B4: Information Systems and Communications Flashcards Preview

Business Environment and Concepts > B4: Information Systems and Communications > Flashcards

Flashcards in B4: Information Systems and Communications Deck (22):
1

Information Technology Components (5)

1. Hardware
2. Software
3. Data
4. Network
5. People

2

Functions performed on data

1. Collect
2. Process
3. Store
4. Transform
5. Distribute

3

Computer storage sequence

Entity, Attributes, Field, Record, Data Value, File, Master File, Transaction File, Database

4

Types of reports

1. Periodic Scheduled Reports: made available on a regular basis
2. Exception Reports: produced when a specific condition or exception occurs
3. Demand "Pull" Reports: available on demand
4. Ad Hoc Reports: does not currently exist but can be created on demand without having to get a software developer or programmer involved.
5. Push Reports: displays up-to-date reports every time an end user logs into a computer network
6. Dashboard Reports: summary of necessary information for management action
7. XBRL: Extensible Business Reporting Language: defines data by currency, time, etc., as well as the definition of each element.

5

Transaction Processing Systems (TPS)

Process and record the routine daily transactions necessary to conduct business

6

Management Information Systems (MIS)

Provides users predefined reports that support effective business decisions

7

Decision Support Systems (DSS)

An extension of MIS that provides interactive tools to support decision making. Also called an expert system

8

Executive Information Systems (EIS)

Provide senior executives with immediate and easy access to internal and external information to assist in strategic decision making

9

Categories of Business Information Systems

- TPS
- MIS
- DSS
- EIS

10

Steps in the Systems Development Life Cycle (SDLC)
"A DITTO"

Systems ANALYSIS
DESIGN (Conceptual and Physical)
IMPLEMENTATION and Conversion
TRAINING
TESTING
OPERATIONS and Maintenance

11

COBIT Governance Objectives

1. Strategic Alignment: linkage between business and IT plans
2. Value Delivery: provision by IT of promised benefits while satisfying its customers and optimizing costs
3. Resource Management: optimization of knowledge and infrastructure
4. Risk Management: risk awareness by senior management, characterized by understanding risk appetite and risk management responsibilities. Begins with identification of risks faced followed by determining how the company will respond to the risk. Avoid, Mitigate, Share, or Ignore.
5. Performance Measurement: includes tracking and monitoring strategy implementation, project completion, resource usage, process performance, and service delivery.

12

COBIT business requirements for information. Know it cold and learn it fast

INTEGRITY: accuracy, completeness, and validity
CONFIDENTIALITY: protection of sensitive information
EFFICIENCY: low cost without compromising effectiveness
RELIABILITY: information represents what it purports to represent
AVAILABILITY: providing current and future information as required
COMPLIANCE: comply with policies, laws, regulations and contractual arrangements
EFFECTIVENESS: relevant or pertinent to a business process, and delivered in timely, correct, consistent, and useful manner

13

What are the four domains for the COBIT framework?

PLAN and ORGANIZE: Direct
ACQUIRE and IMPLEMENT: Solution
DELIVER and SUPPORT: Service
MONITOR and EVALUATE: Ensure

14

System Analyst IT Responsibilities

Internally Developed System:
- determine system requirements
- designs the overall application system
- determines the type of network needed

Purchased System:
- integrates with existing internal and purchased apps
- provides training to end users

15

Computer Programmer IT Responsibilities

Application Programmer/Software Developer (software engineers): Write and/or maintain applications programs

System Programmer: install, support, monitor, and maintain operating system. May also perform capacity planning functions

16

Computer Operator IT Responsibilities

schedule and run processing jobs. can be automated and, in large computing environments, MUST be automated.

17

File Librarian

stores and protects programs and tapes from damage and unauthorized use. In large computing environments, much of the work is automated

18

Data Librarian (Streza)

has custody of and maintains the entity's data and ensures that production data is released only to authorized individuals when needed.

19

Database Administrator

responsible for maintaining and supporting the database software and performing certain security functions.

20

Data Administrator

responsible for the definition, planning, and control of the data within a database

21

Network Administrator

support computer networks through performance monitoring and troubleshooting

22

Segregation of Duties within IT

System & Hardware Designer (Analyst) vs. Computer Programmer (Software Designer): if the same person is in charge of hardware and software, that person could easily bypass security systems without anyone knowing and steal organizational information or assets