System Inputs, Processes, Outputs, and Performance Quiz
29 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following refers to system characteristics such as speed, volume, capacity, availability, and reliability?

  • Inputs
  • Outputs
  • Processes (correct)
  • Performance

What type of flowchart is particularly useful in analyzing the adequacy of control procedures?

  • Organizational flowchart
  • Document flowchart (correct)
  • Illustrative flowchart
  • Business flowchart

Which of the following refers to hardware, software, and procedural controls that safeguard and protect the system and its data from internal or external threats?

  • Inputs
  • Processes
  • Outputs
  • Security (correct)

What is the primary purpose of a business flowchart?

<p>To show the steps that make up a business process, along with who's responsible for each step (D)</p> Signup and view all the answers

Which of the following refers to electronic or printed information produced by the system?

<p>Outputs (B)</p> Signup and view all the answers

What is the primary purpose of a document flowchart?

<p>To illustrate the flow of documents and information between areas of responsibility within an organization (A)</p> Signup and view all the answers

What is the primary goal of systems design?

<p>To build a system that is effective, reliable, and maintainable (B)</p> Signup and view all the answers

What is one of the considerations for user interactions in system design?

<p>Providing flexibility and anticipating future needs (C)</p> Signup and view all the answers

In terms of data considerations, what is recommended regarding data entry?

<p>Entering data into the system where and when it occurs (B)</p> Signup and view all the answers

Which factor determines whether a system is considered reliable?

<p>Handling errors adequately (B)</p> Signup and view all the answers

What is one of the characteristics of a maintainable system according to the text?

<p>Well designed, flexible, and developed with future modifications in mind (A)</p> Signup and view all the answers

Why is verifying data during input important according to the text?

<p>To catch errors immediately (D)</p> Signup and view all the answers

What is the definition of a man-in-the-middle attack?

<p>An attack where a hacker intercepts and relays messages between two parties to steal data (C)</p> Signup and view all the answers

What is the definition of an advanced persistent threat (APT)?

<p>An attack where a hacker gains unauthorized access to a system and remains undetected for an extended period (D)</p> Signup and view all the answers

What is the definition of information security (InfoSec)?

<p>The processes and tools designed to protect sensitive business information from modification, disruption, destruction, and inspection (A)</p> Signup and view all the answers

Who created the I LOVE YOU worm in the year 2000?

<p>Onel De Guzman (A)</p> Signup and view all the answers

Which of the following is considered an insider threat?

<p>An employee who abuses their access permissions (D)</p> Signup and view all the answers

What is the purpose of the DISCLAIMER section in the text?

<p>To indicate that the following material was copied with permission from a presentation (C)</p> Signup and view all the answers

Which of the following best describes cybersex based on the provided text?

<p>Engaging in sexual activity using a computer system for favor or consideration (C)</p> Signup and view all the answers

Why does recording sexual acts with consent from real-life partners not constitute cybersex?

<p>Because there is no element of 'engagement in business' (D)</p> Signup and view all the answers

What differentiates child pornography from cybersex according to the text?

<p>Child pornography depicts children in explicit sexual activities (A)</p> Signup and view all the answers

Why are 'hentai' clips considered a violation of the Anti-Child Pornography Act as per R.A. 9775?

<p>Because they represent children engaged in simulated explicit sexual activities (A)</p> Signup and view all the answers

In the context of R.A. 10175, what distinguishes 'hentai' clips from child pornography?

<p>'Hentai' clips involve simulated explicit sexual activities but not real children (C)</p> Signup and view all the answers

How does the presence of 'favor or consideration' differentiate actions that constitute cybersex from those that do not?

<p>Actions involving favor or consideration are considered cybersex (C)</p> Signup and view all the answers

What does the right to erasure or blocking entail?

<p>Suspend, withdraw, or order the blocking, removal, or destruction of personal information (A)</p> Signup and view all the answers

Under what circumstances can the right to erasure or blocking be invoked?

<p>When the data is incomplete, outdated, false, or unlawfully obtained (D)</p> Signup and view all the answers

What does the right to damages entitle a data subject to?

<p>Receive compensation for damages sustained due to mishandling of personal data (D)</p> Signup and view all the answers

What is the purpose of the right to data portability?

<p>Obtain a copy of data undergoing processing in a commonly used electronic format (D)</p> Signup and view all the answers

When can the right to damages be invoked?

<p>When personal data has been mishandled resulting in damages (B)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser