Deck 15: Designing Accurate Data Entry Procedures

Full screen (f)
exit full mode
Question
Which is not a purpose for coding?

A) keeping track of something
B) classifying information
C) concealing information
D) creating information
E) revealing information
Use Space or
up arrow
down arrow
to flip the card.
Question
A problem that occurs with classification codes is that:

A) there may not be enough letters to form a complete code.
B) the classifications may not be secure enough.
C) there may be several groups that have the same first letter.
D) the classifications are not easily understood since they are encrypted.
E) the data may not be recognized as belonging to any classes.
Question
In establishing a coding system, the analyst should do all except:

A) make codes that are diversified.
B) keep codes concise.
C) keep codes uniform.
D) allow for modification of codes.
E) make codes meaningful.
Question
Which code is necessary for instructing either the computer or the decision maker about what action to take?

A) function code
B) mnemonic code
C) classification code
D) simple sequence code
Question
Which code may be used to conceal or disguise information?

A) classification codes
B) alphabetic deviation codes
C) block sequence codes
D) simple sequence codes
E) cipher codes
Question
Which code indicates the approximate order that the data were entered?

A) classification codes
B) alphabetic deviation codes
C) block sequence codes
D) cipher codes
E) simple sequence codes
Question
Any code that helps the data entry person remember how to enter the data or the end-user remember how to use the information can be considered:

A) classification code.
B) significant-digit code.
C) mnemonic code.
D) block sequence code.
Question
Which method is useful for scoring answer sheets for survey questionnaires?

A) data strips
B) bar codes
C) punch out forms
D) mark sense forms
E) MICR
Question
The systems analyst can support accurate data entry through achievement of all these broad objectives except:

A) effective screen design.
B) effective and complete data capture.
C) efficient data capture.
D) assuring quality through validation.
Question
Classification codes are used to:

A) group data according to a common characteristic.
B) control the sequence of data by ensuring that a class of codes has all unique values.
C) disguise data within a classification, that is, ensure security for classified data.
D) encrypt data according to a security class.
E) enable users to understand the components or classes of data within a larger code.
Question
The code that is used to represent glyphs or syllables or whole words is:

A) block sequence.
B) unicode.
C) mnemonic code.
D) significant-digit.
Question
An advantage of using significant-digit codes is that:

A) the data may be easily concealed.
B) the code may be generated by auto-sequencing programs.
C) the code is short and quick to enter.
D) inquiries may be performed on a portion of the code.
E) the code combines the flexibility of data that is grouped and a sequence code.
Question
Which is a way to read input from a source document with an optical scanner rather than off the magnetic media?

A) mark sense forms
B) punch out forms
C) optical character recognition (OCR)
D) bar codes
Question
Which code is used to assign codes sequentially within a category?

A) classification codes
B) alphabetic deviation codes
C) block sequence codes
D) cipher codes
E) simple sequence codes
Question
Which code describes an object by its membership in many subgroups?

A) significant-digit codes
B) block sequence codes
C) cipher codes
D) mnemonic codes
E) function codes
Question
Codes in a GUI system may be stored:

A) in a database table.
B) as a database function.
C) as a pull-down list.
D) A and B above.
E) A and C above.
Question
A disadvantage of alphabetic derivation codes is that:

A) there is no meaning inherent in the code.
B) there may be names that do not have the minimum required number of consonants in the name or description.
C) there are not enough attributes in the data to form a code.
D) there is no way to obtain information from a part of the code.
E) there is no way to sort on any of the data.
Question
Why would a company issuing credit cards use a code that is much larger than the minimum length?

A) to allow for expansion, since the customer growth may increase exponentially
B) because the numbers are assigned sequentially and the codes should not use all possible numbers
C) so that a person would not be able to guess a credit card number and illegally use it to purchase goods
D) because the codes use the alphabetic derivation format
E) since the codes are used to do inquiries on the data within them
Question
The code used for pull-down menus in a GUI system is:

A) classification codes.
B) alphabetic deviation codes.
C) block sequence codes.
D) cipher codes.
E) simple sequence codes.
Question
Codes are:

A) used in GUI programs to ensure that codes keyed by the user are valid.
B) used in a validation program to ensure that only valid codes have been entered.
C) printed in reports.
D) displayed on screens.
E) All of the above.
Question
Coded data require less time to enter and reduce the number of items entered.
Question
Which of the following is used by radio frequency identification for automatic collection of data?

A) micro transmitting stations
B) transponders
C) cell phones
D) hand-held devices
Question
The ________ sequence code is an extension of the sequence code.

A) block
B) classification
C) significant-digit
D) numeric
Question
Which is not a possible way to validate input?

A) test for missing data
B) test for correct field length
C) test for accurate character data
D) test for comparison with stored data
E) using check digits
Question
One of the disadvantages of using 2D codes is:

A) the ease with which a printed code can be stickered over or tampered with.
B) that codes are readable without the use of specialized software.
C) the unreliability of the transponders used that may run out of power.
D) the minimum distance required to read the code.
Question
A sequence code eliminates the possibility of assigning the same number.
Question
________ means that the identification code for a customer should not change each time new data are received.

A) Stability
B) Reliability
C) Standards based
D) Sortable
Question
Data are unclear and not as readily interpretable when coding classes are not mutually:

A) exclusive.
B) elusive.
C) enforced.
D) inclusive.
Question
Value checks are performed for data that is:

A) continuous.
B) discrete.
C) cross-referenced.
D) using a check digit.
E) stored on a master file.
Question
A user enters the code directly into the terminal of a(n) ________ system or onto a source document of a batch system.

A) online
B) offline
C) documented
D) paper-based
Question
The code that is used to represent glyphs or syllables or whole words is called:

A) unicode.
B) function code.
C) alpha-numeric code.
D) mnemonic code.
Question
Credit card processing uses a check digit formula called the ________ formula.

A) RFID
B) modulus 3
C) Luhn
D) regular expression
E) DTD
Question
There are two types of data to enter: data that ________ every transaction, and data that concisely differentiate the particular item being processed from all other items.

A) change
B) filter
C) capture
D) remove
Question
When it is possible to describe a product via its membership in many subgroups, we can use a ________ code to help describe it.

A) significant-digit
B) block
C) cipher
D) numeric
Question
A random number should be used when order of processing requires knowledge of the sequence in which items enter the system or the order in which events unfold.
Question
Which of the following is a way to validate an XML document?

A) DTD
B) schema
C) Both of the above will validate an XML document.
D) None of the above will validate an XML document.
Question
Effective data ________ is achievable only if prior thought is given to what the source document should contain.

A) capture
B) entry
C) feedback
D) analysis
Question
A ________ code, rather than a random number, gives users an approximation of when the order was received.

A) sequence
B) alphabetic
C) simple
D) numeric
Question
The process of putting ambiguous or cumbersome data into short, easily entered digits or letters is called:

A) coding.
B) data entry.
C) data capture.
D) data analysis.
Question
Coding affords the ability to distinguish between classes of items.
Question
Classification codes should be listed in manuals or posted so that users can locate them easily.
Question
The code abbreviations in a mnemonic system must be frequently changed.
Question
Unicode is used to represent glyphs or syllables or whole words.
Question
If codes must be long, they should be broken up into subcodes.
Question
Only systems analysts need to know the cipher codes by heart.
Question
If codes change frequently or are somewhat unstable, they should be stored as a database function in a GUI system.
Question
Bar codes encode text, graphics, and data into small rectangular dots on a narrow strip of paper.
Question
To be useful, classes must be mutually inclusive.
Question
One reason for revealing information through codes is to make the data entry more meaningful.
Question
The Luhn formula is designed to catch every transposition error.
Question
Active RFID tags are much less reliable because they depend on their own power supply, which may fail.
Question
A pattern that contains symbols representing the type of data that must be present in a field is called a character map.
Question
Any code that helps the data-entry person remember how to enter the data or the end-user remember how to use the information can be considered an alphabetic derivation code.
Question
Credit card processing uses a check digit formula called the Luhn formula.
Question
The analyst must assume that errors in the data will not occur.
Question
A test for range or reasonableness works if there are only a few valid values, and it is feasible for situations in which values are not restricted and predictable.
Question
Radio frequency identification allows the automatic collection of data using RFID tags or transponders that contain a chip and an antenna.
Question
Numeric codes are much easier to sort than alphanumerics.
Question
When using codes in a GUI interface, they should only be selected using a check box.
Question
Keep codes uniform among, as well as within, programs.
Question
What is the purpose of using a mnemonic code for data?
Question
A value check is used when one element has a relationship with another one.
Question
XML documents may be validated by comparing them to a DTD or a schema.
Question
A pattern that contains symbols that represent the type of data that must be present in a field is called a regular expression .
Question
Bar codes appear on any person or object that needs to be checked into and out of any kind of inventory system.
Question
Radio frequency identification allows the automatic collection of data using tags or transponders that contain a chip and an antenna.
Question
List five of the eight data entry methods mentioned in the book.
Question
What is a simple sequence code? Give an example of how this code could be used.
Question
Ensuring the quality of the data input to the information system is critical to ensuring quality output.
Question
List the four objectives that a systems analyst can use to support accurate data entry.
Question
There are three main problems that can occur with input transactions: submitting the wrong data to the system, submission of data by an unauthorized person, or asking the system to perform an unacceptable function.
Question
Value checks are usually performed for any data.
Question
A method for validating credit cards uses a check digit formula called the Kendall formula.
Question
Data entered at the point of sale are reused throughout the entire order fulfillment process in a(n) ecommerce system.
Question
What are the four improvements to data accuracy that transactions conducted over ecommerce Web sites can offer?
Question
An XML DTD is much more powerful than a schema.
Question
In an ecommerce system, data is generally entered into the system by the programmer.
Question
Use the stored data system to prevent the mistake that the intended number 53411 is typed in as number 54311 instead.
Question
A mathematical process of assuring data accuracy involves multiplying each of the digits in the original code by some predetermined weights, summing these results, and then dividing this sum by a modulus number.
Question
Accuracy is improved by better feedback.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/80
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 15: Designing Accurate Data Entry Procedures
1
Which is not a purpose for coding?

A) keeping track of something
B) classifying information
C) concealing information
D) creating information
E) revealing information
D
2
A problem that occurs with classification codes is that:

A) there may not be enough letters to form a complete code.
B) the classifications may not be secure enough.
C) there may be several groups that have the same first letter.
D) the classifications are not easily understood since they are encrypted.
E) the data may not be recognized as belonging to any classes.
C
3
In establishing a coding system, the analyst should do all except:

A) make codes that are diversified.
B) keep codes concise.
C) keep codes uniform.
D) allow for modification of codes.
E) make codes meaningful.
A
4
Which code is necessary for instructing either the computer or the decision maker about what action to take?

A) function code
B) mnemonic code
C) classification code
D) simple sequence code
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
5
Which code may be used to conceal or disguise information?

A) classification codes
B) alphabetic deviation codes
C) block sequence codes
D) simple sequence codes
E) cipher codes
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
6
Which code indicates the approximate order that the data were entered?

A) classification codes
B) alphabetic deviation codes
C) block sequence codes
D) cipher codes
E) simple sequence codes
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
7
Any code that helps the data entry person remember how to enter the data or the end-user remember how to use the information can be considered:

A) classification code.
B) significant-digit code.
C) mnemonic code.
D) block sequence code.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
8
Which method is useful for scoring answer sheets for survey questionnaires?

A) data strips
B) bar codes
C) punch out forms
D) mark sense forms
E) MICR
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
9
The systems analyst can support accurate data entry through achievement of all these broad objectives except:

A) effective screen design.
B) effective and complete data capture.
C) efficient data capture.
D) assuring quality through validation.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
10
Classification codes are used to:

A) group data according to a common characteristic.
B) control the sequence of data by ensuring that a class of codes has all unique values.
C) disguise data within a classification, that is, ensure security for classified data.
D) encrypt data according to a security class.
E) enable users to understand the components or classes of data within a larger code.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
11
The code that is used to represent glyphs or syllables or whole words is:

A) block sequence.
B) unicode.
C) mnemonic code.
D) significant-digit.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
12
An advantage of using significant-digit codes is that:

A) the data may be easily concealed.
B) the code may be generated by auto-sequencing programs.
C) the code is short and quick to enter.
D) inquiries may be performed on a portion of the code.
E) the code combines the flexibility of data that is grouped and a sequence code.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
13
Which is a way to read input from a source document with an optical scanner rather than off the magnetic media?

A) mark sense forms
B) punch out forms
C) optical character recognition (OCR)
D) bar codes
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
14
Which code is used to assign codes sequentially within a category?

A) classification codes
B) alphabetic deviation codes
C) block sequence codes
D) cipher codes
E) simple sequence codes
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
15
Which code describes an object by its membership in many subgroups?

A) significant-digit codes
B) block sequence codes
C) cipher codes
D) mnemonic codes
E) function codes
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
16
Codes in a GUI system may be stored:

A) in a database table.
B) as a database function.
C) as a pull-down list.
D) A and B above.
E) A and C above.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
17
A disadvantage of alphabetic derivation codes is that:

A) there is no meaning inherent in the code.
B) there may be names that do not have the minimum required number of consonants in the name or description.
C) there are not enough attributes in the data to form a code.
D) there is no way to obtain information from a part of the code.
E) there is no way to sort on any of the data.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
18
Why would a company issuing credit cards use a code that is much larger than the minimum length?

A) to allow for expansion, since the customer growth may increase exponentially
B) because the numbers are assigned sequentially and the codes should not use all possible numbers
C) so that a person would not be able to guess a credit card number and illegally use it to purchase goods
D) because the codes use the alphabetic derivation format
E) since the codes are used to do inquiries on the data within them
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
19
The code used for pull-down menus in a GUI system is:

A) classification codes.
B) alphabetic deviation codes.
C) block sequence codes.
D) cipher codes.
E) simple sequence codes.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
20
Codes are:

A) used in GUI programs to ensure that codes keyed by the user are valid.
B) used in a validation program to ensure that only valid codes have been entered.
C) printed in reports.
D) displayed on screens.
E) All of the above.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
21
Coded data require less time to enter and reduce the number of items entered.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following is used by radio frequency identification for automatic collection of data?

A) micro transmitting stations
B) transponders
C) cell phones
D) hand-held devices
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
23
The ________ sequence code is an extension of the sequence code.

A) block
B) classification
C) significant-digit
D) numeric
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
24
Which is not a possible way to validate input?

A) test for missing data
B) test for correct field length
C) test for accurate character data
D) test for comparison with stored data
E) using check digits
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
25
One of the disadvantages of using 2D codes is:

A) the ease with which a printed code can be stickered over or tampered with.
B) that codes are readable without the use of specialized software.
C) the unreliability of the transponders used that may run out of power.
D) the minimum distance required to read the code.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
26
A sequence code eliminates the possibility of assigning the same number.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
27
________ means that the identification code for a customer should not change each time new data are received.

A) Stability
B) Reliability
C) Standards based
D) Sortable
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
28
Data are unclear and not as readily interpretable when coding classes are not mutually:

A) exclusive.
B) elusive.
C) enforced.
D) inclusive.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
29
Value checks are performed for data that is:

A) continuous.
B) discrete.
C) cross-referenced.
D) using a check digit.
E) stored on a master file.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
30
A user enters the code directly into the terminal of a(n) ________ system or onto a source document of a batch system.

A) online
B) offline
C) documented
D) paper-based
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
31
The code that is used to represent glyphs or syllables or whole words is called:

A) unicode.
B) function code.
C) alpha-numeric code.
D) mnemonic code.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
32
Credit card processing uses a check digit formula called the ________ formula.

A) RFID
B) modulus 3
C) Luhn
D) regular expression
E) DTD
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
33
There are two types of data to enter: data that ________ every transaction, and data that concisely differentiate the particular item being processed from all other items.

A) change
B) filter
C) capture
D) remove
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
34
When it is possible to describe a product via its membership in many subgroups, we can use a ________ code to help describe it.

A) significant-digit
B) block
C) cipher
D) numeric
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
35
A random number should be used when order of processing requires knowledge of the sequence in which items enter the system or the order in which events unfold.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following is a way to validate an XML document?

A) DTD
B) schema
C) Both of the above will validate an XML document.
D) None of the above will validate an XML document.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
37
Effective data ________ is achievable only if prior thought is given to what the source document should contain.

A) capture
B) entry
C) feedback
D) analysis
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
38
A ________ code, rather than a random number, gives users an approximation of when the order was received.

A) sequence
B) alphabetic
C) simple
D) numeric
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
39
The process of putting ambiguous or cumbersome data into short, easily entered digits or letters is called:

A) coding.
B) data entry.
C) data capture.
D) data analysis.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
40
Coding affords the ability to distinguish between classes of items.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
41
Classification codes should be listed in manuals or posted so that users can locate them easily.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
42
The code abbreviations in a mnemonic system must be frequently changed.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
43
Unicode is used to represent glyphs or syllables or whole words.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
44
If codes must be long, they should be broken up into subcodes.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
45
Only systems analysts need to know the cipher codes by heart.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
46
If codes change frequently or are somewhat unstable, they should be stored as a database function in a GUI system.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
47
Bar codes encode text, graphics, and data into small rectangular dots on a narrow strip of paper.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
48
To be useful, classes must be mutually inclusive.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
49
One reason for revealing information through codes is to make the data entry more meaningful.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
50
The Luhn formula is designed to catch every transposition error.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
51
Active RFID tags are much less reliable because they depend on their own power supply, which may fail.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
52
A pattern that contains symbols representing the type of data that must be present in a field is called a character map.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
53
Any code that helps the data-entry person remember how to enter the data or the end-user remember how to use the information can be considered an alphabetic derivation code.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
54
Credit card processing uses a check digit formula called the Luhn formula.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
55
The analyst must assume that errors in the data will not occur.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
56
A test for range or reasonableness works if there are only a few valid values, and it is feasible for situations in which values are not restricted and predictable.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
57
Radio frequency identification allows the automatic collection of data using RFID tags or transponders that contain a chip and an antenna.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
58
Numeric codes are much easier to sort than alphanumerics.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
59
When using codes in a GUI interface, they should only be selected using a check box.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
60
Keep codes uniform among, as well as within, programs.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
61
What is the purpose of using a mnemonic code for data?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
62
A value check is used when one element has a relationship with another one.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
63
XML documents may be validated by comparing them to a DTD or a schema.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
64
A pattern that contains symbols that represent the type of data that must be present in a field is called a regular expression .
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
65
Bar codes appear on any person or object that needs to be checked into and out of any kind of inventory system.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
66
Radio frequency identification allows the automatic collection of data using tags or transponders that contain a chip and an antenna.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
67
List five of the eight data entry methods mentioned in the book.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
68
What is a simple sequence code? Give an example of how this code could be used.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
69
Ensuring the quality of the data input to the information system is critical to ensuring quality output.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
70
List the four objectives that a systems analyst can use to support accurate data entry.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
71
There are three main problems that can occur with input transactions: submitting the wrong data to the system, submission of data by an unauthorized person, or asking the system to perform an unacceptable function.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
72
Value checks are usually performed for any data.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
73
A method for validating credit cards uses a check digit formula called the Kendall formula.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
74
Data entered at the point of sale are reused throughout the entire order fulfillment process in a(n) ecommerce system.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
75
What are the four improvements to data accuracy that transactions conducted over ecommerce Web sites can offer?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
76
An XML DTD is much more powerful than a schema.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
77
In an ecommerce system, data is generally entered into the system by the programmer.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
78
Use the stored data system to prevent the mistake that the intended number 53411 is typed in as number 54311 instead.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
79
A mathematical process of assuring data accuracy involves multiplying each of the digits in the original code by some predetermined weights, summing these results, and then dividing this sum by a modulus number.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
80
Accuracy is improved by better feedback.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 80 flashcards in this deck.