IT Functions & Controls Related to People Flashcards
The ____ ____ department is the department that is responsible for creating new end-user computer applications and for maintaining existing applications.
Applications Development
___ ___ are responsible for analyzing and designing computer systems.
Systems analysts
____ ____ work under the direction of the systems analyst to write the actual programs that process data and produce reports.
Application programmers
New program development, and maintenance of existing programs, is completed in a ___ ___ using copies of live data and existing programs rather than in the “live” production environment.
“test” environment
The ___ ___ and ___ department maintains the computer hardware and computing infrastructure and grants access to system resources.
Systems Administration and Programming
____ ____ are The database administrator, network administrator, and web administrators, and they are responsible for management activities associated with the system they control.
Systems administrators
___ ___ maintain the various operating systems and related hardware.
System programmers
Remember that the ___ ___ are engaged in a different function than are system administrators and programmers.
system analysts
The ___ ___ department is responsible for the day-to-day operations of the computer system, including receipt of batch input to the system, conversion of the data to electronic media, scheduling computer activities, running programs, etc.
Computer Operations
The __ __ position controls the flow of all documents into and out of Computer Operations; for batch processing, schedules batches through data entry and editing, monitors processing, and ensures that batch totals are reconciled;
data control
The data control position is called “___ ___” in some organizations.
quality assurance
___ ___ should not access the data, equipment, or programs.
data control
For systems still using manual data entry (which is becoming rare), the ___ ___ ___ (___ ___ ___) keys (enters) handwritten or printed records to convert them into electronic media
Data entry clerk (data conversion operator)
The ___ ____ ___should not be responsible for reconciling batch totals, should not run programs, access system output, or have any involvement in application development and programming.
data entry clerk
___ ____ are responsible for operating the computer: loading program and data files, running the programs, and producing output.
Computer operators
___ ___ should not enter data into the system or reconcile control totals for the data they process. (That job belongs to Data Control.)
Computer operators
Files and data not online are usually stored in a secure environment called the ___ ___
File Library
The ___ ___ is responsible for maintaining control over the files, checking them in and out only as necessary to support scheduled jobs.
file librarian
The ___ ___ should not have access to any of the operating equipment or data (unless it has been checked into the library).
file librarian
___ ___ and ___ ___ ___ – Should never be allowed to act as programmers.
Computer operators and data entry personnel
___ ___ – Should never have access to application program documentation.
Systems programmers
___ ___ – Should never have access to computer operations (“live” data).
Data administrators
___ ___ and ____ ___ – Should not have access to computer operations (“live” data) OR control access to data, programs, or computer resources. F. This matrix illustrates the above segregation of IT functions:
Application programmers and systems analysts
The___, ___, and ___ of employees are among some of an organization’s most valuable assets.
competence, loyalty, and integrity
Appropriate ____ ___ are critical in hiring and retaining quality employees.
personnel policies
Designing systems, prepares specifications for programmers, and serves as intermediary between users and programmers are the primary job functions of ___ ___.
systems analysts.
Managing remote access is an appropriate responsibility for a ___ ___.
network administrator
IT people controls are mostly ___ and ___.
General, Preventive.
The position responsible for managing the flow of documents and reports in and out of the computer operations department is the ___ ___ ___.
data control clerk
The ___ ___ is responsible for establishing user names and authorizing access to specific data files and fields.
database administrator
In a large firm, the custody of an entity’s data is most appropriately maintained by a ___ ___.
Data librarian.
The separation of the ___ ___ function from the application programming function is critical to the segregation of duties within an IT department.
data entry