{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

ch15 - ch15 True/False Indicate whether the statement is...

Info icon This preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
ch15 True/False Indicate whether the statement is true or false. ____ 1. Most organizations today have gateways between their internal systems and the Internet. ____ 2. The primary purpose of integrity controls is to track external activity. ____ 3. System programmers do not usually have full access to all components of the systems and data. ____ 4. Transaction logging keeps track of such things as user ID, date, time, data, and type of update. ____ 5. The “keypunch and verify” technique for input validation is the most widely used control technique today. ____ 6. One way to increase system integrity is to avoid human involvement as much as possible. ____ 7. EDI stands for electronic database integration. ____ 8. XML is a technique used to identify possible security breaches in the system. ____ 9. A report that is used to highlight nonstandard or out-of-range conditions is called an executive report. ____ 10. Reports that are not predefined by a programmer, but are designed as needed, are called "user defined" re- ports. ____ 11. All modern Web browsers and servers support HTTPS. ____ 12. Highly automated input devices such as scanners can capture many system inputs. ____ 13. The master control list of a preliminary data flow diagram (DFD) contains detailed information, including data fields, about the inputs. ____ 14. The UNIX operating system has built-in security for each file in the system ____ 15. In a table of data flow diagram (DFD) outputs, the single/multiple record column generally indicates whether the report is printed immediately after each process or in batch at some other time. ____ 16. To verify that the structure chart modules are consistent with the structure of the output report, analysts look at the data couples and the report data requirements. ____ 17. In the object-oriented approach, outputs are indicated by messages in sequence diagrams that originate from an internal system object and are sent to an external actor. ____ 18. Linking refers to the action of linking a summary field to its supporting detail and enabling users to view the detail dynamically. ____ 19. Completeness control is an integrity control that identifies when a value in a field is too large or too small. ____ 20. Inputs can arrive directly from other information systems through direct messaging. ____ 21. A real-time connection is both a system input and a system output. ____ 22. HTML is extremely efficient from a computational point of view. ____ 23. Many systems enable data to be captured electronically at the point that they are generated. ____ 24. Each input data couple in a data flow diagram (DFD) becomes part of an electronic input data form or an in- put/output form. ____ 25. Programmers or system designers are responsible for designing ad hoc reports.
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
____ 26. Many system outputs do not require dynamic human-computer interaction (HCI). ____ 27. The file column of a data flow diagram (DFD) output table lists the names of the required report files. ____ 28. To report on all objects within a class, a class-level method is used for the output message. ____ 29. With the advent of office automation and other business systems, the use of paper products has vastly de- clined. ____ 30. An encryption key is typically a long string of bits. Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 31. The mechanisms and procedures that are built into the system to safeguard it and the data are called ____ con- trols. a. security c. transaction logging b. access d. user security
Image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern