Information Technology (17%) Flashcards
Cloud Based Systems Applications
- IaaS
- PaaS
- SaaS
- Infrastructure as a service - use cloud to access virtual hardware such as computers and storage.
- Platform as a service - creating cloud-based software and programs.
- Software as a service - remote access to software. Office 365 is an example of SaaS.
An Enterprise Resource Planning (ERP) system’s main purpose is to?
Integrate data from all aspects of an organization’s activities. An ERP system is a comprehensive system that integrates all business processes.
Organizational Structure of a Segregated IT Department (ASC)
ASC functions must be strictly segregated!
- Applications Development
- Systems Administration and Programming
- Computer Operations
Functions in these three areas should be strictly segregated. (This is a bit like the “cannibals and missionaries” problem from computer science and artificial intelligence.) In particular:
- Computer operators and data entry personnel – Should never be allowed to?
- Systems programmers – Should never have?
- Data administrators – Should never have?
- Application programmers and systems analysts – Should not?
- Application programmers and systems analysts – Should not?
- Computer operators and data entry personnel – Should never be allowed to act as programmers.
- Systems programmers – Should never have access to application program documentation.
- Data administrators – Should never have access to computer operations (“live” data).
- Application programmers and systems analysts – Should not have access to computer operations (“live” data).
- Application programmers and systems analysts – Should not control access to data, programs, or computer resources.
Data Conversion occurs at this stage:
Implementation - The process of moving from the old to the new system occurs at this stage.
At this stage, we purchase hardware:
Design and Development - Technical architecture specification and a systems model occur at the design stage. During development, programmers use the design specifications to develop the program and data files.
The requirements definition document is signed at this stage:
Analysis - Systems analysts work with end users to understand and document business processes and system requirements at this stage. All parties sign off on the requirements definition to signify their agreement with the projects goals and processes at this stage.
General Controls in an IT Environment
- Personnel Policies: provides for proper SOD and use of computerized accounts that provide users with passwords, etc. to prevent unauthorized access.
-
File Security Policies: safeguard files from accidental or intentional errors or abuse.
- External/Internal file labels
- Backups of critical files
- Lockout procedures
- File Protection
-
Hardware Controls: built into computer equipment to ensure proper functioning.
- Parity Checks - verifies all bytes of data are stored as an even number of bits
- Echo Checks - data that is transmitted is then sent back to verify that it was received correctly.
The following controls are what type of controls?
- Missing Data Check
- Field Check
- Limit Test (Range and Sign)
- Valid Code Test
- Check Digit
- Reasonableness Check
- Sequence Check
- Key Verification
- Closed Loop Verification
- Batch Control Totals (See card)
- Default Values
- Automated Data Capture
Input Controls - control over data entry and data origination process
Input Controls - Batch Control Totals
- Record Count - total number of entries made (i.e. total number of employees entered into a payroll program)
- Financial Totals - sum of a column of numbers expressed in dollar form (such as total value of all of the checks)
- Non-Financial totals - meaningful sum of a column of numbers expressed in some type of unit other than dollars.
- Hash Totals - meaningless sum of a column of numbers (such as the sum of employee ID numbers)
File Types
-
Master File - updated by postings to transaction files
- Standing Data - part of Master file, consists of infrequently changing master files (fixed assets, supplier names, etc.)
- Detail File - a file listing a group of transactions that can be used to update the master file.
File Controls
- Parity Check - A zero or one included in a byte of information that makes the sum of bits either odd or even. A parity check is designed to detect errors in data transmission.
- Read after write check
- Echo check - verifies transmission between devices by echoing back.
- Error reporting and resolution
- Boundary protection - computer “traffic cop.”
- Internal labels (header and trailer)
- External labels
- Version control
- File access and updating controls
Output Controls
Ensure that computer reports are accurate and are distributed only as authorized.
- Spooling - docs sent to printer that cannot be immediately printed are stored to a disk.
- Disposal of aborted print jobs
- Disruption of reports
- End user (one-to-one checking)
- Logging and archiving of forms
- Record retention and disposal
E-Business vs. E-Commerce
E-Business is a generic name for any business process that relies on electronic dissemination of information or on automated transaction processing.
E-Commerce is a narrower term used to refer to transactions between the organization and its trading partners.
Types of E-Commerce
(remember that a requisite for EC is the trust between two parties conducting the transaction(s))
Business-to-business (B2B) - Involves electronic processing of transactions between businesses and includes electronic data interchange (EDI), supply chain management (SCM) and electronic funds transfer (EFT).
Business-to-consumer (B2C) - Involves selling goods and services directly to consumers, almost always using the Internet and web-based technology. B2C e-commerce relies heavily on intermediaries or brokers to facilitate the sales transaction.
Business-to-employee (B2E) - Involves the use of web-based technology to share information with, and interact, with an organization’s employees, e.g., through portals and intranets.
Business-to-government (B2G) - Involves the growing use of web-based technologies to provide, and support, governmental units, e.g., providing property tax data online, paying parking tickets online, online contract bidding.
E-Commerce Risks
Using EC Risks
- System Availibility / Security / Confidentiality
- Authentication
- Nonrepudiation
- Integrity
Not Using EC Risks
- Customers find online prices are cheaper
- Limited Growth
- Limited markets exposure
E-Commerce Applications
- Customer Relationship Management (CRM) - used to manage relationships with clients, store information about existing and potential customers, etc.
- Electronic Data Interchange (EDI) - computer to computer exchange of business data (purchase orders, confirmations, invoices, etc.). EDI reduces handling costs and speeds transaction processing vs. traditional paper processing.
- Electronic Funds Transfer (EFT)
- Supply Chain Management (SCM) - Supply chain management incorporates all activities from the purchase and storage of raw materials, through the production process into finished goods through to the point-of-consumption.
- Computer Networks - essencial to e-business, e-commerce and social computing.
Electronic Data Interchange (EDI)
- EDI requires that all transactions be submitted in a specified format.
- Translation software is required to convert data between transactions and EDI formats.
- The most common specification in the United States is the American National Standards Institute format ANSI X.12; internationally, the United Nations EDI for Administration, Commerce and Transport (UN/EDIFACT) format is the dominant standard.
- EDI can be implemented using direct links between the trading partners, through communication intermediaries (called “service bureaus”), through value-added networks (VANs), or over the Internet.
- The well-established audit trails, controls, and security provided for EDI transactions by VAN are the principal reasons for their continued popularity.
EDI Costs
- Costs of Change - Costs associated with locating new business partners who support EDI processing; legal costs associated with modifying and negotiating trading contracts with new and existing business partners and with the communications provider; costs of changing internal policies and procedures to support the new processing model (process reengineering) and employee training.
- Hardware costs
- Costs of translation software
- Costs of data transmission
- Costs of security, audit and control procedures
What below is not an EFT?
- Direct deposit of payroll payments into the employee’s bank account
- Cash Cards
- Automated teller machine (ATM) transactions
- Credit card payment initiated from Point-of-Sale (POS) terminal
Cash Cards
Cash cards do not involve bank clearing processes and are not considered to be EFT transactions.
System Types by Activity
-
Operational Systems - supports day-to-day activities of business operations
- Transaction processing systems (TPS)
- Process financial and non-financial transactions
- Generate debit and credit entries
- Management Information Systems (MIS) - see card
- Decision Support Systems (DSS) - see card
- Knowledge Work Systems
- ERP Systems - entire lesson on this one
MIS (Internal Data)
Management Information Systems - systems designed to support routine management problems based primarily on data from transaction processing systems.
- MISs take planning information (budgets, forecasts, etc.) data and compare it to actual results in periodic management reports (summary reports, variance reports, and exception reports).
- Accounting information systems (AISs) – AISs take the financial data from transaction processing systems and use it to produce financial statements and control reports for management (e.g., accounts receivable aging analysis, product cost reports, etc.); AISs are a subset of MISs.
DSS (External Data)
Decision Support Systems
- Unlike MISs, DSSs frequently include external data in addition to summarized information from the TPS and include significant analytical and statistical capabilities.
- Data driven DSSs such as Data Warehousing and Data Mining systems are common examples of data-driven DSSs.
- Model-driven DSS - used to predict outcomes for management.
- Executive support systems (ESSs) or strategic support systems (SSSs) - especially designed for forecasting and LRP’s.
DSS vs. ESS
Executive Support Systems are:
- are a subset of DSS that are especially designed for forecasting and making long-range, strategic decisions, and they place greater emphasis on external data.
A specialized version of a data warehouse that contains data that is pre-configured to meet the needs of specific departments is known as:
Data Mart - focused on a particular market or purpose and contains only information specific to that objective. (TI’s Finance Data Mart)
Which of the following is true in regard to data warehouses?
I. The bulk of the data found in a data warehouse comprises historical operational data.
II. Pattern recognition is one of the principal functionalities offered by data mining software.
Both are TRUE
What is a useful control (i.e., restriction) on the ability of mobile devices to make changes in data?
View Only Access
Which of the following statements is true regarding small business computing?
A. Independent third-party review is especially important.
B. Backup procedures are important.
C. Additional supervision of computing may be necessary.
D. All of the above.
All of the above
Data Structure Hierarchy
-
Database is composed of many =
-
Files are composed of many =
-
Records are composed of multiple =
-
Fields are composed of =
-
Characters are made of =
-
Bytes (8 bits) are composed of =
- Bits = an individual 0 or 1
-
Bytes (8 bits) are composed of =
-
Characters are made of =
-
Fields are composed of =
-
Records are composed of multiple =
-
Files are composed of many =
Programming Languages
All software is created using programming languages.
- High level general purpose = C programming language
- Object oriented language used to design software = C++
- Integrated development environments = Java, templates that automatically generate code.
- Tagging language typically used for the internet = HTLM (Hypertext Markup Language)
- Script languages that add funtionality to web pages = PERL or Python
- Low level languages = assembler or machine (computer instructions)
DBMS Languages
- Data Definition Language (DDL) = allows the definition of tables and fields and relationships among tables. Uses meta-data.
- Data Manipulation Language (DML) = allows the user to add new records, delete old records and udpate existing records.
- Data Query Language (DQL) = allows user to extract information from the database:
- Structured Query Language (SQL) = most relational databases use SQBL to extract data. (text approach)
- Query-By-Example (QBE) = drag and drop fields (graphic approach)
Field (Attribute) Definition
A logical group of bytes. Identifies a characteristic or attribute of an entity.
- Customer name
- Customer address
- Customer number
Record Definition
Group of related fields (or attributes). Describes a:
- Specific invoice
- particular customer
- individual product
File Definition
Collection of related records for multiple entities.
- Invoice file
- Customer file
- Product file
Types of Software
System Software or Application Software
- Systems Software - programs that run computer and support system management (operating system is most important, i.e. Windows, Mac OS X)
- Application Software - end-user programs
Database Management System (DBMS)
“Middle-ware” Program that functions between the application software and the operating system. DBMS manages the database.
Central Processing System (CPU)
Control center of the computer system. 3 Principal Components:
- Control Unit
- Arithmetic Logic Unit (ALU)
- Primary Storage (memory)
- Random Access Memory (RAM) - temporarily stores data while it is in process.
- Read Only Memory (ROM) - semi-permanent data store for instructions that are closely linked to hardware. Hard to change.
Peripheral Devices: Input vs. Ouput
- Input - instruct the CPU and supply data to be processed.
- keyboard, mouse, trackball
- touch-screen technology
- Point of sale (POS) scanners
- Output - transfer data from processing unit to other formats
- Printers
- Plotters
- Monitors
- Flat-panel displays
- Cathode Ray Tube (CRT) displays
Manual Transaction Processing Steps
- Enter Transaction on Source Document
- Record SD chronoligically in a Journal
- Copy to ledger(s) = Master Files
- Prepare reports
Automated Transaction Processing Methodologies
Batch vs. OLRT
Batch
- Groups new transactions by type and processes periodically in sequential order.
- transaction and master files are sorted on a common key called sequential access files.
Disadvantages of Batch - not real time, systems is out of date, delays error detection.
Online Real Time Processing
- Continuous and immediate processing
- Simultaneous transaction entry and master file updating
- Requires random access storage devices (i.e. magnetic disk)
- Requires networked computer system
Disadvantages of OLRT - higher costs