Information systems in the management of knowledge, ethics and crime Flashcards

1
Q

How are files organized on a computer system?

A

By hierarchy, record and entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain data redundancy and inconsistency.

A

Data redundancy (data hierarchy) is the presence of duplicated data in multiple diles, meanwhile data inconsistency (data entity) is when the same atribute has different values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Enumerate the problems with the traditional file environment.

A

Data redundancy and inconsistency, program-data dependence (when changes in program requires changes to data accessed by the program), lack of flexibility, poor security and lack of data sharing and availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What’s a database?

A

A database can be seen as a collection of data organized to serve many applications by centralizing data and controlling redundant data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What’s a DBMS?

A

A DBMS or Database Management System is all the interfaces between application programs and physical data files, that seprates logical and physical views of data and solves the problems of traditional file environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 2 capabilities of DBMS?

A

Querying and reporting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name the 2 types of DBMS you know.

A

RDBMS (Relational DBMS) and OODBMS (Object-Oriented DBMS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Show the differences between RDBMS and OODBMS.

A

The RDBMS stores only data in Entities, defined as tables that hold specific information and handle simpler data. The Entity type refers to the collection of entity that share a common definition.

The OODBMS stores data as Objects, handles larger and more complex data and stores not only data but also the methods to use it. Class describes a group of objects that have common relationships, behaviors and also have similar properties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 3 basic operations to develop useful sets of data in a RDBMS?

A

Select, join and project.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the capabilities of DBMS?

A

Data definition, data dictionary and data manipulation language and report generation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are we doing when we are streamlining complex groupings of data to minimize redundant dsta elements and awkward many-to-many relationships?

A

Normalization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What’s information policy?

A

Information policy specifies the organization’s rules for sharing, disseminating, acquiring, standardizing, classifying and inventorying information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What’s responsible for the specific rules and procedures through which data can be managed as an organizational resource?

A

Data administration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What’s responsible for defining and organizing the structure and content of the database and maintaining the database?

A

Database administration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can one ensure data quality?

A

Identify and correct erroneous data using data quality audits and data cleansing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the 2 traditional techniques to analyze large amounts of data from multiple systems?

A

Data warehousing (provide query, analysis and reporting tools from many cores) and data mining (focus on single subjects).

17
Q

Give a brief explanation of Business Intelligence.

A

Business Intelligence are all the tools for consolidating, analyzing and providing access to vast amounts of data to help users make better business decisions.

18
Q

What are the principal tools that BI use?

A

Query and report, ETL (Extraxt, Transform and Load), OLAP (Online Analytical Processing) and Data Mining

19
Q

What’s KM

A

KM or Knowledge Management is a multidisciplinary approach that takes a systematic view to the information assets of an organization.

20
Q

What’s KMS?

A

KMS or Knowledge Management System is a method for the improvement of business process performance that needs a data base and business intellegence to work.

21
Q

How can a company win costumer’s trust?

A

Customer’s trust is easily won by making sure that their information is collected, used and stored with the utmost care.

22
Q

Talk about GDPR.

A

GDPR also known as General Data Protection Regulation is a European regulation on personal data protection, that says that companies should take privacy in to account when designing, implementing and operating any technology which processes personal and confident data. This should be offered to the user by deafault.

23
Q

What are the recommendations for a more efficient data protection?

A

Data Classification, Encryption, Passwords, Approved Tools (ITC’s), Access Controls, Geograpic Rules, Data Detention, Data Minimization, Escalating Issues and Readiness and Training.

24
Q

Give a explanation of all types of information ethics.

A

Information Accuracy- deals with authentication and fidelity of information;

Information Property- deals with who owns information about individuals and how information can be sold and exchanged;

Information Accessibility- deals with what information a person has the right to obtain about others and how the information can be used;

Information Privacy- deals with collectiong, storing and disseminating information about individuals.

25
Q

What’s the differene between hacking and cracking?

A

Hackers break into computers without doing damages meanwhile crackers break into computer with the purpose of doing damage.

26
Q

Name the most common types of data crime.

A

Data Diddling - modifying data;

Salami Slicing - skimming small amounts of money;

Phreaking - making free long-distance calls;

Cloning - phone fraud using scanners;

Carding - stealing credit card numbers online;

Piggybacking - straling credit card numbers by spying;

Social Engineering - tricking employees to gain access;

Dumpster Driving - finding private info in garbage cans;

Spoofing - stealing passwords through false login page.

27
Q

Name the most common type of software attacks.

A

Viruses, Worms, Torjan Horses, Logic Bombs, Trap Doors, Denial-of-Service, Pest Ware, Adware, Spyware, Spam Ware, Spam, Cookies, Web Bugs, Phishing and Pharming.