0% found this document useful (0 votes)
12 views4 pages

Objective 12 - 13 - 14

Objective 12-13 of the Information Technology syllabus

Uploaded by

dejonaejames
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views4 pages

Objective 12 - 13 - 14

Objective 12-13 of the Information Technology syllabus

Uploaded by

dejonaejames
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

OBJECTIVE 12 – Evaluate the reliability of information obtained from online sources.

(Evaluation of information retrieved electronically for authenticity, currency, relevance, and


bias.)

The Internet is a very powerful worldwide instrument, which serves as a good source
of information.
Easy Communication:
It is very easy to access and at the same time saves time thereby allowing an individual to
manager his/her resources better and effectively
Comparatively Inexpensive and Quick Dispersion of Information:
The Internet creates a comparatively inexpensive avenue for obtaining and dissemination of
information their work.
How reliable is online information
Material such as an article, book, monograph (A monograph is a specialist work of writing (in
contrast to reference works) on a single subject or an aspect of a subject, often by a single
author, and usually on a scholarly subject.), or research paper that has been vetted by the
scholarly community is regarded as reliable, where the material has been published in
reputable peer-reviewed sources or by well-regarded academic presses.
Authenticity is assurance that information is from the source it claims to be from.
Authenticity involves proof of identity.
Currency is all about context, and it’s importance with respect to date to the argument in
which you are engage.
Relevance denotes how well information meets the decision making needs of the user.
Relevance may include concerns such as timeliness, authority or novelty of the result.
Information bias occurs when any information used in a study is either measured or
recorded inaccurately. Eg Underreporting.

OBJECTIVE #13 - Differentiate between validation and verification of data;

Data that is acquired manually must go through a series of checks before it is transferred to
backing storage.
Data verification Data verification is a check for accuracy of transcription or
copying. Example entering a password twice. In this case the
first entry is compared with the second entry.
Data validation This is a check to ensure that it follows the rule/s that apply to
it. Example; A date of birth must be entered according to a
date format (mm/yy/dd).

OBJECTIVE #14 - Identify appropriate validation and verification checks given a particular
scenario.

Methods of validation and verification


Validation checks checks.
Range check:- A method of checking the validity of input data by determining
whether the values fall within an expected range.

Reasonableness check:- A test to determine whether a value conforms to specified


criteria. Note: A reasonableness check can be used to eliminate
questionable data points from subsequent processing

Consistency check:- A consistency check is a test performed to determine if the data


has any internal conflicts.

Data type check:- A data type (or datatype) in programming languages is an


attribute of data that represents the kind and structure of the
data. This involves setting constraints on the data, such as
validity restrictions to values and the types of operations that
may be performed upon it.

Presence Check:- A method of validation that checks if the user has entered
some data. This is sometimes represented as a “required
field” when completing an online form. Presence
checks are important as they help to avoid receiving partial
information which cannot be rectified later.

Verification checks
Verification checks are carried out to eliminate the following errors.
Typographical Error An error which occurs while inputting text via a keyboard, and
is made despite the fact that the user knows exactly what to
type in. This usually results from the operator inexperience,
rushing, not paying attention or carelessness.

Transposition error Transposition error is the unintentional exchange of two


elements of an ordered list with all others staying the same. A
transposition is therefore a permutation of two elements. For
example, the swapping of 2 and 5 to take the list 123456 to
153426 is a transposition. In this example, if the newly ordered
list of 153426 was unintentional, it would be commonly called
a transposition error. In accounting, an error in copying a
number from one place to another is a transposition error.

Transcription error A transcription error is a specific type of data entry error that is
commonly made by human operators or by optical character
recognition (OCR) programs. Human transcription errors are
usually the result of typographical mistakes caused by striking
the wrong key on a keyboard, or by striking two or more wrong
keys because of finger misalignment with respect to the
keyboard. Electronic transcription errors are generally the
result of attempts to scan printed matter that has been
compromised, or that is rendered in an unusual font.

Types of verification checks.

Proofreading Careful reading (and rereading) of a (yet to be


finally-printed) document, to detect any errors in spelling,
punctuation, or grammar

Double Entry Check Entering the same item of data twice and then comparing both
to see if they match.

You might also like