Mobile Device, End-User, and Small Business Computing Flashcards

1
Q

Define view-only access.

A

Permitting a user to view, but not change, a file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Identify five risks of user-developed systems.

A
  1. Not integrated with existing systems
  2. Inadequate testing and documentation
  3. Poor data input controls
  4. Poor system design
  5. Management may rely on these systems without knowing their risks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define malicious app.

A

An app that collects and transmits user data to a third party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define mobile accounting.

A

Transportable computing devices. That is, computing devices that can be carried from place to place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Identify items that should be included in user training in mobile applications.

A

Organizational policies, password maintenance and protection, when and how to use mobile devices, procedures for lost or stolen devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Identify three characteristics of the small business computing environment.

A
  1. Exclusive use of microcomputers and laptops (e.g., there may be no servers)
  2. Outsourced IT
  3. Poor segregation of duties
How well did you know this?
1
Not at all
2
3
4
5
Perfectly