BEC-4 Flashcards

1
Q

Ad hoc report

A

Report that does not currently exist but that needs to be created on demand without having to get a software developer involved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Demand report

A

Specific report that can be printed or viewed on demand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Exception report

A

A report produced when a specific condition or “exceptions” occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Scheduled reports

A

More traditional reports that display information in a predetermine format and that are made available on a regular basis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Business Information System (BIS)

A

General term for information technology that includes hardware, software, networks, people, and data.

BIS allows a business to perform the following on data: collect, process, store, transform, and distribute.

*report is not a function performed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Group coding

A

Group coding embeds intelligence into the identification numbers associated with a particular item.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Sequential coding

A

Sequential coding purely numbers documents, transactions, and other items in order (sequence)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Block coding

A

Block coding represents assignment of blocks of numbers to broad categories of items. (e.g. assigns GL number 1000’s to assets, 2000’s to liabilities).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

XBRL

A

Extensible business reporting language (XBRL) specifically designed to exchange financial information electronically. It is a markup language that tags the items with metadata (data about the data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

HTML

A

HTML is a markup language that tells a web browser how to display content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

HTTP

A

HTTP is the general communications protocol used to transfer web pages on the World Wide Web.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

TCP/IP

A

TCP/IP is the transmission protocol of the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Systems development life cycle (SDLC)

A DITTO mnemonic

A
A - Systems (A)nalysis
D - Design (Conceptual and Physical)
I- Implementation and conversion
T-Training
T- Testing 
O-Operations and maintenance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Control Objectives for Information and Related Technology (COBIT) framework: Information Criteria

ICE RACE

A

I-Integrity
C-Confidentiality
E-Efficiency

R-Reliability
A-Availability
C-Compliance
E-Effectiveness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

COBIT framework anticipates that IT governance will be framed by the following 5 focus areas:

A

1) Strategic alignment
2) Value delivery
3) Resource Management
4) Risk Management
5) Performance measurement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

COBIT framework defines IT processes within the context of four domains that direct the delivery of solutions and services

PO AIDS ME

A

Domain/ Purpose

PO - Plan and organize/ Direct the IT purposes
AI- Acquire and implement/ Deliver the IT solution
DS- Deliver and Support/ Deliver the IT service
ME- Monitor and Evaluate/ Ensure directions are followed

17
Q

Decrytion or decipherment

A

This is the step where the intended recipient converts the cipher text into plain text

18
Q

Encryption

A

Encryption involves using a password or a digital key to scramble a readable (plain text) message into an unreadable (cipher text) message.

19
Q

Digital certificates

A

Digital certificates are a form of data security. It behaves in the online world the same way driver’s licenses, passports, and other trusted documents behave outside the online world.

20
Q

Public key infrastructure (PKI)

A

PKI refers to the system and processes used to issue and manage asymmetric keys and digital certificates.

21
Q

Security policy supporting documents include:

A

regulations
company or industry adopted standards
company procedures

22
Q

Customer relationship management systems (CRM)

A
  • provide sales force automation and customer services in an attempt to manage customer relationships
  • objective to increase customer satisfaction and increase revenue and profitability
23
Q

Enterprise Resource Planning (ERP)

A

ERP coordinates information to ensure timely and responsive reporting and data administration in support of decisions.

ERP is a cross-functional enterprise system that integrates and automates many business processes that work together in the manufacturing, logistics, distribution, accounting, finance and human resources functions of a business.

24
Q

TCP/IP

A

TCP/IP is the network protocol upon which the internet is based

25
Q

Technology and IT systems risk:

Risk Identification

A

1) Strategic risk: risk of choosing inappropriate technology
2) Operating risk: risk of doing the right things in the wrong way
3) Financial risk: risk of having financial resources lost, wasted, or stolen.
4) Information risk: risk of loss of data integrity, incomplete transactions or hackers.

26
Q

Virus

A

A virus is a piece of computer program that inserts itself into some other program to propagate. A virus cannot run independently.

27
Q

Firewall

A

A firewall is an “electronic device” (a firewall may actually be both hardware and software and not just hardware) that prevents unauthorized users from gaining access to network resources.

A firewall isolates a private network of some type from a public network (or a network segment from the main network). It also maintains a (controlled) connection between those two networks.

28
Q

Virtual memory

A

Is memory where portions of a program that are not being executed are stored, but is not real memory.
It is actually a part of disk storage. Once executed that part of the program is retrieved and stored in real memory.

29
Q

RAID

A

RAID is disk storage where multiple inexpensive disk drives are combined into an array of disk drives to obtain performance, capacity, and reliability that excess that of a single large disk drive.

30
Q

Processors

A
  • In addition to processing power, there are many factors such as the speed of the input and output devices, that determine the overall processing power of a computer system.
  • Processing power is often measured in terms of MIPS, which is millions on instructions per second.
  • Multiprocessing is the coordinated processing of programs by more than one processor
  • When multiple processors or computers process the same program, there is an efficiency loss to provide the control of the overall processing. This factor is called the multiprocessing (MIP) factor.
31
Q

Programmed Edit checks

A

1) reasonableness checks

2) mathematically accuracy

32
Q

Data mining

A

Data mining is the use of analytical techniques to identify trends, patterns, and relationships in data.

33
Q

Data warehouse

A

Data warehouses store data from current and previous years often from both operational and management databases. A major use is in data mining.