BEC 4 Flashcards

1
Q

What is IT?

A
Hardware
Software
Data
Network
People
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Business Information System?

A

Transaction processing systems
Enterprise resource planning systems
Decision support systems
Executive information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are functions performed on data?

A
Collect
Process
Store
Transform
Distribute
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is accounting information system?

A

It is type of management information system, it maybe partly transaction processing system and a knowledge system. A well designed AIS leaves an audit trail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is objective of AIS?

A

Validate, classify, value, cutoff and present.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is logical hierarchy of data storage?

A

Entity, Attributes, Field, Record, Data Value, File, Database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is batch processing?

A

Collected and grouped by type of transaction and are processed periodically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are disadvantages of batch processing?

A
Possible High costs
Need for processing power and data storage
Reduction in Local accountability
Bottlenecks
Delay in response time
Increased vulnerability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is adhoc report?

A

A report that does not exist but can be created on demand without having to get a software developer involved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is XBRL?

A

XBRL tags and define the data. It is pre-programmed and used for business reporting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Systems Development Life Cycle?

A

Framework for planning and controlling systems development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the steps in SDLC?

A
Analysis
Design
Implementation 
Training Testing 
Operations 

ADITTO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is COBIT (Control Objectives for Information and Related Technology)?

A

Provides a set of measures, indicators, processes and best practices to maximize benefit of IT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is business objectives of COBIT?

A

Effective decision support
Efficient transaction processing
Compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are governance objects of COBIT?

A

Strategic alignment, Value delivery, Resource measurement, risk management, Performance measurement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is information criteria for COBIT?

A

Integrity, confidentiality, Efficiency, reliability, Availability, compliance and effectiveness.

17
Q

What are the domains of COBIT?

A

Plan and organize
Acquire and implement
Deliver and support
Monitor and evaluate

18
Q

What does programmers should not have?

A

They should not have access to source and production data.

19
Q

What does data librarian do?

A

Custody and maintenance of entity’s data.

20
Q

What is a data administrator?

A

Responsible for the definition, planning and control of data within a database.

21
Q

What are types of backup?

A

Son-Father-Grandfather

Mirroring

22
Q

What is Public Key infrastructure?

A

Electronic documents created and digitally signed by trusted party.

23
Q

What is XML?

A

Transmits data in flexible formats.

24
Q

What are costs of EDI?

A

Legal costs
Hardware costs
Costs of translation
Costs of data transmission

25
What are EDI controls?
Activity log | Acknowledgements from sender or receiver
26
What is business process re-engineering?
Analysis and re-design of business processes to achieve significant performance improvements.
27
What are the risks to systems?
Strategic risk Operating risk Financial risk Information risk
28
What is phishing?
Sending phony emails to ask for user sensitive information.
29
What are steps in disaster recovery
``` Assess the risks Identify mission critical applications develop the plan determine the personnel involved test the disaster recovery plan ```
30
What is cold site?
Offsite location with electrical connections and other physical requirements for data processing but not the actual equipment.