Quiz 3

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

________ are created by combining and customizing components from different online software applications. A. Apps B. Mashups C. SaaS D. Web services

A. Apps

Running a Java program on a computer requires A. a Java Virtual Machine to be installed on the computer. B. a Java Virtual Machine to be installed on the server hosting the Java applet. C. a miniature program to be downloaded to the user's computer. D. no specialized software, as Java is platform-independent.

A. a Java Virtual Machine to be installed on the computer.

The process of presenting a set of computing resources (such as computing power or data storage) so that they can all be accessed in ways that are not restricted by physical configuration or geographic location is called A. cloud computing. B. autonomic computing. C. virtualization. D. multicore processing.

A. cloud computing.

Interpretations of Moore's law assert that A. computing power doubles every 18 months. B. transistors decrease in size 50% every two years. C. data storage costs decrease by 50% every 18 months. D. none of the above.

A. computing power doubles every 18 months.

Which of the following is not one of the current software platform trends? A. grid computing B. open-source software C. HTML5 D. software outsourcing

A. grid computing

The marketplace for computer hardware A. has become increasingly concentrated in top firms. B. has expanded to include a wide variety of start-up and mobile-computing firms. C. has moved significantly to Asian firms. D. has been decimated by mobile and cloud computing.

A. has become increasingly concentrated in top firms.

Which type of computing refers to firms purchasing computing power from remote providers and paying only for the computing power they use? A. on-demand B. grid C. edge D. autonomic

A. on-demand

Software that manages the resources of the computer is called A. operating system software. B. application software. C. data management software. D. network software.

A. operating system software.

The practice of contracting custom software development to an outside firm is commonly referred to as A. outsourcing. B. scaling. C. service-oriented architecture. D. application integration.

A. outsourcing.

Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software programs for certain functions, are referred to as A. software packages. B. mashups. C. outsourced software. D. open-source software.

A. software packages.

An example of autonomic computing is A. spyware protection software that runs and updates itself automatically. B. software programmed to run on any hardware platform. C. cell phones taking on the functions of handheld computers. D. programming languages that allow non-programmers to create custom applications.

A. spyware protection software that runs and updates itself automatically.

Specifications that establish the compatibility of products and the ability to communicate in a network are called A. technology standards. B. Internet standards. C. network standards. D. telecommunications standards

A. technology standards.

As referred to in the text, legacy systems are A. traditional mainframe-based business information systems. B. electronic spreadsheets used on a PC. C. any pre-1990 Wintel systems. D. systems found on older ASPs.

A. traditional mainframe-based business information systems.

Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down? A. modality B. scalability C. expandability D. disintermediation

B) scalability

Which of the following is the most popular mobile operating system? A. Linux B. Android C. Chrome OS D. iOS

B. Android

Which of the following is a leading networking hardware provider? A. Dell B. Cisco C. Seagate D. IBM

B. Cisco

A formal contract between customers and their service providers that outlines the specific responsibilities of the service provider and to the customer is called a(n) A. SOA. B. SLA. C. TCO. D. RFQ.

B. SLA.

________ unleash powerful economies of scale and result in declines in manufactured computer products. A. Internet and Web technologies B. Technology standards C. Linux and open-source software D. Client/server technologies

B. Technology standards

Legacy systems are still used because they A. can only be run on the older mainframe computers. B. are too expensive to redesign. C. integrate well using new Web services technologies. D. contain valuable data that would be lost during redesign.

B. are too expensive to redesign.

The business case for using grid computing involves all of the following except A. cost savings. B. increased accuracy. C. speed of computation. D. agility.

B. increased accuracy.

A SAN is a ________ network. A. server area B. storage area C. scalable architecture D. service-oriented architecture

B. storage area

The network standard for connecting desktop computers into local area networks that enabled the widespread adoption of client/server computing and local area networks and further stimulated the adoption of personal computers is A. TCP/IP. B. COBOL. C. Ethernet. D. ASCII.

C. Ethernet.

Which of the following statements about Linux is not true? A. It plays a major role in the back office running local area networks. B. It is available in free versions downloadable from the Internet. C. It has garnered 80 percent of the server operating system market. D. Linux applications are embedded in cell phones, smartphones, netbooks, and other handheld devices.

C. It has garnered 80 percent of the server operating system market.

Today's nanotechnology-produced computer transistors are roughly equivalent in size to A. the width of a fingernail. B. a human hair. C. a virus. D. an atom.

C. a virus.

Linux is A. primarily concerned with the tasks of end users. B. designed for specific machines and specific microprocessors. C. an example of open-source software. D. especially useful for processing numeric data.

C. an example of open-source software.

A software tool with a graphical user interface for displaying Web pages and for accessing the Web and other Internet resources is called a Web A. service. B. client. C. browser. D. app.

C. browser.

The development of TCP/IP occurred during the ________ era. A. cloud and mobile computing B. general-purpose mainframe and minicomputer C. enterprise computing D. personal computer

C. enterprise computing

Connecting geographically remote computers in a single network to create a "virtual supercomputer" is called A. co-location. B. edge computing. C. grid computing. D. utility computing.

C. grid computing.

SaaS refers to A. supplying online access over networks to storage devices and storage area network technology. B. managing combinations of applications, networks, systems, storage, and security as well as providing Web site and systems performance monitoring to subscribers over the Internet. C. hosting and managing access to software applications delivered over the Internet to clients on a subscription basis. D. none of the above.

C. hosting and managing access to software applications delivered over the Internet to clients on a subscription basis.

Which of the following does grid computing utilize to create enormous supercomputing power? A. massive unused data centers B. underutilized mainframe computers C. networked computers with idle resources D. networks with low usage

C. networked computers with idle resources

All of the following are current hardware platform trends except A. green computing. B. virtualization. C. cloud computing. D. Unix.

D. Unix.

Which of the following factors provides an understanding of why computing resources today are ever more available than in previous decades? A. law of mass digital storage and Moore's law B. network economics C. declining communications costs, universal standards, and the Internet D. all of the above

D. all of the above

An industry-wide effort to develop systems that can configure, optimize, tune, and heal themselves when broken, and protect themselves from outside intruders and self-destruction is called A. grid computing. B. utility computing. C. virtualization. D. autonomic computing.

D. autonomic computing.

Which of the following is not an example of the emerging mobile computing platforms? A. tablets B. the Kindle C. cell phones D. desktop computers

D. desktop computers

Which of the following is not one of the NIST defined characteristics of cloud computing? A. ubiquitous network access B. location-independent resource pooling C. rapid elasticity D. non-measured service

D. non-measured service

Which type of software is created and updated by a worldwide community of programmers and available for free? A. software packages B. mashups C. outsourced D. open source

D. open source

Which type of infrastructure services provides voice and video connectivity to employees, customers, and suppliers? A. networking B. telephone C. VOIP D. telecommunications

D. telecommunications

In a multi-tiered network: A. the work of the entire network is centralized. B. processing is handled by multiple, geographically remote clients. C. processing is split between clients and servers. D. the work of the entire network is balanced over several levels of servers.

D. the work of the entire network is balanced over several levels of servers.

A client computer networked to a server computer, with processing split between the two types of machines, is called a(n): A. multi-tiered client/server architecture. B. service-oriented architecture. C. on-demand architecture. D. two-tiered client/server architecture.

D. two-tiered client/server architecture.

Which of the following is not one of the main six factors to consider when evaluating how much your firm should spend on IT infrastructure? A. your firm's business strategy B. the IT investments made by competitor firms C. market demand for your firm's services D. your firm's organizational culture

D. your firm's organizational culture


Ensembles d'études connexes

Chapter 2 The Organizational Context: Strategy, Structure, and Culture

View Set

Metacognitive Strategies: Definition & Examples

View Set

Operations Management - CH 1, 4, 5, 6

View Set