1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Semenov [28]
3 years ago
9

What is Data validation? (in a simple definition)

Computers and Technology
2 answers:
Slav-nsk [51]3 years ago
8 0
Data validation is a process that ensures the delivery of clean and clear data to the programs, applications and services using it.
(For a simple definition.)


It checks for the integrity and validity of data that is being inputted to different software and its components. Data validation ensures that the data complies with the requirements and quality benchmarks.
(Add this on if you want it longer.)
dlinn [17]3 years ago
7 0
Verify data, something like this

var username = document.getElementById("input1").value

var password = document.getElementById("input2").value

// this is the validation:
if ( username == "anime" && password == "Anime132" ){
alert("Correct login data");
} else {
alert("Wrong login data");
}
You might be interested in
Which of the following operations are considered to be crucial tasks that should be performed before installing server roles and
Bas_tet [7]

Answer:

A. Static IP address have been configured.

Explanation:

A network is an interconnection of network devices for communication to occur. A network comprises of end devices and intermediate network devices.

End devices are the sources and destinations of data transmission, while intermediate devices are the devices that makes communication of data possible like routers and switches. Examples of end devices are servers and workstations (computers, smartphones etc.).

A server in a network is a device that provides special services to workstations or clients. The IP addresses of servers must be known, that is, a static IP address must be configured on a server. Examples of server protocols are DNS, TFTP, FTP, DHCP etc.

8 0
3 years ago
What type of encoding is this?<br>0x6a656c6c7966697368<br>cause I'm trying to decode it
katen-ka-za [31]
According to its structure I'd say that this is SEAL (<span>Software-Optimized Encryption Algorithm). It's difficult to describe how it works, because this kind of ciphers is very tricky. This algorithm uses 160 bit key and it uses 3 tables (R, S, T) to encode and decode.

I'll attach the image where you can see a process of creating a pseudo-random function:
</span>

7 0
3 years ago
What is cpu?<br>please give me right answer ​
LUCKY_DIMON [66]

Answer:

Explanation:

processor such as intel/amd processors

7 0
2 years ago
Read 2 more answers
The default setting for a secondary zone's refresh interval is how many minutes
Vinil7 [7]
The default value at which a refresh interval (an interval a sec. server check for zone updates) is 15 minutes.
If this value is increased, the network traffic is reduced. In the eventuality that the refresh interval expires, the secondary zone will contact the primary zone and request it to initiate the zone transfer.
4 0
3 years ago
Which of the following statements is true about scalability? Choose 3 options.
Simora [160]

Answer:

4, 5, 2

Explanation:

just did it on edge :)

3 0
3 years ago
Read 2 more answers
Other questions:
  • In a process called _____, excel continually reviews the workbook for errors in formulas as you create or manipulate it.
    13·1 answer
  • Computer-aided design software is used primarily by:
    13·1 answer
  • Which of the following components controls the opening and closing of the valves in an engine ?
    15·2 answers
  • We will pass in 2 values, X and Y. You should calculate XY XY and output only the final result. You will probably know that XY X
    13·1 answer
  • This form of analysis is an extension of what-if analysis and is the study of the impact on other variables when one variable is
    8·1 answer
  • Which system utility can you use to troubleshoot a computer that's slow to start by enabling or disabling startup programs?
    7·2 answers
  • Next, Leah wants to add a content slide that allows her to insert a table.
    8·2 answers
  • A(n) ___________________ is a set of characters that the originator of the data uses to encrypt the text and the recipient of th
    10·1 answer
  • !!! PLEASE HELP ASAP REALLY NEED IT !!!
    15·2 answers
  • FOR A BRAINLIEST
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!