SlideShare a Scribd company logo
1 of 8
Download to read offline
Validation And
Verification
Muhammad Rizwan
rizsoft@gmail.com
Validation And Verification
A common problem with computer systems is that it is very easy to
put incorrect data into them. For example :
You could mistype a name or an address in a database resulting in
letters being sent to the wrong people.
An EFTPOS till could misread a barcode and charge the wrong
price for a product.
A MICR reader could misread the account number on a cheque and
take money out of the wrong bank account.

If you put incorrect data into a computer system then you
will get incorrect results out of it. Processing incorrect
inputs will produce incorrect outputs. This leads to the
acronym :
GIGO : Garbage In Garbage Out
Validation And Verification
Sometimes incorrect data can actually cause a
computer system to stop working temporarily. This is
a particular problem in batch processing systems
when data may be processed overnight. If incorrect
data stops a batch processing system from working
then a whole night's processing time may be lost.
People who develop computer systems go to a lot of
trouble to make it difficult for incorrect data to be
entered. The two main techniques used for this
purpose are :
(1) Verification
(2) Validation
Verification
A verification check ensures that data
is correctly transferred into a computer
from the medium that it was originally
stored on. Verification checks are usually
used to check that information written on a
data collection form has been correctly
typed into a computer by a data entry
worker.
Methods of Verification
The two most common methods of verification are :
On-Screen Prompts : After a user has entered some data it
is redisplayed on the screen. The user is prompted to read the
data and confirm that it has been entered correctly. If the user
has entered any data incorrectly he should respond that the
data is inaccurate and retype the incorrect parts.
Dual Input : This method is used when data is entered at the
keyboard. The data to be entered is typed in twice by two
different operators. The two copies of the data are then
compared. Any differences are detected. The operators will
be prompted to retype the sections that differ until both copies
agree. When the two copies agree it is assumed by the
computer that the data has been entered correctly.
Validation
A validation check is an automatic check
made by a computer to ensure that any data
entered into the computer is sensible. A
validation check does not make sure that data has
been entered correctly. It only ensures that the
data is sensible. For this reason validation checks
are not usually as effective as verification checks.
They can however be carried out automatically by
a computer and therefore require less work by
computer operators making them cheaper to use.
Methods of Validation
There are many different methods of validation. The
most appropriate method(s) to use will depend upon
what data is being entered. The most common methods
are listed here.
Presence Check : Checks that data has been entered
into a field and that it has not been left blank. e.g. check
that a surname is always entered into each record in a
database of addresses.
Type Check : Checks that an entered value is of a
particular type. e.g. check that age is numeric.
Length Check : Checks than an entered value e.g.
surname is no longer than a particular number of
characters.
Methods of Validation
Range Check : Checks that an entered value falls within a
particular range. For example the age of a person should be
in the range 0 to 130 years.
Format Check : Checks that an entered value has a
particular format. e.g. a new-style car registration number
should consist of a letter followed by 1 to 3 numbers followed
by 3 letters.
Check Digit : A check digit is a digit attached to the end of a
string of digits. It is calculated from the other digits and used
to help ensure that the whole string is inputted correctly.
Parity Check : Used in data communications to ensure that
data is not corrupted when it is sent down a transmission
medium such as a telephone line.

More Related Content

What's hot

Writing Test Cases 20110808
Writing Test Cases 20110808Writing Test Cases 20110808
Writing Test Cases 20110808slovejoy
 
Calibration and Qualification
Calibration and QualificationCalibration and Qualification
Calibration and QualificationPriyanka Kandhare
 
Data Integrity Training by Dr. A. Amsavel
Data Integrity Training   by Dr. A. AmsavelData Integrity Training   by Dr. A. Amsavel
Data Integrity Training by Dr. A. AmsavelDr. Amsavel A
 
QA interview questions and answers
QA interview questions and answersQA interview questions and answers
QA interview questions and answersMehul Chauhan
 
CHAPTER-3 Product and Process Information.pdf
CHAPTER-3 Product and Process Information.pdfCHAPTER-3 Product and Process Information.pdf
CHAPTER-3 Product and Process Information.pdfDr. Dinesh Mehta
 
What is-smoke-testing ?
What is-smoke-testing ?What is-smoke-testing ?
What is-smoke-testing ?Ajit Waje
 
1 - Introduction to Computerized Systems Validation - for review.pptx
1 - Introduction to Computerized Systems Validation - for review.pptx1 - Introduction to Computerized Systems Validation - for review.pptx
1 - Introduction to Computerized Systems Validation - for review.pptxpatemalabanan
 
Pharmaceutical Data integrity training
Pharmaceutical Data integrity trainingPharmaceutical Data integrity training
Pharmaceutical Data integrity trainingMoataz El Halawany
 
Presentation On Software Testing Bug Life Cycle
Presentation On Software Testing Bug Life CyclePresentation On Software Testing Bug Life Cycle
Presentation On Software Testing Bug Life CycleRajon
 
Software engineering quality assurance and testing
Software engineering quality assurance and testingSoftware engineering quality assurance and testing
Software engineering quality assurance and testingBipul Roy Bpl
 
Good Documentation Practices
Good Documentation PracticesGood Documentation Practices
Good Documentation PracticesNikhil Soni
 
Ecommerce testing
Ecommerce testingEcommerce testing
Ecommerce testingbadurkar
 
Environmental monitoring - nonviable particle testing
Environmental monitoring - nonviable particle testingEnvironmental monitoring - nonviable particle testing
Environmental monitoring - nonviable particle testingJerry Fahrni
 
Computerized system validation_final
Computerized system validation_finalComputerized system validation_final
Computerized system validation_finalDuy Tan Geek
 

What's hot (20)

Writing Test Cases 20110808
Writing Test Cases 20110808Writing Test Cases 20110808
Writing Test Cases 20110808
 
Calibration and Qualification
Calibration and QualificationCalibration and Qualification
Calibration and Qualification
 
Data Integrity Training by Dr. A. Amsavel
Data Integrity Training   by Dr. A. AmsavelData Integrity Training   by Dr. A. Amsavel
Data Integrity Training by Dr. A. Amsavel
 
QA interview questions and answers
QA interview questions and answersQA interview questions and answers
QA interview questions and answers
 
Computer System Validation
Computer System ValidationComputer System Validation
Computer System Validation
 
Software Testing
Software Testing Software Testing
Software Testing
 
Data Integrity
Data IntegrityData Integrity
Data Integrity
 
CHAPTER-3 Product and Process Information.pdf
CHAPTER-3 Product and Process Information.pdfCHAPTER-3 Product and Process Information.pdf
CHAPTER-3 Product and Process Information.pdf
 
Uml diagrams usecase
Uml diagrams usecaseUml diagrams usecase
Uml diagrams usecase
 
What is-smoke-testing ?
What is-smoke-testing ?What is-smoke-testing ?
What is-smoke-testing ?
 
1 - Introduction to Computerized Systems Validation - for review.pptx
1 - Introduction to Computerized Systems Validation - for review.pptx1 - Introduction to Computerized Systems Validation - for review.pptx
1 - Introduction to Computerized Systems Validation - for review.pptx
 
Pharmaceutical Data integrity training
Pharmaceutical Data integrity trainingPharmaceutical Data integrity training
Pharmaceutical Data integrity training
 
Presentation On Software Testing Bug Life Cycle
Presentation On Software Testing Bug Life CyclePresentation On Software Testing Bug Life Cycle
Presentation On Software Testing Bug Life Cycle
 
Software engineering quality assurance and testing
Software engineering quality assurance and testingSoftware engineering quality assurance and testing
Software engineering quality assurance and testing
 
Good Documentation Practices
Good Documentation PracticesGood Documentation Practices
Good Documentation Practices
 
Ecommerce testing
Ecommerce testingEcommerce testing
Ecommerce testing
 
Environmental monitoring - nonviable particle testing
Environmental monitoring - nonviable particle testingEnvironmental monitoring - nonviable particle testing
Environmental monitoring - nonviable particle testing
 
Computerized system validation_final
Computerized system validation_finalComputerized system validation_final
Computerized system validation_final
 
Amazon search test case document
Amazon search test case documentAmazon search test case document
Amazon search test case document
 
Manual testing
Manual testingManual testing
Manual testing
 

Viewers also liked (15)

Truth Vs. Validity
Truth Vs. ValidityTruth Vs. Validity
Truth Vs. Validity
 
Information Systems Action research methods
Information Systems  Action research methodsInformation Systems  Action research methods
Information Systems Action research methods
 
Model-Based Simulation of Legal Requirements: Experience from Tax Policy Simu...
Model-Based Simulation of Legal Requirements: Experience from Tax Policy Simu...Model-Based Simulation of Legal Requirements: Experience from Tax Policy Simu...
Model-Based Simulation of Legal Requirements: Experience from Tax Policy Simu...
 
Verfication and validation of simulation models
Verfication and validation of simulation modelsVerfication and validation of simulation models
Verfication and validation of simulation models
 
Source Credibility
Source CredibilitySource Credibility
Source Credibility
 
Evaluating sources for credibility
Evaluating sources for credibilityEvaluating sources for credibility
Evaluating sources for credibility
 
Credibility
CredibilityCredibility
Credibility
 
033010 class 9
033010 class 9033010 class 9
033010 class 9
 
Source Credibility
Source CredibilitySource Credibility
Source Credibility
 
Data Verification
Data VerificationData Verification
Data Verification
 
Data validation in web applications
Data validation in web applicationsData validation in web applications
Data validation in web applications
 
Logic_160619_01
Logic_160619_01Logic_160619_01
Logic_160619_01
 
verification and validation
verification and validationverification and validation
verification and validation
 
Modelling and simulation
Modelling and simulationModelling and simulation
Modelling and simulation
 
The SlideShare Handbook
The SlideShare HandbookThe SlideShare Handbook
The SlideShare Handbook
 

Similar to Validation verification

Validation and verification
Validation and verificationValidation and verification
Validation and verificationLarry Nelson
 
Verification and Validation.pptx
Verification and Validation.pptxVerification and Validation.pptx
Verification and Validation.pptxVoltBikeKingV8
 
Validation
ValidationValidation
ValidationJTHSICT
 
Commercial Data Processing
Commercial Data ProcessingCommercial Data Processing
Commercial Data Processingmrcarty
 
Application Security: By Prashant Mali Cyber law Consultant
Application Security: By Prashant Mali Cyber law ConsultantApplication Security: By Prashant Mali Cyber law Consultant
Application Security: By Prashant Mali Cyber law ConsultantShivaami Corporation
 
Commercial Data Processing Intro
Commercial Data Processing IntroCommercial Data Processing Intro
Commercial Data Processing Introthomashendry14
 
Commercial Data Processing Intro
Commercial Data Processing IntroCommercial Data Processing Intro
Commercial Data Processing IntronS789
 
Commercial data processing
Commercial data processingCommercial data processing
Commercial data processingvDrPepper
 
03.2 application control
03.2 application control03.2 application control
03.2 application controlMulyadi Yusuf
 
Understanding IDP: Data Validation and Feedback Loop
Understanding IDP: Data Validation and Feedback LoopUnderstanding IDP: Data Validation and Feedback Loop
Understanding IDP: Data Validation and Feedback LoopInfrrd
 
Jiit;project 2013-2014;cse;project presentation
Jiit;project 2013-2014;cse;project presentationJiit;project 2013-2014;cse;project presentation
Jiit;project 2013-2014;cse;project presentationChakshu Sharma
 
IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using ArduinoIRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using ArduinoIRJET Journal
 
ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEM
ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEMONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEM
ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEMJournal For Research
 
File Security And Integrity 03 March 08
File Security And Integrity 03  March 08File Security And Integrity 03  March 08
File Security And Integrity 03 March 08uzdee
 
"Inter- application vulnerabilities. hunting for bugs in secure applications"...
"Inter- application vulnerabilities. hunting for bugs in secure applications"..."Inter- application vulnerabilities. hunting for bugs in secure applications"...
"Inter- application vulnerabilities. hunting for bugs in secure applications"...PROIDEA
 

Similar to Validation verification (20)

Validation and verification
Validation and verificationValidation and verification
Validation and verification
 
Verification and Validation.pptx
Verification and Validation.pptxVerification and Validation.pptx
Verification and Validation.pptx
 
Validation
ValidationValidation
Validation
 
Commercial Data Processing
Commercial Data ProcessingCommercial Data Processing
Commercial Data Processing
 
Application Security: By Prashant Mali Cyber law Consultant
Application Security: By Prashant Mali Cyber law ConsultantApplication Security: By Prashant Mali Cyber law Consultant
Application Security: By Prashant Mali Cyber law Consultant
 
Application Security:
Application Security: Application Security:
Application Security:
 
Commercial Data Processing Intro
Commercial Data Processing IntroCommercial Data Processing Intro
Commercial Data Processing Intro
 
TriEpic Final Project
TriEpic Final ProjectTriEpic Final Project
TriEpic Final Project
 
Commercial Data Processing Intro
Commercial Data Processing IntroCommercial Data Processing Intro
Commercial Data Processing Intro
 
Commercial data processing
Commercial data processingCommercial data processing
Commercial data processing
 
eVoting.pptx
eVoting.pptxeVoting.pptx
eVoting.pptx
 
120 i143
120 i143120 i143
120 i143
 
03.2 application control
03.2 application control03.2 application control
03.2 application control
 
Understanding IDP: Data Validation and Feedback Loop
Understanding IDP: Data Validation and Feedback LoopUnderstanding IDP: Data Validation and Feedback Loop
Understanding IDP: Data Validation and Feedback Loop
 
Jiit;project 2013-2014;cse;project presentation
Jiit;project 2013-2014;cse;project presentationJiit;project 2013-2014;cse;project presentation
Jiit;project 2013-2014;cse;project presentation
 
IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using ArduinoIRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
 
ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEM
ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEMONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEM
ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEM
 
Cdp Pp
Cdp PpCdp Pp
Cdp Pp
 
File Security And Integrity 03 March 08
File Security And Integrity 03  March 08File Security And Integrity 03  March 08
File Security And Integrity 03 March 08
 
"Inter- application vulnerabilities. hunting for bugs in secure applications"...
"Inter- application vulnerabilities. hunting for bugs in secure applications"..."Inter- application vulnerabilities. hunting for bugs in secure applications"...
"Inter- application vulnerabilities. hunting for bugs in secure applications"...
 

More from khair20

Muslim rule lect_4.ppt_filename_= utf-8''muslim rule lect 4
Muslim rule lect_4.ppt_filename_= utf-8''muslim rule lect 4Muslim rule lect_4.ppt_filename_= utf-8''muslim rule lect 4
Muslim rule lect_4.ppt_filename_= utf-8''muslim rule lect 4khair20
 
British in india lect 5
British in india lect 5British in india lect 5
British in india lect 5khair20
 
introduction to law 3
introduction to law 3introduction to law 3
introduction to law 3khair20
 
Expert system
Expert systemExpert system
Expert systemkhair20
 
Algorithms and flowcharts
Algorithms and flowchartsAlgorithms and flowcharts
Algorithms and flowchartskhair20
 
Operating system
Operating systemOperating system
Operating systemkhair20
 

More from khair20 (6)

Muslim rule lect_4.ppt_filename_= utf-8''muslim rule lect 4
Muslim rule lect_4.ppt_filename_= utf-8''muslim rule lect 4Muslim rule lect_4.ppt_filename_= utf-8''muslim rule lect 4
Muslim rule lect_4.ppt_filename_= utf-8''muslim rule lect 4
 
British in india lect 5
British in india lect 5British in india lect 5
British in india lect 5
 
introduction to law 3
introduction to law 3introduction to law 3
introduction to law 3
 
Expert system
Expert systemExpert system
Expert system
 
Algorithms and flowcharts
Algorithms and flowchartsAlgorithms and flowcharts
Algorithms and flowcharts
 
Operating system
Operating systemOperating system
Operating system
 

Recently uploaded

KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 

Recently uploaded (20)

KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 

Validation verification

  • 2. Validation And Verification A common problem with computer systems is that it is very easy to put incorrect data into them. For example : You could mistype a name or an address in a database resulting in letters being sent to the wrong people. An EFTPOS till could misread a barcode and charge the wrong price for a product. A MICR reader could misread the account number on a cheque and take money out of the wrong bank account. If you put incorrect data into a computer system then you will get incorrect results out of it. Processing incorrect inputs will produce incorrect outputs. This leads to the acronym : GIGO : Garbage In Garbage Out
  • 3. Validation And Verification Sometimes incorrect data can actually cause a computer system to stop working temporarily. This is a particular problem in batch processing systems when data may be processed overnight. If incorrect data stops a batch processing system from working then a whole night's processing time may be lost. People who develop computer systems go to a lot of trouble to make it difficult for incorrect data to be entered. The two main techniques used for this purpose are : (1) Verification (2) Validation
  • 4. Verification A verification check ensures that data is correctly transferred into a computer from the medium that it was originally stored on. Verification checks are usually used to check that information written on a data collection form has been correctly typed into a computer by a data entry worker.
  • 5. Methods of Verification The two most common methods of verification are : On-Screen Prompts : After a user has entered some data it is redisplayed on the screen. The user is prompted to read the data and confirm that it has been entered correctly. If the user has entered any data incorrectly he should respond that the data is inaccurate and retype the incorrect parts. Dual Input : This method is used when data is entered at the keyboard. The data to be entered is typed in twice by two different operators. The two copies of the data are then compared. Any differences are detected. The operators will be prompted to retype the sections that differ until both copies agree. When the two copies agree it is assumed by the computer that the data has been entered correctly.
  • 6. Validation A validation check is an automatic check made by a computer to ensure that any data entered into the computer is sensible. A validation check does not make sure that data has been entered correctly. It only ensures that the data is sensible. For this reason validation checks are not usually as effective as verification checks. They can however be carried out automatically by a computer and therefore require less work by computer operators making them cheaper to use.
  • 7. Methods of Validation There are many different methods of validation. The most appropriate method(s) to use will depend upon what data is being entered. The most common methods are listed here. Presence Check : Checks that data has been entered into a field and that it has not been left blank. e.g. check that a surname is always entered into each record in a database of addresses. Type Check : Checks that an entered value is of a particular type. e.g. check that age is numeric. Length Check : Checks than an entered value e.g. surname is no longer than a particular number of characters.
  • 8. Methods of Validation Range Check : Checks that an entered value falls within a particular range. For example the age of a person should be in the range 0 to 130 years. Format Check : Checks that an entered value has a particular format. e.g. a new-style car registration number should consist of a letter followed by 1 to 3 numbers followed by 3 letters. Check Digit : A check digit is a digit attached to the end of a string of digits. It is calculated from the other digits and used to help ensure that the whole string is inputted correctly. Parity Check : Used in data communications to ensure that data is not corrupted when it is sent down a transmission medium such as a telephone line.