Information Technology Flashcards

1
Q

Which IT personnel roles should always be segregated?

A
C - Control group
O - Operators
P - Programmers
A - Systems Analyst
L - Librarians
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the duties of a systems analyst?

A

Designs or purchases IT system
Responsible for flowcharts
Liaison between Users and Programmers
Note: Think IT Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the primary duty of a Systems Administrator?

A

A Systems Administrator controls database access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the duties of a Systems Programmer?

A

Application Programer - Application/Software developer (software engineers) is the person responsible for writing and/or maintaining application programs.
SHOULD NOT be given write/update access to data in production systems or unrestricted and uncontrolled access to application program change management systems.
System Programers - are responsible for installing, supporting (troubleshooting), monitoring, and maintaining the operating system. May also perform capacity planing functions and testing and applying upgrades.
Writes- Updates- Maintains- & Tests software- systems- and compilers
SHOULD NOT be given write/update access to data in production systems or access to change management systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which duties should a Systems Programmer NOT have?

A

In order to maximize internal control- a Systems Programmer should NOT have application programming duties/abilities or be an Operator on the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the duties of a Systems Operator?

A

Schedules and Monitors JobsRuns IT Help Desk.

SHOULD NOT be a Programmer on the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the primary function of a database management system?

A

To create and modify the database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

If it is not possible to segregate duties in an IT System- what actions should be taken to compensate for internal control purposes?

A

Include Computer Logs.

Control Group should review the logs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of a Management Information System (MIS)?

A

To assist with decision making. More broad than DSS.
Provides users predefined reports that support effective business decisions. MIS reports may provide feedback on daily operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the characteristics of an Executive Information System (EIS)?

A

Specialized for Company Executive needs
Assists with Strategy Only
No Decision-Making Capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the characteristics of an Expert System (ES)?

See Decision Support System

A

Computer uses reasoning
Structured
No human interpretation needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the characteristics of a Decision Support System (DSS)?

A
Sometimes called Expert System.
It is an extension of an MIS that provides interactive tools to support decision making. It may provide information, facilitate the preparation of forecasts, or allow modeling of various aspects of a decision.
Computer provides data
Gives Interactive Support
Human interpretation needed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the characteristics of an Ad Hoc computer report?

A

User initiates the report.

The report is created upon demand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When are Exception reports generated?

A

Exception reports are produced when Edit Tests- Check Digits- or Self-Checking Digits identify a problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a query?

A

A type of Ad Hoc report- initiated by a user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is End-User Computing?

A

The User develops and executes their own application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the primary benefit of E-commerce?

A

E-commerce makes business transactions easier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the risks of E-commerce?

A

Compromised data or theft.

Less paper trail for auditors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the benefits of Electronic Data Interchange?

A

Uses globally-accepted standards

Efficient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a File Server?

A

A file server stores shared programs and documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the purpose of a Database?

A

Located on a File Server- a Database allows users to share documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the purpose of a LAN (Local Area Network)?

A

It connects computers in close proximity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the purpose of a WAN (Wide Area Network)?

A

It connects computers that are far apart.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the characteristics of a VAN (Value-Added Network)?

A
Privately-owned Network
Serves as 3rd Party Between 2 Companies
Routes EDI Transactions
Accepts wide range of Protocols
Very Costly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the purpose of a Firewall?

A

Prevents unauthorized access to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are the characteristics of a virus?

A

Takes over a computer

Needs a host program to run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are the characteristics of a computer worm?

A

Takes over multiple computers

Doesn’t need a host program to run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the purpose of Automated Equipment Controls?

A

They prevent and detect hardware errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is RAM?

A

Random Access Memory.

Internal memory in the computer used during immediate processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is a CPU?

A

Computer Processing Unit

It processes commands within a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is Job Control Language?

A

It schedules and allocates system resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What are examples of input devices?

A
Keyboard
Mouse
Scanner
Magnetic Ink Reader
Magnetic Tape Reader
EDI
Point of Sale Scanner
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are examples of Output Devices?

A

Speakers
Monitors
Printers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What are the characteristics of Magnetic Tape storage?

A

Sequential Access - Sorts data in order

Slower data retrieval

Header Label prevents Operator error by loading wrong tape

External Labels prevent accidental destruction by operator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What are the characteristics of Magnetic Disks?

A

Random Access - Finds data in random spots

Faster data retrieval

Uses Boundary Protection for data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is a Gateway?

A

Connects one network to another

Note: the Internet is connected by Gateways

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What are Parity Checks?

A

Output Encryption control
A control that detects internal data errors.
A bit is added to each character- it checks to see if a bit was lost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is an Echo Check?

A

Output Encryption control
Transmitted data is returned to the sender for verification (it echoes back to the sender)
It minimizes the risk of data transmission errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is a Change Control?

A

It authorizes program changes and approves program test results.

40
Q

What is security software?

A

Software that controls access to IT systems.

Note: Don’t confuse this with anti-virus software

41
Q

What is the purpose of a Digital Signature?

A

It confirms a message has not been altered.

42
Q

List the types of computers from smallest to largest

A

PDA/Smartphone/Tablet

Microcomputer - PC- Laptop (cost-effective)

Minicomputer - Like a Mainframe- but smaller

Mainframe - Large computer with terminals attached

Supercomputer - Very powerful and very big

43
Q

What are the units of computer data from smallest to largest?

A

> Bit - 1 (on) and 0 (off)
Byte - 8 bits to a byte/characterField - group of related characters/bytes (i.e. Name- Zip Code- Serial #)
Record - Group of related fields (i.e. Member name- address- phone number)
File - Group of related records (i.e. Membership directory)

44
Q

What is the duty of a design engineer?

A

Determine language used for a specific computer- on a computer-to-computer basis

45
Q

What are object programs?

A

Programs written in base computer language- not similar to English.

46
Q

How can source programs be recognized?

A

They are written in a language close to English.

47
Q

What is the purpose of a Compiler?

A

Takes Source language (English) and converts to Object (Computer) Language

48
Q

How does Online Analytical Processing work?

A

It uses a Data Warehouse to support management decision making.

49
Q

What is Data Mining?

A

Using artificial intelligence and pattern recognition to analyze data stores within a Data Warehouse.

50
Q

What is the purpose of online transaction processing?

A

To process a company’s routine transactions.

51
Q

What does an output control check for?

A

Checks to see if output data is valid- distributed and used in an authorized manner.

52
Q

What does a processing control check?

A

Checks if data processing produced proper output

53
Q

What is a hash total?

A

An INPUT CONTROL number- a meaningless sum of values included in the input.Example would be summing a list of SSNs to make sure the data is the same once entered as it was prior to input into the system.

54
Q

What is a validity check?

A

An INPUT CONTROL that checks to see if data in existing tables or files belongs in the set
For example- is there a # in an alpha-only field or a letter in a numeric-only field

55
Q

What is a limit check?

A

In INPUT CONTROL. Checks to see if numbers surpass a certain limit- i.e. in an age field is the number greater than 110.

56
Q

What is a check digit?

A

An INPUT CONTROL that adds an identification number to a set of digits - usually at the end

57
Q

What is a field check?

A

An INPUT CHECK that prevents invalid characters- i.e. checks for alphabetic letters in a SSN field

58
Q

What is a Hot Site?

A

A disaster recovery system where if the main system goes down- a Hot Site is ready to take over immediately.
Building, hardware, and backup tapes.
Few hours to 1/2 day to operate.

59
Q

What is a Cold Site?

A

If a main system goes down- a Cold Site will take time to get set up and running. 1 - 3 days.
Provides only infrastructure - building.
Does not have the equipment.

60
Q

What is the most common database language?

A

SQL - Structured Query Language

61
Q

What is a Data Definition Language?

A

DEFINES SQL Database

CONTROLS SQL Tables

62
Q

What is a Data Manipulation Language?

A

Queries SQL Database tables

63
Q

What is a Data Control Language?

A

Controls ACCESS to SQL Database

64
Q

What are the characteristics of a Relational Database?

A

Logical structure

Uses rows and columns similar to spreadsheet

65
Q

What are the characteristics of a Hierarchical Database?

A

Has various LEVELS

Uses TREES to store data

66
Q

What are the advantages of a database?

A

Data is more accessible

Reduced redundancy

67
Q

What are the disadvantages of a database?

A

Cost of installation

Skilled personnel required to maintain

68
Q

What are the components of a database?

A

Desktop client
Application Server
Database Server
Think: Your desktop computer runs applications and saves to a database

69
Q

What is Information Technology

A

It is a term relating to the development,installation, and maintenance of computers, applications systems, and the associated programs and telecommunications infrastructure.
It also includes the data stored and transmitted and the people working in the industry.
Today’s economy could not exist without IT. Information and technology requirements are specialized to each industry and business and require assessment. Integral to the needs assessment is an understanding of the nature of data, information, and systems.

70
Q

What are the components of IT?

A
Hardware
Software
Network
People
Data/Information
71
Q

What are the roles of Business Information Systems?

A

The primary roles are in Business Operations are:
> To process detailed data
> To provide info for decision making
> To provide info for strategy development
> To take order from customers

72
Q

What are the information systems viewed from a functional perspective? HAMS

A

Sales & marketing systems
Manufacturing & Production systems
Accounting & Finance systems
Human Resources systems

73
Q

What is the first step in data capture?

A

Capture the data pertaining to the transaction and enter the data into the system.
> A business event or transaction is necessary for the data capture process. (Can’t capture if didn’t happen)
> Capture through manual entries or automation devices
> Ensure data is accurate and complete, - uses well-designed input screens and auto-entry fields

74
Q

What are the functions performed on data?

A
> Collect
> Process
> Store
> Transform
> Distribute
75
Q

What is an Accounting Information System (AIS)?

A

A type of Management Information System (MIS) that processes accounting transactions.

76
Q

What do the objectives of an entity’s AIS include?

A
Transaction recorded must be:
> Valid
> Properly classified
> Properly valued
> Recorded in proper accounting period
> Properly presented with related information in the FS
77
Q

What are the 5 primary transaction cycles in an AIS?

A
> Revenue cycle
> Expenditure cycle
> Production cycle
> HR/Payroll cycle
> Financing cycle
78
Q

What are the sequence of events in an AIS?

A

> Transaction data is entered by end user or internet customer
Transactions are journalized and posted to ledgers
Trial balance is prepared
Adjustments, accruals, and corrections are recorded
Financial reports are produced

79
Q

The data processing cycle consists of 4 functional areas. What are they?

A

> Data input via manual source document input or electronic data capture.
Data storage, which includes the following methods of keeping data: journals and ledgers, coding, chart of accounts, and files.
Data processing (batch or OLRT)
Information output (documents, queries, and reports)

80
Q

What is an audit trail?

A

A well-designed AIS creates an audit trail for accounting transactions which allows a user to trace a transaction from a source foment to the ledger and from the ledger back to the source documents. This is particularly important for auditing. (directional testing)

81
Q

What is batch processing and its characteristics?

A

In batch processing, data (transactions) is processed in batches or groups with the database(s) updated on a periodic (hourly, daily, monthly) basis. There is always some kind of delay, however short, in batch processing.
> Data held- updates multiple files all at once
> Leaves a better audit trail
> Uses Grandfather-Father-Son backup (3 levels of backup kept in 3 locations)

82
Q

What is OLRT - Online, Real-Time Processing?

A

With OLRT processing, there is instantaneous processing and updating of database(s).
OLRT systems require random access storage devices, whereas batch processing systems do not.
Generally, companies have to pick OLRT or batch. They may use different processes for different functions, but its really a binary choice.

83
Q

What is a centralized vs. decentralized distributed processing?

A

Centralized maintains all data and performs all processing in a central location. Decentralized are spread over more than one processor or locations

84
Q

What are the advantages of centralized processing?

A

> Better security

> consistency

85
Q

What are the disadvantages of centralized processing?

A

> High transmission costs
Increased processing power/storage for central processor
Reduction of local accountability
Bottlenecks at busy times
Delay in réponse time to remote locations
Increased vulnerability to problems occurring at the central location.

86
Q

What is End-User Computing (EUC)?

A

Functional end users who perform their own information processing activities with hardware, software and professional resources provided by the organization. - do it yourself - (excel)

87
Q

What are the basic types of reports?

A

Periodic - produced each month, day, hour
Exception - triggers when outside of parameters
Demand - produced when requested - push button
Ad Hoc - Query - Sales by month or region
Push Report - Spits out without request. log in computer and report shows up in screen
Dashboard-Style - At a glance report - graph

88
Q

What is the role of IT in Business Strategy

A

Technology is a core input to the development of strategy.
Technology evolves and due t the speed at which changes, strategy development must be a continual process.
Technology plays an important role in enabling the flow of information in the organization, including information directly relevant to enterprise risk management across strategy setting and the whole organization.

89
Q

What are boundary protection?

A

The primary purpose is to prevent mixing of data on a magnetic disk or storage unit.

90
Q

What are the firewall methodology and what do they do?

A

Can be deeded into several different categories, and they can be used individually or combined in a specific product.
> Packet Filtering is the simplest type. It examines data as it passes through the firewall
> Circuit Level - Allows data to pass only when requested by an internal computer.
> Application Level Gateways or “Proxies” - examine data coming into the gateway in a more sophisticated fashion. Proxies are more secure, but can also be slow.

91
Q

Which activity should be taken to reduce the risk of incorrect processing in a newly installed computerized accounting system?

A

Independently verify the transactions.

92
Q

lists several Data Validation Edits and Controls

A

Sequence check
Limit check
Range check
Validity check - comparison of input to a list of valid items. (detect transposition errors)
Reasonableness check - would not allow invalid date to be accepted
Table lookups
Existence check
Key verification
Check digit - adds an identification number to a set of digits - usually at the endCompleteness check
Duplicate check
Logical Relationship check

93
Q

What does Access Control Software does?

A

It is a preventive control designed to prevent a misstatement from occurring. Access control software prevens unauthorized individuals from gaining access to a system or application and therefore prevents unauthorized transactions or changes in data.

94
Q

Which model evaluate the sophistication of IT processes?

A

Maturity Models rates from maturity level of nonexistent (0) to optimized (5)

95
Q

Cite internet based tools for collaboration.

A

E-mail,
Videoconferencing
Groupware or collaboration systems
NOT EDI