• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/96

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

96 Cards in this Set

  • Front
  • Back
Gregorian chants
-Traditional Latin worship music in the Roman Catholic Church
They are Sung in unison, most chants hold a single syllable across multiple notes
Fourteenth through seventeenth century Europe was known as the
Renaissance.
Major players during the Renaissance
-Leonardo da Vinci
-Galileo
-William Shakespeare
Baroque
Was a music style popular from the sixteenth to the eighteenth century, introducing harmony and replacing modes in church music
The Baroque music period led to the development of
Major and minor tones that replaced outdated modes in music. Bach was a major Baroque composer.
A Plainsong is an:
Unharmonized chant, frequently called a Gregorian chant
-Originating from Greek music theory, plainsongs were the basis for polyphony
-The official music of the Catholic Church, Mass and the Psalms are sung as plainsongs.
How many modes served as the foundation for plainsongs?
Eight
These modes, or arrangements of notes in a scale, were eventually rearranged as major and minor modes in the sixteenth century.
Hindu Music is
Monodic, with tones equal to one-fourth of a full Western tone.
In Hindu Music
Melodies are based on ragas, specific outlines for improvisation.
-The drum and the sitar are generally the two main accompanying musical instruments.
-In India, accompanied music is considered the greatest type of music.
Sitar
Developed in India.
The Sitar has three to seven gut strings and 12 wire strings.
Since the 1960s, the sitar has also become a widely-used instrument in Western music
With its characteristic modal homophony and rhythm Arabic music:
increased to 12 tones in the eleventh century and 17 tones in the thirteenth century.
Arabic music
The nauba is the main musical form, with instrumental solos leading to vocal sections
The main instruments of Arabic music are:
The tanbur, a long-necked lute,
And the ud, a short-necked lute.
Mainly using the organ, Byzantine Music
Was originally considered a spin-off on Greek music, but was then recognized as its own independent form.
-Along with the organ, the Greek instruments the kithara and the aulos are also frequently used as accompaniment
Instead of eight modes, Byzantine music has
Eight echoes
Kanon the main Byzantine hymn is made up of:
Nine odes to reference the Nine canticles of the Old and New Testaments.
-Although there are supposed to be Nine odes, Most kanons only have eight.
A series of tones ordered by pitch is called a:
Scale.
Each type of music has its own unique identifying scale system, most of which continue to change as composers discover new needs.
Allegro and Presto are two different instruction words generally indicating:
A fast speed in classical music
-Allegro indicates a quick, lively speed
-Presto indicates an even faster speed
Adagio or Andante
Would indicate a slow, or leisurely speed in classical music
Temperament refers to:
The work system of a piano tuner.
-Temperament is the distribution of impurities to bring the instrument’s sound as close to others’ as possible
“Equal” temperament divides
The octave into 12 equal half-steps
To indicate a piece uses the C major scale
One says it is in the key of C major.
This concept was not developed until the seventeenth century
Using two, or more, keys at the same time is known as
Polytonality.
This technique was popular with many twentieth-century composers. Alternately, no key is referred to as atonality.
Avoiding a tonal center in a musical piece is known as
Atonality.
After composers like Wagner and Strauss developed such complicated pieces that the key was all but lost underneath, later composers decided to abandon tonality altogether, including Webern and Ives.
Composer Richard Wagner created
The tetralogy Der Ring des Nibelungen.
Beginning with Das Rheingold and Die Walkure in 1857, Wagner, a German Romanticist, did not finish the third installment of Siegfried and Götterdämmerung until 1874. He built a theater especially for their performance.
Die Meistersinger von Nürnberg was Richard Wagner’s only
Comedic Opera.
Wagner composed this piece after abandoning Der Ring des Nibelungen, believing the collection would never be performed.
Franz Liszt a Hungarian composer created:
The symphonic poem,
and composed The Faust Symphony and
The Dante Symphony.
Mozart once claimed that rival composer
Antonio Salieri tried to poison him.
The duo’s feud was dramatized for the motion picture Amadeus, and in a nineteenth-century opera, Mozart et Salieri, by Nicolai Rimsky-Korsakov
The piano composer Frederic Chopin had a:
Stormy affair with author George Sand, during which time he wrote 24 preludes
Frederic Chopin was the first to establish
The piano as an instrument in its own right, free to be separate from the rest of a symphony, most of Chopin’s work was highly romanticized.
Frederic Chopin finest works include:
Piano concertos in E Minor and F Minor, along with sonatas in B Flat Minor.
- The majority of his pieces are known by names he did not give them
Legendary Italian violinist Niccolo Paganini.
Revived the practice of scordatura.
Scordatura is a diverse tuning of the strings designed to optimize each note. A child prodigy, Paganini is also credited with perfecting double and triple stops
French composer Louis-Hector Berlioz debuted:
Symphonie fantastique in 1830, and later composed Romeo and Juliet and Benvenuto Cellini.
Louis-Hector Berlioz's work differed from:
Traditional symphonies with its deeply personal style.
-Berlioz also composed the operas The Damnation of Faust and The Trojans, both of which are considered masterpieces today
Program music tells a story and requires
A textual accompaniment for the audience to understand
Program Music is called such because:
The text is usually delivered to the audience in the form of a program. In contrast, absolute music is not written to follow a story
Absolute music is not written:
To follow a story
An instrumental piece with no vocal accompaniment was first known as a:
Sonata
Developed in Italy, over time the term sonata came to mean pieces with one keyboard.
A piece with both voice and instruments is a:
Cantata
Richard Strauss a German composer had a distinctly romantic style that shows in:
Don Juan (1888) and
Death and Transfiguration (1889).
These are symphonic poems
Richard Strauss was also well-known for his operas which include:
Salome, Electra, Der Rosenkavalier, and Arabella. He was briefly chief of Musical Affairs for the Nazis from 1933 to 1935.
He was briefly chief of Musical Affairs for the Nazis from 1933 to 19
Alban Berg's first operatic masterpiece was
Wozzeck.
Influenced by his friend Arnold Schoenberg, Berg practiced atonality and adopted Schoenberg’s 12-step tone system. In Lyric Suite and the opera Lulu, he perfected this musical style.
The first harmonic of a tone is perceived as
Pitch.
Today, pitch is symbolized by a letter name and represents the frequency of vibrations the instrument should make.
A musical composition with a chorus, orchestra, and solo parts is
Oratorio.
An oratorio volgare also utilizes a narrator to explain the ongoing story to the audience. Giacomo Carissimi is credited with first finalizing this terminology.
A musical introduction to a ballet, opera, or other show is known as
An Overture.
Frequently, an overture is a musical montage of all the forthcoming pieces in the show, as in West Side Story
Which situations would increase the likelihood of fraud?
Application programmers are implementing chnages to production programs.
(Production programs are used for processing an enterprise's data)
An IS auditor invited to a development project meeting notes that no project risks has been documented. When the IS auditor raises this isuue, the project manager responds that it is too early to identify risks and that, if risks do start impacting the project, a risk manager will be hired. The appropriate response of the IS Auditor would be to.
Stress the importance of spending time at this point in the project to consider and document risks and to develop contigency plans.
An organization is implementing a new system to replace a legacy system. Which conversion practices creates the GREATEST risk?
Direct Cutover.
(Direct cutover implies switching to the new system immediately, usually without the ability to revert to the old system in the event of problems.
What management technique enables organizations to develop strategically important systems faster while reducing development costs and maintaining quality?
Rapid application development
Which would impair the independence of a quality assurance team?
Correcting coding errors during the testing process.
Which will BEST ensure the successful offshore development of Bsiness applications?
Detailed and correctly applied specifications
What is the most important element in the design of a data warehouse?
Quality of the Metadata
(Metadata aim to provide a table of contents to the information stored in the data warehouse)
What is a Data Warehouse
A data Warehouse is a copy of transaction data specifically structured for query and analysis
A decision support system (DSS):
Emphasizes flexibility in the decision making approach of users
(A decision support system is aimed at solving less structured problems, combines the use of models and analytic techniques with traditional data access and retrieval functions and supports semistructured decision making tasks.
A company has recently upgraded its purchase system to incorporate EDI transmissions. Which controls should be implemented in the EDI interface to provide for efficient data mapping?
Functional acknowledgements.
(Acting as an audit trail for EDI transactions, functional acknowledgements are on of the main controls used in data mapping.) Data Mapping deals with automatic integration of data in the receiving company.
When identifying an earlier project completion time, which is to be obtained by paying a premium for early completion, the activities that should be selected are those:
That have Zero Slack Time
(Activities on the critical path have zero slack time and conversely, activities with zero slack time are on a critical path) By successively relaxing activities on a critical path, a curve showing total project costs vs. time can be obtained
An advantage of using sanitized live transactions in test data is that:
Test data Transactions are representative live processing
An IS auditor's PRIMARY concern when application developers wish to use a copy of yesterday's production transaction file for volume tests it that:
Unauthorized access to sensitive data may result.
(Unless the data are sanitized, there is a risk of disclosing senstive data)
When implementing an application software package, which of the following presents the GREATEST risk?
Incorrectly set parameters
To minimize the cost of a software project, quality management techniques should be applied:
Continuously throughout the project with an emphasis on finding and fixing defects primarily during testing to maximize the defect detection rate
While evaluating software development practices in an organization, an IS auditor notes that the quality assurance (QA) function reports to project management. The MOST important concern for an IS auditor is the:
Effectiveness of the QA function because it should interact between project management and user management.
Functional acknowledgements are used:
As an audit trail for EDI transactions.
(functional acknowledgement are standard EDI transactions that tell trading partners that their electronic documents were received.
An Organization is migrating from a legacy system to an enterprise resource planning (ERP) system. While reviewing the data migration activity, the MOST important concern for the IS auditor is to determine that there is a:
Correlation of semantic characteristics of the data migrated between the two systems.
A project manager of a project that is scheduled to take 18 months to complete annouces that the project is in a healthy financial position because, after 6 months, only one-sixth of the budget has been spent. The IS auditor should FIRST determine:
What amount of progess against schedule has been achieved.
(Cost performance of a project cannot be properly assessed in isolation of schedule performance.) Cost cannot be assessd simply in terms of elapsed time on a prject.
Which ia an Object-Oriented technology characteristic that permits an enhanced degree of security over data?
Encapsulation
(Encapsulation is a property of Objects and it prevents accessing either properties or methods that have not been previously defined as public. This means that any implementation of the behavior of an Object is not accessible.)
An Object Defines:
A communication interface with the exterior and only that which belongs to that interface can be accessed.
Which Technique would BEST help an IS Auditor gain reasonable assurance that a project can meet its target date?
Extrapolation of the overall end date based on completed work packasges and current resources.
When transmitting a payment instruction, which of the will help verify that the instruction was not Duplicated?
A sequence number and time stamp
(When transmitting data, a sequence number and/or time stamp built into the message to make it unique can be checked by the recipient to ensure that the message was not intercepted and replayed. This is known as replay protection, and could be used to verify that a payment instruction was not duplicated.
Use of a Cryptographic hashing algorith against the entire message helps:
Achieve Data Integrity
Enciphering the message digest using the sender's private key, which signs the sender's digital signature to the document, helps in:
Authenticating the transaction.
When the message is Deciphered by the receiver using the sender's public key, it ensures that the message :
Could only have come from the sender.this process of sender authentication achievces nonrepudiation.
Failure in which of the following Testing stages would have the GREATEST impact on the implementation of new application software?
Acceptance Testing
(Acceptance testing is the final stage before the software is installed and is available for use. The greatest impact would occur if the software fails at the acceptance testing level, as this could result in delays and cost overruns.
System Testing is undertaken by the developer team to determine:
If the software meets user requirements per specifications.
Integration testing examines:
Teh units/Modules as one integrated system and
Unit Testing examines :
The individual units or components of the Software
Which would help to ensure the Portability of an application connected to a Database?
Usage of a Structured Query Language (SQL)
Verification of import and export procedures with other systems ensures:
Better Interfacing with other Systems
Analyzing stored procedures/triggers ensures:
Proper access/Perfomance.
The knowledge base of an Expert System that uses questionnaires to lead the user through a series of choices before a conclusion is reached is known as:
Decision Trees
(Decision trees use questionnaires to lead a user through a series of choices until a conclusion is reached.
Rules refers to the:
Expression of declarative knowledge through the use of if-then relationships
Semantic Nets Consist of a Graph in which nodes represent:
Physical or Conceptual objects and the Arcs describe the relationship between the nodes.
Semantic Nets resemble a dataflow diagram and make use of an:
Inheritance Mechanism to prevent duplication of data
Change Control for Business application systems being developed using prototyping could be complicated by the:
Rapid Pace of modifications in Requirements and Resign.
Which is the GREATEST risk when Implementing a Data Warehouse?
Access controls that are not adequate to prevent Data Modification
An advantage in using a bottom-up vs. top-down approach to software testing that:
Errors in critical Modules are detected earlier
(In bottomuup approach to software testing there is no need for stubs or drivers and errors in critical modules are found earlier
The Major advantage of a component-based develoment approach is the:
Support of Multiple developments environments
The GREATES advantage of Rapid Application Development (RAD) over the traditional System Development Life Cycle (SDLC) is that it:
Shortens the development time frame
By Evaluating Application Development projects against the Capability Maturity Model (CMM), an IS auditor should be able to verify that:
Predictable software processes are followed
CMM (Capability Maturity Model) does not Evaluate Technical processes such as:
Programming nor does it evaluate security requirements or other application controls.
A company uses a bank to process its weekly payroll. Time sheets and payroll adjustment forms (e,g hourly rate changes, terminations) are completed and delivered to the bank, which prepares cheques and reports for distribution. To Best Ensure payroll data accuracy"
Payroll Reports should be compared to Inputs forms
Many IT projects experience problems because the development time and/or resource requirements are underestimated. Which techniques would provide the GREATEST assistance in developing an estimate of project duration?
PERT Chart
An IS auditor reviewing an accounts payable system discovers that audit logs are not being reviewed. When this issue is raised with management the response is that additional controls are not necessary because effective system access controls are in place. THE BEST response the auditor can make is to:
Stress the importance of having a system control framework in place.
Which represents the GREATEST potential risk in an EDI environment?
Transaction Authorization.
(Since the interaction between parties is electronic, there is no inherent authentication occuring: therefore, transaction authorization is the greatest risk.
A company undertakes a business process reengineering (BPR) project in support of a new and direct marketing approach to its customers. Which would be an IS auditor's main concern about the new process?
Whether key controls are in place to protect assets and information resources
During a Postimplementation review of an enterprise resource
management system, an IS Auditor would MOST likely:
Review access control configuration.
An Overture is a musical introduction to
A ballet, opera, or other show
Frequently, an overture is a musical montage of all the forthcoming pieces in the show, as in West Side Story