0% found this document useful (0 votes)
80 views6 pages

Data Preparation Steps

This document discusses data validation, verification, and security. It provides examples of different types of validation like format checks, length checks, and range checks to ensure data is entered correctly. Verification checks that data matches the original source by methods like double entry or proofreading. The document also outlines key threats to data security like loss, corruption, or unauthorized access; and measures to keep data secure through backups, access controls, encryption, and more. It provides examples of data transmission and different transmission types like parallel and serial.

Uploaded by

James Ishaku
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
80 views6 pages

Data Preparation Steps

This document discusses data validation, verification, and security. It provides examples of different types of validation like format checks, length checks, and range checks to ensure data is entered correctly. Verification checks that data matches the original source by methods like double entry or proofreading. The document also outlines key threats to data security like loss, corruption, or unauthorized access; and measures to keep data secure through backups, access controls, encryption, and more. It provides examples of data transmission and different transmission types like parallel and serial.

Uploaded by

James Ishaku
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Data validation and verification

Validation and verification are two ways to check that the data entered into a computer is
correct. Data entered incorrectly is of little use.
Validation is an automatic computer check to ensure that the data entered is sensible
and reasonable. It does not check the accuracy of data.
For example, a secondary school student is likely to be aged between 11 and 16. The
computer can be programmed only to accept numbers between 11 and 16. This is
a range check.

However, this does not guarantee that the number typed in is correct. For example, a student's
age might be 14, but if 11 is entered it will be valid but incorrect.

Types of validation

There are a number of validation types that can be used to check the data that is being
entered.

Validation
How it works Example usage
type

The last one or two digits in a code


Bar code readers in supermarkets use check
Check digit are used to check the other digits
digits
are correct

A National Insurance number is in the form


Format Checks the data is in the right
LL 99 99 99 L where L is any letter and 9 is
check format
any number

Length Checks the data isn't too short or


A password which needs to be six letters long
check too long

Lookup Looks up acceptable values in a There are only seven possible days of the
table table week

Presence Checks that data has been entered In most databases a key field cannot be left
check into a field blank

Checks that a value falls within the Number of hours worked must be less than
Range check
specified range 50 and more than 0

Spell check Looks up words in a dictionary When word processing


Verification

Verification is performed to ensure that the data entered exactly matches the original
source.
There are two main methods of verification:

1. Double entry - entering the data twice and comparing the two copies. This effectively
doubles the workload, and as most people are paid by the hour, it costs more too.
2. Proofreading data - this method involves someone checking the data entered against
the original document. This is also time-consuming and costly.
Data security
Data security is about keeping data safe and affects anyone relying on a computer system. If
the data on a computer system is damaged, lost, or stolen, it can lead to disaster.

Key threats to data security

Data may get:

• lost or damaged during a system crash - especially one affecting the hard disk
• corrupted as a result of faulty disks, disk drives, or power failures
• lost by accidentally deleting or overwriting files
• lost or become corrupted by computer viruses
• hacked into by unauthorised users and deleted or altered
• destroyed by natural disasters, acts of terrorism, or war
• deleted or altered by employees wishing to make money or take revenge on their employer
Keeping data secure

Measures that can be taken to keep data secure include:

• making regular backups of files (backup copies should be stored in fireproof safes or in
another building)
• protecting yourself against viruses by running anti-virus software
• using a system of passwords so that access to data is restricted
• safe storage of important files stored on removable disks, eg locked away in a fireproof and
waterproof safe
• allowing only authorised staff into certain computer areas, eg by controlling entry to these
areas by means of ID cards or magnetic swipe cards
• always logging off or turning terminals off and if possible locking them
• avoiding accidental deletion of files by write-protecting disks
• using data encryption techniques to code data so that it makes no apparent sense

Online banking

When you bank online, after you’ve logged in, you will notice that the http in the address bar
has changed to https. This indicates that a secure connection between your computer and the
bank's computer has been established. Data sent between the two computers is encrypted so
that anyone trying to intercept your data will receive meaningless data. The data can only be
decrypted into readable data by using a key that is known only to the two computers - yours
and the bank's.

Data transfer
Data transfer files have standards so they can be transferred to any computer, hardware or
application. Graphics, text, sound or numbers don’t need to be transferred on physical media
anymore.
Data file types

Data files are stored in a number of formats, the formats depend on which application created
the file to begin with. For example, Microsoft Word stores files as *.doc but Adobe
Photoshop stores files in a different format - *.psd. The file extension identifies the file's
format.

Opening files of different formats

When data is transferred from one computer to another, the computer receiving the data file
may not be able to read the format without the right application installed. For example, an
image created in Adobe Photoshop and saved as a *.psd file (Photoshop's format) would not
be readable by Microsoft Paint.

This is becoming less of a problem as standardisation matures and applications expand the
list of file types they're able to read.

Rapid transfer of data

Files can be easily transferred and shared across the globe using the internet. A file could be:

• emailed as an attachment
• sent over instant messenger
• downloaded from a website/web server
• accessed over a private network
Documents, eg a spreadsheet, can be stored on a web server and then accessed via any
computer with an internet connection and a web browser. Collaborative working is possible
too, where multiple people contribute to the same document.

This makes the world very small as far as transfer of data is concerned. It has allowed many
companies to outsource some or all of their operations. This is where companies transfer
activities such as ticket processing for airlines or telephone banking queries to workers in a
country where wages and running costs are relatively low. Often the time difference between
the two countries gives even greater convenience.

DATA TRANSMISSION
Data transmission is a means of transmitting digital or analog data over a communication
medium to one or more devices. It allows the transmission and communication of devices in
different environments: point-to-point, point-to-multipoint, or multipoint-to-multipoint.
Data transmission can either be analog or digital, but is mostly earmarked for sending and
receiving digital data. As such, data transmission is also referred to as digital transmission or
digital communications.

It works when a device aims to transmit a data object or file to one or multiple recipient
devices. The digital data comes from the source device in the form of digital bit
streams. These data streams are positioned over a communication medium for transmission
to the destination device. An outward signal can either be baseband or passband.
Aside from external communication, data transmission may be done internally, between
different parts of the same device. The sending of data to a processor from the random access
memory (RAM) or hard disk is a form of data transmission.

Types of Data Transmission

• Parallel transmission – Several bits are transmitted together simultaneously within


one clock pulse rate. It transmits quickly, as it utilises several input and output lines
for sending the data.
• Parallel transmission uses a 25-pin port with 17 signal lines and 8 ground lines. The
17 signal lines are divided as follows:

• 4 lines – initiate handshaking
• 5 lines – communicate and notify errors
• 8 lines – transfer data
• Serial Transmission – Data is sent bit by bit from one computer to another in two
directions. Each bit has a clock pulse rate. Eight bits are transmitted at a time with a
start and stop bit known as a parity bit, which is 0 and 1, respectively. Data cables are
used when transmitting data across a longer distance. The data cable has D-shaped 9
pin cable that connects the data in series.

Comparison between Serial and Parallel Transmission

Basis for Comparison Serial Transmission Parallel Transmission


Data flows in multiple
Data flows in 2 directions,
Definition directions, 8 bits (1 byte) at
bit by bit
a time
Cost Economical Expensive
Number of bits transferred
1 bit 8 bits or 1 byte
per clock pulse
Speed Slow Fast
Used for long distance Used for short distance
Applications
communication communication
Example Computer to computer Computer to printer

Types of Serial Transmission

There are two types of serial transmission – synchronous and asynchronous. Both of these
transmission methods use bit synchronisation.
Bit synchronisation is necessary to identify the beginning and end of the data transmission.

Bit synchronisation supports the receiving computer to recognise when data begins and ends
during a transmission. Therefore, bit synchronisation offers timing control.

• Asynchronous Transmission – In asynchronous transmission data moves in a half-


paired approach, 1 byte or 1 character at a time. It sends the data in a constant current
of bytes. The size of a character transmitted is 8 bits, with a parity bit added at the
beginning and at the end, making it a total of 10 bits. It doesn’t need a clock for
integration—rather, it utilises the parity bits to inform the receiver how to translate the
data. It is straightforward, quick, and cost-effective, and it doesn’t require 2-way
communication.
• Synchronous Transmission – In synchronous transmission, data moves in a
complete paired approach in the form of chunks or frames. Synchronisation between
the source and target is required so that the source knows where the new byte begins,
since there are no spaces between the data. This method offers real-time
communication between linked devices.
Synchronous and Asynchronous Transmission

Asynchronous
Point of Comparison Synchronous Transmission
Transmission
Transmits data in the form Transmits 1 byte or
Definition
of chunks or frames character at a time
Speed of Transmission Quick Slow
Cost Expensive Cost-effective
Time Interval Constant Random
Are there gaps between the
Yes No
data?
Chat Rooms, Telephonic
Examples Conversations, Video Email, Forums, Letters
Conferencing

REFERENCES
https://teachcomputerscience.com/data-transmission/
https://www.bbc.co.uk/bitesize/guides/zdvrd2p/revision/1

See the above links for further reading too

You might also like