Information Technology Flashcards

1
Q

IC

Which IT personnel roles should always be segregated?

A

Operators

Programmers

Librarians

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IC

Systems Analyst duties

Note: Think IT Manager

A

Designs / purchases IT system

Flowcharts

Liaison Users and Programmers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IC

Systems Administrator duties

A

Primary: Control database access.

Writes- Updates- Maintains- & Tests

Software, Systems and compilers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IC

Duties a Systems Programmer should NOT have?

A

APPLICATION programming

Operator on the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IC

Systems Operator duties

A

Schedules and Monitors Jobs

Runs IT Help Desk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IC

Duties a System Operator should NOT have?

A

Should not be a Programmer on the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IC

If it is not possible to segregate duties in an IT System-

what actions should be taken to compensate for internal control purposes?

A

Include Computer Logs.

Control Group should review the logs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SYSTEMS

Management Information System (MIS) purpose

A

provide past, present, future information

for planning, organizing, controlling operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SYSTEMS

What is an Accounting Information System (AIS)?

A

A type of MIS that processes accounting transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SYSTEMS

Executive Information System (EIS) characteristics

A

Specialized for Company Executive needs

Assists with Strategy Only

No Decision-Making Capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SYSTEMS

Expert System (ES) characteristics

* type of AI

A

Computer uses reasoning methods to data

Structured

No human interpretation needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SYSTEMS

Decision Support System (DSS) characteristics

A

Computer combines models and data to resolve unstructured problems.

Gives Interactive Support

Human interpretation needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ad Hoc computer report characteristics

A

User initiated

on demand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IC - APPLICATION CONTROL

When are Exception reports generated?

A

When Edit Tests- Check Digits- or Self-Checking Digits identify a problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is End-User Computing?

A

The User develops and executes their own application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

E-COMMERCE

Risks

A

Security

Availability

Processing Integrity

Online Privacy

Confidentiality

Compromised data or theft.

Paper trail for auditors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

E-COMMERCE

Benefit

A

Easier business transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

E-COMMERCE

EDI benefits

A

Uses globally-accepted standards

Quick

Accurate

Efficient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a File Server?

A

Stores shared programs and documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

INTERNET

VAN (Value-Added Network) characteristics

A

Costly

Privately-owned Network

3rd Party Between 2 Companies Routes EDI Trx

Accepts wide range of Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

LAN (Local Area Network)

purpose

A

It connects computers in close proximity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

INTERNET

WAN purpose

A

It connects computers that are far apart.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

INTERNET

What is the purpose of a Firewall?

A

Prevents unauthorized access to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

INTERNET

What are the characteristics of a virus?

A

Takes over a computer

Needs a host program to run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

INTERNET

What are the characteristics of a computer worm?

A

Takes over multiple computers

Doesn’t need a host program to run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is RAM?

A

Internal memory in the computer used during immediate processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is a CPU?

A

Processes commands within a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Input devices?

A

Scanner

Magnetic Ink Reader

Magnetic Tape Reader

EDI

Point of Sale Scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

SOFTWARE

What is Job Control Language?

A

It schedules and allocates system resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the purpose of Automated Equipment Controls?

A

They prevent and detect hardware errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Magnetic Disks characteristics?

A

Random Access - Finds data in random spots

Faster data retrieval

Uses Boundary Protection for data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

IC

What are Parity Checks?

A

A control that detects internal data errors.

A bit is added to each character- it checks to see if a bit was lost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

IC

What is an Echo Check?

A

Transmitted data is returned to the sender for verification

(it echoes back to the sender)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

IC

What is a Change Control?

A

It authorizes program changes and approves program test results.

Code comparison program can compare controlled copy of s/w with in-use s/w

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is a Gateway?

A

Connects one network to another

Note: the Internet is connected by Gateways

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is security software?

A

Software that controls access to IT systems.

..not anti-virus software

37
Q

Purpose of a Digital Signature?

A

It confirms a message has not been altered.

38
Q

Sys Dev

What is the duty of a design engineer?

A

Determine language used for a specific computer

on a computer-to-computer basis

39
Q

SOFTWARE

How can source programs be recognized?

A

They are written in a language close to English.

40
Q

SOFTWARE

Purpose of a Compiler?

A

Takes Source language (English) and converts to Object (Computer) Language

41
Q

INPUT VALIDATION

What is a hash total?

A

An input control number

a meaningless sum of values included in the input.

42
Q

PROCESSING

How does Online Analytical Processing work?

A

It uses a Data Warehouse to support management decision making.

43
Q

PROCESSING

What is Data Mining?

A

Using artificial intelligence and pattern recognition to analyze data stores within a Data Warehouse.

Explain, confirm, explore relationships

44
Q

PROCESSING

Purpose of online transaction processing?

A

To process a company’s routine transactions.

45
Q

PROCESSING

Characteristics of batch processing?

A

Data held- updates multiple files all at once

Leaves a better audit trail

Uses Grandfather-Father-Son backup

(3 levels of backup kept in 3 locations)

46
Q

Processing control check?

A

Checks if data processing produced proper output

47
Q

INPUT VALIDATION

Validity check

A

Checks to see if data in existing tables or files belongs in the set

For example- is there a # in an alpha-only field or a letter in a numeric-only field

48
Q

INPUT VALIDATION

Limit check?

A

Checks to see if numbers surpass a certain limit

i.e. in an age field is the number greater than 110.

49
Q

INPUT VALIDATION

Check digit?

A

An input control that adds an identification number to a set of digits – usually at the end

50
Q

INPUT VALIDATION

Field check?

A

An input check that prevents invalid characters

i.e. checks for alphabetic letters in a SSN field

51
Q

What is Data Mining?

A

Using artificial intelligence and pattern recognition to analyze data stores within a Data Warehouse.

52
Q

Cold Site?

A

If a main system goes down- a Cold Site will take time to get set up and running.

53
Q

DATA STRUCTURES

What is the most common database language?

A

SQL - Standard Query Language

DDL (definition)

DML (manipulation)

DCL (control)

54
Q

DATA STRUCTURE DDL

What is a Data Definition Language?

A

Defines SQL Database

Controls SQL Tables

55
Q

DATA STRUCTURE

DML What is a Data Manipulation Language?

A

Queries SQL Database tables

Maintain - update, insert, modify

56
Q

DATA STRUCTURE

DCL What is a Data Control Language?

A

Controls Access to SQL Database

57
Q

DATA STRUCTURE

Relational Database characteristics

A

Logical structure

Uses rows and columns similar to spreadsheet

58
Q

DATA STRUCTURE

Hierarchical Database characteristics

A

Has various levels

Uses trees to store data

59
Q

DATA STRUCTURE

Database advantages

A

Data is more accessible

Data independence from Apps

Reduced redundancy

60
Q

Sys Dev - Overall lifecycle

A
  • Plan
  • Analysis
  • Design
  • Develop
  • Testing
  • Implement
  • Maintain
61
Q

DATA STRUCTURE

Database disadvantages

A

Cost of installation

Skilled personnel required to maintain

62
Q

DATA STRUCTURE

Components of a database?

A

Desktop client

Application Server

Database Server

Think: Your desktop computer runs applications and saves to a database

63
Q

What is the most common database language?

A

SQL - Standard Query Language

64
Q

Sys Dev - Planning

A
  • Id problem
  • Define system based on strategic goals
  • Scope determination
  • Project Plan development
  • Initial feasibility
65
Q

Sys Dev - Analysis

A

Terms to understand:

  • Requirements
  • Model
  • Needs Assessment
  • Gap Analysis from current sys
  • System specification documents
66
Q

Sys Dev - Design

A

Technical blueprint

67
Q

Sys Dev - Development

A

Off-the-shelf or customized platform

68
Q

Sys Dev - Testing

A

Unit (code)

System Integration

User Acceptance

69
Q

Sys Dev - Implementation

A

Parallel

Plunge

Pilot

Phased

70
Q

Sys Dev - Maintenance

A

Monitor

Support

Training

Help Desk

Authorized Changes

71
Q

SOFTWARE

Operating System

A

Job Control Language for:

Scheduling

Resource allocation

data retrieval

72
Q

SOFTWARE

Multi - processing

A

simultaneous execution of tasks

same system, multiple CPU

73
Q

SOFTWARE

Multi - tasking

A

simultaneous processing of jobs

74
Q

SOFTWARE

Types of Source Programs

A

Machine Language

Assembly

High-level: COBOL, Basic, OOP (Object Oriented) C++, Java

75
Q

SOFTWARE

Desk checking

A

programmer review b4 run/debug

76
Q

SOFTWARE

Loop

A

Repeating program instructions

77
Q

PROCESSING

Data Warehouse

A

Periodic data dumps

Subject oriented

Integrated collection of data

78
Q

DATA STRUCTURE

Data Modeling

A

Entity-relationship modeling

Primary key - individ records

Foreign key - link relational db

AIS REA data model

  • resource: object w/ economic value
  • event: bus activity
  • agent: people/org
79
Q

DATA STRUCTURE

Data Dictionary

A

data repository

data directory

stores meta-data

80
Q

INTERNET Languages

A

HTML

XML - extensible markup

* XBRL (XML for EDGAR)

81
Q

ISACA

COBIT Framework

A

COBIT Achieve objectives of: Governance and Mgt

Enterprise IT

Systematic integration with Biz strategies

82
Q

ISACA

COBIT Principles (5)

A
  1. Meet Stakeholder needs
  2. Cover enterprise end-to-end
  3. Apply single integrated framework
  4. Enable holistic approach
  5. Separate governance from management
83
Q

ISACA

COBIT Enablers (7)

A
  1. Processes
  2. Org Structure
  3. Culture
  4. Policy - Principles
  5. Information produced/used
  6. Infrastructure
  7. People competencies
84
Q

IC

ICHAMB *O*

A

Org structure

segregation of Development and Data processing

85
Q

IC

General Control Activities

A

Developing new systems

Changing existing

Access to data / app

Computer operations

86
Q

BUSINESS CONTINUITY Plan

A

Priorities

Insurance

Backup approach

Individual Assignments

Periodic Testing

Documentation

87
Q

FLOWCHARTs

A

Program: logic within application

System: application interactions

Audit/Document: dept to dept flow

Dataflow: data and functions (paper/elect)

88
Q

IC

Controls are classified into

A

the preventative, detective, and corrective categories