Module 3 (Ch 4-7) Flashcards

(45 cards)

1
Q

Processing Option (Batch or Real-Time): Parts sold daily at a small, locally owned auto parts store.

A

Batch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Processing Option (Batch or Real-Time): Filling prescriptions at a drugstore.

A

Real-Time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Processing Option (Batch or Real-Time): Daily ATM deposits.

A

Batch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Processing Option (Batch or Real-Time): Tickets for a concert.

A

Real-Time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Processing Option (Batch or Real-Time): Point-of-sale transactions.

A

Real-Time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Type of risk mitigated by this control activity: Tiered access is based on job function.

A

Unauthorized logical access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Type of risk mitigated by this control activity: Only employees with Level 4 badges may enter the data center.

A

Unauthorized physical access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Type of risk mitigated by this control activity: Users must authenticate to join the wireless network.

A

Unauthorized physical access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Risk area & implementation type: The company must employ developers to write necessary code and maintain the system, which can be expensive.

A

Budget overrun; In-house development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Risk area & implementation type: If the business isn’t adhering to the software’s licensing policies, the business could face legal issues and reputational loss.

A

Copyright infringement; Third-party purchase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Risk area & implementation type: If the software is not properly secured, the company is vulnerable to hackers and malicious programs.

A

Data breach; Both Third-party and in-house.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Risk area & implementation type: Software may not be properly developed.

A

Technical risk; In-house development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Risk area & implementation type: There might be industry and market changes that cause the software to require extensive updates.

A

External risk; In-house development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Risk area & implementation type: Source code cannot be obtained for review.

A

Business disruption; Third-party purchase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Database Tables: A photo of an inventory item that the firm sells.

A

Product list; Inventory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Database Tables: A bar code that is assigned to an item in the company’s warehouse.

A

Inventory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Database Tables: Results of X-rays and MRIs in a doctor’s office.

A

Patients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Database Tables: Satellite and topographical imagery of land and buildings that a business owns in 30 states.

A

Property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Database Tables: Scripts of calls from the customer call center.

20
Q

Database Tables: Scanned copy of a paper notification that our overdraft limit has been increased.

21
Q

Database Tables: Text messages about products the firm ordered.

A

Purchase orders; Product list

22
Q

Database Tables: Survey data about a new product that the firm sells.

A

Product list; Inventory

23
Q

Database Tables: Patient symptoms during a doctor’s visit.

24
Q

Database Tables: Facebook posts of customer complaints about poor service.

25
Document Type: Managers approve employees' submitted expenses in the system.
Requirements definition
26
Document Type: Data flow diagram shows technical details about how the credit card data will enter the system from the card provider's system.
Systems model
27
Document Type: The login button will be orange.
Graphical User Interface (GUI)
28
Document Type: Employees will import credit card charges to their expense reports.
Requirements definition
29
Document Type: The system-generated data will flow into the HR database, but technical details aren't available yet.
Conceptual design
30
Document Type: The system will operate on the same cloud server as the previous system.
Technical architecture specifications
31
Feasibility Type: The website will streamline communication about analytics throughout the department and allow teams to leverage one another’s ideas and programming easily.
Economic feasibility
32
Feasibility Type: The website will be developed by existing web developers who regularly build and support internal websites such as this.
Technical feasibility
33
Feasibility Type: The website will use existing web page templates and be accessible through the existing corporate home page.
Operation feasibility
34
Feasibility Type: The website will be housed on existing company web servers and cost a minimal amount to build and maintain.
Economic feasibility
35
SDLC Stage: Translating the design specifications into computer code.
Development
36
SDLC Stage: Preparing a blueprint of technical system specifications.
Design
37
SDLC Stage: Assessing whether the computer coding will produce the expected results.
Testing
38
SDLC Stage: Making the system available to users.
Implementation
39
SDLC Stage: Specifying the business problem that needs a solution.
Planning
40
SDLC Stage: Gathering information to determine the specific requirements that the new system must satisfy.
Analysis
41
SDLC Stage: Detecting errors or bugs in the computer code.
Testing
42
SDLC Stage: Determining whether the project is financially feasible.
Planning
43
SDLC Stage: Specifying system inputs, outputs, and user interfaces.
Design
44
SDLC Stage: Updating the system for changes in business conditions.
Maintenance
45
All accounting information systems are ______________.
Transaction Processing Systems