Enhanced Discovering Computers, Fundamentals: Your Interactive Guide To The Digital World, 2013 Edition (shelly Cashman)
Enhanced Discovering Computers, Fundamentals: Your Interactive Guide To The Digital World, 2013 Edition (shelly Cashman)
1st Edition
ISBN: 9781133596448
Author: Misty E. Vermaat
Publisher: Cengage Learning
Expert Solution & Answer
Book Icon
Chapter 11, Problem 7SG

Explanation of Solution

Validation:

Validation is done for comparing data with certain rules to find whether the data meets some criteria.

  • It is a process for checking the data whether it make some meaning or not.
  • Many programs perform validation at the time of entering the data or on entered data.
  • Assume that, there is an admission of new student...

Explanation of Solution

Type of validity checks:

Alphabetic/Numeric Check:

  • Alphabetic check ensures the user enters only alphabetic values to the field. For example, in the field of First Name user should only enter the alphabetic character only.
  • Numeric checks ensure that user enters only numeric values to the field. For example, in the field of Current Enrollment, user can enter only integer values.

Range check:

  • Range check ensures that the user enters a value is within a specified range. For example, assume that the lowest per credit hour fee at the school is $75.00 and the highest is $370.75.
  • A range check ensures whether the credit hour fee field value is between $75.00 and $370.75.

Consistency check:

  • A consistency check will test the data in one field or two or more fields to ensure that the relationship is logically correct and their data format is correct.
  • In this check, it will concentrate to maintain the physical and logical consistency of database.
  • For example, the field date of admission of a student in particular institution cannot be earlier in time than the value in student’s date of birth field...

Blurred answer
Students have asked these similar questions
I would like to get help to resolve the following case
Last Chance Securities The IT director opened the department staff meeting today by saying, "I've got some good news and some bad news. The good news is that management approved the payroll system project this morning. The new system will reduce clerical time and errors, improve morale in the payroll department, and avoid possible fines and penalties for noncompliance. The bad news is that the system must be installed by January 1st in order to meet new federal reporting rules, all expenses from now on must be approved in advance, the system should have a modular design if possible, and the vice president of finance would like to announce the new system in a year-end report if it is ready by mid-December." Tasks 1. Why is it important to define the project scope? How would you define the scope of the payroll project in this case? 2. Review each constraint and identify its characteristics: present versus future, internal versus exter- nal, and mandatory versus desirable. 3. What…
2. Signed Integers Unsigned binary numbers work for natural numbers, but many calculations use negative numbers as well. To deal with this, a number of different methods have been used to represent signed numbers, but we will focus on two's complement, as it is the standard solution for representing signed integers. 2.1 Two's complement • Most significant bit has a negative value, all others are positive. So, the value of an n-digit -2 two's complement number can be written as: Σ2 2¹ di 2n-1 dn • Otherwise exactly the same as unsigned integers. i=0 - • A neat trick for flipping the sign of a two's complement number: flip all the bits (0 becomes 1, or 1 becomes 0) and then add 1 to the least significant bit. • Addition is exactly the same as with an unsigned number. 2.2 Exercises For questions 1-3, answer each one for the case of a two's complement number and an unsigned number, indicating if it cannot be answered with a specific representation. 1. (15 pts) What is the largest integer…

Chapter 11 Solutions

Enhanced Discovering Computers, Fundamentals: Your Interactive Guide To The Digital World, 2013 Edition (shelly Cashman)

Ch. 11 - Prob. 11SGCh. 11 - Prob. 12SGCh. 11 - Prob. 13SGCh. 11 - Prob. 14SGCh. 11 - Prob. 15SGCh. 11 - Prob. 16SGCh. 11 - Prob. 17SGCh. 11 - A(n) _____ is a request for specific information...Ch. 11 - Prob. 19SGCh. 11 - Prob. 20SGCh. 11 - Prob. 21SGCh. 11 - Prob. 22SGCh. 11 - Prob. 23SGCh. 11 - Prob. 24SGCh. 11 - Prob. 25SGCh. 11 - Prob. 26SGCh. 11 - Prob. 27SGCh. 11 - Prob. 28SGCh. 11 - Prob. 29SGCh. 11 - Prob. 30SGCh. 11 - Prob. 31SGCh. 11 - Prob. 32SGCh. 11 - Prob. 33SGCh. 11 - Prob. 34SGCh. 11 - Prob. 35SGCh. 11 - Prob. 36SGCh. 11 - Prob. 37SGCh. 11 - Prob. 38SGCh. 11 - Prob. 39SGCh. 11 - Prob. 40SGCh. 11 - Prob. 41SGCh. 11 - Prob. 42SGCh. 11 - Prob. 43SGCh. 11 - Define the following terms: programming language,...Ch. 11 - Prob. 45SGCh. 11 - Define the terms, procedural language, compiler,...Ch. 11 - Prob. 47SGCh. 11 - Prob. 48SGCh. 11 - Prob. 49SGCh. 11 - Prob. 1TFCh. 11 - Prob. 2TFCh. 11 - Prob. 3TFCh. 11 - Prob. 4TFCh. 11 - Prob. 5TFCh. 11 - Prob. 6TFCh. 11 - Prob. 7TFCh. 11 - Prob. 8TFCh. 11 - One way to secure a database is to allow only...Ch. 11 - In a rollforward, the DBMS uses the log to undo...Ch. 11 - Prob. 11TFCh. 11 - Prob. 12TFCh. 11 - Prob. 1MCCh. 11 - Prob. 2MCCh. 11 - Prob. 3MCCh. 11 - Prob. 4MCCh. 11 - Prob. 5MCCh. 11 - Prob. 6MCCh. 11 - _____ feasibility measures whether an organization...Ch. 11 - Prob. 8MCCh. 11 - Prob. 1MCh. 11 - Prob. 2MCh. 11 - Prob. 3MCh. 11 - Prob. 4MCh. 11 - Prob. 5MCh. 11 - Prob. 6MCh. 11 - Prob. 7MCh. 11 - Prob. 8MCh. 11 - Prob. 9MCh. 11 - Prob. 10MCh. 11 - Prob. 2CTCh. 11 - Prob. 3CTCh. 11 - What is function creep?Ch. 11 - Prob. 5CTCh. 11 - Prob. 6CTCh. 11 - Prob. 7CTCh. 11 - Prob. 8CTCh. 11 - Prob. 9CTCh. 11 - Prob. 10CTCh. 11 - Prob. 11CTCh. 11 - Prob. 12CTCh. 11 - Prob. 13CTCh. 11 - Prob. 14CTCh. 11 - Prob. 15CTCh. 11 - Prob. 16CTCh. 11 - Prob. 17CTCh. 11 - Prob. 18CTCh. 11 - Prob. 19CTCh. 11 - Prob. 20CTCh. 11 - Prob. 21CTCh. 11 - Prob. 22CTCh. 11 - Prob. 23CTCh. 11 - Prob. 24CTCh. 11 - Prob. 25CTCh. 11 - Prob. 26CTCh. 11 - Prob. 27CTCh. 11 - Prob. 28CTCh. 11 - Prob. 1PSCh. 11 - Prob. 2PSCh. 11 - Prob. 3PSCh. 11 - Prob. 4PSCh. 11 - Prob. 5PSCh. 11 - Prob. 6PSCh. 11 - Prob. 7PSCh. 11 - Prob. 8PSCh. 11 - Database Recovery Your boss has informed you that...Ch. 11 - Prob. 10PSCh. 11 - Prob. 11PSCh. 11 - Prob. 1.1ECh. 11 - Prob. 1.2ECh. 11 - Prob. 1.3ECh. 11 - Prob. 2.1ECh. 11 - Prob. 2.2ECh. 11 - Prob. 2.3ECh. 11 - Prob. 3.1ECh. 11 - Prob. 3.2ECh. 11 - Prob. 3.3ECh. 11 - Prob. 4.1E
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Text book image
CMPTR
Computer Science
ISBN:9781337681872
Author:PINARD
Publisher:Cengage
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781305627482
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning