You are on page 1of 1

1. The field calls for an “M” for married or an “S” for single. The entry is a “2.

” What control will


detect this error?
Numeric/alphabetic data checks or validity check
2. The firm allows no more than 10 hours of overtime a week. An employee entered “15” in the
field. Which control will detect this error?
Limit check
3. The password was “CANARY”; the employee entered “CAANARY.” Which control will detect
this error?
Validity check
4. The inventory item number was omitted on the purchase order. Which control will detect this
error?
Missing data check
5. The order entry system will allow a 10 percent variation in list price. For example, an item with
a list price of $1 could be sold for 90 cents or $1.10 without any system interference. The cost of
the item is $3, but the cashier entered $2. Which control would detect this error?
Range check
6. How does privacy relate to output control?
Output control is necessary to prevent the system from generating unauthorized
output. When the privacy of some types of output is violated, like confidential
information about customers or clients, this incident will cause serious problems
to the company.
7. What are some typical problems with passwords?
1. Users failing to remember passwords
2. failure to change
3. passwords frequently
4. displaying passwords where others can see them
5. using simple, easy to guess passwords
8. What are the three categories of processing control?
Run-to-run controls, operator intervention controls, and audit
trail controls
9. Output controls ensure that output is not lost, misdirected, or corrupted and that privacy is not
violated. What are some output exposures, or situations where output is at risk?
output spooling,delayed printing,waste, report distribution
10. Input validation includes field interrogation that examines the data in individual fields. List
four validation tests and indicate what is checked in each.
1. Numeric-alphabetic checks look for the correct content in a field, numbers, or
letters;
2. zero-value checks determine if necessary zeros are present;
3. limit checks verify that values are within preset limits;
4. range checks verify the values fall within an acceptable range.
5. Other acceptable responses include missing data checks that look for blank
spaces, validity checks that compare actual values in a field against known
acceptable values, and check digit controls that identify keystroke errors in key
fields.

You might also like