Information Systems Concepts Quiz
33 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What term describes a single set of hardware, software, databases, telecommunications, people, and procedures?

  • Information System
  • CBIS (correct)
  • Data Management
  • Business Process
  • Which role is responsible for defining and prioritizing requirements within a project?

  • Back-end Developer
  • Game Developer
  • Business Analyst (correct)
  • Database Administrator
  • What is the primary focus of Business Process Reengineering (BPR)?

  • Enhancing user experience
  • Implementing new technology
  • Radical redesign of business processes (correct)
  • Improving database performance
  • Which of the following best defines 'data'?

    <p>Raw facts without meaning</p> Signup and view all the answers

    What is the key purpose of feedback in information systems?

    <p>To improve input or processing activities</p> Signup and view all the answers

    What does efficiency in an information system aim to optimize?

    <p>Resource utilization</p> Signup and view all the answers

    Which type of network covers a larger area than a LAN but smaller than a WAN?

    <p>MAN</p> Signup and view all the answers

    What is meant by timely information in the context of information systems?

    <p>Information delivered on time for decision making</p> Signup and view all the answers

    What is the term for a structured and standardized process for all system development activities?

    <p>System Development Life Cycle</p> Signup and view all the answers

    Which methodology proceeds sequentially from one phase to the next?

    <p>Waterfall methodology</p> Signup and view all the answers

    What is the primary focus of Agile methodology?

    <p>Streamlining the SDLC process</p> Signup and view all the answers

    What is the term for a smaller version of a system with minimal features?

    <p>Operational prototype</p> Signup and view all the answers

    What key activity occurs during the system analysis phase?

    <p>Data collection and problem definition</p> Signup and view all the answers

    Which conversion method is suggested as suitable when the new system must be activated immediately?

    <p>Direct Conversion</p> Signup and view all the answers

    What is the purpose of System Requirements Specifications (SRS)?

    <p>To describe system specifications based on analysis</p> Signup and view all the answers

    What phase is characterized by a feasibility study being conducted?

    <p>System analysis</p> Signup and view all the answers

    Which term describes the temporary and volatile memory in a computer system?

    <p>RAM</p> Signup and view all the answers

    What is the term for simultaneous execution of two or more instructions?

    <p>Multiprocessing</p> Signup and view all the answers

    What does the kernel of an operating system do?

    <p>Manages hardware interactions</p> Signup and view all the answers

    What is the process called when old and new systems operate simultaneously until user satisfaction is reached?

    <p>Parallel Conversion</p> Signup and view all the answers

    Which of the following best describes the SDLC phase of system analysis?

    <p>Problem definition and cause examination</p> Signup and view all the answers

    What does multitasking OS allow users to do?

    <p>Run multiple applications simultaneously</p> Signup and view all the answers

    What does system testing focus on?

    <p>Complete system functioning</p> Signup and view all the answers

    What is the main goal of agile methodology in the SDLC?

    <p>Streamline the process by minimizing overhead</p> Signup and view all the answers

    What commonly describes legitimate-looking emails that deceive users into revealing personal information?

    <p>Phishing</p> Signup and view all the answers

    Which of the following is likely to be a result of increased complexity in computing environments?

    <p>Increased vulnerability to security incidents</p> Signup and view all the answers

    What is the primary function of worms in a computer system?

    <p>Residing in active memory and duplicating themselves</p> Signup and view all the answers

    What term is used for a field in a database that must be unique for each entity?

    <p>Primary Key</p> Signup and view all the answers

    Which software package is considered the main support for database management approaches?

    <p>DBMS</p> Signup and view all the answers

    Which of the following defines the structure of database content and is used to create tables?

    <p>Data Definition Language</p> Signup and view all the answers

    What tool is primarily used for analyzing data to find patterns in historical business activities?

    <p>Data Mining</p> Signup and view all the answers

    Which statement is true regarding the role of a Database Administrator (DBA)?

    <p>In charge of managing an organization's databases</p> Signup and view all the answers

    Signup and view all the answers

    Study Notes

    In-Class Revision "Sample Questions"

    • Information: Collection of facts organized and processed to have value beyond individual facts.
    • Effectiveness: Doing the objective correctly.
    • Feedback: Information from the system used to change input or processing activities.
    • CBIS: Single set of hardware, software, databases, telecommunications, people, and procedures.
    • Database: Organized collection of facts and information (typically two or more related data files).
    • Business Analyst: Defines and prioritizes requirements, and gets feedback and approval on them.
    • Game Developer: Contributes to audio and animation design.
    • Database Administrator: Creates and maintains database standards and policies.
    • Cybersecurity Consultant: Identifies security threats and determines best security measures.
    • Back-end Developer: Responsible for creating and maintaining website components unseen by users.
    • Processing: Converting data into useful outputs.
    • Knowledge: Awareness and understanding of a set of information.

    Lecture #1 & #2

    • System Unit: Houses CPU and memory.
    • RAM: Temporary and volatile memory.
    • Traditional/Serial Processor: A single processor executes program instructions step-by-step.
    • Multiprocessing: Simultaneous execution of two or more instructions.
    • Backup: Copy of programs, data, and information created on one secondary storage medium, duplicated to another.
    • Kernel: Central part of OS with complete control.
    • System Utilities: Software programs essential for effective computer system management (backup, antivirus).
    • Multitasking OS: Permits more than one application to run simultaneously.
    • Scalability: Ability to handle increasing numbers of concurrent users smoothly.
    • Memory Management: Controls memory access and maximizes available memory and storage.

    Lecture #3

    • Output Devices: Monitors, printers, speakers, and plotters.
    • Input Devices: Point-of-sale (POS) and Automatic Teller Machine (ATM) devices.
    • RAM Memory: Temporary and volatile.
    • Multiprocessing: Simultaneous execution of two or more instructions.
    • Direct Access: Retrieving records in any order.
    • Operating System: Coordinates hardware and program activities.
    • ROM Memory: Nonvolatile.
    • Graphical User Interface (GUI): Uses icons and menus for sending commands.

    Lecture #4

    • System Analysis: Identifying problems and their causes.
    • System Testing: Testing system functionality as a whole.
    • Parallel Conversion: Running old and new systems simultaneously until users are satisfied.
    • Black Box Testing: Testing without knowledge of the code.
    • Implementation/Programming: Translating design specifications into software code.
    • Agile: Streamlines SDLC by reducing modeling and documentation overhead.
    • Outsourcing: Eliminates staffing problems.
    • Non-operational Prototype: Mockup/model with output, input specifications and formats.
    • SDLC/System Development Life Cycle: Structured/standardized process for system development.
    • SRS/System Requirements Specification: Describes system specifications that deliver needed functions.
    • RAD/Rapid Application Development: Rapid application development through iterative prototyping.

    Lecture #5

    • Direct Conversion: Only viable conversion solution when activating a new system is urgent or systems can't coexist.
    • System Analysis: Feasibility study phase.
    • System Maintenance: Post-implementation audit documents.
    • System Conversion: Process of changing from an old system to a new one.
    • RAD/Rapid Application Development: Iterative prototyping for rapid application development.
    • Waterfall Methodology: Sequential methodology where the team proceeds from one phase to the next.
    • System Analysis: Identifying problems and their causes.
    • Data Mining: Tools for analyzing data to discover hidden patterns and trends.
    • Data Definition Language (DDL): Defines database structure, tables, and field characteristics.
    • Data Manipulation Language (DML): Used to insert, update, delete, and retrieve data from a database.
    • Phishing: Legitimate-looking emails leading users to fake websites to get personal information.
    • Zombies (in DDoS attacks): Computers taken over in a DDoS attack.
    • Crackers: Hacking with criminal intent to steal or damage data.
    • Spam: Low-cost commercial advertising for questionable products

    Lecture #6

    • Database Administrator (DBA or Database Admin.): Specialist in charge of organization's databases.
    • Database Schema: List of all tables in the database, including primary and foreign keys.
    • Primary Key: Unique field defining each entity.
    • DBMS (Database Management System): Main software package for database management.
    • Data Warehouse: Collects business information from various sources covering company processes, products, and customers.
    • DBMS (Database Management System): Group of programs acting as an interface between the database and user/application programs.

    Lecture #7

    • Data mining: Tools to analyze historical business activity data, revealing hidden trends and patterns.
    • Data Definition Language (DDL): Defines the structure of a database.
    • Data Manipulation Language (DML): Used to modify database data (insert, update, delete).
    • Relational Database: Organizes data in related tables.

    True or False Statements

    • Phishing: Low-cost marketing method also used by legitimate organizations (False).
    • User Responsibility for Trojans: Users are responsible for installing trojans to eliminate vulnerabilities (False).
    • Increased Computing Complexity: Increased computing environment complexity increases vulnerability to security incidents (True).
    • Worms: Reside in active computer memory and duplicate themselves.
    • Viruses: Attach to files, execute when opened.
    • Trojan: Malicious code disguised in harmless programs.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Question Bank lec 1-6 (2) PDF

    Description

    Test your knowledge on key concepts related to information systems. This quiz covers various roles, definitions, and processes essential for understanding the field of business analysis, database administration, and more. Perfect for in-class revision before exams!

    More Like This

    OLTP Systems Quiz
    5 questions

    OLTP Systems Quiz

    AttractiveEnlightenment avatar
    AttractiveEnlightenment
    Information Systems Chapter 2
    34 questions
    Business and Finance Information Systems
    13 questions
    Use Quizgecko on...
    Browser
    Browser