Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
46 Cards in this Set
- Front
- Back
A program that converts a source program into instruction codes that the central processing unit can execute is called
|
A language processor
|
|
Central element of Management Information System MIS is
|
processing of data items is based on decision models.
|
|
One reason to use RAID - array of inexpensive disks - is to ensure that
|
if one drive fail, all data can still be reconstructed
|
|
Critical software application programs should be stored on the server in
|
Object code
|
|
____________ provides instructions to perform a task or job. It would tell the operating system how to schedule, allocate resources and retrieve data.
|
Job control language
|
|
A program that converts PROCEDURE-ORIENTED language to machine language is
|
A compiler
|
|
A distributed/decentralized processing environment works best when
|
significant volumes of data are generated at many remote locations and the user requires immediate access to the data.
|
|
Specialized programs that perform routine and repetitive functions are called
|
Service programs
|
|
Cyclical fluctuations, random variations, seasonal variations and secular trend are all components of
|
time series analysis
|
|
ID of users who have permission to access data elements in database is found in the
|
database schema
|
|
Which method would provide the best data security for a firm that uses a wide area network WAN?
|
End-to-end encryption
|
|
implementing locking procedure could lead to
|
Deadly embraces.
Data locking ensures consistent processing |
|
Exponential smoothing is a statistical method that is useful as a sales forecasting technique.
Exponential smoothing weights current data heavier than |
older data. It is used to smooth forecast variation.
|
|
___________ usually involves two or more computers functioning simultaneously and allows the sharing of a central memory during processing
|
Multiprocessing
|
|
___________ allows multiple programs to be executed at exactly the same time
|
Multiprogramming
|
|
In the systems development cycle, coding is part of the
|
detailed design phase
|
|
The system development cycle consists of (5)
|
analysis, conceptual design, detailed design, implementation and operation.
|
|
Which characteristic distingushes electronic data interchange (EDI) from other forms of electronic commerce?
|
EDI transactions are formatted using STANDARDS that are uniform worldwide
|
|
Online access controls include :
|
authorized user code numbers
passwords list of all files and programs and a record of the type of access each user is entitled to have for each file and program |
|
A computer system flowchart provides the overall view of the inputs, processes and outputs of __________
|
an information system.
|
|
When evaluating internal control of an entity that processes sales transactions on the internet, an auditor would most concern about the:
|
potential for computer disruption in recording sales
|
|
One of the risks in distributed system is
|
database INTEGRITY (unity, wholeness ) might not be preserved during a network or computer failure
|
|
Who is responsible for authorizing transactions and for correcting errors?
|
Users
|
|
Who is responsible for preventing unauthourized physical and logical access to the system?
|
Security management
|
|
Routines that utilize the computer to check the validity and accuracy of TRANSACTION data during input are called
|
edit programs -
they reject those transactions whose data do not meet preestablished standards of data quality |
|
The computer operating system performs scheduling, resource allocation and date retrieval functions based on a set of instructions provided by the
|
JOB CONTROL LANGUAGE
|
|
Librarian and production control are most likely to be included w/in
|
the Operation area of the system department
|
|
A decision table indicates the
|
Alternative logic conditions and actions to be taken in a program
|
|
Operating documentation includes
|
equipment configuration, program and data files, and description of conditions that may req. program interruption.
|
|
Intranets ( private networks) are characterized by
|
higher security risk and lower costs
|
|
Managing the IS function includes
|
charging user departments for computer services, project development planning and responsibility accounting principles
|
|
Validity check use when
|
the data is misspelled of transposed - has typing errors
|
|
Optical character recognition OCR software
|
converts images of paper doc. as read by scanning device into text computer files
|
|
Shareware is
|
a program that can be freely copied and tested before purchase.
It does NOT transfer data |
|
Linked list is a file structure that
|
has a field that has the address of the next record
|
|
Components of the data processing cycle?
|
Collection, refinement (classifying and/or batching), processing, maintenance (calculattion and storage), output
|
|
Authorization controls are implemented using COMPATIBILITY TESTS and ACCESS CONTROL MATRICES
|
COMPATIBILITY TESTS - determine if the user is authorized to perform the desired action.
ACCESS CONTROL MATRICES - 1)is a list of authorized user ID and passwords and 2) a list of all files, data and programs and the access each user has to them |
|
The implementation phase of an acct. software application would include :
|
obtaining and installing hardware, documentating user procedures, training users, and entering test data.
|
|
A DBMS (database management system) are complex software package which permits users to
|
access info. From data base. DBMS provides for access and identification security, concurrent use of data and backup and recovery. It DOES NOT run application programs.
|
|
The TRANSFORMATION component of IS has which of three subsystems?
|
Storage, arithmetic-logic, control subsystem.
|
|
If a database has integrity,
|
this means that the database has only CONSISTENT data.
|
|
The purpose of a cycle processing control is to mitigate the risk of :
|
missing or improper transactions
|
|
REMOTE BACH processing avoids the need of having
|
a CPU at each user location
|
|
Systems analysis is assigned to
|
SYSTEM ANALYST- who helps users to analyze their info and design IS
|
|
Computer operations are assigned to
|
Computer OPERATORS. Programmers should never have access to computer operations
|
|
Operating systems and compilers assigned to
|
SYSTEM PROGRAMMERS , who use the design developed by the analysts to develop an IS and write the computer programs.
|