Tuesday, February 9, 2016

CIS 500 WEEK 5 MIDTERM


BUY HERE



CIS 500 Week 5 Midterm
1.     Why would organizations use cloud computing during tough economic times?
2.     List and explain the four major steps in business performance management (BPM).
3.     Which of the following statements about data warehousing is false?
4.     Database management systems range in size and capabilities from the simple __________ to full-featured __________ solutions.
5.     Which of the following is not a reason why managers and information workers may be constrained by data?
6.     Being a smart company involves each of the following except:
7.     Data warehouses are designed as __________ systems, meaning that the data can be queried and analyzed much more efficiently than online databases.
8.     Which of the following is not one of the essential defenses against botnets and malware?
9.     Fingerprints, retinal scans, and voice scans for user identification are examples of __________ controls.
10.   Prior to 2002, what was the common perspective on infosec?
11.   What is the most cost-effective approach to managing fraud?
12.   The Sarbanes-Oxley Act (SOX):
13.   Wal-Mart’s global sourcing strategy is designed:
14.   Which of the following is an advantage of batch processing over online transaction processing?
15.   A transaction processing system (TPS):
16.   Which of the following statements about virtualization is false?
17.   Processing of transactions is done in one of two modes:
18.   What are three of the major data functions performed by a DBMS? Briefly explain the functions.
19.   Why do social networks and cloud computing increase IT security risks? How can those risks be reduced?
20.   Networks transmit __________, which carry voice or data between a sender and a receiver.
21.   What is significant about 4G networks is that they do not have a __________, which both 2G and 3G networks do have.
22.   Why had various information services—namely documents, voice, and video—functioned independently of each other?
23.   When you send a file or e-mail message over a network, it is broken into smaller blocks called __________ that follow different paths from the source to the destination.
24.   Multiple networks were needed to transmit documents, voice, and video because:
25.   IS capabilities support all of the following business objectives except:
26.   Which of the following is not a component of an information system?
27.   Which of the following is not an impact of the mass migration of users from PCs to mobile devices?
28.   Which of the following is a characteristic of competitive advantage?
29.   While of the following statements about mobile market opportunities is false?
30.   List and explain the four factors to consider when evaluating a mobile network
PART 2
1.     All are factors contributing to mobility except:
2.     An enterprise’s network capability depends on all of the following except:
3.     Which of the following is not a characteristic of intranets?
4.     When you send a file or e-mail message over a network, it is broken into smaller blocks called __________ that follow different paths from the source to the destination.
5.     What is significant about 4G networks is that they do not have a __________, which both 2G and 3G networks do have.
6.     Which of the following is an advantage of batch processing over online transaction processing?
7.     What is a disadvantage of cloud computing?
8.     Because Wal-Mart has thousands of suppliers to manage and is constantly looking for new ones worldwide, they invested in a new __________ strategy.
9.     The number of hours an employee worked in a certain week is an example of:
10.   Processing of transactions is done in one of two modes:
11.   List and explain the four major steps in business performance management (BPM).
12.   Identify three data management problems arising from the file environment approach. Give an example of each problem.
13.   The Sarbanes-Oxley Act (SOX):
14.   What is the most cost-effective approach to managing fraud?
15.   Prior to 2002, what was the common perspective on infosec?
16.   Which of the following is not one of the essential defenses against botnets and malware?
17.   Fingerprints, retinal scans, and voice scans for user identification are examples of __________ controls.
18.   Which of the following is a characteristic of competitive advantage?
19.   IS capabilities support all of the following business objectives except:
20.   Which of the following is not a component of an information system?
21.   Price wars or other fierce reactions by competitors are examples of:
22.   According to Porter’s competitive forces model, there are five major forces in an industry that affect the degree of competition. Those five forces impact:
23.   Why would organizations use cloud computing during tough economic times?
24.   Why do social networks and cloud computing increase IT security risks? How can those risks be reduced?
25.   Explain how data and documents are transferred over a packet-switched network. In your explanation, identify the format, protocol and transfer method. Compare and contrast how data/documents are transferred to how voice is transferred over a circuit-switched network.
26.   Database management systems range in size and capabilities from the simple __________ to full-featured __________ solutions.
27.   Which of the following is not a reason why managers and information workers may be constrained by data?
28.   Which is not a benefit of having a unified view of customers?
29.   Customer name, invoice number, and order date are examples of __________.
30.   Data warehouses are designed as __________ systems, meaning that the data can be queried and analyzed much more efficiently than online databases.








                     

No comments:

Post a Comment