y11 revision jan 2010. testing validation (ensuring data is sensible) verification (ensures data is...

16
Y11 Revision Jan 2010

Upload: kelley-butler

Post on 28-Dec-2015

215 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Y11 Revision Jan 2010. Testing Validation (ensuring data is SENSIBLE) Verification (ensures data is correct) – visual check when entering data also retyping

Y11 Revision Jan 2010

Page 2: Y11 Revision Jan 2010. Testing Validation (ensuring data is SENSIBLE) Verification (ensures data is correct) – visual check when entering data also retyping

Testing• Validation (ensuring data is SENSIBLE)• Verification (ensures data is correct) – visual check when entering data

also retyping such as password (double entry).•  • Check digit —single digit computed from data to check for errors. • Eg 5432 4 sum5432 = 14. 14mod10 = 4 last digit. This can be used to

check other digits are correct. Mod gives remainder.•  • Checks include – Data type check, Length check and Range check. 

– Data type = if data type is number test with text i.e. A, you should get an error explaining wrong data type.

– Length—the field length for a maximum number 99 is 2 which means no more than 2 digits. A length check would be to try and enter more characters than are allowed.

– Range—for numeric fields including number, date and currency a validation rule specifies a “sensible” range. Example the cost o f items on a takeaway menu might have the following validation— price >= 1 and <= 25, check digit

Page 3: Y11 Revision Jan 2010. Testing Validation (ensuring data is SENSIBLE) Verification (ensures data is correct) – visual check when entering data also retyping

Range Check• A range check will check data within, outside the range and

on the boundary.• Normal— valid within the range.• Extreme—valid but are on the boundary.• Abnormal—invalid data below and above the range

9 | 10… …20 | 21

Extreme (10,20)

Normal (11..19)

Abnormal (<10 and >20)

Data must be

>9 AND <21

Page 4: Y11 Revision Jan 2010. Testing Validation (ensuring data is SENSIBLE) Verification (ensures data is correct) – visual check when entering data also retyping

Life cycle• Analysis – analyse the information requirements of the system including

inputs, processing and outputs.• Design – based on the requirements produced during the analysis stage

design the interface, processing and output (reports etc..) Also design a hardware specification to determine what hardware the system will run on.

• Development – create the system, make database tables, forms, queries, reports, write software and install the hardware.

• Test the system to make sure it meets requirements.• Implementation – put the new system “live” so the end users can start suing

it.• Evaluation – evaluate the system to ask if meets the needs of the user and

consider how it might be improved in future releases.• Maintenance – ongoing maintainence will be required to fix small bugs,

backup files etc..• Documentation – user guides and other technical documents will need to be

created to help the user understand the system and to help technical personnel maintain it.

Page 5: Y11 Revision Jan 2010. Testing Validation (ensuring data is SENSIBLE) Verification (ensures data is correct) – visual check when entering data also retyping

Implementation

• There are 3 ways to “rolll out” a new system• Direct – stop using the current system and start using

the new. Adv – quickest, cheapest Disadv – if the new system is buggy and fails there will not be an old one to fall back on.

• Parallel – run the old system and new system at the same time. Adv – the old system can be used if the new system fails. Disadv – a lot of work to maintain two systems side by side.

• Phased – divide a large project into phases and release at different times. Adv – smaller phases can reduce the risk of too many problems at the same time. Disadv – it can take longer to roll out a new system.

Page 6: Y11 Revision Jan 2010. Testing Validation (ensuring data is SENSIBLE) Verification (ensures data is correct) – visual check when entering data also retyping

Implementation electronic register

• Direct – all year groups use electronic register.– Adv – quick – – Disadv – no “old” system to fall back on if there are problems

with the new system.

• Parallel – Use paper register with electronic register for several weeks– Adv – if new system has problems the paper register still have

the data– Disadv – using both systems at same time means more work.

• Phased – Phasing in the system – Upper school first – once this is stable then – lower – then middle school.– Adv – problems are smaller so more managable.– Diadv – takes longer to implement the whole system.

Page 7: Y11 Revision Jan 2010. Testing Validation (ensuring data is SENSIBLE) Verification (ensures data is correct) – visual check when entering data also retyping

Robots

• Robots are machines that can act automatically.

• What are they used for?– Areas that are dangerous – i.e. bomb

disposal.– Repetitive work – spot welding, spray

painting, lifting and moving boxes, drilling, stamping (metal into shapes)

Page 8: Y11 Revision Jan 2010. Testing Validation (ensuring data is SENSIBLE) Verification (ensures data is correct) – visual check when entering data also retyping

Robots Advantage/Disadvantage

• Can work 24 7 365 – almost.

• Can be more accurate• Can work in hazardous

environments• Don’t take breaks• Don’t go on strike• They don’t charge by the

hour

• Expensive to purchase• If there is an error they

will need to be reset (unless capable of self detect)

• Need reprogramming for new tasks

• Expensive to repair/maintain

Page 9: Y11 Revision Jan 2010. Testing Validation (ensuring data is SENSIBLE) Verification (ensures data is correct) – visual check when entering data also retyping

Robots social impact

• Workers made redundant

• Deskilling of skilled and semiskilled workforce

• Workers need to retrain /relocate

• Workers don’t need to work in dangerous environments

• New jobs are created to maintain, develop and design robots

• Production cost of goods has come down.

Page 10: Y11 Revision Jan 2010. Testing Validation (ensuring data is SENSIBLE) Verification (ensures data is correct) – visual check when entering data also retyping

RAM / ROM

• RAM random access memory

• Volatile – data lost when power switched off

• Data can be changed• Data is stored temporarily• RAM – is working

memory and holds data that is being worked on.

• ROM – read only memory• Non-volatile – data not

dependent on power• Read only – can’t change

data• Data is stored

permanently• ROM – holds data that

needs to be read/copied only such as software on CDs or ROM BIOs that gives the computer basic instructions when it is started.

Page 11: Y11 Revision Jan 2010. Testing Validation (ensuring data is SENSIBLE) Verification (ensures data is correct) – visual check when entering data also retyping

Control / Data Logging• Control – input/processing/output• Real time processing –• Input sensors – temp, pressure, light

etc..• Control – if input > X then swtich

output On/Off.• Output – light, buzzer, motor etc..

• Data Logging – • Input(sensors)storage (data

logger)/logging intervals/analysis• Input sensors, temp, humidity, pH.• Interval – every 30s over 5 mins =

10 data points. Every 30 mins over 24 hrs = 48 data points.

• Data copied into spread sheet to analyse and create graphs

• Analogue – continuous value – continuous temperature increase.

• Digital – exact value – i.e. 20c• Analogue Digital Convertor ADC –

converts analogue to digital data. Computers only work with digital data.

Page 12: Y11 Revision Jan 2010. Testing Validation (ensuring data is SENSIBLE) Verification (ensures data is correct) – visual check when entering data also retyping

Internet as Data Source

• Lots of information on many topics

• Quick to search• Many sites updated

frequently (books can become out of date)

• Information interactive – i.e. discussion groups can ask questions and get answers

• Information can be inaccurate or wrong

• Information may be offensive

• With so much information it can be difficult to sift through.

• May be violating copyright if not sure who owns it.

Page 13: Y11 Revision Jan 2010. Testing Validation (ensuring data is SENSIBLE) Verification (ensures data is correct) – visual check when entering data also retyping

Multi media

• Mutli media documents can include power point presentations and web pages.

• Can have wide variety of font sizes, styles and colours.

• Can include images.• Can include links.• Can include sounds.• Can include video.• Can include animation.

Page 14: Y11 Revision Jan 2010. Testing Validation (ensuring data is SENSIBLE) Verification (ensures data is correct) – visual check when entering data also retyping

Data security 1

• Password protected– Password needed to

access data– Changing passwords

regularly prevents guesses

– Mixing letter and numbers makes password stronger.

– Forgetting password can prevent access to data

• Firewall– Prevents unauthorised

access to computers connected to the internet.

– Does not protect agains virus

– Does not protect against internal attacks – i.e. students within the school.

Page 15: Y11 Revision Jan 2010. Testing Validation (ensuring data is SENSIBLE) Verification (ensures data is correct) – visual check when entering data also retyping

Data security 2

• Biometric data– Thumb or retinal scan

• Restrict physical access– Locks on computer rooms– Motion sensor /alarms– User’s might forget swipe

card to get in

• Anti virus software– Can detect viruses– Has to be kept up-to-date

to be effective.

• Regular backups– Lost data can be recovered

from copies– Copies should be kept off

site incase of fire– Need to be copied regularly

to be effective

Page 16: Y11 Revision Jan 2010. Testing Validation (ensuring data is SENSIBLE) Verification (ensures data is correct) – visual check when entering data also retyping