BEC 4 Flashcards

1
Q

Name and briefly describe the 5 major components that make up the info technology of an organization.

A
  1. Hardware: actual physical computer/computer peripheral device
  2. Software: systems and programs that process data and turn that data into info
  3. Network: made up of the communication media that allows multiple computers to share data and info simultaneously
  4. People: many people have a role in IT, such as hardware technicians, network administrators, software developers, and end users
  5. Data: raw facs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 5 functions performed on data in a business information system?

A
  1. Collect
  2. Process
  3. Store
  4. Transform
  5. Distribute
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe the normal series of events in an accounting information system (AIS).

A
  1. Transaction data from source documents is entered into the AIS by the end user
  2. The original paper source documents are filed
  3. The transactions are recorded in the appropriate journal
  4. The transactions are posted to the general and subsidiary ledgers
  5. Trial balances are prepared
  6. Adjustments, accurals, and corrections are entered
  7. Financial reports are generated
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name and briefly describe six different types of MIS reports

A
  1. Periodic schedules reports: traditional reports that display info in a predefined format and are made available on a regular basis to end users of the system
  2. Exception reports: reports produced when a specific condition or “exception” occurs
  3. Demand reports: specific reports that can be printed on demand
  4. Ad hoc reports: report that does not currently exist but that can be created on demand without having to get a software developer involved
  5. Push reports: report that can actually be “pushed” or sent to a computer screen or computer desktop
  6. Dashboard reports: report used by a company to present summary info necessary for management action
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the primary roles of business information systems?

A
  1. Process detailed data
  2. Assist in making daily decisions
  3. Assist in developing business strategies
  4. Take orders from customers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe the two types of processing used in a computerized environment

A

Batch processing - periodic processing

Online, real-time (OLRT) processing (often referred to as “online processing”) - immediate processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a batch control total and how does it differ from a hash total?

A

Batch control total (or batch total) is a manually calculated total that is compared to a computer-generated total as a means of testing the accuracy and completeness of the input and processing.

Batch totals are used for numbers that are normally added, such as dollar amounts.

Hash totals are used for numbers that are not normally added, such as account numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the distinction between centralized and decentralized (distributed) processing?

A

Centralized processing maintains data and performs data processing at one or more central locations.

Decentralized processing occurs when computer power and processing are spread over many locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the advantages and disadvantages of centralized processing?

A

Advantages:
1. Data is secured better, once received
2. Processing is consistent

Disadvantages:
1. Cost of transmitting large numbers of detailed transactions can be high
2. Increased processing power and data storage needs at the central location
3. Reduction in local accountability
4. Input/output bottlenecks may occur at high traffic times
5. Lack of ability to respond in a timely manner to information requests from remote locations
6. Entire organization may be vulnerable to problems incurred at a single location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List and explain the steps in batch processing

A

Accomplished in 2 steps:
1. Create a transaction file: by manually (usually) keying the data (data entry), editing the data for completeness and accuracy, and making any necessary corrections

  1. Update the master file: by sorting the transaction file into the same order as the master file and then updating the relevant records in the master file from the transaction file
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the major distinction between batch processing and online processing?

A

Transaction in batch processing system are processed in batches and not necessarily at the time those transactions are submitted.

In online processing, transactions are processed as the transactions are entered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the various categories of business information systems?

A
  1. Transaction processing systems
  2. Decision support systems
  3. Management information systems
  4. Executive information systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Identify functions that should be segregated in an IT department

A

Duties of systems analysts, computer programmers, and computer operators should be segregated (although many companies combine systems analysts and computer programmers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are 3 types of programmed controls?

A
  1. Input controls
  2. Processing controls
  3. Output controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 6 steps of the system development life cycle (SDLC)?

A
  1. System analysis
  2. Conceptual and physical design
  3. Implementation and conversion
  4. Training
  5. Testing
  6. Operations and maintenance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the objective of executive information systems (EIS)?

A

Provide senior executives with immediate and easy access to internal and external information to assist executives in monitoring business conditions.

EIS assist in strategic, not daily, decision making

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the decision support system (DSS)?

A

Computer-based information system that provides interactive support for managers during the decision-making process.

DSS is useful for developing information directed toward making particular decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are transaction processing systems?

A

Systems that process and record the routine, daily transactions necessary to conduct business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the objective of management information system (MIS)?

A

Provide managerial and other end users with reports. These predefined management reports provide managers with the information they need to assist them in the business decision-making process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the 5 focus areas of the COBIT framework?

A
  1. Strategic alignment
  2. Value delivery
  3. Resource management
  4. Risk management
  5. Performance measurement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are information criteria described by COBIT?

(Remember the ICE RACE)

A
  • (I)ntegrity
  • (C)onfidentiality
  • (E)fficiency
  • (R)eliability
  • (A)vailability
  • (C)ompliance
  • (E)ffectiveness
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Identify the four domains and related process of the COBIT framework

A
  • Plan and organize (direct)
  • Acquire and implement (solution)
  • Deliver and support (service)
  • Monitor and evaluate (ensure direction followed)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Why is it important to have segregation of duties between computer operators and computer programmers?

A

Because a person performing both functions would have the opportunity to make unauthorized and undetected program changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Why is it important to safeguard files and records?

A

Inadequate protection may result in loss or damage that might drive an organization out of business; hardware can always be replaced, but data often cannot be

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is encryption?

A

Using a password or a digital key to scramble a readable (plaintext) message into an unreadable (ciphertext message). The intended recipient of the message then uses either the same or another digital key (depending on the encyrption method) to conver the ciphertext message back into plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What characteristics should a password management policy address?

A
  1. Password length: longer the better. Should be greater than seven characters. Many organizations standardize on eight characters
  2. Password complexity: features 3 of the following 4 characteristics: uppercase, lowercase, numeric, and ASCII characters (e.g., ! @ # $ % ^ & * or ?)
  3. Password age: National Security Agency (NSA) recommends that passwords be changed every 90 days. Administrative passwords should be changed more frequently
  4. Password reuse: The NSA recommends that password reuse of the previous 24 passwords be restricted. The goal is to prevent users from alternating between their favorite two or three passwords.
27
Q

What are the 4 types of computer securities policies?

A
  1. Program-level policy
  2. Program-framework policy
  3. Issue-specific policy
  4. System-specific policy
28
Q

Distinguish between digital signatures and e-signatures

A

Digital signatures - use asymmetric encryption to create legally binding electronic documents.

Web-based e-signatures are an alternative mechanism for accomplishing same objective.

An e-signature is a cursive-style imprint of a person’s name that is applied to an electronic document and is also considered legally binding.

29
Q

What defines an information security policy?

A

States how an organization plans to protect its tangible and intangible information assets

30
Q

How can the Internet be defined?

A

International network composed of servers around the world that communicate with each other

31
Q

Identify the costs associated with implementing EDI

A
  1. Legal costs
  2. Hardware costs
  3. Costs of translation software
  4. Costs of data transmission
  5. Process reengineering and employee training costs for affected applications
  6. Costs associated with security, monitoring, and control procedures
32
Q

Define B2B transactions and identify the 3 different markets

A

B2B transaction = When a business sells its products/services to other businesses

  1. B2B e-commerce: many businesses buy, sell, or trade their products and services with other businesses.
  2. Electronic market: very common for B2B transactions to occur electronically via the Internet
  3. Direct market: also very common for B2B transactions to occur electronically between businesses when there is a preexisting relationship
33
Q

Identify some advantages of B2B e-commerce

A
  1. Speed
  2. Time
  3. Personalization
  4. Security
  5. Reliability
34
Q

Define electronic funds tranfer (EFT) systems

A

Major form of electronic payment for banking and retailing industries.

Uses a variety of technologies to transact, process, and verify money transfers and credits between banks, businesses, and consumers.

The Federal Reserve wire system is used very frequently in EFT to reduce the time and expense required to process checks and credit transactions

35
Q

Define EDI

A

Computer-to-computer exchange of business transaction documents in structured formats that allows for direct processing of the data by the receiving system

36
Q

How are EDI transactions submitted, and what is mapping?

A

Submitted in a standard data format

Mapping is the process of determining the correspondence between elements in a company’s terminology and elements in standard EDI terminology

37
Q

What are the features of EDI?

A
  1. Allows transmission of elecronic documents between computer systems in different organizations
  2. Reduces handling costs and speeds transaction processing
  3. Requires that all transactions be submitted in a standard data format
  4. Can be implemented using direct links, VANs, or over the Internet
38
Q

What are some controls for an EDI system?

A
  1. Encryption of data
  2. Activity logs of failed transaction
  3. Network and sender/recipient acknowledgments
39
Q

What is e-commerce?

A

Involves electronic consummation of exchange transactions.

Normally implies the use of the Internet but a private network can also be used

40
Q

How does EDI differ from e-commerce on a cost, security, speed, and network basis?

A
  • Cost: EDI is more expensive than e-commerce
  • Security: EDI is more secure than e-commerce
  • Speed: E-commerce is faster than EDI
  • Network: EDI uses VAN (private) and e-commerce uses the Internet (public)
41
Q

Define and describe the purpose of business processing reengineering (BPR).

A

Analysis and design of business processes and information systems to achieve significant performance improvements.

Purpose is to simplify the system, make it more effective, and improve entity’s quality & service

42
Q

Define and describe the purpose of enterprise resource planning (ERP).

A

Cross-functional enterprise system that integrates and automates the many business processes and systems that must work together in various functions (e.g., manufacturing, distribution, human resources) of a business

43
Q

Supply chain management is concerned with what 4 characteristics of every sale?

A
  • Goods received should match goods ordered (What)
  • Goods should be delivered by the date promised (When)
  • Goods should be delivered to the location requested (Where)
  • Goods’ cost should be the lowest price (How much)
44
Q

Compare and contract HTML, HTTP, and URL

A
  • Hypertext markup language (HTML) is a tag-based formatting language used for Web Pages
  • Hypertext transfer protocol (HTTP) is the communications protocol used to transfer Web pages on the World Wide Web
  • Uniform resource locator (URL) is the technical name for a Web address, which direct users to a specific location on the Web
45
Q

What are the risks in a business information system?

A
  1. Strategic risk
  2. Operating risk
  3. Financial risk
  4. Information risk
46
Q

Name the 5 threats in a computerized environment

A
  1. Virus
  2. Worm
  3. Trojan horse
  4. Denial-of-service attack
  5. Phishing
47
Q

What are access controls?

A

Limit access to documentation, data files, programs, and computer hardware to authorized personnel.

Ex: locks, passwords, users identification codes, assignment of security levels, callbacks on dial-up systems, the setting of file attributes, and the use of firewalls

48
Q

What is a firewall?

A

System, often both hardware and software, of user identification and authentification that prevents unauthorized users from gaining access to network resources

49
Q

What is disaster recovery and what is the difference between a hot site and a cold site?

A

Disaster recovery consists of plans for continuing operations in the event of destruction of not only programs and data but also processing capability

A hot site is an off-site location that is equipped to take over a company’s data processing.

A cold site is an off-site location that has all of the electrical connections and other physical requirements for data processing but does not have the actual equipment

50
Q

What are 3 types of backups to perform to recover lost data?

A
  1. Full backup
  2. Incremental backup
  3. Differential backup
51
Q

What are 3 types of disaster recovery?

A
  1. Disaster recovery service
  2. Internal disaster recovery
  3. Multiple data center backups
52
Q

What are the 3 types of off-site location?

A
  1. Cold site
  2. Warm site
  3. Hot site
53
Q

What is the disadvantages of a disaster recovery and business continuity plan?

A

Cost and effort required to implement the plan

54
Q

Identify the 4 main functions of a DBMS

A
  1. Database development
  2. Database query
  3. Database maintenance
  4. Application development
55
Q

Identify 9 components of a LAN

A
  1. Node
  2. Workstation
  3. Server
  4. Network Interface Card (NIC)
  5. Transmission media
  6. Network Operating System (NOS)
  7. Communications Device
  8. Communication/Network Protocols
  9. Gateways and Routers
56
Q

Identify the 2 types of networks that can be used to provide WAN communications services

A

Value added network: Privately owned communication network that provides additional services beyond standard data transmission

Internet-based network: Uses Internet protocols and public communications channels to establish network communications

57
Q

List some of the features of a value added network (VAN)

A
  • Privately owned
  • Provides additional services
  • Provides good security
  • Uses periodic (batch) processing
  • May be expensive
58
Q

List some of the features of an Internet-based network

A
  • Uses public communications channels
  • Transmits transactions immediately
  • Relatively affordable
  • Increases the number of potential trading partners
59
Q

What is the difference between an intranet and an extranet?

A

Intranet - connects geographically separate LANs within a company

Extranet - permits specified external parties to access the company’s network

60
Q

What is the basic difference between a database and a database management system?

A

Database - integrated collection of data records and data files

Database management system (DBMS) - software that allows an organization to create, use, and maintain a database

61
Q

What is a data warehouse and what is data mining?

A

Data warehouse - collection of databases that store both operations and management data

Data mining - processing of data in a data warehouse to attempt to identify trends and patterns of business activity

62
Q

What are some advantages of a DBMS?

A
  1. Data redundancy and inconsistency are reduced
  2. Data sharing exists
  3. Data independence exists
  4. Data standardization exists
  5. Data security is improved
  6. Data fields can be expanded without adverse effects on application programs
  7. Timeliness, effectiveness, and availability of information is enhanced
63
Q

What is the basic difference between WANs and LANs?

A

Distance

LANs normally are within a fairly limited distance, and WANs allow a much longer distance

64
Q

What are some of the similarities and differences between the Internet, intranets, and extranets?

A

All use Internet protocols and public communication networks rather than proprietary protocols and networks so that the same browsers can be used.

Intranets connect LANs within a company.
Extranets allow a company’s customers and suppliers to access the company’s network.