Chapter 4 Flashcards

1
Q

In a batch system, individual transactions are…

A

Assigned to groups before posting, and each transaction has it’s OWN line entry in the appropriate ledger. (the batches are processed periodically such as daily, weekly, monthly)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The characteristic of transactions processed within each individual transaction cycle is that…

A

Transactions are numerous but are generally similar and processed nearly identically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a transaction log?

A

It includes all transactions, including payments made to a vendor, that have been processed against the master files. Since any changes to vendor accounts would have to be applied by a transaction, the transaction logs would reflect incorrectly applied adjustments as well as the original correct transactions. (also would include the identity of the person who authorized the transaction)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of system is a payroll system?

A

A transaction processing system (TPS). It may use a database management system to store its data, but it is not a database management system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an ad hoc report?

A

One that is created on demand generally to meet unique specifications that respond to a specific requirement. A well designed database system should be able to produce this report when required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is online analytical processing?

A

It allows end users to retrieve data from a system and perform analysis using statistical and graphical tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the relationship between system analysts, application programers, and system programers?

A

The duties of a system analysts and application programers can be and ofter are combined. The duties of system programmers and and application programers should NOT be combined

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Can a database administrator and a network administrator be the same person?

A

Yes, but it is rare. Since the skill sets of database administrator and network administrator are both highly technical and very specialized, it is unlikely that one person will be able to perform both functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the role of an application programer (software developer/engineer)

A

They are responsible for writing and or maintaining application programs. They should NOT have access to data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are decision support systems?

A

They are computer based information systems that provide INTERACTIVE support to managers or others during the decision making process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Reviewing an audit log is which kind of security control?

A

Detective control. They are generally chronological records that provide documentary evidence of the sequence of activities that can be used to detect errors or irregularities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does a database administrator do?

A

They control the database, not the data, and duties generally include design of the firms database, maintaining security measures, and controlling data structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What should always be included in the system specification document for a financial report?

A

Data elements. They define the building blocks of the information provided in a financial report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the five focus areas identified by COBIT for IT governance?

A
  1. Strategic Alignment
  2. Value Delivery
  3. Resource Management
  4. Risk Management
  5. Performance Measurement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When changing from a manual system to a computer system, what is true about the controls?

A

Methodologies for implementing the controls change. That does not mean that they are better or worse, but they are definitely different

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the primary objective of data security controls?

A

To ensure that storage media are subject to authorization prior to access, change, or destruction. The objective is to protect information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the purpose of a digital signature?

A

It is a means of ensuring that the sender of a message is authentic. The digital signature uses encryption so that the recipient of the message can be assured that it is from the sender that is shown

18
Q

What is the difference between a program-level policy and a program-framework policy?

A

A program-level policy describes information security and assigns responsibility for achievement of security objectives to the IT department.
A program-framework policy adds detail to the IT program by describing the elements and organization of the program and department that will carry out the security mission

19
Q

What is one advantage of using the internet for EDI transactions rather than a traditional value added Network (VAN)?

A

The internet permits EDI transactions to be sent to trading partners as transactions occur (rather than batching them periodically as with a VAN)

20
Q

What would a manufacturing company use if they wanted to be able to place material orders more efficiently?

A

Electronic Data Intercharge (EDI). This would allow them to “place” material orders more efficiently and would utilize EDI for placing those order and also for other “paperwork” between the company and it’s vendors

21
Q

Define electronic data interchange (EDI)

A

Electronic (computer-to-computer) exchange of business transaction documents (business information). It is always between two separate businesses (not internally)

22
Q

What is one benefit of EDI?

A

It would create a compressed business cycle with lower year-end receivables balances. Since it speeds transaction processing, the business cycle is generally shortened and year-end receivable balances are reduced

23
Q

Does EDI require a prior relationship to do business?

A

EDI requires that companies have a prior relationship. Agreements will have been drawn up between the companies to outline how the systems will operate.

24
Q

What is a virus?

A

It is a piece of computer program that inserts itself into some other program to propagate. A virus cannot run independently

25
Q

What are application controls?

A

They are written into the application and are particular to the particular process or subsystem (rather than relating to the timing of its occurrence)

26
Q

What are circuit level gateways?

A

They only allow data into a network that results from computers inside the network by keeping track of requests that are sent out of the network and only allowing data that is in response to those requests

27
Q

What is access control software?

A

Access control is a preventative control. It prevents “bad people” from accessing an organizations system and data

28
Q

To prevent interrupted information systems operation, what controls are included in a company’s disaster recovery plan?

A

Backup and downtime controls. Downtime is a key factor in the disaster recovery plan. Backup is always essential in any disaster recovery plan

29
Q

What is a business continuity plan?

A

It is broader than a disaster recovery plan. It provides for continuation of all areas of the business (eg manufacturing operations) not just for recovery of the management information systems

30
Q

What is a file oriented system?

A

It focuses on individual applications, each with its own set of files and with each file physically separate from the other files

31
Q

What is a database management system (DBMS) (and name an example)?

A

The focus in a DBMS is on data rather than a particular application. This leads to data independence, data standardization, one-time data entry, data security, and shared data ownership (example is Microsoft Access)

32
Q

What is MIPS?

A

Millions of instructions per second. Processing power is measured in MIPS.

33
Q

What is the difference between gateways and routers?

A

Gateways connect different types of networks. Routers route packets of data through interconnected LANs

34
Q

What is a three-tier architecture?

A

A desktop client, application, and database

35
Q

What is data mining?

A

It is the extraction of implicit, previously unknown, and potentially useful information from data. Orgs need to identity trends. process of analyzing data to show patterns or relationships in that data.

36
Q

What is a common use of a VAN?

A

They are often used to route data transactions between trading partners (NOT INSIDE a company)

37
Q

What is a distributed database?

A

A database that is distributed in some manner on different pieces of either local or remote hardware via an intranet or an extranet. It is connected by a company’s local area networks.

38
Q

What is a value added network?

A

They are privately owned communications networks that provide additional services beyond standard data transmission. They provide good security because they are private networks

39
Q

What is the database administrator?

A

It is a person who is responsible for the design, maintenance and security of the database

40
Q

What are the components of a local area network (LAN)

A

transmission media, nodes, workstations, servers, network interface cards, operating systems, and communication devices.

41
Q

What item is most critical to include in a systems specifications document for a financial report?

A

Data elements should always be included. They define the building blocks of the information provided in a financial report

42
Q

What is transaction processing?

A

It is the term used to describe processing large numbers of commonly occurring business events in a predefined, highly structured way. Common transaction processing systems include sales, cash receipts, accounts payable, etc.