Two pass verification


Two pass verification

Two pass verification, also called double data entry, is a data entry quality control method that was originally employed when data records were entered onto sequential 80 column Hollerith cards with a keypunch. In the first pass through a set of records, the data keystrokes were entered onto each card as the data entry operator typed them. On the second pass through the batch, an operator at a separate machine, called a verifier, entered the same data. The verifier compared the second operator's keystrokes with the contents of the original card. If there were no differences, a verification notch was punched on the right edge of the card. [1]

The later IBM 129 keypunch also could operate as a verifier. In that mode, it read a completed card (record) and loaded the 80 keystrokes into a buffer. A data entry operator reentered the record and the keypunch compared the new keystrokes with those loaded into the buffer. If a discrepancy occurred the operator was given a chance to reenter that keystroke and ultimately overwrite the entry in the buffer. If all keystrokes matched the original card, it was passed through and received a verification punch. If corrections were required then the operator was prompted to discard the original card and insert a fresh card on which corrected keystrokes were typed. The corrected record (card) was passed through and received a corrected verification punch. [2]

Modern use

While this method of quality control clearly is not proof against systematic errors or operator misread entries from a source document, it is very useful in catching and correcting random miskeyed strokes which occur even with experienced data entry operators. However, it proved to be a fatally tragic flaw in the Therac 25 incident. This method has survived the keypunch and is available in some currently available data entry programs (e.g. PSPP/SPSS Data Entry). At least one study suggests that single pass data entry with range checks and skip rules approaches the reliability of two-pass data entry (see Controlled Clinical Trials from sometime in the 1990s - Control Clin Trials. 1998 Feb;19(1):15-24.?); however it is desirable to implement both systems in a data entry application.


Wikimedia Foundation. 2010.

Look at other dictionaries:

  • Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in …   Wikipedia

  • Environmental Technology Verification Program — The Environmental Technology Verification (ETV) Program of the Environmental Protection Agency (EPA) in the United States develops testing protocols and verifies the performance of innovative environmental technologies that can address problems… …   Wikipedia

  • Transit Access Pass — TAP Transit Access Pass Location Los Angeles County, California Launched 2007 (soft launch) 2008 (monthly passes) 2009 (day passes) Technology Contactless smart card by …   Wikipedia

  • Data processing — otheruses|Data entry clerk Data processing is any computer process that converts data into information or knowledge. [i.e. data processing can be any computer operation or series of operations performed on data to get insightful information.] The …   Wikipedia

  • Computer data processing — Data processing redirects here. For Unit record data processing, see Unit record equipment. Computer data processing is any process that a computer program does to enter data and summarise, analyse or otherwise convert data into usable… …   Wikipedia

  • Vitamin K — has also been used as a slang term for ketamine, an unrelated anaesthetic. Vitamin K1 (phylloquinone). Both forms of the vitamin contain a functional naphthoquinone ring and an aliphatic side chain. Phylloquinone has a phytyl side chain …   Wikipedia

  • REAL ID Act — of 2005 Full title To establish and rapidly implement regulations for State driver s license and identification document security standards, to prevent terrorists from abusing the asylum laws of the United States, to unify terrorism related… …   Wikipedia

  • Metamaterial antenna — This Z antenna tested at the National Institute of Standards and Technology is smaller than a standard antenna with comparable properties. Its high efficiency is derived from the Z element inside the square that acts as a metamaterial, greatly… …   Wikipedia

  • Identity document — National identity card redirects here. For cards referred to in the English language as national identity card , see National identity card (disambiguation). An identity document (also called a piece of identification or ID, or colloquially as… …   Wikipedia

  • japan — japanner, n. /jeuh pan /, n., adj., v., japanned, japanning. n. 1. any of various hard, durable, black varnishes, originally from Japan, for coating wood, metal, or other surfaces. 2. work varnished and figured in the Japanese manner. 3. Japans,… …   Universalium