• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/165

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

165 Cards in this Set

  • Front
  • Back
The basic building block of information systems planning is _____________
Project Development Planning
A _____ is a long range planning document that specifies what the system will consist of, how it is developed, who will develop it, how needed resources will be acquired, and where the AIS is headed.
Master Plan
The activities and relationship are used to draw _____, which consists of a network of arrows and nodes representing, resprectively, project activities that require an expeniture of time and resources and the completion and initiation of activities.
PERT chart
A _____ is a bar chart with project activities listed on the left hand side and units of time, days or week accross the top.
Grantt Chart
A company wishes to introduce and test a new AIS at a branch location before company-wide adoption. This approach is called
Pilot Conversion
What is an advantage of using CASE?
Simplified documentation
What is the name for the type of testing where copies of real transaction and file records are used rather than hypothetical ones?
acceptance testing
Inadequate testing can lead to serious systems failures. Part of the SDLC process is to adequately test the system being implemented. What is the type of test that determines whether a program is operating as desired?
processing of test transactions
Major resistance to change takes one of several forms. What is the name of the form of resistance where the new system is blamed for any and every unpleasant occurrence?
projection
In which approach to systems acquisition is "inexpensive updates" considered an advantage?
turnkey software and systems
The basic framework for feasibility analysis is the ________
Capital budgeting
_____ This is the number of year required for the net savings to equal the intial cost of the investment. The project with the shortest period is usually selected.
Payback Period
With the ______ all estimate future cash flows are discounted back to the present, using a discount rate that relects the time value of money.
Net Present Value
The ____ is the effective interest rate that results in a NPV of zero.A project's ____ is compared with a minimum acceptable rate to determine acceptance or rejection.
Internal Rate of Return (IRR)
_______ is behavior that is usually inteded to destroy, cripple, or weaken the system's effectiveness. It may take in form of increased error rates, discruptions, or dliberate sobotage.
Aggression
______ involves blaming the new system for any and every unpleasant occurrence.
Projection
One way for employee to deal with a new AIS is to avoid using it in the hope that the problem can be ignored or that it will eventually go away is _____
avoidance.
Look back at data gather informaton:
Page 672
What is the strategies for determine requirements?
1) Ask users what they need
2) Analyze existing system
3) Examine Existing system users
4) Create Prototype
______ is sold on the open market to a broad range of users with similar requirements.
canned software
Software and hardware that are sold as a package and vendor installs the entire system is ________
Turnkey systems.
______ host Web-based software on their computer and deliver the sofware to their clients over the Internet.
ASP
________a data-processing task with input, processing, and output jobs typical of those the new AIS will be require to perform. Processing times are calculated and compared, and the AIS with the lowest time is judged the most efficient.
Benchmark problem
Evaluating system the uses weight to assign to each software and how well their proposal measure up to the standard is ______
point scoring
______ estimate the cost of purchasing or developing features that are not present in a particular AIS.
Requirement costing
____________ is hand on development, use, and control of computer-based information systems by users.
End-User-Computing
_____ occurs when information users, such as managers, accounting, and internal auditors, develop their own applications using computer specialists as advisor.
End-User-Development.
Output design consideration
Use
Medium
Format
Preprinted
Location
Access
Detail
Timeliness
_____ have no prespecified content or format and are not prepared on a regular schedule. They are prepare in response to a management request to evaluate an issue.
Special-purpose analysis reports
_____ have a prespecified content and format but are prepared only in repsonse to abnormal conditions.
Triggered exception reports
_____ have a prespecified content and format but are prepared only on request.
Demand Report
File and database design considerations:
Medium
Processing mode
Maintenance
Size
Actitivies
Input Design Consideration:
Medium
Source
Format
Type
Volume
Personnel
Frequency
Cost
Error dection and correction.
Controls Design Considerations:
Validity
Authorization - How can the AIS ensure that payroll additions have been authorized?
Accuracy - What controls are in place to ensure that data passed between processing activities are not lost

Security
Numericol control
Availability
Maintenability
Integrity
Audit trail.

Look back before exam- page 751
_____ are step-by-step reviews of procedures or program logics. Focus is on the input, files, output, and data flows of the organization.
Walk-through
_____ determines if the program operates as designed.
Processing Test Transaction
_____ use copies of real transactions and files rather than hypothetiscal ones.
Acceptance Test
_______ immediately terminates the old AIS when the new one is introduced.
Direct Conversion
_____ operates the old and new systems simutaneously for a period of time.
Parallel conversion
______ gradually replaces elements of old AIS with the new one.
Phase-in conversion
_______implements a system in just one part of the organization, such as brand or location.
Pilot conversion.
The final step in the SDLC is that of the operation and maintenance of the new system. What is the first activity in the systems development process?
Deliver improved system
Denial of service and distributed denial of service; attack which overburden a server or network and force it to shut down.
DDos Attack
Cracking system security from the outside and gain entry to the private system
Intrusion
Monitoring network traffic passively to gain information.
Snooping
Autonomous and self-replicating computer programs which seek and disable or hijack some or all of a computer system
Viruses
A networked computer viruses which propagate over active network connections.
Worm

Frequently worms are also Trojans
A virus masquerading as a useful or desirable piece of software, or which is hidden in said
Trojan
A system which has been compromised by a stealthy virus; the ______ will devote system resources to running processes in the interest of the virus's creator, such as assisting in DDoS Attack or spaming.
Bot
Gaining access to a system via its human users via duplicity.
Social Engineering
1. Which of the following is(are) Linux media player(s) ?
a. sound juicer
b. rhythmbox
c. gstreamer
d. both A and B
e. all of the above
Both A and B
3. Companies prefer Command Line Interface because
a. give complete control over the system
b. powerful for many task
c. use less memory
d. all of the above
e. none of the above
D. all of the above
4. Apart from software cost, what are the other two costs should be considered in the additional total cost of ownership?
Downtime Cost and Administration costs.
1.What is KDE stand for?
a. (K = no meaning, D = Development, E = Easy)
b. (K = Kool, D = Desktop, E = Environment)
c. (K = Kool, D = Desktop, E = Easy)
d. (K = Kentucky, D = Department, E = Education)
b. (K = Kool, D = Desktop, E = Environment)
2. What are the benefit of using KDE?
a. ease of use
b. low learning curve
c. network transparency
d. all of the above
All of the above
3. Which of the following is NOT compatible with KDE?
a. X Windows
b. Kubuntu
c. Mac OS
d. Fedora 10
e. All are compatible
All are compatible
1. DOS stands for:

a) Deficient Operational System
b) Disk Operating System
c) Directory Operating System
d) Directional Operational System
c. disk operating system
2. Dbase is valued for its ____, but is not very ___.

a) security / user-friendly
b) cost / secure
c) graphics / customizable
d) cost / user-friendly
a) security / user-friendly
3. Windows 3.1 (released in 1992) was one of the first widely used _____ operating system.

a) Windows
b) PC (personal computer)
c) CLI (command line interface) PC
d) GUI (graphic user interface) PC
d) GUI (graphic user interface) PC
What does Quasar accounting offer to Linux users and not Windows?

A) Free Base package
B) Invoicing
C) A handheld barcode scanner interface
D) Accounts payable
C) A handheld barcode scanner interface (ANSWER)
Which Accounting software supports OFC (Open Financial Exchange) and HBCI (Home Banking Computer Information)?

A)Quasar Accounting
B)Gnucash
C)Lamp
D) Wine
B)Gnucash  ANSWER
True or False, do Linux servers have the ability to run for an extended amount of time?
A)True
B)False
A)True  Answer
1.What are the last two steps in the FBI sentinel planning process ?
Planning: Step 6&7
Training
•Realistic schedule and cost estimate of overall project costs
•Train all FBI staff at all location
•development contractor’s responsibility
Monitor
•Effects of taking funds from operational programs
•Identify possible resolution
2. What was the FBI's original information system called?
Automated Case Support System
3. Which company did the FBI ultimately settle on to be contractor for their Sentinel project?
Lockheed Martin
1) Applied Materials' core businesses include:

a) Hard Drives
b) iPhone 3G
c) Semiconductors
d) None of the above
c) Semiconductors
2) One of the drawbacks of having different legacy systems across the organization is/are:

a) They do not communicate well with each other
b) They are cause for operational waste and inefficiency
c) Both (a) and (b) are correct
d) None of the above
c) Both (a) and (b) are correct
3) _______ helped Applied Materials design and upgrade to a new ERP system:

a) Oracle
b) Intuit
c) Microsoft
d) SAP
e) Adobe
d) SAP  Answer
What does XBRL stand for?

a. Extensible Business Reporting Language

b. Extensible Body Reporting Language

c. Extensible Makeup Language

d. Extensible Business Record Language
a. Extensible Business Reporting Language
What is the parent language of XBRL?

a. HTML

b. XML

c. DHTML

d. XBL
b. XML  Answer
Which of the following represent one of many driving forces behind XBRL implementation?


a. E-mail

b. Continuous Auditing

c. Web Design

d. Designer
b. Continuous Auditing 
Command? Copies an input file and can convert the file's content to another format or to have different characteristics
dd
Command? Displays information about how space is allocated in a file system, such as used and free space
df
Command? Summarizes disk usage, with the default of presenting information by directory
du
Command? Monitors CPU-intensive tasks; options on many systems can be specified with or without a hyphen
top
Command? Display how long the system has been up since the last boot
uptime
Command? Provides statistics about free and used memory
free
Command? how you forward an output of top?
top n 3 > topdata
How to run a process in the background ? Command?
top&
Provides a listing of the currently running processses
ps
Command? Stop a process?
kill
Check the spelling of words in one or more plain-text files and suggests changes
ispell
Command? Compare two files and indicates if they are different?
cmp
Command? Text format utility
groff
Command? back up files and directory
dump depends on level level 0 back up all files
Command? Retores entire file systems, specific files, and directories
restore
Command? Enables you to send and receive mail through your computer or server
mail
Command? configures a network connection and is used to view information about the connection such as IP address
ifconfig
Command? Polls a computer on the same or a different network to dtermine if your computer is working, the network is working, or the remote computer is connnected and working.
ping
Command? track the route that network communication takes from point A on a network to point B
traceroute
Command? Monitors network traffic into and out of the host computer
netstats
Command? Run a script to starts a service in unix/linux
service servicename

i.e service portmap
GUI that runs on Linux and many UNIX operating systems
X Window System
Two populars are:GNOME and KDE
Controls how windows appear and how users control them
Window Manager
Provides GUI appearance software applications, and other resources that you use
Desktop
Command? This command stars the X window system
startx
What run level allow enabling graphical access via X window?
level 5
GNOME’s file management tool that is
Used to:
View files and folders
Create new folders
Delete and move files and folders
Copy and paste files and folders
Configure permissions
Open a file or start a program
Access the Internet
Set a bookmark (to a file, folder, or Internet location)
Nautilus
Basic component of data storage
File
Unix/Linux system's way of organizing files on strage devices
File System
Section of the hard disk that has been formatted to hold files
Physical file system
UNIX/Linux consist of multiple file systems that form ______ space for muliple users
Virtual storage
Original native UNIX file system
ufs
Linux native file system is ___
ext
Acts like an extension of memory
General rule: same size as RAM
Swap partition
patition allow to store OS kernel files
/boot partition
_____ contains information about the layout of blocks on a specific partition
Superblock
To _____ a file system is to connect it to the directory tree structure
mount
What file system contains all essential progams for files system repair such as:

Restoring from a backup
Starting the system
Initializing all devices and operating resources
Information for mounting other file systems
root file system
Contains binaries, or executables
Programs needed to start the system and perform other essential system tasks
Holds many programs that all users need to work with UNIX/Linux
/bin directory
Normally contains:
Files needed by the bootstrap loader
The bootstrap loader is the utility that starts the OS
Kernel (OS) images
/boot directory
Contain information about I/O devices that are used by OS kernel when a device is accessed
Two types:
Block special files
Example: for CD/DVD drives
Character special files
Example: for printers
/dev directory
Contains configuration files that the system uses when the computer starts
fstab
group
inittab
login.defs
motd
passwd
printcap and termcap
profile, bashrc and rc
/ect Directory
directory used to offer disk space for users, such as on a system that has multiple user accounts
/home directory
houses:
Kernel modules
Security information
Shared library images
Used by programmers to share code rather than creating copies in their programs
/lib Directory
name, file name, or directory name that contains a pointer to a file/directory in the same directory or in another directory on your system
Symbolic link
Mount points for temporary mounts by the system administrator reside in
/mnt Directory
In newer distributions of UNIX/Linux, mount points for removable storage are in
/media directory
occupies no space on the disk
Virtual file system allocated in memory only

Files in ____ refer to various processes running on the system as well as details about the OS kernel
/proc directory
Home directory for
The system administrator
/root directory
Reserved for the system administrator
Stores:
Programs that start the system
Programs needed for file system repair
Essential network programs
/sbin
Houses software offered to users
Software might be:
Accounting programs
Manufacturing programs
Programs for research applications
Office software
Frequently located on the ___
/usr directory
command? use mount to connect the files sytem partitions to the directory tree when the system starts
mount
Command to print working directory?
pwd
___ stand for change directory
cd
Use ____ command to display a directory content, including files and other directories.
ls
______special character that can stand for any other character or a group of characters
Wildcard * or $ dollar take place of 1 charactor
____ is used to create a new directory
mkdir
To delete an empty directory use this command ____-
rmdir
Use ____ to copy files and ___to delete them
cp and mr
Change permission use ____
chmod

chmod ugo+rwx
chmod go-wx
GUI stands for
Graphical user interface
Command to determine information about who is logged in
Who
To clear your screen use what command?
clear
to look at the online manual use what command?
man
System administrator manage the system; they can also be call as_____
superuser
All other users are known as ___
ordinary user
command to change pw is ?
passwd
what is > stand for?
output redirection operator
command to show system calendar?
cal
command to display multiple files
cat
command to display system date?
date
display the first few lines of the file?
head
Display a long file one screen at a time, you can scroll up and down
less
display a long file one screen at a time, you can scroll down.
more
display the last few lines of a file
tail
display a brief description of command
whatis
command ___ allow you to see who is logged in.
who
XBRL is a set ___ and ____
rules and syntax
Tagging data in XBRL improves the ______ and ______
effeciency and effectiveness
XML documents must follow a basic set of rules and those that do are referred to as being _____
well-formed.
What is the basic unit in an XML document?
element
XML rules:
Rule 1: must have only one root element
Rule 2: All elements must be propertly nested
Rule 3: All elements can contain one or more attributes
______ are dictionaries of pre-defined standard element names that represent financial reporting concept.
XBRL taxonomies
XBRL document are refer to as
instance document
U.S GAAP C&I taxonomy is part of a hierarchy of taxonomies known as?
The U.S Financial Reporting Taxonomy Framework (USFRTF)
It is important to remember that every XBRL instance document is linked to at least one _____
XBRL taxonomy
Any individual taxonomy can "extend" one or more taxonomies higher in the USFRTF taxonomy by adding ____
element definitions and relationships nescassary for specific financial reporting purposes.
The _______ is abbreviation for the taxonomy in which an element is actually define.
Namespace prefix
_____ identify the specific taxonomy in which an element is defined. It also the internet address where it can be found.
Namespace Identifier
U.S. GAAP C&I taxonomy inherits all of its elements from the _____
Primary element taxonomy.
What are the two most common XBRL data types?
string and monetary
xbrli:item and xbrli:tuple
item = simple reporting concept
tuple= a group of logically related reporting concepts.
What is the purpose of a context element in XBRL?
It is to identify the business entity that is reporting information in an XBRL instant document. Must starts with a letter
continue with slice number 21 on XBRL pdf file
SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS