Chapter 11 MIS 360

Ace your homework & exams now with Quizwiz!

True/False 10. The purpose of the network model is to convey the complexity of the system, to show how the system's components will fit together, and to help the project team develop the hardware and software specification.

False

True/False 23. Capacity requirements, which are one kind of performance requirements, attempt to predict how fast the system should operate.

False

True/False 24. Speed requirements, which are one kind of performance requirements, attempt to predict how many total and simultaneous users the system will need to support.

False

True/False 33. System integration requirements document how the technical environment might change in the future and how the system must respond to future technical environment changes.

False

True/False 42. Basically, a web service in cloud computing is the software that supports an entire business process such as salesforce.com.

False

True/False 45. Cost of cloud is one of the set of obstacles for adopting the cloud.

False

A server can be a(n) _____. a. mainframe b. mainframe, minicomputer, or microcomputer c. microcomputer d. minicomputer e. low-end personal computer

b

True/False 38. In order to prepare computer systems for global communication, discrete multilingual systems contain separate parts that are written in multiple languages and must have each language reinstalled before it can be used.

True

True/False 39. Legacy databases and systems are one of seven factors in the hardware and software specification document

True

True/False 8. The hardware and software specification is a document that describes what hardware and software are needed to support the application.

True

Recent studies have shown that almost ___ percent of organizations suffer a virus infection each year. a. 90 b. 80 c. 70 d. 60 e. 50

a

True/False 13. A concurrent multilingual system is one that contains separate parts that are written in each language and must be reinstalled before a specific language can be used.

False

True/False 14. Most systems are not built to use the existing infrastructure in the organization, so the current infrastructure rarely restricts the choice of architecture.

False

True/False 15. The client-server architecture was originally developed to control and secure data, and it is much easier to administer because all data are stored in a single location.

False

True/False 41. Virtualization is another term for cloud computing.

False

True/False 6. Senior management has established the priority for the new system as "the highest security and control at any cost." The systems analyst should recommend a client-based computing architecture.

False

Scalability refers to the _____. a. easy increase or decrease of the storage and processing capabilities of the computer b. fact that there is no central point of failure in the system c. deployment of middleware in the system d. support of many different types of clients and servers e. ease of decreasing the cost of the infrastructure during economic downturn

a

Which one in the following is one of the set of obstacles that cloud computing must overcome before it becomes the primary approach to provision the physical architecture layer. a. the cost of the cloud b. the level of availability of the cloud c. the security in the cloud d. the safety of the cloud e. the usability of the cloud

c

A server in the client-server architecture performs which of the following application functions? a. application logic and data storage b. application logic and presentation logic c. data access logic and presentation logic d. data access logic and data storage e. data storage logic and presentation logic

d

Elements of a deployment diagram include _____. a. Nodes, artifacts, and locations of middleware components b. Client PCs, servers, and locations of application logic modules c. Servers, external networks, and data access logic d. Primarily servers e. Nodes, artifacts, and communication paths

e

Many countries have ____ norms for expressing information such as dates that are unique to the country. Knowledge of these norms is important when developing global information systems. a. cultural b. specialized c. variable d. idiosyncratic e. unstated

e

True/False 11. A node in a deployment diagram typically indicates a server, a client or a separate network. A node never represents an individual network device since that is a very low level of abstraction for a deployment diagram.

False

True/False 19. The function that provides the processing required to query a database and other logic related to the data management layer is called presentation logic.

False

True/False 2. An advantage of server-based architecture is that they never become overloaded and are always able to process user demands in a timely way.

False

True/False 28. Encryption and authentication requirements address virus control measures.

False

True/False 29. The languages in which the system needs to operate are documented as part of the customization requirements.

False

True/False 31. Thin client-server architectures do not have the ability to address cultural and political requirements better than the server-based architectures.

False

True/False 35. The major problem with a server-based architecture is that all data on the server must travel to the client for processing.

False

True/False 36. Assume that your network has a server and three clients, this network is an example of a four-tiered architecture.

False

True/False 40. Cost of ownership is an estimate of the purchase price of the system used to determine whether or not to lease from an outsource vendor.

False

True/False 5. A two-tiered architecture uses only three sets of computers, clients, database servers, and application servers.

False

True/False 9. Server-based computing requires a high degree of coordination among many components, and the chances of security holes or control problems are much greater than with client-server computing.

False

Ethan is considering the replacement of the existing network for his organization. He has projected organizational growth at 50% per year for the next five years. With this growth, many new employees will surely be hired and trained. He has received a large amount of money from a small business grant for the initial development. The architecture Ethan should select is _____. a. server-based b. client-based c. client-server d. network-based e. client-network server

c

The application function that allows data to be stored and retrieved is called _____. a. application logic b. data access logic c. data storage d. presentation logic e. network logic

c

The six architecture characteristics that assist in selecting the proper architecture are cost of infrastructure, cost of development, ease of development, _____, _____, and _____. a. control and security, scalability, cost of programming b. interface capabilities, control and security, cost of programming c. interface capabilities, control and security, scalability d. interface capabilities, control, and security e. interface capabilities, scalability, cost of programming

c

What is one primary problem with server-based computing architectures? a. As more users place heavier demands on the server, it is expensive to increase server capacity. b. Client terminals are no longer made by hardware vendors. c. It is difficult to maintain security in the server-based environment. d. Servers are no longer made by hardware vendors. e. Servers cannot be manufactured quickly by vendors.

a

True/False 1. In the server-based architecture, all data stored on one computer.

True

True/False 12. In a deployment diagram, typically a node is labeled with a stereotype, with the stereotype representing the type of node (e.g., web server, database server, mobile device).

True

True/False 16. Project teams are usually more concerned with how an existing infrastructure needs to be changed or improved to support the requirements that were identified during analysis, as opposed to how to design and build an infrastructure from scratch.

True

True/False 17. Companies seldom build networks to connect distant locations by buying land and laying cable or sending up their own satellites; they usually lease services provided by large telecommunications firms, such as AT&T, Sprint, and Verizon.

True

True/False 18. In a deployment diagram, an artifact is a piece of the information system that is to be deployed onto the physical architecture.

True

True/False 20. The function that provides the logic related to the problem domain layer is called application logic.

True

True/False 21. The function that provides the processing logic required by the human computer interaction layer is called presentation logic.

True

True/False 22. In a deployment diagram, a communication path represents a communication link between the nodes of the physical architecture, and communication paths may be stereotyped.

True

True/False 25. "The system should be operational on a 24/7 basis for the users." This is an example of the availability and reliability requirements.

True

True/False 26. Minicomputer typically costs hundreds of thousands of dollars while a mainframe costs millions of dollars.

True

True/False 27. Access control requirements state who can access data and what type of CRUD data access is permitted to each individual who has access to data.

True

True/False 3. With the client-based architecture the clients are personal computers on a local area network and the server computer is a server on the same network.

True

True/False 30. Maintainability and access control requirements are better met by the server-based architectures than the client-server architectures.

True

True/False 32. Client-based systems are ill equipped to meet operational, performance, security, and cultural/political requirements.

True

True/False 34. A server in the server-based architecture performs application logic, data access logic, data storage, and presentation logic.

True

True/False 37. Scalability is an important attribute in today's systems. Client-server architectures tend to be more scalable compared to the server-based architectures.

True

True/False 4. Client-server architectures strive to balance the processing between the client and the server by having both perform some of the application functions.

True

True/False 43. With Platform as a Service (PaaS), the cloud vendor not only provides hardware support to a customer, but also provides the customer with either package-based solutions, different services that can be combined to create a solution, or the development tools necessary to create custom solutions in the PaaS vendor's cloud.

True

True/False 44. Security concerns are one of the set of obstacles for adopting the cloud.

True

True/False 46. The paperless office idea is becoming a reality thanks for widely using of tablet devices.

True

True/False 7. Senior management has established the priority for the new system as "user friendly, and quickly and inexpensively expandable to all part of the organization." The systems analyst should recommend a client-server based computing architecture.

True

In the public key private key encryption algorithm, normally the public key is used to _________, while the private key is used to ______________. a. Encrypt data, decrypt data b. Store data, restore data c. Access data, access information d. Password-protect data, retrieve password e. Encrypt login id, encrypt password

a

The cloud can contain the firm's IT infrastructure, IT platform, and software. _______________ refers to the cloud providing the computing hardware to the firm as a remote service. a. Infrastructure as a service (IaaS) b. Platform as a service (PasS) c. Software as a service (SaaS) d. Utility as a service (UaaS) e. Computing as a service (CaaS)

a

In an n-tiered architecture, the _____ is spread across two or more different sets of servers. a. presentation logic b. application logic c. data access logic d. data storage e. any of the above can be spread across two or more sets of servers

b

Systems designed to handle multiple languages on the fly are ____ multilingual systems. a. ad-hoc b. concurrent c. versatile d. discrete e. global

b

Which one of the following is not part of the security requirements? a. System value estimates b. Capacity requirements c. Access control requirements d. Encryption and authentication requirements e. Virus control requirements

b

Fundamentally, cloud computing is an umbrella technology that encompasses the ideas of ________________, service-oriented architectures, and grid computing. a. distributed computing b. e-business c. Remote Method Invocation (RMI) d. virtualization e. networking

d

The computing architecture in which the server performs practically all of the work is known as _____. a. client connection based architecture b. client-based architecture c. client-server architecture d. server-based architecture e. middleware architecture

d

Which of the following is NOT one of the four basic functions of a computer application? a. application logic b. data access logic c. data storage d. networking logic e. presentation logic

d

Which one of the following type of operational requirements attempts to anticipate the future requirements? a. Technical environment requirements b. System integration requirements c. Portability requirements d. Maintainability requirements e. Capacity requirements

d

A network model will depict _____. a. clients b. network equipment c. external networks d. servers e. all of the above

e

The public key infrastructure (PKI) is ______. a. hardware b. software c. organizations d. policies e. all of the above

e


Related study sets

ATI Dosage Calculations Critical Care Medications

View Set

Lesson 17: Real Estate Careers and The real estate license law

View Set

Relative Dating of Rock Layers by Principles

View Set

Parkinson's Disease Practice Questions

View Set