This website uses cookies to ensure you have the best experience. Learn more

Cis 210 Input Controls Essay

1116 words - 5 pages

Input Controls

Input control includes the necessary measures to ensure that input data is correct,

complete, and secure (Rosenblatt & Shelly, 2012). It is ultimately important that during the user

interface design or input design stage to focus on input control, which will start with source

documents that will promote data accuracy and quality. Therefore, the main objective of input

design is that we ensure the quality, accuracy, completeness, and timeliness of input data

happens during its conversion from its original source into computer data or it is entered into a

computer application. Input controls could also be considered fail-safes, which ensure that data is

...view middle of the document...

For example, it the text box was designed or programmed to accept alphabetic letters and a

user inputs a number, this can result in a data integrity error.

Our next input control is the drop-down list box, which was mentioned previously. A

drop-down list box displays the current selection; when the user clicks the arrow, a list of the

available choices displays (Rosenblatt & Shelly, 2012). It is beneficial to use this type of control

when there are a specific number of choices for the user to select. A good example of a drop-

down list is when a user is filling out a form, and then they come to where they are asked the

question to which state is there current residency. As we know, there are fifty to choose from and

that these are the only options that can be selected to answer this question. In this example, if this

input control was not put in place, then many things could go wrong, such as they could enter a

multitude of data that does not belong in this block that does not have nothing to do with the

question being asked, resulting in data integrity error.

Using validation controls or it could also be called validation rules, will help reduce the

amount or number of input errors, thus improving data quality. To be able to identify and correct

errors before a user enters them into the system is why we want to use validation controls. There

are at least eight different types of data validation rules. An example is a data type check, in

which it tests the field to make sure the data fits the required type, such as a numeric field will

have only numbers and the same goes for an alphabetic field that contains only the characters A

through Z. Another example is a reasonableness check, which would identify values that might

be questionable, but not wrong. An example of this could be that the input values of $.06 and

$600,000.00 that would pass a limit check for a payment value greater than zero, but both values

could also be errors. If the data was is not validated correctly, then incorrect information can be

transmitted to another system that validates it in a different way, thus creating a possible data

integrity error between he two systems.

Input masks...

Other Papers Like Cis 210 Input Controls

Operating Systems Essay

1257 words - 6 pages CIS 155 December 10, 2011   Operating System You may have heard of UNIX, or maybe not. Where did this so called UNIX come from? What exactly is an operating system you ask and what is it comprised of? Read on to find out more. Birth of a New Creation: UNIX is the

It Communications Essay

1093 words - 5 pages CIS 502 Week 10 Technical Paper Global Finance Inc. xxxxxxxxxxxxx June 19, 2013 xxxxxxxxxx Situation Global Finance Inc. has grown rapidly in the past years, and due to this they have gained a huge customer base. The company invested in the network designed it to be fault tolerant and resilient from any other network failures. However, although the company’s financial status has matured and its network has expanded at a

Sas Certification Sample Test 50

4377 words - 18 pages variable name. You can learn about • • informats in Reading Date and Time Values the colon-format modifier in Reading Free-Format Data. 2.A raw data file is listed below. 1---+----10---+----20---+--Jose,47,210 Sue,,108 The following SAS program is submitted using the raw data file above as input: data employeestats; input name $ age weight; run; The following output is desired: name age weight Jose 47 210 Sue . 108 Which of

Data Mining

1499 words - 6 pages Assignment 4: Data Mining CIS 500 Professor: Dr. Edwin Otto Strayer University August 30, 2013 “Data mining is a process that uses statistical, mathematical, artificial intelligence, and machine learning techniques to extract and identify useful information and subsequent knowledge from large databases, including data warehouses” (Turban, 2011). Predictive analytics serves as a benefit of data mining because it’s a process that uses

Operations And Material Management In Business

2278 words - 10 pages finished goods and services” (Jones, 2007, p. 373). “Materials management is the set of activities that controls the flow of resources into and out of the operating system” (Jones, 2007, p. 373). “The functional activities involved in operations and materials management are usually viewed as a three-stage process. Value creation takes place at all three stages: input, operations, and output” (Jones, 2007, p. 373). “Changes in global competition and

Riordan Manufacturing Final Bsa/500

2608 words - 11 pages Mountain", 2013). Procurement A procurement system is an automated process designed to manage the procurement process and is often included in an enterprise resource planning (ERP) system. Riordan can use the procurement module to include purchase requisitions, purchase orders, goods receipts, and invoice processing. Riordan can also benefit from the additional built-in approval processes, controls, and funds management tools that these

Data Management Policy

2611 words - 11 pages , integrity, and security of those data. 3. Wherever possible, data must be simple to enter and must accurately reflect the situation; they must also be in a useful, usable form for both input and output. 4. Data should be collected only if they have known and documented uses and value. 5. Data must be readily available to those with a legitimate business need. 6. Processes for data capture, validation, and processing should

Cis 210 – Systems Analysis and Development Website Migration Term Paper

3905 words - 16 pages Website Migration Project Chinnasut Nhurod CIS 210 – Systems Analysis and Development Dr. Wesley E. Phillips Strayer University September 15, 2013 Website Migration Project for Tony’s Chips Building the Web Architecture In order to build the web architecture, the system analyst would be required to analyse the business requirements of the organization and then develop a clear statement of goals of the organization. Since, the old

Mobile Application Security

4041 words - 17 pages individual users, it is insufficient for defense needs. Many documented examples exist of hacking of the device lock, as well as defeats of the hardware-level encryption. Once the device is unlocked, there is generally unfettered access to all apps and their associated data. Military applications require additional application-level access controls to provide data security. Unfortunately, there are gaps in the application-level security model of

Lg Report

4489 words - 18 pages LG ELECTRONICS South Korean multinational corporation South Korea's second largest electronics maker and the world's third largest appliance maker Company has 75 subsidiaries worldwide Design a d manufacture te ev s o s, home appliances, and es g and a u actu e televisions, o e app a ces, a d telecommunications devices. LG Electronics owns Zenith Electronics and controls LG Displays, a joint venture with Philips Electronics By 2005, LG was a

Production Process

4645 words - 19 pages , services and spare parts network comprises over 3,500 touch points. Tata Motors is also expanding its international footprint, established through exports since 1961. The company's commercial and passenger vehicles are already being marketed in several countries in Europe, Africa, the Middle East, South East Asia, South Asia, CIS, Russia and South America. It has franchisee/joint venture assembly operations in Bangladesh, Ukraine, and Senegal

Related Essays

Cis 210 Input Controls Essay

1173 words - 5 pages timeliness of input data happens during its conversion from its original source into computer data or it is entered into a computer application. Input controls could also be considered fail-safes, which ensure that data is entered into the system correctly. We must also remember the term garbage in, garbage out (GIGO), because it will not matter how much data is enter into an information system, but the quality of the data that is outputted is

Input Controls Essay

709 words - 3 pages Input Controls Assignment 3 Roseana Clark | CIS 210 Professor Nancy Romero | 11/15/2014 Application controls are used to refer to transactions and any data that relates to the computer based application system. They should be kept specific to each application. Application controls may be manual or programmed, but are necessary in the support of record accuracy as well as data validity. These controls are used in processing, output and

Input Controls Essay

1142 words - 5 pages Assignment 3: Input Controls La Vaughn Aiken Prof. Robert Joseph, Ph.D May 16, 2012 CIS 210 Input Controls The objective of input design is to ensure the quality, accuracy, completeness, and timeliness of input data during its conversion from its original source into computer data, or entry into a computer application. Data entered into a computer application from either manual online input or by scheduled automated processing: batch

Psyc3001 Topic 6 Essay

3604 words - 15 pages Scheffé SCI procedure.   29 UNSW PSYC3001 Research Methods 3 ‐ Topic 6 Lecture Slides    Dr Melanie Gleitzman  Properties of the Scheffé SCI procedure o It controls the noncoverage FWER for CIs on all conceivable contrasts (an infinite set). eg, if noncoverage FWER of  = .05 then for 95% SCIs, for a set of contrasts defined post-hoc,  noncoverage errors for one or more CIs (in the set) will occur on at most 5% of replications. o It is