Information Technology Flashcards

1
Q

What are the domain & process of COBIT?

A

PO AIDS ME

  • Plan & Oraganize: Direct
  • Acquire & Implement: Solution
  • Deliver & Support: Service
  • Monitor & Evaluate: Ensure direction allowed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which COBIT model describes a make or purchase decision?

A

Acquisition & Implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the orders of data structure?

A
  • Field
  • Record
  • File
  • Table
  • Database
  • Data definition file
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Most secure way to access online website:

A

Extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe end-user computing

A

User is responsible for the development and execution of the computer application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Advantage of value-added network for EDI

A

Ability to deal with differing data protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe the 3-layer system

A
  • Desktop client
  • Application
  • Database
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Responsible for a network administrator

A

Managing remote access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Responsible for a system analyst

A
  • Design or purchase IT system
  • Responsible for flowcharts
  • Liaison between users & programmers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Responsible for a system programmer

A

Writes, updates maintain, & tests software, system & compilers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Responsible for a system operator

A
  • Schedules & monitors jobs
  • Runs IT help desk
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Responsible for a data control clerk

A
  • Schedules job for the computer
  • Manages the distribution of reports
  • Coding activities, calculating & checking batch totals
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Responsible of librarians

A

Safeguarding & maintenance of all program & data files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Responsible of users

A
  • Authorizing & recording transactions
  • Correcting errors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Responsible of data control group

A
  • Logs data inputs, processing, outputs
  • Make sure transactions have been authorized
  • Do NOT authoirze or record themselves
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Backup & recovery systems should have both

A

Off-site company & redundancy

17
Q

Which phrase of SDLC identify the problem?

A

Planning phase

18
Q

What’s ad hoc?

A

Quary utility program

19
Q

What are the components of the data processing cycle?

A
  • Input → Collection
  • Processing
  • Output
20
Q

What’s electronic vaulting?

A

Transmit & store backups of programs electronically @ remote data storage facility

21
Q

What’s integrated test facility?

A

Fictitious & real transactions are processed together without the client aware of

22
Q

Which input control would prevent an incorrect state abbreviation from being accepted?

A

Validity check

23
Q

What’s field check?

A

Make sure the entry is correct type (numbers or alphanumeric)

24
Q

What is data definition language?

A
  • Defines database
  • Controls tables
25
Q

What is data manipulation language?

A
  • Queries tables
26
Q

Training occurs in which phases of computer system development?

A

Implementation phase

27
Q

What’s the primary objective of data security controls?

A

Ensure that storage media are subject to authorize prior to access, change or destruction