CIS 500 Midterm Exam ( 60/60 Correct Answers )

CIS 500 Midterm Exam ( 60/60 Correct Answers )

 

CIS 500 Midterm

 

Question 1

Why would organizations use cloud computing during tough economic times?

 

Question 2

List and explain the four major steps in business performance management (BPM).

 

Question 3

Which of the following statements about data warehousing is false?

 

Question 4

Database management systems range in size and capabilities from the simple __________ to full-featured __________ solutions.

 

Question 5

Which of the following is not a reason why managers and information workers may be constrained by data?

 

Question 6

Being a smart company involves each of the following except:

 

Question 7

Data warehouses are designed as __________ systems, meaning that the data can be queried and analyzed much more efficiently than online databases.

 

Question 8

Which of the following is not one of the essential defenses against botnets and malware?

 

Question 9

Fingerprints, retinal scans, and voice scans for user identification are examples of __________ controls.

 

Question 10

Prior to 2002, what was the common perspective on infosec?

 

Question 11

What is the most cost-effective approach to managing fraud?

 

Question 12

The Sarbanes-Oxley Act (SOX):

 

Question 13

Wal-Mart’s global sourcing strategy is designed:

 

Question 14

Which of the following is an advantage of batch processing over online transaction processing?

 

Question 15

A transaction processing system (TPS):

 

Question 16

Which of the following statements about virtualization is false?

 

Question 17

Processing of transactions is done in one of two modes:

 

Question 18

What are three of the major data functions performed by a DBMS? Briefly explain the functions.

 

Question 19

Why do social networks and cloud computing increase IT security risks? How can those risks be reduced?

 

Question 20

Networks transmit __________, which carry voice or data between a sender and a receiver.

 

Question 21

What is significant about 4G networks is that they do not have a __________, which both 2G and 3G networks do have.

 

Question 22

Why had various information services—namely documents, voice, and video—functioned independently of each other?

Question 23

When you send a file or e-mail message over a network, it is broken into smaller blocks called __________ that follow different paths from the source to the destination.

 

Question 24

Multiple networks were needed to transmit documents, voice, and video because:

 

Question 25

IS capabilities support all of the following business objectives except:

 

Question 26

Which of the following is not a component of an information system?

 

Question 27

Which of the following is not an impact of the mass migration of users from PCs to mobile devices?

 

Question 28

Which of the following is a characteristic of competitive advantage?

 

Question 29

While of the following statements about mobile market opportunities is false?

 

Question 30

List and explain the four factors to consider when evaluating a mobile network.

 

  • Question 31

 

All are factors contributing to mobility except:

 

  • Question 32

 

An enterprise’s network capability depends on all of the following except:

 

  • Question 33

 

Which of the following is not a characteristic of intranets?

 

  • Question 34

 

When you send a file or e-mail message over a network, it is broken into smaller blocks called __________ that follow different paths from the source to the destination.

 

  • Question 35

 

What is significant about 4G networks is that they do not have a __________, which both 2G and 3G networks do have.

 

  • Question 36

 

Which of the following is an advantage of batch processing over online transaction processing?

 

  • Question 37

 

What is a disadvantage of cloud computing?

 

  • Question 38

Because Wal-Mart has thousands of suppliers to manage and is constantly looking for new ones worldwide, they invested in a new __________ strategy.

 

  • Question 39

 

The number of hours an employee worked in a certain week is an example of:

 

  • Question 40

 

Processing of transactions is done in one of two modes:

 

  • Question 41

 

List and explain the four major steps in business performance management (BPM).

 

  • Question 42

 

Identify three data management problems arising from the file environment approach. Give an example of each problem.

 

  • Question 43

 

The Sarbanes-Oxley Act (SOX):

 

  • Question 44

 

What is the most cost-effective approach to managing fraud?

 

  • Question 45

Prior to 2002, what was the common perspective on infosec?

 

  • Question 46

 

Which of the following is not one of the essential defenses against botnets and malware?

 

  • Question 47

 

Fingerprints, retinal scans, and voice scans for user identification are examples of __________ controls.

 

  • Question 48

 

Which of the following is a characteristic of competitive advantage?

 

  • Question 49

 

IS capabilities support all of the following business objectives except:

 

  • Question 50

 

Which of the following is not a component of an information system?

 

  • Question 51

 

Price wars or other fierce reactions by competitors are examples of:

 

  • Question 52

 

According to Porter’s competitive forces model, there are five major forces in an industry that affect the degree of competition. Those five forces impact:

 

  • Question 53

 

Why would organizations use cloud computing during tough economic times?

 

  • Question 54

 

Why do social networks and cloud computing increase IT security risks? How can those risks be reduced?

 

  • Question 55

 

Explain how data and documents are transferred over a packet-switched network. In your explanation, identify the format, protocol and transfer method. Compare and contrast how data/documents are transferred to how voice is transferred over a circuit-switched network.

 

  • Question 56

 

Database management systems range in size and capabilities from the simple __________ to full-featured __________ solutions.

 

  • Question 57

 

Which of the following is not a reason why managers and information workers may be constrained by data?

 

  • Question 58

 

Which is not a benefit of having a unified view of customers?

 

  • Question 59

 

Customer name, invoice number, and order date are examples of __________.

 

  • Question 60

 

Data warehouses are designed as __________ systems, meaning that the data can be queried and analyzed much more efficiently than online databases.