Chapter 4 Flashcards

1
Q

Name and briefly describe the five major components that make up the information technology of an organization

A

HARDWARE: Hardware is the actual physical computer or computer peripheral device

SOFTWARE: Software is the systems and programs that process data and turn that data into information

NETWORK: A network is made up of the communication media that allows multiple computers to share data and information simultaneously

PEOPLE: Many people have a role in IT, such as hardware technicians, network administrators, software developers, and end users

DATA: Data is raw facts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the five functions performed on data in a business information system?

A

The 5 functions performed on data are:

  1. Collect
  2. Process
  3. Store
  4. Transform
  5. Distribute
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe the normal series of events in an accounting information system (AIS)

A

The series of events in an AIS is as follows:

  1. The transactions data from source documents is entered into the AIS by an end user
  2. The original paper source documents are filed
  3. The transactions are recorded in the appropriate journal
  4. The transactions are posted to the general and subsidiary ledgers
  5. Trial balances are prepared
  6. Adjustments, accruals, and corrections are entered
  7. Financial reports are generated
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name and briefly describe 6 different types of MIS reports

A
  1. PERIODIC SCHEDULED REPORTS: the traditional reports that display information in a predefined format and are made available on a regular basis to end users of the system
  2. EXCEPTION REPORTS: reports produced when a specific condition or “exception” occurs
  3. DEMAND REPORTS: specific reports that can be printed on demand
  4. AD HOC REPORTS: a report that does not currently exist but that can be created on demand without having to get a software developer involved
  5. PUSH REPORTS: a report that can actually be “pushed” or sent to a computer screen or computer desktop
  6. DASHBOARD REPORTS: a report used by a company to present summary information necessary for management action
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the primary roles of business information systems?

A

The primary roles of business information systems are to:

  1. Process detailed data
  2. Assist in making daily decisions
  3. Assist in developing business strategies
  4. Take orders from customers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name the five functions performed on data by a business information system

A

The five functions performed on data in a business information system are:

  1. Collect
  2. Process
  3. Store
  4. Transform
  5. Distribute
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe the two types of processing used in a computerized environment

A

Batch processing–periodic processing

Online, real-time (OLRT) processing (often referred to as “online processing”)–immediate processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a batch control total and how does it differ from a hash total?

A

A batch control total (or batch total) is a manually calculated total that is compared to a computer-generated total as a means of testing the accuracy and completeness of the input and processing

Batch totals are used for numbers that are normally added, such as dollar amounts

Hash totals are used for numbers that are not normally added, such as account numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the distinction between centralized and decentralized (distributed) processing?

A

Centralized processing maintains data and performs data processing at one or more central locations

Decentralized processing occurs when computing power and processing are spread over many locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the advantages and disadvantages of centralized processing?

A

ADVANTAGES of Centralized Processing

  1. Data is secured better, once received
  2. Processing is consistent

DISADVANTAGES of Centralized Processing

  1. The cost of transmitting large numbers of detailed transactions can be high
  2. There are increased processing power and data storage needs at the central location
  3. There is a reduction in local accountability
  4. Input/output bottlenecks may occur at high traffic times
  5. There may be a lack of ability to respond in a timely manner to information requests from remote locations
  6. The entire organization may be vulnerable to problems incurred at a single location
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

List and explain the steps in batch processing

A

Batch processing is accomplished in two steps:

  1. CREATE A TRANSACTION FILE: The first step is to create the transaction file by manually (usually) keying the data (data entry), editing the data for completeness and accuracy, and making any necessary corrections
  2. UPDATE THE MASTER FILE: The second step is to update the master file by sorting the transaction file into the same order as the master file and then updating the relevant records in the master file from the transaction file
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the major distinction between batch processing and online processing?

A

The major distinction between batch processing and online processing is that transactions in a batch processing system are processed in batches and not necessarily at the time those transactions are submitted

In online processing, transactions are processed as the transactions are entered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the various categories of business information systems?

A

The categories of business information systems are:

  1. Transaction processing systems
  2. Decision support systems
  3. Management information systems
  4. Executive information systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Identify functions that should be segregated in an IT department

A

The duties of systems analysts, computer programmers, and computer operators should be segregated (although many companies combine systems analysts and computer programmers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are three types of programmed controls?

A

Programmed controls are:

  1. Input controls
  2. Processing controls
  3. Output controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the six steps of the system development life cycle (SDLC)?

A
  1. Systems analysis
  2. Conceptual and physical design
  3. Implementation and conversion
  4. Training
  5. Testing
  6. Operations and maintainance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the objective of executive information systems (EIS)?

A

Executive information systems (executive support systems) provide senior executives with immediate and easy access to internal and external information to assist executives in monitoring business conditions

EIS assist in strategic, not daily, decision making

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the decision support system (DSS)?

A

A decision support system is a computer-based information system that provides interactive support for managers during the decision-making process

A DSS is useful for developing information directed toward making particular decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are transaction processing systems?

A

Transaction processing systems are the systems that process and record the routine, daily transactions necessary to conduct business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the objective of management information systems (MIS)?

A

The objective of MIS is to provide managerial and other end users with reports

These predefined management reports provide managers with the information they need to assist them in the business decision-making process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the five focus areas of the COBIT framework?

A
  1. Strategic alignment
  2. Value delivery
  3. Resource management
  4. Risk management
  5. Performance measurement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are information criteria described by COBIT?

ICE RACE

A
  1. Integrity
  2. Confidentiality
  3. Efficiency
  4. Reliability
  5. Availability
  6. Compliance
  7. Effectiveness
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Identify the four domains and related process of the COBIT framework

A

The four domains and related processes of COBIT are:

Plan and Organize (Direct)

Acquire and Implement (Solution)

Deliver and support (Service)

Monitor and Evaluate (Ensure direction followed)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Why is it important to have segregation of duties between computer operators and computer programmers?

A

It is important that computer operators’ and computer programmers’ duties be segregated because a person performing both functions would have the opportunity to make unauthorized and undetected program changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Why is it important to safeguard files and records?

A

Safeguarding of files and records is important because inadequate protection may result in loss or damage that might drive an organization out of business; hardware can always be replaced, but data often cannot be

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is encryption?

A

Encryption involves using a password or a digital key to scramble a readable (plaintext) message into an unreadable (ciphertext message)

The intended recipient of the message then uses either the same or another digital key (depending on the encryption method) to convert the ciphertext message back into plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What characteristics should a password management policy address?

A
  1. PASSWORD LENGTH: The longer the better. Passwords should be greater than seven characters. Many organizations standardize on eight characters
  2. PASSWORD COMPLEXITY: Complex passwords feature three of the following four characteristics: upper case letters, lower case letters, numeric characters, and ASCII characters (e.g., ! @ # $ % ^ & * or ?)
  3. PASSWORD AGE: The national security agency (NSA) recommends that passwords should be changed every 90 days. Administrative passwords should be changed more frequently
  4. PASSWORD REUSE: The NSA recommends that password reuse of the previous 24 passwords be restricted. The goal is to prevent users from alternating between their favorite two or three passwords
28
Q

What are the four types of computer security policies?

A
  1. Program-level policy
  2. Program-framework policy
  3. Issue-specific policy
  4. System-specific policy
29
Q

Distinguish between digital signatures and e-signatures

A

Digital signature uses asymmetric encryption to create legally binding electronic documents

Web-based e-signatures are an alternative mechanism for accomplishing the same objective

An e-signature is a cursive-style imprint of a person’s name that is applied to an electronic document and is also considered legally binding

30
Q

What defines an information security policy?

A

Information security policies state how an organization plans to protect its tangible and intangible information assets

31
Q

How can the internet be defined?

A

The internet is an international network composed of servers around the world that communicate with each other

32
Q

Identify the costs associated with implementing EDI

A
  1. Legal costs
  2. Hardware costs
  3. Costs of translation software
  4. Costs of data transmission
  5. Process reengineering and employee training costs for affected applications
  6. Costs associated with security, monitoring, and control procedures
33
Q

Define B2B transactions and identify the three different markets

A

When a business sells its products or services to other businesses, it is called a Business-to-Business (B2B) transaction:

  1. B2B E-COMMERCE: Many businesses buy, sell, or trade their products and services with other businesses
  2. ELECTRONIC MARKET: It is very common for B2B transactions to occur electronically via the internet
  3. DIRECT MARKET: It also is very common for B2B transactions to occur electronically between businesses when there is a preexisting relationship
34
Q

Identify some advantages of B2B e-commerce

A
  1. Speed
  2. Timing
  3. Personalization
  4. Security
  5. Reliability
35
Q

Define electronic funds transfer (EFT) systems

A

EFT systems are a major form of electronic payment for banking and retailing industries

EFT uses a variety pf technologies to transact, process, and verify money transfers and credits between banks, businesses, and consumers

The federal reserve wire system is used very frequently in EFT to reduce the time and expense required to process checks and credit transactions

36
Q

Define EDI

A

EDI is the computer-to-computer exchange of business transaction documents in structured formats that allows for direct progressing of the data by the receiving system

37
Q

How are EDI transactions submitted, and what is mapping?

A

EDI transactions are submitted in a standard data format

Mapping is the process of determining the correspondence between elements in a company’s terminology and elements in standard EDI terminology

38
Q

What are the features of EDI?

A

The following are the features of EDI:

  1. EDI allows the transmission of electronic documents between computer systems in different organizations
  2. EDI reduces handling costs and speeds transaction processing
  3. EDI requires that all transactions be submitted in a standard data format
  4. EDI can be implemented using directed links, VANs, or over the internet
39
Q

What are some controls for an EDI system?

A

Controls for an EDI system might include:

  1. Encryption of data
  2. Activity logs of failed transactions
  3. Network and sender/recipient acknowledgements
40
Q

What is e-commerce?

A

E-commerce involves electronic consummation of exchange transactions

E-commerce normally implies the use of the internet but a private network can also be used

41
Q

How does EDI differ from e-commerce on a cost, security, speed, and network basis?

A

EDI vs. e-commerce includes the following comparisons

  1. COST: EDI is more expensive than e-commerce
  2. SECURITY: EDI is more secure than e-commerce
  3. SPEED: e-commerce is faster than EDI
  4. NETWORK: EDI uses VAN (private) and e-commerce uses the internet (public)
42
Q

Define and describe the purpose of BPR

A

Business process reengineering (BPR) is the analysis and design of business processes and information systems to achieve significant performance improvements

The purpose of BPR is to simplify the system, make it more effective, and improve the entity’s quality and service

43
Q

Define and describe the purpose of ERP

A

An enterprise resource planning system (ERP) is a cross-functional enterprise system that integrates and automates the many business processes and systems that must work together in various functions (e.g., manufacturing, distribution, human resources) of a business

44
Q

Supply chain management is concerned with what four characteristics of every sale?

A

Supply chain management is concerned with:

  1. Goods received should match goods ordered (What)
  2. Goods should be delivered by the date promised (When)
  3. Goods should be delivered to the location requested (Where)
  4. The goods’ cost should be the lowest possible (How much)
45
Q

Compare and contrast HTML, HTTP, and URL

A

Hypertext markup language (HTML) is a tag-based formatting language used for web pages

Hypertext transfer protocol (HTTP) is the communications protocol used to transfer web pages on the world wide web

Uniform resource locator (URL) is the technical name for a web address, which directs users to a specific location on the web

46
Q

What are the risks in a business information system?

A

The risks in a business information system are:

  1. Strategic risk
  2. Operating risk
  3. Financial risk
  4. Information risk
47
Q

Name the five threats in a computerized environment

A

The five threats in a computerized environment are:

  1. Virus
  2. Worm
  3. Trojan horse
  4. Denial-of-service attack
  5. Phishing
48
Q

What are access controls?

A

Access controls limit access to documentation, data files, programs, and computer hardware to authorized personnel

Examples include locks, passwords, user identification codes, assignment of security levels, callbacks on dial-up systems, the setting of file attributes, and the use of firewall

49
Q

What is a firewall?

A

A firewall is a system, often both hardware and software, of user identification and authentication that prevents unauthorized users from gaining access to network resources

50
Q

What is disaster recovery and what is the difference between a hot site and a cold site?

A

Disaster recovery consists of plans for continuing operations in the event of destruction of not only programs and data but also processing capability

A hot site is an off-site location that is equipped to take over a company’s data processing

A cold site is an off-site location that has all of the electrical connections and other physical requirements for data processing but does not have the actual equipment

51
Q

What are three types of backups to perform to recover lost data?

A
  1. Full backup
  2. Incremental backup
  3. Differential backup
52
Q

What are three types of disaster recovery?

A
  1. Disaster recovery service
  2. Internal disaster recovery
  3. Multiple data center backups
53
Q

What are the three types of off-site location?

A
  1. Cold site
  2. Warm site
  3. Hot site
54
Q

What is the disadvantage of a disaster recovery and business continuity plan?

A

The disadvantage is the cost and effort required to implement the plan

55
Q

Identify the four main functions of a DBMS

A
  1. Database development
  2. Database query
  3. Database maintenance
  4. Application development
56
Q

Identify nine components of a LAN

A
  1. Node
  2. Workstation
  3. Server
  4. Network interface card (NIC)
  5. Transmission media
  6. Network operating system (NOS)
  7. Communications device
  8. Communication/ Network protocols
  9. Gateways and Routers
57
Q

Identify the two types of networks that can be used to provide WAN communications services

A

VALUE ADDED NETWORK: Privately owned communication network that provides additional services beyond standard data transmission

INTERNET-BASED NETWORK: Uses internet protocols and public communications channels to establish network communications

58
Q

List some of the features of a value added network (VAN)

A

A value added network:

  1. Is privately owned
  2. Provides additional services
  3. Provides good security
  4. Uses periodic (batch) processing
  5. May be expensive
59
Q

List some of the features of an internet-based network

A

An internet-based network:

  1. Uses public communications channels
  2. Transmits transactions immediately
  3. Is relatively affordable
  4. Increases the number of potential trading partners
60
Q

What is the difference between an internet and an extranet

A

An intranet connects geographically separate LANs within a company, whereas an extranet permits specified external parties to access the company’s network

61
Q

What is the basic difference between a database and a database management system?

A

A database is an integrated collection of data records and data files

A database management system (DBMS) is the software that allows an organization to create, use, and maintain a database

62
Q

What is a data warehouse and what data mining?

A

A data warehouse is a collection of databases that store both operations and management data

Data mining is the processing of data in a data warehouse to attempt to identify trends and patterns of business activity

63
Q

What are some advantages of a DBMS?

A

Advantages of a DBMS include:

  1. Data redundancy and inconsistency are reduced
  2. Data sharing exists
  3. Data independence exists
  4. Data standardization exists
  5. Data security is improved
  6. Data fields can be expanded without adverse effects on application programs
  7. Timeliness, effectiveness, and availability of information is enhanced
64
Q

What is the basic difference between WANs and LANs?

A

The basic difference between WANs and LANs is distance

LANs normally are within a fairly limited distance, and WANs allow a much longer distance

65
Q

What are some of the similarities and differences between the internet, intranets, and extranets?

A

The internet, intranets, and extranets all use internet protocols and public communication networks rather than proprietary protocols and networks so that the same browsers can be used

Intranets connect LANs within a company

Extranets allow a company’s customers and suppliers to access the company’s network