IT Flashcards

(59 cards)

1
Q

IaaS

A

accessing hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PaaS

A

create software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SaaS

A

accessing software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

COBIT 7 attributes

A
effectiveness
efficiency
integrity
confidential
available
reliable
compliance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which accounts are most profitable

A

CRM (customer relations mgmt.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data mining, data warehouse and drill down to determine optimal opening times

A

OLAP (online analytical processing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Day to day payroll reporting

A

OLTP (online transaction processing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Supply Chain Management

A

Sharing info with suppliers and customers

IT, accurate forecasting, communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Manage help desk

A

Operators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Operating systems and compilers

A

Systems Programmer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Manage remote access

A

Network administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Code changes

A

Application Programmer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Add/update documentation to data dictionary

A

Database Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Control flow of documents

A

Data Control Clerk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Review input/output/operations (internal audit)

A

Control Group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Design computer install, flowcharts or data processing routines

A

System Analyst

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Access to operator instructions (not detailed listing)

A

Operators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Forecast and make long range strategic decisions, external data

A

ESS (Executive Support System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Managerial accounting and budgeting

A

MIS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Large sets of data used to determine patterns

A

DSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Multiple table, matrices, linked by key fields

A

Database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Independent multiple programs to read, redundant

A

Flat File

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Table form, flexible, on direct access device

A

Relational database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Batch Processing

A

Transactions assigned to groups with own line entry

25
Online real time processing 4 characteristics
immediate update storage device required Network access required errors captured and corrected
26
Subsidiary in Manual systems ex: Inventory
Master file
27
Connection of internet devices
IoT (internet of things)
28
ETL
Extract, Transform, Load
29
Blockchain
Independent, secure, non modified audit trail of transactions. Decentralized, distributed, peer to peer
30
EDI
Electronic data interchange - transactions between business trading partners
31
VAN
Value added network provides additional security to process EDI
32
Foundation of System reliability (rollback & retention)
Security
33
Low cost wired transmission
Twisted Pair
34
IT Characteristics Policy
Owner Purpose and title linked to strategy and objectives
35
Goldilocks
Distributed: neither centralized or decentralized
36
Decentralized
Less secure, more responsive, less costs, less bottleneck
37
Most reliable authentication
Digital Certificate
38
Verifies identity and unaltered transmission
Digital Signature
39
Data control language used to determine which users have access
Relational database
40
Single key encryption (private key) encrypts and decrypts
Symmetric Encryption
41
Public/Private encryption, two keys used together, used to encrypt/decrypt and receiver hold the key
Asymmetric Encryption
42
controls that prevent interruptions
Backup and downtime controls
43
Grandfather, father, son approach
Redundant, three sets of backup
44
Zombie computer
used to DoS attack (denial of service)
45
Check point/Restart
process transactions that took place after last valid run
46
Fault Tolerant
Redundancy of components | continues to operate despite failure
47
Data technique for interviews, questionnaires, observations
System Documentation
48
Allows you to maintain software
Program Documentation
49
Verifies state abbreviation or valid account number
Validity Check
50
prevents alpha in numeric field
Field format check
51
Ensure valid & correct customer account number entered
Closed loop
52
Checks for accuracy of data
Echo check
53
Line with faulty data transmission
Parity check
54
Steps in System development
Planning Analysis Design/Develop Implement
55
Step of purchasing hardware
Design/Develop
56
Step of data conversion and training
Implement
57
Step identify a problem
Planning
58
Step to sign requirements definition docs
Analysis
59
Step to assessing needs
Analysis