Podcast
Questions and Answers
Which component of a computer system is considered the main component that connects all others?
Which component of a computer system is considered the main component that connects all others?
- Hard Drive
- Motherboard (correct)
- Power Supply
- Central Processing Unit
What type of system uses data from a Transaction Processing System to create reports for management decision-making?
What type of system uses data from a Transaction Processing System to create reports for management decision-making?
- Management Information System (correct)
- Data Warehouse
- Customer Relationship Management System
- Decision Support System
What is the main purpose of an embedded system?
What is the main purpose of an embedded system?
- To perform a specific task (correct)
- To allow users to run various applications
- To perform multiple tasks simultaneously
- To manage a local network
Which memory type is classified as primary memory?
Which memory type is classified as primary memory?
What does the term 'platform' refer to in the context of computer systems?
What does the term 'platform' refer to in the context of computer systems?
Which of the following is not a benefit of information systems?
Which of the following is not a benefit of information systems?
What is the primary function of a compiler?
What is the primary function of a compiler?
Which type of software is characterized by its availability for free under the General Public License?
Which type of software is characterized by its availability for free under the General Public License?
Which law predicts the doubling of transistors on a computer chip every one and a half to two years?
Which law predicts the doubling of transistors on a computer chip every one and a half to two years?
What does digitisation primarily refer to?
What does digitisation primarily refer to?
Which of the following is not a component of Information Systems?
Which of the following is not a component of Information Systems?
What is a primary key in a database?
What is a primary key in a database?
What is the meaning of 'Creative Destruction' according to Schumpeter?
What is the meaning of 'Creative Destruction' according to Schumpeter?
Which of the following describes 'Knowledge' as per the content provided?
Which of the following describes 'Knowledge' as per the content provided?
What is NOT an effect of Metcalfe's Law?
What is NOT an effect of Metcalfe's Law?
Which type of database allows access to data through multiple tables without needing to reorganize?
Which type of database allows access to data through multiple tables without needing to reorganize?
What is an intranet?
What is an intranet?
What does HTTP stand for?
What does HTTP stand for?
Which protocol is predominantly used for most networks?
Which protocol is predominantly used for most networks?
What is the primary purpose of Search Engine Optimisation (SEO)?
What is the primary purpose of Search Engine Optimisation (SEO)?
What is the function of a Domain Name?
What is the function of a Domain Name?
What is a characteristic of cloud computing?
What is a characteristic of cloud computing?
Which of the following accurately describes a Trojan Horse in computer security?
Which of the following accurately describes a Trojan Horse in computer security?
What is a strategic information system?
What is a strategic information system?
What differentiates security from safety in the context of computer use?
What differentiates security from safety in the context of computer use?
What is the main characteristic of the Prototyping system development approach?
What is the main characteristic of the Prototyping system development approach?
Which of the following best describes a dynamic web page?
Which of the following best describes a dynamic web page?
Which technique is NOT a method of protecting intellectual property?
Which technique is NOT a method of protecting intellectual property?
What is the role of an Internet Service Provider (ISP)?
What is the role of an Internet Service Provider (ISP)?
What key factor differentiates pharming from phishing?
What key factor differentiates pharming from phishing?
Which of the following is a characteristic of Big Data analytics?
Which of the following is a characteristic of Big Data analytics?
Which of the following statements best captures the concept of nonobvious relationship awareness?
Which of the following statements best captures the concept of nonobvious relationship awareness?
Flashcards
Convergence
Convergence
The general process of becoming affordable and accessible, making things available to a wider audience.
Moore's Law
Moore's Law
The prediction that the number of transistors on a computer chip doubles every one and a half to two years, leading to faster and more powerful computers.
Metcalfe's Law
Metcalfe's Law
The value or power of a network grows exponentially as the number of network members increases. More users lead to more connections and more value.
Digitization
Digitization
The mass adoption of connected digital services by consumers, businesses, and governments. It's the shift towards a digital world.
Signup and view all the flashcards
Creative Destruction
Creative Destruction
The process of constant innovation and disruption, where new technologies replace older ones. This creates new industries and destroys old ones.
Signup and view all the flashcards
Data
Data
Raw facts and figures that by themselves have no meaning. It needs to be processed and put into context to become useful.
Signup and view all the flashcards
Database
Database
A collection of related data organized in a structured way. Think of rows and columns like a spreadsheet.
Signup and view all the flashcards
Database System
Database System
A computer program that manages a database, allowing users to store, retrieve, and update information.
Signup and view all the flashcards
What is a TPS?
What is a TPS?
A type of information system that gathers, stores, modifies, and retrieves transactional data about an enterprise.
Signup and view all the flashcards
What is a Management Information System (MIS)?
What is a Management Information System (MIS)?
A system that uses data collected by a TPS to create reports that help managers make routine business decisions.
Signup and view all the flashcards
What is Information Management (IM)?
What is Information Management (IM)?
The process of collecting, managing, and distributing information from various sources to different audiences.
Signup and view all the flashcards
What is the motherboard?
What is the motherboard?
The main component of a computer system, often referred to as the 'motherboard'.
Signup and view all the flashcards
What is the CPU?
What is the CPU?
The brain of a computer, responsible for controlling and processing data.
Signup and view all the flashcards
What is an embedded system?
What is an embedded system?
A microcontroller or microprocessor-based system designed to perform a specific task.
Signup and view all the flashcards
What is an Algorithm?
What is an Algorithm?
A set of step-by-step instructions for completing a task.
Signup and view all the flashcards
What is Open Source Software?
What is Open Source Software?
Software with its source code freely available for study, modification, and distribution.
Signup and view all the flashcards
Intranet
Intranet
A private network designed for use by everyone within an organization, allowing for secure communication and sharing of information.
Signup and view all the flashcards
Extranet
Extranet
A network that connects people within a company with those outside the company, providing access to external resources and partners.
Signup and view all the flashcards
Peer-to-peer architecture
Peer-to-peer architecture
A type of network architecture where devices are connected equally and can share resources directly without a central server.
Signup and view all the flashcards
Client/server architecture
Client/server architecture
A type of network architecture where a central server manages resources and provides services to client computers.
Signup and view all the flashcards
Backbones
Backbones
High-speed data lines used to carry internet traffic, forming the backbone of the internet infrastructure.
Signup and view all the flashcards
Internetworking
Internetworking
The process of connecting separate networks to form a larger interconnected network.
Signup and view all the flashcards
Packet-switching
Packet-switching
A method of transmitting data where information is broken down into packets that travel independently and reassemble at the destination.
Signup and view all the flashcards
Dynamic web page
Dynamic web page
A type of web page that dynamically generates content based on user actions or other factors, providing personalized or up-to-date information.
Signup and view all the flashcards
What is Search Engine Optimization (SEO)?
What is Search Engine Optimization (SEO)?
Improving the visibility of a website or webpage in search engine results that are not paid for, also known as "natural" or "organic" results.
Signup and view all the flashcards
What is Pay-Per-Click (PPC)?
What is Pay-Per-Click (PPC)?
A type of online advertising where the advertiser only pays when a user clicks on their advertisement, often used on search engines.
Signup and view all the flashcards
What is Computer Security?
What is Computer Security?
Techniques used to protect computer data from unauthorized access, modification, or disclosure. Key principles include confidentiality, integrity, and availability.
Signup and view all the flashcards
What is a Logic Bomb?
What is a Logic Bomb?
A set of instructions secretly embedded in a program that execute when a specific condition is met, often with malicious intent.
Signup and view all the flashcards
What is a Trojan Horse?
What is a Trojan Horse?
A program disguised as legitimate software that can secretly damage your system or steal data.
Signup and view all the flashcards
What is Phishing?
What is Phishing?
A type of attack that uses fake emails or websites to deceptively obtain sensitive information from users.
Signup and view all the flashcards
What is Pharming?
What is Pharming?
A type of attack that redirects users to fake websites designed to steal their data or infect their computers.
Signup and view all the flashcards
What is a Rootkit?
What is a Rootkit?
A collection of programs used by hackers to gain administrator-level access to a computer and hide their presence.
Signup and view all the flashcardsStudy Notes
Technology Trends
- AI Revolution
- Building the Digital Future
- Compute and Connectivity Frontiers
- Cutting-edge Engineering
- A Sustainable World
Convergence
- The general process of becoming affordable and accessible
Moore's Law
- Predicts the number of transistors fitting on a computer chip will double every one-and-a-half to two years.
Metcalfe's Law
- The value or power of a network grows exponentially as a function of the number of network members.
Effects of Metcalfe's Law
- Smaller, cheaper processors
- Bigger and more valuable networks
- More applications and growth of the IT industry
Digitisation
- The mass adoption of connected digital services by consumers, enterprises, and government
- Digitisation can play an important role in assisting policymakers to spur economic growth and employment.
Creative Destruction
- According to Schumpeter, the "gale of creative destruction" describes the process of industrial mutation that incessantly revolutionizes the economic structure from within, incessantly destroying the old one, incessantly creating a new one.
Data
- Raw facts and figures that on their own have no meaning
- Data has meaning when processed and in context
Information
- Communication, decision-making, support business processes
Knowledge
- Understanding of rules needed to interpret information
The DIKAR Model
- The "Technology" View: Data → Information → Knowledge → Action
- The "Business" View: Data → Information → Knowledge → Action
Knowledge Types
- Explicit (eg, documents & databases)
- Tacit (rooted in experience & values)
Database
- Structured collection of related data
- Database System- computer program for managing electronic databases
Relational Database
- A collection of tables from which data can be accessed in many different ways without having to reorganise the tables
Boolean Values
- "true" or "false"
Basic Database Operations
- Design
- Data entries
- Queries
- Reports
System
- A set of processes that work together to produce an output
Information System Inputs
- The activity of gathering and capturing data
Information System Processing
- Converting or transforming data into useful outputs
Information System Outputs
- Useful information usually in the form of documents and/or reports
Information System Components
- Hardware
- Software
Transaction Processing System (TPS)
- A type of information system that collects, stores, modifies, and retrieves data transactions.
- Examples: sales order entry, payroll, shipping
Management Information System (MIS)
- An information system that uses data collected by TPS to create reports for managers to make routine business decisions.
Information Management (IM)
- Collecting and managing information from multiple sources and distributing it to multiple audiences.
Information System Benefits
- Gathering
- Storing
- Manipulating
- Retrieving and communicating
- Business rules
Computer System Components
- Motherboard (main component)
- Central Processing Unit (CPU) - the "brain"
- Arithmetic and logic unit (ALU)
- Control unit
- Registers
- Memory (stores data during processing)
- Primary memory:
- Registers
- RAM
- ROM
- Cache memory
- Secondary memory (permanent storage)
Storage Devices
- Block storage devices (hard disks)
- Optical storage devices (CDs, DVDs)
- Flash storage devices (USB sticks, flash cards, SSDs)
Embedded System
- Microcontroller or microprocessor-based system designed for a specific task (e.g., fire alarm)
Mobile Hardware
- Central Processing Units (CPUs) optimized for low power environments.
Levels of Abstraction
- Algorithms --> high-level programming languages --> low-level languages (machine code, assembly language)
Algorithms
- Procedures for a tasks
Operating Systems
- Combination of CPU and operating system (OS)
Open Source Software (OSS)
- Software with source code made available, which usually allows users to modify and redistribute
General Public License (GPL)
- License under which Open Source software is available for free.
Networks
- Local Area Networks (LAN)
- Wide Area Networks (WAN)
- Intranet (private LAN for internal use)
- Extranet (network connecting people inside and outside the company)
Network Classifications
- Topology
- Protocol
- Network Architecture
Network Protocols
- Ethernet Protocol
- Transmission Control Protocol/Internet Protocol (TCP/IP).
Network Architectures
- Peer-to-peer (computers connect directly to each other)
- Client-server (client computer sends information to a server)
Firewalls
- Network security systems monitoring and controlling network traffic.
Internet Technologies
- Backbones (high-speed data lines)
- Internetworking (connecting separate networks)
- Packet switching networks
- Internet Service Provider (ISP)
Hypertext Markup Language (HTML)
- Standard language creating web pages, applications
Domain Names
- Unique names associated with IP addresses
Hypertext Transfer Protocol Secure (HTTPS)
- Secure protocol for transferring data
Dynamic Web Pages
- Display different content each time viewed.
- Two types: Client-side, Server-side scripting
Cloud Computing
- Network-based computing taking place over the internet. (Remotely hosted, ubiquitous, commodified)
E-commerce
- Business involving transfer of information across the internet
Bitcoin
- New currency founded in 2009 by Satoshi Nakamoto
Strategic Information Systems
- Give owners a competitive advantage
Porter's Five Forces
- Threat of new entrants
- Bargaining power of suppliers
- Existing rivalry among competitors
- Bargaining power of buyers
- Threat of substitute products
Search Engines
- Internet-based tools indexing documents
Search Engine Optimization (SEO)
- Process affecting visibility of a website or page
Pay Per Click (PPC)
- Sponsored online advertising
Computer Security
- Protecting data from unauthorized access (confidentiality, integrity, availability)
Security vs Safety
- Security is protecting access. Safety is how people behave when using internet features.
Logic Bombs
- Instructions secretly incorporated into a program.
Trojan Horses
- Masquerades as a beneficial program while quietly doing harmful things
Phishing (and Pharming)
- Fake emails or web pages deceiving users.
Rootkits
- Collection of programs to mask intrusion and grab admin level access
IT Architecture Considerations
- Standardization: using similar products (vendors) for various people
- Integration: Ensures data is not duplicated
System Development Phases
- Initiation
- Analysis
- Design
- Development
- Implementation
- Maintenance
Waterfall Model
- Classic software development lifecycle approach
Prototyping
- Developing a small part of a system at a time
Data Analysis Techniques
- Profiling
- Nonobvious relationship awareness
- Mobile device growth
Intellectual Property Protection
- Trade secrets
- Copyrights
- Patents
Ethical Decision Principles
- (These are too numerous to summarize adequately.)
Big Data, Analytics, and Smart Data
- Big Data + Analytics = Smart Data
Data Analytics
- Analyzing data to draw meaningful, actionable insights
Data Visualization
- Using visual elements (charts, graphs) to represent data.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.