Final Exam Flashcards

(47 cards)

1
Q

data

A

recorded facts or figures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is data information?

A

no

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

information is what humans glean

A

from interpretation of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

asking a data system for specific info is a

A

query

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

information

A

knowledge derived from data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

URL stands for

A

Uniform Resource Locator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

URL is the

A

address of a specific document on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SDLC stands for

A

Systems Development Life Cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SDLC process is called

A

the waterfall method (ex. farmer needs to decide what he needs done and the expense)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SDLC process steps:

A
  • define the system
  • determining the requirements
  • implement the system
  • maintain the system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

denial of service attack

A

floods a web server with to many (fake) service requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

hacking is

A

evading security or breaking security protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

hacking is also

A

intercepting packets of information on other apps and servers exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

software components

A

operating systems and applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

operating systems (OS)

A

this is the brain, but it is not hardware. Manages the computer’s resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

applications

A

specific purposes, opened by the OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

is data information?

A

no

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

information is what humans

A

glean from interpretation of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

although AI is gaining, currently only humans can create and understand information

A

where computers deal in data and use algorithms to decide what to do based on data points

20
Q

knowledge derived from data

21
Q

URL stands for

A

Uniform Resource Locator

22
Q

the address of a specific document on the internet

23
Q

SDLC stands for

A

Systems Development Life Cycle

24
Q

SDLC process is also called

A

the waterfall method (farmer needs to decide what he needs done and the expense)

25
SDLC process steps
- define system - determining the requirements - implement the system - maintain the system
26
Hacking is
- evading security or breaking security protocols - intercepting packets of information on other apps and servers exchange
27
denial of service attack
floods a web server with to many (fake) service requests
28
software components
- operating system (OS) - Applications
29
operating system (OS)
this is the brain, but it is not hardware. manages the computer's resources
30
applications
specific purposes, opened by the OS
31
when to use an absolute reference in excel
- when you don't want your formula reference to change in a flash fill - use the $ sign to create an absolute
32
data warehousing
the "data about data" contained in every warehouse that describes the content and outlines the data's source, history, constraints
33
metadata
- source - history - constraints
34
indicators you have adware
- pop-up advertisements - new cookies reflecting your history - slower run time - you didn't install the program
35
adware is unwanted software designed to
throw advertisements up on your screen, most often within a web browser
36
5 components of an information system
- hardware - software - data - procedures - people
37
computer side of IS
- hardware - software
38
human side of IS
- procedures - people
39
actors of IS
- hardware - people
40
instructions of IS
- software - procedures
41
bridge of IS
data
42
database management system
program used to create process and admin a database
43
a DBMS is an application
not hardware
44
security response is best handled:
- by making contingency plans ahead of time - by responding in real time and hoc - by calling the authorities - crowdsourcing your best plan
45
make all response plans ahead of time
- having a plan in place - centralized reporting - don't waste time on blam - specific responses - practice
46
business process
a business process is a network of activities that generate value by transforming inputs and outputs
47
order fulfillment business process
- check inventory - check customer credit - approve special terms