In-Class Revision Sample Questions

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a collection of facts organized and processed in such a way that they have value beyond the individual facts themselves?

Information

What is the term for doing the objective correctly?

Effectiveness

What is the term for information from the system that is used to make changes to input or processing activities?

Feedback

What is a single set of hardware, software, databases, telecommunications, people, and procedures?

<p>CBIS</p> Signup and view all the answers

What is an organized collection of facts and information, typically consisting of two or more related data files?

<p>Database</p> Signup and view all the answers

Describe the role of a Business Analyst.

<p>A Business Analyst defines requirements, prioritizes them, gets feedback and approval, and ensures that the requirements are met.</p> Signup and view all the answers

What does a Game Developer contribute to?

<p>Audio and animation design.</p> Signup and view all the answers

Who creates and maintains database standards and policies?

<p>Database Administrator</p> Signup and view all the answers

Who identifies possible security threats and determines the best security measures?

<p>Cybersecurity consultant</p> Signup and view all the answers

Who is responsible for creating and maintaining the components of a website unseen by the user?

<p>Back-end developer</p> Signup and view all the answers

What is the term for converting data into useful outputs?

<p>Processing</p> Signup and view all the answers

What is the term for awareness and understanding of a set of information?

<p>Knowledge</p> Signup and view all the answers

What is the term for a single set of hardware, software, databases, telecommunications, people, and procedures?

<p>CBIS</p> Signup and view all the answers

What is information from the system that is used to make changes to input or processing activities?

<p>Feedback</p> Signup and view all the answers

What are raw facts called?

<p>Data</p> Signup and view all the answers

What is the term for fundamental rethinking and radical redesign of business processes to achieve improvements in cost, quality, speed and service?

<p>Business Process Reengineering or BPR</p> Signup and view all the answers

What is using resources optimally where resources could be memory, CPU, time and databases?

<p>Efficiency</p> Signup and view all the answers

What is a computer network that is covers an area larger than LAN but smaller than WAN?

<p>MAN</p> Signup and view all the answers

What is information delivered when it is needed called?

<p>Timely Information</p> Signup and view all the answers

What does a computer system use to collect, manipulate, store, and process data into information?

<p>CBIS</p> Signup and view all the answers

Doing the objective correctly is known as?

<p>Effectiveness</p> Signup and view all the answers

What is an example of a WAN network?

<p>Internet</p> Signup and view all the answers

What are some approaches to evaluate the effectiveness of a computer system?

<p>Productivity, return on investment, and market share.</p> Signup and view all the answers

What houses the CPU and memory of a computer?

<p>System Unit</p> Signup and view all the answers

What is temporary and volatile memory known as?

<p>RAM</p> Signup and view all the answers

What is a single processor that executes program instructions in a step-by-step manner?

<p>Traditional/Serial Processor</p> Signup and view all the answers

What is the execution of two or more instructions simultaneously?

<p>Multiprocessing</p> Signup and view all the answers

What is a copy of programs, data, and information created in one secondary storage medium duplicated to another?

<p>Backup</p> Signup and view all the answers

What is the central part of the OS with complete control over everything in the system?

<p>Kernel</p> Signup and view all the answers

What are software programs essential to effective management of the computer system such as backup files and antivirus protection?

<p>System Utilities</p> Signup and view all the answers

What permits more than one application to run at the same time?

<p>Multitasking OS</p> Signup and view all the answers

What is the ability to handle an increasing number of concurrent users smoothly?

<p>Scalability</p> Signup and view all the answers

What controls how memory is accessed and maximizes the available memory and storage?

<p>Memory Management</p> Signup and view all the answers

What are monitors, printers, speakers, and plotters known as?

<p>Output Devices</p> Signup and view all the answers

What are Point-of-sale (POS) and Automatic teller machine (ATM) devices known as?

<p>Input Devices</p> Signup and view all the answers

What type of memory is RAM?

<p>Temporary and Volatile</p> Signup and view all the answers

What is the simultaneous execution of two or more instructions?

<p>Multiprocessing</p> Signup and view all the answers

What is the process where records can be retrieved in any order?

<p>Direct Access</p> Signup and view all the answers

What coordinates the activities of hardware and programs?

<p>Operating System</p> Signup and view all the answers

What uses icons and menus to send commands to the computer system?

<p>Graphical User Interface</p> Signup and view all the answers

What is the SDLC phase where the problem should be defined and causes as well?

<p>System Analysis</p> Signup and view all the answers

What involves testing the functioning of the system as a whole?

<p>System Testing</p> Signup and view all the answers

What is the process of running old and new systems simultaneously until users and project coordinators are satisfied that the new system is functional?

<p>Parallel Conversion</p> Signup and view all the answers

What is the term when a tester has no knowledge of the code and focuses on the system's functionality?

<p>Black Box Testing</p> Signup and view all the answers

What involves translating system specifications from the design stage into software program code?

<p>Implementation/Programming</p> Signup and view all the answers

Which methodology focuses on streamlining the SDLC by eliminating much of the modeling and documentation overhead?

<p>Agile</p> Signup and view all the answers

Which methodology eliminates staffing and personnel problems?

<p>Outsourcing</p> Signup and view all the answers

What is a mock-up or model that includes output and input specifications and formats, often referred to as a user interface?

<p>Non-operational Prototype</p> Signup and view all the answers

What is a software development methodology that focuses on building applications in a very short time through iterative prototyping development by automating revisions and changes?

<p>RAD/Rapid Application Development</p> Signup and view all the answers

What is a mock-up or model that includes output and input specifications and formats?

<p>Non-operational Prototype</p> Signup and view all the answers

What is the term for a structured and standardized process for all activities of any system development effort?

<p>System Development Life Cycle (A), SDLC (B)</p> Signup and view all the answers

What describes system specifications that will deliver functions identified during systems analysis?

<p>SRS/System Requirements Specifications</p> Signup and view all the answers

What methodology focuses on streamlining the SDLC by eliminating much of the modeling and documentation overhead and time spent on these tasks, such as scrum?

<p>Agile</p> Signup and view all the answers

Which methodology eliminates staffing and personnel fluctuation problems?

<p>Outsourcing</p> Signup and view all the answers

What involves a general design for the entire system is performed, and then the project is divided into a series of distinct subprojects?

<p>Parallel Methodology</p> Signup and view all the answers

What might be the only viable conversion solution in situations where activating the new system is an emergency or when the two systems cannot coexist under any conditions?

<p>Direct Conversion</p> Signup and view all the answers

What is the phase during which a feasibility study is done?

<p>System Analysis</p> Signup and view all the answers

What is the phase that includes post-implementation audit documents?

<p>System Maintenance</p> Signup and view all the answers

What is the process of changing from an old system to a new system?

<p>System Conversion</p> Signup and view all the answers

What is the methodology that focuses on building applications in a very short time through iterative prototyping development?

<p>RAD/Rapid Application Development</p> Signup and view all the answers

What is the methodology in which the team proceeds sequentially from one phase to the next?

<p>Waterfall Methodology</p> Signup and view all the answers

During which phase is gathering data about the existing system and defining the problem done?

<p>System Analysis</p> Signup and view all the answers

What does system design include?

<p>Design of program, databases, and architecture</p> Signup and view all the answers

What happens concurrently in an agile development approach?

<p>Analysis, Design, and Implementation phases</p> Signup and view all the answers

What are tools to automate SW development and reduce repetitive work?

<p>CASE</p> Signup and view all the answers

Which conversion method involves the highest cost, as end users must perform all daily functions with both systems?

<p>Parallel Conversion</p> Signup and view all the answers

What is a smaller version of a system with a minimal number of features called?

<p>Operational Prototype</p> Signup and view all the answers

What are legitimate-looking emails that lead users to fake web sites to get recipient to reveal personal data?

<p>Phishing</p> Signup and view all the answers

What are the computers taken over in DDoS attacks?

<p>Zombies</p> Signup and view all the answers

What is a form of hacking with clear criminal activity to steal data and corrupt systems?

<p>Crackers</p> Signup and view all the answers

What is low-cost commercial advertising for questionable products?

<p>Spam</p> Signup and view all the answers

Where do worms reside and how do they replicate?

<p>Worms reside in the active memory of a computer and duplicate themselves.</p> Signup and view all the answers

How do viruses spread?

<p>Viruses are attached to files, so when the infected file is opened, they execute.</p> Signup and view all the answers

What are Trojan programs and how to they infect systems?

<p>Trojan programs are malicious code hidden inside seemingly harmless programs; users are tricked into installing them.</p> Signup and view all the answers

What is the term for a specialist in charge of the databases of an organization?

<p>Database Administrator or DBA</p> Signup and view all the answers

What is a list of all the tables in the database, along with all the fields with primary and foreign keys identified?

<p>Database Schema</p> Signup and view all the answers

What is a field that is defined to be unique for each entity?

<p>Primary Key</p> Signup and view all the answers

What is the main software package that supports a database management approach?

<p>DBMS</p> Signup and view all the answers

What is a database that collects business information from many sources in the enterprise, covering all aspects of the company's processes, products, and customers?

<p>Data Warehouse</p> Signup and view all the answers

What is a group of programs used as an interface between a database and application programs or a database and the user?

<p>DBMS</p> Signup and view all the answers

What are tools used to analyze data to reveal hidden patterns and trends in historical business activity?

<p>Data Mining</p> Signup and view all the answers

What specifies the structure of database content, used to create tables and define characteristics of fields?

<p>Data Definition Language or DDL</p> Signup and view all the answers

What is used to insert, update, delete, and retrieve data from a database?

<p>Data Manipulation Language or DML</p> Signup and view all the answers

How does a relational database organize data?

<p>In the form of related tables.</p> Signup and view all the answers

What problems can occur if files are maintained separately by different departments?

<p>Data redundancy, data inconsistency, and data inflexibility.</p> Signup and view all the answers

What is the purpose of data mining?

<p>To analyze data in a data warehouse to reveal hidden patterns and trends in historical business activity.</p> Signup and view all the answers

What is a relational database?

<p>A series of related tables stored together with a minimum of duplication.</p> Signup and view all the answers

Flashcards

What is information?

Information is data with meaning and context, organized and processed to provide value beyond individual facts.

What does 'effectiveness' mean?

Effectiveness means achieving a goal or objective, focusing on the desired outcome.

What is feedback in a system?

Feedback is information used to adjust processes or inputs based on the outcome of a previous activity. It's like a steering wheel for a system.

What is a CBIS?

A CBIS (Computer-Based Information System) is a complete system integrating hardware, software, databases, telecommunications, people, and procedures to handle information.

Signup and view all the flashcards

What is a database?

A database is a structured collection of information, often consisting of related tables, designed for efficient storage and retrieval.

Signup and view all the flashcards

What is the role of a Business Analyst?

A Business Analyst plays a critical role in understanding business needs, defining system requirements, prioritizing features, and ensuring the system meets those needs.

Signup and view all the flashcards

What is a Game Developer's role?

A Game Developer creates and integrates audio and animation into video games to enhance the player experience.

Signup and view all the flashcards

Who manages the database?

A Database Administrator (DBA) is responsible for the design, implementation, maintenance, and security of database systems, ensuring data integrity and accessibility.

Signup and view all the flashcards

Who protects against cyber threats?

A Cybersecurity Consultant identifies potential security risks, analyzes vulnerabilities, and recommends solutions to protect systems and data from cyber threats.

Signup and view all the flashcards

What does a Back-end Developer do?

A Back-end Developer creates and maintains the behind-the-scenes elements of a website, handling data logic, functionality, and communication with servers.

Signup and view all the flashcards

What is processing?

Processing converts raw data into meaningful information by applying rules and calculations.

Signup and view all the flashcards

What is knowledge?

Knowledge is a higher level of understanding than information, incorporating awareness, experience, and interpretation.

Signup and view all the flashcards

What is Business Process Reengineering (BPR)?

BPR (Business Process Reengineering) involves a fundamental and radical redesign of business processes to significantly improve efficiency, cost, quality, or service.

Signup and view all the flashcards

What is efficiency?

Efficiency focuses on optimizing the use of resources, such as memory, CPU, time, or databases, to maximize output with minimal waste.

Signup and view all the flashcards

What is a MAN?

A MAN (Metropolitan Area Network) is a computer network covering a geographical area larger than a LAN but smaller than a WAN, usually within a city or urban area.

Signup and view all the flashcards

What is timely information?

Timely information is delivered when it is needed to make effective decisions.

Signup and view all the flashcards

What is the System Unit?

A System Unit is the main housing for a computer, containing the CPU and central memory.

Signup and view all the flashcards

What is RAM?

RAM (Random Access Memory) is a temporary and volatile memory type used by the computer to access and process data actively.

Signup and view all the flashcards

How do traditional processors work?

A Traditional/Serial Processor executes instructions one at a time, processing them sequentially.

Signup and view all the flashcards

What is Multiprocessing?

Multiprocessing allows a processor to execute multiple instructions at the same time, improving performance.

Signup and view all the flashcards

What is a Backup?

A Backup is a copy of programs, data, and information created on one storage medium and duplicated to another, providing a safety net in case of data loss.

Signup and view all the flashcards

What is the Kernel?

The Kernel is the core of the Operating System (OS), responsible for managing all the system's resources and operations.

Signup and view all the flashcards

What are System Utilities?

System Utilities are software programs designed to manage and optimize computer systems, such as backup tools, antivirus software, and disk cleaners.

Signup and view all the flashcards

What does a Multitasking OS do?

A Multitasking Operating System (OS) allows multiple applications to run concurrently, providing the illusion of simultaneous execution.

Signup and view all the flashcards

What is Scalability?

Scalability refers to the ability of a system to handle increasing workloads and user demand smoothly without compromising performance.

Signup and view all the flashcards

What is Memory Management?

Memory Management is a function of the OS responsible for controlling memory access and allocation, ensuring efficient use of memory and storage.

Signup and view all the flashcards

What is System Analysis?

System Analysis is a phase in the SDLC where the problem is thoroughly defined, including its causes and potential solutions.

Signup and view all the flashcards

What is System Testing?

System Testing is a phase in the SDLC where the entire system is tested as a whole to ensure it functions according to specifications.

Signup and view all the flashcards

What is Parallel Conversion?

Parallel Conversion involves running the old and new systems simultaneously, allowing for a gradual transition and ensuring smooth operations.

Signup and view all the flashcards

What is Black Box Testing?

Black Box Testing is a software testing method where the tester has no knowledge of the program's internal code, focusing purely on the system's inputs and outputs.

Signup and view all the flashcards

What is Implementation/Programming?

Implementation/Programming is the phase in the SDLC where system specifications are translated into actual program code, bringing the system to life.

Signup and view all the flashcards

What is Agile?

Agile methodologies streamline the SDLC by prioritizing iterative development, frequent feedback, and flexible adaptation to changes.

Signup and view all the flashcards

What is Outsourcing?

Outsourcing involves hiring an external company or team to handle specific tasks or functions, eliminating staffing issues and offering specialized expertise.

Signup and view all the flashcards

What is a Non-operational Prototype?

A Non-operational Prototype is a model or mock-up of a system, focusing on user interface (UI) design, input and output formats, and user experience.

Signup and view all the flashcards

What is RAD?

RAD (Rapid Application Development) is a software development methodology emphasizing quick iterative prototyping, automation, and continuous feedback to build applications in a short timeframe.

Signup and view all the flashcards

What is the SDLC?

SDLC (System Development Life Cycle) is a structured and standardized framework for all activities involved in developing a system, from planning to maintenance.

Signup and view all the flashcards

What is an SRS?

SRS (System Requirements Specifications) is a document outlining the detailed functional and non-functional requirements of a system, serving as a blueprint for design and implementation.

Signup and view all the flashcards

What is Parallel Methodology?

Parallel Methodology breaks a large project into smaller subprojects, allowing for simultaneous development and independent progress.

Signup and view all the flashcards

What is Direct Conversion?

Direct Conversion involves immediately replacing the old system with the new system, eliminating the old system immediately.

Signup and view all the flashcards

What is System Conversion?

System Conversion refers to the process of transitioning from an old system to a new system, involving various methods and strategies.

Signup and view all the flashcards

What is Waterfall Methodology?

Waterfall Methodology follows a sequential approach to system development, moving from one phase to the next without overlapping.

Signup and view all the flashcards

Study Notes

In-Class Revision "Sample Questions"

  • Information: Collection of facts organized and processed, having value beyond individual facts.
  • Effectiveness: Doing the objective correctly.
  • Feedback: Information from a system used to modify input or processing activities.
  • CBIS: Single set of hardware, software, databases, telecommunications, people, and procedures.
  • Database: Organized collection of facts and information (typically multiple related data files).
  • Business Analyst: Defines and prioritizes requirements, gathers feedback, and approves.
  • Game Developer: Contributes to audio and animation design.
  • Database Administrator: Creates and maintains database standards and policies.
  • Cybersecurity Consultant: Identifies security threats and determines best security measures.
  • Back-end Developer: Creates and maintains unseen website components.
  • Processing: Converting data into useful outputs.
  • Knowledge: Awareness and understanding of a set of information.

Lecture #1 & #2

  • Data: Raw facts.
  • Business Process Reengineering (BPR): Fundamental rethinking and redesign of business processes to improve cost, quality, speed, and service.
  • Efficiency: Optimal use of resources (memory, CPU, time, databases).
  • MAN (Metropolitan Area Network): Computer network larger than LAN but smaller than WAN.
  • Timely Information: Information delivered when needed.
  • CBIS: Single set of hardware, software, databases, telecommunications, people, and procedures configured to collect, manipulate, store, and process data into information.
  • Effectiveness: Doing the objective correctly.
  • WAN (Wide Area Network): Network example, such as the internet.
  • Productivity, ROI, and Market Share: Approaches to evaluate IS success.

Lecture #3

  • System Unit: Houses CPU and memory.
  • RAM (Random Access Memory): Temporary and volatile memory.
  • Traditional/Serial Processor: Single processor executes program instructions step-by-step.
  • Multiprocessing: Simultaneous execution of two or more instructions.
  • Backup: Copy of programs, data, and information duplicated to another secondary storage medium.
  • Kernel: Central part of OS with complete control
  • System Utilities: Software programs for effective computer system management (backup, antivirus).
  • Multitasking OS: Allows multiple applications to run simultaneously.
  • Scalability: Ability to handle increasing concurrent users smoothly.
  • Memory Management: Controls how memory is accessed and maximizes available memory/storage.
  • Output Devices: Monitors, printers, speakers, plotters.
  • Input Devices: Point-of-sale (POS) and Automatic Teller Machine (ATM) devices.
  • RAM: Temporary and volatile memory.
  • Multiprocessing: Simultaneous execution of two or more instructions.
  • Direct Access: Records retrieved in any order
  • Operating System: Coordinates hardware and program activities
  • ROM (Read-Only Memory): Nonvolatile memory.
  • GUI (Graphical User Interface): Uses icons and menus to send commands to the computer.

Lecture #4

  • System Analysis: SDLC phase where the problem is defined and causes are identified.
  • System Testing: Test of overall system's functionality.
  • Parallel Conversion: Old and new systems run simultaneously until users are satisfied.
  • Black Box Testing: Tester has no knowledge of code.
  • Implementation/Programming: System specifications translated into software code.
  • Agile: Streamlining the SDLC by reducing modeling and documentation overhead.
  • Outsourcing: Eliminates staffing and personnel problems.
  • Non-operational Prototype (UI): Mock-up or model with input/output specifications and formats
  • Rapid Application Development (RAD): Short-time software development through iterative prototyping.
  • SDLC (System Development Life Cycle): Structured and standardized process for system development effort.
  • SRS (System Requirements Specifications): Describes system specifications for functions.

Lecture #5

  • Phishing: Legitimate-looking emails lead users to fake websites.
  • Zombies: Computers taken over in DDoS attacks.
  • Crackers: Hacking with clear criminal activity to steal or corrupt data.
  • Spam: Low-cost commercial advertising for questionable products.
  • Direct Conversion: Conversion method used when activating a new system is an emergency or systems cannot co-exist.
  • System Analysis: Phase involving feasibility study.
  • System Maintenance: Includes post-implementation audit documents.
  • System Conversion: Changing from old system to new system.
  • RAD (Rapid Application Development): Iterative prototyping-focused methodology.
  • Waterfall Methodology: Sequential approach, with each phase completed before moving to the next.
  • System Analysis: Determining feasibility of project and setting problem definition.
  • System Design: Program, database, architectural designs.
  • Agile: Concurrently performing analysis, design, and implementation.
  • CASE Tools: Automating SW development, reducing repetitive work.
  • Parallel Conversion: High cost due to users needing to use both systems.
  • Operational Prototype: Smaller system with minimal features.

Lecture #6

  • Database Administrator (DBA): Specialist responsible for organization's databases
  • Database Schema: List of tables, fields with primary and foreign keys.
  • Primary Key: Uniquely identifies each entity.
  • DBMS (Database Management System): Main software package for database management.
  • Data Warehouse: Business information collection from various sources, covering a company's processes, products, and customers.
  • DBMS (Database Management System): Acts as an interface between database and applications or users.
  • Worms: Reside in active memory, duplicate themselves.
  • Viruses: Attached to files that execute when opened
  • Trojan: Malicious code hidden in harmless programs.

Lecture #7

  • Data Mining: Tools analyze data to reveal trends and patterns in historical business activity.
  • Data Definition Language (DDL): Specifies database structure, used to create tables, define characteristics of fields.
  • Data Manipulation Language (DML): Used for inserting, updating, deleting, and retrieving data from databases.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Question Bank lec 1-6 (2) PDF

More Like This

IT Concepts Quiz
0 questions

IT Concepts Quiz

AccommodativeEuphemism avatar
AccommodativeEuphemism
IT Concepts and Software Systems Quiz
14 questions
Use Quizgecko on...
Browser
Browser