Information Technology Flashcards

1
Q

Which IT personnel roles should always be segregated?

A

Operators

Programmers

Librarians

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the duties of a systems analyst?

A

Designs or purchases IT system

Responsible for flowcharts

Liaison between Users and Programmers

Note: Think IT Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the primary duty of a Systems Administrator?

A

A Systems Administrator controls database access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the duties of a Systems Programmer?

A

Writes- Updates- Maintains- & Tests software- systems- and compilers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which duties should a Systems Programmer NOT have?

A

In order to maximize internal control- a Systems Programmer should NOT have application programming duties/abilities or be an Operator on the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the duties of a Systems Operator?

A

Schedules and Monitors Jobs

Runs IT Help Desk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What duties should a System Operator NOT have?

A

For internal control purposes- they should not be a Programmer on the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

If it is not possible to segregate duties in an IT System- what actions should be taken to compensate for internal control purposes?

A

Include Computer Logs.

Control Group should review the logs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of a Management Information System (MIS)?

A

To assist with decision making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an Accounting Information System (AIS)?

A

A type of Management Information System (MIS) that processes accounting transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the characteristics of an Executive Information System (EIS)?

A

Specialized for Company Executive needs

Assists with Strategy Only

No Decision-Making Capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the characteristics of an Expert System (ES)?

A

Computer uses reasoning

Structured

No human interpretation needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the characteristics of a Decision Support System (DSS)?

A

Computer provides data

Gives Interactive Support

Human interpretation needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the characteristics of an Ad Hoc computer report?

A

User initiates the report.

The report is created upon demand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When are Exception reports generated?

A

Exception reports are produced when Edit Tests- Check Digits- or Self-Checking Digits identify a problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a query?

A

A type of Ad Hoc report- initiated by a user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is End-User Computing?

A

The User develops and executes their own application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the primary benefit of E-commerce?

A

E-commerce makes business transactions easier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the risks of E-commerce?

A

Compromised data or theft.

Less paper trail for auditors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the benefits of Electronic Data Interchange?

A

Uses globally-accepted standardsEfficient

EDI: more expensive, secure, slower batch, VAN( private)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a File Server?

A

A file server stores shared programs and documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the purpose of a Database?

Database : files that are interrelated and coordinated

A

Located on a File Server- a Database allows users to share documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the purpose of a LAN (Local Area Network)?

A

It connects computers in close proximity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the purpose of a WAN (Wide Area Network)?

A

It connects computers that are far apart.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are the characteristics of a VAN (Value-Added Network)?

A

Privately-owned Network

Serves as 3rd Party Between 2 Companies

Routes EDI Transactions

Accepts wide range of Protocols

Very Costly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the purpose of a Firewall?

A

Prevents unauthorized access to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are the characteristics of a virus?

A

Takes over a computer

Needs a host program to run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are the characteristics of a computer worm?

A

Takes over multiple computers

Doesn’t need a host program to run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the purpose of Automated Equipment Controls?

A

They prevent and detect hardware errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is RAM?

A

Random Access Memory.

Internal memory in the computer used during immediate processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is a CPU?

A

Computer Processing Unit

It processes commands within a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is Job Control Language?

A

It schedules and allocates system resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are examples of input devices?

A

Keyboard
Mouse
Scanner
Magnetic Ink Reader
Magnetic Tape Reader
EDI
Point of Sale Scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What are examples of Output Devices?

A

Speakers

Monitors

Printers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What are the characteristics of Magnetic Tape storage?

A

Sequential Access - Sorts data in order

Slower data retrieval

Header Label prevents Operator error by loading wrong tape

External Labels prevent accidental destruction by operator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What are the characteristics of Magnetic Disks?

A

Random Access - Finds data in random spots

Faster data retrieval

Uses Boundary Protection for data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is a Gateway?

A

Connects one network to another

Note: the Internet is connected by Gateways

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What are Parity Checks?

A

A control that detects internal data errors.

A bit is added to each character- it checks to see if a bit was lost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is an Echo Check?

A

Transmitted data is returned to the sender for verification (it echoes back to the sender)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is a Change Control?

A

It authorizes program changes and approves program test results.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is security software?

A

Software that controls access to IT systems.

Note: Don’t confuse this with anti-virus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is the purpose of a Digital Signature?

A

It confirms a message has not been altered.

43
Q

List the types of computers from smallest to largest

A

PDA/Smartphone/Tablet

Microcomputer - PC- Laptop (cost-effective)

Minicomputer - Like a Mainframe- but smaller

Mainframe - Large computer with terminals attached

Supercomputer - Very powerful and very big

44
Q

What are the units of computer data from smallest to largest?

A

Bit - 1 (on) and 0 (off)
Byte - 8 bits to a byte/character
Field - group of related characters/bytes (i.e. Name- Zip Code- Serial #)
Record - Group of related fields (i.e. Member name- address- phone number)
File - Group of related records (i.e. Membership directory)

45
Q

What is the duty of a design engineer?

A

Determine language used for a specific computer- on a computer-to-computer basis

46
Q

What are object programs?

A

Programs written in base computer language- not similar to English.

47
Q

How can source programs be recognized?

A

They are written in a language close to English.

48
Q

What is the purpose of a Compiler?

A

Takes Source language (English) and converts to Object (Computer) Language

49
Q

How does Online Analytical Processing work?

A

It uses a Data Warehouse to support management decision making.

50
Q

What is Data Mining?

A

Using artificial intelligence and pattern recognition to analyze data stores within a Data Warehouse.

51
Q

What is the purpose of online transaction processing?

A

To process a company’s routine transactions - master files updates as transaction entered
Req random access storage device
Immediate processing - point of sale/ supermarket/ retail

52
Q

What are the characteristics of batch processing?

A

Data held- updates multiple files all at onceLeaves a better audit trailUses Grandfather-Father-Son backup (3 levels of backup kept in 3 locations)
Always a time delay
Often used in traditional system - payroll; GL system - data do not need to be current all the time
Compare manual and computed generated bacth control totals
Uses both random access and/or sequential

53
Q

What does an output control check for?

A

Checks to see if output data is valid- distributed and used in an authorized manner.

54
Q

What does a processing control check?

A

Checks if data processing produced proper output

55
Q

What is a hash total?

A

An input control number- a meaningless sum of values included in the input.

Example would be summing a list of SSNs to make sure the data is the same once entered as it was prior to input into the system.

56
Q

What is a validity check?

A

Checks to see if data in existing tables or files belongs in the set

For example- is there a # in an alpha-only field or a letter in a numeric-only field

57
Q

What is a limit check?

A

Checks to see if numbers surpass a certain limit- i.e. in an age field is the number greater than 110.

58
Q

What is a check digit?

A

An input control that adds an identification number to a set of
digits - usually at the end

59
Q

What is a field check?

A

An input check that prevents invalid characters- i.e. checks for alphabetic letters in a SSN field

60
Q

What is a Hot Site?

A

A disaster recovery system where if the main system goes down- a Hot Site is ready to take over immediately.

61
Q

What is a Cold Site?

A

If a main system goes down- a Cold Site will take time to get set up and running.

62
Q

What is the most common database language?

A

SQL - Structured Query Language

63
Q

What is a Data Definition Language?

A

Defines SQL Database

Controls SQL Tables

64
Q

What is a Data Manipulation Language?

A

Queries SQL Database tables

65
Q

What is a Data Control Language?

A

Controls Access to SQL Database

66
Q

What are the characteristics of a Relational Database?

A

Logical structure

Uses rows and columns similar to spreadsheet

67
Q

What are the characteristics of a Hierarchical Database?

A

Has various levels

Uses trees to store data

68
Q

What are the advantages of a database?

A

Data is more accessible

Reduced redundancy

69
Q

What are the disadvantages of a database?

A

Cost of installation

Skilled personnel required to maintain

70
Q

What are the components of a database?

A

Desktop client

Application Server

Database Server

Think: Your desktop computer runs applications and saves to a database

71
Q

Data input : input verification

A

trace data to appropriate supporting evidence contributes to validation of the accuracy of the transaction and its authorization

72
Q

Data processing - transactions processed to keep info curent

A

whats done to the data: addition, update, and deletion.

methods: batch processing and OLRT

73
Q

System development life cycle (SDLC)

A

framework for planning and controlling the detailed activities associated w system development. Ex: waterfall approach

74
Q

SDLC : A DITTO

A
System Analysis - first step
Design - conceptual and physical
Implementation
Training
Testing
Operations and Maintenance
75
Q

Participants in Business Process Design

A
  • Management - top lvl
  • Accountants
  • Info system steering committee: oversee. high lvl management : controllers, user dptment management. set gov policies for AIS, ensure top mgment participation, and facilitate integration of info system
  • Project development team - responsible for successful design and implementation of bus system
  • External Parties: major customers or suppliers
76
Q

Control objectives for information and related technology : COBIT

A

measures, indicators, processes and best practices to max benefit of information technology

77
Q

COBIT framework ( 5 )

A

1) Business objectives: effective decision support, compliance
2) Governance objectives: strategic alignment, value delivery, resource management, risk management, performance measure
3) Information criteria : ICE RACE: integrity, confidentiality, efficiency, reliability, availability, compliance, and effectiveness.
4) IT resources: applications, information, infrastructure, people
5) Domains and Processes: PO AIDS ME

78
Q

Control Monitoring:

General Controls

A

apply to org lvl / control environment and includes:

  • system development standards
  • security management
  • change management procedures
  • software acquisition, development, operations, and maintenance controls

general controls that regulate the computer activity: Segregation of duties, proper authorization of transactions, and safeguarding assets

79
Q

Control Monitoring:

Application Controls

A

application specific subject to I/C - authority, recording, and custody

Prevent, detect, and correct transaction error and fraud

provide reasonable assurance as to the system: accuracy, completeness, validity, and authorization

80
Q

Input controls - make sure data is reliable (integrity)

A

Data validation at field lvl: edit checks, meaningful error messages, input masks, ect

Prenumering forms, making it possible to verify that all inputs is accounted for and that no duplicate entry exists

Well-defined source data preparation procedures. Ex collect and prepare source docs, but sometimes no source doc exist bcoz data entered via web application

81
Q

Processing Controls

A
  • Data matching
  • File labels
  • Recalculation batch totals
  • Cross footing and zero balances
  • Write-protection mechanism: against overwrite or erasing
  • Database processing integrity procedures - procedures for accessing and updating database by administrators, concurrent updates protect records from errors when two users attempt to update same record
82
Q

Outputs controls:

A
  • User Review of output
  • Reconciliation procedures (input control totals vs output control totals)
  • External data reconciliation - payroll database and ficticious employees
  • Output encryption - reduce data interception, error. protect data authenticity and integrity. ex: parity check and message ackwoledgement
83
Q

Managing Control Activities/ Control procedures - controls related to use of information technology resources

A
  • Appropriate segregation of duties to reduce opportunies to anyone to both perpetrate and conceal errors in the normal course of his/her duties
  • Design and use adequate docs and records to help ensure proper recording of transactions
  • Limit to asset access in accordance to management’s authorization. Ex data librarian controls production data and allow access to it only to authorized ppl
  • Info processing controls to ensure proper authorization, accuracy, and completeness of individual transaction.
  • Implementation of security measures and contingency plans: security measures/ data security prevent and detect threats - authorization needed to access, change, and destroy storage media. Contingency plans to minimize disruptions of processing while maintaining data integrity.
84
Q

Technologies and Security management features

A
  • Safeguard Records and Files
  • Backup files: son-father-grandfather, backup of system that can be shut down, and that do not shut down
  • Uninterrupted Power Supply
  • Program modification controls: track program changes and prevent changes from unauthorized ppl used in production applications
  • Data encryption : digital certificates, digital signatures
  • Managing passwords: length, complexity
  • User Access: initial access, change in position access
85
Q

Security Policies - how to protect info

A

secure info in stored info, processed info, and transmitted info

Program lvl policy - highest lvl
Program framework policy
Issue-specific
System-specific

86
Q

Risk Event identification

A

Strategic - choose inappropiate technology
Operating - do right things in wrong way
Financial - resources lost, wasted, stolen
Information - loss data integrity, incomplete transaction, hackers
Specific risks: errors, intentional acts, disasters

87
Q

Risk assessment and control activities

A

Risk - possibility of harm or loss
Threat - danger
Vulnerability - renders system susceptible to a threat
Safeguards and controls: policies and procedures to reduce vulnerability
Risk assessment: first assess risks and then they can be managed.
Evaluation and types of controls

88
Q

Risk assessment - steps

A

1) identify risks
2) evaluate possibility that threat will occur
3) evaluate exposure - potential loss from threat
4) identify controls to guard against threats
5) evaluate costs and benefits of implementing controls
6) implement controls that are cost effective

89
Q

Access Controls

A

limit access to program documentation, data files, programs, and computer hardware to those who require it in the performance of their job responsibilities.
Include multilevel security, user identification, user authorization (passwords), limited access room, use of file-level access attributes and firewalls.

90
Q

Physical Access

A

access to computer rooms limited to computer operators and other IT ppl. Restriction by specially coded ID cards or keys to entry. Manual key locks. ID cards can be lost or stolen

91
Q

Electronic Access - unathorized access to data and application programs

A

User identification codes - w change of passwords. backdoors should be eliminated.

Disconnect hardware devices and deactivate use ID when consecutive failed attempts to access to system occur

Req hardware devices to log-off when not in use or automatically log them off after inactive for certain time

Use password scanning to detect weak passwords

Req dual authentication. ex log in and use a code that was sent by text msg.

File-lvl access attributes: ex. read only access

Firewalls : protect against unauthorized access - hardware and software. Packet filtering (examine data coming in according to established rules
), circuit level gateways (allow data inside network only when inside computer request it). Application gateway/ Proxy (examine data in a more sophisticated way - more secure but slow)

92
Q

Disaster recovery steps

A

assess risks
identify mission critical application and data
develop plan for handling mission critical application
determine responsibility of ppl involved
test disaster recovery plan

93
Q

Internal check

A

Examples of internal checks are as follows:

Limit check, which identifies if data have a value higher or lower than a predetermined amount
Identification, which determines if the data is valid
Sequence check, which checks sequencing
Error log, which is simply an up-to-date log of all identified errors
Transaction log, which provides the basic audit trail
Arithmetic proof, which computes the calculation in order to validate the result - recalculation

94
Q

Edit checks

A

accuracy checks performed by an edit program.

accuracy controls include the following:

Use of a current, approved price list
Verification of multiplication and addition
Matching of quantities ordered, received, and invoiced

95
Q

A DBMS (database management system)

A

A tool - consists of computer program(s) for organizing, accessing, and modifying a database. It is a collection of programs that enables users to store, modify, or extract information from a database.

A database is a collection of interrelated information that can be used for a variety of purposes. A database is managed by a computer program called a database management system (DBMS).

96
Q

data security of an online computer system protected by an internal user-to-data access control program

A

Security dependent upon the controls over the issuance of user IDs and user authentication is the key to enforcing personal accountability

97
Q

Data integrity

A

relates to using data for its intended purpose. A local area network would promote data integrity by making data available only to those users having a legitimate reason for access. Centralized access controls would help promote data integrity.

Integrity is the protection of data from unauthorized tampering

98
Q

Online access controls

A

Online access controls are absolutely essential in controlling access to and operation of modern computer systems. These controls include:

  • user code numbers that restrict access to only authorized users,
  • passwords that create a second barrier for access after user code numbers, and
  • lists of files and programs along with lists of the type and extent of access a user is entitled to have to those files and programs.
99
Q

Enterprise resource planning (ERP)

A
integrates all aspects of an organization's activities into one accounting information system. By combining financial and nonfinancial information, the entity can be more flexible and responsive while having more information available for decision making.
however changes to one module can flow throughout the system
100
Q

Run-to-run controls

A

for an online system are able to accumulate separate totals for all transactions processed during the day and then agree the totals to the total of items accepted for processing.

One-for-one checking generally requires manual comparisons of input data elements to processing results.

101
Q

general controls: user authentication procedures

A

seeks to determine if the person seeking access is who they say they are. Password masking is a part of this process. Password masking is the technique of either hiding the password as it is typed or displaying other characters so that observers cannot see what characters the user is actually entering.

102
Q

Public Key Infrastructure (PKI)

A

PKI refers to the system and processes used to issue and manage asymmetric keys and digital certificates

103
Q

compatibility test for users

A

procedure for checking a password to determine if its user is authorized to initiate the type of transaction or inquiry he or she is attempting to initiate.

Use of a compatibility test for users would assure that an employee used a CRT only for purposes related to that employee’s job description. For example, an accounts receivable clerk would not be allowed access to inventory or fixed asset records since those records would not be compatible with the duties of an accounts receivable clerk.