Term
Older computer systems were focued on ____, while newer computer systems tend to be focused more on ___ |
|
Definition
transaction processing; management reporting (decision making aid) |
|
|
Term
What is the difference between transaction processing and management reporting systems? |
|
Definition
Transaxn reporting foxus on recordkeeping; mgmt rpting more on assisting in decision making. |
|
|
Term
Four types of management reporting systems (explain each)? |
|
Definition
1. Management Info Sys = provide info for mgmt to use in dec; 2. Decision Support system (models & data to aid in dec, but extensive user interp needed); 3. Expert system (very limited and structured domain, minimizes need for human interp); 4. Executive info sys (support executive work) |
|
|
Term
Two types of transaction processing? When is each used? |
|
Definition
OLRT = online real time & batch. OLRT used when immediacy of info access is impt (eg bank w/d); batch when accuracy of info is more critical (eg bank deposit) |
|
|
Term
|
Definition
|
|
Term
LAN vs WAN vs VAN vs WLAN? |
|
Definition
local area network is all in same building, WAN in diff locations; VAN links different companies computers; WLAN is wireless (Wi-Fi or Bluetooth) |
|
|
Term
What are options for network topology & why matter? |
|
Definition
Topology matters b/c det which computers can access which; infl efficiency. Bus = link thru common line; Star = hub, Ring = each connected to two on sides, Tree = Stars linked on branches to trunk; Mesh = all interconnected |
|
|
Term
Intranet vs extranet vs internet? |
|
Definition
intranet = w/in co; extranet = co w/links to customers & vendors; internet = external links to all |
|
|
Term
What is EDI and what is it used for? |
|
Definition
Electronic Data Interchange; used in VANs for communication between sppliers & customers--eg automatic orders. Concerns: strict data standards; mapping & translation software; unauthorized access concerns. |
|
|
Term
Risks & Rewards of electronic commerce |
|
Definition
benefits: less paper, fast, simpler recording, real time; risks: data infiltration, loss of paper trail. |
|
|
Term
controls to prevent info from being transmitted to an inappropraite company? |
|
Definition
routing verification procedures; message acknowledgement procedures |
|
|
Term
|
Definition
an order or confirmation is intercepted by an imposter |
|
|
Term
controls to prevent spoofing |
|
Definition
echo transmitted docs back to sender; digital signature |
|
|
Term
|
Definition
**detectino risk may not be reduced enough thru substantive testing alone; must reduce control risk too and build controls into sys to ensure validity of data |
|
|
Term
define: virus, trojan horse, worm, hoax virus, killer application, phishing |
|
Definition
virus = program asking pc to perform an axn not authorized by computer; trojan horse = a virus w/in a program that otherwise acts normal; worm = program that duplicates itself over a network to infect multiple PCs; a "killer app" is a very useful program, and phishing is falsely claiming (& looking like) a legitimate site & asking for private info |
|
|
Term
|
Definition
supercomputers, mainframes, minicomputers, microcomputers = PCs, PDAAs |
|
|
Term
source program vs object program vs compiler |
|
Definition
Source = what the programmer writes (often C++ or Java); Object = machine language 0 & 1 only; compiler turns source program into object program |
|
|
Term
|
Definition
bit = 0 or 1; byte = 8 bits & repr an alphanumeric character |
|
|
Term
What is an MIS and what does it do? |
|
Definition
Management Information Systems take planning information (budgets, forecasts, etc.) data and compare it to actual results in periodic management reports (summary reports, variance reports, and exception reports). |
|
|
Term
What is a DSS & what does it do? |
|
Definition
Decision support systems (DSS) -- provide information to mid- and upper-level management to assist them in managing non-routine problems and in long-range planning. 1. unlike MISs, DSSs frequently include external data in addition to summarized information from the TPS and include significant analytical and statistical capabilities. |
|
|
Term
|
Definition
Enterprise Resource Planning systems (ERPs) -- ERPs provide transaction processing, management support, and decision-making support in a single, integrated package. By integrating all data and processes of an organization into a unified system. Helps overcome problems that arise b/c of inconsistencies bwn depts & op units |
|
|
Term
|
Definition
Online analytical processing system (OLAP): incorporates data warehouse and data mining capabilities within the ERP |
|
|
Term
Advantage of database over flat file |
|
Definition
|
|
Term
What is a data warehouse? |
|
Definition
a database designed to archive an organization's operational transactions (sales, purchases, production, payroll, etc.) over a period of years; external data that might be correlated with these transactions such as economic indicators, stock prices, exchange rates, market share, political issues, weather conditions, etc. can also be incorporated into the data warehouse |
|
|
Term
A specialized version of a data warehouse that contains data that is pre-configured to meet the needs of specific departments is known as: |
|
Definition
|
|
Term
|
Definition
E-business can be conducted within the organization as well as between the organization and its trading partners. E-commerce NARROWER, just interaxns org & trading ptrs |
|
|
Term
|
Definition
bus to bus vs to consumer. B2B incl electronic data interchange (EDI), supply chain management (SCM) and electronic funds transfer (EFT). |
|
|
Term
|
Definition
Customer relationship management (CRM): technologies used to manage relationships with clients; both biographic and transaction information about existing and potential customers is collected and stored in a database; the CRM provides tools to analyze the information and develop personalized marketing plans for individual customers. |
|
|
Term
|
Definition
Electronic Data Interchange (EDI): EDI is computer-to-computer exchange of business data (e.g., purchase orders, confirmations, invoices, etc.) in structured formats that allow direct processing of the data by the receiving system; EDI reduces handling costs and speeds transaction processing compared to traditional paper-based processing. Specific format used (ANSI.x.12 in US, UN/EDIFACT int'lly). Gen proc thru VANs |
|
|
Term
|
Definition
Supply chain management (SCM) -- the process of planning, implementing, and controlling the operations of the supply chain: the process of transforming raw materials into a finished product and delivering that product to the consumer. Supply chain management incorporates all activities from the purchase and storage of raw materials, through the production process, into finished goods through to the point-of-consumption. |
|
|
Term
means of paying electronically |
|
Definition
EFT = electronic funds transfer, token based payment (smart cards), online pmt systems like PayPal. (Electronic wallet is merely centralized location for CC nos) |
|
|
Term
Hedging the receipt of a foreign currency contract would require a contract _____ (buying/selling) that currency in the future |
|
Definition
|
|
Term
|
Definition
DDL = data definition language, used to define db; DCL = data control language, used to specify privileges & security rules; DML = data manipulation language, helps programmers update db; DQL = database query language, used for ad hoc queries |
|
|
Term
|
Definition
millions of instructions per second |
|
|
Term
|
Definition
system development life cycle |
|
|
Term
7 steps in system development life cycle? |
|
Definition
1. Planning & feasibility study; 2. Anslysis (define requirements wking w/end users); 3. Design (tech architecture specs, systems model flowcharts); 4. Development (actual purchasing & compatibility testing); 5. Testing (compare actual to expectations; run both correct & problematic data); 6. Implementation; 7. Maintenance |
|
|
Term
types of implementation of new system? |
|
Definition
parallel (best but$$), cold turkey (worst, only if real simple), phased implementation (parts of sys at a time to all users); pilot (whole system to diff subsets of users at a time) |
|
|
Term
role of IT steering committee, lead systems analyst, application programmers & end users in systems development? |
|
Definition
IT comm: approve & prioritize systems for development; lead systems analyst manages application programmer team, maint contact w/end users, respons for overall programming logic & functionality; applic programers write & test programs; end uers identify the problems to be addressed & approve the proposed soln |
|
|
Term
parties involved in systems development? |
|
Definition
end users, IT committee, application programmers, lead systems analyst |
|
|
Term
transaction files in a computerized environment are equivalent to ____ in a manal accounting system, while master files are equivalent to _____ |
|
Definition
transaction files like JOURNALS, temporary; master files like LEDGERS, permanent. |
|
|
Term
the general ledger in a manual accounting environment is equivalent to ___ in a computerized environment |
|
Definition
|
|
Term
four stages of batch processing? |
|
Definition
data entry, prelim edit, sorting (into same order as master file), master file update |
|
|
Term
Batch vs OLRT adv/disadv & when use each |
|
Definition
Batch disadv is time lags, but can be more accurate b/c more data checking. Use when transaxns periodic, sig amt of master file affected, transaxns are independent. OLRT adv is always current, use when this is key, transaxns are continuous & interdependent or infreq & few |
|
|
Term
centralized, decentralized, distributed systems |
|
Definition
centralized: adv = data security & consistency; disadv = cost, bottlenecks, not as timely. Decentralized (gen rpt to retail) less costsly, fewwer bottleneckcs, but greater potential for security violations, higher cost of installing equip in multiple locales; distrbuted adv = better cmm for remote, more current 7 complete info, disadv is expense of comm between remote locations & conflicts when multiple places try to access data at same time |
|
|
Term
Starting with a bit and ending with a database, what is the hierarchy of data elements? |
|
Definition
Bit (0/1), Byte (8 bits = alphanumeric character), (data values), Field, Record, File |
|
|
Term
|
Definition
control unit, arithmetic logic unit (ALU), Primary storage (memory) |
|
|
Term
|
Definition
two main types are RAM & ROM (incl PROM & EPROM--programmable & eraseable programmable). RAM temp, ROM perm. Also are registers (very small) & cache (freq accessed) |
|
|
Term
types of secondary storage devices? which most common? adv/disadv? |
|
Definition
Magnetic disks (most common), gen fast, Magnetic tape (sequential access only so slower), Optical disks (more stable, = CD & DVD), flash drives, & RAIDs |
|
|
Term
What are RAIDs & advantages of? |
|
Definition
(redundant array of independent disks--backup each transaxn, improve system fault tolerance, facilitate data retrieval) |
|
|
Term
What are the ways that data on a magnetic disk can be accessed? |
|
Definition
Direct access--by PRK (primary record key) fastest but hard to implement; Hashed access (PRK translated to disk address, also fast/diff); indexed (most common; is one file of index and another of records; very flexible); ISAM indexed sequentail access method involves storing the data in sequential order |
|
|
Term
|
Definition
Input: keyboard, mouse, mic, POS scanners, MICR device, OCR device; Output: printer monitor, speaker, VOCA |
|
|
Term
|
Definition
magnetic ink character recognition; optical character recognition; voice output communication aids |
|
|
Term
classifications of computers |
|
Definition
supercomputers, mainframes, minicomputeres, micrcomputers = PCs. Supercomputers for very data intensive proc; mainframes for ecommerce--can support thousands of users simultaneously |
|
|
Term
|
Definition
fat client is a PC on a network that has its own processing functions & data (like my laptop); thin client is a stripped down PC that doesn't have storage, used to access network. netwk admin prefer thin b/c less opp for viruses & threats |
|
|
Term
|
Definition
serwhen ver is used to provide resources to a network, eg, print server or file server; not diretly used by end users; work station is a high performance PC connected to a network & used by end user for specific function |
|
|
Term
architecture of a three-tier client/server system? |
|
Definition
Most client/server systems are designed with a desktop client, which the end user uses to interact with the system, an application server which authenticates users, maintains a library of application programs and controls access to systems resources and a database server on which data from many different databases may reside. |
|
|
Term
3 categories of software? |
|
Definition
System, Programming, Application |
|
|
Term
Types of system software? |
|
Definition
Operating system (OS), Database management system (DBMS), Network operating system (NOS) |
|
|
Term
sublanguages used by DBMS? |
|
Definition
DDL (data definition language), DML (data manipulation language), DQL (data query language) |
|
|
Term
1st - 5th generation programming languages? |
|
Definition
1st = machine language (0/1) (aka object code); 2nd = assember language; 3rd = procedural (exs = C++, Java, COBOL, Pascal--these write SOURCE CODE that is translated into OBJECT CODE); 4th = problem-oriented lang eg query lang or data analysis prog or report generator; 5th = visual or graphical program development environment (these generate source code for 3rd or 4th gen) |
|
|
Term
|
Definition
object oriented programming |
|
|
Term
characteristics of "objects" in object oriented programming? |
|
Definition
inheritance of charac f/class; polymorphism (take on diff attribute dep on condition; encapsulation (lim amt data one object shares w/others) |
|
|
Term
|
Definition
|
|
Term
|
Definition
based on standardized taxonomies, common format for comm fin info |
|
|
Term
What is an expert system and what are its components? |
|
Definition
expert system is a subclass of AI systems used in bus. incl knowledge db (rules), domain db (facts), inference engine (heuristics for dec making) |
|
|
Term
What is a neural network and how does it make decisions? |
|
Definition
a system of prog & data structures designed to recognize pattersin in large quantities of data, using feedback f/prev iterations; makes dec using "fuzzy logic" |
|
|
Term
Advantages of relational over flat file data base? |
|
Definition
eliminates data redundancy, easier to extract data for reporting |
|
|
Term
three types of db models? most used? |
|
Definition
hierarchical, network, relational* |
|
|
Term
adv/disadv of hierarchical db? |
|
Definition
adv: simple & efficient data retrieval (often used by data warehouses). disadv: can only repr 1:1 and 1:M rels, but NOT M:M rels w/o creating a lot of redundancy |
|
|
Term
adv/disadv of network model |
|
Definition
adv: can repr all types rels (1:1, 1:M, M:M), disadv: so much processing OH that it is too slow to be competitive |
|
|
Term
adv/disadv of relational db |
|
Definition
can repr all types of data (1:1, 1:M, M:M) w/least data redundancy. Disadv: slow when files extremely large |
|
|
Term
Explain what it means to "select," "join," & "project" info in a db |
|
Definition
Select = create subset of records; Join = pull data f/two files together; Project = create a new file made up only of selected fields f/the org files |
|
|
Term
what is normalization of db? |
|
Definition
organizing db to min data redundancy |
|
|
Term
|
Definition
view of the logical & physical rels in the db |
|
|
Term
what is a data dictionary? |
|
Definition
a listing of all the data fields found in the db |
|
|
Term
what is referential integrity of a db? |
|
Definition
when the rels between two entities are valid--makes sure that only valid data can be entered |
|
|
Term
what are the 3 components of a dbms? |
|
Definition
|
|
Term
|
Definition
data defintion (for new fields), data manipulation (of records), data query languages |
|
|
Term
two ways of extracting data f/db |
|
Definition
SQL & QBE (structured query language & query by example = drag & drop) |
|
|
Term
what is a distributed database? |
|
Definition
one that is copied and put in multiple locations to be available to multiple users |
|
|
Term
what are the two ways of distributing a database and when is each used? |
|
Definition
replication for when the same data needs to be used in each location; partition when each location will use only a separate part |
|
|
Term
what is record locking & a deadlock |
|
Definition
record locking prevents updating a db when one user is already doing so, deadlock occurs when two users simultaneously need the same info...processing stops until one request is cancelled |
|
|
Term
|
Definition
|
|
Term
How do relational dbs define relationships between tables? |
|
Definition
via a PRK (primary record key) |
|
|
Term
|
Definition
the field a PRK is linked to |
|
|
Term
how are records linked in a hierarchical db? |
|
Definition
using physical address pointers |
|
|
Term
what is another name for the hierarchical db structure |
|
Definition
|
|
Term
CREATE, DROP & ALTER are ex of __ commands |
|
Definition
|
|
Term
INSERT, UPDATE, & DELETE are ex of __ commands |
|
Definition
|
|
Term
|
Definition
nodes, transmission media = how connected; network I/O card (NIC), network OS, communication devices |
|
|
Term
types of wired & wireless "transmission media"? |
|
Definition
wired: twisted pairs, coaxial cables, fiber optic cables; wireless: microwave, Wi-Fi, Bluetooth, digital cellular |
|
|
Term
|
Definition
peer to peer, client/server, hierarchical |
|
|
Term
diff 2 tier vs 3 tier architecture of an NOS |
|
Definition
2 tier = client/server, 3-tier sep out database server vs application server |
|
|
Term
types of communication devices in a network? |
|
Definition
modems, multiplexers, concentrators, bridges, routers, gateways |
|
|
Term
|
Definition
allows you to connect dissimilar networks (eg LAN w WAN) |
|
|
Term
what type of network OSs are used in LANs & WANs |
|
Definition
client/server & peer to peer |
|
|
Term
|
Definition
CDPD stands for cellular digital packet data-type of wireless transmission |
|
|
Term
when use star, ring, bus, tree topologies? |
|
Definition
Star: w host mainframe computer in LAN or WAN; Ring-only in peer to peer (change is $$), Bus (often in Ethernet LANs), controlled byu CSMA-CD carrier sense multle access w/collision detection prevents two simultaneous accesses; tree in LAN large & fast |
|
|
Term
|
Definition
virtual private network, enables a remote user to access a LAN via a "VPN tunnuel." Cost effective & flexible means of providing secure remote access. |
|
|
Term
|
Definition
LAN, WAN, VAN; internet, intranet, exranet; VPN |
|
|
Term
|
Definition
LAN, WAN, VAN; internet, intranet, exranet; VPN |
|
|
Term
|
Definition
Safeguard assets; Promote efficiency of Operations; Measure compliance w/policies & procedures; Ensure accuracy & reliability of accting records (record all valid transaxns, timely updates, accurate $$ values, recorded in proper time period) |
|
|
Term
Risks in the computer environment? |
|
Definition
reliance on faulty systems; unauthorized access, unauthorized changes inmaster files, failures to make necessary updates, inappropriate manual interventions, loss of data |
|
|
Term
How does segregation of duties in computer env differ f/manual |
|
Definition
Duties that would be separated in manual system are often combined in computer BUT computer has controls that compensate |
|
|
Term
Paper vs electronic audit trails? |
|
Definition
Audit trails "disappear" w/electronic data BUT logs can be kept and when they are can be as effective as paper-based trails |
|
|
Term
types of errors more likely in manual vs in computer system? |
|
Definition
Manual --> more random clerical errors; computer -> more systemic errors in programming |
|
|
Term
Authorization in computer vs manual systems? |
|
Definition
Computer systems often have built in "automatic orders" which bypass authorization (eg orders for more inventory or supplies when they reach a certain level). Thus authoriz is missing; therefore automatized transaxns should be regularly reviewed and compared to standards to see if more frequent or $$$ than expected |
|
|
Term
Where are there more possibilities for fraud in computer systems? what mitigates against this? |
|
Definition
more opportunities for remote access to data. concentration of info means that breaches have wide-ranging consequences. Decreased human involvement means decr. opps for observation. There may be fraud or errors built into programs. On the other hand,there is more potential for increased management review and embedded audit modules to mitigate against the additional risks |
|
|
Term
Preventive, Detective, Corrective controls? |
|
Definition
Preventive "before the fact" (eg locks & passwords & seg of duties); tend to be passive--just put them into op. Detective "after the fact" and active, ongoing. Eg data entry edit checks, reconciliations, tests of transaxns. Note that the existence of detective checks can be a preventive check in itself if people know. Corrective checks are paired with detective checks and try to reversse the effects of observed errors, eg, maintaining backup files, disaster recovery plans & insurance (**note well that these are classified officially as CORRECTIVE, not preventive, b/c while you set them up in advance they are only used once something happens) |
|
|
Term
feedback vs feed-forward controls |
|
Definition
feedbck are detective, correct results. feedfwd are preventive--eg inventory systems that try to prevent shortfalls |
|
|
Term
application vs general controls |
|
Definition
general apply to all computerized functions to ensure data integrity (eg restricted access, backups, bkgd chks on personnel); application are special to programs, relate to data input, processing, output. eg checks on numeric values & formatting |
|
|
Term
three models used to evaulate internal controls |
|
Definition
|
|
Term
|
Definition
control environment, risk assessment, info & communications, monitoring, control activities (review f/AUD) |
|
|
Term
|
Definition
2004 update; changes 'control env' to "internal env" and adds 3 more objectives, all with the goal of aligning functions with corporate objectives. Three additions are Objective setting; Event identification (id events that might impact org's ability to meet its goals); Risk Response |
|
|
Term
Four types of objectives in COSO ERM? |
|
Definition
strategic, operational, reporting, compliance |
|
|
Term
Four business levels in COSO ERM? |
|
Definition
entity, division, subsidiary, business unit |
|
|
Term
|
Definition
control objectives for info & related technologyies. widely used internationally in IT security & control. |
|
|
Term
|
Definition
1. Domains & processes (34 basic IT processes divided into 4 domains: planning/org; acquisition/implementation; delivery/support; monitoring); 2. Info criteria (eg effective efficient reliable available confidential); IT resources (people, apps, technology, facilities, data) |
|
|
Term
*three main areas in IT depts?? |
|
Definition
Applications development; Systems administration & programming; Computer operations |
|
|
Term
what is the main control in IT depts? |
|
Definition
segregation of duties betweeen the 3 areas of applications dev, system admin, & computer ops must be strictly maintained |
|
|
Term
What type of controls are gen used in IT (preventive or detective, gen or app) |
|
Definition
|
|
Term
Who works in applications development & what does this dept do |
|
Definition
creates new enduser computer apps & maintains existing ones. Systems analysts design new systems; application programmers work under direxn of systems analyst to actually write the programs. |
|
|
Term
how are new applications tested |
|
Definition
in a test env using copies of live data & existing programs, NOT "live" |
|
|
Term
What does the systems admin & programming dept do? |
|
Definition
database administrator, netowrk administator, web administrator, are responsible for mgmt activites in these areas, esp for granting access; Systems programmers update the operating systems & hardware |
|
|
Term
What should Systems Administrators be prohibited from? Systems Programmers? |
|
Definition
Systems Admin should be prohibited from participating directly in operations of the systems they administer. Systems programmers (who update op sys/hw) should not have access to info about application programs or data files, nor should they control access to data programs or resources |
|
|
Term
What does the computer operations dept do? Main jobs in this dept? |
|
Definition
Responsible for day to day ops, eg scheduling batch jobs, running backups. Main jobs: data control (controls flow os docs into & out of ops, schedules batch jobs); data entry clerks key in data; computer operators run programs, file librarians maintain control over files & data that are not online |
|
|
Term
Seg of duties in computer ops? |
|
Definition
Computer operators should not program. Systems programers should not have access to application doc. Data amin should not have access to computer ops (live data). App programmers & systems analysts should not have access to live data nor should they control access to data or programs |
|
|
Term
What is "social engineering" f/the IT perspective? |
|
Definition
set of techniques used by attackers to fool employees into giving them access to resources |
|
|
Term
3 types of backup systems? |
|
Definition
grandfather-father-son (batch); checkpoint/restart (batch); rollback & recovery (*OLRT) |
|
|
Term
|
Definition
storage area network to replicate data f/multiple sites |
|
|
Term
|
Definition
exact copies; used for "load balancing" |
|
|
Term
Disaster recovery plans (DRPs) |
|
Definition
Cold site (room ready, know where equip will come from); warm site (room & equip ready); hot site (room, equip, & critical data ready) |
|
|
Term
what is a parity bit & why is it used? |
|
Definition
a 0 or 1 included in a byte to make sure that the 0s & 1s sum up to either an odd or an even number; used to make sure data is transmitted accurately |
|
|
Term
what is a read write after check? |
|
Definition
verifies that data was written correctly by reading what was written & cf to source |
|
|
Term
|
Definition
verifes that transmission is accurate by echoing back rec'd ino to source |
|
|
Term
|
Definition
check internal ops of hardware |
|
|
Term
|
Definition
when multiple users accessing machines/data prevents writing over/conflicts; this is a PREVENTIVE control |
|
|
Term
most hardware controls are ____ (prevent/detect/correct) |
|
Definition
|
|
Term
types of hardware controls? |
|
Definition
parity check, echo check, read write after check, diagnostic routine |
|
|
Term
user authentication vs user authorization? |
|
Definition
authentication verifies that this is the right user, authorization determines what this user can access |
|
|
Term
General types of contorls in computer systems? |
|
Definition
Hardware controls, logical access (authentication) controls; authorization controls |
|
|
Term
Bases for user authentication? |
|
Definition
Something user knows (PIN, pw), has (smart card, ID badge) or physical characteristic (fingerprint) |
|
|
Term
what is a security token? |
|
Definition
devices that either provide a one time password (used alongside regular on) or a smart card |
|
|
Term
what is in an authorization matrix |
|
Definition
rows = users, columns = resources |
|
|
Term
what is involved in a digital signature |
|
Definition
public/private key encryption, provides security in networked environment |
|
|
Term
4 levels of documentation for a system? |
|
Definition
Systems, program, operator, user |
|
|
Term
What is the simplest input check? |
|
Definition
|
|
Term
|
Definition
verifies that entered data is of approp type (alph/numeric, date, etc) |
|
|
Term
|
Definition
makes sure entered data does not exceed a specified value (range; sign) |
|
|
Term
|
Definition
just checks to make sure that a code entered is an existing code--does NOT ensure that the code is correct! |
|
|
Term
|
Definition
number created by applying an arithmetic algorithm to other digits in the number; verifies that an entered code is both valid & correct. One of the most reliable methods for ensuring that the correct code has been entered |
|
|
Term
reasonableness check (Logic test) |
|
Definition
makes sure that data in two or more fields is consistent--eg if pay rate is $3500 would not be consistent with pay period value of hourly |
|
|
Term
|
Definition
verifies that #s are in sequence, most commonly used for verifying completeness |
|
|
Term
|
Definition
rekeying of critical data in the transaction followed by a comparison of the two keyings (like entering your pw twice when you first create it) |
|
|
Term
|
Definition
after the code is entered the system displays additional info about the code; only for OLRT systems |
|
|
Term
batch control totals: types? |
|
Definition
calculated totals of various fields in a batch, used to ensure accuracy of data entry. Financial, Hash, Record counts. |
|
|
Term
|
Definition
forms & screens reduce likelihood of data entry errors |
|
|
Term
|
Definition
run to run controls; internal labels (headers & trailer records); audit trail controls |
|
|
Term
|
Definition
spooling (print queue) controls, disposal of aborted print jobs, distribution of reports, end user controls |
|
|