<--- Back to Details
First PageDocument Content
Data validation / Validation / Error detection and correction / Spreadsheet / Laboratory quality control / Form / Computing / Management / Evaluation / Data quality / Quality control / Computer security
Date: 2012-10-16 15:32:52
Data validation
Validation
Error detection and correction
Spreadsheet
Laboratory quality control
Form
Computing
Management
Evaluation
Data quality
Quality control
Computer security

Ecology EDD Processing Tool

Add to Reading List

Source URL: www.ecy.wa.gov

Download Document from Source Website

File Size: 2,07 MB

Share Document on Facebook

Similar Documents

Logic / Mathematical logic / Mathematics / Boolean algebra / Complexity classes / Metalogic / Model theory / True quantified Boolean formula / Satisfiability / FO / PSPACE-complete / Well-formed formula

Introduction Background, Theory Validating Squolem’s Certificates in HOL4 Evaluation Conclusions

DocID: 1xW1P - View Document

Design of experiments / Causal inference / Evaluation / Observational study / Methodology / Knowledge / Impact assessment / Confounding / Experiment / Quasi-experiment / Program evaluation / Impact evaluation

A2J Evaluation and Research Options Process Evaluation Formative Assessment

DocID: 1xVZa - View Document

Education / Learning / Educational psychology / Course evaluation / Formative assessment / Educational assessment / Peer feedback / Educational technology / Active learning / Classroom Assessment Techniques

March 30th, 2016 Vol. 15, Issue 2 Reflections on End-of-Semester Evaluation Hoda Mostafa MD, Associate Professor of Practice Associate Director Center for Learning and Teaching

DocID: 1xVYB - View Document

In Pursuit of Error: A Survey of Uncertainty Visualization Evaluation Jessica Hullman, Xiaoli Qiao, Michael Correll, Alex Kale, Matthew Kay Abstract—Understanding and accounting for uncertainty is critical to effective

DocID: 1xVWY - View Document

Cryptography / Stream ciphers / Block cipher / ESTREAM / DICING / WG

A fundamental evaluation of 80bit keys employed by hardware oriented stream ciphers Iain Devlin Centre for Electronic Systems, Durham University

DocID: 1xVU1 - View Document