Information Technlogy Flashcards
Processes data and transactiosn to provide users with the information they need to plan, control and operate an organization
Information Systems
An IS designed to improve productivity by supporting daily work of employees (ex. word processing, email, etc)
Office automation system
An IS that involves hte daily processing of transactions (ex. payroll processing)
Transaction processing system
An IS designed to help with the decision making process by providing access to computer data
Management reporting system
A management reporting system that’s designed to provide past, present and future information for planning, organzing, and controllin the operations of hte organization
Management information system
A management reporting system that combines models and data to resolve NONSTRUCTURED problems with extensive user involvement
Decision support system
A management reporting system that applies resoning methods to data in a specific relatively structured area to render advice or recommendations, much like a human expert
Expert system
A managmenet reporting system that is specifically designed to support executive work
Executive IS
The traditional methodology for developing information systems, characterized by its phases, each representing a specific set of development activities: Planning Analysis Design Development Testing Implemntation Maintenance
Systems Development Lifecycle (SDLC)
Phase of SDLC in which the problem is identified, plan is developed, and scope
Planning Phase
Phase of SDLC in which teams are developed to analyze the problem and system and create a needs assessment and gap analysis
Analysis Phase
Phase of SDLC where technical blueprints are built
Design Phase
Phase of SDLC in which the documents from the design phase are transformed into the actual system
Development Phase
Phase of SDLC in which tests are done to verifythat hte sytem works and meets the business requirements
Testing Phase
TEsting the units or pieces of code
Unite testing
Testing of the integration fo the units or pieces of code into a sytem
System testing
T
Testing whether the separate systems can work together
Integration testing
Testing whether the system meets the business reqquirements and enables users to perofrm their jobs efficently and effectively
User acceptance testing
The phase of SDLC involves putting the system in operation by the users
Implementation phase
Involves using both systems until it is determined that hte new system is operating properly
Parallel implementation
Ceasing using the old system and beginning using hte new system immediately (low cost, high risk)
Pluge implementation
Having a small group of individuals using the new system until it is seen to be working properly
Pilot implemntation
Installing a new system in a series of phases
Phased implementation
Phase of SDLC that ivolves monitoring and uspporting the new system
Maintenance phase
Extremely powerful, high-speed computers used for extremely high-volume and/or complex processing needs
Super computers
Large, powerful, high-speed computers traditionally used for high-volume transaction processing
Mainframe computer
High-powered microcomputers that serve applications and data to clients that are connected via a network; typically hae greater capacity than their clients and often act as a central repository for organizational data
Server
Computers designed to be used by one person at a time ; often called personal computers
Microcomputers
The principal hardware components of a computer; contains:
- an arithmetic/logic unit
- primary memory
- control unit
major function is to fetch stored instructions and data, decode the instructions, and carry them out
Central Processing Unit (CPU)
Part of CPU that performs mathematical operaions and logical comparisons
Arithmetic/logic unit
Active data nd program steps that are being processed by the CPU; can be devided into RAM (Random-access memory) and ROM (Read-only memory)
Primary memory (storage)
Part of CPU that interprets program instructions and coordinates input, output, and storage devices
Control unit
Slowest type of storage available because data is stored sequentially; primarily used for archiving purposes today
Magnetic tape
The mot common storage medium in use on computers today; data can be accessed directly
Magnetic disks (hard disks, Hard disk drives)
A way of storing the same data reduntantly on multiple magnetic disks
RAID (Redundant array of independent disks)
Disks (CDs) and DVDs that use optical technology toread and write data to the diskc
Compact discs
Use microchips to store data and rquire no moving parts for read/write operations; faster and more expense than CDs, DVDs, and HDDs,
Solid State Drives (SSDs) “flash drives” USB drives”
storage hosted offsite, typically by third parties, and accessed via the Internet
Cloud-Based storage ; “Storage as a Service” (SaaS)
One binary digit
bit
A series of 8 bits
byte
a representation that is produced by the fluctuations of a continous signal (rather than using 0s and 1s) to transmit the functuations in the signal itself to represnet information
Analog
Equipment in direct communication with, and under the control of, the CPU; and having connection to the internet
online
Equipment not in direct communication with eCPU; the operator generally must intervene to connect this equipment or data to the CPU; also refers to lack of internet connection
Off-line
A terminal used for communication between the operator and the computer
Console
All non-CPU hardware that may be placed under the control of the central processor (consists of input, storage, output, and communication)
peripheral equipment
Hardware units designed to operate specific input-output units
Controllers
A temporary storage unit used to hold data during coomputer operaionts
Buffer
Millions of instructions per second; a unit for measuring the execution speed fo computers
MIPS
Uses keyboard to directly enter data into computer
Visual display terminal/monitors
A program that controls the display for hte user (usually on a computer monitor) and allows the user to interact with the system
Input interface
Uses icons, pictures, and menus instead of text for inputs
Graphical User interface (GUI)
Uses text-type commands
Command line interface
Documents that are sent to the customer and returend as inputs (ex. utility bills)
Turnaround documents
A device capable of sensing information recorded as magnetic spots on magnetic tape
Magnetic tape reader
Device that reads characters that have been encoded witha magnetic ink (ex. bank check readers)
Magnetic ink character reader (MICR)
A machine used to execute and record transacitons with financial instiutions
Automatic teller machine (ATM)
Uses radio waves to track and input data–increasingly used for inventory and contactless payment sistems
RFID Radio Frequency Identification (ex. Mobil’s speedpass)
Devices that read price and product code data–function as boht a terminal and cash register
Point of sale(POS) recorders
Manages the input , output, processing and storage devices and operations of a computer (ex. Windows, Linus, Unix)
Operating system
Handle common file, data manipulation, and housekeeping tasks
Utility programs
Controls and supports transmission between computers, computers and monitors, and acceses various databases
Communications software
Programs designed for specific uses, or “applications” such as Word processing, email, and accounting sofware
Applications sofware
Accounting software where everything is in an allin one package; designed for small orgnaizations
Low-end accounting software
Accounting software that is designed in modules (ex. general ledger, receivables)
High-end accounting software
Accounting software designed as relatively complete information system “suites” for large and medium size organizations (ex. HR, financial, manufacturing,e tc)
Ex. SAP, PeopleSoft, Oracle
Enterprise Resource Planning (ERP)
Produces a machine language object program from a source program language
compiler
Simultaneous execution of two or more tasks, usually by two or more CPUs that are part of the same system
Multiprocessing
Teh ismultaneous processing of several jobs on a computer
Multitasking
The conveted source program that was chagnedusing a compiler to creat a set of machien readable instructions that eh CPU understands
Object program
A program writte in a language from which statments are translated into machine language (0’s and 1’s)
Source program
combinations of 1;s and 0’s that are meaningful to a the computer
machine languagw
A low-level programming language that uses words (mneomonics) instead of numbers to perform an operation–can be translated to machine language using an assembler
Assembly language
Translates assembly language into machine language
Assembler
Keep together data structures and procedures through a procedure referred to as encapsulation Include classes (a set of objects with similar structures) and inheritance (the ability to create new classes from existing classes)
Object-oriented programs
Online secondary memory that is used as an extension of primary memory, thus giving hte appearance of larger, virtunally unlimited internal memory
Virtual memory (storage)
Rules determining the required format and methods for transmission of data
Protocal
REveiw of a program by the programmer for errors befroe the program is run and debugged on the computer
Desk checking
To find and eliminate errors in a computer program–often assisted by compilers
debug
To correct input data prior to processing
Edit
A set of program instructions performed reptitively a predetermined number of times, or until all of a particular type of data has been processed
Loop
A listing of hte contents of storage
Memory dump
A section of coding inserted into a program to correct a mistake or to alter a routine
Patch
A complete cycle of a program including input, processing and output
Run
Groups of like transactions
batch
Databases that support day-to-day operations (ex. airline reservation systems, bank ATMS)
Online transaction processing (OLTP)
A getegory of software technology that enables the user to query the system and conduct an alaysis ordinarily while the user is at teh PC—primarily used for analytical analysis
-use statistical and graphical tools
Used as decision support systems
Online Analytical Processing (OLAP)
A subject-orientied, integrated collection of data used to support managment decision making processes
Data warehouse
a data warehouse that is limited in scope
data mart
Using sophisticated techniques from stats, artificial intelligence and computer graphics to explain, confirm, and explore relationships among data
data mining
A combination of systems that help aggregate, access and analyze business data and assist in teh business decision-making process
Business Intelligence
Computer software designed to help humans make decisions—may be viewed as an attempt to model aspects of human thought on computers
Artificial Intelligence
Processing that occurs at one location (typically using a mainframe computer)
centralized processing
Processing and data are stored on computers at multiple locations with the computeres not interconnected by a network
(ex. end-user computing)
Decentralized processing
Processng in which transactions for a single database are processed at various sites (ex. MN office processes payroll for MN emplyees, while WI office processes payfroll forWI employees, but all update the payroll database)
Can be either batch or real time processing
Distributed processing
A group of related characters (ex. social security number)
field
An ordered set of logically related fields; for example, all payroll data relating to a single employee
record
A group of related records (ex. all weekly pay records to date) which is usually arranged in sequence
File
A group of related records in a relational database with a unique identifier (primary key) in each reacord
table
A group of related files or a group of related tables
database
In a programming language, an aggregate that consists of data objects with attributes each which may be uniquely referenced by an index (address)
-often used with object-oriented programs such as C++ and Java
Array
A file containing relatively permanent information used as a source of reference and periodically updated witha detail file
Master file
A file containing current transaction information used to update the master file
Detail or transaction file
Systems that focus upon data processing needs of individual departments; each application program or system is designed to meet the needs of the particular requesting department–similar to traditional accounting (ex. files set up for purchasing, cash receipts, sales, etc.)
Traditional File processing systems
the process of separating a database into logical tables to avoid certain kinds of updating difficulties (known as anomolies)
Normalization
Computer hardware and software that enables the database to be implemented
database system
Software that provides a facility for communications between various applications proframds and the database
database management system
Basic to database systems is this concept which separates the dta from the related application programs
data independence
Indentifying tand organizaing a database’s data, both logically and physically; determining what info will be in the database, how it will be used, and how they will be related to eachother
database modeling
An approach to data modeling that divides a database into entities and relations
Entity-relationship modeling
The field that makes a record in a relational database unique
primary key
Teh fields that are common to two or more related tables in a relational database
secondary/foreign key
A data modle deisnged for use in designing accounting information databases using REsources, Event,s nad Agents
REA data model
A data structure that stores meta-data
data dictionary/repository/directory
Definitional data that provides information about or documentation of other data managed within an application environment
meta-data
The most common language used for creating and querying relational databases
Structured query language (SQL)
SQL used to define a database, including creating, altering, and eleting tables and establishing various constraints
Data definition language (DDL)
SQL that has commands used to maintain an query a database, including updating, inserting in, modifying, and querying
Data manipulation language (DML)
SQL that is commands used to control a database, including controlling which users have varous privileges
Data Control Language (DCL)
A database structure in which the data elements at one level “own” the data elements at the next lower level
Heirarchical databases
A data base structure in which each data element can have several owners and can own several other elements
Networked databases
A database with logical structure of a group of related spreadsheets *have largely replaced heirarchical and networked databases)
Relational databases
Databases iin which information (attritubtes and methods) are included in structures called object classes **the newest database management system technology
Object-oriented databases
Database structures that include both relational and object-oriented features
Object-relational databases
A single database that is spread physically across computers in multiple locations that are connected by a data communications link
Distributed database
Controls that limit the user to reading and/or changing otnly authorized portions of hte database
Access controls
Controls that limit the access of users to the database, as well as operations a particular user may be able to perform (ex. read-only privileges)
restriction privileges
A control in which users may be provided with autorized views of only the portion of the database for which they have a valid need
Logical views
Backing up an entire database several times per week, generally to magnetic tape; use most recent copy of the database to reconstruct if something goes wrong
Backup of database and logs of transactions
Replicating hte database at one or more locations
database replication
Maintaining a backup facility with a vendor who will process data in case of emergency
backup facility
the indvidual responsible for maintaing the database and restricting access to the database to authorized personnel
database administrator (DBA)
A group of interconnected computers and terminals
network
The electronic transfer of information between networks and computers
telecommunications
A computer network that is centered around an individual and the personal communication devices he/she uses (ex. bluetooth, USBs)
Personal area network (PAN)
Privately owned networks within a signle building or campus of up to a few miles in size
Local area networks (LAN)
A larger version of a LAN that might include a grou pof nearby offices within a city
Metropolitan area network (MAN)
Networks that span a large geographical area, often a country or continent
Wide area networks (WAN)
A network in which resources are dedciated to a small number of applications or a restricted set of users, such as a corp’s network
Private network
Networks in which resources are owned by third-pary companies and leased to users ona usage basis (less secure than private networks)
Public netowrks
The use and access of multiple server-based computational resources via digital network
Cloud computing
An XML-based language being developed specifically for hte automation of business information requirements, such as the preparation, sharing, and analyi of ifnancial reports
Extensible Business Reporting Language (XBRL)
An international collection of networks made up of indpendently owned computers that operate as a large computing network
Internet
The primary internet protocol for data communication on the World Wide Web
Hypertext Transfer Protocol (HTTP)
A standard for finding a document by typing in an address
Uniform REsource Locator (URL)
A framework for accessing linked resources (ex. docs, pics, music, etc.) spread out ove the millions of machines all over the internet
World Wide Web
Client software (ex. explorer, firefox, chrome( that provides the user with eability to locate and display web resources
WEb browser
The software that serves web resources to software clients
Web server
A method for portecting an org’s computers and computer information from outsiders–consists of security algorigthms and router communications protocols that prevent outsdiers from tapping into corporate database and email systems
Firewall
A communications interface devicethat connects 2 networks and determines the best way for data packets to move forward to their destinations
Router
A device that divides a LAN into 2 segments, selectively forwarding traffic across the network boundary it defines
Bridge
A device that channels incoming data from any of multiple input ports to the specific output port htat will take the data toward its intentded destination
switch
A combination of hardware and software that links to different types of networks
Gateway (ex. gateways allow differing email systems to exhange messages)
A server that save ans serves copies of web pages to those who request them; can increase efficiency and help assure data security
proxy server
2nd generation of the web (bogs, wikis, twitter, RSS/ATOM)
Web 2.0
An XML application that facilitates the sharing and syndication of website content by subscription
Really Simple Syndication (RSS)
The basic communication language or protocal of the internet–highest layer assembles messages into smaller packets that are transmitted over the Internet and the lower layer assigns IP addresses
Transmission Control Protocol (TCP)
The number htat identifies a machine as unique on the Internet
IP address
An entity that provides access to the internet
Internet SErvice Provider (ISP)
A program that requests the computer operating system to perform certain activities not authorized by the computer
virus
A stored set of instructions and functions that are organized to perform a reptititve task and can be easily activated–many viruses use these
Macro
A malicious, security-breaking program that is disguised as something benign, such as a gane, but actionally is intended to cause IT damage
Trojan horse
A program that propages itself over a netowrk, eproducing itself as it goes
worm
A network of computers that are controlled by computer code, called a “bot” that is designed to perform a repetitive task such as sending span, spreading a virus
Botnet
A local network, usually limited to an orgnaization, that uses nternet-based technology to communicate within the organization
Intranet
Similar to an intranet, but includes an organization’s external customers and/or suppliers inthe network
Extranet
A networked computing model in which database software on a server performs database commands sent to it from client computers
Client-server system
A server that manages file operations and is shared by each of the client PCs–acts simply as ashared data storage device with all data manipulations performed by client PCs
File server
A server that contains the database management system and thus performs more processing than file servers
Database server
A client/server configuration that includes client and server database tiers in addition to application tiers
3-tier architectures
Make shared printers available to various clients
print server
May serve a variety of tasks, such as acting as a gateway to the internet or to the corporate intranet
Communications server
Allows clients on the network to share the hardware for income and outgoing fax transmission
fax server
Stores and serves web pages on request
web server
Printers, scanners, faxes, etc. are called this
peripherals
The physical path that connects components of LAN
Transmission media
the hardware added to the machine that allows it to communicate with the network.Connects workstations and transmission media
Network interface cards
End user is responsible for hte development and execution of the computer application that generates the information used by that same end user
End-User Computing
The conversion of data into a form called a cipher text that cannot be easily understood by unauthorized people
encryption
The process of converting encrypted data back into tis original form
decryption
A detailed sequence of actions to perform to accomplish some task
algorigthm
Making cash payments between 2 or more organizations or indviduals electronically
Electronic funds transfer (EFT)
The electronic exchange of business transactions in a standard format from one entity’s computer to another’s through an electronic communications network
–commonnly used for sales and purchasing
Electronic data interchange (EDI)
A direct computer-to-computer private network link
Point-to-point
A privately owned network that routes an EDI transaction between trading partners and in many cases provides translation, storage,a nd other processing
Value added networks (VAN)–a type of computer service org (a service that allows users to do away with part of the processing function)
Networks that an org has devloped themselves–extremely costly, but extremely reliable
Propietary networks
A block of data that is transmitted from one computer to another–contains data and authentication information
packets
Developed COBIT 5 to assist enterprises in achieving their objectives for governance and management of enterprise IT
The Information Systems Audit and Control Association (ISACA)
A business-oriented framework that provides a systematic way of integrating IT with business strategy and governance by taking a stakeholder approach; based on the 5 principles
COBIT–Control Objectives for Information and Related Technology
An AICPA framework for analyzing if a system is reliable and providing assurance on them using 5 principles:
- security
- availability
- processing integrity
- online privacy
- confidentiality
Trust Services
The two functions of the Information systems department
Systems development & data processing
The other departments of a company that utilize the data prepared by the information systems department
User departments
Responsible for implementing, modifying, and debugging the software necessary for making hte hardware work
Systems programmer
Responsible for analyzing the present user environment and making recommendations
Systems analyst
responsible for writing, testing, and debugging the application programs from the specifications provided by the systems analyst
Applications programmer
Responsible for maintaining the database and restricting access to the database to autorized personnel
Database administrator
Responsible for the daily computer operations of both the hardware and the software–including help desks
Operator
responsible for custody of the removable media (tapes/disks) and for the maintenance of program and system documentation
Data librarian
Acts as liaison between users and the processing center; records input data in a control log, follows the progress of processing, disbritues ouput, etc.
Data control group
Responsible for overseeing hte development, planning, and implementation of a website
Web administrator
responsible for providing expertise and leadership in the development of a website, including the design, analysis, security, etc.
Web master
REsponsible for creating the visual content of hte websit
WEb designer
Responsible for the daily operaions of the website
Web coordinator
Responsible for writing programs for commercial use
Internet developer (simialr to a software engineer or systems programmer)
Responsible for writing programs based on theneeds of hte company
Intra/Extranet developer
Control program development, program changes, computer operations, and access to programs and data–increase the assurance that programmed control activitiies operate effectively during the period
Computer General Control Activities
Specific computer applications that are embedded in the computer program used in the financial reporting system
Programmed Control Activities–an application control
Employee follow up of items listed on computer exception reports
Manual Follow-UP of Computer Exception Reports–an Application Control
Manual checks of computer output against source document or other input, providing assurance that programmed aspects of the accounting system and control activities have operated effectively
User Control Activities
A special bit is added to each character that can detect if the hardware loses a bit during the internal movement of character
Parity check
During hte sending and receiving of characters, the receiving hardware repeats back to the sending hardware what it eceived and the sending hardware automatically resends any characters that were received incorrectly
echo check
Routines activitated when the system is booted up in which hardware supplied by the manufacturer is used to check the interal operations and devices within the computer system
Diagnostic routines
Controsl in place to ensure that simultaneous jobs runnign on a CPU cannot destroy or change the allocated memory of another job
Boundary protection
A program used to compare source and/or object codes of a controlled copy of a program with the program currently being used to process data to identify any unauthorized changes
Code comparison program
When an extra digit is added to an identification number to detect certain types of data transmission errors
Check digit
A total of one numerical field for all the records of a batch that normally would be added (ex. total sales dollars)
Batdh, control, proof total
A control total where the total is meaningless for financial purposes
hash total
A control total of hte total records processed
REcord count
A test of reasonableness of a field of data, given a predetermined uppper/lower limit (ex. exams with scores > 100)
Limit test
A control that limits hte types of characters accepted into a specfic data field (ex. only accept numbers)
Field check
A control that allows only “valid” transactions or data to be entered into the system
Validity check
A cotnrol that searches for blanks inappropriately existing in input data
Missing data check
A control of an exact number of characters to be input
Field size check
Ensures that illogical combinations of input are not accepted
Logic check
Uses 2 identifiers in each transaction record to confirm that hte correct master file record is being updated (ex. name and socfial)
REdundant data check
A control that allows data entry personnel to check the accuracy of input data
Closed-loop verification
zA backup approach in which a master file is updated with the day’s transaction files, and after the update the new file master file is the son
Grandfather-father-son
Similar to Grandfather-father-son, but at certain points the cystem makes a copy of the database and stores it on a separate disk
Checkpoint
Undoing changes made to a database to a point at which it was functioning properly
Rollback
An agreement between 2 or more organizations to aid each other with their data processing needs in the event of a disaster
Reciprocal agreemnt
A commercial disaster recovery service that allows a business to continue computer operaions in the even of a computer disaster–ready right away
Hot site
A disastery recovery site that is ready to use, but the customer must provide and install all equipment–slower but less expensive than a hot site
Cold site
An exact copy of a websit which is the best way to backup a website
Mirrored Web server
A procedure to graphically show the sequential flow of data and/or operations
Flowcharting
A graphic representation fo a data processing application that depicts the interaction of all the computer programs for a given system, rather than the logic for an individual computer program
System flowchart
A graphic representation of hte logic (processing steps) of a computer program
Program flowchart
Use a matri format that lists sets of condtions and the actions that result from various combinations of these condtions
Decision table
Presents logical flows of data and functions in a system–does nto emphasize details such as medium, or agents
Data flow diagrams (DFDs)
When an extra digit is added to an identification number to detect certain types of data transmission errors
Check digit
A total of one numerical field for all the records of a batch that normally would be added (ex. total sales dollars)
Batdh, control, proof total
A control total where the total is meaningless for financial purposes
hash total
A control total of hte total records processed
REcord count
A test of reasonableness of a field of data, given a predetermined uppper/lower limit (ex. exams with scores > 100)
Limit test
A control that limits hte types of characters accepted into a specfic data field (ex. only accept numbers)
Field check
A control that allows only “valid” transactions or data to be entered into the system
Validity check
A cotnrol that searches for blanks inappropriately existing in input data
Missing data check
A control of an exact number of characters to be input
Field size check
Ensures that illogical combinations of input are not accepted
Logic check
Uses 2 identifiers in each transaction record to confirm that hte correct master file record is being updated (ex. name and socfial)
REdundant data check
A control that allows data entry personnel to check the accuracy of input data and verify the authorization of the sender
Closed-loop verification
zA backup approach in which a master file is updated with the day’s transaction files, and after the update the new file master file is the son
Grandfather-father-son
Similar to Grandfather-father-son, but at certain points the cystem makes a copy of the database and stores it on a separate disk
Checkpoint
Undoing changes made to a database to a point at which it was functioning properly
Rollback
An agreement between 2 or more organizations to aid each other with their data processing needs in the event of a disaster
Reciprocal agreemnt
A commercial disaster recovery service that allows a business to continue computer operaions in the even of a computer disaster–ready right away
Hot site
A disastery recovery site that is ready to use, but the customer must provide and install all equipment–slower but less expensive than a hot site
Cold site
An exact copy of a websit which is the best way to backup a website
Mirrored Web server
A procedure to graphically show the sequential flow of data and/or operations
Flowcharting
A graphic representation fo a data processing application that depicts the interaction of all the computer programs for a given system, rather than the logic for an individual computer program
System flowchart
A graphic representation of hte logic (processing steps) of a computer program
Program flowchart
Use a matri format that lists sets of condtions and the actions that result from various combinations of these condtions
Decision table
Presents logical flows of data and functions in a system–does nto emphasize details such as medium, or agents
Data flow diagrams (DFDs)