Information Technology Flashcards

1
Q

Electronic Commerce (Value-Added Network) (VAN)

A

Network that allows one computer to initiate an action on another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Electronic Data Interchange (EDI) - E-Commerce

A

1) Extranets established as VANs to communicate between suppliers and customers
2) Can use internet instead o VANs
3) Special considerations:
- Strict standards for form of data
- Translation software needed to convert data between EDI stadard and internal processing (mapping is process of IDing which field on transmitted form to fields on internal form)
- Unauthorized access (encryption and firewall)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Advantages of EDI

A

1) No human intervention
2) More efficient
3) Eliminates gaps and shortens business cycles (ie. automatically ordering supplies)
4) Payments made/received authomatically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Risks of E-Commerce (Elements)

A

1) Confidentiality
2) Integrity - unauthorized alteration/deletion of data
3) Availability
4) Authentication and nonrepudiation - parties prove identities and confirmation of transaction
5) Power shift to customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risks of E-Commerce and Controls

A

1) Improper use of information
- Security architecture for e-commerce
- Firewalls
- Unique and positive ID process
2) Risk of improper distribution of transactions:
- Routing verification procedures
- Message acknowledgements
3) Spoofing:
- Echo transmissions
- Digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Networks and Control Risk

A

1) Limit network access:
- Read only & read/write
2) Viruses (worm, hoax virus, phishing)
- Antivirus
3) Unauthorized access:
- Firewalls (network and application)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data Structure

A

1) Bits (binary digits)
2) Byte = 8 bits
3) Character - group of bytes
4) Field - group of characters
5) Record - group of fields
- Primary and secondary keys to ID record
6) File - group of records
7) Database - group of files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Database Management System (DBMS)

A

1) Software system that controls organization, storage, and retrieval of data in a database
2) Consists of software and database
- Should be independent of each other (don’t have to use same program and can restrict access)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Big Data

A

Set of data so large that can only be managed using numerous computers running parallel software simultaneously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data Mining

A

Analysis of data in database to look for trends or anomalies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data Normalization (DBMS)

A

Process of organizing database for minimum redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Organizations of an IT Environment (Systems Development and Maintenance)

A

1) Systems analyst - designs information system using system flowcharts
2) Application programmer - writes, tests, and debugs system programs
3) Database admin - responsible for security and information classification of shared data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Systems Development Life Cycle (SDLC)

A

Used to plan, design, develop, test, and implement an application system or major modification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Operations of an IT Function

A

1) Data control clerk
2) Computer operator - operates computer in a datacenter and performs related activities
3) Librarians - responsible for safeguarding and maintenance of all program and data files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Controls (General)

A

Overall computer environment/Segregation of Duties

1) Personnel policies:
- Systems = Development & Maintenance (analysts, application programmer, database admins) AUTHORIZATION
- Operations = input (data entry/computer operator) RECORDING and output (control clerk/librarian) CUSTODY
2) File security:
- Backup/planned downtime controls (grandfather/father/son retention system, checkpoint backup)
- Lock out (timed and concurrent update control)
- Read-only
3) Contingency planning - business continuity/disaster recovery (hot/cold site/mirrored web server)
4) Computer facilities - fire/insurance
5) Access controls (passwords, cybersecurity)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Controls (Application)

A
  • Specific Program Controls
  • Preventative controls (fraud & error)
  • Detective controls and automated controls
  • User controls & corrective controls

1) Input:
- Check digit (inputted correctly)
- Validity check
- Edit test (i.e. #s not letters)
- Limit test
- Financial total (vs manual control totals)
- Record counts (vs manual control totals)
- Hash = meaningless total (adding record numbers) (vs manual control totals)
- Non financial totals (vs manual control totals)
2) Processing:
- System & software documentation
- Error-checking compiler
- Test data
- System testing (programs within system are interacting correctly)
- User Acceptance testing
3) Output - Accurate:
- Detect errors and output only to authorized persons

17
Q

Extensible Business Reporting Language (XBRL)

A

1) Computer-readable identifying tags for each individual item of data
2) Eliminates costs of manual data comparison and reduces errors when generating reports
3) SEC mandated all public companies file F/S in XBRL