Deck 15: Designing Accurate Data Entry
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/82
Play
Full screen (f)
Deck 15: Designing Accurate Data Entry
1
Which is a way to read input from a source document with an optical scanner rather than off the magnetic media?
A)mark sense forms
B)punch out forms
C)optical character recognition (OCR)
D)bar codes
A)mark sense forms
B)punch out forms
C)optical character recognition (OCR)
D)bar codes
C
2
Which method is useful for scoring answer sheets for survey questionnaires?
A)data strips
B)bar codes
C)punch out forms
D)mark sense forms
E)MICR
A)data strips
B)bar codes
C)punch out forms
D)mark sense forms
E)MICR
D
3
Which code may be used to conceal or disguise information?
A)classification codes
B)alphabetic deviation codes
C)block sequence codes
D)simple sequence codes
E)cipher codes
A)classification codes
B)alphabetic deviation codes
C)block sequence codes
D)simple sequence codes
E)cipher codes
E
4
Which code is used to assign codes sequentially within a category?
A)classification codes
B)alphabetic deviation codes
C)block sequence codes
D)cipher codes
E)simple sequence codes
A)classification codes
B)alphabetic deviation codes
C)block sequence codes
D)cipher codes
E)simple sequence codes
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
5
The code used for pull-down menus in a GUI system is:
A)classification codes.
B)alphabetic deviation codes.
C)block sequence codes.
D)cipher codes.
E)simple sequence codes.
A)classification codes.
B)alphabetic deviation codes.
C)block sequence codes.
D)cipher codes.
E)simple sequence codes.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
6
Codes are:
A)used in GUI programs to ensure that codes keyed by the user are valid.
B)used in a validation program to ensure that only valid codes have been entered.
C)printed in reports.
D)displayed on screens.
E)All of the above.
A)used in GUI programs to ensure that codes keyed by the user are valid.
B)used in a validation program to ensure that only valid codes have been entered.
C)printed in reports.
D)displayed on screens.
E)All of the above.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
7
A disadvantage of alphabetic derivation codes is that:
A)there is no meaning inherent in the code.
B)there may be names that do not have the minimum required number of consonants in the name or description.
C)there are not enough attributes in the data to form a code.
D)there is no way to obtain information from a part of the code.
E)there is no way to sort on any of the data.
A)there is no meaning inherent in the code.
B)there may be names that do not have the minimum required number of consonants in the name or description.
C)there are not enough attributes in the data to form a code.
D)there is no way to obtain information from a part of the code.
E)there is no way to sort on any of the data.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
8
Which code describes an object by its membership in many subgroups?
A)significant-digit codes
B)block sequence codes
C)cipher codes
D)mnemonic codes
E)function codes
A)significant-digit codes
B)block sequence codes
C)cipher codes
D)mnemonic codes
E)function codes
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
9
The code that is used to represent glyphs or syllables or whole words is:
A)block sequence.
B)unicode.
C)mnemonic code.
D)significant-digit.
A)block sequence.
B)unicode.
C)mnemonic code.
D)significant-digit.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
10
Why would a company issuing credit cards use a code that is much larger than the minimum length?
A)to allow for expansion, since the customer growth may increase exponentially
B)because the numbers are assigned sequentially and the codes should not use all possible numbers
C)so that a person would not be able to guess a credit card number and illegally use it to purchase goods
D)because the codes use the alphabetic derivation format
E)since the codes are used to do inquiries on the data within them
A)to allow for expansion, since the customer growth may increase exponentially
B)because the numbers are assigned sequentially and the codes should not use all possible numbers
C)so that a person would not be able to guess a credit card number and illegally use it to purchase goods
D)because the codes use the alphabetic derivation format
E)since the codes are used to do inquiries on the data within them
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
11
Classification codes are used to:
A)group data according to a common characteristic.
B)control the sequence of data by ensuring that a class of codes has all unique values.
C)disguise data within a classification, that is, ensure security for classified data.
D)encrypt data according to a security class.
E)enable users to understand the components or classes of data within a larger code.
A)group data according to a common characteristic.
B)control the sequence of data by ensuring that a class of codes has all unique values.
C)disguise data within a classification, that is, ensure security for classified data.
D)encrypt data according to a security class.
E)enable users to understand the components or classes of data within a larger code.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
12
Codes in a GUI system may be stored:
A)in a database table.
B)as a database function.
C)as a pull-down list.
D)A and B above.
E)A and C above.
A)in a database table.
B)as a database function.
C)as a pull-down list.
D)A and B above.
E)A and C above.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
13
Any code that helps the data entry person remember how to enter the data or the end-user remember how to use the information can be considered:
A)classification code.
B)significant-digit code.
C)mnemonic code.
D)block sequence code.
A)classification code.
B)significant-digit code.
C)mnemonic code.
D)block sequence code.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
14
Which code indicates the approximate order that the data were entered?
A)classification codes
B)alphabetic deviation codes
C)block sequence codes
D)cipher codes
E)simple sequence codes
A)classification codes
B)alphabetic deviation codes
C)block sequence codes
D)cipher codes
E)simple sequence codes
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
15
The systems analyst can support accurate data entry through achievement of all these broad objectives except:
A)effective screen design.
B)effective and complete data capture.
C)efficient data capture.
D)assuring quality through validation.
A)effective screen design.
B)effective and complete data capture.
C)efficient data capture.
D)assuring quality through validation.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
16
Which is not a purpose for coding?
A)keeping track of something
B)classifying information
C)concealing information
D)creating information
E)revealing information
A)keeping track of something
B)classifying information
C)concealing information
D)creating information
E)revealing information
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
17
An advantage of using significant-digit codes is that:
A)the data may be easily concealed.
B)the code may be generated by auto-sequencing programs.
C)the code is short and quick to enter.
D)inquiries may be performed on a portion of the code.
E)the code combines the flexibility of data that is grouped and a sequence code.
A)the data may be easily concealed.
B)the code may be generated by auto-sequencing programs.
C)the code is short and quick to enter.
D)inquiries may be performed on a portion of the code.
E)the code combines the flexibility of data that is grouped and a sequence code.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
18
A problem that occurs with classification codes is that:
A)there may not be enough letters to form a complete code.
B)the classifications may not be secure enough.
C)there may be several groups that have the same first letter.
D)the classifications are not easily understood since they are encrypted.
E)the data may not be recognized as belonging to any classes.
A)there may not be enough letters to form a complete code.
B)the classifications may not be secure enough.
C)there may be several groups that have the same first letter.
D)the classifications are not easily understood since they are encrypted.
E)the data may not be recognized as belonging to any classes.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
19
Which code is necessary for instructing either the computer or the decision maker about what action to take?
A)function code
B)mnemonic code
C)classification code
D)simple sequence code
A)function code
B)mnemonic code
C)classification code
D)simple sequence code
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
20
In establishing a coding system, the analyst should do all except:
A)make codes that are diversified.
B)keep codes concise.
C)keep codes uniform.
D)allow for modification of codes.
E)make codes meaningful.
A)make codes that are diversified.
B)keep codes concise.
C)keep codes uniform.
D)allow for modification of codes.
E)make codes meaningful.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
21
One of the disadvantages of using 2D codes is:
A)the ease with which a printed code can be stickered over or tampered with.
B)that codes are readable without the use of specialized software.
C)the unreliability of the transponders used that may run out of power.
D)the minimum distance required to read the code.
A)the ease with which a printed code can be stickered over or tampered with.
B)that codes are readable without the use of specialized software.
C)the unreliability of the transponders used that may run out of power.
D)the minimum distance required to read the code.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
22
The process of putting ambiguous or cumbersome data into short, easily entered digits or letters is called ________.
A)coding
B)data entry
C)data capture
D)data analysis
A)coding
B)data entry
C)data capture
D)data analysis
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
23
Value checks are performed for data that is:
A)continuous.
B)discrete.
C)cross-referenced.
D)using a check digit.
E)stored on a master file.
A)continuous.
B)discrete.
C)cross-referenced.
D)using a check digit.
E)stored on a master file.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
24
Microsoft Tags are different from QR codes because:
A)they can only be used when printed in black and white.
B)codes must be read by a server first.
C)they are readable without the use of specialized software.
D)None of the above.
A)they can only be used when printed in black and white.
B)codes must be read by a server first.
C)they are readable without the use of specialized software.
D)None of the above.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following is used by radio frequency identification for automatic collection of data?
A)micro transmitting stations
B)transponders
C)cell phones
D)hand-held devices
A)micro transmitting stations
B)transponders
C)cell phones
D)hand-held devices
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
26
Data are unclear and not as readily interpretable when coding classes are not mutually ________.
A)exclusive
B)elusive
C)enforced
D)inclusive
A)exclusive
B)elusive
C)enforced
D)inclusive
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
27
There are two types of data to enter: data that ________ every transaction, and data that concisely differentiate the particular item being processed from all other items.
A)change
B)filter
C)capture
D)remove
A)change
B)filter
C)capture
D)remove
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
28
A random number should be used when order of processing requires knowledge of the sequence in which items enter the system or the order in which events unfold.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
29
When it is possible to describe a product via its membership in many subgroups, we can use a ________ code to help describe it.
A)significant-digit
B)block
C)cipher
D)numeric
A)significant-digit
B)block
C)cipher
D)numeric
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
30
Which is not a possible way to validate input?
A)test for missing data
B)test for correct field length
C)test for accurate character data
D)test for comparison with stored data
E)using check digits
A)test for missing data
B)test for correct field length
C)test for accurate character data
D)test for comparison with stored data
E)using check digits
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
31
The code that is used to represent glyphs or syllables or whole words is called ________.
A)unicode
B)function code
C)alpha-numeric code
D)mnemonic code
A)unicode
B)function code
C)alpha-numeric code
D)mnemonic code
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
32
________ means that the identification code for a customer should not change each time new data are received.
A)Stability
B)Reliability
C)Standards based
D)Sortable
A)Stability
B)Reliability
C)Standards based
D)Sortable
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
33
The ________ sequence code is an extension of the sequence code.
A)block
B)classification
C)significant-digit
D)numeric
A)block
B)classification
C)significant-digit
D)numeric
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following is a way to validate an XML document?
A)DTD
B)schema
C)Both of the above will validate an XML document.
D)None of the above will validate an XML document.
A)DTD
B)schema
C)Both of the above will validate an XML document.
D)None of the above will validate an XML document.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
35
Coded data require less time to enter and reduce the number of items entered.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
36
A user enters the code directly into the terminal of a(n)________ system or onto a source document of a batch system.
A)online
B)offline
C)documented
D)paper-based
A)online
B)offline
C)documented
D)paper-based
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
37
A ________ code, rather than a random number, gives users an approximation of when the order was received.
A)sequence
B)alphabetic
C)simple
D)numeric
A)sequence
B)alphabetic
C)simple
D)numeric
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
38
A sequence code eliminates the possibility of assigning the same number.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
39
Effective data ________ is achievable only if prior thought is given to what the source document should contain.
A)capture
B)entry
C)feedback
D)analysis
A)capture
B)entry
C)feedback
D)analysis
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
40
Credit card processing uses a check digit formula called the ________ formula.
A)RFID
B)modulus 3
C)Luhn
D)regular expression
E)DTD
A)RFID
B)modulus 3
C)Luhn
D)regular expression
E)DTD
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
41
Bar codes encode text, graphics, and data into small rectangular dots on a narrow strip of paper.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
42
A test for range or reasonableness works if there are only a few valid values, and it is feasible for situations in which values are not restricted and predictable.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
43
Active RFID tags are much less reliable because they depend on their own power supply, which may fail.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
44
Coding affords the ability to distinguish between classes of items.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
45
If codes change frequently or are somewhat unstable, they should be stored as a database function in a GUI system.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
46
Unicode is used to represent glyphs or syllables or whole words.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
47
The Luhn formula is designed to catch every transposition error.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
48
Numeric codes are much easier to sort than alphanumerics.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
49
The code abbreviations in a mnemonic system must be frequently changed.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
50
Radio frequency identification allows the automatic collection of data using RFID tags or transponders that contain a chip and an antenna..
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
51
The analyst must assume that errors in the data will not occur.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
52
One reason for revealing information through codes is to make the data entry more meaningful.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
53
Only systems analysts need to know the cipher codes by heart.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
54
To be useful, classes must be mutually inclusive.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
55
Classification codes should be listed in manuals or posted so that users can locate them easily.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
56
Any code that helps the data-entry person remember how to enter the data or the end-user remember how to use the information can be considered an alphabetic derivation code.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
57
If codes must be long, they should be broken up into subcodes.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
58
Credit card processing uses a check digit formula called the Luhn formula.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
59
Keep codes uniform among, as well as within, programs.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
60
When using codes in a GUI interface, they should only be selected using a check box.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
61
Tables of codes may be linked to other tables using a drop-down list .
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
62
In an ecommerce system, data is generally entered into the system by the programmer.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
63
What is the purpose of using a mnemonic code for data?
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
64
Use the stored data system to prevent the mistake that the intended number 53411 is typed in as number 54311 instead.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
65
Ensuring the quality of the data input to the information system is critical to ensuring quality output.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
66
There are three main problems that can occur with input transactions: submitting the wrong data to the system, submission of data by an unauthorized person, or asking the system to perform an unacceptable function.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
67
Radio frequency identification allows the automatic collection of data using tags or transponders that contain a chip and an antenna.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
68
An XML DTD is much more powerful than a schema.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
69
What is a simple sequence code? Give an example of how this code could be used.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
70
Value checks are usually performed for any data.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
71
Bar codes appear on any person or object that needs to be checked into and out of any kind of inventory system.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
72
Accuracy is improved by better feedback.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
73
XML documents may be validated by comparing them to a DTD or a schema.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
74
List the four objectives that a systems analyst can use to support accurate data entry.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
75
A pattern that contains symbols that represent the type of data that must be present in a field is called a regular expression .
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
76
A method for validating credit cards uses a check digit formula called the Kendall formula.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
77
A mathematical process of assuring data accuracy involves multiplying each of the digits in the original code by some predetermined weights, summing these results, and then dividing this sum by a modulus number.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
78
Data entered at the point of sale are reused throughout the entire order fulfillment process in a(n)ecommerce system.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
79
A value check is used when one element has a relationship with another one.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck
80
A pattern that contains symbols representing the type of data that must be present in a field is called a character map.
Unlock Deck
Unlock for access to all 82 flashcards in this deck.
Unlock Deck
k this deck