• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/9

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

9 Cards in this Set

  • Front
  • Back
What can both Validation and Verification not ensure?
They cannot ensure that data is completely correct.
What is Validation used for?

It is used to ensure data is reasonable, sensible, complete and within acceptable boundaries.
Identify 5 ways in which Validation is put in place.
RANGE CHECK, PICTURE CHECK, LENGTH CHECK, PRESENCE CHECK, TYPE CHECK
Describe Verification.
Verification ensures the source and object data are the same.
Identify the ways in which Verification is put in to place.
PROOF READING, COMPUTER VERIFICATION
Describe Back Up.
Back Up is making a copy of data.
Describe Archive.
Archive is removing data from direct access.
Identify and Describe the four components of the Cost of Information.

HARDWARE: specialist equipment such as scanner, camera, graphics tablet etc.


SOFTWARE: such as DTP, Graphics Software etc.


PERSONNEL: employees and training individuals


CONSUMABLES: such as Ink, Paper and Electricity

Identify and Describe the five components of the Generic ICT System.

Input: Entering external data into a system


Processing: Manipulating the data


Storage: Holds data for later use


Output: Data put outside of the system


Feedback: Output influencing the input