CIS 500 Week 5 Midterm Exam http://www.homework-bank.com/downloads/cis-500-week-5midterm-exam/ Paste the above URL into your browser
CIS 500 Week 5 Midterm Exam •
Question 1
Because Wal-Mart has thousands of suppliers to manage and is constantly looking for new ones worldwide, they invested in a new __________ strategy. •
Question 2
Which of the following is an advantage of batch processing over online transaction processing? •
Question 3 Wal-Mart’s global sourcing strategy is designed:
•
Question 4 Which of the following statements about virtualization is false?
•
Question 5 The number of hours an employee worked in a certain week is an example of:
•
Question 6 Why would organizations use cloud computing during tough economic times?
•
Question 7 What is the most cost-effective approach to managing fraud?
•
Question 8 Prior to 2002, what was the common perspective on infosec?
•
Question 9 Which of the following is not one of the essential defenses against botnets and malware?
•
Question 10 A majority of data breaches involve:
•
Question 11 Protecting data and business operations involves all of the following efforts except:
•
Question 12
Explain how data and documents are transferred over a packet-switched network. In your explanation, identify the format, protocol and transfer method. Compare and contrast how data/documents are transferred to how voice is transferred over a circuit-switched network. •
Question 13
What are three of the major data functions performed by a DBMS? Briefly explain the functions. •
Question 14 List and explain the four major steps in business performance management (BPM).
•
Question 15 Which of the following statements about data warehousing is false?
•
Question 16 Being a smart company involves each of the following except:
•
Question 17
Data warehouses are designed as __________ systems, meaning that the data can be queried and analyzed much more efficiently than online databases. •
Question 18
Businesses that collect data about employees and customers have the legal duty to __________. •
Question 19
As a general rule, in order to maximize earnings, companies invest in data management technologies that increase: •
Question 20 Implementing security programs raises many ethical issues. Identify two of these ethical
issues.
•
Question 21 IS capabilities support all of the following business objectives except:
•
Question 22 Basic functions of an IS are:
•
Question 23 Which of the following is a characteristic of competitive advantage?
•
Question 24
According to Porter’s competitive forces model, there are five major forces in an industry that affect the degree of competition. Those five forces impact: •
Question 25 While of the following statements about mobile market opportunities is false?
•
Question 26 Multiple networks were needed to transmit documents, voice, and video because:
•
Question 27 Which of the following is not a characteristic of intranets?
•
Question 28
What is significant about 4G networks is that they do not have a __________, which both 2G and 3G networks do have. •
Question 29 Networks transmit __________, which carry voice or data between a sender and a receiver.
•
Question 30
When you send a file or e-mail message over a network, it is broken into smaller blocks called __________ that follow different paths from the source to the destination.