B4- Information Systems & Communication Flashcards

1
Q

Information Technology (IT)

A

a general term that encompasses many different computer-related components

  • Hardware- physical computer, peripheral device
  • Software- systems & programs, general or specific
  • Network- comm media, allows multiple computers to share data & info in real time
  • People (in IT)- all have standard functions, can have different job titles
  • Data & Information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data

vs.

Information

A

Data = raw facts

Information = organized & processed data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Production Data

vs.

Test Data

A

Production Data- live/real data

Test Data- staging data, fake data for testing purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Roles of Business Information Systems (BIS)

A
  • Process Detailed Data (TPS)
  • Assist in Making Daily Decisions (DSS)
  • Assist in Developing Decision Strategies (EIS)
  • Take Orders from Customers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data Capture

A

First step in processing business transactions

Techniques

  • Manual Entries
  • Source Data Automation (barcode scanners)

Data Accuracy

  • Well Designed Input Screens (fool proof)
  • Prenumbered Forms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data Processing

A

After data is collected, it must be processed

Functions Performed on Data

  • Collect
  • Process
  • Store
  • Transform
  • Distribute
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Normal Series of Events in a BIS

A

1- set up by hardware technician, network admin, and software developers

2- functional system ready for end user to input data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Accounting Information Systems (AIS)

definition

A

an AIS is a type of MIS, and may also be partly a TPS. a well-designed AIS creates an audit trail for accounting transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Objectives of an AIS

A

to record valid transactions at the proper value, in the proper accounting period & properly present in FS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Sequence of Events in AIS

A
  1. Source Document
  2. Filed
  3. Journal
  4. Ledger
  5. Trial Balance
  6. FS Report
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Transaction Cycles of AIS

A

5 Cycles:

  • Revenue
  • Expenditure
  • Production
  • HR/Payroll
  • Financing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data Processing Cycle

A
  1. Input
  2. Storage
  3. Process
  4. Output
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Processing Cycle:

1- Input

A
  • make sure all transactions of interest are accounted for
  • input verification (tracing to source documents/turnaround docs)
  • data input is verified prior to acceptance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Processing Cycle:

2- Storage

Methods

A
  • Journals & Legers
  • Coding (sequence, block & group codes)
  • Chart of Accounts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Sequence Codes

A

use seqential numbers, like checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Block Codes

A

blocks of numbers group into categories

Assets = 1000s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Group Code

A

More specific form of block codes

123456

123= appliance

45= kitchen

6= product

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Data Processing Cycle:

2- Storage

Computer storage terms

A
  1. Entity
  2. Attributes
  3. Field
  4. Record
  5. Data Value
  6. File
  7. Master File
  8. Transaction File
  9. Database
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Entity

A

subject of stored info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Attributes

A

data is related to:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Field

A

Data Value stored in a specific space (cell)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Record

A

Many fields

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Data Value

A

contents of fields

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

File

A

many records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Master file

A

like a ledger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Transaction File

A

like a journal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Database

A

interrelated files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Data Processing Cycle:

3- Process

A

transactions are processed to keep info current

methods: either Batch or OLRT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Data Processing Cycle:

4- Output

A
  • Documents- check, PO, receipt
  • Reports- internal or external
  • Query- request for specific data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Data Processing Methodology

Batch Processing

A

Transactions are collected and groupedby type. These groups (batches) are processed periodically. May use sequential storage or random access storage devices

  • always a time delay (slower)
  • Steps: 1) Create a transaction file (batch file), 2) Update the master file
  • Compare manual and computer-generated batch totals
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Data Processing Methodology

Online Real Time (OLRT) Processing

A

master files are updated as the transactions are entered. requires random access storage devices only

  • immediate processing (faster)
  • OLRT often used in network systems
  • Point-of-sale systems (POS)- scanners
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

sequential storage

A

magnetic tape

data stored in sequential order, eventually will need to write over earlier data when full

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Random Access Storage Devices

A

Hard drive

computer immediately updates device and files are stored everywhere

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Centralized Processing

vs.

Decentralized Processing

A

CENTRALIZED- all data @ central location (motherboard)

Pros:

  • enhanced data security
  • consistent processing

Cons:

  • possible high cost
  • inc need for processing & data storage @ center
  • reduction in local accountability
  • bottlenecks

DECENTRALIZED- spread out over many locations via LAN/WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Reporting

Types of Reports

A
  • Periodic Scheduled Reports (monthly F/S)
  • Exception Reports (credit bal > credit limit)
  • Demand Reports/Response Reports/Pull Reports
  • Ad Hoc Reports (end user creates w/ query)
  • Push Reports (updates when data changes)
  • Dashboard Reports (summary info for management)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Categories of Business Information Systems (BIS)

A
  • Transaction Processing Systems (TPS)- process & record routine daily transactions
  • Management Information Systems (MIS)- reports
  • Decision Support Systems (DSS)- assist managers in making DAILY business decisions/Interactive System
  • Executive Information Systems (EIS)- only used by top managers, immediate & easy assess for strategic decision making
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Systems Development Life Cycle (SDLC)

A

Provides a framework for planning & controlling the detailed activities associated with systems development

“Big-design-up-front” / waterfall approach

A DITTO

  • A- Systems Analysis & Planning
  • D- Design (conceptual & Physical)
  • I- Implementation & Conversion
  • T- Training
  • T- Testing
  • O- Operations & Maintenance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Systems Development Life Cycle (SDLC)

Systems Analysis & Planning

A
  • Define nature & scope of project, and identify strengths and weaknesses
  • conduct in-depth study of proposed system & determine feasibility
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Systems Development Life Cycle (SDLC)

Conceptual Design

A
  • Identify & evaluate the appropriate design alternatives to meet user needs.
  • New systems might involve: buying software, developing software in-house, or outsourcing systems development
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Systems Development Life Cycle (SDLC)

Implementation & Conversion

Steps

A
  1. Install new hardware/software
  2. Hire/relocate employees to operate the system
  3. Test/modify new processing procedures
  4. Establish/document standards and controls for the new system
  5. Convert to new system & dismantle old
  6. Fine-tuning
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

IT Control Objectives

A

Control Objectives for Information & Related Technology (COBIT) framework provides a set of measures, indicators, processes & best practices to maximize the benefit of IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

COBIT Framework Outline

A
  • Business Objectives
  • Governance Objectives
  • Information Criteria
  • IT Resources
  • Domains & Processes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

COBIT Framework:

Business Objectives

A
  • Effective Decision Support
  • Efficient Transaction Processing
  • Reporting Requirements
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

COBIT Framework:

Governance Objectives

A
  1. Strategic Alignment- btwn IT & customer satisfaction
  2. Value Delivery- IT delivers benefits to adv overall bus strat –> cust satisfaction
  3. Resource Management- applications, info, infrastructure, people
  4. Risk Management (B1)- risk awareness by understanding risk appetite & risk man responsibilities
  5. Performance Measurement- essential!
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Role of Technology Systems in Control Monitoring:

General Controls

vs.

Application Controls

A

General Controls- Control environment is stable & well managed

Application Controls- prevent, detect & correct error & fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

General Controls

A
  • Info Systems Management Controls
  • Security Management Controls
  • IT Infrastructure Controls
  • Software acquisition, development & maintenance controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Application Controls

A
  • Accuracy
  • Completeness
  • Validity
  • Authorization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Processing Controls

A
  • Data Matching
  • Recalculation of Batch Totals
  • Cross-Footing and Zero-Balance Tests
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Input Controls

vs.

Output Controls

A

Input Controls- “garbage in, garbage out”

Output Controls- user review of output, reconciliation, & encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Control Effectiveness

A
  • Strategic Master Plan- planning LT growth
  • Data Processing Schedule
  • Steering Committee- guide & oversee systems development & acquisition
  • System Performance Measurements
51
Q

IT Professionals:

System Analysts

A
  • Internally Developed System: deign hardware & decide network
  • Outside Purchased System: (System Integrators)- integrate new system w/ old
52
Q

IT Professionals:

Computer Programmer

A
  • Application Programmer/Software Developer- can be system integrators
  • System Programmer- install, support, monitor & maintain operating system
53
Q

IT Professionals:

Computer Operator

A

obsolete

54
Q

IT Professionals:

IT Supervisor

A

manages IT department

55
Q

IT Professionals:

File Librarian

A

controls files from damage & unauthorized use

56
Q

IT Professionals:

Data Librarian

A

has custody & maintains entity’s data

57
Q

IT Professionals:

Security administrator

A

assigns & maintains passwords

58
Q

IT Professionals:

System Adminstrator

A
  • Database Adminstrator (DBA)- maintains & supports database software
  • Network Adminstrator- supports computer networks
  • Web Administrator- responsible for info on website
59
Q

IT Professionals:

Data Input Clerk

A

Obsolete

60
Q

IT Professionals:

Hardware Technician

A

sets up & configures hardware & troubleshoots problems

61
Q

IT Professionals:

End User

A

anyone who enters data or uses information

62
Q

IT Professionals:

Data Adminstrator (DA)

A

end user (scientist who knows the data, but DBA designs system)

63
Q

The purpose of IT systems policies is to…

A

represent management’s formal notification to employees regarding the entity’s objectives

64
Q

Who safeguards records & files?

A

file librarian

65
Q

Son-Father-Grandfather Concept

A

File Backup

Son = most recent back up… w/ 2+ previous backups

periodic (daily) transaction files are stored separately

66
Q

Backups of systems that

can be shut down

vs.

do not shut down

A

can be shut down = easy, backup when no one is on system

do not shut down = more difficult and technically complex

67
Q

Mirroring

A

file backup

the backup computer is an exact real time duplicate of the actual system. very expensive but efficient

68
Q

Uninterrupted Power Supply (UPS)

A

used so equipment does not lose power or crash during power outage

aka battery backup

69
Q

Program Modification Controls

A

prevent unauthorized changes & track changes

70
Q

Data Encryption

A

encryption involves using a digital key to encrypt plaintext into cybertext. The intended recipient uses their digital key to decrypt the cybertext back to plaintext

71
Q

Digital Certificates

A

electronic doc, created & digitally signed by trusted party

72
Q

Public Key Infrastructure (PKI)

A

system used to issue & makage keys & digital certificates

73
Q

Managing Passwords

A
  • length > 7 characters
  • complexity, contain 3/4 character types
  • age- NSA: 90 days
  • reuse- NSA: not last 24
74
Q

User Access

A
  • HR (& IT) provides new employee initial access & authorization for system access
  • HR & IT must make changes for employee in position
75
Q

IT Security Policies

A

the most crucial element in a corporate information security infrastructure & must be considered long before security technology is acquired & deployed

76
Q

Security Policy Goal

A

require people to protect information

77
Q

Electronic Commerce

vs.

Electronic Business

A

E-Commerce

electronic exchange transactions

E-Business

any use of IT in business (may or may not involve a transaction

78
Q

Electronic Data Interchange (EDI)

A

is the computer to computer exchange of business transaction documents that allow direct processing (no human input)

79
Q

Benefits of EDI

A
  • Reduced Handling Costs & Increased Processing Speed
  • Standard Data Format (XML)
  • Communications- use VAN
80
Q

Costs of EDI

A
  • Legal Costs (trade contracts)
  • Hardware Costs
  • Costs of Translation Software
  • Costs of Data Transmission (VAN)
  • Process Reengineering & Employee Training Costs
  • Security, Monitoring & Control Procedures
81
Q

EDI (VAN)

vs.

E-Commerce (Internet)

A

VAN

  • costs more
  • more secure
  • slower (batch)

Internet

  • costs less
  • less secure
  • faster (OLRT)
82
Q

Business Process Reengineering (BPR)

A

= improving systems over time

83
Q

Challenges faced in BPR

A
  • Tradition
  • Resistance
  • Time & Cost Requirements
  • Lack of Management Support
  • Retraining
84
Q

Importance of B2B

A
  • Speed- faster processing (Internet)
  • Timing- 24/7
  • Personalization- online profile
  • Security- encryption
  • Reliability- no opportunity for human error
85
Q

Enterprise Resource Planning Systems (ERP)

Functions

A
  • store info in central repository so dat may be intered, accessed, & used by various deprtments
  • Provide vital cross-functional info quickly to managers for strategic planning (EIS)
86
Q

Supply Chain Managemenr Systems (SCM)

Characteristics

A
  • What- goods received should match goods ordered
  • When- goods should be delivered by data promised
  • Where- goods should be delivered to location requested
  • How much- goods should cost as low as possible
87
Q

Supply Chain Management Systems (SCM)

Objectives

A

To Achieve Flexibility & Reposnsiveness Through:

  • Planing
  • Sourcing
  • Making
  • Delivery
88
Q

Objective of

Customer Relationship Management Systems (CRM)

A

to increase customer satisfaction

80% of sales come from 20% of customers

89
Q

Electronic Funds Transfer (EFT)

A
  • third party vendor
  • data encryption
  • reduction in errors
90
Q

Application Service Providers (ASP)

A

renting systems

  • Adv- lower cost, greater flexibility
  • Disadv- possible security & privacy risks, possible poor support by ASP
91
Q

Web 2.0

A

Colllaborative Websites & Social Networking

Dynamic Content

92
Q

Mashups

A

collages of other webpages & info

93
Q

Stand Alone Web Stores

A

not integrated with the accounting system

ex: shopping cart software

94
Q

Integrated Web Store

A

Larger companies, integrated into a single software system

95
Q

cloud computing

A

virtual servers over the Internet (less expensive)

96
Q

HTML

A

Hypertext Markup Language

formatting for webpage

97
Q

HTTP

A

Hypertext Transfer Protocol

transfers pages to web

98
Q

URL

A

Uniform Resource Locator

http://www.Becker.com.us

  • http:// (transfer protocol)
  • www (server)
  • Becker (domain name)
  • .com (top-level domain)
  • .us (country)
99
Q

Risk Event Identification:

4 main Risks

A
  • Strategic Risk
  • Operating Risk
  • Financial Risk
  • Informational Risk
100
Q

Strategic Risk

A

risk of choosing innappropriate technology

101
Q

Operating Risk

A

Risk of doing the right think the wrong way

102
Q

Financial Risk

A

Risk of having financial resources lost, wasted or stolen

103
Q

Informational RIsk

A

Risk of loss of data integrity, incomplete transactions, or hackers

104
Q

3 Specific Risks

A
  • Errors
  • Intentional Acts
  • Disasters
105
Q

Threats in a Computerized Environment

A
  • Virus
  • Worm
  • Trojan Horse
  • Denial-of-Service (DOS) Attack
  • Phishing
106
Q

Virus

A

program that inserts itself into another program to propogate

107
Q

Worm

A

virus that runs independently w/o a host program

108
Q

Trojan Horse

A

Appears to have a useful function but contains hidden security risk

109
Q

Denial-of-Service Attack (DOS)

A

floods network and intended users are unable to reach the webpage

110
Q

Phishing

A

sending phony emails to lure people to a fake website for financial information

111
Q

Risk

A

possibility of harm or loss

112
Q

Threat

A

hostile intent

113
Q

Vulnerability

A

characteristic of design, suceptible to threat

114
Q

Safeguard & Controls

A

spend money on controls to minimize vulnerability

115
Q

Physical Access Controls

vs

Electronic Access Controls

A

Physical Access

  • locks, ID cards

Electronic Access

  • User ID codes w/ regularly changed pws
  • File Attributes/permissions
  • Firewalls= gatekeepers
116
Q

Firewalls

A

Firewalls deter but cannot completely prevent

Network Firewalls- Physical Device “box”

Application Firewalls- protect specific software

117
Q

Disaster Recovery

A

plan for continuing operations in the event of the destruction of program & data files and processing capabilities

118
Q

What are the steps in Disaster Recovery

A
  1. Assess the risks
  2. Identify mission-critical applications & data
  3. Develop a plan
  4. Determine the responsibilities for personnel involved
  5. Test the plan
119
Q

Types of Disater Recovery

A
  • Use of Disaster Recovery Service (External)
  • Internal Disaster Recovery (mirroring)
  • Multiple Data Center Backup
120
Q

Types of Mutiple Data Center Backups

A

Longest to Shortest

  • Full Backup= exact copy of entire database
  • Differential Backup= copy only items changed since last FULL backup
  • Incremental Backup= copy only items changed since last partial backup
121
Q

Types of Off-Site Locations

A
  • Cold Site (cheapest, 1-3 days)- no actual equipment
  • Warm Site (compromise, 1/2-1 day)- all hardware needed to create simple data center
  • Hot Site (most expensive, few hours)- just need to recover backup
122
Q

XBRL

A

extensible business reporting language

= designed to exchange financial info over web

123
Q

What is a computer network that connect computers of all sized, workstations, terminals, and other devices within a limited proximity?

A

LAN