Summery Flashcards

1
Q

What are the components of an information system?

A

Technology (hardware, software, networks), people, and processes. These components work together to transform data into useful information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define systems thinking.

A

A holistic approach that considers the entire system, its components, and how they work together, focusing on inputs, processes, and outputs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between IT and IS?

A

IT (Information Technology) is a subset of IS (Information Systems). IT includes technology components, whereas IS integrates technology, people, and processes to transform data into information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the characteristics of valuable information?

A

Accessible, consistent, complete, timely, accurate, cost-effective, relevant, and clear.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain the DIKW pyramid.
Back:

A

Data: Raw facts.

Information: Processed data with context and relevance.

Knowledge: Insight derived from information, facilitating action.

Wisdom: Deep understanding and application of knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the role of information systems in organizations?

A

To support decision-making, improve processes, enhance productivity, and integrate functions across the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name three types of software and their purposes.

A

Operating Systems: Interface between hardware and applications (e.g., Windows, macOS).

Application Software: Performs tasks (e.g., Excel, Photoshop).

Enterprise Software: Manages organizational functions (e.g., ERP systems).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define big data and its importance.

A

Big data refers to extremely large datasets that are difficult to process with traditional tools. It enables insights and decision-making through advanced analytics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Porter’s Five Forces?

A

Competitive rivalry.

Threat of new entrants.

Threat of substitutes.

Bargaining power of buyers.

Bargaining power of suppliers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a competitive advantage?

A

A unique strength or position that allows an organization to outperform its competitors, often achieved through innovation, efficiency, or differentiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the types of competitive strategies according to Porter?

A

Cost leadership.
Differentiation.
Focus (niche market targeting).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define the value chain and its purpose.

A

The value chain outlines primary and support activities in a business to identify areas where value can be added to achieve competitive advantage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the main components of a computer’s hardware?

A

Input devices (keyboard, mouse).
Processing unit (CPU).
Storage (HDD, SSD).
Output devices (monitor, printer).
Communication devices (network cards).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of a database?

A

To organize, store, and retrieve data efficiently, enabling informed decision-making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the difference between client-server and peer-to-peer networks?

A

Client-server: Centralized structure where a server provides resources to clients.

Peer-to-peer: Decentralized structure where all nodes share resources equally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the components of the information security triad?

A

Confidentiality: Preventing unauthorized access.

Integrity: Ensuring data accuracy and reliability.

Availability: Ensuring authorized access when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is cybercrime, and give two examples.

A

Illegal activities conducted using computers or networks.

Examples: Phishing, ransomware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the Systems Development Life Cycle (SDLC)?

A

A process for planning, creating, testing, and deploying information systems, typically including:

Planning.
Analysis.
Design.
Implementation.
Maintenance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the difference between explicit and tacit knowledge?

A

Explicit: Easily communicated and documented (e.g., manuals).

Tacit: Intuitive and experience-based, difficult to articulate (e.g., skills, insights).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is SaaS (Software as a Service)?

A

A software distribution model where applications are hosted by a provider and accessed online (e.g., Google Workspace).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Explain the concept of e-commerce.

A

Buying and selling goods or services over the internet, including B2B, B2C, C2C, and B2G models.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is business process re-engineering (BPR)?

A

A strategy to analyze and redesign workflows and processes to improve efficiency and effectiveness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the four types of decision-making in organizations?

A

Strategic (long-term).
Tactical (mid-term).
Operational (short-term).
Ad-hoc (situational).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is blockchain technology?

A

A decentralized ledger system used to securely record transactions across multiple systems, best known for cryptocurrency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are the key differences between a traditional and flat organizational structure?

A

Traditional: Hierarchical, with clear layers of authority.

Flat: Fewer management layers, promoting collaboration and speed in decision-making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are examples of tools for business intelligence (BI)?

A

Data warehouses.
Dashboards.
Analytics software (e.g., Tableau, Power BI).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Define enterprise resource planning (ERP) systems.

A

Integrated systems used to manage core business processes in real-time, using a unified database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are the roles of CIO and CTO?

A

CIO: Oversees the overall IS strategy and ensures alignment with business goals.

CTO: Focuses on technological innovation and infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the importance of data hierarchy in databases?

A

It organizes data into levels (e.g., bits, fields, records, files, databases), ensuring clarity and efficiency in data management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Define cloud computing.

A

Delivering computing services (e.g., servers, storage, databases) over the internet, offering scalability, efficiency, and cost reduction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What are the primary goals of business intelligence (BI)?

A

Support better decision-making.
Identify trends and patterns.
Provide actionable insights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is the primary function of firewalls in cybersecurity?

A

To monitor and control incoming and outgoing network traffic based on predetermined security rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is the difference between a primary key and a foreign key in databases?

A

Primary Key: Uniquely identifies records in a table.

Foreign Key: Establishes relationships between tables by referencing a primary key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What are three main types of e-commerce?

A

B2B (Business-to-Business).
B2C (Business-to-Consumer).
C2C (Consumer-to-Consumer).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What are some examples of input and output devices?

A

Input: Keyboard, scanner, microphone.
Output: Monitor, printer, speakers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is the purpose of a feasibility study in SDLC?

A

To assess the practicality and potential success of a proposed project in terms of technical, economic, and operational aspects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is phishing?

A

A cyberattack that uses deceptive emails or websites to steal sensitive information like passwords or credit card numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Define “big data analytics.”

A

The process of examining large datasets to uncover patterns, correlations, and insights for decision-making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What are the three levels of decision-making in organizations?

A

Strategic: Long-term, top-level decisions.

Tactical: Mid-level planning and control.

Operational: Day-to-day execution and processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is the purpose of normalization in databases?

A

To organize data efficiently, minimize redundancy, and improve data integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What are the advantages of open-source software?

A

Cost-effective.
Flexible and customizable.
Community support and collaboration.

42
Q

Define intellectual property (IP) in the context of IS.

A

Creations of the mind (e.g., software, designs) that are protected legally to prevent unauthorized use.

43
Q

What is the function of a virtual private network (VPN)?

A

To create a secure, encrypted connection over the internet, protecting data from interception.

44
Q

What is the relationship between a transaction processing system (TPS) and an ERP?

A

TPS captures and processes day-to-day transactions, while ERP integrates this data for organization-wide access and analysis.

45
Q

Define “data warehouse.”

A

A central repository of integrated data from multiple sources, used for analysis and reporting.

46
Q

What is a denial-of-service (DoS) attack?

A

A cyberattack that overwhelms a system, making it inaccessible to users.

47
Q

What are examples of enterprise software?

A

ERP (Enterprise Resource Planning).
CRM (Customer Relationship Management).
SCM (Supply Chain Management).

48
Q

Describe batch processing vs. real-time processing.

A

Batch: Data processed in groups at specific times.

Real-time: Data processed immediately as it is entered.

49
Q

What is an imitation-resistant value chain?

A

A business strategy integrating unique processes or resources that are difficult for competitors to replicate.

50
Q

Define the concept of “digital divide.”

A

The gap between individuals or groups in access to or knowledge of digital technologies.

51
Q

What is machine learning in the context of AI?

A

A subset of AI that enables systems to learn and improve from data without explicit programming.

52
Q

What is “blockchain” commonly used for?

A

Securely recording transactions, often used in cryptocurrency and supply chain tracking.

53
Q

What are the primary risks of relying heavily on technology?

A

System failures.

Cybersecurity threats.

Overdependence reducing adaptability.

54
Q

What is SaaS, and how is it different from traditional software?

A

SaaS is subscription-based and accessed online, unlike traditional software that is installed locally.

55
Q

What is the purpose of a business continuity plan?

A

To ensure critical operations can continue or recover quickly after a disruption.

56
Q

What is the main goal of a cybersecurity policy?

A

To establish guidelines and practices for protecting organizational data and systems.

57
Q

Define “enterprise systems.”

A

Large-scale software solutions used to manage and integrate core business processes.

58
Q

What are “smart devices”?

A

Devices connected to a network, capable of sharing and processing data (e.g., IoT devices).

59
Q

What are examples of ethical concerns in IS?

A

Data privacy.
Intellectual property theft.
Digital surveillance.

60
Q

What is the primary role of a project manager in IS?

A

To ensure projects are completed on time, within budget, and meet objectives.

61
Q

What are key features of blockchain technology?

A

Decentralization.
Transparency.
Security through cryptography.

62
Q

Define “knowledge management system” (KMS).

A

A system that facilitates the organization and sharing of organizational knowledge.

63
Q

What is a “digital business landscape”?

A

The dynamic environment shaped by advancements in digital technology impacting businesses and consumers.

64
Q

What are the three categories of cybersecurity tools?

A

Prevention tools (e.g., firewalls).
Detection tools (e.g., intrusion detection systems).
Response tools (e.g., recovery software).

65
Q

Define customer relationship management (CRM).

A

A system that manages a company’s interactions with current and potential customers, enhancing customer satisfaction and loyalty.

66
Q

What are examples of tacit knowledge?

A

Insights, skills, and experiences that are difficult to document, such as leadership skills or creative intuition.

67
Q

What is the main difference between a public and private cloud?

A

Public Cloud: Shared infrastructure managed by third-party providers.

Private Cloud: Dedicated infrastructure for a single organization.

68
Q

What is “encryption” in cybersecurity?

A

The process of converting data into a coded format to protect it from unauthorized access.

69
Q

Define “decision support system” (DSS).

A

A computer-based system that supports managerial decision-making by providing relevant information and analysis tools.

70
Q

What is social engineering in the context of cybersecurity?

A

Manipulating individuals into divulging confidential information through deception or psychological tactics.

71
Q

What is the role of an information security officer?

A

To develop and oversee the implementation of security policies to protect organizational data.

72
Q

What are the types of intellectual property protection?

A

Copyrights.
Patents.
Trademarks.
Trade secrets.

73
Q

Define “smart contracts.”

A

Self-executing contracts with terms directly written into lines of code, typically used with blockchain technology.

74
Q

What are the stages of the technology adoption curve?

A

Innovators.
Early adopters.
Early majority.
Late majority.
Laggards.

75
Q

What is the difference between structured and unstructured data?

A

Structured: Organized, easy to search (e.g., databases).

Unstructured: Not organized, harder to analyze (e.g., videos, emails).

76
Q

Define “SCM” (Supply Chain Management).

A

A system managing the flow of goods, information, and finances through the supply chain to optimize efficiency.

77
Q

What are the benefits of cloud computing?

A

Scalability.
Cost efficiency.
Accessibility.
Disaster recovery.

78
Q

What is “Moore’s Law”?

A

The observation that the number of transistors on a microchip doubles approximately every two years, increasing computing power.

79
Q

What is ERP’s main advantage?

A

It integrates all business processes into a unified system, improving efficiency and decision-making.

80
Q

Define “data mining.”

A

The process of analyzing large datasets to discover patterns, correlations, or trends for decision-making.

81
Q

What is phishing, and how can it be prevented?

A

A cyberattack that tricks individuals into revealing sensitive information. Prevention includes user education, anti-phishing software, and vigilant email monitoring.

82
Q

What are examples of disruptive technologies?

A

AI and machine learning.
Blockchain.
Internet of Things (IoT).
3D printing.

83
Q

Define “enterprise architecture.”

A

A framework that aligns business processes and IT infrastructure to support an organization’s goals and strategy.

84
Q

What is the difference between a LAN and a WAN?

A

LAN (Local Area Network): A network confined to a small geographic area.

WAN (Wide Area Network): A network spanning large geographic areas.

85
Q

What are the components of a database management system (DBMS)?

A

Database engine.
Query language.
Reporting tools.
Data storage.

86
Q

What is the “triple constraint” in project management?

A

Time, cost, and scope; balancing these constraints is critical for project success.

87
Q

What are the types of wireless networks?
Back:

A

PAN (Personal Area Network).
LAN (Local Area Network).
MAN (Metropolitan Area Network).
WAN (Wide Area Network).

88
Q

Define “data governance.”

A

Policies and processes ensuring data quality, security, and proper management within an organization.

89
Q

What are examples of mobile application software?

A

Messaging apps (e.g., WhatsApp).
Productivity apps (e.g., Google Docs).
Navigation apps (e.g., Google Maps).

90
Q

What is the purpose of an SLA (Service Level Agreement)?

A

To define the level of service a provider must deliver, including performance metrics and responsibilities.

91
Q

Define “cyber resilience.”

A

The ability of an organization to prepare for, respond to, and recover from cyberattacks.

92
Q

What is “shadow IT”?

A

IT systems or solutions used within an organization without explicit approval from the IT department.

93
Q

What is the main function of a DNS (Domain Name System)?

A

To translate human-readable domain names into IP addresses.

94
Q

Define “agile methodology.”

A

A flexible software development approach emphasizing collaboration, iteration, and adaptability.

95
Q

What is a zero-day vulnerability?

A

A security flaw that is exploited before the vendor has released a patch or fix.

96
Q

What is “green computing”?

A

Practices and technologies to reduce environmental impact of IT, such as energy-efficient hardware and recycling.

97
Q

What is the purpose of a digital signature?

A

To verify the authenticity and integrity of a message, document, or software using encryption.

98
Q

Define “robotic process automation” (RPA).

A

Technology that uses software robots to automate repetitive tasks.

99
Q

What are the risks of IoT devices?

A

Security vulnerabilities.
Data privacy concerns.
Lack of standardization.

100
Q

What is the difference between data integrity and data security?

A

Data Integrity: Accuracy and consistency of data.

Data Security: Protection of data from unauthorized access or breaches.

101
Q
A