B4-Systems Design and Other Elements Flashcards

1
Q

Categories of Business Information Systems

A
  1. Transaction Processing Systems (TPS)-Process and record daily transactions necessary to conduct business ie-sales order entry, hotel reservation systems, payroll and hr systems,
  2. Management Information Systems (MIS)-Provides users predefined reports that support effective business decisions
  3. Decision Support Systems(DSS)-an extension of an MIS that provides interactive tools to support decision making.

ie-production planning, inventory control, traffic planning

  1. Executive Information System (EIS)-provide senior executives with immediate and easy access to internal and external information to assist in strategic decision making.

ie-sales forecasting, profit planning, key performance indicators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Systems Development Life Cycle

A

framework for planning and controlling the detailed activities associated with systems development.

two approaches

Waterfall approach-no overlapping

Prototyping model-approximation of a final system is built and complete system developed from prototype. Waterfall more popular

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Steps in systems development (A DITTO)

A
  1. Systems Analysis-nature and scope of project and identify strengths and weaknesses; identify needs of users, and write it down
  2. Conceptual Design-how we are going to meet these needs. look at alternatives-buying software, developing software in house, or outsourcings systems development
  3. Physical Design-begin by identifying end outputs
  4. Implementation and Converion
  5. Training
  6. Testing
  7. Operations and Maintenance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Information Technology Control Objectives (COBIT)

A

provides managers, auditors, and IT users with a set of measures, indicators, processes and best prractices to maximize the benefit of information technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Information Technology Control Objectives

A
  1. Business Objectives-effective decsion support, efficient transaction processing and compliance
  2. Governance Objectives-Stragteic Allignment, value delivery of IT to org, resrouce management-optimization of knowlegde and infrastructure, risk management-understanding risks, communicating risks to management and how much risk they are willing to take.
  3. Information Critiera-(ICE RACE)

Integrity-acuracy, completeness, and validity

Confidentiality-proteciton of senstive info

Efficiency-delivery of information through optimal use of resources

Reliability-info represents what its purports to represent

Availability-providing current andf future info as required

Compliance-comly with policies, laws, and regulations

Effectiveness-info is relevant or pertinent to a business process, and delivered in a timely, correct, consistent,a nd useful manner.

  1. IT Resources-1. applications, information, infrastucture, and people
  2. Domains and Processes of COBIT

A. Plan and Organize-provide direction to solution and service delivery

B. Acquire and Implement-provides solutions for IT needs

C. Deliver and Support-provides IT services to Users

D. Monitor and Evaluate-ensure that the direction provided in the planning and organizing steps are followed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Role of Technology Systems in Control Monitoring

A
  1. General Controls-ensure that org’s control environment is stable and well managed
  2. Application Controls-prevent, detect and correct transaction error and fraud and are applications specific, providing reasonable assurace as to system : accuracy, completeness, validity, and authorization.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Input Controls

A
  1. Data validation at field level ie proper year
  2. Prenumbering forms
  3. Well-defined source data prep procedures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Processing Controls

A
  1. Data Matching-matching two or more items of data prior to taking action-ie matching vendor invoice to both the PO and the receiving report before paying vendor
  2. File labels-ensure that correct and most current files are updated. External are readable by humans and internal are in machine readable form. two types of internal labels: header and trailer records.
  3. Recalculation of Batch Totals/hash totals
  4. Cross Footing and Zero-Balance Tests
  5. Write-Protection Mechanisms-make sure there is no accidental writing over
  6. Database Processing Integrity Procedures.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Operation Effectivness

A

evaluating ongoing effectiveness of control policies and procedures provides added assurance that controls are operating as prescribed and acheiving their intended purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Components of Operational Effectiveness

A
  1. Diagnostic Controls-designed to achieve efficiency in operations of the firm to get the most from resources used
  2. Control Effectiveness- following should be applied to systems development

A. Strategic Master Plan-should be developed and updated annually. It should show projects that must be completed to acheive long range cmpany goals and address the company’s hardware, software, personnel, and infrastructure requirements

B. Data Processing Schedule

C. Steering Committee-guide and oversee systems development and acquisition

D. System Performance Measurements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IT Responsibilities and Segregation of Duties

A

Roles and Respons of IT Professionals

  1. System Analyst

A. Internall Developed System- works with end users to determine sys requirements, designs over all application system, determines type of network

B. Purchased system-integrates the application with existing internal and purchased applications; provides training to users

  1. Computer Programmer

A. Application Programmer/Software Developer (software engineers)-writing and/or maintaining application programs

B. System Programmer-to install, support, and monitor and maintain operating system, including capacity planning.

  1. Computer Operator-schedule and run processing jobs. Can be automated and in large computing environments, must be automated. This position is somewhat archaic.
  2. IT Supervisor-manage IT department
  3. File Librarian-store and protect programs and tapes from damage and unauthorized used. In large computing environments, much of this is automated.
  4. Data Librarian-custody of and maintains the entity’s data and ensures that productiondata is released only to authorized individuals when needed.
  5. Security Administrator-responsible for the assignment of initial passwords and often the maintenance of those passwords.
  6. System Administrator-

A. Database Admin-responsible for maintaining and supporting the database software and performing certain security functions. *Database admins differ from data admins; a database administrator responsbiel for actual database software and data admin is resonsible for definition, planning, and control of the data within a database.

B. Network Admin-support computer networks through performance monitoring and troubleshooting

C. Web Admin-responsbiel for information on a website

  1. Data Input Clerk-perpare, verify, and input data to be processed
  2. Hardware Technician-sets up and configures hardware and troubleshoots hardware
  3. End user-workers in an org who enter data into system or who use the information processed by system.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Segregation of Duties within Information Technology

System Analysts vs Computer Programmers

A

System Analysts-system and hardware designer

Computer Programmers-software designer

Theoretically, if the same person is in charge of hardware and software, that person could easily bypass security systems without anyone knowing and steal organizational information and assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Segregation of Duties within Information Technology

Computer Operators vs Computer Programmers

A

threat is that the person performing both functions could make unauthorized and undetected program changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Segregation of Duties within Information Technology

Security Administrators vs Computer Operators and Computer Programmers.

A

Threat is that if security admin were also a programmer or an operator for that system, that person could give himself/herself or another person access to areas they shouldn’t have authority to access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly