Module 8
Module 9
Module 10
Module 11
Random
100
information created due to unplanned information needs that are typically not saved for later use
What is Ad Hoc Reports
100
information systems that integrate business activities across departmental boundaries, including planning, manufacturing sales, marketing, and so on
What is Enterprise Resource Planning (ERP)
100
testing performed by actual system users with actual data in their work environment
What is Beta testing
100
a type of computer crime where the data going into or out of a computer is altered
What is Data Diddling
100
information systems focusing on improving upstream information flows with two main objectives—to accelerate product development and to reduce costs associated with procuring raw materials, components, and services from suppliers
What is Supply Chain Managment
200
an information system designed to process day-to-day business-event data at the operational level of the organization
What is Transaction Processing System (TPS)
200
a data presentation standard that allows designers to create customized features that enable data to be more easily shared between applications and organizations
What is Extensible Markup Language or XML
200
the development, testing, and maintenance of application by users in an organization
What is end user development
200
Difference between a logic bomb and a time bomb
What is a Logic bomb is a type of computer virus that lies I wait for unsuspecting computer users to perform a triggering operation before executing its instructions while a Time bomb is a type of computer virus that lies in wait for a specific date before executing its instructions
200
destructive computer code whose instructions remain hidden to the user because the computer appears to function normally but, in fact, is performing underlying functions dictated by the intrusive code
What is Trojan Horse
300
level of the pyramid that uses Business Intelligence to improve efficiency by automating routine and repetitive activities?
What is Operational Level
300
these are the three types of Intelligent Systems (please provide characteristics)
What are expert systems, neural networks, and intelligent agents
300
a four-phase systems development methodology that combines prototyping, computer-based development tools, special management practices, and close user involvement
What is Rapid Application Development (RAD)
300
Difference between Cyber War and Cyber Terrorism
What is Cyber terrorism is the sue of computer and networking technologies against persons or property to intimidate or coerce governments, individuals, or any segment of society to attain political, religious, or ideological goals while Cyber war is an organized attempt by a country’s military to disrupt or destroy information and communications systems of another country
300
KPI stands for this
What is Key Processing Indicator
400
Instead of facts and numbers this type of data contains non-analytical information
What is Soft Data
400
the use of the electromagnetic energy to transmit information between a reader (transceiver) and a processing device, used to replace bar codes and bar code readers
What is Radio Frequency Identification
400
The difference between data flows and processing logic
What is Data flows is Movement of data through an organization while processing logic is The way in which data are transformed
400
a form of data diddling that occurs when a person shaves small amount from financial accounts and deposits them in a personal account
What is salami slicing
400
crimes committed against telephone company computers with the goal of making free long distance calls, impersonating directory assistance or other operator services, diverting calls to number of the perpetrator’s choice, or otherwise disrupting telephone service for subscribers
What is phreaking
500
This level of the pyramid is responsible for semi-structured decisions
What is Managerial
500
These are the three systems that encompass an operational CRM
What are sales force automation, customer service and support, enterprise marketing managment
500
The four phases of RAD
What is Requirements planning, User design, Construction, and Move to the new system
500
please name the Laws consecutively 1. it is a crime to break into any electronic communications service, including telephone services 2. prohibits stealing or comprimising nat'l defense data, gaining unauthorized access, violating financial data, etc
What is 1. Electronic Communications Privacy Act of 1986 and 2. The Computer Fraud and Abuse act of 1986
500
This version has features and modules that a packaged software system comes with out of the box
What is Vanilla Version