B4: Information Systems Flashcards

1
Q

When is distributed/decentralized processing most appropriate?

A

Large volume of info
Many locations
Fast access required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 5 components of a BIS?

A
Hardware
Software
Data
Network
People
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 5 functions on data in a BIS?

A
collect
process
store
transform
distribute
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a group code?

A

Within account or item number, different groups of numbers have meaning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the major functions in transaction processing?

A

Data input, storage, processing, information output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the main objectives of an AIS?

A
record valid transactions
properly classify transactions
record at proper value
record in proper period (cutoff)
properly present info and transactions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is transaction processing?

A

processing large numbers of commonly occurring events in a predefined, highly structured way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the steps in the SDLC?

A

A DITTO

Systems analysis
Design (conceptual and physical)
Implementation and conversion
Training
Testing
Operations and Maintenance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 7 information criteria under COBIT?

A

ICE RACE

Integrity (accurate, complete, valid)
Confidentiality (protect sensitive info)
Efficiency (low cost without compromising effectiveness)

Reliability (info represents what is purports to represent)
Availability (providing current and future info as required)
Compliance (comply with laws, contracts, regulations)
Effectiveness (relevant to business process and delivered in timely, correct, consistent, and useful manner)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the four domains of the COBIT framework?

A

PO AIDS ME

Plan and organize (direct)

Acquire and implement (solution)
Deliver and support (service)

Monitor and evaluate (ensure direction followed)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does the MIS steering committee do?

A

Plan and oversee development and acquisition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does a DBA do?

A

controls the database

design database, security measures, and controls data structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What should always be included in a systems specification document?

A

data elements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 5 areas of COBIT IT governance?

A
strategic alignment
value delivery
resource mgmt
risk mgmt
performance mgmt
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is COBIT enterprise architecture?

A

combination of IT resources and defined processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In asymmetric encryption, what is used to encrypt and decrypt?

A

public key

private key

17
Q

What is PKI?

A

public key infrastructure

system and processes used to issue and manage asymmetric keys and digital certificates

18
Q

What are the policy support documents?

A

regulations
standards and baselines
guidelines
procedures

19
Q

What are the 5 steps in disaster recovery?

A

assess risks
identify mission-critical applications and data
develop a plan
determine responsibilities of personnel involved
test disaster recovery plan

20
Q

What is the difference between a full, incremental, and differential backup?

A

exact copy of entire database
copying only data that changed since last backup
copies all changes since last FULL backup

21
Q

What are the four general types of reporting risks?

A

Strategic - choosing inappropriate technology
Operating - doing right thing wrong way
Financial - losing, wasting, having financial resources stolen
Information - loss of data integrity, incomplete transactions, hackers

22
Q

What do firewalls do?

A

deter invasion from outsiders

23
Q

What are the layers in a 3-tier architecture?

A

desktop client, application, and database

24
Q

What are the 4 priorities of SCM groups?

A

what
when and where goods delivered
how much the goods cost

25
Q

What is EDI

A

electronic exchange (computer to computer) of business transaction documents in structured formats

26
Q

What are the main differenced between E-commerce and EDI?

A
E-commerce is:
less expensive
less secure
faster (OLRT)
internet (public)
27
Q

What is the primary purpose of ERP?

A

Integrate data from all functional areas of organization’s activity

28
Q

What is TCP/IP?

A

network protocol on which internet is based

Every website has a unique address

29
Q

What do intranets do?

A

private networks with limited if any access for the public

share org info by connecting geographically separate LANs within the org

30
Q

What is the job of a systems analyst?

A

internally developed system:
determine system requirements
design overall application system
determine type of network

Purchased system:
integrates with existing internal and purchased applications
provides training to end users

31
Q

What is the job of an application programmer / software developer?

A

Writing and/or maintaining application programs

should not have access to write/update data in production systems or access application program change mgmt systems

32
Q

What is the job of a system programmer?

A

Installing, supporting, monitoring, and maintaining the operating system
Capacity planning
should not be able to write/update data in production systems or access change mgmt systems

33
Q

What is the job of a computer operator?

A

scheduling and running processing jobs

34
Q

What is program-level policy?

A

mission statement for IT security program

35
Q

What is program-framework policy?

A

IT security strategy

36
Q

What is issue-specific policy?

A

Addresses specific issues of concern

37
Q

What is system-specific policy?

A

Focus on policy issues that exist for a specific system

38
Q

What is the main objective of disaster recovery plans?

A

restoring operating functionality

prevent downtime