Describe and use methods of data verification during data entry and data transfer
6.2 Data Integrity – Keeping Your Data Safe and Sound
What is Data Integrity?
Data integrity means that the data you store, send, or receive is exactly what it was intended to be – no accidental changes, no missing bits, and no tampering. Think of it as a promise that the information stays the same from the moment you type it until it reaches its destination.
Why Do We Need Verification?
- 🛡️ Prevents accidental corruption (e.g., bad memory, network glitches)
- 🔒 Detects intentional tampering (e.g., hacking, fraud)
- 📦 Ensures reliable data transfer between systems
- ?? Helps meet exam requirements for “data verification” questions
Common Verification Techniques
Data Entry Verification (Getting It Right the First Time)
- 🔍 Input Validation – Check that the data matches the expected format (e.g., email, phone number). Use regular expressions or built‑in validation.
- ?? Immediate Feedback – Show a green checkmark or red cross as the user types.
- 🔁 Confirmation Step – Ask the user to confirm critical data (e.g., “Is this your email?”).
- 📦 Use Constraints – Set min/max lengths, required fields, and data type restrictions in the database.
Data Transfer Verification (Keeping It Safe on the Move)
- 📦 Checksum or CRC – Attach a checksum to each packet. The receiver recomputes and compares.
- 🔒 Secure Protocols – Use HTTPS, SFTP, or TLS to encrypt and authenticate.
- 🧪 Error‑Correcting Codes – Add redundancy so the receiver can fix some errors (e.g., Hamming code).
- 🔍 Digital Signatures – Verify that the data came from a trusted source.
Example: Simple Checksum Calculation
Suppose we send the ASCII string "HELLO". Each letter has a numeric value:
| Letter | ASCII |
|---|---|
| H | 72 |
| E | 69 |
| L | 76 |
| L | 76 |
| O | 79 |
Checksum = (72 + 69 + 76 + 76 + 79) mod 256 = 372 mod 256 = 116.
Receiver recomputes 116 and confirms the data is intact.
Exam Tip Box
Tip 1: When asked to calculate a checksum, show the step‑by‑step addition and the modulo operation.
Tip 2: For CRC, explain the polynomial division process and why it catches burst errors.
Tip 3: Use LaTeX for formulas: e.g., $C = \sum_{i=1}^{n} x_i \bmod 256$.
Tip 4: Remember the difference between verification (checking correctness) and authentication (proving source).
Quick Recap (Flashcards)
- 📦 Checksum – Simple sum, fast, good for small data.
- 🔁 CRC – Polynomial, catches more error patterns.
- 🔒 Hash + Signature – Ensures authenticity and integrity.
- 🛠️ Validation Rules – Prevent bad data at entry.
Revision
Log in to practice.