Information_Technology 1 Flashcards

1
Q

Input controls - objective

A

Overall controls

(a) Inputs should be properly authorized and approved.
(b) The system should verify all signifi cant data fi elds used to record information (editing the data).
(c) Conversion of data into machine-readable form should be controlled and verifi ed for accuracy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Batch total

A

Batch total is an input control, the sum of the number of items or total amount. Input is compared to processing; a mismatch of the number of items or sum of the totals (e.g., sum of invoice totals) between input and processing indicates that an item was lost or processed twice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Source Data Controls

A

Source Data Controls

The following controls make sure source documents and other input data are authorized, accurate, complete, accounted for properly, entered into the system, and sent to their intended destination in a timely manner. They should also make sure the data has not been suppressed, duplicated, or otherwise improperly changed.

a. Design source documents such that they minimize errors and omissions.
b. Prenumber all documents and have the system identify and report any missing or duplicate numbers.
c. Restrict source document preparation to authorized personnel.
d. Require all source documents, where required, to be properly authorized before processing them.
e. Use machine-readable turnaround documents (company data sent to an external party and returned to the system as input) to reduce data input time, effort, expense, and errors.
f. Cancel documents that have been entered into the system so they cannot be reused.

(1) Deface paper documents by marking them paid or perforating them.
(2) Flag electronic documents to show they have been canceled.

g. Retain original source documents long enough to satisfy legal requirements.
h. Use check digit verification.

(1) ID numbers can have a check digit computed from the other digits. For example, a six-digit account number can have a seventh digit, which is the check digit.
(2) Data entry devices verify the check digit each time the ID number is entered by using the six digits to recalculate the seventh check digit.
(3) The verification calculation will not match the check digit if an error is made in entering the six digits or the check digit.

i. Use key verification.

(1) An employee rekeys data entered through a keyboard.
(2) The system compares the two sets of keystrokes.
(3) Discrepancies are highlighted for correction.
(4) Key verification is used for crucial input such as customer numbers and amounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Type Input validation (edit) controls

A

(a) Preprinted form— Information is preassigned a place and a format on the input form.
(b) Check digit— An extra digit added to an identifi cation number to detect certain types of data transmission errors. For example, a bank may add a check digit to individuals’ 7-digit account numbers. The computer will calculate the correct check digit based on performing predetermined mathematical operations on the 7-digit account number and will then compare it to the check digit.
(c) Control, batch, or proof total — A total of one numerical fi eld for all the records of a batch that
normally would be added, (e.g., total sales dollars).
(d) Hash total— A control total where the total is meaningless for fi nancial purposes (e.g., a
mathematical sum of employee social security numbers).
(e) Record count— A control total of the total records processed.
(f) Limit (reasonableness) test— A test of the reasonableness of a fi eld of data, given a predetermined
upper and/or lower limit (e.g., for a fi eld that indicates auditing exam scores, a limit check would
test for scores over 100).
(g) Menu driven input— As input is entered, the operator responds to a menu prompting the proper
response (e.g., What score did you get on the Auditing part of the CPA Exam [75-100]?).
(h) Field check— A control that limits the types of characters accepted into a specifi c data fi eld (e.g., a
pay rate should include only numerical data).
(i) Validity check— A control that allows only “valid” transactions or data to be entered into the
system (e.g., a fi eld indicating sex of an individual where 1=female and 2=male—if the fi eld is
coded in any other manner it would not be accepted).
(j) Missing data check— A control that searches for blanks inappropriately existing in input data (e.g.,
if an employee’s division number were left blank an error message would result).
(k) Field size check— A control of an exact number of characters to be input (e.g., if part numbers all
have 6 digits, an error message would result if more or less than 6 characters were input).
(l) Logic check— Ensures that illogical combinations of input are not accepted (e.g., if the Tuba City
branch has no company offi cers, an error message would result if two fi elds for a specifi ed
employee indicated that the employee worked as an offi cer in Tuba City).
(m) Redundant data check— Uses two identifi ers in each transaction record (e.g., customer account
number and the fi rst fi ve letters of customer’s name) to confi rm that the correct master fi le record is
being updated.
(n) Closed-loop verifi cation— A control that allows data entry personnel to check the accuracy of input
data. For example, the system might retrieve an account name of a record that is being updated, and
display it on the operator’s terminal. This control may be used instead of a redundant data check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Database Management System (DBMS)

A
  • A DBMS (database management system) consists of computer program(s) for organizing, accessing, and modifying a database. It is a collection of programs that enables users to store, modify, or extract information from a database.
  • The primary purpose of a database management system is to reduce data redundancy.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Distributed data processing

A

Distributed data processing is a network of interdependent computers where certain functions are centralized, other functions are decentralized, and processing is shared among two or more computers. It is an alternative to both centralization and decentralization.

A distributed/decentralized processing environment works best when significant volumes of data are generated at many remote locations and the user requires near-immediate access to the data. This type of processing environment will allow for quick access to the data as opposed to having that information generated at many locations and processed at a centralized location.

Distributed data processing provides infrastructure services that facilitate the rapid development, deployment, and management of distributed applications in the telecommunications arena and integrate all telecommunications management and control functions into a unified logical software architecture supported by a single distributed control platform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Record Count

A
  • A batch record count is the number of records included in the batch where a record is a set of related fields about the same data.
  • The records are counted before processing and again after processing, and the two totals are compared to assure that no records are added or omitted.

Invoice No. Product Quantity Unit Price

101 K 10 50 $ 5.00
102 M 15 100 10.00
103 P 20 150 25.00
104 Q 25 200 30.00
105 T 30 250 35.00

These records are in sequence (101, 102, 103, 104, 105) so the number of records is five.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Input devices include

A

a. Keyboard
b. Image scanner
c. Magnetic ink character recognition (MICR) —a device used to read magnetic ink characters (such as those found on the bottom of checks)
d. Pointing device (graphics tablet, joystick, light pen, mouse, touchpad, touchscreen)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hash totals

A

Hash totals are an input control. They are a nonsense total; for example, the sum of the digits of an invoice number. A hash total is similar to a control total and is used to verify processing (or output) compared to input.

Invoice # Product Quantity Unit Price

201 F10 150 $ 5.00
202 G15 200 10.00
203 H20 250 25.00
204 K35 300 30.00

In this case, the total of the invoice numbers (810) has no meaning in itself. However, it can be compared to a total of the invoice numbers computed at a different stage in the processing to provide evidence that all invoices were processed or entered and none were processed or entered twice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the benefits of Electronic Data Interchange?

A
  • Electronic data interchange (EDI) is the exchange of documents in standardized electronic form between different entities in an automated manner directly from a computer application in one entity to an application in another.
  • Advantages of an EDI system include reduced errors, costs, and processing time, uses globally-accepted standards, and efficient. It was developed in conjunction with the just-in-time (JIT) inventory system.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the characteristics of a Relational Database?

A

Relational databases are flexible and useful for unplanned, ad hoc queries, do store data in table form, and are maintained on direct access devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the units of computer data from smallest to largest?

A
  • Bit - 1 (on) and 0 (off)
  • Byte - 8 bits to a byte/character
  • Field - group of related characters/bytes (i.e. Name- Zip Code- Serial #)
  • Record - Group of related fields (i.e. Member name- address- phone number)
  • File - Group of related records (i.e. Membership directory)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a check digit?

A

An input control that adds an identification number to a set of digits - usually at the end

A check digit is a specific type of input control, consisting of a single digit at the end of an identification code that is computed from the other digits in a field. If the identification code is mis-keyed, a formula or algorithm will reveal that the check digit is not correct, and the field will not accept the entry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a hash total?

A

An input control number- a meaningless sum of values included in the input.

Example would be summing a list of SSNs to make sure the data is the same once entered as it was prior to input into the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Extensible business reporting language (XBRL)

A

Extensible business reporting language (XBRL) uses tags to identify the contents of each data item. It was created to transmit financial information over the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Access Time

A

Access time is the amount of time it takes for a computer or peripheral device to seek out and find data, i.e., the amount of time to retrieve data from memory or storage.

17
Q

A transaction processing system (TPS)

A
  • A transaction processing system (TPS) is a form of information system that collects, stores, modifies, and retrieves the data transactions of an enterprise.
  • The success of a business enterprise depends on reliable processing to ensure a variety of items:
    • Customer orders being met on time
    • Ensuring employees and suppliers are paid
    • Ensuring payments can be made
  • A transaction processing system (TPS) is a completely programmed and automated system, treating every problem in exactly the same way. This type of system is used in accounting information systems (AIS) so that each transaction is processed in an identical, and therefore objective, manner
18
Q

A master file

A

A master file is used in electronic data processing and contains relatively permanent information used for reference and updated periodically.

example : An inventory file lists the inventory on hand at a point in time. It is an asset, a balance sheet account

19
Q

A flowchart

A

A flowchart is a graphic depiction, using uniform symbols to show the control flow, primary actions, and interrelationships of a task or a set of tasks. A flowchart can be created by a computer program, a computer system, the systems staff, or accountants and auditors.

20
Q

An operating system

A

An operating system is a software program that controls the overall operation of a computer system. Its functions include controlling the execution of computer programs, scheduling, debugging, assigning storage areas, managing data, and controlling input and output.

21
Q

What are the characteristics of an Executive Information System (EIS)?

A
  • Specialized for Company Executive needs
  • Assists with Strategy Only
  • No Decision-Making Capabilities
22
Q

What are the characteristics of batch processing?

A

Data held- updates multiple files all at once

Leaves a better audit trailUses

Grandfather-Father-Son backup (3 levels of backup kept in 3 locations)

Batch processing is updating master files periodically to reflect all transactions that occurred during a given time period. To do this, transactions are grouped in batches and processed as a batch, leading to time delays before a batch is processed.

23
Q

What is a query?

A
  • A type of Ad Hoc report- initiated by a user.
  • Query utility programs are used to access information contained in databases.
  • Query utility programs provide users with online access to database information items and are characterized by their ability to enable a user to design an ad hoc query to retrieve only that information needed by the user.
24
Q

What is an Accounting Information System (AIS)?

A

A type of Management Information System (MIS) that processes accounting transactions.

25
Q

What is the purpose of a Compiler?

A

A compiler is a computer program that converts a source program (e.g., COBOL) into an object program (i.e., machine language). Compilers permit programmers to use process-orientated languages such as COBOL, which reduce the programming effort.

  • Most popular programming languages such as COBOL, FORTRAN, and RPG are classified as high-level programming languages.
  • A compiler is software, not hardware.
26
Q

What is the purpose of a LAN (Local Area Network)?

A

It connects computers in close proximity.

A local area network (LAN) links computers and other devices located close to each other, such as in the same building. These devices are connected to the network using a network interface card (NIC). LANs can be configured in one of three basic ways:

a. I_n a star configuration,_ each device is connected to a central server that controls all communications between devices. Devices send messages to the server, which forwards it to the appropriate device.
b. I_n a ring configuratio_n, each device is linked to two other devices. To control data flow, a software token (these LANs are often called token ring networks) is continually passed around the ring. To send a message, a device grabs the token and attaches a message. Each device checks for messages as the token travels around the ring.
c. In a bus configuration, each device is connected to a main channel called a bus. A software algorithm controls communications between devices. To send a message, a device waits until the bus is free. The other devices check the message to see if it is for them.

27
Q

What is the purpose of a Management Information System (MIS)?

A

To assist with decision making.

Decision Support System (DSS): A DSS is an extension of a management information system.

28
Q

Electronic data interchange (EDI)

A

Electronic data interchange (EDI) is the exchange of documents in standardized electronic form between different entities in an automated manner directly from a computer application in one entity to an application in another. Advantages of an EDI system include reduced errors, costs, and processing time. It was developed in conjunction with the just-in-time (JIT) inventory system.

29
Q

Some advantages of decentralized data processing facilities are:

A

Some advantages of decentralized data processing facilities are:

decentralization increases direct access by users,
standalone capabilities are distributed to points of need,
participation is increased in designs and use, and
the ability to share computing power, which decreases the significance of system failure.