100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

LSUS ISDS FINAL EXAMINATION WITH COMPLETE SOLUTIONS

Beoordeling
-
Verkocht
-
Pagina's
17
Cijfer
A+
Geüpload op
12-05-2025
Geschreven in
2024/2025

T/F Data marts take advantage of data purchased from third party firms, while data warehouses are composed entirely of proprietary corporate data. - ANSWER-FALSE Data marts take advantage of data purchased from third party firms, while data warehouses are composed entirely of proprietary corporate data. FALSE Regarding DDos attack, which of the following would be a good example? - ANSWER-Overloading a popular social networking site with inbound messages in order to shut down access to the site

Meer zien Lees minder
Instelling
LSUS ISDS 705
Vak
LSUS ISDS 705

Voorbeeld van de inhoud

LSUS ISDS 705 FINAL
EXAMINATION WITH COMPLETE
VERIFIED SOLUTIONS


T/F Data marts take advantage of data purchased from third party firms, while data
warehouses are composed entirely of proprietary corporate data. - ANSWER-FALSE Data
marts take advantage of data purchased from third party firms, while data warehouses are
composed entirely of proprietary corporate data. FALSE


Regarding DDos attack, which of the following would be a good example? - ANSWER-
Overloading a popular social networking site with inbound messages in order to shut down
access to the site


What area of application of Data Mining is referred to when companies use and leverage data
to determine which services or products clients purchase together, and how they use this data
to cross sell extra services and products. - ANSWER-Market Basket Analysis


Regarding information security, which of the following statements is consistent with ground
realities? - ANSWER-Law-enforcement agencies struggles to hire, train, and retain staff
capable of keeping pace with today's cyber-criminals.


T/F The data a firm can leverage is a true strategic asset when it is rare, valuable, non-
substitutable, and imperfectly imitable. - ANSWER-TRUE The data a firm can leverage is a
true strategic asset when it is rare, valuable, non-substitutable, and imperfectly imitable.
TRUE


Which of the following term is used to describe raw facts and figures? - ANSWER-Data


The equation ____[BLANK]____ represents the market capitalization of a company -
ANSWER-Share price × Number of shares


T/F Cache is a component that stores data temporarily so that future requests of computing
tasks for that data can be served faster; the data stored in a cache might be the results of an
earlier computation, or a duplicate of data stored elsewhere - ANSWER-T/F [TRUE]

, LSUS ISDS 705 FINAL
EXAMINATION WITH COMPLETE
VERIFIED SOLUTIONS

Cache is a component that stores data temporarily so that future requests of computing tasks
for that data can be served faster; the data stored in a cache might be the results of an earlier
computation, or a duplicate of data stored elsewhere. [TRUE]


T/F Following a rapid prototyping methodology is basically repeatedly performing the
analysis, design, and implementation phases concurrently in a cycle until the software is
completed. Then after the software is complete, it goes back from scratch through a thorough
design and implementation to complete the project. - ANSWER-


The ____[BLANK]____ phase of the SDLC is the part of understanding why an information
system should be built and determining why the project team will build it. - ANSWER-
Planning phase


____[BLANK]____ is the parameter that significantly impact the rank of a website in
Google's search results. - ANSWER-The number of other pages linking to a given page


Following the ____[BLANK]____ development methodology is a linear project management
approach that proceeds in a sequences from one phase to the next - ANSWER-Waterfall


T/F "What should the software produce for the users?" and "who will be the users of the
software?" are the main questions answered within the "Analysis" phase of the SDLC. -
ANSWER-TRUE "What should the software produce for the users?" and "who will be the
users of the software?" are the main questions answered within the "Analysis" phase of the
SDLC. TRUE
Big Data - ANSWER-The collections, storage, and analysis of extremely large, complex, and
often unstructured data sets that can be used by organizations to generate insights that would
otherwise be impossible to make


Within a major pharmaceutical company in the US, there was a research scientist caught
passing top secret highly sensitive information of composition and test results of the
company's newest drug that are worth millions of dollars to a competitor. What crime is he
being held responsible for? - ANSWER-Corporate espionage

, LSUS ISDS 705 FINAL
EXAMINATION WITH COMPLETE
VERIFIED SOLUTIONS


What is E-Discovery? - ANSWER-Identifying and retrieving relevant electronic information
to support litigation efforts


T/F Hadoop as an open source project was created to analyze extremely large amount of raw
data and computation - ANSWER-TRUE


Regarding infiltration techniques, which of the following types does one open up to by
posting sensitive personal information and details about one's workplace on social
networking sites? - ANSWER-Social Engineering


Cookies are only stored on the website visited, not on the user's PC. - ANSWER-FALSE
Cookies are only stored on the website visited, not on the user's PC. FALSE


Within the phases of SDLC, "construct" of software or an application is a step which happens
at the ____[BLANK]____ phase. - ANSWER-Implementation phase


____[BLANK]____ is the magnitude of Google's revenue. - ANSWER-Advertising


Market capitalization (market cap) - ANSWER-The value of a firm calculated by multiplying
its share price by the number of shares.


Business intelligence (BI) - ANSWER-Combines aspects of reporting, data exploration and
ad hoc queries, and sophisticated data modeling and analysis.


Organic or Natural Search - ANSWER-Search engine results returned and ranked according
to relevance.

Geschreven voor

Instelling
LSUS ISDS 705
Vak
LSUS ISDS 705

Documentinformatie

Geüpload op
12 mei 2025
Aantal pagina's
17
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

€14,14
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten

Maak kennis met de verkoper
Seller avatar
BESTSTUDYAIDS

Maak kennis met de verkoper

Seller avatar
BESTSTUDYAIDS (self)
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
-
Lid sinds
2 jaar
Aantal volgers
0
Documenten
55
Laatst verkocht
-
THE FORINSTANCE LEARNING HUB

A hub you can access all the learning materials you need.

0,0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Populaire documenten

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen