Podcast
Questions and Answers
What term refers to the processes that transform data into usable information and knowledge?
What term refers to the processes that transform data into usable information and knowledge?
- Knowledge system
- Computer system
- Information system (correct)
- Database system
Which category of information system does a point-of-sale (POS) system, like the one used by Johnny's Lunch, fall under?
Which category of information system does a point-of-sale (POS) system, like the one used by Johnny's Lunch, fall under?
- Decision Support System (DSS)
- Management Information System (MIS)
- Accounting Information System (AIS)
- Transaction Processing System (TPS) (correct)
What term is used to describe disaster recovery and business continuity planning in IT system operations?
What term is used to describe disaster recovery and business continuity planning in IT system operations?
- Operating Loss
- New Segment
- Discontinuing operations
- Service continuity management (correct)
Which of the following is NOT a task typically required in infrastructure operations?
Which of the following is NOT a task typically required in infrastructure operations?
What is the term used to describe a set of interrelated subsystems that work together to collect, process, store, transform, and distribute information?
What is the term used to describe a set of interrelated subsystems that work together to collect, process, store, transform, and distribute information?
What type of information system model enables an organization to automate and integrate its key business processes?
What type of information system model enables an organization to automate and integrate its key business processes?
What is the term for the collection of high-level activities that ensure an organization’s information security program is adequate and operating properly?
What is the term for the collection of high-level activities that ensure an organization’s information security program is adequate and operating properly?
Which type of software manages the computer's processes and acts as an interface between the user, application software, and hardware?
Which type of software manages the computer's processes and acts as an interface between the user, application software, and hardware?
If two or more computers are connected to share information, they form a:
If two or more computers are connected to share information, they form a:
What does data become?
What does data become?
What is an application software primarily used for?
What is an application software primarily used for?
If a university establishes a web-based system for faculty to record grades and advise students, it is an example of:
If a university establishes a web-based system for faculty to record grades and advise students, it is an example of:
Who determines the classification level of information?
Who determines the classification level of information?
How should you transfer sensitive business data to 3rd parties?
How should you transfer sensitive business data to 3rd parties?
Which statement about using WIFI is correct?
Which statement about using WIFI is correct?
How can you verify the authenticity of a caller?
How can you verify the authenticity of a caller?
Does multi-factor authentication offer improved protection?
Does multi-factor authentication offer improved protection?
Which model represents the traditional manual approach to recording accounting transactions?
Which model represents the traditional manual approach to recording accounting transactions?
Who operates the system and performs various functions in an organization?
Who operates the system and performs various functions in an organization?
Which system supports daily business operations with numerous documents and messages for users throughout the organization?
Which system supports daily business operations with numerous documents and messages for users throughout the organization?
What is the correct way to protect hard copies of confidential documents?
What is the correct way to protect hard copies of confidential documents?
How should you correctly deal with visitors in an organization?
How should you correctly deal with visitors in an organization?
In urgent cases, to whom can you give your password?
In urgent cases, to whom can you give your password?
What step is not recommended in checking emails for phishing?
What step is not recommended in checking emails for phishing?
How should you handle a negative comment about the company on a social network?
How should you handle a negative comment about the company on a social network?
Which social media practice can compromise a company's security?
Which social media practice can compromise a company's security?
What is not a danger of leaving a computer screen unlocked?
What is not a danger of leaving a computer screen unlocked?
Which of the following is a secure password?
Which of the following is a secure password?