Information Technology 2 Flashcards

(195 cards)

1
Q

Office Automation Systems

A

Designed to improve productivity by supporting daily work of employees (e.g., word processing, spreadsheets, presentation tools, e-mail, electronic calendars, contact management software)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Transaction Processing Sytems

A

Involve the daily processing of transactions (e.g., airplane reservation systems, payroll recording, cash receipts, cash disbursements)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Management Reporting Systems

A

Designed to help with the decision-making process by providing access to computer data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Management Information Systems

A

Systems designed to provide past, present and future information for planning, organizing and controlling the operations of the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Decision Support Systems

A

Computer-based information systems that combine models and and data to resolved nonstructured problems with extensive user involvment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Expert Systems

A

Computer systems that apply reasoning methods to data in a specific relatively structured area to render advice or recommendations, much like a human expert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Executive Information Systems

A

Computerized systems that are specifically designed to support executive work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Parallel Implementation

A

Method that uses both systems until it is determined that the new system is operating properly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Plunge Implementation

A

Method where the organization ceases using the old system and begins using the new system immediately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Pilot Implementation

A

Method that involves having a small group of individuals using the new system until it is seen to be working properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Phased Implementation

A

Method that involves installing the system in a series of phases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Supercomputes

A

Extremely powerful, high-speed computers used for extremely high-volume and/or complex processing needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Supercomputer

A

Large, powerful, high-speed computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Servers

A

High-powered microcomputers that “serve” applications and data to clients that are connected via a network (e.g., web servers, database servers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Microcomputers

A

Designed to be used by one person at a time, they are often called personal computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Central Processing Unit (CPU)

A

Principal hardware components of a computer. It contains an arithmetic/logic unit, primary memory, and a control unit. Major function is to fetch stored instructions and data, decode the instructions, and carry out the instructions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Arithmetic/logic unit

A

Performs mathematical operations and logical comparisons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Primary memory (storage)

A

Active data and program steps that are being processed by by the CPU. May be divided into RAM and ROM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Control Unit

A

Interprets program instructions and coordinates input, output, and storage devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Magnetic Tape

A

Slowest type of storage available because data is stored sequentially. Primarily used for archiving purposes today

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Magnetic Disks

A

The most common storage medium in use on computers today. Also called “hard disk drives”. Data can be accessed directly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

RAID

A

A way of storing the same data redundantly on multiple magnetic disks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Compact Discs

A

Use optical technology to read and write data to the disc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Solid State Drives

A

Use microchips to store data and required no moving parts for read/write operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Could-based Storage
Also called SaaS. This type of storage is hosted offsite, typically by third parties, and is accessed via the internet.
26
Analog
The representation that is produced by the fluctuations of a continuous signal (e.g., speech, temperature, weights, speed, etc.) Rather than using 0s and 1s to represent information, analog signals use electrical, mechanical, hydraulic or pneumatic devices to transmit the fluctuations in the signal itself to represent information.
27
Online
Equipment in direct communication with, and under the control of, the CPU.
28
Off-line
Equipment not in direct communication with the CPU, the operator generally must intervene to connect off-line equipment or data to the CPU
29
Console
A terminal used for communication between the operator and the computer (e.g., the operator of a mainframe computer)
30
Peripheral Equipment
All non-CPU hardware that may be placed under the control of the central processor. Classified as online or off-line, this equipment input, storage, output, and communication.
31
Controllers
Hardware units designed to operate specific input-output units
32
Buffer
A temporary storage unit used to hold data during computer operations
33
MIPS
Millions of instructions per second; a unit of measuring the execution speed of computers
34
Key-to-tape and Key-to-disk
In which data is entered on magnetic tape and/or disk respectively, and then read into a computer
35
Visual display terminal/monitors
Uses keyboard to directly enter data into computer
36
Input Interface
A program that controls the display for the users and allows the user to interact with the system
37
Graphical User Interface (GUI)
Uses icons, pictures, and menus instead of text for inputs (e.g., Windows)
38
Command Line Interface
Uses text-type commands
39
Turnaround documents
Documents that are sent to the customer and returned as inputs (e.g., utility bills)
40
Magnetic Tape Reader
A device capable of sensing information recorded as magnetic spots on magnetic tape
41
Magnetic Ink Character Reader (MICR)
Device that reads characters that have been encoded with a magnetic ink (e.g., bank check readers)
42
Scanner
A device that reads characters on printed pages
43
Automatic teller machine (ATM)
A machine used to execute and record transactions with financial instituions
44
Radio Frequency Identification (RFID)
Uses radio waves to track and input data. Does not require line-of-sight access like bar code technology (e.g., Mobil's Speedpass payment systems, FasTrak toll collection system
45
Point-of-sale (POS) recorders
Devices that read price and product code data. POS recorders ordinarily function as both a terminal and a cash register.
46
Electronic commerce and Electronic Data Interchange
Involves one company's computer communicating with another's computer
47
Plotters
Produce paper output of graphs
48
Computer Output to microfilm or microfiche (COM)
Makes use of photographic process to store output
49
Operating System
Performs scheduling, resource allocation, and data retrieval based on instructions provided in job control language
50
Utility Programs
Handle common file, data retrieval based on instructions provided in job control language
51
Communications software
Controls and supports transmission between computers, computers and monitors, and accesses various databases
52
Applications software
Programs designed for specific uses, or “applications"
53
Enterprise Resource Planning (ERP)
Designed as relatively complete information system “suites” for large and medium size organizations (e.g., human resources, financial applications, manufacturing, distribution).
54
Compiler
Produces a machine language object program from a source program language
55
Multiprocessing
Simultaneous execution of two or more tasks, usually by two or more CPUs that are part of the same system
56
Multitasking
The simultaneous processing of several jobs on a computer
57
Object program
The converted source program that was changed using a compiler to create a set of machine readable instructions that the CPU understands
58
Source program
program written in a language from which statements are translated into machine language; computer programming has developed in “generations”
59
Machine language
Composed of combinations of 1’s and 0’s that are meaningful to the computer
60
Assembly language
A low-level programming language that uses words (mnemonics) instead of numbers to perform an operation. Assembly language must be translated to machine language by a utility program called an assembler
61
Virtual memory (storage)
Online secondary memory that is used as an extension of primary memory, thus giving the appearance of larger, virtually unlimited internal memory
62
Protocol
Rules determining the required format and methods for transmission of data
63
Desk checking
Review of a program by the programmer for errors before the program is run and debugged on the computer
64
Debug
To find and eliminate errors in a computer program. Many compilers assist debugging by listing errors such as invalid commands in the program.
65
Edit
To correct input data prior to processing
66
Loop
set of program instructions performed repetitively a predetermined number of times, or until all of a particular type of data has been processed
67
Memory dump
A listing of the contents of storage
68
Patch
A section of coding inserted into a program to correct a mistake or to alter a routine
69
Run
A complete cycle of a program including input, processing and output
70
Online transaction processing (OLTP)
Databases that support day-to-day operations
71
Online analytical processing (OLAP)
A category of software technology that enables the user to query the system (retrieve data), and conduct an analysis, etc., ordinarily while the user is at a PC.
72
Decision support systems
Computer-based information systems that combine models and data in an attempt to solve relatively unstructured problems with extensive user involvement
73
data warehouse
A subject-oriented, integrated collection of data used to support management decision-making processes
74
Data mart
A data warehouse that is limited in scope
75
Data mining
Using sophisticated techniques from statistics, artificial intelligence and computer graphics to explain, confirm and explore relationships among data
76
Business intelligence (BI)
A combination of systems that help aggregate, access, and | analyze business data and assist in the business decision-making process
77
Artificial intelligence (AI)
Computer software designed to help humans make decisions
78
Bit
A binary digit (0 or 1) which is the smallest storage unit in a computer
79
Byte
A group of adjacent bits (usually 8) that is treated as a single unit, or character, by the computer.
80
Field
A group of related characters (e.g., a social security number)
81
Record
An ordered set of logically related fields
82
File
a group of related records (e.g., all the weekly pay records year-to-date), which is usually arranged in sequence
83
Table
A group of related records in a relational database with a unique identifier (primary key field) in each record
84
Database
A group of related files or a group of related tables (if a relational database)
85
Array
In a programming language, an aggregate that consists of data objects with attributes, each of which may be uniquely referenced by an index (address)
86
Master file
A file containing relatively permanent information used as a source of reference and periodically updated with a detail (transaction) file (e.g., permanent payroll records)
87
Detail or transaction file
A file containing current transaction information used to update the master file (e.g., hours worked by each employee during the current period used to update the payroll master file)
88
Database
A collection of interrelated files, ordinarily most of which are stored online.
89
Normalization
The process of separating the database into logical tables to avoid certain kinds of updating difficulties (referred to as “anomalies”)
90
Database system
Computer hardware and software that enables the database(s) to be implemented
91
Database management system
Software that provides a facility for communications between various applications programs (e.g., a payroll preparation program) and the database (e.g., a payroll master file containing the earnings records of the employees)
92
Data independence
Basic to database systems is this concept which separates the data from the related application programs
93
Data modeling
Identifying and organizing a database’s data, both logically and physically
94
Data model
determines what information is to be contained in a database, how the information will be used, and how the items in the database will be related to each othe
95
Entity-relationship modeling
An approach to data modeling. The model (called the entity-relationship diagram, or ERD) divides the database in two logical parts—entities (e.g. “customer,” “product”) and relations (“buys,” “pays for”)
96
Primary key
The field(s) that make a record in a relational database table unique.
97
Foreign key
The field(s) that are common to two (or more) related tables in a relational database
98
REA data model
A data model designed for use in designing accounting information databases. REA is an acronym for the model’s basic types of objects: Resources—Identifiable objects that have economic value, Events—An organization’s business activities, Agents—People or organizations about which data is collected.
99
Data Dictionary
A data structure that stores meta-data
100
Meta-data
Definitional data that provides information about or documentation of other data managed within an application or environment.
101
Structured query language (SQL)
The most common language used for creating and | querying relational databases
102
Data definition language (DDL)
Used to define a database, including creating, altering, | and deleting tables and establishing various constraints
103
Data manipulation language (DML)
Commands used to maintain and query a database, | including updating, inserting in, modifying, and querying (asking for data).
104
Data control language (DCL)
Commands used to control a database, including controlling which users have various privileges (e.g., who is able to read from and write to various portions of the database).
105
Hierarchical
The data elements at one level “own” the data elements at the next lower level
106
Networked
Each data element can have several owners and can own several other elements (think of a matrix-type structure in which various relationships can be supported.
107
Relational
A database with the logical structure of a group of related spreadsheets.
108
Object-oriented
Information (attributes and methods) are included in structures called object classes
109
Object-relational
Includes both relational and object-oriented features
110
Distributed
A single database that is spread physically across computers in multiple locations that are connected by a data communications link.
111
Logical views
Users may be provided with authorized views of only the portions of the database for which they have a valid need.
112
Personal area network (PAN)
A computer network that is centered around an individual and the personal communication devices he/she uses
113
Local area networks (LAN)
Privately owned networks within a single building or campus of up to a few miles in size
114
Metropolitan area network (MAN)
larger version of a LAN. For example, it might include a group of nearby offices within a city.
115
Wide area networks (WAN)
Networks that span a large geographical area, often a country or continent
116
Hypertext Markup Language (HTML) and/or Extensible Markup Language (XML)
Languages used to create and format documents, link documents to other Web pages, and communicate between Web browsers
117
Extensible Business Reporting Language (XBRL)
An XML-based language being developed specifically for the automation of business information requirements, such as the preparation, sharing, and analysis of financial reports, statements, and audit schedules
118
Hypertext Transfer Protocol (HTTP)
The primary Internet protocol for data communication | on the World Wide Web
119
Uniform Resource Locator (URL)
A standard for finding a document by typing in an | address
120
World Wide Web (the web or WWW)
A framework for accessing linked resources (e.g., | documents, pictures, music files, videos, etc.) spread out over the millions of machines all over the Internet
121
Web browser
Client software (e.g., Internet explorer, Firefox, Chrome, Mosaic, etc.) that provides the user with the ability to locate and display web resources
122
Web servers
The software that “serves,” (i.e., makes available) web resources to software clients. web servers
123
Firewall
A method for protecting an organization’s computers and computer information from outsiders. A firewall consists of security algorithms and router communications protocols that prevent outsiders from tapping into corporate database and e-mail systems.
124
Router
A communications interface device that connects two networks and determines the best way for data packets to move forward to their destinations
125
Bridge
A device that divides a LAN into two segments, selectively forwarding traffic across the network boundary it defines; similar to a switch
126
Switch
A device that channels incoming data from any of multiple input ports to the specific output port that will take the data toward its intended destination
127
Gateway
A combination of hardware and software that links to different types of networks. For examples, gateways between e-mail systems allow users of differing e‑mail systems to exchange messages
128
Proxy server
A server that saves and serves copies of web pages to those who request them (e.g., potential customers).
129
Web 2.0
Second generation of the web. Refers to era of web-based collaboration and community generated content via web-based software tools
130
RSS (Really Simple Syndication)/ATOM Feeds
An XML application that facilitates the sharing and syndication of website content by subscription
131
TCP/IP (Transmission Control Protocol/Internet Protocol)
The basic communication language or protocol of the Internet. It has two layers. The higher layer assembles messages or files into smaller packets that are transmitted over the Internet. The lower layer assigns IP addresses and insures that messages are delivered to the appropriate computer
132
IP address
The number that identifies a machine as unique on the Internet
133
ISP (Internet Service Provider)
An entity that provides access to the Internet
134
Botnet
A network of computers that are controlled by computer code, called a “bot,” that is designed to perform a repetitive task such as sending spam, spreading a virus, or creating a distributed denial of service attack
135
Intranet
A local network, usually limited to an organization, that uses internet-based technology to communicate within the organization
136
Extranet
Similar to an intranet, but includes an organization’s external customers and/or suppliers in the network
137
File servers
The file server manages file operations and is shared by each of the client PCs (ordinarily attached to a LAN). The three responsibilities (input/output, processing, and storage) are divided in a manner in which most input/output, and processing occurs on client computers rather than on the server. The file server acts simply as a shared data storage device, with all data manipulations performed by client PCs
138
Database servers
Similar to file servers, but the server here contains the database management system and thus performs more of the processing
139
Distributed systems
These systems connect all company locations to form a distributed network in which each location has its own input/output, processing, and storage capabilities. These local computers also pass data among themselves and possibly to a server (often referred to as a “host” in this context) for further processing
140
Transmission media
Physical path that connect components of LAN, ordinarily twisted-pair wire, coaxial cable, or optical fiber. LANs that are connected wirelessly are called WLANs or WiFi networks
141
Network interface cards
Connect workstation and transmission media
142
End-User Computing (EUC)
The end user is responsible for the development and execution of the computer application that generates the information used by that same end user
143
Algorithm
A detailed sequence of actions to perform to accomplish some task (in this case to encrypt and/or decode data).
144
Key
In the content of encryption, a value that must be fed into the algorithm used to decode an encrypted message in order to reproduce the original plain text.
145
Private key system
An encryption system in which both the sender and receiver have access to the electronic key, but do not allow others access. The primary disadvantage is that both parties must have the key.
146
Electronic data interchange (EDI)
The electronic exchange of business transactions, in a standard format, from one entity’s computer to another entity’s computer through an electronic communications network
147
Value-added network (VAN)
A privately owned network that routes the EDI transactions between trading partners and in many cases provides translation, storage, and other processing. It is designed and maintained by an independent company that offers specialized support to improve the transmission effectiveness of a network. It alleviates problems related to interorganizational communication that results from the use of differing hardware and software.
148
Proprietary networks
In some circumstances (e.g., health care, banking) organizations have developed their own network for their own transactions
149
Authentication
Controls must exist over the origin, proper submission, and proper delivery of EDI communications
150
Packets
A block of data that is transmitted from one computer to another. It contains data and authentication information
151
Encryption
The conversion of plain text data into cipher text data used by an algorithm and key which only the users control
152
Systems analysis
The systems analyst analyzes the present user environment and requirements and may (1) recommend specific changes, (2) recommend the purchase of a new system, or (3) design a new information system
153
Systems programming
The systems programmer is responsible for implementing, modifying, and debugging the software necessary for making the hardware work (such as the operating system, telecommunications monitor, and the database management system).
154
Applications programming
The applications programmer is responsible for writing, testing, and debugging the application programs from the specifications (whether general or specific) provided by the systems analyst
155
Database administration
In a database environment, a database administrator (DBA) is responsible for maintaining the database and restricting access to the database to authorized personnel.
156
Data preparation
Data may be prepared by user departments and input by key to storage devices.
157
Operations
The operator is responsible for the daily computer operations of both the hardware and the software
158
Data library
The librarian is responsible for custody of the removable media (i.e., magnetic tapes or disks) and for the maintenance of program and system documentation
159
Data control
The control group acts as liaison between users and the processing center. This group records input data in a control log, follows the progress of processing, distributes output, and ensures compliance with control totals.
160
Web administrator (web manager)
Responsible for overseeing the development, planning, | and the implementation of a website. Ordinarily a managerial position
161
Web master
Responsible for providing expertise and leadership in the development of a website, including the design, analysis, security, maintenance, content development, and updates.
162
Web designer
Responsible for creating the visual content of the website
163
Web coordinator
Responsible for the daily operations of the website
164
Internet developer
Responsible for writing programs for commercial use. Similar to a software engineer or systems programmer
165
Intranet/Extranet developer
for writing programs based on the needs of the company.
166
Parity check
special bit is added to each character that can detect if the hardware loses a bit during the internal movement of a character
167
Echo check
Primarily used in telecommunications transmissions. During the sending and receiving of characters, the receiving hardware repeats back to the sending hardware what it received and the sending hardware automatically resends any characters that were received incorrectly
168
Diagnostic routines
Hardware or software supplied by the manufacturer to check the internal operations and devices within the computer system. These routines are often activated when the system is booted up
169
Boundary protection
Most CPUs have multiple jobs running simultaneously (multiprogramming environment). To ensure that these simultaneous jobs cannot destroy or change the allocated memory of another job, the systems software contains boundary protection controls
170
Periodic maintenance
The system should be examined periodically (often weekly) by a qualified service technician.
171
Call back
Call back is a specialized form of user identification in which the user dials the system, identifies him/herself, and is disconnected from the system. Then either (1) an individual manually finds the authorized telephone number or (2) the system automatically finds the authorized telephone number of the individual and calls back
172
Preprinted form
Information is preassigned a place and a format on the input form
173
Check digit
An extra digit added to an identification number to detect certain types of data transmission errors
174
Control, batch, or proof total
A total of one numerical field for all the records of a batch that normally would be added, (e.g., total sales dollars)
175
Hash total
A control total where the total is meaningless for financial purposes (e.g., a mathematical sum of employee social security numbers)
176
Record count
A control total of the total records processed
177
Limit (reasonableness) test
A test of the reasonableness of a field of data, given a predetermined upper and/or lower limit (e.g., for a field that indicates auditing exam scores, a limit check would test for scores over 100)
178
Menu driven input
As input is entered, the operator responds to a menu prompting the proper response (e.g., What score did you get on the Auditing part of the CPA Exam [75–100]?).
179
Field check
A control that limits the types of characters accepted into a specific data field (e.g., a pay rate should include only numerical data).
180
Validity check
A control that allows only “valid” transactions or data to be entered into the system (e.g., a field indicating sex of an individual where 1 = female and 2 = male—if the field is coded in any other manner it would not be accepted).
181
Missing data check
A control that searches for blanks inappropriately existing in input data (e.g., if an employee’s division number were left blank an error message would result).
182
Field size check
A control of an exact number of characters to be input (e.g., if part numbers all have 6 digits, an error message would result if more or less than 6 characters were input).
183
Logic check
Ensures that illogical combinations of input are not accepted (e.g., if the Tuba City branch has no company officers, an error message would result if two fields for a specified employee indicated that the employee worked as an officer in Tuba City).
184
Redundant data check
Uses two identifiers in each transaction record (e.g., customer account number and the first five letters of customer’s name) to confirm that the correct master file record is being updated.
185
Closed-loop verification
A control that allows data entry personnel to check the accuracy of input data. For example, the system might retrieve an account name of a record that is being updated, and display it on the operator’s terminal. This control may be used instead of a redundant data check
186
Reciprocal agreement (Mutual aid pact)
An agreement between two or more organizations (with compatible computer facilities) to aid each other with their data processing needs in the event of a disaster.
187
Hot site
A commercial disaster recovery service that allows a business to continue computer operations in the event of computer disaster
188
Cold site
Similar to a hot site, but the customer provides and installs the equipment needed to continue operations
189
Internal site
Large organizations with multiple data processing centers sometimes rely upon their own sites for backup in the event of a disaster
190
Mirrored web server
An exact copy of a website, which is the best way to back up the website.
191
System flowchart
A graphic representation of a data-processing application that depicts the interaction of all the computer programs for a given system, rather than the logic for an individual computer program
192
Program flowchart
A graphic representation of the logic (processing steps) of a computer program.
193
Internal control (audit) flowchart or document flowchart
A graphic representation of the flow of documents from one department to another, showing the source flow and final disposition of the various copies of all documents. Most flowcharts on the CPA exam have been of this type
194
Decision table
Decision tables use a matrix format that lists sets of conditions, and the actions that result from various combinations of these conditions
195
Data flow diagram (DFD)
Presents logical flows of data and functions in a system. For example, a data flow diagram for the delivery of goods to a customer would include a symbol for the warehouse from which the goods are shipped and a symbol representing the customer. It would not emphasize details such as computer processing and paper outputs.