Chapter 5 - Version1
Chapter 5 - Version1
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
Version 1 1
⊚ true
Version 1 2
6) Hardware is the set of instructions the hardware
executes to carry out specific tasks.
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
Version 1 3
12) A good way to understand the client-server would respond with the
relationship is when someone uses a web browser (this would web page being requested
be the client) to access a website (this would be a server that by the client).
⊚ true
⊚ false
13) There are three primary areas where enterprise infrastructure, and
architects focus when maintaining a firm’s MIS infrastructure, sustainable MIS
including information MIS infrastructure, agile MIS infrastructures.
⊚ true
⊚ false
14) If you want to support business operations, you will as customer records, is
focus on building a strong information MIS infrastructure, maintained and secured.
which identifies where and how important information, such
⊚ true
⊚ false
15) If you want to support organization change, you will as customer records, is
focus on building a strong information MIS infrastructure, maintained and secured.
which identifies where and how important information, such
⊚ true
⊚ false
Version 1 4
⊚ true ⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
20) The ability to get a system up and running in the event company information is
of a system crash or failure that includes restoring the called a failover.
⊚ true
⊚ false
⊚ true
⊚ false
Version 1 5
⊚ true
Version 1 6
23) The three primary areas of support provided by recovery plan, and the
information infrastructure are backup and recovery, disaster business continuity plan.
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
Version 1 7
28) Failover occurs when the primary machine recovers
and resumes operations, taking over from the secondary
server.
Version 1 8
⊚ true ⊚ false
⊚ true
⊚ false
30) Disasters such as power outages, fires, floods, transportation, and block
hurricanes, and even malicious activities such as hackers and utilities.
viruses strike companies every day. Disasters can disrupt
communications, damage physical infrastructures, halt
⊚ true
⊚ false
⊚ true
⊚ false
32) A cold site is a separate facility that does not have any
computer equipment but is a place where employees can
move after a disaster.
⊚ true
⊚ false
Version 1 9
⊚ true
Version 1 10
34) A warm site is a separate and fully equipped facility
where the company can move immediately after a disaster and
resume business.
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
Version 1 11
⊚ true ⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
Version 1 12
45) Incident management is the process responsible for
managing how incidents are identified and corrected.
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
Version 1 13
50) Availability refers to the time frames when the system
is operational.
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
53) Scalability describes how well a system can scale up unexpected, growth is key
or adapt to the increased demands of growth. If a company to building scalable
grows faster than anticipated, it might experience a variety of systems that can support
problems, from running out of storage space to taking more that development.
time to complete transactions. Anticipating expected, and
⊚ true
⊚ false
⊚ true
⊚ false
55) Usability is the degree to which a system is easy to learn, efficient, and
Version 1 14
satisfying to use.
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
Version 1 15
⊚ true ⊚ false
61) Capacity represents the maximum throughput a system represents the size or
can deliver; for example, the capacity of a hard drive volume.
⊚ true
⊚ false
62) Web accessibility means that people with disabilities, neurological disabilities,
including visual, auditory, physical, speech, cognitive, and can use the web.
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
Version 1 16
66) Accessibility refers to the time frames when the
system is operational.
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
Version 1 17
⊚ true ⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
77) Flexibility
Version 1 18
represents the maximum throughput a system can deliver; for
example, the capacity of a hard drive represents the size or
volume.
⊚ true
⊚ false
⊚ true
⊚ false
79) Administrator access initiative brings together people physical, speech, and
from industry, disability organizations, government, and visual disabilities.
research labs from around the world to develop guidelines and
resources to help make the web accessible to people with
disabilities, including auditory, cognitive, neurological,
⊚ true
⊚ false
80) Gordon Moore, cofounder of Intel, observed in 1965 its capacity every two
that continued advances in technological innovation made it years.
possible to reduce the size of a computer chip while doubling
⊚ true
⊚ false
Version 1 19
⊚ true ⊚ false
⊚ true
⊚ false
83) Sustainable, or green, MIS describes the production, minimizes damage to the
management, use, and disposal of technology in a way that environment.
⊚ true
⊚ false
84) Ewaste is discarded electronics and is growing with cell phone is less than two
the growth of innovation; for example, a personal computer years.
has a life expectancy of only three to five years and that of a
⊚ true
⊚ false
85) Upcycle refers to discarded electronics and is growing that of a cell phone is less
with the growth of innovation; for example, a personal than two years.
computer has a life expectancy of only three to five years and
⊚ true
⊚ false
⊚ true
⊚ false
Version 1 20
87) Sustainable MIS disposal refers to the safe disposal of
MIS assets at the end of their life cycle.
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
Version 1 21
⊚ true ⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
98) Carbon emission is the amount of energy consumed by business processes and
Version 1 22
systems.
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
Version 1 23
103) Cloud computing delivers electricity using two-way
digital technology and is meant to solve the problem of
outdated electrical grids.
Version 1 24
⊚ true ⊚ false
⊚ true
⊚ false
105) Virtualization creates multiple virtual machines on a four machines, and created
single computing device. A good analogy is a computer additional amounts of
printer. In the past, you had to purchase a fax machine, copy ewaste.
machine, answering machine, and computer printer
separately. This was expensive, required enough energy to run
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
Version 1 25
109) Disaster Recovery as a Service (DRaaS) offers backup data from disruption
services that use cloud resources to protect applications and caused by disaster.
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
Version 1 26
management information systems and associated components,
such as telecommunications and storage systems.
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
119) Multi-tenancy in
the cloud means that a
Version 1 27
single instance of a system serves multiple customers. In the can access the same
cloud, each customer is called a tenant, and multiple tenants system.
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
Version 1 28
125) A public cloud promotes massive, global, industry- upgrade, or replace
wide applications offered to the general public. In a public hardware or software.
cloud, customers are never required to provision, manage,
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
⊚ true
⊚ false
Version 1 29
130) Cloud bursting is when a company uses its own in poor performance or
computing infrastructure for normal usage and accesses the system crashes.
cloud when it needs to scale for high or peak load
requirements, ensuring a sudden spike in usage does not result
⊚ true
⊚ false
dependent on hardware
A) identifies where and how important information, and energy consumption
such as customer records, is maintained and secured D) includes the
B) includes the hardware, software, and plans for how a firm will
telecommunications equipment that, when combined, build, deploy, use, and
provides the underlying foundation to support the share its data, processes
organization’s goals and MIS assets
C) identifies ways that a company can grow in terms
of computing resources while simultaneously becoming less
dependent on hardware
A) identifies where and how important information, and energy consumption
such as customer records, is maintained and secured D) includes the
B) includes the hardware, software, and plans for how a firm will
telecommunications equipment that, when combined, build, deploy, use, and
provides the underlying foundation to support the share its data, processes
organization’s goals and MIS assets
C) identifies ways that a company can grow in terms
of computing resources while simultaneously becoming less
Version 1 30
D) includes the
B) includes the hardware, software, and plans for how a firm will
telecommunications equipment that, when combined, build, deploy, use, and
provides the underlying foundation to support the share its data, processes
organization’s goals and MIS assets
C) identifies ways that a company can grow in terms
of computing resources while simultaneously becoming less
dependent on hardware and energy consumption
D) enterprise
A) MIS Infrastructure manager manager
B) MIS specialist
C) enterprise architect
D) All of the
A) reduces costs answer choices are correct.
B) improves productivity
C) optimizes business operations
Version 1 31
137) What is the difference between hardware and software?
C) client
A) hardware D) server
B) software
C) client
A) hardware D) server
B) software
C) client
A) network D) server
B) software
C) client
A) hardware D) server
B) software
Version 1 32
142) What is a computer dedicated to providing
information in response to requests?
C) client
A) hardware D) server
B) software
a server
A) consists of the physical devices associated with a D) a computer
computer system dedicated to providing
B) the set of instructions the hardware executes to information in response to
carry out specific tasks requests
C) a computer designed to request information from
a server
A) consists of the physical devices associated with a D) a computer
computer system dedicated to providing
B) the set of instructions the hardware executes to information in response to
carry out specific tasks requests
C) a computer designed to request information from
Version 1 33
146) What is a client?
a server
A) consists of the physical devices associated with a D) a computer
computer system dedicated to providing
B) the set of instructions the hardware executes to information in response to
carry out specific tasks requests
C) a computer designed to request information from
a server
A) consists of the physical devices associated with a D) a computer
computer system dedicated to providing
B) the set of instructions the hardware executes to information in response to
carry out specific tasks requests
C) a computer designed to request information from
148) John works for Internal Computer Specialists, which as hard drives. What does
focuses on helping small business owners resolve MIS John’s role at Internal
infrastructure issues. John’s tasks include cleaning and Computer Specialists focus
replacing motherboards, cables, and internal components such on fixing?
C) backup
A) hardware D) recovery
B) clients
149) Jessica started her own online company that for her customers. Which
specializes in selling items for bachelorette parties, wedding of the following is a
parties, and baby showers. Due to the fact that she only critical component in
operates online, her MIS infrastructure needs to be fast, Jessica’s MIS
efficient, and accurate to ensure the best possible experience infrastructure?
D) All of the
A) hardware and software answer choices are correct.
B) clients
C) server
Version 1 34
150) What are the three business functions an MIS infrastructure supports?
D) information,
A) operations, change, and the change, and business
environment/sustainability continuity planning
B) operations, customers, and ewaste
C) information, clients, and viruses
infrastructures
A) information, aggregated, and sustainable MIS D) varies
infrastructures depending on the industry
B) information, operational, and changing MIS
infrastructures
C) information, agile, and sustainable MIS
virtualization
A) accessibility, availability, maintainability, D) storage,
portability, reliability, scalability, and usability network, and server
B) backup and recovery plan, disaster recovery plan, virtualization
and business continuity planning
C) grid computing, cloud computing, and
virtualization
A) accessibility, availability, maintainability, D) storage,
portability, reliability, scalability, and usability network, and server
B) backup and recovery plan, disaster recovery plan, virtualization
and business continuity planning
C) grid computing, cloud computing, and
Version 1 35
154) Which characteristics support an information MIS infrastructure?
virtualization
A) accessibility, availability, maintainability, D) storage,
portability, reliability, scalability, and usability network, and server
B) backup and recovery plan, disaster recovery plan, virtualization
and business continuity planning
C) grid computing, cloud computing, and
C) information
A) agile D) virtualized
B) sustainable
C) information
A) agile D) virtualized
B) sustainable
157) Backup and recovery plan, disaster recovery plan, and ________ MIS
business continuity planning are all elements of a(n) infrastructure.
C) information
A) agile D) virtualized
B) sustainable
A) sustainable
Version 1 36
D) agile
B) information
C) virtualized
C) virtualized
A) sustainable D) agile
B) information
160) A(n) ________ MIS infrastructure includes the when combined, provides
hardware, software, and telecommunications equipment that, the underlying foundation.
C) agile
A) information D) sustainable
B) virtualized
D) virtualized
A) information MIS infrastructure MIS infrastructure
B) agile MIS infrastructure
C) sustainable MIS infrastructure
D) All of the
A) security breaches and theft. answer choices are correct.
B) floods and earthquakes.
C) malicious Internet attacks.
Version 1 37
163) Each year, businesses lose time and money because of
system crashes and failures. Which of the following offers the
best way to protect a system from crashes and failures?
D) All of the
A) backup and recovery plan answer choices are correct.
B) fault tolerance
C) failover
D)
A) failover maintainability
B) disaster recovery cost curve
C) reliability
C) warm site
A) failback D) hot site
B) disrupted communications
Version 1 38
167) What has the ability to recover information or systems
in the event of catastrophic disasters?
C) backup
A) recovery D) failback
B) disaster recovery
168) Shawn works at the local electrical company in that can automatically take
Nampa, ID, which provides electricity to the entire city of over without a loss of
Boise. This area is prone to floods, high winds, and tornados. service to Boise residents.
As the lead enterprise architect on the night shift, Shawn has What should Shawn
been asked to suggest ways the company can protect its recommend his company
information MIS infrastructure. Shawn notices that the implement?
company does not have the ability for its systems to respond
to unexpected failures or crashes and lacks a backup system
D) fault tolerance
A) accessibility
B) Moore’s law
C) antivirus software
D) emergency
A) disaster recovery plan notification system
B) disaster recovery cost curve
C) business continuity planning
B) recovery
A) failure tolerance
Version 1 39
C) reliability
D) capacity planning
Version 1 40
171) What type of backup method does a thumb drive
offer?
D) All of the
A) low cost, high speed answer choices are correct.
B) low cost, low speed
C) high cost, high speed
company infrastructure
A) what types of storage mechanism will meet the need?
needs of the company? D) All of the
B) how often does the company need to backup its answer choices are correct.
information?
C) what types of recovery systems does the
D) All of the
A) disrupted communications answer choices are correct.
B) damaged physical infrastructures
C) halted transportation
D) tornado threat
A) disaster recovery plan plan
B) database lookup initiative
C) management recovery plan
175) Among the sites that support disaster recovery, a ________ is a separate
Version 1 41
facility that does not have any computer equipment but is a
place where employees can move after a disaster.
C) warm site
A) hot site D) disaster site
B) cold site
C) warm site
A) hot site D) disaster site
B) cold site
177) Among the sites that support disaster recovery, a requires installation and
________ is a separate facility with computer equipment that configuration.
C) warm site
A) hot site D) disaster site
B) cold site
Version 1 42
disaster and resume business D) a detailed
B) a separate facility that does not have any process for recovering
computer equipment but is a place where employees can information or a system in
move after a disaster the event of a catastrophic
C) a separate facility with computer equipment that disaster
requires installation and configuration
182) What charts the cost to the company of the the company of recovering
unavailability of information and technology and the cost to from a disaster over time?
D) disaster
A) disaster organizational cost analysis recovery cost curve
B) disaster recovery improvements
C) disaster financial costs
Version 1 43
183) What is a more comprehensive and all-encompassing business operations and
plan that details how a company recovers and restores critical systems after a disaster or
extended disruption?
D) emergency
A) business continuity plan recovery plan
B) database management plan
C) incident recovery plan
D) emergency
A) business operational plan continuity plan
B) business continuity plan
C) emergency notification service
D) All of the
A) through the firm’s own infrastructure answer choices are correct.
B) by an outside service provider on company
premises
C) by an outside service provider hosted remotely
D) All of the
A) radio stations’ occasional tests of the national answer choices are correct.
alert system
B) wireless alerts for promotional discounts
C) text messages from your local grocery store
Version 1 44
immediate action due to potential threat to health and safety,
the environment, or property?
D) technology
A) emergency failure
B) preparedness
C) impact analysis
D) technology
A) technology success failure
B) emergency preparedness
C) business impact analysis
D) technology
A) emergence failure
B) emergency preparedness
C) business impact analysis
D) technology
A) technology success failure
B) technology preparedness
C) business impact analysis
D) technology
A) technology failure recovery strategy
B) incident record
C) incident management
Version 1 45
192) What occurs when the ability of a company to operate
is impaired because of a hardware, software, or data outage?
D) technology
A) technology failure recovery strategy
B) incident record
C) incident management
D) technology
A) technology failure recovery strategy
B) incident record
C) incident management
194) What focuses specifically on prioritizing the order for that best meets business
restoring hardware, software, and data across the organization recovery requirements?
D) technology
A) technology failure recovery strategy
B) incident record
C) incident management
C) usability
A) availability D) responsibility
B) accessibility
Version 1 46
C) restricted
A) functional D) administrator
B) infrastructure
197) Which term refers to the time frames when the system
is operational?
C) availability
A) administrator access D) portability
B) accessibility
is continuously operating
A) High availability is when the system is not at all times.
operating and can’t be used, whereas unavailable is when a D) High
system is continuously operating at all times. availability only refers to
B) Unavailable only refers to clients, whereas high clients, whereas
availability refers to servers. unavailable refers to
C) Unavailable is when the system is not operating servers.
and can’t be used, whereas high availability is when a system
D) "five 10s"
A) "five 9s" availability availability
B) "1%" minimum availability
C) "five’s accessibility" code
C) capacity
A) maintainability planning
B) scalability
Version 1 47
D) portability
Version 1 48
201) Which of the following agile MIS infrastructure
characteristics refers to the ability of an application to operate
on different devices or software platforms, such as different
operating systems?
D) usability
A) reliability
B) portability
C) maintainability
accurate information.
A) the system has the ability to operate in many D) the time
different operating systems. frames when the system is
B) the system is easy to learn and efficient and operational
satisfying to use.
C) the system is functioning correctly and providing
C) reliability
A) flexibility D) affordability
B) scalability
C) performance
A) portability D) sustainability
B) capacity planning
Version 1 49
D) performance
A) capacity system indicators
B) capacity planning
C) capacity function
operations
A) to use different systems continuously at the same D) All of the
time answer choices are correct.
B) to allow employees to work virtually
C) to take down the primary system for maintenance
while the secondary system activates to ensure continuous
D) The system
A) The system is easy to learn, efficient, and quickly transforms to
satisfying to use. support environmental
B) The system functions correctly and provides changes.
accurate information.
C) The system allows varying levels of access.
C) reliability
A) scalability D) availability
B) capacity planning
209) What represents the maximum throughput a system represents the size or
can deliver; for example, the capacity of a hard drive volume?
C) web
A) capacity accessibility initiative
B) web accessibility
Version 1 50
D) vulnerability
Version 1 51
210) What means that people with disabilities, including disabilities, can use the
visual, auditory, physical, speech, cognitive, and neurological web?
C) web usability
A) capacity D) vulnerability
B) web accessibility
211) What brings together people from industry, disability cognitive, neurological,
organizations, government, and research labs from around the physical, speech, and
world to develop guidelines and resources to help make the visual disabilities?
web accessible to people with disabilities, including auditory,
D) vulnerability
A) capacity
B) web usability
C) web accessibility initiative
D) vulnerability
A) capacity
B) web usability
C) web accessibility initiative
213) Which of the following terms represents how quickly levels of reliability,
a third party or vendor can change a system to ensure it meets maintainability or
user needs and the terms of any contracts, including agreed availability?
C) serviceability
A) capacity D) vulnerability
B) web accessibility
214) What is
administrator access?
Version 1 52
D) how quickly a
A) ability to perform functions such as resetting system can transform to
passwords, deleting accounts, and shutting down entire support environmental
systems changes
B) varying levels that define what a user can access,
view, or perform when operating a system
C) time frames when the system is operational
D) how quickly a
A) ability to perform functions such as resetting system can transform to
passwords, deleting accounts, and shutting down entire support environmental
systems changes
B) varying levels that define what a user can access,
view, or perform when operating a system
C) time frames when the system is operational
D) how quickly a
A) ability to perform functions such as resetting system can transform to
passwords, deleting accounts, and shutting down entire support environmental
systems changes
B) varying levels that define what a user can access,
view, or perform when operating a system
C) time frames when the system is operational
environmental changes
A) ability to perform functions such as resetting D) ability to
passwords, deleting accounts, and shutting down entire ensure that a system is
systems functioning correctly and
B) varying levels that define what a user can access, providing accurate
view, or perform when operating a system information
C) how quickly a system can transform to support
Version 1 53
218) What is reliability?
environmental changes
A) ability to perform functions such as resetting D) ability to
passwords, deleting accounts, and shutting down entire ensure that a system is
systems functioning correctly and
B) varying levels that define what a user can access, providing accurate
view, or perform when operating a system information
C) how quickly a system can transform to support
transaction
A) a system that is not operating and cannot be used D) the degree to
which a system is easy to
B) the ability of an application to operate on learn, efficient, and
different devices or software platforms, such as different satisfying to use
operating systems
C) how quickly a system performs a process or
transaction
A) a system that is not operating and cannot be used D) the degree to
which a system is easy to
B) the ability of an application to operate on learn, efficient, and
different devices or software platforms, such as different satisfying to use
operating systems
C) how quickly a system performs a process or
C) how quickly a
A) a system that is not operating and cannot be used
Version 1 54
system performs a process or transaction
D) the degree to which a system is easy to learn,
efficient, and satisfying to use
Version 1 55
222) What is usability?
C) Moore’s law
A) Intel’s law D) Lee’s law
B) Gordon’s law
D) the computer
A) the computer chip performance per dollar chip performance per
doubles every 18 months dollar doubles every 6
B) a company’s ability to acquire small amounts of months
MIS equipment for cheaper cost
C) a company’s ability to acquire small amounts of
capital for spending on innovative ideas every two years
Version 1 56
226) What describes the production, management, use, and
disposal of technology in a way that minimizes damage to the
environment?
D) sustainability
A) environmental MIS or green MIS
B) holistic MIS
C) green designation for technology
D) societal
A) company standard for the Green Initiative concerns
B) corporate social responsibility
C) social expectations
C) society.
A) shareholders. D) governments.
B) employees.
D) government
A) corporate social responsibility social responsibility
B) employee social responsibility
C) society social responsibility
Version 1 57
D) sustainable
A) upcycle MIS
B) recycle
C) ewaste
product
A) a subset of sustainable MIS that refers to the D) a company’s
environmentally responsible use, manufacture, and disposal of acknowledged
technology products and computer equipment responsibility to society
B) built using environment friendly materials and
designed to save energy
C) reuses or refurbishes ewaste and creates a new
product
A) a subset of sustainable MIS that refers to the D) a company’s
environmentally responsible use, manufacture, and disposal of acknowledged
technology products and computer equipment responsibility to society
B) built using environment friendly materials and
designed to save energy
C) reuses or refurbishes ewaste and creates a new
D) storing,
A) a subset of sustainable MIS that refers to the managing, and processing
environmentally responsible use, manufacture, and disposal of data and applications over
technology products and computer equipment the Internet rather than on
B) built using environment friendly materials and a personal computer or
designed to save energy server
C) reusing or refurbishing ewaste and creating a new
product
Version 1 58
D) storing,
A) a subset of sustainable MIS that refers to the managing, and processing
environmentally responsible use, manufacture, and disposal of data and applications over
technology products and computer equipment the Internet rather than on
B) a company's acknowledged responsibility to a personal computer or
society server
C) reusing or refurbishing ewaste and creates a new
product
D) storing,
A) built using environment friendly materials and managing, and processing
designed to save energy data and applications over
B) reusing or refurbishing ewaste and creating a new the Internet rather than on
product a personal computer or
C) a companies’ acknowledged responsibility to server
society
236) What is a subset of sustainable MIS that refers to the technology products and
environmentally responsible use, manufacture, and disposal of computer equipment?
D) corporate
A) clean computing social responsibility
B) green personal computer
C) upcycle
D) corporate
A) clean computing social responsibility
B) green personal computer
C) upcycle
Version 1 59
D) corporate
A) clean computing social responsibility
B) green personal computer
C) upcycle
D) corporate
A) cloud computing social responsibility
B) clean computer
C) upcycle
D) corporate
A) clean computing social responsibility
B) cloud computing
C) upcycle
D) electronic
A) ewaste. sustainability.
B) grid computing.
C) ergonomic code.
C) microwave
A) printer D) computer
B) coal
Version 1 60
243) What are the three pressures driving sustainable MIS infrastructures?
carbon emissions
A) decreases in electronic waste, energy waste, and D) decreases in
carbon emissions ewaste, energy waste, and
B) increases in ewaste, energy waste, and dynamic carbon footprints
scaling
C) increases in electronic waste, energy waste, and
D) sustainable
A) sustainable MIS disposal enterprise disposal
B) sustainable device disposal
C) sustainable software disposal
246) Increased energy consumption poses new and growing amount of carbon dioxide
sustainable infrastructure pressure. The energy consumed by a produced by a
computer is estimated to produce as much as 10 percent of the
C) car.
A) house. D) cell phone.
B) school.
247) Cheap electricity is great for keeping business energy costs down, but this means
Version 1 61
that we have to rely more on ________ for power.
D) All of the
A) cars answer choices are correct.
B) coal
C) gasoline
D) sustainable
A) ewaste MIS
B) energy consumption
C) carbon emissions
D) sustainable
A) ewaste MIS
B) energy consumption
C) carbon emissions
D) sustainable
A) ewaste MIS
B) energy consumption
C) carbon emissions
C) carbon
A) ewaste
B) energy consumption
Version 1 62
emissions
D) sustainable MIS
Version 1 63
252) Which of the following sustainable infrastructure
components is a collection of computers, often geographically
dispersed, that are coordinated to solve a common problem?
D) database
A) cloud computing computing
B) grid computing
C) virtualized computing
253) With grid computing, a problem is broken into pieces processing than could
and distributed to many machines, allowing ________ occur with a single system.
C) faster
A) more moderate D) cleaner
B) slower
D) offers backup
A) combines multiple network storage devices so services that use cloud
they appear to be a single storage device resources to protect
B) combines networks by splitting the available applications and data from
bandwidth into independent channels that can be assigned in disruption caused by
real time to a specific device disaster
C) combines the physical resources, such as servers,
processors, and operating systems, from the applications
D) offers backup
A) combines multiple network storage devices so services that use cloud
they appear to be a single storage device resources to protect
B) combines networks by splitting the available applications and data from
bandwidth into independent channels that can be assigned in disruption caused by
real time to a specific device disaster
C) combines the physical resources, such as servers,
processors, and operating systems, from the applications
Version 1 64
256) What is server virtualization?
D) offers backup
A) combines multiple network storage devices so services that use cloud
they appear to be a single storage device resources to protect
B) combines networks by splitting the available applications and data from
bandwidth into independent channels that can be assigned in disruption caused by
real time to a specific device disaster
C) combines the physical resources, such as servers,
processors, and operating systems, from the applications
D) offers backup
A) combines multiple network storage devices so services that use cloud
they appear to be a single storage device resources to protect
B) combines networks by splitting the available applications and data from
bandwidth into independent channels that can be assigned in disruption caused by
real time to a specific device disaster
C) combines the physical resources, such as servers,
processors, and operating systems, from the applications
D) storage
A) server virtualization virtualization
B) network virtualization
C) Disaster Recovery as a Service
259) What combines networks by splitting the available real time to a specific
bandwidth into independent channels that can be assigned in device?
D) storage
A) server virtualization virtualization
B) network virtualization
C) Disaster Recovery as a Service
Version 1 65
260) What combines the physical resources, such as
servers, processors, and operating systems, from the
applications?
D) storage
A) server virtualization virtualization
B) network virtualization
C) Disaster Recovery as a Service
D) Software as a
A) community cloud Service
B) virtualized system
C) grid computing
D) All of the
A) network resource. answer choices are correct.
B) server.
C) storage device.
D) storage
A) server virtualization virtualization
B) network virtualization
C) Disaster Recovery as a Service
Version 1 66
processing power of a computer and links thousands of that can process intensive
individual computers around the world, creating a ________ tasks.
D) virtual
A) personal computer supercomputer
B) employee client
C) company server
D) interactive
A) smart grid grid
B) systematic grid
C) collective grid
D) server
A) agile computing computing
B) grid computing
C) cloud computing
D) All of the
A) the way people access information answer choices are correct.
B) the way people deliver information
C) the way people use information
C) utility
A) grid computing
B) smart phones
Version 1 67
computing
D) computing services
Version 1 68
269) In what category would you put a cloud computing
benefit that allows a customer to store fewer applications on a
client computer, freeing up the memory and allowing for
increases in performance?
D) increased
A) Internet features software updates
B) increased costs
C) increased performance
D) decreased job
A) limited Internet features stability
B) required Internet connectivity
C) decreased dynamic scaling
D) Platform as a
A) Infrastructure as a Service (IaaS) Service (PaaS)
B) Disaster Recovery as a Service (DRaaS)
C) Software as a Service (SaaS)
Version 1 69
273) What are the three cloud computing service delivery models?
Platform as a Service
A) Independent as a Service, Supportive as a D) Intuit as a
Service, and Partnering as a Service Service, Storage as a
B) Infrastructure as a Service, Software as a Service, Service, and Programming
and Platform as a Service as a Service
C) Innovation as a Service, Server as a Service, and
D) Information as
A) Infrastructure as a Service a Service
B) Platform as a Service
C) Software as a Service
D) viral
A) virtualization computing
B) innovation
C) availability
Version 1 70
277) What is a facility used to house management telecommunications and
information systems and associated components, such as storage systems?
C) delivery base
A) call center D) central center
B) data center
D) cloud fabric
A) multi-tenancy controller
B) single-tenancy
C) cloud fabric
D) cloud fabric
A) multi-tenancy controller
B) single-tenancy
C) cloud fabric
D) cloud fabric
A) multi-tenancy controller
B) single-tenancy
C) cloud fabric
D) public cloud
A) community cloud
B) private cloud
C) utility computing
Version 1 71
282) What promotes massive, global, industry-wide
applications offered to the general public?
D) public cloud
A) community cloud
B) private cloud
C) utility computing
D) public cloud
A) community cloud
B) private cloud
C) utility computing
D) public cloud
A) community cloud
B) private cloud
C) utility computing
D) hybrid cloud
A) community cloud
B) private cloud
C) utility computing
286) What occurs when a company uses its own computing infrastructure for normal
Version 1 72
usage and accesses the cloud when it needs to scale for high
or peak load requirements, ensuring a sudden spike in usage
does not result in poor performance or system crashes?
C) cloud bursting
A) community cloud D) hybrid cloud
B) private cloud
D) Big Data as a
A) Disaster Recovery as a Service (DRaaS) Service (BDaaS)
B) Data as a Service (DaaS)
C) Software as a Service (SaaS)
D) utility
A) Disaster Recovery as a Service (DRaaS) computing
B) Data as a Service (DaaS)
C) Software as a Service (SaaS)
D) Big Data as a
A) Disaster Recovery as a Service (DRaaS) Service (BDaaS)
B) Data as a Service (DaaS)
C) Software as a Service (SaaS)
B) Data as a
A) Disaster Recovery as a Service (DRaaS) Service (DaaS)
Version 1 73
C) Software as a Service (SaaS)
D) Big Data as a Service (BDaaS)
D) Big Data as a
A) Disaster Recovery as a Service (DRaaS) Service (BDaaS)
B) Data as a Service (DaaS)
C) Software as a Service (SaaS)
D) offers a cloud-
A) offers backup services that use cloud resources to based big data service to
protect applications and data from disruption caused by help organizations analyze
disaster massive amounts of data to
B) delivers applications over the cloud using a pay- solve business dilemmas
per-use revenue model
C) facilitates the accessibility of business-critical
data in a timely, secure, and affordable manner
D) offers a cloud-
A) offers backup services that use cloud resources to based big data service to
protect applications and data from disruption caused by help organizations analyze
disaster massive amounts of data to
B) delivers applications over the cloud using a pay- solve business dilemmas
per-use revenue model
C) facilitates the accessibility of business-critical
data in a timely, secure, and affordable manner
Version 1 74
D) offers a cloud-
A) offers backup services that use cloud resources to based big data service to
protect applications and data from disruption caused by help organizations analyze
disaster massive amounts of data to
B) delivers applications over the cloud using a pay- solve business dilemmas
per-use revenue model
C) facilitates the accessibility of business-critical
data in a timely, secure, and affordable manner
D) offers a cloud-
A) offers backup services that use cloud resources to based big data service to
protect applications and data from disruption caused by help organizations analyze
disaster massive amounts of data to
B) delivers applications over the cloud using a pay- solve business dilemmas
per-use revenue model
C) facilitates the accessibility of business-critical
data in a timely, secure, and affordable manner
Version 1 75
298) Describe the characteristics of an agile MIS
infrastructure.
Version 1 76
Answer Key
Version 1 77
20) FALSE
21) TRUE
22) FALSE
23) TRUE
24) FALSE
25) TRUE
26) TRUE
27) TRUE
28) FALSE
29) FALSE
30) TRUE
31) TRUE
32) TRUE
33) TRUE
34) FALSE
35) FALSE
36) FALSE
37) TRUE
38) TRUE
39) FALSE
40) TRUE
Version 1 78
41) FALSE
42) FALSE
43) FALSE
44) FALSE
45) TRUE
46) TRUE
47) TRUE
48) TRUE
49) TRUE
50) TRUE
51) TRUE
52) TRUE
53) TRUE
54) TRUE
55) TRUE
56) TRUE
57) TRUE
58) TRUE
59) TRUE
60) TRUE
61) TRUE
Version 1 79
62) TRUE
63) TRUE
64) FALSE
65) FALSE
66) FALSE
67) FALSE
68) FALSE
69) FALSE
70) FALSE
71) FALSE
72) FALSE
73) FALSE
74) FALSE
75) FALSE
76) FALSE
77) FALSE
78) FALSE
79) FALSE
80) TRUE
81) FALSE
82) FALSE
Version 1 80
83) TRUE
84) TRUE
85) FALSE
86) TRUE
87) TRUE
88) FALSE
89) TRUE
90) TRUE
91) TRUE
92) FALSE
93) FALSE
94) FALSE
95) TRUE
96) TRUE
97) TRUE
98) FALSE
99) FALSE
100) TRUE
101) TRUE
102) TRUE
103) FALSE
Version 1 81
104) FALSE
105) TRUE
106) TRUE
107) TRUE
108) TRUE
109) TRUE
110) FALSE
111) FALSE
112) FALSE
113) FALSE
114) TRUE
115) TRUE
116) TRUE
117) FALSE
118) FALSE
119) TRUE
120) TRUE
121) TRUE
122) TRUE
123) FALSE
124) TRUE
Version 1 82
125) TRUE
126) TRUE
127) TRUE
128) TRUE
129) FALSE
130) TRUE
131) A
132) B
133) C
134) D
135) C
136) D
137) A
138) A
139) B
140) A
141) C
142) D
143) A
144) B
145) D
Version 1 83
146) C
147) D
148) A
149) D
150) A
151) C
152) A
153) C
154) B
155) B
156) A
157) C
158) A
159) B
160) C
161) A
162) D
163) D
164) C
165) A
166) A
Version 1 84
167) B
168) D
169) C
170) B
171) B
172) D
173) D
174) A
175) B
176) A
177) C
178) A
179) B
180) C
181) D
182) D
183) A
184) C
185) D
186) A
187) A
Version 1 85
188) B
189) C
190) D
191) B
192) A
193) C
194) D
195) B
196) D
197) C
198) C
199) A
200) A
201) B
202) C
203) B
204) C
205) B
206) C
207) A
208) A
Version 1 86
209) A
210) B
211) C
212) D
213) C
214) A
215) B
216) C
217) C
218) D
219) A
220) B
221) C
222) C
223) D
224) C
225) A
226) D
227) B
228) C
229) A
Version 1 87
230) A
231) A
232) B
233) C
234) B
235) D
236) A
237) B
238) C
239) D
240) B
241) A
242) B
243) C
244) A
245) D
246) C
247) B
248) A
249) B
250) C
Version 1 88
251) D
252) B
253) C
254) A
255) B
256) C
257) D
258) D
259) B
260) A
261) B
262) D
263) C
264) D
265) A
266) B
267) D
268) C
269) C
270) B
271) A
Version 1 89
272) C
273) B
274) C
275) D
276) A
277) B
278) A
279) B
280) C
281) C
282) D
283) B
284) A
285) D
286) C
287) A
288) D
289) B
290) C
291) D
292) A
Version 1 90
293) C
294) B
295) D
296) The three primary areas where enterprise identifies ways that
architects focus when maintaining a firm’s a company can
MIS infrastructure are: (1) Supporting grow in terms of
operations: Information MIS infrastructure computing
identifies where and how important resources while
information, such as customer records, is simultaneously
maintained and secured; (2) Supporting becoming less
change: Agile MIS infrastructure includes the dependent on
hardware, software, and telecommunications hardware and
equipment that, when combined, provides the energy
underlying foundation to support the consumption.
organization’s goals; (3) Supporting the
environment: Sustainable MIS infrastructure
297) The three primary areas an information Business continuity
infrastructure provides to support continuous plan: This details
business operations are: (1) Backup and how a company
recovery: A backup is an exact copy of a recovers and
system’s information. Recovery is the ability restores critical
to get a system up and running in the event of business operations
a system crash or failure and includes and systems after a
restoring the information backup; (2) Disaster disaster or extended
recovery plan: This plan provides a detailed disruption.
process for recovering information or a system
in the event of a catastrophic disaster; (3)
298) Accessibility: The varying levels that define what a user
Version 1 91
can access, view, or perform when operating a system can “scale
systemAvailability: The time frames when the up” or adapt to the
system is operationalMaintainability (or increased demands
flexibility): How quickly a system can of growthUsability:
transform to support environmental The degree to which
changesPortability: The ability of an a system is easy to
application to operate on different devices or learn and efficient
software platforms, such as different operating and satisfying to use
systemsReliability (or accuracy): Ensures a
system is functioning correctly and providing
accurate informationScalability: How well a
299) Increased energy consumption, increased refers to the safe
electronic waste, and increased carbon disposal of MIS
emissions are all associated with MIS. Ewaste assets at the end of
refers to discarded, obsolete, or broken their life cycle.
electronic devices. Sustainable MIS disposal
300) The components of a sustainable MIS environment.Virtual
infrastructure include:Grid computing: A ized computing:
collection of computers, often geographically The creation of
dispersed, that are coordinated to solve a multiple “virtual”
common problemCloud computing: The use machines on a
of resources and applications hosted remotely single computing
on the Internet. The term comes (at least in device
part) from the image of a cloud to represent
the Internet or some large networked
Version 1 92