IT Flashcards

1
Q

Sequence of events in an AIS logical order

A
  1. Transaction data from source doc. is entered into AIS by end user
  2. Original paper source documents are filed
  3. These transactions are recored in the appropriate journal
  4. Transactions are posted to the vernal and subsidiary ledgers.
  5. Trial balances are prepared.
  6. Financial reports are generated.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Component of information technology (Bsns Info. System)

A
  1. Hardware
  2. Software
  3. Network
  4. People in IT dept.
  5. Data/infor.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Batch processing

A
  • input doc/trans are collected and grouped.
  • always a time delay (slower)
  • Create a transaction files ->update master files
  • Comparing manual and computer generated batch control totals
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Online real-time processing

A
  • Immediate processing (fast)

- used in networked systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Centralized processing? What is its advantage n disadvantage?

A
  • maintain and perform all data processing at a central location.
  • Adv: enhanced security; consistent processing
  • Disadv: high cost, increase need for processing power and data storage, reduction in local accountability, bottlenecks and larger delay in response time.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Decentralized / distributed processing

A

Occurs when computing power, applications, work is spread out over many locations.
-> reduce burden on central computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Periodic Scheduled reports

A

Traditional reports

make available on regular basis to end user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Exception report

A

Produced when a specific condition or exception occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Demand reports / Pull reports

A

infor prepared on demand. similar to response report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ad hoc report

A

a report that does not currently exist but that needs to be created on demand without having to get a software developer involved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Push report

A

report that push to computer, cell phones…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Dashbard style report

A

used by organizations to present summary info. necessary for management action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Business Information Systems (BIS) performing the following function

A
  • collect
  • process
  • store
  • transform
  • distribute
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Decision Support System (DSS)

A
  • Assists managers in making daily decisions (interactive support)
  • DSS is an extension of an MIS
  • Sometimes called expert systems (ES)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Management information systems (MIS)

A
  • Assist decision making (similar to DSS)

- Methods of processing: Integrated; Automated; Manual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Executive Information Systems (EIS)

A
  • Only used by top managers

- assist in strategic , no daily decision making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Transation processing systems (TPS)

A

-process and record the routine daily trans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

System Development Life Cycle (SDLC)

A
- 5-step process: A DITTO
A - System Analysis & planning
D - Design (Conceptual design, Physical design)
I  - Implementation and conversion
T - Training, 
T - Testing
O - Operations and maintenance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Control Objective For Information Related Technology (COBIT) - Objectives

A
  • Business objectives:
    + Effective decision support
    + Efficient trans. processing
    + Compliance wt reporting requirement and security.
- Governance objectives: 
  \+ Strategic alignment: btw IT value and customer satisfactory
  \+ Value delivery
  \+ Resource management
  \+ Risk management
  \+ Performance measurement.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

COBIT - Information criteria

A
ICE RACE 
I - Integrity : Accuracy and completeness of the info
C - Confidentiality
E- Efficiency
R- Reliability 
A - Availability
C - Compliance
E - Effectiveness
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

COBIT Domains & process

A

PO AIDS ME

Direct PO Plan & Organize
Solution AI Acquire & Implement
Service DS Deliver & Support
Ensure direction follow ME Monitor & Evaluate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

General controls include

A
  1. Information systems management controls.
  2. Security management controls
  3. IT infrastructure controls
  4. Software acquisition, development, and maintenance controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Application controls provide assurance about

A
  1. accuracy
  2. completeness
  3. Validity
  4. authorization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Types of Internal Controls

A
  1. Preventive Controls: control prior to an error or irregularity ->prevent
  2. Detective Controls: to discover problems as soon as they arise
  3. Corrective Controls: identify the cause of the problems, corrections and modification of system to minimize future errors.
25
Q

Output controls includes

A
  1. user review of output
  2. reconciliation procedures
  3. external data reconciliation
  4. output encryption
26
Q

Processing controls includes

A
  1. Data matching
  2. Recalculate batch total
  3. Cross footing and zero balance test
  4. Write protection mechanisms.
27
Q

Segregation of duties in IT

A
  • separate authorizing, recording and custody of assets (ARC)
  • normally separate systems analysts, computer programmers, operators and security admin.
  • System analysts and programmer can be combined.
28
Q

What are System Analysts in charge of?

A

SYSTEMS ANALYSTS are in charge of HARDWARE.

29
Q

What are Computer Programmers in charge of?

A

COMPUTER PROGRAMMERS are in charge of SOFTWARE.

30
Q

What are System Programmers in charge of?

A

SYSTEM PROGRAMMERS are in charge of maintaining the OPERATING SYSTEM.

31
Q

What are Security Administrators in charge of?

A

SECURITY ADMINISTRATORS are in charge of SECURITY of the entire computer system.

32
Q

What are Database Administrators in charge of?

A

DATABASE ADMINISTRATORS are in charge of DATA integrity for the entire computer system.

33
Q

What are 6 Key Elements of Operational Effectiveness?

A

1) Strategic Master Plan= Developed and updated yearly.
2) Project Controls = Shows how a project will be completed.
3) Data Processing Schedule = Data processing tasks should be organized according to a data processing schedule.
4) Steering Committee= Should be formed to guide and oversee systems development and acquisition.
5) System Performance Measurements= systems MUST be assessed using system performance measurements.
6) Post Implement Review= Determine if anticipated benefits were achieved.

34
Q

What is the ascending hierarchy of data in a system?

A

Character - Field - Record - File

35
Q

Son-father-grandfather concept

A
  • backup file system
  • most recent = son. second most recent = father. preceding file is grandfather.
  • reading previous file, recording trans, create a new updated master file.
36
Q

Program modification controls

A

-control that attempt to prevent changes by unauthorized personnel , and track program changes.

37
Q

Types of computer security polices (4)

A
  1. Program level policy: used for creating a management-sponsored computer security program
  2. Program-framework policy: establishes the overall approach to computer security.
  3. Issue-specific policy: addresses specific issues of concern to org.
  4. System-specific policy: focuses on policy issues that management has decided for a specific system
38
Q

3 level model for system security policy

A
  1. security objectives
  2. Operational security
  3. policy implementation.
39
Q

What are 5 types of technology Risks?

A
  1. Strategic Risk: risk of choosing inappropriate technology
  2. Operating risk: risk of doing the right things in the wrong way
  3. Financial risk: Risk of having financial resource lost, wasted
  4. Information risk: lost of data integrity, hackers
  5. Specific risk: error, intentional acts, disasters.
40
Q

What are 4 advantages of EDI?

A

4 Advantages of EDI (Electronic Data Interchange) are:

1) Speed.
2) Less paper flow.
3) Less manual keying.
4) Lower cost to process the transactions themselves.

41
Q

What are 5 Costs associated with EDI (Electronic Data Interchange)?

A

5 Costs associated with EDI (Eletronic Data Interchange) are:

1) Legal=Set up agreements between companies.
2) Hardware.
3) Translation software (data MUST be translated into specific EDI software format).
4) Data Transmission= a Value Added Network (VAN) is required which costs more $$.
5) Security, monitoring and control (There MUST be monitoring).

42
Q

What are 6 types of Databases?

A

6 Types of Databases are:

1) Operational Database= Customer and personal databases for example.
2) Analytical Database= Summary data related to sales and the marketplace.
3) Data Warhehouses= Collections of sales and inventory data from multiple years.
4) Distributed Database= physically distributed on a local or remote hardware such as intranet or the internet.
5) End-User= email for example.
6) Relational = two-dimensional data arrangement with records linked by keys.

43
Q

What is a Database Management System?

A

A Database Management System (DBMS) controls the development,use, and maintenance of the databases used by the organization.

44
Q

What are 6 Advantages of a Database Management System (DBMS)?

A

6 Advantages of a Database Management System are;

1) Reduced data redundancy and inconsistency.
2) Data Independence.
3) Increased Data standardization.
4) Improved data security.
5) Improved data availability. (Via networks)
6) Direct Access.

45
Q

What are 2 Disadvantages of a Database Management System (DBMS)?

A

2 Disadvantages of a Database Management System (DBMS) are:

1) The need fo highly specialized personnel ( Database Administrators are expensive).
2) High Cost of purchase and maintenance (maintenance always has to be considered.)

46
Q

What are 3 Recovery Alternatives for Disaster Reovery and Business Continuity?

A

1) Cold Site = No Equipment but has power (It takes a few days to get operating).
2) Hot Site = Has equipment and operating system ready to go in the event of a disaster.
(It takes a few hours only to get operating).
3) Warm Site = In between having what they totally need and basic power. (It takes a few hours only to get operating).

47
Q

What are 3 Types of Backups?

A

3 Types of Backup are:

1) Full Backup = exact copy of entire database.
2) Incremental Backup = copying only data that has changed since last backup.
3) Differential Backup = copies ALL changes made since the last FULL backup.

48
Q

What is Enterprise Resource Planning system?

A

A system that integrates multiple functional area of business operation.

49
Q

What does three-tier architecture consist of ?

A

Desktop client - Application - Database

50
Q

What are 5 Steps in Developing a Disaster Recovery Plan?

A

1) Assess risks.
2) Identify mission-critical applications.
3) Determine responsibilities of the personnel.
4) Develop a plan.
5) Test the plan.

51
Q

What is an advantage of using the Internet for electronic commerce rather than a tradtional Value Added Network(VAN)?

A

The Internet permits EDI transactions to be sent to trading partners as transactions occur.

52
Q

What is “MIPS” as it refers to computer processing power

A
MIPS
M=Millions
I= Instructions
P=Per
S=Second,
53
Q

What does a Database Administrator do?

A

A Database Administrator controls the database, NOT THE DATA, and duties generally include design of the firm’s database, maintaining security measures, and controlling data structure.

54
Q

What is Mapping?

A

Mapping= The process of determining the correspondence between elements in a company’s terminology and elements in standard EDI terminology.

Once the mapping has been completed, translation software can be developed to convert transactions from one format to the other.

55
Q

A local area network (LAN) is best described as a(n):

A

A local area network (LAN) is a computer network that connects computers of all sizes, workstations, terminals, and other devices within a limited proximity.

56
Q

Supply Chain Management (SCM)

A

Supply Chain Management (SCM) is concerned with four important characteristics for every sale: what, when and where the goods were delivered and how much the goods cost.

57
Q

what is A business continuity plan?

A

A business continuity plan is broader than a disaster recovery plan. It provides for continuation of all areas of the business (e.g. manufacturing operations), not just for recovery of the management information systems.

58
Q

Which type of security policy might prescribe the need for information security and may delegate the creation and management of the program to a role within the IT department?

A

Program-level policy describes information security and assigns responsibility for achievement of security objectives to the IT department.

59
Q

XBRL

A

XBRL, the acronym for eXtensible Business Reporting Language, is derived from XML (eXtensible markup language).

XBRL is an open, royalty-free, Internet-based information standard for business reporting of all kinds. XBRL labels data so that they are provided with context that remains with them and brings conformity to the names by which they are recognized by disparate software.