is well written, and detailed. If the student were to include a number of screenshots of Microsoft Access, this would re-enforce their background understanding of their written knowledge.

Level of analysis

The three different paragraph are well explained and the student clearly understands how all three methods work. Although for high marks, the student could include real examples of their own database, and explain why it's necessary to include these. There is little information on why the user needs to implemented the three methods, which would allow the student to evaluate their background knowledge.

Quality of writing

The presentation of the report is a block of text, which makes it quite difficult to read when going though the report. The report should contain line breaks, by splitting the report into three different sections. These would include 'Verification', 'Validation' and 'Input Masks'.


Did you find this review helpful? Join our team of reviewers and help other students learn

Reviewed by danielbeal 22/02/2012

Read less
Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE ICT Systems and Application essays

  1. Different types of technology How I use ICT at home and at school

    Disadvantages (How it does not meet my needs) However, Facebook can be quite deceiving. While it may make me think I have a social life. It simply gives the illusion. The social life it makes me think I have is simply created online and it doesn't mean I have a social life in real life.

  2. Explain the difference between primary and secondary sources of data, with examples.

    Some methods of data collection are seen as more reliable than others. For example on a questionnaire people will often lie or not tell the truth (e.g. ticking the box to say how much you earn). Whereas in an interview face-to-face people will tell the truth a lot more and

  1. Advantages &amp;amp; disadvantages of ICT

    In business, information provided by a computer can be used to aid decision-making. Levels of information: 1. Operational Information is a record of all events and transactions within an organisation. A record must be kept of all payments and orders.

  2. Health and Safety Issues in ICT

    Ensure that the room is well ventilated by using air conditioning if available. Ideally, blinds should be provided to ensure that users do not suffer from glare. Screens should be regularly cleaned.

  1. Creating a computer system for a video rental shop

    There are many advantages to a computer based rather than a non-computerised system these advantages include: - * Computer systems can be backed up so that if there is a fire or the computers contract a virus, the files are not lost altogether.

  2. This project is designed to help non-computerized library to easily keep track of their ...

    * After a wait for one weeks. if he dose not still return the book then the librarian sends a warning notice and in the members status he is written late returner. * And after a wait for two weeks if the book still not returned then membership is cancelled

  1. ICT Report 2b: ICT in Organisations

    * The customer cancels the order an hour later. * Sales cancel the order on the computer system. The system automatically sends the cancellation to Operations and the production run is stopped, before any product has been made. * The system cancels the raw materials order. * No product is wasted, so very little money is lost.

  2. Computer study project outline - library and book club database.

    Time Planning This will take a lot of time as this not just one project but it is a mix of two projects. 1. Choosing the topic- 7 days 2. Recognizing the problem- 3 days 3. Planning the project- this took me 10 days.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work