2020 - BEC
Area - IV
INFORMATION TECHNOLOGY
FLASH CARD
1
BUSINESS ENVIRONMENT AND CONCEPTS
2
BUSINESS ENVIRONMENT AND CONCEPTS
3
AREA - IV
Information Technology
4
Classification of control based on control
5
Enterprise Resource Planning System (ERPs)
6
What is Application Controls?
7
Disadvantage of ERP:
8
Components of ERP: (OLAP and OLTP)
9
Cloud Based System Advantages:
10
Cloud Based System Disadvantages:
11
Examples of Cloud Based Systems:
12
An IT system continuity Plan allows:
13
Business Continuity Management (BCM):
Overall process of planning for disasters
14
DRP (Disaster Recovery Plan):
15
Cold Site:
16
Warm Site:
17
Hot Site:
18
Mirrored Site
19
IT Functions: IT Internal Controls
20
Roles within IT:
21
What are IT Controls (3)?
22
Why are input controls important:
23
What are the 3 main goals of input controls:
24
Examples of Input Controls:
25
Objective of Processing Controls -
26
Types of Processing Controls:
27
Objectives of Output Controls -
28
Types of Output Controls:
29
IT System Development -
30
Main Roles of the SDLC are:
31
What are stages of the SDLC:
32
Types of Planning and Feasibility
33
Objectives of Analysis phase of SDLC
34
Types of Implementation of application / system
35
Importance of Documentation in an IT Environment
36
Types of data size?
37
What is RAM ?
38
Optical Disk (CD)
39
Central Processing Unit (CPU)
40
Online Real Time Processing (OLRT) -
41
Master File -
42
Batch Processing
43
Point of Sale System (POS) -
44
Centralized System -
45
Peer-to-peer Network -
46
Local Area Network (LAN) -
47
What is a Node ?
48
Wide Area Network (WAN) -
49
Extensible Markup Language (XML)
50
Hypertext Markup Language (HTML) -
51
Transmission Control Protocol/Internet Protocol (TCP/IP) -
52
Extensible Business Reporting Language (EXBRL) -
53
File Transfer Protocol (FTP) -
54
Remote Backup Service -
55
Rollback and Recovery Method of Backup -
56
Mirroring -
57
Biometric Controls -
58
File Attributes -
59
Social Engineering -
60
Four (4) electrical systems risks are:
61
'Cleartext' or 'Plaintext' -
62
Symmetric Encryption
63
Digital Certification -
64
Asymmetric Encryption -
65
Secure internet transactions are made possible by 2 main security protocols -
66
Ciphertext -
67
Denial of Service Attack -
68
Trojan Horse -
69
Types of data storage?
70
What is Backdoor?
71
Change control system
A system put in place for the purpose of authorizing and monitoring changes related to information technology, including software implementation, development, application programs, database administration, etc. Although system implementations often take longer and cost more than originally budgeted, these issues (along with scope creep) can be minimized with better oversight through an established system
72
Data Mining
73