FINALS Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is Data?

A

Raw facts (e.g., employee number, total hours worked).
Alphanumeric, image, audio, and video data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Information?

A

Organized and processed data.
Provides additional value beyond individual facts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the transformation of Data to Information?

A

Organization of data through rules and relationships.
The process involves defining relationships to create useful information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 8 Characteristics of Quality Information

A

Accessible: Easily reachable by authorized users.
Accurate: Error-free information.
Complete: Contains all important facts.
Relevant: Important to decision-making.
Reliable: Trustworthy information.
Secure: Protected from unauthorized access.
Simple: Not overly complex to avoid information overload.
Timely: Delivered when needed.
Verifiable: Can be checked for correctness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

System vs Information System

A

System: Set of things working together.
Information System (IS): Interrelated components collecting, processing, storing, and disseminating data and
information.
Provides feedback for monitoring and control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 5 Components of an Information System:

A

Hardware
Software
Database
Network
People

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Give Examples of:
Hardware
Software
Database
Network
People

A

Hardware: Input/output devices, processor, operating system, media devices.
Software: Various programs and procedures.
Database: Data organized in the required structure.
Network: Hubs, communication media, network devices
People: Device operators, network administrators, and system specialists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Data Modeling

A

Considering what data to collect, its source, access, usage, and database performance
monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an Entity-Relationship (ER) Diagram

A

Popular data model depicting entities and their relationships.
Boxes represent data items/entities, and lines show relationships.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Data Flow Diagram (DFD)

A

Maps out the flow of information for a process or system.
Uses symbols to represent data inputs, outputs, storage points, and routes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Internet of Things (IoT)

A

Network of physical objects embedded with sensors, processors, and connectivity.
Enables data exchange between devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Client/Server

A

Multiple clients connect to a server for services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the Client/Server Architecture

A

Multiple platforms dedicated to special functions
(e.g., database management, printing).

Platforms called servers, accessible by all network computers.

Servers store applications, and data files, and have operating systems.

Servers distribute programs and data to client computers upon request.

Example: Application server holds inventory database for the specific application.

Client is any computer requesting services from servers.
Client communicates with multiple servers concurrently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Examples of Client/Server Architecture

A

Examples: Some of the services that utilize client servers are email, network printing, and the
World Wide Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What Architecture would be needed for:

A bank implementing an online banking system to provide its customers with the
ability to access their accounts, perform transactions, and manage their finances through the Internet.

A

In this case, a client-server architecture could be employed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Peer to Peer

A

Nodes can act as clients or servers, each requesting and providing services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a Peer-to-Peer (P2P) Network

A

Created when two or more PCs connect and share resources without a separate server.
Can be ad hoc (temporary connection) or permanent infrastructure.
Small office network or larger-scale network over the Internet.
Resources are shared directly between users without an intermediary server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are some examples of a Peer-to-Peer (P2P) Network

A

File-sharing networks like BitTorrent, where users can share files directly with each
other without relying on a central server.

A group of students collaborates on a research project using a peer-to-peer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What Architecture would be needed for:
A group of students collaborates on a research project.

A

Peer-to-Peer (P2P) Network
File Sharing: Each student contributes a portion of their research findings as files
to a shared folder. Other students can download and access these files directly from their peers.

Decentralized Communication: If one student’s computer goes offline, the others can still communicate and share files among themselves without relying on a central server.

Scalability: As more students join the project, the peer-to-peer network scales easily since each new participant becomes both a consumer and contributor to the shared resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the 6 Network Types

A

Personal Area Networks (PAN)
Local Area Networks (LAN)
Metropolitan Area Networks (MAN)
Wide Area Networks (WAN)
Campus Area Network (CAN)
Wireless Local Area Networks (WLAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a Personal Area Network (PAN):

A

Wireless networks for devices close to one person.
- Coverage: Smallest area, typically within a person’s workspace.
- Devices: Connects personal devices like laptops, smartphones, and tablets.
- Technology: Utilizes wireless technologies like Bluetooth or Infrared (IR).
- Purpose: Used for data sharing, communication, or control among personal devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a Local Area Network (LAN):

A

Connects computer systems within a small area.
Coverage: Small geographical areas like a home, office, or building.
Devices: Connects computers, printers, servers, and devices within the same location.
Technology: Typically uses Ethernet or Wi-Fi connections.
Purpose: Facilitates resource sharing, file sharing, and communication within a confined area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a Metropolitan Area Network (MAN)

A

Connect users in a geographical area.
Coverage: Covers a city or metropolitan area.
Devices: Connects multiple LANs or CANs across a larger geographical area.
Technology: Uses a combination of fiber optics, wireless, and high-speed technologies.
Purpose: Facilitates the connection between different LANs or CANs within a city for specific
services or businesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a Wide Area Network (WAN)

A

Connect large geographic regions.
Coverage: Spans across a wide geographical area, even across countries or continents.
Devices: Connects multiple LANs, CANs, and MANs over large distances.
Technology: Relies on long-distance communication technologies like leased lines, satellites,
and the internet.
- Purpose: Enables communication and data exchange between geographically dispersed
locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a campus area network (CAN)

A

A campus area network (CAN) is a computer network that spans a limited geographic area. CANs interconnect multiple local area networks (LAN) within an educational or corporate campus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is a wireless local-area network (WLAN)

A

A group of colocated computers or other devices that form a network based on wireless technology rather than wired connections. A Wi-Fi network is a type of WLAN; anyone connected to Wi-Fi while reading this webpage is using a WLAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the internet

A

Definition: The Internet is a global network that connects millions of private, public,
academic, business, and government networks. It is a vast network of networks that use standardized communication protocols.
Accessibility: The internet is a public network, accessible to anyone with an internet connection. It is open and available for general use.
Scope: The internet spans the entire globe, connecting users worldwide. It is not limited to a specific organization or group of users.
Usage: It is used for various purposes, including communication, information sharing, entertainment, online shopping, education, and more.
Security: While the internet has security protocols in place, it is generally more susceptible to security threats, as it is an open network with diverse users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the Extranet

A

Definition: An extranet is a private network that uses internet protocols and public networks but limits access to a specific group of authorized users. It extends an organization’s intranet to
users outside the organization.
Accessibility: The extranet is a restricted network that allows only authorized users, such as employees, customers, suppliers, or partners, to access specific resources and information.
Scope: The extranet is limited to a specific set of users or organizations. It provides a
controlled and secure environment for collaboration.
Usage: Extranets are commonly used for secure collaboration, sharing of confidential
information, joint project management, and communication between different organizations.
Security: Extranets focus on ensuring a higher level of security by restricting access to authorized users. Security measures like encryption and user authentication are commonly implemented.

29
Q

What is the intranet

A

An intranet can be defined as a private network used by an organization. Its primary purpose is to help employees securely communicate with each other, to store information, and to help collaborate.

30
Q

What is Cloud Computing

A

A computing environment providing software and storage as Internet services

31
Q

What are the 3 Cloud Computing Deployment Types

A

Public Cloud Computing
Private Cloud Computing
Hybrid Cloud Computing
Autonomic Cloud Computing

32
Q

What is Public Cloud Computing and its 3 types (S)

A

The service provider owns and manages infrastructure.
Types: IaaS, SaaS, PaaS.

33
Q

What is Private Cloud Computing

A

Single-tenant cloud can be on-premise or managed by a service provider.

34
Q

What is Hybrid Cloud Computing

A

Integrates both private and public clouds

35
Q

What is Autonomic Cloud Computing

A

Enabling technology for cloud computing.
IT systems manage themselves and adapt to changes.

36
Q

What are the 2 types of Information Systems Models?

A

Service Model
integrated Model

37
Q

What is a Service Model:

A

Information Systems department for technical support.
Divisions or departments responsible for their systems.

38
Q

What is an Integrated Model

A

The Information Systems department coordinates all Information Systems activities.
Develops/purchases systems, and defines overall strategy.

38
Q

What are the 3 Components of a Network

A

Devices
Media
Services.
Devices and media are physical elements (hardware).
Examples: laptop, PC, switch, router, wireless access point, cabling.

Services are communication programs (software) that run on networked devices.

Provide information in response to requests.
Examples: email hosting, and web hosting.

Processes provide functionality for directing and moving messages through the network.

Critical to network operation but less visible to users.

39
Q

What is Channel Bandwidth

A

Capacity of the communication path.
Measured in bits per second (bps).
Broad bandwidth allows more information exchange.
Broadband refers to high-speed, always-on Internet faster than dial-up.

39
Q

What is Communications Media

A

Selection depends on information volume, speed, data privacy, user mobility, and business requirements.

Guided (Wired) Transmission Media: Signals along a solid medium.

Wireless Transmission Media: Signals broadcast as electromagnetic radiation.

39
Q

What is the Open Systems Interconnection (OSI) Model

A

The OSI model is a standard reference model for telecommunications networks, defining seven layers of functions. Each layer adds specific functions to the communication process.

40
Q

What are the 7 OSI Model layers?

A
  1. Physical Layer:
    Conveys the bit stream at the electrical and mechanical level.
    Provides hardware means of sending and receiving data.
  2. Data Link Layer:
    Provides synchronization for the physical level.
    Furnishes transmission protocol knowledge and management.
  3. Network Layer:
    Handles routing of data at the packet level.
    Manages routing, forwarding, and addressing.
  4. Transport Layer:
    Manages end-to-end control and error checking.
    Ensures complete data transfer.
  5. Session Layer:
    Sets up, coordinates, and terminates conversations between applications.
    Deals with session and connection coordination.
  6. Presentation Layer:
    Ensures data passing through is in the appropriate format for the recipient application.

Presents data in a readable format from an application layer perspective.

  1. Application Layer:
    Identifies communication partners, and considers quality of service, user authentication, and
    privacy.
    Identifies constraints on data syntax, not the application itself.
41
Q

What is the Software Development Life Cycle (SDLC)

A

The Software Development Life Cycle (SDLC) is a structured process used by the software
industry to design, develop, and test high-quality software. It aims to produce software that meets or exceeds customer expectations within specified time and cost estimates.

42
Q

What are the 6 steps of the Software Development Life Cycle (SDLC)

A
  1. Planning and Requirement Analysis

Objective: Define project goals, gather requirements, and conduct feasibility studies.
Activities: Involve senior team members, customers, sales department, and domain
experts. Plan project approach and conduct a feasibility study.

  1. Defining Requirements:

Objective: Clearly define and document product requirements.
Artifact: Software Requirement Specification (SRS) document.
Activities: Approval of requirements from customers or market analysts.

  1. Designing the Product Architecture

Objective: Develop the best architecture based on the requirements.
Artifact: Design Document Specification (DDS).
Activities: Propose multiple design approaches, review by stakeholders, and select the best
design approach.

  1. Building or Developing the Product:
    Objective: Generate programming code as per the design.
    Activities: Actual development starts, and the product is built.
  2. Testing the Product

Objective: Identify, report, and fix product defects until it meets quality standards.
Activities: Subset of testing activities involved in all SDLC stages. Focus on defect
reporting, tracking, fixing, and retesting.

  1. Deployment in the Market and Maintenance:
    Objective: Formally release the product in the market.
    Activities: Release the product, deployment in stages, and testing in the real business
    environment.
43
Q

List the 2 SDLC Models:

A

Waterfall Model
V-Model

44
Q

List the Waterfall Model 6 Phases

A

Requirements
Design
Implementation
Testing
Deployment
Maintenance

Each phase must be completed before moving to the next

45
Q

What is a V-Model

A

The V-Model demonstrates the relationships between each phase of the development life cycle and its associated phase of testing. The horizontal and vertical axes represent time or project completeness (left-to-right) and level of abstraction (coarsest-grain abstraction uppermost), respectively.

46
Q

What are CASE Tools

A

CASE stands for Computer Aided Software Engineering. These tools automate various SDLC.

47
Q

What are the 3 types of CASE Tools

A
  1. Upper Case Tools
  2. Lower Case Tools: Used in implementation, testing, and maintenance stages.
  3. Integrated Case Tools: Helpful in all SDLC stages, from requirement gathering to testing
    and documentation.
48
Q

What is an Upper Case Tools

A

Used in planning, analysis, and design stages of SDLC.

49
Q

What is a Lower Case Tools

A

Used in implementation, testing, and maintenance stages.

50
Q

What is Integrated Case Tools

A

Helpful in all SDLC stages, from requirement gathering to testing
and documentation.

51
Q

What is a Central Repository

A

A central place of storage for product specifications, requirement
documents, reports, diagrams, and management-related information.

52
Q

What are the 11 types of CASE Tools

A
  1. Diagram Tools
  2. Process Modeling Tools
  3. Project Management Tools
  4. Document Tools
  5. Design Tools
  6. Configuration Management Tools
  7. Change Control Tools
  8. Programming Tools
  9. Prototyping Tools
  10. Maintenance Tools
  11. Quality Assurance Tools
53
Q

List 2 Popular CASE Tools:

A
  1. Entity Relationship Diagrams (ERD): Illustrates the logical structure of databases.
  2. Data Flow Diagram (DFD): Graphical representation of data flow in an information system.
53
Q

What is an Office Automation System

A

An office automation system is a tool that facilitates data movement between systems without human intervention.

54
Q

What are some benefits of an Office Automation System?

A

Benefits:
- Reduces manual effort
- Efficient data storage and retrieval
- Streamlines day-to-day tasks
- Speeds up information retrieval
Functions:
- Streamlines data storage and retrieval
- Retrieves information instantly
- Eliminates the need for paperwork
- Reduces data redundancy
- Allows multiple people to access data
- Reduces the possibility of errors

55
Q

What are the 8 reasons of Importance of Data Security

A
  1. Protection Against Unauthorized Access:
    - Prevents unauthorized individuals or entities from accessing sensitive information.
    - Ensures that only authorized personnel can view, modify, or delete data.
  2. Prevention of Data Loss:
    - Safeguards against accidental or intentional deletion, corruption, or loss of data.
    - Implements measures to recover lost data and maintain data integrity.
  3. Preservation of Privacy:
    - Safeguards personal and confidential information from being exposed to unauthorized
    individuals.
    - Protects against identity theft, fraud, and other privacy-related issues.
  4. Maintaining Business Continuity:
    - Minimizes the impact of security incidents, ensuring continuous business operations.
    - Reduces the risk of financial losses, reputational damage, and legal consequences.
  5. Compliance with Regulations:
    - Ensures adherence to legal and regulatory requirements related to data protection.
    - Avoids penalties and legal actions resulting from non-compliance.
  6. Preserving Customer Trust:
    - Builds and maintains trust with customers by safeguarding their sensitive information.
    - Enhances the reputation of the business as a responsible custodian of data.
  7. Protection Against Cyber Threats:
    - Guards against various cyber threats, including malware, ransomware, and phishing attacks.
    - Strengthens the overall cybersecurity posture of an organization.
  8. Securing Intellectual Property:
    - Protects proprietary information, trade secrets, and intellectual property from theft or
    unauthorized access.
    - Preserves the competitive advantage of businesses by safeguarding their unique assets.
56
Q

What is Data Security

A

Data security is the process of protecting corporate data and preventing data loss
through unauthorized access. It involves measures to defend against various types of threats,
including cyberattacks, natural disasters, and intentional or unintentional human actions.

57
Q

What is Disaster Management and Recovery

A

Disaster management and recovery in the context of data security involve planning
and strategies to mitigate the impact of disasters or security incidents. It includes backup strategies, data recovery plans, and measures to ensure business continuity.

58
Q

What are the 3 types of Disaster Management and Recovery?

A
  1. Natural Threats: Caused by natural disasters such as floods, earthquakes, and storms.
  2. Intentional Threats: Result from purposeful actions, including computer crimes, espionage,
    and identity theft.
  3. Unintentional Threats: Arise from accidental or unauthorized modifications of software or data.
59
Q

What are the 8 Plans and Strategies to Minimize Data Breaches

A
  1. Keep Only What You Need: Inventory and reduce the volume of stored information.
  2. Safeguard Data: Restrict access to sensitive information and conduct background checks.
  3. Destroy Before Disposal: Shred paper files and destroyed electronic media securely.
  4. Educate/Train Employees: Establish privacy policies, communicate them to employees, and
    provide training.
  5. Control Computer Usage: Restrict computer usage to business-related activities and block
    unauthorized software.
  6. Keep Security Software Up-To-Date: Regularly update security patches, use firewalls,
    antivirus, and anti-spyware software.
  7. Encrypted Data: Mandate encryption of all data transmissions, both ‘at rest’ and ‘in motion.’
  8. Manage Use of Portable Media: Allow only encrypted data on portable storage devices.
60
Q

What is Backing up Data

A

Backing up data is a crucial strategy to minimize the risk of data breaches. It
involves creating copies of data to ensure its availability in case of data loss or security
incidents.

61
Q

What are the 4 Backup Type

A
  1. Full Backup
  2. Incremental Backup
    backup time and storage requirements.
  3. Differential Backup
  4. Mirror Backup: Creates an exact copy of the source data set, storing only the latest version
    without tracking different versions.
62
Q

What is a Full Backup

A

Copies all data to storage, providing a complete set of media for restoration.

63
Q

What is an Incremental Backup

A

Copies only data that has changed since the last backup, reducing backup time and storage requirements.

64
Q

What is a Differential Backup

A

Copies data changed since the last full backup, storing more data than incremental backups.

65
Q

What is a Mirror Backup

A

Creates an exact copy of the source data set, storing only the latest version
without tracking different versions.