Info Systems and Comms Flashcards
What is B2G?
Business to Government
What is a master file?
Ledger or subsidiary ledger equivalent that holds accounts and account balance information
What is a data mart?
A specialized version of a data warehouse that contains data that is preconfigured to meet the needs of a specific department
What is XBRL (Extensible Business Reporting Language)?
A technology specifically designed to exchange financial information over the World Wide Web?
What is a back door?
A type of malware designed to let the attacker bypass the normal authentication process and enter the users system
What is an EDI system and its benefits?
An Electronic Database Interchange is where electronic business information is exchanged between two or more businesses
Benefits:
Faster transaction processing
Reduction in ordering costs
Reduction in lead time
Assurance of data due to standardized controls
What are the steps of IT life cycle development?
Analysis Design Build Test Implement
(Design=technical architecture specification and a systems model
Development=programmers use the design specifications to develop the program and data files)
Is DBMS (database management software) considered middleware?
Yes (and software)
What component of a database is responsible for maintaining the referential integrity of the data in the system?
DBMS-Database Management System
What is DDL?
Data Definition Language-
Defines the database structure and content by
creating tables and fields of information within the fields
(Data element names, their characteristics, and their relationship to one another)
What methods could internet businesses use to prevent unauthorized intruders from accessing proprietary information?
Data encryption
Password management
Digital signatures-(authenticates messages transmitted by determine that they had not been altered)
How does public/private key encryption work?
Both the public and private keys can be used to encrypt and decrypt messages
What are the characteristics of relational databases?
Flexible and useful for unplanned, ad hoc queries
Maintained on direct access devices
Stores data in table form
What are the benefits of a computerized accounting system over a manual system?
Combines functions that would be considered incompatible in a manual system
What is program change control?
The practice of authorizing changes, approving test results, and copying development programs to a production library
What are the disadvantages of flat file systems?
Program independence
Data redundancy
What are the characteristics of online/real-time transaction processing?
Timeliness of information
Records are updated as transactions occur
Random access storage devices are normally required
Network access is required
Errors are detected and corrected as transactions are processed
Online transaction processing provides the most accurate and complete information for decision making
Is hardware or software encryption more secure?
Hardware (software is more easily accessed and altered)
What activity is top priority in DRP?
Mission critical
How can data be prevented from mixing?
Boundary protection
What is the makeup of the internet?
Gateways to allow mainframe computers to connect to personal computers
What is the responsibility of an APPLICATION programmer when maintaining effective segregation of duties?
Code approved changes to a program
What are the CPU components?
ALU
Control unit
RAM
What documentation is useful in determining system construction?
Systems documentation
What documentation provides instructions on the use of the program including required data files, startup instructions, check points, etc
Operators documentation
What’s the most reliable form of electronic authentication?
Digital certificate (a background check is completed to confirm the identity of the requesting entity)
What databases use SQL computer language?
Nearly all relational databases
What system is likely to include external data?
ESS
What are some types of application input controls?
Edit check
Reasonableness test
Batch control totals
Field (format) check (prevents a type of character from being used)
Validity check (comparing inputs to a list of valid items)
Check digit (adding an extra digit to a number and that digit has a mathematical relationship to the other numbers [the numbers may be subjected to an algorithm])
Where should copies of system data backup be stored?
Secure, off-site location
What is a more efficient backup method than off-site backup files?
Checkpoint/restart controls (reprocess only those transactions that took place after the last valid run)
What factor is needed for successful data mining a large data store?
Pattern recognition
What is a VAN and its benefit for EDI transactions?
A value added network is a privately owned network that route data transactions between trading partners. The benefit to EDI is the ability to deal with differing data protocols
What systems include redundancy of components?
Fault tolerant systems
What are the minimum functions that should be segregated in computer systems?
Programming
Operating
Library functions
What controls are found in batch processing systems?
Check digits
Financial control totals
Limit checks
What input control is associated with online real-time systems?
Closed loop verification
What is the primary function of the DBMS?
Create and modify the database
Why are computer input controls designed?
Ensure that data received for processing are properly authorized and converted to machine readable form
What is a VPN?
A virtual private network is a secure way to create an encrypted communication tunnel to allow remote users secure access to the internet. The VPN uses authentication to identify users and encryption to prevent unauthorized users from intercepting data
What does it mean to use a batch processing method and a detailed posting type for transactions?
Transactions are assigned to groups before posting, and each transaction had its own line entry in the appropriate ledger
What is the first step of a disaster recovery plan?
Prepare a statement of responsibilities for the tasks included in a disaster recovery plan
What are the characteristics of intranets?
Intranets are implemented using internet protocols
Training time for intranet based apps are lower than programs using LANs
Intranets connect LANs from various locations within a company
What is the function of an accounting system header?
Identify data records
Used in conjunction with magnetic tape will likely prevent errors by the computer operator
What is included in a disaster recovery plan?
Alternate processing site Backup and off-site storage procedures Identification of critical applications Test of the plan (names and vendor locations, current hardware configurations, names of team members, etc.)
What is the three-tiered architectural layers of most client/server applications?
Desktop client
Application
Database
What machine-language program results from the translation of a symbolic-language (source) program (readable by humans)
Object program (machine readable)
How can proof of unauthorized transactions be uncovered?
Transaction logs
What is a Trojan horse?
A seemingly legitimate program that contains an unauthorized code that performs malicious activities when the program is run. They often provide a back door to the victims system, enabling the hacker to gain access
What increases password strength?
Length
Numbers
Letters (upper and lower)
Special characters
What are the categories of computer software?
Application software
System software
Programming languages
What is the responsibility of a network administrator?
Maintaining the hardware and software aspects of a computer network (including remote access).
What is the multi-location system structure that is sometimes called the “goldilocks” solution because it seeks to balance design tradeoffs?
Distributed (a compromise between centralized and decentralized computing)
What type of area network uses dedicated lines?
LAN (local area network)