1 3 Computing System Fundamentals 3.6 Errors. 3.6.2 Prevention and Recovery.

Slides:



Advertisements
Similar presentations
2.2 Validation & Verification
Advertisements

Commercial Data Processing Lesson 3: Data Validation.
3.1 Data and Information –The rapid development of technology exposes us to a lot of facts and figures every day. –Some of these facts are not very meaningful.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Chapter 8 USING ACCOUNTING APPLICATIONS. Organization of Accounting Applications.
Processing Integrity and Availability Controls
Validation and Verification Today will look at: The difference between accuracy and validity Explaining sources of errors and how they could be overcome.
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
Processing Integrity and Availability Controls
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
TRANSACTION PROCESSING SYSTEM Liew Woei Song Muhammad Hofiz Achoson.
Validation and Verification
CHAPTER 6 ELECTRONIC DATA PROCESSING SYSTEMS
Standard Grade Computing COMMERCIAL DATA PROCESSING CHAPTER 13.
RNJ 10/02/091 3 Computing System Fundamentals 3.6 Errors Prevention and Detection.
Module Designing Computer-based Information Systems
Transaction Processing System
GCSE ICT Checking data. Why do errors happen? Computers do not make mistakes. However if incorrect data is put in errors happen. In ICT this is called.
3.2 Data Checking.
CHAPTER 2: COMPUTER-SYSTEM STRUCTURES Computer system operation Computer system operation I/O structure I/O structure Storage structure Storage structure.
Error Detection and Correction
Copyright © 2007 Pearson Education Canada 1 Chapter 13: Audit of the Sales and Collection Cycle: Tests of Controls.
CDP Standard Grade1 Commercial Data Processing Standard Grade Computing Studies.
MATSEC Past Papers May 2010 Paper 1 Paper 2A. What is the difference between each of the following pairs of items? Syntax Error Caused by forgetting certain.
Data entry: Validation
Checking data GCSE ICT.
Checking data Chapter 7 Prepared by:Sir Mazhar Javed.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Objectives of Control The objectives of control are:  To ensure that all data are processed  To preserve the integrity of maintained data  To detect,
I.Information Building & Retrieval Learning Objectives: the process of Information building the responsibilities and interaction of each data managing.
Manipulating data Data management: validation and verification.
System Development Lifecycle Verification and Validation.
1.The Nature, Impact and Issues of Information Technology 1.6Strategies used to Prevent Deliberate and Accidental Illegal Actions.
Information Processing Content covered  Data and information  Information Qualities  Data/Information Processing  Commercial Information Processing.
 2001 Prentice Hall Business Publishing, Accounting Information Systems, 8/E, Bodnar/Hopwood Chapter 10 Electronic Data Processing Systems.
Test and Review chapter State the differences between archive and back-up data. Answer: Archive data is a copy of data which is no longer in regular.
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
AS computing Validation and verification. Introduction It is important to maintain the integrity of any database of information. Any data item must always.
AS Computing Data Transmission and Networks. Transmission error Detecting errors in data transmission is very important for data integrity. There are.
DATA ERRORS. Introduction The processing of incorrect data can produce ridiculous and embarrassing output. Errors can take time to sort out and can be.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Verification & Validation F451 AS Computing. Why check data? It’s useless if inaccurate. Also, wrong data: Can be annoying Can cost a fortune Can be dangerous.
Verification & Validation. Batch processing In a batch processing system, documents such as sales orders are collected into batches of typically 50 documents.
Review of Data Capture. Input Devices What input devices are suitable for data entry? Keyboard Voice Bar Code MICR OMR Smart Cards / Magnetic Stripe cards.
Errors!. Where do errors occur? Anywhere data is transferred, processed, stored, etc. Input user error Storage magnetic hard drive errors physical tampering.
Data Collection. Data Capture This is the first stage involved in getting data into a computer Various input devices are used when getting data to the.
Data Verification and Validation
Chapter 3 Data Control Ensure the Accurate and Complete data is entering into the data processing system.
Verification & Validation
Validation & Verification Today will look at: The difference between accuracy and validity Explaining sources of errors and how they could be overcome.
Data Transmission and Networks Transmission error checking & correcting.
Input, Output and Processing.. What data needs to be input into the system? Identify the sources – i.e. where does the data come from? What is the volume.
( ) 1 Chapter # 8 How Data is stored DATABASE.
 At the end of the class students should:  distinguish between data and information.  explain the characteristics and forms of Information Processing.
Data Capture Forms What are they?. Example 1 Example 2.
GCSE ICT LESSON 5 Booklet Sections: 6 & 7 Data Capture & Checking Data.
File-System Management
Validation and verification 1.2
DATA COLLECTION Data Collection Data Verification and Validation.
Processing Integrity and Availability Controls
Validation Bury College.
Managing the IT Function
Fun gym Cambridge Nationals R001.
Fun gym Cambridge Nationals R001.
Objectives TO UNDERSTAND THAT CAPTURING DATA IS VALIDATED AND VERIFIED TO CHECK THAT IT IS REASONABLE AND CORRECT.
How can errors in data occur when using an ICT system?
Verification and Validation
Presentation transcript:

1 3 Computing System Fundamentals 3.6 Errors

3.6.2 Prevention and Recovery

3 Methods Verification - checking the data on the source document are Exactly the same as those being entered. Validation - checking the data input into the system are Acceptable (make sense/are possible).

4 Verification Is it exact? Is it equal? Is it accurate? Verification has to involve humans.

5 Verification methods Visual verification i.e. proof-reading. Double entry verification - the data from the source document are entered twice, the keyboard may lock and the computer sound an alarm if the second item is not the same as the first.

6 Validation Is it reasonable? Is it possible? Is it acceptable? Computers can be programmed to validate.

7 Validation methods Presence check - some fields are required (must contain data) e.g. customer account number on a sales order. Range check - do the data fall within a certain range e.g. an age outside the range 0 to 120 cannot be entered.

8 Validation methods Character count e.g. a French postcode must have 5 characters. Format check e.g. a UK postcode has the pattern TTN NTT, where T is a letter and N is a number.

9 Check digits A digit calculated from a data item number, then tagged onto that number and entered into the computer, the latter can then calculate back to validate it.

10 Check digit example Product code: Add the digits: = 41. Divide by 10: 41 div 10 = 4 mod 1 So use 1 as the check digit, the product code becomes

11 Parity bits This system checks if a byte is complete, typically during data transmission. There are 128 ASCII characters, so only 7 bits of a byte are needed, the 8th bit can be used as the parity bit.

12 Parity bits Under even parity, the parity bit is set so there are an even number of 1's in the byte ‣ would get the parity bit 0 and ‣ would get a 1. The receiving device checks each byte for correct parity.

13 Parity bits If the system is using odd parity, there must be an odd number of 1’s. The sender and the receiver must both be using the same parity (odd or even) - this is part of the network protocol.

14 Batch and control totals With groups of records, a batch total (number of records) and control total (sum of a particular field from each record) may be added to the file when the batch of records is transmitted to ensure that all are received correctly.

15 Check sums When software is transmitted, a check sum is generated (the sum of all the instructions when treated as numbers), which gets checked before the software is executed.

16 Online processes For a data entry error in an online process, re- inputting the data is usually the most efficient method of recovery.

17 Batch processes If it is a batch process, the errors will be reported (printed out) and the batch process will continue with the next input. The entries with errors can then be corrected and included with the next batch.

18 Real-time processes With real-time processing, inputs have to be verified instantaneously - this can cause problems for control systems.

19 Transmission errors Transmission errors can be caught by parity bits and/or check sums can be automatically corrected in some circumstances but more commonly there will be a request for a re- transmission of the data.

20 Backups Many organizations rely heavily upon computer-stored data so it must be protected. Backups are taken every day. Backup media should be stored in a fireproof safe or at a different location.

21 Backups They are often rotated over 2 weeks but can be kept for months or years. Full backups save a new copy of every file. Incremental backups save only those files which are new or have changed since the last backup.

22 Backups Archiving backs up then removes the old files from the system. Magnetic tape is a common backup medium because it is cheap and data won't need to be accessed directly, only sequentially (it is accepted that restoring a backup will not be a fast process).

23 Deliberate errors These are hardest to recover from - the offending user usually knows enough to get around any validation checks. File access permissions should be imposed by the operating system and system administrator.

24 Deliberate errors They require vigilance from the administrator. Cross-referencing data to other reliable sources will show if deliberate damage has been done.