1.A ____ check tests data items to verify that they fall between a specifiedminimum and maximum value.
You are watching: A range check is a data validation check that ____.
3.____ interaction describes the relationship between computers and people whouse them to perform business-related tasks.
4.Companies use various ____ methods to maintain output integrity and security.For example, every report should include an appropriate title, report number orcode, printing date, and time period covered.
6.When designing a report, you should prepare a sample report, which is called a____, for users to review.
10.A ____ is a specially formatted digital audio file that can be downloaded byInternet users from a variety of content providers.
12.Output ____ protects privacy rights and shields the organization”s proprietarydata from theft or unauthorized access.
13.Once data is entered, the company should store source documents in a safelocation for some specified length of time according to their ____ policy.
14.After a report design is approved, you should document the design by creating areport ____ form, which contains information about the fields, data types andlengths, and report frequency.
15.The main part of the form, called the ____ zone, usually takes up at least halfof the space on the form and contains captions and areas for entering variabledata.
18.An automated facsimile or ____ system allows a customer to request a fax usinge-mail, via the company Web site, or by telephone.
19.A ____ check improves input quality by testing the data and rejecting any entrythat fails to meet specified conditions.
20.A ____ workstation is a network terminal that supports a full-featured userinterface, but limits the printing or copying of data, except to certain networkresources that can be monitored and controlled.
21.Sensitive data can be coded, in a process called ____, so only users withdecoding software can read it.
22.A popular security solution is the use of a network based application, oftencalled a ____, that controls access to and from workstation interfaces.
24.Good form ____ makes the form easy to complete and provides enough space, bothvertically and horizontally, for users to enter the data.
25.____ is often used by large firms to scan and store images of originaldocuments to provide high-quality records management and archiving.
26.Using ____ input, data entry usually is performed on a specified time schedule,such as daily, weekly, monthly, or longer.
27.Every page should include a page ____, which appears at the top of the page andincludes the column headings that identify the data.
29.Although the vast majority of reports are designed graphically, some systemsstill produce one or more character-based reports that use a character set with____ spacing.
31.A ____ check is performed on two or more fields to ensure that they areconsistent or reasonable when considered together.
33.A ____ describes how users interact with a computer system, and consists of allthe hardware, software, screens, menus, functions, output, and features thataffect two-way communications between the user and the computer.
34.A ____ document is a form used to request and collect input data, trigger orauthorize an input action, and provide a record of the original transaction.
35.In addition to built-in design tools, popular software packages such as ____Reports offer powerful features that help designers deal withprofessional-level design issues across the enterprise.
36.The ____ zone contains codes, identification information, numbers, and datesthat are used for storing completed forms.
37.Database programs such as Microsoft Access include a variety of report designtools, including a ____, which is a menu-driven feature that designers can useto create reports quickly and easily.
40.A sales manager might want to know total sales for each sales representative,but not want a detail report listing every sale made by them. In that case, a____ report is appropriate.
41.A control break usually causes specific actions, such as printing subtotals fora group of records. That type of detail report is called a ____ report.
42.Companies use various ____ methods to maintain output integrity and security.For example, every report should include an appropriate title, report number orcode, printing date, and time period covered.
43.Data ____ is the process of manually entering data into the information system,usually in the form of keystrokes or mouse clicks.
45.Data ____ policies and procedures protect data from loss or damage, which is avital goal in every organization.
46. Good interface designis based partly on ____, which provides the operational structure required tocarry out the design objectives.
47.When designing data entry screens, provide an on-screen instruction to letusers know the date format, and provide an example if the user must enter ____.
48.A key physical design element is the ____, which describes how users interactwith a computer system.
50.In older systems, often the user interface mainly consisted of ____-controlscreens that allowed a user to send commands to the system.
52.Initial screen designs can be presented to users in the form of a(n) ____,which is a sketch that shows the general screen layout and design.
C: is performed on twoor more fields to ensure that they are consistent or reasonable when consideredtogether
54.In a data entry screen a(n) ____ is a control feature that is used to representon or off status and switches to the other status when clicked.
Email ThisBlogThis!Share to TwitterShare to Facebook