S2 - Information Systems and Data Management

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/72

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

73 Terms

1
New cards

The physical components that comprise computers, computer-realted equipment, and external peripheral devices

Computer Hardware

2
New cards

Electronic machines, typically computers or microcomputers, that directly interact with employees or consumers at the “edge” of a network

End-user devices

3
New cards

Examples of non-end user devices

Switches, routers, servers, other network support devices

4
New cards

Facilities and safeguards on such facilities that contain hardware

Infrastructure housing

5
New cards

Traditional hardware found in most networks

Modems, routers, switches, gatewats, edge-enabled devices, servers, firewalls

6
New cards

Connect a network to an internet service provider’s network

Modems

7
New cards

Manage network traffic by connecting devices to form a network

Routers

8
New cards

Connect and divide devices within a computer network

Switches

9
New cards

A computer or device that acts as an intermediary between different networks

Gateways

10
New cards

Allow computing, storage, and networking functions closer to the devices’ source of the data or system requests

Edge-enabled devices

11
New cards

Physical or virtual machines that coordinate the computers, programs, and data that are part of the network

Servers

12
New cards

Software applications or hardware devices that protect a person’s or a company’s network traffic by filtering it through security protocols with predefined rules

Firewalls

13
New cards

Seven Layers responsible for specific data exchange functions in the Open System Interconnection (OSI) model

Physical, Data link, network, transport, session, persentation, application

14
New cards

Local-Area Networks, Wide-Area networks, Software-defined Wide Area Networks, Virtual Private Networks, Demilitarized Zone

Network Architecture Designs

15
New cards

Three Primary Cloud Computing Models and the respective levels of controls associated with each model

Iaas (More control), Paas (Medium Control), Saas (less)

16
New cards

The publication provides specific guidance to organizations for applying the COSO framework to cloud computing. In general, an organization must integrate the governance of cloud computing into its overall risk management strategy

COSO Enterprise Risk Management for Cloud Computing

17
New cards

Cross-functional systems that support different business functions and facilitate the integration of information across department such as accounting, customer management, finance, human resources, inventory management, manufacturing, marketing and vendor management. An ERP may include accounting information system (AIS) capabilities while being more robust than a standalone AIS and integrated with other departments

Enterprise Resource Planning Systems

18
New cards

Three subsystems that make up an AIS

Transaction processing system, financial reporting system, management reporting system

19
New cards

Revenue and cash collection, purchasing and disbursement, human resources and payroll, production, fixed assets, treasury, general ledger and reporting

Common transaction cycels within an accounting department

20
New cards

Four broad areas of process improvements that can enhance accounting information system performances

Automation, shared services, outsourcing, offshore operations

21
New cards

A system’s ability to initiate and complete transactions so that they are valid, accurate, completed timely, and authorized to meet an organization’s objective

Processing Integrity

22
New cards

A properly designed control that either:

  • does not operate as designed

  • is performed by a person who lacks authority or competence to perform the control effectively

Deficiency in the operation of a control

23
New cards

Assess the risks, identify mission-critical applications and data, develop a plan for handling the mission-critical applications, determine the responsibilities of the personnel involved in disaster recovery, test the disaster recovery plan

Common steps in a disaster recovery plan

24
New cards

Located off-site, connections are in place, equipment is not in place, typically takes 1-3 days to be operational, and is the cheapest

Cold site

25
New cards

Located off-site, connections are/are not in place, equipment is/is not in place, typically takes 0-3 days to be operational, and is moderately expensive

Warm Site

26
New cards

Located off-site, connections are in place, equipment is in place, typically immediate to be operational, and it the most expensive

Hot site

27
New cards
28
New cards

Failure of IT infrastructure, insufficient capacity and resources, lack of business resiliency

Common system availability risks

29
New cards

Physical controls, IT infrastructure controls, uninterrupted power supply, redundancy, system backup

System availability controls

30
New cards

The policies, procedures, and resources employed to govern change in an organization

Change management

31
New cards

Five forms of computing environment

Development, testing, staging, production, disaster recovery

32
New cards

Three examples of risks that exist pertaining to the selection and acquisition of software

Lack of expertise, lack of a formal selection process, software/hardware vulnerability and compatibility

33
New cards

User resistance, lack of management support, lack of stakeholder support, resource concerns, business disruptions, lack of system integration

Integration risks during change management process

34
New cards

Lack of organizational knowledge, uncertainty of the third’s party’s knowledge and management, lack of security

Outsourcing risks during the change management process

35
New cards
36
New cards

Establish acceptance criteria, analyze logs, evaluate the results, monitor, test using continuous adoption

Procedures to test change management controls

37
New cards

Different teams of employees performing separate tasks in sequence, with:

  • each team beginning work from the rpe-written authoritative agreement of the preceding team

  • ending work when ther euqiremnts for the team have been met

Waterfall model

38
New cards

Different teams working on different phases or task simulatneously, with shorter deadlines to encourage efficiency. Relative to the waterfall model,a more flexible approach to change management

Agile model

39
New cards

Different conversion methods for converting a computer systems to another system

Direct method, parallel method, pilot method, phased method, hybrid method

40
New cards

System test during the development process

Unit Testing, Integration testing, System testing, acceptance testing

41
New cards

Examining the smallest increment, or unit of an application

Unit Testing

42
New cards

Examining if different components or modules within an application will work cohesively

Integration Testing

43
New cards

Verifying that all combined modules of a completed application work as designed in totality

System Testing

44
New cards

Assessing an application to determine whether it meets end-user requirements

Acceptance testing

45
New cards

Eight steps of data life cycle

Definition, capture, preparation, synthesis, analytics and usage, publication, archival, purging

46
New cards

Remove unnecessary headings or subtotals, clean leading zeros and non printable characters, format negative numbers, identify and correct inconsistencies across data, address inconsistent data types

Cleaning data

47
New cards

When data already exists, whether internal or external, the data must be extracted from its original sources, transformed into useful information, and loaded into the tool you choose to use for analysis.

Extract, transform, load data collection method

48
New cards

Directly asking users fro data through means such as a survey or an interview

Active Data Collection Method

49
New cards

Interactions occur involving the collection of data without direct permission from users

Passive data collection method

50
New cards

Repository of transactional data from multiple sources and is often an interim areas between a data source and data warehouses

Operational Data Store

51
New cards

Large data repositories that are centralized and sued for reporting and analysis rather than for transactional purposes

Data warehouses

52
New cards

Similar to data warehouse but more focused on a specific purpose and is often a subset of a data warehouse

Data mart

53
New cards

Repository similar to a data warehouse but contains both structured and unstructured data, with data mostly beign in its natural or raw format

Data lake

54
New cards

Store data across a series of related tables. Storing data in a normalized database helps to reasonably assure that data is complete, not redundant, and that business rules and internal controls are enforced

Relational databases

55
New cards

Data elements associated with relational databses?

Tables, attributes, records, fields, data types, keys

56
New cards

An attribute required in every table to help solidify that each row in the table is unique

Primary key

57
New cards

The combination of more than one attribute to uniquely identify each record in the table

Composite Primary key

58
New cards

Attributes in one table that are also primary keys in another table

Foreign keys

59
New cards

High-level of design of the data structures in an information system

Data model

60
New cards

Actual implementation and execution of that design in a specific relational database

Database schema

61
New cards

Forms in the normalization of data to eliminate redundant data and ensure data is stored logically

First normal form, second normal form, third normal form

62
New cards

Two common types of schemas for dimensional modeling

Star schema, snowflake schema

63
New cards

Central fact table with associated dimension tables surrounding it

Star schema

64
New cards

Similar to star schema, but with dimension tables further normalized. The dimension tables are broken down into multiple related tables rather than a single table

Snowflake schema

65
New cards

Language specific words used in SQL queries intended for data extraction

SQL Commands

66
New cards

References to table names, attribute names, or criteria

Database elements

67
New cards

Command is required as the first clause in most SQL queries. Indicate which attributes are requested to view

SELECT SQL Command

68
New cards

Command is required as the second clause. Indicates which table the attribute(s) requested to SELECT are located in.

FROM SQL command

69
New cards

Command is used to filter results, command [attribute] = [criteria]

WHERE SQL Command

70
New cards

Clauses are required to indicate the second table and how the second table is related to the primary tables (via the related primary key and foreign key)

JOIN and ON SQL Commands

71
New cards

Showcase how many organizations are involved in a given process in BPMN activity models

Pools

72
New cards

More granular than pools, indicating the segregation of duties within an organization in BPMN activity models

Swim lanes

73
New cards

Describe the appropriate order of SQL Commands

Select, from, join, where, group by, having, order by, limit