IT Flashcards

1
Q

Describe the implementation step of the systems development lifecycle (SDCLC) process.

A

Stage 6 of the systems development lifecycle (SDLC) process. Before the new system is moved into production, existing data must be often be converted to the new system format and users must be trained on the new system; implementation of the new system may occur in one of four ways.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the phased implementation method for new systems.

A

Implementation of a new system where the system is divided into modules that are brought online one or two at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe the design step of the systems development lifecycle (SDCLC) process.

A

Stage 3 of the systems development lifecycle (SDLC) process. In the design phase, the technical specifications of the system are established; the design specification has two primary components: Technical architecture specification, creation of a systems model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define “application programmers”.

A

The team of programmers who, under direction of the lead analyst are responsible for writing and testing the program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe the pilot implementation method for new systems.

A

Implementation of a new system similar to phased implementation, except rather than dividing the system into modules, the users are divided into smaller groups and are trained on the new system one group at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define “end user”.

A

In relation to systems development, the employees who will use the program to accomplish their tasks. Responsible for identifying the problem to be addressed and approving the proposed solution to the problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe the testing step of the systems development lifecycle (SDCLC) process.

A

Stage 5 of the systems development lifecycle (SDLC) process. The system is evaluated to determine whether it meets the specifications identified in the requirements definition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe the composition of the information technology steering committee.

A

Members of the committee are selected from functional areas across the organization, including the IT department; the committee’s principal duty is to approve and prioritize systems proposals for development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define “lead systems analyst”.

A

The manager of the programming team: Usually responsible for all direct contact with the end user; Often responsible for developing the overall programming logic and functionality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe the “cold turkey” (also called the “plunge” or “big bang”) implementation method for new systems.

A

Implementation of a new system where the old system is dropped and the new system put in place all at once.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe the development step of the systems development lifecycle (SDCLC) process.

A

Stage 4 of the systems development lifecycle (SDLC) process. During this phase, programmers use the systems design specifications to develop the program and data files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe the parallel implementation method for new systems.

A

Implementation of a new systems where the new system and the old system are run concurrently until it is clear that the new system is working properly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe the planning and feasibility study step of the systems development lifecycle (SDCLC) process.

A

Stage 1 of the systems development lifecycle (SDLC) process. When an application proposal is submitted for consideration, it is evaluated from three respects: Technical, Economic, and Operational feasibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe the analysis step of the systems development lifecycle (SDCLC) process.

A

Stage 2 of the systems development lifecycle (SDLC) process. During this phase the systems analysts work with end users to understand the business process and document the requirements of the system; the collaboration of IT personnel and end users to define the system is known as joint application development (JAD).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe the maintenance step of the systems development lifecycle (SDCLC) process.

A

Stage 7 of the systems development lifecycle (SDLC) process. Monitoring the system to ensure that it is working properly and updating the programs and/or procedures to reflect changing needs and requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are three important goals of input controls?

A

Validity, completeness, accuracy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What purpose do check digit tests serve in accounting systems?

A

Ensures that validity of a number. Created by applying an arithmetic algorithm to the digits of a number, for example, a customer’s account number. The algorithm yields a single digit that is appended to the end of the code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How does a reasonableness check (also called a logic test) improve data input?

A

Checks to see that data in two or more fields is consistent. For example, a Rate of Pay value of “$3,500” and a Pay Period value of “Hourly” may both be valid values for the fields when the fields are viewed independently. However, the combination (an hourly pay rate of $3,500) is not valid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How does closed loop verification improve data input?

A

This helps ensure that a valid and correct entry has been made. For example, after a customer’s account code is entered, the system looks up and displays additional information about the selected customer. For example, the system might display the customer’s name and address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How do preprinted forms and preformatted screens improve data input?

A

They reduce the likelihood of data entry errors by organizing input data in a logical manner. When the position and alignment of data fields on an entry screens matches the organization of the fields on a source document, data entry is faster andmore accurate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Why are input controls more important than processing and output controls?

A

Garbage in, garbage out (GIGO), if bad data enters the systems nothing good will come out of it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Define “automated data capture.”

A

Use of automated equipment, such as bar code scanners, to reduce the amount of manual data entry . Reducing human involvement reduces the number of errors in the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How does a sequence check improve data input?

A

Verifies that all items in a numerical sequence (check numbers, invoice numbers, etc.) are present. It is a common control for assessing record completeness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Define “default values.”

A

Pre-supplied data values for a field when that value can be reasonably predicted. For example, when entering sales data, the sales order date is usually the current date;. Fields using default values generate fewer errors than other fields.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Describe “spooling (print queue) controls.”

A

Jobs sent to a printer that cannot be printed immediately are spooled—stored temporarily on disk—while waiting to be printed. Access to this temporary storage is controlled to prevent unauthorized access to printed files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What purpose do run-to-run controls serve?

A

These counts to monitor the number of units in a batch as it moves from one programmed procedure (run) to another. Totals of processed transactions are reconciled to batch totals - a difference indicates an error.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Define “hardware controls.”

A

Controls built into the computer equipment to ensure that data is transmitted and processed accurately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Define “parity check (parity bit).”

A

An example of a check digit. A 0 or 1 included in a byte of information which makes the sum of bits either odd or even.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are processing controls?

A

Controls to ensure that master file updates are completed accurately and completely and to detect unauthorized transactions entered into the system and maintain processing integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is boundary protection in an accounting system?

A

When multiple programs and/or users are running simultaneously and sharing the same resource (usually the primary memory of a CPU), boundary protection protects program instructions and data from one program from being overwritten by program instructions and/or data from another program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What purpose do output controls serve?

A

These controls ensure that computer reports are accurate and distributed as authorized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is an electronic audit trail?

A

Transactions are written to a transaction log as they are processed. The transaction logs are an electronic audit trail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Define “diagnostic routines.”

A

Program utilities that check the internal operations of hardware components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Define “supply chain management (SCM).”

A

The process of planning, implementing, and controlling the operations of the supply chain: the process of transforming raw materials into a finished product and delivering that product to the consumer. Supply chain management incorporates all activities from the purchase and storage of raw materials, through the production process, into finished goods through to the point-of-consumption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What are customer relationship management (CRM) systems?

A

Technologies that facilitate managing e-relationships with clients. Both biographic and transaction information about existing and potential customers is collected and stored in a database. The CRM provides tools to analyze the information and develop personalized marketing plans for individual customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Define “electronic wallets.”

A

Software programs that allow the user to manage credit cards, user names, passwords, and address information in an easy-to-use, centralized location (e.g., RoboForm).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Define “electronic funds transfer (EFT).”

A

A technology for transferring money from one bank account directly to another without the use of paper money or checks. Reduces the time and expense required to process checks and credit transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Define “electronic data interchange (EDI).”

A

The system-to-system exchange of business data (e.g., purchase orders, confirmations, invoices, etc.) in structured formats that allow direct processing of the data by the receiving system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Define “token-based payment systems.”

A

Electronic cash, smart cards (cash cards), and online payment systems (e.g., PayPal); similar to electronic fund transfer (EFT), but governed by different laws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Define “knowledge base (or knowledgebase)”.

A

A component of a knowledge management system. A special type of database designed for retrieval of knowledge. It provides the means to collect and organize the information and develop relationships among information components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Describe a flat file system.

A

Early information technology systems used flat file technology. Flat files are characterized by independent programs and data sets, high degrees of data redundancy, and difficulty in achieving cross functional reporting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Define “data mart”.

A

A specialized version of a data warehouse that contains data that is pre-configured to meet the needs of specific departments. Companies often support multiple data marts within their organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Define “expert system (knowledge-based system)”.

A

A computer program that contains subject-specific knowledge derived from experts. The system consists of a set of rules that are used to analyze information provided by the user of the system. Based on the information provided, the system recommends a course of action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Describe the concept of knowledge management (KM)

A

Attempts to ensure that the right information is available at the right time to the right user. A variety of practices attempt to electronically capture and disseminate information throughout the organization. Knowledge management practices seek specific outcomes, including shared intelligence, improved performance, competitive advantage, and more innovation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Define “slicing and dicing” as it relates to data warehouses.

A

The ability to view a single data item in multiple dimensions; for example, the sale of VCRs might be viewed by product, by region, by time period, by company, etc.

46
Q

Identify five risks of user-developed systems.

A
  1. Not integrated with existing systems, 2. Inadequate testing and documentation, 3. Poor data input controls, 4. Poor system design, 5. Management may rely on these systems without knowing their risks.
47
Q

Identify three characteristics of the small business computing environment.

A
  1. Exclusive use of microcomputers and laptops (e.g., there may be no servers), 2. Outsourced IT, 3.poor segregation of duties.
48
Q

Identify items that should be included in user training in mobile applications.

A

Organizational policies, password maintenance and protection, when and how to use mobile devices, procedures for lost or stolen devices.

49
Q

Define “operating system.”

A

The interface between the user and the computer hardware.

50
Q

Define “file.”

A

A collection of records for one specific entity (an Invoice File, a Customer File, a Product File). In a relational database environment, files are also known as tables.

51
Q

Define “systems software.”

A

The programs that run the computer and support system management operations.

52
Q

Define “byte.”

A

A group of (usually) eight bits that are used to represent alphabetic and numeric characters and other symbols (3, g, X, ?, etc.). Several coding systems are used to assign specific bytes to characters. ASCII and EBCIDIC are the two most commonly used coding systems. Each system defines the sequence of zeros and ones that represent each character.

53
Q

Define “field.”

A

A group of characters (bytes) that identify a characteristic of an entity. A data value is a specific value found in a field. Fields can consist of a single character (Y, N) but usually consist of a group of characters. Each field is defined as a specific data type. Date, Text and Number are common data types.

54
Q

Define a “bit” (binary digit).

A

An individual zero or one; the smallest piece of information that can be represented.

55
Q

Define “application software.”

A

The diverse group of end-user programs that accomplish specific user objectives. Can be general purpose (word processors, spreadsheets, databases) or custom-developed for a specific application (ex.: a marketing information system for a clothing designer). May be purchased “off the shelf” or developed internally.

56
Q

Define “record.”

A

A group of related fields (or attributes) that describe an individual instance of an entity (a specific invoice, a particular customer, an individual product).

57
Q

Define “programming languages.”

A

All software is created using programming languages. They consist of sets of instructions and a syntax that determine how the instructions can be put together.

58
Q

Define “transaction files.”

A

Computerized data files equivalent to the journals found in a manual accounting system.

59
Q

Define “master files.”

A

Computerized data files equivalent to the ledgers found in manual accounting system.

60
Q

What are “time lags” in batch processing systems?

A

This is an inherent part of batch processing. There is always a time delay between the time the transaction occurs, the time that the transaction is recorded, and the time that the master file is updated.

61
Q

What are subsidiary ledgers (sub-ledgers)?

A

These ledgers classify transactions by alternative accounts (e.g., customer accounts, vendor accounts, product accounts).

62
Q

What are distributed database systems?

A

Database is distributed across locations according to their needs (note the subtle reference to Karl Marx here. . .)

63
Q

What are centralized systems?

A

Maintain all data and perform all data processing at a central location; remote users may access the centralized data files via a telecommunications channel, but all processing is centralized.

64
Q

Define “Bluetooth.”

A

Wireless transmission medium. It uses the same radio frequencies as Wi-Fi, but with lower power consumption resulting in a weaker connection. It is used to provide a direct communications link between two devices (e.g., a cell phone and ear piece, computer and a printer).

65
Q

What is a wide area network (WAN)?

A

These networks vary dramatically in geographic coverage. Most WANs are national or international in scope.

66
Q

What is a “client” on a computer network?

A

A node, usually a microcomputer, which is used by end users; uses but usually does not supply network resources.

67
Q

What is a “node”?

A

A device connected to a computer network.

68
Q

Whant is a “peer-to-peer network”?

A

A network system in which all nodes share in communications management. No central controller (server) is required. These systems are relatively simple and inexpensive to implement; used by LANs.

69
Q

What is a “local area networks (LAN)” ?

A

Originally confined to very limited geographic areas (a floor of a building, a building, or possibly a couple of buildings in very close proximity to each other). Inexpensive fiber optic cable now enables local area networks to extend many miles.

70
Q

What is a “server”?

A

Computer or other device on a network which only provides resources to the network and is not available (normally) to individual users; examples include print servers, file servers, and communications servers. Contrast with a workstation

71
Q

What is a “computer network”?

A

Two or more computing devices connected by a communication channel on which the devices exchange data.

72
Q

What is a “client/server system”?

A

A central machine (the server) mediates communication on the network and grants access to network resources. Client machines use of network resources and also perform data processing functions; used by LANs.

73
Q

Define “file server.”

A

In a local area network, a computer that provides centralized access to program and data files.

74
Q

What is “File Transfer Protocol (FTP)”?

A

A protocol used for file transfer applications.

75
Q

What is extensible business reporting language (XBRL)?

A

XML-based protocol for encoding and tagging business information. A means to consistently and efficiently identify the content of business and accounting information in electronic form.

76
Q

Define “internet”.

A

A “network of networks:” a global network of millions of interconnected computers and computer networks.

77
Q

Describe extranets.

A

Open to an organization’s associates (company suppliers, customers, business partners, etc.) to access data that is relevant to them.

78
Q

Define “Transmission Control Protocol / Internet Protocol (TCP/IP)”.

A

The core protocol transmission of the internet.

79
Q

What makes a computer language extensible?

A

Users can create taxonomies for specific environments, for example for the purpose of taxation reporting, environmental regulation reporting, or automobile manufacturing.

80
Q

Describe intranets.

A

Available only to members of the organization (business, school, association); often used to connect geographically separate LANs within a company.

81
Q

What is “instant messaging (IM)”?

A

A protocol for instant messaging.

82
Q

What is extensible markup language (XML)?

A

Protocol for encoding (tagging) documents in machine-readable form.

83
Q

Define “hypertext markup language (HTML)”.

A

Core “markup” language (a way of tagging text) for web pages. The basic building-block protocol for constructing webpages.

84
Q

Define “remote backup service.”

A

A service that provides users with an online system for backing up and storing computer files. Remote backup has several advantages over traditional backup methodologies: the task of creating and maintaining backup files is removed from the IT department’s responsibilities; the backups are maintained off site; some services can operate continuously, backing up each transaction as it occurs.

85
Q

Describe the checkpoint and restart backup and recovery system methodology.

A

Common to batch processing, a checkpoint is a point in data processing where the accuracy of the processing can be verified. Backups are maintained during the update process so that, if a problem is detected, it is only necessary to return to the backup at the previous checkpoint instead of returning to the beginning of transaction processing.

86
Q

Define “grandfather-father-son file security control.”

A

A technique used to maintain redundant backup copies (three “generations”) of data files; backup files are used to recover from systems failures in which data files are damaged or destroyed.

87
Q

Describe the rollback and recovery backup and recovery system methodology.

A

A backup and recovery system method that is common to online, real-time processing. All transactions are written to a transaction log when they are processed. Periodic “snapshots” are taken of the master file. when a problem is detected, the recovery manager program starts with the snapshot of the master file and reprocesses all transactions that have occurred since the snapshot was taken.

88
Q

Define “storage area networks (SANs).”

A

A method of backup that can be used to replicate data from multiple sites. Data stored on a SAN is immediately available without the need to recover it. This enables highly efficient disaster recovery.

89
Q

Define “mirroring.”

A

A method of backup consisting of the maintenance of an exact copy of a data set to provide multiple sources of the same information. Mirrored sites are most frequently used in e-commerce for load balancing - distributing excess demand from the primary site to the mirrored.

90
Q

What are logical access controls?

A

Control electronic access to systems via internal and external networks.

91
Q

Why does multi-factor authentication increase control?

A

All authentication techniques may fail. Requiring multi-factor authentication procedures—the use of several separate authentication procedures at one time (e.g., user name, password, one-time password and fingerprint) enhances the authentication process.

92
Q

What is a firewall?

A

A firewall consists of hardware, or software, or both, that help detect security problems and enforce security policies on a computer system. Like a door with a lock for a computer system. There are multiple types, and levels, of firewalls.

93
Q

Describe asymmetric encryption (also called public/private-key encryption and private-key encryption).

A

Uses two paired encryption algorithms to encrypt and decrypt the text: if the public key encrypts, the private key decrypts. If the private key encrypts, the public key decrypts.

94
Q

Describe how digital certificates work.

A

Provides legally recognized electronic identification of the sender and verifies the integrity of message content. Based on public/private key technology (like the digital signature).

95
Q

Describe symmetric encryption (also called single-key encryption or private-key encryption).

A

Uses a single algorithm to encrypt and decrypt. Sender uses the encryption algorithm to create the ciphertext and sends the encrypted text to the recipient. Sender tells recipient which algorithm was used to encrypt. The recipient uses the algorithm to decrypt. Common in data storage applications

96
Q

Identify the two internet protocols that are typically used for secure Internet transmission protocols.

A

Sensitive data sent via the internet is usually secured by one of two encryption protocols: SSL (Secure Sockets Layer) or S-HTTP (Secure Hypertext Transport Protocol).

97
Q

Define “ciphertext.”

A

Text that has been mathematically scrambled so that its meaning cannot be determined without the use of an algorithm and key.

98
Q

Describe how digital signatures work.

A

Uses public/private key pair technology to provide authentication of the sender and verification of the content of the message.

99
Q

Describe the use of secure electronic transactions (SET) protocols.

A

A protocol that is often used in credit card payments. Used by the merchant to securely transmit payment information and authenticate trading partner identity.

100
Q

Define “packet sniffers”.

A

Programs called packet sniffers capture packets of data as they move across a computer network. Packet sniffing has legitimate uses to monitor network performance or troubleshoot problems with network communications. However, it is often used by hackers to capture user names and passwords, IP addresses, and other information that can help the hacker break into the network. Packet sniffing a computer network is similar to wire tapping a phone line.

101
Q

Define “worm.”

A

Similar to viruses except that worms attempt to replicate themselves across multiple computer systems. They generally try to accomplish this by activating the system’s email client and sending multiple emails.

102
Q

Define session hijacking or masquerading

A

This occurs when an attacker identifies an IP address (usually through packet sniffing) and then attempts to use it to access a network. If successful, the hacker has “hijacked” the session, i.e., gained access to the session by pretending to be another user.

103
Q

What is a back door attack on a system?

A

A software program that allows an unauthorized user to gain access to the system by side-stepping the normal logon procedures;. Back doors were once commonly used by programmers to facilitate access to systems under development.

104
Q

Define “denial of service attacks.”

A

An attack that attempts to prevent legitimate users from gaining access to the system. These attacks, called denial of service attacks, are perpetrated by flooding the server with incomplete access requests.

105
Q

Define the four types of computer crime.

A
  1. Computer as target, 2. Computer as subject, 3. Computer as tool, 4. Computer as symbol.
106
Q

What is a logic bomb attack on a system?

A

An unauthorized program which is planted in the system. The logic bomb lies dormant until the occurrence of a specified event or time (e.g., a specific date, the elimination of an employee from “active employee” status, etc.).

107
Q

Define “Trojan horse”.

A

A malicious program that is hidden inside a seemingly benign file.

108
Q

Define “virus.”

A

An unauthorized program, usually introduced through an email attachment, which copies itself to files in the users system. These programs may actively damage data, or they may be benign.

109
Q

Define “password crackers.”

A

Password cracking software generates and tests a large number of potential passwords to try to access a system.

110
Q

Define “malicious software (malware).”

A

Programs that exploit system and user vulnerabilities to gain access to the computer. There are many types of malware.