IT Flashcards

1
Q

Online real-time processing

A

Online real-time processing is especially desirable when transactions occur continuously and are interdependent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Batch processing

A

Batch processing is especially desirable when transactions occur periodically and are independent.
Stored data is not updated until the batch is processed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

B2G

A

Business to government e-commerce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Line chart

A

Preferred chart for showing one or more measures over time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Electronic data interchange

A

Electronic data interchange is used to electronically connect a company to its suppliers and customers.
Refers to the electronic trasnfer of documents between businesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Electronic funds transfer systems

A

Electronic funds transfer systems minimize the need for entry of information and, therefore, reduce the chance of entry errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SQL

A

is most directly related to relational database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

database management system

A

One of the functions is to create and modify the database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Object program

A

the translation of a symbolic language program (readable by humans) results in an object program that is machine-readable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Blockchain

A

Blockchain requires widespread user adoption; business transformation cannot occur until there is sufficient adoption among users. Therefore, blockchain transformation will likely not occur quickly.
Reduced auditing and compliance costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data structure hierarchy

A

Character, field, record, file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

OLAP (online analytical processing system)

A

The online analytical processing system (OLAP) incorporates data warehouse and data mining capabilities within the ERP.
It is primarily the OLAP that provides an integrated view of transactions in all parts of the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

OLTP (online transaction processing system )

A

The online transaction processing system (OLTP) records the day-to-day operational transactions and enhances the visibility of these transactions throughout the system.
The OLTP is primary concerned with collecting data (and not analyzing it) across the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Rule-based expert systems

A

rule-based expert systems do not learn from experience; they simply execute rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

information technology (IT) governance

A

A primary goal of IT governance is to balance risk versus return over IT and its processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Phishing

A

Phishing is the fraudulent request for information generally delivered via email.

17
Q

Virus

A

A virus is an unauthorized program that copies itself to files in the user’s system generally intended to actively damage data.

18
Q

Denial of service

A

A denial of service attack is an interruption to an authorized user’s access to a computer network, generally caused with malicious intent.

19
Q

Salami fraud

A

Salami fraud describes the illegal taking of a small amount of money from many accounts using various rounding methods.

20
Q

Data Leakage

A

Data leakage is the unauthorized transmission of classified information from a data center or computer system to outside parties.

21
Q

Virtual private network (VPN)

A

A virtual private network (VPN) is a secure way to create an encrypted communication tunnel to allow remote users secure access to a network. The VPN uses authentication to identify users and encryption to prevent unauthorized users from intercepting data.

22
Q

Analysis phase

A

The analysis phase the team attempts to get an understanding of the requirements of the system.

23
Q

SOC 1 report

A

They are primarily to assist financial statement auditors when processing services have been outsourced to a service provider.

24
Q

SOC 2 report

A

They are meant for management of service organizations, user entities, and certain other specified entities.

25
Q

Header

A

Headers are used to identify data records in an accounting system file.

26
Q

cybersecurity program

A

Identify and prioritize risks, create current profile, conduct risk assessment

27
Q

Enterprise Resource Planning (ERP)

A

Integrate data from all aspects of an organization’s activities into a centralized data repository.

28
Q

Privacy

A

addresses whether the collection, use, retention, disclosure, and disposal of personal information is consistent with the entity’s commitments and with GAPP

29
Q

Value-added network (VAN).

A

VANs often provide the additional security and addressing capabilities necessary to process EDI transactions.

30
Q

System programmer

A

systems programmers are given responsibility for maintaining system software, including operating systems and compilers.

31
Q

Parity check

A

A parity check is designed to detect errors in data transmission.

32
Q
A