B4: Information Systems Flashcards
When is distributed/decentralized processing most appropriate?
Large volume of info
Many locations
Fast access required
What are the 5 components of a BIS?
Hardware Software Data Network People
What are the 5 functions on data in a BIS?
collect process store transform distribute
What is a group code?
Within account or item number, different groups of numbers have meaning
What are the major functions in transaction processing?
Data input, storage, processing, information output
What are the main objectives of an AIS?
record valid transactions properly classify transactions record at proper value record in proper period (cutoff) properly present info and transactions
What is transaction processing?
processing large numbers of commonly occurring events in a predefined, highly structured way
What are the steps in the SDLC?
A DITTO
Systems analysis Design (conceptual and physical) Implementation and conversion Training Testing Operations and Maintenance
What are the 7 information criteria under COBIT?
ICE RACE
Integrity (accurate, complete, valid)
Confidentiality (protect sensitive info)
Efficiency (low cost without compromising effectiveness)
Reliability (info represents what is purports to represent)
Availability (providing current and future info as required)
Compliance (comply with laws, contracts, regulations)
Effectiveness (relevant to business process and delivered in timely, correct, consistent, and useful manner)
What are the four domains of the COBIT framework?
PO AIDS ME
Plan and organize (direct)
Acquire and implement (solution)
Deliver and support (service)
Monitor and evaluate (ensure direction followed)
What does the MIS steering committee do?
Plan and oversee development and acquisition
What does a DBA do?
controls the database
design database, security measures, and controls data structure
What should always be included in a systems specification document?
data elements
What are the 5 areas of COBIT IT governance?
strategic alignment value delivery resource mgmt risk mgmt performance mgmt
What is COBIT enterprise architecture?
combination of IT resources and defined processes
In asymmetric encryption, what is used to encrypt and decrypt?
public key
private key
What is PKI?
public key infrastructure
system and processes used to issue and manage asymmetric keys and digital certificates
What are the policy support documents?
regulations
standards and baselines
guidelines
procedures
What are the 5 steps in disaster recovery?
assess risks
identify mission-critical applications and data
develop a plan
determine responsibilities of personnel involved
test disaster recovery plan
What is the difference between a full, incremental, and differential backup?
exact copy of entire database
copying only data that changed since last backup
copies all changes since last FULL backup
What are the four general types of reporting risks?
Strategic - choosing inappropriate technology
Operating - doing right thing wrong way
Financial - losing, wasting, having financial resources stolen
Information - loss of data integrity, incomplete transactions, hackers
What do firewalls do?
deter invasion from outsiders
What are the layers in a 3-tier architecture?
desktop client, application, and database
What are the 4 priorities of SCM groups?
what
when and where goods delivered
how much the goods cost