100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

LSUS ISDS 705 FINAL Exam Questions With Correct Answers

Rating
-
Sold
-
Pages
19
Grade
A+
Uploaded on
18-10-2024
Written in
2024/2025

LSUS ISDS 705 FINAL Exam Questions With Correct Answers Big Data - answerThe collections, storage, and analysis of extremely large, complex, and often unstructured data sets that can be used by organizations to generate insights that would otherwise be impossible to make Within a major pharmaceutical company in the US, there was a research scientist caught passing top secret highly sensitive information of composition and test results of the company's newest drug that are worth millions of dollars to a competitor. What crime is he being held responsible for? - answerCorporate espionage What is E-Discovery? - answerIdentifying and retrieving relevant electronic information to support litigation efforts T/F Hadoop as an open source project was created to analyze extremely large amount of raw data and computation - answerTRUE Regarding infiltration techniques, which of the following types does one open up to by posting sensitive personal information and details about one's workplace on social networking sites? - answerSocial Engineering ©SIRJOEL EXAM SOLUTIONS 12/3/2024 11:27AM T/F Data marts take advantage of data purchased from third party firms, while data warehouses are composed entirely of proprietary corporate data. - answerFALSE Data marts take advantage of data purchased from third party firms, while data warehouses are composed entirely of proprietary corporate data. FALSE Regarding DDos attack, which of the following would be a good example? - answerOverloading a popular social networking site with inbound messages in order to shut down access to the site What area of application of Data Mining is referred to when companies use and leverage data to determine which services or products clients purchase together, and how they use this data to cross sell extra services and products. - answerMarket Basket Analysis Regarding information security, which of the following statements is consistent with ground realities? - answerLaw-enforcement agencies struggles to hire, train, and retain staff capable of keeping pace with today's cyber-criminals. T/F The data a firm can leverage is a true strategic asset when it is rare, valuable, non- substitutable, and imperfectly imitable. - answerTRUE The data a firm can leverage is a true strategic asset when it is rare, valuable, non-substitutable, and imperfectly imitable. TRUE Which of the following term is used to describe raw facts and figures? - answerData The equation ____[BLANK]____ represents the market capitalization of a company - answerShare price × Number of shares

Show more Read less
Institution
LSUS ISDS 705
Course
LSUS ISDS 705










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
LSUS ISDS 705
Course
LSUS ISDS 705

Document information

Uploaded on
October 18, 2024
Number of pages
19
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

©SIRJOEL EXAM SOLUTIONS
12/3/2024 11:27AM



LSUS ISDS 705 FINAL Exam Questions
With Correct Answers


Big Data - answer✔The collections, storage, and analysis of extremely large, complex, and often

unstructured data sets that can be used by organizations to generate insights that would otherwise

be impossible to make

Within a major pharmaceutical company in the US, there was a research scientist caught passing

top secret highly sensitive information of composition and test results of the company's newest

drug that are worth millions of dollars to a competitor. What crime is he being held responsible

for? - answer✔Corporate espionage


What is E-Discovery? - answer✔Identifying and retrieving relevant electronic information to

support litigation efforts

T/F Hadoop as an open source project was created to analyze extremely large amount of raw data

and computation - answer✔TRUE


Regarding infiltration techniques, which of the following types does one open up to by posting

sensitive personal information and details about one's workplace on social networking sites? -

answer✔Social Engineering

, ©SIRJOEL EXAM SOLUTIONS
12/3/2024 11:27AM


T/F Data marts take advantage of data purchased from third party firms, while data warehouses

are composed entirely of proprietary corporate data. - answer✔FALSE Data marts take

advantage of data purchased from third party firms, while data warehouses are composed entirely

of proprietary corporate data. FALSE

Regarding DDos attack, which of the following would be a good example? -

answer✔Overloading a popular social networking site with inbound messages in order to shut

down access to the site

What area of application of Data Mining is referred to when companies use and leverage data to

determine which services or products clients purchase together, and how they use this data to

cross sell extra services and products. - answer✔Market Basket Analysis


Regarding information security, which of the following statements is consistent with ground

realities? - answer✔Law-enforcement agencies struggles to hire, train, and retain staff capable of

keeping pace with today's cyber-criminals.

T/F The data a firm can leverage is a true strategic asset when it is rare, valuable, non-

substitutable, and imperfectly imitable. - answer✔TRUE The data a firm can leverage is a true

strategic asset when it is rare, valuable, non-substitutable, and imperfectly imitable. TRUE


Which of the following term is used to describe raw facts and figures? - answer✔Data


The equation ____[BLANK]____ represents the market capitalization of a company -

answer✔Share price × Number of shares

, ©SIRJOEL EXAM SOLUTIONS
12/3/2024 11:27AM


T/F Cache is a component that stores data temporarily so that future requests of computing tasks

for that data can be served faster; the data stored in a cache might be the results of an earlier

computation, or a duplicate of data stored elsewhere - answer✔T/F [TRUE]


Cache is a component that stores data temporarily so that future requests of computing tasks for

that data can be served faster; the data stored in a cache might be the results of an earlier

computation, or a duplicate of data stored elsewhere. [TRUE]

T/F Following a rapid prototyping methodology is basically repeatedly performing the analysis,

design, and implementation phases concurrently in a cycle until the software is completed. Then

after the software is complete, it goes back from scratch through a thorough design and

implementation to complete the project. - answer✔


The ____[BLANK]____ phase of the SDLC is the part of understanding why an information

system should be built and determining why the project team will build it. - answer✔Planning

phase

____[BLANK]____ is the parameter that significantly impact the rank of a website in Google's

search results. - answer✔The number of other pages linking to a given page


Following the ____[BLANK]____ development methodology is a linear project management

approach that proceeds in a sequences from one phase to the next - answer✔Waterfall


T/F "What should the software produce for the users?" and "who will be the users of the

software?" are the main questions answered within the "Analysis" phase of the SDLC. -

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
sirjoel Liberty University
View profile
Follow You need to be logged in order to follow users or courses
Sold
102
Member since
1 year
Number of followers
13
Documents
11875
Last sold
5 days ago
Sirjoel

Here you will find all documents and package deals offered by sirjoel

3.4

16 reviews

5
3
4
4
3
7
2
1
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions