Information Technology Flashcards

1
Q

IC

Which IT personnel roles should always be segregated?

A

Operators

Programmers

Librarians

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IC

Systems Analyst duties

Note: Think IT Manager

A

Designs / purchases IT system

Flowcharts

Liaison Users and Programmers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IC

Systems Administrator duties

A

Primary: Control database access.

Writes- Updates- Maintains- & Tests

Software, Systems and compilers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IC

Duties a Systems Programmer should NOT have?

A

APPLICATION programming

Operator on the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IC

Systems Operator duties

A

Schedules and Monitors Jobs

Runs IT Help Desk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IC

Duties a System Operator should NOT have?

A

Should not be a Programmer on the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IC

If it is not possible to segregate duties in an IT System-

what actions should be taken to compensate for internal control purposes?

A

Include Computer Logs.

Control Group should review the logs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SYSTEMS

Management Information System (MIS) purpose

A

provide past, present, future information

for planning, organizing, controlling operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SYSTEMS

What is an Accounting Information System (AIS)?

A

A type of MIS that processes accounting transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SYSTEMS

Executive Information System (EIS) characteristics

A

Specialized for Company Executive needs

Assists with Strategy Only

No Decision-Making Capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SYSTEMS

Expert System (ES) characteristics

* type of AI

A

Computer uses reasoning methods to data

Structured

No human interpretation needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SYSTEMS

Decision Support System (DSS) characteristics

A

Computer combines models and data to resolve unstructured problems.

Gives Interactive Support

Human interpretation needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ad Hoc computer report characteristics

A

User initiated

on demand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IC - APPLICATION CONTROL

When are Exception reports generated?

A

When Edit Tests- Check Digits- or Self-Checking Digits identify a problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is End-User Computing?

A

The User develops and executes their own application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

E-COMMERCE

Risks

A

Security

Availability

Processing Integrity

Online Privacy

Confidentiality

Compromised data or theft.

Paper trail for auditors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

E-COMMERCE

Benefit

A

Easier business transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

E-COMMERCE

EDI benefits

A

Uses globally-accepted standards

Quick

Accurate

Efficient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a File Server?

A

Stores shared programs and documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

INTERNET

VAN (Value-Added Network) characteristics

A

Costly

Privately-owned Network

3rd Party Between 2 Companies Routes EDI Trx

Accepts wide range of Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

LAN (Local Area Network)

purpose

A

It connects computers in close proximity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

INTERNET

WAN purpose

A

It connects computers that are far apart.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

INTERNET

What is the purpose of a Firewall?

A

Prevents unauthorized access to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

INTERNET

What are the characteristics of a virus?

A

Takes over a computer

Needs a host program to run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
INTERNET What are the characteristics of a computer worm?
Takes over multiple computers Doesn't need a host program to run
26
What is RAM?
Internal memory in the computer used during immediate processing.
27
What is a CPU?
Processes commands within a computer.
28
Input devices?
Scanner Magnetic Ink Reader Magnetic Tape Reader EDI Point of Sale Scanner
29
SOFTWARE What is Job Control Language?
It schedules and allocates system resources.
30
What is the purpose of Automated Equipment Controls?
They prevent and detect hardware errors.
31
Magnetic Disks characteristics?
Random Access - Finds data in random spots Faster data retrieval Uses Boundary Protection for data
32
IC What are Parity Checks?
A control that detects internal data errors. A bit is added to each character- it checks to see if a bit was lost.
33
IC What is an Echo Check?
Transmitted data is returned to the sender for verification (it echoes back to the sender)
34
IC What is a Change Control?
It authorizes program changes and approves program test results. Code comparison program can compare controlled copy of s/w with in-use s/w
35
What is a Gateway?
Connects one network to another Note: the Internet is connected by Gateways
36
What is security software?
Software that controls access to IT systems. ..not anti-virus software
37
Purpose of a Digital Signature?
It confirms a message has not been altered.
38
Sys Dev What is the duty of a design engineer?
Determine language used for a specific computer on a computer-to-computer basis
39
SOFTWARE How can source programs be recognized?
They are written in a language close to English.
40
SOFTWARE Purpose of a Compiler?
Takes Source language (English) and converts to Object (Computer) Language
41
INPUT VALIDATION What is a hash total?
An input control number a meaningless sum of values included in the input.
42
PROCESSING How does Online Analytical Processing work?
It uses a Data Warehouse to support management decision making.
43
PROCESSING What is Data Mining?
Using artificial intelligence and pattern recognition to analyze data stores within a Data Warehouse. Explain, confirm, explore relationships
44
PROCESSING Purpose of online transaction processing?
To process a company's routine transactions.
45
PROCESSING Characteristics of batch processing?
Data held- updates multiple files all at once Leaves a better audit trail Uses Grandfather-Father-Son backup (3 levels of backup kept in 3 locations)
46
Processing control check?
Checks if data processing produced proper output
47
INPUT VALIDATION Validity check
Checks to see if data in existing tables or files belongs in the set For example- is there a # in an alpha-only field or a letter in a numeric-only field
48
INPUT VALIDATION Limit check?
Checks to see if numbers surpass a certain limit i.e. in an age field is the number greater than 110.
49
INPUT VALIDATION Check digit?
An input control that adds an identification number to a set of digits – usually at the end
50
INPUT VALIDATION Field check?
An input check that prevents invalid characters i.e. checks for alphabetic letters in a SSN field
51
What is Data Mining?
Using artificial intelligence and pattern recognition to analyze data stores within a Data Warehouse.
52
Cold Site?
If a main system goes down- a Cold Site will take time to get set up and running.
53
DATA STRUCTURES What is the most common database language?
SQL - Standard Query Language DDL (definition) DML (manipulation) DCL (control)
54
DATA STRUCTURE DDL What is a Data Definition Language?
Defines SQL Database Controls SQL Tables
55
DATA STRUCTURE DML What is a Data Manipulation Language?
Queries SQL Database tables Maintain - update, insert, modify
56
DATA STRUCTURE DCL What is a Data Control Language?
Controls Access to SQL Database
57
DATA STRUCTURE Relational Database characteristics
Logical structure Uses rows and columns similar to spreadsheet
58
DATA STRUCTURE Hierarchical Database characteristics
Has various levels Uses trees to store data
59
DATA STRUCTURE Database advantages
Data is more accessible Data independence from Apps Reduced redundancy
60
Sys Dev - Overall lifecycle
* Plan * Analysis * Design * Develop * Testing * Implement * Maintain
61
DATA STRUCTURE Database disadvantages
Cost of installation Skilled personnel required to maintain
62
DATA STRUCTURE Components of a database?
Desktop client Application Server Database Server Think: Your desktop computer runs applications and saves to a database
63
What is the most common database language?
SQL - Standard Query Language
64
Sys Dev - Planning
* Id problem * Define system based on strategic goals * Scope determination * Project Plan development * Initial feasibility
65
Sys Dev - Analysis
Terms to understand: * Requirements * Model * Needs Assessment * Gap Analysis from current sys * System specification documents
66
Sys Dev - Design
Technical blueprint
67
Sys Dev - Development
Off-the-shelf or customized platform
68
Sys Dev - Testing
Unit (code) System Integration User Acceptance
69
Sys Dev - Implementation
Parallel Plunge Pilot Phased
70
Sys Dev - Maintenance
Monitor Support Training Help Desk Authorized Changes
71
SOFTWARE Operating System
Job Control Language for: Scheduling Resource allocation data retrieval
72
SOFTWARE Multi - processing
simultaneous execution of tasks same system, multiple CPU
73
SOFTWARE Multi - tasking
simultaneous processing of jobs
74
SOFTWARE Types of Source Programs
Machine Language Assembly High-level: COBOL, Basic, OOP (Object Oriented) C++, Java
75
SOFTWARE Desk checking
programmer review b4 run/debug
76
SOFTWARE Loop
Repeating program instructions
77
PROCESSING Data Warehouse
Periodic data dumps Subject oriented Integrated collection of data
78
DATA STRUCTURE Data Modeling
Entity-relationship modeling Primary key - individ records Foreign key - link relational db AIS REA data model - resource: object w/ economic value - event: bus activity - agent: people/org
79
DATA STRUCTURE Data Dictionary
data repository data directory stores meta-data
80
INTERNET Languages
HTML XML - extensible markup \* XBRL (XML for EDGAR)
81
ISACA COBIT Framework
COBIT Achieve objectives of: Governance and Mgt Enterprise IT Systematic integration with Biz strategies
82
ISACA COBIT Principles (5)
1. Meet Stakeholder needs 2. Cover enterprise end-to-end 3. Apply single integrated framework 4. Enable holistic approach 5. Separate governance from management
83
ISACA COBIT Enablers (7)
1. Processes 2. Org Structure 3. Culture 4. Policy - Principles 5. Information produced/used 6. Infrastructure 7. People competencies
84
IC ICHAMB \*O\*
Org structure segregation of Development and Data processing
85
IC General Control Activities
Developing new systems Changing existing Access to data / app Computer operations
86
BUSINESS CONTINUITY Plan
Priorities Insurance Backup approach Individual Assignments Periodic Testing Documentation
87
FLOWCHARTs
Program: logic within application System: application interactions Audit/Document: dept to dept flow Dataflow: data and functions (paper/elect)
88
IC Controls are classified into
the preventative, detective, and corrective categories