29 Questions
Which of the following refers to system characteristics such as speed, volume, capacity, availability, and reliability?
Processes
What type of flowchart is particularly useful in analyzing the adequacy of control procedures?
Document flowchart
Which of the following refers to hardware, software, and procedural controls that safeguard and protect the system and its data from internal or external threats?
Security
What is the primary purpose of a business flowchart?
To show the steps that make up a business process, along with who's responsible for each step
Which of the following refers to electronic or printed information produced by the system?
Outputs
What is the primary purpose of a document flowchart?
To illustrate the flow of documents and information between areas of responsibility within an organization
What is the primary goal of systems design?
To build a system that is effective, reliable, and maintainable
What is one of the considerations for user interactions in system design?
Providing flexibility and anticipating future needs
In terms of data considerations, what is recommended regarding data entry?
Entering data into the system where and when it occurs
Which factor determines whether a system is considered reliable?
Handling errors adequately
What is one of the characteristics of a maintainable system according to the text?
Well designed, flexible, and developed with future modifications in mind
Why is verifying data during input important according to the text?
To catch errors immediately
What is the definition of a man-in-the-middle attack?
An attack where a hacker intercepts and relays messages between two parties to steal data
What is the definition of an advanced persistent threat (APT)?
An attack where a hacker gains unauthorized access to a system and remains undetected for an extended period
What is the definition of information security (InfoSec)?
The processes and tools designed to protect sensitive business information from modification, disruption, destruction, and inspection
Who created the I LOVE YOU worm in the year 2000?
Onel De Guzman
Which of the following is considered an insider threat?
An employee who abuses their access permissions
What is the purpose of the DISCLAIMER section in the text?
To indicate that the following material was copied with permission from a presentation
Which of the following best describes cybersex based on the provided text?
Engaging in sexual activity using a computer system for favor or consideration
Why does recording sexual acts with consent from real-life partners not constitute cybersex?
Because there is no element of 'engagement in business'
What differentiates child pornography from cybersex according to the text?
Child pornography depicts children in explicit sexual activities
Why are 'hentai' clips considered a violation of the Anti-Child Pornography Act as per R.A. 9775?
Because they represent children engaged in simulated explicit sexual activities
In the context of R.A. 10175, what distinguishes 'hentai' clips from child pornography?
'Hentai' clips involve simulated explicit sexual activities but not real children
How does the presence of 'favor or consideration' differentiate actions that constitute cybersex from those that do not?
Actions involving favor or consideration are considered cybersex
What does the right to erasure or blocking entail?
Suspend, withdraw, or order the blocking, removal, or destruction of personal information
Under what circumstances can the right to erasure or blocking be invoked?
When the data is incomplete, outdated, false, or unlawfully obtained
What does the right to damages entitle a data subject to?
Receive compensation for damages sustained due to mishandling of personal data
What is the purpose of the right to data portability?
Obtain a copy of data undergoing processing in a commonly used electronic format
When can the right to damages be invoked?
When personal data has been mishandled resulting in damages
Test your knowledge on the concepts of Inputs, Processes, Outputs, and Performance in the context of system characteristics and logical rules applied to transform data into meaningful information. Explore various aspects of system requirements and security measures.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free