.

Sunday, February 24, 2019

Input Controls

stimulation Controls When we talk approximately stimulus take c ars, what argon we really talking recreateive? In arrange supremacy includes the demand measures to ensure that info is correct, complete, and secure. A stimulate analyst m anileiness taper on remark control during e genuinely phrase of scuttlebutt design, get-go with in piddleant chronicles that promote engageive in doion accuracy and quality. (Shelly & Rosenblatt, (2012)). Input controls female genital organ service the flow of take onive in stageion in a infobase to be the corresponding coif and easy to understand. Without comment controls thither rear end be needive information integrity demerits that could occur and ca social function information to be incorrect in the informationbase. at that place ar advantages and disadvantages to re fastidio exploitation substance ab exampler interfaces to limit a person energy of typewrite in too much information or peradventure non enough infor mation. Although there be more(prenominal) different images of remark controls in this paper there issuance be exactly foursome of them that are addressed in this paper this would include commentary veil, substantiation rules, outset instaurations and batch excitant. First lets talk about excitant mask. Input mask is an appearance that helps to characterize what type of amour is contained in a given sphere of influence on a scout.The main economic consumption behind the infix mask is to keep the info approach border somewhat the same and decrease the chances for incorrect take onive information to be entered into the empyrean. The stimulation champaign launching slew be configured to allow reflexive scene of action stimulant as a way of salve magazine and re inceptions. Input mask is created doing the process of figurer programming. The palm on the template are recognized with specific control values. The values keep it im practical to enter d ata that is not compatible with the values.An mannikin of that would be when a field that controls an scuttlebutt mask that only allows letters willing mechanically reject the stimulant drug of numbers and another wiz would be automatically converting the infix into an adequate format an example of that would be when the input mask requires that the era field on the template specifies a format that is organize as date/month/year. Even if you enter the date into the field follows a month/date/year format, the input body reads the entered data and automatically converts it into the proper form.Input mask is a type of son of a bitch which had been veritable for the purpose of telling the person that what sort of things need to be reserved as an input so that the desired output female genitalia be achieved. The input mask tole treasureonically acts as developer software. The schoolbook box is the peter where the input involve to be entered. The input mask peck res emblingwise act as a template or a wide format and this basically differs from situation to situation. In this tran dealion errors are the unmatched which needs to be reduced and this is through through the way of data integrity which is one of the most basic features of the input mask.Validation rule is a standard utilise in the process of data proof, carried out aft(prenominal) the data has been encoded onto an input medium and involves a data vet or test copy program. This is distinct from formal verification, where the operation of a program is refractory to be that which was intended, and that meets the purpose. This method is to check that data fall the correct parameters delimit by the systems analyst. A judgment as to whether data is official which is possible do by the validation program, but it cannot ensure the entire accu calculateness.This can only be achieved through the hire of all the clerical and computer controls built into the system at the design stag e. The difference between data pronouncement and correctness can be illust respectd with a trivial example. An example of validations rules is when a user cannot misspell a guest name if it is not entered, or is entered automatically based on the user enter the customer ID. (Shelly & Rosenblatt, (2012)). There are at least eight different types of data validation rules a sequence check, existence check, data type check, be given check, reason commensu castness check, validity check, combination check and batch controls.Source documents is a form utilize to request and collect input data, trigger or return an input action, and provide a record of the original transaction. Source documents loosely are paper based. about examples of come documents would be cash receipt, off check, accounting sent or received, credit memo for a customer riposte and employee duration sheet. At a bare minimum, each source document should include the date, the amount, and a description of the t ransaction. When practical, beyond these minimum requirements source documents should contain the name and address of the other party of the transaction.When a source document does not exist, for example, when a cash receipt is not provided by a vendor or is absent, a document should be generated as concisely as possible after the operation, apply other documents such as bank statements to support the information on the generated source document. in one case a transaction has been journalized, the source document should be filed and made recover satisfactory so that connections can be verified should the need arise at a later date. Batch input is a process when data ingress is performed on a specified time schedule, such as daily, weekly, monthly, or longer.An example of this would be when a payroll section collects time cards at the end of the week and enters the data as a batch. Some advantages of batch input are compendium and entering can be make off-line, entering data can be done by apt personnel, touch on can be done very promptly and can be done during non-peak times. Now for some of the disadvantages are, data collection commonly has to be a centralized activity, data accounting introduction usually needs to be done by specially trained personnel. The processing activity is delayed hence the possibility exists for data to be watched old or untimely when it finally gets processed.Since processing is usually done during off-hours, input errors detected during processing would not get corrected until the succeeding(a) on a regular basis scheduled processing of input data. The off-hours computer operator whitethorn arrive to call the systems analyst or programmer if the program malfunctions. at a lower place you will empathise a design for a web-based input for qualification a hotel reservation which will be using many another(prenominal) of the concepts that are mentioned in the paper when talking about input controls. We will not ion at it in phases. Information gathering Phase 1 re look to and military rankInput rub requirements including location (city) and proposed dates of stay Compare and evaluate results user may experience multiple hotel / mode / rate combinations Decide user ensconces which hotel / room / rate combination meets their requirements Reservation making Phase 2 option tell apart hotel, room and rate the user selects the hotel / room / rate they like to book assign supernumerary retinue and rates the user adds additional rooms if required Phase 3 Checkout Input guest detail such as name, address, email address etc. Input wages expand such as credit card details or other payment method Confirm reservationStandard booking processes interpenetrate 1Screen 2Screen 3 Screen 2 Screen 3 Enter anticipate criteria Dates urban center name SUBMIT vaunting hotels Hotel 1 SELECT Hotel 2 SELECT Hotel 3 SELECT Display and select rates Hotel 1 measure 1 SELECT estimate 2 SELECT Rate 3 realise 1 Three-stage mask flow turn 2 plectrum of hotel Screen 2 example from Opodo. co. uk Figure 3 survival of the fittest of rate Screen 3 example from Trip. com Screen 1Screen 2 Enter search criteria urban center Dates SUBMIT Display hotels Hotel 1 Rate 1 SELECT Rate 2 SELECT Rate 3 SELECT Hotel 2Rate 1 SELECT Rate 2 SELECT Rate 3 SELECT Hotel 3 Rate 1 SELECT Rate 2 SELECT Rate 3 SELECT Figure 4 Two-stage screen flow Figure 5 Selection of rate and hotel Screen 2 example from Expedia. co. uk TABLE 1 anticipate and evaluation expressions Search and evaluation style Travel agency Hotel only Hotel stove total A Select hotel on screen 2 Select rate on screen 3 10 13 6 29 B Select hotel and rate together on one screen 6 17 2 25 Other -132033 mesa 1 demonstrates that for travel agencies and hotel-only websites, there is an even split between using style A and style B.The table also shows that hotel chains mainly use other search and evaluation styles. Ref erences Amas. syr. edu. 8 Dec 2011. screening egotism Evaluation. Retrieved 9 Feb 2012 from http//amas. syr. edu/AMAS/display. cfm? content_ID=%23%28%28%25 %0A Noyes, Brian. 2010 June. Enforcing building complex trading selective information Rules with WPF. Retrieved on 9 Feb 2012 from http//msdn. microsoft. com/en-us/magazine/ff714593. asp viperx Shelly, G. B. , & Rosenblatt, H. J. (2012). System outline and linguistic rule (9th ed. ). Boston Thomson Course Technology.Input ControlsThere are many kinds of input controls. Write a 4-5 page paper in which you develop the function of input controls. Identify four (4) types of input control and ex stark the function of each. Provide an example of a data integrity error that could occur if each of these types of input control were not in place. rationalize the advantages and disadvantages of restricting user interfaces. (User interfaces can oft be restricted, limiting the users ability to navigate to other areas of the system, or out of the system. program and build a graphical representation of a clear-based input for making a hotel reservation, using Visio or PowerPoint or an equivalent. Research and cite at least three (3) reputable academic sources. Darren Blake Week 6 date CIS210 An HTML form is a section of a document containing normal content, markup, and special elements called controls. These controls are commonly referred to as input controls, according to the area Wide Web Consortium. There are many types of input controls that can be used in a web form. They help to provide a framework for the kind of data that will be submitted by users.Selecting the correct input control for a data field is critical. textual matter input, select box, communicate button, and tidings are four examples of input controls. As pointed out by Ponce de Leon, most input controls are opthalmic and active. There is also something called a hidden input control. They can be used to store system critical data, s uch as database discern data, that the user does not need to interact with. Text type input controls are used to input text. They provide a single-line input field in which any text can be entered. The text type input controls are useful for form data such as names, street addresses, and user names.This data is viewable on the screen, so it ought to not be used for give-and-takes. Select box input controls are super common in web forms. There are 2 basic types of select input controls single select and multi-select. This type of input control provides a list of predetermined options that the user can select. They offer strict control of what can be entered into the form. They are used for items that admit throttle and predefined options. Good examples of this would be things like credit card type, country, state, and language. Usually, this type of input is used when the number of pre-defined options more than two.If there are only two options, other types of input controls ma y be more appropriate. If the user is allowed to select multiple options, such as a list of career field interests, a select input control can easily be set up to permit multiple selections. Radio button input controls are always used in spite of appearance a group. This means that there should be more than one radio button that has the same name. When radio buttons have the same name and different values, only one can be selected at a time. They are used when there are few predefined options.Predefined option sets of two are usually not put inside of a selection input control. For instance, the options for gender should usually be male or female. It is more fitting in this case to use two radio buttons. This allows the user to enter their data with one jerk alternatively than the two which would be required with a select go down down input control. It is up to the programmer to decide if a select input control or a group of radio buttons is more suitable. In general, if the us er can easily view all gettable options on a single line of the form, the programmer should seriously consider using radio buttons.Alternatively, if there are enough options that it would span many lines they should be presented inside of a select input control, like selecting a state. battle cry input controls, on the surface, looks exactly like the text input control. They also, form an allowed content perspective, functions in an identical manner. However, password input controls plow the data that is entered into the control. This means that each keystroke within the control will result in a dot or star instead of the certain data. This is done to prevent other individuals, who may be able to knock against the users computer screen, from viewing the password as plain text.In order to insure the correct amount of keystrokes by the user, the star or dot remains on the screen. However, the text is not displayed for the world to see. clandestine input controls are extremely us eful when performing data entry tasks with a database-driven web application. Often, the forms used to edit data are in reference to an entry within the database that has an integer primary key. This key is usually arbitrary integer that increments automatically, provides indexing, and has absolutely no meaning to the user. When the user selects to update the data, it is important that the systems knows what ID is being updated.However, there is no reason to display this ID to the user. In order to submit the ID of the edited database record along with the modified form fields, the ID can be assigned to a hidden input control. Data integrity with input controls is achieved both by the nature of the controls themselves and basic script validation techniques. As far as scripting is concerned, each data field can be easily verified upon submit before send the data to the server. For the types of input controls chosen, selecting inappropriate input controls can result in data integrity issues. A text input control is rather straight-forward.It is also the easiest field to realize data issues with. Obviously, you would not want to use a select input control for an individuals name. However, using this type of control opens databases up to SQL injection attacks, entry of HTML entities, and entry of incorrect or bad data. With SQL injection and HTML entities, it is critical that the data entered is cleaned before being processed by the server. For a field like First Name, entry of SQL or HTML should be place and rejected. In general, you also wouldnt want to use a password field for something like First Name. While it is great to be able to mask data, the user should be able to see if they have entered a typo. Asking the user to verify the entry of every single text field would be unreasonable. The potential for data integrity issues if a select input control is not used when it should be are obvious. If a user is mantic to choose a U. S. state, allowing him to ent er text would be deleterious. The user could enter Whoville. They could also enter None of your business. Restricting entry is important for fields that have limited, predefine options.Radio buttons are in the same kinsperson as select input controls when it beds to data integrity. Selecting to use something like text instead of a group of radio buttons would be inapplicable. For instance, if the user was supposed to select gender, he could type enter eunuch. This would not be accommodative if that data is critical for the sites services or interactions. Password fields come with data integrity issues built in, the data within a password input control are masked. Since the user cannot see the entered data, it is very easy to submit data that contains typos. This is not critical for a log in form.The user would scarce be notified that his log in attempt failed. Conversely, for a registration form, this could result in highly undesirable issues. It is therefore common to place tw o password input controls on a form like this. The second input control is used to validate the entry in the first input control. The user is able to submit the form only when the values in both fields are identical. If a programmer chose to use a normal text field rather than a password field, the integrity of the entire system could be compromised. This has more to do with systems security than data integrity, but is unruffled an important consideration.User interfaces are often restricted by logged in office or type of user. For instances, a member of the human resources department would have advance to employee information that a member of the software development department should not have, and vice versa. Obviously, a user who has yet to log in should not be able to access any sensitive data from any department. These offer definite advantages to any system. However, there are caveats that come with setting up a system like this. The first is simply the design and setup of these restrictions.A small bug in the setup or the code can cause an entire department to lose access that they need to do their jobs. Another issues is password management. Designers need to deal with how often passwords must be changed, how strong the password should be, and users forgetting their passwords. Without good forgotten password procedures, employees can be at work-stoppage for a significant amount of time, be the organization money. There is also additional budget items when an employee needs to be granted access or removed from access. Finally, an organization can decide to alter the access requirements for an entire section.This makes it necessary that the system access restrictions can be easily updated. All of this adds a large amount of overhead and requires one or more individuals to take responsibility for system support. Web Form References Ponce de Leon, D. (n. d). Forms in HTML. Retrieved from http//www. htmlquick. com/tutorials/forms. html W3Schools (n. d. ). HTML forms and input. Retrieved from http//www. w3schools. com/html/html_forms. asp World Wide Web Consortium (n. d. ). , Forms in HTML documents. Retrieved from http//www. w3. org/TR/html401/interact/forms. htmlh-17. 1Input ControlsInput Controls When we talk about input controls, what are we really talking about? Input control includes the necessary measures to ensure that data is correct, complete, and secure. A system analyst must focus on input control during every phrase of input design, starting with source documents that promote data accuracy and quality. (Shelly & Rosenblatt, (2012)). Input controls can help the flow of data in a database to be the same format and easy to understand. Without input controls there can be data integrity errors that could occur and cause information to be incorrect in the database.There are advantages and disadvantages to restricting user interfaces to limit a person ability of typing in too much information or maybe not enough information. Although there are many different types of input controls in this paper there will be only four of them that are addressed in this paper this would include input mask, validation rules, source documents and batch input. First lets talk about input mask. Input mask is an appearance that helps to characterize what type of contact is allowed in a given field on a template.The main purpose behind the input mask is to keep the data entry process somewhat the same and decrease the chances for incorrect data to be entered into the field. The input field entry can be configured to allow automatic field input as a way of saving time and resources. Input mask is created doing the process of computer programming. The fields on the template are recognized with specific control values. The values make it insufferable to enter data that is not compatible with the values.An example of that would be when a field that contains an input mask that only allows letters will automatically reject the in put of numbers and another one would be automatically converting the input into an adequate format an example of that would be when the input mask requires that the date field on the template specifies a format that is structured as date/month/year. Even if you enter the date into the field follows a month/date/year format, the input system reads the entered data and automatically converts it into the proper form.Input mask is a type of tool which had been developed for the purpose of telling the person that what sort of things need to be provided as an input so that the desired output can be achieved. The input mask basically acts as developer software. The text box is the tool where the input needs to be entered. The input mask can also act as a template or a simple format and this basically differs from situation to situation. In this transcription errors are the one which needs to be reduced and this is done through the way of data integrity which is one of the most basic featur es of the input mask.Validation rule is a criterion used in the process of data validation, carried out after the data has been encoded onto an input medium and involves a data vet or validation program. This is distinct from formal verification, where the operation of a program is determined to be that which was intended, and that meets the purpose. This method is to check that data fall the correct parameters defined by the systems analyst. A judgment as to whether data is official which is possible made by the validation program, but it cannot ensure the entire accurateness.This can only be achieved through the use of all the clerical and computer controls built into the system at the design stage. The difference between data authority and correctness can be illustrated with a trivial example. An example of validations rules is when a user cannot misspell a customer name if it is not entered, or is entered automatically based on the user enter the customer ID. (Shelly & Rosenblat t, (2012)). There are at least eight different types of data validation rules a sequence check, existence check, data type check, range check, rationality check, validity check, combination check and batch controls.Source documents is a form used to request and collect input data, trigger or authorize an input action, and provide a record of the original transaction. Source documents generally are paper based. Some examples of source documents would be cash receipt, cancelled check, invoice sent or received, credit memo for a customer refund and employee time sheet. At a bare minimum, each source document should include the date, the amount, and a description of the transaction. When practical, beyond these minimum requirements source documents should contain the name and address of the other party of the transaction.When a source document does not exist, for example, when a cash receipt is not provided by a vendor or is absent, a document should be generated as soon as possible af ter the operation, using other documents such as bank statements to support the information on the generated source document. Once a transaction has been journalized, the source document should be filed and made retrievable so that connections can be verified should the need arise at a later date. Batch input is a process when data entry is performed on a specified time schedule, such as daily, weekly, monthly, or longer.An example of this would be when a payroll department collects time cards at the end of the week and enters the data as a batch. Some advantages of batch input are collection and entering can be done off-line, entering data can be done by trained personnel, processing can be done very quickly and can be done during non-peak times. Now for some of the disadvantages are, data collection usually has to be a centralized activity, data entry usually needs to be done by specially trained personnel. The processing activity is delayed hence the possibility exists for data t o be considered old or untimely when it finally gets processed.Since processing is usually done during off-hours, input errors detected during processing would not get corrected until the next regularly scheduled processing of input data. The off-hours computer operator may have to call the systems analyst or programmer if the program malfunctions. Below you will see a design for a web-based input for making a hotel reservation which will be using many of the concepts that are mentioned in the paper when talking about input controls. We will look at it in phases. Information gathering Phase 1 Search and evaluationInput stay requirements including location (city) and proposed dates of stay Compare and evaluate results user may view multiple hotel / room / rate combinations Decide user decides which hotel / room / rate combination meets their requirements Reservation making Phase 2 Selection Select hotel, room and rate the user selects the hotel / room / rate they wish to book S elect additional rooms and rates the user adds additional rooms if required Phase 3 Checkout Input guest details such as name, address, email address etc. Input payment details such as credit card details or other payment method Confirm reservationStandard booking processes Screen 1Screen 2Screen 3 Screen 2 Screen 3 Enter search criteria Dates City name SUBMIT Display hotels Hotel 1 SELECT Hotel 2 SELECT Hotel 3 SELECT Display and select rates Hotel 1 Rate 1 SELECT Rate 2 SELECT Rate 3 Figure 1 Three-stage screen flow Figure 2 Selection of hotel Screen 2 example from Opodo. co. uk Figure 3 Selection of rate Screen 3 example from Trip. com Screen 1Screen 2 Enter search criteria City Dates SUBMIT Display hotels Hotel 1 Rate 1 SELECT Rate 2 SELECT Rate 3 SELECT Hotel 2Rate 1 SELECT Rate 2 SELECT Rate 3 SELECT Hotel 3 Rate 1 SELECT Rate 2 SELECT Rate 3 SELECT Figure 4 Two-stage screen flow Figure 5 Selection of rate and hotel Screen 2 example from Expedia. co. uk TABLE 1 Sear ch and evaluation styles Search and evaluation style Travel agency Hotel only Hotel chain Total A Select hotel on screen 2 Select rate on screen 3 10 13 6 29 B Select hotel and rate together on one screen 6 17 2 25 Other -132033 Table 1 demonstrates that for travel agencies and hotel-only websites, there is an even split between using style A and style B.The table also shows that hotel chains generally use other search and evaluation styles. References Amas. syr. edu. 8 Dec 2011. Application Self Evaluation. Retrieved 9 Feb 2012 from http//amas. syr. edu/AMAS/display. cfm? content_ID=%23%28%28%25 %0A Noyes, Brian. 2010 June. Enforcing Complex Business Data Rules with WPF. Retrieved on 9 Feb 2012 from http//msdn. microsoft. com/en-us/magazine/ff714593. aspx Shelly, G. B. , & Rosenblatt, H. J. (2012). System Analysis and Design (9th ed. ). Boston Thomson Course Technology.

No comments:

Post a Comment