Topic > Input Controls - 789

Input Controls There are several ways in which a user can enter, modify, or select data in a program, five of the most common input controls; text box, drop-down list box, check box, file input box and radio button. The ability to enter data into the program is critical, and any data entered incorrectly will result in errors or failures in the program. A text box allows the user to enter information about a task that the system will perform. Basically a text box is used to enter text into a single or double line field. This type of input control is useful for entering data such as names, addresses, screen names, email addresses. The drop-down list box is commonly found on websites. This type of input provides a list of choices from which a user can select. One consideration to consider is the number of options that may be available in the drop-down list. A drop-down list of countries or states is often used, whereas a list of hundreds or thousands of options would force the end user to scroll through data when searching for their item. Since there is a predetermined entity list, this has tight control over what can be entered into the form. Typically, list box options are limited. The checkbox or radio button input control is typically used within a group. It is used when there are few predefined options. Default option sets of two are typically not placed inside a selection input control. For example, the options for a question might be "Yes" or "No" and "True" or "False." This allows users to enter data with just one click instead of two. It is up to the designer to decide whether an input selection control or a group of radio buttons is more appropriate. In general, if the user can easily see...half of the sheet of paper...their passwords. Without good forgotten password procedures, employees can be left out of work for a significant period of time, costing the organization financially. There is also additional overhead when you need to grant access to an employee or remove them from access. Finally, an organization may decide to change the entry requirements for an entire section. This makes it necessary that system access restrictions can be easily updated. All of this adds a large amount of overhead and requires one or more individuals to take responsibility for supporting the system. Works CitedGlynn, F. (2012, May 14). Everything related to safety. Retrieved August 2012 from www.veacode.com: http://www.veracode.com/blog/2012/05/what-is-data-integrity/Shelly, G. B., & Rosenblatt, H. J. (2012). Systems analysis and design (9th ed.). (S. Maureen and M. Stranz, eds.) Mason, Ohio, USA: Cengage Learning.