Information Technology Flashcards

1
Q

What is a central processing unit (CPU)?

A

The main component of computer hardware – includes (a) primary storage, (b) a control unit, and (c) an arithmetic/logic unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the primary storage of a CPU?

A

The part which holds the program, data, and results during processing (and thus involves only temporary storage)

Divided between RAM (random-access memory) and ROM (read-only memory)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the control unit of a CPU?

A

The part which directs the computer’s operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the arithmetic/logic unit of a CPU?

A

The part with special capabilities to do arithmetic calculations and logical operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

As regards computers, what is a bus?

A

A communication system for transferring data inside a computer or between computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is magnetic tape?

A

Thin magnetic tape on which data can be imprinted as magnetized dots (e.g. magnetic strips on credit cards)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a redundant array of independent disks (RAID)?

A

A collection of disks that all have the same data written on it – good for backup purposes, but often unnecessary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the difference between randomly accessible data and sequentially accessible data?

A

Randomly = records can be directly accessed

Sequentially = records can be accessed only by reading through previous info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does software differ from hardware?

A

Hardware refers to the required physical devices, while software refers to the internal programming and data needed to run the technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the five generations of programming languages?

A

(1) machine language – simple binary
(2) assembly language – includes short commands for repetitive tasks
(3) procedural language – closer to human language; source code in procedural language can be translated into machine-readable object code
(4) fourth-generation language (4GL) – many routine procedures are preprogrammed
(5) object-oriented programming (OOP) – has a modular approach; focused on the objective rather than the procedure

(3)-(5) are machine-independent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some examples of procedural language?

A

(i) FORTRAN – Formula Translation
(ii) COBOL – Common Business-Oriented Language
(iii) BASIC – Beginners All-Purpose Symbolic Instruction Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some examples of object-oriented programming (OOP)?

A

(i) C++

(ii) Java

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a graphical user interface (GUI)?

A

A display where users can interact with icons, scroll bars, etc. rather than just line-by-line commands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a patch?

A

An additional part added to a program, usually to update it and/or correct a problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an operating system (OS)?

A

Software that coordinates various computer functions and applications/programs

Also provides a graphical user interface (GUI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are some examples of operating systems?

A

(1) Windows XP
(2) Unix
(3) Linux – a modified version of Unix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a job control language (JCL)?

A

A language used by an OS to do its work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are multiprocessing and multiprogramming?

A

Multiprocessing – uses more than one CPU to run more than one program simultaneously

Multiprogramming – a program processes until it needs an input or delivers an output, at which point the OS switches to another program instantly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is virtual storage?

A

Occurs when an OS subdivides programs into “pages” and only uses the needed pages to execute the instructions it’s trying to carry out – thus lowers processing costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are application programs?

A

Programs designed to process a particular application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

As regards application programs, what is a “pass” or a “run”?

A

A full round done by the program – input, processing, and output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are collaborative computing applications?

A

Any applications where multiple people have access and where the changes made by different people can be tracked to them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are management information systems (MIS)?

A

Systems used in a company to provide management with the data it needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is enterprise resource planning (ERP)?

A

A software arrangement that addresses the enterprise’s needs (including financial reporting, inventory management, etc.), seeking to meet the organizational goals by tightly integrating all functions of an enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a database management system (DBMS)?

A

Any set of programs which manages a database, whether by creating it, maintaining it, updating it, allowing access to it, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is a relational database model?

A

A model that seeks to relate common data (e.g. customer info) in one integrated database to meet the needs of different users accessing the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are utility programs and library programs?

A

(1) utility programs = programs which perform standard/routine functions, such as merging or sorting
(2) library programs = programs often utilized by other programs, being stored and then “called up” when needed (e.g. random number generation)

Can also be called utility routines or library routines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is a network?

A

An arrangement where multiple computers and multiple users have access to common hardware, software, or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are an internet, an intranet, and an extranet?

A

(1) internet = a network of networks (with the internet being a public network of networks)
(2) intranet = a network closed off, usually just to employees
(3) extranet = an internet that is not entirely closed off, but password-protected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are different kinds of networks?

A

(1) local area network (LAN) = an intranet within a relatively small physical area
(2) wide area network (WAN) = a network across a very large areas, e.g. a city or country
(3) value-added network (VAN) = a network which provides services beyond Internet capabilities (usually EDI-related)
(4) virtual private network (VPN) = a network where it appears that a remote user accesses a private network, even though it is through public lines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is a concentrator?

A

An apparatus which concentrates several communication channels into one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is a multiplexer?

A

An apparatus that, for communication purpsoes, converts multiple low-speed transmissions into one high-speed transmission and then back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is a proxy server?

A

A server acting as an intermediary for requests from clients involving info from other servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is a router?

A

An apparatus that transfers packets of data outward using the most efficient route possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is a firewall?

A

Software separating segments with the aim of prohibiting anyone from gaining unwarranted access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is a gateway?

A

Any software or hardware linking computer networks together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is a web crawler?

A

A program that searches the internet to find files for the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is topology?

A

A network’s physical arrangement

Different kinds are (i) bus, (ii) ring, (iii) tree, and (iv) star arrangements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

As regards topology, what is a bus arrangement?

A

Resembles the arrangement of people on a bus: there is one central line (the “bus aisle”) to which several computers are connected

Easy to add more computers with this arrangement, but communication can be cut off by a failed device in the middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

As regards topology, what is a ring arrangement?

A

Each computer is connected to one on each side, such that all effectively form a circle

Easy to add more computers with this arrangement, and a failed device does not cut off communication (failed devices on each side would), though communication can be slower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

As regards topology, what is a tree arrangement?

A

A hierarchical arrangement where each device can have a number of other devices connected to it as branches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

As regards topology, what is a star arrangement?

A

Each computer is connected to a central device

Generally the most expensive topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What are data transmission protocols?

A

Sets of procedures/rules governing the transferal of data among devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is the difference between serial and parallel data transmission?

A

Serial = each bit (of a byte) are transmitted singularly

Parallel = all bits are transmitted simultaneously on parallel lines, one bit per line

Parallel is practicable only with short network distances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is the difference between circuit switching and packet switching?

A

Switching mechanisms route bits to take different paths

  • circuit switching sends a message in its entirety through oen path
  • packet switching sends messages in packets, sometimes through separate paths
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is a common example of packet switching?

A

TCP/IP – transmission control protocol/internal protocol

Provides protocols for internet packing switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is bandwidth?

A

The degree to which a channel can handle data transmission

Narrow bandwidth signifies a low rate of transmission; broad bandwidth a high rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What is client-server architecture?

A

An arrangement where computers on a network are either clients or servers

  • clients are workstations or PCs
  • servers are powerful machines which can manage networks, disk drives, etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

As regards client-server architecture, what is the difference between a file server and a database server?

A

File = the server primarily stores files and processes data; used as the only server in a two-tier client-server architecture arrangement

Database = the server primarily stores software for database management; does some processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What is a three-tier (or more) client-server architecture?

A

Any arrangement where two or more servers are needed

The other ones can be print servers, web servers, application servers, fax servers, and so on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What are some different network languages?

A

(1) hypertext markup language (HTML) – used for internet display
(2) hypertext transfer protocol (HTTP) – protocols governing the coding, transferal, and viewing of data
(3) extensible markup language (XML) – also used for internet display, but further identifies the nature of the info displayed (e.g. phone #s)
(4) extensible business reporting language (XBRL) – required by the SEC, helpful for reading financial statements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What is an internet protocol (IP) number?

A

A specific number used to identify a particular computer within a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What does URL stand for?

A

Uniform resource locator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What are different levels of data?

A

(1) bit – binary digit, smallest unit of data
(2) byte – group of bits
(3) character – group of bytes
(4) field – group of related characters (e.g. a name)
(5) record – group of related fields (e.g. customer record with name, address, phone #)
(6) file – group of related records

55
Q

What is the difference between a master file and a transaction/detail file?

A

Master = data is generally permanent

Transaction/detail = data is more current and temporary, used for updating a master file

56
Q

What are the steps involved in updating a master file?

A

(i) records from both the master file and the transaction file are read into the CPU
(ii) master file records are updated in the CPU
(iii) updated records are written onto an output reel to create a new updated master file

Thus at the end, there are three files: a master file, a transaction file, and an updated master file

57
Q

What is parallel processing?

A

Running a new system-to-be-implemented at the same as the old system, comparing their results

This makes the conversion smoother (providing a stepping stone) and can avoid disaster if the new system crashes

Also called parallel operating

58
Q

What is volume testing?

A

Testing the ability of a new system to handle various volumes of data

59
Q

What are two different transaction processing models?

A

Batch processing and online processing

60
Q

What is batch processing?

A

Accumulating transactions into groups that can then be processed all at once, as one batch, rather than each being processed individually as they arose

61
Q

What is a disadvantage of batch processing?

A

Since transactions are not processed immediately, errors will not be detected as quickly

62
Q

What is online processing?

A

Immediately processing transactions online as they occur

63
Q

What is an OLRT system?

A

An online, real-time system – it processes data quickly enough to interact with and receive responses for other data

E.g. for airline reservations, a customer’s data can be inputted, and then the available flights are returned, and then the customer can select the flight

64
Q

What is an integrated system?

A

A system where a transaction affects all the relevant files at once, rather than needing separate actions

E.g. a sale can update revenues, accounts receivable, and inventory at once

65
Q

What are different ways to do external information processing?

A

(1) block time = renting the use of another entity’s computer
(2) time-sharing = having equal access with other users to one system
(3) service bureau = an outside entity which provides data service at a cost

66
Q

What are some general controls restricting IT department activity?

A

(1) Segregating functions of users and the IT department
(2) Barring IT people from making or authorizing transactions
(3) Segregating duties within the IT department

67
Q

What are different IT functions that ought to be segregated?

A

(1) Control group
(2) Operators
(3) Programmers
(4) Analysts
(5) Librarians

68
Q

What is the role of a control group in the IT department?

A

It oversees internal control

69
Q

What is the role of operators in the IT department?

A

They convert data into a machine-readable form

70
Q

What is the role of programmers in the IT department?

A

They write and debug programs

  • Applications programmers = deal with application programs
  • Systems programmers = deal with software that runs the hardware
71
Q

What is the role of analysts in the IT department?

A

They design the overall system, mapping it out with a flowchart

72
Q

What is the role of librarians in the IT department?

A

They track the access, use, and storage of programs or other files, including backups

73
Q

What are different professionals needed to develop a business website well?

A

(i) accountant or auditor – for understanding business processes and safety, e.g. fraud prevention
(ii) graphics designer
(iii) marketer
(iv) usability specialist
(v) webmaster – main programmer
(vi) writer

74
Q

What are control objectives for information technology (COBIT)?

A

Objectives developed to help fulfill Section 404 of SOX, which requires their oversight of the company’s internal controls

COBIT serves as a generally accepted standard for IT to provide security and control, with three main objectives:

(i) ensuring that data systems help fulfill the company’s goals
(ii) optimizing investments in IT
(iii) managing risks and opportunities related to IT

75
Q

What is important to know about documentation for IT systems?

A

Control procedures for IT systems often do not leave documentary evidence behind

76
Q

What is important to know regarding a change in IT system?

A

IT systems are more difficult to change than manual systems

77
Q

What are some ways in which paper data is superior to electronic data?

A

(i) more difficult to alter
(ii) more credible in its source (direct mailing rather than through electronic system)
(iii) often includes approvals in the documentation
(iv) easier to use

78
Q

What are some benefits to an IT system over a traditional/manual system?

A
  • can perform large and complex calculations
  • increases how timely, available, and accurate info is
  • allows further analysis
  • allows further monitoring
  • can have stricter controls
79
Q

What are some risks to an IT system?

A
  • errors can be systematic
  • unauthorized access can give the user great power
  • data can be lost
  • programs can be neglected/not updated
80
Q

What are some examples of transaction processing systems?

A

(i) sales
(ii) purchasing
(iii) payroll
(iv) general ledger

81
Q

What is data mining?

A

Taking large amounts of data and acquiring new info (specifically, patterns or trends) from it

Good for checking for fraud, e.g. checking employee addresses to vendor addresses, vendor records with P.O. box addresses, etc.

82
Q

What is a fraud profile?

A

A set of data characteristics which would signify a higher chance of fraud, given the entity’s internal controls

83
Q

What is EDI?

A

Electronic Data Interchange

Business conducted electronically between customers and vendors

84
Q

What is a connectionless environment?

A

A medium or environment where a customer is not in contact with a specific representative of the company

Websites are connectionless environments, since many people can simultaneously utilize them

85
Q

What is one of the advantages of IT for public companies?

A

Updating and generating financial statements becomes much simpler, faster, and more accurate

Also can use data mining to find relevant financial info for management, rather than having them read the entire statements

86
Q

What is an ad hoc financial report?

A

A special report created as the circumstances arise – i.e. not one ordinarily generated by IT

87
Q

What are hackers and crackers?

A

Hackers = people who intentionally intrude into IT systems to violate laws, obtain information, etc.
-sometimes this term refers to general tech enthusiasts, in which case “crackers” (criminal hackers) would refer to the malicious types

88
Q

What are some tools of hackers?

A

(1) demon dialers = rapidly dial through phone numbers to find modems and then use usernames and passwords to break into the system
(2) port scanners = scan a network and its devices to find services that are available and unsecured
(3) scripts = search through machines to find accounts on the machine and whether password attempts to access the machine are limited
(4) sniffers = identify and report all usernames and passwords it can find
(5) Trojan horses = apparently good programs which operate unexpectedly (and usually harmfully) if a user permits the program
(6) viruses = self-replicating programs which affix themselves to other programs and cause harm

89
Q

What are digital signatures?

A

They provide assurance that data hasn’t been altered – thus they can establish the legitimacy of a file, but not other things (like privacy)

90
Q

What is encryption?

A

Coding data so it can’t be read by those who aren’t authorized to read it

Decryption = changing encrypted data to a readable format

91
Q

As regards encryption, what is the key?

A

The entire set of operations done on data to encrypt, and done in reverse on encrypted data to decrypt it

Often includes both an original set of random variables + a set of algorithms acting on the data

92
Q

What is symmetric encryption?

A

The same key (a “private key”) is used for encryption and decryption

Not useful for parties who send a few messages to a large number of correspondents, since each message would require a separate private key

93
Q

What is asymmetric encryption?

A

Uses a public key to encrypt data and a private key to decrypt it

Both the public key and the private key are particular to the recipient, and the private key is mathematically related to the public key though not deducible from it, so as long as public keys are truly publicly available, parties can transfer messages to others without needing to agree in advance on a shared private key

94
Q

What are different kinds of IT controls?

A

(1) preventive
(2) detective
(3) compliance
(4) application
(5) general

95
Q

What are some minimum requirements for a company in a disaster recovery situation?

A

(i) backup data

(ii) additional hardware off-site

96
Q

What are two different kinds of off-site locations for disaster recovery situations?

A

(1) hot sites = mostly ready for continued operations
(2) cold sites = mostly unready for continued operations

There are also degrees of “warmth” between the two

97
Q

What are some important elements of a disaster recovery plan?

A

(i) procedures for how parties will communicate with each other
(ii) testing the plan under different hypothetical scenarios
(3) temporary locations and procedures for continuing operations, e.g. working from home

98
Q

What is important about IT documentation?

A

It provides all sorts of info concerning the system’s purpose, input and output, users, controls, etc., which can be very useful to the auditor

99
Q

What are the first three kinds of IT documentation?

A

(1) problem definition – gaining a general understanding of the reason a system was implemented
(2) systems – how to trace accounting info from input to output
(3) program – a summary of how a program works: its flowchart, controls, instructions, special features, etc.

100
Q

What are the last three kinds of IT documentation?

A

(4) operations – provided by the computer operator on how to run/administer the system
(5) user – how to use the system (e.g. required input and expected output)
(6) operator – documentation for the jobs done on the computer by the operator

101
Q

What are some general controls restricting IT department activity?

A

(1) segregating functions of users and the IT department
(2) barring IT people from making or authorizing transactions
(3) segregating duties within the IT department

102
Q

What are some general controls related to systems development?

A
  • users should be involved in the procedures for system design and the choice of software
  • systems testing should involve both users and IT people
  • there should be controls barring unauthorized changes
  • mgmt should require documentation for choices made regarding the system
103
Q

What is a parity bit?

A

A way to test hardware for malfunctions

Odd parity = characters are represented by some odd number of magnetized dots
Even parity = characters are represented by some even number

A parity bit tests for whether a character has the wrong number (e.g. due to dust)

104
Q

What is an echo check?

A

Signal is sent to activate a device, which sends a signal back, and the computer “checks” this “echo”

105
Q

What is a hardware check?

A

The computer checks the hardware equipment

106
Q

What is boundary protection?

A

Separates files or programs when they are shared in a common place (e.g. in time-sharing)

107
Q

What are two different kinds of internal file labels?

A

(1) header label = at beginning of file
- contains name, ID #, tape reel #
(2) trailer label = at end of file
- contains # of records in file, end-of-file code

108
Q

What is an external label?

A

A label that is attached to some secondary storage device rather than inside the file, readable by humans rather than machines

109
Q

What is a file protection ring?

A

A plastic ring placed around magnetic tape to avoid accidentally erasing information through physical writing or marking

110
Q

What are different file protection plans?

A

(1) duplicate files
(2) disk reconstruction plan
(3) grandfather-father-son retention

111
Q

What is a disk reconstruction plan?

A

Periodically saves a disk file, so that the file can be reconstructed at any given point in time

112
Q

What is grandfather-father-son retention?

A

When a master file has a day’s transactions processed against it, the new master file will be the father and the old one the grandfather. When the father master file has the next day’s transactions processed against it, the new file will be the son.

The terms “grandfather,” “father,” and “son” are relative, referring to how far back in the chain older files are retained. For instance, when the son master file (mentioned above) has a new day’s transactions processed against it, the new master file is effectively the son, the old son file is the father, the old father is the grandfather, and the old grandfather is erased. The important point is that two older files are retained for backup purposes at any given time – the grandfather and father are the two backups for the son.

113
Q

What are some important factors to consider concerning physical safeguards?

A

(1) temperature, humidity, dust, and other factors are not problematic/extreme
(2) the environment is prepared for physical disaster (e.g. basement flooding)
(3) other facilities are ready in case of disaster

114
Q

What do microcomputers signify for internal controls?

A

A weakness in internal controls – since they are usually not in isolated areas, and since they can more easily be modified (including at home)

115
Q

What are different types of inputs which should have internal controls as safeguards?

A

(1) transaction entries
(2) file maintenance
(3) inquiries
(4) error corrections

116
Q

What are control totals?

A

A type of internal control meant to double-check data inputted into the system

Can be financial totals (e.g. total $ in A/Rs), hash totals (e.g. sum of account #s), or record/document counts (# of transactions processed)

117
Q

What are edit tests?

A

Checks performed by a computer to test data being inputted

118
Q

What is a limit test?

A

An edit test to see whether a value is not greater than or lesser than certain amounts

Also called a reasonableness test

119
Q

What is a character test?

A

An edit test to see whether an input has a proper size and composition (e.g. if an input ought to always have 7 numbers)

Also called a valid field test

120
Q

What is a code test?

A

An edit test to ensure that a wrong number is not used (e.g. if a company has four stores, the entry should not be greater than 4)

Also called a valid number test

121
Q

What is a sequence check?

A

An edit test that ensures data is inputted in the right order

122
Q

What is a missing data test?

A

An edit test to see whether all fields contain data

123
Q

What is a valid transaction test?

A

An edit test that sees whether an inputted transaction is the right kind for the file (e.g. for A/R, it might be that all inputted transactions are either debits or credits to A/R)

124
Q

What is a valid combination of fields test?

A

An edit test that sees whether certain data, when combined, is reasonable (e.g. selling a large quantity of washers and dryers to a single customer – this might show that the wrong quantity was entered)

125
Q

What is a self-checking digit?

A

An edit test where a digit is added to some number (e.g. an order ID number) based off the number itself, and then checked for accuracy later

E.g. there might be a formula to add the sum of the 2nd and 5th digits of an order ID, so an order ID of 41853 would be changed to 418534, since 1+3=4. This can help ensure that other data is inputted correctly.

126
Q

What is a valid sign test?

A

An edit test that checks whether a sign (i.e. positive or negative) is accurate for a record

127
Q

What is an error log?

A

A record of transactions that aren’t processed due to some error – exists to ensure that transactions skipped over (due to error) will later be corrected

Also called an error listing

128
Q

What are some application controls related to processing?

A

(1) Reconciling control totals with inputs
(2) Prevention of processing the wrong files
(3) Limit tests built into programs

129
Q

What are some application controls related to output?

A

(1) Reconciling output totals with input totals
(2) Comparing scanned outputs to original documents
(3) Distributing outputs only to authorized users

130
Q

What two segregation controls are important in small-business IT environments?

A
  • between data entry and processing

- between IT and transaction authorization for users

131
Q

What might an auditor do if a company does not document changes made to an IT program?

A

Obtain the original software from the manufacturer and see what changes have been made

132
Q

What are distributed systems?

A

Systems with a main/central computer system and several remote computer sites

133
Q

What are important factors to remember if a client utilizes an IT service center?

A

(1) transmission
(2) error correction
(3) audit trail
(4) master file changes
(5) output
(6) security