IT Flashcards

1
Q

A business continuity plan is

A

designed to minimize disruptions to operations in the event of a disaster. Business continuity plans would help ensure a timely recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A value-added network

A

routes data transactions between trading partners. A value-added network is used to link different companies’ computer files together, helping to facilitate transactions between the trading partners.

A value added network links the computer files of different companies

provides increased security over data transmissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

private key

A

A disadvantage of using a private key for encryption is that both sender and receiver must have the key for this encryption method to be effective.

A private key can be broken into fragments and distributed to the receiver.

The private key must be used by both the sender for encryption and the receiver for decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

greatest risk regarding an entity’s use of electronic data interchange (EDI)?

A

data is transmitted electronically, creating the risk that data may be inadvertently transmitted to an unauthorized or inappropriate user.

EDI transactions are formatted using standards that are uniform worldwide they can be transmitted among parties electronically.

must be GAAP.

conducted over the Internet

process of communication between suppliers and customers.

EDI uses strict communication standards, encryption, and access controls to ensure orders are placed and processed as expected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

On-line analytical processing systems

A

enable users to interactively analyze data through operations such as consolidation, drill-down, and slicing and dicing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Transmission Control Protocol or Internet Protocol (TCP/IP) network

A

Every site connected to a Transmission Control Protocol or Internet Protocol (TCP/IP) network has a unique address.

can be used with all computers with access to the world wide web

may be an exchange of any type of data

Transmission control program/Internet protocol is a set of communications standards used for the internet and similar networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An executive support system is designed to

A

support the work of executives including making nonroutine decisions, answering questions about competitors, and identifying new acquisitions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Decision support systems

A

process and present data to support management decision-making, but are not specific to the requirements of strategic levels of an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Management information systems

A

support day-to-day management decision making through pre-defined reports, and routine strategic level decision making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Transaction processing systems

A

support day-to-day operations, not strategic level decision making

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A virtual private network

A

establishes an encrypted point-to-point connection between sites and provides secure access to remote user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An authority certificate

A

certifies the ownership of a public data encryption key and is not a method for creating encrypted communication over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Packet-switching

A

is a communications method that groups all data into blocks for transmission and does not create secure access for remote users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

integrated test facilities

A

auditor’s data + client data

client’s program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

test data

A

auditor’s data

client’s program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

parallel simulation

A

client’s data

auditor’s program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Access control software

A

would prevent unauthorized individuals from accessing the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Contingency planning

A

is designed to correct an error or irregularity and minimize any consequences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An echo check
and
hash total

A

is a detective control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The data librarian

A

is responsible for the collection, preservation, and maintenance of an entity’s data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Computer operators

A

oversee the running of computer systems. Their responsibilities should be segregated from the custody role of the data librarian.

22
Q

computer programmers

A

write computer software

23
Q

Systems analysts

A

examine business problems, recommend solutions, and coordinate the development of solutions.

24
Q

A limit check

A

is used to determine that data entered falls within acceptable limits, indicating a potential error when it does not.

25
Q

A validity check test

A

compares certain data to acceptable values, indicating a potential error when there is not a match.

26
Q

Creating hash totals from Social Security numbers is an example of a

A

processing control.

27
Q

Biometric devices restricting access to the computer center is an example of a

A

general control.

28
Q

Limiting entry of sales transactions to only valid credit card customers is an example of an

A

application control.

29
Q

Restricting entry of transactions to authorized users is an example of a

A

user control

30
Q

digital signature

A

used on files and emails to verify that the information sent is unaltered in transmission. Digital signatures can be used to verify the sender of a message and its content, but not the recipient.

31
Q

A local area network consists

A

of a group of computers, usually at the same location, that are linked together to enable users to share peripheral devices, programs, and data.

To enable this sharing, the computers must have a means of transmitting data to one another through common media.

32
Q

Capacity planning generally refers to

A

the IT function of optimizing IT infrastructure across the organization.

33
Q

Extensible business reporting language (XBRL)

A

is a global standard language specifically designed for the electronic communication of business information.

specifically designed to exchange financial information over the World Wide Web

34
Q

Hypertext markup language

HTML

A

is a language used to create web pages and other information for display in a web browser.

35
Q

Hypertext transfer protocol

HTTP

A

is the foundational protocol for data communication for the World Wide Web.

36
Q

Logic tests are

A

application-level control

37
Q

general control

A

A information system’s information technology infrastructure

Security management

Software acquisition procedures

38
Q

A byte is a

A

group of 8 bits representing a single character.

Several characters make up a field.

39
Q

A field is a

A

group of related characters representing a unit of information.

Several fields may be included in a record.

40
Q

A record is a

A

collection of related information treated as a unit,

which may be combined with others in a file.

41
Q

a file is

A

group of logically related records,

42
Q

Closed loop verification

A

is a means by which two parties can verify their identity to enable safe access to data.

43
Q

Redundant data checks

A

compare data from two or more files to determine if they match for the purpose of making certain that the computer has read the data properly

44
Q

A Trojan horse

A

is a computer program that appears to be legitimate but performs an illicit activity when run.

45
Q

The job control language in the computer’s operating system performs

A

scheduling, resource allocation, and data retrieval functions based on a set of instructions.

46
Q

Duties that are considered incompatible and should be segregated in an IT environment are

A

ARC

authorization
recording
custody

47
Q

An enterprise resource planning system

A

is software that integrates all the business processes of an organization.

The modules of an ERP system are interconnected and share data, thus increasing responsiveness and flexibility.

Integrate data from all aspects of an organization’s activities

48
Q

Three-tiered architecture for client/server applications consists of

A

a desktop client,
an application, and
a database.

49
Q

stakeholder

A

“Stakeholder” refers to anyone in the organization who creates or uses documents, data, or networks in the business information system. Stakeholders are not limited to management, IT personnel, or users.

50
Q

data mining

A

process that sifts through large amounts of data to discover previously unknown, meaningful patterns or trends.