Input Controls

Only available on StudyMode
  • Topic: Hotel chains, Data validation, Validation rule
  • Pages : 6 (1473 words )
  • Download(s) : 143
  • Published : April 22, 2013
Open Document
Text Preview
Input Controls
When we talk about input controls, what are we really talking about? Input control includes the necessary measures to ensure that data is correct, complete, and secure. A system analyst must focus on input control during every phrase of input design, starting with source documents that promote data accuracy and quality. (Shelly & Rosenblatt, (2012)). Input controls can help the flow of data in a database to be the same format and easy to understand. Without input controls there can be data integrity errors that could occur and cause information to be incorrect in the database. There are advantages and disadvantages to restricting user interfaces to limit a person ability of typing in too much information or maybe not enough information. Although there are many different types of input controls in this paper there will be only four of them that are addressed in this paper; this would include input mask, validation rules, source documents and batch input. First let’s talk about input mask. Input mask is an appearance that helps to characterize what type of contact is allowed in a given field on a template. The main purpose behind the input mask is to keep the data entry process somewhat the same and decrease the chances for incorrect data to be entered into the field. The input field entry can be configured to allow automatic field input as a way of saving time and resources. Input mask is created doing the process of computer programming. The fields on the template are recognized with specific control values. The values make it impossible to enter data that is not compatible with the values. An example of that would be when a field that contains an input mask that only allows letters will automatically reject the input of numbers and another one would be automatically converting the input into an adequate format an example of that would be when the input mask requires that the date field on the template specifies a format that is structured as date/month/year. Even if you enter the date into the field follows a month/date/year format, the input system reads the entered data and automatically converts it into the proper form. Input mask is a type of tool which had been developed for the purpose of telling the person that what sort of things need to be provided as an input so that the desired output can be achieved. The input mask basically acts as developer software. The text box is the tool where the input needs to be entered. The input mask can also act as a template or a simple format and this basically differs from situation to situation. In this transcription errors are the one which needs to be reduced and this is done through the way of data integrity which is one of the most basic features of the input mask. Validation rule is a criterion used in the process of data validation, carried out after the data has been encoded onto an input medium and involves a data vet or validation program. This is distinct from formal verification, where the operation of a program is determined to be that which was intended, and that meets the purpose. This method is to check that data fall the correct parameters defined by the systems analyst. A judgment as to whether data is official which is possible made by the validation program, but it cannot ensure the entire accurateness. This can only be achieved through the use of all the clerical and computer controls built into the system at the design stage. The difference between data authority and correctness can be illustrated with a trivial example. An example of validations rules is when a user cannot misspell a customer name if it is not entered, or is entered automatically based on the user enter the customer ID. (Shelly & Rosenblatt, (2012)). There are at least eight different types of data validation rules; a sequence check, existence check, data type check, range check, reasonableness check, validity check, combination check and batch controls. Source documents...
tracking img