BEC IT Flashcards

(105 cards)

1
Q

network

A

two or more computing devices connected by a communication channel to exchange data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are networks used for?

A

file sharing, links to email systems, enabling connections to printers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Node

A

device connected to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

T/F client nodes provide network resources

A

F - server node provides services and resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

T/F end users generally use the server directly

A

F - digitally or virtually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A client server network presides as the _______ of communication and grants _______ to network resources.

Used by the _______ and lacks ______ or ______.

A

mediator, access, internet, video screen or keyboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

peer to peer network (requires/doesn’t required) a central server.

A

require

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

in a client server environment, the “client” is likely to be the

A

workstation of various users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NIC/NAC

A

circuit boards and software that translate between network language and computer language.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

T/F computers contain NIC/NACs already so they can communicate with the network out of the box?

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Transmission media

A

communication link between nodes on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

twisted pair is what kind of transmission media?

A

wired

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

satellite microwave transmission is what kind of transmission media?

A

wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what are the wired transmission media?

A

twisted pair, coaxial cable, fiber optic cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

which is the most reliable, fastest, most expensive, and highest capacity wired cable?

A

fiber optics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

which is the least reliable, slowest, cheapest, and lowest capacity wired cable?

A

twisted pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what are satellite microwave transmissions used for?

A

cell phone and WANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What networks are bluetooth used in?

A

PAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

T/F bluetooth uses the same radio frequency as WIFI but with lower power consumption resulting in weaker connection

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what are the advantages of wireless vs wired?

A

wireless networks are scalable, flexible, often lower cost, mobile

wired communications are reliable, more secure, and faster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what is wifi used for?

A

spectrum radio transmission, home networks, LANS and WANS

less reliable than wired connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what kind of line does LAN use?

A

dedicated line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What do SANs do?

A

connect storage devices to servers and other devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

T/F SANs are local only

A

F - can be on a cloud purchased from a third party vendor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Match the crimes to the definitions: Email bombing Denial of Service Attack logic bomb Backdoor Man in the middle A. Hacker establishes a connection between two devices than then pretends to be each party thereby intercepting and interfering with messages. B. Attacking a computer by sending thousands of identical emails C. software allowing unauthorized access to a system by omitting normal logon procedures D. prevents legitimate user access by taking over zombie computers and flooding the system with incomplete requests to tie up the system E. Program planted in a system that is dormant until an event or a particular time
Man in the middle A, Email bombing B, Backdoor C, DOS D, logic bomb E,
26
Virus
form of malware that replicates itself within a system and may damage data
27
Worm
worm can replicate across many systems via email
28
T/F Viruses replicate over one system
T
29
T/F Viruses come through emails
F - worms do
30
What is a method of man in the middle attack?
eavesdropping
31
packet sniffer
formatted blocks of data carried by computer networks to monitor network packages or troubleshoot problems with network performance, but criminals can determine which packets may contain unsername and passwords
32
T/F accounting systems are always software based
F - way of getting raw data into FS
33
what does a well designed AIS need?
Audit trail
34
Put the steps of an AIS in order 1. transactions are posted to general and subsidiary ledger 2. original paper source documents are filed 3.transaction data from source documents is entered into the AIS by end user 4. transactions are recorded in appropriate journal 5. trial balances are prepared 6. financial reports are generated
3, 2, 1, 4, 5, 6
35
T/F information produced by AIS is made some levels of management for use in planning and controlling an organization's activities
F - available to all
36
T/F AIS is best suited to solve problems where there is ambiguity
F - requires certainty and clearly defined reporting processes
37
What is the AIS for revenue cycle focused on?
transactions associated with sales of goods or services that produce cash or other assets
38
Data addition
process of adding new records to a database
39
Updating
Revisions to an already existing file
40
What are the two ways to update a database?
OLRT processing Batch processing
41
Batch processing
Master files are only updated periodically
42
T/F batch processing has a timing delay
T
43
T/F batch processing sort transactions in a different order as the master file since they don't have to be in sequence
F
44
T/F batch processing is good for high volume, periodic transactions
F - low volume
45
what is a good type of record to use for batch processing
fixed assets
46
what are the steps of batch processing
1. creating transaction files/ data validation 2. master file is updated usually by sorting transaction files into the same order as the master file
47
how do we ensure what we processed in batch processing is what we intended to process
batch totals
48
what are batch totals
compare manual calculations to a computer generated total for the same batch
49
OLRT
continuous immediate processing method
50
T/F OLRT
each transaction goes through all processing steps before the next transaction is processed
51
T/F Batch processing uses random access storage devices and OLRT uses sequential device
F - batch processing uses sequential device and OLRT uses sequential device
52
why can't OLRT use sequential devices?
would have to be sorted and wouldn't be in real time
53
T/F OLRT used when transactions are high volume, and allows for better customer service
T
54
The POS system at a grocery store is an example of batch or OLRT processing?
OLRT
55
T/F OLRT is easier with to implement and for auditing
F
56
T/F a group of bits is a byte
T
57
Bit
individual zero or 1. Smallest piece of info that can be represented
58
T/F each attribute is stored in a field
T
59
Field
where each attribute is stored
60
record
all the information combined the one customer
61
entity
subject of the data ex) customer, employee, product
62
master file
stores cumulative information that is considered permanent
63
T/F master files are transaction files
F
64
data value
within each field are either numbers or letters
65
what is the correct hierarchy of data in a system file field character record
character, field, record, file
66
what correctly composes each other bytes data values fields records bits files
bytes are composed of bits data values are composed of bytes fields are composed of data values Files are composed of records
67
what is a set of logically related files?
database
68
flat file
all files stored sequentially
69
hierarchy or tree database
records have branches
70
what are the columns in a relational database called?
attributes/fields
71
what are the rows in a relational database called?
records
72
primary key
unique identifier in a table
73
T/F primary key values can appear multiple times
F - primary keys are values that only appear once
74
foreign key
primary key from a different table that are now secondary on a new table
75
T/F customer ID on the customer table would be a primary key for the customer table and a foreign key for sales order table
T
76
referential integrity
maintaining data consistency across related database tables
77
Referential integrity makes sure that any field in a table is declared a (primary/foreign key) and that the database remains _______
foreign, accurate and reliable
78
normalization
eliminates data redundancy and improve data integrity by ensuring that each piece of information is stored in the most logical place
79
T/F normalization is about structure and design and referential integrity is about consistency and rules
T
80
T/F primary keys contain null values
F
81
what are demands in SQL?
Clauses
82
Clauses make up a ______
statement
83
What is an example of a statement
Select, From, Where;
84
If goal is to select all columns from a table the statement should include a _____
*
85
If there is a condition, what clause is included?
Where
86
What are examples of aggregate functions?
SUM, Max, Min, Average, Count
87
What part of the statement does an aggregate function go?
Select "aggregate function"
88
What do each of the following aggregate functions do? Count SUM Max Min
Count - how many transactions involved Sum - total quantity sold Max - largest quantity Min - smallest quantity
89
what are examples of string functions?
length, INSTR,
90
T/F String values work on numeric values
F - only work on text values
91
What is the role of the applications development team?
Safeguard applications that are being developed
92
Where is new application created?
Test environment
93
What are the roles within application development?
System analyst and application programmer
94
what is the role of the system analyst?
analyzes and designs new applications
95
what is the role of application programmer?
writes new application in the test environment (software engineer)
96
what is the role of the systems admin and systems programming team?
maintains the operating system
97
what are the roles within systems admin and systems programming?
system programmer and system administrator
98
T/F because the role of a system programmer requires that they be in direct contact with the production programs and data, they (can/ can not) have access to information about application programs
Can not
99
What is the role of a system programmer?
maintain operating system
100
What is the role of system administrator?
provides access
101
T/F applications programmer and system analyst should have access to the live computer system?
F - design and write the program
102
what are the roles of application controls?
accuracy, validity, and completeness of data processing
103
what are the three application controls?
input and origination, processing and file controls, output controls
104
Automated data capture
data origination with scanners rather than manual data entry
105