Information Technology Flashcards

1
Q

Operators

Programmers

Librarians

A

Information Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Designs or purchases IT system

Responsible for flowcharts

Liaison between Users and Programmers

Note: Think IT Manager

A

Information Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A Systems Administrator controls database access.

A

Information Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Writes- Updates- Maintains- & Tests software- systems- and compilers

A

Information Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In order to maximize internal control- a Systems Programmer should NOT have application programming duties/abilities or be an Operator on the system.

A

Information Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Schedules and Monitors Jobs

Runs IT Help Desk

A

Information Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

For internal control purposes- they should not be a Programmer on the system.

A

Information Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Include Computer Logs.

Control Group should review the logs.

A

Information Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

To assist with decision making.

A

Information Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A type of Management Information System (MIS) that processes accounting transactions.

A

Information Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Specialized for Company Executive needs

Assists with Strategy Only

No Decision-Making Capabilities

A

Information Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Computer uses reasoning

Structured

No human interpretation needed

A

Information Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Computer provides data

Gives Interactive Support

Human interpretation needed

A

Information Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

User initiates the report.

The report is created upon demand.

A

Information Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Exception reports are produced when Edit Tests- Check Digits- or Self-Checking Digits identify a problem

A

Information Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A type of Ad Hoc report- initiated by a user.

A

Information Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The User develops and executes their own application.

A

Information Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

E-commerce makes business transactions easier.

A

Information Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Compromised data or theft.

Less paper trail for auditors.

A

Information Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Uses globally-accepted standards

Efficient

A

Information Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A file server stores shared programs and documents.

A

Information Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Located on a File Server- a Database allows users to share documents.

A

Information Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

It connects computers in close proximity.

A

Information Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

It connects computers that are far apart.

A

Information Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Privately-owned Network

Serves as 3rd Party Between 2 Companies

Routes EDI Transactions

Accepts wide range of Protocols

Very Costly

A

Information Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Prevents unauthorized access to a network.

A

Information Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Takes over a computer

Needs a host program to run

A

Information Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Takes over multiple computers

Doesn’t need a host program to run

A

Information Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

They prevent and detect hardware errors.

A

Information Technology

30
Q

Random Access Memory.

Internal memory in the computer used during immediate processing.

A

Information Technology

31
Q

Computer Processing Unit

It processes commands within a computer.

A

Information Technology

32
Q

It schedules and allocates system resources.

A

Information Technology

33
Q

Keyboard
Mouse
Scanner
Magnetic Ink Reader
Magnetic Tape Reader
EDI
Point of Sale Scanner

A

Information Technology

34
Q

Speakers

Monitors

Printers

A

Information Technology

35
Q

Sequential Access - Sorts data in order

Slower data retrieval

Header Label prevents Operator error by loading wrong tape

External Labels prevent accidental destruction by operator

A

Information Technology

36
Q

Random Access - Finds data in random spots

Faster data retrieval

Uses Boundary Protection for data

A

Information Technology

37
Q

Connects one network to another

Note: the Internet is connected by Gateways

A

Information Technology

38
Q

A control that detects internal data errors.

A bit is added to each character- it checks to see if a bit was lost.

A

Information Technology

39
Q

Transmitted data is returned to the sender for verification (it echoes back to the sender)

A

Information Technology

40
Q

It authorizes program changes and approves program test results.

A

Information Technology

41
Q

Software that controls access to IT systems.

Note: Don’t confuse this with anti-virus software

A

Information Technology

42
Q

It confirms a message has not been altered.

A

Information Technology

43
Q

PDA/Smartphone/Tablet

Microcomputer - PC- Laptop (cost-effective)

Minicomputer - Like a Mainframe- but smaller

Mainframe - Large computer with terminals attached

Supercomputer - Very powerful and very big

A

Information Technology

44
Q

Bit - 1 (on) and 0 (off)
Byte - 8 bits to a byte/character
Field - group of related characters/bytes (i.e. Name- Zip Code- Serial #)
Record - Group of related fields (i.e. Member name- address- phone number)
File - Group of related records (i.e. Membership directory)

A

Information Technology

45
Q

Determine language used for a specific computer- on a computer-to-computer basis

A

Information Technology

46
Q

Programs written in base computer language- not similar to English.

A

Information Technology

47
Q

They are written in a language close to English.

A

Information Technology

48
Q

Takes Source language (English) and converts to Object (Computer) Language

A

Information Technology

49
Q

It uses a Data Warehouse to support management decision making.

A

Information Technology

50
Q

Using artificial intelligence and pattern recognition to analyze data stores within a Data Warehouse.

A

Information Technology

51
Q

To process a company’s routine transactions.

A

Information Technology

52
Q

Data held- updates multiple files all at once

Leaves a better audit trail

Uses Grandfather-Father-Son backup (3 levels of backup kept in 3 locations)

A

Information Technology

53
Q

Checks to see if output data is valid- distributed and used in an authorized manner.

A

Information Technology

54
Q

Checks if data processing produced proper output

A

Information Technology

55
Q

An input control number- a meaningless sum of values included in the input.

Example would be summing a list of SSNs to make sure the data is the same once entered as it was prior to input into the system.

A

Information Technology

56
Q

Checks to see if data in existing tables or files belongs in the set

For example- is there a # in an alpha-only field or a letter in a numeric-only field

A

Information Technology

57
Q

Checks to see if numbers surpass a certain limit- i.e. in an age field is the number greater than 110.

A

Information Technology

58
Q

An input control that adds an identification number to a set of
digits - usually at the end

A

Information Technology

59
Q

An input check that prevents invalid characters- i.e. checks for alphabetic letters in a SSN field

A

Information Technology

60
Q

A disaster recovery system where if the main system goes down- a Hot Site is ready to take over immediately.

A

Information Technology

61
Q

If a main system goes down- a Cold Site will take time to get set up and running.

A

Information Technology

62
Q

SQL - Standard Query Language

A

Information Technology

63
Q

Defines SQL Database

Controls SQL Tables

A

Information Technology

64
Q

Queries SQL Database tables

A

Information Technology

65
Q

Controls Access to SQL Database

A

Information Technology

66
Q

Logical structure

Uses rows and columns similar to spreadsheet

A

Information Technology

67
Q

Has various levels

Uses trees to store data

A

Information Technology

68
Q

Data is more accessible

Reduced redundancy

A

Information Technology

69
Q

Cost of installation

Skilled personnel required to maintain

A

Information Technology

70
Q

Desktop client

Application Server

Database Server

Think: Your desktop computer runs applications and saves to a database

A

Information Technology