Know and understand importance, characteristics and uses of verification including visual checking and double data entry to reduce data entry errors
15 Proofing (Verification)
Learning Objectives
Explain why verification (proofing) is essential when handling data.
Identify the purpose and key characteristics of effective verification (AO3 – analyse/evaluate reliability).
Describe the software tools and techniques used for proofing, including visual checking, double data entry, validation rules, cross‑checking totals, checksums and audit trails.
Apply appropriate proofing techniques in documents, spreadsheets, databases and presentations to minimise data‑entry errors.
Understand the eSafety, data‑protection and health‑&‑safety implications of proofing personal or critical data.
Why Proofing Matters
Data underpins every decision, report and analysis. Errors can cause:
Incorrect conclusions and poor decisions.
Loss of credibility for individuals and organisations.
Financial loss, legal issues or safety hazards (e.g., wrong dosage in a medical record).
Wasted time correcting mistakes after they have been used.
Proofing is the systematic process of checking data for accuracy before it is stored, processed or published.
Purpose and Characteristics of Verification (AO3)
Systematic: Follow a documented procedure each time data is entered.
Independent: Where possible, the checker is not the original data‑entry operator.
Timely: Errors are identified as soon as possible, ideally before the data is used.
Documented: Record how verification was carried out and any corrections made.
Risk‑based: Critical data receives more rigorous proofing.
Proofing and eSafety / Data Protection
When personal or sensitive information is being proofed, learners must also consider:
Confidentiality: Verify that no unauthorised personal data is exposed; use redaction, encryption or password‑protected files where required.
Data‑protection compliance: Ensure that proofing actions respect GDPR or local data‑privacy regulations (e.g., do not copy personal data to insecure devices).
Health & safety impact: Incorrect data in safety‑critical systems (e.g., engineering specifications, medical dosages) can lead to physical harm.
Software Tools for Proofing
Spell‑check & Grammar‑check – Quick Guide
Activate via the Review tab (Word, PowerPoint) or Tools menu (Google Docs/Sheets).
Common settings: “Ignore ALL CAPS”, “Add to dictionary”, “Suggest alternatives”.
Limitations: cannot detect correctly‑spelled but factually wrong data; rely on the user to accept or reject suggestions.
Backup in a format that retains constraints (e.g., .accdb, .sql dump).
Presentations (PowerPoint, Google Slides)
Spell‑check and peer review of slide text.
Visual check that charts/tables match source data.
Export final version as PDF to lock in content.
Practical Example – Double Entry in a Spreadsheet
School exam scores entered by two operators. The comparison highlights a discrepancy that is then corrected.
Student ID
Score (Entry A)
Score (Entry B)
Status
00123
78
78
OK
00124
85
58
Mismatch – review source
00125
92
92
OK
Tips for Reducing Data‑Entry Errors
Use clear, well‑structured source documents (tables, labelled fields).
Train staff on common error types (transposition, omission, duplication).
Implement field‑level validation (numeric only, date format, mandatory fields).
Schedule regular breaks to avoid fatigue.
Maintain an error‑log and analyse trends to improve the proofing process.
When handling personal data, double‑check that no sensitive information is inadvertently displayed.
Suggested Diagram
Flowchart of the double‑data‑entry verification cycle: parallel entry → automated comparison → error resolution → final approval → audit‑trail record.
Summary
Proofing is a vital quality‑control step in ICT. By understanding why it is needed, applying systematic characteristics, and using the appropriate software tools and techniques (spell‑check, grammar‑check, validation rules, visual checking, double data entry, cross‑checking totals, checksums and audit trails), learners can dramatically reduce data‑entry errors across documents, spreadsheets, databases and presentations. This not only improves the reliability of information for decision‑making (AO3) but also safeguards personal data, complies with eSafety standards, and prevents health‑ and safety risks.
Support e-Consult Kenya
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources,
past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.