Information Technology Flashcards

1
Q

What is the role of databases, data warehouses, and data marts in information systems?

A

Databases: Store organized data for business use.
Data Warehouses: Centralized databases combining data from multiple sources for analysis.
Data Marts: Subsets of data warehouses focused on specific areas for quick data analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are application controls and their purpose?

A

Application Controls:
Application controls are controls that are designed for a specific IT system. One example is Data validation checks (e.g., sales invoices, supplier codes) to prevent and report errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does IT support strategic business goals?

A

IT can be an opportunity or threat; its internal adoption impacts organizational strength or weakness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the main organizational changes driven by technological advancements?

A

Downsizing: Reduces the size of the organization as tasks become automated.
De-layering: Removal of management layers due to improved communication and delegation.
Outsourcing: External firms handle non-core tasks, allowing focus on core activities.
Restructuring: Can be vertical (merging functions) or horizontal (creating divisions) due to tech advancements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do technological advancements impact tasks, products, and services?

A

Tasks: Machines replace mechanical tasks; computers replace mental and intellectual tasks.
Products & Services: Businesses must adapt to tech advancements to stay competitive (e.g., Nokia vs. competitors; changes in TV technology).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some general controls to ensure IT system security?

A

Physical Access Controls: Secure rooms, fire protection.
Passwords: Use secure, regularly changed passwords.
Encryption: Protects data during transmission.
Firewalls: Blocks unauthorized access.
Anti-Virus Software: Prevents and removes viruses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the common threats to IT systems security?

A

Human Error: Mistakes in data entry or handling.
Technical Error: Hardware/software malfunctions.
Natural Disasters: Risk of environmental damage.
Sabotage/Criminal Damage: Theft or malicious attacks.
Deliberate Corruption: Viruses, hacking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the main components of Information Technology?

A

Computer Technology
Communications Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the different types of Information Systems (IS) and their purposes?

A

An information system (IS) is an interconnected set of components used to collect, store, process and transmit
data and digital information.

Transaction Processing Systems (TPS): Manage routine transactions (e.g., sales orders).
Management Information Systems (MIS): Provide routine information for planning and control.
Decision Support Systems (DSS): Assist in complex decision-making with forecasting models.
Executive Information Systems (EIS): Offer key data for executives.
Expert Systems (ES): Provide expert advice (e.g., medical or legal).
Enterprise Resource Planning (ERP): Integrate company-wide functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How has technology changed work methods and business interactions?

A

Virtual Companies: Operate without a physical hub; network of individuals linked via technology.
Online Social Media: Alters business models and marketing strategies; impacts traditional interactions.
Big Data: Analyzes large datasets to understand customer behavior and improve decision-making.
Artificial Intelligence (AI): Provides online assistance, solves routine problems, and aids decision-making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some types of Cybersecurity Threats?

A

Trojan Horse: A malicious program that appears harmless but causes damage or steals information. Signs include unexpected computer behavior.

Worm: A self-replicating malicious program that spreads across networks, causing widespread damage.

Trap Door: A flaw in software that allows unauthorized access by exploiting the defect.

Logic Bomb: Dormant code in software that activates under specific conditions to execute harmful actions like file deletion.

Time Bomb: A program set to trigger an action at a specific time or date.

Denial of Service (DoS): An attack aimed at making a service unavailable, disrupting access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly