-
Define the components of a system and how those components manifest in an AIS
-
Define the characteristics of useful information.
Reliable- free from error/bias
Understandable- intelligible to user
Complete- all relevant data
Timely- on time to make decision
Relevant- reduces uncertainty
-
Compare and contrast the three types of Cloud Computing models (according to NIST): IaaS, PaaS, and SaaS.
 Make or buy decision, used for SOC audits, could is outsourcing
-
IPO Model
-
Explain the Technology Acceptance model
- Ease of use less dominant than other factors

-
Why is blockchain structure so secure?
3 reasons for Blockchain Security:
- (1) distributed system (consensus)
- (2) hash system (immutable)
- (3) Proof-of-Work (solve a cryptographic puzzle to validate transaction
First is genesis block
-
-
Construct a map of multiple database files that highlight the relationship between primary keys and foreign keys.
A primary key generally focuses on the uniqueness of the table. It assures the value in the specific column is unique. A foreign key is generally used to build a relationship between the two tables. The table allows only one primary key.
-
Why is a master data management plan (MDM) important?
organizational consistency and customer service (Tim W vs Timothy vs Timothy West example)
-
Long vs wide format table
long form better than wide for accounting but wide used more
-
Describe the four types of data analysis: (1) descriptive, (2) diagnostic, predictive, and predictive.
- (1) descriptive- what happened?
- (2) diagnostic- why did it happen?
- (5) predictive (regression, credit score) what will happen?
- (4) prescriptive (what should I do?)
-
Explain the three phases of the system development process
-
Explain the three steps in the System Analysis Process
- Understand current situation (assess needs, strengths/weaknesses, user/business requirements0
- Evaluate alternatives (time, technology, operations, money)
- Communicate recommendations (or present alternatives)
-
Systems Implementation Steps
- - Software development (or acquisition)
- - Hardware acquisition
- - System installation
- - System testing
- - System training
- - System conversion
SHITTC Creek?
-
Describe the FIVE critical success factors (CSF’s) used to evaluate system development success
FEMUR
Flexibility (adaptation, not restricted)
(Cost) Effectiveness (cost v benefit, maintenance)
Management commitment
User acceptance (TAM!!!)
Reliability
-
Describe IT decision-making landscape key players and decisions
-
Describe the data governance model
-
Internal Control
A process effected by an entity’s board of directors, management, and other personnel, designed to provide reasonable assurance regarding the achievement of objectives relating to operations, reporting and compliance
-
COSO Internal Control Framework Components
CRIME!
- Control activities
- Risk Assessment
- Information and Communication
- Monitoring activities
- Environment
-
-
Corporate Culture
Collective view of individuals in an organization
-
Risk appetite
Level of acceptable risk assessed by corporate culture
-
Risk inventory
All risks present in an organization
-
Risk profile
How risk factors interact (tolerance stacking), division or project-specific
-
Portfolio View
Entity view of risk profiles
-
COSO Enterprise Risk Management Framework
Governance and culture (board oversight, culture, core values, ASA)
Strategy and Objective setting (risk appetite, objectives, strategies)
Performance (identify/prioritize risk, portfolio view)
Review/Revision (assess change, risk performance, attempt ERM improvement)
Info/Comms/Reporting (communicate/report risk)
-
Data Lake vs warehouse vs mart
Data lake- unstructured raw data that is large and undefined, stream processing, machine learning, real time analysis
Data warehouse- defined, structured, batch processing/reporting, smaller, relational data (ops etc)
data mart is a data warehouse that serves the needs of a specific business unit
-
Information Ecosystem
External/internal parties who need to interact with org's data and vice versa
-
Horizontal vs hierarchical block diagram
- Horizontal (IPO)
- Hierarchical shows info flows but no inter-level association of data
-
Peer to peer
no centralized server
-
Types of cloud deployment
public (all users), private (single org), hybrid, community (multiple orgs)
-
Transaction, master, and open files
-
Field
Data element within a record comprising that transaction or master file record (customer, inventory accts)
|
|