Flashcards in B4: Information Systems and Communications Deck (22):
Information Technology Components (5)
Functions performed on data
Computer storage sequence
Entity, Attributes, Field, Record, Data Value, File, Master File, Transaction File, Database
Types of reports
1. Periodic Scheduled Reports: made available on a regular basis
2. Exception Reports: produced when a specific condition or exception occurs
3. Demand "Pull" Reports: available on demand
4. Ad Hoc Reports: does not currently exist but can be created on demand without having to get a software developer or programmer involved.
5. Push Reports: displays up-to-date reports every time an end user logs into a computer network
6. Dashboard Reports: summary of necessary information for management action
7. XBRL: Extensible Business Reporting Language: defines data by currency, time, etc., as well as the definition of each element.
Transaction Processing Systems (TPS)
Process and record the routine daily transactions necessary to conduct business
Management Information Systems (MIS)
Provides users predefined reports that support effective business decisions
Decision Support Systems (DSS)
An extension of MIS that provides interactive tools to support decision making. Also called an expert system
Executive Information Systems (EIS)
Provide senior executives with immediate and easy access to internal and external information to assist in strategic decision making
Categories of Business Information Systems
Steps in the Systems Development Life Cycle (SDLC)
DESIGN (Conceptual and Physical)
IMPLEMENTATION and Conversion
OPERATIONS and Maintenance
COBIT Governance Objectives
1. Strategic Alignment: linkage between business and IT plans
2. Value Delivery: provision by IT of promised benefits while satisfying its customers and optimizing costs
3. Resource Management: optimization of knowledge and infrastructure
4. Risk Management: risk awareness by senior management, characterized by understanding risk appetite and risk management responsibilities. Begins with identification of risks faced followed by determining how the company will respond to the risk. Avoid, Mitigate, Share, or Ignore.
5. Performance Measurement: includes tracking and monitoring strategy implementation, project completion, resource usage, process performance, and service delivery.
COBIT business requirements for information. Know it cold and learn it fast
INTEGRITY: accuracy, completeness, and validity
CONFIDENTIALITY: protection of sensitive information
EFFICIENCY: low cost without compromising effectiveness
RELIABILITY: information represents what it purports to represent
AVAILABILITY: providing current and future information as required
COMPLIANCE: comply with policies, laws, regulations and contractual arrangements
EFFECTIVENESS: relevant or pertinent to a business process, and delivered in timely, correct, consistent, and useful manner
What are the four domains for the COBIT framework?
PLAN and ORGANIZE: Direct
ACQUIRE and IMPLEMENT: Solution
DELIVER and SUPPORT: Service
MONITOR and EVALUATE: Ensure
System Analyst IT Responsibilities
Internally Developed System:
- determine system requirements
- designs the overall application system
- determines the type of network needed
- integrates with existing internal and purchased apps
- provides training to end users
Computer Programmer IT Responsibilities
Application Programmer/Software Developer (software engineers): Write and/or maintain applications programs
System Programmer: install, support, monitor, and maintain operating system. May also perform capacity planning functions
Computer Operator IT Responsibilities
schedule and run processing jobs. can be automated and, in large computing environments, MUST be automated.
stores and protects programs and tapes from damage and unauthorized use. In large computing environments, much of the work is automated
Data Librarian (Streza)
has custody of and maintains the entity's data and ensures that production data is released only to authorized individuals when needed.
responsible for maintaining and supporting the database software and performing certain security functions.
responsible for the definition, planning, and control of the data within a database
support computer networks through performance monitoring and troubleshooting