CIS 500 WEEK 5 MIDTERM
CIS 500 Week 5 Midterm
1. Why would
organizations use cloud computing during tough economic times?
2. List and explain the
four major steps in business performance management (BPM).
3. Which of the following
statements about data warehousing is false?
4. Database management
systems range in size and capabilities from the simple __________ to
full-featured __________ solutions.
5. Which of the following
is not a reason why managers and information workers may be constrained by
data?
6. Being a smart company
involves each of the following except:
7. Data warehouses are
designed as __________ systems, meaning that the data can be queried and
analyzed much more efficiently than online databases.
8. Which of the following
is not one of the essential defenses against botnets and malware?
9. Fingerprints, retinal
scans, and voice scans for user identification are examples of __________
controls.
10. Prior to 2002, what
was the common perspective on infosec?
11. What is the most
cost-effective approach to managing fraud?
12. The Sarbanes-Oxley Act
(SOX):
13. Wal-Mart’s global sourcing
strategy is designed:
14. Which of the following
is an advantage of batch processing over online transaction processing?
15. A transaction
processing system (TPS):
16. Which of the following
statements about virtualization is false?
17. Processing of
transactions is done in one of two modes:
18. What are three of the
major data functions performed by a DBMS? Briefly explain the functions.
19. Why do social networks
and cloud computing increase IT security risks? How can those risks be reduced?
20. Networks transmit
__________, which carry voice or data between a sender and a receiver.
21. What is significant
about 4G networks is that they do not have a __________, which both 2G and 3G
networks do have.
22. Why had various
information services—namely documents, voice, and video—functioned
independently of each other?
23. When you send a file
or e-mail message over a network, it is broken into smaller blocks called
__________ that follow different paths from the source to the destination.
24. Multiple networks were
needed to transmit documents, voice, and video because:
25. IS capabilities
support all of the following business objectives except:
26. Which of the following
is not a component of an information system?
27. Which of the following
is not an impact of the mass migration of users from PCs to mobile devices?
28. Which of the following
is a characteristic of competitive advantage?
29. While of the following
statements about mobile market opportunities is false?
30. List and explain the
four factors to consider when evaluating a mobile network
PART 2
1. All are factors
contributing to mobility except:
2. An enterprise’s
network capability depends on all of the following except:
3. Which of the following
is not a characteristic of intranets?
4. When you send a file
or e-mail message over a network, it is broken into smaller blocks called
__________ that follow different paths from the source to the destination.
5. What is significant
about 4G networks is that they do not have a __________, which
both 2G and 3G networks do have.
6. Which of the following
is an advantage of batch processing over online transaction processing?
7. What is a disadvantage
of cloud computing?
8. Because Wal-Mart has
thousands of suppliers to manage and is constantly looking for new ones
worldwide, they invested in a new __________ strategy.
9. The number of hours an
employee worked in a certain week is an example of:
10. Processing of
transactions is done in one of two modes:
11. List and explain the
four major steps in business performance management (BPM).
12. Identify three data
management problems arising from the file environment approach. Give an example
of each problem.
13. The Sarbanes-Oxley Act
(SOX):
14. What is the most
cost-effective approach to managing fraud?
15. Prior to 2002, what
was the common perspective on infosec?
16. Which of the following
is not one of the essential defenses against botnets and malware?
17. Fingerprints, retinal
scans, and voice scans for user identification are examples of __________
controls.
18. Which of the following
is a characteristic of competitive advantage?
19. IS capabilities
support all of the following business objectives except:
20. Which of the following
is not a component of an information system?
21. Price wars or other
fierce reactions by competitors are examples of:
22. According to Porter’s
competitive forces model, there are five major forces in an industry that
affect the degree of competition. Those five forces impact:
23. Why would
organizations use cloud computing during tough economic times?
24. Why do social networks
and cloud computing increase IT security risks? How can those risks be reduced?
25. Explain how data and
documents are transferred over a packet-switched network. In your explanation,
identify the format, protocol and transfer method. Compare and contrast how
data/documents are transferred to how voice is transferred over a
circuit-switched network.
26. Database management
systems range in size and capabilities from the simple __________ to
full-featured __________ solutions.
27. Which of the following
is not a reason why managers and information workers may be constrained by
data?
28. Which is not a benefit
of having a unified view of customers?
29. Customer name, invoice
number, and order date are examples of __________.
30. Data warehouses are
designed as __________ systems, meaning that the data can be queried and
analyzed much more efficiently than online databases.
No comments:
Post a Comment