• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/46

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

46 Cards in this Set

  • Front
  • Back
A program that converts a source program into instruction codes that the central processing unit can execute is called
A language processor
Central element of Management Information System MIS is
processing of data items is based on decision models.
One reason to use RAID - array of inexpensive disks - is to ensure that
if one drive fail, all data can still be reconstructed
Critical software application programs should be stored on the server in
Object code
____________ provides instructions to perform a task or job. It would tell the operating system how to schedule, allocate resources and retrieve data.
Job control language
A program that converts PROCEDURE-ORIENTED language to machine language is
A compiler
A distributed/decentralized processing environment works best when
significant volumes of data are generated at many remote locations and the user requires immediate access to the data.
Specialized programs that perform routine and repetitive functions are called
Service programs
Cyclical fluctuations, random variations, seasonal variations and secular trend are all components of
time series analysis
ID of users who have permission to access data elements in database is found in the
database schema
Which method would provide the best data security for a firm that uses a wide area network WAN?
End-to-end encryption
implementing locking procedure could lead to
Deadly embraces.
Data locking ensures consistent processing
Exponential smoothing is a statistical method that is useful as a sales forecasting technique.
Exponential smoothing weights current data heavier than
older data. It is used to smooth forecast variation.
___________ usually involves two or more computers functioning simultaneously and allows the sharing of a central memory during processing
Multiprocessing
___________ allows multiple programs to be executed at exactly the same time
Multiprogramming
In the systems development cycle, coding is part of the
detailed design phase
The system development cycle consists of (5)
analysis, conceptual design, detailed design, implementation and operation.
Which characteristic distingushes electronic data interchange (EDI) from other forms of electronic commerce?
EDI transactions are formatted using STANDARDS that are uniform worldwide
Online access controls include :
authorized user code numbers
passwords
list of all files and programs and a record of the type of access each user is entitled to have for each file and program
A computer system flowchart provides the overall view of the inputs, processes and outputs of __________
an information system.
When evaluating internal control of an entity that processes sales transactions on the internet, an auditor would most concern about the:
potential for computer disruption in recording sales
One of the risks in distributed system is
database INTEGRITY (unity, wholeness ) might not be preserved during a network or computer failure
Who is responsible for authorizing transactions and for correcting errors?
Users
Who is responsible for preventing unauthourized physical and logical access to the system?
Security management
Routines that utilize the computer to check the validity and accuracy of TRANSACTION data during input are called
edit programs -
they reject those transactions whose data do not meet preestablished standards of data quality
The computer operating system performs scheduling, resource allocation and date retrieval functions based on a set of instructions provided by the
JOB CONTROL LANGUAGE
Librarian and production control are most likely to be included w/in
the Operation area of the system department
A decision table indicates the
Alternative logic conditions and actions to be taken in a program
Operating documentation includes
equipment configuration, program and data files, and description of conditions that may req. program interruption.
Intranets ( private networks) are characterized by
higher security risk and lower costs
Managing the IS function includes
charging user departments for computer services, project development planning and responsibility accounting principles
Validity check use when
the data is misspelled of transposed - has typing errors
Optical character recognition OCR software
converts images of paper doc. as read by scanning device into text computer files
Shareware is
a program that can be freely copied and tested before purchase.
It does NOT transfer data
Linked list is a file structure that
has a field that has the address of the next record
Components of the data processing cycle?
Collection, refinement (classifying and/or batching), processing, maintenance (calculattion and storage), output
Authorization controls are implemented using COMPATIBILITY TESTS and ACCESS CONTROL MATRICES
COMPATIBILITY TESTS - determine if the user is authorized to perform the desired action.
ACCESS CONTROL MATRICES - 1)is a list of authorized user ID and passwords and
2) a list of all files, data and programs and the access each user has to them
The implementation phase of an acct. software application would include :
obtaining and installing hardware, documentating user procedures, training users, and entering test data.
A DBMS (database management system) are complex software package which permits users to
access info. From data base. DBMS provides for access and identification security, concurrent use of data and backup and recovery. It DOES NOT run application programs.
The TRANSFORMATION component of IS has which of three subsystems?
Storage, arithmetic-logic, control subsystem.
If a database has integrity,
this means that the database has only CONSISTENT data.
The purpose of a cycle processing control is to mitigate the risk of :
missing or improper transactions
REMOTE BACH processing avoids the need of having
a CPU at each user location
Systems analysis is assigned to
SYSTEM ANALYST- who helps users to analyze their info and design IS
Computer operations are assigned to
Computer OPERATORS. Programmers should never have access to computer operations
Operating systems and compilers assigned to
SYSTEM PROGRAMMERS , who use the design developed by the analysts to develop an IS and write the computer programs.