MIS Chapter 5

¡Supera tus tareas y exámenes ahora con Quizwiz!

One comparison of the life expectancy of electronic devices is the analogy that one human year is equivalent to ________ years of technological advancements. A. 10 B. 2 C. 50 D. 7

7

Currently, what percent of ewaste in the United States is not recycled? A. 42% B. 80% C. 52% D. 10%

80%

What is a widely held but difficult to achieve standard of availability for a system? A. "Five 9s" availability B. "1%" minimum availability C. The "five's accessibility" code D. "Five 10s" availability

"Five 9s" availability

Which of the following delivers electricity using two-way digital technology? A. A smart grid B. A systematic grid C. A collective grid D. An interactive grid

A smart grid

Computers in United States account for 1% of the total energy needs of the entire country. This is roughly equal to the total energy needs of ______________. A. A country such as Russia B. A company such as Microsoft C. A vehicle such as a bus D. A state such as Mississippi

A state such as Mississippi

Which term refers to the varying levels that define what a user can access, view, or perform when operating a system? A. Availability B. Accessibility C. Usability D. Responsibility

Accessibility

What are the seven characteristics of an agile MIS infrastructure? A. Accessibility, availability, maintainability, portability, reliability, scalability, and usability B. Accessibility, affordability, mobility, portability, reliability, scalability, and usability C. Accessibility, availability, mobility, penetrability, responsibility, sensibility, and usability D. Accessibility, affordability, functionality, changeability, constancy, sources, and understanding

Accessibility, availability, maintainability, portability, reliability, scalability, and usability

Which characteristics support an agile MIS infrastructure? A. Accessibility, availability, maintainability, portability, reliability, scalability, usability B. Backup and recovery plan, disaster recovery plan, business continuity plan C. Grid computing, cloud computing, and virtualization D. All of the above

Accessibility, availability, maintainability, portability, reliability, scalability, usability

Enterprise architects require _____________ access so they can perform such functions as resetting passwords or deleting accounts. A. Functional access B. Infrastructure access C. Restricted access D. Administrator access

Administrator access

The ____________ MIS infrastructure includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation. A. Information B. Virtualized C. Agile D. Sustainable

Agile

Building and deploying flexible systems can allow for ___________. A. Reconfigurations B. Easy updates and changes C. Solutions for unexpected business environmental changes D. All of the above

All of the above

Each year businesses lose time and money because of system crashes and failures. Which of the following offers the best way to protect a system from crashes and failures? A. Backup and recovery plans B. Fault tolerance C. Failover D. All of the above

All of the above

Jessica started her own online company, which specializes in selling items for bachelorette parties, wedding parties, and baby showers. Due to the fact that she only operates online, her MIS infrastructure needs to be fast, efficient, and accurate ensuring the best possible experience for her customers. Which of the below is a critical component in Jessica's MIS infrastructure? A. Hardware and software B. Client C. Server D. All of the above

All of the above

The information MIS infrastructure supports the day-to-day business operations and plans for ____________. A. Security breaches and theft B. Floods and earthquakes C. Malicious internet attacks D. All of the above

All of the above

The power of MIS comes from its ability to ____________ information. A. Carry B. House C. Support D. All of the above

All of the above

What are the different options where an emergency notification service can be deployed? A. Through the firm's own infrastructure B. By an outside service provider on company premises C. By an outside service provider hosted remotely D. All of the above

All of the above

What are the ramifications of improper electronic recycling, when analyzing the example of a single desktop computer? A. One computer contains more than 700 chemicals that can be toxic to the environment B. Computers in landfills can leak these toxic chemicals into our land, water, and air C. Computers contain high levels of mercury, lead, and cadmium-harmful toxins D. All of the above

All of the above

What question below would a company need to answer when first establishing a backup and recovery plan? A. What types of storage mechanism will meet the needs of the company? B. How often does the company need to backup its information? C. What types of recovery systems does the company infrastructure need? D. All of the above

All of the above

Which of the below offers a low-speed and low-cost backup method? A. DVD B. Thumb drive C. External hard drive D. All of the above

All of the above

Which of the following is a benefit of a solid MIS infrastructure? A. Reduces costs B. Improves productivity C. Optimizes business operations D. All of the above

All of the above

Which of the following is an effect a company could experience because of a disaster such as a fire, flood, or hurricane? A. Disrupting communications B. Damaging physical infrastructures C. Halting transportation D. All of the above

All of the above

Why is estimating future growth a challenge for most companies? A. Growth can occur because the company acquires new markets B. Growth can occur because the company acquires new customers C. Growth can occur because the company acquires new products D. All of the above

All of the above

When building a scalable system that can support new company developments what are the key factors to consider? A. Anticipating expected and unexpected growth B. Organizing and deploying additional resources C. Understanding competitor products and services D. Analyzing the accessibility and availability of competitor systems

Anticipating expected and unexpected growth

Which of the below is not contributing to ewaste? A. VCR B. Automobile C. Microwave D. Computer

Automobile

Which term refers to the time frames when the system is operational? A. Administrator access B. Accessibility C. Availability D. Portability

Availability

Which characteristics support an information MIS infrastructure? A. Accessibility, availability, maintainability, portability, reliability, scalability, usability B. Backup and recovery plan, disaster recovery plan, business continuity plan C. Grid computing, cloud computing, and virtualization D. All of the above

Backup and recovery plan, disaster recovery plan, business continuity plan

Which of the following describes the difference between a backup plan and a recovery plan? A. Recovery is an exact copy of a system's information, where backup is the ability to get a system up and running in the event of a system crash or failure B. Backup is mandatory, where recovery is optional C. Backup is an exact copy of a system's information, where recovery is the ability to get a system up and running in the event of a system crash or failure D. Recovery is mandatory, where backup is optional

Backup is an exact copy of a system's information, where recovery is the ability to get a system up and running in the event of a system crash or failure

Which of the below represents the primary elements in an information MIS infrastructure? A. Backup, recovery, disaster recovery, and business continuity planning B. Backup, accessibility, and usability C. Backup, cloud computing, and virtualization D. Grid computing, cloud computing, and virtualization

Backup, recovery, disaster recovery, and business continuity planning

What identifies all critical business functions and the effect that a specific disaster may have upon them? A. Emergence B. Emergency preparedness C. Business Impact analysis D. Technology failure

Business Impact analysis

What creates a way for a company to recover and restore partially or completely interrupted critical functions within a predetermined time after a disaster or extended disruption? A. Disaster recovery plan B. Disaster recovery cost curve C. Business continuity planning D. Emergency notification system

Business continuity planning

What is a more comprehensive and all-encompassing plan that details how a company recovers and restores critical business operations and systems after a disaster or extended disruption? A. Business continuity planning B. Database management plan C. Disaster recovery plan D. Emergency recovery plan

Business continuity planning

What determines future environmental infrastructure requirements that ensure high-quality system performance? A. Capacity system B. Capacity planning C. Capacity function D. Performance indicators

Capacity planning

What represents the maximum throughput a system can deliver, for example the capacity of a hard drive represents the size or volume? A. Capacity B. Web accessibility C. Web accessibility initiative D. Vulnerability

Capactiy

The sustainable infrastructure pressure of increased energy consumption poses new and growing pressure. The energy consumed by a computer is estimated to produce as much as 10% of the amount of carbon dioxide produced by a __________. A. House B. School C. Car D. Cell phone

Car

What includes the carbon dioxide and carbon monoxide in the atmosphere, produced by business processes and systems? A. Ewaste B. Energy consumption C. Carbon emissions D. Sustainable MIS

Carbon emissions

Cheap electricity is great for keeping business energy costs down, but this mean that we have to rely more on ____________ for power. A. Cars B. Coal C. Gasoline D. All of the above

Coal

Within the sites that support disaster recovery, __________ is a separate facility that does not have any computer equipment but is a place where employees can move after a disaster. A. Hot site B. Cold site C. Warm site D. Disaster site

Cold site

According to the text, which of the below does not benefit from smart grid computing? A. The U.S power grid B. Excel Energy's grid C. Boulder, Colorado's electric grid D. Comcast Cable's grid

Comcast Cable's grid

Sustainable MIS is a critical part of _____________within a company. A. Company Standard for the green initiative B. Corporate social responsibility C. Social expectations D. Society concerns

Corporate social responsibility

What has the ability to recover information or systems in the event of catastrophic disasters? A. Recovery B. Disaster recovery C. Backup D. Failback

Disaster recovery

A disaster recovery plan contains a _____________ that outlines the costs to support the plan. A. Disaster organizational cost analysis B. Disaster recovery improvements C. Disaster financial costs D. Disaster recovery cost curve

Disaster recovery cost curve

What charts the cost to the company of the unavailability of information and technology and the cost to the company of recovering from a disaster over time? A. Disaster organizational cost analysis B. Disaster recovery improvements C. Disaster financial costs D. Disaster recovery cost curve

Disaster recovery cost curve

To combat disasters a company can create a _________ that would detail the process for recovering information or a system in the event of a catastrophic disaster. A. Disaster recovery plan B. Database lookup initiative C. Management recovery plan D. Tornado threat plan

Disaster recovery plan

An MIS infrastructure is ___________ and ____________. A. Dynamic and static B. Dynamic and continually changing C. A client and a server D. Hardware and software

Dynamic and continually changing

What is a sudden, unexpected event requiring immediate action due to potential threat to health and safety, the environment, or property? A. Emergence B. Emergency preparedness C. Business Impact analysis D. Technology failure

Emergence

What is an infrastructure built for notifying people in the event of an emergency? A. Business operational plan B. Business continuity plan C. Emergency notification service D. Emergency continuity plan

Emergency notification service

What ensures a company is ready to respond to an emergency in an organized, timely, and effective manner? A. Emergence B. Emergency preparedness C. Business Impact analysis D. Technology failure

Emergency preparedness

What is the amount of energy consumed by business processes and systems? A. Ewaste B. Energy consumption C. Carbon emissions D. Sustainable MIS

Energy consumption

Who is a person who is grounded in technology, fluent in business, and able to provide the important bridge between MIS and the business? A. MIS Infrastructure manager B. MIS specialist C. Enterprise architect D. Enterprise manager

Enterprise architect

The increased demand in technology devices has caused an increase in discarded devices, a phenomenon known as ________. A. Ewaste B. Grid computing C. Ergonomic code D. Electronic sustainability

Ewaste

What refers to discarded, obsolete, or broken electronic devices? A. Ewaste B. Energy consumption C. Carbon emissions D. Sustainable MIS

Ewaste

What occurs when a primary machine recovers and resumes operations, taking over from a secondary server? A. Failback B. Disrupting communications C. Warm site D. Hot site

Failback

What occurs when a redundant storage server offers an exact replica of the real-time data, and if the primary server crashes, the users are automatically directed to a secondary server? A. Failover B. Disaster recovery cost curve C. Reliability D. Maintainability

Failover

With grid computing a problem is broken into pieces and distributed to many machines, allowing _________ processing than could occur with a single system. A. Moderate B. Slower C. Faster D. Cleaner

Faster

Shawn works at the local electrical company in Nampa, ID, which provides electricity to the entire city of Boise. This area is prone to floods, high winds, and tornados. As the lead enterprise architect on the night shift, Shawn has been asked to suggest ways the company can protect its information MIS infrastructure. Shawn notices that the company does not have the ability for its systems to respond to unexpected failures or crashes and there is not a backup system that can automatically take over without a loss of serve to Boise residents. What should Shawn recommend his company implement? A. Accessibility B. Moore's law C. Antivirus software D. Fault tolerance

Fault tolerance

DreamWorks Animation Company used which sustainable infrastructure component to complete many of its films including Shrek, Madagascar and Antz? A. Agile computing B. Grid computing C. Cloud computing D. Server computing

Grid computing

Which of the following sustainable infrastructure components is a collection of computers, often geographically dispersed, that are coordinated to solve a common problem? A. Cloud computing B. Grid computing C. Virtualized computing D. Database computing

Grid computing

Which characteristics support a sustainable MIS infrastructure? A. Accessibility, availability, maintainability, portability, reliability, scalability, usability B. Backup and recovery plan, disaster recovery plan, business continuity plan C. Grid computing, cloud computing, and virtualization D. All of the above

Grid computing, cloud computing, and virtualization

John works for Internal Computer Specialists, which focuses on helping small business owners resolve MIS infrastructure issues. John's tasks include cleaning and replacing motherboards, cables, and internal components such as DVDs and hard drives. What does John's role at Internal Computer Specialists focus on fixing? A. Hardware B. Clients C. Backup D. Recovery

Hardware

What is the difference between hardware and software? A. Hardware is the physical devices associated with a computer system, where software is the instructions the hardware executes to carry out tasks B. They are both specific forms of clients C. Hardware executes the instructions to carry out tasks, where software is the physical devices associated with a computer system D. They are both specific forms of servers

Hardware is the physical devices associated with a computer system, where software is the instructions the hardware executes to carry out tasks

Within the sites that support disaster recovery, ___________ is a separate and fully equipped facility where the company can move immediately after a disaster and resume business. A. Hot site B. Cold site C. Warm site D. Disaster site

Hot site

What is the process responsible for managing how incidents are identified and corrected? A. Technology failure B. Incident record C. Incident management D. Technology recovery strategy

Incident mangement

What contains all of the details of an incident? A. Technology failure B. Incident record C. Incident management D. Technology recovery strategy

Incident record

What are the three pressures driving sustainable MIS infrastructures? A. Decreases in electronic waste, energy waste, and carbon emissions B. Increases in ewaste, energy waste, and dynamic scaling C. Increases in electronic waste, energy waste, and carbon emissions D. Decreases in ewaste, energy waste, and carbon footprints

Increases in electronic waste, energy waste, and carbon emissions

The __________ MIS infrastructure identifies where and how important information, such as customer records, is maintained and secured. A. Sustainable B. Information C. Virtualized D. Agile

Information

Francis works in the human resources division of a large oil and gas company in Texas. Francis' tasks include maintaining payroll and vacation records, employment histories, and benefit information along with ensuring the security of all sensitive employee information. Which MIS infrastructure is most important to Francis? A. Information MIS infrastructure B. Agile MIS infrastructure C. Sustainable MIS infrastructure D. Virtualized MIS infrastructure

Information MIS infrastructure

Which of the following include the three section titles of an MIS infrastructure? A. Information MIS, aggregated MIS, and sustainable MIS infrastructures B. Information MIS, operational MIS, and changing MIS infrastructures C. Information MIS, agile MIS, and sustainable MIS infrastructures D. Varies depending on the industry

Information MIS, agile MIS, and sustainable MIS infrastructures

Which of the following agile MIS infrastructure characteristics refers to how quickly a system can transform to support environmental changes? A. Maintainability B. Scalability C. Capacity planning D. Portability

Maintainability

Gordon Moore, the co-founder of Intel, established which MIS law? A. Intel's Law B. Gordon's Law C. Moore's Law D. All of the above

Moore's Law

What measures how quickly a system performs a process or transaction? A. Portability B. Capacity planning C. Performance D. Sustainability

Performance

Which of the following agile MIS infrastructure characteristics refers to the ability of an application to operate on different devices or software platforms, such as different operating systems? A. Reliability B. Portability C. Maintainability D. Usability

Portability

Which of the following is an example of an emergency notification system? A. Radio stations' occasional tests of the national alert system B. Wireless alerts for promotional discounts C. Text messages from your local cell phone provider D. All of the above

Radio stations' occasional tests of the national alert system

What is the ability to get a system up and running in the event of a system crash or failure that includes restoring the information backup? A. Failure tolerance B. Recovery C. Reliability D. Capacity planning

Recovery

What refers to how well a system can adapt to increased demands? A. Scalability B. Capacity planning C. Reliability D. Availability

Scalability

Which of the following describes how well a system can scale up, or adapt to the increased demands or growth? A. Flexibility B. Scalability C. Reliability D. Affordability

Scalability

What is a computer dedicated to providing information in response to requests? A. Client B. Hardware C. Server D. Software

Server

Which of the following terms represents how quickly a third-party or vendor can change a system to ensure it meets user needs and the terms of any contracts including agreed levels of reliability, maintainability, or availability? A. Capacity B. Web accessibility C. Serviceability D. Vulnerability

Serviceability

Corporate social responsibility is a company's acknowledged responsibility to __________. A. Shareholders B. Employees C. Society D. Governments

Society

What are the three business functions an MIS infrastructure supports? A. Supports operations, change, and the environment or sustainability B. Supports operations, customers, and ewaste C. Supports operations, clients, and servers D. Supports information, change, and business continuity planning

Supports operations, change, and the environment or sustainability

What describes the production, management, use, and disposal of technology in a way that minimizes damage to the environment? A. Environmental MIS B. Holistic MIS C. The green designation for technology D. Sustainability or green MIS

Sustainability or green MIS

Grid computing, cloud computing, and virtualization are all elements of a ________ MIS infrastructure. A. Agile B. Sustainable C. Information D. Virtualized

Sustainable

The __________ MIS infrastructure identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption. A. Sustainable B. Information C. Virtualized D. Agile

Sustainable

What refers to the safe disposal of MIS assets at the end of their life cycle? A. Ewaste B. Energy consumption C. Carbon emissions D. Sustainable MIS

Sustainable MIS

What is the safe disposal of MIS assets at the end of their life cycle called? A. Sustainable MIS disposal B. Sustainable device disposal C. Sustainable software disposal D. Sustainable enterprise disposal

Sustainable MIS disposal

What occurs when the ability of a company to operate is impaired because of a hardware, software, or data outage? A. Emergence B. Emergency preparedness C. Business Impact analysis D. Technology failure

Technology failure

What occurs when the ability of a company to operate is impaired because of a hardware, software, or data outage? A. Technology failure B. Incident record C. Incident management D. Technology recovery strategy

Technology failure

What focuses specifically on prioritizing the order for restoring hardware, software, and data across the organization that best meets business recovery requirements? A. Technology failure B. Incident record C. Incident management D. Technology recovery strategy

Technology recovery strategy

Which of the following reflects Moore's law? A. The computer chip performance per dollar doubles every 18 months B. A company's ability to acquire small amounts of MIS equipment for cheaper cost C. A company's ability to acquire small amounts of capital for spending on innovative ideas every two years D. The computer chip performance per dollar doubles every 6 months

The computer chip performance per dollar doubles every 18 months

What is usability? A. The system is easy to learn and efficient and satisfying to use B. The system functions correctly and provides accurate information C. The system allows varying levels of access D. The system quickly transforms to support environmental changes

The system is easy to learn and efficient and satisfying to use

What does reliability ensure? A. The system has the ability to operate in many different operating systems B. The system is easy to learn and efficient and satisfying to use C. The system is functioning correctly and providing accurate information D. The time frames when the system is operational

The system is functioning correctly and providing accurate information

What is the primary reason a company has a failover system? A. To use different systems continuously at the same time B. To allow employees to work virtually C. To take down the primary system for maintenance, while the secondary system activates to ensure continuous operations D. All of the above

To take down the primary system for maintenance, while the secondary system activates to ensure continuous operations

What is the difference between unavailable and high availability? A. High availability is when the system is not operating and can't be used, where unavailable is when a system is continuously operating at all times B. Unavailable only refers to clients, where high availability refers to servers C. Unavailable is when the system is not operating and can't be used, where high availability is when a system is continuously operating at all times D. High availability only refers to clients, where unavailable refers to servers

Unavailable is when the system is not operating and can't be used, where high availability is when a system is continuously operating at all times

Grid computing takes advantage of the available 75% of unused processing power of a computer and links thousands of individual computers around the world creating a _______ that can process intensive tasks. A. Personal computer B. Employee client C. Company server D. Virtual supercomputer

Virtual supercomputer

What is a system weakness that can be exploited by a threat? A. Capacity B. Web accessibility C. Web accessibility initiative D. Vulnerability

Vulnerability

Within the sites that support disaster recovery, _________ is a separate facility with computer equipment that requires installation and configuration. A. Hot site B. Cold site C. Warm site D. Disaster site

Warm site

What means that people with disabilities including visual, auditory, physical, speech, cognitive, and neurological disabilities can use the Web? A. Capacity B. Web accessibility C. Web accessibility initiative D. Vulnerability

Web accessibility

What brings together people from industry, disability organizations, government, and research labs from around the world to develop guidelines and resources to help make the Web accessible to people with disabilities including auditory, cognitive, neurological, physical, speech, and visual disabilities? A. Capacity B. Web accessibility C. Web accessibility initiative D. Vulnerability

Web accessibility initiative

The optimal disaster recovery plan in terms of cost and time is where on the disaster recovery cost curve? A. Where the two cost effects intersect B. When the cost to the company of unavailability of information and technology is high C. When the cost to the company of recovering from a disaster over time is high D. When the two cost effects are furthest apart

Where the two cost effects intersect

What does a business continuity plan typically include? A. How frequently the system backup is performed B. Which systems and business processes are critical and the maximum amount of time the company can continue to operate without functioning systems C. How quickly the system recovery needs to be performed D. Where a hot site is located

Which systems and business processes are critical and the maximum amount of time the company can continue to operate without functioning systems

Apple understood the importance of usability when it designed its _________. A. PowerPoint software B. Antivirus software C. Fault tolerance system D. iPod and iTunes system

iPod and iTunes system


Conjuntos de estudio relacionados

Anatomy and Physiology 2 Chapter 25

View Set

MGMT 309: Chapter 3 "Understanding the Organization's Environment"

View Set

Грамматика present perfect and past simple

View Set

Comm 88 Final Practice Questions

View Set

Chapter 14: Viruses & Immunology

View Set

CNA. Quiz 1 & Exam 1 (ch.1-5 & 7)

View Set