Fundamentals of Information Systems Quiz #1

In: Computers and Technology

Submitted By eddienielsen
Words 535
Pages 3
Info Quiz1
1 The process of defining relationships among data to create useful information requires ______ knowledge 2 _____ are people who create, use, and disseminate knowledge and are usually professionals in science, engineering, business, and other areas.
Knowledge workers

3 Data that can be used for a variety of purposes is said to be ______.
Flexible

4 In information systems, _____ is used to make changes to input or processing activities.
Feedback

5 ____ consists of computer programs that govern the operation of the computer.
Software

6 An _____ is a network based on Web technologies that allows only selected outsiders, such as business partners and customers, to access authorized resources of a company’s intranet.
Extranet

7 ____ is (are) considered to be the most important element in a computer-based information system.
People

8 ___ involves using information systems and the Internet to acquire parts and supplies. e-procurement 9 A set of integrated programs that manages vital business operations for an entire multisite, global organization. enterprise resource planning system

10 A(n) _____ is an organized collection of people, procedures, software, databases, and devices that support problem-specific decision making.
DSS

11 The ______ is an organized collection of people, procedures, software, databases, and devices to create, store, share, and use the organization’s knowledge and experience. knowledge management system

12 _____ is a branch of artificial intelligence that allows computers to recognize and act on patterns or trends.
Neural networks

13 Hiring an outside company to perform some or all of a systems development project is called _____
Outsourcing

14 The goal of the _____ phase of systems development is to gain a clear understanding of the problem to be solved or opportunity to be…...

Similar Documents

Accounting Information System Chapter 1

...Accounting Information Systems Chapter 1 The Information System: An Accountant’s Perspective 3 Introduction to Transaction Processing 31 Ethics, Fraud, and Internal Control 91 Chapter 2 I Chapter 3 1 CHAPTER The Information System: An Accountant’s Perspective nlike many other accounting subjects, such as intermediate accounting, accounting information systems (AIS) lacks a well-defined body of knowledge. Much controversy exists among college faculty as to what should and should not be covered in the AIS course. To some extent, however, the controversy is being resolved through legislation. The Sarbanes-Oxley Act (SOX) of 2002 established new corporate governance regulations and standards for public companies registered with the Securities and Exchange Commission (SEC). This wide-sweeping legislation impacts public companies, their management, and their auditors. Of particular importance to AIS students is the impact of SOX on internal control standards and related auditing procedures. Whereas SOX does not define the entire content of the AIS course, it does identify critical areas of study that need to be included for accountants. These topics and more are covered in the chapters of this text. The purpose of this chapter is to place the subject of AIS in perspective for accountants. Toward this end, the chapter is divided into three major sections, each dealing with a different aspect of information systems. The first section explores the information......

Words: 13048 - Pages: 53

Fundamentals of Information Systems Security

...Fundamentals of Information Systems Security CSS150-1302B-02 Phase 1 Discussion Board 2 Christopher Smith May 22, 2013 Hello all. At this time we are going to discuss three out of the seven domains of a typical IT infrastructure. The three that have I chosen to discuss have the greatest impact on your day to day work lives. The domains with the most impact are the user domain (you), the workstation domain (your computer), and the remote access domain (work from home users). The information within the seven domains is meant as internal use only. We at Richman Investments take the security of our, and our customer’s information very seriously. We will be discussing the three domains that are the most susceptible to attack. The human factor is the biggest variable in these domains. We will be discussing the safeguards put in place here at our firm. The largest of the three domains we will be discussing is the user domain. As stated above this means you. Included in our yearly security awareness training is a recap of our acceptable use policy (also found in your employee handbook). The acceptable use policy mandates what you cannot do on our network. This includes not using personal devices on any wired/wireless networks within our property, and using storage devices not provided to you by the company. Any files you need to access away from the office should be stored on our secure online storage system only. As the user it is your responsibility to be diligent and keep......

Words: 905 - Pages: 4

Lab 1 Questions for Fundamentals of Information Systems Security

...Lab 1 Assessment Questions 1. Name at least five applications and tools pre-loaded on the Windows 2003 Server Target VM and identify whether that application starts as a service on the system or must be run manually? Windows Applications Loaded | Starts as Service Y/N | FileZila Server | Y | Nmap | N | WireShark | N | WinPcap | N | Tenable Network Security | N | Tftpd32-SE | N | 2. What was the DHCP allocated source IP host address for the Student VM, DHCP Server, and IP default gateway router? a. Student – 10.96.108.20 b. TargetWindows01 – 10.96.109.30 c. TargetUbunto01 – 10.96.109.36 d. TargetUbuntu02 – 10.96.109.40 3. Did the targeted IP host respond to the ICMP echo-request packet with an ICMP echo-reply packet when you initiated the “ping” command at your DOS prompt? If yes, how many ICMP echo-request packets were sent back to the IP source? e. Yes. f. 4 4. If you ping the “WindowsTarget01” VM server and the “UbuntuTarget01” VM server, which fields in the ICMP echo-request / echo-plies vary? g. The TTL on Windows was 128 while on Ubuntu the TTL was 64. 5. What is the command line syntax for running an “Intense Scan” with ZenMap on a target subnet of 172.30.0.0/24? h. Nmap –T4 –A –V –PE –PS22, 25, 80 –PA21, 23, 80, 3389 10.96.109.30 6. Name at least 5 different scans that may be performed from the ZenMap GUI and document under what circumstances you would choose to run those......

Words: 415 - Pages: 2

: Ab #1 Fundamentals of Information Systems Security

...Assessment Worksheet 15 1 Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Using Zenmap GUI (Nmap) LAb #1 – ASSESSMENT WORKSHEET Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: Fundamentals of Information Security Lab due date: Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, you planned an attack on 172.30.0.0/24 where the VM server farm resides, and used the Zenmap GUI to perform an “Intense Scan” on the targeted IP subnetwork. Note: These forms have been formatted to allow you to complete the form online and save it using Adobe Reader. You may experience problems with either or both of these actions if you are using any other software program. Lab Assessment Questions & Answers 1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. windows applicaTion loaded 1. 2. 3. 4. 5. sTarTs as service Y/n q Yes q Yes q Yes q Yes q Yes q No q No q No q No q No FileZilla Server Interface Wire Shark Net Whitness Investigator 9.0......

Words: 647 - Pages: 3

Lab 3 Questions for Fundamentals of Information Systems Security

...1. What are the three fundamental elements of an effective access control solution for information systems? Identification, Authentication, and Authorization. 2. What two access controls can be setup for a Windows Server 2003 folders and authentication? Discretionary access control lists (DACLs that we configure for privileges Security association between client and server that is a process to verify someone who they claim they are. 3. If you can browse a file on a Windows network share but are not able to copy it or modify it what type of access controls and permissions are probably configured? What type of Access Control would best describe this access control situation? List Folder Contents and Security Policy based control. 4. What is the mechanism on a Windows Server where you can administer granular policies and permissions on a Windows network using role-based access? Group Policy Editor. 5. What is two-factor authentication and why is it an effective access control technique? Two Factors sometimes uses three characteristics in Authentication types Knowledge, Ownership, Characteristics. 6. Relate how Windows Server 2008 R2 Active Directory and the configuration of access controls achieve C-I-A for departmental LANs, departmental folders, and data. The security principals in the active directory domain partition. 7. Is it a good practice to include the account or user name in the password? Why or why not? It is not a good idea to......

Words: 354 - Pages: 2

Fundamentals of Information Systems Security

...Assessment Worksheet 15 1 Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Using Zenmap GUI (Nmap) LAb #1 – ASSESSMENT WORKSHEET Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: student Name: Instructor Name: Lab due date: Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, you will explore the Virtual Security Cloud Lab (VSCL). You will learn how to access several different applications, including PuTTY and the Zenmap Graphical User Interface (GUI) for the Nmap Security Scanner application. You will use the data you uncover to plan an attack on 172.30.0.0/24 where the VM server farm resides. Lab Assessment Questions & Answers 1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. windows applicaTion loaded 1. 2. 3. 4. 5. sTarTs as service Y/n q Yes q Yes q Yes q Yes q Yes q No q No q No q No q No 2. What was the allocated source IP host address for the TargetWindows01 server, LAN Switch 1, LAN Switch 2, and the IP default......

Words: 489 - Pages: 2

Fundamentals of Information Systems

...University of Phoenix Material Database Records and Relational Data Worksheet Complete Parts A and B of this worksheet. Cite any outside sources consistent with APA guidelines. Part A: Database Records l Answer the following patient information questions using the table provided. Refer to figure 4-10 on p. 83 of Health Information Technology and Management for assistance. 1. What patient resides in California? What is the patient number? Sofia Yakaria Pallares live in California. Her patient number is 10259. 2. Who is the provider of Sofia Yakaria Pallares? What credentials does her provider have? Sofia’s provider is Ruth Ann Raymond, her credentials are; MD. 3. What patient was seen on 11/05/2010? What is the patient’s date of birth? John Peters was seen on 11/05/2010. His date of birth is 5/25/1965. 4. What date and time did patient #1298 visit the doctor’s office? What is the patient’s name and date of birth? Lucy Ann Johnson was born on 6/12/1975. She was seen by a doctor on 06/04/2011 5. What patient lives in 1704 N. Atlantic Ave Ontario, AZ 85320? What is its encounter number? John Peters lives on 1704 N. Atlantic Ave in Ontario, AZ. His encounter number is 111218. Patient Info Table | Pat# | Last_Name | First_Name | Middle_Name | Birthdate | 10259 | Pallares | Sofia | Yakaria | 9/18/1985 | 30528 | Peters | John | | 5/25/1965 | 1298 | Johnson | Lucy | Ann | 6/12/1975 | Patient Address Table | Pat# | Address | City...

Words: 901 - Pages: 4

Fundamental Concept of Information System

...LECTURE 1 Fundamental Concepts of Information Systems Learning Objectives     Understand the concept of a system and how it relates to information systems Explain major components of an information system Present major types of information systems in the business world Explain how a firm can use IT to gain competitive advantages What is a system?  A system     Is a set of interrelated components With a clearly defined boundary Working together to achieve a common set of objectives By accepting inputs and producing outputs in a transformation process A computer, an organization  Example:  What is an Information System?  An organized combination of…      People Hardware and software Communication networks Data resources Policies and procedures Collects, processes, stores, and disseminates information in an organization  This system…  Information systems model Components of an IS  People Resources   End users: the people who use the IS or the information from the IS IS specialists: the people who develop and operate IS All physical devices used in information processing Machines, data media, peripherals All information processing instructions including programs and procedures System software, application software and procedures  Hardware Resources    Software Resources   Components of an IS (cont.)  Data Resources    Facts about the business......

Words: 1291 - Pages: 6

Managment Information System 1

...Question 1) (10.5/12) Cloud computing is where software and storage are provided by internet services and are accessed with a web browser. RDM would pay a fee to the supplier that would be far less expensive and time consuming then if they continue in their current situation. RDM remote access systems for consultants are unreliable, they has employed a local IT contractor to maintain its internal system which includes backup files on a weekly bases. The backup protocol is old and once per week is inefficient. IT is not RDM’s core business, they are a small firm management consulting firm and there is the matter of the cost for a new system that they may not be able to afford. Employing an experience and reputable company that offers Cloud computing should be an option that RDM explores. 1.5 /3 Yes, it is appropriate, since RDM’s client base spans across Canada and the United States. Reliable remote access from any location to systems is important. B) The method of Community Cloud computing is several businesses share resources or Private Cloud would be two of the choices that I would recommend. RDM has only 15 employees, costs are important in deciding on what deployment method to use. They have had a system that was not the most efficient for ten years and stayed faithful, now they are looking to upgrade which means the business may be looking to expand. A Community Cloud would cost less and may have more resources available to the group than a Private Cloud...

Words: 1691 - Pages: 7

Information Systems Week 2 Quiz

... Grade Details - All Questions Question 1. Question : Which of the following choices may lead to competitive advantage (1) new products, services and business models; (2) charging less for superior products; (3) responding to customers in real time? Student Answer: 1 only 1 and 2 2 and 3 1, 2, and 3 Instructor Explanation: p. 15 Points Received: 1 of 1 Comments: Question 2. Question : An information system can be defined technically as a set of interrelated components that collect (or retrieve), process, store, and distribute information to support Student Answer: decision making and control in an organization. communications and data flow. manager's analysis of the organization’s raw data. the creation of new products and services. Instructor Explanation: p. 15 Points Received: 1 of 1 Comments: Question 3. Question : The three activities in an information system that produce the information that organizations use to control operations are Student Answer: information retrieval, research, and analysis. input, output, and feedback. input, processing, and output. data analysis, processing, and feedback. Instructor Explanation: p. 16 Points Received: 1 of 1 Comments: Question 4. Question : The fundamental set of assumptions, values, and ways of doing......

Words: 999 - Pages: 4

Module 1 Quiz Systems

...1 * Question 1 0 out of 1 points | | | Your text classifies information systems as being either operations or management information systems. Using this conceptual classification, operations support systems produce a variety of information products for internal and external use. Their main emphasis is to produce the specific information products that can best be used by managers. | | | | | Selected Answer: |  True | Correct Answer: |  False | | | | | * Question 2 0 out of 1 points | | | Information technology primarily helps for-profit businesses improve the efficiency and effectiveness of their business processes, managerial decision making, and workgroup collaboration and thus strengthen their competitive positions in a rapidly changing marketplace. | | | | | Selected Answer: |  True | Correct Answer: |  False | | | | | * Question 3 1 out of 1 points | | | In an information system, software resources would include all of the following except: | | | | | Selected Answer: |  Telecommunications networks. | Correct Answer: |  Telecommunications networks. | | | | | * Question 4 0 out of 1 points | | | Decision support systems are defined as computer-based information systems that use management models and shared databases to assist the decision-making processes of all end users by providing them with information on an ad hoc (as needed) basis. | | | | | Selected Answer: |  True | ......

Words: 963 - Pages: 4

Cis 207 Information Systems Fundamentals Entire Course

...CIS 207 Information Systems Fundamentals Entire Course http://homeworkfy.com/downloads/cis-207-information-systems-fundamentals-entire-course/ CIS 207 Information Systems Fundamentals Entire Course CIS 207 WEEK 1 DQS DQ 1 According to Healey (2010), what factors influence the deployment and acceptance of enterprise social networking systems, such as the Microsoft® SharePoint® system? How might businesses use this technology in the future? DQ 2 Based upon Bidokhti’s (2008, January) article, the reliability and availability requirements are absolutely essential at the start of the of product development life cycle (PDLC) process. This is very similar to requirements for the SDLC. If you were developing a new business information system, how does the requirements stage of PDLC/SDLC affect the final outcome of the project, and why are they so important DQ 3 Describe the major activities of the systems development life cycle (SDLC). Why would it be important to follow a structured approach to development? DQ 4 Why is it important for everyone in business organizations to have a basic understanding of the systems development process? DQ 5 What are your career goals, and how can a computer-based information system be used to achieve them CIS 207 WEEK 2 Individual Assignment Information Systems Paper Write a 750-1050 word paper identifying and describing how information systems support the business processes in an organization. Describe the business processes......

Words: 1365 - Pages: 6

Quizs and Interactive Sessions - Information Systems

...Q1: UPS 1 What are the inputs, processing, and outputs of UPS’s package tracking system?  INPUTS: barcoded label (which has all the information regarding addresses, names and other info of the packages, all of this translated into a barcode). PROCESSING: the DIAD. OUTPUT: the information about the package (which was firstly translated into a barcode) that can be read by the DIAD, and so, the DIAD displays the addresses, names, etc. 2 What technologies are used by UPS? How are these technologies related to UPS’s business strategy?  The technologies used by UPS are data management technology, networking and telecommunications technology, IT infrastructure and computer hardware and software. These technologies are related to their business strategy because they will be able to be more efficient and maintain high levels of customer service, while keeping costs low (e.g. avoiding pakages to go to wrong locations). 3 What business objectives do UPS’s information systems address? This UPS's information system addresses as objectives: operational excellence, customer and supplier intimacy and, finally, a competitive advantage. 4 What would happen if these systems were not available?  If these systems were not available, UPS would not be able to be so efficient, it would not serve customers that well, it would not be so productive and consequently, it would not be that competitive. Q2: FEDEX 1 List the Business Processes displayed in the Video? When a package......

Words: 2226 - Pages: 9

Fundamentals of Information Technology Module 1

...System Analysis Design for a Library System Suppose you are helping to develop a library system for your community. Here is a brief description of various scenarios using this library system. • Bob wanted to become a member at his local library. He went in and filled out an application form with his name, address, phone number, and driver's license number and gave it to the librarian, Alice. Alice logged into the system with her id and created a new membership for Bob. She then provided Bob with his new library card, and a login and password to his account. • Bob wanted to borrow two novels by C.S. Lewis, but he couldn’t remember their names. He used one of the computers at the library to search for the books by using the author's name. He found the titles he wanted, which were “The Chronicles of Narnia” and "The Space Trilogy". The first book was shown as available, and the second book was shown as out on loan. • Using his new login and password, Bob logged into his account and requested the book "The Space Trilogy" in order to recall it, so that when the book was returned it would be held for him at the library. • Bob then went to the stacks and found the book "The Chronicles of Narnia" on the shelf, and waited in line at the desk to check it out. He presented his ID card, and checked out the book with the librarian. • Before leaving the library, Bob saw his friend Simon. He chatted with Simon (quietly), and asked if he was a member and came to the library...

Words: 588 - Pages: 3

Management Information System Chapter 1

...An example of a business using information systems to attain competitive advantage is: A) JC Penny's information system that allows its contract manufacturers to see what garments have been sold and need to be replaced. B) Toyota's legendary TPS that has created superlative efficiencies and enabled Toyota to become the world's largest auto maker C) Verizon's Web-based digital dashboard providing real-time company information for managers. D) Apple's creation of the IPod. Ans: C) Verizons Web-based digital dashboard providing real-time company information for managers. 2) Which of the following choices may lead to competitive advantage (1) new products, services, and business models; (2) charging less for superior products; (3) responding to customers in real-time? A) 2 and 3 B) 1, 2, and 3 C) 1 only D) 1 and 2 Ans: B) 1,2, and 3 3) A major criterion in deciding the most important perspectives of a business problem is: A) change management. B) usefulness. C) organizational needs. D) implementation. Ans:B) Usefulness 4) Inadequate database capacity is an example of the ________ dimension of business problems. A) people B) management C) organizational D) technology Ans:D) Technology 5) The owners of Speed-EZ, a new bike messenger service, are concerned about how they will manage their messengers once they have left the office. This is a business problem that falls into the: A) management dimension. B) technology dimension...

Words: 2622 - Pages: 11

Anatomia De Grey 5º Temporada Completa 7 Dvd Nuevo Precintado Series (Sin Abrir) | Bernard-jou Iwaku. | Alles total normal