Podcast
Questions and Answers
What is a collection of facts organized and processed in such a way that they have value beyond the individual facts themselves?
What is a collection of facts organized and processed in such a way that they have value beyond the individual facts themselves?
Information
What is the term for doing the objective correctly?
What is the term for doing the objective correctly?
Effectiveness
What is the term for information from the system that is used to make changes to input or processing activities?
What is the term for information from the system that is used to make changes to input or processing activities?
Feedback
What is a single set of hardware, software, databases, telecommunications, people, and procedures?
What is a single set of hardware, software, databases, telecommunications, people, and procedures?
Signup and view all the answers
What is an organized collection of facts and information, typically consisting of two or more related data files?
What is an organized collection of facts and information, typically consisting of two or more related data files?
Signup and view all the answers
Describe the role of a Business Analyst.
Describe the role of a Business Analyst.
Signup and view all the answers
What does a Game Developer contribute to?
What does a Game Developer contribute to?
Signup and view all the answers
Who creates and maintains database standards and policies?
Who creates and maintains database standards and policies?
Signup and view all the answers
Who identifies possible security threats and determines the best security measures?
Who identifies possible security threats and determines the best security measures?
Signup and view all the answers
Who is responsible for creating and maintaining the components of a website unseen by the user?
Who is responsible for creating and maintaining the components of a website unseen by the user?
Signup and view all the answers
What is the term for converting data into useful outputs?
What is the term for converting data into useful outputs?
Signup and view all the answers
What is the term for awareness and understanding of a set of information?
What is the term for awareness and understanding of a set of information?
Signup and view all the answers
What is the term for a single set of hardware, software, databases, telecommunications, people, and procedures?
What is the term for a single set of hardware, software, databases, telecommunications, people, and procedures?
Signup and view all the answers
What is information from the system that is used to make changes to input or processing activities?
What is information from the system that is used to make changes to input or processing activities?
Signup and view all the answers
What are raw facts called?
What are raw facts called?
Signup and view all the answers
What is the term for fundamental rethinking and radical redesign of business processes to achieve improvements in cost, quality, speed and service?
What is the term for fundamental rethinking and radical redesign of business processes to achieve improvements in cost, quality, speed and service?
Signup and view all the answers
What is using resources optimally where resources could be memory, CPU, time and databases?
What is using resources optimally where resources could be memory, CPU, time and databases?
Signup and view all the answers
What is a computer network that is covers an area larger than LAN but smaller than WAN?
What is a computer network that is covers an area larger than LAN but smaller than WAN?
Signup and view all the answers
What is information delivered when it is needed called?
What is information delivered when it is needed called?
Signup and view all the answers
What does a computer system use to collect, manipulate, store, and process data into information?
What does a computer system use to collect, manipulate, store, and process data into information?
Signup and view all the answers
Doing the objective correctly is known as?
Doing the objective correctly is known as?
Signup and view all the answers
What is an example of a WAN network?
What is an example of a WAN network?
Signup and view all the answers
What are some approaches to evaluate the effectiveness of a computer system?
What are some approaches to evaluate the effectiveness of a computer system?
Signup and view all the answers
What houses the CPU and memory of a computer?
What houses the CPU and memory of a computer?
Signup and view all the answers
What is temporary and volatile memory known as?
What is temporary and volatile memory known as?
Signup and view all the answers
What is a single processor that executes program instructions in a step-by-step manner?
What is a single processor that executes program instructions in a step-by-step manner?
Signup and view all the answers
What is the execution of two or more instructions simultaneously?
What is the execution of two or more instructions simultaneously?
Signup and view all the answers
What is a copy of programs, data, and information created in one secondary storage medium duplicated to another?
What is a copy of programs, data, and information created in one secondary storage medium duplicated to another?
Signup and view all the answers
What is the central part of the OS with complete control over everything in the system?
What is the central part of the OS with complete control over everything in the system?
Signup and view all the answers
What are software programs essential to effective management of the computer system such as backup files and antivirus protection?
What are software programs essential to effective management of the computer system such as backup files and antivirus protection?
Signup and view all the answers
What permits more than one application to run at the same time?
What permits more than one application to run at the same time?
Signup and view all the answers
What is the ability to handle an increasing number of concurrent users smoothly?
What is the ability to handle an increasing number of concurrent users smoothly?
Signup and view all the answers
What controls how memory is accessed and maximizes the available memory and storage?
What controls how memory is accessed and maximizes the available memory and storage?
Signup and view all the answers
What are monitors, printers, speakers, and plotters known as?
What are monitors, printers, speakers, and plotters known as?
Signup and view all the answers
What are Point-of-sale (POS) and Automatic teller machine (ATM) devices known as?
What are Point-of-sale (POS) and Automatic teller machine (ATM) devices known as?
Signup and view all the answers
What type of memory is RAM?
What type of memory is RAM?
Signup and view all the answers
What is the simultaneous execution of two or more instructions?
What is the simultaneous execution of two or more instructions?
Signup and view all the answers
What is the process where records can be retrieved in any order?
What is the process where records can be retrieved in any order?
Signup and view all the answers
What coordinates the activities of hardware and programs?
What coordinates the activities of hardware and programs?
Signup and view all the answers
What uses icons and menus to send commands to the computer system?
What uses icons and menus to send commands to the computer system?
Signup and view all the answers
What is the SDLC phase where the problem should be defined and causes as well?
What is the SDLC phase where the problem should be defined and causes as well?
Signup and view all the answers
What involves testing the functioning of the system as a whole?
What involves testing the functioning of the system as a whole?
Signup and view all the answers
What is the process of running old and new systems simultaneously until users and project coordinators are satisfied that the new system is functional?
What is the process of running old and new systems simultaneously until users and project coordinators are satisfied that the new system is functional?
Signup and view all the answers
What is the term when a tester has no knowledge of the code and focuses on the system's functionality?
What is the term when a tester has no knowledge of the code and focuses on the system's functionality?
Signup and view all the answers
What involves translating system specifications from the design stage into software program code?
What involves translating system specifications from the design stage into software program code?
Signup and view all the answers
Which methodology focuses on streamlining the SDLC by eliminating much of the modeling and documentation overhead?
Which methodology focuses on streamlining the SDLC by eliminating much of the modeling and documentation overhead?
Signup and view all the answers
Which methodology eliminates staffing and personnel problems?
Which methodology eliminates staffing and personnel problems?
Signup and view all the answers
What is a mock-up or model that includes output and input specifications and formats, often referred to as a user interface?
What is a mock-up or model that includes output and input specifications and formats, often referred to as a user interface?
Signup and view all the answers
What is a software development methodology that focuses on building applications in a very short time through iterative prototyping development by automating revisions and changes?
What is a software development methodology that focuses on building applications in a very short time through iterative prototyping development by automating revisions and changes?
Signup and view all the answers
What is a mock-up or model that includes output and input specifications and formats?
What is a mock-up or model that includes output and input specifications and formats?
Signup and view all the answers
What is the term for a structured and standardized process for all activities of any system development effort?
What is the term for a structured and standardized process for all activities of any system development effort?
Signup and view all the answers
What describes system specifications that will deliver functions identified during systems analysis?
What describes system specifications that will deliver functions identified during systems analysis?
Signup and view all the answers
What methodology focuses on streamlining the SDLC by eliminating much of the modeling and documentation overhead and time spent on these tasks, such as scrum?
What methodology focuses on streamlining the SDLC by eliminating much of the modeling and documentation overhead and time spent on these tasks, such as scrum?
Signup and view all the answers
Which methodology eliminates staffing and personnel fluctuation problems?
Which methodology eliminates staffing and personnel fluctuation problems?
Signup and view all the answers
What involves a general design for the entire system is performed, and then the project is divided into a series of distinct subprojects?
What involves a general design for the entire system is performed, and then the project is divided into a series of distinct subprojects?
Signup and view all the answers
What might be the only viable conversion solution in situations where activating the new system is an emergency or when the two systems cannot coexist under any conditions?
What might be the only viable conversion solution in situations where activating the new system is an emergency or when the two systems cannot coexist under any conditions?
Signup and view all the answers
What is the phase during which a feasibility study is done?
What is the phase during which a feasibility study is done?
Signup and view all the answers
What is the phase that includes post-implementation audit documents?
What is the phase that includes post-implementation audit documents?
Signup and view all the answers
What is the process of changing from an old system to a new system?
What is the process of changing from an old system to a new system?
Signup and view all the answers
What is the methodology that focuses on building applications in a very short time through iterative prototyping development?
What is the methodology that focuses on building applications in a very short time through iterative prototyping development?
Signup and view all the answers
What is the methodology in which the team proceeds sequentially from one phase to the next?
What is the methodology in which the team proceeds sequentially from one phase to the next?
Signup and view all the answers
During which phase is gathering data about the existing system and defining the problem done?
During which phase is gathering data about the existing system and defining the problem done?
Signup and view all the answers
What does system design include?
What does system design include?
Signup and view all the answers
What happens concurrently in an agile development approach?
What happens concurrently in an agile development approach?
Signup and view all the answers
What are tools to automate SW development and reduce repetitive work?
What are tools to automate SW development and reduce repetitive work?
Signup and view all the answers
Which conversion method involves the highest cost, as end users must perform all daily functions with both systems?
Which conversion method involves the highest cost, as end users must perform all daily functions with both systems?
Signup and view all the answers
What is a smaller version of a system with a minimal number of features called?
What is a smaller version of a system with a minimal number of features called?
Signup and view all the answers
What are legitimate-looking emails that lead users to fake web sites to get recipient to reveal personal data?
What are legitimate-looking emails that lead users to fake web sites to get recipient to reveal personal data?
Signup and view all the answers
What are the computers taken over in DDoS attacks?
What are the computers taken over in DDoS attacks?
Signup and view all the answers
What is a form of hacking with clear criminal activity to steal data and corrupt systems?
What is a form of hacking with clear criminal activity to steal data and corrupt systems?
Signup and view all the answers
What is low-cost commercial advertising for questionable products?
What is low-cost commercial advertising for questionable products?
Signup and view all the answers
Where do worms reside and how do they replicate?
Where do worms reside and how do they replicate?
Signup and view all the answers
How do viruses spread?
How do viruses spread?
Signup and view all the answers
What are Trojan programs and how to they infect systems?
What are Trojan programs and how to they infect systems?
Signup and view all the answers
What is the term for a specialist in charge of the databases of an organization?
What is the term for a specialist in charge of the databases of an organization?
Signup and view all the answers
What is a list of all the tables in the database, along with all the fields with primary and foreign keys identified?
What is a list of all the tables in the database, along with all the fields with primary and foreign keys identified?
Signup and view all the answers
What is a field that is defined to be unique for each entity?
What is a field that is defined to be unique for each entity?
Signup and view all the answers
What is the main software package that supports a database management approach?
What is the main software package that supports a database management approach?
Signup and view all the answers
What is a database that collects business information from many sources in the enterprise, covering all aspects of the company's processes, products, and customers?
What is a database that collects business information from many sources in the enterprise, covering all aspects of the company's processes, products, and customers?
Signup and view all the answers
What is a group of programs used as an interface between a database and application programs or a database and the user?
What is a group of programs used as an interface between a database and application programs or a database and the user?
Signup and view all the answers
What are tools used to analyze data to reveal hidden patterns and trends in historical business activity?
What are tools used to analyze data to reveal hidden patterns and trends in historical business activity?
Signup and view all the answers
What specifies the structure of database content, used to create tables and define characteristics of fields?
What specifies the structure of database content, used to create tables and define characteristics of fields?
Signup and view all the answers
What is used to insert, update, delete, and retrieve data from a database?
What is used to insert, update, delete, and retrieve data from a database?
Signup and view all the answers
How does a relational database organize data?
How does a relational database organize data?
Signup and view all the answers
What problems can occur if files are maintained separately by different departments?
What problems can occur if files are maintained separately by different departments?
Signup and view all the answers
What is the purpose of data mining?
What is the purpose of data mining?
Signup and view all the answers
What is a relational database?
What is a relational database?
Signup and view all the answers
Study Notes
In-Class Revision "Sample Questions"
- Information: Collection of facts organized and processed, having value beyond individual facts.
- Effectiveness: Doing the objective correctly.
- Feedback: Information from a system used to modify input or processing activities.
- CBIS: Single set of hardware, software, databases, telecommunications, people, and procedures.
- Database: Organized collection of facts and information (typically multiple related data files).
- Business Analyst: Defines and prioritizes requirements, gathers feedback, and approves.
- Game Developer: Contributes to audio and animation design.
- Database Administrator: Creates and maintains database standards and policies.
- Cybersecurity Consultant: Identifies security threats and determines best security measures.
- Back-end Developer: Creates and maintains unseen website components.
- Processing: Converting data into useful outputs.
- Knowledge: Awareness and understanding of a set of information.
Lecture #1 & #2
- Data: Raw facts.
- Business Process Reengineering (BPR): Fundamental rethinking and redesign of business processes to improve cost, quality, speed, and service.
- Efficiency: Optimal use of resources (memory, CPU, time, databases).
- MAN (Metropolitan Area Network): Computer network larger than LAN but smaller than WAN.
- Timely Information: Information delivered when needed.
- CBIS: Single set of hardware, software, databases, telecommunications, people, and procedures configured to collect, manipulate, store, and process data into information.
- Effectiveness: Doing the objective correctly.
- WAN (Wide Area Network): Network example, such as the internet.
- Productivity, ROI, and Market Share: Approaches to evaluate IS success.
Lecture #3
- System Unit: Houses CPU and memory.
- RAM (Random Access Memory): Temporary and volatile memory.
- Traditional/Serial Processor: Single processor executes program instructions step-by-step.
- Multiprocessing: Simultaneous execution of two or more instructions.
- Backup: Copy of programs, data, and information duplicated to another secondary storage medium.
- Kernel: Central part of OS with complete control
- System Utilities: Software programs for effective computer system management (backup, antivirus).
- Multitasking OS: Allows multiple applications to run simultaneously.
- Scalability: Ability to handle increasing concurrent users smoothly.
- Memory Management: Controls how memory is accessed and maximizes available memory/storage.
- Output Devices: Monitors, printers, speakers, plotters.
- Input Devices: Point-of-sale (POS) and Automatic Teller Machine (ATM) devices.
- RAM: Temporary and volatile memory.
- Multiprocessing: Simultaneous execution of two or more instructions.
- Direct Access: Records retrieved in any order
- Operating System: Coordinates hardware and program activities
- ROM (Read-Only Memory): Nonvolatile memory.
- GUI (Graphical User Interface): Uses icons and menus to send commands to the computer.
Lecture #4
- System Analysis: SDLC phase where the problem is defined and causes are identified.
- System Testing: Test of overall system's functionality.
- Parallel Conversion: Old and new systems run simultaneously until users are satisfied.
- Black Box Testing: Tester has no knowledge of code.
- Implementation/Programming: System specifications translated into software code.
- Agile: Streamlining the SDLC by reducing modeling and documentation overhead.
- Outsourcing: Eliminates staffing and personnel problems.
- Non-operational Prototype (UI): Mock-up or model with input/output specifications and formats
- Rapid Application Development (RAD): Short-time software development through iterative prototyping.
- SDLC (System Development Life Cycle): Structured and standardized process for system development effort.
- SRS (System Requirements Specifications): Describes system specifications for functions.
Lecture #5
- Phishing: Legitimate-looking emails lead users to fake websites.
- Zombies: Computers taken over in DDoS attacks.
- Crackers: Hacking with clear criminal activity to steal or corrupt data.
- Spam: Low-cost commercial advertising for questionable products.
- Direct Conversion: Conversion method used when activating a new system is an emergency or systems cannot co-exist.
- System Analysis: Phase involving feasibility study.
- System Maintenance: Includes post-implementation audit documents.
- System Conversion: Changing from old system to new system.
- RAD (Rapid Application Development): Iterative prototyping-focused methodology.
- Waterfall Methodology: Sequential approach, with each phase completed before moving to the next.
- System Analysis: Determining feasibility of project and setting problem definition.
- System Design: Program, database, architectural designs.
- Agile: Concurrently performing analysis, design, and implementation.
- CASE Tools: Automating SW development, reducing repetitive work.
- Parallel Conversion: High cost due to users needing to use both systems.
- Operational Prototype: Smaller system with minimal features.
Lecture #6
- Database Administrator (DBA): Specialist responsible for organization's databases
- Database Schema: List of tables, fields with primary and foreign keys.
- Primary Key: Uniquely identifies each entity.
- DBMS (Database Management System): Main software package for database management.
- Data Warehouse: Business information collection from various sources, covering a company's processes, products, and customers.
- DBMS (Database Management System): Acts as an interface between database and applications or users.
- Worms: Reside in active memory, duplicate themselves.
- Viruses: Attached to files that execute when opened
- Trojan: Malicious code hidden in harmless programs.
Lecture #7
- Data Mining: Tools analyze data to reveal trends and patterns in historical business activity.
- Data Definition Language (DDL): Specifies database structure, used to create tables, define characteristics of fields.
- Data Manipulation Language (DML): Used for inserting, updating, deleting, and retrieving data from databases.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your understanding of essential IT concepts such as information, feedback, and roles within a business context. This quiz reviews key terms and definitions that are crucial for IT professionals, particularly in database management and cybersecurity. Prepare effectively by assessing your knowledge through these sample questions.