Information Technology Flashcards

2
Q

Which IT personnel roles should always be segregated?

A

Operators

Programmers

Librarians

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does an Information System do within an Business?

A

Information systems process data and transactions to provide users with the information they need to plan, control and operate an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the duties of a systems analyst?

A

Designs or purchases IT system

Responsible for flowcharts

Liaison between Users and Programmers

Note: Think IT Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the primary duty of a Systems Administrator?

A

A Systems Administrator controls database access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the duties of a Systems Programmer?

A

Writes- Updates- Maintains- & Tests software- systems- and compilers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the functions of an Information System?

A
  1. Collecting transaction and other data
  2. Entering it into the information system
  3. Processing the data
  4. Providing users with the information needed
  5. Controlling the process
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which duties should a Systems Programmer NOT have?

A

In order to maximize internal control- a Systems Programmer should NOT have application programming duties/abilities or be an Operator on the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the general types of IT Systems?

A
  1. Office automation systems - designed to improve productivity by supporting daily work of employees
  2. Transaction processing systems - involve the daily processing of transactions
  3. Management reporting systems - designed to help with the decision making process by providing access to computer data
  4. Executive information systems - computerized systems that are specifically designed to support executive work
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the duties of a Systems Operator?

A

Schedules and Monitors Jobs

Runs IT Help Desk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What duties should a System Operator NOT have?

A

For internal control purposes- they should not be a Programmer on the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If it is not possible to segregate duties in an IT System- what actions should be taken to compensate for internal control purposes?

A

Include Computer Logs.

Control Group should review the logs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the different Management reporting systems?

A
  1. Management information systems - systems designed to provide past, present and future information for planning, organizing and controlling the operations of the organization
  2. Decision support systems - computer-based information systems that combine models and data to resolve non-structured problems with extensive user involvement
  3. Expert systems - computer systems that apply reasoning methods to data in a specific relatively structured area to render advice or recommendations (like a human expert)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of a Management Information System (MIS)?

A

To assist with decision making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the phases included in the Systems Design and Process Improvement?

A
  1. Planning phase
  2. Analysis phase
  3. Design phase
  4. Development phase
  5. Testing phase
  6. Implementation phase
  7. Maintenance phase
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an Accounting Information System (AIS)?

A

A type of Management Information System (MIS) that processes accounting transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the characteristics of an Executive Information System (EIS)?

A

Specialized for Company Executive needs

Assists with Strategy Only

No Decision-Making Capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the characteristics of an Expert System (ES)?

A

Computer uses reasoning

Structured

No human interpretation needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the characteristics of a Decision Support System (DSS)?

A

Computer provides data

Gives Interactive Support

Human interpretation needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the characteristics of an Ad Hoc computer report?

A

User initiates the report.

The report is created upon demand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When are Exception reports generated?

A

Exception reports are produced when Edit Tests- Check Digits- or Self-Checking Digits identify a problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a query?

A

A type of Ad Hoc report- initiated by a user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is End-User Computing?

A

The User develops and executes their own application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Supercomputer?

A

A supercomputer is an extremely powerful, high-speed computer used for extremely high-volume and/or complex processing needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the primary benefit of E-commerce?

A

E-commerce makes business transactions easier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the risks of E-commerce?

A

Compromised data or theft.

Less paper trail for auditors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the benefits of Electronic Data Interchange?

A

Uses globally-accepted standards

Efficient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a File Server?

A

A file server stores shared programs and documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of a Database?

A

Located on a File Server- a Database allows users to share documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the characteristics of the Planning phase?

Systems Design & Process Improvement

A

a. Identify the problem
b. Design the system to be developed
c. Determine project scoped. Develop a project plan. Evaluate the initial feasibility of the project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of a LAN (Local Area Network)?

A

It connects computers in close proximity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of a WAN (Wide Area Network)?

A

It connects computers that are far apart.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the characteristics of a VAN (Value-Added Network)?

A

Privately-owned Network

Serves as 3rd Party Between 2 Companies

Routes EDI Transactions

Accepts wide range of Protocols

Very Costly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of a Firewall?

A

Prevents unauthorized access to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the characteristics of a virus?

A

Takes over a computer

Needs a host program to run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the characteristics of a computer worm?

A

Takes over multiple computers

Doesn’t need a host program to run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the purpose of Automated Equipment Controls?

A

They prevent and detect hardware errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the characteristics of the Design phase?

Systems Design & Process Improvement

A

The primary goal of the design phase is to build a technical blueprint of how the proposed system will work.

Components of this phase include:

  1. Databases
  2. User interfaces for input & output
  3. Required reports
  4. Programs
  5. Infrastructure & controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is RAM?

A

Random Access Memory.

Internal memory in the computer used during immediate processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a CPU?

A

Computer Processing Unit

It processes commands within a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the characteristics of the Development phase?

Systems Design & Process Improvement

A

During the development phase the documents from the design phase are transformed into the actual system. In the design phase the platform on which the system is to operate is built or purchased off-the-shelf and customized and databases are developed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Job Control Language?

A

It schedules and allocates system resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are examples of input devices?

A
Keyboard
Mouse
Scanner
Magnetic Ink Reader
Magnetic Tape Reader
EDI
Point of Sale Scanner
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are examples of Output Devices?

A

Speakers

Monitors

Printers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the characteristics of Magnetic Tape storage?

A

Sequential Access – Sorts data in order

Slower data retrieval

Header Label prevents Operator error by loading wrong tape

External Labels prevent accidental destruction by operator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a Console used for?

A

A console is a terminal used for communication between the operator and the computer (i.e. the operator of a mainframe computer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the characteristics of Magnetic Disks?

A

Random Access - Finds data in random spots

Faster data retrieval

Uses Boundary Protection for data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a Gateway?

A

Connects one network to another

Note: the Internet is connected by Gateways

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are Parity Checks?

A

A control that detects internal data errors.

A bit is added to each character- it checks to see if a bit was lost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is an Echo Check?

A

Transmitted data is returned to the sender for verification (it echoes back to the sender)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a Change Control?

A

It authorizes program changes and approves program test results.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is security software?

A

Software that controls access to IT systems.

Note: Don’t confuse this with anti-virus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the characteristics of the Testing phase?

Systems Design & Process Improvement

A

The testing phase involves verifying that the system works and meets the business requirements as set forth in the analysis phase.

The following types of tests should be performed:

  1. Unit testing - involves testing the units or pieces of code
  2. System testing - involves testing of the integration of the units or pieces of code into a system
  3. Integration testing - involves testing whether separate systems can work together
  4. User acceptance testing - determines whether the system meets the business requirements & enables users to perform their jobs efficiently & effectively
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a Server?

A

A server is a high-powered micro-computer that “serve” applications and data to clients that are connected via a network

Servers typically have greater capacity than their clients (micro-computers) and often act as a central repository for organizational data

Servers today are often configured as a “virtual machine” meaning multiple operating systems can coexist and operate simultaneously on the same machineVirtual machines are appealing because they lower hardware costs and they create energy savings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a microcomputer?

A

A microcomputer (desktop computer and labtop computer) is designed to be used by one person at a time

They are often called personal computers, which are typically used for word processing, e-mail, spreadsheets, surfing the web, creating and editing graphics, playing music and gaiming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are Controllers?

A

Controllers are hardware units designed to operate specific input-output units

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a Buffer?

A

A buffer is a temporary storage unit used to hold data during computer operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does “MIPS” mean?

A

MIPS is characterized as millions of instructions per second, which is a unit for measuring the execution speed of computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a Tablet or Smart Phone or Personal Digital Assistant?

A

Tablets, Smartphone, or Personal Digital assistants are typically smaller, handheld wireless devices that depend or WiFi and/or cellular technology for communication

Examples of these are: iPad, iPhone, Android, Blackberry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the purpose of a Digital Signature?

A

It confirms a message has not been altered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the characteristics of the Implementation phase?

Systems Design & Process Improvement

A

The implementation phase involves putting the system in operations by the users. An organization may choose from a number of implementation methods including:

  1. Parallel implementation
  2. Plunge implementation
  3. Pilot implementation
  4. Phased implementation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a Mainframe computer?

A

Mainframe computers are large, powerful, high-speed computers

While these are less powerful than supercomputers, they have traditionally been used for high-volume transaction processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

List the types of computers from smallest to largest

A

PDA/Smartphone/Tablet

Microcomputer - PC- Laptop (cost-effective)

Minicomputer - Like a Mainframe- but smaller

Mainframe - Large computer with terminals attached

Supercomputer - Very powerful and very big

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is a Central Processing Unit (CPU)?

A

A central processing unit (CPU) is the principal hardware components of a computer. It contains an arithmetic/logic unit, primary memory, and a control unit

The major function of the CPU is to fetch stored instructions and data, decode the instructions, and carry out the instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the duty of a design engineer?

A

Determine language used for a specific computer- on a computer-to-computer basis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What are object programs?

A

Programs written in base computer language- not similar to English.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is Parallel implementation?

Implementation Phase - Systems Design & Process Improvement

A

The parallel implementation method uses both systems until it is determined that the new system is operating properly

Advantage - this method has the advantages of a full operational test of the new system with less risk of a system disaster

Disadvantage - this method has the additional work and cost during the period in which both systems are operating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are the characteristics of the Analysis phase?

Systems Design & Process Improvement

A

This phase involves teams including end users, information technology specialists, systems analysts, and process design specialists to understand the requirements for the proposed system

A needs assessment may be performed, which involves determining the requirements for the system in terms of processes, data capture, information & reporting

An analysis is performed on the existing system

A gap analysis is performed to examine the differences (gaps) between the required system and the existing system

The following are analyzed in this phase for the new system:

a. Performance levels
b. Reliability
c. Quality
d. Interfaces
e. Security & privacy
f. Constraints & limitations
g. Functional capabilities
h. Data structures & elements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

How can source programs be recognized?

A

They are written in a language close to English.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What are the various types of storage devices?

A

There are 6 types of storage devices:

  1. Magnetic tape
  2. Magnetic disks
  3. RAID (Redundant array of independent disks
  4. Compact discs
  5. Solid State Drives (SSDs)
  6. Cloud-Based Storage (Storage as a Services - “SaaS”
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is the purpose of a Compiler?

A

Takes Source language (English) and converts to Object (Computer) Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

How does Online Analytical Processing work?

A

It uses a Data Warehouse to support management decision making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is Data Mining?

A

Using artificial intelligence and pattern recognition to analyze data stores within a Data Warehouse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is Plunge implementation?

Implementation Phase - Systems Design & Process Improvement

A

When an organization uses the plunge implementation method, they cease using the old system and begin using the new system immediately

This method is less costly than the parallel method but it has higher risk of a system breakdown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is the purpose of online transaction processing?

A

To process a company’s routine transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What are the characteristics of batch processing?

A

Data held- updates multiple files all at once

Leaves a better audit trail

Uses Grandfather-Father-Son backup (3 levels of backup kept in 3 locations)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What does an output control check for?

A

Checks to see if output data is valid- distributed and used in an authorized manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What does a processing control check?

A

Checks if data processing produced proper output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is Pilot implementation?

Implementation Phase - Systems Design & Process Improvement

A

The pilot implementation method involves having a small group of individuals using the new system until it is seen to be working properly

Advantage - provides a partial operational test of the new system at a lower cost than parallel implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is a hash total?

A

An input control number- a meaningless sum of values included in the input.

Example would be summing a list of SSNs to make sure the data is the same once entered as it was prior to input into the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is a validity check?

A

Checks to see if data in existing tables or files belongs in the set

For example- is there a # in an alpha-only field or a letter in a numeric-only field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is a limit check?

A

Checks to see if numbers surpass a certain limit- i.e. in an age field is the number greater than 110.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is a compiler?

A

A compiler produces a machine language object program from a source program language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is multiprocessing?

A

Multiprocessing is simultaneous execution of two or more tasks, usually by two or more CPUs that are part of the same system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is a field check?

A

An input check that prevents invalid characters- i.e. checks for alphabetic letters in a SSN field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is Phased implementation?

Implementation Phase - Systems Design & Process Improvement

A

The phased implementation method involves installing the system in a series of phases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is a Source program?

A

A source program is a program written in a language from which statements are translated into machine language; computer programming has developed in “generations”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is a Hot Site?

A

A disaster recovery system where if the main system goes down- a Hot Site is ready to take over immediately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What are the characteristics of the Maintenance phase?

Systems Design & Process Improvement

A

The maintenance phase involves monitoring and supporting the new system. In this phase the organization provides on-going training, help desk resources, and a system for making authorized and tested changes to the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is a Cold Site?

A

If a main system goes down- a Cold Site will take time to get set up and running.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is the most common database language?

A

SQL - Standard Query Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is a Data Definition Language?

A

Defines SQL Database

Controls SQL Tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is a Data Manipulation Language?

A

Queries SQL Database tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is a Data Control Language?

A

Controls Access to SQL Database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What are the characteristics of a Relational Database?

A

Logical structure

Uses rows and columns similar to spreadsheet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What are the characteristics of a Hierarchical Database?

A

Has various levels

Uses trees to store data

44
Q

What are the advantages of a database?

A

Data is more accessible

Reduced redundancy

44
Q

What are the disadvantages of a database?

A

Cost of installation

Skilled personnel required to maintain

44
Q

What are the components of a database?

A

Desktop client

Application Server

Database Server

Think: Your desktop computer runs applications and saves to a database

44
Q

What is the 5fth generation of Source program?

A

The 5th generation of source program includes visual or graphical interfaces used to create source language that is usually compiled with a 3rd or 4th generation language compiler

44
Q

What is virtual memory (storage)?

A

Virtual memory (storage) is online secondary memory that is used as an extension of primary memory, thus giving the appearance of larger, virtually unlimited internal memory

44
Q

What is Desk checking?

A

Desk checking is review of a program by the programmer for errors before the program is run and debugged on the computer

44
Q

What is debug?

A

Debug is to find and eliminate errors in a computer program. Many compilers assist debugging by listing errors in the program such as invalid commands

44
Q

What is Edit?

A

Edit means to correct input data prior to processing

44
Q

What is a Loop?

A

A loop is a set of program instructions performed repetitively a predetermined number of times or until all of a particular type of data has been processed

44
Q

What is a memory dump?

A

A memory dump is a listing of the content of storage

44
Q

What is a Patch?

A

A patch is a section of coding inserted into a program to correct a mistake or to alter a routine

44
Q

What is a Run?

A

A run is a complete cycle of a program including input, processing and output

45
Q

What does Online mean?

A

Online means equipment in direct communication with, and under the control of, the CPU

Online also refers to having a connection to the Internet

46
Q

What does Off-line mean?

A

Off-line means equipment not in direct communication with the CPU; the operator generally must intervene to connect off-line equipment or data to the CPU (i.e. mount a magnetic tape of archival data)

Off-line also refers to the absence of an Internet connection

47
Q

What are the different types of Input devices?

In other words, what are the different methods used to input information into a computer?

A

The different types of input devices or ways to input information into a computer are as follows:

  1. Keying data
  2. Online entry
  3. Turnaround documents
  4. Automated source data input devices
  5. Electronic commerce / Electronic data interchange
48
Q

What does Peripheral equipment consist of?

A

Peripheral equipment consist of all non-CPU hardware that may be placed under the control of the central processor

Classified as online or off-line, this equipment consists of input, storage, output, and communication

50
Q

What is a Decision support system?

A

A decision support system is a computer-based system that combine models and data in an attempt to solve relatively unstructured problems with extensive user involvement

51
Q

What are the various types of Online entry?

Input device or methods used to input information into a computer

A

The various types of Online entry are as follows:

  1. Visual terminal/monitors - uses keyboard to directly enter data into computer
  2. Input interface - a program that controls the display for the user (usually on a computer monitor) and allows the user to interact with the system
  3. Graphical user interface (GUI) - uses icons, pictures, and menus instead of text for inputs (i.e. windows)
  4. Command line interface - uses text-type commands
  5. Mouse, joysticks, light pens, bar-code scanners - familiar devices that allow data entry
  6. Touch-sensitive screen - allows users to enter data from a menu of items by touching the surface of the monitor

All the following above are methods used to input information into a computer

51
Q

What is a Data warehouse?

A

A data warehouse is a subject-oriented, integrated collection of data used to support management decision-making processes

52
Q

What is a Data mart?

A

A data mart is a data warehouse that is limited in scope

53
Q

What is Data mining?

A

Data mining is using sophisticated techniques from statistics, artificial intelligence and computer graphics to explain, confirm and explore relationships amount data (which is often stored in a data warehouse or data mart)

54
Q

What are turnaround documents?

Input device or methods used to input information into a computer

A

Turnaround documents are documents that are sent to the customer and returned as inputs (i.e. utility bills - when Puget Sound Energy mail you a bill, they include a remittance advice for you to mail back with your payment. The remittance advice would be a turnaround document)

55
Q

What is Business Intelligence (BI)?

A

Business intelligence is a combination of systems that help aggregate, access, and analyze business data and assist in the business decision-making process

59
Q

What are the units of computer data from smallest to largest?

A

Bit - 1 (on) and 0 (off)

Byte - 8 bits to a byte/character

Field - group of related characters/bytes (i.e. Name- Zip Code- Serial #)

Record - Group of related fields (i.e. Member name- address- phone number)

File - Group of related records (i.e. Membership directory)

61
Q

What is a Database?

A

A database is a collection of interrelated files ordinarily most of which are stored online

61
Q

What does Normalization mean?

A

Normalization is the process of separating the database into logical tables to avoid certain kinds of updating difficulties (referred to as “anomalies”)

62
Q

What are the components of a Central Processing Unit (CPU)?

A

The components of a central processing unit are as follows:

  1. Arithmetic / logic unit - performs mathematical operations and logical comparisons
  2. Primary memory (storage) - active data and program steps that are being processed by the CPU. It may be divided into RAM (random access memory) and ROM (read-only memory). Application programs and data are stored in the RAM at execution time
  3. Control unit - interprets program instructions and coordinates input, output, and storage devices
63
Q

What are the characteristics of a Point-of-sale (POS) recorder?

(Input device or methods used to input information into a computer)

A

The characteristics of point-of-sale recorders are as follows:

  1. POS processing allows one to record and track customer orders, process credit / debit cards, connect to other systems in a network, and manage inventory. Generally, a POS terminal has as its core a personal computer, which is provided with application-specific programs and input/output devices for the particular environment in which it will serve
  2. POS terminals are used in most industries that have a point of sale such as service desk, including restaurants, lodging, entertainment, and museums.
  3. POS terminals are also web-based, which makes remote training and operation possible, as well as inventory tracking across geographically dispersed locations
63
Q

What is a Database system?

A

A database system consists of computer hardware and software that enables the database to be implemented

64
Q

What is a Monitor?

Type of Output device

A

A monitor visually displays output

64
Q

What is a Database management system?

A

A database management system is software that provides a facility for communications between various application programs (i.e. payroll preparation program) and the database (i.e. a payroll master file containing the earnings records of the employees)

65
Q

What does Data independence mean?

A

Data independence is basic to database systems, which is the concept that separates the data from the related application programs

65
Q

What is Data modeling?

A

Data modeling is the process of identifying and organizing a database’s data, both logically and physically. A data model determines what information is to be contained in a database, how the information will be used, and how the items in the database will be related to each other

67
Q

What is Entity-relationship modeling?

A

Entity-relationship modeling is one of the 4 ways data modeling can be constructedIt is an approach to data modeling. The model (aka Entity-Relationship diagram or ERD) divides the database into two logical parts - entities (i.e. “customer” or “product”) and relations (“buys” or “pays for”)

69
Q

What is Computer output to microfiche (COM)?

Type of Output device

A

Computer output to microfiche makes use of photographic process to store output

70
Q

What is a Primary key?

A

A Primary key is one of the 4 ways data modeling can be constructed

It is the field(s) that make a record in a relational database table unique

71
Q

What is a Foreign key?

A

A Foreign key is one of the 4 ways data modeling can be constructedIt is the field(s) that are common to two or more related tables in a relational database

72
Q

What is Magnetic tape?

Type of Storage Device

A

Magnetic tape is the slowest type of storage available because data is stored sequentially
Primarily used for archiving purposes today

74
Q

What are the components of systems software?

A

The components of systems software are:

  1. Operating system
  2. Utility programs
  3. Communications software
75
Q

What is a Magnetic disk?

Type of Storage Device

A

A magnetic disk is the most common storage medium in use on computers today. Magnetic disks are also called “hard disks” or “hard disk drives” (HDD)

Data can be accessed directly

76
Q

What is Meta-data?

A

Meta-data is definitional data that provides information about or documentation of other data managed within an application or environment. For example, data about data elements, records and data structures (length, fields, columns, etc.)

76
Q

What is Hypertext Transfer Protocol (HTTP)?

A

Hypertext transfer protocol (HTTP) is the primary internet protocol for data communication on the world wide web

77
Q

What is an Operating system?

Component of systems software

A

An operating system manages the input, output, processing and storage devices and operations of a computer

An operating system performs scheduling, resource allocation and data retrieval based on instructions provided in job control language

77
Q

What is a Uniform Resource Locator (URL)?

A

Uniform Resource Locator (URL) is a standard for finding a document by typing in an address. URLs work in much the same way as addresses on mail processed by the postal department

78
Q

What is the World Wide Web (the web or WWW)?

A

The world wide web is a framework for accessing linked resources spread out over the millions of machines all over the internet

79
Q

What is an utility program?

Component of systems software

A

A utility program handles common file, data manipulation and “housekeeping” tasks (backing data up)

80
Q

What is a RAID (Redundant array of independent disk)?

Type of Storage Device

A

RAID (Redundant array of independent disk) is a way of storing the same data redundantly on multiple magnetic disks

When originally recorded, data is written to multiple disks to decrease the likelihood of loss of data
If a disk fails, at least one of the other disks has the information and continues operation

81
Q

What is a Web browser?

A

A web browser is client software that provides the user with the ability to locate and display web resources

82
Q

What are Web servers?

A

A web server is the software that “serves” (i.e. makes available) web resources to software clients. Web resources (i.e. Apache & internet Information Server- IIS) typically run on “server” hardware

83
Q

What is a Compact disc?

Type of Storage Device

A

Compact disc are CDs and Digital Video discs (DVDs). Both are the same physical size and both use optical technology to read and write data to the disc

84
Q

What is communications software?

Component of systems software

A

Communications software controls and supports transmission between computers, computers and monitors, and access various databases

85
Q

What is an Object program?

A

An object program is the converted source program that was changed using a compiler to create a set of machine readable instructions that the CPU understands

86
Q

What is a Router?

A

A router is a communications interface device that connects two networks and determines the best way for data packets to move forward to their destinations

87
Q

What is a Bridge?

A

A bridge is a device that divides a LAN into two segments, selectively forwarding traffic across the network boundary it defines; similar to a switch

88
Q

What is an applications software?

A

Applications software are programs designed for specific uses or “applications”, such as:

  1. Word processing, graphics, spreadsheets, email and database systems (i.e. MS Office, Suite)
  2. Accounting software.
    a. Low-end
    b. High-end
    c. Enterprise Resource Planning (ERP)
89
Q

What is a Switch?

A

A switch is a device that channels incoming data from any of multiple input ports to the specific output port that will take the data toward its intended destination

90
Q

What is a check digit?

A

An input control that adds an identification number to a set of digits – usually at the end

92
Q

What is are Solid State Drives (SSDs)?

Type of Storage Device

A

SSDs use microchips to store data and require no moving parts for read/write operation

SSDs are faster and more expensive per gigabyte than CDs, DVDs, and HDDs

SSDs are increasingly being used in place of HDDs in microcomputers, but cost and limited capacity have constrained their adoption as a primary storage device

SDDs are more commonly used for auxiliary storage. SSDs that are “pluggable” are often called “thumb drives”, “flash drives” or “USB drives” because they use a USB interface to “plug” into other devices

93
Q

What are the types of Accounting software?

A

The types of accounting software are:

  1. Low-end - all in one package designed for small organizations (i.e. QuickBooks, Peachtree)
  2. High-end - ordinarily in modules (e.g. GL, A/R)
  3. Enterprise Resource Planning (ERP) - designed as relatively complete information system “suites” for large and medium organizations. Major vendors are well known - SAP, PeopleSoft, Oracle, and J.D. EdwardsAdvantages of ERP systems - integration of various portions of the information systems, direct electronic communication with suppliers & customers, increased responsiveness to information requests for decision-making

Disadvantages of ERP systems - complex, costly, and integration with supplier and customer systems may be more difficult than anticipated

94
Q

What is the 1st generation of Source program?

A

The 1st generation of source program is machine language

Machine language - composed of combinations of 1’s and 0’s that are meaningful to the computer

96
Q

What is a Blog?

A

A blog is an asynchronous discussion or web log led by a moderator that typically focuses on a single topic. Blogs are an efficient way to share information, views, and opinions

97
Q

What is Cloud-Based Storage (SaaS)?

Type of Storage Device

A

Cloud-based storage (also called “Storage as a Service” or SaaS) is a type of storage that is hosted offsite, typically by third parties, and is accessed via the Internet

98
Q

What is a Wiki?

A

A Wiki is an information-gathering and knowledge-sharing website that is developed collaboratively by a community or group, all of whom can freely add, modify, or delete content

99
Q

What is a Twitter?

A

A twitter is a micro-variation of a blogRestricts input (tweets) to 140 charactersCommonly used to “follow” friends and celebrities

100
Q

What is the 4th generation of Source program?

A

The 4th generation of source program is an “application-specific” language usually built around database systems

These programs are ordinarily closer to human languages than the first three generation (i.e. SQL - structured query language: an instruction to create a report)

101
Q

What is RSS/ATOM Feeds (Really Simple Syndication)?

A

RSS / ATOM Feeds is an XML application that facilitates the sharing and syndication of website content by subscriptionRSS feeds are automatically checked by RSS-enabled client software for new website content on a regular basis

103
Q

What is the manner in which information is represented in a computer?

A

Information is represented in a computer via Digital and Analog:

Digital - a series of binary digits (0s and 1s). One binary digit is called a “bit”. A series of 8 bits is referred to as a “byte”. One byte can form a letter, a number, or a special character

Analog - the representation that is produced by the fluctuations of a continuous signal (i.e. speech, temperature, weight, speed, etc.). Rather than using 0s and 1s to represent information, analog signals use electrical, mechanical, hydraulic or pneumatic devices to transmit the fluctuations in the signal itself to represent infomration

104
Q

What is an IP address?

A

An IP address is the number that identifies a machine as unique on the Internet

105
Q

What is an ISP (Internet Service Provider)?

A

An ISP or internet service provider is an entity that provides access to the internet

107
Q

What is an overall client-server system?

A

An overall client-server system is a networked computing model (usually a LAN) in which database software on a server performs database commands sent to if from client computers

108
Q

What are the generations of Source program?

A

1st generation - machine language

2nd generation - assembly language

3rd generation - High-level programming languages such as COBOL, Basis, Fortran, C++, and Java

4th generation - Application-specific language usually built around database systems

5th generation - includes visual or graphical interfaces used to create source language that is usually compiled with a 3rd or 4th generation language compiler

111
Q

What is Encryption?

A

Encryption is the conversion of data into a form called cipher text that cannot be easily understood by unauthorized people

112
Q

What is the 2nd generation of Source program?

A

The 2nd generation of source program is Assembly language

Assembly language is a low-level programming language that uses words (mnemonics) instead of numbers to perform an operationAssembly language must be translated to machine language by a utility program called an assembler

113
Q

What is a check digit?

A

An input control that adds an identification number to a set of digits – usually at the end

114
Q

What are the characteristics of Keying Data?

Input device or methods used to input information into a computer

A

The characteristics of keying data or data entry devices is:

Key-to-tape and key-to-disk - this is when data is entered on magnetic tape and/or disk and then read on a computer

115
Q

What is an Algorithm?

A

An algorithm is a detailed sequence of actions to perform to accomplish some task (in this case to encrypt and/or decode data)

116
Q

What is a Key?

A

A key is, in the context of encryption, a value that must be fed into the algorithm used to decode an encrypted message in order to reproduce the original plain text

117
Q

What is the 3rd generation of Source program?

A

The 3rd generation of source program is “high level” programming languages such as COBOL, Basic, Fortran, C++, and Java

  1. C++ & Java are considered object-oriented programs (OOP) in that they are based on the concept of an “object”, which is a data structure that uses a set of routines called “methods” which operate on the data. The “objects” are efficient in that they often are reusable in other programs.
  2. Object-oriented programs keep together data structures and procedures (methods) through a procedure referred to as encapsulation. Basic object-oriented programs are the concepts of a class (a set objects with similar structures) and inheritance (the ability to create new classes from existing classes)
119
Q

What is Authentication?

A

Controls must exist over the origin, proper submission, and proper delivery of EDI communications. Authentication deals with the receiver of the message must having proof of the origin of the message as well as its proper submission and delivery

120
Q

What are Packets?

A

Packets are a block of data that is transmitted from one computer to another. It contains data and authentication information

121
Q

What are the various types of Automated source data input devices?

(Input device or methods used to input information into a computer)

A

The following are examples of Automated source data input devices:

  1. Magnetic tape reader - a device capable of sensing information recorded as magnetic spots on magnetic tape (i.e. when you write a check, there are magnetic ink characters on the check to enable faster processing of check payments)
  2. Magnetic ink character reader (MICR) - device that reads characters that have been encoded with a magnetic ink (i.e. blank checks)
  3. Scanner - a device that reads characters on printed pages
  4. Automatic teller machine (ATM) - a machine used to execute and record transactions with financial institutions
  5. Radio Frequency Identification (RFID) - uses radio waves to track and input data. Increasingly used for inventory and contactless payment systems. RFID tags can be read wirelessly by RFID readers; does not require line-of-sight access like bar code technology (i.e. the Good to Go Pass)
  6. Point-of-sale (POS) recorders - devices that read price and product code. These function as a terminal and a cash register
  7. Voice recognition - a system that understands spoken words and transmits them into a computer
122
Q

What is a Web master?

A

A web master is responsible for providing expertise and leadership in the development of a website, including the design, analysis, security, maintenance, content development, and updates

123
Q

What is electronic commerce and electronic data interchange?

Input device or methods used to input information into a computer

A

Electronic commerce and electronic data exchange involves one company’s computer communicating with another’s computer

For example, a buyer electronically sending a purchase order to a supplier

124
Q

What is a Web coordinator?

A

A web coordinator is responsible for the daily operations of the website

125
Q

What is an Intranet / Extranet developer?

A

An intranet / extranet developer is responsible for writing programs based on the needs of the company

126
Q

What are Diagnostic routines?

A

Diagnostic routines are hardware or software supplied by the manufacturer to check the internal operations and devices within the computer system

128
Q

What is Periodic maintenance?

A

The system should be examined periodically (often weekly) by a qualified service technician

132
Q

What are the different ways Data modeling can be constructed?

A

Data modeling can be constructed in any of the following ways:

  1. Entity-relationship modeling
  2. Primary key
  3. Foreign key
  4. REA data model
140
Q

What is a Printer?

Type of Output device

A

A printer produces paper output

141
Q

What is a Rollback?

A

A rollback is as a part of recovery, to undo changes made to a database to a point at which it was functioning properly

143
Q

What is a Plotter?

Type of Output device

A

A plotter produces paper output of graphs

145
Q

What is a Mirrored web server?

A

A mirrored web server is an exact copy of a website which is the best way to back up the website

147
Q

What is a Program flowchart?

A

A program flowchart is a graphic representation of the logic (processing steps) of a computer program

148
Q

What is an Internal control (audit) flowchart or document flowchart?

A

An internal control (audit) or document flowchart is a graphic representation of the flow of documents from one department to another, showing the source flow and final disposition of the various copies of all documents

150
Q

What is a Decision table?

A

Decision tables use a matrix format that lists sets of conditions and the actions that result from various combinations of these conditions

151
Q

What are the characteristics of a Decentralized processing structure?

A

A decentralized processing structure has the following:

  1. Processing (and data) are stored on computers at multiple locations
  2. Ordinarily the computers involved are not interconnected by a network, so users at various sites cannot share data
  3. May be viewed as a collection of independent databases, rather than a single database
  4. End-user computing is relatively decentralized
152
Q

What are the characteristics of a Distributed processing structure?

A

A distributed processing structure has the following:

  1. Transactions for a single database are processed at various sites
  2. Processing may be on either a batch or online real-time basis
  3. An overall single database is ordinarily updated for these transactions and available at the various sites
155
Q

What is a Proxy server?

A

A proxy server is a server that saves and serves copies of web pages to those who request them.

When a web page is requested, the proxy server is able to access that page either through its cache (reserve of web pages already sent or loaded) or by obtaining it through the original server

A proxy server can both increase efficiency of internet operations and help assure data security

163
Q

What is TCP/IP (Transmission Control Protocol / Internet Protocol)?

A

TCP / IP is the basic communication language or protocol of the internetIt has two layers

The higher layer assembles messages or files into smaller packets that are transmitted over the Internet

The lower layer assigns IP addresses and insures that messages are delivered to the appropriate computer

165
Q

What are the various types of database client-server architecture types?

A

The 3 types of database client-server architecture types are:

  1. Overall client-server systems
  2. Subtypes of client / server architectures: File servers, Database servers, and Three-tier architectures
  3. Distributed systems
169
Q

What are Distributed systems?

A

Distributed systems are systems that connect all company locations to form a distributed network in which each location has its own input/output , processing, and storage capabilities

These local computers also pass data amount themselves and possibly to a server (often referred to as a “host” in this context) for processing

170
Q

What is Decryption?

A

Decryption is the process of converting encrypted data back into its original form so it can be understood

The conversion is performed using an algorithm and key which only the users control

172
Q

What is Web 2.0?

A

Web 2.0 is the 2nd generation of the web, which refers to the era of web-based collaboration and community generated content via web-based software tools such as:

  1. Blog
  2. Wiki
  3. Twitter
  4. RSS/ATOM Feeds - Really Simple Syndication
176
Q

What is a Private key system?

A

A private key system is an encryption system in which both the sender and receiver have access to the electronic key, but do not allow other access

The primary disadvantage is that both parties must have the key, In addition, encryption and decryption uses more system overhead; which means they slow down the rate of processing

177
Q

What is an Internet developer?

A

An internet developer is responsible for writing programs for commercial use

An internet developer is similar to a software engineer or systems programmer

181
Q

What are the various types of database client-server architecture types?

A

The 3 types of database client-server architecture types are:

  1. Overall client-server systems
  2. Subtypes of client / server architectures: File servers, Database servers, and Three-tier architectures
  3. Distributed systems
182
Q

What is a Preprinted form?

A

The use of a preprinted form is a type of input validation (edit) control

Information is pre-assigned a place and a format on the input form

184
Q

What are the various types of subtypes of client/server architectures?

A

The various types of subtypes of client/server architectures consist of the following:

  1. File servers - manages file operations and is shared by each of the client PCs. The 3 responsibilities (input/output, processing, and storage) are divided in a manner in which most input/output and processing occurs on client computers rather than on the server. The file server acts simply as a shared data storage device
  2. Database servers - similar to file servers, but this type of server contains the database management system and thus performs more processing

NOTE: The above two architectures are referred to as “two-tier” architecture - client tier & server database tier

  1. Three-tier architectures - a client/server configuration that includes 3 tiers. This type of architecture includes another server layer in addition to the two tiers above

Examples of additional servers added may be:

a. Print server
b. Communications server
c. Fax serverd. Web server

185
Q

What is Redundant data check?

A

The use of a redundant data check is a type of input validation (edit) control

Uses two identifiers in each transaction record (i.e. customer account number and the first five letter of customer’s name) to confirm that the correct master file record is being updated

186
Q

What is a Checkpoint?

A

Similar to grandfather-father-son batch system recovery method, but at certain points, “check points”, the system makes a copy of the database and this “check point” file is stored on a separate disk or tape

If a problem occurs, the system is restarted at the last checkpoint and updated with subsequent transactions

188
Q

What is Boundary protection?

A

Most CPUs have multiple jobs running simultaneously (multiprogramming environment)

To ensure that these simultaneous jobs do not destroy or change the allocated memory of another job, the systems software contains boundary protection controls

190
Q

What is Documentation?

A

Systems and programs should be adequately documented

System specification documents should detail such matters as:

  1. Performance levels
  2. Reliability
  3. Security & privacy
  4. Constraints & limitations
  5. Functional capabilities
  6. Data structure & elements
192
Q

What is a Control / Batch / or Proof total?

A

The use of a control, batch or proof total is a type of input validation (edit) control

A total of one numerical field for all the records of a batch that normally would be added (i.e. total sales dollars)

193
Q

What is Menu driven input?

A

The use of a menu driven input is a type of input validation (edit) control

As input is entered, the operator responds to a menu prompting the proper response (i.e. what score did you get on the BEC exam [75 - 99]?)

194
Q

What is a Missing data check?

A

The use of a missing data check is a type of input validation (edit) control

A control that searches for blanks inappropriately existing in input data (i.e. if an employee’s division number were left blank an error message would result)

195
Q

What is Field size check?

A

The use of a field size check is a type of input validation (edit) control

A control of an exact number of characters to be input (i.e. if part numbers all have 6 digits, an error message would result if more or less than 6 characters were input)

196
Q

What is a Logic check?

A

The use of a logic check is a type of input validation (edit) control

Ensures that illogical combinations of input are not accepted (i.e. If the Bellevue city branch has no company officers, an error message would result if two fields for a specified employee indicated that the employee worked as an officer in Bellevue)

197
Q

What is REA data model?

A

An REA data model is one of the 4 ways data modeling can be constructed. It is a data model designed for use in designing accounting information databases. REA is an acronym for the model’s basic types of objects:

R - Resources: Identifiable objects that have economic value

E - Events: An organization’s business activities

A - Agents: People or organizations about which data is collected

199
Q

What is Closed-loop verification?

A

The use of a closed-loop verification is a type of input validation (edit) control

A control that allows data entry personnel to check the accuracy of input data. For example, the system might retrieve an account name of a record that is being updated and display it on the operator’s terminal

This control may be used instead of a redundant data check

200
Q

What does the Data control group do within the IT Control Environment?

A

The control group acts as a liaison between users and the processing center

This group records input data in a control log, follows the progress of processing, distributes output, and ensures compliance with control totals

201
Q

What is Boundary protection?

A

Most CPUs have multiple jobs running simultaneously (multiprogramming environment)

To ensure that these simultaneous jobs do not destroy or change the allocated memory of another job, the systems software contains boundary protection controls

203
Q

What is Documentation?

A

Systems and programs should be adequately documented

System specification documents should detail such matters as:

  1. Performance levels
  2. Reliability
  3. Security & privacy
  4. Constraints & limitations
  5. Functional capabilities
  6. Data structure & elements
204
Q

What are the various types of subtypes of client/server architectures?

A

The various types of subtypes of client/server architectures consist of the following:

  1. File servers - manages file operations and is shared by each of the client PCs.

The 3 responsibilities (input/output, processing, and storage) are divided in a manner in which most input/output and processing occurs on client computers rather than on the server. The file server acts simply as a shared data storage device

  1. Database servers - similar to file servers, but this type of server contains the database management system and thus performs more processing

NOTE: The above two architectures are referred to as “two-tier” architecture - client tier & server database tier

  1. Three-tier architectures - a client/server configuration that includes 3 tiers. This type of architecture includes another server layer in addition to the two tiers above

Examples of additional servers added may be:

a. Print server
b. Communications server
c. Fax serverd. Web server

206
Q

What is a Control / Batch / or Proof total?

A

The use of a control, batch or proof total is a type of input validation (edit) control

A total of one numerical field for all the records of a batch that normally would be added (i.e. total sales dollars)

208
Q

What is a Missing data check?

A

The use of a missing data check is a type of input validation (edit) control

A control that searches for blanks inappropriately existing in input data (i.e. if an employee’s division number were left blank an error message would result)

210
Q

What is Field size check?

A

The use of a field size check is a type of input validation (edit) control

A control of an exact number of characters to be input (i.e. if part numbers all have 6 digits, an error message would result if more or less than 6 characters were input)

211
Q

What is a Logic check?

A

The use of a logic check is a type of input validation (edit) control

Ensures that illogical combinations of input are not accepted (i.e. If the Bellevue city branch has no company officers, an error message would result if two fields for a specified employee indicated that the employee worked as an officer in Bellevue)

213
Q

What are the methods of Processing data?

A

The methods of processing data are:

  1. Batch Processing
  2. Online real-time (direct access processing)

a. Online transaction processing (OLTP)
b. Online analytical processing (OLAP)

214
Q

What are the 5 principles of a reliable system according to the AICPA Trust Services?

A

The AICPA Trust Services provide assurance on information systems uses a framework with 5 principles of a reliable system:

  1. Security
  2. Availability
  3. Processing integrity
  4. Online privacy
  5. Confidentially
215
Q

What is Closed-loop verification?

A

The use of a closed-loop verification is a type of input validation (edit) control

A control that allows data entry personnel to check the accuracy of input data. For example, the system might retrieve an account name of a record that is being updated and display it on the operator’s terminal

This control may be used instead of a redundant data check

216
Q

What does an Operator do within the IT Control Environment?

A

The operator is responsible for the daily computer operations of both the hardware and the software

The operator supervises operations on the operator’s console, accepts any required input, and distributes any general output

The operator should have adequate documentation available to run the program (a run manual), but should not have detailed program information

Help desks are usually a responsibility of operations because of the operational nature of their functions

219
Q

What is a Reciprocal agreement?

A

A reciprocal agreement is an agreement between two or more organizations (with compatible computer facilities) to aid each other with their data processing needs in the event of a disaster

This is also referred to as a mutual aid pact

222
Q

What is a Data flow diagram (DFD)?

A

A data flow diagram presents logical flows of data and functions in a system

For example, a data flow diagram for the delivery of goods to a customer would include a symbol for the warehouse from which the goods are shipped and a symbol representing the customer

It would not emphasize details such as computer processing and paper outputs

224
Q

What are the steps in a System development lifecycle?

A

The steps in the system development lifecycle are:

  1. Software concept - identify the need for the new system
  2. Requirements analysis - determine the needs of the users
  3. Architectural design - determining the hardware, software, people, etc. needed
  4. Coding & debugging - acquiring & testing the software
  5. System testing - testing & evaluating the functionality of the system
227
Q

What are the steps in a System development lifecycle?

A

The steps in the system development lifecycle are:

  1. Software concept - identify the need for the new system
  2. Requirements analysis - determine the needs of the users
  3. Architectural design - determining the hardware, software, people, etc. needed
  4. Coding & debugging - acquiring & testing the software
  5. System testing - testing & evaluating the functionality of the system
228
Q

What are the 5 principles of a reliable system according to the AICPA Trust Services?

A

The AICPA Trust Services provide assurance on information systems uses a framework with 5 principles of a reliable system:

  1. Security
  2. Availability
  3. Processing integrity
  4. Online privacy
  5. Confidentially
229
Q

What does a Systems analyst do within the IT Control Environment?

A

The systems analyst analyzes the present user environment and may:

  1. Recommend specific changes
  2. Recommend the purchase of a new system
  3. Design a new information system

The analyst is in constant contact with user departments and programming staff to ensure the users’ actual and ongoing needs are being met

A system flowchart is a tool used by the analyst to define the systems requirements

230
Q

What is a Data flow diagram (DFD)?

A

A data flow diagram presents logical flows of data and functions in a system

For example, a data flow diagram for the delivery of goods to a customer would include a symbol for the warehouse from which the goods are shipped and a symbol representing the customer

It would not emphasize details such as computer processing and paper outputs

231
Q

What does an Applications programmer do within the IT Control Environment?

A

The application programmer is responsible for writing, testing, and debugging the application programs from the specifications (whether general or specific) provided by the system analyst

A program flowchart is one tool used by the applications programmer to define the program logic

233
Q

What does an Operator do within the IT Control Environment?

A

The operator is responsible for the daily computer operations of both the hardware and the software

The operator supervises operations on the operator’s console, accepts any required input, and distributes any general output

The operator should have adequate documentation available to run the program (a run manual), but should not have detailed program information

Help desks are usually a responsibility of operations because of the operational nature of their functions

235
Q

What does the Data control group do within the IT Control Environment?

A

The control group acts as a liaison between users and the processing center

This group records input data in a control log, follows the progress of processing, distributes output, and ensures compliance with control totals