Module 41: Information Technology Flashcards

(262 cards)

1
Q

Information System

A

Processes data and transactions to provide users with the info. they need to plan, control and operate an org.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are 3 benefits of computer processing?

A

1) Reduces or eliminates processing time
2) Prevents computational errors
3) Prevents errors in processing routine transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IT Systems, Office Automation Systems

A

Designed to improve productivity by supporting daily work of employees.

eg. Spreadsheets and e-mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IT Systems, Transaction Processing Systems

A

Involve the daily processing of transactions

eg. Airplane reservation systems and cash receipts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IT Systems, Management Reporting Systems

A

Designed to help with the decision-making process by providing access to computer data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IT Systems, Management Reporting Systems, Management Information Systems

A

Provide past, present and future info. for planning , organizing and controlling the operations of the org.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IT Systems, Management Reporting Systems, Decision Support Systems

A

Combines models and data to resolved nonstructured problems with extensive user involvement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IT Systems, Management Reporting Systems, Expert Systems

A

Applies reasoning methods to data in a specific relatively structured area to render advice or recommendations - like a human expert.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IT Systems, Management Reporting Systems, Executive Information Systems

A

Specifically designed to support executive work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The Systems Development Lifecycle (SDLC)

A

1) The Planning Phase
2) The Analysis Phase
3) The Design Phase
4) The Development Phase
5) The Testing Phase
6) The Implementation Phase
7) The Maintenance Phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The Systems Development Lifecycle (SDLC), what are the 5 major activities of the planning phase?

A

1) Identify the problem(s) the proposed system will solve
2) Design the system to be developed
3) Determine the project scope - what the new system will do and how it will be evaluated
4) Develop a project plan - activities that will be performed, and the individuals and resources needed
5) Evaluate the initial feasibility of the project - determining the projects technical, organizational, and economical feasibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The Systems Development Lifecycle (SDLC), The Analysis Phase

A

This phase is to understand the requirements for the proposed system. Processing, data, and logic models help determine the system requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The Systems Development Lifecycle (SDLC), The Analysis Phase, Needs Assessment

A

Involves determining the requirements for the system in terms of process, data capture, info and reporting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The Systems Development Lifecycle (SDLC), The Analysis Phase, Gap Analysis

A

Examines the differences between the required system and the existing system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The Systems Development Lifecycle (SDLC), The Analysis Phase, what (8) basic info do system specification documents contain?

A

1) Performance levels
2) Reliability
3) Quality
4) Interfaces
5) Security and privacy
6) Constraints and limitations
7) Functional capabilities
8) Data structures and elements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The Systems Development Lifecycle (SDLC), The Design Phase

A

Build a technical blueprint of the purposed system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The Systems Development Lifecycle (SDLC), what are the 5 components of the design phase?

A

1) Databases
2) User interfaces for input and output
3) Required reports
4) Programs
5) Infrastructure and controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The Systems Development Lifecycle (SDLC), The Development Phase

A

Documents from the design phase are transformed into the actual system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The Systems Development Lifecycle (SDLC), what are 4 tests that should be performed during the testing phase?

A

1) Unit testing - testing units or pieces of code
2) System testing - testing the integration of units or pieces of code into a system
3) Integration testing - testing whether separate systems can work together.
4) User acceptance testing - determines whether the system meets the business requirements and enables users to perform their job efficiently and effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The Systems Development Lifecycle (SDLC), what are the 4 methods used during the implementation phase?

A

1) Parallel implementation
2) Plunge implementation
3) Pilot implementation
4) Phased implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The Systems Development Lifecycle (SDLC), Implementation Phase, Parallel Implementation

A

Uses both systems until it is determined that the new system is operating properly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The Systems Development Lifecycle (SDLC), Implementation Phase, what is an advantage of parallel Implementation?

A

Full operational test of the new system with less risk of system disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The Systems Development Lifecycle (SDLC), Implementation Phase, what is an disadvantage of parallel Implementation?

A

Additional work and cost during the period in which both systems are in use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The Systems Development Lifecycle (SDLC), Implementation Phase, Plunge Implementation

A

Ceases using the old system and begin using the new system immediately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
The Systems Development Lifecycle (SDLC), Implementation Phase, what is an advantage of plunge Implementation?
Less costly
26
The Systems Development Lifecycle (SDLC), Implementation Phase, what is an disadvantage of plunge Implementation?
Higher risk of a system breakdown
27
The Systems Development Lifecycle (SDLC), Implementation Phase, Pilot Implementation
A small group of individuals using the new system until it is seen to be working properly.
28
The Systems Development Lifecycle (SDLC), Implementation Phase, what is an advantage of pilot Implementation?
Provides a partial operational test of the new system at a lower cost than parallel implementation.
29
The Systems Development Lifecycle (SDLC), Implementation Phase, Phased Implementation
Installing the system in a series of phases
30
What are the 5 types of computers?
1) Supercomputers 2) Mainframe computers 3) Servers 4) Microcomputers 5) Tablets/Smart Phones/Personal Digital Assistants
31
Supercomputer
1) Powerful 2) High-speed 3) Extremely high-volume processing 4) Extremely complex processing
32
Mainframe Computer
1) Powerful 2) High-speed 3) High-volume transaction processing
33
Servers
1) High-powered 2) Microcomputer 3) Connected via a network 4) Greater capacity 5) Central repository for organizational data 6) Often configured as a "virtual machine" 7) Low hardware costs 8) Create energy savings
34
Virtual Machine
Multiple operating systems coexisting and operating simultaneously on the same machine.
35
Microcomputer
Desktop, laptop - used by one person at a time.
36
What are 4 categories of hardware?
1) Central processing unit 2) Secondary storage 3) Input devices 4) Output devices
37
Central Processing Unit
Contains an arithmetic/logic unit, primary memory and a control unit. The major function is to fetch stored instructions and data, decode the instructions, and carry out the instructions.
38
CPU, Arithmetic/Logic Unit
Performs mathematical operations and logical comparisons
39
CPU, Primary Memory (storage)
Active data and program steps that are being processed by the CPU and may be divided into RAM and ROM.
40
CPU, Primary Memory (storage), RAM
Random-access memory - Stores application programs and data.
41
CPU, Primary Memory (storage), ROM
Read-only memory
42
CPU, Control Unit
Interprets program instructions and coordinates input, output, and storage devices.
43
What are 6 types of secondary storage devices?
1) Magnetic tap 2) Magnetic disk 3) Redundant array of independent disks (RAID) 4) Compact discs 5) Solid State Devices (SSDs) 6) Cloud-based storage
44
Secondary Storage, Devices, Magnetic Tape
Slowest type of storage available because data is stored sequentially - primarily used for archiving purposes.
45
Secondary Storage, Devices, Magnetic Disks
Most common storage. Data can be accessed directly. aka. Hard disks or Hard disk drives (HDD)
46
Secondary Storage, Devices, RAID
Redundant array of independent disks - Stores the same data redundantly on multiple magnetic disks, which decreases the likelihood of loss of data and continues operation.
47
Secondary Storage, Devices, Compact Discs
Discs (CDs), Digital Video Discs (DVDs) - Both use optical technology to read and write data to the disc.
48
Secondary Storage, Devices, Solid State Drives (SSDs)
Uses microchips to store data and require no moving parts for read/write operations. Being used in place of HDDs and are more commonly used for auxiliary storage.
49
Secondary Storage, Devices, Cloud-Based Storage
Hosted offsite, typically by third parties, and accessed via the internet. aka. Storage as a service (SaaD)
50
Digital
A series of binary (0's & 1's).
51
Bit
One binary digit.
52
Byte
A series of 8 bits, which can form a letter, a number, or a special character.
53
Analog
The representation that is produced by the fluctuations of continuous signal, and use electrical, mechanical, hydraulic, or pneumatic devices to transmit the fluctuations in the signal to represent info.
54
Online
1) Equipment in direct communication with, and under the control of the CPU. 2) Having a connection to the internet
55
Offline
1) Equipment not in direct communication with the CPU. | 2) Absence of internet
56
Console
A terminal used for communication b/w the operator and the computer.
57
Peripheral Equipment
All non-CPU hardware that may be placed under the control of the central processor, consisting of input, storage, output and communication.
58
Buffer
Temporary storage unit used to hold data during computer operations
59
Computer Hardware, Controllers
Hardware units designed to operate specific input-output units.
60
Computer Hardware, MIPS
Millions of instructions per second - A unit of measuring the execution speed of computers.
61
What are 5 categories of input devices?
1) Data entry devices/Keying data 2) Online entry 3) Turnaround documents 4) Automated source data input devices 5) Electronic commerce/Electronic data interchange
62
Input Devices, Keying Data, Key-to-tape/disk
Data is entered on magnetic tape and/or disk respectively, and then read into a computer.
63
Input Devices, Online Entry, Visual Display Terminals/Monitors
Uses keyboard to directly enter data into computer
64
What are 3 types of visual display terminal/monitor devices?
1) Input interface 2) Graphical user interface (GUI) 3) Command line interface
65
Input Devices, Online Entry, Visual Display Terminals/Monitors, Input Interface
A program that controls the display for the user and allows the user to interact with the system. eg. Computer monitor
66
Input Devices, Online Entry, Visual Display Terminals/Monitors, Graphical User Interface (GUI)
Uses icons, pictures, and menus instead of text for inputs eg. Windows
67
Input Devices, Online Entry, Visual Display Terminals/Monitors, Command Line Interface
Uses text-type commands
68
Input Devices, Turnaround Documents
Documents that are sent to the customer and returned as inputs eg. Utility bills
69
What are 7 automated source data input devices?
1) Magnetic tape reader 2) Magnetic ink character reader (MICR) 3) Scanner 4) Automatic teller machine (ATM) 5) Radio Frequency Identification (RFID) 6) Point-of-Sale (POS) recorders 7) Voice recognition
70
Input Devices, Magnetic Tape Reader
A device capable of sensing info. recorded as magnetic spots on magnetic tape.
71
Input Devices, Magnetic Ink Character Reader (MICR)
Device that reads characters that have been encoded with magnetic ink.
72
Input Devices, Scanner
A device that reads characters on printed paper
73
Input Devices, Radio Frequency Identification (RFID)
Uses radio waves to track and input data. eg. FasTrak toll collection system
74
Input Devices, Point-of-Sale (POS) Recorders
Function as a terminal and a cash register, records and tracks customer orders, processes credit and debit cards, connects to other systems in the network, manages inventory, and is customizable for the type of industry.
75
Input Devices, Voice Recognition
A system that understands spoken words and transmits them into a computer.
76
Input Devices, Electronic Commerce/Electronic Data Interchange
One company's computer communicating with another company's computer.
77
What are 4 types of output devices?
1) Monitors 2) Printers 3) Plotters - paper output of graphs 4) Computer output to microfilm or microfiche (COM)
78
What are 2 categories of software?
1) Systems Software | 2) Applications Software
79
What are 3 categories of systems software?
1) Operating System 2) Utility Programs 3) Communications Software
80
What are 3 categories of applications software?
1) Low-end 2) High-end 3) Enterprise Resource Planning (ERP)
81
Systems Software, Operating System
Manages the input, output, processing and storage devices and operation of a computer. In addition, performs scheduling, resource allocation, and data retrieval based on instructions provided in job control language. eg. Windows
82
Systems Software, Utility Programs
Handle common file, data manipulation and "housekeeping" tasks.
83
Systems Software, Communications Software
Controls and supports transmission b/w computers, computers and monitors, and accesses various databases
84
Applications Software, Low-End
All in one package, designed for small organizations
85
Applications Software, High-End
Ordinarily in modules eg. General ledger
86
Applications Software, Enterprise Resource Planning (ERP)
Relatively complete information system "suite" for large and medium organizations. eg. PeopleSoft
87
Applications Software, what are some advantages of enterprise resource planning (ERP) software?
Integration of various portions of the info. system, direct electronic communication w/suppliers and customers, increased responsiveness to info. requests for decision-making
88
Applications Software, what are some disadvantages of enterprise resource planning (ERP) software?
Complexity, costs, integration with supplier and customer systems may be more difficult than anticipated.
89
Software, Compiler
Produces a machine language object program from a source program language
90
Software, Multiprocessing
Simultaneous execution of two or more tasks, usually by two or more CPUs that are part of the same system.
91
Software, Multitasking
The simultaneous processing of several jobs on a computer
92
Software, Object Program
The converted source program that was changed using a compiler to create a set of machine readable instructions that the CPU understands.
93
Software, Source Program
A program written in a language from which statements are translated into machine language (1's & 0's).
94
Software, Source Program, Assembly Language
Uses words instead of numbers to perform an operation, is specific to a computer architecture, and is not portable.
95
Software, Source Program, Assembly Language, Assembler
Translates words to machine language (1's & 0's).
96
Software, Source Program, High-Level Programming Language
Are considered object-oriented programs (OOPs), which are efficient in that they often are reusable in other programs, they keep together data structures and procedures encapsulated. eg. COBOL, C++, Java
97
Software, Source Program, High-Level Programming Language, Encapsulation
A procedure in which object-oriented programs keep data structures and procedures together
98
Software, Source Program, Application-Specific Language
Programs that are built around database systems and usually closer to human language than machine, assembly, and high-level languages.
99
Software, Virtual Memory (storage)
Online secondary memory that is used as an extension of primary memory.
100
Software, Protocol
Rules determining the required format and methods for transmission of data.
101
Programming, Desk Checking
Review of a program by the programmer for errors before the program is run and debugged on the computer.
102
Programming, Debug
To find and eliminate errors in a computer program
103
Programming, Loop
A set of program instructions performed repetitively a predetermined number of times, or until all of a particular type of data has been processed
104
Programming, Patch
A section of coding inserted into a program to correct a mistake or to alter a routine.
105
Programming, Run
A complete cycle of a program
106
Batch Processing
Transactions flow through the system in groups of like transactions, which leaves a relatively easy-to-follow audit trail.
107
Online Real-Time/Direct Access Processing
Transactions are processed in the order in which they occur, regardless of type, and are categorized as being either online transaction processing (OLTP) systems or online analytical processing (OLAP) systems.
108
Online Real-Time/Direct Access Processing, OLTP
Online transaction processing - Databases that support day-to-day operations. eg. ATMs, airline reservations systems
109
Online Real-Time/Direct Access Processing, OLAP
Online analytical processing - Software technology that enables the user to query the system and conduct an analysis, while the user is at a PC. This is primarily used for analytical analysis.
110
Online Real-Time/Direct Access Processing, OLAP, Decision Support System
Computer-based info. systems that combine models and data in an attempt to solve relatively unstructured problems with extensive user involvement.
111
Online Real-Time/Direct Access Processing, OLAP, Data Warehouse
A subject-oriented, integrated collection of data to support management decision-making processes.
112
Online Real-Time/Direct Access Processing, OLAP, Data Mart
A data warehouse that is limited in scope
113
Online Real-Time/Direct Access Processing, OLAP, Data Mining
Using sophisticated techniques from statistics, artificial intelligence and computer graphics to explain, confirm and explore relationships among data.
114
Online Real-Time/Direct Access Processing, OLAP, Business Intelligence (BI)
A form of AI, an combination of systems that help aggregate, access, and analyze business data and assist in the business decision-making process.
115
Online Real-Time/Direct Access Processing, OLAP, Artificial Intelligence (AI)
A software designed to help humans make decisions and attempts to model aspects of human thought.
116
Online Real-Time/Direct Access Processing, OLAP, Expert System
A form of AI, info. system that guides decision processes and allows decisions comparable to those of an expert. Expert knowledge is modeled into a mathematical system.
117
Centralized Processing
Processing occurs at one location in which a mainframe computer processes data submitted to it through terminals.
118
Decentralized Processing
Data is stored on computers at multiple locations, which are usually not interconnected by a network,
119
Distributed Processing
Data is processed, for a single database, at various sites.
120
Method of Data Structure, Field
A group of related characters
121
Method of Data Structure, Table
A group of related files or a group of related tables
122
Method of Data Structure, Database
A group of related files or a group of related tables
123
Method of Data Structure, Array
An aggregate that consists of data objects with attributes, each of which may be uniquely referenced by an index (address).
124
Method of Data Structure, Master File
A file containing relatively permanent info. used as a source of reference and periodically updated with a detail (transaction) file.
125
Method of Data Structure, Detail/Transaction File
A file containing current transaction info. used to updated the master file.
126
Traditional File Processing Systems
Each application program or system is developed to meet the needs of the particular requesting dept. or user group.
127
What are 2 advantages of traditional processing systems?
1) Currently operational for many existing (legacy) systems | 2) Often cost effective for simple applications
128
What are 5 disadvantages of traditional processing systems?
1) Dependent upon a particular application program 2) In complex business situations, there is much duplication of data between data files 3) Each application must be developed individually 4) Maintenance is expensive 5) Data may be isolated and difficult to share b/w functional areas.
129
Database Systems, Database
A collection of interrelated files, ordinarily most of which are stored online
130
Database Systems, Database, Normalization
Process of separating the database into logical tables to avoid certain kinds of updating difficulties.
131
Database Systems, Database System
Computer hardware and software that enables the database(s) to be implemented.
132
Database Systems, Database Management System
Software that provides a facility for communications between various applications programs and the database.
133
Database Systems, Database Independence
Separates the data from the related application programs
134
Database Systems, Database Modeling
Identifying and organizing a database's data, both logically and physically.
135
What are 4 types of database data models?
1) Entity-relationship modeling 2) Primary key 3) Foreign Key 4) REA data model
136
Database Systems, Database Modeling, Entity-Relationship Modeling
The model divides the database into two logical parts, entities (customer, product) and relations (buys, pays for).
137
Database Systems, Database Modeling, Primary Key
The field(s) that make a record in a relational database table unique.
138
Database Systems, Database Modeling, Foreign Key
The field(s) that are common to two or more related tables in a relational database.
139
Database Systems, Database Modeling, REA Data Model
Resources, Events, and Agents - A data model designed for use in designing accounting info. databases.
140
Database Systems, Database Modeling, REA Data Model, Resources
Identifiable objects that have economic value
141
Database Systems, Database Modeling, REA Data Model, Events
An organization's business activities
142
Database Systems, Database Modeling, REA Data Model, Agents
People or organization's about which data is collected.
143
Database Systems, Data Dictionary/Repository/Directory
A data structure that store meta-data
144
Database Systems, Meta-Data
Definitional data that provides info. about or documentation of other data managed within an application or environment.
145
Database Systems, Structured Query Language (SQL)
Most common language for creating and querying relational databases.
146
Database Systems, what are 3 commands of structured query language (SQL)?
1) Data definition language (DDL) 2) Data manipulation language (DML) 3) Data control language (DCL)
147
Database Systems, Structured Query Language (SQL), Data Definition Language (DDL)
Used to define a database, including creating, altering, and deleting tables and establishing various constraints.
148
Database Systems, Structured Query Language (SQL), Data Manipulation Language (DML)
Commands used to maintain and query a database including updating, inserting in, modifying, and querying
149
Database Systems, Structured Query Language (SQL), Data control language (DCL)
Commands used to control a database, including controlling which users have various privileges.
150
Database Structures, Hierarchical
The data elements at one level "own" the data elements at the lower level
151
Database Structures, Networked
Each data element can have several owners and can own several other elements.
152
Database Structures, Relational
A database with logical structure of a group of related spreadsheets
153
Database Structures, Object-Oriented
Attributes and methods are included in structures called object classes.
154
Database Structures, Object-Relational
Includes both relational and object-oriented features.
155
Database Structures, Distributed
A single database that is spread physically across computers in multiple locations that are connected by a data communications link.
156
Database Controls, User Department
Controls over who is authorized to read and/or change the database
157
Database Controls, Access Controls
Limits the user to reading and/or changing only authorized portions of the database.
158
Database Controls, Access Controls, Restricting Privileges
Limits the access of users to the database, as well as operations a particular user may be able to perform.
159
Database Controls, Access Controls, Logical Views
Authorized views of only the portions of the database for which they have a valid need.
160
Database Controls, Backup/Recovery
A database is updated on a continuous basis during the day.
161
What are 3 methods of database backup/recovery?
1) Backup of database and logs of transactions 2) Database Replication 3) Backup Facility
162
Database Controls, Backup/Recovery, Backup of Database and Logs of Transactions
Is to backup the entire database several times per wee, generally to magnetic tape. A log of all transactions is also maintained.
163
Database Controls, Backup/Recovery, Database Replication
Is to replicate the database at one or more locations
164
Database Controls, Backup/Recovery, Backup Facility
Is to maintain a backup facility w/ a vendor who will process data in case of an emergency.
165
Database Controls, Database Administrator (DBA)
Individual responsible for maintaining the database and restricting access to the database to authorized personnel
166
Database Controls, Audit Software
Use by auditors to test the database
167
What are 5 advantages of database systems?
1) Data independence 2) Minimal data redundancy 3) Data Sharing 4) Reduced programmed maintenance 5) Can be modified to a company's needs
168
What are 4 disadvantages of database systems?
1) Need for specialized personnel w/database expertise 2) Installation is costly 3) Conversion is costly 4) Comprehensive backup/recovery procedures are necessary
169
Networks, Telecommunication
The electronic transmission of info. by radio, fiber optic, wire, microwave, laser, and other electromagnetic systems.
170
Networks, Personal Area Network (PAN)
Is centered around an individual and the personal communication devices they use.
171
Networks, Local Area Network (LAN)
Privately owned networks within a single building or campus of up to a few miles in size.
172
Networks, Metropolitan Area Network (MAN)
Privately owned network within a group of building or campuses.
173
Networks, Wide Area Networks (WAN)
Spans a large geographical area, often a country or continent, composes of a collection of computers and other hardware/software for running user programs.
174
Networks, Private Ownership
Network resources are usually dedicated to a small number of applications or a restricted set of users.
175
What are some advantages and disadvantages of a privately owned network?
Advantages: Secure, flexible, performance often exceeds that of public networks. Disadvantages: Costly
176
Networks, Public Ownership
Resources are owned by third-party companies and leased to users on a usage basis.
177
What are some advantages and disadvantages of a publically owned network?
Disadvantages: They are not secure, flexible, and is often outperformed by private networks. Advantages: Less costly
178
Networks, Cloud Computing/Services
Use and access of multiple server-based computational resources via a digital network (WAN). They are managed by the cloud server and data is stored remotely in the cloud configuration. Users do not download on their own device and instead access programs through the cloud.
179
What are 3 risks of cloud computing?
1) Information security and Privacy 2) Continuity of services 3) Migration
180
Internet, HTML
Hypertest Markup Language - Communication language
181
Internet, XML
Extensible Markup Language - Communication language
182
Internet, XBRL
Extensible Business Reporting Language - Is being developed specifically for the automation of business info. requirements, such as preparation, sharing, and analysis of financial reports, statements, and audit schedules.
183
Internet
An international collection of networks made up of independently owned computers that operate as a large computing network.
184
Internet, Hypertext Transfer Protocol (HTTP)
Primary internet protocol for data communication
185
Internet, Uniform Resource Locator (URL)
A standard for finding a document, an address
186
Internet, Web Browser
Client software with the ability to locate and display web resources
187
Internet, Web Servers
The software that make available web resources to software clients
188
Internet, Firewall
Protects an org's computers from outsiders, and consists of security algorithms and router communications protocols.
189
Internet, Router
A communications interface device that connects two networks and determines the best way for data packets to move forward to their destinations
190
Internet, Switch
A device that channels incoming data from multiple input ports to the specific output port that will take the data toward its intended destination.
191
Internet, Bridge
A device that divides a LAN into two segments, selectively forwarding traffic across the network boundary it defines
192
Internet, Gateway
A combination of hardware and software that links to different types of networks.
193
Internet, Proxy Server
A server that saves and serves copies of web pages to those who request them. A proxy sever can both increase efficiency of internet operations and help assure data security
194
Internet, Web 2.0
2nd generation of the web that refers to an era of web-based collaboration and community-generated content via web-based software tools.
195
Internet, Web 2.0, what are 4 web-based software tools?
1) Blogs 2) Wiki 3) Twitter 4) Really simple syndication (RSS) feeds
196
Internet, Transmission Control Protocol/Internet Protocol (TCP/IP)
The basic communication language or protocol of the internet. 1) Higher Layer 2) Lower Layer
197
Internet, Transmission Control Protocol/Internet Protocol (TCP/IP), Higher Layer
Assembles messages or files into smaller packets that are transmitted over the Internet.
198
Internet, Transmission Control Protocol/Internet Protocol (TCP/IP), Lower Layer
Assigns IP addresses and insures that messages are delivered to the appropriate computer
199
Internet, IP Address
The number that identifies a machine as unique
200
Internet, Internet Service Provider (ISP)
An entity that provide access to the internet.
201
Internet, Virus
A program, macro, or piece of code that requests the computer operating system to perform certain activities not authorized by the computer user.
202
Internet, Trojan Horse
A malicious, security-breaking program that is disguised as something benign, such as a game, but actually is intended to cause IT damage.
203
Internet, Worm
A program that propagates itself over a network, reproducing itself as it goes.
204
Internet, Botnet
A network of computers that are controlled by computer code, called a "bot", that is designed to perform a repetitive task such as sending spam, spreading a virus, or creating distributed denial of a service attack.
205
Intranet
A local network, usually limited to an organization
206
Extranet
A local network, limited to an organization, it's customers and it's suppliers.
207
Database Client-Server Architecture, Overall Client-Server Systems
A networked computing model, usually a LAN, in which database software on a server performs database commands sent to it from client computers.
208
Database Client-Server Architecture, what are 2 subtypes of client/server architectures?
1) File servers | 2) Database servers
209
Database Client-Server Architecture, Subtypes of Client/Server Architectures, File Servers
Manages file operations and is shared by each of the client PCs and are divided in a manner in which most input/output, and processing occurs on client computers rather than on the server.
210
Database Client-Server Architecture, Subtypes of Client/Server Architectures, Database Servers
The server contains the database management system and thus performs more of the processing
211
Database Client-Server Architecture, Subtypes of Client/Server Architectures, Two-Tier Architectures
Include a file server and a database server.
212
Database Client-Server Architecture, Subtypes of Client/Server Architectures, n-Tier Architectures
Include a file server, a database server and 1 or more of the below servers: 1) Print server 2) Communication Server 3) Fax server 4) Web server
213
Database Client-Server Architecture, Distributed Systems
Connect all company locations to form a distributed network in which each location has its own input/output, processing, and storage capabilities.
214
Local Area Networks (LANs), Software, what are 4 common services?
1) Network server 2) File server 3) Print Server 4) Communications server
215
Local Area Networks (LANs), what are 4 types of hardware components?
1) Workstations 2) Peripherals 3) Transmission media 4) Network interface cards
216
Local Area Networks (LANs), Hardware Components, Workstations
Ordinarily microcomputers
217
Local Area Networks (LANs), Hardware Components, Peripherals
Printers, network attached storage (NAS) devices, optical scanners, fax board.
218
Local Area Networks (LANs), Hardware Components, Transmission Media
Physical path that connect components of LAN, ordinarily twisted-pair wire, coaxial cable, or optical fiber, and WiFi.
219
Local Area Networks (LANs), Hardware Components, Network Interface Cards
Connect workstation and transmission media
220
Local Area Networks (LANs), what are 6 control implications?
1) Often weak 2) Rely upon end users who may not be control conscious 3) Users may not be provided adequate resources for problem resolution, troubleshooting and recovery support 4) Doesn't provide security features in larger scale environments. 5) Controlling access and gaining accountability through logging of transactions enforces a segregation of duties 6) Management controls - passwords, access codes
221
What are the 3 control categories for micro computers?
1) Security 2) Verification 3) Personnel
222
Microcomputer, Control, Security Controls
Access to the software installation files should be controlled and backup copies should be made. Access to the hard drive should be restricted, and management should become more directly involved in supervision.
223
Microcomputer, Control, Verification Controls
Independent verification of the applications being process should be made to prevent the system from being used for personal projects. Verification also helps prevent errors from going undetected.
224
Microcomputer, Control, Personnel Controls
Centralized authorization to purchase hardware and software, and prohibiting the loading of unauthorized software and data on company-owned computers.
225
Microcomputer, Control, Personnel Controls, Software Controls
Make sure software is copyrighted, and have controls in place for software piracy. Maintaining a log of all software purchases, performing an audit to identify installed software, and establishing a software policy.
226
End-User Computing (EUC)
Is responsible for the development and execution of the computer application that generates the info. used by that same end user.
227
End-User Computing (EUC), what are 4 risks?
1) Applications are not always adequately tested before implementation 2) Personnel need to understand control concepts 3) Mgmt often does not review the results of applications appropriately 4) Old or existing applications may not be updated for current applicability and accuracy.
228
End-User Computing (EUC), what are 8 Control implications?
1) Applications to be adequately tested 2) Adequate documentation 3) Physical access controls 4) Control access to appropriate users 5) Control use of incorrect versions of data files 6) Backup Files 7) Application controls 8) Support programmed or user recons to provide assurance that processing is correct.
229
End-User Computing (EUC), Control Implications, what are 6 physical access controls?
1) Clamps/chains 2) Diskless workstations - download files only 3) Regular backup 4) Limit access to those who know user ID and password 5) Control access from outside the org. 6) Commitment to security matters
230
End-User Computing (EUC), Control Implications, what are 6 user access controls?
1) Passwords and user IDs 2) Menus for EUC access to database 3) Restrict user ability to load data 4) Require appropriate validations, authorization, and reporting control when uploading data. 5) Independent review of transactions 6) Record access to company databases by EUC application
231
Electronic Commerce, what are 5 areas of risk?
1) Security 2) Availability 3) Processing integrity 4) Online privacy 5) Confidentiality
232
Electronic Commerce, WebTrust Seal of Assurance
Tells potential customers that the AICPA and the Canadian Institute of Chartered Accountants has evaluated a website's business practices and controls to determine whether they are in conformity with WebTrust principles.
233
Electronic Commerce, Digital Certificates
Means of assuring data integrity. Allows an individual to digitally sign a message so the recipient knows that it actually came from that individual, and ordinarily, the message is encrypted and the recipient decrypts it.
234
Encryption
The conversion of data into a form called a cipher text, that cannot be easily understood by unauthorized people.
235
Decryption
Is the process of converting encrypted data back into its original form so it can be understood. The conversion is performed by an algorithm.
236
Encryption, Algorithm
A detailed sequence of actions to perform to accomplish some task
237
Encryption, Key
A value that must be fed into the algorithm used to decode an encrypted message in order to reproduce the original plain text.
238
Encryption, Private Key System
An encryption system in which both the sender and receiver have access to the electronic key, but do not allow others access.
239
What is one disadvantage of a encrypted private key system?
Both parties must have the key.
240
Encryption, System Overhead
Machine instructions necessary to encrypt and decrypt data - slows down the rate of processing
241
Electronic Funds Transfer (ETF)
Making cash payments between two or more organizations or individuals electronically rather than by using checks or cash.
242
What are 2 risk vulnerabilities of an ETF?
1) Unauthorized access to proprietary data | 2) Fraudulent fund transfers
243
What are 4 controls for ETFs?
1) Control physical access to network terminals 2) Electronic identification required for all network terminals 3) Control access with passwords 4) Encryption should be used to secure stored data and data being transmitted.
244
Electronic Data Interchange (EDI)
Electronic exchange of business transactions, in a standard format, from one entity's computer to another entity's computer through an electronic communications network.
245
What are some risks related to EDI?
Used for sales and purchasing, and related accounts, and the speed at which transactions occur often reduces amounts receivable (payable) due to electronic processing of receipts (payments).
246
EDI, Point-to-Point
A direct computer-to-computer private network link
247
What are 4 advantages to the Point-to-Point method of Electronic Data Interchange (EDI)?
1) No reliance on third parties for computer processing 2) Org. controls who has access to the network 3) Org. can enforce proprietary (its own) software standard in dealings with all trading partners 4) Timeliness of delivery may be improved since no third parties are involved.
248
What are 5 disadvantages to the Point-to-Point method of Electronic Data Interchange (EDI)?
1) Must establish connection w/each trading partner 2) High initial cost 3) Computer scheduling issues 4) Need for common protocols between partners 5) Need for hardware and software compatibility
249
EDI, Value-Added Network (VAN)
Privately owned network that routes the EDI transactions b/w trading partners and in many cases provides translation, storage, and other processing. It's designed and maintained by an independent company that offers specialized support to improve the transmission effectiveness of a network. A VAN receives data from the sender, determines the intended recipient, and places data in the recipient's electronic mailbox.
250
EDI, what are 5 advantages of a VAN EDI?
1) Reduces communication and data protocol problems 2) Partners don't have to establish the numerous point-to-point connections 3) Reduces scheduling problems 4) Translates application to a standard format that partner does not have to reformat 5) Can provide increased security
251
EDI, what are 3 advantages of a VAN Electronic data interchange (EDI)?
1) Cost 2) Dependence on systems and controls 3) Possible loss of data confidentiality
252
What are 4 advantages of a public network?
1) Avoids cost of proprietary lines 2) Avoids cost of VAN 3) Directly communicates transactions to trading partners 4) Software is being developed which allows communication b/w differing systems
253
What are 4 disadvantages of a public network?
1) Possible loss of data confidentiality 2) Computer or transmission disruption 3) Hackers and viruses 4) Attempted electronic frauds
254
Proprietary Networks
Org's have developed their own network for their transactions, which are costly to develop and operate, but they are extremely reliable.
255
Networks, EDI, Authentication
Controls over origin, proper submission, proper delivery, and proof of origin.
256
Networks, EDI, Packets
A block of data that is transmitted from one computer to another. It contains data and authentication info.
257
Networks, what are 6 benefits of EDI?
1) Quick response and access to info. 2) Cost efficiency 3) Reduced paperwork 4) Accuracy and reduced errors and error-correction costs 5) Better communications and customer service 6) Necessary to remain competitive.
258
Networks, what are 9 exposures of EDI?
1) Total dependence upon computer system for operation 2) Possible loss of confidentiality of sensitive info. 3) Increased opportunity for unauthorized transactions and fraud 4) Concentration of control amoung a few people involved in EDI 5) Reliance on third parties 6) Data processing, application and communications errors 7) Potential legal liability due to errors 8) Potential loss of audit trails and info. needed by mgmt. due to limited retention polices 9) Reliance on trading partner's system
259
What are 5 technologies that are enabled by telecommunications?
1) Electronic data interchange 2) Electronic funds transfer 3) Point of sale systems 4) Commercial databases 5) Airline reservation systems
260
What are 6 controls for telecommunications?
1) System integrity at remote sites 2) Data entry 3) Central computer security 4) Dial-in security 5) Transmission accuracy and completeness 6) Physical security over telecommunication facilities
261
Computer Service Organizations
Record and process data for companies and allow companies to do away with the data-processing function.
262
Pg 89 - start at D.
Tuesday