Sample questions.doc_第1页
Sample questions.doc_第2页
Sample questions.doc_第3页
Sample questions.doc_第4页
Sample questions.doc_第5页
已阅读5页,还剩2页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

QuestionSample AnswerReferenceThere are several data types we usually refer to. Alphanumeric data can be described as:a. Moving images or picturesb. Alphabetic letters onlyc. Numbers, letters and other charactersd. Numbers and letters onlye. Sound, noise or tonesCReadings, week 1 Stair and Reynolds, page 5A/An _ is a set of interrelated components that collect, manipulate and disseminate data and information and provide a feedback mechanism to meet an objective.a. Local area networkb. Expert systemc. Information Systemd. Gatewaye. Error correction protocolCReadings, week 1 Stair and Reynolds, page 4There are 7 unique features of e-commerce technology.Describe the following feature and explain the business significanceReadings week 7&8 Laudon and Laudon Page 394Global reachThe technology reaches across national boundaries, around the earth. The business significance is that Commerce is enabled across cultural and national boundaries seamlessly and without modification the market space includes potentially billions of consumers and millions of business worldwide.Information densityThe technology reduces information costs and raises quality. The business significance is that information processing, storage and communication costs drop dramatically, whereas currency, accuracy and timeliness improve greatly. Information becomes plentiful, cheap and more accurate.InteractivityThe technology works through interaction with the user. The business significance is that consumers are engaged in a dialog that dynamically adjusts the experience to the individual and makes the consumer a co-participant. In the process of delivering goods to the market.UbiquityInternet/web technology is available everywhere at work, at home and elsewhere via mobile devices anytime.The Market place is extended beyond traditional boundaries and is removed from a temporal (lasting only a short time) and geographic location. “Marketspace” is created and shopping can take place anywhere. Customer convenience is enhanced and shopping costs are reduced. We need to remind the manager about security threats to protect our information systems. Please describe carefully security safeguards as they relate to the five components of information systems.HardwareSoftwareDataProceduresPeopleTechnical safeguards Identification and authorisation Encryption Firewalls Malware protection Application designData Safeguards Data rights and responsibilities Passwords Encryption Backup and recovery Physical securityHuman Safeguards Hiring Training Education Procedure design Administration Assessment Compliance accountabilityReading week 9/10 Kroenke page 279Explain how the digital credit card payment system works.This payment system provides secure services for credit card payments on the Internet protects information transmitted among users, merchant sites and processing banks.Readings week 7&8 Laudon and Laudon Page 418There are many security threats that can be very dangerous for business.Explain the threat of Phishing.Phishing is a way that criminals collect unauthorised data using a pretexting email technique. The Phisher pretends to be a legitimate company and sends an email requesting confidential data such as account numbers and passwords. Readings week 7&8 KroenkePage 275 Explain the term pretexting and discuss why it is a serious issue for business.Pretexting occurs when someone deceives by pretending to be someone else. A common scam involves a telephone caller who pretends to be from a credit card company and claims to be checking the validity of credit card numbers. The criminal is attempting to steal data by asking you to discuss the details.Readings week 7&8 KroenkePage 275There are 11 main characteristics relating to valuable information. The verifiable characteristic is:a. Should be easily accessibleb. Error freec. You can check it to make sure it is correct, perhaps by checking many sources for the same information.d. Information that is important to the decision makere. Information that can be depended uponReadings, week 1 Stair and Reynolds, page 7In discussing the main components of an information system, we often use the term feedback. Feedback can be described as:a. Converting or transforming data into useful outputsb. Production of useful information usually in the form of documents and reportsc. Gathering and capturing raw datad. Output that is used to make changes to input or processing activitiese. Processing and reduction of dataReadings, week 1 Stair and ReynoldsAn organised collection of people, procedures, software, databases and devices used to create, store, share and use the organistions experience and knowledge is known as a/an a. TPSb. MISc. DSSd. KMSe. OISReadings, week 1 Stair and Reynolds and Readings week 5 &6 Kroenke, pages 198-211When software is stored and run from a centralised location, the computer containing such information is known as a/an _a. File serverb. Print serverc. Application serverd. Data serverReadings Week 2&3 Norton, pages 340-381 A competitive advantage of a reporting system is _a. Improve productivityb. Improve decisions by providing relevant, accurate and timely information to the right personc. Improve communicationd. Improve networkinge. Improve access to information for stakeholdersReadings week 5 &6 Kroenke, pages 198-211A competitive advantage model which provides a general view of the firm, its competitors and the firms environment is known as_a. An Equity modelb. A Supply chain management modelc. Porters competitive forces modeld. A Trading modele. A Competitor modelWeek 5 & 6 Laudon and Laudon page 96During the needs analysis phase of system development, the team must:a. Correct errors within the systemb. Define the problemc. Implement the systemd. Decide how to implement the systeme. Create ApplicationsWhat can be used to develop other types of computer software quickly and reliably?a. Prototypingb. Data flow diagramsc. Computer aided software engineering (CASE) toolsd. Decision treese. Entiry relations

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论