Download presentation
Presentation is loading. Please wait.
Published byPiers Atkins Modified over 8 years ago
2
IPM Quiz
3
Select which chapter to test Chapter One Two & Three Chapter Four & Five Chapter Six & Seven Chapter Eight
4
Chapter One, Two & Three 100200300 100200300 100200300 100200300 100200300 100200300 Chapter 4 & 5 Chapter 6 & 7 Chapter 8
5
Chapter One 100 These steps transform data into information. There are numerous steps to be used. The Information Processing Steps Home
6
Chapter One 100 This group of components are made to process, manage and protect data and Information. Information Systems: It is made up of People, Procedures, Hardware and software, data Home
7
Chapter One 100 This consists of computer programs that are the direct control and operation of the computer. System Software Home
8
Chapter One 10 This is prewritten off the shelf Application Software Home
9
Chapter One 100 Sequence of tasks which must be completed in order to follow an Information System Step. A procedure Home
10
Chapter One 100 Entails steps to which a problem can be solved. Problem Solving Methodology Home
11
Chapter One 200 This is a defined sequence through which an Information System goes through in its life. The System Development Life Cycle Home
12
Chapter One 200 The idea of this organisation is to make a profit. Profit-Based-Organisation Home
13
Chapter One 200 These are the broad targets in an organisation Organisational Goal Home
14
Chapter Two 200 This can be measured through the use of inputs, such as labour, money and raw materials Efficiency Home
15
Chapter Two 200 Formal written statement describes its purpose of an organisation and includes a general description of current and future activities. A mission statement Home
16
Chapter Two 200 These decisions are made by CEO’s and General Managers. Strategic Decisions Home
17
Chapter Two 300 These are more specific than goals. They set out the desired aims or end results. An Objective Home
18
Chapter Two 300 People who use this information require it highly summarised forecasting 3 – 5 year plans Strategic management Home
19
Chapter Two 300 Carries out planning tasks and preparing budgets, require summarised information in the form of weekly monthly quarterly or annually summary reports. Tactical management Home
20
Chapter Three 300 Require detailed information in order to perform their work tasks. E.g. advise customers about a product. Non management workers Home
21
Chapter Three 300 Information is valuable and suitable for decision making. You must some of these attributes. Accuracy Timeliness Clarity Relevance Home
22
Chapter Three 300 Data is collected first hand it is unpublished from direct sources. Primary Source Home
23
Chapter Three 300 The removal of unwanted files from the computer. Disposal Home
24
Chapter 3 300 Data gathered from published material can be obtained from mass media such as books or the Internet. Secondary Source Home
25
Chapter 3 400 Process of entering data and instructions into a computer. Input Home
26
Chapter 3 400 This criteria is used to evaluate software functions. Ease of use Efficiency Effectiveness Home
27
Chapters 4 & 5 Chapter 4Chapter 5 Home Chapter 1, 2 & 3Chapter 6 & 7Chapter 8
28
Chapter 4 100200300400 100200300400 100200300400 100200300 Extra Special Question Home
29
Chapter 4 100 These arise for a number of reasons for example: technological changes, changing organisational needs, external factors or things going wrong. Information Problems Back
30
Chapter 4 100 There are four main stages to solving an Information Problem Problem Solving Methodology Home
31
Extra Special Question What date and time is the Exam for IPM? Monday 9 th of November 3 pm -5-15 pm Home
32
Chapter 4 100 These are the different ways in which you can solve an Information Problem Top Down Bottom Up Trial and Error Home
33
Chapter 4 200 This type of testing involves applying another series of tests during the development of a solution to confirm that newly added sections work as required. Informal testing Home
34
Chapter 4 200 This is a written statement which describes how to use a solution software tool or an Information System. User Documentation Home
35
Chapter 4 200 This is where you make the solution ready for use by anyone who would need it. Implementing the Solution Home
36
Chapter 4 200 The idea of this step is that you confirm that the possible solution produces the desired results. Testing the Solution Home
37
Chapter 4 300 Data is prepared for input to a solution which has associated outcomes. It is used to check the validation of the solution or processing techniques incorporated into the solution. Test Data Home
38
Chapter 4 300 The aim of this is to find out if the solution is meeting the needs of the user and the organisation. Evaluating the Solution Home
39
Chapter 4 300 These factors must be considered when assessing the effectiveness of the solution to information problems. Accessibility Functionality Ease of use Reliability Home
40
Chapter 4 300 A project goes through 4 basic stages, what are they? Defining a Project Design the Project Execute the Project Terminate the Project Home
41
Chapter 4 400 These are used to diagrammatically represent the main project document details including tasks, timeframes team members, dependencies and responsibilities. Gantt Charts Home
42
1002003004001000 1002003004001000 Chapter 5 Chapters 1, 2 & 3Chapter 6 Chapter 8 Chapter 7 Chapter 4 Home
43
Chapter 5 100 All Information systems follow this process. It receives information from their environments, processes the information and produces output back into the environment. IPO (Input Process Output) Home
44
Chapter 5 100 The goals are translated into objectives which set out specific or desired outcomes Information System Objectives Home
45
Chapter 5 200 This person teaches you how to use application and operating software Computer Technician Home
46
Chapter 5 200 These are the physical parts of the computer Computer Hardware Home
47
Chapter 5 300 This section of the computer executes program instructions to process data into information and controls the peripheral devices connected to the system unit. CPU Home
48
Chapter 5 300 This is short term memory it is loaded each time the computer is turned on. It loses the memory when it is switched off. RAM Home
49
Chapter 5 400 This has a large hard disk and memory capacities that support a network of computers. It allows users to share files, programs and peripheral devices. A Server Home
50
Chapter 5 400 These are the most expensive and most powerful computers Super Computer Home
51
Chapter 5 1000 This is an object oriented programming language Java Home
52
Chapter 5 1000 These are different types of Information Systems. Can you name all of them? Transaction Processing System Office automation System Management Information System Executive Information System Decision Support system Expert System Home
53
Chapters 6 & 7 Chapter 6Chapter 7 Home Chapter 5Chapter 1, 2 & 3Chapter 4
54
1002003004001000 1002003004001000 Chapter 6 Home
55
Chapter 6 100 These types of Information systems are designed to produce information for Senior Management. They use highly summarised reports Executive Information System Home
56
Chapter 6 100 These management use this information system, they make decisions by summarising and comparing data or information obtained from interna or external sources. Decision Support System Home
57
Chapter 6 200 This type of system combines the knowledge of human experts into a computer based system that stimulates aspects of human reasoning and decision making processes. Expert System Home
58
Chapter 6 200 Mouse, track point, track pad, joystick pen based device and touch screen are all what type of deceives Pointing devices Home
59
Chapter 6 300 This is a technique for minimising data loss in the even of a disk failure where two disk drives record identical data. Disk MirroringHome
60
Chapter 6 300 This is the process of testing data to ensure its valid. Validation Home
61
Chapter 6 400 This is where you check the stored data against its original source Verification Home
62
Chapter 6 400 This is the process of transferring inactive files which need to be retained from a hard disk and coping them onto another medium before deleting them. Archiving Home
63
Chapter 6 1000 This is the use of one or more human physical characters to identify those authorised to ender a specific area. Biometrics Home
64
Chapter 6 1000 What type of software barriers are there available to stop unauthorised access. User name Passwords Monitoring logins Keep audit trails Access restrictions Encryptions, Home
65
Chapter 7 1002003004001000 1002003004001000 Home Chapter 6Chapter 5Chapter 4Chapter 3, 2 & 1
66
Chapter 7 100 This is a power supply that is uninterrupted. UPS (Interrupted power supply)Home
67
Chapter 7 100 This act has stopped companies from passing on personal information to a third party. Individuals can access information about themselves held by an organisation and correct errors. Organisations must set up formal policies on email use and inform employees of the policies. Privacy Amendment Act Private Sector 2000 Home
68
Chapter 7 200 This act covers personal information Privacy Act 1988 Home
69
Chapter 7 200 This act covers personal information held by the public sector in Victoria Information Privacy Act 2000 Home
70
Chapter 7 300 This act covers health information Health Records Act 2001 Home
71
Chapter 7 300 Works include artistic, literacy, musical works, television and sound broadcasts, dram works, films, computer programs Copyright Amendment Act 2000 Home
72
Chapter 7 400 These are individuals who have a vested interest in the organisation Stakeholders Home
73
Chapter 7 400 This act protects the owner by: Allowing them to control when their work will be digitised and how it will be communicated. Increase the power to use technological copyright protection devices Making it illegal for a person to tamper with the copyright statement on a digitised version of the work. Copyright amendment act digital agenda 2000 Home
74
Chapter 7 1000 Government policy, Community Values and legislation of privacy of information are all impetus for change from what major change agent? Social Home
75
Chapter 7 1000 Competitive Edge, Telecommunications and downsizing are all impetus for change from what major change agent? Economic Impetus Home
76
Chapter 8 The final section to Network Jeopardy Home Chapter 3, 2 & 1Chapter 4Chapter 5Chapter 6Chapter 7
77
Chapter 8 1002003004001000 1002003004001000
78
Chapter 8 100 In the SDLC list the different stages of the life cycle Analysis Design Development Implementation Evaluation Home
79
Chapter 8 200 Name 4 different training techniques Informal training Computer based training Formal external courses Seminars conferences Exhibitions Manuals Tutorials. Home
80
Chapter 8 200 What are the different types of conversion to a new system are there? Direct Phased Pilot Parallel Home
81
Chapter 8 300 How can you measure the performance of a new system? Ask employees what tasks they have completed during a set time. Observing the systems capacity to cope during peek periods Costing a total days work in terms of work, wages, materials and power Error logs Survey Customers Log of enquiries Check absentee rates Home
82
Chapter 8 300 This is where each stage of the SDLC is completed in turn until the new system is handed over. Waterfall method Home
83
Chapter 8 400 When managing the project as a change you go through these stages. What are they? Define the Project Preliminary investigation Develop a broad plan Planning and executing each stage Terminate the project Home
84
Chapter 8 400 This represents each project in the order of their dependencies Pert Chart Home
85
General Book Information 1000 This is an interconnected group of computers and peripheral devices located within a limited area of 1 square kilometre LAN Home
86
Chapter 8 1000 There is no central file server all workstations share the task of sorting files and have access to the files located on all other workstations Peer to Peer Network Home
87
Final Section of the Power point General Information General Information General Information General Information General Information General Information General Information General Information
88
General Book Information Client server & Peer to Peer are both kinds of what networks? LANS Home
89
General Book Information The different types of cables are: Twisted Pair Coaxial Cable Fiber-Optic Cable Home
90
General Book Information The different type of network topologies are: Bus Token Ring Star Home
91
General Book Information In a network these are used in LANS to retransmit data to all computers they are connected to. Each computer decides if the packet is for them or not. Hub Home
92
General Book Knowledge This is used in a LAN to retransmit data recovered from one computer only to the computer to which the data is intended. Switch Home
93
General Book Knowledge This is used to link two or more otherwise separate networks only allowing data through from one network to another if the data is intended for a computer on that network Router Home
94
General Book Knowledge This is used to connect a computer into a network cable. Network Interface Card (NIC) Home
95
General book knowledge This is the end of the slide show. I hope you have enjoyed it. Any problems or queries please email ec@stlehena.vic.edu.au
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.