Chapter 8 Quiz: Designing the Interface

1. Before designing output, ask yourself several questions, which do not include which of the following?

a. Do security or confidentiality issues exist?

b. What specific information will be included?

c. What type of source document will be used?

d. What is the purpose of the output?

2. A(n) ____ describes how users interact with a computer system, and consists of all the hardware, software, screens, menus, functions, output, and features that affect two-way communications between the user and the computer.

a. both information system and user interface

b. neither information system nor user interface

c. information system

d. user interface

3. A ______is a specially formatted digital audio file that can be downloaded by Internet users from a variety of content providers.

a. listencast

b. voicecast

c. songcast

d. podcast

4. ______is often used by large firms to scan and store images of original documents to provide high-quality records management and archiving.

a. COS

b. COM

c. COF

d. COL

5. Database programs such as Microsoft Access include a variety of report design tools, including a ______, which is a menu-driven feature that designers can use to create reports quickly and easily.

a. Report Wizard

b. Report Generator

c. Data Wizard

d. Data Generator

6. A ______report produces one or more lines of output for each record processed.

a. control

b. detail

c. summary

d. highlights

7. A sales manager might want to know total sales for each sales representative, but not want a detail report listing every sale made by them. In that case, a(n) ______report is appropriate.

a. error

b. regression analysis

c. summary

d. highlights

8. The report ______, which appears at the beginning of the report, identifies the report, and contains the report title, date, and other necessary information.

a. control

b. signature

c. footer

d. header

9. Every page should include a page ______, which appears at the top of the page and includes the column headings that identify the data.

a. control

b. signature

c. footer

d. header

10. Companies use various ______methods to maintain output integrity and security.

a. output control

b. output checking

c. output reporting

d. output listing

11. A ____ workstation is a network terminal that supports a full-featured user interface, but limits the printing or copying of data, except to certain network resources that can be monitored and controlled.

a. either disk or diskless

b. neither disk nor diskless

c. disk

d. diskless

12. Industry leader IBM believes that the best interfaces are the ones that ______.

a. are cost-effective

b. recognize voice commands

c. are the most attractive

d. users do not even notice

13. In a user-centered system, the distinction blurs between ______and the interface itself.

a. both input and output

b. neither input nor output

c. input

d. output

14. A ______interface uses icons, graphical objects, and pointing devices.

a. human-computer

b. graphical user

c. green screen

d. Web 1.0

15. A ______rule improves input quality by testing the data and rejecting any entry that fails to meet specified conditions.

a. data validation

b. data quality

c. data resources

d. data dependency

16. Using ______input, data entry usually is performed on a specified time schedule, such as daily, weekly, monthly, or longer.

a. sequence

b. combination

c. batch

d. intermittent

17. Data ______is the process of manually entering data into the information system, usually in the form of keystrokes, mouse clicks, touch screens, or spoken words.

a. layout

b. switching

c. entry

d. checking

18. A ______uses command buttons that enable users to navigate the system and select from groups of related tasks.

a. podcast

b. switchboard

c. storyboard

d. port protector

19. A ______check is used for data items that must have certain values.

a. validity

b. range

c. process-control

d. reasonableness

20. A(n) ______document collects input data, triggers or authorizes an input action, and provides a record of the original transaction.

a. source

b. output

c. report

d. sequence

21. The main part of the form, called the ______zone, usually takes up at least half of the space on the form and contains captions and areas for entering variable data.

a. footer

b. authorization

c. body

d. heading

22. The ______zone contains codes, identification information, numbers, and dates that are used for storing completed forms.

a. body

b. heading

c. footer

d. control

23. Web designers must use ______text to capture and hold a user's attention.

a. large

b. colorful

c. bold

d. scannable

24. ______includes the necessary measures to ensure that input data is correct, complete, and secure.

a. Either output control or input control

b. Neither output control nor input control

c. Output control

d. Input control

25. Once data is entered, the company should store source documents in a safe location for some specified length of time according to their ______policy.

a. records filing

b. records scanning

c. records retention

d. records safety