IT chap Flashcards

1
Q

IT components

A

Hardware
Physical computer or printer or workstation

Software
Systems and programs that work through the hardware to process information (word, etc, ERP systems)

Network
Communication media that allows multiple computers to share data

People
Needed for set up, maintenance, support

Data/Info
Data
Raw Facts (quantity,name, $)
Information organized and processed data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IT Roles and Responsibilities

A

System Analyst

Computer Programmer

Computer Operator

File Librarian

Security Administrator

System Administrator

Data Input Clerk

Hardware Tech

End User

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IC implications IT roles and responsibilities

A

***IC implications – Accountants should not be programmers

Progrmmers should not be able to update data or information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

System Analyst

A

Internally Developed System
Design the overall application system
Work with end users to determine what they need and design system accordingly
Role is often paired with the programmer

Purchased system
More of a system integrator
Designing interfaces to connect purchased system to existing applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Computer Programmer

A

Writes and maintains applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Computer Operator

A

Scheduling, processing jobs, running or monitoring production jobs, printing and distributing report to end users
Less and less of these today
Automated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

File Librarian

A

Store and protect programs from unauthorized use and damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security Administrator

A

Passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

System Administrator

A

DBA (database admin)
Maintaining, supporting, and often securing the database
Should not have write/update access to data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data Input Clerk

A

Prepare, verify, and input data to be processed

If not distributed to end users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hardware Tech

A

Set up and configuration and troubleshooting hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

End User

A

Accountants, auditors, excutives, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IT Segregation of Duties

A

In addition to not allowing certain IT roles to do certain write/update data funtions OR have access to assets, certain IT jobs should never be done by the same person
System analyst and Programmers
Computer Operators and Programmers
Security Admin and Programmers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IT Fundamentals (Hardware)

A

CPU (Central Processing Unit)
The Processor
Interprets program instructions, input and output and storage

Primary Storage
ROM vs RAM

Secondary Storage
Hard drives, CD ROMs, data tapes

Peripherals
Devices that transfer data
Input – keyboards, mice, scnner
Output – printers, speakers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

System Software

A

Programs that run the computer
Operating System
Interface between user and harware
Microsoft Windows

Database Management System (DBMS)
Software package(a tool) that controls the development, use and maintenance of the databases
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data Storage Definitions

A

Bit – binary unit (0 or 1) with which all data is stored
Byte – 8 bits
Field – a group of Bytes (employee #)
Record –a group of fields (customer)
File – a group of records (mater and transaction)
Database – integrated collection of records and files

17
Q

Types of Databases

A

Operational
Store detailed data to support day to day
Analyical
Summarized data used by managers and extracted from operational databases
Data Warehouses
Store operational and analytical info from previous and current years
Data mining – trends, etc
End User Databases
Store data files developed by end users at their workstations
Emails, downloads, word, excel, etc

18
Q

DBMS advantages

A
Advantages
Reduction of Data Redundancy
Potential for Data Sharing
Data Independence
Data Standardization
Improved Data Security
Expanded Data Fields
Improved Efficiency
19
Q

DBMS disadvantages

A

Disadvantages
Cost (highly trained personnel needed and special backup and recovery needed)
Increased chance of breakdowns
Harder to follow audit trail

20
Q

Programming Languages

A
Fourth Generation
Enable end users to develop application with little technical assistance
Debugging
Programs contain bugs 
Desk checking – used to test software
21
Q

Networks

A

An interconnected group of computers and terminals

LAN

WAN

22
Q

LAN

A

Permit shared resources with computers in a limited area
Node – an device connected to a network
Workstation – a node used by end users
Server – node that provides services to the rest of the network
Network Interface Card (NIC) circuit board that allows the note to connect over the network

23
Q

WAN

A

Allow national and international communication

VANs – Value added networks
Privately owned networks that provide MORE then data transmission
EDI
Good security,but expensive for small companies

24
Q

System Operations

A

Transaction files –
Journals (sales journal) subledgers
A bunch of journal entries
Used to update mater files

Master files –
Ledgers
A bunch of T accounts for permanent accounts (AR)
Data at a certain point

Batch vs. OLRT processing

25
Q

Programmed Controls – when manual controls are built into a computerized environment

A

Input Controls
Verify that transaction data entered is valid, complete, and accurate (error messages, double input, reasonableness limits, etc)

Processing Controls
All transactions are processed completely and accurately during file maintenance (after upload)

Output Controls
Accuracy of reports distributed

26
Q

System Risks

A

Strategic Risk
The risk of choosing inappropriate technology

Operating Risk
Doing all the right things the wrong way (running good reports at the wrong time)

Financial Risk
Risk of having financial resources lost, stolen, or wasted

Information Risk
Risk of loss of data integrity, incomplete transactions or hackers

Specific Risk
Errors
Intentional Acts (fraud)
Distasters (fire, flood, etc)

27
Q

System Risk Management

A

Risk Management
Assessing risk and mitigating them with controls the best way possible

Controls
General
Maintenance, access security and application development
Application Controls
Controls over processing individual transactions
Physical Controls 
Access to computer facilities and data
Segregation of Duties
28
Q

Access Controls

A

Limit access to program documentation, data files, computer hardware, etc

Physical Access

Electronic Access
User Identification Codes
Assignment and Maintenance of Security Levels
Restrict certain functions and programs from certain people
File attributes
Restrict writing, reading and priveleges fro a file
Firewalls
Gatekeeper of the network

29
Q

Threats in an IT environment

A

Virus
Piece of computer program that inserts itself into another program
Requires a host and cannot be run independently

Worm
Special type of virus that can run independently but cannot attach itself to other program

Phishing
Sending phony emails to lure people to phony web sites asking for financial or personal info

30
Q

Data and Procedural Controls

A

Safeguarding Records and Files

Backup Files

Data Validation and Editing Techniques

Programmed Modification Controls

Data Encryption

31
Q

Disaster Recovery and Business Continuity

A

Alternate Processing Facilities
Disaster Recovery
Plans for continuing ops when destruction occurs
Major players
The organization, the service provider (IBM) and the disater recovery provider
Steps in DR
Assess risk, identify critical applications, develop a plan for handling, assign jobs
Needed – IT is such an important part of a company – you could be out of business without a plan such as this

32
Q

Data Validation and Editing Techniques

A

Valid Code Tests
Codes entered are checked against valid codes in a master file

Check Digits
Technique used to compute a digit to add to an existing number (sum of digits)
Limit Tests (would catch extra zeros or an improper CC number
Reasonableness Checks

33
Q

Programmed Modification Controls

A

Emails that are sent to verify you changed something on an account

34
Q

Data Encryption

A

Each party has a public and private ‘key’
Sender has the private key and it goes no where
Public keys are sent out to those who sender wants

Digital Signatures and Certificates
Authenticate a document by using encryption

35
Q

Types of Disaster Recovery

A

Use of Recovery Service
Outsource the job

Internal DR
Used if needed instantaneously
Data is mirrored (updated and stored) in two facilities at all times
Very expensive and not often done

Multiple Data Center Back ups

36
Q

Cold site

A

Off-site location with all electrical connections and other physical requirements for data processing but NOT the actual equipment

37
Q

Hot site

A

Off-site location completely equipped for immediate take over of a company’s data processing