• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/43

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

43 Cards in this Set

  • Front
  • Back
Name and briefly describe the five major components that comprise the information technology of an organization.
1. Hardware
2. Network
3. Software
4. Data
5. People
Describe the normal series of events in an Accounting Information System (AIS):
1. Transaction data from source documents is entered into the AIS by the end user.
2. The original paper source documents are filed.
3. These transations are recorded in the appro. journal.
4. The transactions are posted in the general and subsidiary ledgers.
5. TBs are prepared
6. Financial reports are generated.
Name and briefly describe five different types of MIS reports.
1. Periodic Scheduled Reports
2. Exception Reports
3. Demand Reports
4. Ad Hoc Reports
5. Push Reports
What are the various categories of the Business Information Systems?
1. Transactional processing systems.
2. Knowledge systems.
3. Mgmt information systems.
4. Decision support systems.
5. Executive information systems.
What are the primary roles of teh Biz Info Systems (BIS)?
1. Process detail data
2. Assist in making daily decisions, and
3. Assist in developing business strategies
What are the reporting risks in a BIS?
1) Strategic Risk
2) Operating Risk
3) Financial Risk
4) Information Risk
Identify functions that should be segregated in an IT department.
The duties of systems analysts, computer programmers, and computer operators should be segregated.
Identify the four functions of a DBMS:
1. Database Development
2. Database Query
3. Database Maintenance
4. Application Development
Identify the seven components of a LAN.
1. NODE
2. Workstation
3. Server
4. Network Interface Card (NIC)
5. Transmission Media
6. Network Operating System (NOS)
7. Communications Device.
Identify the two types of networks that can be used to provide WAN Communications services.
VAN - privately own communications networks that provide additional services beyond standard data transmissions

Internet based networks - use internet protocols and public communications channels to establish network communications.
List some of the features of the value added network.
VAN:
-is privately owned
-provides additional services
-provides good security
-uses periodic (batch) processing
-may be expensive.
List some of the features of an internet-based network.
An internet based network:

-uses public communcation channels
-transmits transactions immediately
-is relatively affordable
-increases the number of potential trading partners.
What is the difference bw the intranet and the extranet?
An intranet connects geographically separate LANs within a compnay, whereas an extranet permits specified external parties to access the company's network.
Describe two types of processing used in the computerized environment.
Batch processing - processing

On-line, real-time (OLRT) processing - immediate processing
Identify three types of computer software.
System software (programs that run the computer).

Programming languages (generate computer processing instructions)

Application software (end user programs)
What is a batch control total?
A batch control total is a maunally calculated total that is compared to a computer generated total as a means of testing accuracy and completeness.
What are the advantages and disadvantages of centralized processing?
Advantages:
-Data is secured better, once received.
-Processing is consistent (decentralized systems may result in inconsistent processing among regional offices).

Disadvantages:
-cost of transmitting large numbers of detailed transaction can be high
-there are increasing processing power and data storage needs at the central location.
-there is a reduction in local accountability
-input/output bottlenecks may occur at high traffic times.
-there may be a lack of ability to respond in a timely manner to information requests from remote locations
Identify some differences and problems that one needs to be aware of when auditing in a computer environment rather than in a manual environment.
1. Disappear Audit Trail
2. Uniform Transaction Processing
3. Computer Initiated Transactions
4. Potential for Increased Errors and Irregularities
5. Potential for Increased Supervision and Reveiw.
List and explain the steps in batch processing.
Batch processing is accomplised in two steps:

1. Create a transaction file: the first step is to create a transaction file by manually (usually) keying the data (data entry), editing the data for completeness and accuracy, and making any necessary corrections.

2. Update the Master File: the second step is to update the master file by sorting the transaction file into the same order as the master file and then updating the relevant records in the master file from the transaction file.
What is the basic difference bw a database management system and a database?
A database is an integrated collection of data records and data files. A database management system (DBMS) is the software that allows an organization to create, use, and maintain a database.
What is a data warehouse and what is data mining?
A data warehouse is a collection of databases that store both operations and management data.

Data mining is the processing of data in a data warehouse to attempt to identify trends and patterns of business activity.
What are some advantages of a DBMS?
Advantages of a DBMS include:
1. Data redundancy & inconsistency are reduced.
2. Data sharing exits
3. Data independence exists
4. Data standardizaton exits
5. Data security is improved, and
6. Data fields can be expanded without adverse effects on application programs.
What is the basic difference bw WANs and LANs?
The basic difference bw WANs and LANs is distance.

LANs normally are within a fairly limited distance, and WANs allow much longer distance.
How can the internet be defined?
The internet is an international network composed of servers around the world that communicate with each other.
What are some of the similarities and differences bw the internet, intranets, and extranets?
The internet, intranets, and extranets all use internet protocols and public communciation networks rather than proprietary protocols and netwroks so that the same browsers can be used.

Intranets connect LANs within a company.

Extranets allow a company's customers and suppliers to access the company's network.
What are three types of programmed controls?
1. input controls
2. processing controls
3. output controls
What is the major distinction bw batch processing and online processing?
The major distinction bw batch processing and online processing is that transactions in a bath processing system are processed in batches and not necessarily at the time those transactions are submitted.

In online processing, transactions are processed as the transactions are entered.
What is the distinction bw centralized and distributed process?
Central processing maintains data and performs data processing at one or more central locations.

Decentralized processing occurs when computing power and processing are spread out over many locations.
What characterisitcs of a computerized system might lead to a higher potential for errors and irregularities than in manual systems?
The following:
1. the opportunity for remote access increases the likelihood for unauthorized access.
2. concentration of information means that once security is breached, the potential for damage is higher
3. decreased human involvement in procesesing results in a decreased opportunity for observation of errors
4. errors of fraud might occur in the design or maintenance of application programs
What are access controls?
Access controls limit access to program documentation, data files, programs, and computer hardware to authorized personnel.

Examples include locks, passwords, user id codes, assignment of security levels, call backs on dial up systems, setting of file attributes, and use of firewalls.
What is a firewall?
A firewall is a system of user identification and authorization that prevents unauthorized users form gaining access to network controls.
What is disaster recovery andwhat is the difference bw a hot site and a cold site?
Disaster recovery consists of plans for continuing operations in the event of descruction of not only program and data files but also processing capability.

A hot site is an off site location that is completely equipped to immediately take over a company's data processing.

A cold site is an off site location that has all the electrical connections and other physical requirements for data processing, but does not have the actual equipment.
Identify the costs associated with implementing EDI.
1. Legal Costs
2. Hardware Costs
3. Costs of translation software
4. Costs of Data Transmission
5. Process reengineering and employee traning costs for affected applications
6. Costs associated with security, monitoring, and control proceedres.
Define B2B transactions and identify the three different mkts.
When a biz sells its products or sevices to other bizs, it is called a B2B transaction.

B2B E-commerce: many bizs buy, sell, trade their products & services w/ other bizs.

Electronic Mkt: it is very common for B2B transactions to occur electronically via the internet.

Direct Mkt: it is also very common for b2b transactions to occur electronically bw businesses where there is a pre-existing relationship.
Identify some advantages of B2B e-commerce.
-speed
-timing
-personalization
-security
-reliability
Define electronic funds transfer (EFT).
EFT systems are a major form of electronic pymt for banking and retailing industries.

EFT uses a variety of technologies to transact, process, and verify money transfers and credits bw banks, businesses, and consumers.

The FED wire system is used very frequently in EFT to reduce the time and expense required to process cks and credit transactions.
Define EDI
EDI is computer to computer exchange of business transactions documents.
How are EDI transactions submitted, and what is mapping?
EDI transactions are submitted ina standard data format

Mapping is the process of determing the correspondence bw elements ina company's terminology and elements in standard EDI terminology.
What are the characterisitics / features of EDI?
1. EDI allows the transmission of electronic documents bw computer systems in different orgs.
2. EDI reduces handling costs and speeds transaction processing.
3. EDI requires that all transactions be submitted in a standard format.
4. EDI can be implemented using direct links, VANs, or over the internet.
What are some controls for and EDI system?
-Encryption of data
-Activity logs of failed transactions
-Network and sender / receipient acknowledgments.
What is e-commerce?
E-commerce involves electronic consummation of exchange transactions.

E-commerce normally implies the use of the internet.
What is B2B?
B2B is e-commerce bw businesses.
What is supply chain mgmt?
supply chain mgmt is the mgmt of an organization's supply chain including what, when, where, andhow much for every sale.