B4- Information Systems and Communications Flashcards

1
Q

Sequence of AIS events

A

1) transaction data from source docs is entered into the AIS by an end user
2) the original paper source docs are filed
3) the transactions are recorded to the appropriate journal
4) transactions are posted to general and sub ledgers
5) trial balances are prepared
6) financial reports are generated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Business Info System (BIS)

A

Hardware, software, network, people, and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

XBRL -

eXtensible Business Reporting Language

A
  • Derived from XML (eXtensible markup language)

- open, royalty-free, internet-based info system for reporting needs of all kinds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Transaction Cycles - def.

A

Transaction cycles generally capture commonly-occuring transactions (EG customer transactions,) and process them repeatedly / in a nearly identical fashion

Also ref. as “Transaction Processing”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Block Code
Sequential Code
Object Code
Group Code

A

Block Code
(EG - cash to 1000’s, liabilities to 2000’s in the GL)

Sequential Code
(Numbers docs, transactions, or other items in order. EG customer orders?)
Object Code
(created by instructor, represents Intermediate instruction that takes program code --> machine language)
Group Code
(Imbeds intelligence into dif. numbers associated with an item; eg coding insurance policies)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hierarchy of Data in a System

A

Character (symbol, e.g. letter or number)
Field (collection of letters/numbers, EG name or Address)
Record (group of fields – EG name and address in the A/R Record)
File (group of records - EG A/R Subledger)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Systems Programmer and Application programmer as same person…

A

NO!

Huge internal control risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Database Admin (DBA) responsibilities:

A
  • design/control firm database; incl. app. independence, back-up, and recovery procedures
  • assignment of user codes and maintenance of other security measures
  • control of all changes in data structure and programs that use the database

Who needs to be UNINVOLVED:
Application programmers!!!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The COBIT (Control Objectives for Information and Related Technology) Framework Includes –

ICE RACE

A

Integrity
Confidentiality
Efficiency

Reliability
Availability
Compliance
Effectiveness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

COBIT -

The 5 areas of IT governance

A
Value Delivery
Strategic Alignment
Resource Management
Risk Management
Performance Management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Enterprise Architecture for IT

A

Combination of IT resources - EG applications, information, infrastructure, and people)

Along with Defined Processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The COBIT 4 Domains (PO AIDS ME)

A

Process & Organize
(direct the IT process)

Acquire and Implement
(Deliver the IT SOLUTION)

Deliver and Support
(Deliver the IT SERVICE)

Monitor and Evaluate
(Ensure directions are followed)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Management Information Systems

A

Provides managerial and other end users with reports

transaction processing systems and biz. info. systems are not types of MIS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Systems Analyst

A

Design an internally developed application system… and possibly also, modify network specifically to this purpose
Prepare Specs for Programmers
INTERMEDIARY Between end-users and programmers

SOMETIMES combined with programmers to create programmers/systems analysts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Decision Support Systems

A

interactive support for managers during decision-making

but NOT for as high-level as executives, that would be the Executive Information System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Network Administrator

A

Network admin. support computer networks. A network admin. sets up and configures a computer network so that multiple computers can share the same data and info.

After a network is established, the work is mostly monitoring and troubleshooting

Sometimes, network admin are called telecom. analysts or network operators. (SEE ALSO: security admin)

17
Q

Program-Level Policy

A

Describes Info. Security of a co., and assigns responsibility for achievement of security objectives to the IT department

18
Q

Program-framework policy

A

Adds details to the IT program by describing the elements and org. of the program, and the dept. that will carry out the security mission.

19
Q

Encryption by hardware > Encryption by software?

A

True

20
Q

Technical Security Controls
Admin. Security Controls
Logical controls

A

Technical Security Controls
(user log-in and logical access controls, as well as antivirus software firewalls)

Admin. Security Controls
(separation of empl. duties, biz continuity planning, and proper hiring practices)

Logical controls
(software safeguards for an entitys computer systems ID and software access)

21
Q

Electronic Data Interchange (EDI)

A

EDI is comp-2-comp exchange of biz transaction documents (EG purchase orders, confirms, invoices)

  • Structured in a format that allows direct processing of this DATA by the receiving system
  • TRANSLATION SOFTWARE required
  • security should come thru a hardware device and not software
  • Often uses VAN (BATCHD) though can use Internet (non-batched)
  • SEE ALSO: Value added network (VAN)
22
Q

Value Added Network (VAN)

A

VANs are PRIVATELY owned and managed communication networks that provide addit’l services beyond the standard data transmission.

VANS often used for EDI.

23
Q

What does EFT Electronic funds transfer do?

A

Reduce data entry errors

24
Q

CRM systems

A

Provide sales force automation and customer service

25
Q

E-cash

A

Paypal

26
Q

Cloud computing

A

Virtual servers that allow users (including Orgs) to have access to applications and services over the Internet on a real-time basis.

These services are offered from data centers all over the world, which is consistent with the term “the cloud”

27
Q

Firewall

A

a system of user identification and authentication that prevents unauth’d users from gaining access to network resources.

Primary purpose is to block unauth. access to the network

28
Q

Can a virus run independently?

A

No

29
Q

Circuit-level gateways

A

Only allow data into a network that results from requests from computers INSIDE the network

30
Q

Packet Filtering

A

Examines packets of data as they pass thru a firewall. Packet filtering is the SIMPLEST type of firewall configuration

31
Q

client/server applications - 3-tiered architecture?

A

Desktop Client
Application
Database

32
Q

Relational Database

A

Data stored in 2D tables that are related to each other by keys