Sample Questions Information Communication Systems

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/47

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

48 Terms

1
New cards

List 8 common input devices

  1. Keyboard

  2. Mouse

  3. Scanner

  4. Light Pen

  5. Magnetic card reader (ATM, Doors)

  6. Barcodes

  7. Kimball tags

  8. Voice Data Entry (VDE)

  9. Optical Character Recognition (OCR)

  10. Magnetic Ink Character Recognition (MICR)

  11. Touch Sensitive Screen

2
New cards

Explain Local Area Network

A network connecting computers within a limited area - often in the same building or group of buildings.

The computers can be connected by cables or wireless communication.

In a server/client network, a computer called a server stores common data which it then ‘serves’ to the other computers called clients

3
New cards

Wide Area Network

Computers as well as networks, are linked together over a large distance.

A WAN operates like a LAN but not on a much larger scale.

i.e. A multinational company can link its computers in different parts of a country or in different parts of the world. The computers communicate via satellite links.

4
New cards

Metropolitan Area Network

A computer network that connects computers within a metropolitan area, which could be a single large city, multiple cities and towns or any given large area with multiple buildings.

MAN is larger than LAN but smaller than WAN

5
New cards

Explain Dial Up Connections with regard to Internet Connection

Is a technology used to connect to the internet using a standard telephone line.

it works by dialing a specific phone number provided by an internet service provider (ISP) and establishing a connection through a modern.

6
New cards

What does a driver do?

A driver is specialised software component that allows an operating systems to communicate with and control a hardware device.

It serves as a bridge between the higher-level software applications and the low-level hardware components, facilitating the translation of commands from the operating system into a language that the hardware understands.

Drivers are essential for proper functionality and compatibility of hardware devices with computer systems.

7
New cards

Explain the Internet

The Internet is a global network of interconnected computers and devices that allows users to access and share information and devices, allowing them to communicate and exchange data.

Requirements to connect:

  1. Internet Service Provider (ISP)

  2. Computer

  3. Modem (modulator/demodulator - digital to analogue conversion)

  4. WiFi/Phone Line/Cable

  5. Software - a browser i.e. Internet Explorer

ISP services - connectivity, email, web hosting

8
New cards

Describe what Encryption is

An algorithm (program) encodes or scrambles information during transmissions or storage.

Decoded/unscrambled by only authorized individuals to read it.

How is it done?

  • Both parties agree on the encryption method (there are many) using keys:

    1. Symmetric Key - Sender and receiver have the key which can be risky.

    2. Public Key - Use a public and private key where the public key is used to send an encrypted message and private key that the receiver uses to decode the message

9
New cards

Describe what Authentication is

Persons accessing the information is who they say they are.

Factors of Identification:

  • Something you know - user ID and Password

    1. User ID identifies you while the password authenticates you.

    2. Easy to compromise if weak password.

  • Something you have - Key or Card

    1. Can be lost or stolen.

  • Something you are - Physical Characteristics (i.e. Biometrics)

    1. Much harder to compromise.

A combination of at least 2 factors is recommended.

10
New cards

Describe what Message Integrity is

A process of verifying that the received message is intact and is exactly as sent.

this ensures that the transmitted message from the sender to the receiver is not altered by any type of manipulation such as changing content, adding fragments, removing fragments or content transposition.

11
New cards

Describe what Digital Signature is

Is a mathematical technique used to validate the authenticity and integrity of digital document, message or software.

Its the digital equivalent of a handwritten signature or stamped seal, but it offers far more inherent security.

12
New cards

Describe what Digital Certificates is

A file or electronic password that proves the authenticity of a device, server or user through the use of cryptography and the public key infrastructure (PKI)

Digital Certificate Authentication helps organizations ensure that only trusted devices and users can connect to their networks.

13
New cards

Describe what Digital Wallets is

Is a software-based systems or an application that runs on any connected device.

it stores your payment information and passwords of numerous payment methods and websites.

Digital wallets run primarily on mobile devices but may be accessible from a computer - Mobile Wallets, which are a subset, are primarily used on mobile devices.

14
New cards

Define Adware

Is the term used for various pop-up advertisements that show up on your computer or mobile device.

Adware has the potential to become malicious and harm your device by slowing it down, hijacking your browser and installing viruses and/or spyware.

15
New cards

Define Spyware

Is a malicious software that enters a user’s computer, gathers data from the device and user, and sends it to third parties without their consent.

A commonly accepted spyware definition is a strand of malware designed to access and damage a device without the user’s consent.

16
New cards

Define Grayware

Is commonly referred to as potentially unwanted programs or PUPS.

Those are all the applications that perform activities that can slow down the user’s devices.

Most common grayware exists for advertising or adware and spyware which tracks and records the user information and behaviour.

17
New cards

Explain the term Social Engineering

Is the term used for a broad range of malicious activities accomplished through human interactions.

It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.

18
New cards

Explain Viruses

Is a type of malicious software, or malware, that spreads between computers and causes damage to data and software.

Computer viruses aim to disrupt systems, cause major operational issues and result in data loss and leakage.

19
New cards

Explain Worms

Is a types of malware or malicious software that can replicate rapidly and spread across devices within a network.

As it spreads, a worm consumes bandwidth, overloading infected systems and making them unreliable or unavailable.

Worms can also change and delete files or introduce other malware.

20
New cards

Explain Hacking

Is the act of identifying and then exploiting weaknesses in a computer system or network, usually to gain unauthorized access to personal or organizational data.

Hacking is not always a malicious activity, but the term has mostly negative connotations due to its association with cybercrime.

21
New cards

Explain Trojans

Is a virus that disguises itself as legitimate software to trick users into installing it.

Once inside, it can steal data, damage files, take control of your computer, or create a backdoor for further attacks

22
New cards

Differentiate between Data Security and Data Integrity

Data Security:

Involves protecting data from unauthorized access and preventing data from being corrupted or stolen.

Data Integrity:

Is typically a benefit of data security but refers to data accuracy and validity rather than data protection.

23
New cards

What is the difference between Data Validation and Data Verification?

Data Verification involves checking the accuracy and completeness of data, while data validation involves ensuring that the data meets certain standards or criteria.

24
New cards

What are the roles and responsibilities of Data Controllers when storing data?

The Data Controller is responsible for ensuring that personal data is processed, lawfully, transparently in accordance with the rights of the data subjects.

A data controller is an individual or entity that determines the purposes, conditions, and means of processing personal data.

In the context of data protection regulations like the General Data Protection Regulation.

Defining the purpose for which data is processed.

Deciding what data is collect and implementing measures to protect the privacy and security of the data.

Data controllers may include businesses, organizations or individuals who collect and process personal information.

25
New cards

Define Software Copyright

It protects the expression of an idea in a software program, like the code itself. It prevents others from copying, distributing or creating derivative works without permission.

26
New cards

Define Intellectual Property

It refers to creations of the mind that are legally protected from unauthorized use by others.

these creations can include inventions, literary and artistic works, designs, symbols, names and images used in commerce.

27
New cards

what does Patent mean?

Is a form of intellectual property that grants/protects computer software and the inventor exclusive rights to a unique software-based invention or process, preventing others from using, copying or selling it without permission for a period of time.

28
New cards

Define Plagiarism

Is the act of using someone else’s work, ideas, words or creations without proper acknowledgment and presenting them as your own.

It is considered unethical and can have serious academic, professional and legal consequences.

It can be intentional or accidental but both can be taken seriously, especially in educational and creative fields.

29
New cards

List 5 types of Information Systems (pt1 of long question)

  1. Personal Information System

  2. Transaction Processing System (TPS)

  3. Management Information System (MIS)

  4. Decision Support System (DIS)

  5. Expert Systems (ES)

30
New cards

Explain Personal Information Systems in detail (pt2 long question)

A personal information systems is a type of information systems designed to help individuals collect, organize, store and manage their personal data for decision making, productivity or communication purposes. Unlike organizational information systems that serve entire businesses or departments, personal information systems focus on individual users and their specific needs. for example Contact Management systems are used for phone contact apps and Health Tracking apps are used for apps that cant track your health like Apple Health.

31
New cards

Explain Transaction Processing Systems in detail (pt3 long question)

A Transaction Processing Systems is a type of computerized information system designed to process large volume of routine, structured transactions efficiently and accurately. These transactions are the fundamental operations of an organization, such as sales, purchases, deposits, withdrawals, orders, payroll, and reservations. TPS is the backbone of any organization’s daily functioning and plays a critical role in supporting business operations. For example Airlines use Reservation systems for booking flights and managing passenger information.

32
New cards

Explain Management Information Systems in detail (pt4 long question)

A Management Information System (MIS) is a computerized system that provides managers with the tools to organize, evaluate, and efficiently manage departments within an organization. MIS collects data from various business operations, processes it, and then produces meaningful information in the form of reports that managers use for decision-making and strategic planning. For example Sales Management Systems Track sales performance, customer trends, and revenue targets.

33
New cards

Explain Decision Support System in detail (pt5 long question)

A Decision Support System (DSS) is a computer-based information system that supports business or organizational decision-making activities. DSS helps managers and business professionals make informed and data-driven decisions by analyzing large volumes of data, applying models, and offering simulations, forecasts, or alternative solutions The main goal of a DSS is to support rather than replace decision-making. It provides relevant information and analytical tools that help managers explore different scenarios, For example Marketing DSS Analyzes market trends, customer behavior, and campaign performance.

34
New cards

Explain Expert System in detail (pt6 long question)

An Expert System (ES) is a branch of artificial intelligence that attempts to replicate the decision-making abilities of a human expert. It is designed to solve complex problems by reasoning through bodies of knowledge, represented mainly as if-then rules, rather than through conventional procedural code. The primary goal of an expert system is to mimic human expertise and provide reliable solutions to problems that would otherwise require human specialists For example

35
New cards

Explain Topology in Network Design (pt1 LQ)

Network topology refers to the arrangement of different elements (links, nodes, devices, etc.) in a computer network. It is a structural layout that defines how computers, printers, routers, and other devices are interconnected, either physically or logically. Choosing the right topology is crucial in network design, as it affects performance, scalability, fault tolerance, and cost.

36
New cards

List 5 main types (pt2 LQ)

  1. Bus

  2. Ring

  3. Star

  4. Tree

  5. Mesh

37
New cards

Explain Bus in detail (pt3 LQ)

Bus topology is a type of network design where all devices (nodes) are connected to a single central cable, known as the bus or backbone. Data sent by one device travels along the bus and can be received by any of the other devices on the network. In a bus topology, each computer or device is directly connected to a single central cable (the bus) using T-connectors. Both ends of the bus must be connected to terminators to prevent the signal from bouncing back along the cable, which would cause interference.

38
New cards

Explain Ring in detail (pt4 LQ)

Ring topology is a type of network topology in which each device (also called a node) is connected to exactly two other devices, forming a circular pathway for signals. Data travels in one direction (unidirectional) or both directions (bidirectional) around the ring, and each device in the ring has exactly two neighbors for communication purposes. In a ring topology, the devices are connected in a closed loop. Each device has a dedicated point-to-point connection with the two devices on either side. This setup forms a circle, or a “ring,” through which data is transmitted.

39
New cards

Explain Star in detail (pt5 LQ)

Star topology is a type of network design where all devices (also known as nodes) are individually connected to a central networking device such as a hub, switch, or router. This central device acts as a controller to manage and direct data flow among the connected nodes. In star topology, each device has a dedicated point-to-point connection to the central hub. Devices do not connect directly to each other; instead, all communication passes through the central hub or switch. This layout forms a star-like structure.

40
New cards

Explain Tree in detail (pt6 LQ)

Tree topology is a hierarchical network topology in which the structure is similar to a tree. It combines characteristics of both star topology and bus topology. The network is organized in levels, with a root node at the top, and all other nodes connected in a parent-child hierarchy.

  • The topmost node is known as the root node (often a central hub, router, or server).

  • The root connects to one or more intermediate nodes (like switches or secondary hubs), forming branches.

  • These intermediate nodes further connect to end devices (computers, printers, etc.), forming sub-branches.

This creates a structure that resembles a tree: with branches, leaves, and nodes.

41
New cards

Explain Mesh in detail (pt7 LQ)

Mesh topology is a type of network topology where each device (node) is interconnected with every other device in the network, either directly or through multiple hops. This creates a highly robust and reliable communication network.

There are two types of mesh topologies:

  1. Full Mesh Topology – Every device is directly connected to every other device.

  2. Partial Mesh Topology – Some devices are connected to all others, while others are only connected to specific nodes.

42
New cards

What is an Operating System (pt1 LQ)

An Operating System (OS) is a system software that acts as an intermediary between the user and the computer hardware. It manages hardware components, software resources, and provides a platform for running application programs. Without an operating system, a computer cannot function. The primary purpose of an OS is to enable users to interact with the computer system efficiently and conveniently. It ensures that all hardware and software components work together smoothly and that system resources like CPU, memory, and storage are allocated and managed properly.

43
New cards

List some functions that an Operating System is responsible for(pt2 LQ)

  1. Process Management

  2. Memory Management

  3. File Management

  4. Device Management

  5. User Interface

  6. Security and Access Control

  7. Job Scheduling

  8. Input/Output Management

  9. Error Detection and Handling

  10. Networking

44
New cards

What are the 4 main structural components in a computer? (pt1 LQ)

  1. Central Processing Unit (CPU)

  2. Memory (Primary Storage)

  3. Input/Output (I/O) Devices

  4. System Interconnection (Buses)

45
New cards

Describe Central Processing Unit in detail (pt2 LQ)

The Central Processing Unit (CPU) is often referred to as the “brain” of the computer. It is the most critical component of any computing device, responsible for executing instructions, processing data, and managing system operations. Every task performed by a computer, from the simplest calculation to running complex applications, is carried out under the direction of the CPU. The CPU is a hardware component that performs all the processing tasks of a computer. It interprets and executes the instructions from both software applications and the operating system. The speed and efficiency of a computer are largely determined by the power and design of its CPU.

46
New cards

Describe Memory (Primary Storage) in detail (pt3 LQ)

Memory, also known as primary storage or main memory, is a vital component of a computer system. It is responsible for temporarily storing data and instructions that the CPU needs while performing tasks. Without memory, the CPU would have no data to work on, and a computer would not function. Memory plays a critical role in determining the speed and efficiency of the system. Primary memory is the part of a computer where the operating system, application software, and currently used data are kept so that they can be quickly accessed by the CPU. It is volatile, meaning that all data is lost when the power is turned off.

47
New cards

Describe Input/Output Devices in detail (pt4 LQ)

Input/Output (I/O) devices are essential components of a computer system. They serve as the communication link between the user and the computer. Input devices allow users to provide data and commands to the computer, while output devices allow the computer to display or communicate the results of processing. Without I/O devices, users would not be able to interact with or make use of computer systems effectively. Input/Output devices are hardware components that facilitate data exchange between the computer and the outside world. They either send data to the system (input) or receive data from the system (output), and some can even perform both functions.

48
New cards

Describe System Interconnection in detail (pt5 LQ)

A computer system is made up of several components, such as the CPU, memory, and input/output devices, all of which must work together efficiently to perform tasks. The System Interconnection is the internal communication mechanism that links all these components, allowing them to share data and instructions. Without it, the components would be isolated and unable to function as a unified system. System Interconnection refers to the communication pathways—typically called buses—that connect the major components of a computer system. These pathways allow data, addresses, and control signals to be transferred between the Central Processing Unit (CPU), memory, and input/output (I/O) devices.