• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/72

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

72 Cards in this Set

  • Front
  • Back
A business, an industrious effort, especially one directed toward making money.
Enterprise
A set of interconnected channels for communicating knowledge of specific events or situtations
Information System
Joined together, united made into a whole by having brough all parts together
Integrated
_____ happens when each functional area typicaly has its own system.
Enterprise Stovepipes or silos
What are common Integrated attempt?
1) Integrated the end results
2) Integrated similar types of systems
3) Enterprise Systems
An __________ is a real-world object that has a separate physical or conceptual exisitence
Entity
A _______ is an association between entities.
Relationship
A ___________________ is a characteristic possessed by an entitites or a relationship.
Attribute
A combination of student ID attribute with the course ID attribute would suffice as a primary key. Such key is called a _______________
concatenated primary key.
A ___________ is a attribute that cannot be further decomposed.
Simple Attribute
__________ attribute may be decomposeed into other attribute.
Decompose

I.E. Address can be decompose into Street, City, State.
A ____________ attribute is an attribute that can be derived (computed) from values of other attributes in the database.
Derivable Attribute
There are two types of derivable attributes: Those for which the derived value will not change if new dagta are entered into the database
Static derivable attribute
There are two types of derivable attributes: Those for which drived value will change if new ata are entered into the database
Volatile derivable attribute
Economy Risk consist of:
Risks associated with factors that affect the entire economy:
Global economics downturns
Wars
Epidemics
Terrorist attack
Environment disasters (flood, hurricanes)
Industry Risks consist of:
Risks associated with factors that affect the enterprises' industry:

Industrywide cost increases
Industrywide decrease in demand for products
Economy risk especially bad for a specific industry
Unexpected competition from another industry.
Enterprise risks consist of:
External Factors:
Increased competition from other enterprise
Reduction of perceived brand quality or reputation
Crises involving business partners
Catastrophe that causes an interruption of operations
Merger or acquitsition involving another enterprise.

Internal Factors:
Lack of ethics
Low employee morale
Employee incompetence
Business process risks consist of:
Risks associated with actual business process objects:
Resources
Event
Agent
Resources-Event Relationships
Event-Event Relationships
Event-Agent Relationships
Resource-Agent Relationships
Information process risks consist of:
Risk associated with:

Recording information about REA
Maintaining information about REA
Reporting information about
REA
____ focus on preventing errors or irregularities
Preventive Controls
_____ focus on identifying that errors or iregularities have occured
Detective Controls
__________ should built into the system to verify that percribed business rules are followed when executing an event.
Event processing rules
_______ helps the user verify that the correct record is being processed and updated.
Close-loop verification
_____ keys input data twice
key verifications (rekeying)
Read over Entities Intergration Chapter 14 over:
Important concept
A formula can be applied to an account number, part number, or similar standard number to calculate a _____
Check Digit

Suppose we want a five-digit account number (including the check digit) and the first four digits of the account number based on styles, division, clor and product type are 1534. A check digit is used to add the fifth digit.
A ______ check verifies that all critical field data are entered. It checks for missing data or blanks.
Compleness Check
_____ Set the field content to a prespecified (default) value
Default values
If a field is declared as text or an alphanumeric field, the data input should be alphanumeric letter and numbers. What kind of edit check is used?
Field or mode check
A _____ check compares entered data to a predetermined acceptable upper and/or lower limit. Data are not accepted without special authorization if the data fall outside the specified limits.
Range(limit) Check
A _____ check compares entered data against prespecified data stored within the computer to determine its validity.

For Example, to determine the validity of a user identification number, the computer would compare the entered primary key of the user to a stored list of valid users numbers.
Validity check.
A _____ verifies that the records in a bath are sorted in the proper sequence.
Sequence check.
A ____ verifies that all transactions included within the batch are tof the same category or type.

For example, we would not want the addition of a new customer to be confused with the addition of a new employee.
Transaction type check.
________ are used to verify that no transactions within a batch are present and have been processed.
Batch control total.
A _____ is the sum of an attribute that normally would not be summed because its sum has no real meaning.
Hash control total
A _____ is the sum of a financial field, such as the invoice amount, of all record in a batch.
Financial/numeric control total .
A ______ is a total of the number of recors in a batch
Record count control total
Understand the COSO controls and the components in each parts.
Important Concept
Creating of seprate models for diffferent portions of a system is called?
View Modeling
What are the three steps involves in view integration?
1) Identify the common entities
2) Merge the common entities, resolving any entity conflicts and performing a set union of their attributes.
3) Examine each relationship and resolve an relationship conflicts.
What's a disadvantage that results from combined entitiy key posting?
The inability to enforce referential integrity
1 . What are the five (5) components of Enterprise Content Management as defined by the Association for Information and Image Management?

a. Capture, Manage, Verify, Preserve, Deliver
b. Capture, Authority, Verify, Preserve, Deliver
c. Capture, Manage, Store, Preserve, Deliver
d. Capture, Authority, Store, Preserve, Deliver
e. Capture, Manage, Cumulate, Sustain, Deliver
c. Capture, Manage, Store, Preserve, Deliver
2. Collaboration is the art of working together and an essential part of the Enterprise Content Management. What is the initial step that an enterprise
must consider in order to mitigate the risk of silo content trap?

a. Searching for a set of technologies including instant messaging, whiteboards, online meetings, e-mail etc. that allow work to take place wherever
and whenever needed.
b. Examining current organizational structure and breaking down rigid hierarchy that impedes communication.
c. Carrying out a financial analysis using Net Present Value (NPV) and Internal Rate of Return (IRR) to determine the profitability and the payback
period of the impending ECM systems purchase.
d. Obtaining an assessment on the company’s internal controls from the current auditor.
e. Implementing an Enterprise Resource Planning (ERP) right away so that it will integrate all facets of the organization's
business, and such organization will benefit from more closely shared information.
a. Searching for a set of technologies including instant messaging, whiteboards, online meetings, e-mail etc. that allow work to take place wherever
and whenever needed.
3. What is the implication of taxonomy in the context of Enterprise Content Management?

a. It is a formal structure for information based on the individual needs of a business, and various tools can automate the placement of
content for future retrieval based on groupings

b. Technologies that allow paper information to be translated to electronic data without manual data input, and they can have progressive
capabilities from optical character recognition (OCR) to intelligent character recognitions (ICR).

c. An essential part of the capture process, which tags scanned documents (customer ID number, for example) so the document can be found.

d. A system that reduces corporate tax by creating and keeping track of capital loss account that could be used in the future to offset corporate
capital gains.
e. A management tool for assigning authority and responsibility. It explains proper business practices, describes the knowledge and experience
needed by key personnel, spells out management policy for handling specific transactions, and documents the systems and procedures employed to process
those transactions.
a. It is a formal structure for information based on the individual needs of a business, and various tools can automate the placement of
content for future retrieval based on groupings.
1) WAP components include
a. 5 layers that are dependent on each other
b. 4 layers that are dependent on each other
c. 5 layers that are independent on each other
d. 7 layers that are independent on each other
c. 5 layers that are independent on each other
2) WML is based on
a. XML
b. WAP
c. DNS
d. ACID
a. XML
3) What are some mobile internet’s constraints?
a. Less bandwidth
b. Restricted power consumption
c. Less memory
d. All of the above
d. All of the above
1. Drive-by malware is also known as which of the following:
A. concealment malware
B. infectious malware
C. drive-by download
D. none of the above
c. driven-by download
2. Which of the following is not a threat that malware poses to a company?

A. loss of data
B. deletion of data
C. theft of data
D. interruption of business processes
E. all of the above are threats
C. theft of data (Might be all of the above)
3. According to Google’s research, the majority of sites that initiate drive-by downloads onto visitors’ computers originate in:

A. China
B. India
C. Mexico
D. Canada
E. USA
A. China
1.Which of the following are reasons why security breaches are committed:

a. Human error/ negligence
b. Corporate sabotage
c. Disgruntled employees
d. Missing or lack of standard practices
e. All of the of the above
E. All of the above
2. What category is creating a culture that stress: Integrity, commitment to ethical values and competence belong?

A. Corrective
B. Preventive
C. Detective
D. Management Development Program
B. Preventive
A. Require the contractor to return organization assets
B. Access right removed
C. A and B
D. B only
C. A and B
1. What are the dangers of Cross Site Scripting?
• a) Theft of confidential information
• b) Corrupted Database
• c) Misdirect Uses to Malicious Sites
• d) Gain control of users’ computer
• e) Answer b) and d)
• f) All of above
E. All of the above
2. How to secure a site against Cross Site Scripting attacks?
• a) In house input filtering
• b) Output filtering
• c) Installing a third-party application firewall
• d) Answer a) and b)
• e) All of above
E. All of the above
3. Which one is not “Stored” Cross Site Scripting?
• a) Non-Persistent
• b) Persistent
• c) script language injection attack
• d) HTML injection attack
A. Non-persistent
1. Which of the following below is a cloud computing type?
a. Public cloud
b. Hybrid cloud
c. Private cloud
d. All of the above
d. All of the above
2. What is cloud computing?
a. The ability to access customized software and applications virtually anywhere with internet connection
b. Internet access
c. Networking websites such as FaceBook and MySpace
d. None of the above
a. The ability to access customized software and applications virtually anywhere with internet connection
3. What does the acronym for SaaS stand for?
a. Service and as Software
b. Software and as Service
c. Software as a Service
d. Service as a Software
c. Software as a Service
1. What does DNS stand for?
a. Domain name system
b. Domain name server
c. Domain network system
d. Domain network server
a. Domain name system
2. Randomization of BIND ID’s was mentioned. What does BIND stand for?
a. Boston Internet Name Domain
b. Berkeley Internet Name Domain
c. Binding Internet Name Domain
d. Berkeley Internet Network Domain
b. Berkeley Internet Name Domain
3. What could be used as a first line of defense from DNS poisoning?
a. Deploying a secure version of DNS
b. Switching to a TCP connection
c. Screening query responses
d. Use UDP source port randomization
d. Use UDP source port randomization
1. What does the A in ACID stand for:
a. Atomic
b. Atomicity
c. Ace
d. Database
b. Atomicity
2. What guarantee does Isolation provide in a transaction?
a. “all or nothing”
b. Upon completion of the transaction, the operation will not be reversed
c. The transaction will behave as if it is the only operation being performed upon the database.
d. The database will be in a consistent state when the transaction begins and ends.
c. The transaction will behave as if it is the only operation being performed upon the database.
3. How is AIS and ACID related?
a. Backup and transaction logs
b. Preventive and corrective
c. Authorization and preventive
b. Preventive and corrective
1) Organic RFIDs can be used in
a) only lower frequencies
b) only ultra high frequencies
c) both frequencies
d) neither frequencies
a) only lower frequencies
2) RFID use started in ______ and is now moving into use in ______
a) open supply chains, just in time manufacturing
b) medicine, inventory
c) just in time manufacturing, open supply chains
d) animal tracking, smart cards
c) just in time manufacturing, open supply chains
3) RFIDs are used for which of the following internal controls
a) preventive
b) detective
c) corrective
d) a and b
e) b and c
d) a and b
1) What does SQL stand for?
a. Stable Query Letters
b. Structured Query Language
c. Structured Query Lessons
d. Sampled Query Lists
b. Structured Query Language
2) Is it programmatically possible to detect malicious error.
a. Yes
b. No
a. No
3)An example of a SQL injection from the presentation is
a. Changing the Where statement to reflect a x=x criteria resulting in always being a true statement
b. Switching the FROM statement to FROMAS
c. Inserting a virus into the SQL when it connects to the internet
d. Opening ports to cause the query to be invalid
a. Changing the Where statement to reflect a x=x criteria resulting in always being a true statement
4)According to the presentation, SQL injection is harmful for business because
a. It can cause disable VOIP commands
b. It can cause a system crash
c. It can lead to stolen sensitive data
d. It can delete all data on the system
c. It can lead to stolen sensitive data