Friday, 3 March 2017

ITEC 610 - MIDTERM EXAM

Instructions

1. There are five questions in this exam. Each question is worth 20 points so you can earn up to 100 points. This exam is worth 25% of your grade.

2. Each answer should be complete and respond to all facets of the question. Each answer shall be no longer than 2 pages, single spaced, 12 pt font, with 1 inch margins. State your assumptions if needed. Your writing style will be evaluated.

3. The deliverable must be APA compliant and include at least two references for each question. Place your reference list at the end of each question.

4. All of your answers must be original and in your own words. Do not include quoted material. Reminder that you signed an academic integrity honor pledge early in the semester. Violators of the academic integrity policy will be subject to disciplinary action.

5. Do not copy and paste. Your instructor will submit your exam to Turnitin. Do not create a student account in Turnitin. Remember that you signed the Academic Integrity Pledge at the beginning of the semester.

6. Post your answer file (DOC or DOCX only) in the LEO Assignment area by the end of the session, Sunday night 11:59 pm EST.

Questions

1. You have just been hired to work in a brand new cupcake bakery in Adelphi, Maryland. Profits from this bakery go to the UMUC scholarship fund. You know the value of information systems and want to convince the owner (who knows only how to manage a bakery) that it can help the business. List at least four specific strategies (not technologies) involving the business use of information systems so that the bakery may gain a competitive edge. Also, for each strategy, give an illustrative IT technology example that can apply to the bakery.

2. Identify and describe four technologies developed and/or advanced by Google and explain how it impacts society positively and negatively. At least one must be related to networks and at least one should be related to mobile technology. Indicate which technology is related to networks and which relates to mobile technology.

3. When making decisions about how to acquire hardware, software, or any other components of the IT Infrastructure, consideration is given to the following four characteristics of an IT infrastructure:

• Dependable
• Manageable
• Adaptable
• Affordable

Evaluate cloud computing in relation to each of these four criteria.

4. The Department of Homeland Security (DHS) consists of U.S. Customs and Border Protection, Federal Emergency Management Agency, U.S. Immigration and Customs Enforcement, Transportation Security Administration, United States Coast Guard and the United States Secret Service.

The DHS strategic plan states: “The Department of Homeland Security’s overriding and urgent mission is to lead the unified national effort to secure the country and preserve our freedoms. While the Department was created to secure our country against those who seek to disrupt the American way of life, our charter also includes preparation for and response to all hazards and disasters.”

Define and explain both data warehouses and data mining and describe how they could be used in the DHS.

5. Describe how applying big data technology to social media can be useful for: (1) a chain of fitness centers, (2) a large government agency, (3) a multinational fashion retail company and (4) a global online university.

Next, summarize the negative aspects of using social media data in this way and identify ways to mitigate these concerns.
ITEC 610 MIDTERM SPRING 17

No comments:

Post a Comment

Note: only a member of this blog may post a comment.