Podcast
Questions and Answers
What term describes a single set of hardware, software, databases, telecommunications, people, and procedures?
What term describes a single set of hardware, software, databases, telecommunications, people, and procedures?
Which role is responsible for defining and prioritizing requirements within a project?
Which role is responsible for defining and prioritizing requirements within a project?
What is the primary focus of Business Process Reengineering (BPR)?
What is the primary focus of Business Process Reengineering (BPR)?
Which of the following best defines 'data'?
Which of the following best defines 'data'?
Signup and view all the answers
What is the key purpose of feedback in information systems?
What is the key purpose of feedback in information systems?
Signup and view all the answers
What does efficiency in an information system aim to optimize?
What does efficiency in an information system aim to optimize?
Signup and view all the answers
Which type of network covers a larger area than a LAN but smaller than a WAN?
Which type of network covers a larger area than a LAN but smaller than a WAN?
Signup and view all the answers
What is meant by timely information in the context of information systems?
What is meant by timely information in the context of information systems?
Signup and view all the answers
What is the term for a structured and standardized process for all system development activities?
What is the term for a structured and standardized process for all system development activities?
Signup and view all the answers
Which methodology proceeds sequentially from one phase to the next?
Which methodology proceeds sequentially from one phase to the next?
Signup and view all the answers
What is the primary focus of Agile methodology?
What is the primary focus of Agile methodology?
Signup and view all the answers
What is the term for a smaller version of a system with minimal features?
What is the term for a smaller version of a system with minimal features?
Signup and view all the answers
What key activity occurs during the system analysis phase?
What key activity occurs during the system analysis phase?
Signup and view all the answers
Which conversion method is suggested as suitable when the new system must be activated immediately?
Which conversion method is suggested as suitable when the new system must be activated immediately?
Signup and view all the answers
What is the purpose of System Requirements Specifications (SRS)?
What is the purpose of System Requirements Specifications (SRS)?
Signup and view all the answers
What phase is characterized by a feasibility study being conducted?
What phase is characterized by a feasibility study being conducted?
Signup and view all the answers
Which term describes the temporary and volatile memory in a computer system?
Which term describes the temporary and volatile memory in a computer system?
Signup and view all the answers
What is the term for simultaneous execution of two or more instructions?
What is the term for simultaneous execution of two or more instructions?
Signup and view all the answers
What does the kernel of an operating system do?
What does the kernel of an operating system do?
Signup and view all the answers
What is the process called when old and new systems operate simultaneously until user satisfaction is reached?
What is the process called when old and new systems operate simultaneously until user satisfaction is reached?
Signup and view all the answers
Which of the following best describes the SDLC phase of system analysis?
Which of the following best describes the SDLC phase of system analysis?
Signup and view all the answers
What does multitasking OS allow users to do?
What does multitasking OS allow users to do?
Signup and view all the answers
What does system testing focus on?
What does system testing focus on?
Signup and view all the answers
What is the main goal of agile methodology in the SDLC?
What is the main goal of agile methodology in the SDLC?
Signup and view all the answers
What commonly describes legitimate-looking emails that deceive users into revealing personal information?
What commonly describes legitimate-looking emails that deceive users into revealing personal information?
Signup and view all the answers
Which of the following is likely to be a result of increased complexity in computing environments?
Which of the following is likely to be a result of increased complexity in computing environments?
Signup and view all the answers
What is the primary function of worms in a computer system?
What is the primary function of worms in a computer system?
Signup and view all the answers
What term is used for a field in a database that must be unique for each entity?
What term is used for a field in a database that must be unique for each entity?
Signup and view all the answers
Which software package is considered the main support for database management approaches?
Which software package is considered the main support for database management approaches?
Signup and view all the answers
Which of the following defines the structure of database content and is used to create tables?
Which of the following defines the structure of database content and is used to create tables?
Signup and view all the answers
What tool is primarily used for analyzing data to find patterns in historical business activities?
What tool is primarily used for analyzing data to find patterns in historical business activities?
Signup and view all the answers
Which statement is true regarding the role of a Database Administrator (DBA)?
Which statement is true regarding the role of a Database Administrator (DBA)?
Signup and view all the answers
Signup and view all the answers
Study Notes
In-Class Revision "Sample Questions"
- Information: Collection of facts organized and processed to have value beyond individual facts.
- Effectiveness: Doing the objective correctly.
- Feedback: Information from the system used to change input or processing activities.
- CBIS: Single set of hardware, software, databases, telecommunications, people, and procedures.
- Database: Organized collection of facts and information (typically two or more related data files).
- Business Analyst: Defines and prioritizes requirements, and gets feedback and approval on them.
- Game Developer: Contributes to audio and animation design.
- Database Administrator: Creates and maintains database standards and policies.
- Cybersecurity Consultant: Identifies security threats and determines best security measures.
- Back-end Developer: Responsible for creating and maintaining website components unseen by users.
- Processing: Converting data into useful outputs.
- Knowledge: Awareness and understanding of a set of information.
Lecture #1 & #2
- System Unit: Houses CPU and memory.
- RAM: Temporary and volatile memory.
- Traditional/Serial Processor: A single processor executes program instructions step-by-step.
- Multiprocessing: Simultaneous execution of two or more instructions.
- Backup: Copy of programs, data, and information created on one secondary storage medium, duplicated to another.
- Kernel: Central part of OS with complete control.
- System Utilities: Software programs essential for effective computer system management (backup, antivirus).
- Multitasking OS: Permits more than one application to run simultaneously.
- Scalability: Ability to handle increasing numbers of concurrent users smoothly.
- Memory Management: Controls memory access and maximizes available memory and storage.
Lecture #3
- Output Devices: Monitors, printers, speakers, and plotters.
- Input Devices: Point-of-sale (POS) and Automatic Teller Machine (ATM) devices.
- RAM Memory: Temporary and volatile.
- Multiprocessing: Simultaneous execution of two or more instructions.
- Direct Access: Retrieving records in any order.
- Operating System: Coordinates hardware and program activities.
- ROM Memory: Nonvolatile.
- Graphical User Interface (GUI): Uses icons and menus for sending commands.
Lecture #4
- System Analysis: Identifying problems and their causes.
- System Testing: Testing system functionality as a whole.
- Parallel Conversion: Running old and new systems simultaneously until users are satisfied.
- Black Box Testing: Testing without knowledge of the code.
- Implementation/Programming: Translating design specifications into software code.
- Agile: Streamlines SDLC by reducing modeling and documentation overhead.
- Outsourcing: Eliminates staffing problems.
- Non-operational Prototype: Mockup/model with output, input specifications and formats.
- SDLC/System Development Life Cycle: Structured/standardized process for system development.
- SRS/System Requirements Specification: Describes system specifications that deliver needed functions.
- RAD/Rapid Application Development: Rapid application development through iterative prototyping.
Lecture #5
- Direct Conversion: Only viable conversion solution when activating a new system is urgent or systems can't coexist.
- System Analysis: Feasibility study phase.
- System Maintenance: Post-implementation audit documents.
- System Conversion: Process of changing from an old system to a new one.
- RAD/Rapid Application Development: Iterative prototyping for rapid application development.
- Waterfall Methodology: Sequential methodology where the team proceeds from one phase to the next.
- System Analysis: Identifying problems and their causes.
- Data Mining: Tools for analyzing data to discover hidden patterns and trends.
- Data Definition Language (DDL): Defines database structure, tables, and field characteristics.
- Data Manipulation Language (DML): Used to insert, update, delete, and retrieve data from a database.
- Phishing: Legitimate-looking emails leading users to fake websites to get personal information.
- Zombies (in DDoS attacks): Computers taken over in a DDoS attack.
- Crackers: Hacking with criminal intent to steal or damage data.
- Spam: Low-cost commercial advertising for questionable products
Lecture #6
- Database Administrator (DBA or Database Admin.): Specialist in charge of organization's databases.
- Database Schema: List of all tables in the database, including primary and foreign keys.
- Primary Key: Unique field defining each entity.
- DBMS (Database Management System): Main software package for database management.
- Data Warehouse: Collects business information from various sources covering company processes, products, and customers.
- DBMS (Database Management System): Group of programs acting as an interface between the database and user/application programs.
Lecture #7
- Data mining: Tools to analyze historical business activity data, revealing hidden trends and patterns.
- Data Definition Language (DDL): Defines the structure of a database.
- Data Manipulation Language (DML): Used to modify database data (insert, update, delete).
- Relational Database: Organizes data in related tables.
True or False Statements
- Phishing: Low-cost marketing method also used by legitimate organizations (False).
- User Responsibility for Trojans: Users are responsible for installing trojans to eliminate vulnerabilities (False).
- Increased Computing Complexity: Increased computing environment complexity increases vulnerability to security incidents (True).
- Worms: Reside in active computer memory and duplicate themselves.
- Viruses: Attach to files, execute when opened.
- Trojan: Malicious code disguised in harmless programs.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on key concepts related to information systems. This quiz covers various roles, definitions, and processes essential for understanding the field of business analysis, database administration, and more. Perfect for in-class revision before exams!