Documente Academic
Documente Profesional
Documente Cultură
INPUT CONTROLS
PROCESSING CONTROLS
OUTPUT CONTROLS
INPUT CONTROLS
Designed to ensure that the transactions that bring
data into the system are valid, accurate, and
complete
Data input procedures can be either:
Source document-triggered (batch)
Direct input (real-time)
2) Record Interrogation
3) File Interrogation
#1-Field Interrogation
Involves programmed procedures that examine
the characteristics of the data in the field.
1. Check Digit
2. Missing Data Check
3. Numeric-Alphabetic Check
4. Limit Check
5. Range Check
6. Validity Check
Check digit
Transcription Errors
Addition errors
ex. 83276 recorded as 832766
Truncation Errors
ex. 83276 recorded as 8327
Substitution Errors
ex. 83276 recorded as 83266
Check digit
Transposition Errors
Single transposition errors
ex. 83276 recorded as 38276
1. Reasonableness Check
2. Sign Check
3. Sequence Check
Reasonableness Check
This control check determines if a value in one field,
which has already passed a limit check and a
range check, is reasonable when considered
along with other data fields in the record.
2. Version Checks
Internal and External Label Check
Verify that the file being processed is
the one the program is actually
calling for.
Figure 7.3
Version Check
Are used to verify that the version of the file being
processed is the correct one. The version check
compares the version number of the file being
processed with the program’s requirements.
Figure 7.4
PROCESSING CONTROLS
After input data have been edited the transactions
enter the processing stage of the application.
Processing controls are programmed procedures
designed to ensure that an application’s logic is
functioning properly.
Classes
1) Run-to-Run Controls
Figure 7.5,
7.6,
COMMON ERROR HANDLING
TECHNIQUES
1. CORRECT IMMEDIATELY
Upon detecting a keystroke error or an illogical
relationship, the system should halt the data
entry procedure until the user corrects the error
2. CREATE AN ERROR FILE
individual errors should be flagged to prevent
them from being processed. At the end of the
validation procedure, the records flagged as
errors are removed from the batch and placed in
a temporary error holding file until the errors can
be investigated. Figure 7.9.
COMMON ERROR HANDLING
TECHNIQUES
3. REJECT THE BATCH
Some forms of errors are associated with the
entire batch and are not clearly attributable to
individual records. The most effective solution
in this case is to cease processing and return
the entire batch to data control to evaluate,
correct, and resubmit.
HASH TOTALS
Refers to a simple control technique that uses
non financial data to keep track of the records
in a batch.
OPERATOR INTERVENTION
When operator manually enters
controls into the system
Report retention:
Statutory requirements (gov’t)
Number of copies in existence
Existence of softcopies (backups)
Destroyed in a manner consistent
with the sensitivity of its contents
OUTPUT CONTROLS
Controlling real-time systems output
Eliminates intermediaries
Threats:
Interception
Disruption
Destruction
Corruption
Exposures:
Equipment failure
Subversive acts
Systems performance controls (Ch. 2)
Chain of custody controls (Ch. 5)
TESTING COMPUTER
APPLICATION CONTROLS
1) Black box (around)
Procedures:
1) Predetermined results and expectations
2) Run test deck
3) Compare
Figure 7.15
BASE CASE SYSTEM
EVALUATION (BCSE)
Variant of Test Data method