Input Controls Essay

1034 words - 5 pages

Input Controls
There are a number of ways that a user is allowed to input, change or select data with in a program, five of the more common input controls; text box, drop-down list box, check box, file input box and radio button. The ability to input data into the program is critical, and any data incorrectly entered will result in errors or a failure in the program.
A text box allows the user to enter information about a task or the system will perform. Basically a text box is used to input text in a single or double-line field. This type of input control is useful for entering data like names, addresses, screen names, email addresses.
The drop-down list box is commonly found on ...view middle of the document...

The last type of input control is the file input box, which is predominately used on websites to upload documents.
Data integrity
Data integrity with input controls is achieved both by the nature of the controls themselves and basic script validation techniques. As far as scripting is concerned, each data field can be easily verified upon submit before sending the data to the server. For the types of input controls chosen, selecting incorrect input controls can result in data integrity issues (Glynn, 2012).
A dialog box control is rather straight-forward. It is also the easiest field to realize data issues with. Obviously, you would not want to use a select input control for an individual’s name. However, using this type of control opens databases up to SQL injection attacks, entry of HTML entities, and entry of incorrect or bad data. With SQL injection and HTML entities, it is critical that the data entered is cleaned before being processed by the server. For a field like “First Name”, entry of SQL or HTML should be identified and rejected. In general, you also would not want to use a password field for something like “First Name.” While it is great to be able to mask data, the user should be able to see if they have entered a typo. Asking the user to verify the entry of every single text field would be unreasonable.
The potential for data integrity issues if a select input control is not used when it should be are obvious. If a user is supposed to choose a U.S. state, allowing him to enter text would be disastrous. The user could enter “Somewhere.” They could also enter “I’m not telling.” Restricting entry is important for fields that have limited, predefined options.
Option buttons are in the same category as select input controls when it comes to data integrity. Selecting to use something like text instead of a group of radio buttons would be undesirable. For...

Find Another Essay On Input Controls

Accounting Systems Essay

1975 words - 8 pages authorized persons to authorized persons. - Controls totals on the output should be checked against the control totals of the input to ensure the consistency of data. - All the documents produced should be numbered and accounted for - Highly sensitive materials should not be seen by the general data processing staff but should be outputted to a secure location. - A feedback system


942 words - 4 pages Running head: INTERAL CONTROL AND RISK EVALUATION Internal Control and Risk Evaluation Patricia Coleman ACC/542 April 7, 2014 Maryln Fisher In today's society, internal controls are applied to support an organization's managers to become more successfully to release the responsibilities by applying and understanding internal control concepts. Internal controls are most frequently saw as "a lot of red tapes"; however, internal controls have

Developing Corporate Culture

672 words - 3 pages of strategy making. There is a considerable overlap between the role of manager and entrepreneurs. Finally both entrepreneurs and good managers must display creativity, sometimes of a very high value. Entrepreneurs are sometimes understood rather than plain managers, for not having the time or the leaning to make strategies be clearer. Question 12 What are some examples of behavior controls, output controls, input controls? Behavior

Information System Control

1256 words - 5 pages Information System Control Information system controls are methods and devices that attempt to ensure the accuracy, validity and propriety of information system activities. It is design to monitor and maintain the quality and security of the input, processing, output, and storage activities of any information system. Input control Example include password and other security codes, formatted data entry screen, audible error signals, templates

Effect of CIS processing on the entity's internal control structure

3476 words - 14 pages . Application controls detect errors before, during and after processing.There controls are:1) Input controlsInput controls process the information by computers to make sure they are authorized, accurate and complete. Input controls include controls for rejecting, correcting, and re-submitting data initially incorrect.2) Processing controlsProcessing controls prevent and detect transactions are not lost, added, duplicated or improperly changed, and

Nissan VSS-From-Instrument Cluster Investigation

1743 words - 7 pages ROSTRA PRECISION CONTROLS Nissan VSS-from-instrument cluster investigation Executive Summary: On the Nissan Frontier/Titan applications, VSS is obtainable from a single wire in the instrument cluster and the Controller Area Network (CAN). The instrument cluster VSS wire is not always pre-installed because, in this case, it is not part of a safety critical system; it only used for accessories. Inside the instrument cluster, the

Brain&Nervous System

667 words - 3 pages thalamus, used to integrate sensory input and the hypothalamus, which controls emotions, sleep and other bodily processes. In our forebrain, as well, is the cerebral cortex. Much like a peach and its core, the cerebrum is surrounded by the half-inch thick cortex that controls our conscious thinking processes. The cerebrum inside learns, reads, understands, stores info and basically anything human and some things that animals do as well. As well, there is our motor cortex, which controls movement.

Hardware and Software

530 words - 2 pages (Ambrose, 2005, p. 10). For this reason, assembling the right computer hardware requires an understanding of computer hardware and software interdependent relationship and their functions as listed below. Input Devices and Processing Devices Devices such as key boards and mouse are the input devices. They enable one to put data into the computer. Key board helps enter numeric and alphabetical data while the mouse controls the pointer on the screen

Programable logic controlers

1183 words - 5 pages the side of the 120 VAC power source. By doing this the PLC is able to work with real world devices such as switches and solenoids.The actual logic of the control system is accepted inside the PLC by a computer program. This program controls which output gets used under input settings. Although the program looks like ladder logic diagram, with switch and relay symbols, there are no switch contacts or relay coils working inside the PLC.It’s

Computer Operations Paper

1003 words - 4 pages CPU coordinates the action of the entire system. Programs (software) provide the CPU, a set of instruction to follow and perform a specific task. Between any two components of the computer system, there is a pathway called bus which allow for the data transfer between them.Control unit controls all the hardware operations, i.e., those of input units, output units, memory unit and the processor. The arithmetic and logic units in computers are

Auditing Attestation - Notes

3824 words - 16 pages action. Monitoring activities ? insures system of IC is evaluated continuosly ensuring it is operating as designed and is effective ? falls to internal auditing department (independent of management and reports to auditing committee). 2. To have effective controls at transaction level, need effective controls at the internal level. Before relying on application controls (input, processing, and output), need to evaluate effectiveness of

Similar Essays

Input Controls Essay

1688 words - 7 pages Input controls are used to ensure that the data entered into a system is correctly, completely, and is secure. The input controls can help the flow of data in a database to be the same format and easy to understand. There are many times of input controls, however the paper goes into detail about four types of input control which are: input mask, validation rules, source documents, and batch input. Without input controls there can be data

Hardware And Software Essay

1180 words - 5 pages from changing anything in the program.The second area of internal controls or application controls deals with transactions. Application controls can be divided in three parts: input control, processing controls, and output controls (Bagranoff 2008). These three areas of control deal with data input, processing data and the reporting of processed data. Application controls are vital to ensuring accuracy and legitimacy of the data.Two common input

Katie Dziengel Essay

1202 words - 5 pages numeric keypad on the right side of the keyboard. Most of today’s desktop keyboards are enhanced. Enhanced meaning having 12 or more funtions along the top and a set of arrow and additional keys between the typing area and numeric keypad. Function keys are special keys programmed to issue instructions to a computer such as media controls internet controls (Shelly and Vermaat). Smart phone input devices can vary from key-based, finger-based

Discussion Of Internal Controls That Are Placed In An Accounting Information Systems

2160 words - 9 pages the most important set of controls as they are the ones that are placed on the day to day running of the system. Procedural controls are particularly effective in detecting whether a system has been tampered with and so are effective in detecting fraud. Procedural controls are divided into those controls placed on input, output, processing and storage.Input ControlsThese are procedural controls that are placed on the input of data into the system