Mobile Device, End-User, and Small Business Computing Flashcards
1
Q
Define view-only access.
A
Permitting a user to view, but not change, a file.
2
Q
Identify five risks of user-developed systems.
A
- Not integrated with existing systems
- Inadequate testing and documentation
- Poor data input controls
- Poor system design
- Management may rely on these systems without knowing their risks
3
Q
Define malicious app.
A
An app that collects and transmits user data to a third party.
4
Q
Define mobile accounting.
A
Transportable computing devices. That is, computing devices that can be carried from place to place.
5
Q
Identify items that should be included in user training in mobile applications.
A
Organizational policies, password maintenance and protection, when and how to use mobile devices, procedures for lost or stolen devices.
6
Q
Identify three characteristics of the small business computing environment.
A
- Exclusive use of microcomputers and laptops (e.g., there may be no servers)
- Outsourced IT
- Poor segregation of duties