0% found this document useful (0 votes)
12 views16 pages

Jan 2022

The document discusses various data validation and error checking techniques used to ensure accuracy of information entered into databases and spreadsheets. These include checks for values within a certain range, matching of related fields, and error handling for invalid formulas. Security techniques like encryption, passwords and firewalls are also mentioned.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views16 pages

Jan 2022

The document discusses various data validation and error checking techniques used to ensure accuracy of information entered into databases and spreadsheets. These include checks for values within a certain range, matching of related fields, and error handling for invalid formulas. Security techniques like encryption, passwords and firewalls are also mentioned.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

The process of checking for errors after processing is done

The process of checking data for errors before processing is done

Ensures that numbers entered falls within a certain range

hours in a day cannot exceed 24 hours

Checks pieces of information to make sure they match up

DOB and age should match up


=(B3/C3)*100

There is no value in C9 to be divided so D9 showed an error


Right aligned

Left aligned

=(B3/$B$10)*100

Relative

Absolute

The value for total runs need to be in each formula. The fill handle

would've have changed the cell if it was not absolute.


Place information in a safe

Lock information with a lock and key in a cabinet

Firewall

Encryption

Password

Hackers

Viruses
Date/Time

Boolean

Number

Short text
A primary key is a unique key in a database table that identifies unique

values in a record

ID

Degree Code

A foreign key is used to make relationships between two tables.

Eg. Degree is a foreign key in the contact table because it can be found

in both tables and it is a primary key in the degrees table

Degree
Degree Code
One to Many because degree code can be entered once in table 2

but in table 1, it can be repeated multiple times


START

Declare price, qty, total and discount as integer

Constant dis = 0.25

Initialize

price

qty

total

discount

Write "Enter price and qty"

Read price and qty

Total=price*qty

If (price>1800) then

Discount=total*dis

Endif

Print "The discount is",Discount

End
Local Area Network

Wide Area Network

Metropolitan Area Network

LAN because it connects all the computers in the same location to a

central server

Intranet only allows verified users within the organisation to connect and

share information while extranet allows external computers to connect to the

internal network on a managed basis


=C5*B5

=AVERAGE(C3:C9)
Select the range of data that is to be sorted

Select Sort and Filter in the menu option

Sort A-Z by the Items field

Highlight the field that you wish to delete

Right click on the mouse

Select delete row from the drop down list


Monitor

Mouse

System Unit

Keyboard

Data storage - makes it easier to back up files for safe keeping and quick

recovery

Data retrieval - the data is stored using indexed sequential access methods

which makes it easier to retrieve information

To protect sensitive data from unauthorized access

kEv@/1!73c$
To find the highest number

Sequence

Selection

Repitition

Line 1

Prompts the user to continue entering numbers or enter 0 to end the

program
NUM

MAX

Line 4 and 5
Start

Yes

No

Stop

You might also like