Information_Technology 2 Flashcards

1
Q

Enterprise resource planning (ERP) systems

A

Enterprise resource planning (ERP) systems integrate all aspects of a company’s operations with its information system. By combining financial and nonfinancial information, the entity can be more flexible and responsive while having more information available for decision making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ROM (read-only memory)

A

ROM (read-only memory) is a memory component for the storage of elementary software (firmware) information that cannot be modified by the user of the system or program. Other forms of read-only memory include compact audio disks (CDs), cartridges, and optical disks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Software Monitor

A

The purpose of a software monitor is to collect data on the use of various hardware components during a computer run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Decision table

A
  • A decision table is a chart used to guide people to make correct and consistent decisions. Decision tables may be especially useful when many alternative inputs and/or results are possible.
  • A decision table is a chart used to document actions in response to specific conditions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An access control matrix consists of

A

An access control matrix consists of:

  • a list of all authorized user code numbers and passwords,
  • a list of all files and programs maintained on the system, and
  • a record of the type of access to which each user is entitled.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Application Controls

A

“Application controls” refers to the transactions and data relating to each computer-based application system and are, therefore, specific to each such application. The objectives of application controls, which may be manual or programmed, are to ensure the completeness and accuracy of the records and the validity of the entries made therein.

Application controls consist of input controls, processing controls, and output controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Database schema

A

database schema is “a view of the entire structure of the database.” It is “the organizational chart showing how the database is structured.” The database schema shows all elements of the database and areas of responsibility of individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Integrated Test Facility

A

allows fictitious and real transactions to be processed together without client operating personnel being aware of the testing process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A transaction log

A

A transaction log is a detailed record of every transaction entered in a system through data entry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A disaster recovery plan

A

A disaster recovery plan is the process, policies, and procedures of restoring operations critical to the resumption of business, including gaining access to data (records, hardware, software, etc.), communications, workspace, and other business processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Stakeholder

A

A “stakeholder” is a broad term, encompassing all those with an interest in preparing or using the information. The other answer choices describe specific stakeholders, but there are other stakeholders as well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The database administrator

A

The database administrator may be a single individual or a staff of individuals depending on the size of the organization. The functional responsibilities generally include planning the database, defining schemas and subschemas, selecting the appropriate database management system (DBMS) software, creating the database structure, establishing policy and procedures for database usage, teaching users how to work with the DBMS, and controlling database activity, i.e., database design, operation and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Compatibility check

A

A compatibility check (or compatibility test) is a procedure for checking a password to determine if its user is authorized to initiate the type of transaction or inquiry he or she is attempting to initiate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Multiprocessing

Multiprogramming

A
  • Multiprocessing involves the simultaneous execution of two or more tasks, usually by using two or more processing units that are part of the same system (with a single central memory).
  • Multiprogramming is the appearance of simultaneous execution of two programs as a single processing unit switches back and forth between the programs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The data processing cycl

A

The data processing cycle describes the operations performed on data in computer-based systems to generate meaningful and relevant information. The data processing cycle has four stages: data input, data processing, data storage, and information output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Logical access

A

Logical access describes how security software works to restrict access to a computer’s data. This type of restricted access is called “logical access” because the computer’s software interprets information, such as user ID and password, to determine who can have access to the computer’s records.

17
Q

Business-to-business (B2B)

A

Business-to-business (B2B), where organizations do business with one another.

a. Most B2B transactions occur between organizations with established relationships so there is less need for third-party assurance services.
b. In B2B transactions, large dollar amounts are usually involved.

(1) The selling organization extends credit to customers.
(2) Partial payments on accounts are permitted, which makes accounting for and controlling sales and customer payments more challenging.

18
Q

An Intranet

A

An Intranet is an internal version of the Internet. It can be accessed using conventional hardware and software that works with the World Wide Web (Internet). The Intranet is usually separated from the Internet by a firewall.

They are subject to higher security risks but are less costly to operate than local or wide area networks.

19
Q
A
20
Q

A denial-of-service attack

A

A denial-of-service attack is an attempt to make a machine or network resource unavailable by saturating the target server with requests so it cannot respond to legitimate traffic because of server overload.

21
Q

What are the characteristics of a VAN (Value-Added Network)?

A

Privately-owned NetworkServes as 3rd Party Between 2 CompaniesRoutes EDI TransactionsAccepts wide range of ProtocolsVery Costly

A value-added network (VAN) offers specialized hardware, software, and long-distance communications to private networks so they can exchange data.

22
Q

What are the duties of a systems analyst?

A

Designs or purchases IT system

Responsible for flowcharts

Liaison between Users and Programmers

Note: Think IT Manager

A systems analyst would be likely to be involved in analysis of the present system, preparing program specifications, designing computer applications and flowcharts. A systems analyst would not develop and code computer programs. This is a function performed by a programmer.

23
Q

What are the duties of a Systems Operator?

A

Schedules and Monitors Jobs

Runs IT Help Desk

24
Q

What duties should a System Operator NOT have?

A

For internal control purposes- they should not be a Programmer on the system.

25
Q

What is a limit check?

A

Checks to see if numbers surpass a certain limit- i.e. in an age field is the number greater than 110.

26
Q

What is the primary duty of a Systems Administrator?

A

A Systems Administrator controls database access.

27
Q

What is the purpose of a Database?

A
  • Located on a File Server- a Database allows users to share documents.
  • A database is a collection of interrelated information that can be used for a variety of purposes.
  • A database is managed by a computer program called a database management system (DBMS).
28
Q

What is the purpose of a Firewall?

A

Prevents unauthorized access to a network.

29
Q

Which duties should a Systems Programmer NOT have?

A

In order to maximize internal control- a Systems Programmer should NOT have application programming duties/abilities or be an Operator on the system.

Systems programmers use the design developed by the analysts to develop an information system and write the computer programs. It follows, therefore, that the programmers would be concerned with the operating system and how it will handle various applications, as well as with compilers (computer programs that convert a source program into an object program, reducing the programming effort).

30
Q

Which IT personnel roles should always be segregated?

A

Operators -Programmers - Librarians

31
Q

Disaster Recovery Plan (DRP)

A

A disaster recovery plan is used to smoothly and quickly restore data processing capacity when there is a disaster. A recovery plan has the following objectives:

a. Minimize the disruption, damage, and loss from the disaster.
b. Establish a short-term data processing alternative so the company can quickly resume normal operations.
c. Train and familiarize personnel with emergency procedures.

When developing a DRP, the first step is to create a set or responsibilities for the various participants and tasks that are to be included in the plan. Once this step is completed, the participants named would likely be the ones to complete the plan. The plan would include the following:

Setting recovery priorities
Providing the necessary insurances
Providing for backup computer and telecommunications facilities
Having procedures for periodic testing and revision
Complete documentation of the process

32
Q
A