CIS 500 Week 5 Midterm Exam

Question # 00089845 Posted By: A+ Tutors Updated on: 08/06/2015 04:05 PM Due on: 08/06/2015
Subject Computer Science Topic Networking Tutorials:
Question
Dot Image

CIS 500 Week 5 Midterm Exam

1. Because Wal-Mart has thousands of suppliers to manage and is constantly looking for new ones worldwide, they invested in a new __________ strategy.

2. Which of the following is an advantage of batch processing over online transaction processing?

3. Wal-Mart’s global sourcing strategy is designed:

4. Which of the following statements about virtualization is false?

5. The number of hours an employee worked in a certain week is an example of:

6. Why would organizations use cloud computing during tough economic times? • Question

7. What is the most cost-effective approach to managing fraud?

8. Prior to 2002, what was the common perspective on infosec?

9. Which of the following is not one of the essential defenses against botnets and malware?

10. A majority of data breaches involve:

11. Protecting data and business operations involves all of the following efforts except:

12. Explain how data and documents are transferred over a packet-switched network. In your explanation, identify the format, protocol and transfer method. Compare and contrast how data/documents are transferred to how voice is transferred over a circuit-switched network.

13. What are three of the major data functions performed by a DBMS? Briefly explain the functions.

14. List and explain the four major steps in business performance management (BPM).

15. Which of the following statements about data warehousing is false?

16. Being a smart company involves each of the following except:

17. Data warehouses are designed as __________ systems, meaning that the data can be queried and analyzed much more efficiently than online databases.

18. Businesses that collect data about employees and customers have the legal duty to __________.

19. As a general rule, in order to maximize earnings, companies invest in data management technologies that increase:

20. Implementing security programs raises many ethical issues. Identify two of these ethical issues.

21. IS capabilities support all of the following business objectives except:

22. Basic functions of an IS are:

23. Which of the following is a characteristic of competitive advantage?

24. According to Porter’s competitive forces model, there are five major forces in an industry that affect the degree of competition. Those five forces impact:

25. While of the following statements about mobile market opportunities is false?

26. Multiple networks were needed to transmit documents, voice, and video because:

27. Which of the following is not a characteristic of intranets?

28. What is significant about 4G networks is that they do not have a __________, which both 2G and 3G networks do have.

29. Networks transmit __________, which carry voice or data between a sender and a receiver.

30. When you send a file or e-mail message over a network, it is broken into smaller blocks called __________ that follow different paths from the source to the destination.

Dot Image
Tutorials for this Question
  1. Tutorial # 00084232 Posted By: A+ Tutors Posted on: 08/06/2015 04:07 PM
    Puchased By: 2
    Tutorial Preview
    The solution of CIS 500 Week 5 Midterm Exam...
    Attachments
    CIS_500_Week_5_Midterm_Exam.docx (70.88 KB)

Great! We have found the solution of this question!

Whatsapp Lisa