exam 2 review questions Flashcards

1
Q

why do you need to know about databases?

A

they are everywhere,
we access dozens, if not hundreds, everyday

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is a database?

A

a set of logically related data stored in a shared repository

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is a database management system (DBMS)?

A

a program that creates, processes, and administers databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

how do database applications make databases more useful?

A

forms, reporting, queries, and application programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are the basic types of processes?

A

workgroup, enterprise, and inter-enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

how can information systems improve process quality?

A
  1. performing an activity (partially or completely automated)
  2. augmenting human performing activity
  3. controlling data quality (ensure data is complete and correct)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

how do information systems eliminate the problems of information silos?

A
  1. integrate data into a single database
  2. revise application and data processes to eliminate duplicate data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are the challenges of implementing and upgrading enterprise information systems?

A
  1. collaborative management
  2. identify requirement gaps
  3. transition problems
  4. employee resistance
  5. new technology
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

how do CRM, ERP, and EAI support enterprise processes?

A

they help organizations fundamentally rethink how they work to dramatically improve customer service, cut operational costs, and become world-class competitors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is systems development?

A

the process of creating and maintaining information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

why is systems development difficult and risky?

A

many projects never finish, often over budget, some don’t accomplish goals, and there is a high risk of failure even w/ competent people following the appropriate methodology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what are the five phases of the S D L C?

A
  1. system definition
  2. requirement analysis
  3. component design
  4. implementation
  5. system maintenance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

how is systems definition accomplished?

A

by defining the system goals and scope, assessing feasibility, forming a project team, and planning the project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is the users’ role in the requirements phase?

A

interviews

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

how are the five components designed?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

how is an information system implemented?

A

pilot, phased, parallel, or plunge

17
Q

what are the tasks for system maintenance?

A

record requests for change (failures, enhancements), prioritize requests, & fix failures (patches, service packs, new releases)

18
Q

what are some of the problems with S D L C?

A

SDLC Waterfall Method
requirements documentation difficult
scheduling and budgeting difficulties

19
Q

what is the goal of info. systems security?

A

find appropriate trade-off between risk of loss and cost of implementing safeguards

20
Q

how big is the computer security problem?

A

the average computer crime costs increases every year

21
Q

how should you respond to security threats?

A

create strong/multiple passwords, send no valuable data via email or IM, demonstrate security concern, etc.

22
Q

how can technical safeguards protect against security threats?

A

identification & authentication
encryption
firewalls
malware protection
design for secure applications

23
Q

how can data safeguards protect against security threats?

A

define data policies
data rights & responsibilities
rights enforced by user accounts authenticated by passwords
data encryption
backup & recovery procedures
physical security

24
Q

how can human safeguards protect against security threats?

A

account administration,
safeguard for employees and nonemployees

25
Q

how should orgs. respond to security incidents?

A

speed, preparation pays, don’t make problem worse