6.2 SecurityPrivacy&DataIntegrity.data_integrity Flashcards

1
Q

What is data integrity?

A

Data integrity refers to the accuracy, completeness, and consistency of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can data integrity be compromised?

A
  • During data entry and data transmission.
  • By malicious attacks like malware or hacking.
  • Through accidental data loss from hardware issues.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are two methods used to ensure data integrity?

A

Validation and verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is validation?

A

A method used to ensure entered data is reasonable and meets specific input criteria.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is verification?

A

A method used to ensure data is correct, using techniques like double entry or visual checks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a check digit?

A

An additional digit appended to a number to verify if the entered data is error-free.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is a check digit calculated using Modulo-11?

A

By applying modulus division by 11 to determine the check digit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a checksum?

A

A verification method used to detect if data has been altered or corrupted during transfer, calculated from the data block being sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a parity check?

A

A method for verifying if data was transferred correctly, using even or odd parity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a parity bit?

A

An extra bit added at the end of a byte to maintain the correct parity according to the sender/receiver’s protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a parity block?

A

A combination of horizontal and vertical parity checks used on a block of data during transfer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can you mitigate risks to data integrity?

A
  • Use validation and verification during data entry.
  • Protect systems against malware and hacking.
  • Implement regular data back-ups to prevent accidental data loss.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a parity byte?

A

A parity byte is an additional byte sent with transmitted data to enable vertical parity checking, alongside horizontal parity checking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Automatic Repeat Request (ARQ)?

A

ARQ is a type of verification check used to ensure data is received correctly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an acknowledgement in data transmission?

A

A message sent to the sender to confirm that data has been received without error.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is validation?

A

A method of checking if entered data is reasonable and within given criteria, but it does not confirm if the data is accurate or correct.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Can validation detect accurate data entry mistakes?

A

No, validation checks if data is reasonable, but it cannot verify its accuracy (e.g., entering age as 62 instead of 26 would pass validation).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are common types of validation tests?

9

A
  • Type check: Ensures data is of the correct type (e.g., numbers only in numeric fields).
  • Range check: Ensures data falls within specified limits.
  • Format check: Ensures data matches a required format (e.g., date format).
  • Length check: Ensures data has the required number of characters.
  • Presence check: Ensures mandatory fields are not left empty.
  • Existence check: Ensures referenced data or files actually exist.
  • Limit check: Checks either the upper or lower limit (but not both).
  • Consistency check: Ensures related fields have logically consistent data.
  • Uniqueness check: Ensures entered data is unique (e.g., usernames).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Give an example of a type check validation.

A

Entering “sk.34” in a price field would fail, but entering “34.50” would pass.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a range check, and give an example.

A

It checks if data falls within set limits. Example: Entering age as “-120” fails; “48” passes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Provide an example of a format check validation.

A

Entering a date as “12-12-20” fails if the format is “dd/mm/yyyy”, while “12/12/2020” passes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a length check with an example?

A

It verifies if data meets required length. Example: A phone number “012 345 678” fails if 11 digits are needed, while “012 345 678 90” passes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a presence check with an example?

A

Ensures required fields are filled. Example: Leaving a passport number field empty fails, while “AB 1234567 CD” passes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is an existence check with an example?

A

Verifies if data or a file exists. Example: Searching for non-existent car registration “A123BCD” fails, while finding “books_in_stock” in a database passes.

25
Q

What is a limit check with an example?

A

Checks data against a single limit. Example: Entering “-25” for age fails if negative values are not allowed; “72” passes if the upper limit is 140.

26
Q

What is a consistency check with an example?

A

Ensures data in related fields is logically consistent. Example: Selecting “Mr” as a title and “female” as gender fails; selecting “Ms” and “female” passes.

27
Q

What is a uniqueness check with an example?

A

Ensures data is unique. Example: Choosing “MAXIMUS222” fails if already taken; website name “Aristooo.com” passes if it’s unused.

28
Q

What is verification in data entry?

A

Verification is a method of preventing errors when data is manually entered or transferred between computers.

29
Q

What are the three common methods of verification during data entry?

A
  • Double Entry: Data is entered twice by two people and compared for discrepancies.
  • Visual Check: Data on the screen is compared with the original document to identify errors.
  • Check Digits: An additional digit is added to a number to detect errors during data entry.
30
Q

How does double entry verification work?

A

Data is entered twice, often by two different individuals, and the entries are compared to identify inconsistencies.

31
Q

What is a visual check in verification?

A

A manual comparison of the entered data with the original source document to ensure accuracy.

32
Q

What is a check digit?

A

An extra digit added to a number (usually at the end) to help detect errors like incorrect entries, transpositions, omissions, or phonetic mistakes.

33
Q

Where are check digits commonly used?

A

In barcodes, ISBNs (books), and VINs (vehicle identification numbers).

34
Q

What types of errors can check digits detect?

A
  • Incorrect digits: e.g., entering 8190 instead of 8180.
  • Transposition errors: e.g., entering 8108 instead of 8180.
  • Omitted or added digits: e.g., entering 818 or 81180 instead of 8180.
  • Phonetic errors: e.g., entering 13 (thirteen) instead of 30 (thirty).
35
Q

What is the modulo-11 method for calculating check digits?

A
  1. Assign weightings from 7 to 1 (left to right) to each digit in a 7-digit number.
  2. Multiply each digit by its weighting and sum the results.
  3. Divide the total by 11 and find the remainder.
  4. Subtract the remainder from 11 to get the check digit (if the result is 10, ‘X’ is used).
36
Q

Can you provide an example of modulo-11 check digit calculation?

A
  • Number: 4 1 5 6 7 1 0
  • Weightings: 7, 6, 5, 4, 3, 2, 1
  • Calculation: (7×4) + (6×1) + (5×5) + (4×6) + (3×7) + (2×1) + (1×0) = 106
  • 106 ÷ 11 = 9 remainder 7
  • 11 − 7 = 4 (check digit)
  • Final number: 4 1 5 6 7 1 0 4

If an incorrect number like 4 1 5 7 6 1 0 4 is entered and it does not pass check digit verification. The recalculated check digit would be 3 instead of 4, indicating an error occurred during data entry.

37
Q

How does the check digit help detect errors?

A

When the number is re-entered, the check digit is recalculated. If the new check digit doesn’t match the original, an error is detected.

38
Q

What is verification during data transfer?

A

Verification during data transfer ensures data is not corrupted or lost when sent electronically between devices.

39
Q

What are some common methods of verification during data transfer?

A
  • Checksums
  • Parity Checks
  • ARQ
40
Q

What is a checksum?

A

A checksum is a value calculated from a block of data and sent along with the data to detect any changes or corruption during transmission.

41
Q

How is a checksum calculated?

A
  1. Add all the byte values in the data block.
  2. If the sum (X) is ≤ 255, the checksum equals this value.
  3. If X > 255:
    • Divide X by 256: X / 256
    • Round down the result to get Y.
    • Multiply Y by 256 to get Z.
    • Subtract Z from X: X - Z (this is the checksum).
42
Q

Example of checksum calculation:

A
  • Sum of bytes (X) = 1185
  • 1185 / 256 = 4.629 → Y = 4 (rounded down)
  • 4 times 256 = 1024 (Z)
  • 1185 - 1024 = 161 (checksum)
43
Q

How does a checksum detect errors?

A

The sender’s checksum is compared with the receiver’s recalculated checksum. If they differ, an error occurred, triggering a request to resend the data.

44
Q

What is a parity check?

A

A parity check uses a parity bit to detect errors in data transmission, ensuring the correct number of 1-bits based on even or odd parity.

45
Q

What is a parity bit?

A

An extra bit added to a byte before transmission to ensure the total number of 1-bits is even (even parity) or odd (odd parity).

46
Q

How does even parity work?

A

The parity bit is set so the total number of 1-bits is even.
- Example: Data = 1 1 0 1 1 0 0 (4 ones → already even)
- Parity bit = 0 → Final byte: 0 1 1 0 1 1 0 0

47
Q

How does odd parity work?

A

The parity bit is set so the total number of 1-bits is odd.
- Example: Data = 1 1 0 1 1 0 0 (4 ones → even)
- Parity bit = 1 → Final byte: 1 1 1 0 1 1 0 0

48
Q

How does a parity check detect errors?

A

After transmission, the receiver recalculates the parity. If it doesn’t match the agreed parity (even/odd), an error is detected.

49
Q

Example of parity error detection:

A
  • Sender’s byte (even parity): 0 1 0 1 1 1 0 0 (4 ones → even)
  • Receiver’s byte: 0 1 0 0 1 1 0 0 (3 ones → odd)
  • Result: Error detected because parity changed from even to odd.
50
Q

Can a parity check identify the exact bit in error?

A

No, it can detect that an error occurred but cannot specify which bit is incorrect.

51
Q

What is the method of parity blocks in error checking for transmitted data?

A

Parity blocks involve performing a parity check both horizontally and vertically on a block of data to identify and locate errors. The method uses a parity byte that indicates the result of the vertical parity check and marks the end of the data block.

52
Q

What does a parity byte represent in the parity block method?

A

The parity byte consists entirely of the parity bits from the vertical parity check of the data block and also indicates the end of the transmitted data block.

53
Q

When might it be impossible to locate an error using the parity block method?

A

It may be impossible to locate the error if an even number of bits change value during transmission, as this would not alter the overall parity in a way that helps identify the specific error.

54
Q

What is Automatic Repeat Request (ARQ) in error checking?

A

ARQ is a method that involves sending an acknowledgment message to confirm correct data receipt, and requesting a re-send if an error is detected, or if a timeout occurs before acknowledgment.

55
Q

How does ARQ work when no error is detected in transmitted data?

A

If no error is detected, a positive acknowledgment is sent to the sender to confirm that the data has been received correctly.

56
Q

What happens if an error is detected during data transmission using ARQ?

A

If an error is detected, the receiving device requests the sending device to re-send the data packet.

57
Q

How does ARQ handle timeouts?

A

If a timeout occurs (i.e., the acknowledgment is not received within a specified time), the sending device will re-send the data packet.

58
Q

What is the purpose of ARQ in mobile phone networks?

A

ARQ is used in mobile phone networks to ensure data integrity by managing errors and ensuring reliable transmission.