100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

LSUS ISDS FINAL EXAMINATION WITH COMPLETE SOLUTIONS

Rating
-
Sold
-
Pages
17
Grade
A+
Uploaded on
12-05-2025
Written in
2024/2025

T/F Data marts take advantage of data purchased from third party firms, while data warehouses are composed entirely of proprietary corporate data. - ANSWER-FALSE Data marts take advantage of data purchased from third party firms, while data warehouses are composed entirely of proprietary corporate data. FALSE Regarding DDos attack, which of the following would be a good example? - ANSWER-Overloading a popular social networking site with inbound messages in order to shut down access to the site

Show more Read less
Institution
LSUS ISDS 705
Module
LSUS ISDS 705










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
LSUS ISDS 705
Module
LSUS ISDS 705

Document information

Uploaded on
May 12, 2025
Number of pages
17
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

LSUS ISDS 705 FINAL
EXAMINATION WITH COMPLETE
VERIFIED SOLUTIONS


T/F Data marts take advantage of data purchased from third party firms, while data
warehouses are composed entirely of proprietary corporate data. - ANSWER-FALSE Data
marts take advantage of data purchased from third party firms, while data warehouses are
composed entirely of proprietary corporate data. FALSE


Regarding DDos attack, which of the following would be a good example? - ANSWER-
Overloading a popular social networking site with inbound messages in order to shut down
access to the site


What area of application of Data Mining is referred to when companies use and leverage data
to determine which services or products clients purchase together, and how they use this data
to cross sell extra services and products. - ANSWER-Market Basket Analysis


Regarding information security, which of the following statements is consistent with ground
realities? - ANSWER-Law-enforcement agencies struggles to hire, train, and retain staff
capable of keeping pace with today's cyber-criminals.


T/F The data a firm can leverage is a true strategic asset when it is rare, valuable, non-
substitutable, and imperfectly imitable. - ANSWER-TRUE The data a firm can leverage is a
true strategic asset when it is rare, valuable, non-substitutable, and imperfectly imitable.
TRUE


Which of the following term is used to describe raw facts and figures? - ANSWER-Data


The equation ____[BLANK]____ represents the market capitalization of a company -
ANSWER-Share price × Number of shares


T/F Cache is a component that stores data temporarily so that future requests of computing
tasks for that data can be served faster; the data stored in a cache might be the results of an
earlier computation, or a duplicate of data stored elsewhere - ANSWER-T/F [TRUE]

, LSUS ISDS 705 FINAL
EXAMINATION WITH COMPLETE
VERIFIED SOLUTIONS

Cache is a component that stores data temporarily so that future requests of computing tasks
for that data can be served faster; the data stored in a cache might be the results of an earlier
computation, or a duplicate of data stored elsewhere. [TRUE]


T/F Following a rapid prototyping methodology is basically repeatedly performing the
analysis, design, and implementation phases concurrently in a cycle until the software is
completed. Then after the software is complete, it goes back from scratch through a thorough
design and implementation to complete the project. - ANSWER-


The ____[BLANK]____ phase of the SDLC is the part of understanding why an information
system should be built and determining why the project team will build it. - ANSWER-
Planning phase


____[BLANK]____ is the parameter that significantly impact the rank of a website in
Google's search results. - ANSWER-The number of other pages linking to a given page


Following the ____[BLANK]____ development methodology is a linear project management
approach that proceeds in a sequences from one phase to the next - ANSWER-Waterfall


T/F "What should the software produce for the users?" and "who will be the users of the
software?" are the main questions answered within the "Analysis" phase of the SDLC. -
ANSWER-TRUE "What should the software produce for the users?" and "who will be the
users of the software?" are the main questions answered within the "Analysis" phase of the
SDLC. TRUE
Big Data - ANSWER-The collections, storage, and analysis of extremely large, complex, and
often unstructured data sets that can be used by organizations to generate insights that would
otherwise be impossible to make


Within a major pharmaceutical company in the US, there was a research scientist caught
passing top secret highly sensitive information of composition and test results of the
company's newest drug that are worth millions of dollars to a competitor. What crime is he
being held responsible for? - ANSWER-Corporate espionage

, LSUS ISDS 705 FINAL
EXAMINATION WITH COMPLETE
VERIFIED SOLUTIONS


What is E-Discovery? - ANSWER-Identifying and retrieving relevant electronic information
to support litigation efforts


T/F Hadoop as an open source project was created to analyze extremely large amount of raw
data and computation - ANSWER-TRUE


Regarding infiltration techniques, which of the following types does one open up to by
posting sensitive personal information and details about one's workplace on social
networking sites? - ANSWER-Social Engineering


Cookies are only stored on the website visited, not on the user's PC. - ANSWER-FALSE
Cookies are only stored on the website visited, not on the user's PC. FALSE


Within the phases of SDLC, "construct" of software or an application is a step which happens
at the ____[BLANK]____ phase. - ANSWER-Implementation phase


____[BLANK]____ is the magnitude of Google's revenue. - ANSWER-Advertising


Market capitalization (market cap) - ANSWER-The value of a firm calculated by multiplying
its share price by the number of shares.


Business intelligence (BI) - ANSWER-Combines aspects of reporting, data exploration and
ad hoc queries, and sophisticated data modeling and analysis.


Organic or Natural Search - ANSWER-Search engine results returned and ranked according
to relevance.
£11.68
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
BESTSTUDYAIDS

Get to know the seller

Seller avatar
BESTSTUDYAIDS (self)
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
1 year
Number of followers
0
Documents
55
Last sold
-
THE FORINSTANCE LEARNING HUB

A hub you can access all the learning materials you need.

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions