ITAC exam 1

  1. Define the components of a system and how those components manifest in an AIS
    Image Upload 2
  2. Define the characteristics of useful information.
    Reliable- free from error/bias

    Understandable- intelligible to user

    Complete- all relevant data

    Timely- on time to make decision

    Relevant- reduces uncertainty
  3. Compare and contrast the three types of Cloud Computing models (according to NIST): IaaS, PaaS, and SaaS.
    Image Upload 4Make or buy decision, used for SOC audits, could is outsourcing
  4. IPO ModelImage Upload 6
  5. Explain the Technology Acceptance model
    • Ease of use less dominant than other factors
    • Image Upload 8
  6. Why is blockchain structure so secure?
    3 reasons for Blockchain Security:

    • (1) distributed system (consensus)
    • (2) hash system (immutable)
    • (3) Proof-of-Work (solve a cryptographic puzzle to validate transaction

    First is genesis block
  7. Data Analytic Cycle
    Image Upload 10
  8. Construct a map of multiple database files that highlight the relationship between primary keys and foreign keys.
    A primary key generally focuses on the uniqueness of the table. It assures the value in the specific column is unique. A foreign key is generally used to build a relationship between the two tables. The table allows only one primary key.Image Upload 12
  9. Why is a master data management plan (MDM) important?
    organizational consistency and customer service (Tim W vs Timothy vs Timothy West example)
  10. Long vs wide format table
    long form better than wide for accounting but wide used moreImage Upload 14
  11. Describe the four types of data analysis: (1) descriptive, (2) diagnostic, predictive, and predictive.
    • (1) descriptive- what happened?
    • (2) diagnostic- why did it happen?
    • (5) predictive (regression, credit score) what will happen?
    • (4) prescriptive (what should I do?)
  12. Explain the three phases of the system development process
    Image Upload 16
  13. Explain the three steps in the System Analysis Process
    - Understand current situation (assess needs, strengths/weaknesses, user/business requirements0

    - Evaluate alternatives (time, technology, operations, money)

    - Communicate recommendations (or present alternatives)
  14. Systems Implementation Steps
    • - Software development (or acquisition)
    • - Hardware acquisition
    • - System installation
    • - System testing
    • - System training
    • - System conversion

    SHITTC Creek?
  15. Describe the FIVE critical success factors (CSF’s) used to evaluate system development success
    FEMUR

    Flexibility (adaptation, not restricted)

    (Cost) Effectiveness (cost v benefit, maintenance)

    Management commitment

    User acceptance (TAM!!!)

    Reliability
  16. Describe IT decision-making landscape key players and decisions
    Image Upload 18
  17. Describe the data governance model
    Image Upload 20
  18. Internal Control
    A process effected by an entity’s board of directors, management, and other personnel, designed to provide reasonable assurance regarding the achievement of objectives relating to operations, reporting and compliance
  19. COSO Internal Control Framework Components
    CRIME!

    • Control activities
    • Risk Assessment
    • Information and Communication
    • Monitoring activities
    • Environment
  20. COBIT Objectives
    Image Upload 22
  21. Corporate Culture
    Collective view of individuals in an organization
  22. Risk appetite
    Level of acceptable risk assessed by corporate culture
  23. Risk inventory
    All risks present in an organization
  24. Risk profile
    How risk factors interact (tolerance stacking), division or project-specific
  25. Portfolio View
    Entity view of risk profiles
  26. COSO Enterprise Risk Management Framework
    Governance and culture (board oversight, culture, core values, ASA)

    Strategy and Objective setting (risk appetite, objectives, strategies)

    Performance (identify/prioritize risk, portfolio view)

    Review/Revision (assess change, risk performance, attempt ERM improvement)

    Info/Comms/Reporting (communicate/report risk)
  27. Data Lake vs warehouse vs mart
    Data lake- unstructured raw data that is large and undefined, stream processing, machine learning, real time analysis

    Data warehouse- defined, structured, batch processing/reporting, smaller, relational data (ops etc)

    data mart is a data warehouse that serves the needs of a specific business unit
  28. Information Ecosystem
    External/internal parties who need to interact with org's data and vice versa
  29. Horizontal vs hierarchical block diagram
    • Horizontal (IPO) 
    • Hierarchical shows info flows but no inter-level association of data
  30. Peer to peer
    no centralized server
  31. Types of cloud deployment
    public (all users), private (single org), hybrid, community (multiple orgs)
  32. Transaction, master, and open files
    Image Upload 24
  33. Field
    Data element within a record comprising that transaction or master file record (customer, inventory accts)
Author
collgirl06
ID
361992
Card Set
ITAC exam 1
Description
Updated