Deck 4: The Relentless Distribution of Information Technology

Full screen (f)
exit full mode
Question
Throughout the 1980's networks of PC's known as Local Area Networks or LAN's became a widespread and increasingly important computing platform in organizations of all sizes.
Use Space or
up arrow
down arrow
to flip the card.
Question
The internal application of TCP/IP is known as what?

A) Intranet
B) Internet
C) Extranet
D) Intralnet
Question
Which of the following describes the central problem in managing information systems functions within organizations?

A) How to effectively deliver services
B) How to allow access to distributed resources
C) How to maintain control of resources
D) How to integrate software and hardware infrastructures
Question
According to the text, which of the following best describes connectivity?

A) ability of computer system to connect to network
B) ability of computer system to connect to network and exchange information
C) ability of computer system to access network and transfer information
D) ability of computer system to access network, transfer information, and update information
Question
Which of the following is a major drawback to a globalized and mobilized workforce?

A) Lack of centralization
B) Diversified Software requirements
C) Lack of connectivity
D) Lack of availability
Question
Evaluation of the performance of an information system is dependent on which of the following factors:

A) user expectations
B) number of users
C) number of managers
D) management expectations
Question
Which of the following is a generic solution to the challenge of performance?

A) scalable solutions
B) reliable solutions
C) transparent solutions
D) server solutions
Question
If a company specifies that all desktops must use a certain operation system, software, and institute a directory service, what are they trying to achieve?

A) Performance gain
B) Transparency
C) Connectivity gain
D) Performance homogeneity
Question
According to the text a directory is

A) A comprehensive catalog of users
B) A comprehensive catalog of users and hardware files
C) A comprehensive catalog of users, IT resources, security information and roles
D) A basic tree structure used to traverse the system software
Question
The most successful strategy for security involves which of the following?

A) Users
B) Roles
C) Models
D) Resources
Question
Redundancy is the most common and dependable way to ensure reliability into a system.
Question
Redundancy is the most inconsistent and unpredictable way to ensure reliability into a system.
Question
Failover is the mechanism that redirects access or processing in the event of a failure to a working resource.
Question
Failover is the mechanism that directs access of users in the event of a failure to a stored procedure.
Question
Which of the following is the best way to achieve scalability of an information system?

A) dividing computing services into focused roles
B) combining hardware to create a centralized infrastructure
C) dividing software components into functional services
D) thinking about the future of computing systems
Question
The simplest way to achieve load balancing is to:

A) maintain a list of available servers and pass incoming requests to those servers
B) distribute the load of data transfer to a single server with high capacity
C) buy the latest load balancing software
D) institute single tier architecture
Question
OLTP stands for what?

A) online transfer processing
B) online transaction processing
C) online temporary processing
D) online processing transaction
Question
The presentation layer of an n-tier architecture does not contain which of the following

A) Browser
B) Database
C) Processing Applications
D) Web Services
Question
Which of the following would support having the data tier on one physical server?

A) splitting data is error prone
B) splitting data is highly complex
C) data is not highly integrated
D) functionally-orientated legacy systems
Question
Distributed information systems require greater:

A) training
B) support
C) investment
D) network administration
Question
Building an IT infrastructure requires:

A) short-term view
B) long-term view
C) senior-level commitment
D) company partner commitment
Question
Which of the following are architecture NO-NO's?

A) Trying to standardize everything
B) Choosing a technologist to lead the project
C) Making financial ROI the top goal
D) Confusing architecture with another technology project
Question
A 3-tier Client/Server architecture consists of which of the following?

A) Presentation tier
B) Business Logic Tier
C) Business Logistics Tier
D) Data Tier
Question
The presentation Layer is sometimes referred to as a client.
Question
If the amount of activity on the presentation layer is minimal the tier is referred to as a fat client.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 4: The Relentless Distribution of Information Technology
1
Throughout the 1980's networks of PC's known as Local Area Networks or LAN's became a widespread and increasingly important computing platform in organizations of all sizes.
True
2
The internal application of TCP/IP is known as what?

A) Intranet
B) Internet
C) Extranet
D) Intralnet
Intranet
3
Which of the following describes the central problem in managing information systems functions within organizations?

A) How to effectively deliver services
B) How to allow access to distributed resources
C) How to maintain control of resources
D) How to integrate software and hardware infrastructures
How to effectively deliver services
How to allow access to distributed resources
How to maintain control of resources
4
According to the text, which of the following best describes connectivity?

A) ability of computer system to connect to network
B) ability of computer system to connect to network and exchange information
C) ability of computer system to access network and transfer information
D) ability of computer system to access network, transfer information, and update information
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is a major drawback to a globalized and mobilized workforce?

A) Lack of centralization
B) Diversified Software requirements
C) Lack of connectivity
D) Lack of availability
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
Evaluation of the performance of an information system is dependent on which of the following factors:

A) user expectations
B) number of users
C) number of managers
D) management expectations
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is a generic solution to the challenge of performance?

A) scalable solutions
B) reliable solutions
C) transparent solutions
D) server solutions
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
If a company specifies that all desktops must use a certain operation system, software, and institute a directory service, what are they trying to achieve?

A) Performance gain
B) Transparency
C) Connectivity gain
D) Performance homogeneity
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
According to the text a directory is

A) A comprehensive catalog of users
B) A comprehensive catalog of users and hardware files
C) A comprehensive catalog of users, IT resources, security information and roles
D) A basic tree structure used to traverse the system software
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
The most successful strategy for security involves which of the following?

A) Users
B) Roles
C) Models
D) Resources
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
Redundancy is the most common and dependable way to ensure reliability into a system.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
Redundancy is the most inconsistent and unpredictable way to ensure reliability into a system.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
Failover is the mechanism that redirects access or processing in the event of a failure to a working resource.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
Failover is the mechanism that directs access of users in the event of a failure to a stored procedure.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is the best way to achieve scalability of an information system?

A) dividing computing services into focused roles
B) combining hardware to create a centralized infrastructure
C) dividing software components into functional services
D) thinking about the future of computing systems
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
The simplest way to achieve load balancing is to:

A) maintain a list of available servers and pass incoming requests to those servers
B) distribute the load of data transfer to a single server with high capacity
C) buy the latest load balancing software
D) institute single tier architecture
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
OLTP stands for what?

A) online transfer processing
B) online transaction processing
C) online temporary processing
D) online processing transaction
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
The presentation layer of an n-tier architecture does not contain which of the following

A) Browser
B) Database
C) Processing Applications
D) Web Services
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following would support having the data tier on one physical server?

A) splitting data is error prone
B) splitting data is highly complex
C) data is not highly integrated
D) functionally-orientated legacy systems
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
Distributed information systems require greater:

A) training
B) support
C) investment
D) network administration
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
Building an IT infrastructure requires:

A) short-term view
B) long-term view
C) senior-level commitment
D) company partner commitment
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following are architecture NO-NO's?

A) Trying to standardize everything
B) Choosing a technologist to lead the project
C) Making financial ROI the top goal
D) Confusing architecture with another technology project
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
A 3-tier Client/Server architecture consists of which of the following?

A) Presentation tier
B) Business Logic Tier
C) Business Logistics Tier
D) Data Tier
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
The presentation Layer is sometimes referred to as a client.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
If the amount of activity on the presentation layer is minimal the tier is referred to as a fat client.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 25 flashcards in this deck.