Section 4D Flashcards
disk storage unit is preferred over a magnetic tape drive because the disk storage unit:
has nine tracks.
offers sequential access to data files.
offers random access to data files.
is a cheaper medium for data storage.
offers random access to data files.
Access to data takes less time with disk storage than with magnetic tape storage.
Consider how data is stored on magnetic tape. Blocks of data files are arranged linearly along the entire length of the tape. In order to move from a read location at or near the beginning of the tape to a read location near the end of the tape, it is necessary to travel over all tape between the two read locations.
On the other hand, if disk storage is used, it is possible to jump directly from one read location to another. This is possible because disk storage offers random access to data files.
DATA STORAGE CONCEPTS
An \_\_\_\_ some times called a \_\_\_ , is something about which information is stored (employees, inventory items, customers). ....Each entity has attributes, or characteristics of interest, which are stored (employee pay rates, customer addresses). T/F
A ___is a specific instance of an attribute. (The ___for Able Company’s customer number is 16152.)
……. Data values are stored in a physical space called a __. A customer number, such as 16152, will be stored in a ___named “Customer Number.”
A set of fields is called a ___
Related records are grouped to form a __
A set of interrelated, centrally coordinated files is referred to as a ___
entity, sometimes called a variable
True
data value
field
record
file
database
A ___stores cumulative information about an organization and is similar to a l edger in a manual system. This is like a perm file.
___are records of past transactions, including those of past periods.
\_\_\_files are files that are referred to during processing. A \_\_file is a traditional file system characterized by having only fixed-length “\_\_” files. All files are of equal \_\_
master file
Archive files
Reference
flat , length.
Which of the following technologies is specifically designed to exchange financial information over the World Wide Web?
Hypertext markup language (HTML)
Extensible business reporting language (XBRL)
Hypertext transfer protocol (HTTP)
Transmission control program/internet protocol (TCP/IP)
XBRL
Extensible business reporting language (XBRL) uses tags to identify the contents of each data item. It was created to transmit financial information over the Internet.
The other answer choices (HTML, HTTP, and TCP/IP) are incorrect because they are each protocols used on the Internet but are not limited to the exchange of financial information.
Which of the following is responsible for making sure that the information system operates efficiently and effectively?
Network manager
Security management
Systems administrator
Change management
System Admin
The systems administrators make sure the information system operates efficiently and effectively.
The network managers make sure the networks operate continuously and properly and that all applicable devices are linked to the organization’s internal and external networks.
Which of the following input controls would prevent an incorrect state abbreviation from being accepted as legitimate data?
Reasonableness test
Field check
Digit verification check
Validity check
Validity Check
A validity check is an edit test in which an identification number or transaction code is compared with a table of valid identification numbers or codes maintained in computer memory. As an example, the system would compare an incorrect state abbreviation of “PS” with all possible valid state abbreviations and determine that it is not an abbreviation for one of the 50 states.
A field check makes sure that the entry is the correct type for the field (numeric or alphanumeric). Any letters would satisfy this requirement, whether or not they were a valid state abbreviation.
Which of the following procedures would enhance the control structure of a computer operations department?
Periodic rotation of operators
Mandatory vacations
Controlled access to the facility
All of the answer choices are correct.
All above
Periodic rotation of operators, mandatory vacations, and controlled access to the facility would all enhance the control structure of a computer operations department.
Periodic rotation of operators and mandatory vacations provide other personnel the opportunity to detect any control weakness. Controlled access is one of the basic control objectives.
Management of a company has a lack of segregation of duties within the application environment, with programmers having access to development and production. The programmers have the ability to implement application code changes into production without monitoring or a quality assurance function. This is considered a deficiency in which of the following areas?
Change control
Management override
Data integrity
Computer operations
Change Control
Change control is the process of modifying application software, including requesting a change, reviewing the effectiveness of the change, approving the change, and implementing the change. Since programmers can implement application code changes without approval, there is a weakness in control over changes to application programs.
Data integrity refers to accuracy of data entered into the program or processing of that data rather than the software itself.
____is the process of modifying application software, including requesting a change, reviewing the effectiveness of the change, approving the change, and implementing the change.
Change control
A control procedure that could be used in an online system to provide an immediate check on whether an account number has been entered on a terminal accurately is a: HASH TOTAL
False - Self-checking digit
A self-checking digit is generated when the data element is inputted. A prescribed arithmetic operation is automatically done and stored on this element. This same operation is then performed later on, which would “ensure that the number has not been recorded incorrectly.”
A compatibility test validates the data within the field.
A hash total is the total of a nonquantitative field such as account number to be sure all records are processed.
If the company installs a ___network, it should ensure that transmission facilities on its premises are secure.
leased-line
The planning committee was concerned that unauthorized people might attempt to gain access to the network. If the company installs a network using leased lines, then it should ensure that:
phone numbers for the network are kept confidential.
tone suppression devices are installed on all ports.
transmission facilities on its premises are secure.
network availability is limited to certain times of the day.
transmission facilities on its premises are secure.
Specialized programs that are made available to users of computer systems to perform routine and repetitive functions are referred to as: SOURCE PROGRAMS
False -Service Programs
Service programs are applications programs that can be called in by the user’s programs to perform some common, subordinate function. They are sometimes referred to as “canned” programs.
____are applications programs that can be called in by the user’s programs to perform some common, function. They are sometimes referred to as “canned” programs.
Service programs
A software tool used for ad hoc, online access to items in a database would most likely be:
a query utility program.
an application generator.
a report generator.
terminal emulation software.
query utility program
Query utility programs are used to access information contained in databases. Query utility programs provide users with online access to database information items and are characterized by their ability to enable a user to design an ad hoc query to retrieve only that information needed by the user.
A systems engineer is developing the input routines for a payroll system. Which of the following methods validates the proper entry of hours worked for each employee?
Check digit
Sequence check
Capacity check
Reasonableness check
Reasonableness check
Reasonableness checks test to make sure data makes sense when compared to other data—they can be used to validate the proper entry of hours worked for each employee.
A check digit is created from other digits (e.g., each time a six-digit ID number is entered, a seventh check digit is computed from the first six digits; a verification calculation will not match the check digit if an error is made in entering the six digits)
Flowcharting is a useful internal audit tool for evaluating controls in operational units and operations. A problem relating to flowcharts is the time and cost of developing and maintaining them. One means for reducing this cost is through use of which of the following?
Flowcharting software
Organization charts as surrogates for flowcharts
Outsourcing
Standard flowcharts
flowchart software
Flowcharting software could be used to reduce the cost of preparing and updating flowcharts.
A system where several minicomputers are connected for communication and data transmission purposes, but where each computer can also process its own data, is known as a CENTRALIZED NETWORK
Distributed Data Processing Network
Distributed data processing is a network of interdependent computers where certain functions are centralized and other functions are decentralized and processing is shared among two or more computers. In a distributed data processing network, each computer can also process its own data. Distributed data processing is an alternative to both centralization and decentralization.
In a large multinational organization, which of the following job responsibilities should be assigned to the network administrator?
Managing remote access
Developing application programs
Reviewing security policy
Installing operating system upgrades
Manage Remote Access
. A network administrator in this environment would be expected to deal with the full scope of network activities, which would include access to the network from remote locations.
JOB DUTIES:
Who is dis? Give Job Title
the organization's networks operate continuously and properly, and all applicable devices are linked to the organization's internal and external networks.
WHO IS DIS? GIVE A JOB TITLE
___makes sure all system components are secure and protected from any and all internal as well as external threats.
Network manager
Security management
An advantage of having a computer maintain an automated error log in conjunction with computer edit programs is that:
reports can be developed that summarize the errors by type, cause, and person responsible.
less manual work is required to determine how to correct errors.
better editing techniques will result.
the audit trail is maintained.
reports can be developed that summarize the errors by type, cause, and person responsible.
An audit trail is maintained but reports would have to be developed to make it meaningful.
In a microcomputer system, the place where parts of the operating system program and language translator program are permanently stored is RAM (Random Access Memory)
False - Read only Memory (ROM)
The operating system and language translator programs are permanently stored in the read only memory (ROM). ROM may only be read from to prevent these important programs from being accidentally altered or deleted.
RAM is used for temporary storage of data or programs and can be erased and reused. This memory is used to store programs and data currently being used by the CPU.tion.
A decision table indicates the:
sequence of logical operations in a program.
sequence of operations in a system.
alternative logic conditions and actions to be taken in a program.
flow of documents regarding a transaction.
alternative logic conditions and actions to be taken in a program.
A decision table is useful in building logical models. It is a tabular representation of logical processes. It indicates the alternative logic conditions and actions to be taken in a program.
An employee mistakenly enters “April 31” in the date field. Which of the following programmed edit checks offers the best solution for detecting this error?
Reasonableness
A reasonableness check is an edit check of logical correctness of the relationships among the values in an input data set, or the value of an input item with the values of a related data item in a master file.