Information Technlogy Flashcards

1
Q

Processes data and transactiosn to provide users with the information they need to plan, control and operate an organization

A

Information Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An IS designed to improve productivity by supporting daily work of employees (ex. word processing, email, etc)

A

Office automation system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An IS that involves hte daily processing of transactions (ex. payroll processing)

A

Transaction processing system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An IS designed to help with the decision making process by providing access to computer data

A

Management reporting system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A management reporting system that’s designed to provide past, present and future information for planning, organzing, and controllin the operations of hte organization

A

Management information system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A management reporting system that combines models and data to resolve NONSTRUCTURED problems with extensive user involvement

A

Decision support system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A management reporting system that applies resoning methods to data in a specific relatively structured area to render advice or recommendations, much like a human expert

A

Expert system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A managmenet reporting system that is specifically designed to support executive work

A

Executive IS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
The traditional methodology for developing information systems, characterized by its phases, each representing a specific set of development activities:
Planning
Analysis
Design
Development
Testing
Implemntation
Maintenance
A

Systems Development Lifecycle (SDLC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Phase of SDLC in which the problem is identified, plan is developed, and scope

A

Planning Phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Phase of SDLC in which teams are developed to analyze the problem and system and create a needs assessment and gap analysis

A

Analysis Phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Phase of SDLC where technical blueprints are built

A

Design Phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Phase of SDLC in which the documents from the design phase are transformed into the actual system

A

Development Phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Phase of SDLC in which tests are done to verifythat hte sytem works and meets the business requirements

A

Testing Phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TEsting the units or pieces of code

A

Unite testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Testing of the integration fo the units or pieces of code into a sytem

A

System testing

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Testing whether the separate systems can work together

A

Integration testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Testing whether the system meets the business reqquirements and enables users to perofrm their jobs efficently and effectively

A

User acceptance testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The phase of SDLC involves putting the system in operation by the users

A

Implementation phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Involves using both systems until it is determined that hte new system is operating properly

A

Parallel implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Ceasing using the old system and beginning using hte new system immediately (low cost, high risk)

A

Pluge implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Having a small group of individuals using the new system until it is seen to be working properly

A

Pilot implemntation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Installing a new system in a series of phases

A

Phased implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Phase of SDLC that ivolves monitoring and uspporting the new system

A

Maintenance phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Extremely powerful, high-speed computers used for extremely high-volume and/or complex processing needs
Super computers
26
Large, powerful, high-speed computers traditionally used for high-volume transaction processing
Mainframe computer
27
High-powered microcomputers that serve applications and data to clients that are connected via a network; typically hae greater capacity than their clients and often act as a central repository for organizational data
Server
28
Computers designed to be used by one person at a time ; often called personal computers
Microcomputers
29
The principal hardware components of a computer; contains: - an arithmetic/logic unit - primary memory - control unit major function is to fetch stored instructions and data, decode the instructions, and carry them out
Central Processing Unit (CPU)
30
Part of CPU that performs mathematical operaions and logical comparisons
Arithmetic/logic unit
31
Active data nd program steps that are being processed by the CPU; can be devided into RAM (Random-access memory) and ROM (Read-only memory)
Primary memory (storage)
32
Part of CPU that interprets program instructions and coordinates input, output, and storage devices
Control unit
33
Slowest type of storage available because data is stored sequentially; primarily used for archiving purposes today
Magnetic tape
34
The mot common storage medium in use on computers today; data can be accessed directly
Magnetic disks (hard disks, Hard disk drives)
35
A way of storing the same data reduntantly on multiple magnetic disks
RAID (Redundant array of independent disks)
36
Disks (CDs) and DVDs that use optical technology toread and write data to the diskc
Compact discs
37
Use microchips to store data and rquire no moving parts for read/write operations; faster and more expense than CDs, DVDs, and HDDs,
Solid State Drives (SSDs) "flash drives" USB drives"
38
storage hosted offsite, typically by third parties, and accessed via the Internet
Cloud-Based storage ; "Storage as a Service" (SaaS)
39
One binary digit
bit
40
A series of 8 bits
byte
41
a representation that is produced by the fluctuations of a continous signal (rather than using 0s and 1s) to transmit the functuations in the signal itself to represnet information
Analog
42
Equipment in direct communication with, and under the control of, the CPU; and having connection to the internet
online
43
Equipment not in direct communication with eCPU; the operator generally must intervene to connect this equipment or data to the CPU; also refers to lack of internet connection
Off-line
44
A terminal used for communication between the operator and the computer
Console
45
All non-CPU hardware that may be placed under the control of the central processor (consists of input, storage, output, and communication)
peripheral equipment
46
Hardware units designed to operate specific input-output units
Controllers
47
A temporary storage unit used to hold data during coomputer operaionts
Buffer
48
Millions of instructions per second; a unit for measuring the execution speed fo computers
MIPS
49
Uses keyboard to directly enter data into computer
Visual display terminal/monitors
50
A program that controls the display for hte user (usually on a computer monitor) and allows the user to interact with the system
Input interface
51
Uses icons, pictures, and menus instead of text for inputs
Graphical User interface (GUI)
52
Uses text-type commands
Command line interface
53
Documents that are sent to the customer and returend as inputs (ex. utility bills)
Turnaround documents
54
A device capable of sensing information recorded as magnetic spots on magnetic tape
Magnetic tape reader
55
Device that reads characters that have been encoded witha magnetic ink (ex. bank check readers)
Magnetic ink character reader (MICR)
56
A machine used to execute and record transacitons with financial instiutions
Automatic teller machine (ATM)
57
Uses radio waves to track and input data--increasingly used for inventory and contactless payment sistems
RFID Radio Frequency Identification (ex. Mobil's speedpass)
58
Devices that read price and product code data--function as boht a terminal and cash register
Point of sale(POS) recorders
59
Manages the input , output, processing and storage devices and operations of a computer (ex. Windows, Linus, Unix)
Operating system
60
Handle common file, data manipulation, and housekeeping tasks
Utility programs
61
Controls and supports transmission between computers, computers and monitors, and acceses various databases
Communications software
62
Programs designed for specific uses, or "applications" such as Word processing, email, and accounting sofware
Applications sofware
63
Accounting software where everything is in an allin one package; designed for small orgnaizations
Low-end accounting software
64
Accounting software that is designed in modules (ex. general ledger, receivables)
High-end accounting software
65
Accounting software designed as relatively complete information system "suites" for large and medium size organizations (ex. HR, financial, manufacturing,e tc) Ex. SAP, PeopleSoft, Oracle
Enterprise Resource Planning (ERP)
66
Produces a machine language object program from a source program language
compiler
67
Simultaneous execution of two or more tasks, usually by two or more CPUs that are part of the same system
Multiprocessing
68
Teh ismultaneous processing of several jobs on a computer
Multitasking
69
The conveted source program that was chagnedusing a compiler to creat a set of machien readable instructions that eh CPU understands
Object program
70
A program writte in a language from which statments are translated into machine language (0's and 1's)
Source program
71
combinations of 1;s and 0's that are meaningful to a the computer
machine languagw
72
A low-level programming language that uses words (mneomonics) instead of numbers to perform an operation--can be translated to machine language using an assembler
Assembly language
73
Translates assembly language into machine language
Assembler
74
``` Keep together data structures and procedures through a procedure referred to as encapsulation Include classes (a set of objects with similar structures) and inheritance (the ability to create new classes from existing classes) ```
Object-oriented programs
75
Online secondary memory that is used as an extension of primary memory, thus giving hte appearance of larger, virtunally unlimited internal memory
Virtual memory (storage)
76
Rules determining the required format and methods for transmission of data
Protocal
77
REveiw of a program by the programmer for errors befroe the program is run and debugged on the computer
Desk checking
78
To find and eliminate errors in a computer program--often assisted by compilers
debug
79
To correct input data prior to processing
Edit
80
A set of program instructions performed reptitively a predetermined number of times, or until all of a particular type of data has been processed
Loop
81
A listing of hte contents of storage
Memory dump
82
A section of coding inserted into a program to correct a mistake or to alter a routine
Patch
83
A complete cycle of a program including input, processing and output
Run
84
Groups of like transactions
batch
85
Databases that support day-to-day operations (ex. airline reservation systems, bank ATMS)
Online transaction processing (OLTP)
86
A getegory of software technology that enables the user to query the system and conduct an alaysis ordinarily while the user is at teh PC---primarily used for analytical analysis -use statistical and graphical tools Used as decision support systems
Online Analytical Processing (OLAP)
87
A subject-orientied, integrated collection of data used to support managment decision making processes
Data warehouse
88
a data warehouse that is limited in scope
data mart
89
Using sophisticated techniques from stats, artificial intelligence and computer graphics to explain, confirm, and explore relationships among data
data mining
90
A combination of systems that help aggregate, access and analyze business data and assist in teh business decision-making process
Business Intelligence
91
Computer software designed to help humans make decisions---may be viewed as an attempt to model aspects of human thought on computers
Artificial Intelligence
92
Processing that occurs at one location (typically using a mainframe computer)
centralized processing
93
Processing and data are stored on computers at multiple locations with the computeres not interconnected by a network (ex. end-user computing)
Decentralized processing
94
Processng in which transactions for a single database are processed at various sites (ex. MN office processes payroll for MN emplyees, while WI office processes payfroll forWI employees, but all update the payroll database) Can be either batch or real time processing
Distributed processing
95
A group of related characters (ex. social security number)
field
96
An ordered set of logically related fields; for example, all payroll data relating to a single employee
record
97
A group of related records (ex. all weekly pay records to date) which is usually arranged in sequence
File
98
A group of related records in a relational database with a unique identifier (primary key) in each reacord
table
99
A group of related files or a group of related tables
database
100
In a programming language, an aggregate that consists of data objects with attributes each which may be uniquely referenced by an index (address) -often used with object-oriented programs such as C++ and Java
Array
101
A file containing relatively permanent information used as a source of reference and periodically updated witha detail file
Master file
102
A file containing current transaction information used to update the master file
Detail or transaction file
103
Systems that focus upon data processing needs of individual departments; each application program or system is designed to meet the needs of the particular requesting department--similar to traditional accounting (ex. files set up for purchasing, cash receipts, sales, etc.)
Traditional File processing systems
104
the process of separating a database into logical tables to avoid certain kinds of updating difficulties (known as anomolies)
Normalization
105
Computer hardware and software that enables the database to be implemented
database system
106
Software that provides a facility for communications between various applications proframds and the database
database management system
107
Basic to database systems is this concept which separates the dta from the related application programs
data independence
108
Indentifying tand organizaing a database's data, both logically and physically; determining what info will be in the database, how it will be used, and how they will be related to eachother
database modeling
109
An approach to data modeling that divides a database into entities and relations
Entity-relationship modeling
110
The field that makes a record in a relational database unique
primary key
111
Teh fields that are common to two or more related tables in a relational database
secondary/foreign key
112
A data modle deisnged for use in designing accounting information databases using REsources, Event,s nad Agents
REA data model
113
A data structure that stores meta-data
data dictionary/repository/directory
114
Definitional data that provides information about or documentation of other data managed within an application environment
meta-data
115
The most common language used for creating and querying relational databases
Structured query language (SQL)
116
SQL used to define a database, including creating, altering, and eleting tables and establishing various constraints
Data definition language (DDL)
117
SQL that has commands used to maintain an query a database, including updating, inserting in, modifying, and querying
Data manipulation language (DML)
118
SQL that is commands used to control a database, including controlling which users have varous privileges
Data Control Language (DCL)
119
A database structure in which the data elements at one level "own" the data elements at the next lower level
Heirarchical databases
120
A data base structure in which each data element can have several owners and can own several other elements
Networked databases
121
A database with logical structure of a group of related spreadsheets *have largely replaced heirarchical and networked databases)
Relational databases
122
Databases iin which information (attritubtes and methods) are included in structures called object classes **the newest database management system technology
Object-oriented databases
123
Database structures that include both relational and object-oriented features
Object-relational databases
124
A single database that is spread physically across computers in multiple locations that are connected by a data communications link
Distributed database
125
Controls that limit the user to reading and/or changing otnly authorized portions of hte database
Access controls
126
Controls that limit the access of users to the database, as well as operations a particular user may be able to perform (ex. read-only privileges)
restriction privileges
127
A control in which users may be provided with autorized views of only the portion of the database for which they have a valid need
Logical views
128
Backing up an entire database several times per week, generally to magnetic tape; use most recent copy of the database to reconstruct if something goes wrong
Backup of database and logs of transactions
129
Replicating hte database at one or more locations
database replication
130
Maintaining a backup facility with a vendor who will process data in case of emergency
backup facility
131
the indvidual responsible for maintaing the database and restricting access to the database to authorized personnel
database administrator (DBA)
132
A group of interconnected computers and terminals
network
133
The electronic transfer of information between networks and computers
telecommunications
134
A computer network that is centered around an individual and the personal communication devices he/she uses (ex. bluetooth, USBs)
Personal area network (PAN)
135
Privately owned networks within a signle building or campus of up to a few miles in size
Local area networks (LAN)
136
A larger version of a LAN that might include a grou pof nearby offices within a city
Metropolitan area network (MAN)
137
Networks that span a large geographical area, often a country or continent
Wide area networks (WAN)
138
A network in which resources are dedciated to a small number of applications or a restricted set of users, such as a corp's network
Private network
139
Networks in which resources are owned by third-pary companies and leased to users ona usage basis (less secure than private networks)
Public netowrks
140
The use and access of multiple server-based computational resources via digital network
Cloud computing
141
An XML-based language being developed specifically for hte automation of business information requirements, such as the preparation, sharing, and analyi of ifnancial reports
Extensible Business Reporting Language (XBRL)
142
An international collection of networks made up of indpendently owned computers that operate as a large computing network
Internet
143
The primary internet protocol for data communication on the World Wide Web
Hypertext Transfer Protocol (HTTP)
144
A standard for finding a document by typing in an address
Uniform REsource Locator (URL)
145
A framework for accessing linked resources (ex. docs, pics, music, etc.) spread out ove the millions of machines all over the internet
World Wide Web
146
Client software (ex. explorer, firefox, chrome( that provides the user with eability to locate and display web resources
WEb browser
147
The software that serves web resources to software clients
Web server
148
A method for portecting an org's computers and computer information from outsiders--consists of security algorigthms and router communications protocols that prevent outsdiers from tapping into corporate database and email systems
Firewall
149
A communications interface devicethat connects 2 networks and determines the best way for data packets to move forward to their destinations
Router
150
A device that divides a LAN into 2 segments, selectively forwarding traffic across the network boundary it defines
Bridge
151
A device that channels incoming data from any of multiple input ports to the specific output port htat will take the data toward its intentded destination
switch
152
A combination of hardware and software that links to different types of networks
Gateway (ex. gateways allow differing email systems to exhange messages)
153
A server that save ans serves copies of web pages to those who request them; can increase efficiency and help assure data security
proxy server
154
2nd generation of the web (bogs, wikis, twitter, RSS/ATOM)
Web 2.0
155
An XML application that facilitates the sharing and syndication of website content by subscription
Really Simple Syndication (RSS)
156
The basic communication language or protocal of the internet--highest layer assembles messages into smaller packets that are transmitted over the Internet and the lower layer assigns IP addresses
Transmission Control Protocol (TCP)
157
The number htat identifies a machine as unique on the Internet
IP address
158
An entity that provides access to the internet
Internet SErvice Provider (ISP)
159
A program that requests the computer operating system to perform certain activities not authorized by the computer
virus
160
A stored set of instructions and functions that are organized to perform a reptititve task and can be easily activated--many viruses use these
Macro
161
A malicious, security-breaking program that is disguised as something benign, such as a gane, but actionally is intended to cause IT damage
Trojan horse
162
A program that propages itself over a netowrk, eproducing itself as it goes
worm
163
A network of computers that are controlled by computer code, called a "bot" that is designed to perform a repetitive task such as sending span, spreading a virus
Botnet
164
A local network, usually limited to an orgnaization, that uses nternet-based technology to communicate within the organization
Intranet
165
Similar to an intranet, but includes an organization's external customers and/or suppliers inthe network
Extranet
166
A networked computing model in which database software on a server performs database commands sent to it from client computers
Client-server system
167
A server that manages file operations and is shared by each of the client PCs--acts simply as ashared data storage device with all data manipulations performed by client PCs
File server
168
A server that contains the database management system and thus performs more processing than file servers
Database server
169
A client/server configuration that includes client and server database tiers in addition to application tiers
3-tier architectures
170
Make shared printers available to various clients
print server
171
May serve a variety of tasks, such as acting as a gateway to the internet or to the corporate intranet
Communications server
172
Allows clients on the network to share the hardware for income and outgoing fax transmission
fax server
173
Stores and serves web pages on request
web server
174
Printers, scanners, faxes, etc. are called this
peripherals
175
The physical path that connects components of LAN
Transmission media
176
the hardware added to the machine that allows it to communicate with the network.Connects workstations and transmission media
Network interface cards
177
End user is responsible for hte development and execution of the computer application that generates the information used by that same end user
End-User Computing
178
The conversion of data into a form called a cipher text that cannot be easily understood by unauthorized people
encryption
179
The process of converting encrypted data back into tis original form
decryption
180
A detailed sequence of actions to perform to accomplish some task
algorigthm
181
Making cash payments between 2 or more organizations or indviduals electronically
Electronic funds transfer (EFT)
182
The electronic exchange of business transactions in a standard format from one entity's computer to another's through an electronic communications network --commonnly used for sales and purchasing
Electronic data interchange (EDI)
183
A direct computer-to-computer private network link
Point-to-point
184
A privately owned network that routes an EDI transaction between trading partners and in many cases provides translation, storage,a nd other processing
Value added networks (VAN)--a type of computer service org (a service that allows users to do away with part of the processing function)
185
Networks that an org has devloped themselves--extremely costly, but extremely reliable
Propietary networks
186
A block of data that is transmitted from one computer to another--contains data and authentication information
packets
187
Developed COBIT 5 to assist enterprises in achieving their objectives for governance and management of enterprise IT
The Information Systems Audit and Control Association (ISACA)
188
A business-oriented framework that provides a systematic way of integrating IT with business strategy and governance by taking a stakeholder approach; based on the 5 principles
COBIT--Control Objectives for Information and Related Technology
189
An AICPA framework for analyzing if a system is reliable and providing assurance on them using 5 principles: 1. security 2. availability 3. processing integrity 4. online privacy 5. confidentiality
Trust Services
190
The two functions of the Information systems department
Systems development & data processing
191
The other departments of a company that utilize the data prepared by the information systems department
User departments
192
Responsible for implementing, modifying, and debugging the software necessary for making hte hardware work
Systems programmer
193
Responsible for analyzing the present user environment and making recommendations
Systems analyst
194
responsible for writing, testing, and debugging the application programs from the specifications provided by the systems analyst
Applications programmer
195
Responsible for maintaining the database and restricting access to the database to autorized personnel
Database administrator
196
Responsible for the daily computer operations of both the hardware and the software--including help desks
Operator
197
responsible for custody of the removable media (tapes/disks) and for the maintenance of program and system documentation
Data librarian
198
Acts as liaison between users and the processing center; records input data in a control log, follows the progress of processing, disbritues ouput, etc.
Data control group
199
Responsible for overseeing hte development, planning, and implementation of a website
Web administrator
200
responsible for providing expertise and leadership in the development of a website, including the design, analysis, security, etc.
Web master
201
REsponsible for creating the visual content of hte websit
WEb designer
202
Responsible for the daily operaions of the website
Web coordinator
203
Responsible for writing programs for commercial use
Internet developer (simialr to a software engineer or systems programmer)
204
Responsible for writing programs based on theneeds of hte company
Intra/Extranet developer
205
Control program development, program changes, computer operations, and access to programs and data--increase the assurance that programmed control activitiies operate effectively during the period
Computer General Control Activities
206
Specific computer applications that are embedded in the computer program used in the financial reporting system
Programmed Control Activities--an application control
207
Employee follow up of items listed on computer exception reports
Manual Follow-UP of Computer Exception Reports--an Application Control
208
Manual checks of computer output against source document or other input, providing assurance that programmed aspects of the accounting system and control activities have operated effectively
User Control Activities
209
A special bit is added to each character that can detect if the hardware loses a bit during the internal movement of character
Parity check
210
During hte sending and receiving of characters, the receiving hardware repeats back to the sending hardware what it eceived and the sending hardware automatically resends any characters that were received incorrectly
echo check
211
Routines activitated when the system is booted up in which hardware supplied by the manufacturer is used to check the interal operations and devices within the computer system
Diagnostic routines
212
Controsl in place to ensure that simultaneous jobs runnign on a CPU cannot destroy or change the allocated memory of another job
Boundary protection
213
A program used to compare source and/or object codes of a controlled copy of a program with the program currently being used to process data to identify any unauthorized changes
Code comparison program
214
When an extra digit is added to an identification number to detect certain types of data transmission errors
Check digit
215
A total of one numerical field for all the records of a batch that normally would be added (ex. total sales dollars)
Batdh, control, proof total
216
A control total where the total is meaningless for financial purposes
hash total
217
A control total of hte total records processed
REcord count
218
A test of reasonableness of a field of data, given a predetermined uppper/lower limit (ex. exams with scores > 100)
Limit test
219
A control that limits hte types of characters accepted into a specfic data field (ex. only accept numbers)
Field check
220
A control that allows only "valid" transactions or data to be entered into the system
Validity check
221
A cotnrol that searches for blanks inappropriately existing in input data
Missing data check
222
A control of an exact number of characters to be input
Field size check
223
Ensures that illogical combinations of input are not accepted
Logic check
224
Uses 2 identifiers in each transaction record to confirm that hte correct master file record is being updated (ex. name and socfial)
REdundant data check
225
A control that allows data entry personnel to check the accuracy of input data
Closed-loop verification
226
zA backup approach in which a master file is updated with the day's transaction files, and after the update the new file master file is the son
Grandfather-father-son
227
Similar to Grandfather-father-son, but at certain points the cystem makes a copy of the database and stores it on a separate disk
Checkpoint
228
Undoing changes made to a database to a point at which it was functioning properly
Rollback
229
An agreement between 2 or more organizations to aid each other with their data processing needs in the event of a disaster
Reciprocal agreemnt
230
A commercial disaster recovery service that allows a business to continue computer operaions in the even of a computer disaster--ready right away
Hot site
231
A disastery recovery site that is ready to use, but the customer must provide and install all equipment--slower but less expensive than a hot site
Cold site
232
An exact copy of a websit which is the best way to backup a website
Mirrored Web server
233
A procedure to graphically show the sequential flow of data and/or operations
Flowcharting
234
A graphic representation fo a data processing application that depicts the interaction of all the computer programs for a given system, rather than the logic for an individual computer program
System flowchart
235
A graphic representation of hte logic (processing steps) of a computer program
Program flowchart
236
Use a matri format that lists sets of condtions and the actions that result from various combinations of these condtions
Decision table
237
Presents logical flows of data and functions in a system--does nto emphasize details such as medium, or agents
Data flow diagrams (DFDs)
238
When an extra digit is added to an identification number to detect certain types of data transmission errors
Check digit
239
A total of one numerical field for all the records of a batch that normally would be added (ex. total sales dollars)
Batdh, control, proof total
240
A control total where the total is meaningless for financial purposes
hash total
241
A control total of hte total records processed
REcord count
242
A test of reasonableness of a field of data, given a predetermined uppper/lower limit (ex. exams with scores > 100)
Limit test
243
A control that limits hte types of characters accepted into a specfic data field (ex. only accept numbers)
Field check
244
A control that allows only "valid" transactions or data to be entered into the system
Validity check
245
A cotnrol that searches for blanks inappropriately existing in input data
Missing data check
246
A control of an exact number of characters to be input
Field size check
247
Ensures that illogical combinations of input are not accepted
Logic check
248
Uses 2 identifiers in each transaction record to confirm that hte correct master file record is being updated (ex. name and socfial)
REdundant data check
249
A control that allows data entry personnel to check the accuracy of input data and verify the authorization of the sender
Closed-loop verification
250
zA backup approach in which a master file is updated with the day's transaction files, and after the update the new file master file is the son
Grandfather-father-son
251
Similar to Grandfather-father-son, but at certain points the cystem makes a copy of the database and stores it on a separate disk
Checkpoint
252
Undoing changes made to a database to a point at which it was functioning properly
Rollback
253
An agreement between 2 or more organizations to aid each other with their data processing needs in the event of a disaster
Reciprocal agreemnt
254
A commercial disaster recovery service that allows a business to continue computer operaions in the even of a computer disaster--ready right away
Hot site
255
A disastery recovery site that is ready to use, but the customer must provide and install all equipment--slower but less expensive than a hot site
Cold site
256
An exact copy of a websit which is the best way to backup a website
Mirrored Web server
257
A procedure to graphically show the sequential flow of data and/or operations
Flowcharting
258
A graphic representation fo a data processing application that depicts the interaction of all the computer programs for a given system, rather than the logic for an individual computer program
System flowchart
259
A graphic representation of hte logic (processing steps) of a computer program
Program flowchart
260
Use a matri format that lists sets of condtions and the actions that result from various combinations of these condtions
Decision table
261
Presents logical flows of data and functions in a system--does nto emphasize details such as medium, or agents
Data flow diagrams (DFDs)