Ins511 Flashcards

(56 cards)

1
Q

What is application software?

A

Software that helps users perform specific tasks like word processing, graphic design, or browsing the web.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Give examples of application software.

A

Microsoft Word, Adobe Photoshop, Google Chrome.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is programming software?

A

Software including compilers, debuggers, and IDEs used to write and test code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name some high-level programming languages.

A

Python, Java, C++, JavaScript.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is system software?

A

Software that manages and controls hardware and provides a platform for application software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are examples of operating systems?

A

Windows, macOS, Linux, Android.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe Symbian OS.

A

An OS developed for smartphones, used by Nokia, discontinued by 2012.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are device drivers?

A

Programs allowing the OS to communicate with hardware devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is utility software?

A

Programs for system maintenance tasks like antivirus, disk cleanup, file management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List types of operating systems.

A

Batch OS, Time-Sharing OS, Distributed OS, Real-Time OS, Mobile OS, Embedded OS, Network OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the categories of websites?

A

Informational, E-commerce, Social Media, Portfolio, Community Forums, Entertainment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is malware?

A

Malicious software designed to harm or exploit systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List types of malware.

A

Viruses, Worms, Trojan Horses, Ransomware, Spyware, Adware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

List types of computer viruses.

A

File Infector, Macro, Polymorphic, Metamorphic, Boot Sector, Resident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is information privacy?

A

The right to control how personal data is collected, stored, shared, and used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

List the key aspects of information privacy.

A

Data Protection, Consent, Confidentiality, Transparency, Rights of Individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are health concerns related to technology?

A

Eye strain, sleep disruption, repetitive strain injuries, and mental health effects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is green computing?

A

Environmentally sustainable computing through practices like e-waste recycling, energy-efficient hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

List types of software licenses.

A

Proprietary, Open-source, Freeware, SaaS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is competitive advantage?

A

An edge in cost, quality, or speed that allows a company to perform better than competitors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Define a business process.

A

A collection of related activities that produce a product or service of value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the elements of a business process?

A

Inputs, Resources, Outputs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How do information systems support the procurement process?

A

They automate workflows, capture data, and monitor performance across departments.

24
Q

What is Robotic Process Automation (RPA)?

A

The use of software bots to automate repetitive business tasks.

25
Give examples of RPA applications.
Customer service, invoice processing, sales orders, payroll, price comparison.
26
What is Business Process Reengineering (BPR)?
A radical redesign to improve productivity by starting from scratch.
27
What is Business Process Improvement (BPI)?
A method of continuous improvement and optimization.
28
What is Business Process Management (BPM)?
Systematic tools and tech to manage and improve workflows in real time.
29
What are market pressures?
Globalization, changing workforce, empowered customers.
30
What are technology pressures?
Innovation and obsolescence, information overload.
31
What are societal, political, and legal pressures?
Social responsibility, environmental concerns, regulations.
32
How can IT respond to business pressures?
Cloud computing, CRM, analytics, security, compliance management.
33
What is a strategic information system?
An IS that helps achieve competitive advantage or supports strategic goals.
34
What are Porter's five competitive forces?
Threat of new entrants, bargaining power of suppliers, power of buyers, threat of substitutes, rivalry.
35
What is Porter’s Value Chain model?
A model describing primary and support activities that add value.
36
What are examples of primary activities?
Inbound logistics, operations, outbound logistics, marketing & sales, after-sales service.
37
What is business-IT alignment?
Aligning IT with business strategy to create value.
38
List characteristics of effective IT alignment.
IT as innovation catalyst, customer focus, cross-department rotation, shared goals, financial literacy, inclusive culture.
39
What is ethics?
Moral guidelines people follow to decide right and wrong.
40
What are the three tenets of ethics?
Responsibility, Accountability, Liability.
41
List four categories of ethical issues in IT.
Privacy, Accuracy, Property, Access.
42
What is the utilitarian approach to ethics?
Choosing actions that produce the greatest benefit with the least harm.
43
What is the rights approach to ethics?
Protecting individuals’ rights such as privacy and safety.
44
What is the fairness approach to ethics?
Ensuring equal treatment unless justified.
45
What is the common good approach to ethics?
Focusing on shared societal benefits.
46
What is deontology?
Judging actions by their adherence to rules, not consequences.
47
What are the steps of the ethical decision-making framework?
1. Identify issues, 2. Gather info, 3. Analyze options, 4. Choose decision, 5. Implement and learn.
48
Give examples of corporate ethical failures.
Enron (fraud), Facebook-Cambridge Analytica (privacy), Uber (workplace misconduct), BP (environmental), Volkswagen (non-compliance).
49
What are modern privacy rights?
Protection of personal data including consent, security, and the right to be forgotten.
50
What are major privacy concerns?
Data breaches, digital footprints, lack of control over data, identity theft.
51
What is the opt-out model?
Data is collected by default unless users opt out.
52
What is the opt-in model?
Explicit user consent is required before data collection.
53
What is P3P?
Platform for Privacy Preferences - a protocol to communicate privacy policies online.
54
List privacy policy guidelines.
State data collection methods, ensure accuracy, enforce confidentiality, plan breach responses.
55
What are threats to privacy from technology?
Electronic surveillance, online tracking, database breaches, data aggregation.
56
What are ethical challenges from emerging tech?
AI bias, surveillance risks, IoT vulnerabilities, genetic privacy, e-waste.