INSY 5375 (6 - 10)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Who is a program manager?

The visionary leader for the overall program who articulates the goals and objectives of the program and how it will impact the business.

What is community cloud?

A cloud computing solution to a limited number of individuals or organizations that is governed, managed and secured commonly by all the participating organizations or a third party managed service provider

What is Platform as a service? (PaaS)

A computing platform that is rented or delivered as an integrated solution, solution stack or service through an Internet connection.

What is dedicated hosting?

A dedicated hosting service, dedicated server, or managed hosting service is a type of Internet hosting in which the client leases an entire server not shared with anyone else

What is a Project portfolio management (PPM)?

A holistic management strategy used to align an organization's software, portfolios and projects for analysis and collaboration.

What is cloud computing?

Delivery of on demand computing over the internet

_________ disable infrastructure devices by flooding them with an overwhelming number of messages.

Denial of Service Attacks

What are some features of SaaS

Easier to procure & manage Restructuring & Reengineering make it easier to manage & use Enhancements to infrastructure to improve interoperability & efficiency in use of computing assets

What is IT Governance?

Effort to devise an overarching and integrated approach, addressing broad themes such as operating performance, strategic control, risk management and values alignment.

Why did the old IT service delivery not work?

Every company had it's own technology Those technologies could not communicate Reliance on company's own tech meant you were locked in that technology

_______ are actions against computing infrastructure

External Threats

What is Nonfeasance?

Failure to perform an act that is required by law.

Examples of estimates provided by a feasibility study?

Financial benefits Qualitative benefits Implementation costs Target milestone and completion date Staffing level

Principles of Security Management

Make Deliberate Security Decisions Consider Security a Moving Target Practice Disciplined Change management Educate Users Deploy Multilevel Technical Measures

Reliability in infrastructure is expressed in terms of _________

Nines

What are some benefits of outsourcing?

No shortage of IT workers Less time to market 24/7 Operations Favorable cash flows Cost reductions Global availability of services

What is IT project management?

Overseeing projects for software development, hardware installations, network upgrades, cloud computing and virtualization rollouts, business analytics and data management projects and implementing IT service

Examples of features of high availability services

Uninterpreted Power Supply Networking Connectivity Redundancy (N+1 & N+N) Climate Control & Fire Suppression Physical Security Helpdesk & Incident Response Procedures

Major characteristics that apply to most SaaS vendors:

Updates are applied automatically The service is purchased on a subscription basis No hardware is required to be installed by the customer

Security is a matter of _______ rather than absolutes.

degree

What is the Agency Problem?

The physical separation between the owners of a company and its managers (its agents) provide these managers the opportunity to act in ways that are advantageous to themselves but detrimental the interest of owners

What is utility computing?

The process of providing computing service through an on-demand, pay-per-use billing method.

Under APM, further investment in upgrades or changes in the portfolio mix must be justified by ________ & __________

projected returns and other measurable factors.

Defense against hackers is difficult because threats are _______, ________, and, ________.

varied, sophisticated & ever evolving

_____________ are stand-alone malicious programs that can self-replicate and propagate via computer networks, without human help.

Worms

What is Malfeasance?

Wrongdoing by a public official

___ % of companies have suffered attacks in the last 12 months

46

Fives Nines means ______ reliability.

99.999

Who is a project manager?

A person who has the overall responsibility for the successful initiation, planning, design, execution, monitoring, controlling & closure of a project

What is grid computing?

A processor architecture that combines computer resources from various domains to reach a main objective.

What is Infrastructure as a service (IaaS)?

A service model that delivers computer infrastructure on an outsourced basis to support enterprise operations.

What is communications as a service (CaaS)?

A service model that delivers computer infrastructure on an outsourced basis to support enterprise operations.

What is middleware?

A software layer situated between applications and operating systems.

What is a project?

A temporary endeavor undertaken to create a unique product, service or result.

What is Misfeasance?

A transgression, especially the wrongful exercise of lawful authority.

What is an pplication portfolio management (APM)?

An IT management technique that applies cost benefit analysis and other business analytics to IT decision-making.

What is the Sarbanes-Oxley Act?

An act passed by U.S. Congress in 2002 to protect investors from the possibility of fraudulent accounting activities by corporations. The Sarbanes-Oxley Act (SOX) mandated strict reforms to improve financial disclosures from corporations and prevent accounting fraud.)

What are the phases of system development?

Analysis & Design Construction Implementation Operation & Maintenance

What are some features of On demand computing environment

Anywhere anytime access Information processes, applications Middleware Infrastructure

On-demand computing (ODC) is an enterprise-level model of technology and computing in which resources are provided on a _______ & _______ basis

As needed, when needed

Examples of Defensive Measures

Authentication Encryption Firewalls Patching & Change Management Intrusion Detection & Monitoring

What is the driving force for better IT governance?

Business Value of IT Recognition of IT Impact IT as an Enabler of Corporate Governance and Compliance

What is a hybrid cloud?

Cloud computing service model that provides cloud computing solutions by combining different cloud service models.

How did the Internet (TCP / IP) improve IT service delivery?

Companies are now not locked in specific vendor tech Companies can share communication with company & customers Inter-operation improved More competition led to lower prices PCs & Other emerging tech were now in use

What is a public cloud?

Computing service model used for the provisioning of storage and computational services to the general public over the Internet.

Explain McFarlan Quadrant of the role of IT Strategy

High operational impact, high strategic impact. IT organizations that have most projects in this quadrant understand that IT can both improve core operations of the firm while simultaneously generating strategic options.

Explain McFarlan Quadrant of the role IT factory

High operational impact, low strategic impact. This quadrant is about operational improvements that affect large portions of the firm, and are aimed at improving performance or decreasing cost.

What is colocation hosting?

Housing your servers and devices in a professional datacenter in order to access economies of scale, advanced infrastructure, greater bandwidth, lower latency, specialist services and systems, constant security and a whole host of additional advantages.

What is a private cloud?

IT services are provisioned over private IT infrastructure for the dedicated use of a single organization.

Increment in Capability comes with additional ______ & ______

Infrastructure Complexity & Management Changes

Explain McFarlan Quadrant of the role IT turnaround

Low operational impact, high strategic impact. This quadrant is about exploiting new technologies to provide strategic opportunities.

Explain McFarlan Quadrant of the role of IT support

Low operational impact, low strategic impact. This quadrant is about local process improvements for individual users.

_______ is unauthorized users getting access to your IT infrastructure by a variety of methods.

Intrusion

____________ causes a dip in performance during system cut over.

Learning Curve

How do you calculate reliability for components in parallel?

Probability of failures* # of Components

What is Governance?

Process of structuring, operating, and controlling the organization with a view to achieving its long-term strategic goals, serving the interests of its various stakeholders, and complying with legal and regulatory requirements.

What are some project dimensions influencing implementation risk?

Project size Experience with technology Requirements volatility

__________ is the key to inherent reliability

Redundancy

How do you calculate reliability for components in series?

Reliability of one component * # of Components

What are some objectives of governance?

Strategic goal satisfaction Operational efficiency Measurement reliability Compliance

What are the Roles of IT ?

Support Factory Turnaround Strategic

What are the characteristics of a Project?

Temporary Unique Required to be On Time Required to be On budget

What is Project Management?

The discipline of initiating, planning, executing, controlling, and closing the work of a team to achieve specific goals and meet specific success criteria at the specified time.

T or F ? Service reliability decreases as components are added in series.

True

T or F? Application portfolio management looks at each program and piece of equipment as an asset within a company's overall portfolio, giving it a score based on factors like age, importance, number of users and so on.

True

T or F? The higher the number of risk risk factors the higher the project risk

True

T or F? The role of the project manager is more tactical than the program manager

True

______________ require an active host program or an already-infected and active operating system in order to run

Virus

What is shared hosting?

Web hosting in which the service provider serves pages for multiple Web sites, each having its own Internet domain name, from a single Web server. Most Web hosting companies provide shared hosting.

It is difficult to achieve high levels of reliability because IT services are delivered by ________ working together

a number of components


Ensembles d'études connexes

CFP 3 Unit 5 Alternative Investments and Derivatives

View Set

SAP MM all Practice Questions (books 1-4)

View Set

Urinary Catheterization: 210L Quiz #11

View Set