Page 108 - Courses
P. 108
IT Essentials — Assessing Infrastructure and Networks
You mentioned spreadsheets as an example of application software. We consider spreadsheets as
end-user computing. Is application software always owned, managed, or developed by the
organization versus IT?
In most cases, application software is managed by IT and the development is performed by IT
programmers. IT works to reduce the amount of end-user computing within the organization.
Often, the business unit will develop or directly procure software because the organization’s IT
department is overlooked as a source capable of addressing these business needs. In other
instances, although IT is capable of addressing the needs, the request to do so could not be met
within the required timeframe.
Thank you for clarifying. Can we review information on storage and databases next?
I’m glad I could help. That is actually the next topic we are going to cover.
Storage and Databases
Storage (disk space) and databases are repositories of an organization’s business information. They
are frequently managed by specialized software that allow users on the network to access, and
where necessary, amend and append enterprise data and information.
Data Storage
There are three primary forms of data storage that are commonly used. The differences between
each can be described by the source and type of data.
Database — single source repository; can be structured or unstructured data. This is the most
common form of storage.
Data Warehouse — multiple sources of data stored in a single repository; structured data that is
easily retrievable for a defined purpose.
Data Lake — multiple sources of data stored in a single repository; unstructured and not easily
retrievable.
A database organizes data in a manner that allows for easy retrieval and updates. There are two
main types of databases:
Relational database characteristics:
Multiple datasets arranged in a table-based schema of rows and columns.
Clearly defined relationships among the tables.
Useful for managing large stores of transactional and related data.
Data security models allow users to see only what they are authorized to see.
Can be queried (analyzed) using Structured Query Language (SQL), and in tabular format, usually
using proprietary database software.
Copyright © 2020 by The Institute of Internal Auditors, Inc. All rights reserved.