Bis 420 Fin A Range Check Is A Data Validation Check That ____.

1.A ____ check tests data items to verify that they fall between a specifiedminimum and maximum value.

You are watching: A range check is a data validation check that ____.


3.____ interaction describes the relationship between computers and people whouse them to perform business-related tasks.
4.Companies use various ____ methods to maintain output integrity and security.For example, every report should include an appropriate title, report number orcode, printing date, and time period covered.
6.When designing a report, you should prepare a sample report, which is called a____, for users to review.
10.A ____ is a specially formatted digital audio file that can be downloaded byInternet users from a variety of content providers.
12.Output ____ protects privacy rights and shields the organization”s proprietarydata from theft or unauthorized access.
13.Once data is entered, the company should store source documents in a safelocation for some specified length of time according to their ____ policy.
14.After a report design is approved, you should document the design by creating areport ____ form, which contains information about the fields, data types andlengths, and report frequency.
15.The main part of the form, called the ____ zone, usually takes up at least halfof the space on the form and contains captions and areas for entering variabledata.
18.An automated facsimile or ____ system allows a customer to request a fax usinge-mail, via the company Web site, or by telephone.
19.A ____ check improves input quality by testing the data and rejecting any entrythat fails to meet specified conditions.
20.A ____ workstation is a network terminal that supports a full-featured userinterface, but limits the printing or copying of data, except to certain networkresources that can be monitored and controlled.
21.Sensitive data can be coded, in a process called ____, so only users withdecoding software can read it.
22.A popular security solution is the use of a network based application, oftencalled a ____, that controls access to and from workstation interfaces.
24.Good form ____ makes the form easy to complete and provides enough space, bothvertically and horizontally, for users to enter the data.
25.____ is often used by large firms to scan and store images of originaldocuments to provide high-quality records management and archiving.
26.Using ____ input, data entry usually is performed on a specified time schedule,such as daily, weekly, monthly, or longer.
27.Every page should include a page ____, which appears at the top of the page andincludes the column headings that identify the data.

See more: ” The Extended Attributes Are Inconsistent Windows 10 Fix, The Extended Attributes Are Inconsistent


29.Although the vast majority of reports are designed graphically, some systemsstill produce one or more character-based reports that use a character set with____ spacing.
31.A ____ check is performed on two or more fields to ensure that they areconsistent or reasonable when considered together.
33.A ____ describes how users interact with a computer system, and consists of allthe hardware, software, screens, menus, functions, output, and features thataffect two-way communications between the user and the computer.
34.A ____ document is a form used to request and collect input data, trigger orauthorize an input action, and provide a record of the original transaction.
35.In addition to built-in design tools, popular software packages such as ____Reports offer powerful features that help designers deal withprofessional-level design issues across the enterprise.
36.The ____ zone contains codes, identification information, numbers, and datesthat are used for storing completed forms.
37.Database programs such as Microsoft Access include a variety of report designtools, including a ____, which is a menu-driven feature that designers can useto create reports quickly and easily.
40.A sales manager might want to know total sales for each sales representative,but not want a detail report listing every sale made by them. In that case, a____ report is appropriate.
41.A control break usually causes specific actions, such as printing subtotals fora group of records. That type of detail report is called a ____ report.
42.Companies use various ____ methods to maintain output integrity and security.For example, every report should include an appropriate title, report number orcode, printing date, and time period covered.
43.Data ____ is the process of manually entering data into the information system,usually in the form of keystrokes or mouse clicks.
45.Data ____ policies and procedures protect data from loss or damage, which is avital goal in every organization.
46. Good interface designis based partly on ____, which provides the operational structure required tocarry out the design objectives.
47.When designing data entry screens, provide an on-screen instruction to letusers know the date format, and provide an example if the user must enter ____.
48.A key physical design element is the ____, which describes how users interactwith a computer system.
50.In older systems, often the user interface mainly consisted of ____-controlscreens that allowed a user to send commands to the system.
52.Initial screen designs can be presented to users in the form of a(n) ____,which is a sketch that shows the general screen layout and design.

See more: Identify The Predominant Intermolecular Forces In Each Of The Given Substances.


C: is performed on twoor more fields to ensure that they are consistent or reasonable when consideredtogether
54.In a data entry screen a(n) ____ is a control feature that is used to representon or off status and switches to the other status when clicked.
Email ThisBlogThis!Share to TwitterShare to Facebook

*

Published

Leave a comment

Your email address will not be published. Required fields are marked *