EXAMINATION WITH COMPLETE
VERIFIED SOLUTIONS
T/F Data marts take advantage of data purchased from third party firms, while data
warehouses are composed entirely of proprietary corporate data. - ANSWER-FALSE Data
marts take advantage of data purchased from third party firms, while data warehouses are
composed entirely of proprietary corporate data. FALSE
Regarding DDos attack, which of the following would be a good example? - ANSWER-
Overloading a popular social networking site with inbound messages in order to shut down
access to the site
What area of application of Data Mining is referred to when companies use and leverage data
to determine which services or products clients purchase together, and how they use this data
to cross sell extra services and products. - ANSWER-Market Basket Analysis
Regarding information security, which of the following statements is consistent with ground
realities? - ANSWER-Law-enforcement agencies struggles to hire, train, and retain staff
capable of keeping pace with today's cyber-criminals.
T/F The data a firm can leverage is a true strategic asset when it is rare, valuable, non-
substitutable, and imperfectly imitable. - ANSWER-TRUE The data a firm can leverage is a
true strategic asset when it is rare, valuable, non-substitutable, and imperfectly imitable.
TRUE
Which of the following term is used to describe raw facts and figures? - ANSWER-Data
The equation ____[BLANK]____ represents the market capitalization of a company -
ANSWER-Share price × Number of shares
T/F Cache is a component that stores data temporarily so that future requests of computing
tasks for that data can be served faster; the data stored in a cache might be the results of an
earlier computation, or a duplicate of data stored elsewhere - ANSWER-T/F [TRUE]
, LSUS ISDS 705 FINAL
EXAMINATION WITH COMPLETE
VERIFIED SOLUTIONS
Cache is a component that stores data temporarily so that future requests of computing tasks
for that data can be served faster; the data stored in a cache might be the results of an earlier
computation, or a duplicate of data stored elsewhere. [TRUE]
T/F Following a rapid prototyping methodology is basically repeatedly performing the
analysis, design, and implementation phases concurrently in a cycle until the software is
completed. Then after the software is complete, it goes back from scratch through a thorough
design and implementation to complete the project. - ANSWER-
The ____[BLANK]____ phase of the SDLC is the part of understanding why an information
system should be built and determining why the project team will build it. - ANSWER-
Planning phase
____[BLANK]____ is the parameter that significantly impact the rank of a website in
Google's search results. - ANSWER-The number of other pages linking to a given page
Following the ____[BLANK]____ development methodology is a linear project management
approach that proceeds in a sequences from one phase to the next - ANSWER-Waterfall
T/F "What should the software produce for the users?" and "who will be the users of the
software?" are the main questions answered within the "Analysis" phase of the SDLC. -
ANSWER-TRUE "What should the software produce for the users?" and "who will be the
users of the software?" are the main questions answered within the "Analysis" phase of the
SDLC. TRUE
Big Data - ANSWER-The collections, storage, and analysis of extremely large, complex, and
often unstructured data sets that can be used by organizations to generate insights that would
otherwise be impossible to make
Within a major pharmaceutical company in the US, there was a research scientist caught
passing top secret highly sensitive information of composition and test results of the
company's newest drug that are worth millions of dollars to a competitor. What crime is he
being held responsible for? - ANSWER-Corporate espionage
, LSUS ISDS 705 FINAL
EXAMINATION WITH COMPLETE
VERIFIED SOLUTIONS
What is E-Discovery? - ANSWER-Identifying and retrieving relevant electronic information
to support litigation efforts
T/F Hadoop as an open source project was created to analyze extremely large amount of raw
data and computation - ANSWER-TRUE
Regarding infiltration techniques, which of the following types does one open up to by
posting sensitive personal information and details about one's workplace on social
networking sites? - ANSWER-Social Engineering
Cookies are only stored on the website visited, not on the user's PC. - ANSWER-FALSE
Cookies are only stored on the website visited, not on the user's PC. FALSE
Within the phases of SDLC, "construct" of software or an application is a step which happens
at the ____[BLANK]____ phase. - ANSWER-Implementation phase
____[BLANK]____ is the magnitude of Google's revenue. - ANSWER-Advertising
Market capitalization (market cap) - ANSWER-The value of a firm calculated by multiplying
its share price by the number of shares.
Business intelligence (BI) - ANSWER-Combines aspects of reporting, data exploration and
ad hoc queries, and sophisticated data modeling and analysis.
Organic or Natural Search - ANSWER-Search engine results returned and ranked according
to relevance.