Information Technology Flashcards
What is the role of databases, data warehouses, and data marts in information systems?
Databases: Store organized data for business use.
Data Warehouses: Centralized databases combining data from multiple sources for analysis.
Data Marts: Subsets of data warehouses focused on specific areas for quick data analysis.
What are application controls and their purpose?
Application Controls:
Application controls are controls that are designed for a specific IT system. One example is Data validation checks (e.g., sales invoices, supplier codes) to prevent and report errors.
How does IT support strategic business goals?
IT can be an opportunity or threat; its internal adoption impacts organizational strength or weakness.
What are the main organizational changes driven by technological advancements?
Downsizing: Reduces the size of the organization as tasks become automated.
De-layering: Removal of management layers due to improved communication and delegation.
Outsourcing: External firms handle non-core tasks, allowing focus on core activities.
Restructuring: Can be vertical (merging functions) or horizontal (creating divisions) due to tech advancements.
How do technological advancements impact tasks, products, and services?
Tasks: Machines replace mechanical tasks; computers replace mental and intellectual tasks.
Products & Services: Businesses must adapt to tech advancements to stay competitive (e.g., Nokia vs. competitors; changes in TV technology).
What are some general controls to ensure IT system security?
Physical Access Controls: Secure rooms, fire protection.
Passwords: Use secure, regularly changed passwords.
Encryption: Protects data during transmission.
Firewalls: Blocks unauthorized access.
Anti-Virus Software: Prevents and removes viruses.
What are the common threats to IT systems security?
Human Error: Mistakes in data entry or handling.
Technical Error: Hardware/software malfunctions.
Natural Disasters: Risk of environmental damage.
Sabotage/Criminal Damage: Theft or malicious attacks.
Deliberate Corruption: Viruses, hacking.
What are the main components of Information Technology?
Computer Technology
Communications Technology
What are the different types of Information Systems (IS) and their purposes?
An information system (IS) is an interconnected set of components used to collect, store, process and transmit
data and digital information.
Transaction Processing Systems (TPS): Manage routine transactions (e.g., sales orders).
Management Information Systems (MIS): Provide routine information for planning and control.
Decision Support Systems (DSS): Assist in complex decision-making with forecasting models.
Executive Information Systems (EIS): Offer key data for executives.
Expert Systems (ES): Provide expert advice (e.g., medical or legal).
Enterprise Resource Planning (ERP): Integrate company-wide functions.
How has technology changed work methods and business interactions?
Virtual Companies: Operate without a physical hub; network of individuals linked via technology.
Online Social Media: Alters business models and marketing strategies; impacts traditional interactions.
Big Data: Analyzes large datasets to understand customer behavior and improve decision-making.
Artificial Intelligence (AI): Provides online assistance, solves routine problems, and aids decision-making.
What are some types of Cybersecurity Threats?
Trojan Horse: A malicious program that appears harmless but causes damage or steals information. Signs include unexpected computer behavior.
Worm: A self-replicating malicious program that spreads across networks, causing widespread damage.
Trap Door: A flaw in software that allows unauthorized access by exploiting the defect.
Logic Bomb: Dormant code in software that activates under specific conditions to execute harmful actions like file deletion.
Time Bomb: A program set to trigger an action at a specific time or date.
Denial of Service (DoS): An attack aimed at making a service unavailable, disrupting access.