IT Flashcards

1
Q

Modem

A

converts digital signals received from a computer onto analog signals that can be transmitted over telephone lines to another modem where analog signals is converted back to digital signals before it enters another computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Application Programmer
Analyst
Systems Admin.
Systems Program

A

1 - Codes
2 - Designs
3 - Efficient and effective operation, database design; security
4 - use the design developed by the analysts to develop an information system and write the computer programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Compiler

A

Software program that converts program language to machine language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Decision Table

A

ALTERNATIVE logical conditions and actions to be taken in a program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Access Controls

Security Controls

A

1 - monitor activity; amount of time it takes for a computer to seek out and find data or, as stated in the problem, “to retrieve data from memory.”
2 - enforce authorization before activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DBMS

A

System that allows for easy development of new applications without changing the storage method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Password protection for a screensaver security level

A

WEAK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Database Decision Support

A

aids management in problem solving for a SPECIFIC ISSUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Predominant threat to IT environment

A

Unauthorized Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Internet processing transaction risks

A

Disruption leading to missing or duplicate information; deteriorates completeness and accuracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

COBIT

A

Control Objectives for Information and Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Electronic Vaulting

A

Electronic transmitting & storing backups of programs and data at a remote data storage facility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Intranet
1 - Define
2 - Access
3 - Advantage/Disadvantage

A

1 - internal version of the internet
2 - accessed through conventional software, works with the World Wide Web (separated through a firewall)
3 - Cheap/ High Security Risk (compared to WANS/LANS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Management Reporting System encompasses what type of DATA

A

1 - internal/external

2 - Financial/Operating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Plotter

A

printing device specifically for graphs and charts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Biometric Processing

A

security identification by physical traits of user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Enterprise Risk Management

A

Integrates all aspects of companies operations into one IT system.
Financial/Non financial/ External DATA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Access Control Matrix

A

Lists and access data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When is batch processing current

A

only directly after update occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

One for One Checking

A

verifying each hard copy has been processed through the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Executive Support System

A

Aids management in strategic planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

EDI

A

Direct communication between partners but relies on third parties as well; constant contact without much human intervention
RISK - Improper Distribution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Mirror Web Server is best for

A

Data Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Encryption of Software versus Hardware

A

Hardware encryption is more reliable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
TCP/IP
Basic communication between and internet and an intranet. Messages are assembled into small packets by the internet and received by the TCP layer that reassembles the messages into readable formatt.
26
End User Computing
Creation, Control, and Implementation by system users
27
Business Continuity is ensured by what type of planning
Contingency
28
Operations System
Integrated group of programs that supervised, supports, and executes activities in the most efficient manner
29
Backup Process for 1 - Magnetic Tape 2 - Magnetic Disk
1 - creates a new file as an output for every update (automatic backup) SLOWER 2 - replaces old file with a new file for every update (separate backup procedures required) QUICKER
30
Bottlenecks
Companies should eliminate to make new technology run smoother
31
Extensible business reporting language (XBRL)
Specifically designed to exchange financial information over the World Wide Web by using tags to identify the contents of each data item
32
Magnetic Ink
is a system of data entry originated in the 1950s that Reads magnetic ink characters on the bottom front of checks. It is used primarily by banks to read the information on checks, deposits, and other transaction tickets.
33
Query
Enable a user to query or interrogate a database. Typically this is done on an as-needed basis.
34
Heuristics
knowledge based systems
35
Authorization transactions best remedy
passwords
36
LAN risks
1 - lack of documentation 2 - poor security 3 - incomplete data communications
37
Self check digit
is an extra digit, precisely computed, that is added to a basic identification number (e.g., employee ID number) to detect transpositions or other clerical errors
38
Compatibility test
Password used correctly correlates to the activity to be preformed
39
Assembly language
programming NOT machine language
40
database schema
a view of the entire structure of the database.
41
Data Control Group
verifies transactions are processed correct and input and output are reconciled
42
Computer Operations Unit
help desk functions
43
Disk Storage
offers random access to data files (jumps directly from one read location to another)
44
fail-soft protection
capability to continue processing at all sites except a non functioning one
45
virtual private network
uses the Internet to provide secure remote access to an organization's network
46
Relational databases
flexible and useful for unplanned, ad hoc queries, do store data in table form, and are maintained on direct access device
47
denial-of-service attack
ttempt to make a machine or network resource unavailable by saturating the target server with requests so it cannot respond to legitimate traffic because of server overload
48
Change control
process of modifying application software, including requesting a change, reviewing the effectiveness of the change, approving the change, and implementing the change
49
read only memory (ROM) RAM
operating system and language translator programs are permanently stored Temporary storage
50
Hard Disk
common medium for data files for the database
51
Distributed data processing
network of interdependent computers where certain functions are centralized, other functions are decentralized, and processing is shared among two or more computers. It is an alternative to both centralization and decentralization.
52
Change management control policies
proper processes and approval channels to make changes to an organization's systems
53
Modem
device is used to convert digital signals received from a computer into analog signals that can be transmitted over telephone lines to another modem where the analog signal is converted back into a digital signal before it enters another computer system.
54
Risk associated with accounts payable not accounts receivable
unauthorized purchases
55
Key tasks in processing cash receipts
comparing control and remittance totals
56
Test of Controls can be accomplished by
an auditor
57
Contingency Planning
impairment of a software backup plan
58
systems program
systems program manipulates application programs
59
Run-to-run controls
accumulate separate totals for all transactions processed during the day and then agree the totals to the total of items accepted for processing
60
Programmer and testing
programmers are not allowed to test their data and then release it to a data librarian unless is has been tested by an independent source
61
management information system (MIS)
provides managers with the information they need for planning, organizing, decision making, and controlling the activities of the entity.