IT Flashcards

1
Q

Modem

A

converts digital signals received from a computer onto analog signals that can be transmitted over telephone lines to another modem where analog signals is converted back to digital signals before it enters another computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Application Programmer
Analyst
Systems Admin.
Systems Program

A

1 - Codes
2 - Designs
3 - Efficient and effective operation, database design; security
4 - use the design developed by the analysts to develop an information system and write the computer programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Compiler

A

Software program that converts program language to machine language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Decision Table

A

ALTERNATIVE logical conditions and actions to be taken in a program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Access Controls

Security Controls

A

1 - monitor activity; amount of time it takes for a computer to seek out and find data or, as stated in the problem, “to retrieve data from memory.”
2 - enforce authorization before activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DBMS

A

System that allows for easy development of new applications without changing the storage method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Password protection for a screensaver security level

A

WEAK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Database Decision Support

A

aids management in problem solving for a SPECIFIC ISSUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Predominant threat to IT environment

A

Unauthorized Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Internet processing transaction risks

A

Disruption leading to missing or duplicate information; deteriorates completeness and accuracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

COBIT

A

Control Objectives for Information and Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Electronic Vaulting

A

Electronic transmitting & storing backups of programs and data at a remote data storage facility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Intranet
1 - Define
2 - Access
3 - Advantage/Disadvantage

A

1 - internal version of the internet
2 - accessed through conventional software, works with the World Wide Web (separated through a firewall)
3 - Cheap/ High Security Risk (compared to WANS/LANS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Management Reporting System encompasses what type of DATA

A

1 - internal/external

2 - Financial/Operating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Plotter

A

printing device specifically for graphs and charts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Biometric Processing

A

security identification by physical traits of user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Enterprise Risk Management

A

Integrates all aspects of companies operations into one IT system.
Financial/Non financial/ External DATA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Access Control Matrix

A

Lists and access data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When is batch processing current

A

only directly after update occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

One for One Checking

A

verifying each hard copy has been processed through the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Executive Support System

A

Aids management in strategic planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

EDI

A

Direct communication between partners but relies on third parties as well; constant contact without much human intervention
RISK - Improper Distribution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Mirror Web Server is best for

A

Data Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Encryption of Software versus Hardware

A

Hardware encryption is more reliable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

TCP/IP

A

Basic communication between and internet and an intranet. Messages are assembled into small packets by the internet and received by the TCP layer that reassembles the messages into readable formatt.

26
Q

End User Computing

A

Creation, Control, and Implementation by system users

27
Q

Business Continuity is ensured by what type of planning

A

Contingency

28
Q

Operations System

A

Integrated group of programs that supervised, supports, and executes activities in the most efficient manner

29
Q

Backup Process for
1 - Magnetic Tape
2 - Magnetic Disk

A

1 - creates a new file as an output for every update (automatic backup) SLOWER
2 - replaces old file with a new file for every update (separate backup procedures required) QUICKER

30
Q

Bottlenecks

A

Companies should eliminate to make new technology run smoother

31
Q

Extensible business reporting language (XBRL)

A

Specifically designed to exchange financial information over the World Wide Web by using tags to identify the contents of each data item

32
Q

Magnetic Ink

A

is a system of data entry originated in the 1950s that Reads magnetic ink characters on the bottom front of checks. It is used primarily by banks to read the information on checks, deposits, and other transaction tickets.

33
Q

Query

A

Enable a user to query or interrogate a database. Typically this is done on an as-needed basis.

34
Q

Heuristics

A

knowledge based systems

35
Q

Authorization transactions best remedy

A

passwords

36
Q

LAN risks

A

1 - lack of documentation
2 - poor security
3 - incomplete data communications

37
Q

Self check digit

A

is an extra digit, precisely computed, that is added to a basic identification number (e.g., employee ID number) to detect transpositions or other clerical errors

38
Q

Compatibility test

A

Password used correctly correlates to the activity to be preformed

39
Q

Assembly language

A

programming NOT machine language

40
Q

database schema

A

a view of the entire structure of the database.

41
Q

Data Control Group

A

verifies transactions are processed correct and input and output are reconciled

42
Q

Computer Operations Unit

A

help desk functions

43
Q

Disk Storage

A

offers random access to data files (jumps directly from one read location to another)

44
Q

fail-soft protection

A

capability to continue processing at all sites except a non functioning one

45
Q

virtual private network

A

uses the Internet to provide secure remote access to an organization’s network

46
Q

Relational databases

A

flexible and useful for unplanned, ad hoc queries, do store data in table form, and are maintained on direct access device

47
Q

denial-of-service attack

A

ttempt to make a machine or network resource unavailable by saturating the target server with requests so it cannot respond to legitimate traffic because of server overload

48
Q

Change control

A

process of modifying application software, including requesting a change, reviewing the effectiveness of the change, approving the change, and implementing the change

49
Q

read only memory (ROM)

RAM

A

operating system and language translator programs are permanently stored

Temporary storage

50
Q

Hard Disk

A

common medium for data files for the database

51
Q

Distributed data processing

A

network of interdependent computers where certain functions are centralized, other functions are decentralized, and processing is shared among two or more computers. It is an alternative to both centralization and decentralization.

52
Q

Change management control policies

A

proper processes and approval channels to make changes to an organization’s systems

53
Q

Modem

A

device is used to convert digital signals received from a computer into analog signals that can be transmitted over telephone lines to another modem where the analog signal is converted back into a digital signal before it enters another computer system.

54
Q

Risk associated with accounts payable not accounts receivable

A

unauthorized purchases

55
Q

Key tasks in processing cash receipts

A

comparing control and remittance totals

56
Q

Test of Controls can be accomplished by

A

an auditor

57
Q

Contingency Planning

A

impairment of a software backup plan

58
Q

systems program

A

systems program manipulates application programs

59
Q

Run-to-run controls

A

accumulate separate totals for all transactions processed during the day and then agree the totals to the total of items accepted for processing

60
Q

Programmer and testing

A

programmers are not allowed to test their data and then release it to a data librarian unless is has been tested by an independent source

61
Q

management information system (MIS)

A

provides managers with the information they need for planning, organizing, decision making, and controlling the activities of the entity.