LSUS ISDS 705 FINAL EXAM QUESTIONS AND
100% CORRECT ANSWERS
Big Data ANSWER Collections, storage, and analysis of very large, complicated, often
unstructured data sets that may be utilized by organizations to develop insights that
otherwise could not be made
In a US-based major pharmaceutical company, a research scientist had been caught
passing highly sensitive top secret information on composition and test results of the
newest drug worth millions of dollars to a competitor. What crime is he responsible for?
- ANSWER Corporate espionage
What is E-Discovery? - ANSWER Identifying and retrieving relevant electronic
information to support litigation efforts
T/F Hadoop as an open source project was created to analyze extremely large amount
of raw data and computation - ANSWER TRUE
About infiltration techniques, what kind does one open oneself up to by posting sensitive
personal information and details about one's workplace on social networking sites? -
ANSWER Social Engineering
T/F Data marts take advantage of data purchased from third party firms, while data
warehouses are composed entirely of proprietary corporate data. - ANSWER FALSE
Data marts take advantage of data purchased from third party firms, while data
warehouses are composed entirely of proprietary corporate data. FALSE
Which of the following is a good example of a DDos attack? - ANSWER Overloading a
popular social networking site with inbound messages in order to shut down access to
the site
,What application area of Data Mining describes when businesses use and take
advantage of the data in order to find out what services or products clients purchase
together and also how they use the data to cross sell extra services and products. -
ANSWER Market Basket Analysis
Which of the following statements, with regard to information security, constitutes a fact
reflective of ground realities? ANSWER It is a fact that law-enforcement agencies find it
difficult to recruit, train, and retain staff able to keep pace with today's cyber-criminal.
T/F The data a firm can leverage is a true strategic asset when it is rare, valuable,
nonsubstitutable, and imperfectly imitable. - ANSWER TRUE The data a firm can
leverage is a true strategic asset when it is rare, valuable, nonsubstitutable, and
imperfectly imitable. TRUE
Which of the following term is used to describe raw facts and figures? - ANSWER Data
____[BLANK] ____ - The market capitalization of a company is given by the equation -
ANSWER Share price × Number of shares
T/F Cache is a component which stores data temporarily so that future requests of
computing tasks for that data can be served faster; the data stored in a cache might be
the results of an earlier computation, or a duplicate of data stored elsewhere - ANSWER
T/F [TRUE]
A cache is a component that stores data temporarily to serve future requests of
computing tasks for that data more quickly. The data stored in a cache may be the
results from an earlier computation, or a copy of data stored elsewhere. [TRUE]
T/F Following a rapid prototyping methodology is essentially repeatedly doing the
analysis, design, and implementation phases in parallel in a cycle until the software is
done. Then, after the software is complete, it goes back from scratch through a
thorough design and implementation to complete the project. - ANSWER
The ____[BLANK]____ phase of the SDLC is the part of understanding why an information
system should be built and determining why the project team will build it. - ANSWER
Planning phase
, ____[BLANK]____ is the parameter that considerably affects the rank of a website in the
search results. - ANSWER The number of other pages linking to a given page
Following the ____[BLANK]____ development methodology is a linear project
management approach that proceeds in a sequence from one phase to the next -
ANSWER Waterfall
T/F "What should the software produce for the users?" and "who will be the users of the
software?" are the main questions answered within the "Analysis" phase of the SDLC. -
ANSWER TRUE "What should the software produce for the users?" and "who will be the
users of the software?" are the main questions answered within the "Analysis" phase of
the SDLC. TRUE
Cookies are only stored on the website visited, not on the user's PC. - ANSWER FALSE
Cookies are only stored on the website visited, not on the user's PC. FALSE
Within the phases of SDLC, "construct" of software or an application is a step which
happens at the ____[BLANK]____ phase. - ANSWER Implementation phase
____[BLANK]____ is the magnitude of Google's revenue. - ANSWER Advertising
Market capitalization (market cap)-ANSWER The value of a firm calculated by
multiplying its share price with number of shares.
Business intelligence (BI)-ANSWER Combines aspects of reporting, data exploration
and ad hoc queries, and sophisticated data modeling and analysis.
Organic or Natural Search-ANSWER Search engine results returned and ranked
according to relevance.
Analytics - ANSWER A term describing the extensive use of data, statistical and
100% CORRECT ANSWERS
Big Data ANSWER Collections, storage, and analysis of very large, complicated, often
unstructured data sets that may be utilized by organizations to develop insights that
otherwise could not be made
In a US-based major pharmaceutical company, a research scientist had been caught
passing highly sensitive top secret information on composition and test results of the
newest drug worth millions of dollars to a competitor. What crime is he responsible for?
- ANSWER Corporate espionage
What is E-Discovery? - ANSWER Identifying and retrieving relevant electronic
information to support litigation efforts
T/F Hadoop as an open source project was created to analyze extremely large amount
of raw data and computation - ANSWER TRUE
About infiltration techniques, what kind does one open oneself up to by posting sensitive
personal information and details about one's workplace on social networking sites? -
ANSWER Social Engineering
T/F Data marts take advantage of data purchased from third party firms, while data
warehouses are composed entirely of proprietary corporate data. - ANSWER FALSE
Data marts take advantage of data purchased from third party firms, while data
warehouses are composed entirely of proprietary corporate data. FALSE
Which of the following is a good example of a DDos attack? - ANSWER Overloading a
popular social networking site with inbound messages in order to shut down access to
the site
,What application area of Data Mining describes when businesses use and take
advantage of the data in order to find out what services or products clients purchase
together and also how they use the data to cross sell extra services and products. -
ANSWER Market Basket Analysis
Which of the following statements, with regard to information security, constitutes a fact
reflective of ground realities? ANSWER It is a fact that law-enforcement agencies find it
difficult to recruit, train, and retain staff able to keep pace with today's cyber-criminal.
T/F The data a firm can leverage is a true strategic asset when it is rare, valuable,
nonsubstitutable, and imperfectly imitable. - ANSWER TRUE The data a firm can
leverage is a true strategic asset when it is rare, valuable, nonsubstitutable, and
imperfectly imitable. TRUE
Which of the following term is used to describe raw facts and figures? - ANSWER Data
____[BLANK] ____ - The market capitalization of a company is given by the equation -
ANSWER Share price × Number of shares
T/F Cache is a component which stores data temporarily so that future requests of
computing tasks for that data can be served faster; the data stored in a cache might be
the results of an earlier computation, or a duplicate of data stored elsewhere - ANSWER
T/F [TRUE]
A cache is a component that stores data temporarily to serve future requests of
computing tasks for that data more quickly. The data stored in a cache may be the
results from an earlier computation, or a copy of data stored elsewhere. [TRUE]
T/F Following a rapid prototyping methodology is essentially repeatedly doing the
analysis, design, and implementation phases in parallel in a cycle until the software is
done. Then, after the software is complete, it goes back from scratch through a
thorough design and implementation to complete the project. - ANSWER
The ____[BLANK]____ phase of the SDLC is the part of understanding why an information
system should be built and determining why the project team will build it. - ANSWER
Planning phase
, ____[BLANK]____ is the parameter that considerably affects the rank of a website in the
search results. - ANSWER The number of other pages linking to a given page
Following the ____[BLANK]____ development methodology is a linear project
management approach that proceeds in a sequence from one phase to the next -
ANSWER Waterfall
T/F "What should the software produce for the users?" and "who will be the users of the
software?" are the main questions answered within the "Analysis" phase of the SDLC. -
ANSWER TRUE "What should the software produce for the users?" and "who will be the
users of the software?" are the main questions answered within the "Analysis" phase of
the SDLC. TRUE
Cookies are only stored on the website visited, not on the user's PC. - ANSWER FALSE
Cookies are only stored on the website visited, not on the user's PC. FALSE
Within the phases of SDLC, "construct" of software or an application is a step which
happens at the ____[BLANK]____ phase. - ANSWER Implementation phase
____[BLANK]____ is the magnitude of Google's revenue. - ANSWER Advertising
Market capitalization (market cap)-ANSWER The value of a firm calculated by
multiplying its share price with number of shares.
Business intelligence (BI)-ANSWER Combines aspects of reporting, data exploration
and ad hoc queries, and sophisticated data modeling and analysis.
Organic or Natural Search-ANSWER Search engine results returned and ranked
according to relevance.
Analytics - ANSWER A term describing the extensive use of data, statistical and