Technology Trends and Concepts Quiz
32 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which component of a computer system is considered the main component that connects all others?

  • Hard Drive
  • Motherboard (correct)
  • Power Supply
  • Central Processing Unit
  • What type of system uses data from a Transaction Processing System to create reports for management decision-making?

  • Management Information System (correct)
  • Data Warehouse
  • Customer Relationship Management System
  • Decision Support System
  • What is the main purpose of an embedded system?

  • To perform a specific task (correct)
  • To allow users to run various applications
  • To perform multiple tasks simultaneously
  • To manage a local network
  • Which memory type is classified as primary memory?

    <p>ROM</p> Signup and view all the answers

    What does the term 'platform' refer to in the context of computer systems?

    <p>The combination of CPU and operating system</p> Signup and view all the answers

    Which of the following is not a benefit of information systems?

    <p>Increasing hardware costs</p> Signup and view all the answers

    What is the primary function of a compiler?

    <p>To convert source code into machine code</p> Signup and view all the answers

    Which type of software is characterized by its availability for free under the General Public License?

    <p>Open Source software</p> Signup and view all the answers

    Which law predicts the doubling of transistors on a computer chip every one and a half to two years?

    <p>Moore's Law</p> Signup and view all the answers

    What does digitisation primarily refer to?

    <p>The mass adoption of connected digital services</p> Signup and view all the answers

    Which of the following is not a component of Information Systems?

    <p>Cloud Storage</p> Signup and view all the answers

    What is a primary key in a database?

    <p>A key that ensures uniqueness in a database</p> Signup and view all the answers

    What is the meaning of 'Creative Destruction' according to Schumpeter?

    <p>A process that incessantly creates and destroys the economic structure</p> Signup and view all the answers

    Which of the following describes 'Knowledge' as per the content provided?

    <p>Understanding of rules needed to interpret information</p> Signup and view all the answers

    What is NOT an effect of Metcalfe's Law?

    <p>Increased costs of network maintenance</p> Signup and view all the answers

    Which type of database allows access to data through multiple tables without needing to reorganize?

    <p>Relational Database</p> Signup and view all the answers

    What is an intranet?

    <p>A private LAN for organization members</p> Signup and view all the answers

    What does HTTP stand for?

    <p>Hypertext Transfer Protocol</p> Signup and view all the answers

    Which protocol is predominantly used for most networks?

    <p>Ethernet</p> Signup and view all the answers

    What is the primary purpose of Search Engine Optimisation (SEO)?

    <p>To enhance the visibility of a website in organic search results.</p> Signup and view all the answers

    What is the function of a Domain Name?

    <p>To associate a unique name with an IP address</p> Signup and view all the answers

    What is a characteristic of cloud computing?

    <p>Is network based and takes place over the internet</p> Signup and view all the answers

    Which of the following accurately describes a Trojan Horse in computer security?

    <p>A program that simulates a trusted application while causing harm.</p> Signup and view all the answers

    What is a strategic information system?

    <p>An information system providing a competitive advantage</p> Signup and view all the answers

    What differentiates security from safety in the context of computer use?

    <p>Security refers to protecting data, while safety pertains to user behavior online.</p> Signup and view all the answers

    What is the main characteristic of the Prototyping system development approach?

    <p>Building the system incrementally through small iterative parts.</p> Signup and view all the answers

    Which of the following best describes a dynamic web page?

    <p>Shows different content with each visit</p> Signup and view all the answers

    Which technique is NOT a method of protecting intellectual property?

    <p>Data compression</p> Signup and view all the answers

    What is the role of an Internet Service Provider (ISP)?

    <p>To connect individuals and organizations to the internet</p> Signup and view all the answers

    What key factor differentiates pharming from phishing?

    <p>Pharming redirects users to fake web pages, while phishing uses deceptive emails.</p> Signup and view all the answers

    Which of the following is a characteristic of Big Data analytics?

    <p>Drawing actionable insights to inform business decisions.</p> Signup and view all the answers

    Which of the following statements best captures the concept of nonobvious relationship awareness?

    <p>Uncovering hidden connections between data that are not immediately visible.</p> Signup and view all the answers

    Study Notes

    • AI Revolution
    • Building the Digital Future
    • Compute and Connectivity Frontiers
    • Cutting-edge Engineering
    • A Sustainable World

    Convergence

    • The general process of becoming affordable and accessible

    Moore's Law

    • Predicts the number of transistors fitting on a computer chip will double every one-and-a-half to two years.

    Metcalfe's Law

    • The value or power of a network grows exponentially as a function of the number of network members.

    Effects of Metcalfe's Law

    • Smaller, cheaper processors
    • Bigger and more valuable networks
    • More applications and growth of the IT industry

    Digitisation

    • The mass adoption of connected digital services by consumers, enterprises, and government
    • Digitisation can play an important role in assisting policymakers to spur economic growth and employment.

    Creative Destruction

    • According to Schumpeter, the "gale of creative destruction" describes the process of industrial mutation that incessantly revolutionizes the economic structure from within, incessantly destroying the old one, incessantly creating a new one.

    Data

    • Raw facts and figures that on their own have no meaning
    • Data has meaning when processed and in context

    Information

    • Communication, decision-making, support business processes

    Knowledge

    • Understanding of rules needed to interpret information

    The DIKAR Model

    • The "Technology" View: Data → Information → Knowledge → Action
    • The "Business" View: Data → Information → Knowledge → Action

    Knowledge Types

    • Explicit (eg, documents & databases)
    • Tacit (rooted in experience & values)

    Database

    • Structured collection of related data
    • Database System- computer program for managing electronic databases

    Relational Database

    • A collection of tables from which data can be accessed in many different ways without having to reorganise the tables

    Boolean Values

    • "true" or "false"

    Basic Database Operations

    • Design
    • Data entries
    • Queries
    • Reports

    System

    • A set of processes that work together to produce an output

    Information System Inputs

    • The activity of gathering and capturing data

    Information System Processing

    • Converting or transforming data into useful outputs

    Information System Outputs

    • Useful information usually in the form of documents and/or reports

    Information System Components

    • Hardware
    • Software

    Transaction Processing System (TPS)

    • A type of information system that collects, stores, modifies, and retrieves data transactions.
    • Examples: sales order entry, payroll, shipping

    Management Information System (MIS)

    • An information system that uses data collected by TPS to create reports for managers to make routine business decisions.

    Information Management (IM)

    • Collecting and managing information from multiple sources and distributing it to multiple audiences.

    Information System Benefits

    • Gathering
    • Storing
    • Manipulating
    • Retrieving and communicating
    • Business rules

    Computer System Components

    • Motherboard (main component)
    • Central Processing Unit (CPU) - the "brain"
    • Arithmetic and logic unit (ALU)
    • Control unit
    • Registers
    • Memory (stores data during processing)
    • Primary memory:
      • Registers
      • RAM
      • ROM
      • Cache memory
    • Secondary memory (permanent storage)

    Storage Devices

    • Block storage devices (hard disks)
    • Optical storage devices (CDs, DVDs)
    • Flash storage devices (USB sticks, flash cards, SSDs)

    Embedded System

    • Microcontroller or microprocessor-based system designed for a specific task (e.g., fire alarm)

    Mobile Hardware

    • Central Processing Units (CPUs) optimized for low power environments.

    Levels of Abstraction

    • Algorithms --> high-level programming languages --> low-level languages (machine code, assembly language)

    Algorithms

    • Procedures for a tasks

    Operating Systems

    • Combination of CPU and operating system (OS)

    Open Source Software (OSS)

    • Software with source code made available, which usually allows users to modify and redistribute

    General Public License (GPL)

    • License under which Open Source software is available for free.

    Networks

    • Local Area Networks (LAN)
    • Wide Area Networks (WAN)
    • Intranet (private LAN for internal use)
    • Extranet (network connecting people inside and outside the company)

    Network Classifications

    • Topology
    • Protocol
    • Network Architecture

    Network Protocols

    • Ethernet Protocol
    • Transmission Control Protocol/Internet Protocol (TCP/IP).

    Network Architectures

    • Peer-to-peer (computers connect directly to each other)
    • Client-server (client computer sends information to a server)

    Firewalls

    • Network security systems monitoring and controlling network traffic.

    Internet Technologies

    • Backbones (high-speed data lines)
    • Internetworking (connecting separate networks)
    • Packet switching networks
    • Internet Service Provider (ISP)

    Hypertext Markup Language (HTML)

    • Standard language creating web pages, applications

    Domain Names

    • Unique names associated with IP addresses

    Hypertext Transfer Protocol Secure (HTTPS)

    • Secure protocol for transferring data

    Dynamic Web Pages

    • Display different content each time viewed.
    • Two types: Client-side, Server-side scripting

    Cloud Computing

    • Network-based computing taking place over the internet. (Remotely hosted, ubiquitous, commodified)

    E-commerce

    • Business involving transfer of information across the internet

    Bitcoin

    • New currency founded in 2009 by Satoshi Nakamoto

    Strategic Information Systems

    • Give owners a competitive advantage

    Porter's Five Forces

    • Threat of new entrants
    • Bargaining power of suppliers
    • Existing rivalry among competitors
    • Bargaining power of buyers
    • Threat of substitute products

    Search Engines

    • Internet-based tools indexing documents

    Search Engine Optimization (SEO)

    • Process affecting visibility of a website or page

    Pay Per Click (PPC)

    • Sponsored online advertising

    Computer Security

    • Protecting data from unauthorized access (confidentiality, integrity, availability)

    Security vs Safety

    • Security is protecting access. Safety is how people behave when using internet features.

    Logic Bombs

    • Instructions secretly incorporated into a program.

    Trojan Horses

    • Masquerades as a beneficial program while quietly doing harmful things

    Phishing (and Pharming)

    • Fake emails or web pages deceiving users.

    Rootkits

    • Collection of programs to mask intrusion and grab admin level access

    IT Architecture Considerations

    • Standardization: using similar products (vendors) for various people
    • Integration: Ensures data is not duplicated

    System Development Phases

    • Initiation
    • Analysis
    • Design
    • Development
    • Implementation
    • Maintenance

    Waterfall Model

    • Classic software development lifecycle approach

    Prototyping

    • Developing a small part of a system at a time

    Data Analysis Techniques

    • Profiling
    • Nonobvious relationship awareness
    • Mobile device growth

    Intellectual Property Protection

    • Trade secrets
    • Copyrights
    • Patents

    Ethical Decision Principles

    • (These are too numerous to summarize adequately.)

    Big Data, Analytics, and Smart Data

    • Big Data + Analytics = Smart Data

    Data Analytics

    • Analyzing data to draw meaningful, actionable insights

    Data Visualization

    • Using visual elements (charts, graphs) to represent data.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge on the latest technology trends, including the AI revolution, Moore's Law, and the effects of digitization. Explore key concepts such as convergence, Metcalfe's Law, and creative destruction in the tech industry. Perfect for anyone interested in understanding the future of technology.

    More Like This

    Use Quizgecko on...
    Browser
    Browser