0% found this document useful (0 votes)
5 views12 pages

Mis Paper Exam Study - 074316

The document covers various topics related to data, processes, and information, including encryption protocols used in VPNs, e-commerce business models, and the benefits and drawbacks of telecommuting. It also discusses the importance of security measures, the client/server model, and the systems development life cycle (SDLC). Additionally, it highlights technologies such as fuzzy logic and biometric security, as well as transaction-processing systems and their role in data management.

Uploaded by

majolaoluhle98
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views12 pages

Mis Paper Exam Study - 074316

The document covers various topics related to data, processes, and information, including encryption protocols used in VPNs, e-commerce business models, and the benefits and drawbacks of telecommuting. It also discusses the importance of security measures, the client/server model, and the systems development life cycle (SDLC). Additionally, it highlights technologies such as fuzzy logic and biometric security, as well as transaction-processing systems and their role in data management.

Uploaded by

majolaoluhle98
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 12

(5)

{C} Data, Processes, and Information

(6)

Data sent through a Virtual Private Network (VPN) is encrypted using protocols
designed to secure tunneling. The layer Two Tunneling Protocol (L2TP) is commonly
used in VPNs, often in combination with IPsec, to encrypt and encapsulate data at
the data link layer. Internet Control Message Protocol (ICMP) is for the network
diagnostics, User Datagram Protocol (UDP) is a transport protocol without inherent
encryption, and Transmission Control Protocol (TCP) manages data transmission but
is not specifically for VPN encryption.

(7)

{What -if}
What-if analysis involves evaluating different conditions (e.g whether the account
number is correct) to determine the outcome (displaying the balance). This fits the
context of a conditional check, unlike, *What-is(describing a state), *If-
continue(not a standard term), or

*If-else(a broader control structure not specifically tied to this analysis type).

(8)
The brokerage model is an e-commerce business model where a platform acts as an
intermediary that brings sellers and buyers together on the Web and facilitates
transactions, earning commission on those transactions. Examples include eBay or
Amazon Marketplace , where the platform connects parties and takes a percentage of
each sale.
*The Infomediary model focuses on providing information.

*The Merchant model involves selling goods directly.

*The Advertising model relies on Ad-revenue, non of which align with the
description of collecting commissions on transactions between sellers and buyers.
{c} pd 224

(9)

COGITO (by Italy-based Expert System)


is used for monitoring what consumers are saying in
blogs, comment sections, message boards, and Web based articles. It is also used in
search engines to better understand users’ queries. pg 348, {d}

(12)

Inbound Logistics-Movement of materials and parts from suppliers and vendors to


production or storage facilities; includes tasks associated with receiving, storing
and disseminating incoming goods or material.
Outbound Logistics-Moving and storing products, from the end of the production line
to end users or distribution centers.{False}

(13)
There are 5Vs of big data known as: Volume, Variety, Velocity, Veracity, Value.

What are "5Vs" of Big Data?-


One of the Following is not among 5Vs of big data:{a}
a. Variance
b. Value
c. Variety
d. Veracity

(14)

Spoofing-is an attempt to gain access to a network by posing as an authorized user


in order to find sensitive information such as passwords and credit card
information. {Spoofing also happens when an illegitimate program poses as a
legitimate on}. {D}

(15)

Potential Benefits of Telecommuting

Can care for small children or elderly parents and spend more time with family.
Have fewer restrictions on clothing for work, thereby saving the expense of work
wear.
No commute, so distance and time factors are reduced as well as the effects of car.
emissions on air quality.
Able to work in more pleasant surroundings
Increased productivity.
Decreased neighborhood crime because of more people being home during the day.
Easier work environment for employees with disabilities
Reduced costs for office space and utilities.
Reduced employee turnover and absenteeism.
Able to find and hire people with special skills, regardless of where they are
located.
Fewer interruptions from coworkers.

Potential Drawbacks of Telecommuting

Can become a workaholic (no hard boundaries between “at


work” and “at home”).
No regulated work routine.
Less interaction with coworkers.
No separation between work and home life.
Potential legal issues about workers’ injuries.
Family interruptions and household distractions.
Lack of necessary supplies or equipment.
Could create a two-tiered workforce—telecommuters and
on-site workers—that affects promotions and raise.
{a}

(16)

Convergence refers to
integrating voice, video, and data
so that multimedia information can
be used for decision making.

Common applications of convergence include the


following:
• E-commerce.
• More entertainment options as the number of TV
channels substantially increases and movies and
videos on demand become more available.
• Increased availability and affordability of video and
computer conferencing.
• Consumer products and services, such as virtual
classrooms, telecommuting, and virtual reality. {b}

(17)

BYOD-a strategy used by companies, the strategy is called (bring your own device).
BYOD has further enhanced the popularity of mobile and wireless networks. This
strategy allows employees of an organization to use their own computers, tablets,
smartphones, or other devices for work purposes.

Advantages of this strategy include cost-


savings, increased flexibility, increased productivity, and its attractiveness for
some job-seekers.

Disadvantages
include privacy and security issues related to an organization’s information
resources. {b}

(18)

Keystroke loggers- monitor and record keystrokes and


can be software or hardware devices.

Sometimes, companies use these devices to track employees’ use of e-


mail
and the Internet, and this use is legal. However, keystroke
loggers can be used for malicious purposes, too, such
as collecting the credit card numbers that users enter
while shopping online. Some antivirus and antispyware
programs guard against software keystroke loggers, and
utilities are available to install as additional protection.

Spyware- is software that secretly gathers information


about users while they browse the Web.

This information could be used for malicious purposes. Spyware can also interfere
with users’ control of their computers, through such methods as installing
additional software and redirecting Web browsers. Some spyware changes computer
settings, resulting in slow Internet connections. {c}

(19)

What is the purpose of the Metaverse?


(20)

Merchant mode- transfers the old


retail model to the e-commerce world by using the
medium of the Internet.

In the most common type of merchant model, an e-commerce company uses


Internet technologies and Web services to sell goods
and services over the Web. Companies following this
model offer good customer service and lower prices
to establish a presence on the Web. Amazon uses this
model, but traditional businesses, such as Dell, Cisco,
and Hewlett-Packard, have adopted this model to
eliminate the middleman and reach new customers.

(21)

Spreadsheet Software

A spreadsheet is a table
of rows and columns, and
spreadsheet software is
capable of performing
numerous tasks with the information in a spreadsheet.
You can even prepare a budget and perform a “what-if”
analysis on the data. For example, you could calculate the
effect on other budget items of reducing your income
by 10 percent, or you could see the effect of a 2 percent reduction in your
mortgage interest rate. Common
spreadsheet software includes Microsoft Excel, IBM’s
Lotus 1-2-3, and Corel Quattro Pro. {b}

(22)
True

(23)

??

(24)

A hierarchical topology (also called a “tree”) combines computers with different


processing strengths in
different organizational levels. For example, the bottom
level might consist of workstations, with minicomputers
in the middle and a server at the top. Companies that are
geographically dispersed and organized hierarchically are
good candidates for this type of network. Failure of nodes
at the bottom might not have a big impact on network
performance, but the middle nodes and especially the
top node (which controls the entire network) are crucial
for network operation. {d}

(25)
??

(26)

?
(27)
?

(28)

Any credit card companies reimburse


fraudulent charges. In addition, other electronic payment systems are being
developed, such as e-wallets and smart
cards, that reduce the risks of exposing consumers’ information on the Web. pg 110.
{True}

(29)
answer:D

(30)

During the maintenance


phase, the information system
is operating, enhancements and
modifications to the system have
been developed and tested,
and hardware and software
components have been added or
replaced.

The maintenance
team assesses how the system is working and takes steps to keep the system up and
running. As part of this phase, the team collects performance data and gathers
information on whether the system is meeting its objectives by talking with users,
customers, and other people affected by the new system. If the system’s objectives
are not being met, the team
must take corrective action. Creating a help desk to support
users is another important task in this phase. With the ongoing nature of the SDLC
approach, maintenance can lead
to starting the cycle over at the planning phase if the team
discovers the system is not working correctly.

pg 287,
{c}

(31)
Robots -are one of the most
successful applications of AI. They
perform well at simple, repetitive
tasks and can be used to free
workers from tedious or hazardous
jobs.

programming languages for controlling robots


include Variable Assembly Language (VAL), Functional
Robotics (FROB), and A Manufacturing Language (AML).
These languages are usually proprietary, meaning they are specific to individual
robot manufacturers.

pg, 346 {c}

(32)
Biometric security
measures use a physiological
element that is unique to a person
and cannot be stolen, lost, copied,
or passed on to others.

Iris Pattern(d) are considered the most unique and stable Biometric measure over
time. They have highly complex and individualized patterns that remain consistent
through out a person's life, with minimal changes after early childhood.
Fingerprints(c) are also highly unique but can be affected by wear, injury, or
aging. Hand Geometry(a) is less unique and can change due to weight gain, injury,
or aging. Voice Recognition(b) is the least stable, as it can be influenced by
illness, aging, or environmental factors. {d} try page, 140

(33)

answer: (b)- If any organization's website collects any of the regulated data from
European Union (EU) users, it is liable to comply with GDPR.

GDPT applies to any organization , regardless of location, that collects or


processes personal data of individuals within the European Union (EU). This is
because the regulation aims to protect the privacy and data rights of EU residents,
making any entity handling such data liable to comply, even if the organization is
based outside EU (e.g., in the United States). Options a, c, and d are incorrect
because GDPR's jurisdiction is not limited to organizations within the EU or based
on the location of the users alone, but rather on the processing of EU users'
regulated data. {b}

(34)

Joint application design


(JAD) is a collective activity
involving users, top management,
and IT professionals. It centers on a
structured workshop (called a JAD
session) where users and system
professionals come together to
develop an application.

An advantage of the JAD approach


is that it incorporates varying viewpoints from different functional areas of an
organization to help ensure that collected requirements for the application are not
too narrow and one-dimensional in focus. pg 273 {a}

(35)

Fuzzy logic allows a smooth,


gradual transition between human
and computer vocabularies and
deals with variations in linguistic
terms by using a degree of
membership.

Uses of Fuzzy Logic


Fuzzy logic has been used in search engines, chip design,
database management systems, software development,
and other areas.39 You might be more familiar with its
uses in appliances, as shown in the following examples:
• Dryers that convert information on load size, fabric
type, and flow of hot air into drying times and
conditions
• Refrigerators that set defrosting and cooling times
based on usage patterns
• Shower systems that suppress variations in water
temperature
• TVs that adjust screen color and texture for each
frame and stabilize the volume based on the viewer’s
location in the room
• Video camcorders that eliminate shakiness in images
(common with handheld video cameras) and adjust
focus and lighting automatically40,41, pg,333

Finite Automata are used in systems that can process and respond to specific inputs
based on predefined states, such as adjusting screen color, texture, and volume
based on the viewer's location. This technology allows TV's to dynamically adapt to
environmental or positional data, making it a suitable fit for the described
functionality. Virtual Reality simulations(a) are more focused on immersive
environments, Artificial Neural capabilities(b) involve complex learning systems,
and Fuzzy Logic(c) deals with approximate reasoning none of which directly align
with the precise state-based adjustments mentioned. {d}

not found on the pdf...

(36)

In addition, a comprehensive security system must


provide three levels of security:

• Level 1—Front-end servers, those available to both


internal and external users, must be protected against unauthorized access.
Typically, these systems are e-mail and Web servers.

• Level 2—Back-end systems (such as users’


workstations and internal database servers) must be
protected to ensure confidentiality, accuracy, and
integrity of data.

• Level 3—The corporate network must be protected


against intrusion, denial-of-service attacks, and
unauthorized access. pg 134, {a}

(37)

In the client/server
model, software runs on the
local computer (the client) and
communicates with the remote
server to request information
or services. A server is a remote
computer on the network that
provides information or services in
response to client requests.

In the most basic client/server configuration,


the following events usually take place:
1. The user runs client
software to create a
query.

2. The client accepts


the request and formats it so the server
can understand it.

3. The client sends


the request to the
server over the
network.

4. The server receives


and processes the query.

5. The results are sent to the client.

6. The results are formatted and displayed to the user


in an understandable format. pg 171, {a}

(38)

Extreme programming
(XP) is a method for developing
software applications and
information system projects in
which the project is divided into
smaller functions and developers
cannot go on to the next phase
until the current phase is finished.
Each function of the overall project
is developed in a step-by-step
fashion. {b} pg, 288.

(39)

Expert systems solve a problem by going through a series


of if–then–else rules, but Case-Based reasoning (CBR)
is a problem-solving technique that matches a new case (problem) with a previously
solved case and its solution, both stored in a database. Each case in the database
is stored with a description and keywords that identify it. pg,352 {b}

(40)
• Spot leasing—Search engines and directories offer space that companies can
purchase for advertising purposes. Spots have an advantage over banner ads because
their placement is permanent; banner ad placement can change from visit to visit.
However, spots can be more expensive than banner ads, especially on high-traffic
sites, such as Yahoo! pg 237 {a}

(41)

Systems development life


cycle (SDLC), also known as
the “waterfall model,” is a series of
well-defined phases performed
in sequence that serves as a
framework for developing a system
or project. System Development Life Cycle (SDLC) is also know as, "WATERFALL
MODEL". I think the answer is true...

(42)

Define transaction-processing systems (TPSs).


They focus on data collection and processing; the
major reason for using them is cost reduction.
This may include payroll processing or ATMs in
a bank. [check: page, 46-47].

Transaction processing systems are designed to handle large volumes of


routine, repetitive transactions (e.g., Sales, payments) efficiently, ensuring
accuracy and speed. They automate these operations to reduce manual effort and
minimize errors, which is why, "involve operations that are repetitive" (option d)
is the correct characteristic) {d}

(43

(45)

Task management
software enables team members
to prioritize and track tasks, which
helps to keep track of deadlines.{b} pg 334

(?)

Install the software on the network that will cause the computer to lock out if no
activity is detected for 30 seconds. {d}

(48)

Mirror disks—This method uses two disks containing


the same data; if one fails, the other is available,
allowing operations to continue. Mirror disks are
usually a less-expensive, level-1 RAID system and can
be a suitable solution for small organizations. {False}
pg, 135

(?)
?
(?)

Normalization in database design involves structuring data to reduce redundancy and


ensuring data integrity by organizing it into separate tables based on relationship
and dependencies, which align with option,

{a}- The process of organizing data to eliminate redundancy and dependency.pg, 82

(50)

The Domain Name System (DNS) protocol converts domain names to internet Protocol
(IP) addresses, which are used to route information across networks. {a} pg 190...

(51)

first-generation,(1946–1956) vacuum tube technology, pg, (53-54).

second-generation,(1957–1963) are Transistors.

Third-generation,(1964–1970) Integrated circuits,


remote data entry, telecommunication.

Fourth-generation- (1971–1992) Miniaturization,


VSLI, personal computers, optical disc.

Fifth-generation,(1993–present) Parallel processing,


gallium arsenide chips, optical technologies.

Generation Major Attribute


First Machine language
Second Assembly language
Third High-level language
Fourth Fourth-generation language
Fifth Natural language processing (NLP),

pg,32, {d}

(52)

Tools and Technologies of Big Data


Many technologies and applications have contributed to
the growth and popularity of big data. Mobile and wireless technology, the
popularity of social networks, and the
enhanced power and sophistication of smartphones and
handheld devices are among the key factors. {a} pg, 95.

(53)

Software as a service
(SaaS), also known as
on-demand software, is a model
for ASPs to deliver software to
users for a fee; the software is for
temporary or long-term use. pg,372.
In SaaS(Software as a Service), the provider typically manages service levels,
availability, and infrastructure scaling, so subscribers do not need to add
hardware, software, or communications capacity themselves. {d}

(54)

Optical mark recognition (OMR) system—This is


sometimes called a “mark sensing” system because it
reads marks on paper. OMRs are often used to grade
multiple-choice and true/false tests. pg.58

*An Optical mark recognition (OMR) system is an input device specifically


designed to grade multiple-choice and true/false tests by detecting marked
responses on paper forms. {d}

(59)

In a Query by Example(QBE) form, the OR operator is used when only one of the
conditions needs to be met for the query to return results.(no page) {b}

(60)

Ransomware is a type of cyberattack that denies users access to their files by


encrypting them, demanding payment or other actions to restore access. {c}

(?)

The SaaS (Software as a Service) model incorporates


cloud computing, along with Web 2.0, grid computing, and utility computing, as it
delivers software over the internet as a service. {c}

(?)

The best way is (a). Share a truck's location through an extranet between the two
companies.

*WHY: An Extranet provides a secure, private network that allows the truck company
and the retailer to share specific information, such as truck locations, while
maintaining control and security. This method ensures that sensitive data is not
exposed to the public (unlike option b and c), making it the most efficient and
secure choice for business partners.

(57)

Platform as a Service (PaaS) provides a platform allowing customers to develop,


run, and manage applications without the complexity of building and maintaining the
infrastructure typically associated with developing and launching apps. This
includes automation tools for configuration and deployment, making it ideal for the
organization's needs. {d}

(?)

This program Arithmetic operations (increasing sales values b 20%), storage (saving
data to the flash drive), and retrieval (reading data from the flash drive),
fulfilling all three basic tasks performed by computers.

You might also like