BEC IT Flashcards

1
Q

network

A

two or more computing devices connected by a communication channel to exchange data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are networks used for?

A

file sharing, links to email systems, enabling connections to printers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Node

A

device connected to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

T/F client nodes provide network resources

A

F - server node provides services and resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

T/F end users generally use the server directly

A

F - digitally or virtually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A client server network presides as the _______ of communication and grants _______ to network resources.

Used by the _______ and lacks ______ or ______.

A

mediator, access, internet, video screen or keyboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

peer to peer network (requires/doesn’t required) a central server.

A

require

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

in a client server environment, the “client” is likely to be the

A

workstation of various users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NIC/NAC

A

circuit boards and software that translate between network language and computer language.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

T/F computers contain NIC/NACs already so they can communicate with the network out of the box?

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Transmission media

A

communication link between nodes on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

twisted pair is what kind of transmission media?

A

wired

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

satellite microwave transmission is what kind of transmission media?

A

wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what are the wired transmission media?

A

twisted pair, coaxial cable, fiber optic cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

which is the most reliable, fastest, most expensive, and highest capacity wired cable?

A

fiber optics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

which is the least reliable, slowest, cheapest, and lowest capacity wired cable?

A

twisted pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what are satellite microwave transmissions used for?

A

cell phone and WANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What networks are bluetooth used in?

A

PAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

T/F bluetooth uses the same radio frequency as WIFI but with lower power consumption resulting in weaker connection

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what are the advantages of wireless vs wired?

A

wireless networks are scalable, flexible, often lower cost, mobile

wired communications are reliable, more secure, and faster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what is wifi used for?

A

spectrum radio transmission, home networks, LANS and WANS

less reliable than wired connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what kind of line does LAN use?

A

dedicated line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What do SANs do?

A

connect storage devices to servers and other devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

T/F SANs are local only

A

F - can be on a cloud purchased from a third party vendor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Match the crimes to the definitions:

Email bombing
Denial of Service Attack
logic bomb
Backdoor
Man in the middle

A. Hacker establishes a connection between two devices than then pretends to be each party thereby intercepting and interfering with messages.
B. Attacking a computer by sending thousands of identical emails
C. software allowing unauthorized access to a system by omitting normal logon procedures
D. prevents legitimate user access by taking over zombie computers and flooding the system with incomplete requests to tie up the system
E. Program planted in a system that is dormant until an event or a particular time

A

Man in the middle A, Email bombing B, Backdoor C, DOS D, logic bomb E,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Virus

A

form of malware that replicates itself within a system and may damage data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Worm

A

worm can replicate across many systems via email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

T/F Viruses replicate over one system

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

T/F Viruses come through emails

A

F - worms do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is a method of man in the middle attack?

A

eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

packet sniffer

A

formatted blocks of data carried by computer networks to monitor network packages or troubleshoot problems with network performance, but criminals can determine which packets may contain unsername and passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

T/F accounting systems are always software based

A

F - way of getting raw data into FS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

what does a well designed AIS need?

A

Audit trail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Put the steps of an AIS in order

  1. transactions are posted to general and subsidiary ledger
  2. original paper source documents are filed
    3.transaction data from source documents is entered into the AIS by end user
  3. transactions are recorded in appropriate journal
  4. trial balances are prepared
  5. financial reports are generated
A

3, 2, 1, 4, 5, 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

T/F information produced by AIS is made some levels of management for use in planning and controlling an organization’s activities

A

F - available to all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

T/F AIS is best suited to solve problems where there is ambiguity

A

F - requires certainty and clearly defined reporting processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is the AIS for revenue cycle focused on?

A

transactions associated with sales of goods or services that produce cash or other assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Data addition

A

process of adding new records to a database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Updating

A

Revisions to an already existing file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What are the two ways to update a database?

A

OLRT processing
Batch processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Batch processing

A

Master files are only updated periodically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

T/F batch processing has a timing delay

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

T/F batch processing sort transactions in a different order as the master file since they don’t have to be in sequence

A

F

44
Q

T/F batch processing is good for high volume, periodic transactions

A

F - low volume

45
Q

what is a good type of record to use for batch processing

A

fixed assets

46
Q

what are the steps of batch processing

A
  1. creating transaction files/ data validation
  2. master file is updated usually by sorting transaction files into the same order as the master file
47
Q

how do we ensure what we processed in batch processing is what we intended to process

A

batch totals

48
Q

what are batch totals

A

compare manual calculations to a computer generated total for the same batch

49
Q

OLRT

A

continuous immediate processing method

50
Q

T/F OLRT

A

each transaction goes through all processing steps before the next transaction is processed

51
Q

T/F Batch processing uses random access storage devices and OLRT uses sequential device

A

F - batch processing uses sequential device and OLRT uses sequential device

52
Q

why can’t OLRT use sequential devices?

A

would have to be sorted and wouldn’t be in real time

53
Q

T/F OLRT used when transactions are high volume, and allows for better customer service

A

T

54
Q

The POS system at a grocery store is an example of batch or OLRT processing?

A

OLRT

55
Q

T/F OLRT is easier with to implement and for auditing

A

F

56
Q

T/F a group of bits is a byte

A

T

57
Q

Bit

A

individual zero or 1. Smallest piece of info that can be represented

58
Q

T/F each attribute is stored in a field

A

T

59
Q

Field

A

where each attribute is stored

60
Q

record

A

all the information combined the one customer

61
Q

entity

A

subject of the data ex) customer, employee, product

62
Q

master file

A

stores cumulative information that is considered permanent

63
Q

T/F master files are transaction files

A

F

64
Q

data value

A

within each field are either numbers or letters

65
Q

what is the correct hierarchy of data in a system

file
field
character
record

A

character, field, record, file

66
Q

what correctly composes each other

bytes
data values
fields
records
bits
files

A

bytes are composed of bits
data values are composed of bytes
fields are composed of data values
Files are composed of records

67
Q

what is a set of logically related files?

A

database

68
Q

flat file

A

all files stored sequentially

69
Q

hierarchy or tree database

A

records have branches

70
Q

what are the columns in a relational database called?

A

attributes/fields

71
Q

what are the rows in a relational database called?

A

records

72
Q

primary key

A

unique identifier in a table

73
Q

T/F primary key values can appear multiple times

A

F - primary keys are values that only appear once

74
Q

foreign key

A

primary key from a different table that are now secondary on a new table

75
Q

T/F customer ID on the customer table would be a primary key for the customer table and a foreign key for sales order table

A

T

76
Q

referential integrity

A

maintaining data consistency across related database tables

77
Q

Referential integrity makes sure that any field in a table is declared a (primary/foreign key) and that the database remains _______

A

foreign, accurate and reliable

78
Q

normalization

A

eliminates data redundancy and improve data integrity by ensuring that each piece of information is stored in the most logical place

79
Q

T/F normalization is about structure and design and referential integrity is about consistency and rules

A

T

80
Q

T/F primary keys contain null values

A

F

81
Q

what are demands in SQL?

A

Clauses

82
Q

Clauses make up a ______

A

statement

83
Q

What is an example of a statement

A

Select, From, Where;

84
Q

If goal is to select all columns from a table the statement should include a _____

A

*

85
Q

If there is a condition, what clause is included?

A

Where

86
Q

What are examples of aggregate functions?

A

SUM, Max, Min, Average, Count

87
Q

What part of the statement does an aggregate function go?

A

Select “aggregate function”

88
Q

What do each of the following aggregate functions do?

Count
SUM
Max
Min

A

Count - how many transactions involved
Sum - total quantity sold
Max - largest quantity
Min - smallest quantity

89
Q

what are examples of string functions?

A

length, INSTR,

90
Q

T/F String values work on numeric values

A

F - only work on text values

91
Q

What is the role of the applications development team?

A

Safeguard applications that are being developed

92
Q

Where is new application created?

A

Test environment

93
Q

What are the roles within application development?

A

System analyst and application programmer

94
Q

what is the role of the system analyst?

A

analyzes and designs new applications

95
Q

what is the role of application programmer?

A

writes new application in the test environment (software engineer)

96
Q

what is the role of the systems admin and systems programming team?

A

maintains the operating system

97
Q

what are the roles within systems admin and systems programming?

A

system programmer and system administrator

98
Q

T/F because the role of a system programmer requires that they be in direct contact with the production programs and data, they (can/ can not) have access to information about application programs

A

Can not

99
Q

What is the role of a system programmer?

A

maintain operating system

100
Q

What is the role of system administrator?

A

provides access

101
Q

T/F applications programmer and system analyst should have access to the live computer system?

A

F - design and write the program

102
Q

what are the roles of application controls?

A

accuracy, validity, and completeness of data processing

103
Q

what are the three application controls?

A

input and origination, processing and file controls, output controls

104
Q

Automated data capture

A

data origination with scanners rather than manual data entry

105
Q
A