Information system
What is first generation programming language?
first generation programming language --> written in binary code (0 and 1) so they are directly understood by the computer
What is second generation programming language?
second generation programming language --> programming language written using english words and are subsequently converted into machine language by a software
What is third generation language?
3rd generation language --> procedure oriented languages that require translation into multiple machine level instructions. ex (COBOL, BASIC, C and C++)
What is 4th generation language?
4th generation language --> the purpose of this is to simplify programming. These are english like languages that permitthe user to describe the problem to and receive guidance from the computer.
Two phases of systems planning are project definition and project initiation. All of the following are steps in the project initiation phase except A. Training selected personnel. B. Assembling the project team. C. Preparing the project proposal. D. Informing managers and employees of the project.
C. Preparing the project proposal. The project initiation phase includes 1) informing managers and employees about the project 2) assembling the project team such as system analysts, programmers, accountants, and users. 3) training selected personnel to improve the neccesary skills and enhance communications among team members 4) establishing project controls project initation phase is basically assessing the project proposal not preparaing it
An overall description of a database, including the names of data elements, their characteristics, and their relationship to each other, is defined by using a A. Data control language. B. Data command interpreter language. C. Data definition language. D. Data manipulation language.
Data definition language.
The most distinguishing feature of the use of a client-server processing model over an old mainframe configuration is A. Less need for data backup. B. Decentralization over centralization. C. Ability to connect remote locations. D. Digital processing over analog.
Decentralization over centralization. Mainframes were arranged so that all processing and data storage were done in a single, central location. Improvements in technology have led to increasing decentralization of information processing. The most cost-effective and easy-to-administer arrangement for local area networks (LANs) uses the client-server model. cl9ient server --> this is when the client (object that requests something from another object) requests from a central server (can be a computer)
Most client-server applications operate on a three-tiered architecture consisting of which of the following layers? A. Desktop server, application, and database. B. Desktop client, application, and database. C. Desktop client, software, and hardware. D. Desktop server, software, and hardware.
Desktop client, application, and database. Client-server system divides processing of an application between a client machine on a network and a server. many applications word processing and spreadsheet software, reside on the client computer (a desktop, workstation, laptop) the server manages peripheral hardware and controls access to shared databases.
Which one of the following is likely to be a concern in performing an assessment of an electronic data interchange (EDI) purchasing system? A. Increased transaction volume. B. Increased competition in the market. C. Decreased competition in the market. D. Increased turnover of the information technology staff.
Increased turnover of the information technology staff. EDI systems rely on technically trained personnel for operations. Changes in personnel suggest that crucial expertise may have been lost
The use of message encryption software A. Requires manual distribution of keys. B. Reduces the need for periodic password changes. C. Increases system overhead. D. Guarantees the secrecy of data.
Increases system overhead. the machine instructions neccesary to encrypt and decrypt data consitute system overhead. as a result, processing speed may be slowed encryption doesn't guarentee the secrecy of data
What is information system?
Information systems help us create, store, control, find and access this massive amount of information. An information system is computer based tools for collecting storing and procesing data in our world. businesses uses it to reach potential customers over te web and process financial accounts and manage workforece. Governments use IS to provide services, collect taxes. IS will have database to store data and program to use data and there will be a user database and user interface to obtain data
What is information technology?
Information technology is related to anything related to computing technology such as networking, hardware, the internet, or the people that work with these technologies. IT departments used for managing the computers, networks, and other technical areas of their businesses
C++, BASIC, FORTRAN, and COBOL are all examples of A. Application programs. B. Machine languages. C. Operating systems. D. Procedural languages.
Procedural languages. procedure-oriented language are processing steps to create a program
Which of the following represents the procedure managers use to identify whether the company has information that unauthorized individuals want, how these individuals could obtain the information, the value of the information, and the probability of unauthorized access occurring? A. Disaster recovery plan assessment. B. Test of controls. C. Risk assessment. D. Systems assessment.
Risk assessment. Risk assessment is the core of the organization's contingency plan. This involves 1) types of vulnerabilities to which each of the organization's critical system is subject 2) likihood of each of the vulnerabilities being exploited 3) what countermeasures should be taken
What is a rule-based expert system?
Rule-based expert systems function on the basis of set rules to arrive at an answer. These cannot be changed by the system itself. They must be changed by an outside source (i.e., the computer programmer).
Which of the following testing methods examines the program's code and its associated documentation through reviews, walkthroughs, or inspections but does not require the program be executed? A. Gray-box testing. B. Static testing. C. Black-box testing. D. Dynamic testing.
Static testing. static testing examines the application system's code and its associated documentation through reviews, walkthroughs, inspectrions but doesn't requiure the program to be executed gray-box testing --> this is a method of testing software that tests internal structures or workings of an application as opposed to its functionality
What should be examined to determine if an information system is operating according to prescribed procedures? A. Accessibility to system information. B. System capacity. C. System complexity. D. System control.
System control. system control is the most comprehensive indicator of IS compliance with prescribed procedures is the control the system has over the data.
Which of the following statements about personal and notebook computers and servers is true? A. Because of the increased use of personal and notebook computers, there will be little need for servers in the near future. B. Personal and notebook computers usually cost more than servers but less than mainframes. C. The cost per transaction to process on each type of computer has decreased in recent years. D. Servers must be programmed directly in machine language while personal and notebook computers use higher-level language.
The cost per transaction to process on each type of computer has decreased in recent years. computers can act as servers and advances in technology have resulted in less expensive computers and increased computing power. The cost to process transactions on all kinds of computers has therefore decreased.
One advantage of a database management system (DBMS) is A. The cost of the data processing department decreases as users are now responsible for establishing their own data handing techniques. B. A decreased vulnerability as the database management system has numerous security controls to prevent disasters. C. The independence of the data from the application programs, which allows the programs to be developed for the user's specific needs without concern for data capture problems. D. Each organizational unit takes responsibility and control for its own data.
The independence of the data from the application programs, which allows the programs to be developed for the user's specific needs without concern for data capture problems. database management system is the software that handles storage, retrieval, and updating of data in a computer system
Which of the following database models is considered to be the most versatile? A. The tree model. B. The network model. C. The relational model. D. The hierarchical model.
The relational model. relational model --> this is most versatile because it's easier to construct than complex architechures that result when using the hierarchical and network models. The tables provide flexibility because they can be combined (joined) in many ways to permit a wide variety of inquiries. They also permit data to be added/ommited from the data structures network model --->
What is accounting information system?
This is a subsystem of management information system that processes financial and transactional data related to managerial and finaicial AIS supports operations by collecting and sorting historical data about an organization's transactions.
Which of the following best describes the primary reason that organizations develop contingency plans for their computer-based information systems operations? A. To help hold down the cost of insurance. B. To ensure that they will be able to process vital transactions in the event of a disaster. C. To plan for sources of capital for recovery from any type of disaster. D. To ensure the safety of important records.
To ensure that they will be able to process vital transactions in the event of a disaster. The contingency plans must be drafted so that the organization will be able to resume normal processing following a disaster
After a company implements electronic data interchange (EDI) to communicate with its customers, an appropriate control for ensuring authenticity of the electronic orders it receives is to A. Perform reasonableness checks on quantities ordered before filling orders. B. Acknowledge receipt of electronic payments with a confirming message. C. Verify the identity of senders and determine whether orders correspond to contract terms. D. Encrypt sensitive messages such as electronic payments for raw materials received.
Verify the identity of senders and determine whether orders correspond to contract terms. An EDI system is subject not only to the usual risk exposures for computer systems but also to those arising from the potential ineffectiveness of control on the part of the trading partner and the third-party service provider. Accordingly, authentication of users and messages received is a major security concern.
What is computer aided software engineering?
computer aided software engineering is using the computer for designing and developing software CASE provides the computer with the capacity to maintain on the computer all of the system documentation, data flow diagram, data dictionaries. CASE assits with the creation, organization, and maintenance of documentation and permits some automation of the coding process
What is the ethernet?
ethernet is a system for connecting a number of computer systems to form a local area network
Which of the following structures refers to the collection of data for all vendors in a relational data base? A. Field. B. File. C. Byte. D. Record.
file --> file is a group of records. Each record refers to the collection of data for a specific vendor in the data base A field is a group of bytes. The field contains a unit of data about a specific entity. Byte -->group of bits it ca nbe used to signify a character a number, alphabet or symbol
What are flat files?
flat files is data being stored sequentially on a magnetic tape
In a database file what is the key?
key --> it contains enough information to uniquely identify each record. There can be no 2 records with the same key.
What is an intranet?
local/restricted communications network especially a private network created using a World Wide Web (www) software ex. organization has made available the company newsletter and job openings on the network such that only employees of the organization may view them
What are non-relational databases?
storage and retrieval of data other than the table relations. Without the table relations allow operations to run faster
What is object oriented databases?
this is storing graphics from C++ and java