INFORMATION TECHNOLOGY AND COMMUNICATION Flashcards
what does the CPU contain?
primary storage, a control unit, and an arithmetic/logic unit
what is primary storage?
temporary main memory portion of the CPU which is part RAM part ROM. Secondary storage consists of devices external to the CPU such as disks, flash drives, & hard drives
elements of assembly language:
must be translated into machine language by an assemblereasier to write programs in than machine languageit’s an efficient form of second gen language
elements of a procedural language:
3rd gen language that concentrates on the procedures and functions of the programs. written in source code then translated into object code. source code is more similar to english but object code is the machine language for the type of computer. FORTRAN, COBOL, and BASIC are all forms of procedural languages
what are the 2 distinct functions of the information systems department?
systems development and data processing
liason between end-users and the processing center?
the control group.
what are the 3 main types of system documentation?
data flow diagramssystem flowchartsentity relationship diagrams
What AICPA framework relates to “reliable systems”?
AICPA’s Trust Services provides assurance on systems.
what 3 IT functions need to be separated?
programming, operations, and the library
daily operations of the website?
Web coordinator
control activities defined?
Control activities include all of the policies and procedures used within a sytem to help ensure that all management directives are performed as anticipated. Each system is supposed to perform designated tasks. Control activities are installed to ensure those tasks get accomplished efficiently and effectively.
5 examples of information goals?
(1) input validity - where input data be approved and reflect accurate economic events (2) input completeness - all valid events are captured (3) input accuracy - all events are captured correctly (4) update completeness - all events are reflected in respective master files (5) update accuracy - all events are reflected correctly within master file.
controlling computer operations is controlled by:
Segregation controls, backup and recovery, contingency processing, file protection rings and internal and external labels represent methods to control computer operations. Segregation controls represent controlling access to programs and data.
There are five risks associated with e-commerce, according to the Trust Services framework established by the AICPA. These risks are:
1) security, 2) availability, 3) processing integrity, 4) online privacy, and 5) confidentiality.
4 categories of IT resources under COBIT:
applications, which include systems and manual procedures to process information; the information itself; infrastructure, which includes hardware, equipment, and operating systems needed to process information; and people.