CH4 Flashcards

1
Q

IT RESPONSIBILITIES AND SEGREGATION OF DUTIES

-FILE LIBRARIAN

A

FILE LIBRARIES STORE AND PROTECT PROGRAMS AND TAPES FROM DAMAGE AND UNAUTHORIZED USE, AND FILE LIBRARIANS CONTROL THE FILE LIBRARIES. IN LARGE COMPUTING ENVIRONMENTS, MUCH OF THIS WORK HAS BEEN AUTOMATED. SOFTWARE PROGRAM LIBRARIANS ARE AVAILABLE AS PART OF THE PROGRAM CHANGE CONTROL PROCESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IT RESPONSIBILITY AND SEGREGATION OF DUTIES

-DATA LIBRARIAN

A

IN LARGE COMPANIES, THE DATA LIBRARIAN HAS CUSTODY OF AND MAINTAINS THE ENTITY’S DATA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IT RESPONSIBILITY AND SEGREGATION OF DUTIES

-SECURITY ADMIN

A

SECURITY ADMINS ARE RESPONSIBLE FOR THE ASSIGNMENT OF INITIAL PASSWORDS AND OFTEN THE MAINTENANCE OF THOSE PASSWORDS (IF THE END USER DOES NOT MAINTAIN THEIR OWN PASSWORDS). SECURITY ADMIN ARE RESPONSIBLE FOR THE OVERALL OPERATION OF THE VARIOUS SECURITY SYSTEMS AND THE SECURITY SOFTWARE IN GENERAL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IT RESPONSIBILITY AND SEGREGATION OF DUTIES

-SYSTEM ADMIN

A

SYSTEM ADMIN IS COMPOSED OF:

  • DATABASE ADMIN (DBA)
  • NETWORK ADMIN
  • WEB ADMING
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IT RESPONSIBILITY AND SEGREGATION OF DUTIES

-SYSTEM ADMIN-DATABASE ADMIN

A

WITHIN A DATABASE ENVIRONMENT, DATABASE ADMIN ARE RESPONSIBLE FOR MAINTAINING AND SUPPORTING DATABASE SOFTWARE.
-DATABASE ADMINS ARE DIFFERENT FROM DATA ADMINS; A DATABASE ADMIN IS RESPONSIBLE FOR THE ACUTAL DATABASE SOFTWARE, WHILE A DATA ADMIN IS RESPONSIBLE FOR THE DEFINITION, PLANNING AND CONTROL OF THE DATA WITHIN A DATABASE.
THE FUNCTION OF A DATABASE ADMIN IS MORE TECHNICAL, AND THE FUNCTION OF A DATA ADMIN IS MORE ADMINISTRATIVE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IT RESPONSIBILITY AND SEGREGATION OF DUTIES

-SYSTEM ADMIN-NETWORK ADMIN

A

NETWORK ADMIN SUPPORT COMPUTER NETWORKS. NETWORK PERFORMANCE MONITORING AND TROUBLESHOOTING IS A SPECIALLY IMPORTANT ASPECT OF THEIR WORK. A NETWORK ADMIN SETS UP AND CONFIGURES A COMPTER NETWORK SO THAT MULTIPLE COMPUTERS CAN SHARE THE SAME DATA AND INFO. AFTER A NETWORK IS ESTABLISHED, THE WORK IS MOSTL MONITORING AND TROUBLESHOOTING. SOMETIMES NETWORK ADMINS ARE CALLED TELECOMMUNICATIONS ANALYST OR NETWORK OPERATORS.
-IN SMALL ORG, SYSTEM ADMIN/ SYSTEM PROGRAMMING AND NETWORK ADMIN ARE OFTEN PERFORMED BY THE SAME PERSON OR PEOPLE. IN THOSE ORG, THE LINE BETWEEN SYSTEM ADMIN AND NETWORK ADMIN IS OFTEN HARD TO DRAW.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

WEB ADMIN

A

RESPONSIBLE FOR INFO ON A WEBSITE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DATA INPUT CLERK

A

DATA INPUT PERSONNEL PREPARE, VERIFY AND INPUT DATA TO BE PROCESSED IF THAT FUNCTION HAS NOT BEEN DISTRIBUTED TO THE END USERS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HARDWARE TECHNICIAN

A

A HARDWARE TECHNICIAN SETS UP AND CONFIGURES HARDWARE AND TROUBLESHOOTS ANY RESULTING HARDWARE PROBLEMS. MOST OF THE TIME, THE HARDWARE MAINTAINED INCLUDES PCS AND PERIPHERAL EQUIP; THE HARDWARE VEDORS NORMALLY MAINTAIN MAINFRAMES AND MIDRANGE COMPUTERS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SEGREGATION OF DUTIES WITHIN INFO TECHNOLOGY

A

SEGREGATION OF DUTIES IS DEFINED AS DIVIDING RESPONSIBILITIES FOR DIFFERENT PORTIONS OF A TRANSACTION (AUTHORIZATION, RECORDING AND CUSTODY) AMONG SEVERAL DIFFERENT PEOPLE OR DEPARTMENTS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SEGREGATION OF DUTIES WITHIN INFO TECHNOLOGY

-SYSTEM ANALYST VS COMPUTER PROGRAMERS

A

SYSTEM ANALYSTS HELP USERS DETERMINE THEIR INFO NEEDS, AND THE DESING AN INFO SYSTEM TO MEET THOSE NEEDS WHEREAS COMP PROGRAMMERS TAKE THE DESIGN PROVIDED BY SYSTEM ANALYSTS AND CREATE INFO SYSTEM BY WRITING THE COMP PROGRAMS.

  • ANALYSTS OFTEN ARE IN CHARGE OF HARDWARE AND COMPUTER PROGRAMERS ARE IN CHARGE OF THE APPLICATION SOFTWARE.
  • THEORETICALLY, IF THE PERSON WHO IS IN CHARGE OF SETTING UP THE HARDWARE IS ALSO IN CHARGE OF SETTING UP AND MAINTAINING THE SOFTWARE, THAT PERSON COULD EASILY BYPASS SECURITY SYSTEMS WITHOUT ANYONE KNOWING AND STEAL ORG INFO OR ASSETS.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SEGREGATION OF DUTIES WITHIN INFO TECHNOLOGY

-COMPUTER OPERATORS VS COMPUTER PROGRAMERS

A

IT IS IMPORTANT THAT COMPUTER OPERATORS AND COMP PROGRAMMERS BE SEGREGATED BECAUSE A PERSON PERFORMING BOTH FUNCTIONS OCULD MAKE UNAUTHORIZED AND UNDETECTED PROGAM CHANGES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SEGREGATION OF DUTIES WITHIN INFO TECHNOLOGY

-COMPUTER OPERATORS VS COMPUTER PROGRAMERS

A

SECURITY ADMINS VS COMPUTER OPERATORS AND COMPUTER PROGRAMMERS
-SECURITY ADMIN ARE THE PEOPLE WHO ARE RESP FOR RESTRICTING ACCESS TO SYSTEMS, APPS, OR DATABASES TO THE APPROPRIATE PERSONNEL. IF THE PERSON WHO IS IN CHARGE OF RESTRICTING ACCESS IS ALSO A PROGRAMMER OR AN OPERATOR (OR ADMINISTRATOR) FOR THAT SYSTEM, THEN THAT PERSON COULD GIVE HIMSELF/HERSELF OR ANOTHER PERSON ACCESS TO AREAS THEY ARE NOT AUTHORIZED TO ENTER. THIS SECURITY BYPASS WOULD ALSO ALLOW THAT PERSON TO STEAL ORG INFO OR ASSETS (EMBEZZLING OF FUNDS) WITHOUT ANYONE KNOWING ABOUT IT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

POLICIES

A

IT POLICIES REPRESENT MANAGEMENT FORMAL NOTIFICATION TO EMPLOYEES REGARDING THE ENTITY’S OBJECTIVES. POLICIES SURROUNDING SYSTEM DESIGN SHOULD PROMOTE COMMUNICATION. POLICIES SHOULD DESCRIBE THE MEANS OF COMMUNICATING SIGNIFICANT INFO UPSTREAM. THERE SHOULD ALSO BE EFFECTIVE COMMUNICATION WITH EXTERNAL PARTIES, SUCH AS CUSTOMERS, SUPPLIERS, REGULATORS, AND SHAREHOLDERS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

POLICIES

-IMPLEMENTATION

A

AUTHORITY AND RESP ARE ASSIGNED THROUGH FORMAL JOB DESCRIPTIONS; EMPLOYEE TRAINING, OPERATING PLANS, SCHEDULES, AND BUDGETS; A FORMAL COMPANY CODE OF CONDUCT AND A WRITTEN POLICY AND PROCEDURES MANUAL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

EXAMPLES OF A DECISION SUPPORT SYSTEM INCLUDE (DSS):

A
  • SENSITIVITY ANALYSIS APPLICATION
  • FINANCIAL MODELING APPLICATION
  • DATABASE QUERY APPLICATION

DECISION SUPPORT SYSTEMS (DSS) ARE COMPUTER-BASED INFO SYSTEM THAT PROVIDE INTERACTIVE SUPPORT TO MANAGERS OR OTHER DURING THE DECION-MAKING PROCESS.

  • TPS PROCESS DATA RESULTING FROM BUSINESS TRANSACTIONS (MONTHLY, HISTORICAL IN NATURE; NOT PREDICTIVE).
  • A FINANCIAL MODELING APP IS A DSS TO ASSIST MANAGEMENT IN EVALUATION FINANCING ALTERNATIVES.
  • DATABASE QUERY APPLICATION ARE A DSS THAT READ AND REORGANIZE DATA TO MANAGEMENTS SPECIFICATIONS BUT DO NOT ALLOW ALTERNATIONS OF THE DATA.
  • SENSITIVITY ANALYSIS IS A DS THAT USES A WHAT IF TECHNIQUE THAT ASKS HOW A GIVEN OUTCOME WILL CHANGE IF THE ORIGINAL ESTIMATES OF THE MODEL ARE CHANGED.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DECISION SUPPORT SYSTEM (DSS)

A

DSS ARE COMPUTER BASED INFO SYSTEMS THAT PROVIDE INTERACTIVE SUPPORT TO MANAGERS OR OTHERS DURING THE DECION-MAKING PROCESS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

MANAGEMENT REPORTING SYSTEMS

A

MANAGEMENT REPORTING SYSTEMS PROVIDE MANAGERS WITH THE INFO NEEDED FOR DAY TO DAY DECISION MAKING.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

FORMALIZED SYSTEM

A

A FORMALIZED SYSTEM IS A GENERIC TERM USED TO DESCRIBE ANY SYSTEM OPERATING IN PROPER OR REGULAR FORM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

STRUCTURED SYSTEM

A

A STRUCTURED SYSTEM IS A SYSTEM IN WHICH EACH PROGRAM WITHIN A SYSTEM IS INDEPENDENT OF OTHER PROGRAMS WITHIN THE SYSTEMS. THIS ENABLES PROGRAMMING TEAMS TO WORK INDEPENDENTLY ON DIFFERENT PROGRAMS WITHIN THE SAME SYSTEM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

EXECUTIVE INFO SYSTEMS (EIS)

A

-AN EIS PROVIDES STRATEGIC INFO TAILORED TO THE NEEDS OF TOP MANAGEMENT. IT IS NOT WIDELY USED THROUGHOUT THE ORG. .
-EIS OR EXECUTIVE SUPPORT SYSTEMS, PROVIDE SENIOR EXECUTIVES WITH IMMEDIATE AND EASY ACCESS TO INTERNAL AND EXTERNAL INFOT TO ASSIT THE EXECUTIVES IN STRATEGIC, NOT DAYLY DECISION MAKING.
EIS HELPS EXECUTIVE MONITOR BUSINESS CONDITIONS IN GENERAL AND ASSISTS IN STRATEGIC PLANNING TO CONTROL AND OPERATE THE COMPANY.
-PROVIDES TOP EXECUTIVES WITH IMMEDIATE AND EASY ACCESS TO INFO IN A HIGHLY INTERACTIVE FORMAT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

SEGREGATION OF DUTIES IN AN IT ENVIRONMENT

A

THE DUTIES OF A SYSTEM ANALYST AND APPLICATION PROGRAMMERS CAN BE AND OFTER ARE COMBINED. THE DUTIES OF SYSTEM PROGRAMMERS AND APPLICATION PROGRAMMERS SHOULD NOT BE COMBINED.

  • SEGRAGATION OF DUTIES IN AN IT ENVIRONMENT NORMALLY REVOLVES AROUND GRANTING AND/OR RESTRICTING ACCESS TO PRODUCTION DATA AND/OR PRODUCTION PROGRAMS.
  • SEGREGATION OF DUTIES IN AN IT ENVIRONMENT IS DEFINED AS GIVING RESP FOR DIFFERENT PROTIONS OF A TRANSACTION AMONG SEVERAL DIFFERENT PEOPLE
  • THE IT DEPT IS A SUPPORT GROUP IN THAT IT NORMALLY DOES NOT INITIATE OR AUTHORIZE TRANSACTIONS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

WHICH OF THE FOLLOWING IS AN ADVANTAGE OF A COMPUTER BASED SYSTEM FOR TRANSACTION PROCESSING OVERA MANUAL SYSTEM?

A
  • A COMPUTER BASED SYSTEM WILL ALMOST BE MORE EFFICIENT IN DOING SOMETHING THAT HAS TO BE DONE MULTIPLE TIMES. THUS, IF MULTIPLE FS HAVE TO BE PRODUCED, FOR EXAMPLE, AT MULTIPLE TIMES DURING THOSE CLOSING PROCESS, A COMPUTER BASED SYSTEM WILL NORMALLY BE MORE EFFICIENT.
  • A COMPUTER BASED SYSTEM REQUIRES A SET OF INTERNAL CONTROLS THAT ARE JUST AS STRINGENT AS A MANUAL SYSTEM.
  • THERE IS NOTHING ABOUT A COMPUTER BASED SYSTEM THAT GUARANTEES INCREASED ACCURACY.
  • THERES NOTHING ABOUT COMPUTER BASED SYSTEM THAT ELIMINATES THE NEED TO RECONCILE CONTROL ACCOUNTS AND SUBSIDIARY LEDGERS. COMP SYSTEMS REALLY THE PROGRAMS IN THOSE SYSTEMS MAKE MISTAKES SOMETIMES, THEY ARE CALLED BUGS.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

AREAS OF RESPONSIBILITY THAT ARE NORMALLY ASSIGNED TO A SYSTEM PROGRAMMER IN A COMPUTER SYSTEM ENVIRONMENT

A

-OPERATING SYSTEMS AND COMPILERS
SYSTEM PROGRAMMERS WORK WITH OPERATING SYSTEM AND COMPILERS.
SYSTEM PROGRAMMERS SELDOM IF EVER WRITE APP PROGRAMS. THE SETS AND MINDSETS OF SYSTEM PROGRAMS AND APP PROGRAMERS ARE ALMOST COMPLETELY DIFFERENT, NOT TO MENTION THAT SYSTEM PROGRAMMERS DOING BOTH WOULD VIOLATE GOOD IC PRINCIPLES.
-SYSTEM PROGRAMMERS COULD BE ASSIGNED THE
RESPONSIBILITY FOR DATA COMMUNICATIONS HARDWARE AND SOFTWARE.
SYSTEM PROGRAMMERS ARE NOT NORMALLY RESPONSIBLE FOR COMPUTER OPERATIONS PERSONNEL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

STATEMENTS REGARDING DATA, INFO AND INFO SYSTEMS.

A

TPS AND MANAGEMENT INFO SYSTEM ARE BOTH TYPES OF BIS (BUSINESS INFO SYSTEMS)
-AN AUDIT TRAIL ALLOWS INFO IN THE FS TO BE VOUCED TO THE ORIGINAL SOURCE DOCS. IT REPRESENTS THE ABILITY TO VOUCH SUMMARY INFO IN THE FS THROUGH THE ACCOUNTING RECORDS AND INTO SOURCE DOCS.
-BUSINESS DATA IS GENERALLY STORED IN TWO DIMENSIONAL TABLES THAT FORM RELATIONAL DATABASE.
DATA PROCESSED INTO A MEANINGFUL FORMAT IS INFO.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

SYSTEMS ANALYST EXAMPLE

A

AN AD IN A LOCAL NEWSPAPER STATED THAT A SMALL LOCAL BUSINESS REQUIRED SOMEONE WHO CAN GET OUR NEW OFF-THE-SHELF PRODUCTION SOFTWARE TO DO WHAT WE WANT IT TO DO SO WE CAN GET ON WITH RUNNING OUR BUSINESS. THIS IS A TYPE OF SYSEM ANALYST JOB.
- A SYSTEM ANALYST JOB WOULD TAKE ON THE ROLE OF LEARNING A PURCHASED PACKAGE AND WOULD HAVE THE JOB OF INTEGRATING IT TO ANY EXISTING SOFTWARE.
THE SYSTEM ANALYST WOULD ALSO TAKE THE RESPONSIBILITY FOR TRAINING STAFF IN ITS USE.
- A SYSTEM ANALYST IS SOMETIMES REFERRED TO AS A SYSTEM INTEGRATOR WITH PURCHASED SYSTEMS SINCE THE INDIVIDUAL IS RESPONSIBLE FOR ADAPTING OR INTEGRATING THE PURCHASED SYSTEM INTO THE BUSINESS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

EMPLOYEE ACTION AS A SYSTEM PROGRAMMER AND APPLICATION PROGRAMER IS…

A

A SERIOUS INTERNAL CONTROL WEAKNESS THAT IS VERY DIFFICULT TO OVERCOME.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

DATA BASE ADMIN

A

MAINTAINS AND SUPPORTS ITS DATABASE SYSTEMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

NETWORK ADMIN

A

IT SUPPORTS ITS OWN INTERNAL NETWORK BY MONITORING PERFORMANCE OF THOSE NETWORKS AND TROUBLESHOOTING ANY PROBLEMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

DATABASE ADMIN AND NETWORK ADMIN

A

CAN BE PERFORMED BY THE SAME PERSON, ALTHOUGH THAT IS NOT LIKELY SINCE THE SKILL SETS OF ADMIN AND NETWORK ADMINISTRATOR ARE BOTH HIGHLY TECHNICAL AND VERY SPECIALIZED.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

IT DEPARTMENT

A

IS A SUPPORT GROUP AND NORMALLY DOES NOT INITIATE OR AUTHORIZE TRANSACTIONS. WHEN IT DOES INITIATE OR AUTHORIZE TRANSACTIONS, THOSE TRANSACTIONS NORMALLY ARE FOR SUCH ACTIVITIES AS LEASING HARDWARE, PAYING SOFTWARE LICENSE FEES, AND OTHER IT-RELATED ACTIVITIES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

PROGRAM MODIFICATION CONTROLS

A

PROGRAM MODIFICATIONS ARE CONTROLS OVER THE MODIFICATION OF PROGRAMS BEING USED IN PRODUCTION APPLICATIONS.

  • PROGRAM MODIFICATION CONTROLS INCLUDE BOTH CONTROLS THAT ATTEMPT TO PREVENT CHANGES BY UNAUTHORIZED PERSONNEL AND ALSO TRACK PROGRAM CHANGES SO THAT THERE IS AN EXACT RECORD OF WHAT VERSIONS OF WHAT PROGRAMS WERE RUNNING IN PRODUCTION AT ANY SPECIFIC POINT IN TIME.
  • PROGRAM CHANGE CONTROL SOFTWARE NORMALLY INCLUDES A SOFTWARE CHANGE MANAGEMENT TOOL AND CHANGE REQUEST TRACKING TOOL. PROGRAM CHANGE CONTROL OFTEN INVOLVES CHANGING WHAT ARE EFFECTIVELY THE SAME PROGRAMS IN TWHO DIFFERENT WAYS SIMULTANEOUSLY. NORMALLY AN ENVIRONMENT HAS BOTH PRODUCTION PROGRAMS AND PROGRAMS THAT ARE BEING TESTED. SOMETIMES, PRODUCTION PROGRAMS REQUIRE CHANGES PRODUCTION FIXES AT THE SAME TIME THE TEST VERSION OF TEH SAME PROGRAMS ARE BEING WORKED ONE. THIS PROCESS MUST BE CONTROLLED SO THAT ONE SET OF CHANGES DOES NOT INCORRECTLY OVERAY THE OTHER.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

IN A LARGE MULTINATIONAL ORG, WHICH OF THE FOLLOWING JOB RESP SHOULD BE ASSIGNED TO THE NETWORK ADMIN?

A

-MANAGING REMOTE PROCESS

IN A LARGE MULTINATIONAL ORG OR EVEN A MEDUM MANAGING REMOTE ACESS WOULD BE THE RESPONSIBILITY OF A NETWORK ADMING.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

EFFECTIVE SEGREGATION OF DUTIES WITHIN INFO TECH AN APP PROGRAMMER SHOULD HAVE WHAT RESPONSIBILITIES

A

-CODE APPROVED CHANGES TO A P/R PROGRAM
A P/R PROGRAM IS AN APP PROGRAM AND THE CHANGES HAVE BEEN PREVIOUSLY APPROVED.

AN APP PROGRAMER SHOULD NEVER BE ASSIGNED RESP TO CORRECT DATA ENTRY ERRROS FOR THE CASH DISBURSEMENT OR ANY OTHER SYSTEM.
APP PROGRAMMERS SHOULD NEVER HAVE ACCESS TO DATA OTHER THAN FOR VERY CONTROLLED SITUATIONS SUCH AS DATA FIXES.
APP PROGRAMMERS SHOULD NOT HAVE CUSTODY OF BILLING OR ANY OTHER APPLICATION SYSTEM PROGRAM CODE. CUSTODY SHOULD BE WITH THE LIBRARIAN EITHER A PERSON OR SYSTEM. AN APP PROGRAMMERS SHOULD ONLY HAVE CONTROLLED ACCESS TO THE PROGRAM CODE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

FIRST STEP IN A COMPANYS SYSTEM DEVELOPMENT LIFE CYCLE OF ITS INFO TECHNOLOGY DEVELOPED INTERNALLY

A

ANALYSIS.

  • DESIGN
  • TESTING
  • LASTLY IMPLEMENTATION.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

ECHO CHECKS

A

DEVICES THAT VERIFY TRANSMISSIONS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

DATA PROCESSING

A

INVOLVES TREATMENT OF THE DATA INPUT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

RESPONSIBILITY OF AN MIS OR EDP STEERING COMMITTEE

A
  • A STEERING COMMITTEE SHOULD BE FORMED TO GUIDE AND OVERSEE SYSTEM DEVELOPMENT AND ACQUISITION.
  • A STEERING COMMITTEE HAS BROAD OBJECTIVES THAT INCLUDE THE OVERSIGHT OF SYSTEMS DEVELOPMENT AND ACQUISITION AFTER AN ASSESSMENT OF DATA PROCEEDING NEEDS.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

DATABASE ADMINS

A

A DATABASE ADMIN CONTROLS THE DATABASE, NOT THE DATA AND DUTIES GENERELLY INCLUDE:

  • DESIGN OF FIRMS DATABASE
  • MAINTAINING SECURITY MEASURES
  • CONTROLLING DATA STRUCTURE.

A DATABASE ADMIN IS RESPONSIBLE FOR THE ACTUAL DATABASE SOFTWARE, WHILE DATA ADMIN IS RESPONSIBLE FOR THE DEFINITION, PLANNING AND CONTROL OF THE DATA WITHIN A DATABASE.
-THE FUNCTION OF A DATABASE ADMIN IS MORE TECHNICAL AND THE FUNCTION OF A DATA ADMIN IS MORE ADMINISTRATIVE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

AN EXAMPLE OF AN APPLICATION INPUT CONTROL

A
  • EDIT CHECK
  • AN EDIT CHECK IS AN APPLICATION INPUT CONTROL THAT VALIDATES DATA BEFORE THE DATA IS SUCCESSFULLY INPUTED. BATCHES CONTAINING TRANSACTIONS WITH ERRORS, INCORRECT BATCH TOTALS AND BATCHES WHRE DR DO NOT EQUAL CR ARE WRITTEN TO A SUSPENDED TRANSACTION FILE. THESE TRANSACTIONS ARE THEN CORRECTED AND RESUBMITTED. ALL TRANSACTIONS MUST BE CORRECTED AND RESUBMITTED BEFORE END-MONTH PROCESSING CAN BEGIN.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

WHAT SHOULD BE ALWAYS INCLUDED IN A SYSTEM SPECIFICATION DOCUMENT FOR A FINANCIAL REPORT?

A

-DATA ELEMENTS
DATA ELEMENTS SHOULD ALWAYS BE INCLUDED IN THE SYSTEM SPECIFICATION DOCUMENT FOR A FINANCIAL REPORT. DAA ELEMENTS DEFINE THE BUILDING BLOCKS OF INFO PROVIDED IN A FINANCIAL REPORT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

PRIMARY OBJECTIVE OF DATA SECURITY CONTROLS?

A

-TO ENSURE THAT STORAGE MEDIA ARE SUBJECT TO AUTHORIZATION PRIOT TO ACCESS, CHANGE OR DESTRUCTION.
THE OBJECTIVE OF SECURITY DATA IS TO ENSURE THAT STORAGE MEDIA ARE ONLY CHANGED OR DELETED AFTER APPROPRIATE AUTHORIZATION. THE OBJECTIVE IS TO PROTECT INFO.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

CHANGE MANAGEMENT

A

AND RELATED CONTROL ACTIVITIES ANTICIPATE MONITORING THE USE OF SYSTEM SOFTWARE TO PREVENT UNAUTHORIZED ACCESS TO SYSTEM SOFTWARE AND COMPUTER PROGRAMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

POLICIES SUPPORT DOCS

A

SUCH AS PROCEDURES, FORMALIZE STANDARS RULES AND PROCEDURES TO ENSURE THAT ORG CONTROLS ARE PROPERLY EXECUTED. DATA SECURITY CONTROLS MAY BE INCLUDED IN PROCEDURES, BUT DEVELOPMENT PROCEDURES IS NOT THEIR OBJECTIVE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

THE CONTROL OBJECTIVE FOR INFO AND RELATED TECH (COBIT) FRAMEWORK INCLUDES ALL OF THE FOLLOWING INFO CRITERIA:

A

THE COBIT FRAMEWORK IDENTIFIES 7 INFO CRITERIA (ICE RACE) THAT INCLUDE

  1. INTEGRITY
  2. CONFIDENTIALITY
  3. EFFICIENCY
  4. RELIABILITY
  5. AVAILABILITY
  6. COMPLIANCE
  7. EFFECTIVENESS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

COBIT

-EFFECTIVENESS

A

-THE IDEA THAT INFO WILL BE DELIVERED TIMELY IN A CORRECT, CONSISTENT AND USEFUL MANNER.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

INTEGRITY

A

THE IDEA THAT INFO MUST BE ACCURATE AND COMPLETE AND VALID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

EFFECTIVENESS

A

INFO BE RELEVANT TO A BUSINESS PROCESS AND DELIVERED TIMELY IN CORREC, CONSISTENT AND USABLE MANNER.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

THE COBIT FRAMEWORK IDENTIFIES 5 FOCUS AREAS FOR IT GOVERNANCE WHICH INCLUDE:

A
  • STRATEGIC ALIGNMENT
  • RESOURCE MANAGEMENT
  • RISK MANAGEMENT
  • PERFORMANCE MEASUREMENT
  • VALUE DELIVERY
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

COBIT INFO CRITERIA

A

ICE RACE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

COBIT DEFINES THE ENTERPRISE ARCHITECTURE FOR IT AS A

A

-COMBINATION OF IT RESOURCES AND DEFINED PROCESSES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

USING PROCESSES DEFINED BY THE COBIT FRAMEWORK, THE DOMAIN CATEGORY NORMALLY ASSOCIATED WITH THE DELIVERY OF IT SOLUTIONS TO A BUSINESS ARE REFERED TO AS.

A

ACQUIRED AND IMPLEMENT

  • UNDER COBIT FRAMEWORK, THE ACQUIRE AND IMPLEMENT DOMAIN ADDRESSES THE DELIVERY OF IT SOLUTIONS TO USERS. THE COBIT FRAMEWORK INCLUDES THE 4 DOMAINS IN THE MNEMONIC “PO AIDS ME”
  • PROCESS AND ORGANIZE
  • ACQUIRE AND IMPLEMENT
  • DELIVERY AND SUPPORT
  • MONITOR AND EVALUATE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

EXECUTIVE SUPPORT SYSTEM

A

EXECUTIVE SUPPORT SYSTEMS PROVIDE SENIOR EXECUTIVES WITH IMMEDIATE AND EAY ACCESS TO INTERNAL AND EXTERNAL INFO TO ASSIST THE EXECUTIVES IN STRATEGIC ISSUES SUCH AS NON ROUTINE DECISIONS THAT MAY INVOLVE ANALYSIS OF CYCLICAL DATA ACQUISITIONS AND COMPETITOR BEHAVIOR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

AUDIT LOGS ARE AN EXAMPLE OF»>

A

TYPES OF SECURITY CONTROL
-AUDIT LOGS ARE DETECTIVE SECURITY CONTROLS. THEY ARE GENERALLY CHRONOLOGICAL RECORDS THAT PROVIDE DOCUMENTARY EVIDENCE OF THE SEQUENCE OF ACTIVITIES THAT CAN BE USED TO DETECT ERRORS OR IRREGULARITIES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

EDI IS BEST DESCRIBED AS

A

COMPUTER TO COMPUTER TRANSACTIONS FOR DIRECT PROCESSING
-BY DEFINITION, EDI IS THE COMPUTER TO COMPUTER EXCHANGE OF BUSINESS DATA IN STRUCTURED FORMATS THAT ALLOWS DIRECT PROCESSING OF DATA BY THE RECEIVING SYSTEM.
EDI TRANSACTIONS MAY BE TRANSMITTED USING VAN, BUT EDI IS NOT A VAN BY DEFINTION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

DATA WAREHOUSE

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

E COMMERCE

A

ORDERING GOODS OR SERVICES OVER THE INTERNET FROM A CORPORATE WEBSITE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

ELECTRONIC DATA INTERCHANGE (EDI)

A

IT TYPICALLY OCCURS BETWEEN PARTIES WITH A PREVIOUS RELATIONSHIP NORMALLY OVER A VAN (VALUE ADDED NETWORK) NOT THE INTERNET. HOWEVER, THE USE OF THE INTERNET FOR EDI IS BECOMING MORE COMMON.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

B2B TRANSACTIONS ARE FREQUENTLY HANDLED THROUGH ELECTRONIC MEDIA. THEY TYPICALLY HAPPEN

A

THROUGH THE INTERNET, EDI, INTRANETS OR EXTRANETS.

  • B2B TRANSACTIONS OCCUR THROUGH ANY NUMBER OF DIFFERENT NETWORKS INCLUDING THE INTERNET.
  • B2B IS NOT REQUIRED TO TAKE PLACE ONLY THROUGH A SINGLE NETWORK
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

THE COMMUNICATIONS NETWORK TYPICALLY USED TO EFFECT ELECTRONIC DATA EDI BETWEEN BUSINESSES IS?

A
  • VAN (VALUE ADDED NETWORK)

- EDI IS USUALLY EFFECTED THROUGH A VAN. HOWEVER, IT CAN BE EFFECTED THROUGH THE INTERNET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

ADVANTAGE OF E-COMMERCE OVER EDI

A
  • IS GENERALLY LESS EXPENSIVE THAN EDI
  • FASTER THAN EDI BECAUSE IS CONDUCTED THROUGH THE INTERNET
  • DO NOT REQUIRE THAT ORG ENTER A CONTRACT BEFORE TRANSACTING BUSINESS; EDI TRANSACTIONS DO
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

SUPPLY CHAIN MANAGEMENT

A
  • IS CONCERNED WITH FOUR IMPORTANT CHARACTERISTICS FOR EVERY SALE:
  • WHAT
  • WHEN
  • WHERE
  • HOW MUCH
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

EDI CHARACTERISTIC

A
  • REQUIRES ALL TRANSACTIONS TO BE SUBMITTED IN STANDARD (BY INDUSTRY) DATA FORMAT. HOWEVER, THERE ARE AT LEAST 2 SETS OF STANDARDS IN DIFFERENT PARTS OF THE WORLD
  • EDIIS COMPUTER TO COMPUTER EXCHANGE OF BUSINESS DATA THAT OFTEN INVOLVES THE USE OF THE INTERNET
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

MAPPING

A
  • IS THE PROCESS OF DETERMINING THE CORRESPONDENCE BETWEEN ELEMENTS IN A COMPANY’S TERMINOLOGY AND ELEMENTS IN STANDARD EDI TERMINOLOGY.
  • ONCE MAPPING HAS BEEN COMPLETED TRANSLATION SOFTWARE CAN BE DEVELOPED TO CONVERT TRANSACTIONS FROM ONE FORMAT TO THE OTHER.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

WHICH OF THE FOLLOWING IS USALLY A BENEFIT OF USING ELECTRONIC FUNDS TRANSFER FOR INTERNATIONAL CASH TRANSACTIONS

A
  • USE OF ELECTRONIC FUNDS TRANSFER FOR ANY FUNDS TRANSFER REDUCES THE NEED FOR MANUAL DATA ENTRY, THUS REDUCING THE OCCURRENCE OF DATA ENTRY ERRORS.
  • IT ALSO REDUCED PAPER AUDIT TRAIL
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

SECURITY OF MESSAGES IN AN ELECTRONIC DATA INTERCHANGE (EDI)

A
  • ENCRYPTION PERFORMED BY PHYSICALLY SECURE HARDWARE IS MORE SECURE THAN ENCRYPTION PERFORMED BY SOFTWARE.
  • ENCRYPTION PERFORMED BY PHYSICALLY SECURE HARDWARE IS MORE SECURE THAN THAT PERFORMED BY SOFTWARE BECAUSE SOFTWARE MAY BE MORE ACCESSIBLE FROM REMOTE LOCATIONS.
  • IN ADDITION, BECAUSE HARDWARE DECRYPTS FASTER THAN SOFTWARE, MORE COMPLEX ALGORITHMS WHICH ARE MORE DIFFICULT TO CRACK MAY BE USED.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

AN ADDITIONAL COST FROM USING EDI RATHER THAN A TRADITIONAL PAPAER ENVIRONMENT IS??

A
  • TRANSLATION SOFTWARE BECAUSE IS NEEDED TO CONVERT TRANSACTION FROM ENTITY’S INTERNAL FORMAT TO A STANDARD EDI FORMAT.
  • TRANSLATION SOFTWARE REPRESENTS AN ADDITIONAL COST NOT INCURRED IN THE TRADITIONAL PAPER ENVIRONMENT.
68
Q

WHICH OF THE FOLLOWING IS USUALLY A BENEFIT OF TRANSMITTING TRANSACTIONS IN AN ELECTRONIC DATA INTERCHANGE (EDI) ENVIRONMENT

A
  • A COMPRESS BUSINESS CYCLE WITH LOWER YR-END RECEIVABLES BALANCE.
  • EDI SPEEDS TRANSACTION PROCESSING, THE BUSINESS CYCLE IS GENERALLY SHORTENED AND YR-END RECEIVABLES ARE REDUCED.
  • EDI REQUIRES GREATER TESTING OF COMPUTER CONTROLS.
  • EDI DOES NOT AFFECT THE ABILITY TO APPLY STATISTICAL SAMPLING TECHNIQUES TO ACCOUNT BALANCES.
  • EDI IS OFTEN IMPLEMENTED THROUGH COMMUNICATION INTERMEDIARIES, REQUIRING RELIANCE ON THOSE PROVIDERS FOR PROVISION OF APPROPRIATE SECURITY MEASURES.
69
Q

DETROIT SERVICES CORP PROVIDES SERVICES TO VARIOUS COMPANIES IN THE AUTOMOTIVE INDUSTRY. DETROIT USES A CRM SYSTEM. WHICH OF THE FOLLOWING STATEMENTS IS CORRECT WITH RESPECT TO CRM SYSTEMS?

A
  • CRM SYSTEMS PROVDE SALES FORCE AUTOMATION AND CUSTOMER SERVICES.
  • CRM OBJECTIVES ARE TO INCREASE CUSTOMER SATISFACTION AND CUSTOMER REVENUE.
  • CRM SYSTEMS RECORD AND MANAGE CUSTOMER CONTACTS, MANAGE SALESPEOPLE, FORECAST SALES AND SALES TARGETS AND GOALS, MANAGE SALES LEADS AND POTENTIAL SALES LEADS, PROVIDE AND MANAGE ONLINE QUOTES AND PRODUCT SPECIFICATION AND PRICING, AND ANALYZE SALES DATA.
70
Q

A MANUFACTURES COMPANY THAT WANTED TO BE ABLE TO PLACE MATERIAL ORDERS MORE EFFICIENTLY MOST LIKELY WOULD UTILIZE WHICH OF THE FOLLOWING??

A
  • ELECTRONIC DATA INTERCHANGE (EDI)
  • A MANUFACTURING COMPANY THAT WANTED TO BE ABLE TO PLACE MATERIAL ORDERS MORE EFFICIENTLY WOULD UTILIZE EDI FOR PLACING THOSE ORDERS AND ALSO FOR OTHER PAPERWORK BETWEEN THE COMPANY AND ITS VENDORS.
71
Q

A COMPANY THAT RELIED HEAVILY ON E-COMMERCE WOULD WANT

A

-AS MANY PREVENTATIVE CONTROLS AS POSSIBLE BECAUSE IT MIGHT BE DIFFICULT OR IMPOSSIBLE TO CORRECT ERRORS AFTER THE FACT.

72
Q

BEST DEFINITION OF EDI

A
  • ELECTRONIC BUSINESS INFO IS EXCHANGED BETWEEN TWO OR MORE BUSINESSES.
  • THE BEST DEFINITION OF EDI IS ELECTRONIC (COMPUTER TO COMPUTER) EXCHANGE OF BUSINESS TRANSACTION DOCUMENTS. (BUSINESS INFO). EDI IS ALWAYS BETWEEN TWO SEPARATE BUSINESS NOT INTERNALLY
73
Q

INTERNAL COMMUNICATION

A

-TRANSMITTING ENTERED SALES DATA VIA A CENTRALIZED NETWORK TO A CENTRAL PROCESSOR

74
Q

ENTERPRISE RESOURCE PLANNING (ERP) HAS THE FOLLOWING ADVANTAGES OVER MULTIPLE INDEPENDENT FUNCTIONAL SYSTEMS…

A
  • INCREASE RESPONSIVENESS AND FLEXIBILITY WHILE AIDING IN THE DECISION-MAKING PROCESS
  • ERP COORDINATES INFO TO ENSURE TIMELY AND RESPONSIVE REPORTING AND DATA ADMIN IN SUPPORT OF DECISIONS.
  • ERP SYSTEM IS A CROSS-FUNCTIONAL ENTERPRISE SYSTEMS THAT INTEGRATES AND AUTOMATES MANY BUSINESS PROCESSES AT WORK TOGETHER IN MANUFACTURING, LOGISTICS, DISTRIBUTION, ACCOUNTING, FINANCE AND HR FUNCTIONS OF A BUSINESS.
  • ERP SOFTWARE IS COMPRISED OF A # OF MODULES THAT CAN FUNCTION INDEPENDENTLY OR AS INTEGRATED SYSTEM TO ALLOW DATA AND INFO TO BE SHARED AMONG ALL OF THE DIFFERENT DEPARTMENTS AND DIVISIONS OF LARGE BUSINESS.
  • IMPLEMENTATION AND TRAINING WOULD INCREASE WITH ERP.
75
Q

ERP SYSTEM IS DESIGNED TO??

A
  • INTEGRATE DATA FROM ALL ASPECTS OF AN ORG ACTIVITIES.

- ERP IS DESIGNED TO INTEGRATE DATA FROM ALL ASPECTS OF AN ORG.

76
Q

IN AN E-COMMERCE ENVIRONMENT THAT REQUIRES INFO TECHNOLOGY SYSTEMS BE AVAILABLE ON CONTINUOUS BASIS, MORE EMPHASIS WILL BE PLACED ON WHICH OF THE FOLLOWING ASPECTS OF PLANNING THAN IN TRADITIONAL ORG??

A

-MAINTAING REDUNDANT SYSTEMS FOR INSTANT AVAILABILITY TO ASSURE THE FLOW OF TRANSACTIONS.

77
Q

TYPES OF RISK AN ACCOUNTANT MUST RECOGNIZE

A

-STRATEGIC RISK
INCLUDES RISKS SUCH AS CHOOSING INAPPROPRIATE TECHNOLOGY
-FINANCIAL RISK
INCLUDES RISKS SUCH AS HAVING FINANCIAL RESOURCES LOST, WASTED, OR STOLEN
-INFO RISK
RISK SUCH AS LOSS OF DATA INTEGRITY, INCOMPLETE TRANSACTIONS OR HACKERS.

78
Q

FIREWALL

A

THE SYSTEM OF USER IDENTIFICATION AND AUTHENTICATION THAT PREVENTS UNAUTHORIZED USERS FROM GAINING ACCESS TO NETWORK RESOURCES. THIS NAME MAY ALSO APPLIED TO A NETWORK NODE USED TO IMPROVE NETWORK TRAFFIC AND TO SET UP A BOUNDARY THAT PREVENTS TRAFFIC FROM ONE SEGMENT FROM CROSSING OVER TO OTHER.

79
Q

NETWORK SERVER

A

IS A TYPE OF RESOURCE PROTECTED BY THE FIREWALL.

80
Q

FIREWALL

A

IS THE PROTECTIVE DEVICE THAT ALLOWS PRIVATE INTRANET USERS TO ACCESS THE INTERNET WITHOUT ALLOWING INTERNET USERS TO ACCESS TO PRIVATE INTRANET INFO.

81
Q

ANTI VIRUS PROTECTION PROGRAM

A

-ANTI VIRUS PROTECTION PROGRAMS SCAN COMP FOR VIRUSES AND IN SOME CASES, DESTROY THEM BUT DO NOT PROVIDE SECURITY FROM EXTERNAL ACCESS TO AN ORG PRIVATE DATA.

82
Q

ACCESS CONTROLS

A

THEY LIMIT ACCESS TO PROGRAM DOCUMENTATION, DATA FILES, PROGRAMS, AND COMPUTER HARDWARE. TO THOSE WHO REQUIRE IT IN THE PERFORMANCE OF THEIR JOB RESPONSIBILITIES. THESE CONTROLS INCLUDE:

  • MULTILEVEL SECURITY
  • USER ID
  • PASSWORDS
  • LIMIT ACCESS ROOMS
  • CALLBACKS ON DIAL UP SYSTEMS
  • USE OF ATTRIBUTES AND FIREWALL.
83
Q

BACKDOOR

A

-IS A MEANS OF ACCESS TO A PROGRAM OR SYSTEM THAT BYPASSES NORMAL SECURITY MECHANISMS. BACKDOORS SHOULD BE ELIMINATED.

84
Q

FIREWALL

A

IS A SYSTEM OFTEN BOTH HARDWARE AND SOFTWARE OF USER ID AND AUTHENTICATION THAT PREVENTS UNAUTHORIZED USERS FROM GAINING ACCESS TO NETWORK RESOURCES.
A FIREWALL ACTS AS A GATEKEEPER BY ISOLATING A PRIVATE NETWORK FROM A PUBLIC NETWORK. THE TERM FIREWALL MAY ALSO BE APPLIED TO A NETWORK NODE USED TO IMPROVE NETWORK TRAFFIC AND TO SET UP BOUNDARY THAT PREVENTS TRAFFIC FROM ONE NETWORK SEGMENT FROM CROSSING OVER TO ANOTHER.

85
Q

FIREWALL DETER

A

ACCESS RULES FOR FIREWALLS HAVE TO BE ESTABLISHED AND MAINTAINED. FIREWALLS CAN DATER BUT CANNOT COMPLETELY PREVENT, INTRUSION FROM OUTSIDERS. FIREWALLS DO NOT PREVENT OR PROTECT AGAINST VIRUSES.

86
Q

NETWORK FIREWALLS

A

TRADITIONALLY, FIREWALLS HAVE BEEN NETWORK FIREWALLS THAT HAVE PROTECTED THE NETWORK AS A WHOLE.
-PHYSICAL DEVICE

87
Q

APPLICATION FIREWALLS

A

AS OPPOSED TO A NETWORK FIREWALL, IT IS DESIGNED TO PROTEC SPECIFIC APPLICATION SERVICES FROM ATTACK.

  • APPLICATION FIREWALLS ARE NOT DESIGNED TO REPLACE NETWORK FIREWALLS, BUT ARE DESIGNED TO SUPPLEMENT NETWORK FIREWALLS AND PROTECT AGAINST ATTACKS ON SPECIFIC APPLICATIONS INSTEAD OF ATTACKS ON NETWORKS.
  • THEY DO THIS BY EXAMINING THE DATA IN PACKETS AS OPPOSED TO JUST THE DATA IN PACKET HEADERS THAT IS EXAMINED BY NETWORK FIREWALLS.
  • PACKETS ARE SMALL PIECES OF DATA THAT TRAVEL OVER A NETWORK. EACH PACKET HAS A PACKET HEADER TO IDENTIFY THE PACKET AND TO INDICATE ITS SENDING AND RECEIVING LOCATIONS.
88
Q

FIREWALL METHODOLOGIES

A

-PACKET FILTERING:
SIMPLEST TYPE OF FIREWALL CONFIGURATION
-CIRCUIT LEVEL GATEWAYS:
ONLY ALLOW DATA INTO A NETWORK THAT RESULT FROM REQUESTS FROM COMPUTERS INSIDE A NETWORK.
-APPLICATION LEVEL GATEWAYS:
AKA PROXIES, EXAMING DATA COMING INTO THE GATEWAY IN A MORE SOPHISTICATED FASHION.

89
Q

VIRUS

A

IS A PIECE OF COMPUTER PROGRAM THAT INSERTS ITSELF INTO SOME PROGRAM TO PROPAGATE. ALTERNATIVELY IT CAN RUN INDEPENDENTLY.

90
Q

DENIAL SERVICE ATTACK

A

-ONE COMPUTER BOMBARDS ANOTHER COMPUTER WITH A FLOOD OF INFO INTENDED TO KEEP LEGITIMATE USERS FROM ACCESSING THE TARGET COMPUTER NETWORK.

91
Q

WHICH OF THE FOLLOWING ACTIVITIES WOULD MOST LIKELY DETECT COMPUTER-RELATED FRAUD?

A
  • REVIEWING THE SYSTEMS-ACCESS LOG.
  • MOST OF THE TIME COMPUTER RELATED FRAUD HAS SOMETHING TO DO WITH AN UNAUTHORIZED ACCESS TO SYSTEMS AND/OR DATA.
  • SYSTEM ACCESS LOGS ARE ELECTRONIC LISTS OF WHO HAS ACCESSED OR HAS ATTEMPTED TO ACCESS SYSTEMS OR PARTS OF SYSTEMS OR DATA SUBSETS OF DATA.
92
Q

APPLICATION CONTROLS

A

-APPLICATION CONTROLS, PREVENT, DETECT AND CORRECT TRANSACTION ERROR AND FRAUD AND ARE APPLICATION SPECIFIC. PROVIDING REASONABLE ASSURANCE AS TO THE SYSTEM.
-ACCURACY
-COMPLETENESS
-VALIDITY
-AUTHORIZATION.
THE WORDS PROCESS AND SUBSYSTEM ARE QUITE SIMILAR TO THE WORD APPLICATION.

93
Q

PROCEDURES THAT ARE PART OF CONTROL ENVIRONMENT

A

PREVENTIVE CONTROLS:
-ARE CONTROLS DESIGNED TO PREVENT POTENTIAL PROBLEMS FROM OCCURRING.
-CORRECTIVE CONTROLS
CONTROLS DESIGNED TO FIX PROBLEMS THAT HAVE OCCURRED AND THAT HAVE BEEN LOCATED BY DEFECTIVE CONTROLS.
-DETECTIVE CONTROLS:
ARE CONTROLS THAT ARE DESIGNED TO LOCATE PROBLEMS THAT HAVE OCCURRED SO THAT THEY CAN BE FIXED BY CORRECTIVE CONTROLS.

94
Q

EXAMPLE OF ELECTRONIC ACCESS CONTROL FOR AN ONLINE REAL TIME HOTEL RESERVATION COMPUTER SYSTEM??

A

-A SYSTEM OF PASSWORDS TO ALLOW ACCESS TO THE SYSTEM (PASSWORDS ARE CHANGED ON A REGULAR BASIS)
-A FIREWALL THAT PREVENTS UNAUTHORIZED ACCESS TO THE NETWORK.
-PASSWORDS AND FIREWALLS ARE BOTH EXAMPLES OF ELECTRONIC ACCESS CONTROLS
PHYSICAL ACCESS CONTROL:
-RESTRICTED ACCESS TO THE HOTELS FRONT DESK IS A PHYSICAL ACCESS CONTROL.

95
Q

CIRCUIT LEVEL GATEWAYS

A

-CIRCUIT LEVEL GATEWAYS ONLY ALLOW DATA INTO A NETWORK THAT RESULT FROM REQUESTS FROM COMPUTER INSIDE THE NETWORK BY KEEPING TRACK OF REQUESTS THAT ARE SENT OUT OF THE NETWOK AND ONLY ALLOWING DATA IN THAT IS IN RESPONSE TO THOSE REQUESTS.

96
Q

PACKET FILTERING

A

EXAMINES PACKETS OF DATA AS THEY PASS THROUGH THE FIREWALL. PACKET FILTERING IS THE SIMPLEST TYPE OF FIREWALL CONFIGURATION.

97
Q

APPLICATION LEVEL GATEWAYS

A

-EXAMINING DATA COMING INTO THE GATEWAY. THEY CAN BE USED TO CONTROL WHICH COMPUTERS IN A NETWORK CAN ACCESS THE INTERNET AND CAN BE USED TO CONTROL WHICH INTERNET WEBSITE OR PAGES CAN VE VIEWED ONCE ACCESS IS ALLOWED.

98
Q

WHICH OF THE FOLLOWING STATEMENTS BEST CHARACTERIZES THE FUNCTION OF A PHYSICAL ACCESS CONTROL:

A
  • SEPARATES UNAUTHORIZED INDIVIDUALS FROM COMPUTER RESOURCES.
  • THE FUNCTION OF A PHYSICAL ACCESS IS TO SEPARATE UNAUTHORIZED INDIVIDUALS FROM COMPUTER RESOURCES. EXAMPLES ARE LOCKS ON DOORS TO COMPUTER ROOMS ETC. WHICH LIMIT PHYSICAL ACCESS TO COMPUTER RESOURCES TO PEOPLE WHO NEED SUCH ACCESS IN THE PERFORMANCE OF THEIR JOB RESPONSIBILITIES.
99
Q

FIREWALL

A

-IS AN ELECTRONIC DEVICE. IT MIGHT BE BOTH HARDWARE AND SOFTWARE THAT PREVENTS UNAUTHORIZED USERS FROM GAINING ACCESS TO NETWORK RESOURCES. A FIREWALL ISOLATES A PRIVATE NETWORK OF SOME TYPE FROM PUBLIC NETWORK. OR NETWORK SEGMENT FROM THE MAIN NETWORK. IT ALSO MAINTAINS A CONTROLLED CONNECTION BETWEEN THOSE TWO NETWORKS

100
Q

ACCESS CONTROL SOFTWARE

A

IS A PREVENTIVE CONTROL. IT PREVENTS BAD PEOPLE FROM ACCESSING AN ORG SYSTEMS AND DATA.

101
Q

HASH TOTAL

A

IS A DETECTIVE CONTROL

102
Q

WHICH OF THE FOLLOWING I/C PROCEDURES WOULD PREVENT AN EMPLOYEE FROM BEING PAID AN INAPPROPRIATE HOURLY WAGE

A

-LIMITING ACCESS TO EMPLOYEE MASTER FILES TO AUTHORIZED EMPLOYEES IN THE PERSONNEL DEPARTMENT.

103
Q

RISK ASSESSMENT

A
  • FIRST STEP IN RISK ASSESSMENT IS TO IDENTIFY THE RISKS.
  • TO EVALUATE THE RISK IN TERMS OF PROBABILITY OF OCCURRENCE, TO EVALUATE THE EXPOSURE IN TERMS OF POTENTIAL LOSS FROM EACH RISK TO IDENTIFY CONTROLS THAT COULD GUARD AGAINST THER RISKS, TO EVALUATE THE COSTS AND BENEFITS OF IMPLEMENTING THE CONTROLS AND TO IMPLEMENT THE CONTROLS THAT ARE COST EFFECTIVE.
104
Q

PROCESSING CONTROLS

A

INCLUDE

  • HASH TOTALS
  • RECALCULATION OF BATCH TOTALS AND SIMILAR PROCEDURES
105
Q

GENERAL CONTROL FOR A COMPUTERIZED SYSTEM

A

RESTRICTING ACCESS TO COMPUTER CENTER BY USE OF BIOMETRIC DEVICES REPRESENTS A GENERAL CONTROL.
-GENERAL CONTROLS ARE DESIGNED TO ENSURE THAT AN ORGANIZATIONS CONTROL ENVIRONMENT IS STABLE AND WELL MANAGED.

106
Q

A COMPANY’S WEB SERVER HAS BEEN OVERWHELMED WITH A SUDDED SURGE OF FALSE REQUESTS THAT CAUSED THE SERVER TO CRASH. THE COMPANY HAS MOST LIKELY BEEN THE TARGET OF?

A

-DENIAL OF SERVICE ATTACK.
IN A DENIAL OF SERVICE ATTACK, ONE COMPUTER BOMBARDS ANOTHER COMPUTER WITH A FLOOD OF INFO INTENDED TO KEEP LEGITIMATE USER FROM ACCESSING THE TARGET COMPUTER OR NETWORK. A SURGE OF FALSE REQUESTS THAT CAUSE A COMPANY’S SERVER TO CRASH IS A DENIAL OF SERVICE ATTACK.

107
Q

AUXILIARY POWER SUPPLY

A

-PROVISION OF UNINTERRUPTED ELECTRICITY MAY PREVENT ACCIDENTAL LOSS OF DATA BUT IT DOES NOT HELP A COMPANY RECOVER FROM A DISASTER THAT HAS ALREADY OCCURRED.

108
Q

DISASTER RECOVERY PLAN?

A

STORING DUPLICATE COPIES OF KEY FILES IN A SEPARATE LOCATION CAN HELP A COMPANY CONTINUE OPERATIONS IN THE EVENT A DISASTER DESTROYS THE ORIGINALS.

109
Q

DISASTER RECOVERY PLAN??

A

IT WOULD INCLUDE AN IDENTIFICATION OF CRITICAL APPLICATIONS

110
Q

TO PREVENT INTERRUPETED INFO SYSTEM OPERATION, WHICH OF THE FOLLOWING CONTROLS ARE TYPICALLY INCLUDED IN AN ORG DISASTERS RECOVERY PLAN?

A
  • BACKUP AND DOWNTIME CONTROLS.
  • DOWNTIME OR THE COMPLETE LACK THEREOF IS A KEY FACTOR IN DISASTER RECOVERY PLAN. BACKUP IS ALWAYS ESSENTIAL IN ANY DISASTER RECOVERY PLAN.
111
Q

MOST COMPLETE DISASTER RECOVERY PLAN?

A
  • ALTERNATE PROCESSING SITE
  • BACKUP AND OFF-SITE STORAGE PROCEDURES
  • IDENTIFICATION OF CRITICAL APPLS
  • TEST OF THE PLAN
112
Q

BUSINESS CONTINUITY

A

A BUSINESS CONTINUITY PLAN IS BROADER THAN A DISASTER RECOVERY PLAN. IT PROVIDES FOR CONTINUATION OF THE BUSINESS NOT JUST THE RECOVERY OF THE COMPUTER PROCESSING.

113
Q

WHICH METHOD INVOLVES COPYING ONLY THE DATA THAT HAS CHANGED SINCE THE LAST BACKUP?

A
  • INCREMENTAL
  • INCREMENTAL BACKUP INVOLVES COPYING ONLY THE DATA ITEMS THAT HAVE CHANGED SINCE THE LAST BACKUP. THIS PROCEDURES A SET OF INCREMENTAL BACKUP FILES, EACH CONTAINING THE RESULTS OF ONE DAYS TRANSACTIONS.
114
Q

DIFFERENTIAL BACKUP

A

IT COPIES ALL CHANGES MADE SINCE THE LAST FULL BACKUP

115
Q

FULL BACKAUP

A

IS AN EXACT COPY OF THE ENTIRE DATABASE.

116
Q

EXTRANET

A

-ARE NETWORKS THAT DIRECTLY LINK CERTAIN INTRANETS OF AN ORGANIZATION WITH OTHER ORGANIZATIONS OR INDIVIDUALS WITH WHICH THE ORGANIZATION MAY HAVE A RELATIONSHIP. EXTRANETS ENABLE CUSTOMERS VENDORS SUPPLIER CONSULTANTS SUBCONTRACTORS AND OTHERS TO GAIN ACCESS TO CERTAIN AREAS OF A PRIVATE INTRANET.

117
Q

DATA WAREHOUSE

A

IS AN ENTERPRISE-WIDE DATABASE THAT STORES DATA THAT HAS BEEN EXTRACTED FROM VARIOUS OPERATIONAL AND EXTERNAL DATABASES FROM WITHIN THE ORGANIZATION. THE DATA IN THESE DATA WAREHOUSES HAS BEEN GATHERED AND COMBINED FROM SEVERAL SOURCES INTO THIS MAIN CENTRAL LOCATION.

118
Q

LAN

A

A LOCAR AREA NETWORK (LAN) IS A COMPUTER NETWORK THAT CONNECTS COMPUTERS OF ALL SIZES WORKSTATIONS, TERMINALS AND OTHER DEVICES WITHIN A LIMITED PROXIMITY.

119
Q

FILE ORIENTED SYSTEM

A

-FILE ORIENTED SYSTEM FOCUSES ON INDIVIDUALS APPLICATIONS, EACH WITH ITS OWN SET OF FILES AND WITH EACH FILE PHYSICALLY SEPARATE FROM THE OTHER FILES.

120
Q

DATABASE MANAGEMENT SYSTEM

A

THE FOCUS IS ON THE DATA RATHER THAN A PARTICULAR APPLICATION. THIS LEADS TO DATA INDEPENDENCE, DATA STANDARDIZATION, ONE TIME DATA ENTRY, DATA SECURITY, AND SHARED DATA OWNERSHIP.

121
Q

ADVANTAGES OF MANAGEMENT SYSTEM (DBMS)

A
  • REDUCE DATA REDUNDANCY AND INCONSISTENCIES
  • DATA ACCESSIBILITY INCREASES THE TIMELINESS, EFFECTIVENESS, AND AVAILABILITY OF INFO.
  • ABILITY TO EXPAND DATA FIELDS WITHOUT AFFECTING APPLICATION PROGRAMS, INSTEAD, ALTERATIONS ARE NEEDED ONLY IN THE DBMS.
122
Q

DISADVANTAGES OF DBMS

A
  • INCREASED VULNERABILITY AS A COMMON DATABASE IS HIGHLY INTEGRATED. A BREAKDOWN IN HARDWARE OR SOFTWARE HAS A MCH MORE SEVERE EFFECT THAN IN A SYSTME HAVING SEPARATE FILES AND APPLICATIONS.
  • AUDIT TRAILS BEING SOMEWHAT OBSCURED AS THE RESULT OF MOVEMENT OF DATA FROM ONE FILE TO ANOTHER.
123
Q

COMPILER

A

A LANGUAGE PROCESSOR (TRANSLATOR)

124
Q

STATEMENTS FOR COMPUTER HARDWARE

A
  • VIRTUAL MEMORY IS MEMORY WHERE PORTIONS OF A PROGRAM THAT ARE NOT BEING EXECUTED ARE STORED, BUT IT IS NOT REAL MEMORY.
  • RAID IS DISK STORAGE WHERE MULTIPLE INEXPENSIVE DISK DRIVES ARE COMBINED INTO AN ARRAY.
125
Q

PROCESSORS AND PROCESSING POWER

A

MULTIPROCESSING IS THE COORDINATED PROCESSING OF PROGRAMS BY MORE THAN ONE PROCESSOR.

  • WHEN MULTIPLE PROCESSORS OR COMPUTERS PROCESS THE SAME PROGRAM, THERE IS AN EFFICIENCY LOSS TO PROVIDE THE CONTROL OF THE OVERALL PROCESSING. THIS FACTOR IS CALLED MULTIPROCESSING FACTOR.
  • IN ADDITION TO PROCESSING POWER THERE ARE MNAY OTHER FACTORS SUCH AS SPEED OF THE INPUT AND OUTPUT DEVICES THAT DETERMINE THE OVERALL PROCESSING POWER OF A COMPUTER SYSTEM.
  • PROCESSING POWER IS OFTEN MEASURED IN TERMS OF MIPS, WHICH IS MILLIONS OF INSTRUCTIONS PER SECOND
126
Q

APPLICATION SOFTWARE

A

WHEN APPLICATION SOFTWARE IS PURCHASED, MAINTENANCE FOR THE SOFTWARE MAY OR MAY NOT BE PURCHASED. MAINTENANCE IS NORMALLY UPDATES AND SUPPORT

127
Q

TELECOMMUNICATIONS NETWORK

A
  • A COMMUNICATION OR NETWORK PROTOCOL IS THE SET OF RULES THAT ALLOWS THE VARIOUS PIECES OF HARDWARE AND SOFTWARE THAT ARE INCLUDED IN THE NETWORK TO COMMUNICATE.
  • SOME OF THE FUNCTIONS OF TELECOMMUNICATIONS NETWOK ARE TO ESTABLISH AN INTERFACE BETWEEN THE SENDER AND THE RECEIVER OF THE MESSAGE AND TO TRANSMIT THE MESSAGE.
  • A BRIDGE IS USED TO CONNECT SEGMENTS OF A LAN WHICH BOTH USE THE SAME SET OF NETWORK PROTOCOLS.
128
Q

GATEWAYS

A

CONNECT DIFFERENT TYPES OF NETWORKS

129
Q

ROUTERS

A

ROUTERS ROUTE PACKETS OF DATA THROUGH INTERCONNECTED LANS

130
Q

JOB CONTROL LANGUAGE

A

JOB LANGUAGE IS SOMETHING ASSOCIATED WITH IBM MAINFRAMES, SPECIALLY BATCH PROCESSING APPLICATIONS JOB CONTROL LANGUAGE, WHICH CAN BE ALMOST AS COMPLEX AS ANY PROGRAMMING LANGUAGE IS USED TO INTERFACE BETWEEN THE JOBS THAT ARE TO BE RUN AND THE OPERATING SYSTEM. JOBS NORMALLY CONSISTS OF MULTIPLE PROGRAMS TO BE RUN, AND THE JOB CONTROL LANGUAGE CONTROLS THE RUNNING OF THE JOBS AND PROGRAMS. IT ALSO ALLOWS THE PROGRAMS TO BE WRITTEN SOMEWHAT GENERICALLY, AND THE JOB CONTROL LANGUAGE MAKES THE TRANSLATION.
-THE WORD LANGUAGE IMPLIES SOME KIND OF SOFTWARE JUST LIKE ANY PROGRAMMING LANGUAGE.

131
Q

HARDWARE EXAMPLES

A
  • MULTIPLEXER
  • CONCENTRATOR
  • PERIPHERAL PROCESSORS
132
Q

MOST CLIENT/SERVER APPLICATION OPERATE ON A 3 TIERED ARCHITECTURE CONSISTING OF WHAT LAYERS

A
  1. DESKTOP CLIENT
  2. APPLICATION
  3. DATABASE.
133
Q

THE TYPE OF DATABASE THAT IS CONNECTED BY A COMPANY’S LAN IS ……

A

DISTRIBUTED DATABASE
-DISTRIBUTED DATABASE IS A DATABASE THAT IS DISTRIBUTED IN SOME MANNER ON DIFFERENT PIECES OF EITHER LOCAL OR REMOTE HARDWARE VIA AN INTERNET OR EXTRANET.

134
Q

DATA WAREHOUSE

A

STORES DATA FROM BOTH OPERATIONAL AND MANAGEMENT DATABASES FRO CURRENT AND PREVIOUS YRS.

135
Q

ANALYTICAL DATABASE

A

THEY STORE DATA AND INFO EXTRACTED FROM OPERATIONAL DATABASES. THESE DATABASES CONSISTS OF SUMMARIZED DATE USED PRIMARILY BY MANAGERS IN AN ORG

136
Q

NODE

A

IS A COMPUTER, PRINTER, SCANNER OR OTHER DEVICE CONNECTED TO A NETWORK

137
Q

MODEMS

A

ARE USED FOR COMMUNICATION BY TRANSLATING DIGITAL DATA INTO ANALOG FORMAT AND VICE VERSA.

138
Q

BROADBAND

A

MEANS HIGH SPEED TRANSMISSIONS OF DATA SUCH AS CABLE AND DSL.

139
Q

NETWORK INTERFACE CARD

A

A NETWORK INTERFACE CARD, MUST BE INSTALLED IN ALL COMPUTERS/NODES IN A CLIENT SEVER NETWORK IN JUST THE SAME WAY PEER TO PEER NETWORK. THERE IS NO CHANGE IN HARDWARE REQUIREMENTS BASED ON NETWORK TYPE.

140
Q

NETWORK INTERFACE CARD (NIC)

A

-A NETWORK INTERFACE CARD IS A CIRCUIT BOARD INSTALLED ON A NODE THAT ALLOWS THE NODE TO CONNECT WITH AND COMMUNICATE OVER THE NETWORK.

141
Q

NORMALIZATION

A

IS THE PROCESS OF SEPARATING DATA INTO LOGICAL TABLES.

DATA NORMALIZATION IS REQUIRED BEFORE A RELATIONAL DATABASE CAN BE DESIGNED.

142
Q

RELATIONAL DATABASES

A

DATA IS STORED IN 2-DIMENSIONAL TABLES THAT ARE RELATED TO EACH OTHERS BY KEYS

143
Q

OBJECT ORIENTED DATABASES

A

THEY CAN BE USED TO STORE COMMENTS, DRAWINGS, IMAGES, VOICE AND VIDEO THAT DO NOT NORMALLY FIT INTO MORE STRUCTURED DATABASES
-THEY ARE NORMALLY SLOWER THAT RELATIONAL DATABASES.

144
Q

PROGRAMMING LANGUAGES

A
  • FOURTH GENERATION LANGUAGES ARE LANGUAGES THAT ENABLE END USERS TO DELOP APPS WITH LITTLE OR NOT TECHNICAL ASSISTANCE.
  • PROGRAMS ARE NORMALLY WRITTEN IN SOURCE CODE THAT IS THEN TRANSLATED INTO OBJECT CODE. THE TRANSALTION IS THE COMPILATION OR INTERPRETATION OF THE SOURCE CODE. IF A PROGRAM IS COMPILED, BROADLY SPEAKING, THE OBJECT CODE IS RETAINED AND IS WHAT IS EXECUTED. IF A PROGRAM IS INTERPRETED THE INTERPRETED CODE IS WHAT EXECUTES. IF THE PROGRAM IS EXECUTED AGAIN , IT IS INTERPRETED AGAIN.
  • EXAMPLE OF MODERN PROGRAMMING LANGUAGES ARE C, C++, VISUAL BASIC AND JAVA.
  • PROGRAMS MAY BE EITHER INTERPRETED OR COMPILED. HOWEVER, WHEN PROGRAMS ARE INTERPRETED NOT COMPILED EACH LINE OF SOURCE CODE IS CONVERTED INTO EXECUTABLE CODE IMMEDIATELY BEFORE IT IS EXECUTED. INTERPRETATION IS NORMALLY SLOWER THAN COMPILATION BECAUSE IT IS HARDER TO OPTIMIZE FOR PERFORMANCE AN INTERPRETED PROGRAM. OPTIMIZATION NORMALLY IS PART OF THE COMPILATION OR LINKING PROCESS.
145
Q

DATA MINING

A

CAN BE DEFINED AS THE EXTRACTION OF IMPLICIT PREVIOUSLY UNKNOWN AND POTENTIALLY USEFUL INFO FROM DATA.

  • IT IS USUALLY ASSOCIATED WITH AN ORGANIZATIONS NEED TO IDENTIFY TRENDS. DATA MINING INVOLVES THE PROCESS OF ANALYZING THE DATA SHOW PATTERNS OR RELATIONSHIPS IN THAT DATA.
  • THUS PATTERN RECOGNITION OR THE ABILITY OF THE DATA MINING SOFTWARE TO RECOGNIZE THE PATTERNS OR TRENDS. IS THE CRITICAL SUCCESS FACTOR FOR DATA MINING.
146
Q

TRANSMISSION CONTROL PROTOCOL AND INTERNET PROTOCOL

A
  • EVERY SITE CONNECTED TO A TCP/IP NETWORK HAS A UNIQUE ADDRESS.
  • TCP/IP IS THE NETWORK PROTOCOL UPON WHICH THE INTERNET IS BASED.
147
Q

PRIMARY FUNCTION OF A DATABASE MANAGEMENT SYSTEM?? (DBMS)

A

A PRIMARY FUNCTION OF A DATABASE MANAGEMENT SYSTEM IS TO PROVIDE THE CAPABILITY TO CREATE AND MODIFY THE DATABASE.

148
Q

VAN PERFORMS WHICH OF THE FOLLOWING FUNCTIONS??

A

VANS ARE OFTEN USED TO ROUTE DATA TRANSACTIONS BETWEEN TRADING PARTNERS.

149
Q

LINUX

A
  • LINUX IS WRITTEN IN THE C PROGRAMMING LANGUAGE
  • UNIX WAS DESIGNED TO RUN INTERACTIVE, TIME SHARING, ONLINE APPS WITH CONSIDERABLE USER INTERFACE
  • THE UNIX OPERATING SYSTEM IS DIVIDED INTO 2 PIECES: THE KEMEL AND THE SHELL. THE KEMEL HANDLES TAKS OF MEMORY ALLOCATION, DEVICE INPUT/OUTPU PROCESS ALLOCATION, SECURITY AND USER ACCESS. THE SHELL HANDLES USERS INPUT AND INVOKES OTHER PROGRAMS TO RUN COMMANDS.
150
Q

VIRTUAL PRIVATE NETWORK

A

-PROVIDES AN ENCRYPTED COMMUNICATION TUNNEL ACROSS THE INTERNET THAT ALLOWS REMOTE USERS TO SECURE ACCESS TO A NETWORK (VPN)

151
Q

AN ACCOUNTING INFO SYSTEM IS DISTINGUISHED FROM MANAGEMENT INFO SYSTEM BY THE FACT THAT

A
  • AN IAS IS A SUBSYSTEM WITHI MIS
  • AIS DEALS WITH ACCT INFO, IT IS PART OF AN MIS
  • AIS IS NOT CONTROL ORIENTED
152
Q

COMPONENTS OF LAN

A
  • NODE
  • NETWORK INTERFACE CARD (NIC)
  • NETWORK OPERATING SYSTEM (NOS)
153
Q

DATABASE MANAGEMENT SYSTEM (DBMS)

A

-IT IS A SEPARATE SET OF COMPUTER PROGRAMS THAT ALLOWS AN ORG TO CREATE NEW DATABASES, USE AND WORK WITH THE DATA IN A DATABASE AFTER THE DATABASE HAS BEEN CREATED, AND ALSO ALLOWS FOR MAINTENANCE TO BE PERFOROMED ON DATABASE AFTER IT HAS BEEN PLACED INTO OPERATION.

154
Q

VAN CHARACTERISTICS

A

AUTOMATIC ERROR DETECTION, PROTOCOL CONVERSION, AND MESSAGE STORING AND FORWARDING SERVICES.

155
Q

INTRANET

A

CONNECT GEOGRAPHICALY SEPARATE LANS WITHIN AN ORGANIZATION.
INTRANET ARE PRIVATE NETWORKS THAT PEOPLE OUTSIDE OF AN ORGANIZATION GENERALLY HAVE NO ACCESS TO. INTRANETS SHARE ORGANIZATIONAL INFO BY CONNECTING GEOGRAPHICALLY SEPARATE LAN WIHIN AN ORG.

156
Q

DATA MINING

A

AN ANALYSIS OF LARGE AND DIVERSE AMOUNTS OF DATA INCLUDED IN DATA WAREHOUSES.
-DATA MINING REFERS TO THE PROCESS OF SITTING THROUGH LARGE AMOUNTS OF DATA IMPOSSIBLE TO ANALYZE BY INDIVIDUALS TO SEACHR FOR RELATIONSHIPS AMONGS VARIOUS DATA AS A MEANS FOR ACHIEVING STRATEGIC OR COMPETITIVE ADVANTAGE.

157
Q

COMPONENT OF LAN

A

A TRANSMISSION MEDIA IS ONE COMPONENT OF A LAN. OTHER COMPONENTS ARE:

  • NODES
  • WORKSTATIONS
  • SERVERS
  • NETWORK INTERFACE CARDS
  • OPERATING SYSTEMS
  • COMMUNICATION DEVICES
158
Q

DATABASE ADMINISTRATOR

A

IS A HUMAN RESPONSIBLE FOR THE DESIGN, MAINTENANCE AND SECURITY OF THE DATABASE.

159
Q

DATABASE MANAGEMENT SYSTEM

A

DBMS:

  • DATA DEFINITION LANGUAGE (DDL) IS ONE OF THE TOOLS THAT IS COMMONLY FOUND IN DBMS. THESE TOOLS HELP THE DATABASE ADMIN DESING AND MAINTAIN THE DATA ELEMENTS THEMSELVES AS WELL AS DEFINE RELATIONSHIP AMONG DATA ELEMENTS.
  • MINIMIZING DATA REDUNDANCY IS A PRIMARY GOAL OF DBMS
  • INCREASED USER INTERFACE WITH THE SYSTEM THROUGH INCREASED ACCESSIBILITY AND FLEXIBILITY IS A COMMON BENEFIT OF USING DBMS.
160
Q

WHICH OF THE FOLLOWING BEST CHARACTERIZES A DECISION SUPPORT SYSTEM (DSS)

A

-INTERACTIVE SYSTEM

DECISION SUPPORT SYSTEM ARE INTERACTIVE

161
Q

DATA MINING

A
  • DATA MINING IS THE ANALYSIS OF DATA IN A WAREHOUSE PERFORMED IN ORDER TO ATTEMPT TO DISCOVER HIDDEN PATTERNS AND TRENDS IN BUSINESS.
  • DATA MINING ASSIST MANAGERS IN MAKING BUSINESS DECISIONS AND STRATEGIC PLANNING.
162
Q

PURCHASED APPLICATION PACKAGES

A

-IF A APP PACKAGE IS PURCHASED FROM AN OUTSIDE VENDOR AND INSTALLED, SYSTEM ANALYSTS MAY BE CALLED SYSTEM INTEGRATORS. FOR PURCHASED PURCHASED APPS THEIR MAIN RESP WOULD BE TO DESING INTERFACES TO CONVER THE INITIAL DATA FOR THE APP AND TO PROVIDE TRAINING TO END USERS

163
Q

PROCESSING POWER IS OFTEN DESCRIBED IN TERMS OF MIPS

A

MIPS MEASUREMENT IS ONLY ONE OF THE FACTORS IN DETERMINING THE OVERALL PROCESSING POWER OF A PARTICULAR PROCESSOR OR COMPUTER SYSTEM.

164
Q

MULTIPROGRAMMING

A

IS SEVERAL PARTS OF A PROGRAM RUNNING AT THE SAME TIME ON A SINGLE PROCESSOR.
IN MULTIPROGRAMMING SINCE THERE IS ONLY ONE PROCESSOR ONLY ONE PART OF A PROGRAM CAN ACTUALLY RUN AT A SINGLE POINT IN TIME.

165
Q

VALID CODE TESTS

A

VALID CODE TESTS ARE TEST WHERE CODES ENTERED ARE CHECKED AGAINST VALID VALUES IN A MASTER FILE.
VALID CODE TESTS ARE AN EFFECTIVE CONTROL ON THE ENTRY OF THE DOLLAR AMOUNTS IN ITS TRANSACTIONS.