24
1 3 Computing System Fundamentals 3.6 Errors

1 3 Computing System Fundamentals 3.6 Errors. 3.6.2 Prevention and Recovery

Embed Size (px)

Citation preview

Page 1: 1 3 Computing System Fundamentals 3.6 Errors. 3.6.2 Prevention and Recovery

1

3 Computing System Fundamentals

3.6 Errors

Page 2: 1 3 Computing System Fundamentals 3.6 Errors. 3.6.2 Prevention and Recovery

3.6.2 Prevention and Recovery

Page 3: 1 3 Computing System Fundamentals 3.6 Errors. 3.6.2 Prevention and Recovery

3

Methods

•Verification - checking the data on the source document are Exactly the same as those being entered.

•Validation - checking the data input into the system are Acceptable (make sense/are possible).

Page 4: 1 3 Computing System Fundamentals 3.6 Errors. 3.6.2 Prevention and Recovery

4

Verification

•Is it exact?

•Is it equal?

•Is it accurate?

•Verification has to involve humans.

Page 5: 1 3 Computing System Fundamentals 3.6 Errors. 3.6.2 Prevention and Recovery

5

Verification methods

•Visual verification i.e. proof-reading.

•Double entry verification - the data from the source document are entered twice, the keyboard may lock and the computer sound an alarm if the second item is not the same as the first.

Page 6: 1 3 Computing System Fundamentals 3.6 Errors. 3.6.2 Prevention and Recovery

6

Validation

•Is it reasonable?

•Is it possible?

•Is it acceptable?

•Computers can be programmed to validate.

Page 7: 1 3 Computing System Fundamentals 3.6 Errors. 3.6.2 Prevention and Recovery

7

Validation methods

•Presence check - some fields are required (must contain data) e.g. customer account number on a sales order.

•Range check - do the data fall within a certain range e.g. an age outside the range 0 to 120 cannot be entered.

Page 8: 1 3 Computing System Fundamentals 3.6 Errors. 3.6.2 Prevention and Recovery

8

Validation methods

•Character count e.g. a French postcode must have 5 characters.

•Format check e.g. a UK postcode has the pattern TTN NTT, where T is a letter and N is a number.

Page 9: 1 3 Computing System Fundamentals 3.6 Errors. 3.6.2 Prevention and Recovery

9

Check digits

•A digit calculated from a data item number, then tagged onto that number and entered into the computer, the latter can then calculate back to validate it.

Page 10: 1 3 Computing System Fundamentals 3.6 Errors. 3.6.2 Prevention and Recovery

10

Check digit example

•Product code: 0198327633

•Add the digits: 0 + 1 + 9 + 8 + 3 + 2 + 7 + 6 + 3 + 3 = 41.

•Divide by 10: 41 div 10 = 4 mod 1

•So use 1 as the check digit, the product code becomes 01983276331

Page 11: 1 3 Computing System Fundamentals 3.6 Errors. 3.6.2 Prevention and Recovery

11

Parity bits

•This system checks if a byte is complete, typically during data transmission.

•There are 128 ASCII characters, so only 7 bits of a byte are needed, the 8th bit can be used as the parity bit.

Page 12: 1 3 Computing System Fundamentals 3.6 Errors. 3.6.2 Prevention and Recovery

12

Parity bits

•Under even parity, the parity bit is set so there are an even number of 1's in the byte

‣0010100 would get the parity bit 0 and

‣1101011 would get a 1.

•The receiving device checks each byte for correct parity.

Page 13: 1 3 Computing System Fundamentals 3.6 Errors. 3.6.2 Prevention and Recovery

13

Parity bits

•If the system is using odd parity, there must be an odd number of 1’s.

•The sender and the receiver must both be using the same parity (odd or even) - this is part of the network protocol.

Page 14: 1 3 Computing System Fundamentals 3.6 Errors. 3.6.2 Prevention and Recovery

14

Batch and control totals

•With groups of records, a batch total (number of records) and control total (sum of a particular field from each record) may be added to the file when the batch of records is transmitted to ensure that all are received correctly.

Page 15: 1 3 Computing System Fundamentals 3.6 Errors. 3.6.2 Prevention and Recovery

15

Check sums

•When software is transmitted, a check sum is generated (the sum of all the instructions when treated as numbers), which gets checked before the software is executed.

Page 16: 1 3 Computing System Fundamentals 3.6 Errors. 3.6.2 Prevention and Recovery

16

Online processes

•For a data entry error in an online process, re-inputting the data is usually the most efficient method of recovery.

Page 17: 1 3 Computing System Fundamentals 3.6 Errors. 3.6.2 Prevention and Recovery

17

Batch processes

•If it is a batch process, the errors will be reported (printed out) and the batch process will continue with the next input. The entries with errors can then be corrected and included with the next batch.

Page 18: 1 3 Computing System Fundamentals 3.6 Errors. 3.6.2 Prevention and Recovery

18

Real-time processes

•With real-time processing, inputs have to be verified instantaneously - this can cause problems for control systems.

Page 19: 1 3 Computing System Fundamentals 3.6 Errors. 3.6.2 Prevention and Recovery

19

Transmission errors

•Transmission errors can be caught by parity bits and/or check sums can be automatically corrected in some circumstances but more commonly there will be a request for a re-transmission of the data.

Page 20: 1 3 Computing System Fundamentals 3.6 Errors. 3.6.2 Prevention and Recovery

20

Backups

•Many organizations rely heavily upon computer-stored data so it must be protected.

•Backups are taken every day.

•Backup media should be stored in a fireproof safe or at a different location.

Page 21: 1 3 Computing System Fundamentals 3.6 Errors. 3.6.2 Prevention and Recovery

21

Backups

•They are often rotated over 2 weeks but can be kept for months or years.

•Full backups save a new copy of every file.

•Incremental backups save only those files which are new or have changed since the last backup.

Page 22: 1 3 Computing System Fundamentals 3.6 Errors. 3.6.2 Prevention and Recovery

22

Backups

•Archiving backs up then removes the old files from the system.

•Magnetic tape is a common backup medium because it is cheap and data won't need to be accessed directly, only sequentially (it is accepted that restoring a backup will not be a fast process).

Page 23: 1 3 Computing System Fundamentals 3.6 Errors. 3.6.2 Prevention and Recovery

23

Deliberate errors

•These are hardest to recover from - the offending user usually knows enough to get around any validation checks.

•File access permissions should be imposed by the operating system and system administrator.

Page 24: 1 3 Computing System Fundamentals 3.6 Errors. 3.6.2 Prevention and Recovery

24

Deliberate errors

•They require vigilance from the administrator.

•Cross-referencing data to other reliable sources will show if deliberate damage has been done.