Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

LSUS ISDS 705 FINAL EXAMS PRACTICE GUIDE 2024-2025, Exams of Management of Health Service

LSUS ISDS 705 FINAL EXAMS PRACTICE GUIDE 2024-2025

Typology: Exams

2024/2025

Available from 07/11/2025

Fortis-In-Re
Fortis-In-Re 🇺🇸

1

(1)

2.4K documents

1 / 17

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
LSUS ISDS 705 FINAL EXAMS PRACTICE
GUIDE 2024-2025
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff

Partial preview of the text

Download LSUS ISDS 705 FINAL EXAMS PRACTICE GUIDE 2024-2025 and more Exams Management of Health Service in PDF only on Docsity!

LSUS ISDS 705 FINAL EXAMS PRACTICE

GUIDE 2024- 2025

LSUS ISDS 705 FINAL EXAMS PRACTICE GUIDE 2024-2025 Big Data CORRECT ANSWER- The collections, storage, and analysis of extremely large, complex, and often unstructured data sets that can be used by organizations to generate insights that would otherwise be impossible to make Within a major pharmaceutical company in the US, there was a research scientist caught passing top secret highly sensitive information of composition and test results of the company's newest drug that are worth posible for - CORRECTS. millions of dollars to a competitor. What crime is he being held ri Corporate espionage What is E-Discovery? - GORRECTENGWER Identifying and retrieving relevant electronic information to support litigation efforts T/F Hadoop as an open source project was created to analyze extremely large amount of raw data and computation - GORRECTENSWEN-TRUE Regarding infiltration techniques, which of the following types does one open up to by posting sensitive personal information and details about one's workplace on social networking sites? - Social Engineering T/F Data marts take advantage of data purchased from third party firms, while data warehouses are composed GORRECTENGWER- FALSE Data marts take advantage of data purchased from third party firms, while data warehouses are composed entirely of proprietary corporate data. FALSE entirely of proprietary corporate data. Regarding DDes attack, which of the following would be a good example? - GORRECIANSWER. Overloading a popular social networking site with inbound messages in order to shut down access to the site What area of application of Data Mining is referred to when companies use and leverage data to determine which services or products clients purchase together, and how they use this data to cross sell extra services and products. - GORRECTENGWER Marker Basket Analysis Regarding information security, which of the following statements is consistent with ground realities? - GORRECTANGWEN-Law-en forcement agencies struggles to hire, train, and retain staff capable of keeping pace with today's cyber-criminals. T/F The data a firm can leverage is a true strategic asset when it is rare, valuable, non-substitutable, and imperfectly imitable. - GORRECTMNSWERL TRUE The dara a firm can leverage is a true strategic asset when it is rare, valuable, non-substitutable, and imperfectly imitable. TRUE Which of the following term is used to describe raw facts and figures? - GORREGHANSWERL Data The equation ___[BLANK]__ represents the marker capitalization of a company - G@RRECD BINSWERI- Share price x Number of shares T/F Cache is a component that stores data temporarily so that future requests of computing tasks for that data can be served faster; the data stored in a cache might be the results of an earlier computation, or a duplicate of data stored elsewhere - CORRECT ANSWER -I/ F [TRUE] Cache is a component that stores data temporarily so that future requests of computing tasks for that data can be served faster; the data stored in a cache might be the results of an earlier computation, or a duplicate of data stored elsewhere. [TRUE] T/E Following a rapid prototyping methodology is basically repeatedly performing the analysis, design, and implementation phases concurrently in a cycle until the software is completed. Then after the software is complete, it goes back from scratch through a thorough design and implementation to complete the project. - Organic or Natural Search - GORRECTANS WER Search engine results returned and ranked according to relevance. Analytics - CORRECT ANSWER -A term describing the extensive use of data, statistical and quantitative analysis, explanatory and predictive models, and fact-based. management to drive decisions and actions, Pagerank - @ORREGMANSWER Algorithm developed by Google co-founder Larry Page to rank Web sites. Machine Learning - SGRRECHMBNISWIER leverages massive amounts of dace so that computers can actand improve on their own without additional programming. Search Engine Optimization (SEO) - G@RREGMANSWERI-The process of improving a page's organic search results Data - CORRECT ANSWER -Facts and statistics collected together for reference or analysis Knowledge - CORRECT ANSWER -Skills, experience, and expertise coupled with information and intelligence that creates a person's intellectual resources Database - CORRECT ANSWER -A. single cable or a collection of related tables. Database Management Systems (DBMS) - @@RREGIANSWER Software for creating, maintaining, and manipulating data Structured query language (SQL) - CORRECT ANSWER -A language used to create and manipulate databases. Database Administrator (DBA) CORRECT ANSWER -Job title focused on directing, performing, or overseeing activities associated with a database or set of databases. These may include (but not necessarily be limited to): database design, creation, implementation, maintenance, backup and recovery, policy setting and enforcement, and security. Table/File - GORREGIANSWERLA list of daca, arranged in columns (fields) and rows (records). Column/Field - GORREGMANSWER- represent each category of data contained in a record Row/Record - (SORRIEGIANSIVER presents a single instance of the data in che cable Key - CORRECT ANSWER -A field or set of fields in a record that is used to identify the record, and to relate separate tables in a database Relational Database - CORRECT ANSWER - The most common standard for expressing databases, whereby tables (files) are related based on common keys. Transaction - CORRECT ANSWER -Any kind of business exchange Loyalty Card - GORREGINANSWVERI-syscem thar provides rewards in exchange for consumers , allowing tracking and recording of their activities, Enhances data collection and represents a significant switching cost. Enterprise Software - GORREGIANS WERE Set of integrated modules for applications such as sales and distribution, financial accounting, investment management, materials management, production planning, plant maintenance, and human resources that allow data to be used by multiple functions and business processes. Surveys - SRGRRIGTIANISHUERL- Questionnaires and interviews that ask people directly about their experiences, attitudes, or opinions. Online Analytical Processing (OLAP) CORRECT ANSWER. A method of querying and reporting that takes data from standard relational databases, calculates and summarizes the data, and then stores the data in a special database called a data cube. Data Cube - CORRECT ANSWER -A special database used to store data in OLAP reporting. Data Mining - GQ@RREGTANSWER using computers to identify hidden patterns in large data sets and. to build models from this data Overengincering - S@RREGHANSWER. Building a model with so many variables that the solution arrived at might only work on the subset of data used to create it Artificial Intelligence (Al) - GORRECIAINSWERI-Computer software that seeks to reproduce or mimic human thought, decision making, or brain functions. Neural Network - GORRECTMNSWER Examines data and hunts down and exposes patterns, in order to build models to exploit findings Expert Systems - GORRECTMNGWER Leverages rules or examples to perform a task in a way that mimics applied human expertise Genetic Algorithms - SQSRIIEGTIANSIRL Model building techniques where computers examine many potential solutions to a problem, modifying various mathematical models that have to be searched for a best alternative. Retail Link - GORRECTMNGWER. Records asale and automatically triggers inventory reordering, scheduling, and delivery TCP/IP - GORRECTANS WER -Telecommunications protocols (software) that allows inter-connectivity on the Internet Keyword Stuffing - GGRREGTANGITRE Packing a Web site with unrelated keywords to attract higher- value contextual ads Spiders - CORRECT ANSWER discovers documents for indexing and retrieval Bandwidth - CORRECT ANSWER -The amount of data that can be transmitted over a network in a given amount of time. Social Influence Fraud - SORAIBGIUANSWIERI-Gencrating fake followers Hikes, 1s, reewees, shares, oF YouTube views Cache- (SGRREGINENSVER!.A temporary storage space used to speed computing casks. Net Neutrality - GGRREGHANSWERI-the principle thar all Internet traffic should be treated equally by Internet Service Providers. Click Farms - GORRECTANSWER Recruiting a network of users to engage in click fraud with the goal of spreading IP addresses across several systems and make a fraud effort more difficult to detect. Server Farm - GORRECTANGWER Network of computer servers running software to coordinate their collective use targeting - CORRECT ANSWER -A strategy in which marketers evaluate the attractiveness of each potential segment and decide in which of these groups they will invest resources to try to turn them into customers. Hacker - QORRECINANSWERA person who secretly gains access to computers and files without Search Engine Marketing (SEM) - G@RIRE@INAINSWERI-The practice of designing, running and optimizing search engine ad campaigns. White Hat Hackers - GORRECTANSWER- Uncover computer weaknesses without exploiting them. Contribute to improving system security. Keyword Advertising - GORRECTNGWER Advertisements that are targeted based on a user's query. pay-per-click - GORRECTANSWER revenue model in which advertisers display ads to potential customers for free and pay only when the customer clic Black Hat Hacker - GORREGIBINSWERI-Coimputer criminals who exploit a system's weakness for personal gain Hacktivists - GORRESTANSWER In filcrace a system and exposing information as a protest seeking to make a political point geotargeting - SORRECSTIANISWAIRiderncitying a user's physical location for the purpose of delivering tailored ads or other content Ad Network - SORRECTMINSWER Links advertisers co websites and other content providers willing to host advertisements in exchange for payment Griefers or Trolls - GORRECTENSWER malicious pranksters Stuxnec - GORREGIMINSIWERL A computer worm designed to find and infect a particular piece of industrial hardware; used in an attack against Iranian nuclear plants Adsense - S@RREGHANSWER-web 2.0 product from google chat searches an org's we site and inserts ads that match content on that site; when users click those ads google pays the org a fee Xkeyscore - GORRECTENGWER- analytical tool to collect "almost anything done on the internet” Contextual Advertising - SQRERIESIANSSBRE A dyer ing based on a Web site's content. Bad Apples - GORRECTANSWER)-Rogue employees who steal secrets, install malware, or hold a firm hostage Display Networks - SORRIEGTIANSHERE-y:01ps of adver engaging in inventory trade pays publishers for displaying others ads and/or charges for running their own ads rs agreeing to standards (ad size,etc) and then publishers, advertisers and the network all win, making money from the arrangement can utilize CPC, CPA, or CPM (cost per thousand) models Social Engineering - GORREGINANSWER-Con games chat trick employees into revealing information or performing other tasks that compromise a firm Aliliate Programs - SGRREGINANSWER program sponsors pay referring web sites percentage of revenue earned from the referral Remarketing - GORRECTENSWER Shows custom, targeted ads to a user when visiting other sites if the user has already visited a given page on the advertiser's site Malvvare - SGRIREGISANSWER sofware that seeks to compromise a computer system without permission Malicious Adware - GORREGHANSWER! Installed without full user consent or knowledge, later serve unwanted advertisements Google Analytics - CORRECT ANSWER -a freemium web analytics service offered by Google that tracks and reports website traffic Media Access Control (MAC) Address - GORREC@IANS WER address is a permanent and unique identifier baked into every network-connected device. Keylogger - KRGORIRIRGTININISIIERE Records user keystrokes, Sofiware-based or hardware-based Enriching Click Fraud - GORRECTANSWER generating bogus ad clicks to earn CPC income Screen Capture - GORRECTNGWER. Records pixels that appear on a user's screen to identify proprietary information Card Skimmes~ (SGRIRECGINAINISWERI.Cap ures daca from a card's magnetic stip Enriching Impression Fraud - G@@RIREGIANSWERI generating false page views to boost a site's CPM earnings RAM scraping or storage scanning software - GORRECTANSWERL Malicious code that scans computing memory (RAM, hard drives, or other storage) for sensitive data, often looking for patterns such as credit card or Social Security numbers. Depleting Click Fraud - (@RRIEGIVAINS WIR clicking a rival's ads to exhaust their CPC advertis budget Ransomware - GORREGTANSWERL Malware that encrypts user's files with demands that a user pay to regain control of their data and/or device Depleting Impression Fraud - QQRREGSIGAISWVER. zenerasing bogus impressions to exhaust rival's CPM ad budget Blended threats - GORREGIAINSWER- Attacks combining multiple malware or hacking exploits Rank-Based Impression Fraud - G@RREGIANSWERE repeatedly searching keywords linked to rival ads, to lower their performance rank Dumpster Diving - GORRECTANSWERL combing through trash co identify valuable assets Disbarring Fraud. - GORRECTIANGIVERE venerating bogus clicks or impressions associated with rivals, to ban them from an ad network Shoulder Surfing - GORREGTANS WER Gaining compromising information through observation (as in looking over someone's shoulder). Link Fraud - GORREGIAINSWER Creating a series of bogus websites, all linking back to the pages one is trying to promote, Also called spamdexing or link farming, Blacklists - GORRECTANSWERL Deny the entry or exit of specific IP addresses and other entities Whitelists - GORRECDANSWER-Permic communication only wich approved entities or in an approved manner Goal of Project Management - G@RRECHANSWERE to deliver a project that is on time, on budget, and on target Number of projects chat fail - GORREGIMAINSWERI-2/3 - 66% Project Manager (PM) - (SGRIREGINAINSINIERY-The person assigned by the performing organization to achieve the project objectives, usually a senior systems analyst or IT department manager 4 Activities of a Program Manager - GORRECTANS WER Planning, Scheduling, Monitoring, Reporting Work Breakdown Structure - CORRECT ANSWER -The hierarchy of project tasks, subtasks, and work packages. Includes the task duration, current status of task and task dependencies. WAS Tool- SORRESTASNIR antt charts and Network Diagrams Gannt Chart - GORRECGIANSWERL program management charting method that provides a graphical illustration of the time frame for tasks to be completed and what has been completed to date. Shows time required to complete tasks and overlapping tasks, and sequential tasks. Limitations of Gannt Charts - CORRECT ANSWER. Rework entire schedule for missing WBS, hard to read for large projects, task dependency not clearly defined, does not display costs or scope. Program Evaluation and Review Technique (PERT) - CORRECT ANSWER -A method for analyzing the tasks involved in completing a given project, estimating the time needed to complete each task, and ident ing the minimum time needed to complete the total project. Critical Path Method (CPM) - G@RREGTANSWER project-management tool that illustrates the relationships among all the activities involved in completing a project and identifies the sequence of activities likely to take the longest to complete 3 points of PERT - CORRECT ANSWER -PERT uses best case, worst case and probably case scenarios to estimate time required for a project. Dependent Tasks - CORRECT ANSWER - Tasks chat must be completed one after another Multiple Successor Tasks - GORREGIANSWERI-When several tasks can be completed at the same time Multiple Predecessor Tasks - GORRECTANSWER- When a task requires two or more prior tasks to be completed before it can start Critical Path - CORRECT ANSWER -in a PERT network, the sequence of tasks chat takes the longest time to complete Slack Time - GORREGHENSWER!The time that an activicy can be delayed without delaying the entire project; the difference between the late and early start times of an activity.