Input Controls

789 Words2 Pages

Input Controls There are a number of ways that a user is allowed to input, change or select data with in a program, five of the more common input controls; text box, drop-down list box, check box, file input box and radio button. The ability to input data into the program is critical, and any data incorrectly entered will result in errors or a failure in the program. A text box allows the user to enter information about a task or the system will perform. Basically a text box is used to input text in a single or double-line field. This type of input control is useful for entering data like names, addresses, screen names, email addresses. The drop-down list box is commonly found on websites. This type of input provides a list of choices a user can select from. A consideration that must be considered is the number of options that could be available in the drop-down list. A drop-down list of countries or states are often used, while a list of hundreds or thousands of options would force the end user to scroll though the data while searching for their item. Since there is a list of predetermined entities, this has strict control of what can be entered into the form. Usually, the list box is limited in options. The check box or radio button input control are typically used within a group. This is used when there are few predefined options. Predefined option sets of two are usually not put inside of a selection input control. For example, the options for a question could be “Yes” or “No” and “True” or “False”. This allows users to enter data with only one click as opposed to two. It is up to the designer to decide if a select input control or a group of option buttons is more appropriate. In general, if the user can easily view... ... middle of paper ... ...eir passwords. Without good forgotten password procedures, employees can be at work-stoppage for a significant amount of time, costing the organization money. There is also additional overhead when an employee needs to be granted access or removed from access. Finally, an organization can decide to alter the access requirements for an entire section. This makes it necessary that the system access restrictions can be easily updated. All of this adds a large amount of overhead and requires one or more individuals to take responsibility for system support. Works Cited Glynn, F. (2012, May 14). All Things Security. Retrieved August 2012, from www.veacode.com: http://www.veracode.com/blog/2012/05/what-is-data-integrity/ Shelly, G. B., & Rosenblatt, H. J. (2012). Systems Analysis and Design (9th ed.). (S. Maureen , & M. Stranz, Eds.) Mason, Ohio, USA: Cengage Learning.

Open Document