IT Flashcards
Modem
converts digital signals received from a computer onto analog signals that can be transmitted over telephone lines to another modem where analog signals is converted back to digital signals before it enters another computer system
Application Programmer
Analyst
Systems Admin.
Systems Program
1 - Codes
2 - Designs
3 - Efficient and effective operation, database design; security
4 - use the design developed by the analysts to develop an information system and write the computer programs.
Compiler
Software program that converts program language to machine language
Decision Table
ALTERNATIVE logical conditions and actions to be taken in a program
Access Controls
Security Controls
1 - monitor activity; amount of time it takes for a computer to seek out and find data or, as stated in the problem, “to retrieve data from memory.”
2 - enforce authorization before activity
DBMS
System that allows for easy development of new applications without changing the storage method
Password protection for a screensaver security level
WEAK
Database Decision Support
aids management in problem solving for a SPECIFIC ISSUE
Predominant threat to IT environment
Unauthorized Access
Internet processing transaction risks
Disruption leading to missing or duplicate information; deteriorates completeness and accuracy
COBIT
Control Objectives for Information and Technology
Electronic Vaulting
Electronic transmitting & storing backups of programs and data at a remote data storage facility
Intranet
1 - Define
2 - Access
3 - Advantage/Disadvantage
1 - internal version of the internet
2 - accessed through conventional software, works with the World Wide Web (separated through a firewall)
3 - Cheap/ High Security Risk (compared to WANS/LANS)
Management Reporting System encompasses what type of DATA
1 - internal/external
2 - Financial/Operating
Plotter
printing device specifically for graphs and charts
Biometric Processing
security identification by physical traits of user
Enterprise Risk Management
Integrates all aspects of companies operations into one IT system.
Financial/Non financial/ External DATA
Access Control Matrix
Lists and access data
When is batch processing current
only directly after update occurs
One for One Checking
verifying each hard copy has been processed through the system
Executive Support System
Aids management in strategic planning
EDI
Direct communication between partners but relies on third parties as well; constant contact without much human intervention
RISK - Improper Distribution
Mirror Web Server is best for
Data Recovery
Encryption of Software versus Hardware
Hardware encryption is more reliable