INFORMATION TECHNOLOGY AND COMMUNICATION Flashcards

1
Q

what does the CPU contain?

A

primary storage, a control unit, and an arithmetic/logic unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is primary storage?

A

temporary main memory portion of the CPU which is part RAM part ROM. Secondary storage consists of devices external to the CPU such as disks, flash drives, & hard drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

elements of assembly language:

A

must be translated into machine language by an assemblereasier to write programs in than machine languageit’s an efficient form of second gen language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

elements of a procedural language:

A

3rd gen language that concentrates on the procedures and functions of the programs. written in source code then translated into object code. source code is more similar to english but object code is the machine language for the type of computer. FORTRAN, COBOL, and BASIC are all forms of procedural languages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are the 2 distinct functions of the information systems department?

A

systems development and data processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

liason between end-users and the processing center?

A

the control group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are the 3 main types of system documentation?

A

data flow diagramssystem flowchartsentity relationship diagrams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What AICPA framework relates to “reliable systems”?

A

AICPA’s Trust Services provides assurance on systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what 3 IT functions need to be separated?

A

programming, operations, and the library

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

daily operations of the website?

A

Web coordinator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

control activities defined?

A

Control activities include all of the policies and procedures used within a sytem to help ensure that all management directives are performed as anticipated. Each system is supposed to perform designated tasks. Control activities are installed to ensure those tasks get accomplished efficiently and effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

5 examples of information goals?

A

(1) input validity - where input data be approved and reflect accurate economic events (2) input completeness - all valid events are captured (3) input accuracy - all events are captured correctly (4) update completeness - all events are reflected in respective master files (5) update accuracy - all events are reflected correctly within master file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

controlling computer operations is controlled by:

A

Segregation controls, backup and recovery, contingency processing, file protection rings and internal and external labels represent methods to control computer operations. Segregation controls represent controlling access to programs and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

There are five risks associated with e-commerce, according to the Trust Services framework established by the AICPA. These risks are:

A

1) security, 2) availability, 3) processing integrity, 4) online privacy, and 5) confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

4 categories of IT resources under COBIT:

A

applications, which include systems and manual procedures to process information; the information itself; infrastructure, which includes hardware, equipment, and operating systems needed to process information; and people.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

4 components of the COBIT framework’s IT process model:

A

1) plan and organize, 2) acquire and implement, 3) deliver and support, and 4) monitor and evaluate. Abbreviated, these components are referred to as: Plan, Build, Run, and Monitor.

17
Q

Who established COBIT?

A

The Information Systems Audit and Control Association (ISACA)

18
Q

definition of net present value?

A

present value of cash inflows minus the net investment

19
Q

rollback and recovery procedures are most common in:

A

online real-time systems. periodic snapshots are taken of a master file, and upon detection of a problem, the system reprocesses all transactions that have occurred since the snapshot

20
Q

who designs, creates, and tests program?

A

application programmers

21
Q

a fire supression system in a computer facility should include:

A

halon and other chemical suppressents that dont harm computer hardware

22
Q

which critical function is most likely to be missing in a small business computing environment?

A

authorization

23
Q

in a large firm, who would maintain custody of the entity’s data?

A

the data librarian

24
Q

what allows a database management system to add new records, delete old records, and update records?

A

a data manipulation language (DML)

25
Q

What is used to verify that a program was free of unauthorized changes?

A

a source code comparison program. this compares an archived program to the program actually in use

26
Q

What is PaaS?

A

PaaS is the use of the cloud to create (not access) software