System Inputs, Processes, Outputs, and Performance Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which of the following refers to system characteristics such as speed, volume, capacity, availability, and reliability?

  • Inputs
  • Outputs
  • Processes (correct)
  • Performance

What type of flowchart is particularly useful in analyzing the adequacy of control procedures?

  • Organizational flowchart
  • Document flowchart (correct)
  • Illustrative flowchart
  • Business flowchart

Which of the following refers to hardware, software, and procedural controls that safeguard and protect the system and its data from internal or external threats?

  • Inputs
  • Processes
  • Outputs
  • Security (correct)

What is the primary purpose of a business flowchart?

<p>To show the steps that make up a business process, along with who's responsible for each step (D)</p> Signup and view all the answers

Which of the following refers to electronic or printed information produced by the system?

<p>Outputs (B)</p> Signup and view all the answers

What is the primary purpose of a document flowchart?

<p>To illustrate the flow of documents and information between areas of responsibility within an organization (A)</p> Signup and view all the answers

What is the primary goal of systems design?

<p>To build a system that is effective, reliable, and maintainable (B)</p> Signup and view all the answers

What is one of the considerations for user interactions in system design?

<p>Providing flexibility and anticipating future needs (C)</p> Signup and view all the answers

In terms of data considerations, what is recommended regarding data entry?

<p>Entering data into the system where and when it occurs (B)</p> Signup and view all the answers

Which factor determines whether a system is considered reliable?

<p>Handling errors adequately (B)</p> Signup and view all the answers

What is one of the characteristics of a maintainable system according to the text?

<p>Well designed, flexible, and developed with future modifications in mind (A)</p> Signup and view all the answers

Why is verifying data during input important according to the text?

<p>To catch errors immediately (D)</p> Signup and view all the answers

What is the definition of a man-in-the-middle attack?

<p>An attack where a hacker intercepts and relays messages between two parties to steal data (C)</p> Signup and view all the answers

What is the definition of an advanced persistent threat (APT)?

<p>An attack where a hacker gains unauthorized access to a system and remains undetected for an extended period (D)</p> Signup and view all the answers

What is the definition of information security (InfoSec)?

<p>The processes and tools designed to protect sensitive business information from modification, disruption, destruction, and inspection (A)</p> Signup and view all the answers

Who created the I LOVE YOU worm in the year 2000?

<p>Onel De Guzman (A)</p> Signup and view all the answers

Which of the following is considered an insider threat?

<p>An employee who abuses their access permissions (D)</p> Signup and view all the answers

What is the purpose of the DISCLAIMER section in the text?

<p>To indicate that the following material was copied with permission from a presentation (C)</p> Signup and view all the answers

Which of the following best describes cybersex based on the provided text?

<p>Engaging in sexual activity using a computer system for favor or consideration (C)</p> Signup and view all the answers

Why does recording sexual acts with consent from real-life partners not constitute cybersex?

<p>Because there is no element of 'engagement in business' (D)</p> Signup and view all the answers

What differentiates child pornography from cybersex according to the text?

<p>Child pornography depicts children in explicit sexual activities (A)</p> Signup and view all the answers

Why are 'hentai' clips considered a violation of the Anti-Child Pornography Act as per R.A. 9775?

<p>Because they represent children engaged in simulated explicit sexual activities (A)</p> Signup and view all the answers

In the context of R.A. 10175, what distinguishes 'hentai' clips from child pornography?

<p>'Hentai' clips involve simulated explicit sexual activities but not real children (C)</p> Signup and view all the answers

How does the presence of 'favor or consideration' differentiate actions that constitute cybersex from those that do not?

<p>Actions involving favor or consideration are considered cybersex (C)</p> Signup and view all the answers

What does the right to erasure or blocking entail?

<p>Suspend, withdraw, or order the blocking, removal, or destruction of personal information (A)</p> Signup and view all the answers

Under what circumstances can the right to erasure or blocking be invoked?

<p>When the data is incomplete, outdated, false, or unlawfully obtained (D)</p> Signup and view all the answers

What does the right to damages entitle a data subject to?

<p>Receive compensation for damages sustained due to mishandling of personal data (D)</p> Signup and view all the answers

What is the purpose of the right to data portability?

<p>Obtain a copy of data undergoing processing in a commonly used electronic format (D)</p> Signup and view all the answers

When can the right to damages be invoked?

<p>When personal data has been mishandled resulting in damages (B)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Use Quizgecko on...
Browser
Browser