Chapter 8 Flashcards
(102 cards)
Definition of Hardware and Software?
Hardware -
Digital computer and peripheral equipment
Software -
Various programs and routines for operating the system
Advantages and disadvantages of IT-Based Systems
- May enhance reliability of financial information
- Process transactions uniformly
- Reduce human errors
May increase certain risks
Program defects may result in all transactions being processed incorrectly
Errors/fraud may not be as easily detectable
Systems possesses one or more of the following elements:
- Batch processing
- Online capabilities
- Database storage
- IT networks
- End user computing
The principle hardware component is known as the (CPU)
Central Processing Unit
- Uses a series of on and off circuits to communicate (binary language)
Application software includes programs designed to perform a specific data processing task. True or false?
True
Describe peripheral devices
Devices for inputting information (e.g., input terminals, scanners, electronic cash registers, bar code readers)
Devices for secondary storage (e.g., magnetic tape, magnetic disk, optical disk drives)
Devices for information output (e.g., display terminals, printers)
Define batch processing
Input data gathered and processed periodically in discrete groups. Often more efficient than other types of systems, but do not always provide up-to-minute information.
Example: Accumulate all of a day’s sales transactions and process them as a “batch” at end of day
Define IT Networks
Computers linked together through telecommunication links that enable computers to communicate information back and forth. Allows distributed data processing - resources, data, and programs shared by a large number of users based on their specifications (LAN and WAN)
Disadvantages of Database storage
Redundant information stored in several files
Increased storage costs
May cause data inconsistencies due to file discrepancies
Describe the three methods used to establish networks
Internet – exchange of information through remote locations
Intranet – internet software for use in closed networks
Extranet – intranets that include external business partners
Names of two types of Online Systems
Online transaction processing (OLTP):
- Process various types of transactions
- Individual transactions entered directly from the originators at remote locations
Online analytical processing (OLAP)
-Enables user to query a system for various analyses
Examples: Data warehouses, decision support systems, expert systems
Define End User Computing
User departments are responsible for the development and execution of certain IT applications. Involves a decentralized processing system – user department generates and uses its own information.
(non-programmers can create working applications to better integrate themselves into computing environment for problem-solving)
Define Electronic Data Interchange (EDI)
enable company and customers/suppliers to exchange business data electronically over a private line of communication (more secure than the internet) – must have strong IT controls to ensure privacy (e.g., firewalls, data encryption)
More automation reduces potential for human errors and increases potential for systematic errors. True or false?
True
Is audit trail necessary in printed form?
Not often in printed form, but definitely still necessary.
Define an End-user Application
designed with end user in mind for a specific, custom purpose. NOT a personal computer.
IT Responsibilities can be broken down into (there are a ton!)
Information systems Management
Systems Analysis
Application Programming
Database Administration
Data entry
IT Operations
Program and File Librarians
Data control
Telecommunication Specialists
systems Programming
Define Telecommunication Specialists
Responsible for maintaining and enhancing IT networks (including monitoring for improper access)
Which IT responsibility supervises the operation of the department and report to vice president of finance/controller, or serve on vice president level as CIO reporting directly to president
Information Systems Management
Which IT responsibility reviews and tests all input procedures, monitors processes, reviews exception reports, reprocesses exceptions, and reviews and distributes IT logs (also reviews operator intervention and library usage logs)?
Data Control
History shows the person responsible for frauds in many situations set up the system and controlled its modifications. True or False?
True, so segregation of duties.
Programming separate from controlling data entry
Computer operator from functions having custody or detailed knowledge of programs
Define IT Operations
Run and monitor central computers, maintain detailed log of all operator intervention (NOTE: vital for IT operations to be separate from programming to prevent unauthorized program changes)
Which responsibility is defined as follows: Prepare and verify input data for processing (today, typically done by user departments)
Data Entry
Which responsibility is responsible for designing the information system?
Systems Analysis