Data Validation and Verification: Methods and Techniques
CSEC IT: Data Quality Assurance
Essential Understanding: Accurate data is the foundation of reliable information systems. Data validation and verification are critical processes that ensure data entered into computer systems is both reasonable and correct. These concepts are fundamental to the CSEC Information Technology syllabus and appear regularly in examinations.
🎯 Learning Objectives
By the end of this article, you should be able to:
- Define data validation and data verification
- Distinguish clearly between validation and verification
- Identify and explain common validation methods used in information systems
- Describe verification techniques used in data processing
- Apply validation and verification concepts to CSEC-style examination questions
Introduction: Why Data Accuracy Matters
In today's digital world, data is the backbone of virtually every organization, from schools and businesses to government agencies and healthcare facilities. The accuracy of this data directly impacts the quality of decisions made, services provided, and operations conducted. When data contains errors—whether through typos, incorrect entries, or system glitches—the consequences can range from minor inconveniences to serious financial losses or even safety risks.
Consider a school's student registration system: if a student's date of birth is entered incorrectly, it could affect their eligibility for certain programs, their graduation date, or even their exam registration. Imagine a student whose birth year was entered as 2015 instead of 2005—they might be incorrectly placed in a grade below their appropriate level. Similarly, if exam results are entered with the wrong student identification numbers, the wrong students could receive the wrong grades, potentially affecting their future educational opportunities.
📝 Real-World Example: Examination Data Processing
The Caribbean Examination Council (CXC) processes results for hundreds of thousands of students across the Caribbean each year. Each student's record includes personal details, subject entries, and multiple assessment marks. A single error in any of these fields could result in:
- Incorrect certification of a student
- Wrong grades appearing on transcripts
- Students missing out on tertiary education opportunities
- Appeals and costly reissuing of certificates
To prevent these issues, CXC employs both validation (to ensure data is reasonable) and verification (to ensure data is correct) at every stage of data processing.
What Is Data Validation?
Data validation is the process of checking that data entered into a system is reasonable, logical, and follows predefined rules. It does not confirm that the data is absolutely correct—rather, it ensures that the data falls within acceptable parameters. Think of validation as a gatekeeper that asks: "Does this data make sense?"
When you enter your age as "150" into an online form, validation would flag this as invalid because no human being could be 150 years old. However, validation would not catch the error if you entered "25" when you are actually 30—both are reasonable ages. Validation deals with the format, range, and structure of data, not its absolute truth.
Key Characteristics of Data Validation
Understanding the nature of validation helps distinguish it from verification. Validation is primarily automated, meaning it happens without human intervention through programmed rules in software. It is rule-based, operating on predefined constraints such as "age must be between 0 and 120" or "email must contain @ symbol." Validation is pre-emptive, occurring before data is accepted into the system to prevent errors at the source.
Common Data Validation Methods
Information systems employ various validation techniques to ensure data quality. Each method addresses specific types of errors and is suited to particular kinds of data. Below, we explore the most common validation methods you need to know for your CSEC Information Technology examination.
CSEC Validation Methods Summary
✅ Presence Check: Ensures required data is not left empty
✅ Range Check: Verifies numerical data falls within acceptable bounds
✅ Type Check: Ensures correct data type is entered
✅ Length Check: Verifies character count is correct
✅ Format Check: Ensures data follows specific pattern
✅ Check Digit: Detects transcription errors through calculated digit
1. Presence Check
A presence check (also called a required field check) ensures that essential data has actually been entered and is not left blank. This is one of the most basic and common validation methods. When you register for an account online and see an error message saying "Email address is required," you have encountered a presence check.
📝 Example
Scenario: A school registration form requires students to enter their Student ID Number.
Validation Rule: The Student ID field cannot be empty.
Result: If a user tries to submit the form without entering an ID number, the system displays an error message like "Please enter your Student ID Number" and prevents submission.
2. Range Check
A range check verifies that numerical or date data falls within a specified minimum and maximum value. This validation method ensures that entered data is within realistic or acceptable boundaries. It is commonly used for quantities, ages, scores, dates, and other numerical data with known limits.
📝 Example
Scenario: An exam score entry system accepts marks from 0 to 100.
Validation Rule: Mark ≥ 0 AND Mark ≤ 100
Result: If a teacher tries to enter "150" as a mark, the system rejects it with the message "Marks must be between 0 and 100."
3. Type Check
A type check ensures that data entered matches the expected data type. For example, a field expecting a number should not accept text characters, and a field expecting text should not accept purely numerical entries. This prevents fundamental mismatches between what the system expects and what the user provides.
📝 Example
Scenario: A banking application asks for the number of deposit slips.
Validation Rule: The field must contain only numeric characters (0-9).
Result: If a user tries to enter "five" instead of "5," the system displays "Please enter a valid number" and rejects the input.
4. Length Check
A length check verifies that the amount of data entered falls within a specified character length range. This is particularly useful for fields like identification numbers, postal codes, and usernames where the system expects a specific number of characters. Too few or too many characters indicate a potential error.
📝 Example
Scenario: A Caribbean telephone number entry system expects 10 digits (e.g., 246-555-1234).
Validation Rule: Phone number length must be exactly 10 characters (excluding hyphens).
Result: If a user enters "246-555-123" (only 9 digits), the system prompts "Please enter a complete 10-digit phone number."
5. Format Check
A format check (also called a pattern check or picture control) ensures that data conforms to a specific pattern or structure. This often involves regular expressions or predefined templates that data must match. Format checks are commonly used for email addresses, dates, social security numbers, and other data with standardized formats.
📝 Example
Scenario: An online registration form requires a valid email address.
Validation Rule: Email must match pattern: characters@characters.domain
Result: If a user enters "useremail.com" (missing @ symbol), the system displays "Please enter a valid email address." However, "user@email.com" would be accepted, even if "user@email.com" is not a real email address.
6. Check Digit
A check digit is an extra digit calculated from the other digits in a number, used to detect transcription errors. The number is considered valid if the calculated check digit matches the entered one. This method is particularly effective at catching common errors like digit transpositions (swapping two adjacent digits) or single-digit mistakes. Credit card numbers, ISBN numbers, and national identification numbers often use check digits.
📝 Example
Scenario: A school uses a 7-digit student ID where the last digit is a check digit calculated using the first 6 digits.
Validation Rule: Apply the check digit algorithm to the first 6 digits and verify it matches the 7th digit.
Result: If a student ID is entered as "1234567" but the correct check digit should be "3," the system detects the error and asks the user to verify the ID number.
Summary Table: Data Validation Methods
| Validation Method | Purpose | Example Rule | Real-World Application |
|---|---|---|---|
| Presence Check | Ensures required data is not empty | Field cannot be blank/null | Mandatory fields in online forms |
| Range Check | Verifies numerical data within bounds | Value ≥ 0 AND Value ≤ 100 | Exam marks, ages, quantities |
| Type Check | Ensures correct data type entered | Field must contain only numbers | Phone numbers, quantities |
| Length Check | Verifies character count is correct | Exactly 11 characters | National ID numbers, car plate numbers |
| Format Check | Ensures data matches specific pattern | DD/MM/YYYY or XX@XX.XX | Dates, email addresses |
| Check Digit | Detects transcription errors | Luhn algorithm or custom formula | Credit cards, ISBN, student IDs |
What Is Data Verification?
Data verification is the process of confirming that data entered into a system is actually correct. Unlike validation, which checks whether data is reasonable, verification checks whether data is true. This typically involves comparing entered data against original source documents or having a second person check the entry.
Verification answers the question: "Is this data truly accurate according to the original source?" If a student ID is entered as "2024001," validation might check that it's the correct length and format. Verification, however, would compare the entered number against the actual student ID on the registration form or ID card to confirm they match exactly.
Key Characteristics of Data Verification
Verification differs from validation in several important ways. Verification is often manual or semi-automated, requiring human involvement to compare documents or confirm data. It is source-dependent, relying on access to original documents or authoritative data sources. Verification is confirmatory, designed to catch errors that validation might miss, particularly those involving incorrect but properly formatted data.
Verification Techniques
1. Double Entry (Dual Entry Verification)
Double entry (also called dual entry verification) involves having two different people independently enter the same data, then comparing the results. If both entries match, the data is accepted. If they differ, the system flags the discrepancy for investigation. This technique exploits the fact that two people are unlikely to make the same mistake in the same way.
📝 Example
Scenario: A hospital enters patient identification data from admission forms into their electronic system.
Process: Two data entry clerks independently enter all patient information. The computer automatically compares both entries.
Result: If Clerk A enters "Williams" and Clerk B enters "Williamms," the system flags the difference. An investigation reveals the correct spelling is "Williams," and the error is corrected before data is accepted.
2. Visual Check (Visual Verification)
A visual check involves a person reviewing entered data on the screen and comparing it directly against the original source document. The verifier examines each field, confirming that what appears on screen exactly matches what is on the document. This is one of the simplest verification methods and requires minimal training.
📝 Example
Scenario: A school registrar enters new student information from paper application forms into the student database.
Process: After entering all data, the registrar displays the entered record on screen and visually compares it to the original application form, field by field.
Result: The registrar notices that while the student's name was entered as "Marcus Johnson," the application form shows "Markus Johnson." The error is corrected before saving the record.
3. Proofreading and Comparison
Proofreading and comparison involves carefully reading through entered data to identify errors, inconsistencies, or anomalies. This may include comparing related fields to ensure they make sense together (for example, checking that a student's recorded age is consistent with their grade level). Proofreading can be done by the original data entry person or by a separate reviewer.
📝 Example
Scenario: An examination officer reviews student result data before final submission to CXC.
Process: The officer reviews each student's record, checking that subjects match the entry form, that grades are within expected ranges, and that total credits make sense for the certificate type.
Result: The officer notices that a student has 8 Cape subjects listed but the student only registered for 4 subjects. Further investigation reveals the extra subjects were accidentally copied from another student's record.
Summary Table: Verification Techniques
| Verification Technique | Description | Best Used For | Advantages | Disadvantages |
|---|---|---|---|---|
| Double Entry | Two people independently enter data; results are compared | Critical data where accuracy is paramount | Highly reliable; catches most errors | Time-consuming; requires twice the effort |
| Visual Check | Person compares screen display to source document | Moderate-volume data entry | Simple to implement; requires minimal training | Human fatigue can lead to missed errors |
| Proofreading | Reviewing entered data for errors and inconsistencies | Final quality assurance before submission | Can catch contextual errors | Requires careful attention; can be subjective |
Validation vs Verification: Key Differences
Understanding the distinction between validation and verification is essential for your CSEC examination. This topic appears frequently in multiple-choice and structured questions. The table below provides a comprehensive comparison that you should study carefully.
| Aspect | Data Validation | Data Verification |
|---|---|---|
| Definition | Checking that data is reasonable and follows rules | Checking that data is actually correct |
| Question Asked | "Is this data reasonable?" | "Is this data true?" |
| Primary Purpose | Prevent obviously wrong data from entering the system | Confirm data matches the original source |
| Automation Level | Usually automated (programmed rules) | Usually manual or semi-automated |
| Human Involvement | Minimal; the system performs checks | High; people compare documents or recheck data |
| When Applied | At data entry time (pre-entry) | During or after data entry (during/post-entry) |
| Catches | Format errors, out-of-range values, missing data | Transcription errors, incorrect but properly formatted data |
| Does NOT Catch | Correct-looking but wrong data | Errors in the original source document |
| Example | Rejecting "999" as an age (too high) | Checking that "1990" matches the birth certificate |
| CSEC Keywords | Range check, format check, type check, validation | Double entry, visual check, proofreading, verification |
CSEC Exam Tip
When answering questions about validation and verification, ask yourself:
- Is the system checking if data makes sense (validation) or if data is correct (verification)?
- Is the check automated or does it require human judgment?
- Does the check prevent entry of wrong data or catch errors after entry?
Real-World Applications
Online Forms and Registration Systems
Every time you complete an online registration form, you encounter both validation and verification. The form uses validation to ensure your email contains an "@" symbol, your phone number consists only of digits, and required fields are not left blank. Some systems may send a verification email requiring you to click a link to confirm your email address is actually valid and accessible.
School Databases and Student Records
Schools maintain extensive databases containing student information, grades, attendance records, and more. These systems rely heavily on validation to ensure data quality—for example, grades must fall between 0 and 100, attendance percentages cannot exceed 100, and dates must be in valid formats. Verification is used when new students enroll, comparing entered data against birth certificates, transfer documents, and other official records.
Banking and Financial Systems
Financial institutions use some of the most sophisticated validation and verification systems. Account numbers incorporate check digits to detect transcription errors. Transaction amounts are validated to ensure they are positive and within reasonable limits. Large transfers may require additional verification steps, including two-factor authentication or manual approval. The consequences of data errors in banking are severe, making these safeguards essential.
Examination Data Processing
Organizations like CXC process enormous amounts of examination data under strict quality controls. Validation ensures that candidate numbers follow correct formats, grades are valid, and subjects are legitimate offerings. Verification is achieved through multiple stages: schools verify entries before submission, CXC validates submitted data, and candidates can verify their own results through official channels.
Common Student Misconceptions
As you study data validation and verification, be aware of these frequent misunderstandings that can lead to errors in your examination answers.
⚠️ Misconception 1: "Validation and verification mean the same thing"
This is perhaps the most common misconception. Validation and verification are distinct processes with different purposes. Validation checks if data is reasonable; verification checks if data is correct. Both are important and serve different roles in data quality assurance. Always use the correct term in your answers.
⚠️ Misconception 2: "Validation guarantees that data is correct"
Validation does not guarantee correctness. It only ensures data is reasonable and follows rules. A student could enter "15" as their age when they are actually 25—validation would accept this because "15" is a valid age number. Only verification against a birth certificate would reveal the true error.
⚠️ Misconception 3: "Verification is automatic and happens without human involvement"
While some verification can be automated (like comparing two data entries), most verification requires human involvement. Visual checks, proofreading, and document comparison all need people. Automated systems can verify that two entries match, but they cannot confirm if both entries are actually correct.
⚠️ Misconception 4: "If validation passes, no further checks are needed"
Validation is just one layer of data quality assurance. Even after validation passes, verification is still necessary to catch errors that validation cannot detect. Think of validation as a first line of defense and verification as a final quality check.
⚠️ Misconception 5: "All validation methods catch the same types of errors"
Each validation method targets specific error types. A format check catches structure errors, a range check catches value errors, and a presence check catches missing data. Understanding which method addresses which error type is essential for both implementing and answering questions about data validation.
Interactive Student Activities
🧠 Activity 1: Identify the Validation Method
For each scenario, identify which validation method is being described:
a) A system rejects an email address that does not contain the "@" symbol.
Answer: Format Check
b) A hospital system will not accept a patient's age as "-5".
Answer: Range Check
c) A banking system requires the account number to contain exactly 10 digits.
Answer: Length Check
d) An online form will not submit without the user's phone number being entered.
Answer: Presence Check
e) A library system rejects a book barcode containing letters when only numbers are expected.
Answer: Type Check
🧠 Activity 2: Validation or Verification?
For each scenario, determine whether the process described is validation or verification:
a) A data entry clerk compares the student's name on the screen to the name on the birth certificate.
Answer: Verification (comparing entered data to source document)
b) A system automatically rejects any exam mark greater than 100.
Answer: Validation (automated range check at entry)
c) Two data entry operators independently enter the same student data and the computer compares the results.
Answer: Verification (double entry technique)
d) A website checks that the password contains at least 8 characters before accepting it.
Answer: Validation (automated length check)
e) A teacher reviews the printed list of entered grades to identify any obvious errors.
Answer: Verification (proofreading and visual check)
🧠 Activity 3: Scenario-Based Exercise
Situation: The Ministry of Education is implementing a new student database for all secondary schools in the Caribbean. You have been asked to recommend appropriate validation and verification methods for different data fields.
a) For the "Date of Birth" field, what validation methods would you recommend and why?
Recommended Answer:
- Format check: To ensure date is in DD/MM/YYYY format
- Range check: To ensure the date is reasonable (e.g., student born between 1990 and 2015)
- Type check: To ensure only valid date characters are entered
b) For the "Student ID Number" field, what validation methods would you recommend?
Recommended Answer:
- Length check: To ensure the ID has the correct number of characters
- Type check: To ensure only alphanumeric characters (if applicable) are entered
- Check digit: To detect transcription errors in the ID number
c) What verification technique would you recommend for ensuring the accuracy of student data transferred from existing records?
Recommended Answer:
- Double entry: Have two operators enter the data independently and compare results
- Visual check: Review entered data against original records
- Proofreading: Check for inconsistencies like age not matching grade level
CSEC Exam Focus
Understanding how validation and verification appear in your CSEC Information Technology examination is crucial for success. This topic is a regular feature in both multiple-choice and structured questions, testing your ability to distinguish between the two concepts and apply them to scenarios.
📋 How This Topic Appears in the Exam
Multiple-Choice Questions
You will typically encounter 1-2 questions about validation or verification in the multiple-choice section. These questions often:
- Present a scenario and ask you to identify the type of check being described
- Test your understanding of the difference between validation and verification
- Ask which validation method would catch a specific type of error
- Present common misconceptions as distractors
Structured Questions
Section B and C often include questions requiring you to:
- Explain the difference between validation and verification
- Recommend appropriate validation methods for given scenarios
- Describe how specific validation or verification techniques work
- Analyze why data errors occurred despite validation being in place
Scenario-Based Items
You may be given a scenario (like a school database or online registration system) and asked to:
- Identify validation rules that should be implemented
- Suggest verification techniques for ensuring data accuracy
- Explain why errors occurred and how they could have been caught
- Compare different validation methods for suitability
CSEC-Style Practice Questions
✍️ Practice Questions
Question 1 (Multiple Choice)
Which of the following validation methods would BEST detect that the student ID number "2024001" was entered as "2024006"?
A) Presence check
B) Range check
C) Type check
D) Check digit
Answer: D) Check digit
Explanation: A check digit is calculated from the other digits and can detect transcription errors like single-digit mistakes or transpositions. The other methods (presence, range, type) would all accept "2024006" as valid since it contains the right type of data, is within range, and is not empty.
Question 2 (Multiple Choice)
Data verification is different from data validation because verification:
A) Occurs automatically without human involvement
B) Checks if data is reasonable according to rules
C) Confirms that data matches the original source
D) Prevents obviously wrong data from being entered
Answer: C) Confirms that data matches the original source
Explanation: Verification involves confirming that entered data matches the original source document, while validation checks if data follows rules. Options A, B, and D describe characteristics of validation, not verification.
Question 3 (Short Answer)
Explain why validation alone is not sufficient to ensure data accuracy in an information system. Use an example in your answer.
Sample Answer:
Validation alone is not sufficient because it only checks if data is reasonable and follows rules—it does not confirm if data is actually correct. For example, if a student enters their age as "16" when they are actually 18, validation would accept this because "16" is a reasonable age (within range, correct format, etc.). Only verification against a birth certificate would reveal that the entered age is incorrect.
Additionally, validation cannot catch errors in the original source document itself. If a clerk copies a wrong address from a handwritten form, validation would accept it because the address looks reasonable and follows the correct format.
Question 4 (Short Answer)
a) Define data validation.
b) State TWO examples of validation checks that could be used when entering student examination marks into a computer system.
Sample Answer:
a) Data validation is the automated process of checking that data entered into a computer system conforms to specified rules and is reasonable. It ensures data follows format, range, and other constraints but does not verify absolute accuracy.
b) Two validation checks for examination marks:
- Range check: Ensures marks are between 0 and 100
- Type check: Ensures only numerical data is entered (no letters)
- Presence check: Ensures marks are entered for all required subjects
- Format check: Ensures marks are entered in the correct format
Question 5 (Scenario-Based)
A school's examination officer is entering CXC CSEC results into the school's database. She enters a mark of "150" for a student but the system accepts it. However, when she tries to enter "-5" as a mark, the system rejects it.
a) Explain why the system rejected "-5" but accepted "150".
b) What type of validation check would prevent marks above 100 from being accepted?
c) The officer wants to verify that the entered marks are correct. Describe ONE technique she could use.
Sample Answer:
a) The system rejected "-5" because a range check detected a value below the minimum allowed (0). However, the system accepted "150" because there is no upper range check implemented, or the maximum was incorrectly set above 100. This indicates incomplete validation rules.
b) A range check with an upper limit would prevent marks above 100. The rule would be: Mark ≥ 0 AND Mark ≤ 100.
c) Verification techniques the officer could use:
- Visual check: Compare the entered data on screen against the original result slips
- Proofreading: Review all entered marks for inconsistencies or anomalies
- Double entry: Have another person independently enter the marks and compare results
Question 6 (Multiple Choice)
Which verification technique involves two people independently entering the same data?
A) Visual check
B) Double entry
C) Format check
D) Range check
Answer: B) Double entry
Explanation: Double entry (also called dual entry verification) involves two people independently entering the same data and comparing the results. This is a verification technique, not a validation technique. Options A, C, and D are either not verification techniques (C and D are validation) or describe different verification methods.
Question 7 (Structured)
a) Differentiate between data validation and data verification.
b) A bank is designing an online fund transfer form. Recommend TWO validation rules that should be implemented and explain why each is important.
Sample Answer:
a) Data validation is the automated process of checking that entered data is reasonable and conforms to predefined rules. It catches obvious errors like out-of-range values or incorrect formats. Data verification is the process of confirming that entered data is accurate by comparing it to the original source or having multiple people check it. Verification catches errors that validation cannot, such as correct-looking but wrong data.
b) Two validation rules for bank transfers:
- Range check on transfer amount: Ensures the amount is positive and within daily limits. This prevents accidentally entering huge amounts or negative values.
- Check digit on account number: Validates that the recipient's account number was entered correctly by checking against a calculated check digit. This catches common transcription errors.
- Type check on amount field: Ensures only numbers and decimal points are entered, preventing text that could cause processing errors.
- Presence check on required fields: Ensures recipient account and amount are always entered.
Question 8 (Short Answer)
State what each of the following validation checks is designed to prevent:
a) Type check
b) Length check
c) Format check
Sample Answer:
a) Type check prevents wrong data types from being entered (e.g., letters in a numeric field like phone number or age).
b) Length check prevents data with too few or too many characters from being entered (e.g., an ID number that is too short or too long).
c) Format check prevents data that does not follow the required pattern or structure (e.g., an email address missing the "@" symbol or a date in the wrong format).
Question 9 (Scenario-Based)
A company processes employee payroll data. Last month, an employee's salary was entered as $5,000 instead of $50,000. The validation system accepted the entry because it was a positive number and contained only digits.
a) What type of error occurred and why was it not caught by validation?
b) Suggest TWO ways this error could have been caught through verification.
c) What additional validation rule could prevent similar errors in the future?
Sample Answer:
a) This was a transcription error where a digit was omitted ($50,000 became $5,000). Validation did not catch it because the entered value was a reasonable positive number within typical salary ranges, contained only digits (correct type), and met any format requirements. Validation only catches unreasonable data, not correct-looking but wrong data.
b) Verification techniques that could have caught the error:
- Visual check: A supervisor could have compared the entered salary against the original payroll documentation or employment contract.
- Double entry: Two operators could have independently entered the payroll data and compared results—the discrepancy would have been flagged.
- Proofreading: Reviewing the entered data would have revealed that $5,000 is unusually low for the employee's position.
c) Additional validation rules:
- Raise the minimum range: Set a minimum salary of $10,000 to catch obvious underpayments.
- Check digit: Use a check digit on salary amounts to detect digit omissions or transpositions.
- Format check: Require salary to include two decimal places or a specific format that makes omissions obvious.
Question 10 (Multiple Choice)
A school database requires students to enter their date of birth in the format DD/MM/YYYY. Which validation method ensures the data follows this specific format?
A) Range check
B) Presence check
C) Format check
D) Type check
Answer: C) Format check
Explanation: A format check (also called a pattern check) ensures data conforms to a specific structure or pattern. In this case, the format check would verify the data follows the DD/MM/YYYY pattern. Range check (A) checks numerical bounds, presence check (B) ensures data is not empty, and type check (D) ensures correct data types—but none of these specifically enforce the exact format required.
Final Study Tips for the CSEC Exam
To excel in questions about data validation and verification:
- Memorize the definitions: Know exactly what validation and verification mean and can explain the difference clearly.
- Know your methods: Be able to list all six validation methods and explain when each is used.
- Know your techniques: Understand the three verification techniques and their applications.
- Practice scenarios: Work through practice questions that present real-world situations.
- Use CSEC terminology: Use the correct technical terms in your answers.
- Data Validation: Automated checks that ensure data is reasonable and follows rules
- Data Verification: Manual or semi-automated processes that confirm data accuracy against original sources
- Validation Methods: Presence check, range check, type check, length check, format check, check digit
- Verification Techniques: Double entry, visual check, proofreading/comparison
This article is designed to support CSEC Information Technology students in understanding data validation and verification concepts. For additional practice, refer to past CSEC papers and your IT syllabus guide.
