Deck 4: The Relentless Distribution of Information Technology
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/25
العب
ملء الشاشة (f)
Deck 4: The Relentless Distribution of Information Technology
1
Throughout the 1980's networks of PC's known as Local Area Networks or LAN's became a widespread and increasingly important computing platform in organizations of all sizes.
True
2
The internal application of TCP/IP is known as what?
A) Intranet
B) Internet
C) Extranet
D) Intralnet
A) Intranet
B) Internet
C) Extranet
D) Intralnet
Intranet
3
Which of the following describes the central problem in managing information systems functions within organizations?
A) How to effectively deliver services
B) How to allow access to distributed resources
C) How to maintain control of resources
D) How to integrate software and hardware infrastructures
A) How to effectively deliver services
B) How to allow access to distributed resources
C) How to maintain control of resources
D) How to integrate software and hardware infrastructures
How to effectively deliver services
How to allow access to distributed resources
How to maintain control of resources
How to allow access to distributed resources
How to maintain control of resources
4
According to the text, which of the following best describes connectivity?
A) ability of computer system to connect to network
B) ability of computer system to connect to network and exchange information
C) ability of computer system to access network and transfer information
D) ability of computer system to access network, transfer information, and update information
A) ability of computer system to connect to network
B) ability of computer system to connect to network and exchange information
C) ability of computer system to access network and transfer information
D) ability of computer system to access network, transfer information, and update information
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following is a major drawback to a globalized and mobilized workforce?
A) Lack of centralization
B) Diversified Software requirements
C) Lack of connectivity
D) Lack of availability
A) Lack of centralization
B) Diversified Software requirements
C) Lack of connectivity
D) Lack of availability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
6
Evaluation of the performance of an information system is dependent on which of the following factors:
A) user expectations
B) number of users
C) number of managers
D) management expectations
A) user expectations
B) number of users
C) number of managers
D) management expectations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following is a generic solution to the challenge of performance?
A) scalable solutions
B) reliable solutions
C) transparent solutions
D) server solutions
A) scalable solutions
B) reliable solutions
C) transparent solutions
D) server solutions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
8
If a company specifies that all desktops must use a certain operation system, software, and institute a directory service, what are they trying to achieve?
A) Performance gain
B) Transparency
C) Connectivity gain
D) Performance homogeneity
A) Performance gain
B) Transparency
C) Connectivity gain
D) Performance homogeneity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
9
According to the text a directory is
A) A comprehensive catalog of users
B) A comprehensive catalog of users and hardware files
C) A comprehensive catalog of users, IT resources, security information and roles
D) A basic tree structure used to traverse the system software
A) A comprehensive catalog of users
B) A comprehensive catalog of users and hardware files
C) A comprehensive catalog of users, IT resources, security information and roles
D) A basic tree structure used to traverse the system software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
10
The most successful strategy for security involves which of the following?
A) Users
B) Roles
C) Models
D) Resources
A) Users
B) Roles
C) Models
D) Resources
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
11
Redundancy is the most common and dependable way to ensure reliability into a system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
12
Redundancy is the most inconsistent and unpredictable way to ensure reliability into a system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
13
Failover is the mechanism that redirects access or processing in the event of a failure to a working resource.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
14
Failover is the mechanism that directs access of users in the event of a failure to a stored procedure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the following is the best way to achieve scalability of an information system?
A) dividing computing services into focused roles
B) combining hardware to create a centralized infrastructure
C) dividing software components into functional services
D) thinking about the future of computing systems
A) dividing computing services into focused roles
B) combining hardware to create a centralized infrastructure
C) dividing software components into functional services
D) thinking about the future of computing systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
16
The simplest way to achieve load balancing is to:
A) maintain a list of available servers and pass incoming requests to those servers
B) distribute the load of data transfer to a single server with high capacity
C) buy the latest load balancing software
D) institute single tier architecture
A) maintain a list of available servers and pass incoming requests to those servers
B) distribute the load of data transfer to a single server with high capacity
C) buy the latest load balancing software
D) institute single tier architecture
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
17
OLTP stands for what?
A) online transfer processing
B) online transaction processing
C) online temporary processing
D) online processing transaction
A) online transfer processing
B) online transaction processing
C) online temporary processing
D) online processing transaction
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
18
The presentation layer of an n-tier architecture does not contain which of the following
A) Browser
B) Database
C) Processing Applications
D) Web Services
A) Browser
B) Database
C) Processing Applications
D) Web Services
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following would support having the data tier on one physical server?
A) splitting data is error prone
B) splitting data is highly complex
C) data is not highly integrated
D) functionally-orientated legacy systems
A) splitting data is error prone
B) splitting data is highly complex
C) data is not highly integrated
D) functionally-orientated legacy systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
20
Distributed information systems require greater:
A) training
B) support
C) investment
D) network administration
A) training
B) support
C) investment
D) network administration
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
21
Building an IT infrastructure requires:
A) short-term view
B) long-term view
C) senior-level commitment
D) company partner commitment
A) short-term view
B) long-term view
C) senior-level commitment
D) company partner commitment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
22
Which of the following are architecture NO-NO's?
A) Trying to standardize everything
B) Choosing a technologist to lead the project
C) Making financial ROI the top goal
D) Confusing architecture with another technology project
A) Trying to standardize everything
B) Choosing a technologist to lead the project
C) Making financial ROI the top goal
D) Confusing architecture with another technology project
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
23
A 3-tier Client/Server architecture consists of which of the following?
A) Presentation tier
B) Business Logic Tier
C) Business Logistics Tier
D) Data Tier
A) Presentation tier
B) Business Logic Tier
C) Business Logistics Tier
D) Data Tier
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
24
The presentation Layer is sometimes referred to as a client.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
25
If the amount of activity on the presentation layer is minimal the tier is referred to as a fat client.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck

