Uploaded by Giaa

8. VALIDATION & VERIFICATION (2)

advertisement
Evaluation of Information Gathered Electronically
There is a wide array of data available on the internet from a variety of
sites. Not all the information found on the internet is accurate or reliable.
Reliability is the extent to which the information can be depended on to be
accurate.
Reliability has four main attributes:
 Authenticity
 Lack of bias
 Currency
 Relevance
Authenticity is where the information is real or true. This means that you
can rely on the information to be accurate and safe to use.
Lack of bias means that the information is presented in its entirety and not
filtered to focus on one or more outcome. It must also be free from personal
opinions.
Currency means that the information is up to date. Older information might
be out of date and no longer applicable to the present day.
Relevance means the data is appropriate to be used for the intended
application.
Information that is retrieved from the internet or other sources should have
these attributes for it to be deemed reliable and therefore safe to use.
Information should be checked across multiple independent sources to
determine if the information is factually the same and presented in the
same way. Sites where users can edit the content and information are not
reliable sources of information. Especially if there is not a professional or
reputable company fact checking and overseeing the site.
Validation
Validation is an automatic computer check to ensure that the data entered is
sensible and reasonable. It does not check the accuracy of data. The
program looks at the values entered into it and determines if they make
sense based on rules that are programmed into it. It is used to determine if
the data entered is incomplete, inaccurate or unreasonable. If the user enters
a wrong value that still meets the requirements of the rules the data will be
accepted by the program.
For example, if the time is 10:30am but the user enters 10:40am. The
computer will check, and the hour and minutes values are both within
acceptable limits so the computer will accept 10:40am even though it is not
the correct time. If the user enters 26:30am or 10:70am the computer will not
accept the data because the values are outside the expected limits.
Types of Validation
There are several validation checks that can be used to check the data that
is being entered.
Presence Checks: Presence checks are used to check that data has been
entered into a field and that it has not been left blank. For example, a
database storing the names of students would require the surname field for
each student to contain data. However, this check would not ensure that the
correct surname was entered for the student.
Data-type checks: Data-type checks are used to check that an entered
value is of a particular type. When a table in a database is created, each field
is given a data type. Data may be of typed text, memo, number, date/time,
and so on. When data is entered into a specific field, the database will check
to ensure that the data is of the correct type. If not, an error message will be
displayed and the data will have to be re-entered.
Length checks: Length checks are used to check that the number of
characters entered in a field does not exceed the number allocated for the
field or is not fewer than specified. For example, a password, which has to
be 6 or more characters, so A123BC would validate, but AB123 would not.
Range checks: Range checks are used to check whether data is within a
range of possible values. For example, when entering the months of a date
of birth, the range of acceptable numbers lies in the range 1 to 12.
Format checks: Format checks are used to check that the data is entered
in the format specified by the software. For example, a car registration
number should consist of one to three letters followed or preceded by one to
four numbers.
Consistency checks: Consistency checks are checks that ensures that the
data does not contradict other data in the set by checking to see if the current
value is in contradiction with other data, reference data or rules. For example,
a consistency check is often run to ensure a package's shipping date is not
before the order date.
Reasonableness checks: Reasonableness checks are used to compare an
input value with expected reasonable values or testing it based on set rules.
For example, a field that requires “number of passes in CSEC” may flag an
entry of 55 because the rule might say a reasonable range is between 0 and
5.
Verification
Verification is checking that data which has already been entered into a
system matches the data on the source document. For example, going
through a set of values on a sheet and ensuring they match the values
entered into the computer. Verification is usually carried out by humans.
There are two main types of errors that can be found by verification:
 Typographical errors where the user types in the data wrong and there
may be missing or additional characters.
 Transposition errors where the user switches two adjacent characters
in a number or string.
There are two main methods of verification that detects the errors above:
 Double entry: Double entry is where the user enters the data twice and
compares the two copies. This effectively doubles the workload, and as
most people are paid by the hour, it costs more too. If the user enters the
same error twice then the two copies will still match. For example, double
entry is used when inputting a new password to reduce the chance of the
user entering the wrong password. If the user enters the same wrong thing
twice (for example if caps lock is on) the two copies will match and no
error will be detected.
 Proofreading: Proofreading data involves someone checking the data
entered against the original document. It may be the same person who
entered the data or another person. This is also time-consuming and costly.
Download