Deck 4: The Relentless Distribution of Information Technology
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
Play
Full screen (f)
Deck 4: The Relentless Distribution of Information Technology
1
Throughout the 1980's networks of PC's known as Local Area Networks or LAN's became a widespread and increasingly important computing platform in organizations of all sizes.
True
2
The internal application of TCP/IP is known as what?
A) Intranet
B) Internet
C) Extranet
D) Intralnet
A) Intranet
B) Internet
C) Extranet
D) Intralnet
Intranet
3
Which of the following describes the central problem in managing information systems functions within organizations?
A) How to effectively deliver services
B) How to allow access to distributed resources
C) How to maintain control of resources
D) How to integrate software and hardware infrastructures
A) How to effectively deliver services
B) How to allow access to distributed resources
C) How to maintain control of resources
D) How to integrate software and hardware infrastructures
How to effectively deliver services
How to allow access to distributed resources
How to maintain control of resources
How to allow access to distributed resources
How to maintain control of resources
4
According to the text, which of the following best describes connectivity?
A) ability of computer system to connect to network
B) ability of computer system to connect to network and exchange information
C) ability of computer system to access network and transfer information
D) ability of computer system to access network, transfer information, and update information
A) ability of computer system to connect to network
B) ability of computer system to connect to network and exchange information
C) ability of computer system to access network and transfer information
D) ability of computer system to access network, transfer information, and update information
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is a major drawback to a globalized and mobilized workforce?
A) Lack of centralization
B) Diversified Software requirements
C) Lack of connectivity
D) Lack of availability
A) Lack of centralization
B) Diversified Software requirements
C) Lack of connectivity
D) Lack of availability
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
Evaluation of the performance of an information system is dependent on which of the following factors:
A) user expectations
B) number of users
C) number of managers
D) management expectations
A) user expectations
B) number of users
C) number of managers
D) management expectations
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is a generic solution to the challenge of performance?
A) scalable solutions
B) reliable solutions
C) transparent solutions
D) server solutions
A) scalable solutions
B) reliable solutions
C) transparent solutions
D) server solutions
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
If a company specifies that all desktops must use a certain operation system, software, and institute a directory service, what are they trying to achieve?
A) Performance gain
B) Transparency
C) Connectivity gain
D) Performance homogeneity
A) Performance gain
B) Transparency
C) Connectivity gain
D) Performance homogeneity
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
According to the text a directory is
A) A comprehensive catalog of users
B) A comprehensive catalog of users and hardware files
C) A comprehensive catalog of users, IT resources, security information and roles
D) A basic tree structure used to traverse the system software
A) A comprehensive catalog of users
B) A comprehensive catalog of users and hardware files
C) A comprehensive catalog of users, IT resources, security information and roles
D) A basic tree structure used to traverse the system software
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
The most successful strategy for security involves which of the following?
A) Users
B) Roles
C) Models
D) Resources
A) Users
B) Roles
C) Models
D) Resources
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
Redundancy is the most common and dependable way to ensure reliability into a system.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
Redundancy is the most inconsistent and unpredictable way to ensure reliability into a system.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
Failover is the mechanism that redirects access or processing in the event of a failure to a working resource.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
Failover is the mechanism that directs access of users in the event of a failure to a stored procedure.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is the best way to achieve scalability of an information system?
A) dividing computing services into focused roles
B) combining hardware to create a centralized infrastructure
C) dividing software components into functional services
D) thinking about the future of computing systems
A) dividing computing services into focused roles
B) combining hardware to create a centralized infrastructure
C) dividing software components into functional services
D) thinking about the future of computing systems
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
The simplest way to achieve load balancing is to:
A) maintain a list of available servers and pass incoming requests to those servers
B) distribute the load of data transfer to a single server with high capacity
C) buy the latest load balancing software
D) institute single tier architecture
A) maintain a list of available servers and pass incoming requests to those servers
B) distribute the load of data transfer to a single server with high capacity
C) buy the latest load balancing software
D) institute single tier architecture
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
OLTP stands for what?
A) online transfer processing
B) online transaction processing
C) online temporary processing
D) online processing transaction
A) online transfer processing
B) online transaction processing
C) online temporary processing
D) online processing transaction
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
The presentation layer of an n-tier architecture does not contain which of the following
A) Browser
B) Database
C) Processing Applications
D) Web Services
A) Browser
B) Database
C) Processing Applications
D) Web Services
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following would support having the data tier on one physical server?
A) splitting data is error prone
B) splitting data is highly complex
C) data is not highly integrated
D) functionally-orientated legacy systems
A) splitting data is error prone
B) splitting data is highly complex
C) data is not highly integrated
D) functionally-orientated legacy systems
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
Distributed information systems require greater:
A) training
B) support
C) investment
D) network administration
A) training
B) support
C) investment
D) network administration
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
Building an IT infrastructure requires:
A) short-term view
B) long-term view
C) senior-level commitment
D) company partner commitment
A) short-term view
B) long-term view
C) senior-level commitment
D) company partner commitment
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following are architecture NO-NO's?
A) Trying to standardize everything
B) Choosing a technologist to lead the project
C) Making financial ROI the top goal
D) Confusing architecture with another technology project
A) Trying to standardize everything
B) Choosing a technologist to lead the project
C) Making financial ROI the top goal
D) Confusing architecture with another technology project
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
A 3-tier Client/Server architecture consists of which of the following?
A) Presentation tier
B) Business Logic Tier
C) Business Logistics Tier
D) Data Tier
A) Presentation tier
B) Business Logic Tier
C) Business Logistics Tier
D) Data Tier
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
The presentation Layer is sometimes referred to as a client.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
If the amount of activity on the presentation layer is minimal the tier is referred to as a fat client.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck