Ensuring error-free information

Ensuring Error-Free Information: Error-free information is accurate, complete, and reliable data that has been verified, validated, and controlled through systematic checks to eliminate mistakes during collection, entry, processing, and output stages. It ensures that decisions are based on correct facts.

Quick Summary

  • Error-free information means data without mistakes or inaccuracies
  • Three main methods ensure accuracy: data control, verification, and validation
  • Data control ensures only authorized and correct data enters the system
  • Verification checks that data was entered exactly as written on source documents
  • Validation detects unreasonable or impossible data values
  • Errors can occur at any processing stage and must be prevented

Why Error-Free Information Matters

Imagine JAMB releasing exam results and your score shows 89 instead of 289. Or a bank transfers N500,000 from your account instead of N50,000. These errors can cause serious problems.

In computing, we have a principle called GIGO: Garbage In, Garbage Out. This means if you put wrong data into a computer, you will get wrong information out. The computer cannot think for itself. It will process whatever you give it, whether correct or incorrect.

Error-free information is important because:

  • Wrong medical records can lead to incorrect treatment and patient death
  • Incorrect bank data can cause financial losses
  • Wrong exam scores can ruin students’ admission chances
  • Incorrect tax calculations can lead to government revenue loss
  • Wrong voter data can affect election results

This is why organizations use three main methods to ensure accuracy: data control, data verification, and data validation.

Methods of Ensuring Error-Free Information

1. Data Control

Data control means managing who can enter, change, or delete data in a system. It ensures that only the right data enters the computer and only authorized people can access it.

There are several types of data control:

Access Control: Only authorized people can use the system. For example, in a Nigerian bank, only trained cashiers can enter customer transactions. Students cannot access the system to change their exam scores. INEC officials need passwords to enter election results.

Source Document Control: Every data entry must come from an approved form or document. For instance, banks require deposit slips before entering money into accounts. Schools need properly filled exam registration forms. FRSC requires completed license application forms.

Data Entry Control: Some controls prevent wrong data from being entered. Examples include:

  • Mandatory fields that must be filled (you cannot submit JAMB registration without choosing subjects)
  • Drop-down lists that limit choices (selecting state from a list instead of typing, to avoid spelling errors)
  • Date pickers that prevent impossible dates like February 30
  • Numeric fields that reject letters (account number field only accepts numbers)

Audit Trail: The system records who entered data, when it was entered, and what changes were made. If errors occur, you can trace them back to the source. Nigerian banks keep records of which cashier processed each transaction.

2. Data Verification

Verification means checking that data was copied correctly from the source document into the computer. It ensures that what you see on screen matches what is written on paper.

Common verification methods include:

Double Entry: The same data is entered twice by two different people or at two different times. The computer compares both entries. If they match, the data is probably correct. If they differ, there is an error.

Example: When you create a new password on a website, you must type it twice. This verifies that you typed what you intended. Many Nigerian schools ask data entry clerks to enter student scores twice to reduce errors.

Proofreading: After entering data, someone reads the screen display while another person reads the original document aloud. They check that everything matches.

For instance, after entering WAEC candidate details, an official may read back the name, exam number, and subjects while another person checks the registration form.

Visual Verification: The person who enters data looks carefully at the screen to check for obvious mistakes before saving. A cashier entering N5000 will notice if the screen shows N50000.

Check Digits: A special digit is added to important numbers like account numbers or product codes. The computer uses a mathematical formula to verify the number is correct.

Example: The last digit of a bank account number or barcode is often a check digit. If you enter the account number wrongly, the check digit will not match and the computer will reject it.

3. Data Validation

Validation means checking that data makes sense and falls within acceptable limits. Even if data is entered correctly, it may still be unreasonable or impossible. Validation catches these errors.

Types of validation checks:

Range Check: Ensures data falls within acceptable minimum and maximum values.

Examples:

  • Age for WAEC candidates must be between 10 and 80 years (if you enter 150, the system rejects it)
  • JAMB scores range from 0 to 400 (entering 450 will be rejected)
  • Working hours per day should be between 1 and 24

Type Check: Ensures the data is the correct type (number, letter, or date).

Examples:

  • Phone numbers should contain only digits, not letters
  • Names should contain only letters, not numbers (rejecting “John234”)
  • Dates should be in proper format (DD/MM/YYYY)

Length Check: Ensures data has the correct number of characters.

Examples:

  • Nigerian phone numbers must be 11 digits (starting with 0) or 10 digits (without 0)
  • BVN must be exactly 11 digits
  • Vehicle plate numbers have specific format (e.g., LSR-123-AB for Lagos)

Presence Check: Ensures important fields are not left empty.

Examples:

  • JAMB registration cannot be completed without candidate name, phone number, and subject choices
  • Bank withdrawal form must include account number and amount
  • Job applications must include applicant name and contact details

Format Check: Ensures data follows the required pattern.

Examples:

  • Email addresses must contain @ symbol and a domain name
  • Nigerian dates often follow DD/MM/YYYY format
  • Matriculation numbers follow specific patterns (e.g., UNI/2024/12345)

Consistency Check: Ensures related data items do not contradict each other.

Examples:

  • If gender is “Male”, title cannot be “Mrs”
  • If age is 10, marital status cannot be “Married”
  • If state is “Kano”, local government must be from Kano state, not Lagos

Check Sum: A calculated total is compared to expected total.

Example: After entering 100 students’ scores, the computer adds them all. If the total does not match the manual total, there may be entry errors.

Comparison of Error Prevention Methods

Method Purpose When Applied Example What It Catches
Data Control Manage access and entry rights Before and during entry Password protection Unauthorized changes
Verification Confirm accurate copying During and after entry Double entry of passwords Typing mistakes
Validation Check reasonableness During entry Rejecting age as 200 years Impossible or unrealistic values

Real-World Application: Nigerian Voter Registration

Let us see how INEC ensures error-free voter registration data:

Data Control:

  • Only trained INEC staff can operate registration machines
  • Each machine requires staff login with unique ID
  • Registration forms must be official INEC documents
  • System logs all registrations with staff ID, location, and time

Data Verification:

  • Biometric fingerprint is captured to verify identity
  • Photograph is displayed on screen for voter to confirm
  • Personal details are read back to voter before submission
  • Voter Identification Number (VIN) includes check digit

Data Validation:

  • Range check: Age must be 18 years or above
  • Type check: Phone numbers must be digits only
  • Length check: VIN must be correct length
  • Presence check: Name, address, and state are compulsory
  • Consistency check: Local government must match selected state
  • Format check: Date of birth must be valid calendar date

Common Exam Mistakes

WAEC examiners report these common errors when students answer questions on error-free information:

  • Confusing verification and validation: Verification checks if data was copied correctly. Validation checks if data makes sense. These are different things.
  • Listing methods without explaining them: When asked to “explain”, you must describe how each method works, not just list names.
  • Giving vague examples: Instead of saying “checking data”, be specific: “checking that age falls between 1 and 120 years”.
  • Forgetting the difference between data control and validation: Control manages who enters data. Validation checks if entered data is reasonable.
  • Not mentioning real-life applications: Questions often ask for practical examples from banking, schools, or government. Always relate to Nigerian situations.

Practice Questions

Multiple Choice Questions

1. Which method ensures that only authorized people can enter data into a system?
a) Data verification
b) Data validation
c) Data control ✓
d) Data processing

2. The process of checking that data was copied correctly from source document to computer is called:
a) Validation
b) Verification ✓
c) Control
d) Processing

3. Which validation check ensures that age is not entered as 500 years?
a) Type check
b) Length check
c) Range check ✓
d) Format check

4. Entering data twice to compare both entries is an example of:
a) Data validation
b) Data control
c) Data verification ✓
d) Data processing

Essay/Theory Questions

1. Explain three methods of ensuring error-free information in data processing. (12 marks)

Examiner’s Tip: Choose data control, verification, and validation. For each method: define it (1 mark), explain how it works (2 marks), give one clear example (1 mark). Total: 4 marks × 3 methods = 12 marks.

2. State and explain four types of validation checks used in computer systems. (12 marks)

Examiner’s Tip: State the check (1 mark), explain its purpose (2 marks), give example (1 mark) for each. Choose from: range, type, length, presence, format, or consistency checks.

3. Differentiate between data verification and data validation. Give two examples of each. (10 marks)

Examiner’s Tip: Define verification (2 marks), define validation (2 marks), state two differences (2 marks), give two examples for each (2 marks each = 4 marks).

4. Using a Nigerian bank as an example, describe how error-free information is ensured during customer account opening. (8 marks)

Examiner’s Tip: Mention specific controls (only bank staff can access system), verification methods (customer confirms details on screen), and validation checks (BVN must be 11 digits, age must be 18+). Be specific and practical.

Memory Aid

Remember the three main methods using CVerVal:

  • C = Control (who can enter)
  • Ver = Verification (copied correctly)
  • Val = Validation (makes sense)

For validation types, use RLTP-FC:

  • R = Range (within limits)
  • L = Length (correct size)
  • T = Type (number/letter/date)
  • P = Presence (not empty)
  • F = Format (correct pattern)
  • C = Consistency (no contradictions)

Related Topics

  • Major Steps in Data Processing
  • Types of Errors in Data Processing
  • Data Integrity and Security
  • Input Devices and Their Uses
  • Computer Security Measures

Leave a comment

not allowed!