IFTC Flashcards
Which of the following is not true? Relational databases
a. Are maintained on direct access devices.
b. Store data in table form.
c. Are flexible and useful for unplanned, ad hoc queries.
d. Use trees to store data in hierarchical structure.
Use trees to store data in hierarchical structure.
Graphical notations that show the flow and transformation of data within system or business area are called
Data flow diagrams.
Which of the following items would be most critical to include in systems specification document for financial report?
a. Cost-benefit analysis.
b. Training requirements.
c. Data elements needed.
d. Communication change management considerations.
Data elements needed.
What type of computerized data processing system would be most appropriate for a company that is opening new retail location?
Real-time processing.
First Federal has an on-line real-time system, with terminals installed in all of its branches. This system will not accept a customer’s cash withdrawal instructions in excess of $1,000 without the use of a “terminal audit key.” After the transaction is authorized by supervisor, the bank teller then pacesses the transaction with the audit key. This control can be strengthened by
Online recording of the transaction on an audit override sheet.
Companies now can use electronic transfers to conduct regular business transactions. Which of the following terms best describes system where an agreement is made between two or more parties to electronically transfer purchase orders, sales orders, invoices, and/or other financial documents?
a. Electronic funds transfer (EFT).
b. Electronic data processing (EDP).
c. Electronic data interchange (EDI).
d. Electronic mail (E-mail).
Electronic data interchange (EDI).
In an accounting information system, which of the following types of computer files most likely would be master file?
a. Cash receipts.
b. Cash disbursements.
c. Inventory subsidiary.
d. Payroll transactions.
Inventory subsidiary.
The primary objective of security software is to
Control access to information system resources.
A digital signature is used primarily to determine that a message is
Unaltered in transmission.
A system in which the end user is responsible for the development and execution of the computer application that he or she uses is referred to as
End-user computing.
An entity doing business on the Internet most likely could use any of the following methods to prevent unauthorized intruders from accessing proprietary information except:
a. Password management.
b. Digital certificates.
c. Data encryption.
d. Batch processing.
Batch processing.
Parity checks, read-after-write checks, and duplicate circuitry are computer controls that are designed to detect
Erroneous internal handling of data.
An overall description of database, including the names of data elements, their characteristics, and their relationship to one another, would be defined by using a
Data definition language.
The use of header label in conjunction with magnetic tape is most likely to prevent errors by the
Computer operator.
A brokerage firm has changed program so as to permit higher transaction volumes. After paper testing of the change, the revised programs were authorized and copied to the production library. This practice is an example of
Change control.
Bacchus, Inc. is large multinational corporation with various business units around the world. After fire destroyed the corporate headquarters and largest manufacturing site, plans for which of the following would help Bacchus ensure timely recovery?
a. Backup power.
b. Daily backup.
c. Business continuity.
d. Network security.
Business continuity.
When designing the physical layout of a data processing center, which of the following would be least likely to be necessary control?
a. Inclusions of an adequate power supply system with surge protection.
b. Consideration of risks related to other uses of electricity in the area.
c. Design of controls to restrict access.
d. Adequate physical layout space for the operating system.
Adequate physical layout space for the operating system.
Which of the following statements best characterizes the function of physical access control?
a. Provides authentication of users attempting to log into the system.
b. Minimizes the risk of incurring power or hardware failure.
c. Protects systems from the transmission of Trojan horses.
d. Separates unauthorized individuals from computer resources.
Separates unauthorized individuals from computer resources.
A fast-growing service company is developing its information technology internally. What is the first step in the company’s systems development life cycle?
Analysis.
Which of the following most likely represents a significant deficiency in the internal control?
a. The control clerk establishes control over data received by the information systems departments and reconciles totals after processing.
b. The systems pagrammer designs systems for computerized applications and maintains output controls.
c. The accounts payable clerk prepares data for computer processing and enters the data into the computer.
d. The systems analyst reviews applications of data processing and maintains systems documentation.
The systems pagrammer designs systems for computerized applications and maintains output controls.
What is a major disadvantage to using private key to encrypt data?
Both sender and receiver must have the private key before this encryption method will work.
Which of the following statements is correct regarding the Internet as commercially viable network?
a. Organizations must use firewalls if they wish to maintain security over internal data.
b. Companies must apply to the Internet to gain permission to create homepage to engage in electronic commerce.
c. Companies that wish to engage in electronic commerce on the Internet must meet required security standards established by the coalition of Internet providers.
d. The Internet is the only feasible method to conduct business electronically.
Organizations must use firewalls if they wish to maintain security over internal data.
Which of the following information technology (IT) departmental responsibilities should be delegated to separate individuals?
a. Data entry and antivirus management.
b. Data entry and quality assurance.
c. Network maintenance and wireless access.
d. Data entry and application programming.
Data entry and application programming.
To reduce security exposure when transmitting proprietary data over communication lines, a company should use
Cryptographic devices.