BEC 6 Flashcards

1
Q

the primary objective of data security controls

A

to ensure that storage media are subject to authorization prior to access, change, or destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

why must ensure segregation of duties of system analysts and computer programmers

A

SA design an information system to meet user needs where as CP use that design to write computer programs to create the IS. if the same person is in charge of hardware and software, that person can easily bypass security systems without anyone knowing and steal organizational information or assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

why must ensure segregation of duties of computer operators and computer programmers

A

if the same person in charge, that person can make unauthorized and undetected program changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

why must ensure segregation of duties of security administrator with computer programmers and operators

A

Security admin is in charge of restricting access to systems, applications, or databases to the appropriate personnel. if same person in charge of security admin with either CP or computer operator, the person could give him or herself or anyone access to areas that they are not authorized to enter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

characteristics of just in time system

A

Just-in-time has the goal to minimize the level of inventory carried. Typical characteristics include lot sizes equal to one, insignificant set-up times and costs, and balanced and level workloads. In a just-in-time environment, the flow of goods is controlled by a “pull” approach, where an item is produced only when it is needed down the line, and not a “push-through” system.
it usually results in a reduction in the number of suppliers. Because a company that adopts J-I-T is very dependent on supplier performance, usually fewer suppliers are used and a very close working relationship is developed with existing suppliers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what would be most beneficial to use JIT system

A

inventory carrying costs increasing and costs per purchase order decreasing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

five areas of focus for IT governance

A

strategic alignment, value delivery, resource management, risk management, performance measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

formula of calculating the expected monetary value of risk event

A

= costs to correct risk event * estimated risk probability + cost of risk event not occurring * remaining estimated risk probability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is Kaizen?

A

one type of lean manufacturing: Kaizen, or continuous improvement, occurs at the manufacturing stage where the ongoing search for cost reductions takes the form of analysis of production processes to ensure that resource uses stay within target costs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

data admin vs database admin

A

the data admin is in charge of design and control of the data in the data dictionary. A database administrator is responsible for the actual database software, while a data administrator is responsible for the definition, planning, and control of the data within a database or databases. The function of a database administrator is more technical, and the function of a data administrator is more administrative.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is EDI (electronic data interchange)

A

EDI (electronic data interchange) is the exchange of business transaction documents from one computer to another. Because this exchange is significantly faster than paper exchanges, inventory can be reordered (and ultimately received) much faster than with traditional ordering systems. As a result, an inventory stock out becomes much less of a risk. but It is not a tool used specifically for collaboration between humans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

gap analysis

A

Gap analysis determines the difference between industry best practices and current company practices. It focuses on quality as it identifies areas that need improvement to meet industry best practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

absolute conformance

A

Absolute conformance represents perfect compliance with pre-established levels of quality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

lean manufacturing

A

The main objective in lean manufacturing is waste reduction. Although customer requirements and demand-pull serve as the basis for the approach, quality is not the preeminent concept.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TQM

A

Total quality management is driven by customer satisfaction and continuous product improvement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

the theory of constraint

A

The theory of constraints is concerned with maximizing throughput by identifying and alleviating constraints.

17
Q

six sigma

A

Six Sigma is a quality improvement program that uses metrics to evaluate the achievement of goals. Improving current processes for the purpose of things like reducing defective product outputs is a big component of the program.
it emphasizes cost reduction above production constraints.

18
Q

activity-based costing

A

Activity-based costing focuses on value added by identifying the cost drivers that add value.

19
Q

data mining

A

Data mining involves looking at large databases and large data sets in order to derive new information. Given how much data is reviewed, there is bound to be previously undiscovered information that is identified in the process.

20
Q

backdoor

A

A backdoor is a means of access to a program or system that bypasses normal security mechanisms. Backdoors should be eliminated.

21
Q

BIS and allows business to perform functions of what

A

Business information system” is a general term for information technology that includes hardware, software, networks, people, and data.
Business Information Systems allow a business to perform the following functions on data: collect, process, store, transform, and distribute.