MAT 105 Spring 2008.  An identification number is a sequence of letters and/or numbers that identifies an object, person, place, or concept  The number.

Slides:



Advertisements
Similar presentations
Chapter 16: Check Digit Systems, Continued
Advertisements

Math for Liberal Studies. An identification number is a sequence of letters and/or numbers that identifies an object, person, place, or concept The number.
Chapter 16: Check Digit Systems
The Secret Shopper Salt Lake City September 15, 2008.
Numbers in Our Pockets GCNU 1025 Numbers Save the Day.
Math for Liberal Studies.  Problems can occur when data is transmitted from one place to another  The two main problems are  transmission errors: the.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Carl Johnson Financial Literacy Jenks High School.
Math for Liberal Studies.  None of the methods we have investigated so far can detect transposition errors  In this section we will investigate new.
Need your MyMathLab card with your access code Need a Valid Address Need to know Purdue’s zip code is and your course ID for your Class You.
MAT 1000 Mathematics in Today's World Winter 2015.
MAT 1000 Mathematics in Today's World Winter 2015.
CSCI 530 Lab Authentication. Authentication is verifying the identity of a particular person Example: Logging into a system Example: PGP – Digital Signature.
Write A if the quantity in Column A is greater
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Chapter 16: Identification Numbers Lesson Plan
More to Learn Check digit –It is used to check whether a number is valid. –Both ISBN and Hong Kong Identity Card numbers contain a check digit for data.
© All Rights Reserved Barcodes How does a barcode reader work?
1 JOB APPLICATION DOS AND DON ’ TS I can complete a job application with accuracy.
MAT 1000 Mathematics in Today's World Winter 2015.
Wong Wai Ling, Lam Pui Ki Identification number  clearly identify a person or a thing Check digit  an extra digit for the purpose of error.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Topic 4 : Know the features of a current account.
Staying Safe Online Keep your Information Secure.
Illuminate Your Life. Overview CollegeScope Overview of key features Resources for faculty A quick tour (student and faculty view) Helping your students.
1 JavaScript 4 User Input Validation. 2 Input Validation One of the most useful applications of JavaScript is input validation Scripts in the page can.
Overcoming Errors. We need to be accurate all the time. Owners, bankers, investors, employees, and tax authorities rely on accurate information. ERRORS.
SAT Review 1.Which is the equation of a line that passes through the pt (7, - 1) and is to y + 2x = 1. A. y = 2x – 15 B. y = –2x + 13 C. D. 2.Line p is.
Modular Arithmetic, The Codabar System, and applications Tomás Cometto and Daniel Stokley Linear Systems 5/1/06.
Fault Tolerance CDA 5140 Spring 06 Everyday FT. Background Use of check digits for error detection on everyday applications used extensively but most.
Lecture 12.  The ISBN 10-digit uses a reverse weighting system: multiply the first digit by 10, the second by 9, the third by 8 and so on until the check.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
IDENTITY THEFT OCCURS WHEN A CRIMINAL USES ANOTHER PERSON'S PERSONAL INFORMATION TO TAKE ON THAT PERSON'S IDENTITY. IDENTITY THEFT IS MUCH MORE THAN MISUSE.
Spring 2015 Mathematics in Management Science Identification Numbers Data Security Check Digits UPCs, Routing Nos, Bar Codes Personal Data.
System Development Lifecycle Verification and Validation.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Analyzing Numerical Data: Validating Identification Numbers
Intake and Interview 1. The Intake Process 1.Taxpayer fills out Intake Sheet 2.Volunteer completes Interview 3.Check Identification 4.Review Documents.
Barcodes! Felipe Voloch These notes and the barcode program are available at /barcode.html.
Welcome to PHY2049 Physics for Engineers and Scientists II Dr. Bindell SPRING 2009 Dr. J. B. Bindell.
Registering for MyEnvironmentPlace. Go to Click Books Available.
Verification & Validation. Batch processing In a batch processing system, documents such as sales orders are collected into batches of typically 50 documents.
Joseph Kirtland Department of Mathematics Marist College
1 AQA ICT AS Level © Nelson Thornes 2008 Good quality data and information Data terms.
You. are at risk for the fastest growing crimes crime.
CSCI 530 Lab Authentication. Authentication is verifying the identity of a particular person Example: Logging into a system Example: PGP – Digital Signature.
Chapter 3 Data Control Ensure the Accurate and Complete data is entering into the data processing system.
Introduction to Bank Accounts. Questions? Why do some people choose not have a bank account? What are some advantages to having a bank account? What is.
Math for Liberal Studies. What is an identification number?  An identification number is a sequence of digits and/or numbers that identifies an object,
Check Digits Tanli Su. Introduction -identification numbers are used to easily identify people, products, books, accounts, credit cards, driver's licenses,
Weighted Codes, Codabar, ISBN & Code 39 Sol: DM.11 Classwork: worksheet Homework (day 47): worksheet.
NEW ONLINE OUTREACH TRAINER PORTAL
Don’t talk to people that you don’t know online. What would you do if someone that you don’t know threatens you? Call the police or tell a parent!! Be.
Validation and verification 1.2
Identity Theft It’s a crime!
Analyzing Numerical Data: Validating Identification Numbers
Chapter 16: Identification Numbers Lesson Plan

Keeper 8: UPC Codes S.A.S. #12 1 – 3 Credit Cards S.A.S. #
MAT 105 Spring 2008 Chapter 17: Binary Codes.
Chapter 16: Introduction
Credit Cards UPC Codes.
Objectives TO UNDERSTAND THAT CAPTURING DATA IS VALIDATED AND VERIFIED TO CHECK THAT IT IS REASONABLE AND CORRECT.
Name: Form: What Are Bar-codes

Chapter 16: Check Digit Systems, Continued
Chapter 16: Identification Numbers Lesson Plan
Lesson 3.7 Parity Error Checking
Presentation transcript:

MAT 105 Spring 2008

 An identification number is a sequence of letters and/or numbers that identifies an object, person, place, or concept  The number should unambiguously identify something: no two things should have the same ID number

 Think about the different ways you encounter ID numbers in your daily life…  License plate  Driver’s license number  Student ID number  Social Security number  Phone numbers  Credit card numbers  ISBN (International Standard Book Number)  UPC (Universal Product Code)  Many, many more…

 What happens if you go to Amazon.com and try to order something with a random credit card number?  What should happen?

 How does the computer know that the number you typed in isn’t valid?  Should the computer have to look through all the millions of credit card numbers to make sure that the one you made up isn’t on the list?

 Most ID numbers have a quick way to check to make sure that the number is valid  This is not just for security, but to detect errors  If the ID number is entered incorrectly, it is important that the error is caught; you don’t want your account to get charged for someone else’s order

 Substitution: instead of  This error is the most common, occurring almost 80% of the time  Transposition: instead of  This error accounts for around 10% of all errors  Jump transposition: instead of  This error is much rarer, accounting for only about 1% of all errors

 Most errors are detected using check digits  Check digits are extra digits attached to the ID number that are only used for checking that the ID number is valid  Many different check digit systems are used, and we will study several of them  Some check digit systems are secret so that they cannot be used to generate fake (but valid) ID numbers