Content deleted Content added
m Reverted edits by 166.205.209.40 (talk) (AV) |
|||
(20 intermediate revisions by 17 users not shown) | |||
Line 1:
[[File:Keypunching at Texas A&M2.jpg|thumb|right|Two women entering data onto punched cards at Texas A&M in the 1950s. The woman at the right is seated at an [[IBM 026]] keypunch machine. The woman at left is at an [[Keypunch#IBM 056 Card Verifier|IBM 056]] Card Verifier. She would re-enter the data and the '056 verifier machine would check that it matched the data punched onto the cards.]]
'''Two
The [[Keypunch#IBM 056 Card Verifier|IBM 056]] and [[Keypunch#IBM 059 Card Verifier|059]] Card Verifiers were companion machines to the IBM 026 and 029 keypunches, respectively. The later IBM 129 keypunch also could operate as a verifier. In that mode, it read a completed card (record) and loaded the 80 keystrokes into a buffer. A data entry operator reentered the record and the keypunch compared the new keystrokes with those loaded into the buffer. If a discrepancy occurred the operator was given a chance to reenter that keystroke and ultimately overwrite the entry in the buffer. If all keystrokes matched the original card, it was passed through and received a verification punch. If corrections were required, then the operator was prompted to discard the original card and insert a fresh card on which corrected keystrokes were typed. The corrected record (card) was passed through and received a corrected verification punch.<ref>{{cite
▲'''Two pass verification''', also called '''double data entry''', is a data entry quality control method that was originally employed when data records were entered onto sequential 80 column [[Hollerith card]]s with a [[keypunch]]. In the first pass through a set of records, the data keystrokes were entered onto each card as the data entry operator typed them. On the second pass through the batch, an operator at a separate machine, called a ''verifier,'' entered the same data. The verifier compared the second operator's keystrokes with the contents of the original card. If there were no differences, a verification notch was punched on the right edge of the card. [http://www.museumwaalsdorp.nl/computer/en/punchcards.html]
▲The later IBM 129 keypunch also could operate as a verifier. In that mode, it read a completed card (record) and loaded the 80 keystrokes into a buffer. A data entry operator reentered the record and the keypunch compared the new keystrokes with those loaded into the buffer. If a discrepancy occurred the operator was given a chance to reenter that keystroke and ultimately overwrite the entry in the buffer. If all keystrokes matched the original card, it was passed through and received a verification punch. If corrections were required then the operator was prompted to discard the original card and insert a fresh card on which corrected keystrokes were typed. The corrected record (card) was passed through and received a corrected verification punch. [http://ed-thelen.org/comp-hist/IBM-ProdAnn/129.pdf]
==Modern use==
While this method of quality control clearly is not proof against systematic errors or operator misread entries from a source document, it is very useful in catching and correcting random miskeyed strokes which occur even with experienced data entry operators. However, it proved to be a fatally tragic flaw in the [[Therac 25]] incident. This method has survived the keypunch and is available in some currently available data entry programs (e.g. [[PSPP]]/[[SPSS]] Data Entry).
==References==
{{Reflist}}
{{DEFAULTSORT:Two Pass Verification}}
[[Category:Data
[[Category:
|