BEC 4 Flashcards

1
Q

Name and briefly describe the five major components that make up the information technology of an organization.

A
  1. Hardware: Hardware is the actual physical computer or computer peripheral device.
  2. Software: Software is the systems and programs that process data and turn that data into information.
  3. Network: A network is made up of the communication media that allows multiple computers to share data and information simultaneously.
  4. People: Many people have a role in IT, such as hardware technicians, network administrators, software developers, and end users.
  5. Data: Data is raw facts.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the normal series of events in an accounting information system (AIS).

A

The series of events in an AIS is as follows:

  1. The transaction data from source documents is entered into the AIS by an end user.
  2. The original paper source documents are filed.
  3. The transactions are recorded in the appropriate journal.
  4. The transactions are posted to the general and subsidiary ledgers.
  5. Trial balances are prepared.
  6. Financial reports are generated.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name and briefly describe five different types of MIS reports.

A
  1. Periodic Scheduled Reports: The traditional reports that display information in a predefined format and are made available on a regular basis to end users of the system.
  2. Exception Reports: Reports produced when a specific condition or “exception” occurs.
  3. Demand Reports: Specific reports that can be printed on demand.
  4. Ad Hoc Reports: A report that does not currently exist but that can be created on demand without having to get a software developer involved.
  5. Push Reports: A report that can actually be “pushed” or sent to a computer screen or computer desktop.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the primary roles of business information systems?

A

The primary roles of business information systems are to:

  1. Process detailed data.
  2. Assist in making daily decisions.
  3. Assist in developing business strategies.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the various categories of business information systems?

A

The categories of business information systems are:

  1. Transaction processing systems
  2. Decision support systems
  3. Management information systems
  4. Executive information systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe the two types of processing used in a computerized environment.

A

Batch processing – periodic processing

Online, real-time (OLRT) processing (often referred to as “online processing”) – immediate processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a batch control total?

A

A batch control total (or batch total) is a manually calculated total that is compared-generated total as a means of testing the accuracy and completeness of the input and processing. Batch totals are used for numbers that are normally added, such as dollar amounts. Hash totals are used for numbers that are not normally added, such as account numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the distinction between centralized and distributed processing?

A

Centralized processing maintains data and performs data processing at one or more central locations. Decentralized processing occurs when computing power and processing are spread over many locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the advantages and disadvantages of centralized processing?

A

Advantages of Centralized Processing
1. Data is secured better, once received.
2. Processing is consistent.
Disadvantages of Centralized Processing
1. The cost of transmitting large numbers of detailed transactions can be high.
2. There are increased processing power and data storage needs at the central location.
3. There is a reduction in local accountability.
4. Input/output bottlenecks may occur at high traffic times.
5. There may be a lack of ability to respond in a timely manner to information requests from remote locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List and explain the steps in batch processing.

A

Batch processing is accomplished in two steps:

  1. Create a Transaction File: The first step is to create the transaction file by manually (usually) keying the data (data entry), editing the data for completeness and accuracy, and making any necessary corrections.
  2. Update the Master File: The second step is to update the master file by sorting the transaction file into the same order as the master file and then updating the relevant records in the master file from the transaction file.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the major distinction between batch processing and online processing?

A

The major distinction between batch processing and online processing is that transactions in a batch processing system are processed in batches and not necessarily at the time those transactions are submitted. In online processing, transactions are processed as the transactions are entered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Identify functions that should be segregated in an IT department.

A

The duties of systems analysts, computer programmers, and computer operators should be segregated (although many companies combine systems analysts and computer programmers).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the three types of programmed controls?

A

Programmed controls are:

  1. Input controls
  2. Processing controls
  3. Output controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the five steps of the system development life cycle (SDLC)?

A
  1. Systems analysis
  2. Operations and maintenance
  3. Implementation and conversion
  4. Conceptual design
  5. Physical design
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the three main functions of internal control objectives?

A
  1. Preventive
  2. Detective
  3. Corrective
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the objective of executive systems (EIS)?

A

Executive information systems (executive support systems) provide senior executives with immediate and easy access to internal and external information to assist executives in monitoring business conditions. EIS assist in strategic, not daily, decision making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the decision support system (DSS)?

A

A decision support system is a computer-based information system that provides interactive support for managers during the decision-making process. A DSS is useful for developing information directed toward making particular decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are transaction processing systems?

A

Transaction processing systems are the systems that process and record the routine, daily transactions necessary to conduct business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the objective of management information systems (MIS)?

A

To provide managerial and other end users with reports. These predefined management reports provide managers with the information they need to assist them in the business decision-making process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the five focus areas of the COBIT framework?

A
  1. Strategic alignment
  2. Value delivery
  3. Resource management
  4. Risk management
  5. Performance measurement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are information criteria described by COBIT?

Hint: Remember the ICE RACE

A
Integrity
Confidentiality
Efficiency
Reliability
Availability
Compliance
Effectivenesss
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Why is it important to have segregation of duties between computer operators and computer programmers?

A

It is important that computer operators’ and computer programmers’ duties be segregated because a person performing both functions would have the opportunity to make unauthorized and undetected program changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What characteristics of a computerized system might lead to a higher potential for errors and irregularities than in manual systems?

A

The characteristics of a computerized systems that might lead to a higher potential for errors and irregularities than in manual systems include the following:

  1. The following for remote access increases the likelihood for unauthorized access.
  2. Concentration of information means that once security is breached, the potential for damage is higher.
  3. Decreased human involvement in processing results in a decreased opportunity for observation of errors.
  4. Errors or fraud might occur in the design or maintenance of application programs.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Why is it important to safeguard files and records?

A

Safeguarding of files and records is important because inadequate protection may result in loss or damage that might drive an organization out of business; hardware can always be replaced, but data often cannot be.

25
Q

What is encryption?

A

Encryption involves using a password or a digital key to scramble a readable (plaintext) message into an unreadable (ciphertext) message. The intended recipient of the message then uses either the same or another digital key (depending on the encryption method) to convert the ciphertext message back into plaintext.

26
Q

What characteristics should a password management policy address?

A
  1. Password Length: The longer the better. Passwords should be greater than seven characters. Many organizations standardize on eight characters.
  2. Password Complexity: Complex passwords feature three of the following four characteristics: uppercase characters, lowercase characters, numeric characters, and ASCII characters (e.g., !@#$%^&*?).
  3. Password Age: The National Security Agency (NSA) recommends that passwords should be changed every 90 days. Administrative passwords should be changed more frequently.
  4. Password Reuse: The NSA recommends that password resuse of the previous 24 passwords be restricted. The goal is to prevent users from alternating between their favorite two or three passwords.
27
Q

What are four types of policy?

A
  1. Program-level policy
  2. Program-specific policy
  3. Issue-specific policy
  4. System-specific policy
28
Q

Distinguish between digital signatures and e-signatures.

A

Digital signatures use asymmetric encryption to create legally binding electronic documents. Web-based e-signatures are an alternative mechanism for accomplishing the same objective. An e-signature is a cursive-style imprint of a person’s name that is applied to an electronic document.

29
Q

What defines an information security policy?

A

Information security policies state how an organization plans to protect its tangible and intangible information assets.

30
Q

How can the Internet be defined?

A

The Internet is an international network composed of servers around the world that communicate with each other.

31
Q

Identify the costs associated with implementing EDI.

A
  1. Legal costs
  2. Hardware costs
  3. Costs of translation software
  4. Costs of data transmission
  5. Process reengineering and employee training costs for affected applications
  6. Costs associated with security, monitoring, and control procedures.
32
Q

Define B2B transactions and identify the three different markets.

A

When a business sells its products or services to other businesses, it is called a Business-to-Business (B2B) transaction.

  1. B2B e-Commerce: Many businesses buy, sell, or trade their products and services with other businesses.
  2. Electronic Market: It is very common for B2B transactions to occur electronically via the Internet.
  3. Direct Market: It also is very common for B2B transactions to occur electronically between businesses when there is a preexisting relationship.
33
Q

Identify some advantages of B2B e-Commerce.

A
  1. Speed
  2. Timing
  3. Personalization
  4. Security
  5. Reliability
34
Q

Define electronic funds transfer (EFT) systems.

A

EFT systems are a major form of electronic payment for banking and retailing industries. EFT uses a variety of technologies to transact, process, and verify money transfers and credits between banks, businesses, and consumers. The Federal Reserve wire system is used very frequently in EFT to reduce the time and expense required to process checks and credit transactions.

35
Q

Define EDI.

A

EDI is the computer-to-computer exchange of business transaction documents.

36
Q

How are EDI transactions submitted, and what is mapping?

A

EDI transactions are submitted in a standard data format.

Mapping is the process of determining the correspondence between elements in a company’s terminology and elements in standard EDI terminology.

37
Q

What are the characteristics and features of EDI?

A

The characteristics and features of EDI are the following:

  1. EDI allows the transmission of electronic documents between computer systems in different organizations.
  2. EDI reduces handling costs and speed transaction processing.
  3. EDI requires that all transactions be submitted in a standard data format.
  4. EDI can be implemented using direct links, VANs, or over the Internet.
38
Q

What are some controls for an EDI system?

A

Controls for an EDI system might include:

  1. Encryption of data.
  2. Activity logs of failed transactions.
  3. Network and sender/recipient acknowledgments.
39
Q

What is e-Commerce?

A

E-Commerce involves electronic consummation of exchange transactions. E-Commerce normally implies the use of the Internet.

40
Q

What are the risks in a business information system?

A

The risks in a business information system are:

  1. Strategic risk
  2. Operating risk
  3. Financial risk
  4. Information risk
41
Q

What are access controls?

A

Access controls limit access to documentation, data files, programs, and computer hardware to authorized personnel. Examples include locks, passwords, user identification codes, assignment of security levels, callbacks on dial-up systems, the setting of file attributes, and the use of firewalls.

42
Q

What is a firewall?

A

A firewall is a system, often both hardware and software, of user identification and authentication that prevents unauthorized users from gaining access to network resources.

43
Q

What is disaster recovery and what is the difference between a hot site and a cold site?

A

Disaster recovery consists of plans for continuing operations in the event of destruction of not only programs and data but also processing capability.

A hot site is an off-site location that is equipped to take over a company’s data processing. A cold site is an off-site location that has all of the electrical connections and other physical requirements for data processing but does not have the actual equipment.

44
Q

What are three types of backups?

A
  1. Full backup
  2. Incremental backup
  3. Differential backup
45
Q

What are three types of disaster recovery?

A
  1. Disaster recovery service
  2. Internal disaster recovery
  3. Multiple data center backups
46
Q

What are the three types of off-site location?

A
  1. Cold site
  2. Warm site
  3. Hot site
47
Q

What is the disadvantage of a disaster recovery and business continuity plan?

A

The disadvantage is the cost and effort required to implement the plan.

48
Q

Identify the four main functions of a DBMS.

A
  1. Database development
  2. Database entry
  3. Database maintenance
  4. Application development
49
Q

Identify seven components of a LAN.

A
  1. Node
  2. Workstation
  3. Server
  4. Network Interface Card (NIC)
  5. Transmission Media
  6. Network Operating System (NOS)
  7. Communications Device
50
Q

Identify the two types of networks that can be used to provide WAN communications services.

A

Value Added Network: Privately owned communication network that provides additional services beyond standard data transmission

Internet-Based Network: Uses Internet protocols and public communications channels to establish network communications

51
Q

List some of the features of a value added network (VAN).

A

A value added network:

  • Is privately owned
  • Provides additional services
  • Provides good security
  • Uses periodic (batch) processing
  • May be expensive
52
Q

List some of the features of an internet-based network.

A

An Internet-based network:

  • Uses public communications channels
  • Transmits transactions immediately
  • Is relatively affordable
  • Increases the number of potential trading partners
53
Q

What is the difference between an intranet and an extranet?

A

An intranet connects geographically separate LANs within a company, whereas an extranet permits specified external parties to access the company’s network.

54
Q

What is the basic difference between a database and a database management system?

A

A database is an integrated collection of data records and data files. A database management system (DBMS) is the software that allows an organization to create, use, and maintain a database.

55
Q

What is a data warehouse and what is data mining?

A

A data warehouse is a collection of databases that store both operations and management data.

Data mining is the processing of data in a data warehouse to attempt to identify trends and patterns of business activity.

56
Q

What are some advantages of a DBMS?

A

Advantages of a DBMS include:

  1. Data redundancy and inconsistency are reduced.
  2. Data sharing exists.
  3. Data independence exists.
  4. Data standardization exists.
  5. Data security is improved.
  6. Data fields can be expanded without adverse effects on application programs.
57
Q

What is the basic difference between WANs and LANs?

A

The basic difference between WANs and LANs is distance. LANs normally are within a fairly limited distance, and WANs allow a much longer distance.

58
Q

What are some of the similarities and differences between the Internet, intranets, and extranets?

A

The Internet, intranets, and extranets all use Internet protocols and public communication networks rather that proprietary protocols and networks so that the same browsers can be used.

Intranets connect LANs within a company. Extranets allow a company’s customers and suppliers to access the company’s network.