Systems Analysis and Design (Shell...

11th Edition
Scott Tilley + 1 other
ISBN: 9781305494602



Systems Analysis and Design (Shell...

11th Edition
Scott Tilley + 1 other
ISBN: 9781305494602
Textbook Problem

What e input masks� What are validation rules? Why are they important?

Program Plan Intro

Input masks, validation rules and their importance.

Program Explanation

Input mask:

  • An input mask is used to restrict the user to enter the information only in the format readable by the system.
  • It is a template, or a pre-defined format for the input.
  • For example, the date format must be dd-mm-yy.

Validation rules:

  • Validation is the process of finding correctness in data. In this process, the data entered by user is compared with set of rules.
  • A validation rule is like a quality check, which tests the input with a pre-defined set of conditions, or input masks, and rejects the input if the test returns failure.
  • For example if a user enters the salary in the name field, then this process informs user about the wrong entry.

There are eight data validation rules described below:

  1. Sequence check: Sequence check is performed on the data which is checked in an orderly or sequential manner.
  2. Existence check: Existence check uses only those data items, which are mandatory.
  3. Data type check: A data type check is a kind of validation that is used to ensure that the proper format is followed for the required data...

Still sussing out bartleby?

Check out a sample textbook solution.

See a sample solution

The Solution to Your Study Problems

Bartleby provides explanations to thousands of textbook problems written by our experts, many with advanced degrees!

Get Started

Additional Engineering Solutions

Find more solutions based on key concepts

Show solutions add

Define the term “computer network.”

Fundamentals of Information Systems

Seasoned engineers are good at estimating physical values without using tools. Therefore, you need to begin dev...

Engineering Fundamentals: An Introduction to Engineering (MindTap Course List)

What is a technical security control?

Management Of Information Security

Making Use of the Web Website Creation and Management Retailers and organizations realize the importance of hav...

Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)

What two types of modulation does DSL use to carry data?

Network+ Guide to Networks (MindTap Course List)