• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/95

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

95 Cards in this Set

  • Front
  • Back
Hardware?
Physical computer equip. Downtime is when computer aint functioning.
What's CPU / mainframe?
Primary hardware component. Actual processing data occurs in the CPU! It contains primary storage, a control unit & an arithmetic / logic unit!
What's RAM & ROM?
The primary storage contains the data & program steps that are being processed by the CPU & is divided into RAM (random-access memory) & ROM (read-only memory)!
What's the control unit?
Portion of the CPU that controls & directs the operations of the computer. It interprets the instructions from the program & directs the computer system to perform them.
What are peripheral equip?
Equip that is NOT part of the CPU but that may be placed under the control of the CPU, i.e., which may be accessed directly by the CPU. Input/Output devices & secondary storage devices are peripheral equip!
What are examples of Input/Output devices?
1. Barcode readers
2. Keyboard
3. Magnetic Ink Character Recognition
4. Magnetic Tape Reader
5. Modem
6. Monitor / Screen
7. Mouse / Trackball
8. Optical character recognition scanner
9. Printer
Briefly explain what software is?
Software includes programs, routines, documentation, manuals, etc., that make it possible for the computer system to operate & process data.
What are examples of secondary storage?
1. Disk, Diskette
2. Magnetic Tape
3. Offline Storage
4. Online Storage
5. Redundant Array of Independent disks
6. Randomly accessible (direct access)
7. Sequentially Accessible
What's a program?
A program is a set of instructions that da computer follows to accomplish a task (e.g., A/R update program, inventory mnmgt program, & payroll program). Program maintenance refers to making changes in the program in order to keep it current & functioning properly. ex. payroll update for soc sec changes.
What are the 5 program languages?
MAPFO

1. Machine Language
2. Assembly Language
3. Procedural Language
4. Fourth-generation Lang
5. Object-oriented programming
What's a graphical user interface?
A GUI allows user access to software functions depicted through use of icons, scroll bars, frames, & other pictorial means, rather than line-by-line commands or requests.
What's a patch?
Addition of a new part to a program.
Explain briefly JCL, Multiprocessing & programming & VS.
Job Control Lang - A commend language that launches apps, specifying priorities, program sizes, running sequences, databases used, & files used.

Multiprocessing - 2 or more programs at same time & needs more than one CPU!

Multiprogramming - A program is processed until some type of input or output is needed. APPEARS if more than one program is being processed concurrently using one CPU!

Virtual Storage - O/S divides a program into segments (called pages) & brings only sections of the program into memory as needed.
What's an operating system?
Manages the coordinating & scheduling of various application programs & computer functions. The O/S is like a traffic controller for data btw peripheral equip & application programs.
What's pass (run)?
A complete cycle of input, processing, & output in the execution of a program, typically an application program.
What's heuristic?
In computing, the adjective heuristic signifies able to change, it is used to descrie a computer program that can modify itself in response to da user. ex. spell check or voice recognition software.

Think Heuristic - spell check, wierd spelling!
Collaborative Computing Applications (Groupware, Shareware)?
A program that allows several people to have access to the same info & attempts to track the authors of changes.
Management information system?
An information system within an org that provides manmgt with the info needed for planning & control.
Utility program?
Routine functions such as sorting & merging!
What's Enterprise Resource Planning Software?
Complex, highly integrated, multimodule applications that manage a business' diff aspects, from traditional accounting to inventory management & advanced planning & forecasting.
Library Program (library routine)?
Programs that frequently are used by several other programs. They are kept within the system & "called up" whenever necessary.

ex. generating random #'s
Web Crawler?
A specialized program used to search the WWW for files meeting user criteria.

*Browser displays!
*Crawler searches!
Topology?
Physical layout of a network! BTRS!
Explain the 4 topologies.
BTRS!
Bus - Each device is connected to a line with disconnected ends. Communication on either side of a failed device is impossible.

Tree - Devices connected to other devices in a hierarchical manner. Some have many connections & some don't.

Ring - Each device connected to 2 others suce that it resembles a circle. If one device fails communication is still possible, however if a device btw 2 failed one's won't be able to communicate.

Star - All connected to cent'l device, all messages pass through cent'l one!
Brief explanation of what networks are.
A network is an arrangement of computers to allow users access to common data, hardware, &/or software. An internet is a network of networks. Intranet gen'ly is restricted to employee access. Extranet is password protected internet usually made for vendors & customers.
What's a concentrator?
A device that combines multiple communication channels into one. A concentrator differs from a multiplexor in that the total bandwidth of inputs don't have to = total bandwidth of outputs!
Multiplexor?
Total bw of inputs must equal outputs. It converts low speed into high speed transmissions & back again for communication stuff!
Proxy server?
An app or device that manages requests from web browsers. A proxy server caches (saves) a copy of pages retrieved from a web server. Future requests for the same page are supplied from the cache for shorter response time.
Router?
Switch that transfers incoming messages to outgoing links via the most efficient route possible. ex. over the internet!
Firewall?
Software designed to prevent unauthorized access to data by separating one segment from another!
Gateway?
Software or hardware that links 2 or more computer networks.
Web Browser?
Program used to find & display www files meeting user criteria.
Parallel vs Serial Transmissions.
P - all of the bits of a byte are transmitted at once along parallel lines, with one bit on each line. Practical only for short distances, public infrastructure is limited in capacity to do this.

S - each bit is transmitted at one time!
What are transmission protocols?
Sets of rules used by the transmitting and receiving devices so that they both interpret data identically. File transfer protocols is an example.
Explain what packet switching is.
PS divides a message into packets which may be transmitted separately through diff paths. Routing & ctrl software assemble the packets to recreate the org message. More efficient than circuit switching, but often involves some delay.
Explain what circuit switching is.
CS involves a dedicated channel for the duration of the transmission. Sender signals it will send message, receiver acknowledges, then whole message is sent.
What's client-svr architecture?
A network of workstations (clients) & another computer (server) that is shared among the clients.

1. File Server - a server in two-tier architecture where most processing occurs at clients & server mainly serves to store stuff.

2. Database server - similar to a file server, except the server stores the database management software & does some processing.

3. Three Tier (n-tier) Architecture - additional servers are added to a two-tier so clients share the functions provided by the svrs. Typical servers include print servers, fax servers, application servers & web servers.
What are the 4 network languages?
HHXX
1. HTML - Hyper text markup lang - the code used to format files for internet display.
2. HTTP - Hyper text transfer protocol - a set of rules establishing how data in files is coded, transferred & viewed.

3. XML - extensive markup lang - similar to HTML as formats info for use on the web but goes further identifying the nature of the info.

XBRL - Extensive business reporting lang - protocol under development that will provide interactive capabilities to SEC filings.
IP# or address?
An internet protocol # is a unique # assigned to a computer in a network. A registered IP # is registered with a central database to eliminate duplication on the web. Since IP #'s aren't easy to remember, unique domain names may be assigned to these #'s. A Uniform Resource Locator (URL) is another name for a web address.
What's prima facie credibility?
Something transmitted electronically froma customer derives its credibility primarily from the controls within the electronic environment.
A sniffer is?
A tool that will report all the user names & passwords that it finds, allowing the operator access to an unaware users email or other accounts.
What are the diff's btw a TH, virus, & virus hoax?
Trojan Horse - a seemingly legit program that operates in an unauthorized manner, usually causing damage.

Virus - replicates & attaches itself to other programs, can be just an annoying message or malicious activity.

Virus Hoax - an email message with a false warning, originator trys to get it circulated as widely as possible.
Digital Sig?
A dig sig is a guarantee that info has not been modified, like a tamper proof seal on a bottle of aspirin. Digital sigs are used for establishing secure website connections & verifying the validity, but NOT da privacy, of transmitted files. Also, a digital sig don't verify the receiving person or address.
What's encryption?
Encryption is a mathematical process of coding data so that in cant be read by unauthorized people. Decryption is transforming an encrypted file into the file that existed b4 the encryption. A key is used to lock & unlock the data. The key is the set of mathematical operations & any random initial values that are used to encrypt & decrypt the data. Algorithms describe the mathematical process vs. key which give the exact process.
Explain symmetric encryption.
With symmetric (private key) encryption, da same algorithm is used for encryption & decryption. Anyone who knows the method used to encrypt the message can decrypt it. Should be kept secret btw sender & recipient.
Explain asymmetric encryption.
Think A-Pub!!

Public key (asymmetric) encryption is a system that uses a public key that may be widely known & a private key that is intended to be dept secret & known only by the recipient of da encrypted messages. The sender encrypts messages to each particular recipient public key. Da recipient decrypts messages with their private key.
What are "hot" & "cold" sites?
Back up places!

Hot - location where a functioning system is planned for use with minimal prep in the event of a disaster at the primary location.

Cold - equip & pwr is avail at a location, but req's a lot of set up!
What's a connectionless enivironment?
The internet (web) since a website can interact with many users simultaneously.
What's back-end processing?
Sales reporting, order inquiry, inventory updating, shipping order generation, etc.
Hacker vs Cracker?
Hackers - computer enthusiast who's interested in learning the nitty-gritty.

Crackers - (criminal hacker)
intentionally involved in unethical activity.

Script Kiddies - use tools in an automated fashion & cause damage w/o understanding what they doing.
What are 7 kinds of hacker tools?
DPS TVSV
1. Demon Dialers
2. Port Scanners
3. Scripts
4. Trojan Horse
5. Virus
6. Sniffer
7. Virus Hoax
What's an ad hoc report?
Non-standardize report composed when the need arises.
What are demon dialers?
Software tools that will dial through a series of phone #'s finding modems then it will issue standard or default passwords, username combos, or brute attack trying to break into da system.
What are scripts?
Scripts will interrogate or investigate machines, finding out what accounts exist on the maching & whether a limit on password attempts is enabled.
What are port scanners?
Port Scanners are tools that will scan a network & network devices, & produce, automatically, reports that say these particular svcs are available & open. Thus, it's important to turn off svcs NOT being used & restrict svcs that are being used.
6 things a gen'l IT system includes?
1. Hardware
2. Software
3. Documentation
4. Personnel
5. Data
6. Controls
What's another word for automated controls?
Controls embedded in computer programs!
What are the benefits of an IT environment?
1. Consistently apply predefined bus rules & perform complex calcs in processing large volumes of trans!

2. Enhance timeliness, availability, & accuracy of info.

3. Facilitate additional analysis of info.

4. Enhance the ability to monitor the performance of the entity's activities & compliance with its policies & proc's.

5. Reduce the risk that controls will be circumvented, especially if controls over changes to the IT system are effective.
What are the risks of an IT environment?
1. Overeliance on info provided b the IT system.

2. Unauthorized access to data.

3. Unauthorized changes to computer programs.

4. Failure to make necessary changes to computer programs.

5. Inappropriate manual intervention.

6. Potential loss of data.
What are the 6 trans processing systems?
1. Inventory control
2. Sales
3. Purchasing
4. Payroll
5. Production
6. Gen'l ledger
What are 4 things to consider about an IT system?
1. Documentation - many proc's in IT system don't leave evidence of performance automatically.

2. Electronic info - files & records are in machine-readable form & can't be read w/o a computer.

3. Knowledge - a user may need specialized knowledge to use the system.

4. Difficulty of change - once implemented it's hard to change an IT system.
What are the 3 management reporting systems?
1. F/S

2. Data Mining

3. Key Performance Indicators
Explain da 3 types of data mining.
1. Sieve - sift thru large amts of data quickly. Can be done on entire pop's!

2. Customer Profiling - ex. credit card co may flag & delay trans that don't fit da customer profile. A store may notice several unrelated items commonly are purchases at da same time, a change in merchandise arrangement can result in increased sales.

3. Auditing - looking for fraud.
Explain the structure of data.
Bit - binary digit (0 or 1, on or off) represents smallest unit of data.

Byte - group of bits that represents a single character

Field - group of related characters. ex. a name

Record - group of related fields. ex. customer file

Editing refers to da addition, deletion, &/or rearrangement of data. Input editing refers to editing b4 processing & output editing refers to editing after processing.
Master vs Transaction file?
Master - contains relatively perm data like customer name, address, credit limit, amount owed, etc.

Transaction - contain current temporary data. A transaction file is used to update a master file.

For example, the day's charge sales would be accumulated on a trans file that would be used to update the A/R master file during an update run.
Explain database.
A structured set of interrelated files combined to eliminate redundancy of data items within the files & to establish logical connections btw data items. For ex, within personnel & payroll files, some of the data in the two sets of records will be the same, in a database system, these files would be combined to eliminate the redundant data.
What's encode and decode?
Encoding (or encryption) is scrambling data to prevent unauthorized use.

Decoding is converting data from an encoded state to its original form.
What are the 5 phases of development & implementation?
Analysis - feasibility study
Design
Programming - coding and testing
Implementation - system is released to user
Monitoring
In systems operation, what are the 4 processing methodologies?
1. Batch Processing

2. Online Processing

3. Real-time Processing

4. Integrated System
Diff btw batch & online processing?
B - transactions to be processed are accumulated in group (batches) b4 processing & are then processed as a batch.

OP - Trans are processed & the files are updated as the trans occurs. ex. cash terminal may automatically update inventory file when sale is made.
What's real-time processing and what's an example?
An online system is operating in real time if the data is processed fast enough to get the response back in time to influence the process. For ex, an airline reservation system is an OLRT system since da customer receives reservations after waiting only a few moments.
Which functions within the IT dept should be segregated?
Control Group
Operators
Programmer
System Analyst
Librarian

COPSL
What's an integrated system?
All files affected by a transaction are updated in one trans processing run! ex. a sales trans may update the sales summary file, the A/R master file, & the inventory file during one processing run!
What are the 3 outside processing arrangements?
1. Block time - rent certain block of time from outside party.

2. Time-sharing - a # of users share a computer system. Each may a access a CPU outside a client whenever.

3. Service bureau - outside org that provides a wide range of data processing svcs for a fee.
What do the C, O & S do in an IT dept?
Control Group - repsonsible for I/C within the IT dept!

Operators - Convert data into machine readable form!

Systems Analyst - Designs the overall system & prepares the system flowchart.
Who are the 6 people usually in a website team?
1. Accountant / Auditor - Specialists who understand how bus processes work.

2. Graphics designer - an artists who uses colors & images to design a site to complement da sites mission.

3. Marketing Specialist

4. Usability Specialist

5. Webmaster - A programmer responsible for the functionality of a site.

6. Writer

AMUGWW
What are the 3 diff administrators & what do they each do?
Database administrator - responsible for maintaining 1 or more databases & restricting access to authorized personnel.

Network Administrator - responsible for maintaining da efficiency & effectiveness of an internal network.

Web Administrator - responsible for maintaining external network interfaces (websites).
What's program documentation?
Primarily used by systems analysts & programmers to provide a control over program corrections & revisions.
What are operations documentation?
Info provided to the computer operator. IT can be used by the auditor to obtain an understanding of the functions performed by da operator & to determine how data is processed.
What are hardware controls?
They are controls that are built into the computer.
Echo check vs Hardware Check?
Echo - CPU sends signal to activate input/output device, the device sends back signal to verify activation.

Hardware - computer checks to make sure the equip is functioning properly.
What is boundary protection?
Keeps several files or programs seperate when they share a common storage.
File labels?
External - Human readable
Internal - Machine readable
Header - appears at beg of file & contains such info as the file name, ID# & the tape reel #.

Trailer - at end of file, contains info like count of the records in the file & an end of file code.
What's a file protection ring?
Guards against the inadvertant erasure of the info on the tape.
What's computer editing?
Computers can be programmed to perform a wide range of edit tests (edit checks) on records as they are being entered in da system.

If a particular record does NOT meet da test, it aint processed.
The 6 control types are?
PACCDS
Preventive - b4 an error occurs
Application - limited to a specific app, such as a control that verifies that a soc sec # has only numerical input.
Corrective - after an error is found
Compliance - promote adherence to established policies
Detective - uncover errors after they happen
System or gen'l - apply to da entire system, such as a control that verifies parity is maintained.
Hot vs cold sites?
Hot - location where a functioning system is planned for use with minimal prep in da event of a disaster at the primary location.

Cold - location where equip & pwr is located & available but req's considerable effort to get an o/s functioning.
What should continuity planning include?
1. Notification proc's
2. Recovery mngmt
3. Temp Operating Proc's
4. Backup & recovery proc's
Best way to scenario test disaster stuff?
Scenario Testing - Da expense & lost productivity to simulate a company wide disaster could be significant & unnecessary. A dry run (or table-top testing) would discover many weaknesses & allow contingency plans to be refined. Several limited-scope disaster sims could pinpoint additional weaknesses with minimal disruption to regular operations.
Documentation Mnemonic?
OPSOUP
Operation documentation
Problem definition doc
Systems documentation
Operator documentation
User documentation
Program documentation
Explain user documentation.
Description of da input req'd for processing an output listing. Auditor's may use it to gain an understanding of da functions performed by the user & the gen'l flow of info.
What are decision tables?
Decision tables are one means of documentation. They emphasize da relationships among conditions & actions, & present decision choices. Decision tables often supplement systems flowcharts.
Explain operator documenation.
Documentation should be prepared that will indicate da jobs run & any operator interaction.

1. Daily computer log - tells jobs run, the time & by who.
2. Console log - a listing of all interactions btw the console & the cpu.
What's systems documentation?
Provides sufficient info to trace accting data from it's original entry to system output. Includes:
1. Desc of system
2. System flowchart
3. Input descriptions
4. Output descriptions
5. File descriptions
6. Descriptions of controls
7. Copies of authorizations & their effective dates for system changes.
What's problem definition documentation?
Permits auditor to gain a gen'l understanding of a system w/o having to become involved in da details of the programs.