Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Accounting Information Systems Study Set 1
Quiz 8: Controlling Information Systems: Introduction to Pervasive Controls
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 121
Short Answer
______________________________ is a policy of requiring an employee to take leave from the job and substituting another employee in his or her place.
Question 122
Short Answer
In a(n) ______________________________ a Web site is overwhelmed by an intentional onslaught of thousands of simultaneous messages, making it impossible for the attacked site to engage in its normal activities.
Question 123
Short Answer
The ______________________________ documentation portion of application documentation provides an overall description of the application, including the system's purpose; an overview of system procedures; and sample source documents, outputs, and reports.
Question 124
Short Answer
A facility usually comprised of air-conditioned space with a raised floor, telephone connections, and computer ports, into which a subscriber can move equipment, is called a(n) ______________________________.
Question 125
Short Answer
With the data replication strategy known as ______________________________ all data changes are data stamped and saved to secondary systems as the changes are happening.
Question 126
Short Answer
A(n) ______________________________ is a technique to protect one network from another "untrusted" network.
Question 127
Short Answer
A(n) ______________________________ indemnifies a company in case it suffers losses from defalcations committed by its employees.
Question 128
Short Answer
Computer software that is used to facilitate the execution of a given business process is called ______________________________.
Question 129
Short Answer
The ______________________________ gives detailed instructions to computer operators and to data control about a particular application.
Question 130
Short Answer
______________________________ documentation provides a description of an application computer program and usually includes the program's purpose, program flowcharts, and source code listings.
Question 131
Short Answer
______________________________ controls restrict access to data, programs and documentation.
Question 132
Short Answer
The most common biometric devices read ______________________________.
Question 133
Short Answer
The ______________________________ describes user procedures for an application and assists the user in preparing inputs and using outputs.
Question 134
Short Answer
The ______________________________ covers the progression of information systems through the systems development process, from birth, through implementation, to ongoing use and modification.
Question 135
Short Answer
The disaster recovery strategy known as a(n) ______________________________ is a fully equipped data center that is made available on a standby basis to client companies for a monthly subscriber's fee.