0% found this document useful (0 votes)
18 views2 pages

Question Bank

s

Uploaded by

Shubham Keluskar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views2 pages

Question Bank

s

Uploaded by

Shubham Keluskar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Question Bank

**Module 1 - Introduction To Information Systems:**

1. Define an Information System (IS) and explain its components.


2. How does Information Technology (IT) impact organizations? Provide examples.
3. Discuss the importance of Information Systems to society and various sectors.
4. Explain the concept of organizational strategy and how Information Systems support it.
5. What are competitive advantages and how can Information Systems contribute to
achieving them?

**Module 2 - Data and Knowledge Management:**

6. Describe the database approach and its benefits in managing organizational data.
7. Define Big Data and discuss its significance in modern organizations.
8. Differentiate between a Data Warehouse and Data Marts.
9. What is Knowledge Management, and why is it crucial for organizations?
10. Explain the role of Business Intelligence (BI) in aiding managerial decision-making.

**Module 2 - Business Intelligence (BI):**

11. How does Business Intelligence (BI) assist in data analysis within an organization?
12. Discuss the types of data visualization techniques used in presenting BI results.
13. Provide examples of how BI tools can be used to improve operational efficiency.
14. Explain the concept of a dashboard in the context of Business Intelligence.
15. How does BI contribute to the identification of market trends and opportunities?

**Module 3 - Ethical Issues and Privacy:**

16. Define Information Security and its importance in the context of Information Systems.
17. List and explain the common threats to Information Systems and data.
18. Describe the concept of security controls and provide examples.
19. How can organizations mitigate the risks associated with social engineering attacks?
20. Discuss the ethical concerns related to the collection and use of personal data.

**Module 3 - Ethical Issues and Privacy (contd.):**

21. Explain the difference between confidentiality, integrity, and availability in information
security.
22. Discuss the role of encryption in safeguarding sensitive information.
23. How do regulations like GDPR impact the way organizations handle data?
24. Describe the steps an organization can take to establish a strong information security
culture.
25. Discuss the importance of regularly updating and patching software for security
purposes.

**Module 3 - Threat to IS and Security Controls:**


26. What is malware, and how can organizations defend against it?
27. Explain the concept of phishing and provide tips to avoid falling victim to it.
28. Describe the role of firewalls in protecting networks from unauthorized access.
29. What are intrusion detection systems (IDS), and how do they enhance information
security?
30. Discuss the importance of user authentication and access controls in maintaining
security.

**Module 3 - Threat to IS and Security Controls (contd.):**

31. Differentiate between a virus and a worm in the context of cybersecurity.


32. Explain the concept of multi-factor authentication and its benefits.
33. How does social engineering exploit human psychology to breach security?
34. Describe the purpose of disaster recovery planning and its components.
35. Discuss the potential security risks associated with using public Wi-Fi networks.

Important Points

Porters, Informed users, all threats unintentional and deliberate , types of knowledge ,
impact of IT on diff industries, health of employees, diff business pressures,
Decision making process, all attacks, privacy policies, users in organisation, Data breach,, IS
and its components, case study for porter , case study for components, strategies for
competitive advantage with examples,4 types of organizational information systems

In short DW DM DB keys ETL , BI impact on managerial decisions, diff security controls,how


BI impacts on decision making

You might also like