Chapter 4 Flashcards
In a batch system, individual transactions are…
Assigned to groups before posting, and each transaction has it’s OWN line entry in the appropriate ledger. (the batches are processed periodically such as daily, weekly, monthly)
The characteristic of transactions processed within each individual transaction cycle is that…
Transactions are numerous but are generally similar and processed nearly identically
What is a transaction log?
It includes all transactions, including payments made to a vendor, that have been processed against the master files. Since any changes to vendor accounts would have to be applied by a transaction, the transaction logs would reflect incorrectly applied adjustments as well as the original correct transactions. (also would include the identity of the person who authorized the transaction)
What type of system is a payroll system?
A transaction processing system (TPS). It may use a database management system to store its data, but it is not a database management system
What is an ad hoc report?
One that is created on demand generally to meet unique specifications that respond to a specific requirement. A well designed database system should be able to produce this report when required
What is online analytical processing?
It allows end users to retrieve data from a system and perform analysis using statistical and graphical tools
What is the relationship between system analysts, application programers, and system programers?
The duties of a system analysts and application programers can be and ofter are combined. The duties of system programmers and and application programers should NOT be combined
Can a database administrator and a network administrator be the same person?
Yes, but it is rare. Since the skill sets of database administrator and network administrator are both highly technical and very specialized, it is unlikely that one person will be able to perform both functions
What is the role of an application programer (software developer/engineer)
They are responsible for writing and or maintaining application programs. They should NOT have access to data
What are decision support systems?
They are computer based information systems that provide INTERACTIVE support to managers or others during the decision making process
Reviewing an audit log is which kind of security control?
Detective control. They are generally chronological records that provide documentary evidence of the sequence of activities that can be used to detect errors or irregularities
What does a database administrator do?
They control the database, not the data, and duties generally include design of the firms database, maintaining security measures, and controlling data structure
What should always be included in the system specification document for a financial report?
Data elements. They define the building blocks of the information provided in a financial report
What are the five focus areas identified by COBIT for IT governance?
- Strategic Alignment
- Value Delivery
- Resource Management
- Risk Management
- Performance Measurement
When changing from a manual system to a computer system, what is true about the controls?
Methodologies for implementing the controls change. That does not mean that they are better or worse, but they are definitely different
What is the primary objective of data security controls?
To ensure that storage media are subject to authorization prior to access, change, or destruction. The objective is to protect information.