Lesson Plan

Lesson Plan
Grade: Date: 17/01/2026
Subject: Computer Science
Lesson Topic: Describe how data validation and data verification help protect the integrity of data
Learning Objective/s:
  • Describe the roles of data validation and data verification in maintaining data integrity.
  • Explain common validation techniques (type, range, format, mandatory, cross‑field) and verification methods (parity, checksum, hash, digital signature).
  • Apply appropriate validation checks in client‑side and server‑side code and select suitable verification methods for different data sensitivity levels.
  • Evaluate how combined validation and verification strategies prevent data corruption and security breaches.
Materials Needed:
  • Projector or interactive whiteboard
  • Slide deck summarising validation and verification concepts
  • Sample code snippets (HTML/JavaScript form, server‑side validation script)
  • Worksheets with validation/verification exercises
  • Computers with an IDE or code editor
  • Example data files for checksum calculation
  • Handout summarising techniques and key terms
Introduction:

Begin with a quick poll: “What could happen if a system accepted any data without checks?” Connect this to prior lessons on database constraints. Explain that today’s success criteria are to identify validation and verification techniques and to demonstrate them in practice.

Lesson Structure:
  1. Do‑now (5'): Quick quiz on data integrity concepts – teacher reviews answers.
  2. Mini‑lecture (10'): Define data validation vs. verification; show comparison table.
  3. Guided demo (15'): Live coding of client‑side form validation (type, range, regex) and server‑side checks.
  4. Hands‑on activity (20'): In pairs, students add validation to a sample form and compute an 8‑bit checksum for a provided data file.
  5. Verification demo (10'): Run a Python script to generate and compare SHA‑256 hashes.
  6. Think‑pair‑share (5'): Discuss why both validation and verification are essential.
  7. Formative check (5'): Exit ticket – list two validation techniques and two verification methods learned.
Conclusion:

Recap the key points: validation stops bad data entering, verification catches corruption after storage or transmission. Collect exit tickets and highlight a few responses. For homework, assign students to create a short webpage with at least three validation rules and a script that generates a checksum for a user‑uploaded file.