• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/65

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

65 Cards in this Set

  • Front
  • Back

Name and briefly describe the five major components that make up the information technology of an organization

1. Hardware: Hardware is the actual physical computer or computer peripheral device


2. Software: Software is the systems and programs that process data and turn that data into information


3. Network: A network is made up of the communication media that allows multiple computers to share data and information simultaneously


4. People: Many people have a role in IT, such as hardware technicians, network administrators, software developers, and end users


5. Data: Data is raw facts

What are the five functions performed on data in a business information system?

The five functions performed on data are:


1. Collect


2. Process


3. Store


4. Transform


5. Distribute



Describe the normal series of events in an accounting information system (AIS)

The series of events in an AIS is as follows:


1. The transaction data from source documents is entered into the AIS by an end user


2. The original paper source documents are filed


3. The transactions are recorded in the appropriate journal


4. The transactions are posted to the general and subsidiary ledgers


5. Trial balances are prepared


6. Adjustments, accruals, and corrections are entered


7. Financial reports are generated

Name and briefly describe six different types of MIS reports

1. Periodic Scheduled Reports: The traditional reports that display information in a predefined format and are made available on a regular basis to end users of the system


2. Exception Reports: Reports produced when a specific condition or "exception" occurs


3. Demand Reports: Specific reports that can be printed on demand


4. Ad Hoc Reports: A report that does not currently exist but that can be created on demand without having to get a software developer involved


5. Push Reports: A report that can actually be "pushed" or sent to a computer screen or computer desktop


6. Dashboard Reports: A report used by a company to present summary information necessary for management action

What are the primary roles of business information systems?

The primary roles of business information systems are to:


1. Process detailed data


2. Assist in making daily decisions


3. Assist in developing business strategies


4. Take orders from customers

Name the five functions performed on data by a business information system

The five functions performed on data in a business information system are:


1. Collect


2. Process


3. Store


4. Transform


5. Distribute

Describe the two types of processing used in a computerized environment

Batch processing - periodic processing




Online, real time (OLRT) processing (often referred to as "online processing") - immediate processing



What is a batch control total and how does it differ from a hash total?

A batch control total (or batch total) is a manually calculated total that is compared to a computer-generated total as a means of testing the accuracy and completeness of the input and processing




Batch totals are used for numbers that are normally added, such as dollar amounts, while hash totals are used for numbers that are not normally added, such as account numbers

What is the distinction between centralized and decentralized (distributed) processing?

Centralized processing maintains data and performs data processing at one or more central locations




Decentralized processing occurs when computing power and processing are spread over many locations

What are the advantages and disadvantages of centralized processing?

Advantages:


1. Data is secured better, once received


2. Processing is consistent




Disadvantages:


1. The cost of transmitting large numbers of detailed transactions can be high


2. There are increased processing power and data storage needs at the central location


3. There is a reduction in local accountability


4. Input/output bottlenecks may occur at high traffic times


5. There may be a lack of ability to respond in a timely manner to information requests from remote locations


6. The entire organization may be vulnerable to problems incurred at a single location

List and explain the steps in batch processing

Batch processing is accomplished in two steps:


1. Create a Transaction File: The first step is to create the transaction file by manually (usually) keying the data (data entry), editing the data for completeness and accuracy, and making any necessary corrections


2. Update the Master File: The second step is to update the master file by sorting the transaction file into the same order as the master file and then updating the relevant records in the master file from the transaction file

What is the major distinction between batch processing and online processing?

The major distinction between batch processing and online processing is that transactions in a batch processing system are processed in batches and not necessarily at the time those transactions are submitted




In online processing, transactions are processed as the transactions are entered

What are the various categories of business information systems?

The categories of business information systems are:


1. Transaction processing systems (TPS)


2. Decision support systems (DSS)


3. Management information systems (MIS)


4. Executive information systems (EIS)

Identify functions that should be segregated in an IT department

The duties of systems analysts, computer programmers, and computer operators should be segregated (although many companies combine systems analysts and computer programmers)

What are three types of programmed controls?

Programmed controls are:


1. Input controls


2. Processing controls


3. Output controls

What are the six steps of the system development life cycle (SDLC)?

1. Systems analysis


2. Conceptual and physical design


3. Implementation and conversion


4. Training


5. Testing


6. Operations and maintenance

What is the objective of executive information systems (EIS)?

EIS provide senior executives with immediate and easy access to internal and external information to assist executives in monitoring business conditions




EIS assist in strategic, not daily, decision making

What is the decision support system (DSS)?

A DSS is a computer-based information system that provides interactive support for managers during the decision-making process




A DSS is useful for developing information directed toward making particular decisions



What are transaction processing systems?

TPS are the systems that process and record the routine, daily transactions necessary to conduct business

What is the objective of management information systems (MIS)?

The objective of MIS is to provide managerial and other end users with reports




These predefined management reports provide managers with the information they need to assist them in the business decision making process

What are the five focus areas of the COBIT framework?

1. Strategic alignment


2. Value delivery


3. Resource management


4. Risk management


5. Performance measurement

What are information criteria described by COBIT?

Integrity


Confidentiality


Efficiency


Reliability


Availability


Compliance


Effectiveness

Identify the four domains and related process of the COBIT framework

1. Plan and Organize (Direct)


2. Acquire and Implement (Solution)


3. Deliver and Support (Service)


4. Monitor and Evaluate (Ensure direction followed)

Why is it important to have segregation of duties between computer operators and computer programmers?

It is important the computer operators and computer programmers' duties be segregated because a person performing both functions would have the opportunity to make unauthorized and undetected program changes

Why is it important to safeguard files and records?

Safeguarding of files and records is important because inadequate protection may result in loss or damages that might drive an organization out of business; hardware can always be replaced, but data often cannot be

What is encryption?

Encryption involves using a password or a digital key to scramble a readable (plaintext) message into an unreadable (cipher text message)




The intended recipient of the message then uses either the same or another digital key (depending on the encryption method) to convert the cipher text message back into plaintext

What characteristics should a password management policy address?

1. Password Length: The longer the better. Passwords should be greater than sever characters. Many organizations standardize on eight characters


2. Password Complexity: Complex passwords feature three of the following four characteristics - uppercase, lowercase, numeric, and ASCII


3. Password Age: The National Security Agency (NSA) recommends that passwords should be changed every 90 days. Administrative passwords should be changed more frequently


4. Password Reuse: the NSA recommends that password reuse of the previous 24 passwords be restricted. The goal is to prevent users from alternating between their favorite two or three passwords

What are the four types of computer security policies?

1. Program-level policy


2. Program-framework policy


3. Issue-specific policy


4. System-specific policy

Distinguish between digital signatures and e-signatures

Digital signatures use asymmetric encryption to create legally binding electronic documents. Web-based e-signatures are an alternative mechanism for accomplishing the same objective




An e-signature is a cursive-style imprint of a person's name that is applied to an electronic document and is also considered legally binding

What defines an information security policy?

Information security policies state how an organization plans to protect its tangible and intangible information assets



How can the Internet be defined?

The Internet is an international network composed of servers around the world that communicate with each other

Identify the costs associated with implementing EDI

1. Legal Costs


2. Hardware Costs


3. Costs of translation software


4. Costs of data transmission


5. Process reengineering and employee training costs for affected applications


6. Costs associated with security, monitoring, and control procedures

Define B2B transactions and identify the three different markets

When a business sells its products or services to other businesses, it is called a Business-to-Business (B2B) transaction


1. B2B e-commerce: many businesses buy, sell, or trade their products and services with other businesses


2. Electronic market: it is very common for B2B transaction to occur electronically via the Internet


3. Direct market: it is also very common for B2B transactions to occur electronically between businesses when there is a preexisting relationship

Identify some advantages of B2B e-commerce

1. Speed


2. Timing


3. Personalization


4. Security


5. Reliability

Define electronic funds transfer (EFT) systems

EFT systems are a major form of electronic payment for banking and retailing industries




EFT uses a variety of technologies to transact, process, and verify money transfers and credits between banks, businesses, and consumers. The Federal Reserve wire system is used very frequently in EFT to reduce the time and expense required to process checks and credit transactions

Define EDI

EDI is the computer-to-computer exchange of business transaction documents in structured formats that allows for direct processing of the data by the receiving system

How are EDI transactions submitted, and what is mapping?

EDI transactions are submitted in a standard data format




Mapping is the process of determining the correspondence between elements in a company's terminology and elements in standard EDI terminology

What are the features of EDI?

1. EDI allows the transmission of electronic documents between computer systems in different organizations


2. EDI reduces handling costs and speeds transaction processing


3. EDI requires that all transactions be submitted in a standard data format


4. EDI can be implemented using direct links, VANs, or over the Internet

What are some controls for an EDI system?

Controls for an EDI system might include:


1. Encryption of data


2. Activity logs of failed transactions


3. Network and sender/recipient acknowledgments

What is e-commerce?

E-commerce involves electronic consummation of exchange transactions




E-commerce normally complies the use of the Internet but a private network can also be used

How does EDI differ from e-commerce on a cost, security, speed, and network basis?

EDI vs. e-commerce includes the following comparisons:


- Cost: EDI is more expensive than e-commerce


- Security: EDI is more secure than e-commerce


- Speed: e-commerce is faster than EDI


- Network: EDI uses VAN (private) and e-commerce uses the Internet (public)

Define and describe the purpose of BPR

Business process reengineering (BPR) is the analysis and design of business processes and information systems to achieve significant performance improvements. The purpose of BPR is to simplify the system, make it more effective, and improve the entity's quality and service

Define and describe the purpose of ERP

An enterprise resource planning system (ERP) is a cross-functional enterprise system that integrates and automates the many business processes and systems that must work together in various functions (e.g. manufacturing, distribution, human resources) of a business

Supply chain management is concerned with what four characteristics of every sale?

Supply chain management is concerned with:


- Goods received should match goods ordered (what)


- Goods should be delivered by the date promised (when)


- Goods should be delivered to the location requested (where)


- The goods' cost should be the lowest possible (how much)



Compare and contrast HTML, HTTP, and URL

Hypertext markup language (HTML) is a tag-based formatting language used for Web pages




Hypertext transfer protocol (HTTP) is the communications protocol used to transfer Web pages on the World Wide Web




Uniform resource locator (URL) is the technical name for a Web address, which directs users to a specific location on the Web

What are the risks in a business information system?

1. Strategic risk


2. Operating risk


3. Financial risk


4. Information risk

Name the five threats in a computerized environment

1. Virus


2. Worm


3. Trojan House


4. Denial-of-service attack


5. Phishing



What are access controls?

Access controls limit access to documentation, data files, programs, and computer hardware to authorized personnel




Examples include locks, passwords, user identification codes, assignment of security levels, callbacks on dial-up systems, the setting of file attributes, and the use of firewalls

What is a firewall?

A firewall is a system, often both hardware and software, of user identification and authentication that prevents unauthorized users from gaining access to network resources

What is disaster recovery and what is the difference between a hot site and a cold site?

Disaster recovery consists of plans for continuing operations in the event of destruction of not only programs and data but also processing capability




A hot site is an off-site location that is equipped to take over a company's data processing


A cold site is an off-site location that has all of the electrical connections and other physical requirements for data processing but does not have the actual equipment

What are the three types of backups to performs to recover lost data?

1. Full backup


2.Incremental backup


3. Differential backup



What are three types of disaster recovery?

1. Disaster recovery service


2. Internal disaster recovery


3. Multiple data center backups

What are the three types of off-site locations?

1. Cold site


2. Warm site


3. Hot site

What is the disadvantage of a disaster recovery and business continuity plan?

The disadvantage is the cost and effort required to implement the plan

Identify the four main functions of a DBMS

1. Database development


2. Database query


3. Database maintenance


4. Application development

Identify nine components of a LAN

1. Node


2. Workstation


3. Server


4. Network Interface Card (NIC)


5. Transmission Media


6. Network Operating System (NOS)


7. Communications Device


8. Communication/Network Protocols


9. Gateways and Routers

Identify the two types of networks that can be used to provide WAN communications services

Value Added Network: privately owned communication network that provides additional services beyond standard data transmission




Internet-based Network: uses Internet protocols and public communications channels to establish network communications

List some of the features of a value added network (VAN)

A value added network:


- Is privately owned


- Provides additional services


- Provides goods security


- Uses periodic (batch) processing


- May be expensive

List some of the features of an Internet-based network

An Internet-based network:


- Uses public communications channels


- Transmits transactions immediately


- Is relatively affordable


- Increases the number of potential trading partners

What is the difference between an intranet and an extranet?

An intranet connects geographically separate LANs within a company, whereas an extranet permits specified external parties to access the company's network

What is the basic difference between a database and a database management system?

A database is an integrated collection of data records and data files




A database management system (DBMS) is the software that allows an organization to create, use, and maintain a database

What is a data warehouse and what is data mining?

A data warehouse is a collection of databases that store both operations and management data




Data mining is the processing of data in a data warehouse to attempt to identify trends and patterns of business activity

What are some advantages of a DBMS?

Advantages of a DBMS include:


1. Data redundancy and inconsistency are reduced


2. Data sharing exists


3. Data independence exists


4. Data standardization exists


5. Data security is improved


6. Data fields can be expanded without adverse effects on application programs


7. Timeliness, effectiveness, and availability of information is enhanced

What is the basic difference between WANs and LANs?

The basic difference between WANs and LANs is distance




LANs normally are within a fairly limited distance, and WANs allow a much longer distance

What are the some of the similarities and differences between the Internet, intranets, and extranets?

The Internet, intranets, and extranets all use Internet protocols and public communication networks rather than proprietary protocols and networks so that the same browsers can be used




Intranets connect LANs within a company. Extranets allow a company's customers and suppliers to access the company's network