0% found this document useful (0 votes)
10 views12 pages

Lesson 8 - Validation and Verification

The document outlines the concepts of Validation and Verification in data entry systems, emphasizing the importance of ensuring data accuracy and reasonableness. It details various types of validation checks, such as range, length, type, character, format, presence, and check digits. Additionally, it provides pseudocode tasks for finding a name in an array, sorting numbers, and checking age and height for fairground rides.

Uploaded by

abirmuhammad009
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views12 pages

Lesson 8 - Validation and Verification

The document outlines the concepts of Validation and Verification in data entry systems, emphasizing the importance of ensuring data accuracy and reasonableness. It details various types of validation checks, such as range, length, type, character, format, presence, and check digits. Additionally, it provides pseudocode tasks for finding a name in an array, sorting numbers, and checking age and height for fairground rides.

Uploaded by

abirmuhammad009
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Task on Entry

• Write a pseudocode to find a name (Riya) in an


array named Patients[]

• Write a pseudocode to sort a list of 100 numbers in


ascending order.

LO: We are learning to understand the concept of Validation


and Verification
Validation and Verification

Success Criteria

Lesson Objective: • I can Understand the concept of


Validation and Verification
We are learning to understand • I can identify the different types of
the concept of Validation and Validation checks
Verification • I can analyze different validation
checks through the pseudocodes

LO: We are learning to understand the concept of Validation


and Verification
Starter- Curiosity

LO: We are learning to understand the concept of Validation and


Verification
Validation and Verification
In order for computer systems to only accept data inputs that are
reasonable and accurate, every item of data needs to be examined before
it is accepted by the system.

VALIDATION
VERIFICATION
For data entry,
VALIDATION is performed It is used to check that the
automatically by the computer data
system to ensure that only data does not change as it is being
that is reasonable is accepted entered.

LO: We are learning to understand the concept of Validation


and Verification
Types of Validation

• Range checks
• Length checks
• Type checks
• Character
checks
• Format checks
• Presence
checks
• Check digits.

LO: We are learning to understand the concept of Validation


and Verification
Types of Validation
A RANGE CHECK checks that only numbers within a specified range are
accepted.
A LENGTH CHECK checks either: that data contains an exact number of
characters,
that the data entered is a reasonable number of characters
A TYPE CHECK checks that the data entered is of a given data type
A CHARACTER CHECK checks that when a string of characters is entered it does
not
contain any invalid characters or symbols
A FORMAT CHECK checks that the characters entered conform to a pre-defined
pattern
A PRESENCE CHECK checks to ensure that some data has been entered and the
value has not been left blank
A CHECK DIGIT is the final digit included in a code; it is calculated from all the
other digits in the code
LO: We are learning to understand the concept of Validation
and Verification
Range Check

Length Check

LO: We are learning to understand the concept of Validation


and Verification
Type Check

Presence Check

LO: We are learning to understand the concept of Validation


and Verification
Verification
Verification is checking that data has been accurately copied
from one source to another – for instance, input into a
computer or transferred from one part of a computer system
to another. Verification methods for input data include:

» Double entry
 Data is entered twice, sometimes by different
operators.
 The computer system compares both entries
 If they are different outputs an error message

» Screen/visual check.
 A manual check completed by the user entering the
data.
 When the data entry is complete the data is displayed
on the screen and the user is asked to confirm that it
is correct before continuing.
LO:We
Theareuser
learning to understand
either checks thethe concept
data on theofscreen
Validation
against
and Verification
the resources that they have with them.
AFL

https://quizizz.com/admin/quiz/
58d9391a04bd40205838be3c/data-validation-and-
verification?fromSearch=true&source=null

LO: We are learning to understand the concept of Validation


and Verification
Main Activity

Task 1: State, with reasons, which validation checks you could use for the following inputs.
You may decide that more than one validation check is required.
– Entering a telephone number
– Entering a pupil’s name
– Entering a part number in the form XXX999, when X must be a letter and 9 must be a
digit.

Task 2: Write an algorithm using pseudocode to check the age and height of a child who
wants to go on a fairground ride. The age must be over 7 and under 12, the height must be
over 110 centimeters and under 150 centimeters.

Task 3: Write an algorithm using pseudocode to check that the length of a password is
between 8 and 12 characters inclusive.

LO: We are learning to understand the concept of Validation


and Verification
Plenary

Strength
Improvement
Development

LO: We are learning to understand the concept of Validation


and Verification

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy