Information Systems Concepts Quiz
33 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What term describes a single set of hardware, software, databases, telecommunications, people, and procedures?

  • Information System
  • CBIS (correct)
  • Data Management
  • Business Process

Which role is responsible for defining and prioritizing requirements within a project?

  • Back-end Developer
  • Game Developer
  • Business Analyst (correct)
  • Database Administrator

What is the primary focus of Business Process Reengineering (BPR)?

  • Enhancing user experience
  • Implementing new technology
  • Radical redesign of business processes (correct)
  • Improving database performance

Which of the following best defines 'data'?

<p>Raw facts without meaning (B)</p> Signup and view all the answers

What is the key purpose of feedback in information systems?

<p>To improve input or processing activities (D)</p> Signup and view all the answers

What does efficiency in an information system aim to optimize?

<p>Resource utilization (C)</p> Signup and view all the answers

Which type of network covers a larger area than a LAN but smaller than a WAN?

<p>MAN (B)</p> Signup and view all the answers

What is meant by timely information in the context of information systems?

<p>Information delivered on time for decision making (A)</p> Signup and view all the answers

What is the term for a structured and standardized process for all system development activities?

<p>System Development Life Cycle (A)</p> Signup and view all the answers

Which methodology proceeds sequentially from one phase to the next?

<p>Waterfall methodology (B)</p> Signup and view all the answers

What is the primary focus of Agile methodology?

<p>Streamlining the SDLC process (B)</p> Signup and view all the answers

What is the term for a smaller version of a system with minimal features?

<p>Operational prototype (D)</p> Signup and view all the answers

What key activity occurs during the system analysis phase?

<p>Data collection and problem definition (C)</p> Signup and view all the answers

Which conversion method is suggested as suitable when the new system must be activated immediately?

<p>Direct Conversion (A)</p> Signup and view all the answers

What is the purpose of System Requirements Specifications (SRS)?

<p>To describe system specifications based on analysis (C)</p> Signup and view all the answers

What phase is characterized by a feasibility study being conducted?

<p>System analysis (D)</p> Signup and view all the answers

Which term describes the temporary and volatile memory in a computer system?

<p>RAM (C)</p> Signup and view all the answers

What is the term for simultaneous execution of two or more instructions?

<p>Multiprocessing (B)</p> Signup and view all the answers

What does the kernel of an operating system do?

<p>Manages hardware interactions (B)</p> Signup and view all the answers

What is the process called when old and new systems operate simultaneously until user satisfaction is reached?

<p>Parallel Conversion (B)</p> Signup and view all the answers

Which of the following best describes the SDLC phase of system analysis?

<p>Problem definition and cause examination (C)</p> Signup and view all the answers

What does multitasking OS allow users to do?

<p>Run multiple applications simultaneously (C)</p> Signup and view all the answers

What does system testing focus on?

<p>Complete system functioning (B)</p> Signup and view all the answers

What is the main goal of agile methodology in the SDLC?

<p>Streamline the process by minimizing overhead (B)</p> Signup and view all the answers

What commonly describes legitimate-looking emails that deceive users into revealing personal information?

<p>Phishing (B)</p> Signup and view all the answers

Which of the following is likely to be a result of increased complexity in computing environments?

<p>Increased vulnerability to security incidents (B)</p> Signup and view all the answers

What is the primary function of worms in a computer system?

<p>Residing in active memory and duplicating themselves (B)</p> Signup and view all the answers

What term is used for a field in a database that must be unique for each entity?

<p>Primary Key (C)</p> Signup and view all the answers

Which software package is considered the main support for database management approaches?

<p>DBMS (D)</p> Signup and view all the answers

Which of the following defines the structure of database content and is used to create tables?

<p>Data Definition Language (D)</p> Signup and view all the answers

What tool is primarily used for analyzing data to find patterns in historical business activities?

<p>Data Mining (A)</p> Signup and view all the answers

Which statement is true regarding the role of a Database Administrator (DBA)?

<p>In charge of managing an organization's databases (D)</p> Signup and view all the answers

Signup and view all the answers

Flashcards

Information

Facts organized and processed for a specific purpose, giving them value beyond the individual facts.

Effectiveness

The ability to achieve the intended goal, focusing on doing the right tasks correctly.

Feedback

Information used to adjust inputs and processes within a system for improvement.

CBIS

A complete set of hardware, software, databases, telecommunications, people, and procedures.

Signup and view all the flashcards

Database

A collection of organized data, typically consisting of multiple linked files.

Signup and view all the flashcards

Processing

The process of transforming raw data into useful outputs, like reports or summaries.

Signup and view all the flashcards

Knowledge

A deep understanding and awareness of a set of information.

Signup and view all the flashcards

Business Process Reengineering (BPR)

A fundamental redesign of business processes to improve cost, quality, speed, and service.

Signup and view all the flashcards

Kernel

The central component of an operating system (OS) that manages and controls all hardware and software resources, including memory, processes, and file systems.

Signup and view all the flashcards

System Utilities

Software programs that provide essential functions for managing the computer system, such as backing up files, optimizing performance, and protecting against viruses.

Signup and view all the flashcards

Multitasking OS

A type of operating system that allows multiple applications to run simultaneously, enabling users to switch between tasks seamlessly.

Signup and view all the flashcards

Scalability

The ability of a system to handle an increasing workload without significant performance degradation, ensuring smooth operation even with a growing user base.

Signup and view all the flashcards

Memory Management

A crucial function of operating systems that manages how memory is accessed and allocated, maximizing the available space and preventing conflicts between applications.

Signup and view all the flashcards

System Analysis

The phase in the System Development Life Cycle (SDLC) where the problem is thoroughly analyzed, identifying its causes, and defining the scope of the solution.

Signup and view all the flashcards

Black Box Testing

A type of system testing where the tester has no knowledge of the internal code or structure, relying solely on the external inputs and outputs to assess functionality.

Signup and view all the flashcards

Implementation/Programming

The implementation stage of the SDLC where the system specifications from the design phase are translated into working software program code.

Signup and view all the flashcards

Non-operational Prototype

A preliminary model of a system, including input and output specifications, but not operational. It's used for early visualization and feedback.

Signup and view all the flashcards

System Development Life Cycle (SDLC)

A structured method for designing, developing, and maintaining information systems. It involves phases like planning, analysis, design, implementation, and maintenance.

Signup and view all the flashcards

System Requirements Specifications (SRS)

A detailed document outlining the functionalities and requirements of a system. It serves as a blueprint for development.

Signup and view all the flashcards

Agile Development

A development methodology focusing on rapid prototyping, iterative development, and flexible adaptation to changing requirements.

Signup and view all the flashcards

Direct Conversion

A conversion strategy where the old system is entirely replaced by the new one immediately. This is ideal for critical situations or when systems cannot coexist.

Signup and view all the flashcards

System Design

The phase of the SDLC that focuses on designing the architecture, program modules, databases, and user interfaces of the system.

Signup and view all the flashcards

System Maintenance

The phase of the SDLC where the newly implemented system is monitored, evaluated, and adjusted to ensure ongoing functionality and meet user needs.

Signup and view all the flashcards

Crackers

A type of hacking that aims to harm systems or steal data, usually for illegal purposes.

Signup and view all the flashcards

Trojan Horse

A malicious program disguised as legitimate software that tricks users into installing it, allowing attackers to gain access to a system.

Signup and view all the flashcards

Zombie Network

A network of compromised computers controlled remotely by an attacker, used to launch DDoS attacks or other malicious actions.

Signup and view all the flashcards

DDoS Attack

A form of cyberattack that floods a target with traffic, overwhelming it and making it unavailable to legitimate users.

Signup and view all the flashcards

Software Vulnerability

A security vulnerability in a software program that can be exploited by attackers to gain unauthorized access or control.

Signup and view all the flashcards

Relational Database

A collection of data organized and structured in tables with relationships between them. It allows for efficient storage, retrieval, and analysis of information.

Signup and view all the flashcards

Primary Key

A field within a database table that uniquely identifies each record. It ensures that every entry has a distinct identifier.

Signup and view all the flashcards

Database Management System (DBMS)

A specialized software application used to manage and access databases. It provides tools for creating, querying, updating, and maintaining databases.

Signup and view all the flashcards

Study Notes

In-Class Revision "Sample Questions"

  • Information: Collection of facts organized and processed to have value beyond individual facts.
  • Effectiveness: Doing the objective correctly.
  • Feedback: Information from the system used to change input or processing activities.
  • CBIS: Single set of hardware, software, databases, telecommunications, people, and procedures.
  • Database: Organized collection of facts and information (typically two or more related data files).
  • Business Analyst: Defines and prioritizes requirements, and gets feedback and approval on them.
  • Game Developer: Contributes to audio and animation design.
  • Database Administrator: Creates and maintains database standards and policies.
  • Cybersecurity Consultant: Identifies security threats and determines best security measures.
  • Back-end Developer: Responsible for creating and maintaining website components unseen by users.
  • Processing: Converting data into useful outputs.
  • Knowledge: Awareness and understanding of a set of information.

Lecture #1 & #2

  • System Unit: Houses CPU and memory.
  • RAM: Temporary and volatile memory.
  • Traditional/Serial Processor: A single processor executes program instructions step-by-step.
  • Multiprocessing: Simultaneous execution of two or more instructions.
  • Backup: Copy of programs, data, and information created on one secondary storage medium, duplicated to another.
  • Kernel: Central part of OS with complete control.
  • System Utilities: Software programs essential for effective computer system management (backup, antivirus).
  • Multitasking OS: Permits more than one application to run simultaneously.
  • Scalability: Ability to handle increasing numbers of concurrent users smoothly.
  • Memory Management: Controls memory access and maximizes available memory and storage.

Lecture #3

  • Output Devices: Monitors, printers, speakers, and plotters.
  • Input Devices: Point-of-sale (POS) and Automatic Teller Machine (ATM) devices.
  • RAM Memory: Temporary and volatile.
  • Multiprocessing: Simultaneous execution of two or more instructions.
  • Direct Access: Retrieving records in any order.
  • Operating System: Coordinates hardware and program activities.
  • ROM Memory: Nonvolatile.
  • Graphical User Interface (GUI): Uses icons and menus for sending commands.

Lecture #4

  • System Analysis: Identifying problems and their causes.
  • System Testing: Testing system functionality as a whole.
  • Parallel Conversion: Running old and new systems simultaneously until users are satisfied.
  • Black Box Testing: Testing without knowledge of the code.
  • Implementation/Programming: Translating design specifications into software code.
  • Agile: Streamlines SDLC by reducing modeling and documentation overhead.
  • Outsourcing: Eliminates staffing problems.
  • Non-operational Prototype: Mockup/model with output, input specifications and formats.
  • SDLC/System Development Life Cycle: Structured/standardized process for system development.
  • SRS/System Requirements Specification: Describes system specifications that deliver needed functions.
  • RAD/Rapid Application Development: Rapid application development through iterative prototyping.

Lecture #5

  • Direct Conversion: Only viable conversion solution when activating a new system is urgent or systems can't coexist.
  • System Analysis: Feasibility study phase.
  • System Maintenance: Post-implementation audit documents.
  • System Conversion: Process of changing from an old system to a new one.
  • RAD/Rapid Application Development: Iterative prototyping for rapid application development.
  • Waterfall Methodology: Sequential methodology where the team proceeds from one phase to the next.
  • System Analysis: Identifying problems and their causes.
  • Data Mining: Tools for analyzing data to discover hidden patterns and trends.
  • Data Definition Language (DDL): Defines database structure, tables, and field characteristics.
  • Data Manipulation Language (DML): Used to insert, update, delete, and retrieve data from a database.
  • Phishing: Legitimate-looking emails leading users to fake websites to get personal information.
  • Zombies (in DDoS attacks): Computers taken over in a DDoS attack.
  • Crackers: Hacking with criminal intent to steal or damage data.
  • Spam: Low-cost commercial advertising for questionable products

Lecture #6

  • Database Administrator (DBA or Database Admin.): Specialist in charge of organization's databases.
  • Database Schema: List of all tables in the database, including primary and foreign keys.
  • Primary Key: Unique field defining each entity.
  • DBMS (Database Management System): Main software package for database management.
  • Data Warehouse: Collects business information from various sources covering company processes, products, and customers.
  • DBMS (Database Management System): Group of programs acting as an interface between the database and user/application programs.

Lecture #7

  • Data mining: Tools to analyze historical business activity data, revealing hidden trends and patterns.
  • Data Definition Language (DDL): Defines the structure of a database.
  • Data Manipulation Language (DML): Used to modify database data (insert, update, delete).
  • Relational Database: Organizes data in related tables.

True or False Statements

  • Phishing: Low-cost marketing method also used by legitimate organizations (False).
  • User Responsibility for Trojans: Users are responsible for installing trojans to eliminate vulnerabilities (False).
  • Increased Computing Complexity: Increased computing environment complexity increases vulnerability to security incidents (True).
  • Worms: Reside in active computer memory and duplicate themselves.
  • Viruses: Attach to files, execute when opened.
  • Trojan: Malicious code disguised in harmless programs.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Question Bank lec 1-6 (2) PDF

Description

Test your knowledge on key concepts related to information systems. This quiz covers various roles, definitions, and processes essential for understanding the field of business analysis, database administration, and more. Perfect for in-class revision before exams!

More Like This

Information Systems Chapter 2
34 questions
Information Systems Overview
40 questions

Information Systems Overview

JubilantDiopside1201 avatar
JubilantDiopside1201
Business and Finance Information Systems
13 questions
Use Quizgecko on...
Browser
Browser