BEC 4 Flashcards

1
Q

What is IT?

A
Hardware
Software
Data
Network
People
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Business Information System?

A

Transaction processing systems
Enterprise resource planning systems
Decision support systems
Executive information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are functions performed on data?

A
Collect
Process
Store
Transform
Distribute
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is accounting information system?

A

It is type of management information system, it maybe partly transaction processing system and a knowledge system. A well designed AIS leaves an audit trail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is objective of AIS?

A

Validate, classify, value, cutoff and present.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is logical hierarchy of data storage?

A

Entity, Attributes, Field, Record, Data Value, File, Database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is batch processing?

A

Collected and grouped by type of transaction and are processed periodically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are disadvantages of batch processing?

A
Possible High costs
Need for processing power and data storage
Reduction in Local accountability
Bottlenecks
Delay in response time
Increased vulnerability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is adhoc report?

A

A report that does not exist but can be created on demand without having to get a software developer involved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is XBRL?

A

XBRL tags and define the data. It is pre-programmed and used for business reporting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Systems Development Life Cycle?

A

Framework for planning and controlling systems development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the steps in SDLC?

A
Analysis
Design
Implementation 
Training Testing 
Operations 

ADITTO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is COBIT (Control Objectives for Information and Related Technology)?

A

Provides a set of measures, indicators, processes and best practices to maximize benefit of IT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is business objectives of COBIT?

A

Effective decision support
Efficient transaction processing
Compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are governance objects of COBIT?

A

Strategic alignment, Value delivery, Resource measurement, risk management, Performance measurement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is information criteria for COBIT?

A

Integrity, confidentiality, Efficiency, reliability, Availability, compliance and effectiveness.

17
Q

What are the domains of COBIT?

A

Plan and organize
Acquire and implement
Deliver and support
Monitor and evaluate

18
Q

What does programmers should not have?

A

They should not have access to source and production data.

19
Q

What does data librarian do?

A

Custody and maintenance of entity’s data.

20
Q

What is a data administrator?

A

Responsible for the definition, planning and control of data within a database.

21
Q

What are types of backup?

A

Son-Father-Grandfather

Mirroring

22
Q

What is Public Key infrastructure?

A

Electronic documents created and digitally signed by trusted party.

23
Q

What is XML?

A

Transmits data in flexible formats.

24
Q

What are costs of EDI?

A

Legal costs
Hardware costs
Costs of translation
Costs of data transmission

25
Q

What are EDI controls?

A

Activity log

Acknowledgements from sender or receiver

26
Q

What is business process re-engineering?

A

Analysis and re-design of business processes to achieve significant performance improvements.

27
Q

What are the risks to systems?

A

Strategic risk
Operating risk
Financial risk
Information risk

28
Q

What is phishing?

A

Sending phony emails to ask for user sensitive information.

29
Q

What are steps in disaster recovery

A
Assess the risks
Identify mission critical applications
develop the plan 
determine the personnel involved
test the disaster recovery plan
30
Q

What is cold site?

A

Offsite location with electrical connections and other physical requirements for data processing but not the actual equipment.