B4- Information Systems & Communication Flashcards

1
Q

Information Technology (IT)

A

a general term that encompasses many different computer-related components

  • Hardware- physical computer, peripheral device
  • Software- systems & programs, general or specific
  • Network- comm media, allows multiple computers to share data & info in real time
  • People (in IT)- all have standard functions, can have different job titles
  • Data & Information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data

vs.

Information

A

Data = raw facts

Information = organized & processed data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Production Data

vs.

Test Data

A

Production Data- live/real data

Test Data- staging data, fake data for testing purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Roles of Business Information Systems (BIS)

A
  • Process Detailed Data (TPS)
  • Assist in Making Daily Decisions (DSS)
  • Assist in Developing Decision Strategies (EIS)
  • Take Orders from Customers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data Capture

A

First step in processing business transactions

Techniques

  • Manual Entries
  • Source Data Automation (barcode scanners)

Data Accuracy

  • Well Designed Input Screens (fool proof)
  • Prenumbered Forms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data Processing

A

After data is collected, it must be processed

Functions Performed on Data

  • Collect
  • Process
  • Store
  • Transform
  • Distribute
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Normal Series of Events in a BIS

A

1- set up by hardware technician, network admin, and software developers

2- functional system ready for end user to input data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Accounting Information Systems (AIS)

definition

A

an AIS is a type of MIS, and may also be partly a TPS. a well-designed AIS creates an audit trail for accounting transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Objectives of an AIS

A

to record valid transactions at the proper value, in the proper accounting period & properly present in FS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Sequence of Events in AIS

A
  1. Source Document
  2. Filed
  3. Journal
  4. Ledger
  5. Trial Balance
  6. FS Report
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Transaction Cycles of AIS

A

5 Cycles:

  • Revenue
  • Expenditure
  • Production
  • HR/Payroll
  • Financing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data Processing Cycle

A
  1. Input
  2. Storage
  3. Process
  4. Output
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Processing Cycle:

1- Input

A
  • make sure all transactions of interest are accounted for
  • input verification (tracing to source documents/turnaround docs)
  • data input is verified prior to acceptance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Processing Cycle:

2- Storage

Methods

A
  • Journals & Legers
  • Coding (sequence, block & group codes)
  • Chart of Accounts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Sequence Codes

A

use seqential numbers, like checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Block Codes

A

blocks of numbers group into categories

Assets = 1000s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Group Code

A

More specific form of block codes

123456

123= appliance

45= kitchen

6= product

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Data Processing Cycle:

2- Storage

Computer storage terms

A
  1. Entity
  2. Attributes
  3. Field
  4. Record
  5. Data Value
  6. File
  7. Master File
  8. Transaction File
  9. Database
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Entity

A

subject of stored info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Attributes

A

data is related to:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Field

A

Data Value stored in a specific space (cell)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Record

A

Many fields

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Data Value

A

contents of fields

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

File

A

many records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Master file
like a ledger
26
Transaction File
like a journal
27
Database
interrelated files
28
Data Processing Cycle: 3- Process
transactions are processed to keep info current methods: either Batch or OLRT
29
Data Processing Cycle: 4- Output
* Documents- check, PO, receipt * Reports- internal or external * Query- request for specific data
30
Data Processing Methodology Batch Processing
Transactions are collected and groupedby type. These groups (batches) are processed periodically. May use sequential storage or random access storage devices * always a time delay (slower) * Steps: 1) Create a transaction file (batch file), 2) Update the master file * Compare manual and computer-generated batch totals
31
Data Processing Methodology Online Real Time (OLRT) Processing
master files are updated as the transactions are entered. requires random access storage devices only * immediate processing (faster) * OLRT often used in network systems * Point-of-sale systems (POS)- scanners
32
sequential storage
magnetic tape data stored in sequential order, eventually will need to write over earlier data when full
33
Random Access Storage Devices
Hard drive computer immediately updates device and files are stored everywhere
34
Centralized Processing vs. Decentralized Processing
CENTRALIZED- all data @ central location (motherboard) Pros: * enhanced data security * consistent processing Cons: * possible high cost * inc need for processing & data storage @ center * reduction in local accountability * bottlenecks DECENTRALIZED- spread out over many locations via LAN/WAN
35
Reporting Types of Reports
* Periodic Scheduled Reports (monthly F/S) * Exception Reports (credit bal \> credit limit) * Demand Reports/Response Reports/Pull Reports * Ad Hoc Reports (end user creates w/ query) * Push Reports (updates when data changes) * Dashboard Reports (summary info for management)
36
Categories of Business Information Systems (BIS)
* _Transaction Processing Systems (TPS)_- process & record routine daily transactions * _Management Information Systems (MIS)_- reports * _Decision Support Systems (DSS)_- assist managers in making DAILY business decisions/Interactive System * _Executive Information Systems (EIS)_- only used by top managers, immediate & easy assess for strategic decision making
37
Systems Development Life Cycle (SDLC)
Provides a framework for planning & controlling the detailed activities associated with systems development "Big-design-up-front" / waterfall approach A DITTO * A- Systems Analysis & Planning * D- Design (conceptual & Physical) * I- Implementation & Conversion * T- Training * T- Testing * O- Operations & Maintenance
38
Systems Development Life Cycle (SDLC) Systems Analysis & Planning
- Define nature & scope of project, and identify strengths and weaknesses - conduct in-depth study of proposed system & determine feasibility
39
Systems Development Life Cycle (SDLC) Conceptual Design
- Identify & evaluate the appropriate design alternatives to meet user needs. - New systems might involve: buying software, developing software in-house, or outsourcing systems development
40
Systems Development Life Cycle (SDLC) Implementation & Conversion Steps
1. Install new hardware/software 2. Hire/relocate employees to operate the system 3. Test/modify new processing procedures 4. Establish/document standards and controls for the new system 5. Convert to new system & dismantle old 6. Fine-tuning
41
IT Control Objectives
Control Objectives for Information & Related Technology (COBIT) framework provides a set of measures, indicators, processes & best practices to maximize the benefit of IT
42
COBIT Framework Outline
* Business Objectives * Governance Objectives * Information Criteria * IT Resources * Domains & Processes
43
COBIT Framework: Business Objectives
* Effective Decision Support * Efficient Transaction Processing * Reporting Requirements
44
COBIT Framework: Governance Objectives
1. Strategic Alignment- btwn IT & customer satisfaction 2. Value Delivery- IT delivers benefits to adv overall bus strat --\> cust satisfaction 3. Resource Management- applications, info, infrastructure, people 4. Risk Management (B1)- risk awareness by understanding risk appetite & risk man responsibilities 5. Performance Measurement- essential!
45
Role of Technology Systems in Control Monitoring: General Controls vs. Application Controls
General Controls- Control environment is stable & well managed Application Controls- prevent, detect & correct error & fraud
46
General Controls
* Info _Systems_ Management Controls * _Security_ Management Controls * IT _Infrastructure_ Controls * _Software_ acquisition, development & maintenance controls
47
Application Controls
* Accuracy * Completeness * Validity * Authorization
48
Processing Controls
* Data Matching * Recalculation of Batch Totals * Cross-Footing and Zero-Balance Tests
49
Input Controls vs. Output Controls
Input Controls- "garbage in, garbage out" Output Controls- user review of output, reconciliation, & encryption
50
Control Effectiveness
* Strategic Master Plan- planning LT growth * Data Processing Schedule * Steering Committee- guide & oversee systems development & acquisition * System Performance Measurements
51
IT Professionals: System Analysts
* Internally Developed System: deign hardware & decide network * Outside Purchased System: (System Integrators)- integrate new system w/ old
52
IT Professionals: Computer Programmer
* Application Programmer/Software Developer- can be system integrators * System Programmer- install, support, monitor & maintain operating system
53
IT Professionals: Computer Operator
obsolete
54
IT Professionals: IT Supervisor
manages IT department
55
IT Professionals: File Librarian
controls files from damage & unauthorized use
56
IT Professionals: Data Librarian
has custody & maintains entity's data
57
IT Professionals: Security administrator
assigns & maintains passwords
58
IT Professionals: System Adminstrator
* Database Adminstrator (DBA)- maintains & supports database software * Network Adminstrator- supports computer networks * Web Administrator- responsible for info on website
59
IT Professionals: Data Input Clerk
Obsolete
60
IT Professionals: Hardware Technician
sets up & configures hardware & troubleshoots problems
61
IT Professionals: End User
anyone who enters data or uses information
62
IT Professionals: Data Adminstrator (DA)
end user (scientist who knows the data, but DBA designs system)
63
The purpose of IT systems policies is to...
represent management's formal notification to employees regarding the entity's objectives
64
Who safeguards records & files?
file librarian
65
Son-Father-Grandfather Concept
File Backup Son = most recent back up... w/ 2+ previous backups periodic (daily) transaction files are stored separately
66
Backups of systems that can be shut down vs. do not shut down
can be shut down = easy, backup when no one is on system do not shut down = more difficult and technically complex
67
Mirroring
file backup the backup computer is an exact real time duplicate of the actual system. very expensive but efficient
68
Uninterrupted Power Supply (UPS)
used so equipment does not lose power or crash during power outage aka battery backup
69
Program Modification Controls
prevent unauthorized changes & track changes
70
Data Encryption
encryption involves using a digital key to encrypt plaintext into cybertext. The intended recipient uses their digital key to decrypt the cybertext back to plaintext
71
Digital Certificates
electronic doc, created & digitally signed by trusted party
72
Public Key Infrastructure (PKI)
system used to issue & makage keys & digital certificates
73
Managing Passwords
* length \> 7 characters * complexity, contain 3/4 character types * age- NSA: 90 days * reuse- NSA: not last 24
74
User Access
* HR (& IT) provides new employee initial access & authorization for system access * HR & IT must make changes for employee in position
75
IT Security Policies
the most crucial element in a corporate information security infrastructure & must be considered long before security technology is acquired & deployed
76
Security Policy Goal
require people to protect information
77
Electronic Commerce vs. Electronic Business
E-Commerce electronic exchange transactions E-Business any use of IT in business (may or may not involve a transaction
78
Electronic Data Interchange (EDI)
is the computer to computer exchange of business transaction documents that allow direct processing (no human input)
79
Benefits of EDI
* Reduced Handling Costs & Increased Processing Speed * Standard Data Format (XML) * Communications- use VAN
80
Costs of EDI
* Legal Costs (trade contracts) * Hardware Costs * Costs of Translation Software * Costs of Data Transmission (VAN) * Process Reengineering & Employee Training Costs * Security, Monitoring & Control Procedures
81
EDI (VAN) vs. E-Commerce (Internet)
VAN * costs more * more secure * slower (batch) Internet * costs less * less secure * faster (OLRT)
82
Business Process Reengineering (BPR)
= improving systems over time
83
Challenges faced in BPR
* Tradition * Resistance * Time & Cost Requirements * Lack of Management Support * Retraining
84
Importance of B2B
* Speed- faster processing (Internet) * Timing- 24/7 * Personalization- online profile * Security- encryption * Reliability- no opportunity for human error
85
Enterprise Resource Planning Systems (ERP) Functions
* store info in central repository so dat may be intered, accessed, & used by various deprtments * Provide vital cross-functional info quickly to managers for strategic planning (EIS)
86
Supply Chain Managemenr Systems (SCM) Characteristics
* What- goods received should match goods ordered * When- goods should be delivered by data promised * Where- goods should be delivered to location requested * How much- goods should cost as low as possible
87
Supply Chain Management Systems (SCM) Objectives
To Achieve Flexibility & Reposnsiveness Through: * Planing * Sourcing * Making * Delivery
88
Objective of Customer Relationship Management Systems (CRM)
to increase customer satisfaction 80% of sales come from 20% of customers
89
Electronic Funds Transfer (EFT)
* third party vendor * data encryption * reduction in errors
90
Application Service Providers (ASP)
renting systems * Adv- lower cost, greater flexibility * Disadv- possible security & privacy risks, possible poor support by ASP
91
Web 2.0
Colllaborative Websites & Social Networking Dynamic Content
92
Mashups
collages of other webpages & info
93
Stand Alone Web Stores
not integrated with the accounting system ex: shopping cart software
94
Integrated Web Store
Larger companies, integrated into a single software system
95
cloud computing
virtual servers over the Internet (less expensive)
96
HTML
Hypertext Markup Language formatting for webpage
97
HTTP
Hypertext Transfer Protocol transfers pages to web
98
URL
Uniform Resource Locator http://www.Becker.com.us * http:// (transfer protocol) * www (server) * Becker (domain name) * .com (top-level domain) * .us (country)
99
Risk Event Identification: 4 main Risks
* Strategic Risk * Operating Risk * Financial Risk * Informational Risk
100
Strategic Risk
risk of choosing innappropriate technology
101
Operating Risk
Risk of doing the right think the wrong way
102
Financial Risk
Risk of having financial resources lost, wasted or stolen
103
Informational RIsk
Risk of loss of data integrity, incomplete transactions, or hackers
104
3 Specific Risks
* Errors * Intentional Acts * Disasters
105
Threats in a Computerized Environment
* Virus * Worm * Trojan Horse * Denial-of-Service (DOS) Attack * Phishing
106
Virus
program that inserts itself into another program to propogate
107
Worm
virus that runs independently w/o a host program
108
Trojan Horse
Appears to have a useful function but contains hidden security risk
109
Denial-of-Service Attack (DOS)
floods network and intended users are unable to reach the webpage
110
Phishing
sending phony emails to lure people to a fake website for financial information
111
Risk
possibility of harm or loss
112
Threat
hostile intent
113
Vulnerability
characteristic of design, suceptible to threat
114
Safeguard & Controls
spend money on controls to minimize vulnerability
115
Physical Access Controls vs Electronic Access Controls
Physical Access * locks, ID cards Electronic Access * User ID codes w/ regularly changed pws * File Attributes/permissions * Firewalls= gatekeepers
116
Firewalls
Firewalls deter but cannot completely prevent Network Firewalls- Physical Device "box" Application Firewalls- protect specific software
117
Disaster Recovery
plan for continuing operations in the event of the destruction of program & data files and processing capabilities
118
What are the steps in Disaster Recovery
1. Assess the risks 2. Identify mission-critical applications & data 3. Develop a plan 4. Determine the responsibilities for personnel involved 5. Test the plan
119
Types of Disater Recovery
* Use of Disaster Recovery Service (External) * Internal Disaster Recovery (mirroring) * Multiple Data Center Backup
120
Types of Mutiple Data Center Backups
Longest to Shortest * Full Backup= exact copy of entire database * Differential Backup= copy only items changed since last FULL backup * Incremental Backup= copy only items changed since last partial backup
121
Types of Off-Site Locations
* Cold Site (cheapest, 1-3 days)- no actual equipment * Warm Site (compromise, 1/2-1 day)- all hardware needed to create simple data center * Hot Site (most expensive, few hours)- just need to recover backup
122
XBRL
extensible business reporting language = designed to exchange financial info over web
123
What is a computer network that connect computers of all sized, workstations, terminals, and other devices within a limited proximity?
LAN