IT Flashcards

1
Q

IaaS

A

accessing hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PaaS

A

create software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SaaS

A

accessing software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

COBIT 7 attributes

A
effectiveness
efficiency
integrity
confidential
available
reliable
compliance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which accounts are most profitable

A

CRM (customer relations mgmt.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data mining, data warehouse and drill down to determine optimal opening times

A

OLAP (online analytical processing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Day to day payroll reporting

A

OLTP (online transaction processing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Supply Chain Management

A

Sharing info with suppliers and customers

IT, accurate forecasting, communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Manage help desk

A

Operators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Operating systems and compilers

A

Systems Programmer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Manage remote access

A

Network administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Code changes

A

Application Programmer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Add/update documentation to data dictionary

A

Database Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Control flow of documents

A

Data Control Clerk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Review input/output/operations (internal audit)

A

Control Group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Design computer install, flowcharts or data processing routines

A

System Analyst

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Access to operator instructions (not detailed listing)

A

Operators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Forecast and make long range strategic decisions, external data

A

ESS (Executive Support System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Managerial accounting and budgeting

A

MIS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Large sets of data used to determine patterns

A

DSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Multiple table, matrices, linked by key fields

A

Database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Independent multiple programs to read, redundant

A

Flat File

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Table form, flexible, on direct access device

A

Relational database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Batch Processing

A

Transactions assigned to groups with own line entry

25
Q

Online real time processing 4 characteristics

A

immediate update
storage device required
Network access required
errors captured and corrected

26
Q

Subsidiary in Manual systems ex: Inventory

A

Master file

27
Q

Connection of internet devices

A

IoT (internet of things)

28
Q

ETL

A

Extract, Transform, Load

29
Q

Blockchain

A

Independent, secure, non modified audit trail of transactions. Decentralized, distributed, peer to peer

30
Q

EDI

A

Electronic data interchange - transactions between business trading partners

31
Q

VAN

A

Value added network provides additional security to process EDI

32
Q

Foundation of System reliability (rollback & retention)

A

Security

33
Q

Low cost wired transmission

A

Twisted Pair

34
Q

IT Characteristics Policy

A

Owner
Purpose and title
linked to strategy and objectives

35
Q

Goldilocks

A

Distributed: neither centralized or decentralized

36
Q

Decentralized

A

Less secure, more responsive, less costs, less bottleneck

37
Q

Most reliable authentication

A

Digital Certificate

38
Q

Verifies identity and unaltered transmission

A

Digital Signature

39
Q

Data control language used to determine which users have access

A

Relational database

40
Q

Single key encryption (private key) encrypts and decrypts

A

Symmetric Encryption

41
Q

Public/Private encryption, two keys used together, used to encrypt/decrypt and receiver hold the key

A

Asymmetric Encryption

42
Q

controls that prevent interruptions

A

Backup and downtime controls

43
Q

Grandfather, father, son approach

A

Redundant, three sets of backup

44
Q

Zombie computer

A

used to DoS attack (denial of service)

45
Q

Check point/Restart

A

process transactions that took place after last valid run

46
Q

Fault Tolerant

A

Redundancy of components

continues to operate despite failure

47
Q

Data technique for interviews, questionnaires, observations

A

System Documentation

48
Q

Allows you to maintain software

A

Program Documentation

49
Q

Verifies state abbreviation or valid account number

A

Validity Check

50
Q

prevents alpha in numeric field

A

Field format check

51
Q

Ensure valid & correct customer account number entered

A

Closed loop

52
Q

Checks for accuracy of data

A

Echo check

53
Q

Line with faulty data transmission

A

Parity check

54
Q

Steps in System development

A

Planning
Analysis
Design/Develop
Implement

55
Q

Step of purchasing hardware

A

Design/Develop

56
Q

Step of data conversion and training

A

Implement

57
Q

Step identify a problem

A

Planning

58
Q

Step to sign requirements definition docs

A

Analysis

59
Q

Step to assessing needs

A

Analysis