Final Examination IDE427 Systems Engineering PDF 2024-2025

Document Details

StreamlinedHelium

Uploaded by StreamlinedHelium

Colegio de San Juan de Letran

2025

Colegio de San Juan de Letran

Tags

systems engineering information systems exam final exam

Summary

This is a final exam for the IDE427 Systems Engineering course at the Colegio de San Juan de Letran, 1st semester 2024-2025. The exam covers true/false and identification questions related to information systems, business strategies, and operations. It's a PDF file.

Full Transcript

Colegio de San Juan de Letran Intramuros, Manila College of Engineering and Information Technology Industrial Engineering Program FINAL EXAMINATION...

Colegio de San Juan de Letran Intramuros, Manila College of Engineering and Information Technology Industrial Engineering Program FINAL EXAMINATION IDE427 – Systems Engineering 1st Semester, AY 2024 - 2025 Inst. Eunice Y. Gayoma, CIE Score: ____________ Name: _______________________________________ Section: ____________ Student No.: _______________________________________ Date: ____________ GENERAL DIRECTIONS / INSTRUCTIONS: ▪ Strictly no erasures. Write legibly. Use a black pen only. Place your bag in a designated area. LEARNING OUTCOMES: In this course, students will gain a thorough understanding of Information Systems and their role in organizations, including their integration into business strategies and operations. They will explore the System Development Life Cycle phases, learn about IS components and types, and evaluate methodologies. The course will also develop students' critical thinking, problem-solving, and communication skills, preparing them to design, develop, and manage IS within enterprises. I. TRUE OR FALSE (1 Point Each) Write T if the statement is true. Otherwise, write F. Write your answer in the blank space provided. 1. System Analysis is important in determining if the project should even get started. 2. System design takes the system requirements document created in the previous phase and develops the specific technical details required for the system. 3. In Testing, the result of this phase is an initial working program that meets the requirements laid out in the system-analysis phase and the design developed in the system-design phase. 4. SYSTEM TEST - where the different components of the system are tested to ensure that they work together properly. 5. UNIT TEST - which tests individual parts of the code for errors or bugs. 6. In Confidentiality, the assurance that the information being accessed has not been altered and truly represents what is intended. Page 1 of 7 Colegio de San Juan de Letran Intramuros, Manila College of Engineering and Information Technology Industrial Engineering Program 7. In Availability, this means that information can be accessed and modified by anyone authorized to do so in an appropriate timeframe. 8. World Wide Web allows businesses and individuals to use networks, including the internet, to promote and sell products services. 9. External Information is an example of Output in DSS. 10. In MIS they do the RIGHT THING. II. IDENTIFICATION (1 Point Each) Write your answer in the blank space provided. Do not abbreviate your answer. 1. Used by employees to record daily routine transactions in an organization. It is also used to make structured decisions 2. Is the major recipient of data from the lower-level systems which is mainly used by Senior Managers in unstructured decision-making. 3. Usually receives and utilizes the data it gets from the TPS. This is used by Managers to make semi- structured decisions. 4. Uses the same approach as DSS but is more focused on supporting executives in decision-making. 5. Cover a large area such as a City, Region, Country, or several countries. 6. Is a service on the internet that links information stored on different computers. 7. He conducts classes to teach people specific computer skills. 8. The first line of support for computer users in the company. Computer users who are having problems or need information can contact the help desk for assistance. 9. Helps the Organization. DO THINGS RIGHT Page 2 of 7 Colegio de San Juan de Letran Intramuros, Manila College of Engineering and Information Technology Industrial Engineering Program 10. The transaction is processed with immediate effect. 11. Systems for payments and funds transfers is an example of 12. They are the policies that govern the operation of a computer system. 13. It refers to such massively large data sets that conventional database tools do not have the processing power to analyze them 14. It is an organized collection of related information. It is an organized collection because, in a database, all data is described and associated with other data. All information in a database should be related as well; separate databases should be created to manage unrelated information. 15. The management of the flow of goods and services and includes all processes that transform raw materials into final products. It involves the active streamlining of a business's supply-side activities to maximize customer value and gain a competitive advantage in the marketplace. 16. It receives information from the computer and carries data that has been processed by the computer to the user. 17. It is a piece of equipment used to provide data and control signals to an information processing system, such as a computer or information appliance. 18. The main circuit board on the computer. 19. The most important System Software. 20. These are software that allows the user to accomplish some goal or purpose III. MULTIPLE CHOICE (1 Point Each) Encircle the correct answer. 1. It is a technology solution that manages and tracks a company's goods. This technology will integrate and manage purchasing, shipping, receiving, warehousing, and returns into a single system. Page 3 of 7 Colegio de San Juan de Letran Intramuros, Manila College of Engineering and Information Technology Industrial Engineering Program 34 A. Inventory Control System B. Order Entry System C. Production Scheduling System D. Logistic Management System 2. It is a technology solution that assigns different raw materials, resources, or processes to different products. 35 A. Inventory Control System B. Order Entry System C. Production Scheduling System D. Logistic Management System 3. This storage contains the programming needed to start a personal computer, which is essential for boot-up; it performs major input/output tasks and holds programs or software instructions. A. Read-only Memory B. Random Access Memory C. Optical Media Storage D. Solid-state storage 4. It is a communication system that transfers data between components inside a computer, or between computers. A. Bus B. ROM C. RAM D. CPU 5. It is essentially short-term memory where data is stored as the processor needs it. A. Read-only Memory B. Random Access Memory C. Optical Media Storage D. Solid-state storage 6. It was first invented in the 1990s and exchanges data over short distances using radio waves. It generally has a range of 100 to 150 feet. A. Infrared B. Airdrop C. Network D. Bluetooth 7. Information with no context is called? A. Knowledge B. Data C. Wisdom Page 4 of 7 Colegio de San Juan de Letran Intramuros, Manila College of Engineering and Information Technology Industrial Engineering Program D. Facts 8. Which of the following has the most memory? A. Kilobyte B. Megabyte C. Terabyte D. Gigabyte 9. What is a management information system? A. Use to perform and record business transactions in a day-to-day business. B. It is concerned with the long-term planning in an organization. C. Use the transaction data to produce information needed by Managers to run the business. D. support executives in decision-making 10. What is a transaction processing system? A. Use to perform and record business transactions in a day-to-day business. B. It is concerned with the long-term planning in an organization. C. Use the transaction data to produce information needed by Managers to run the business. D. Support executives in decision-making 11. They write, modify, and test code and scripts that allow computer software and applications to function properly. A. System Analyst B. Programmer C. Computer Engineer D. Computer Operator 12. He studies an organization's current computer systems and procedures and designs improvements to them. A. System Analyst B. Programmer C. Computer Engineer D. Computer Operator 13. A technology professional who is highly skilled in maintaining connectivity in terms of data, voice, calls, videos, and wireless services. A. Hardware Engineer B. Systems Engineer C. Software Engineer D. Network Engineer Page 5 of 7 Colegio de San Juan de Letran Intramuros, Manila College of Engineering and Information Technology Industrial Engineering Program 14. It can be accomplished by identifying someone through one or more of three factors: something they know, something they have, or something they are. A. Authentication B. Access Control C. Encryption D. Firewalls 15. It is in this phase that the business requirements are translated into specific technical requirements. A. Preliminary Analysis B. System Analysis C. System Design D. Programming 16. This phase includes training the users, providing documentation, and conversion from any previous system to the new system. A. Preliminary Analysis B. System Analysis C. Implementation D. Maintenance 17. This is where system updates and backups are performed regularly. A. Preliminary Analysis B. System Analysis C. Implementation D. Maintenance 18. It is a process of encoding data upon its transmission or storage so that only authorized individuals can read it. A. Authentication B. Access Control C. Encryption D. Firewalls 19. It protects all company servers and computers by stopping packets from outside the organization’s network that do not meet a strict set of criteria. A. Authentication B. Access Control C. Encryption D. Firewalls 20. It determines which users are authorized to read, modify, add, and/or delete information. A. Authentication Page 6 of 7 Colegio de San Juan de Letran Intramuros, Manila College of Engineering and Information Technology Industrial Engineering Program B. Access Control C. Encryption D. Firewalls -End- Prepared by: Checked by Approved by: Inst. Eunice Y. Gayoma, Asst. Prof. Katrina L. Lee Assoc. Prof. Jacqueline D. Reynoso, PhD CIE Faculty Chairperson Dean Name: _______________________________________ Section: ____________ Student No.: _______________________________________ Date: ____________ Page 7 of 7

Use Quizgecko on...
Browser
Browser