Chapter
8 Review
1.
A ____ check tests data items to verify that they fall between a specified
minimum and maximum value.
A:
process-control
B:
toggle button
C:
data validation
D:
range
2.
Web-based logs, called ____, are journals written from a particular point of
view.
A:
wogs
B:
jogs
C: blogs
D:
logs
3.
____ interaction describes the relationship between computers and people who
use them to perform business-related tasks.
A: Human-computer
B:
Person-computer
C:
Human-PC
D:
Person-PC
4.
Companies use various ____ methods to maintain output integrity and security.
For example, every report should include an appropriate title, report number or
code, printing date, and time period covered.
A:
output reporting
B:
output listing
C: output control
D:
output checking
5.
____ includes the necessary measures to ensure that input data is correct,
complete, and secure.
A:
Output control
B: Input control
C:
either a. or b.
D:
neither a. nor b.
6.
When designing a report, you should prepare a sample report, which is called a
____, for users to review.
A:
mock-up
B:
prototype
C: either a. or b.
D:
neither a. nor b.
7.
An option button, or ____ button, represents one choice in a set of options.
A:
television
B:
DVD player
C:
stereo
D:
radio
8.
A ____ report produces one or more lines of output for each record processed.
A:
summary
B:
highlights
C:
control
D: detail
9.
A ____ check identifies values that are questionable, but not necessarily
wrong.
A: reasonableness
B:
process-control
C:
data validation
D:
range
10.
A ____ is a specially formatted digital audio file that can be downloaded by
Internet users from a variety of content providers.
A:
songcast
B: podcast
C:
listencast
D:
voicecast
11.
A ____ interface uses icons, graphical objects, and pointing devices.
A:
green screen
B:
Web 1.0
C:
human-computer
D: graphical user
12.
Output ____ protects privacy rights and shields the organization's proprietary
data from theft or unauthorized access.
A:
reporting
B:
prototyping
C: security
D:
safety
13.
Once data is entered, the company should store source documents in a safe
location for some specified length of time according to their ____ policy.
A: records
retention
B:
records safety
C:
records filing
D:
records scanning
14.
After a report design is approved, you should document the design by creating a
report ____ form, which contains information about the fields, data types and
lengths, and report frequency.
A:
system
B: analysis
C:
design
D:
prototype
15.
The main part of the form, called the ____ zone, usually takes up at least half
of the space on the form and contains captions and areas for entering variable
data.
A: body
B:
heading
C:
footer
D:
authorization
16.
Each line of output printed is called a ____ line.
A: detail
B:
information
C:
data
D:
control
17.
A ____ check is used for data items that must have certain values.
A:
process-control
B:
reasonableness
C: validity
D:
range
18.
An automated facsimile or ____ system allows a customer to request a fax using
e-mail, via the company Web site, or by telephone.
A:
fax fast
B:
fax mail
C:
fax now
D:
faxback
19.
A ____ check improves input quality by testing the data and rejecting any entry
that fails to meet specified conditions.
A:
data resources
B:
data dependency
C: data validation
D:
data quality
20.
A ____ workstation is a network terminal that supports a full-featured user
interface, but limits the printing or copying of data, except to certain network
resources that can be monitored and controlled.
A:
disk
B: diskless
C:
either a. or b.
D:
neither a. nor b.
21.
Sensitive data can be coded, in a process called ____, so only users with
decoding software can read it.
A:
filtering
B:
context safety
C:
spam
D: encryption
22.
A popular security solution is the use of a network based application, often
called a ____, that controls access to and from workstation interfaces.
A:
port cop
B: port protector
C:
workstation cop
D:
workstation protector
23.
A ____ report displays only those records that meet a specific condition or
conditions.
A: exception
B:
error
C:
end
D:
estimation
24.
Good form ____ makes the form easy to complete and provides enough space, both
vertically and horizontally, for users to enter the data.
A: layout
B:
processing
C:
data entry
D:
output
25.
____ is often used by large firms to scan and store images of original
documents to provide high-quality records management and archiving.
A:
COF
B:
COL
C:
COS
D: COM
26.
Using ____ input, data entry usually is performed on a specified time schedule,
such as daily, weekly, monthly, or longer.
A: batch
B:
intermittent
C:
sequence
D:
combination
27.
Every page should include a page ____, which appears at the top of the page and
includes the column headings that identify the data.
A:
footer
B: header
C:
control
D:
signature
28.
The ____ zone usually contains the company name or logo and the title and
number of the form.
A:
control
B: heading
C:
footer
D:
body
29.
Although the vast majority of reports are designed graphically, some systems
still produce one or more character-based reports that use a character set with
____ spacing.
A: fixed
B:
variable
C:
either a. or b.
D:
neither a. nor b.
30.
When the value of a control field changes, a control ____ occurs.
A: break
B:
miss
C:
mistake
D:
error
31.
A ____ check is performed on two or more fields to ensure that they are
consistent or reasonable when considered together.
A:
dual
B:
two-time
C: combination
D:
readiness
32.
____ design focuses on user needs for screen and printed forms of output.
A: Output
B:
User interface
C:
both a. and b.
D:
neither a. nor b.
33.
A ____ describes how users interact with a computer system, and consists of all
the hardware, software, screens, menus, functions, output, and features that
affect two-way communications between the user and the computer.
A:
user scope map
B: user interface
C:
user path
D:
user process
34.
A ____ document is a form used to request and collect input data, trigger or
authorize an input action, and provide a record of the original transaction.
A:
report
B:
sequence
C: source
D:
output
35.
In addition to built-in design tools, popular software packages such as ____
Reports offer powerful features that help designers deal with
professional-level design issues across the enterprise.
A: Crystal
B:
Diamond
C:
Gold
D:
Platinum
36.
The ____ zone contains codes, identification information, numbers, and dates
that are used for storing completed forms.
A:
footer
B: control
C:
body
D:
heading
37.
Database programs such as Microsoft Access include a variety of report design
tools, including a ____, which is a menu-driven feature that designers can use
to create reports quickly and easily.
A:
Data Wizard
B:
Data Generator
C: Report Wizard
D:
Report Generator
38.
A ____ box can display messages or provide a place for a user to enter data.
A:
option
B: text
C:
graphics
D:
storyboard
39.
In a user-centered system, the distinction blurs between ____ and the interface
itself.
A:
input
B:
output
C: both a. and b.
D:
neither a. nor b.
40.
A sales manager might want to know total sales for each sales representative,
but not want a detail report listing every sale made by them. In that case, a
____ report is appropriate.
A: summary
B:
highlights
C:
error
D:
regression analysis
41.
A control break usually causes specific actions, such as printing subtotals for
a group of records. That type of detail report is called a ____ report.
A:
control output
B:
control series
C: control break
D:
control error
42.
Companies use various ____ methods to maintain output integrity and security.
For example, every report should include an appropriate title, report number or
code, printing date, and time period covered.
A:
output reporting
B:
output listing
C: output control
D:
output checking
43.
Data ____ is the process of manually entering data into the information system,
usually in the form of keystrokes or mouse clicks.
A: entry
B:
checking
C:
layout
D:
switching
44.
Batch ____ are totals used to verify batch input.
A: controls
B:
zones
C:
buttons
D:
tags
45.
Data ____ policies and procedures protect data from loss or damage, which is a
vital goal in every organization.
A:
control
B:
process
C: security
D:
integrity
46. Good interface design
is based partly on ____, which provides the operational structure required to
carry out the design objectives.
A:
aesthetics
B: interface technology
C:
ergonomics
D:
output security
47.
When designing data entry screens, provide an on-screen instruction to let
users know the date format, and provide an example if the user must enter ____.
A:
verifiers
B:
clones
C: separators
D:
masks
48.
A key physical design element is the ____, which describes how users interact
with a computer system.
A:
HCI
B:
PCI
C: UI
D:
PI
49.
In a well-designed detail report, a field called a(n) ____ field controls the
output.
A:
break
B:
indexed
C:
dominant
D: control
50.
In older systems, often the user interface mainly consisted of ____-control
screens that allowed a user to send commands to the system.
A:
physical
B: process
C:
input
D:
command
51.
In a source document, if totals are included on a form, they appear in the ____
zone.
A:
calculated
B:
control
C: totals
D:
heading
52.
Initial screen designs can be presented to users in the form of a(n) ____,
which is a sketch that shows the general screen layout and design.
A: storyboard
B: turnaround document
C: faxback
D: output control
53.
A combination check is a data validation check that ____.
A: tests data items to verify that they fall
between a specified minimum and maximum value
B: identifies values that are questionable,
but not necessarily wrong
C: is performed on two
or more fields to ensure that they are consistent or reasonable when considered
together
D: is used for mandatory data items
54.
In a data entry screen a(n) ____ is a control feature that is used to represent
on or off status and switches to the other status when clicked.
A:
command button
B:
option button
C: toggle button
D:
radio button
0 comments:
Post a Comment