Deck 4: The Relentless Distribution of Information Technology

ملء الشاشة (f)
exit full mode
سؤال
Throughout the 1980's networks of PC's known as Local Area Networks or LAN's became a widespread and increasingly important computing platform in organizations of all sizes.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The internal application of TCP/IP is known as what?

A) Intranet
B) Internet
C) Extranet
D) Intralnet
سؤال
Which of the following describes the central problem in managing information systems functions within organizations?

A) How to effectively deliver services
B) How to allow access to distributed resources
C) How to maintain control of resources
D) How to integrate software and hardware infrastructures
سؤال
According to the text, which of the following best describes connectivity?

A) ability of computer system to connect to network
B) ability of computer system to connect to network and exchange information
C) ability of computer system to access network and transfer information
D) ability of computer system to access network, transfer information, and update information
سؤال
Which of the following is a major drawback to a globalized and mobilized workforce?

A) Lack of centralization
B) Diversified Software requirements
C) Lack of connectivity
D) Lack of availability
سؤال
Evaluation of the performance of an information system is dependent on which of the following factors:

A) user expectations
B) number of users
C) number of managers
D) management expectations
سؤال
Which of the following is a generic solution to the challenge of performance?

A) scalable solutions
B) reliable solutions
C) transparent solutions
D) server solutions
سؤال
If a company specifies that all desktops must use a certain operation system, software, and institute a directory service, what are they trying to achieve?

A) Performance gain
B) Transparency
C) Connectivity gain
D) Performance homogeneity
سؤال
According to the text a directory is

A) A comprehensive catalog of users
B) A comprehensive catalog of users and hardware files
C) A comprehensive catalog of users, IT resources, security information and roles
D) A basic tree structure used to traverse the system software
سؤال
The most successful strategy for security involves which of the following?

A) Users
B) Roles
C) Models
D) Resources
سؤال
Redundancy is the most common and dependable way to ensure reliability into a system.
سؤال
Redundancy is the most inconsistent and unpredictable way to ensure reliability into a system.
سؤال
Failover is the mechanism that redirects access or processing in the event of a failure to a working resource.
سؤال
Failover is the mechanism that directs access of users in the event of a failure to a stored procedure.
سؤال
Which of the following is the best way to achieve scalability of an information system?

A) dividing computing services into focused roles
B) combining hardware to create a centralized infrastructure
C) dividing software components into functional services
D) thinking about the future of computing systems
سؤال
The simplest way to achieve load balancing is to:

A) maintain a list of available servers and pass incoming requests to those servers
B) distribute the load of data transfer to a single server with high capacity
C) buy the latest load balancing software
D) institute single tier architecture
سؤال
OLTP stands for what?

A) online transfer processing
B) online transaction processing
C) online temporary processing
D) online processing transaction
سؤال
The presentation layer of an n-tier architecture does not contain which of the following

A) Browser
B) Database
C) Processing Applications
D) Web Services
سؤال
Which of the following would support having the data tier on one physical server?

A) splitting data is error prone
B) splitting data is highly complex
C) data is not highly integrated
D) functionally-orientated legacy systems
سؤال
Distributed information systems require greater:

A) training
B) support
C) investment
D) network administration
سؤال
Building an IT infrastructure requires:

A) short-term view
B) long-term view
C) senior-level commitment
D) company partner commitment
سؤال
Which of the following are architecture NO-NO's?

A) Trying to standardize everything
B) Choosing a technologist to lead the project
C) Making financial ROI the top goal
D) Confusing architecture with another technology project
سؤال
A 3-tier Client/Server architecture consists of which of the following?

A) Presentation tier
B) Business Logic Tier
C) Business Logistics Tier
D) Data Tier
سؤال
The presentation Layer is sometimes referred to as a client.
سؤال
If the amount of activity on the presentation layer is minimal the tier is referred to as a fat client.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 4: The Relentless Distribution of Information Technology
1
Throughout the 1980's networks of PC's known as Local Area Networks or LAN's became a widespread and increasingly important computing platform in organizations of all sizes.
True
2
The internal application of TCP/IP is known as what?

A) Intranet
B) Internet
C) Extranet
D) Intralnet
Intranet
3
Which of the following describes the central problem in managing information systems functions within organizations?

A) How to effectively deliver services
B) How to allow access to distributed resources
C) How to maintain control of resources
D) How to integrate software and hardware infrastructures
How to effectively deliver services
How to allow access to distributed resources
How to maintain control of resources
4
According to the text, which of the following best describes connectivity?

A) ability of computer system to connect to network
B) ability of computer system to connect to network and exchange information
C) ability of computer system to access network and transfer information
D) ability of computer system to access network, transfer information, and update information
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following is a major drawback to a globalized and mobilized workforce?

A) Lack of centralization
B) Diversified Software requirements
C) Lack of connectivity
D) Lack of availability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
6
Evaluation of the performance of an information system is dependent on which of the following factors:

A) user expectations
B) number of users
C) number of managers
D) management expectations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following is a generic solution to the challenge of performance?

A) scalable solutions
B) reliable solutions
C) transparent solutions
D) server solutions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
8
If a company specifies that all desktops must use a certain operation system, software, and institute a directory service, what are they trying to achieve?

A) Performance gain
B) Transparency
C) Connectivity gain
D) Performance homogeneity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
9
According to the text a directory is

A) A comprehensive catalog of users
B) A comprehensive catalog of users and hardware files
C) A comprehensive catalog of users, IT resources, security information and roles
D) A basic tree structure used to traverse the system software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
10
The most successful strategy for security involves which of the following?

A) Users
B) Roles
C) Models
D) Resources
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
11
Redundancy is the most common and dependable way to ensure reliability into a system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
12
Redundancy is the most inconsistent and unpredictable way to ensure reliability into a system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
13
Failover is the mechanism that redirects access or processing in the event of a failure to a working resource.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
14
Failover is the mechanism that directs access of users in the event of a failure to a stored procedure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the following is the best way to achieve scalability of an information system?

A) dividing computing services into focused roles
B) combining hardware to create a centralized infrastructure
C) dividing software components into functional services
D) thinking about the future of computing systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
16
The simplest way to achieve load balancing is to:

A) maintain a list of available servers and pass incoming requests to those servers
B) distribute the load of data transfer to a single server with high capacity
C) buy the latest load balancing software
D) institute single tier architecture
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
17
OLTP stands for what?

A) online transfer processing
B) online transaction processing
C) online temporary processing
D) online processing transaction
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
18
The presentation layer of an n-tier architecture does not contain which of the following

A) Browser
B) Database
C) Processing Applications
D) Web Services
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following would support having the data tier on one physical server?

A) splitting data is error prone
B) splitting data is highly complex
C) data is not highly integrated
D) functionally-orientated legacy systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
20
Distributed information systems require greater:

A) training
B) support
C) investment
D) network administration
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
21
Building an IT infrastructure requires:

A) short-term view
B) long-term view
C) senior-level commitment
D) company partner commitment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
22
Which of the following are architecture NO-NO's?

A) Trying to standardize everything
B) Choosing a technologist to lead the project
C) Making financial ROI the top goal
D) Confusing architecture with another technology project
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
23
A 3-tier Client/Server architecture consists of which of the following?

A) Presentation tier
B) Business Logic Tier
C) Business Logistics Tier
D) Data Tier
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
24
The presentation Layer is sometimes referred to as a client.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
25
If the amount of activity on the presentation layer is minimal the tier is referred to as a fat client.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.