Information Technology Flashcards Preview

Audti > Information Technology > Flashcards

Flashcards in Information Technology Deck (70):
1

Operators

Programmers

Librarians

Information Technology

2

Designs or purchases IT system

Responsible for flowcharts

Liaison between Users and Programmers

Note: Think IT Manager

Information Technology

3

A Systems Administrator controls database access.

Information Technology

4

Writes- Updates- Maintains- & Tests software- systems- and compilers

Information Technology

5

In order to maximize internal control- a Systems Programmer should NOT have application programming duties/abilities or be an Operator on the system.

Information Technology

6

Schedules and Monitors Jobs

Runs IT Help Desk

Information Technology

7

For internal control purposes- they should not be a Programmer on the system.

Information Technology

8

Include Computer Logs.

Control Group should review the logs.

Information Technology

9

To assist with decision making.

Information Technology

10

A type of Management Information System (MIS) that processes accounting transactions.

Information Technology

11

Specialized for Company Executive needs

Assists with Strategy Only

No Decision-Making Capabilities

Information Technology

12

Computer uses reasoning

Structured

No human interpretation needed

Information Technology

13

Computer provides data

Gives Interactive Support

Human interpretation needed

Information Technology

14

User initiates the report.

The report is created upon demand.

Information Technology

15

Exception reports are produced when Edit Tests- Check Digits- or Self-Checking Digits identify a problem

Information Technology

16

A type of Ad Hoc report- initiated by a user.

Information Technology

17

The User develops and executes their own application.

Information Technology

18

E-commerce makes business transactions easier.

Information Technology

19

Compromised data or theft.

Less paper trail for auditors.

Information Technology

20

Uses globally-accepted standards

Efficient

Information Technology

21

A file server stores shared programs and documents.

Information Technology

22

Located on a File Server- a Database allows users to share documents.

Information Technology

23

It connects computers in close proximity.

Information Technology

24

It connects computers that are far apart.

Information Technology

25

Privately-owned Network

Serves as 3rd Party Between 2 Companies

Routes EDI Transactions

Accepts wide range of Protocols

Very Costly

Information Technology

26

Prevents unauthorized access to a network.

Information Technology

27

Takes over a computer

Needs a host program to run

Information Technology

28

Takes over multiple computers

Doesn't need a host program to run

Information Technology

29

They prevent and detect hardware errors.

Information Technology

30

Random Access Memory.

Internal memory in the computer used during immediate processing.

Information Technology

31

Computer Processing Unit

It processes commands within a computer.

Information Technology

32

It schedules and allocates system resources.

Information Technology

33

Keyboard
Mouse
Scanner
Magnetic Ink Reader
Magnetic Tape Reader
EDI
Point of Sale Scanner

Information Technology

34

Speakers

Monitors

Printers

Information Technology

35

Sequential Access - Sorts data in order

Slower data retrieval

Header Label prevents Operator error by loading wrong tape

External Labels prevent accidental destruction by operator

Information Technology

36

Random Access - Finds data in random spots

Faster data retrieval

Uses Boundary Protection for data

Information Technology

37

Connects one network to another

Note: the Internet is connected by Gateways

Information Technology

38

A control that detects internal data errors.

A bit is added to each character- it checks to see if a bit was lost.

Information Technology

39

Transmitted data is returned to the sender for verification (it echoes back to the sender)

Information Technology

40

It authorizes program changes and approves program test results.

Information Technology

41

Software that controls access to IT systems.

Note: Don't confuse this with anti-virus software

Information Technology

42

It confirms a message has not been altered.

Information Technology

43

PDA/Smartphone/Tablet

Microcomputer - PC- Laptop (cost-effective)

Minicomputer - Like a Mainframe- but smaller

Mainframe - Large computer with terminals attached

Supercomputer - Very powerful and very big

Information Technology

44

Bit - 1 (on) and 0 (off)
Byte - 8 bits to a byte/character
Field - group of related characters/bytes (i.e. Name- Zip Code- Serial #)
Record - Group of related fields (i.e. Member name- address- phone number)
File - Group of related records (i.e. Membership directory)

Information Technology

45

Determine language used for a specific computer- on a computer-to-computer basis

Information Technology

46

Programs written in base computer language- not similar to English.

Information Technology

47

They are written in a language close to English.

Information Technology

48

Takes Source language (English) and converts to Object (Computer) Language

Information Technology

49

It uses a Data Warehouse to support management decision making.

Information Technology

50

Using artificial intelligence and pattern recognition to analyze data stores within a Data Warehouse.

Information Technology

51

To process a company's routine transactions.

Information Technology

52

Data held- updates multiple files all at once

Leaves a better audit trail

Uses Grandfather-Father-Son backup (3 levels of backup kept in 3 locations)

Information Technology

53

Checks to see if output data is valid- distributed and used in an authorized manner.

Information Technology

54

Checks if data processing produced proper output

Information Technology

55

An input control number- a meaningless sum of values included in the input.

Example would be summing a list of SSNs to make sure the data is the same once entered as it was prior to input into the system.

Information Technology

56

Checks to see if data in existing tables or files belongs in the set

For example- is there a # in an alpha-only field or a letter in a numeric-only field

Information Technology

57

Checks to see if numbers surpass a certain limit- i.e. in an age field is the number greater than 110.

Information Technology

58

An input control that adds an identification number to a set of
digits - usually at the end

Information Technology

59

An input check that prevents invalid characters- i.e. checks for alphabetic letters in a SSN field

Information Technology

60

A disaster recovery system where if the main system goes down- a Hot Site is ready to take over immediately.

Information Technology

61

If a main system goes down- a Cold Site will take time to get set up and running.

Information Technology

62

SQL - Standard Query Language

Information Technology

63

Defines SQL Database

Controls SQL Tables

Information Technology

64

Queries SQL Database tables

Information Technology

65

Controls Access to SQL Database

Information Technology

66

Logical structure

Uses rows and columns similar to spreadsheet

Information Technology

67

Has various levels

Uses trees to store data

Information Technology

68

Data is more accessible

Reduced redundancy

Information Technology

69

Cost of installation

Skilled personnel required to maintain

Information Technology

70

Desktop client

Application Server

Database Server

Think: Your desktop computer runs applications and saves to a database

Information Technology