Info Systems and Comms Flashcards

1
Q

What is B2G?

A

Business to Government

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a master file?

A

Ledger or subsidiary ledger equivalent that holds accounts and account balance information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a data mart?

A

A specialized version of a data warehouse that contains data that is preconfigured to meet the needs of a specific department

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is XBRL (Extensible Business Reporting Language)?

A

A technology specifically designed to exchange financial information over the World Wide Web?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a back door?

A

A type of malware designed to let the attacker bypass the normal authentication process and enter the users system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an EDI system and its benefits?

A

An Electronic Database Interchange is where electronic business information is exchanged between two or more businesses
Benefits:
Faster transaction processing
Reduction in ordering costs
Reduction in lead time
Assurance of data due to standardized controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the steps of IT life cycle development?

A
Analysis
Design
Build
Test
Implement

(Design=technical architecture specification and a systems model
Development=programmers use the design specifications to develop the program and data files)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Is DBMS (database management software) considered middleware?

A

Yes (and software)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What component of a database is responsible for maintaining the referential integrity of the data in the system?

A

DBMS-Database Management System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is DDL?

A

Data Definition Language-
Defines the database structure and content by
creating tables and fields of information within the fields
(Data element names, their characteristics, and their relationship to one another)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What methods could internet businesses use to prevent unauthorized intruders from accessing proprietary information?

A

Data encryption
Password management
Digital signatures-(authenticates messages transmitted by determine that they had not been altered)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does public/private key encryption work?

A

Both the public and private keys can be used to encrypt and decrypt messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the characteristics of relational databases?

A

Flexible and useful for unplanned, ad hoc queries
Maintained on direct access devices
Stores data in table form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the benefits of a computerized accounting system over a manual system?

A

Combines functions that would be considered incompatible in a manual system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is program change control?

A

The practice of authorizing changes, approving test results, and copying development programs to a production library

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the disadvantages of flat file systems?

A

Program independence

Data redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the characteristics of online/real-time transaction processing?

A

Timeliness of information
Records are updated as transactions occur
Random access storage devices are normally required
Network access is required
Errors are detected and corrected as transactions are processed
Online transaction processing provides the most accurate and complete information for decision making

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Is hardware or software encryption more secure?

A

Hardware (software is more easily accessed and altered)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What activity is top priority in DRP?

A

Mission critical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How can data be prevented from mixing?

A

Boundary protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the makeup of the internet?

A

Gateways to allow mainframe computers to connect to personal computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the responsibility of an APPLICATION programmer when maintaining effective segregation of duties?

A

Code approved changes to a program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the CPU components?

A

ALU
Control unit
RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What documentation is useful in determining system construction?

A

Systems documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What documentation provides instructions on the use of the program including required data files, startup instructions, check points, etc

A

Operators documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What’s the most reliable form of electronic authentication?

A

Digital certificate (a background check is completed to confirm the identity of the requesting entity)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What databases use SQL computer language?

A

Nearly all relational databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What system is likely to include external data?

A

ESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are some types of application input controls?

A

Edit check
Reasonableness test
Batch control totals
Field (format) check (prevents a type of character from being used)
Validity check (comparing inputs to a list of valid items)
Check digit (adding an extra digit to a number and that digit has a mathematical relationship to the other numbers [the numbers may be subjected to an algorithm])

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Where should copies of system data backup be stored?

A

Secure, off-site location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is a more efficient backup method than off-site backup files?

A

Checkpoint/restart controls (reprocess only those transactions that took place after the last valid run)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What factor is needed for successful data mining a large data store?

A

Pattern recognition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is a VAN and its benefit for EDI transactions?

A

A value added network is a privately owned network that route data transactions between trading partners. The benefit to EDI is the ability to deal with differing data protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What systems include redundancy of components?

A

Fault tolerant systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What are the minimum functions that should be segregated in computer systems?

A

Programming
Operating
Library functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What controls are found in batch processing systems?

A

Check digits
Financial control totals
Limit checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What input control is associated with online real-time systems?

A

Closed loop verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is the primary function of the DBMS?

A

Create and modify the database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Why are computer input controls designed?

A

Ensure that data received for processing are properly authorized and converted to machine readable form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is a VPN?

A

A virtual private network is a secure way to create an encrypted communication tunnel to allow remote users secure access to the internet. The VPN uses authentication to identify users and encryption to prevent unauthorized users from intercepting data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What does it mean to use a batch processing method and a detailed posting type for transactions?

A

Transactions are assigned to groups before posting, and each transaction had its own line entry in the appropriate ledger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is the first step of a disaster recovery plan?

A

Prepare a statement of responsibilities for the tasks included in a disaster recovery plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What are the characteristics of intranets?

A

Intranets are implemented using internet protocols

Training time for intranet based apps are lower than programs using LANs

Intranets connect LANs from various locations within a company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is the function of an accounting system header?

A

Identify data records

Used in conjunction with magnetic tape will likely prevent errors by the computer operator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is included in a disaster recovery plan?

A
Alternate processing site
Backup and off-site storage procedures
Identification of critical applications
Test of the plan
(names and vendor locations, current hardware configurations, names of team members, etc.)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is the three-tiered architectural layers of most client/server applications?

A

Desktop client
Application
Database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What machine-language program results from the translation of a symbolic-language (source) program (readable by humans)

A

Object program (machine readable)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

How can proof of unauthorized transactions be uncovered?

A

Transaction logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is a Trojan horse?

A

A seemingly legitimate program that contains an unauthorized code that performs malicious activities when the program is run. They often provide a back door to the victims system, enabling the hacker to gain access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What increases password strength?

A

Length
Numbers
Letters (upper and lower)
Special characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What are the categories of computer software?

A

Application software
System software
Programming languages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What is the responsibility of a network administrator?

A

Maintaining the hardware and software aspects of a computer network (including remote access).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What is the multi-location system structure that is sometimes called the “goldilocks” solution because it seeks to balance design tradeoffs?

A

Distributed (a compromise between centralized and decentralized computing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What type of area network uses dedicated lines?

A

LAN (local area network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What type of transmission media and protocol is cellphone to earpiece communication?

A

Bluetooth (designed for short-range, low power communication)

56
Q

What are some ETF transaction?

A

Direct deposit
ATM
POS terminal payment

57
Q

What practices are needed for small business computing?

A

Backup procedures
Additional computing supervision
Independent third-party review

58
Q

What are the characteristics of a VAN?

A

Value added networks-
Costly
Increase security
Eliminated numerous point to point connections
Reduce communication and data protocol problems

59
Q

What are the types of disaster recovery plans?

A
Hot site (location equipped with redundant hardware and software configurations)
Cold site
Reciprocal agreement (two org agree to aid each other)
60
Q

What functions should an application programmer have to maintain segregation of duties?

A

Code approved changes to a program

61
Q

What method allows customers to pay for goods or services from a website while maintaining privacy?

A

E-cash

The payer is not identified by the method of payment

62
Q

What is mirroring?

A

Mirroring is a high-cost, high reliability approach to backup that is common in e-commerce applications. It provides continuous duplication of data in a different location

62
Q

How could programmer fraud be detected?

A

Periodic compiling of programs from documented source files, and comparison with the programs already in use

62
Q

What critical accounting function is most likely absent in a small business computing environment?

A

Authorization, there is a great need for third-party review and testing within the small business computing environment

( spreadsheets should be reviewed and tested by an independent third party)

63
Q

What is the most critical item to include in a systems specification document for a financial report?

A

Data elements needed

64
Q

Today’s organizations use microcomputers for data presentation over mainframe for what reason?

A

Cost effective

65
Q

What increases the security of E-commerce business?

A

Successful use of a firewall will help assure the security of a firm’s computer system

66
Q

What is a TPS?

A

Transaction Processing Systems support the day to day activities of the business (purchases, sales, cash collection, payroll, etc)

67
Q

How does batch processing occur?

A

Transactions are gathered together in a group and then keyed into a transaction file. Periodically, the transaction file is edited, sorted, and then the transactions are used to update the master file

68
Q

What is an example of Online Analytical Processing?

A

A data warehouse (storage comprised mostly of historical operational data)

69
Q

What IT functions should be segregated?

A

Data entry

Application programming

70
Q

What is a system where the end user is responsible for development and execution of the computer application used?

A

End-user computing

71
Q

When computer program controls detect errors, the error report should be reviewed and followed up by who?

A

The control group should handle that internal audit function

72
Q

What enhances controls of a computer operations dept?

A

Mandatory vacations
Periodic rotation of operators
Controlled access to the facility
Segregation of personnel who are responsible for controlling input and output

73
Q

What is the data control protocol used to control transmission on the internet?

A

TCP/IP (transmission control protocol/internet protocol)

74
Q

At what stage does data conversion occur?

A

Implementation (the process of moving from the old system to the new system)

75
Q

What areas of responsibility are normally assigned to a SYSTEM programmer in a computer system environment?

A

Maintaining system software such as:
Operating systems
Compilers

76
Q

What is the difference between SaaS and PaaS?

A

SaaS (the use of the cloud to access software and programs)

PaaS (the use of the cloud to create software and programs)

77
Q

How does a denial of service attack work?

A

A web server is overwhelmed with a sudden surge of false requests that causes the server to crash

78
Q

Adding and updating documentation items in the data dictionary should be restricted to who?

A

Database administrators

79
Q

What are the risks of e-commerce?

A

Authentication
Integrity
Security and confidentiality

80
Q

What is the ascending hierarchy of data in a system?

A

Character
Field
Record
File

81
Q

In a client/server environment, who is usually the client?

A

Computers of various users (computer or workstation of the individual user)

82
Q

What system most resembles a managerial accounting, budgeting system?

A

MIS (takes planning information data and compares it to actual results in periodic management reports)

83
Q

Data control language used in relational database is most likely to include commands used to control what?

A

Which users have various privileges relating to a database

84
Q

What language is related to the maintenance and querying of a database?

A

Data manipulation language

85
Q

What is the benefit of a single integrated database information system?

A

Increased data accessibility

86
Q

In COBIT, the process of reviewing system response time logs falls within what control process domain?

A

Monitor and evaluate (monitor the processes “M1” activity)

87
Q

What are ERPs?

A

Enterprise resource management systems are integrated packages that provide transaction processing, management support, and decision making support. They avoid many problems related to merging information from different departments, regions, or divisions

88
Q

Why is securing client/server systems complex?

A

Number of access points
Concurrent operation of multiple user sessions
Widespread data access and update capabilities

89
Q

What a major purpose of COBIT?

A

Guide managers, users, and auditors to adopt best practices related to the management of IT.

90
Q

What plan help ensure a timely recovery of business operations after a disaster?

A

BCM (Business Continuity Management)

The third step of BCM is determine business continuity strategies

91
Q

The management of changes to an application is part of what?

A

SPLMS (source program library management system)

92
Q

What are the system analyst responsibilities?

A

Designs the computer system (system goal and means to achieve them) based on the nature of the business and its information needs
Outlines the data processing system for the computer programmer with system flow charts

93
Q

What artificial intelligent systems can learn from experiences?

A

Intelligent agents
Neural networks
Case-based reasoning systems

94
Q

How are internal disk labels read?

A

Software

95
Q

Who is responsible for managing the flow of documents and reports in and out of the computer operations department?

A

Data control clerk

96
Q

What provides the most security for sensitive data stored on a personal computer?

A

Encrypting data files on the computer

97
Q

What should a fire suppression system in a computer facility avoid?

A

Halon chemicals (they are environmental hazards)

98
Q

When is a distributed processing environment beneficial?

A

Large volumes of data are generated at many locations and fast access is required

99
Q

What compensating control may detect/stop segregated functions from being performed by one person?

A

Computer logs

100
Q

When should OLRT or batch processing be used?

A

Online Real Time-transactions are continuous and interdependent
Batch Processing-periodic and independent

101
Q

What system uses checkpoints?

A

Batch because checkpoint and restart is an important backup procedure

102
Q

Who is responsible for an organization’s computer help desk function

A

Computer Prrstion Unut

103
Q

What strategy is important to managing security for mobile systems?

A

View-only access (which is a useful control on the ability of mobile devices to make changes in data

104
Q

What type of network is often used for EDI?

A

VAN

105
Q

Name a low cost, low quality wired transmission medium?

A

Twisted pair

106
Q

What role does OLAP and OLTP play in an ERP?

A

Online Analytical Processing incorporates data warehouse capabilities
Online Transaction Processing records daily operational transactions and makes them more visible in the system

107
Q

Who determines machine language for a specific computer?

A

The engineers who designed the computer

A programmer can not change the computer’s machine language

108
Q

What are the advantages of decentralized/distributed systems?

A

More responsive to end user needs
Reduced data transmission costs
Avoids input/output bottlenecks of high traffic periods

109
Q

What type of storage is best for a large volume of data that is unlikely to change often?

A

CD-ROM

110
Q

What are some of the five principles of COBIT 5?

A

Meeting stakeholder needs
Covering the enterprise end-to-end
Separating governance from management

111
Q

Who is responsible for the overall program logic and functionality?

A

Lead Systems Analyst

112
Q

What is a hardware control?

A

Echo check (checks for accuracy in data transmission)

113
Q

What are the characteristics of a WAN?

A

Inexpensive

Wide geographic coverage

114
Q

What is an EES?

A

Executive Support System that is a subset of DDS (decision support system) with emphasis on external data

115
Q

What are some characteristics of firewalls?

A

Include hardware and software components
Screen and block data packets from the system
Application firewalls control the execution of programs

116
Q

Who handles a source program after changes have been made and verified?

A

Production

operators handle programs that are already in use

117
Q

What is the difference between a hot site and a cold site?

A

A hot site has data and information processing capabilities in place before a disaster
(A cold site is a backup site that has not been stocked with equipment)

118
Q

What is the fiction of a physical access control?

A

Restricts access of hardware, programs, and data files to authorized individuals

119
Q

What is the benefit of a computer based transaction processing system over a manual one?

A

Efficiency of producing financial statements

120
Q

What is used to connect dissimilar networks?

A

Gateway (translates between two or more different protocol families)

121
Q

What controls are included in a disaster recovery plan that prevents interrupted information systems operation?

A

Backups and downtime controls

122
Q

What is the benefit of using EFT for international cash transactions?

A

Reduction in the frequency of data entry errors (electronic funds transfer minimize the need for entry of information)

123
Q

How could a small company increase its internal control effectiveness?

A

Engage the owner in direct participation in the activities, including financial record-keeping, of the business (it’s an important compensating control for small businesses)

124
Q

What are some secondary storage devices?

A

Flash drives
Magnetic disk
Optical disc (burns data onto a surface)

125
Q

What controls should be considered when designing the layout of a data processing center?

A

Access controls
Adequate power supply with surge protection
Risks related to other uses of electricity in the area

126
Q

What does encrypt and decrypt mean?

A

Encrypt=run the encryption algorithm forward

Decrypt=run the encryption algorithm backward

127
Q

What is an effective control related to person computing in small businesses?

A

Locking doors when offices are open and removing storage devices to secure locations

128
Q

What is a type of output control?

A

Distribution of reports

129
Q

What type of control is IT faculty controls?

A

General

130
Q

What implementation approach has been described as sink or swim?

A

Cold turkey (aka the plunge or Big Bang approach) drops the old and begins the new all at once

131
Q

What is a parity check?

A

It is designed to detect errors in data transmission

132
Q

What is data control language?

A

Commands used to control a database (who is able to read from and write to database sections)

133
Q

What is another name for a field?

A

Attribute

134
Q

What is a hash total?

A

A meaningless sum which normally has no use other than to prove completeness of the processed information)

135
Q

Why should computer operators not have access to detailed program listings?

A

They have the opportunity to modify the programs