rnj 10/02/091 3 computing system fundamentals 3.6 errors 3.6.2 prevention and detection
TRANSCRIPT
![Page 1: RNJ 10/02/091 3 Computing System Fundamentals 3.6 Errors 3.6.2 Prevention and Detection](https://reader035.vdocuments.us/reader035/viewer/2022072011/56649de75503460f94ae13d6/html5/thumbnails/1.jpg)
RNJ 10/02/09 1
3 Computing System Fundamentals
3.6 Errors
3.6.2 Prevention and Detection
![Page 2: RNJ 10/02/091 3 Computing System Fundamentals 3.6 Errors 3.6.2 Prevention and Detection](https://reader035.vdocuments.us/reader035/viewer/2022072011/56649de75503460f94ae13d6/html5/thumbnails/2.jpg)
RNJ 10/02/09 2
Verification – checking the data on the source document are Exactly the same as those being entered
Validation - checking the data input into the system are Acceptable (make sense).
Methods
![Page 3: RNJ 10/02/091 3 Computing System Fundamentals 3.6 Errors 3.6.2 Prevention and Detection](https://reader035.vdocuments.us/reader035/viewer/2022072011/56649de75503460f94ae13d6/html5/thumbnails/3.jpg)
RNJ 10/02/09 3
is it exact? is it equal? is it accurate? has to involve humans.
Verification
![Page 4: RNJ 10/02/091 3 Computing System Fundamentals 3.6 Errors 3.6.2 Prevention and Detection](https://reader035.vdocuments.us/reader035/viewer/2022072011/56649de75503460f94ae13d6/html5/thumbnails/4.jpg)
RNJ 10/02/09 4
Visual verification i.e. proof-reading Double entry verification - the
data from the source document are entered twice, the keyboard may lock and the computer sound an alarm if the second item is not the same as the first.
Verification methods
![Page 5: RNJ 10/02/091 3 Computing System Fundamentals 3.6 Errors 3.6.2 Prevention and Detection](https://reader035.vdocuments.us/reader035/viewer/2022072011/56649de75503460f94ae13d6/html5/thumbnails/5.jpg)
RNJ 10/02/09 5
is it reasonable? is it possible? is it acceptable? computers can be programmed to
validate.
Validation
![Page 6: RNJ 10/02/091 3 Computing System Fundamentals 3.6 Errors 3.6.2 Prevention and Detection](https://reader035.vdocuments.us/reader035/viewer/2022072011/56649de75503460f94ae13d6/html5/thumbnails/6.jpg)
RNJ 10/02/09 6
Presence check - some fields are required (must contain data) e.g. customer account number on a sales order.
Range check - do the data fall within a certain range e.g. an age outside the range 0 to 120 cannot be entered
Validation methods
![Page 7: RNJ 10/02/091 3 Computing System Fundamentals 3.6 Errors 3.6.2 Prevention and Detection](https://reader035.vdocuments.us/reader035/viewer/2022072011/56649de75503460f94ae13d6/html5/thumbnails/7.jpg)
RNJ 10/02/09 7
Character count e.g. a French postcode must have 5 characters.
Format check e.g. a UK postcode has the pattern TTN NTT, where T is a letter and N is a number.
Validation methods
![Page 8: RNJ 10/02/091 3 Computing System Fundamentals 3.6 Errors 3.6.2 Prevention and Detection](https://reader035.vdocuments.us/reader035/viewer/2022072011/56649de75503460f94ae13d6/html5/thumbnails/8.jpg)
RNJ 10/02/09 8
Digit calculated from a data item number, then tagged onto that number and entered into the computer, the latter can then calculate back to validate it.
Check digits
![Page 9: RNJ 10/02/091 3 Computing System Fundamentals 3.6 Errors 3.6.2 Prevention and Detection](https://reader035.vdocuments.us/reader035/viewer/2022072011/56649de75503460f94ae13d6/html5/thumbnails/9.jpg)
RNJ 10/02/09 9
Product code: 0198327633 Add digits: 0 + 1 + 9 + 8 + 3 + 2 +
7 + 6 + 3 + 3 = 41 Divide by 10: 41 div 10 = 4 mod 1 Use 1 as the check digit, product
code becomes 01983276331
Check digits - example
![Page 10: RNJ 10/02/091 3 Computing System Fundamentals 3.6 Errors 3.6.2 Prevention and Detection](https://reader035.vdocuments.us/reader035/viewer/2022072011/56649de75503460f94ae13d6/html5/thumbnails/10.jpg)
RNJ 10/02/09 10
Checks if a byte is complete, typically during data transmission
128 ASCII characters, so only 7 bits of a byte are needed, the 8th bit can be used as the parity bit
Parity
![Page 11: RNJ 10/02/091 3 Computing System Fundamentals 3.6 Errors 3.6.2 Prevention and Detection](https://reader035.vdocuments.us/reader035/viewer/2022072011/56649de75503460f94ae13d6/html5/thumbnails/11.jpg)
RNJ 10/02/09 11
Under even parity, the parity bit is set so there are an even number of 1's in the byte (0010100 would have the parity bit 0 and 1101011 would have 1)
Receiving device checks each byte for correct parity
Parity
![Page 12: RNJ 10/02/091 3 Computing System Fundamentals 3.6 Errors 3.6.2 Prevention and Detection](https://reader035.vdocuments.us/reader035/viewer/2022072011/56649de75503460f94ae13d6/html5/thumbnails/12.jpg)
RNJ 10/02/09 12
If the system is using odd parity, must be an odd number of 1's
Sender and the receiver must both be using the same parity (odd or even) - this is part of the network protocol .
Parity
![Page 13: RNJ 10/02/091 3 Computing System Fundamentals 3.6 Errors 3.6.2 Prevention and Detection](https://reader035.vdocuments.us/reader035/viewer/2022072011/56649de75503460f94ae13d6/html5/thumbnails/13.jpg)
RNJ 10/02/09 13
With groups of records, a batch total (number of records) and control total (sum of a particular field from each record) may be added to the file when the batch of records is transmitted to ensure that all are received correctly.
Batch and control totals
![Page 14: RNJ 10/02/091 3 Computing System Fundamentals 3.6 Errors 3.6.2 Prevention and Detection](https://reader035.vdocuments.us/reader035/viewer/2022072011/56649de75503460f94ae13d6/html5/thumbnails/14.jpg)
RNJ 10/02/09 14
When software is transmitted, a check sum is generated (the sum of all the instructions when treated as numbers), which gets checked before the software is executed.
Check sum