BIS202 - Chapter 05 Questions .pdf

Full Transcript

Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ 5) Explain the three components of a sustainable MIS infrastructure along with their business benefits. 6) What is an information MIS infrastructure? A) identifies where and...

Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ 5) Explain the three components of a sustainable MIS infrastructure along with their business benefits. 6) What is an information MIS infrastructure? A) identifies where and how important information, such as customer records, is maintained and secured B) includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization’s goals C) identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption D) includes the plans for how a firm will build, deploy, use, and share its data, processes and MIS assets Version 1 2 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ 7) What is an agile MIS infrastructure? A) identifies where and how important information, such as customer records, is maintained and secured B) includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization’s goals C) identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption D) includes the plans for how a firm will build, deploy, use, and share its data, processes and MIS assets 8) What is a sustainable MIS infrastructure? A) identifies where and how important information, such as customer records, is maintained and secured B) includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization’s goals C) identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption D) includes the plans for how a firm will build, deploy, use, and share its data, processes and MIS assets 9) What is an MIS infrastructure? Version 1 3 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ A) identifies where and how important information, such as customer records, is maintained and secured B) includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization’s goals C) infrastructure identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption D) includes the plans for how a firm will build, deploy, use, and share its data, processes and MIS assets 10) Who is a person who is grounded in technology, fluent in business, and able to provide the important bridge between MIS and the business? A) MIS Infrastructure manager B) MIS specialist C) enterprise architect D) enterprise manager 11) Which of the following is a benefit of a solid MIS infrastructure? A) reduces costs B) improves productivity C) optimizes business operations D) All of the answers are correct. 12) What is the difference between hardware and software? Version 1 4 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ A) Hardware is the physical devices associated with a computer system, whereas software is the instructions the hardware executes to carry out tasks. B) They are both specific forms of clients. C) Hardware executes the instructions to carry out tasks, whereas software is the physical devices associated with a computer system. D) All of the answers are correct. 13) What consists of the physical devices associated with a computer system? A) hardware B) software C) client D) server 14) What is the set of instructions the hardware executes to carry out specific tasks? A) hardware B) software C) client D) server 15) What is a communications system created by linking two or more devices and establishing a standard methodology in which they can communicate? Version 1 5 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ A) network B) software C) client D) server 16) What is a computer designed to request information from a server? A) hardware B) software C) client D) server 17) What is a computer dedicated to providing information in response to requests? A) hardware B) software C) client D) server 18) What is hardware? Version 1 6 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ A) consists of the physical devices associated with a computer system B) the set of instructions the hardware executes to carry out specific tasks C) a computer designed to request information from a server D) a computer dedicated to providing information in response to requests 19) What is software? A) consists of the physical devices associated with a computer system B) the set of instructions the hardware executes to carry out specific tasks C) a computer designed to request information from a server D) a computer dedicated to providing information in response to requests 20) What is a network? A) consists of the physical devices associated with a computer system B) the set of instructions the hardware executes to carry out specific tasks C) a computer designed to request information from a server D) a communications system created by linking two or more devices and establishing a standard methodology in which they can communicate 21) What is a client? Version 1 7 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ A) consists of the physical devices associated with a computer system B) the set of instructions the hardware executes to carry out specific tasks C) a computer designed to request information from a server D) a computer dedicated to providing information in response to requests 22) What is a server? A) consists of the physical devices associated with a computer system B) the set of instructions the hardware executes to carry out specific tasks C) a computer designed to request information from a server D) a computer dedicated to providing information in response to requests 23) John works for Internal Computer Specialists, which focuses on helping small business owners resolve MIS infrastructure issues. John’s tasks include cleaning and replacing motherboards, cables, and internal components such as hard drives. What does John’s role at Internal Computer Specialists focus on fixing? A) hardware B) clients C) backup D) recovery Version 1 8 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ 24) Jessica started her own online company that specializes in selling items for bachelorette parties, wedding parties, and baby showers. Due to the fact that she only operates online, her MIS infrastructure needs to be fast, efficient, and accurate to ensure the best possible experience for her customers. Which of the following is a critical component in Jessica’s MIS infrastructure? A) hardware and software B) clients C) server D) All of the answers are correct. 25) What are the three business functions an MIS infrastructure supports? A) operations, change, and the environment/sustainability B) operations, customers, and ewaste C) information, clients, and viruses D) information, change, and business continuity planning 26) Which of the following include the three components of an MIS infrastructure? A) information, aggregated, and sustainable MIS infrastructures B) information, operational, and changing MIS infrastructures C) information, agile, and sustainable MIS infrastructures D) varies depending on the industry 27) Which characteristics support an agile MIS infrastructure? Version 1 9 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ A) accessibility, availability, maintainability, portability, reliability, scalability, and usability B) backup and recovery plan, disaster recovery plan, and business continuity planning C) grid computing, cloud computing, and virtualization D) storage, network, and server virtualization 28) Which characteristics support a sustainable MIS infrastructure? A) accessibility, availability, maintainability, portability, reliability, scalability, and usability B) backup and recovery plan, disaster recovery plan, and business continuity planning C) grid computing, cloud computing, and virtualization D) storage, network, and server virtualization 29) Which characteristics support an information MIS infrastructure? A) accessibility, availability, maintainability, portability, reliability, scalability, and usability B) backup and recovery plan, disaster recovery plan, and business continuity planning C) grid computing, cloud computing, and virtualization D) storage, network, and server virtualization 30) Grid computing, cloud computing, and virtualization are all elements of a(n) ________ Blank MIS infrastructure. Version 1 10 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ A) agile B) sustainable C) information D) virtualized 31) Accessibility, availability, maintainability, portability, reliability, scalability, and usability are all elements of a(n)________ MIS infrastructure. A) agile B) sustainable C) information D) virtualized 32) Backup and recovery plan, disaster recovery plan, and business continuity planning are all elements of a(n) ________ Blank MIS infrastructure. A) agile B) sustainable C) information D) virtualized 33) A(n) ________ Blank MIS infrastructure identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption. Version 1 11 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ A) sustainable B) information C) virtualized D) agile 34) What type of MIS infrastructure identifies where and how important information, such as customer records, is maintained and secured? A) sustainable B) information C) virtualized D) agile 35) What type of MIS infrastructure includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation? A) information B) virtualized C) agile D) sustainable 36) Francis works in the human resources division of a large oil and gas company in Texas. Francis’s tasks include maintaining payroll and vacation records, employment histories, and benefit information along with ensuring the security of all sensitive employee information. Which MIS infrastructure is most important to Francis? Version 1 12 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ A) information MIS infrastructure B) agile MIS infrastructure C) sustainable MIS infrastructure D) virtualized MIS infrastructure 37) The information MIS infrastructure supports the day-to-day business operations and plans for A) security breaches and theft. B) floods and earthquakes. C) malicious Internet attacks. D) All of the answers are correct. 38) Each year, businesses lose time and money because of system crashes and failures. Which of the following offers the best way to protect a system from crashes and failures? A) backup and recovery plan B) fault tolerance C) failover D) All of the answers are correct. 39) Which of the following describes the difference between a backup plan and a recovery plan? Version 1 13 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ A) Recovery is an exact copy of a system’s information, whereas backup is the ability to get a system up and running in the event of a system crash or failure. B) Backup is mandatory, whereas recovery is optional. C) Backup is an exact copy of a system’s information, whereas recovery is the ability to get a system up and running in the event of a system crash or failure. D) Recovery is mandatory, whereas backup is optional. 40) What occurs when a redundant storage server offers an exact replica of the real-time data and, if the primary server crashes, the users are automatically directed to a secondary server? A) failover B) disaster recovery cost curve C) reliability D) maintainability 41) What occurs when a primary machine recovers and resumes operations, taking over from a secondary server? A) failback B) disrupted communications C) warm site D) hot site 42) What has the ability to recover information or systems in the event of catastrophic disasters? Version 1 14 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ A) recovery B) disaster recovery C) backup D) failback 43) Shawn works at the local electrical company in Nampa, ID, which provides electricity to the entire city of Boise. This area is prone to floods, high winds, and tornados. As the lead enterprise architect on the night shift, Shawn has been asked to suggest ways the company can protect its information MIS infrastructure. Shawn notices that the company does not have the ability for its systems to respond to unexpected failures or crashes and lacks a backup system that can automatically take over without a loss of service to Boise residents. What should Shawn recommend his company implement? A) accessibility B) Moore’s law C) antivirus software D) fault tolerance 44) What creates a way for a company to recover and restore partially or completely interrupted critical functions within a predetermined time after a disaster or extended disruption? A) disaster recovery plan B) disaster recovery cost curve C) business continuity planning D) emergency notification system Version 1 15 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ 45) What is the ability to get a system up and running in the event of a system crash or failure that includes restoring the information backup? A) failure tolerance B) recovery C) reliability D) capacity planning 46) What type of backup method does a thumb drive offer? A) low cost, high speed B) low cost, low speed C) high cost, high speed D) All of the answers are correct. 47) What question below would a company need to answer when first establishing a backup and recovery plan? A) What types of storage mechanism will meet the needs of the company? B) How often does the company need to backup its information? C) What types of recovery systems does the company infrastructure need? D) All of the answers are correct. 48) Which of the following is an effect a company could experience because of a disaster such as a fire, flood, or hurricane? Version 1 16 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ A) disrupted communications B) damaged physical infrastructures C) halted transportation D) All of the answers are correct. 49) To combat disasters, a company can create a ________ that details the process for recovering information or a system in the event of a catastrophic disaster. A) disaster recovery plan B) database lookup initiative C) management recovery plan D) tornado threat plan 50) Among the sites that support disaster recovery, a ________ is a separate facility that does not have any computer equipment but is a place where employees can move after a disaster. A) hot site B) cold site C) warm site D) All of the answers are correct. 51) Among the sites that support disaster recovery, a ________ is a separate and fully equipped facility where the company can move immediately after a disaster and resume business. Version 1 17 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ A) hot site B) cold site C) warm site D) disaster site 52) Among the sites that support disaster recovery, a ________ is a separate facility with computer equipment that requires installation and configuration. A) hot site B) cold site C) warm site D) disaster site 53) What is a hot site? A) a separate and fully equipped facility where the company can move immediately after a disaster and resume business B) a separate facility that does not have any computer equipment but is a place where employees can move after a disaster C) a separate facility with computer equipment that requires installation and configuration D) a detailed process for recovering information or a system in the event of a catastrophic disaster 54) What is a cold site? Version 1 18 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ A) a separate and fully equipped facility where the company can move immediately after a disaster and resume business B) a separate facility that does not have any computer equipment but is a place where employees can move after a disaster C) a separate facility with computer equipment that requires installation and configuration D) a detailed process for recovering information or a system in the event of a catastrophic disaster 55) What is a warm site? A) a separate and fully equipped facility where the company can move immediately after a disaster and resume business B) a separate facility that does not have any computer equipment but is a place where employees can move after a disaster C) a separate facility with computer equipment that requires installation and configuration D) a detailed process for recovering information or a system in the event of a catastrophic disaster 56) What is a disaster recovery plan? Version 1 19 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ A) a separate and fully equipped facility where the company can move immediately after a disaster and resume business B) a separate facility that does not have any computer equipment but is a place where employees can move after a disaster C) a separate facility with computer equipment that requires installation and configuration D) a detailed process for recovering information or a system in the event of a catastrophic disaster 57) What charts the cost to the company of the unavailability of information and technology and the cost to the company of recovering from a disaster over time? A) disaster organizational cost analysis B) disaster recovery improvements C) disaster financial costs D) disaster recovery cost curve 58) What is a more comprehensive and all-encompassing plan that details how a company recovers and restores critical business operations and systems after a disaster or extended disruption? A) business continuity plan B) database management plan C) incident recovery plan D) emergency recovery plan Version 1 20 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ 59) What is an infrastructure built for notifying people in the event of an emergency? A) business operational plan B) business continuity plan C) emergency notification service D) emergency continuity plan 60) What are the different options for how an emergency notification service can be deployed? A) through the firm’s own infrastructure B) by an outside service provider on company premises C) by an outside service provider hosted remotely D) All of the answers are correct. 61) Which of the following is an example of an emergency notification system? A) radio stations’ occasional tests of the national alert system B) wireless alerts for promotional discounts C) text messages from your local grocery store D) All of the answers are correct. 62) What is a sudden, unexpected event requiring immediate action due to potential threat to health and safety, the environment, or property? Version 1 21 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ A) emergency B) preparedness C) impact analysis D) technology failure 63) What ensures a company is ready to respond to an emergency in an organized, timely, and effective manner? A) technology success B) emergency preparedness C) business impact analysis D) technology failure 64) What identifies all critical business functions and the effect that a specific disaster may have upon them? A) emergence B) emergency preparedness C) business impact analysis D) technology failure 65) What occurs when the ability of a company to operate is impaired because of a hardware, software, or data outage? Version 1 22 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ A) technology success B) technology preparedness C) business impact analysis D) technology failure 66) What contains all of the details of an incident? A) technology failure B) incident record C) incident management D) technology recovery strategy 67) What occurs when the ability of a company to operate is impaired because of a hardware, software, or data outage? A) technology failure B) incident record C) incident management D) technology recovery strategy 68) What is the process responsible for managing how incidents are identified and corrected? Version 1 23 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ A) technology failure B) incident record C) incident management D) technology recovery strategy 69) What focuses specifically on prioritizing the order for restoring hardware, software, and data across the organization that best meets business recovery requirements? A) technology failure B) incident record C) incident management D) technology recovery strategy 70) Which term refers to the varying levels that define what a user can access, view, or perform when operating a system? A) availability B) accessibility C) usability D) responsibility 71) Enterprise architects require ________ access so they can perform such functions as resetting passwords or deleting accounts. Version 1 24 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ A) functional B) infrastructure C) restricted D) administrator 72) Which term refers to the time frames when the system is operational? A) administrator access B) accessibility C) availability D) portability 73) What is the difference between unavailable and high availability? A) High availability is when the system is not operating and can’t be used, whereas unavailable is when a system is continuously operating at all times. B) Unavailable only refers to clients, whereas high availability refers to servers. C) Unavailable is when the system is not operating and can’t be used, whereas high availability is when a system is continuously operating at all times. D) High availability only refers to clients, whereas unavailable refers to servers. 74) What is a widely held but difficult to achieve standard of availability for a system? Version 1 25 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ A) “five 9s” availability B) “1%” minimum availability C) “five’s accessibility” code D) “five 10s” availability 75) Which of the following agile MIS infrastructure characteristics refers to how quickly a system can transform to support environmental changes? A) maintainability B) scalability C) capacity planning D) portability 76) Which of the following agile MIS infrastructure characteristics refers to the ability of an application to operate on different devices or software platforms, such as different operating systems? A) reliability B) portability C) maintainability D) usability 77) What does reliability ensure? Version 1 26 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ A) the system has the ability to operate in many different operating systems B) the system is easy to learn and efficient and satisfying to use C) the system is functioning correctly and providing accurate information D) the time frames when the system is operational 78) Which of the following describes how well a system can scale up or adapt to the increased demands or growth? A) flexibility B) scalability C) reliability D) affordability 79) What measures how quickly a system performs a process or transaction? A) portability B) capacity planning C) performance D) sustainability 80) What determines future environmental infrastructure requirements that ensure high- quality system performance? Version 1 27 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ A) capacity system B) capacity planning C) capacity function D) performance indicators 81) What is the primary reason a company has a failover system? A) to use different systems continuously at the same time B) to allow employees to work virtually C) to take down the primary system for maintenance while the secondary system activates to ensure continuous operations D) All of the answers are correct. 82) What is usability? A) the system is easy to learn, efficient, and satisfying to use B) the system functions correctly and provides accurate information C) the system allows varying levels of access D) the system quickly transforms to support environmental changes 83) What refers to how well a system can adapt to increased demands? Version 1 28 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ A) scalability B) capacity planning C) reliability D) availability 84) What represents the maximum throughput a system can deliver; for example, the capacity of a hard drive represents the size or volume? A) capacity B) web accessibility C) web accessibility initiative D) vulnerability 85) What means that people with disabilities, including visual, auditory, physical, speech, cognitive, and neurological disabilities, can use the web? A) capacity B) web accessibility C) web usability D) vulnerability 86) What brings together people from industry, disability organizations, government, and research labs from around the world to develop guidelines and resources to help make the web accessible to people with disabilities, including auditory, cognitive, neurological, physical, speech, and visual disabilities? Version 1 29 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ A) capacity B) web usability C) web accessibility initiative D) vulnerability 87) What is a system weakness that can be exploited by a threat? A) capacity B) web usability C) web accessibility initiative D) vulnerability 88) Which of the following terms represents how quickly a third party or vendor can change a system to ensure it meets user needs and the terms of any contracts, including agreed levels of reliability, maintainability or availability? A) capacity B) web accessibility C) serviceability D) vulnerability 89) What is administrator access? Version 1 30 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ A) ability to perform functions such as resetting passwords, deleting accounts, and shutting down entire systems B) varying levels that define what a user can access, view, or perform when operating a system C) time frames when the system is operational D) how quickly a system can transform to support environmental changes 90) What is accessibility? A) ability to perform functions such as resetting passwords, deleting accounts, and shutting down entire systems B) varying levels that define what a user can access, view, or perform when operating a system C) time frames when the system is operational D) how quickly a system can transform to support environmental changes 91) What is availability? A) ability to perform functions such as resetting passwords, deleting accounts, and shutting down entire systems B) varying levels that define what a user can access, view, or perform when operating a system C) time frames when the system is operational D) how quickly a system can transform to support environmental changes Version 1 31 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ 92) What is maintainability? A) ability to perform functions such as resetting passwords, deleting accounts, and shutting down entire systems B) varying levels that define what a user can access, view, or perform when operating a system C) how quickly a system can transform to support environmental changes D) ability to ensure that a system is functioning correctly and providing accurate information 93) What is reliability? A) ability to perform functions such as resetting passwords, deleting accounts, and shutting down entire systems B) varying levels that define what a user can access, view, or perform when operating a system C) how quickly a system can transform to support environmental changes D) ability to ensure that a system is functioning correctly and providing accurate information 94) What does it mean if a system is unavailable? A) a system that is not operating and cannot be used B) the ability of an application to operate on different devices or software platforms, such as different operating systems C) how quickly a system performs a process or transaction D) the degree to which a system is easy to learn, efficient, and satisfying to use Version 1 32 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ 95) What does it mean if an application has portability? A) a system that is not operating and cannot be used B) the ability of an application to operate on different devices or software platforms, such as different operating systems C) how quickly a system performs a process or transaction D) the degree to which a system is easy to learn, efficient, and satisfying to use 96) What is performance? A) a system that is not operating and cannot be used B) the ability of an application to operate on different devices or software platforms, such as different operating systems C) how quickly a system performs a process or transaction D) the degree to which a system is easy to learn, efficient, and satisfying to use 97) What is usability? A) a system that is not operating and cannot be used B) the ability of an application to operate on different devices or software platforms, such as different operating systems C) the degree to which a system is easy to learn, efficient, and satisfying to use D) how well a system can scale up or adapt to the increased demands of growth Version 1 33 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ 98) What is scalability? A) a system that is not operating and cannot be used B) the ability of an application to operate on different devices or software platforms, such as different operating systems C) the degree to which a system is easy to learn and efficient and satisfying to use D) how well a system can scale up or adapt to the increased demands of growth 99) Gordon Moore, the cofounder of Intel, established which MIS law? A) Intel’s law B) George’s law C) Moore’s law D) Lee’s law 100) Which of the following reflects Moore’s law? A) the computer chip performance per dollar doubles every 18 months B) a company’s ability to acquire small amounts of MIS equipment for cheaper cost C) a company’s ability to acquire small amounts of capital for spending on innovative ideas every two years D) the computer chip performance per dollar doubles every 6 months Version 1 34 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ 169) What is Big Data as a Service (BDaaS)? A) offers backup services that use cloud resources to protect applications and data from disruption caused by disaster B) delivers applications over the cloud using a pay-per-use revenue model C) facilitates the accessibility of business-critical data in a timely, secure, and affordable manner D) offers a cloud-based big data service to help organizations analyze massive amounts of data to solve business dilemmas 170) MIS infrastructure is a communications system created by linking two or more devices and establishing a standard methodology for communication. ⊚ true ⊚ false 171) Every company, regardless of size, relies on some form of MIS infrastructure, whether it is a few personal computers networked together or many interconnected around the world. ⊚ true ⊚ false Version 1 58 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ 172) Hardware consists of the physical devices associated with a computer system, where software is the set of instructions the hardware executes to carry out specific tasks. ⊚ true ⊚ false 173) Software is the set of instructions the hardware executes to carry out specific tasks. ⊚ true ⊚ false 174) Software consists of the physical devices associated with a computer system, where software is the set of instructions the hardware executes to carry out specific tasks. ⊚ true ⊚ false 175) Hardware is the set of instructions the hardware executes to carry out specific tasks. ⊚ true ⊚ false Version 1 59 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ 176) A network is a communications system created by linking two or more devices and establishing a standard methodology in which they can communicate. ⊚ true ⊚ false 177) A client is a computer designed to request information from a server. ⊚ true ⊚ false 178) A server is a computer dedicated to providing information in response to requests. ⊚ true ⊚ false 179) A server is a computer designed to request information from a server. ⊚ true ⊚ false Version 1 60 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ 180) A client is a computer dedicated to providing information in response to requests. ⊚ true ⊚ false 181) A good way to understand the client-server relationship is when someone uses a web browser (this would be the client) to access a website (this would be a server that would respond with the web page being requested by the client). ⊚ true ⊚ false 182) There are three primary areas where enterprise architects focus when maintaining a firm’s MIS infrastructure, including information MIS infrastructure, agile MIS infrastructure, and sustainable MIS infrastructures. ⊚ true ⊚ false 183) If you want to support business operations, you will focus on building a strong information MIS infrastructure, which identifies where and how important information, such as customer records, is maintained and secured. ⊚ true ⊚ false Version 1 61 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ 184) If you want to support organization change, you will focus on building a strong information MIS infrastructure, which identifies where and how important information, such as customer records, is maintained and secured. ⊚ true ⊚ false 185) If you want to support the environment, you will focus on building a strong, sustainable MIS infrastructure, which identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption. ⊚ true ⊚ false 186) Software is a computer designed to request information from a server. ⊚ true ⊚ false 187) Hardware is a computer dedicated to providing information in response to requests. Version 1 62 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ ⊚ true ⊚ false 188) An enterprise architect is a person grounded in technology, fluent in business, and able to provide the important bridge between MIS and the business. ⊚ true ⊚ false 189) The ability to get a system up and running in the event of a system crash or failure that includes restoring the company information is called a failover. ⊚ true ⊚ false 190) Failback occurs when the primary machine recovers and resumes operations, taking over from the secondary server. ⊚ true ⊚ false Version 1 63 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ 191) Fault tolerance is an exact copy of a system’s information. ⊚ true ⊚ false 192) The three primary areas of support provided by information infrastructure are backup and recovery, disaster recovery plan, and the business continuity plan. ⊚ true ⊚ false 193) Failover backs up an exact copy of a system’s information. ⊚ true ⊚ false 194) A backup is an exact copy of a system’s information. ⊚ true ⊚ false Version 1 64 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ 195) Recovery is the ability to get a system up and running in the event of a system crash or failure that includes restoring the information backup. ⊚ true ⊚ false 196) Failover is a specific type of fault tolerance that occurs when a redundant storage server offers an exact replica of the real-time data and, if the primary server crashes, the users are automatically directed to the secondary server or backup server. This is a high-speed and high- cost method of backup and recovery. ⊚ true ⊚ false 197) Failover occurs when the primary machine recovers and resumes operations, taking over from the secondary server. ⊚ true ⊚ false 198) Failback is a specific type of fault tolerance that occurs when a redundant storage server offers an exact replica of the real-time data, and, if the primary server crashes, the users are automatically directed to the secondary server or backup server. Version 1 65 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ ⊚ true ⊚ false 199) Disasters such as power outages, fires, floods, hurricanes, and even malicious activities such as hackers and viruses strike companies every day. Disasters can disrupt communications, damage physical infrastructures, halt transportation, and block utilities. ⊚ true ⊚ false 200) A hot site is a separate and fully equipped facility where the company can move immediately after a disaster and resume business. ⊚ true ⊚ false 201) A cold site is a separate facility that does not have any computer equipment but is a place where employees can move after a disaster. ⊚ true ⊚ false Version 1 66 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ 202) A warm site is a separate facility with computer equipment that requires installation and configuration. ⊚ true ⊚ false 203) A warm site is a separate and fully equipped facility where the company can move immediately after a disaster and resume business. ⊚ true ⊚ false 204) A warm site is a separate facility that does not have any computer equipment but is a place where employees can move after a disaster. ⊚ true ⊚ false 205) A cold site is a separate facility with computer equipment that requires installation and configuration. Version 1 67 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ ⊚ true ⊚ false 206) An emergency is a sudden, unexpected event requiring immediate action due to potential threat to health and safety, the environment, or property. ⊚ true ⊚ false 207) Emergency preparedness ensures a company is ready to respond to an emergency in an organized, timely, and effective manner. ⊚ true ⊚ false 208) Business impact analysis details how a company recovers and restores critical business operations and systems after a disaster or extended disruption. ⊚ true ⊚ false Version 1 68 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ 209) A business impact analysis identifies all critical business functions and the effect that a specific disaster may have upon them. ⊚ true ⊚ false 210) A business continuity planning identifies all critical business functions and the effect that a specific disaster may have upon them. ⊚ true ⊚ false 211) A business impact analysis occurs when the ability of a company to operate is impaired because of a hardware, software, or data outage. ⊚ true ⊚ false 212) A cold site can destroy large amounts of vital data, often causing incidents and an unplanned interruption of a service. ⊚ true ⊚ false Version 1 69 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ 213) An emergency contains all of the details of an incident. ⊚ true ⊚ false 214) Incident management is the process responsible for managing how incidents are identified and corrected. ⊚ true ⊚ false 215) Technology recovery strategies focus specifically on prioritizing the order for restoring hardware, software, and data across the organization that best meets business recovery requirements. ⊚ true ⊚ false 216) Accessibility refers to the varying levels that define what a user can access, view, or perform when operating a system. Version 1 70 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ ⊚ true ⊚ false 217) Top-level MIS employees require administrator access, or unrestricted access to the entire system. Administrator access can perform functions such as resetting passwords, deleting accounts, and shutting down entire systems. ⊚ true ⊚ false 218) High availability occurs when a system is continuously operational at all times. ⊚ true ⊚ false 219) Availability refers to the time frames when the system is operational. ⊚ true ⊚ false Version 1 71 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ 220) A system is called unavailable when it is not operating and cannot be used. ⊚ true ⊚ false 221) Portability refers to the ability of an application to operate on different devices or software platforms, such as different operating systems. ⊚ true ⊚ false 222) Scalability describes how well a system can scale up or adapt to the increased demands of growth. If a company grows faster than anticipated, it might experience a variety of problems, from running out of storage space to taking more time to complete transactions. Anticipating expected, and unexpected, growth is key to building scalable systems that can support that development. ⊚ true ⊚ false 223) Reliability means the system functions correctly and provides accurate information. ⊚ true ⊚ false Version 1 72 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ 224) Usability is the degree to which a system is easy to learn, efficient, and satisfying to use. ⊚ true ⊚ false 225) Maintainability means the system quickly transforms to support environmental changes. ⊚ true ⊚ false 226) Performance measures how quickly a system performs a process or transaction. ⊚ true ⊚ false 227) Capacity planning determines future environmental infrastructure requirements to ensure high-quality system performance. ⊚ true ⊚ false Version 1 73 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ 228) Vulnerability is a system weakness that can be exploited by a threat. ⊚ true ⊚ false 229) Serviceability is how quickly a third party or vendor can change a system to ensure it meets user needs and the terms of any contracts, including agreed levels of reliability, maintainability, or availability. ⊚ true ⊚ false 230) Capacity represents the maximum throughput a system can deliver; for example, the capacity of a hard drive represents the size or volume. ⊚ true ⊚ false 231) Web accessibility means that people with disabilities, including visual, auditory, physical, speech, cognitive, and neurological disabilities, can use the web. Version 1 74 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ ⊚ true ⊚ false 232) The Web Accessibility Initiative (WAI) brings together people from industry, disability organizations, government, and research labs from around the world to develop guidelines and resources to help make the web accessible to people with disabilities, including auditory, cognitive, neurological, physical, speech, and visual disabilities. ⊚ true ⊚ false 233) Availability refers to the varying levels that define what a user can access, view, or perform when operating a system. ⊚ true ⊚ false 234) Unavailability occurs when a system is continuously operational at all times. ⊚ true ⊚ false Version 1 75 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ 235) Accessibility refers to the time frames when the system is operational. ⊚ true ⊚ false 236) A system is called available when it is not operating and cannot be used. ⊚ true ⊚ false 237) Scalability refers to the ability of an application to operate on different devices or software platforms, such as different operating systems. ⊚ true ⊚ false 238) Portability describes how well a system can scale up or adapt to the increased demands of growth. ⊚ true ⊚ false Version 1 76 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ 239) Maintainability means the system functions correctly and provides accurate information. ⊚ true ⊚ false 240) Web accessibility is the degree to which a system is easy to learn and efficient and satisfying to use. ⊚ true ⊚ false 241) Serviceability means the system quickly transforms to support environmental changes. ⊚ true ⊚ false 242) Scalability measures how quickly a system performs a process or transaction. ⊚ true ⊚ false Version 1 77 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ 243) Maintainability determines future environmental infrastructure requirements to ensure high-quality system performance. ⊚ true ⊚ false 244) Reliability is a system weakness that can be exploited by a threat. ⊚ true ⊚ false 245) Usability is how quickly a third party or vendor can change a system to ensure it meets user needs and the terms of any contracts, including agreed levels of reliability, maintainability or availability. ⊚ true ⊚ false 246) Flexibility represents the maximum throughput a system can deliver; for example, the capacity of a hard drive represents the size or volume. Version 1 78 Sara Notes 36825484 ‫يحرم على اي شخص بيع او تداول النوتات بعد الشراء‬ ⊚ true ⊚ false 247) Availability means that people with disabilities, including visual, auditory, physical, speech, cognitive, and neurological disabilities, can use the web. ⊚ true ⊚ false 248) Administrator access initiative brings together people from industry, disability organizations, government, and research labs from around the world to develop guidelines and resources to help make the web accessible to people with disabilities, including auditory, cognitive, neurological, physical, speech, and visual disabilities. ⊚ true ⊚ false 249) Gordon Moore, cofounder of Intel, observed in 1965 that continued advances in technological innovation made it possible to reduce the size of a computer chip while doubling its capacity every two years. ⊚ true ⊚ false Version 1 79

Use Quizgecko on...
Browser
Browser