Strayer CIS500 Week 5 Midterm

CIS 500 Week 5 Midterm Exam

Question 1

Why would organizations use cloud computing during tough economic times?

Answer

Question 2

List and explain the four major steps in business performance management (BPM).

Answer

Selected Answer:

Step 1 – Decide on desired performance levels – Whats our company goals or objectives.

Step 2 – Determine how to attain the performance levels – How we are gonna achieve those goals.

Step 3 – Periodically assess where the organization stands with respect to its goals, objectives, and measures – Whats our company status in achieving our goals.

Step 4 – Adjust performance and/or goals – How are we doing is there any issues, if so, apply corrective actions.

Question 3

Which of the following statements about data warehousing is false?

Answer

Question 4

Database management systems range in size and capabilities from the simple __________ to full-featured __________ solutions.

Answer

Question 5

Which of the following is not a reason why managers and information workers may be constrained by data?

Answer

Question 6

Being a smart company involves each of the following except:

Answer

Question 7

Data warehouses are designed as __________ systems, meaning that the data can be queried and analyzed much more efficiently than online databases.

Answer

Question 8

Which of the following is not one of the essential defenses against botnets and malware?

Answer

Question 9

Fingerprints, retinal scans, and voice scans for user identification are examples of __________ controls.

Answer

Question 10

Prior to 2002, what was the common perspective on infosec?

Answer

Question 11

What is the most cost-effective approach to managing fraud?

Answer

Question 12

The Sarbanes-Oxley Act (SOX):

Answer

Question 13

Wal-Mart’s global sourcing strategy is designed:

Answer

Question 14

Which of the following is an advantage of batch processing over online transaction processing?

Answer

Question 15

A transaction processing system (TPS):

Answer

Question 16

Which of the following statements about virtualization is false?

Answer

Question 17

Processing of transactions is done in one of two modes:

Answer

Question 18

What are three of the major data functions performed by a DBMS? Briefly explain the functions.

Answer

Question 19

Why do social networks and cloud computing increase IT security risks? How can those risks be reduced?

Answer

Response Feedback:

Please check the correc t answer.

Question 20

Networks transmit __________, which carry voice or data between a sender and a receiver.

Answer

Question 21

What is significant about 4G networks is that they do not have a __________, which both 2G and 3G networks do have.

Answer

Question 22

Why had various information services—namely documents, voice, and video—functioned independently of each other?

Answer

Question 23

When you send a file or e-mail message over a network, it is broken into smaller blocks called __________ that follow different paths from the source to the destination.

Answer

Question 24

Multiple networks were needed to transmit documents, voice, and video because:

Answer

Question 25

IS capabilities support all of the following business objectives except:

Answer

Question 26

Which of the following is not a component of an information system?

Answer

Question 27

Which of the following is not an impact of the mass migration of users from PCs to mobile devices?

Answer

Question 28

Which of the following is a characteristic of competitive advantage?

Answer

Question 29

While of the following statements about mobile market opportunities is false?

Answer

Question 30

List and explain the four factors to consider when evaluating a mobile network.