Information Technology Flashcards

1
Q

Which IT personnel roles should always be segregated?

A

Operators

Programmers

Librarians

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the duties of a systems analyst?

A

Designs or purchases IT system

Responsible for flowcharts

Liaison between Users and Programmers

Note: Think IT Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the primary duty of a Systems Administrator?

A

A Systems Administrator controls database access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the duties of a Systems Programmer?

A

Writes- Updates- Maintains- & Tests software- systems- and compilers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which duties should a Systems Programmer NOT have?

A

In order to maximize internal control- a Systems Programmer should NOT have application programming duties/abilities or be an Operator on the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the duties of a Systems Operator?

A

Schedules and Monitors Jobs

Runs IT Help Desk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What duties should a System Operator NOT have?

A

For internal control purposes- they should not be a Programmer on the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

If it is not possible to segregate duties in an IT System- what actions should be taken to compensate for internal control purposes?

A

Include Computer Logs.

Control Group should review the logs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of a Management Information System (MIS)?

A

To assist with decision making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an Accounting Information System (AIS)?

A

A type of Management Information System (MIS) that processes accounting transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the characteristics of an Executive Information System (EIS)?

A

Specialized for Company Executive needs

Assists with Strategy Only

No Decision-Making Capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the characteristics of an Expert System (ES)?

A

Computer uses reasoning

Structured

No human interpretation needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the characteristics of a Decision Support System (DSS)?

A

Computer provides data

Gives Interactive Support

Human interpretation needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the characteristics of an Ad Hoc computer report?

A

User initiates the report.The report does not currently exist, but can be created upon demand, without having to get a software developer or programmer involved.
Often called a User Report Writer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When are Exception reports generated?

A

Exception reports are produced when Edit Tests- Check Digits- or Self-Checking Digits identify a problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Query?

A
  • A request for specific data that meet a set of criteria (Ex: Day’s sales)
  • A type of Ad Hoc report- initiated by a user.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is End-User Computing?

A

The User develops and executes their own application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the primary benefit of E-commerce?

A

E-commerce makes business transactions easier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the risks of E-commerce?

A

Compromised data or theft.

Less paper trail for auditors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the benefits of Electronic Data Interchange?

A

Uses globally-accepted standards

Efficient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a File Server?

A

A file server stores shared programs and documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a Database & what is its purpose?

A
  • Files that are interrelated & coordinated

- Located on a File Server- a Database allows users to share documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the purpose of a LAN (Local Area Network)?

A

It connects computers in close proximity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the purpose of a WAN (Wide Area Network)?

A

It connects computers that are far apart.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are the characteristics of a VAN (Value-Added Network)?

A

Privately-owned Network

Serves as 3rd Party Between 2 Companies

Routes EDI Transactions

Accepts wide range of Protocols

Very Costly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the purpose of a Firewall?

A

Prevents unauthorized access to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are the characteristics of a virus?

A

Takes over a computer

Needs a host program to run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are the characteristics of a computer worm?

A

Takes over multiple computers

Doesn’t need a host program to run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the purpose of Automated Equipment Controls?

A

They prevent and detect hardware errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is RAM?

A

Random Access Memory.

Internal memory in the computer used during immediate processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is a CPU?

A

Computer Processing Unit

It processes commands within a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is Job Control Language?

A

It schedules and allocates system resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are examples of input devices?

A

Keyboard
Mouse
Scanner
Magnetic Ink Reader
Magnetic Tape Reader
EDI
Point of Sale Scanner

34
Q

What are examples of Output Devices?

A

Speakers

Monitors

Printers

35
Q

What are the characteristics of Magnetic Tape storage?

A

Sequential Access - Sorts data in order

Slower data retrieval

Header Label prevents Operator error by loading wrong tape

External Labels prevent accidental destruction by operator

36
Q

What are the characteristics of Magnetic Disks?

A

Random Access - Finds data in random spots

Faster data retrieval

Uses Boundary Protection for data

37
Q

What is a Gateway?

A

Connects one network to another

Note: the Internet is connected by Gateways

38
Q

What are Parity Checks?

A

A control that detects internal data errors.

A bit is added to each character- it checks to see if a bit was lost.

39
Q

What is an Echo Check?

A

Transmitted data is returned to the sender for verification (it echoes back to the sender)

40
Q

What is a Change Control?

A

It authorizes program changes and approves program test results.

41
Q

What is security software?

A

Software that controls access to IT systems.

Note: Don’t confuse this with anti-virus software

42
Q

What is the purpose of a Digital Signature?

A

It confirms a message has not been altered.

43
Q

List the types of computers from smallest to largest

A

PDA/Smartphone/Tablet

Microcomputer - PC- Laptop (cost-effective)

Minicomputer - Like a Mainframe- but smaller

Mainframe - Large computer with terminals attached

Supercomputer - Very powerful and very big

44
Q

What are the units of computer data from smallest to largest?

A

Bit - 1 (on) and 0 (off)
Byte - 8 bits to a byte/character
Field - group of related characters/bytes (i.e. Name- Zip Code- Serial #)
Record - Group of related fields (i.e. Member name- address- phone number)
File - Group of related records (i.e. Membership directory)

45
Q

What is the duty of a design engineer?

A

Determine language used for a specific computer- on a computer-to-computer basis

46
Q

What are object programs?

A

Programs written in base computer language- not similar to English.

47
Q

How can source programs be recognized?

A

They are written in a language close to English.

48
Q

What is the purpose of a Compiler?

A

Takes Source language (English) and converts to Object (Computer) Language

49
Q

How does Online Analytical Processing work?

A

It uses a Data Warehouse to support management decision making.

50
Q

What is Data Mining?

A

Using artificial intelligence and pattern recognition to analyze data stores within a Data Warehouse.

51
Q

What is the purpose of online transaction processing?

A

To process a company’s routine transactions.

52
Q

What are the characteristics of batch processing?

A

Data held- updates multiple files all at once

Leaves a better audit trail

Uses Grandfather-Father-Son backup (3 levels of backup kept in 3 locations)

53
Q

What does an output control check for?

A

Checks to see if output data is valid- distributed and used in an authorized manner.

54
Q

What does a processing control check?

A

Checks if data processing produced proper output

55
Q

What is a hash total?

A

A meaningless total/sum of values included in the input- an input control number, that normally does not include dollar amounts.

Ex: Summing a list of SSNs to make sure the data is the same once entered as it was prior to input into the system.

56
Q

What is a validity check?

A

Checks to see if data in existing tables or files belongs in the set

For example- is there a # in an alpha-only field or a letter in a numeric-only field

57
Q

What is a limit check?

A

Checks to see if numbers surpass a certain limit- i.e. in an age field is the number greater than 110.

58
Q

What is a check digit?

A

An input control that adds an identification number to a set of digits - usually at the end

59
Q

What is a field check?

A

An input check that prevents invalid characters- i.e. checks for alphabetic letters in a SSN field

60
Q

What is a Hot Site?

A

A disaster recovery system where if the main system goes down- a Hot Site is ready to take over immediately.

61
Q

What is a Cold Site?

A

If a main system goes down- a Cold Site will take time to get set up and running.

62
Q

What is the most common database language?

A

SQL - Structured Query Language

63
Q

What is a Data Definition Language?

A

Defines SQL Database

Controls SQL Tables

64
Q

What is a Data Manipulation Language?

A

Queries SQL Database tables

65
Q

What is a Data Control Language?

A

Controls Access to SQL Database

66
Q

What are the characteristics of a Relational Database?

A

Logical structure

Uses rows and columns similar to spreadsheet

67
Q

What are the characteristics of a Hierarchical Database?

A

Has various levels

Uses trees to store data

68
Q

What are the advantages of a database?

A

Data is more accessible

Reduced redundancy

69
Q

What are the disadvantages of a database?

A

Cost of installation

Skilled personnel required to maintain

70
Q

What are the components of a database?

A

Desktop client

Application Server

Database Server

Think: Your desktop computer runs applications and saves to a database

71
Q

What is Batch Processing?

A

Occurs when transactions are recorded, but the master files are only updated PERIODICALLY, such as daily.

  • There is ALWAYS a time delay b/w the time the transaction is initiated & the time it is fully processed.
  • Most often found in “traditional” systems, (payroll or general ledger systems) where the data doesn’t need to be current at all times.
72
Q

What is Online Real-Time Processing (OLRT), aka Online Processing?

A

Occurs when transactions are recorded and master files are IMMEDIATELY updated in real-time.

  • OLRT files are always current & error detection is immediate.
  • REQUIRE random access storage devices.
73
Q

What is a Batch Total?

A

A total of fields in a transaction that might normally be added. It is most often used for totals of DOLLAR fields.
Ex: a batch might contain $1,000,000 of debits & $1,000,000 of credits.

74
Q

What are the steps in a System’s Development Life Cycle (SDLC)?

A
**Think: A DITTO   (pg. B4-20)
A - Systems Analysis
D - Design (Conceptual & Physical)
I - Implementation & Conversion
T - Training
T - Testing
O - Operations & Maintenance
75
Q

What is COBIT?

A
  • Control Objectives for Information & Related Technology (COBIT)
  • Provides managers, auditors & IT users with a set of measures, indicators, processes and best practices to maximize the benefit of information technology.
76
Q

What are the information criteria (the business requirements for info) described by COBIT?

A

**Think: ICE RACE -> Know it cold & learn it fast!! (pg. B4-25)
I - Integrity
C - Confidentiality
E - Efficiency

R - Reliability
A - Availibility
C - Compliance
E - Effectiveness

77
Q

What are Detective Security Controls?

A

They are generally chronological records that provide documentary evidence of the sequence of activities that can be used to detect errors or irregularities. (Ex: Audit logs)

78
Q

What are Preventative Security Controls?

A

They prevent errors or irregularities

-Org’s that rely heavily on e-commerce would probably want as many preventive controls as possible bc it might be difficult/impossible to correct errors after the fact.

79
Q

What are Corrective Security Controls?

A

They represent procedures put in place to correct security weaknesses.

80
Q

What are the 5 focus areas that the COBIT framework anticipates that IT governance will be framed by?

A
  1. Strategic Alignment - linkage b/w business & IT plans
  2. Value Delivery - provision by IT of promised benefits while satisfying its customers & optimizing Costs
  3. Resource Management - Optimization of knowledge & infrastructure
  4. Risk Management
  5. Performance Measurement - tracking & monitoring
81
Q

What are the domains of the COBIT Framework?

A

**Think: You will need a purchase order, & therefore PO AIDS ME

PO - Plan & Organize - Directs the IT Process
AI - Acquire & Implement - Deliver the IT Solution
DS - Deliver & Support - Deliver the IT Service
ME - Monitor & Evaluate - Ensure directions are followed