B6 (Area IV) Flashcards
Information technology (IT) corporate governance goal is to
align with organizational objectives
Six Sigma steps are
problem, analyze data, and control
IT governance concept of
timeliness of data availability, depict the way an organization achieves its mission critical goals using IT strategies
Supporting documentation for an organizations IT security policy is
industry regulations, performance standards for IT assets, protocols for IT processes
Vision Statement security outlines how
an organization will protect tangible and intangible assets.
Factors that those in charge of IT governance use to create organizations IT strategy are
vision statement, corporate strategy, regulations
Virtual networks uses
outsourced computer power
Internet provider vision to provide reliable and consistent network connectivity for all customer is reliant on
All IT personnel on company payroll, physical network, quick disaster recovery speeds
Strong IT governance models have
both people and policies in place that help organizations reach objectives
Responsibility of an information technology steering committee should be
formed to guide and oversee systems development and acquisition
Function of information systems steering committee is
ensuring top management participation, guidance and control, coordination of integrating information systems, setting governing policies for various information systems
Information resource are categorized as
medium impact when work around for its loss on short term but recovery is necessary for long term. High impact is organization cannot operate without information resource over short period of time. Low impact the organization could operate without information resource. No impact is not a category.
Routers are
network devices that assign IP addresses and manage network traffic by source and destination fields
1) Routers assign:
2) Switches:
3) Gateways:
4) Servers:
1) IP addresses
2) switches can divide one connection into multiple connections
3) gateways convert protocols to communicate with other network devices
4) servers coordinate programs data and other computers so that the network can operate but do not act and an intermediary.
Virtual private networks creates an
encrypted communication tunnel across the internet for the purpose of allowing a remote user secure access into the network
Error most likely detected by analyzing financial totals is
transportation error on one employees paycheck on weekly payroll (manual total will be calculated for each transaction then compared to computer generated batch control total)
An accounting information system (AIS)
is a subsystem within management information system
Accounting information system (AIS) is found in a
well design system of audit trail that allows a user to trace a transaction from source documents to financial reports
Example of audit trail is authorized individual to select
inventory can be traced back by a copy of purchase order to see when item was ordered and who authorized it
Management information systems
perform report data for strategic planning
An example of decision support system (DDS) is
transaction processing system because (DSS) forecasts scenarios
Enterprise resource planniny system is
integrate and secure data from all aspects of an organizations activities
Supply chain management system concerned with
what goods were ordered, when goods were delivered and the amount paid
B= Business, C= Consumer
Local food writer is asked by business to write a review about food this is an example of _________
Accountants referring to the AICPA website is__________
1) of C2B
2) is B2C
Benefit of using electronic funds transfer for international cash transactions is
reducing frequency of entry errors
Cloud computing can best be defined as
organizations that use internet access and applications that run on remote third party technology infrastructure
The best reason for the company to switch to cloud computing is
usually has lower upfront costs of equipment and maintenance
Disadvantage of IT outsourcing is
quality control because they are a third party with their own standards
Veracity is
trustworthiness of your data,
Publication phase of the data cycle
when data is circulated to users for various purposes.