ch15 - ch15 True/False Indicate whether the statement is...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
True/False Indicate whether the statement is true or false. ____ 1. Most organizations today have gateways between their internal systems and the Internet. ____ 2. The primary purpose of integrity controls is to track external activity. ____ 3. System programmers do not usually have full access to all components of the systems and data. ____ 4. Transaction logging keeps track of such things as user ID, date, time, data, and type of update. ____ 5. The “keypunch and verify” technique for input validation is the most widely used control technique today. ____ 6. One way to increase system integrity is to avoid human involvement as much as possible. ____ 7. EDI stands for electronic database integration. ____ 8. XML is a technique used to identify possible security breaches in the system. ____ 9. A report that is used to highlight nonstandard or out-of-range conditions is called an executive report. ____ 10. Reports that are not predefined by a programmer, but are designed as needed, are called "user defined" re- ports. ____ 11. All modern Web browsers and servers support HTTPS. ____ 12. Highly automated input devices such as scanners can capture many system inputs. ____ 13. The master control list of a preliminary data flow diagram (DFD) contains detailed information, including data fields, about the inputs. ____ 14. The UNIX operating system has built-in security for each file in the system ____ 15. In a table of data flow diagram (DFD) outputs, the single/multiple record column generally indicates whether the report is printed immediately after each process or in batch at some other time. ____ 16. To verify that the structure chart modules are consistent with the structure of the output report, analysts look at the data couples and the report data requirements. ____ 17. In the object-oriented approach, outputs are indicated by messages in sequence diagrams that originate from an internal system object and are sent to an external actor. ____ 18. Linking refers to the action of linking a summary field to its supporting detail and enabling users to view the detail dynamically. ____ 19. Completeness control is an integrity control that identifies when a value in a field is too large or too small. ____ 20. Inputs can arrive directly from other information systems through direct messaging. ____ 21. A real-time connection is both a system input and a system output. ____ 22. HTML is extremely efficient from a computational point of view. ____ 23. Many systems enable data to be captured electronically at the point that they are generated. ____ 24. Each input data couple in a data flow diagram (DFD) becomes part of an electronic input data form or an in- put/output form. ____ 25.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 12/29/2010 for the course FCIT 200 taught by Professor Dr.adam during the Spring '10 term at Katholieke Universiteit Leuven.

Page1 / 12

ch15 - ch15 True/False Indicate whether the statement is...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online