ITMG 100 CHAPTER QUIZ REVIEW GUIDE
Chapter One – Introduction to Information Systems
Flatteners and Competitive Advantage Slides
Chapter Two – Information Systems in the Organization
Chapter Eight – Enterprise Systems
1. Identify and describe the six basic transaction processing activities performed by transaction processing systems.
2. Define and describe what a transaction processing systems (TPS) is, its purpose, and be able to provide an example.
3. Define functional area information systems (FAIS), and be able to provide an example of the support they provide for each functional area of the organization.
4. What the difference between a batch and online transaction processing.
5. What is an enterprise system? Identify three different types.
6. Identify advantages and drawbacks to implementing an ERP system.
7. How do customer relationship management systems help organizations achieve customer intimacy?
8. What are four key business capabilities in CRM?
9. Discuss the relationship between CRM and customer privacy.
10. Distinguish between operational CRM systems and analytical CRM systems.
11. Differentiate between customer-facing CRM applications and customer-touching CRM applications.
12. Define the term supply chain; describe the three components and the three flows of a supply chain.
13. Identify two major challenges in setting accurate inventory levels throughout the supply chain.
14. Describe what push and pull means in supply chains.
Chapter Six – Networks
1. Define the terms computer network, compare and contrast the different network topology, and know the different types of networks.
2. Describe the differences amount the three types of wired communications media and discuss the main advantages/disadvantages of each type.
3. Understand the two main network protocols, Ethernet and TCP-IP (includes packet switching, client-server and peer-to-peer).
4. Differentiate between the Internet and the World Wide Web. Discuss the most common methods for accessing the Internet.
5. What is an IP address, what is a URL?
6. Discuss different types of wireless media communication.
7. What is channel bandwidth?
8. Should the Internet be regulated?
9. What is Internet censorship?
10. What is cloud computing? Identify three different ways to deploy.
Chapter Three - Hardware
Chapter Two - Software
1. What is the role of the operating system? 2. Identify and describe the five types of operating system interfaces
3. The Mac OS X supports dual booting. What is this and what benefits does it provide? 4. What is open-source software? What are the benefits and drawbacks for a business using open-source software?
5. What is the difference between freeware and open-source software?
Protecting Your Assets
Chapter Thirteen – Cybercrime and Information Security
1. What are the six reason why computer incidents are so prevalent. (or five factors that contribute to the increasing vulnerability of information resources and be able to provide a specific example of each factor.)
2. What is BYOD?
3. What is a zero-day attack?
4. What is the difference between human error and social engineering?
5. What are the ten types of deliberate attacks?
6. What is the difference between a black hat hacker and a cracker?
7. What are the three risk mitigation strategies and be able to provide an example of each one.
8. Identify the three major types of controls that organizations can use to protect their information resource.
9. What is the CAN-SPAM act? What is CAPTCHA?
10. What is reasonable assurance?
11. What is the intent of a security policy?
Chapter Fourteen – Ethical, Legal, and Social Issues of Information Systems