In-Class Revision Sample Questions
87 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a collection of facts organized and processed in such a way that they have value beyond the individual facts themselves?

Information

What is the term for doing the objective correctly?

Effectiveness

What is the term for information from the system that is used to make changes to input or processing activities?

Feedback

What is a single set of hardware, software, databases, telecommunications, people, and procedures?

<p>CBIS</p> Signup and view all the answers

What is an organized collection of facts and information, typically consisting of two or more related data files?

<p>Database</p> Signup and view all the answers

Describe the role of a Business Analyst.

<p>A Business Analyst defines requirements, prioritizes them, gets feedback and approval, and ensures that the requirements are met.</p> Signup and view all the answers

What does a Game Developer contribute to?

<p>Audio and animation design.</p> Signup and view all the answers

Who creates and maintains database standards and policies?

<p>Database Administrator</p> Signup and view all the answers

Who identifies possible security threats and determines the best security measures?

<p>Cybersecurity consultant</p> Signup and view all the answers

Who is responsible for creating and maintaining the components of a website unseen by the user?

<p>Back-end developer</p> Signup and view all the answers

What is the term for converting data into useful outputs?

<p>Processing</p> Signup and view all the answers

What is the term for awareness and understanding of a set of information?

<p>Knowledge</p> Signup and view all the answers

What is the term for a single set of hardware, software, databases, telecommunications, people, and procedures?

<p>CBIS</p> Signup and view all the answers

What is information from the system that is used to make changes to input or processing activities?

<p>Feedback</p> Signup and view all the answers

What are raw facts called?

<p>Data</p> Signup and view all the answers

What is the term for fundamental rethinking and radical redesign of business processes to achieve improvements in cost, quality, speed and service?

<p>Business Process Reengineering or BPR</p> Signup and view all the answers

What is using resources optimally where resources could be memory, CPU, time and databases?

<p>Efficiency</p> Signup and view all the answers

What is a computer network that is covers an area larger than LAN but smaller than WAN?

<p>MAN</p> Signup and view all the answers

What is information delivered when it is needed called?

<p>Timely Information</p> Signup and view all the answers

What does a computer system use to collect, manipulate, store, and process data into information?

<p>CBIS</p> Signup and view all the answers

Doing the objective correctly is known as?

<p>Effectiveness</p> Signup and view all the answers

What is an example of a WAN network?

<p>Internet</p> Signup and view all the answers

What are some approaches to evaluate the effectiveness of a computer system?

<p>Productivity, return on investment, and market share.</p> Signup and view all the answers

What houses the CPU and memory of a computer?

<p>System Unit</p> Signup and view all the answers

What is temporary and volatile memory known as?

<p>RAM</p> Signup and view all the answers

What is a single processor that executes program instructions in a step-by-step manner?

<p>Traditional/Serial Processor</p> Signup and view all the answers

What is the execution of two or more instructions simultaneously?

<p>Multiprocessing</p> Signup and view all the answers

What is a copy of programs, data, and information created in one secondary storage medium duplicated to another?

<p>Backup</p> Signup and view all the answers

What is the central part of the OS with complete control over everything in the system?

<p>Kernel</p> Signup and view all the answers

What are software programs essential to effective management of the computer system such as backup files and antivirus protection?

<p>System Utilities</p> Signup and view all the answers

What permits more than one application to run at the same time?

<p>Multitasking OS</p> Signup and view all the answers

What is the ability to handle an increasing number of concurrent users smoothly?

<p>Scalability</p> Signup and view all the answers

What controls how memory is accessed and maximizes the available memory and storage?

<p>Memory Management</p> Signup and view all the answers

What are monitors, printers, speakers, and plotters known as?

<p>Output Devices</p> Signup and view all the answers

What are Point-of-sale (POS) and Automatic teller machine (ATM) devices known as?

<p>Input Devices</p> Signup and view all the answers

What type of memory is RAM?

<p>Temporary and Volatile</p> Signup and view all the answers

What is the simultaneous execution of two or more instructions?

<p>Multiprocessing</p> Signup and view all the answers

What is the process where records can be retrieved in any order?

<p>Direct Access</p> Signup and view all the answers

What coordinates the activities of hardware and programs?

<p>Operating System</p> Signup and view all the answers

What uses icons and menus to send commands to the computer system?

<p>Graphical User Interface</p> Signup and view all the answers

What is the SDLC phase where the problem should be defined and causes as well?

<p>System Analysis</p> Signup and view all the answers

What involves testing the functioning of the system as a whole?

<p>System Testing</p> Signup and view all the answers

What is the process of running old and new systems simultaneously until users and project coordinators are satisfied that the new system is functional?

<p>Parallel Conversion</p> Signup and view all the answers

What is the term when a tester has no knowledge of the code and focuses on the system's functionality?

<p>Black Box Testing</p> Signup and view all the answers

What involves translating system specifications from the design stage into software program code?

<p>Implementation/Programming</p> Signup and view all the answers

Which methodology focuses on streamlining the SDLC by eliminating much of the modeling and documentation overhead?

<p>Agile</p> Signup and view all the answers

Which methodology eliminates staffing and personnel problems?

<p>Outsourcing</p> Signup and view all the answers

What is a mock-up or model that includes output and input specifications and formats, often referred to as a user interface?

<p>Non-operational Prototype</p> Signup and view all the answers

What is a software development methodology that focuses on building applications in a very short time through iterative prototyping development by automating revisions and changes?

<p>RAD/Rapid Application Development</p> Signup and view all the answers

What is a mock-up or model that includes output and input specifications and formats?

<p>Non-operational Prototype</p> Signup and view all the answers

What is the term for a structured and standardized process for all activities of any system development effort?

<p>System Development Life Cycle (A), SDLC (B)</p> Signup and view all the answers

What describes system specifications that will deliver functions identified during systems analysis?

<p>SRS/System Requirements Specifications</p> Signup and view all the answers

What methodology focuses on streamlining the SDLC by eliminating much of the modeling and documentation overhead and time spent on these tasks, such as scrum?

<p>Agile</p> Signup and view all the answers

Which methodology eliminates staffing and personnel fluctuation problems?

<p>Outsourcing</p> Signup and view all the answers

What involves a general design for the entire system is performed, and then the project is divided into a series of distinct subprojects?

<p>Parallel Methodology</p> Signup and view all the answers

What might be the only viable conversion solution in situations where activating the new system is an emergency or when the two systems cannot coexist under any conditions?

<p>Direct Conversion</p> Signup and view all the answers

What is the phase during which a feasibility study is done?

<p>System Analysis</p> Signup and view all the answers

What is the phase that includes post-implementation audit documents?

<p>System Maintenance</p> Signup and view all the answers

What is the process of changing from an old system to a new system?

<p>System Conversion</p> Signup and view all the answers

What is the methodology that focuses on building applications in a very short time through iterative prototyping development?

<p>RAD/Rapid Application Development</p> Signup and view all the answers

What is the methodology in which the team proceeds sequentially from one phase to the next?

<p>Waterfall Methodology</p> Signup and view all the answers

During which phase is gathering data about the existing system and defining the problem done?

<p>System Analysis</p> Signup and view all the answers

What does system design include?

<p>Design of program, databases, and architecture</p> Signup and view all the answers

What happens concurrently in an agile development approach?

<p>Analysis, Design, and Implementation phases</p> Signup and view all the answers

What are tools to automate SW development and reduce repetitive work?

<p>CASE</p> Signup and view all the answers

Which conversion method involves the highest cost, as end users must perform all daily functions with both systems?

<p>Parallel Conversion</p> Signup and view all the answers

What is a smaller version of a system with a minimal number of features called?

<p>Operational Prototype</p> Signup and view all the answers

What are legitimate-looking emails that lead users to fake web sites to get recipient to reveal personal data?

<p>Phishing</p> Signup and view all the answers

What are the computers taken over in DDoS attacks?

<p>Zombies</p> Signup and view all the answers

What is a form of hacking with clear criminal activity to steal data and corrupt systems?

<p>Crackers</p> Signup and view all the answers

What is low-cost commercial advertising for questionable products?

<p>Spam</p> Signup and view all the answers

Where do worms reside and how do they replicate?

<p>Worms reside in the active memory of a computer and duplicate themselves.</p> Signup and view all the answers

How do viruses spread?

<p>Viruses are attached to files, so when the infected file is opened, they execute.</p> Signup and view all the answers

What are Trojan programs and how to they infect systems?

<p>Trojan programs are malicious code hidden inside seemingly harmless programs; users are tricked into installing them.</p> Signup and view all the answers

What is the term for a specialist in charge of the databases of an organization?

<p>Database Administrator or DBA</p> Signup and view all the answers

What is a list of all the tables in the database, along with all the fields with primary and foreign keys identified?

<p>Database Schema</p> Signup and view all the answers

What is a field that is defined to be unique for each entity?

<p>Primary Key</p> Signup and view all the answers

What is the main software package that supports a database management approach?

<p>DBMS</p> Signup and view all the answers

What is a database that collects business information from many sources in the enterprise, covering all aspects of the company's processes, products, and customers?

<p>Data Warehouse</p> Signup and view all the answers

What is a group of programs used as an interface between a database and application programs or a database and the user?

<p>DBMS</p> Signup and view all the answers

What are tools used to analyze data to reveal hidden patterns and trends in historical business activity?

<p>Data Mining</p> Signup and view all the answers

What specifies the structure of database content, used to create tables and define characteristics of fields?

<p>Data Definition Language or DDL</p> Signup and view all the answers

What is used to insert, update, delete, and retrieve data from a database?

<p>Data Manipulation Language or DML</p> Signup and view all the answers

How does a relational database organize data?

<p>In the form of related tables.</p> Signup and view all the answers

What problems can occur if files are maintained separately by different departments?

<p>Data redundancy, data inconsistency, and data inflexibility.</p> Signup and view all the answers

What is the purpose of data mining?

<p>To analyze data in a data warehouse to reveal hidden patterns and trends in historical business activity.</p> Signup and view all the answers

What is a relational database?

<p>A series of related tables stored together with a minimum of duplication.</p> Signup and view all the answers

Study Notes

In-Class Revision "Sample Questions"

  • Information: Collection of facts organized and processed, having value beyond individual facts.
  • Effectiveness: Doing the objective correctly.
  • Feedback: Information from a system used to modify input or processing activities.
  • CBIS: Single set of hardware, software, databases, telecommunications, people, and procedures.
  • Database: Organized collection of facts and information (typically multiple related data files).
  • Business Analyst: Defines and prioritizes requirements, gathers feedback, and approves.
  • Game Developer: Contributes to audio and animation design.
  • Database Administrator: Creates and maintains database standards and policies.
  • Cybersecurity Consultant: Identifies security threats and determines best security measures.
  • Back-end Developer: Creates and maintains unseen website components.
  • Processing: Converting data into useful outputs.
  • Knowledge: Awareness and understanding of a set of information.

Lecture #1 & #2

  • Data: Raw facts.
  • Business Process Reengineering (BPR): Fundamental rethinking and redesign of business processes to improve cost, quality, speed, and service.
  • Efficiency: Optimal use of resources (memory, CPU, time, databases).
  • MAN (Metropolitan Area Network): Computer network larger than LAN but smaller than WAN.
  • Timely Information: Information delivered when needed.
  • CBIS: Single set of hardware, software, databases, telecommunications, people, and procedures configured to collect, manipulate, store, and process data into information.
  • Effectiveness: Doing the objective correctly.
  • WAN (Wide Area Network): Network example, such as the internet.
  • Productivity, ROI, and Market Share: Approaches to evaluate IS success.

Lecture #3

  • System Unit: Houses CPU and memory.
  • RAM (Random Access Memory): Temporary and volatile memory.
  • Traditional/Serial Processor: Single processor executes program instructions step-by-step.
  • Multiprocessing: Simultaneous execution of two or more instructions.
  • Backup: Copy of programs, data, and information duplicated to another secondary storage medium.
  • Kernel: Central part of OS with complete control
  • System Utilities: Software programs for effective computer system management (backup, antivirus).
  • Multitasking OS: Allows multiple applications to run simultaneously.
  • Scalability: Ability to handle increasing concurrent users smoothly.
  • Memory Management: Controls how memory is accessed and maximizes available memory/storage.
  • Output Devices: Monitors, printers, speakers, plotters.
  • Input Devices: Point-of-sale (POS) and Automatic Teller Machine (ATM) devices.
  • RAM: Temporary and volatile memory.
  • Multiprocessing: Simultaneous execution of two or more instructions.
  • Direct Access: Records retrieved in any order
  • Operating System: Coordinates hardware and program activities
  • ROM (Read-Only Memory): Nonvolatile memory.
  • GUI (Graphical User Interface): Uses icons and menus to send commands to the computer.

Lecture #4

  • System Analysis: SDLC phase where the problem is defined and causes are identified.
  • System Testing: Test of overall system's functionality.
  • Parallel Conversion: Old and new systems run simultaneously until users are satisfied.
  • Black Box Testing: Tester has no knowledge of code.
  • Implementation/Programming: System specifications translated into software code.
  • Agile: Streamlining the SDLC by reducing modeling and documentation overhead.
  • Outsourcing: Eliminates staffing and personnel problems.
  • Non-operational Prototype (UI): Mock-up or model with input/output specifications and formats
  • Rapid Application Development (RAD): Short-time software development through iterative prototyping.
  • SDLC (System Development Life Cycle): Structured and standardized process for system development effort.
  • SRS (System Requirements Specifications): Describes system specifications for functions.

Lecture #5

  • Phishing: Legitimate-looking emails lead users to fake websites.
  • Zombies: Computers taken over in DDoS attacks.
  • Crackers: Hacking with clear criminal activity to steal or corrupt data.
  • Spam: Low-cost commercial advertising for questionable products.
  • Direct Conversion: Conversion method used when activating a new system is an emergency or systems cannot co-exist.
  • System Analysis: Phase involving feasibility study.
  • System Maintenance: Includes post-implementation audit documents.
  • System Conversion: Changing from old system to new system.
  • RAD (Rapid Application Development): Iterative prototyping-focused methodology.
  • Waterfall Methodology: Sequential approach, with each phase completed before moving to the next.
  • System Analysis: Determining feasibility of project and setting problem definition.
  • System Design: Program, database, architectural designs.
  • Agile: Concurrently performing analysis, design, and implementation.
  • CASE Tools: Automating SW development, reducing repetitive work.
  • Parallel Conversion: High cost due to users needing to use both systems.
  • Operational Prototype: Smaller system with minimal features.

Lecture #6

  • Database Administrator (DBA): Specialist responsible for organization's databases
  • Database Schema: List of tables, fields with primary and foreign keys.
  • Primary Key: Uniquely identifies each entity.
  • DBMS (Database Management System): Main software package for database management.
  • Data Warehouse: Business information collection from various sources, covering a company's processes, products, and customers.
  • DBMS (Database Management System): Acts as an interface between database and applications or users.
  • Worms: Reside in active memory, duplicate themselves.
  • Viruses: Attached to files that execute when opened
  • Trojan: Malicious code hidden in harmless programs.

Lecture #7

  • Data Mining: Tools analyze data to reveal trends and patterns in historical business activity.
  • Data Definition Language (DDL): Specifies database structure, used to create tables, define characteristics of fields.
  • Data Manipulation Language (DML): Used for inserting, updating, deleting, and retrieving data from databases.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Question Bank lec 1-6 (2) PDF

Description

Test your understanding of essential IT concepts such as information, feedback, and roles within a business context. This quiz reviews key terms and definitions that are crucial for IT professionals, particularly in database management and cybersecurity. Prepare effectively by assessing your knowledge through these sample questions.

More Like This

IT Concepts Quiz
0 questions

IT Concepts Quiz

AccommodativeEuphemism avatar
AccommodativeEuphemism
IT Concepts and Software Systems Quiz
14 questions
Use Quizgecko on...
Browser
Browser