Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
165 Cards in this Set
- Front
- Back
The basic building block of information systems planning is _____________
|
Project Development Planning
|
|
A _____ is a long range planning document that specifies what the system will consist of, how it is developed, who will develop it, how needed resources will be acquired, and where the AIS is headed.
|
Master Plan
|
|
The activities and relationship are used to draw _____, which consists of a network of arrows and nodes representing, resprectively, project activities that require an expeniture of time and resources and the completion and initiation of activities.
|
PERT chart
|
|
A _____ is a bar chart with project activities listed on the left hand side and units of time, days or week accross the top.
|
Grantt Chart
|
|
A company wishes to introduce and test a new AIS at a branch location before company-wide adoption. This approach is called
|
Pilot Conversion
|
|
What is an advantage of using CASE?
|
Simplified documentation
|
|
What is the name for the type of testing where copies of real transaction and file records are used rather than hypothetical ones?
|
acceptance testing
|
|
Inadequate testing can lead to serious systems failures. Part of the SDLC process is to adequately test the system being implemented. What is the type of test that determines whether a program is operating as desired?
|
processing of test transactions
|
|
Major resistance to change takes one of several forms. What is the name of the form of resistance where the new system is blamed for any and every unpleasant occurrence?
|
projection
|
|
In which approach to systems acquisition is "inexpensive updates" considered an advantage?
|
turnkey software and systems
|
|
The basic framework for feasibility analysis is the ________
|
Capital budgeting
|
|
_____ This is the number of year required for the net savings to equal the intial cost of the investment. The project with the shortest period is usually selected.
|
Payback Period
|
|
With the ______ all estimate future cash flows are discounted back to the present, using a discount rate that relects the time value of money.
|
Net Present Value
|
|
The ____ is the effective interest rate that results in a NPV of zero.A project's ____ is compared with a minimum acceptable rate to determine acceptance or rejection.
|
Internal Rate of Return (IRR)
|
|
_______ is behavior that is usually inteded to destroy, cripple, or weaken the system's effectiveness. It may take in form of increased error rates, discruptions, or dliberate sobotage.
|
Aggression
|
|
______ involves blaming the new system for any and every unpleasant occurrence.
|
Projection
|
|
One way for employee to deal with a new AIS is to avoid using it in the hope that the problem can be ignored or that it will eventually go away is _____
|
avoidance.
|
|
Look back at data gather informaton:
|
Page 672
|
|
What is the strategies for determine requirements?
|
1) Ask users what they need
2) Analyze existing system 3) Examine Existing system users 4) Create Prototype |
|
______ is sold on the open market to a broad range of users with similar requirements.
|
canned software
|
|
Software and hardware that are sold as a package and vendor installs the entire system is ________
|
Turnkey systems.
|
|
______ host Web-based software on their computer and deliver the sofware to their clients over the Internet.
|
ASP
|
|
________a data-processing task with input, processing, and output jobs typical of those the new AIS will be require to perform. Processing times are calculated and compared, and the AIS with the lowest time is judged the most efficient.
|
Benchmark problem
|
|
Evaluating system the uses weight to assign to each software and how well their proposal measure up to the standard is ______
|
point scoring
|
|
______ estimate the cost of purchasing or developing features that are not present in a particular AIS.
|
Requirement costing
|
|
____________ is hand on development, use, and control of computer-based information systems by users.
|
End-User-Computing
|
|
_____ occurs when information users, such as managers, accounting, and internal auditors, develop their own applications using computer specialists as advisor.
|
End-User-Development.
|
|
Output design consideration
|
Use
Medium Format Preprinted Location Access Detail Timeliness |
|
_____ have no prespecified content or format and are not prepared on a regular schedule. They are prepare in response to a management request to evaluate an issue.
|
Special-purpose analysis reports
|
|
_____ have a prespecified content and format but are prepared only in repsonse to abnormal conditions.
|
Triggered exception reports
|
|
_____ have a prespecified content and format but are prepared only on request.
|
Demand Report
|
|
File and database design considerations:
|
Medium
Processing mode Maintenance Size Actitivies |
|
Input Design Consideration:
|
Medium
Source Format Type Volume Personnel Frequency Cost Error dection and correction. |
|
Controls Design Considerations:
|
Validity
Authorization - How can the AIS ensure that payroll additions have been authorized? Accuracy - What controls are in place to ensure that data passed between processing activities are not lost Security Numericol control Availability Maintenability Integrity Audit trail. Look back before exam- page 751 |
|
_____ are step-by-step reviews of procedures or program logics. Focus is on the input, files, output, and data flows of the organization.
|
Walk-through
|
|
_____ determines if the program operates as designed.
|
Processing Test Transaction
|
|
_____ use copies of real transactions and files rather than hypothetiscal ones.
|
Acceptance Test
|
|
_______ immediately terminates the old AIS when the new one is introduced.
|
Direct Conversion
|
|
_____ operates the old and new systems simutaneously for a period of time.
|
Parallel conversion
|
|
______ gradually replaces elements of old AIS with the new one.
|
Phase-in conversion
|
|
_______implements a system in just one part of the organization, such as brand or location.
|
Pilot conversion.
|
|
The final step in the SDLC is that of the operation and maintenance of the new system. What is the first activity in the systems development process?
|
Deliver improved system
|
|
Denial of service and distributed denial of service; attack which overburden a server or network and force it to shut down.
|
DDos Attack
|
|
Cracking system security from the outside and gain entry to the private system
|
Intrusion
|
|
Monitoring network traffic passively to gain information.
|
Snooping
|
|
Autonomous and self-replicating computer programs which seek and disable or hijack some or all of a computer system
|
Viruses
|
|
A networked computer viruses which propagate over active network connections.
|
Worm
Frequently worms are also Trojans |
|
A virus masquerading as a useful or desirable piece of software, or which is hidden in said
|
Trojan
|
|
A system which has been compromised by a stealthy virus; the ______ will devote system resources to running processes in the interest of the virus's creator, such as assisting in DDoS Attack or spaming.
|
Bot
|
|
Gaining access to a system via its human users via duplicity.
|
Social Engineering
|
|
1. Which of the following is(are) Linux media player(s) ?
a. sound juicer b. rhythmbox c. gstreamer d. both A and B e. all of the above |
Both A and B
|
|
3. Companies prefer Command Line Interface because
a. give complete control over the system b. powerful for many task c. use less memory d. all of the above e. none of the above |
D. all of the above
|
|
4. Apart from software cost, what are the other two costs should be considered in the additional total cost of ownership?
|
Downtime Cost and Administration costs.
|
|
1.What is KDE stand for?
a. (K = no meaning, D = Development, E = Easy) b. (K = Kool, D = Desktop, E = Environment) c. (K = Kool, D = Desktop, E = Easy) d. (K = Kentucky, D = Department, E = Education) |
b. (K = Kool, D = Desktop, E = Environment)
|
|
2. What are the benefit of using KDE?
a. ease of use b. low learning curve c. network transparency d. all of the above |
All of the above
|
|
3. Which of the following is NOT compatible with KDE?
a. X Windows b. Kubuntu c. Mac OS d. Fedora 10 e. All are compatible |
All are compatible
|
|
1. DOS stands for:
a) Deficient Operational System b) Disk Operating System c) Directory Operating System d) Directional Operational System |
c. disk operating system
|
|
2. Dbase is valued for its ____, but is not very ___.
a) security / user-friendly b) cost / secure c) graphics / customizable d) cost / user-friendly |
a) security / user-friendly
|
|
3. Windows 3.1 (released in 1992) was one of the first widely used _____ operating system.
a) Windows b) PC (personal computer) c) CLI (command line interface) PC d) GUI (graphic user interface) PC |
d) GUI (graphic user interface) PC
|
|
What does Quasar accounting offer to Linux users and not Windows?
A) Free Base package B) Invoicing C) A handheld barcode scanner interface D) Accounts payable |
C) A handheld barcode scanner interface (ANSWER)
|
|
Which Accounting software supports OFC (Open Financial Exchange) and HBCI (Home Banking Computer Information)?
A)Quasar Accounting B)Gnucash C)Lamp D) Wine |
B)Gnucash ANSWER
|
|
True or False, do Linux servers have the ability to run for an extended amount of time?
A)True B)False |
A)True Answer
|
|
1.What are the last two steps in the FBI sentinel planning process ?
|
Planning: Step 6&7
Training •Realistic schedule and cost estimate of overall project costs •Train all FBI staff at all location •development contractor’s responsibility Monitor •Effects of taking funds from operational programs •Identify possible resolution |
|
2. What was the FBI's original information system called?
|
Automated Case Support System
|
|
3. Which company did the FBI ultimately settle on to be contractor for their Sentinel project?
|
Lockheed Martin
|
|
1) Applied Materials' core businesses include:
a) Hard Drives b) iPhone 3G c) Semiconductors d) None of the above |
c) Semiconductors
|
|
2) One of the drawbacks of having different legacy systems across the organization is/are:
a) They do not communicate well with each other b) They are cause for operational waste and inefficiency c) Both (a) and (b) are correct d) None of the above |
c) Both (a) and (b) are correct
|
|
3) _______ helped Applied Materials design and upgrade to a new ERP system:
a) Oracle b) Intuit c) Microsoft d) SAP e) Adobe |
d) SAP Answer
|
|
What does XBRL stand for?
a. Extensible Business Reporting Language b. Extensible Body Reporting Language c. Extensible Makeup Language d. Extensible Business Record Language |
a. Extensible Business Reporting Language
|
|
What is the parent language of XBRL?
a. HTML b. XML c. DHTML d. XBL |
b. XML Answer
|
|
Which of the following represent one of many driving forces behind XBRL implementation?
a. E-mail b. Continuous Auditing c. Web Design d. Designer |
b. Continuous Auditing
|
|
Command? Copies an input file and can convert the file's content to another format or to have different characteristics
|
dd
|
|
Command? Displays information about how space is allocated in a file system, such as used and free space
|
df
|
|
Command? Summarizes disk usage, with the default of presenting information by directory
|
du
|
|
Command? Monitors CPU-intensive tasks; options on many systems can be specified with or without a hyphen
|
top
|
|
Command? Display how long the system has been up since the last boot
|
uptime
|
|
Command? Provides statistics about free and used memory
|
free
|
|
Command? how you forward an output of top?
|
top n 3 > topdata
|
|
How to run a process in the background ? Command?
|
top&
|
|
Provides a listing of the currently running processses
|
ps
|
|
Command? Stop a process?
|
kill
|
|
Check the spelling of words in one or more plain-text files and suggests changes
|
ispell
|
|
Command? Compare two files and indicates if they are different?
|
cmp
|
|
Command? Text format utility
|
groff
|
|
Command? back up files and directory
|
dump depends on level level 0 back up all files
|
|
Command? Retores entire file systems, specific files, and directories
|
restore
|
|
Command? Enables you to send and receive mail through your computer or server
|
mail
|
|
Command? configures a network connection and is used to view information about the connection such as IP address
|
ifconfig
|
|
Command? Polls a computer on the same or a different network to dtermine if your computer is working, the network is working, or the remote computer is connnected and working.
|
ping
|
|
Command? track the route that network communication takes from point A on a network to point B
|
traceroute
|
|
Command? Monitors network traffic into and out of the host computer
|
netstats
|
|
Command? Run a script to starts a service in unix/linux
|
service servicename
i.e service portmap |
|
GUI that runs on Linux and many UNIX operating systems
|
X Window System
Two populars are:GNOME and KDE |
|
Controls how windows appear and how users control them
|
Window Manager
|
|
Provides GUI appearance software applications, and other resources that you use
|
Desktop
|
|
Command? This command stars the X window system
|
startx
|
|
What run level allow enabling graphical access via X window?
|
level 5
|
|
GNOME’s file management tool that is
Used to: View files and folders Create new folders Delete and move files and folders Copy and paste files and folders Configure permissions Open a file or start a program Access the Internet Set a bookmark (to a file, folder, or Internet location) |
Nautilus
|
|
Basic component of data storage
|
File
|
|
Unix/Linux system's way of organizing files on strage devices
|
File System
|
|
Section of the hard disk that has been formatted to hold files
|
Physical file system
|
|
UNIX/Linux consist of multiple file systems that form ______ space for muliple users
|
Virtual storage
|
|
Original native UNIX file system
|
ufs
|
|
Linux native file system is ___
|
ext
|
|
Acts like an extension of memory
General rule: same size as RAM |
Swap partition
|
|
patition allow to store OS kernel files
|
/boot partition
|
|
_____ contains information about the layout of blocks on a specific partition
|
Superblock
|
|
To _____ a file system is to connect it to the directory tree structure
|
mount
|
|
What file system contains all essential progams for files system repair such as:
Restoring from a backup Starting the system Initializing all devices and operating resources Information for mounting other file systems |
root file system
|
|
Contains binaries, or executables
Programs needed to start the system and perform other essential system tasks Holds many programs that all users need to work with UNIX/Linux |
/bin directory
|
|
Normally contains:
Files needed by the bootstrap loader The bootstrap loader is the utility that starts the OS Kernel (OS) images |
/boot directory
|
|
Contain information about I/O devices that are used by OS kernel when a device is accessed
Two types: Block special files Example: for CD/DVD drives Character special files Example: for printers |
/dev directory
|
|
Contains configuration files that the system uses when the computer starts
fstab group inittab login.defs motd passwd printcap and termcap profile, bashrc and rc |
/ect Directory
|
|
directory used to offer disk space for users, such as on a system that has multiple user accounts
|
/home directory
|
|
houses:
Kernel modules Security information Shared library images Used by programmers to share code rather than creating copies in their programs |
/lib Directory
|
|
name, file name, or directory name that contains a pointer to a file/directory in the same directory or in another directory on your system
|
Symbolic link
|
|
Mount points for temporary mounts by the system administrator reside in
|
/mnt Directory
|
|
In newer distributions of UNIX/Linux, mount points for removable storage are in
|
/media directory
|
|
occupies no space on the disk
Virtual file system allocated in memory only Files in ____ refer to various processes running on the system as well as details about the OS kernel |
/proc directory
|
|
Home directory for
The system administrator |
/root directory
|
|
Reserved for the system administrator
Stores: Programs that start the system Programs needed for file system repair Essential network programs |
/sbin
|
|
Houses software offered to users
Software might be: Accounting programs Manufacturing programs Programs for research applications Office software Frequently located on the ___ |
/usr directory
|
|
command? use mount to connect the files sytem partitions to the directory tree when the system starts
|
mount
|
|
Command to print working directory?
|
pwd
|
|
___ stand for change directory
|
cd
|
|
Use ____ command to display a directory content, including files and other directories.
|
ls
|
|
______special character that can stand for any other character or a group of characters
|
Wildcard * or $ dollar take place of 1 charactor
|
|
____ is used to create a new directory
|
mkdir
|
|
To delete an empty directory use this command ____-
|
rmdir
|
|
Use ____ to copy files and ___to delete them
|
cp and mr
|
|
Change permission use ____
|
chmod
chmod ugo+rwx chmod go-wx |
|
GUI stands for
|
Graphical user interface
|
|
Command to determine information about who is logged in
|
Who
|
|
To clear your screen use what command?
|
clear
|
|
to look at the online manual use what command?
|
man
|
|
System administrator manage the system; they can also be call as_____
|
superuser
|
|
All other users are known as ___
|
ordinary user
|
|
command to change pw is ?
|
passwd
|
|
what is > stand for?
|
output redirection operator
|
|
command to show system calendar?
|
cal
|
|
command to display multiple files
|
cat
|
|
command to display system date?
|
date
|
|
display the first few lines of the file?
|
head
|
|
Display a long file one screen at a time, you can scroll up and down
|
less
|
|
display a long file one screen at a time, you can scroll down.
|
more
|
|
display the last few lines of a file
|
tail
|
|
display a brief description of command
|
whatis
|
|
command ___ allow you to see who is logged in.
|
who
|
|
XBRL is a set ___ and ____
|
rules and syntax
|
|
Tagging data in XBRL improves the ______ and ______
|
effeciency and effectiveness
|
|
XML documents must follow a basic set of rules and those that do are referred to as being _____
|
well-formed.
|
|
What is the basic unit in an XML document?
|
element
|
|
XML rules:
|
Rule 1: must have only one root element
Rule 2: All elements must be propertly nested Rule 3: All elements can contain one or more attributes |
|
______ are dictionaries of pre-defined standard element names that represent financial reporting concept.
|
XBRL taxonomies
|
|
XBRL document are refer to as
|
instance document
|
|
U.S GAAP C&I taxonomy is part of a hierarchy of taxonomies known as?
|
The U.S Financial Reporting Taxonomy Framework (USFRTF)
|
|
It is important to remember that every XBRL instance document is linked to at least one _____
|
XBRL taxonomy
|
|
Any individual taxonomy can "extend" one or more taxonomies higher in the USFRTF taxonomy by adding ____
|
element definitions and relationships nescassary for specific financial reporting purposes.
|
|
The _______ is abbreviation for the taxonomy in which an element is actually define.
|
Namespace prefix
|
|
_____ identify the specific taxonomy in which an element is defined. It also the internet address where it can be found.
|
Namespace Identifier
|
|
U.S. GAAP C&I taxonomy inherits all of its elements from the _____
|
Primary element taxonomy.
|
|
What are the two most common XBRL data types?
|
string and monetary
|
|
xbrli:item and xbrli:tuple
|
item = simple reporting concept
tuple= a group of logically related reporting concepts. |
|
What is the purpose of a context element in XBRL?
|
It is to identify the business entity that is reporting information in an XBRL instant document. Must starts with a letter
|
|
continue with slice number 21 on XBRL pdf file
|
SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS
|