Information Technology Flashcards
What is e-cash
Ecash is a system for use of cash to purchase items over the internet. Allows customers to pay for goods or services from a web site maintaining financial privacy.
what is a cold site/ hot site, backup plans
cold - backup site that has not been stocked with equipment - involves processing at another site. Customer can provide and install equipment in the event of a disaster.
hot - one that is stocked and ready for operation - relies upon a commercial disaster recovery service that allows a business to continue in the event of computer disaster
RAID - designed to prevent loss of data in the event of equipment failure
off site mirrored web server - provides continuous duplication of data in different geographic locations
When is a distributed data processing system useful?
When processing is done in multiple locations. It enables processing of a large volume of transactions and fast access to data.
Most appropriate when large volumes of data are generated and data is needed at remote locations.
Distributed processing is not appropriate to a centralized system.
What is a reciprocal agreement
Involves agreement between two or more organizations to help each other in the event of disaster to one’s processing
What is rollback
A checkpoint system for copying the database at certain points for backup support.
What is a trojan horse
Computer program that appears to be legitimate but performs an illicit activity when it is run
What is used as a batch control to verify the accuracy of the total credit posting in updating a computerized AR file?
AR will be credited for the amount of cash received plus discounts taken by customers. The control total should be the sum of the cash deposits plus the discounts taken by customers. It is NOT less the sales returns.
What risk is minimized by requiring all employees accessing the information system to use passwords?
Firewall vulnerability - passwords can prevent unauthorized individuals from penetrating the firewall
NOT collusion, as it can still occur with passwords
Firewall prevents unauthorized users from accessing a network segment. “it separates or isolates a network segment from the main network which maintaining connection between networks”
What should be the role of the computer librarian
Should maintain custody of program code, documentation, and instructions and detailed listings to strengthen controls in a computer system
Computer operators
Computer operations
Should not have access to detailed program listings which would give them the opportunity to modify the programs
Good controls for computer operations dept includes periodic rotation and mandatory vacation to provide other personnel ability to detect operator problems. Controlled access and segregation of duties helps to separate incompatible functions.
Control group
Should be responsible for the distribution of all computer output to strengthen controls in a computer system
Data control personnel correct detected data entry errors for the cash disbursement system.
Computer/applications programmers
Computer programmer writes detailed programs based upon the work of the systems analyst.
Should write and debug programs which perform routines designed by the systems analyst in order to strengthen controls in a computer system
Code approved changes to a payroll program
Note difference between application programmer and systems programmer
Systems analyst
Responsible for designing the computer system, including the goals of the system and means of achieving those goals, based upon the nature of the business and its info needs. The systems analyst must also outline the data processing system for the computer programmer with system flowcharts.
Reviews applications of data processing and maintains systems documentation
Systems programmer
Given responsibility for maintaining system software, including operating systems and compilers.
Modify and adapt operating system software.
Should not maintain custody of output in a computerized system. At a minimum, the programming, operating, and library functions should be segregated.
Control clerk
Establishes control over data received by the information systems departments and reconciles totals after processing.
AP clerk
Prepares data for computer processing and enters the data into the system
What is the benefit of an ERP system
Major aspect of an ARP system is the alignment of mgmt risk taking with shareholder risk appetite
Increases responsiveness and flexibility while aiding in the decision making process. ERP reduces data redundancy. ERP systems are typically more expensive to implement.
Compare batch processing to online real time processing
Batch system often requires less personnel and takes less operating resources.
Batch processed data is not updated until the batch is processed.
Note that a greater level of control is necessary in an online real time system.
Batch system may process sequentially against a master file, keypunching is followed by machine processing, processed batches result in numerous printouts.
What is a critical success factor in data mining a large data store?
Pattern recognition - the benefit of data mining is the confirmation and exploration of data relationships.
Note that data mining does not involve search engines.
What are value added networks (VAN)
-Provide increased security over transactions because they use private networks (not public).
It is a system that routes data transactions between trading partners.
-VANs cost more than simply using the internet.
-VANs make it more difficult to collect data about transmissions.
-VAN is able to reduce communication and data protocol problems. Partners establish less point to point connections using VAN.
VAN is a privately owned network that routes EDI transactions and alleviates problems related to differences between various organizations’ hardware and software.
VAN is more costly and it results in communications to the value added network and then to the trading partner NOT direct communication between trading partners.
What is a data flow diagram
Graphical notations that show the flow and transformation of data within a system or business area
Action diagrams
Process logic notations that combine graphics and text to support the definition of technical rules
Program structure charts
Graphical depictions of the hierarchy of modules or instructions in a program
Conceptual data models
Independent definitions of the data requirements that are explained in terms of entities and relationships.
In a client server, who is the client?
Client is the computer or workstation of the individual user. The server ordinarily provides most of the software and provides services to the client.
What do the different tests check for - sequence test, completeness test, validity check, limit test, parity check, echo check
sequence test - to see if sequence is in right order
completeness test- test of completeness of records
validity check - check of an entered number to see if it is in valid form or a valid account number
limit test - test of reasonableness of a field based on specified limits
Batch control total - detects an error when clerk inputs 12.99 when actual is 122.99. Not to be confused with limit check as it would only work if amounts were reversed.
Parity check
Echo check - hardware control where data is transmitted back to its source and compared to the original data to verify the transmission correctness (echoing)
Parity - involves a special bit which is added to each character stored in memory and detects if the hardware loses a bit during the internal movement of the character.
What are good internal controls in a computer system
Segregates operators, programmers, and library function. Machine operators should not have access to the systems manual. Operators should not have complete info on the operation and weaknesses of the overall system. Operators should (by nature of operating the system( have access to error messages and will distribute them to the control group.
Store backup files off premises will improve internal control. Reconstruction of files if necessary will be possible.
What should be in a systems specifications document
Description of data elements needed
Record, field, file,byte for collection of data for all vendors in a database
Byte - piece of a field
Field - element of a record
Record - info about one vendor
File - collection of data for all vendors
Control figures, limit checks
Address the accuracy of info on a file, not the physical security of a program file.
Crossfooting tests
Address the accuracy of info on a file, not the physical security of a program file
External labels
Will prevent file destruction by properly identifying each file
Stakeholder
Anyone that uses a system. Anyone in the organization who has a role in creating or using the documents and data stored on the computer or networks.
International standards for the professional practice of internal auditing - what should chief audit executive do?
Establish a risk based approach to determine audit priorities