checking the accuracy of data & data proccesing
verification and data processing
start_
Verification and data processing
verification used in transmission of data
Common Ways of Verifying Data
other ways of verifying data
Data processing
Real time process
Online processing
Batch processing
Verification
what is verification
Is the process of checking that the data entered into the computer system matches the original source.There are 6 types of verification and they can be clasified into 3; - Common Ways of Verifying Data -Other Ways of Verifying Data -Verifications used in transmission of data
Verification
COMMON WAYS OF VERIFICATION
These can be categorised into 2;-Visual Checking
Helps pick-up errors where data has been entered incorrectly by having the user visually check/proofread the data, making sure it matches the original source.
After the data is entered, the computer displays the input for the user to confirm that its correct.
COMMON WAYS OF VERIFICATION
-Double EntryData is input twice and the computer checks wether both enteries match or not if there are any difference then one of the inputs must be incorrect eg.when adding pasword
Verification
other ways of verification
Hash Total
Used when a vast amount of data is entered at once.
It is calculated by adding together the values from an input field for all the records that needs to be input.
User must manually add up the values before the input starts.
The computer checks whether the the hash total calculated automatically is equal to the hash total calculated manually.
Verification
other ways of verification
Control Total
similar to hash total
Has some useful meaning.
eg. total prices for individual items on an order.
vERIFICATION USED IN TRANSMISSION OF DATA
Parity Checking
used to find errors by checking if binary data has changed during data transmission.
computers decide upon the protocol to be used - even or odd parity
within each byte of data to be sent, one bit becomes a parity bit
the parity bit is either 0 or 1, depending on whether we are looking to create an even or odd number of 1s and 0s in the byte
the receiving computer checks to see if the byte of data received matches the agreed protocol
Checksumresults of calculations on the contents of a file used to check whether a file has been transmitted or copied properly.
can be useful if checking that a hacker hasn’t disguised a malicious file as a genuine one.
slight change in a file will mean a different checksum is generated.
checksums are usually represented to the user as hexadecimal digits.
Data processing
Batch process
is when a computer processes a number of tasks that it has collected in a group. It is designed to be a completely automated process, without human intervention.
For the data to be processed it is usually stored in files first. there are two main file types that are used to store data, Master file where it collects records holding information about an enity such as a person and transaction which holds information about events, such as travel expenses files.
Batch processing is an incredibly cost effective way to process huge amounts of data in a small amount of time. Once it has started, the computer will only stop when it discovers an error or abnormality.
An example of the use of batch processing system is financial services like fraud surveillance and end-of-day transaction processing. They use batch processing to minimize human error, increase speed and accuracy, and reduce costs with automation. However errors cannot be corrected until the batch process is complete.
batch processing
This file is called the transaction file. In a banking system, the transaction file would contains payment details.
After a period of time. The complete batch of records in the transaction file are proccesd.
The process payment orders with at least one external recipient, the order is transferred to the upstream system to determine the routing. If there are communication errors, the order is flagged with an error indicator. This report selects all these payment orders and sends the information once again to the upstream system. If this corrects the error, the error indicator is removed and the payment order is processed. If the error still exists, the error indicator remains and the payment order is selected again during the next run.
Guide Lorem ipsum dolor sit amet
Real time processing
This file is called the transaction file. In a banking system, the transaction file would contains payment details.
After a period of time. The complete batch of records in the transaction file are proccesd.
The process payment orders with at least one external recipient, the order is transferred to the upstream system to determine the routing. If there are communication errors, the order is flagged with an error indicator. This report selects all these payment orders and sends the information once again to the upstream system. If this corrects the error, the error indicator is removed and the payment order is processed. If the error still exists, the error indicator remains and the payment order is selected again during the next run.
Guide Lorem ipsum dolor sit amet
rEAL TIME
An automobile engine can also be a good example of real-time processing. If the engine is late in its response to the command it receives, it might cause the whole automobile to malfunction.
A real-life example of Real-Time Processing is when you travel from destination A to destination B using Google Maps. Google Maps automatically updates traffic congestion levels using information acquired from various mobile devices and road sensors in that area to suggest to you the optimal & shortest path to reach your destination.
Data processing
Online processing
also known as interactive processing, involves the user entering data and receiving feedback in the form of outputs.
Dealing with data as transactions is one method of online processing. As a transaction, a certain amount of data is entered. This amount of information is typically small. Once the transaction data has been collected, it is processed and the next transaction can take place.
Data will be processed during transactions by an online booking system, such as an airline ticket booking system. The transaction will result in the collection of all the customer's flight, passenger, and seat information. After processing this, a ticket may be produced as an output. This prevents a seat on the airline from being double-booked because each transaction is handled in turn.
Guide Lorem ipsum dolor sit amet
Electronic fund transfer
The electronic transfer of cash (money) to or from a bank account is known as an electronic funds transfer, or EFT. Several EFT payment types include:
Direct payments allow money to be transferred directly between bank accounts. This may occur right away, within a specific time window, or over the course of an entire night.
Cash withdrawals from a bank account are done through automated teller machines (ATMs). If there are adequate funding, the ATM will check a customer's bank account in a database, permit a withdrawal, and subtract the withdrawal amount as from account balance.
.
Data processing
Debit card are used to make requests to purchase a goods and services to your banks. Initially A customer must enter a PIN to verify their ownership of the card, onces its confirmed,The bank's computer system will verify that the customer's balance is adequate for the transaction.if its sufficient, the banks confirms to the retailer that the transaction can proceed then the amount to transfer is sent to the bankThe funds will subsequently be taken out of the customer's account and added to the retailer's account through a transaction created by the bank's computer system for the value of the purchase.
Data processing
ONLINE SHOPING
online stores
A customer can order a product from an online store and have it delivered to their home address from anywhere in the world. An interactive system is used by an online retailer so that customers may explore or conduct product searches on a website which when they later purchase is paid by EFT.
Automatic stock control
LAutomatic stock control.
A stock control system's goal is to guarantee that a store never has too many items and that there are always enough for sale. Another option is to use a stock control system to guarantee that the components required for a manufacturing process are always available.
In order to keep the shop's inventory levels at healthy levels, the system will need to record the following information on the stock:
amount in stock and level of reorder
Reorder quantity (the quantity that should be ordered when the reorder level is reached).
Electronic data exchange
A standardized format for transmitting data across organizations is electronic data exchange, sometimes known as electronic data interchan (EDI). As an instance, your school will transmit coursework grades and projected grades to an awarding organization online or by utilizing software that is intended to make the transfer of that information easier. Application program interfaces (APIs) are used to offer a common interface for data importing and exporting between various software applications.
Business-to-business buying and selling
Having a uniform interface for placing and receiving orders helps simplify the process when a company purchases in bulk from a supplier
Verificationand data processing
Bethlehem Degefu
Created on November 5, 2022
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Akihabara Microsite
View
Essential Microsite
View
Essential CV
View
Practical Microsite
View
Akihabara Resume
View
Tourism Guide Microsite
View
Online Product Catalog
Explore all templates
Transcript
checking the accuracy of data & data proccesing
verification and data processing
start_
Verification and data processing
verification used in transmission of data
Common Ways of Verifying Data
other ways of verifying data
Data processing
Real time process
Online processing
Batch processing
Verification
what is verification
Is the process of checking that the data entered into the computer system matches the original source.There are 6 types of verification and they can be clasified into 3; - Common Ways of Verifying Data -Other Ways of Verifying Data -Verifications used in transmission of data
Verification
COMMON WAYS OF VERIFICATION
These can be categorised into 2;-Visual Checking Helps pick-up errors where data has been entered incorrectly by having the user visually check/proofread the data, making sure it matches the original source. After the data is entered, the computer displays the input for the user to confirm that its correct.
COMMON WAYS OF VERIFICATION
-Double EntryData is input twice and the computer checks wether both enteries match or not if there are any difference then one of the inputs must be incorrect eg.when adding pasword
Verification
other ways of verification
Hash Total Used when a vast amount of data is entered at once. It is calculated by adding together the values from an input field for all the records that needs to be input. User must manually add up the values before the input starts. The computer checks whether the the hash total calculated automatically is equal to the hash total calculated manually.
Verification
other ways of verification
Control Total similar to hash total Has some useful meaning. eg. total prices for individual items on an order.
vERIFICATION USED IN TRANSMISSION OF DATA
Parity Checking used to find errors by checking if binary data has changed during data transmission. computers decide upon the protocol to be used - even or odd parity within each byte of data to be sent, one bit becomes a parity bit the parity bit is either 0 or 1, depending on whether we are looking to create an even or odd number of 1s and 0s in the byte the receiving computer checks to see if the byte of data received matches the agreed protocol
Checksumresults of calculations on the contents of a file used to check whether a file has been transmitted or copied properly. can be useful if checking that a hacker hasn’t disguised a malicious file as a genuine one. slight change in a file will mean a different checksum is generated. checksums are usually represented to the user as hexadecimal digits.
Data processing
Batch process
is when a computer processes a number of tasks that it has collected in a group. It is designed to be a completely automated process, without human intervention. For the data to be processed it is usually stored in files first. there are two main file types that are used to store data, Master file where it collects records holding information about an enity such as a person and transaction which holds information about events, such as travel expenses files. Batch processing is an incredibly cost effective way to process huge amounts of data in a small amount of time. Once it has started, the computer will only stop when it discovers an error or abnormality. An example of the use of batch processing system is financial services like fraud surveillance and end-of-day transaction processing. They use batch processing to minimize human error, increase speed and accuracy, and reduce costs with automation. However errors cannot be corrected until the batch process is complete.
batch processing
This file is called the transaction file. In a banking system, the transaction file would contains payment details. After a period of time. The complete batch of records in the transaction file are proccesd. The process payment orders with at least one external recipient, the order is transferred to the upstream system to determine the routing. If there are communication errors, the order is flagged with an error indicator. This report selects all these payment orders and sends the information once again to the upstream system. If this corrects the error, the error indicator is removed and the payment order is processed. If the error still exists, the error indicator remains and the payment order is selected again during the next run.
Guide Lorem ipsum dolor sit amet
Real time processing
This file is called the transaction file. In a banking system, the transaction file would contains payment details. After a period of time. The complete batch of records in the transaction file are proccesd. The process payment orders with at least one external recipient, the order is transferred to the upstream system to determine the routing. If there are communication errors, the order is flagged with an error indicator. This report selects all these payment orders and sends the information once again to the upstream system. If this corrects the error, the error indicator is removed and the payment order is processed. If the error still exists, the error indicator remains and the payment order is selected again during the next run.
Guide Lorem ipsum dolor sit amet
rEAL TIME
An automobile engine can also be a good example of real-time processing. If the engine is late in its response to the command it receives, it might cause the whole automobile to malfunction. A real-life example of Real-Time Processing is when you travel from destination A to destination B using Google Maps. Google Maps automatically updates traffic congestion levels using information acquired from various mobile devices and road sensors in that area to suggest to you the optimal & shortest path to reach your destination.
Data processing
Online processing
also known as interactive processing, involves the user entering data and receiving feedback in the form of outputs. Dealing with data as transactions is one method of online processing. As a transaction, a certain amount of data is entered. This amount of information is typically small. Once the transaction data has been collected, it is processed and the next transaction can take place. Data will be processed during transactions by an online booking system, such as an airline ticket booking system. The transaction will result in the collection of all the customer's flight, passenger, and seat information. After processing this, a ticket may be produced as an output. This prevents a seat on the airline from being double-booked because each transaction is handled in turn.
Guide Lorem ipsum dolor sit amet
Electronic fund transfer
The electronic transfer of cash (money) to or from a bank account is known as an electronic funds transfer, or EFT. Several EFT payment types include: Direct payments allow money to be transferred directly between bank accounts. This may occur right away, within a specific time window, or over the course of an entire night. Cash withdrawals from a bank account are done through automated teller machines (ATMs). If there are adequate funding, the ATM will check a customer's bank account in a database, permit a withdrawal, and subtract the withdrawal amount as from account balance. .
Data processing
Debit card are used to make requests to purchase a goods and services to your banks. Initially A customer must enter a PIN to verify their ownership of the card, onces its confirmed,The bank's computer system will verify that the customer's balance is adequate for the transaction.if its sufficient, the banks confirms to the retailer that the transaction can proceed then the amount to transfer is sent to the bankThe funds will subsequently be taken out of the customer's account and added to the retailer's account through a transaction created by the bank's computer system for the value of the purchase.
Data processing
ONLINE SHOPING
online stores A customer can order a product from an online store and have it delivered to their home address from anywhere in the world. An interactive system is used by an online retailer so that customers may explore or conduct product searches on a website which when they later purchase is paid by EFT.
Automatic stock control
LAutomatic stock control. A stock control system's goal is to guarantee that a store never has too many items and that there are always enough for sale. Another option is to use a stock control system to guarantee that the components required for a manufacturing process are always available. In order to keep the shop's inventory levels at healthy levels, the system will need to record the following information on the stock: amount in stock and level of reorder Reorder quantity (the quantity that should be ordered when the reorder level is reached).
Electronic data exchange A standardized format for transmitting data across organizations is electronic data exchange, sometimes known as electronic data interchan (EDI). As an instance, your school will transmit coursework grades and projected grades to an awarding organization online or by utilizing software that is intended to make the transfer of that information easier. Application program interfaces (APIs) are used to offer a common interface for data importing and exporting between various software applications. Business-to-business buying and selling Having a uniform interface for placing and receiving orders helps simplify the process when a company purchases in bulk from a supplier