IS and Comm E - Types of IS and Tech Risks Flashcards
A risk of using potentially incorrect end-user developed files is that
management places the same degree of reliance on the files as they do on files generated from mainframe system
If a company currently tracks their fixed assets and depreciation in a password-protected sheet but the IT group is moving to an ERP system, the long term solution should be to
adopt the fixed-asset module of the new system for integration
The most effective application for a client who wants to implement a management information system that integrates all functional areas within an organization to allow information exchange and collaboration among all parties involved in the business operations is
an ERP system
The major risk in relying on anti-virus software is that it
may not detect certain unknown viruses
An ERP system is designed to
integrate data from all aspects of an organization’s activities
As compared to a centralized database, a distributed database would involve the risk of
database integrity might not be preserved during a network or computer failure
In an Electronic Data Interchange (EDI), encryption performed by a physically secure hardware devise is ______ secure than encryption performed by software
more
When an AP system is supported via dial-up connection and the administrator leaves the company but no changes are made, what presents the greatest security risk?
User accounts are not removed upon termination of employees
The system that assists with nonroutine decisions, serves strategic levels of the organization, helps answer questions regarding what a company’s competitors are doing, and identifies new acquisitions that would protect the company from cyclical business swings is
an Executive support system
Within an integrated financial system, major risk considerations associated with the AR component of the system are
- credits may be applied to improper accounts
- updated of credit ratings may be untimely
- financial or management reporting may be inaccurate
A risk more likely to be encountered with end-user computing as compared to a mainframe computer system is
that applications would be difficult to integrate with other information systems
Within an MIS system, the highest risk project would include ______ technology and _______ structure
new; sketchy
A disadvantage for an entity that keeps microcomputer-prepared data files rather than manually prepared files is that
it is usually easier for unauthorized persons to access and alter the files
As a planning committee identifies more applications that a proposed network could support, the committee realizes that a significant risk could be
incomplete, inadequately tested, or unauthorized application software
Advantages of decentralized data processing facilities include:
- increased direct access by users
- standalone capabilities distributed to points of need
- participation is increased in designs and use
- decreased significance of system failure