This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
• Five categories of integrity controls are designed to meet the preceding objectives:– Source data controls– Data entry controls– Processing controls– Data transmission controls– Output controls
• Five categories of integrity controls are designed to meet the preceding objectives:– Source data controls– Data entry controls– Processing controls– Data transmission controls– Output controls
• The following source data controls regulate integrity of input:– Forms design– Pre-numbered forms sequence test– Turnaround documents– Cancellation and storage of documents– Authorization and segregation of duties– Visual scanning– Check digit verification– RFID security
• Five categories of integrity controls are designed to meet the preceding objectives:– Source data controls– Data entry controls– Processing controls– Data transmission controls– Output controls
• Once data is collected, data entry control procedures are needed to ensure that it’s entered correctly. Common tests to validate input include:– Field check– Sign check– Limit check– Range check– Size (or capacity) check– Completeness check– Validity check– Reasonableness check
• Five categories of integrity controls are designed to meet the preceding objectives:– Source data controls– Data entry controls– Processing controls– Data transmission controls– Output controls
• Five categories of integrity controls are designed to meet the preceding objectives:– Source data controls– Data entry controls– Processing controls– Data transmission controls– Output controls
• Five categories of integrity controls are designed to meet the preceding objectives:– Source data controls– Data entry controls– Processing controls– Data transmission controls– Output controls
• In Access Assignment 1, we specified that the data field “RRNumber” in the Receiving Report table should be strictly autonumber. This is an example of:
• The data entry control “validity check” would detect discrepancies between the primary key fields and prevent the enforcement of referential integrity. Which of the following is a best example:
a) A zip code of BY23A
b) A product ID such as “BOX 16”
c) A vendor ID, such as “LASRON” that is not listed in the Vendor table