Information Technology Flashcards

1
Q

Systems Analyst

A

Systems Analyst
a systems analyst designs the information system using systems flowcharts and other tools and prepares specifications for applications programmers, as well as acting as an intermediary between the users and the programmer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Applications Programmer

A

Applications Programmer
an applications programmer writes, tests, and debugs programs that will be used in the system. The programmer also develops instructions for operators to follow when running the program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Database Administrator

A

Database Administrator
a database administrator is an individual or department responsible for the security and information classification of the shared data stored on a database system. This responsibility includes the design, definition and maintenance of the database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data Control Clerk

A

Data Control Clerk
a data control clerk schedules jobs for the computer and manages the distribution of reports and other output. Data control clerks will be involved in coding activities, calculating and checking batch totals, and related clerical tasks.(data control clerks should not know about programming)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Computer Operator

A

Computer Operator
a computer operator is a person who operates a computer and eight data center and forms such activities as commanding the operating system, monitoring disks and placing paper in the printer. Operators also write the job control language (JCL), which schedules the daily work for the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Librarians

A

Librarians

librarians are individuals responsible for the safeguarding and maintenance of all program and data files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

System Programmer Or Technical Support

A

System Programmer or Technical Support

a systems programmer or technical support is responsible for updating and maintaining the operating systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security Administration

A

Security Administration
security administration is responsible for security of the system including control access and maintenance of user passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

General Controls

A

General Controls
these related to overall integrity of the system. Controls include policies, procedures, and practices (tasks and activities) established by management to provide reasonable assurance that specific objectives will be achieved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Application Control

A

Application Control

days are specific to individual programs and uses of the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Authorization (Noah and the ARCC)

A

Authorization (Noah and the ARCC)
Authorization-the development of new programs and changes to existing programs should be performed by systems analysts and programmers. These personnel should not be involved in basic vision of computer operations or the control and review of output. Systems analysts work with operating systems and compilers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Recording (Noah and the ARCC)

A

Recording (Noah and the ARCC)
Recording-Data input clerks and computer operators have the role of entering information into the computer and running the programs. These personnel should not have access to program code that would enable them to modify programs nor should they control the output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Custody (Noah and the ARCC)

A

Custody (Noah and the ARCC)
Custody-Control clerks and librarians obtain and review output from computers to review exception reports indicating inappropriate functioning of the computer, send printouts and other outputs to the appropriate destinations and maintain disks, tapes, or other storage units of data. These personnel should not have the ability to create or alter programs or to operate computer that generates the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Reconciliation (Noah and the ARCC)

A

Reconciliation (Noah and the ARCC)

company reconciliations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Parity Check

A

Parity Check
in the storage of bytes, one bit will be a “dummy” it that doesn’t represent any actual information, but this turned on automatically when necessary so that the total number of bits in the on position is an odd number (in an odd parity computer). When the computer is reading bytes of data from a chip or a disk drive, a bite with an even number of bits turned: will be known to be functioning properly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Echo Check (Echo Control)

A
Echo Check (Echo Control)
when data is being transmitted from one computer to another, especially over telephone lines, distortion caused by static or other causes can cause information to be transmitted improperly. An echo check involves the data sent from one computer to another being transmitted back to the original, which will verify that it  has received what it sent. If the echoed data doesn't agree with the transmission, the packet of data is  then resent
17
Q

Field Checks

A

Field Checks
data is validated as to the correct late, character types, and format accepted. (i.e., an entry of a license plate might be verified for the type, alphanumeric, so that only letters and numbers are accepted and the link is not longer than 7).

18
Q

Validity Checks

A

Validity Checks

data is compared with a list of acceptable entries to be sure it matches one of them.(two letter state abbreviation)

19
Q

Limit Tests

A

Limit Tests

numbers are compared to limits that have been sent for acceptability (pay rate may be compared to current minimum wage)

20
Q

Check Digits

A

Check Digits
numbers with no obvious meaning, such as identification numbers, are often designed so that one of the digits is determined by a formula applied to the rest of the numbers. The computer applies the formula when a number is entered to determine if it is an acceptable one. This control makes it difficult someone to invent a fake number if they do not know the formula, since the program will recognize a number that isn’t designed so that the check digit is correct. The check digit can actually be either a number or a letter, and can be placed in any consistent position in the overall identification.