Define each of the following input controls and give an example of how they may be used:
a.  Missing data checkb.  Numeric/alphabetic data checkc.  Limit checkd.  Range checke.  Reasonableness checkf.  Validity check

What will be an ideal response?


Missing data check is useful because some programming languages are restrictive as to the justification (right or left) of data within the field. If data are not properly justified or if a character is missing (has been replaced with a blank), the value in the field will be improperly processed. For example, the presence of blanks in a numeric data field may cause a system failure. When the control routine detects a blank where it expects to see a data value, the error is flagged.

A numeric-alphabetic check control identifies when data in a particular field are in the wrong form. For example, a customer's account balance should not contain alphabetic data and the presence of it will cause a data processing error. Therefore, if alphabetic data are detected, the error record flag is set.

Limit checks are used to identify field values that exceed an authorized limit. For example, assume the firm's policy is that no employee works more than 44 hours per week. The payroll system input control program can test the hours-worked field in the weekly payroll records for values greater than 44.

Range checks exit when data have upper and lower limits to their acceptable values. For example, if the range of pay rates for hourly employees in a firm is between 8 and 20 dollars, this control can examine the pay rate field of all payroll records to ensure that they fall within this range.

A reasonableness check determines if a value in one field, which has already passed a limit check and a range check, is reasonable when considered along with data in other fields of the record. For example, assume that an employee's pay rate of 18 dollars per hour falls within an acceptable range. This rate is excessive, however, when compared to the employee's job skill code of 693; employees in this skill class should not earn more than 12 dollars per hour.

A validity check compares actual field values against known acceptable values. For example, this control may be used to verify such things as valid vendor codes, state abbreviations, or employee job skill codes. If the value in the field does not match one of the acceptable values, the record is flagged as an error.

PTS: 1

Computer Science & Information Technology

You might also like to view...

The java.util.List interface has an add method that takes an index and an element as parameters. It adds the element to the list at the index. Its header is void add(int index, E element) Can the addToFront operation use an implementation of this add method?

What will be an ideal response?

Computer Science & Information Technology

The _________ is located at the top of each printed page and can contain labels, text boxes, and other controls

A) page header B) page footer C) report header D) report footer

Computer Science & Information Technology

A corporate user is attempting to connect to the company’s Windows domain server on the local network with her new laptop through a wired connection. ? Which of the following is required for the user to successfully sign in to the Windows domain?

A. SSID, authentication and encryption settings B. Windows domain user name and password C. A valid connection to a DHCP server on the LAN D. User name and password supplied by the ISP

Computer Science & Information Technology

Match each term with the correct statement below:

A. a method for identifying resources shared using the SMB protocol B. protocol that operates at the session layer and has no routing capabilities C. option contained within the Apache configuration file D. relational database management system often used in the background of Web applications E. program the e-mail user uses to read and write e-mails F. computer name made up of the host name, the domain name, and the name of the TLD G. an answer to a DNS query provided by the master server for the domain H. clock that runs independently of any control program running in the CPU I. estimated time error of the peer clock

Computer Science & Information Technology