Information Technology Flashcards

1
Q

Which IT personnel roles within the Information Systems Dept. should always be segregated AT a MINIMUM?

A

At a minimum, the following IT personnel roles within the Information Systems Dept. should always segregated – 1. Operators 2. Programmers 3. Librarians

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the duties of a systems analyst?

A

The duties of a systems analyst are as follows– 1. Analyzes the present user environment and system requirements; 2. Recommends specific system changes; 3. Recommends the purchase of a new IT system; and/or 4. Designs new IT systems; 5. Acts as liaison between Users and Programmers - in constant contact with user departments and programming staff to ensure that the users’ actual and ongoing needs are being met. Note: Think IT Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the duty of a Systems Administrator - aka a Database Administrator (DBA)?

A

A Systems Administrator is responsible for maintaining the database and restricting access to the database to authorized personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the duties of a Systems Programmer?

A

Systems Programmers are responsible for implementing, modifying, and debugging the software necessary for making the hardware of a system function properly (examples of hardware: operating system, telecommunications monitor, and the database management system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In order to maximize internal control- a Systems Programmer should NOT have ___ ___ duties/abilities or be an ___ on the system.

A

application programming duties/abilities; Operator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the duties of a Systems Operator?

A

A Systems Operator is responsible for the daily computer operations of BOTH the software and the hardware of the IT system. This includes:

  1. Scheduling and Monitoring Jobs
  2. Supervision of the Operator’s Console
  3. Accepts any required input
  4. Distributes any generated output
  5. Runs IT Help Desk
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

For internal control purposes- the System Operator should not be a ____ on the system.

A

For internal control purposes- they should not be a Programmer on the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

If it is not possible to segregate duties in an IT System- what actions should be taken to compensate for internal control purposes?

A

CREATE a “Control Group” - this group should act as a liaison between the users and the processing center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of a Management Information System (MIS)?

A

To assist with decision making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an Accounting Information System (AIS)?

A

A type of Management Information System (MIS) that processes accounting transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the characteristics of an Executive Information System (EIS)?

A

Specialized for Company Executive needs Assists with Strategy Only No Decision-Making Capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the characteristics of an Expert System (ES)?

A

Computer uses reasoning Structured No human interpretation needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the characteristics of a Decision Support System (DSS)?

A

Computer provides data Gives Interactive Support Human interpretation needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the characteristics of an Ad Hoc computer report?

A

User initiates the report. The report is created upon demand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When are Exception reports generated?

A

Exception reports are produced when Edit Tests- Check Digits- or Self-Checking Digits identify a problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a query?

A

A type of Ad Hoc report- initiated by a user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is End-User Computing?

A

The User develops and executes their own application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the primary benefit of E-commerce?

A

E-commerce makes business transactions easier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the risks of E-commerce?

A

Compromised data or theft. Less paper trail for auditors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the benefits of Electronic Data Interchange?

A

Uses globally-accepted standards Efficient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a File Server?

A

A file server stores shared programs and documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the purpose of a Database?

A

Located on a File Server- a Database allows users to share documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the purpose of a LAN (Local Area Network)?

A

It connects computers in close proximity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the purpose of a WAN (Wide Area Network)?

A

It connects computers that are far apart.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are the characteristics of a VAN (Value-Added Network)?

A

Privately-owned Network Serves as 3rd Party Between 2 Companies Routes EDI Transactions Accepts wide range of Protocols Very Costly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the purpose of a Firewall?

A

Prevents unauthorized access to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are the characteristics of a virus?

A

Takes over a computer Needs a host program to run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are the characteristics of a computer worm?

A

Takes over multiple computers Doesn’t need a host program to run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the purpose of Automated Equipment Controls?

A

They prevent and detect hardware errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is RAM?

A

Random Access Memory. Internal memory in the computer used during immediate processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is a CPU?

A

Computer Processing Unit It processes commands within a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is Job Control Language?

A

It schedules and allocates system resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What are examples of input devices?

A

Keyboard Mouse Scanner Magnetic Ink Reader Magnetic Tape Reader EDI Point of Sale Scanner

35
Q

What are examples of Output Devices?

A

Speakers Monitors Printers

36
Q

What are the characteristics of Magnetic Tape storage?

A

Sequential Access – Sorts data in order Slower data retrieval Header Label prevents Operator error by loading wrong tape External Labels prevent accidental destruction by operator

37
Q

What are the characteristics of Magnetic Disks?

A

Random Access - Finds data in random spots Faster data retrieval Uses Boundary Protection for data

38
Q

What is a Gateway?

A

Connects one network to another Note: the Internet is connected by Gateways

39
Q

What are Parity Checks?

A

A control that detects internal data errors. A bit is added to each character- it checks to see if a bit was lost.

40
Q

What is an Echo Check?

A

Transmitted data is returned to the sender for verification (it echoes back to the sender)

41
Q

What is a Change Control?

A

It authorizes program changes and approves program test results.

42
Q

What is security software?

A

Software that controls access to IT systems. Note: Don’t confuse this with anti-virus software

43
Q

What is the purpose of a Digital Signature?

A

It confirms a message has not been altered.

44
Q

List the types of computers from smallest to largest

A

PDA/Smartphone/Tablet Microcomputer - PC- Laptop (cost-effective) Minicomputer - Like a Mainframe- but smaller Mainframe - Large computer with terminals attached Supercomputer - Very powerful and very big

45
Q

What are the units of computer data from smallest to largest?

A

Bit - 1 (on) and 0 (off) Byte - 8 bits to a byte/character Field - group of related characters/bytes (i.e. Name- Zip Code- Serial #) Record - Group of related fields (i.e. Member name- address- phone number) File - Group of related records (i.e. Membership directory)

46
Q

What is the duty of a design engineer?

A

Determine language used for a specific computer- on a computer-to-computer basis

47
Q

What are object programs?

A

Programs written in base computer language- not similar to English.

48
Q

How can source programs be recognized?

A

They are written in a language close to English.

49
Q

What is the purpose of a Compiler?

A

Takes Source language (English) and converts to Object (Computer) Language

50
Q

How does Online Analytical Processing work?

A

It uses a Data Warehouse to support management decision making.

51
Q

What is Data Mining?

A

Using artificial intelligence and pattern recognition to analyze data stores within a Data Warehouse.

52
Q

What is the purpose of online transaction processing?

A

To process a company’s routine transactions.

53
Q

What are the characteristics of batch processing?

A

Data held- updates multiple files all at once Leaves a better audit trail Uses Grandfather-Father-Son backup (3 levels of backup kept in 3 locations)

54
Q

What does an output control check for?

A

Checks to see if output data is valid- distributed and used in an authorized manner.

55
Q

What does a processing control check?

A

Checks if data processing produced proper output

56
Q

What is a hash total?

A

An input control number- a meaningless sum of values included in the input. Example would be summing a list of SSNs to make sure the data is the same once entered as it was prior to input into the system.

57
Q

What is a validity check?

A

Checks to see if data in existing tables or files belongs in the set For example- is there a # in an alpha-only field or a letter in a numeric-only field

58
Q

What is a limit check?

A

Checks to see if numbers surpass a certain limit- i.e. in an age field is the number greater than 110.

59
Q

What is a check digit?

A

An input control that adds an identification number to a set of digits – usually at the end

60
Q

What is a field check?

A

An input check that prevents invalid characters- i.e. checks for alphabetic letters in a SSN field

61
Q

What is a Hot Site?

A

A disaster recovery system where if the main system goes down- a Hot Site is ready to take over immediately.

62
Q

What is a Cold Site?

A

If a main system goes down- a Cold Site will take time to get set up and running.

63
Q

What is the most common database language?

A

SQL - Standard Query Language

64
Q

What is a Data Definition Language?

A

Defines SQL Database Controls SQL Tables

65
Q

What is a Data Manipulation Language?

A

Queries SQL Database tables

66
Q

What is a Data Control Language?

A

Controls Access to SQL Database

67
Q

What are the characteristics of a Relational Database?

A

Logical structure Uses rows and columns similar to spreadsheet

68
Q

What are the characteristics of a Hierarchical Database?

A

Has various levels Uses trees to store data

69
Q

What are the advantages of a database?

A

Data is more accessible Reduced redundancy

70
Q

What are the disadvantages of a database?

A

Cost of installation Skilled personnel required to maintain

71
Q

What are the components of a database?

A

Desktop client Application Server Database Server Think: Your desktop computer runs applications and saves to a database

72
Q

What is the function of a “Control Group” within the IT department?

A

This group functions as a compensating control when the desired segregation of duties within the IT dept. is impossible.

73
Q

The ___ ___ , as identified in the organizational structure of the IT dept, are defined as the other departments of the company that utilize the data prepared by the information systems department.

A

user departments

74
Q

Define “byte”.

A

A group of (usually) eight bits that are used to represent alphabetic and numeric characters and other symbols (3, g, X, ?, etc.). Several coding systems are used to assign specific bytes to characters. ASCII and EBCIDIC are the two most commonly used coding systems. Each system defines the sequence of zeros and ones that represent each character.

75
Q

Define “field”.

A

A group of characters (bytes) that identify a characteristic of an entity. A data value is a specific value found in a field. Fields can consist of a single character (Y, N) but usually consist of a group of characters. Each field is defined as a specific data type. Date, Text and Number are common data types.

76
Q

Define “programming languages”.

A

All software is created using programming languages. They consist of sets of instructions and a syntax that determine how the instructions can be put together.

77
Q

Define “file”.

A

A collection of records for one specific entity (an Invoice File, a Customer File, a Product File). In a relational database environment, files are also known as tables.

78
Q

Define a “bit” (binary digit).

A

An individual zero or one; the smallest piece of information that can be represented.

79
Q

Define “record”.

A

A group of related fields (or attributes) that describe an individual instance of an entity (a specific invoice, a particular customer, an individual product).

80
Q

Define “operating system”.

A

The interface between the user and the computer hardware.

81
Q

Define “systems software”.

A

The programs that run the computer and support system management operations.

82
Q
A