Chapter 8 Review


Chapter 8 Review

1. A ____ check tests data items to verify that they fall between a specified minimum and maximum value.
 A: process-control
 B: toggle button
 C: data validation
 D: range

2. Web-based logs, called ____, are journals written from a particular point of view.
 A: wogs
 B: jogs
 C: blogs
 D: logs

3. ____ interaction describes the relationship between computers and people who use them to perform business-related tasks.
 A: Human-computer
 B: Person-computer
 C: Human-PC
 D: Person-PC

4. Companies use various ____ methods to maintain output integrity and security. For example, every report should include an appropriate title, report number or code, printing date, and time period covered.
 A: output reporting
 B: output listing
 C: output control
 D: output checking

5. ____ includes the necessary measures to ensure that input data is correct, complete, and secure.
 A: Output control
 B: Input control
 C: either a. or b.
 D: neither a. nor b.

6. When designing a report, you should prepare a sample report, which is called a ____, for users to review.
 A: mock-up
 B: prototype
 C: either a. or b.
 D: neither a. nor b.

7. An option button, or ____ button, represents one choice in a set of options.
 A: television
 B: DVD player
 C: stereo
 D: radio

8. A ____ report produces one or more lines of output for each record processed.
 A: summary
 B: highlights
 C: control
 D: detail

9. A ____ check identifies values that are questionable, but not necessarily wrong.
 A: reasonableness
 B: process-control
 C: data validation
 D: range

10. A ____ is a specially formatted digital audio file that can be downloaded by Internet users from a variety of content providers.
 A: songcast
 B: podcast
 C: listencast
 D: voicecast

11. A ____ interface uses icons, graphical objects, and pointing devices.
 A: green screen
 B: Web 1.0
 C: human-computer
 D: graphical user

12. Output ____ protects privacy rights and shields the organization's proprietary data from theft or unauthorized access.
 A: reporting
 B: prototyping
 C: security
 D: safety

13. Once data is entered, the company should store source documents in a safe location for some specified length of time according to their ____ policy.
 A: records retention
 B: records safety
 C: records filing
 D: records scanning

 14. After a report design is approved, you should document the design by creating a report ____ form, which contains information about the fields, data types and lengths, and report frequency.
 A: system
 B: analysis
 C: design
 D: prototype

15. The main part of the form, called the ____ zone, usually takes up at least half of the space on the form and contains captions and areas for entering variable data.
 A: body
 B: heading
 C: footer
 D: authorization

16. Each line of output printed is called a ____ line.
 A: detail
 B: information
 C: data
 D: control
17. A ____ check is used for data items that must have certain values.
 A: process-control
 B: reasonableness
 C: validity
 D: range

18. An automated facsimile or ____ system allows a customer to request a fax using e-mail, via the company Web site, or by telephone.
 A: fax fast
 B: fax mail
 C: fax now
 D: faxback

19. A ____ check improves input quality by testing the data and rejecting any entry that fails to meet specified conditions.
 A: data resources
 B: data dependency
 C: data validation
 D: data quality

20. A ____ workstation is a network terminal that supports a full-featured user interface, but limits the printing or copying of data, except to certain network resources that can be monitored and controlled.
 A: disk
 B: diskless
 C: either a. or b.
 D: neither a. nor b.

21. Sensitive data can be coded, in a process called ____, so only users with decoding software can read it.
A: filtering
B: context safety
C: spam
D: encryption

22. A popular security solution is the use of a network based application, often called a ____, that controls access to and from workstation interfaces.
A: port cop
B: port protector
C: workstation cop
D: workstation protector

23. A ____ report displays only those records that meet a specific condition or conditions.
A: exception
B: error
C: end
D: estimation

24. Good form ____ makes the form easy to complete and provides enough space, both vertically and horizontally, for users to enter the data.
A: layout
B: processing
C: data entry
D: output

25. ____ is often used by large firms to scan and store images of original documents to provide high-quality records management and archiving.
A: COF
B: COL
C: COS
D: COM

26. Using ____ input, data entry usually is performed on a specified time schedule, such as daily, weekly, monthly, or longer.
A: batch
B: intermittent
C: sequence
D: combination

27. Every page should include a page ____, which appears at the top of the page and includes the column headings that identify the data.
A: footer
B: header
C: control
D: signature

28. The ____ zone usually contains the company name or logo and the title and number of the form.
A: control
B: heading
C: footer
D: body

29. Although the vast majority of reports are designed graphically, some systems still produce one or more character-based reports that use a character set with ____ spacing.
A: fixed
B: variable
C: either a. or b.
D: neither a. nor b.

30. When the value of a control field changes, a control ____ occurs.
A: break
B: miss
C: mistake
D: error

31. A ____ check is performed on two or more fields to ensure that they are consistent or reasonable when considered together.
A: dual
B: two-time
C: combination
D: readiness

32. ____ design focuses on user needs for screen and printed forms of output.
A: Output
B: User interface
C: both a. and b.
D: neither a. nor b.

33. A ____ describes how users interact with a computer system, and consists of all the hardware, software, screens, menus, functions, output, and features that affect two-way communications between the user and the computer.
A: user scope map
B: user interface
C: user path
D: user process

34. A ____ document is a form used to request and collect input data, trigger or authorize an input action, and provide a record of the original transaction.
A: report
B: sequence
C: source
D: output

35. In addition to built-in design tools, popular software packages such as ____ Reports offer powerful features that help designers deal with professional-level design issues across the enterprise.
A: Crystal
B: Diamond
C: Gold
D: Platinum

36. The ____ zone contains codes, identification information, numbers, and dates that are used for storing completed forms.
A: footer
B: control
C: body
D: heading

37. Database programs such as Microsoft Access include a variety of report design tools, including a ____, which is a menu-driven feature that designers can use to create reports quickly and easily.
A: Data Wizard
B: Data Generator
C: Report Wizard
D: Report Generator

38. A ____ box can display messages or provide a place for a user to enter data.
A: option
B: text
C: graphics
D: storyboard

39. In a user-centered system, the distinction blurs between ____ and the interface itself.
A: input
B: output
C: both a. and b.
D: neither a. nor b.

40. A sales manager might want to know total sales for each sales representative, but not want a detail report listing every sale made by them. In that case, a ____ report is appropriate.
A: summary
B: highlights
C: error
D: regression analysis

41. A control break usually causes specific actions, such as printing subtotals for a group of records. That type of detail report is called a ____ report.
A: control output
B: control series
C: control break
D: control error

42. Companies use various ____ methods to maintain output integrity and security. For example, every report should include an appropriate title, report number or code, printing date, and time period covered.
A: output reporting
B: output listing
C: output control
D: output checking

43. Data ____ is the process of manually entering data into the information system, usually in the form of keystrokes or mouse clicks.
A: entry
B: checking
C: layout
D: switching

44. Batch ____ are totals used to verify batch input.
A: controls
B: zones
C: buttons
D: tags

45. Data ____ policies and procedures protect data from loss or damage, which is a vital goal in every organization.
A: control
B: process
C: security
D: integrity

46. Good interface design is based partly on ____, which provides the operational structure required to carry out the design objectives.
A: aesthetics
B: interface technology
C: ergonomics
D: output security

47. When designing data entry screens, provide an on-screen instruction to let users know the date format, and provide an example if the user must enter ____.
A: verifiers
B: clones
C: separators
D: masks

48. A key physical design element is the ____, which describes how users interact with a computer system.
A: HCI
B: PCI
C: UI
D: PI

49. In a well-designed detail report, a field called a(n) ____ field controls the output.
A: break
B: indexed
C: dominant
D: control

50. In older systems, often the user interface mainly consisted of ____-control screens that allowed a user to send commands to the system.
A: physical
B: process
C: input
D: command

51. In a source document, if totals are included on a form, they appear in the ____ zone.
A: calculated
B: control
C: totals
D: heading

52. Initial screen designs can be presented to users in the form of a(n) ____, which is a sketch that shows the general screen layout and design.
A: storyboard
B: turnaround document
C: faxback
D: output control

53. A combination check is a data validation check that ____.
A: tests data items to verify that they fall between a specified minimum and maximum value
B: identifies values that are questionable, but not necessarily wrong
C: is performed on two or more fields to ensure that they are consistent or reasonable when considered together
D: is used for mandatory data items

54. In a data entry screen a(n) ____ is a control feature that is used to represent on or off status and switches to the other status when clicked.
A: command button
B: option button
C: toggle button
D: radio button

0 comments:

Post a Comment