Term
| Older computer systems were focued on ____, while newer computer systems tend to be focused more on ___ |
|
Definition
| transaction processing; management reporting (decision making aid) |
|
|
Term
| What is the difference between transaction processing and management reporting systems? |
|
Definition
| Transaxn reporting foxus on recordkeeping; mgmt rpting more on assisting in decision making. |
|
|
Term
| Four types of management reporting systems (explain each)? |
|
Definition
| 1. Management Info Sys = provide info for mgmt to use in dec; 2. Decision Support system (models & data to aid in dec, but extensive user interp needed); 3. Expert system (very limited and structured domain, minimizes need for human interp); 4. Executive info sys (support executive work) |
|
|
Term
| Two types of transaction processing? When is each used? |
|
Definition
| OLRT = online real time & batch. OLRT used when immediacy of info access is impt (eg bank w/d); batch when accuracy of info is more critical (eg bank deposit) |
|
|
Term
|
Definition
|
|
Term
| LAN vs WAN vs VAN vs WLAN? |
|
Definition
| local area network is all in same building, WAN in diff locations; VAN links different companies computers; WLAN is wireless (Wi-Fi or Bluetooth) |
|
|
Term
| What are options for network topology & why matter? |
|
Definition
| Topology matters b/c det which computers can access which; infl efficiency. Bus = link thru common line; Star = hub, Ring = each connected to two on sides, Tree = Stars linked on branches to trunk; Mesh = all interconnected |
|
|
Term
| Intranet vs extranet vs internet? |
|
Definition
| intranet = w/in co; extranet = co w/links to customers & vendors; internet = external links to all |
|
|
Term
| What is EDI and what is it used for? |
|
Definition
| Electronic Data Interchange; used in VANs for communication between sppliers & customers--eg automatic orders. Concerns: strict data standards; mapping & translation software; unauthorized access concerns. |
|
|
Term
| Risks & Rewards of electronic commerce |
|
Definition
| benefits: less paper, fast, simpler recording, real time; risks: data infiltration, loss of paper trail. |
|
|
Term
| controls to prevent info from being transmitted to an inappropraite company? |
|
Definition
| routing verification procedures; message acknowledgement procedures |
|
|
Term
|
Definition
| an order or confirmation is intercepted by an imposter |
|
|
Term
| controls to prevent spoofing |
|
Definition
| echo transmitted docs back to sender; digital signature |
|
|
Term
|
Definition
| **detectino risk may not be reduced enough thru substantive testing alone; must reduce control risk too and build controls into sys to ensure validity of data |
|
|
Term
| define: virus, trojan horse, worm, hoax virus, killer application, phishing |
|
Definition
| virus = program asking pc to perform an axn not authorized by computer; trojan horse = a virus w/in a program that otherwise acts normal; worm = program that duplicates itself over a network to infect multiple PCs; a "killer app" is a very useful program, and phishing is falsely claiming (& looking like) a legitimate site & asking for private info |
|
|
Term
|
Definition
| supercomputers, mainframes, minicomputers, microcomputers = PCs, PDAAs |
|
|
Term
| source program vs object program vs compiler |
|
Definition
| Source = what the programmer writes (often C++ or Java); Object = machine language 0 & 1 only; compiler turns source program into object program |
|
|
Term
|
Definition
| bit = 0 or 1; byte = 8 bits & repr an alphanumeric character |
|
|
Term
| What is an MIS and what does it do? |
|
Definition
| Management Information Systems take planning information (budgets, forecasts, etc.) data and compare it to actual results in periodic management reports (summary reports, variance reports, and exception reports). |
|
|
Term
| What is a DSS & what does it do? |
|
Definition
Decision support systems (DSS) -- provide information to mid- and upper-level management to assist them in managing non-routine problems and in long-range planning. 1. unlike MISs, DSSs frequently include external data in addition to summarized information from the TPS and include significant analytical and statistical capabilities. |
|
|
Term
|
Definition
| Enterprise Resource Planning systems (ERPs) -- ERPs provide transaction processing, management support, and decision-making support in a single, integrated package. By integrating all data and processes of an organization into a unified system. Helps overcome problems that arise b/c of inconsistencies bwn depts & op units |
|
|
Term
|
Definition
| Online analytical processing system (OLAP): incorporates data warehouse and data mining capabilities within the ERP |
|
|
Term
| Advantage of database over flat file |
|
Definition
|
|
Term
| What is a data warehouse? |
|
Definition
| a database designed to archive an organization's operational transactions (sales, purchases, production, payroll, etc.) over a period of years; external data that might be correlated with these transactions such as economic indicators, stock prices, exchange rates, market share, political issues, weather conditions, etc. can also be incorporated into the data warehouse |
|
|
Term
| A specialized version of a data warehouse that contains data that is pre-configured to meet the needs of specific departments is known as: |
|
Definition
|
|
Term
|
Definition
| E-business can be conducted within the organization as well as between the organization and its trading partners. E-commerce NARROWER, just interaxns org & trading ptrs |
|
|
Term
|
Definition
bus to bus vs to consumer. B2B incl electronic data interchange (EDI), supply chain management (SCM) and electronic funds transfer (EFT). |
|
|
Term
|
Definition
| Customer relationship management (CRM): technologies used to manage relationships with clients; both biographic and transaction information about existing and potential customers is collected and stored in a database; the CRM provides tools to analyze the information and develop personalized marketing plans for individual customers. |
|
|
Term
|
Definition
| Electronic Data Interchange (EDI): EDI is computer-to-computer exchange of business data (e.g., purchase orders, confirmations, invoices, etc.) in structured formats that allow direct processing of the data by the receiving system; EDI reduces handling costs and speeds transaction processing compared to traditional paper-based processing. Specific format used (ANSI.x.12 in US, UN/EDIFACT int'lly). Gen proc thru VANs |
|
|
Term
|
Definition
| Supply chain management (SCM) -- the process of planning, implementing, and controlling the operations of the supply chain: the process of transforming raw materials into a finished product and delivering that product to the consumer. Supply chain management incorporates all activities from the purchase and storage of raw materials, through the production process, into finished goods through to the point-of-consumption. |
|
|
Term
| means of paying electronically |
|
Definition
| EFT = electronic funds transfer, token based payment (smart cards), online pmt systems like PayPal. (Electronic wallet is merely centralized location for CC nos) |
|
|
Term
| Hedging the receipt of a foreign currency contract would require a contract _____ (buying/selling) that currency in the future |
|
Definition
|
|
Term
|
Definition
| DDL = data definition language, used to define db; DCL = data control language, used to specify privileges & security rules; DML = data manipulation language, helps programmers update db; DQL = database query language, used for ad hoc queries |
|
|
Term
|
Definition
| millions of instructions per second |
|
|
Term
|
Definition
| system development life cycle |
|
|
Term
| 7 steps in system development life cycle? |
|
Definition
| 1. Planning & feasibility study; 2. Anslysis (define requirements wking w/end users); 3. Design (tech architecture specs, systems model flowcharts); 4. Development (actual purchasing & compatibility testing); 5. Testing (compare actual to expectations; run both correct & problematic data); 6. Implementation; 7. Maintenance |
|
|
Term
| types of implementation of new system? |
|
Definition
| parallel (best but$$), cold turkey (worst, only if real simple), phased implementation (parts of sys at a time to all users); pilot (whole system to diff subsets of users at a time) |
|
|
Term
| role of IT steering committee, lead systems analyst, application programmers & end users in systems development? |
|
Definition
| IT comm: approve & prioritize systems for development; lead systems analyst manages application programmer team, maint contact w/end users, respons for overall programming logic & functionality; applic programers write & test programs; end uers identify the problems to be addressed & approve the proposed soln |
|
|
Term
| parties involved in systems development? |
|
Definition
| end users, IT committee, application programmers, lead systems analyst |
|
|
Term
| transaction files in a computerized environment are equivalent to ____ in a manal accounting system, while master files are equivalent to _____ |
|
Definition
| transaction files like JOURNALS, temporary; master files like LEDGERS, permanent. |
|
|
Term
| the general ledger in a manual accounting environment is equivalent to ___ in a computerized environment |
|
Definition
|
|
Term
| four stages of batch processing? |
|
Definition
| data entry, prelim edit, sorting (into same order as master file), master file update |
|
|
Term
| Batch vs OLRT adv/disadv & when use each |
|
Definition
| Batch disadv is time lags, but can be more accurate b/c more data checking. Use when transaxns periodic, sig amt of master file affected, transaxns are independent. OLRT adv is always current, use when this is key, transaxns are continuous & interdependent or infreq & few |
|
|
Term
| centralized, decentralized, distributed systems |
|
Definition
| centralized: adv = data security & consistency; disadv = cost, bottlenecks, not as timely. Decentralized (gen rpt to retail) less costsly, fewwer bottleneckcs, but greater potential for security violations, higher cost of installing equip in multiple locales; distrbuted adv = better cmm for remote, more current 7 complete info, disadv is expense of comm between remote locations & conflicts when multiple places try to access data at same time |
|
|
Term
| Starting with a bit and ending with a database, what is the hierarchy of data elements? |
|
Definition
| Bit (0/1), Byte (8 bits = alphanumeric character), (data values), Field, Record, File |
|
|
Term
|
Definition
| control unit, arithmetic logic unit (ALU), Primary storage (memory) |
|
|
Term
|
Definition
| two main types are RAM & ROM (incl PROM & EPROM--programmable & eraseable programmable). RAM temp, ROM perm. Also are registers (very small) & cache (freq accessed) |
|
|
Term
| types of secondary storage devices? which most common? adv/disadv? |
|
Definition
| Magnetic disks (most common), gen fast, Magnetic tape (sequential access only so slower), Optical disks (more stable, = CD & DVD), flash drives, & RAIDs |
|
|
Term
| What are RAIDs & advantages of? |
|
Definition
| (redundant array of independent disks--backup each transaxn, improve system fault tolerance, facilitate data retrieval) |
|
|
Term
| What are the ways that data on a magnetic disk can be accessed? |
|
Definition
| Direct access--by PRK (primary record key) fastest but hard to implement; Hashed access (PRK translated to disk address, also fast/diff); indexed (most common; is one file of index and another of records; very flexible); ISAM indexed sequentail access method involves storing the data in sequential order |
|
|
Term
|
Definition
| Input: keyboard, mouse, mic, POS scanners, MICR device, OCR device; Output: printer monitor, speaker, VOCA |
|
|
Term
|
Definition
| magnetic ink character recognition; optical character recognition; voice output communication aids |
|
|
Term
| classifications of computers |
|
Definition
| supercomputers, mainframes, minicomputeres, micrcomputers = PCs. Supercomputers for very data intensive proc; mainframes for ecommerce--can support thousands of users simultaneously |
|
|
Term
|
Definition
| fat client is a PC on a network that has its own processing functions & data (like my laptop); thin client is a stripped down PC that doesn't have storage, used to access network. netwk admin prefer thin b/c less opp for viruses & threats |
|
|
Term
|
Definition
| serwhen ver is used to provide resources to a network, eg, print server or file server; not diretly used by end users; work station is a high performance PC connected to a network & used by end user for specific function |
|
|
Term
| architecture of a three-tier client/server system? |
|
Definition
| Most client/server systems are designed with a desktop client, which the end user uses to interact with the system, an application server which authenticates users, maintains a library of application programs and controls access to systems resources and a database server on which data from many different databases may reside. |
|
|
Term
| 3 categories of software? |
|
Definition
| System, Programming, Application |
|
|
Term
| Types of system software? |
|
Definition
| Operating system (OS), Database management system (DBMS), Network operating system (NOS) |
|
|
Term
| sublanguages used by DBMS? |
|
Definition
| DDL (data definition language), DML (data manipulation language), DQL (data query language) |
|
|
Term
| 1st - 5th generation programming languages? |
|
Definition
| 1st = machine language (0/1) (aka object code); 2nd = assember language; 3rd = procedural (exs = C++, Java, COBOL, Pascal--these write SOURCE CODE that is translated into OBJECT CODE); 4th = problem-oriented lang eg query lang or data analysis prog or report generator; 5th = visual or graphical program development environment (these generate source code for 3rd or 4th gen) |
|
|
Term
|
Definition
| object oriented programming |
|
|
Term
| characteristics of "objects" in object oriented programming? |
|
Definition
| inheritance of charac f/class; polymorphism (take on diff attribute dep on condition; encapsulation (lim amt data one object shares w/others) |
|
|
Term
|
Definition
|
|
Term
|
Definition
| based on standardized taxonomies, common format for comm fin info |
|
|
Term
| What is an expert system and what are its components? |
|
Definition
| expert system is a subclass of AI systems used in bus. incl knowledge db (rules), domain db (facts), inference engine (heuristics for dec making) |
|
|
Term
| What is a neural network and how does it make decisions? |
|
Definition
| a system of prog & data structures designed to recognize pattersin in large quantities of data, using feedback f/prev iterations; makes dec using "fuzzy logic" |
|
|
Term
| Advantages of relational over flat file data base? |
|
Definition
| eliminates data redundancy, easier to extract data for reporting |
|
|
Term
| three types of db models? most used? |
|
Definition
| hierarchical, network, relational* |
|
|
Term
| adv/disadv of hierarchical db? |
|
Definition
| adv: simple & efficient data retrieval (often used by data warehouses). disadv: can only repr 1:1 and 1:M rels, but NOT M:M rels w/o creating a lot of redundancy |
|
|
Term
| adv/disadv of network model |
|
Definition
| adv: can repr all types rels (1:1, 1:M, M:M), disadv: so much processing OH that it is too slow to be competitive |
|
|
Term
| adv/disadv of relational db |
|
Definition
| can repr all types of data (1:1, 1:M, M:M) w/least data redundancy. Disadv: slow when files extremely large |
|
|
Term
| Explain what it means to "select," "join," & "project" info in a db |
|
Definition
| Select = create subset of records; Join = pull data f/two files together; Project = create a new file made up only of selected fields f/the org files |
|
|
Term
| what is normalization of db? |
|
Definition
| organizing db to min data redundancy |
|
|
Term
|
Definition
| view of the logical & physical rels in the db |
|
|
Term
| what is a data dictionary? |
|
Definition
| a listing of all the data fields found in the db |
|
|
Term
| what is referential integrity of a db? |
|
Definition
| when the rels between two entities are valid--makes sure that only valid data can be entered |
|
|
Term
| what are the 3 components of a dbms? |
|
Definition
|
|
Term
|
Definition
| data defintion (for new fields), data manipulation (of records), data query languages |
|
|
Term
| two ways of extracting data f/db |
|
Definition
| SQL & QBE (structured query language & query by example = drag & drop) |
|
|
Term
| what is a distributed database? |
|
Definition
| one that is copied and put in multiple locations to be available to multiple users |
|
|
Term
| what are the two ways of distributing a database and when is each used? |
|
Definition
| replication for when the same data needs to be used in each location; partition when each location will use only a separate part |
|
|
Term
| what is record locking & a deadlock |
|
Definition
| record locking prevents updating a db when one user is already doing so, deadlock occurs when two users simultaneously need the same info...processing stops until one request is cancelled |
|
|
Term
|
Definition
|
|
Term
| How do relational dbs define relationships between tables? |
|
Definition
| via a PRK (primary record key) |
|
|
Term
|
Definition
| the field a PRK is linked to |
|
|
Term
| how are records linked in a hierarchical db? |
|
Definition
| using physical address pointers |
|
|
Term
| what is another name for the hierarchical db structure |
|
Definition
|
|
Term
| CREATE, DROP & ALTER are ex of __ commands |
|
Definition
|
|
Term
| INSERT, UPDATE, & DELETE are ex of __ commands |
|
Definition
|
|
Term
|
Definition
| nodes, transmission media = how connected; network I/O card (NIC), network OS, communication devices |
|
|
Term
| types of wired & wireless "transmission media"? |
|
Definition
| wired: twisted pairs, coaxial cables, fiber optic cables; wireless: microwave, Wi-Fi, Bluetooth, digital cellular |
|
|
Term
|
Definition
| peer to peer, client/server, hierarchical |
|
|
Term
| diff 2 tier vs 3 tier architecture of an NOS |
|
Definition
| 2 tier = client/server, 3-tier sep out database server vs application server |
|
|
Term
| types of communication devices in a network? |
|
Definition
| modems, multiplexers, concentrators, bridges, routers, gateways |
|
|
Term
|
Definition
| allows you to connect dissimilar networks (eg LAN w WAN) |
|
|
Term
| what type of network OSs are used in LANs & WANs |
|
Definition
| client/server & peer to peer |
|
|
Term
|
Definition
| CDPD stands for cellular digital packet data-type of wireless transmission |
|
|
Term
| when use star, ring, bus, tree topologies? |
|
Definition
| Star: w host mainframe computer in LAN or WAN; Ring-only in peer to peer (change is $$), Bus (often in Ethernet LANs), controlled byu CSMA-CD carrier sense multle access w/collision detection prevents two simultaneous accesses; tree in LAN large & fast |
|
|
Term
|
Definition
| virtual private network, enables a remote user to access a LAN via a "VPN tunnuel." Cost effective & flexible means of providing secure remote access. |
|
|
Term
|
Definition
| LAN, WAN, VAN; internet, intranet, exranet; VPN |
|
|
Term
|
Definition
| LAN, WAN, VAN; internet, intranet, exranet; VPN |
|
|
Term
|
Definition
| Safeguard assets; Promote efficiency of Operations; Measure compliance w/policies & procedures; Ensure accuracy & reliability of accting records (record all valid transaxns, timely updates, accurate $$ values, recorded in proper time period) |
|
|
Term
| Risks in the computer environment? |
|
Definition
| reliance on faulty systems; unauthorized access, unauthorized changes inmaster files, failures to make necessary updates, inappropriate manual interventions, loss of data |
|
|
Term
| How does segregation of duties in computer env differ f/manual |
|
Definition
| Duties that would be separated in manual system are often combined in computer BUT computer has controls that compensate |
|
|
Term
| Paper vs electronic audit trails? |
|
Definition
| Audit trails "disappear" w/electronic data BUT logs can be kept and when they are can be as effective as paper-based trails |
|
|
Term
| types of errors more likely in manual vs in computer system? |
|
Definition
| Manual --> more random clerical errors; computer -> more systemic errors in programming |
|
|
Term
| Authorization in computer vs manual systems? |
|
Definition
| Computer systems often have built in "automatic orders" which bypass authorization (eg orders for more inventory or supplies when they reach a certain level). Thus authoriz is missing; therefore automatized transaxns should be regularly reviewed and compared to standards to see if more frequent or $$$ than expected |
|
|
Term
| Where are there more possibilities for fraud in computer systems? what mitigates against this? |
|
Definition
| more opportunities for remote access to data. concentration of info means that breaches have wide-ranging consequences. Decreased human involvement means decr. opps for observation. There may be fraud or errors built into programs. On the other hand,there is more potential for increased management review and embedded audit modules to mitigate against the additional risks |
|
|
Term
| Preventive, Detective, Corrective controls? |
|
Definition
| Preventive "before the fact" (eg locks & passwords & seg of duties); tend to be passive--just put them into op. Detective "after the fact" and active, ongoing. Eg data entry edit checks, reconciliations, tests of transaxns. Note that the existence of detective checks can be a preventive check in itself if people know. Corrective checks are paired with detective checks and try to reversse the effects of observed errors, eg, maintaining backup files, disaster recovery plans & insurance (**note well that these are classified officially as CORRECTIVE, not preventive, b/c while you set them up in advance they are only used once something happens) |
|
|
Term
| feedback vs feed-forward controls |
|
Definition
| feedbck are detective, correct results. feedfwd are preventive--eg inventory systems that try to prevent shortfalls |
|
|
Term
| application vs general controls |
|
Definition
| general apply to all computerized functions to ensure data integrity (eg restricted access, backups, bkgd chks on personnel); application are special to programs, relate to data input, processing, output. eg checks on numeric values & formatting |
|
|
Term
| three models used to evaulate internal controls |
|
Definition
|
|
Term
|
Definition
| control environment, risk assessment, info & communications, monitoring, control activities (review f/AUD) |
|
|
Term
|
Definition
| 2004 update; changes 'control env' to "internal env" and adds 3 more objectives, all with the goal of aligning functions with corporate objectives. Three additions are Objective setting; Event identification (id events that might impact org's ability to meet its goals); Risk Response |
|
|
Term
| Four types of objectives in COSO ERM? |
|
Definition
| strategic, operational, reporting, compliance |
|
|
Term
| Four business levels in COSO ERM? |
|
Definition
| entity, division, subsidiary, business unit |
|
|
Term
|
Definition
| control objectives for info & related technologyies. widely used internationally in IT security & control. |
|
|
Term
|
Definition
| 1. Domains & processes (34 basic IT processes divided into 4 domains: planning/org; acquisition/implementation; delivery/support; monitoring); 2. Info criteria (eg effective efficient reliable available confidential); IT resources (people, apps, technology, facilities, data) |
|
|
Term
| *three main areas in IT depts?? |
|
Definition
| Applications development; Systems administration & programming; Computer operations |
|
|
Term
| what is the main control in IT depts? |
|
Definition
| segregation of duties betweeen the 3 areas of applications dev, system admin, & computer ops must be strictly maintained |
|
|
Term
| What type of controls are gen used in IT (preventive or detective, gen or app) |
|
Definition
|
|
Term
| Who works in applications development & what does this dept do |
|
Definition
| creates new enduser computer apps & maintains existing ones. Systems analysts design new systems; application programmers work under direxn of systems analyst to actually write the programs. |
|
|
Term
| how are new applications tested |
|
Definition
| in a test env using copies of live data & existing programs, NOT "live" |
|
|
Term
| What does the systems admin & programming dept do? |
|
Definition
| database administrator, netowrk administator, web administrator, are responsible for mgmt activites in these areas, esp for granting access; Systems programmers update the operating systems & hardware |
|
|
Term
| What should Systems Administrators be prohibited from? Systems Programmers? |
|
Definition
| Systems Admin should be prohibited from participating directly in operations of the systems they administer. Systems programmers (who update op sys/hw) should not have access to info about application programs or data files, nor should they control access to data programs or resources |
|
|
Term
| What does the computer operations dept do? Main jobs in this dept? |
|
Definition
| Responsible for day to day ops, eg scheduling batch jobs, running backups. Main jobs: data control (controls flow os docs into & out of ops, schedules batch jobs); data entry clerks key in data; computer operators run programs, file librarians maintain control over files & data that are not online |
|
|
Term
| Seg of duties in computer ops? |
|
Definition
| Computer operators should not program. Systems programers should not have access to application doc. Data amin should not have access to computer ops (live data). App programmers & systems analysts should not have access to live data nor should they control access to data or programs |
|
|
Term
| What is "social engineering" f/the IT perspective? |
|
Definition
| set of techniques used by attackers to fool employees into giving them access to resources |
|
|
Term
| 3 types of backup systems? |
|
Definition
| grandfather-father-son (batch); checkpoint/restart (batch); rollback & recovery (*OLRT) |
|
|
Term
|
Definition
| storage area network to replicate data f/multiple sites |
|
|
Term
|
Definition
| exact copies; used for "load balancing" |
|
|
Term
| Disaster recovery plans (DRPs) |
|
Definition
| Cold site (room ready, know where equip will come from); warm site (room & equip ready); hot site (room, equip, & critical data ready) |
|
|
Term
| what is a parity bit & why is it used? |
|
Definition
| a 0 or 1 included in a byte to make sure that the 0s & 1s sum up to either an odd or an even number; used to make sure data is transmitted accurately |
|
|
Term
| what is a read write after check? |
|
Definition
| verifies that data was written correctly by reading what was written & cf to source |
|
|
Term
|
Definition
| verifes that transmission is accurate by echoing back rec'd ino to source |
|
|
Term
|
Definition
| check internal ops of hardware |
|
|
Term
|
Definition
| when multiple users accessing machines/data prevents writing over/conflicts; this is a PREVENTIVE control |
|
|
Term
| most hardware controls are ____ (prevent/detect/correct) |
|
Definition
|
|
Term
| types of hardware controls? |
|
Definition
| parity check, echo check, read write after check, diagnostic routine |
|
|
Term
| user authentication vs user authorization? |
|
Definition
| authentication verifies that this is the right user, authorization determines what this user can access |
|
|
Term
| General types of contorls in computer systems? |
|
Definition
| Hardware controls, logical access (authentication) controls; authorization controls |
|
|
Term
| Bases for user authentication? |
|
Definition
| Something user knows (PIN, pw), has (smart card, ID badge) or physical characteristic (fingerprint) |
|
|
Term
| what is a security token? |
|
Definition
| devices that either provide a one time password (used alongside regular on) or a smart card |
|
|
Term
| what is in an authorization matrix |
|
Definition
| rows = users, columns = resources |
|
|
Term
| what is involved in a digital signature |
|
Definition
| public/private key encryption, provides security in networked environment |
|
|
Term
| 4 levels of documentation for a system? |
|
Definition
| Systems, program, operator, user |
|
|
Term
| What is the simplest input check? |
|
Definition
|
|
Term
|
Definition
| verifies that entered data is of approp type (alph/numeric, date, etc) |
|
|
Term
|
Definition
| makes sure entered data does not exceed a specified value (range; sign) |
|
|
Term
|
Definition
| just checks to make sure that a code entered is an existing code--does NOT ensure that the code is correct! |
|
|
Term
|
Definition
| number created by applying an arithmetic algorithm to other digits in the number; verifies that an entered code is both valid & correct. One of the most reliable methods for ensuring that the correct code has been entered |
|
|
Term
| reasonableness check (Logic test) |
|
Definition
| makes sure that data in two or more fields is consistent--eg if pay rate is $3500 would not be consistent with pay period value of hourly |
|
|
Term
|
Definition
| verifies that #s are in sequence, most commonly used for verifying completeness |
|
|
Term
|
Definition
| rekeying of critical data in the transaction followed by a comparison of the two keyings (like entering your pw twice when you first create it) |
|
|
Term
|
Definition
| after the code is entered the system displays additional info about the code; only for OLRT systems |
|
|
Term
| batch control totals: types? |
|
Definition
| calculated totals of various fields in a batch, used to ensure accuracy of data entry. Financial, Hash, Record counts. |
|
|
Term
|
Definition
| forms & screens reduce likelihood of data entry errors |
|
|
Term
|
Definition
| run to run controls; internal labels (headers & trailer records); audit trail controls |
|
|
Term
|
Definition
| spooling (print queue) controls, disposal of aborted print jobs, distribution of reports, end user controls |
|
|