Cis 500 week 5 midterm exam

Page 1

CIS 500 Week 5 Midterm Exam http://www.homework-bank.com/downloads/cis-500-week-5midterm-exam/ Paste the above URL into your browser

CIS 500 Week 5 Midterm Exam •

Question 1

Because Wal-Mart has thousands of suppliers to manage and is constantly looking for new ones worldwide, they invested in a new __________ strategy. •

Question 2

Which of the following is an advantage of batch processing over online transaction processing? •

Question 3 Wal-Mart’s global sourcing strategy is designed:

Question 4 Which of the following statements about virtualization is false?

Question 5 The number of hours an employee worked in a certain week is an example of:

Question 6 Why would organizations use cloud computing during tough economic times?

Question 7 What is the most cost-effective approach to managing fraud?

Question 8 Prior to 2002, what was the common perspective on infosec?

Question 9 Which of the following is not one of the essential defenses against botnets and malware?


Question 10 A majority of data breaches involve:

Question 11 Protecting data and business operations involves all of the following efforts except:

Question 12

Explain how data and documents are transferred over a packet-switched network. In your explanation, identify the format, protocol and transfer method. Compare and contrast how data/documents are transferred to how voice is transferred over a circuit-switched network. •

Question 13

What are three of the major data functions performed by a DBMS? Briefly explain the functions. •

Question 14 List and explain the four major steps in business performance management (BPM).

Question 15 Which of the following statements about data warehousing is false?

Question 16 Being a smart company involves each of the following except:

Question 17

Data warehouses are designed as __________ systems, meaning that the data can be queried and analyzed much more efficiently than online databases. •

Question 18

Businesses that collect data about employees and customers have the legal duty to __________. •

Question 19

As a general rule, in order to maximize earnings, companies invest in data management technologies that increase: •

Question 20 Implementing security programs raises many ethical issues. Identify two of these ethical

issues.


Question 21 IS capabilities support all of the following business objectives except:

Question 22 Basic functions of an IS are:

Question 23 Which of the following is a characteristic of competitive advantage?

Question 24

According to Porter’s competitive forces model, there are five major forces in an industry that affect the degree of competition. Those five forces impact: •

Question 25 While of the following statements about mobile market opportunities is false?

Question 26 Multiple networks were needed to transmit documents, voice, and video because:

Question 27 Which of the following is not a characteristic of intranets?

Question 28

What is significant about 4G networks is that they do not have a __________, which both 2G and 3G networks do have. •

Question 29 Networks transmit __________, which carry voice or data between a sender and a receiver.

Question 30

When you send a file or e-mail message over a network, it is broken into smaller blocks called __________ that follow different paths from the source to the destination.


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.