Matching
Match the primary responsibilities below with the positions within an IT department .
Premises:
Flowcharts logic of computer programs, develops and documents programs, and debugs programs.
Manages security of IT systems, including hardware, security software and monitors access to programs and data, and follows-up on security breaches.
Exercises overall control, develops short and long range plans, and approves systems.
Designs content and organization of the database and controls access to and use of the database.
Evaluates existing systems, designs new systems, outlines the systems, and prepares specifications for programmers.
Acts as liaison with user departments and monitors input, processing, and output.
Maintains custody of systems documentation, programs, and files.
Operates the computer hardware and executes the program according to operating instructions.
Responses:
IT manager
Systems analyst
Programmer
Computer operator
Security administrator
Librarian
Data control group
Database administrator
Correct Answer:
Premises:
Responses:
Flowcharts logic of computer programs, develops and documents programs, and debugs programs.
Manages security of IT systems, including hardware, security software and monitors access to programs and data, and follows-up on security breaches.
Exercises overall control, develops short and long range plans, and approves systems.
Designs content and organization of the database and controls access to and use of the database.
Evaluates existing systems, designs new systems, outlines the systems, and prepares specifications for programmers.
Acts as liaison with user departments and monitors input, processing, and output.
Maintains custody of systems documentation, programs, and files.
Operates the computer hardware and executes the program according to operating instructions.
Premises:
Flowcharts logic of computer programs, develops and documents programs, and debugs programs.
Manages security of IT systems, including hardware, security software and monitors access to programs and data, and follows-up on security breaches.
Exercises overall control, develops short and long range plans, and approves systems.
Designs content and organization of the database and controls access to and use of the database.
Evaluates existing systems, designs new systems, outlines the systems, and prepares specifications for programmers.
Acts as liaison with user departments and monitors input, processing, and output.
Maintains custody of systems documentation, programs, and files.
Operates the computer hardware and executes the program according to operating instructions.
Responses:
Related Questions
Q56: Which one of the following is not
Q57: The use of a<b> transaction log</b> is
Q58: Input controls include controls over:<br>A) conversion of
Q59: The rekeying of all or a portion
Q60: Which of the following control program development,
Q62: In an audit of a small company,
Q63: Distinguish between systems programs and application programs,
Q64: Which one of the following is a
Q65: The risk of misstatement is associated with
Q66: A <b>before-and-after report</b> shows a summary of