Summary

This document contains questions on information systems. It covers topics such as defining requirements, prioritizing requirements, feedback, and different terms.

Full Transcript

Introduction to Information Systems Module 24/25 In-Class revision “Sample Questions” Lecture # 1 & 2 Replace with scientific term: ✓ Collection of facts organized and processed in such a way that they have value beyond the individual facts themselves. (Information) ✓ Doin...

Introduction to Information Systems Module 24/25 In-Class revision “Sample Questions” Lecture # 1 & 2 Replace with scientific term: ✓ Collection of facts organized and processed in such a way that they have value beyond the individual facts themselves. (Information) ✓ Doing the objective correctly. (Effectiveness) ✓ Information from the system that is used to make changes to input or processing activities. (Feedback) ✓ Single set of hardware, software, databases, telecommunications, people, and procedures. (CBIS) ✓ An organized collection of facts and information, typically consisting of two or more related data files. (Database) Guess Who?? ✓ His role revolves around defining requirements and prioritizing requirements and getting feedback and approval on requirements. (Business Analyst) ✓ Contributes to audio and animation design. (Game Developer) ✓ Creates and maintains database standards and policies. (Database Administrator) ✓ Identifies possible security threats and determines the best security measures. (Cybersecurity consultant) ✓ Responsible for creating and maintaining the components of a website unseen by the user (Back-end developer) Replace with scientific term: Converting data into useful outputs. (Processing) Collection of facts organized and processed in such a way that they have value beyond the individual facts themselves. (Information) Awareness and understanding of a set of information. (Knowledge) Single set of hardware, software, databases, telecommunications, people, and procedures. (CBIS) Information from the system that is used to make changes to input or processing activities. (Feedback) Raw facts. (Data) Fundamental rethinking and radical redesign of business processes to achieve improvements in cost, quality, speed and service. (Business Process Reengineering/BPR) Using the resources optimally where resources could be memory, CPU, time and databases. (Efficiency) A computer network that is covers an area larger than LAN but smaller than WAN. (MAN) Information is delivered when it is needed. (Timely information) Complete: ▪ Single set of hardware, software, databases, telecommunications, people, and procedures configured to collect, manipulate, store, and process data into information is called CBIS. ▪ Effectiveness is doing the objective correctly. ▪ Internet is an example of a WAN network. ▪ Productivity, return on Investment and market Share are approaches to evaluate Successfulness of IS. Lecture #3 Replace with the scientific term: ✓ Houses CPU and memory. (System Unit) ✓ Temporary and volatile memory. (RAM) ✓ A single processor executes program instructions in a step-by-step manner. (Traditional/Serial processor) ✓ Simultaneous execution of two or more instructions. (Multiprocessing) ✓ Copy of programs, data, and information created in one secondary storage medium duplicated to another. (Backup) Replace with the scientific term: ✓ The central part of OS with completes control over everything in the system. (Kernel) ✓ Software programs—essential to effective management of the computer system such as backup files and antivirus protection. (System Utilities) ✓ permit more than one application to run at same time. (Multitasking OS) ✓ The ability to handle an increasing number of concurrent users smoothly. (Scalability) ✓ Control how memory is accessed and maximize the available memory and storage. (Memory Management) Complete: 1. Examples of output devices are monitors, printers, speakers and plotters. 2. Point-of-sale (POS) and Automatic teller machine (ATM) devices are considered input devices. 3. RAM memory is temporary and volatile. 4. Multiprocessing is simultaneous execution of two or more instructions. 5. The records are retrieved in any order in direct access. 6. Operating system coordinates the activities of hardware and programs. 7. ROM memory is nonvolatile. 8. Graphical user interface uses icons and menus to send commands to the computer system. Lecture #4 Replace with scientific term: ✓ An SDLC phase where the problem should be defined and causes as well. (System analysis) ✓ Test functioning of system as a whole. (System Testing) ✓ Old and new systems are run simultaneously until the end users and project coordinators are fully satisfied that the new system. (Parallel conversion) ✓ Tester has no knowledge of code. (Black box testing) ✓ System specifications from design stage are translated into software program code. (Implementation/Programming) Replace with scientific term: ✓ Focuses on streamlining the SDLC by eliminating much of the modeling and documentation overhead. (Agile) ✓ Eliminates staffing and personnel problems. (Outsourcing) ✓ A mock-up, or model that includes output and input specifications and formats (UI). (Non-operational prototype) ✓ software development methodology that focuses on building applications in a very short time through iterative prototyping development by automating revisions and changes. (RAD/Rapid Application Development) Replace with scientific term: ✓ Mock-up, or model that includes output and input specifications and formats. (Non- operational prototype) ✓ Structured and standardized process for all activities of any system development effort. (SDLC/ System Development Life Cycle) ✓ Describes system specifications that will deliver functions identified during systems analysis. (SRS/ System Requirements Specifications) ✓ Focuses on streamlining SDLC by eliminating much of modeling and documentation overhead and time spent on those tasks, such as scrum. (Agile) ✓ Eliminates staffing and personnel fluctuation problems. (Outsourcing) ✓ A general design for the entire system is performed and then project is divided into a series of distinct subprojects. (Parallel methodology) ✓ May be the only viable conversion solution in situations where activating the new system is an emergency or when the two systems cannot coexist under any conditions. (Direct Conversion) ✓ Phase during which a feasibility study is done. (System analysis) ✓ Includes post-implementation audit documents. (System maintenance) ✓ Process of changing from old system to new system. (System conversion) ✓ Methodology that focuses on building applications in a very short time through iterative prototyping development. (RAD/Rapid Application Development) ✓ The methodology in which the team proceeds sequentially from one phase to the next. (Waterfall methodology) Complete: 1. Gathering data about the existing system and defining the problem is done during the system analysis activity. 2. System design includes design of program, databases and architecture. 3. In agile, the analysis, design and implementation phases are performed concurrently. 4. CASE are tools to automate SW development and reduce repetitive work. 5. Parallel conversion incurs highest cost as end users must perform all daily functions with both systems. 6. Smaller version of system with minimal number of features is called operational prototype. Lecture #5 Replace with scientific term: 1. Legitimate-looking emails which lead users to fake web sites to get recipient to reveal personal data. (Phishing) 2. The computers taken over in DDoS attacks. (Zombies) 3. A form of hacking with clear criminal activity to steal data and corrupt systems. (crackers) 4. Low-cost commercial advertising for questionable products. (Spam) 5. Reside in active memory of a computer and duplicate themselves. (Worms) True or False: 1. Phishing is a low-cost method of marketing also used by many legitimate organizations. (F) 2. Users are responsible for obtaining and installing trojans to eliminate SW vulnerabilities. (F) 3. Increased computing environment complexity increases vulnerability to security incidents. (T) Complete: 1. Worms reside in active memory of a computer and duplicate themselves. 2. In general, Viruses are attached to files, so that when the infected file is opened, it executes. 3. Trojan are malicious code hidden inside seemingly harmless programs; users are tricked into installing. Lecture #6 Replace with scientific term: 1. A specialist in charge of the databases of an organization. (Database Administrator or DBA) 2. List of all the tables in the database, along with all the fields with primary and foreign keys identified. (Database schema) 3. A field that is defined to be unique for each entity. (Primary Key) 4. The main software package that supports a database management approach. (DBMS) 5. Database that collects business information from many sources in the enterprise, covering all aspects of the company’s processes, products and customers. (Data warehouse) 6. A group of programs used as an interface between a database and application programs or a database and the user. (DBMS) 7. Tools used to analyze data to reveal hidden patterns and trends in historical business activity. (Data mining) 8. Specifies structure of database content, used to create tables and define characteristics of fields. (Data Definition Language or DDL) 9. Used to Insert, update, delete, retrieve data from database. (Data Manipulation Language or DML) Complete: 1. A relational database organizes data in the form of related tables. 2. If files are maintained separately by different departments, then we will have some problems such as data redundancy, data inconsistency and data inflexibility. 3. Data mining analyzes data in data warehouse to reveal hidden patterns and trends in historical business activity. 4. A relational database is a series of related tables, stored together with a minimum of duplication.

Use Quizgecko on...
Browser
Browser