v369 exam 1

Ace your homework & exams now with Quizwiz!

Moore's law and what it means for the future of IT

As we approach the limits of transistor density we will need to find other ways to keep increasing performance. Notably, a new fundamental architecture. This is precisely what extreme scale designers and engineers are doing right now

Organizational strategies for Cloud

Check 7.3

Why, what, and how components of strategy formulation

Business Strategy (why): •We must learn to manage the demand for information systems in accordance with business needs, and to manage the supply of systems and infrastructure in a coherent way •Failure to manage (IT) strategically generates conflict and wastes management time Information Systems Strategy (what): •Information systems = IT services •Establish the demand for new systems •Aligned closely to plans for the business and its development •Define responsibilities and benefits Information Technology Strategy (how) •Describe the activities which need to be undertaken and how they are to be organized •Provide foundations for the definition and execution of systems projects •Ultimately deliver benefits and thereby the strategic objectives of the business

Key leadership roles in IT

CIO: •Developing and directing the organization's overall IT strategy •Working closely with other senior management, including the CEO. CTO, COO, and CFO to coordinate data policies •Providing vision and leadership in all aspects of IT management CTO: •Sets the overall technology standards and practices •Gives recommendations and explanations about technology to senior managers, including the CIO CISO: •Manages enterprise security policies and systems •Develops and implements infosec strategy •Ensures that the organization meets all mandated security standards (compliance)

Market share leaders

Desktop: Windows Browser: Chrome Mobile: Android Mobile(US): Apple(ios)

Service Models of Cloud

Consume it (SaaS) •End-User Applications delivered as a service, rather than by on-premises software Build on it (PaaS) •Application platform or middleware provided as a service on which developers can build and deploy custom applications Migrate to it (IaaS) •Computing, storage, or other IT infrastructure provided as a service, rather than as a dedicated capability

What is the fourth industrial revolution, and how does it impact IT?

One of the main effects of the Fourth Industrial Revolution is increased human productivity. With technologies like AI and automation augmenting our professional lives, we're able to make smart choices, faster than ever before.

In ITIL, which of the four dimensions of service management focuses on the culture of the organization, while also looking at the skills and competencies of individuals and teams?

Organizations and People

Decision makers are often motivated by three key business drivers. Time and money are two key drivers. What is the third?

Quality (user/ customer experience)

Three core components of IT

people, Technology, processes

Which of the following are interfaces provided by an operating system?

text user interfaces (TUI) and graphical user interfaces (GUI) as examples. Graphical user interfaces have many similarities in different operating systems: such as the start menu, desktop etc.

Which transport layer protocol is focused on reliability, with sequencing and flow control?

transport layer

Challenges in IT management today

•Maintaining a resilient workforce •The scope of technology management •Managing suppliers •Acquiring technology

ad hoc

for a specific purpose or situation

The purpose and value of IT

fundamentally the value of IT is in helping to transform the business.

Four Dimensions Model

-Organizations and people -Information and technology -Partners and suppliers -Value streams and processes Check class 2-2 for in detail about these

Key vendors in cloud

AWS, Azure, Google

Which of the following are "usual suspects" of non-functional requirements that most services or applications will most likely need to include in their design specifications?

Hardware Requirements Software Requirements Performance Requirements Supportability Requirements Security Requirements Interface Requirements Availability Requirements Assumptions / Constraints

Difference between IT and IS strategy

Information systems strategies define the information and systems needs for activities within the business. Information technology strategies define how system needs will be met and how the information technology that will be required will be acquired, developed and operated so as to support existing and future applications.

General Management Practices

Psychological Safety emerged as the #1 factor in determining the effectiveness of a team Check class 2-2 for full list

Which of the following are fundamental service models of cloud computing, as defined by NIST?

SaaS, PaaS, IaaS

Determining value

Service providers help their consumers to achieve outcomes, and in doing so, take on some of the associated risks and costs...on the other hand, service relationships can introduce new risks and costs, and in some cases, can negatively affect some of the intended outcomes, while supporting others

A project oriented approach to strategy consists of three key questions. The first question is "where are we now?" The second question is "where could we be?" What is the third question?

Where do we want to be?

Key functions of an OS

•Provides a human/machine Interface -GUI -CLI -Voice •Manages all the storage and provides a filesystem •Provides authentication (authN) and authorization (authZ) of users -Login -Permissions (files, etc.) •Manages the processor (CPU) -Processes, threads -Scheduler •Manages memory - all the programs "loaded" into RAM -Isolation •I/O - a "device driver" for each piece of hardware -Graphics -Storage -Network -Printer, scanner, keyboard, mouse, etc. •Provides a platform interface for all other software -APIs

Which of the following are key characteristics of cloud computing?

-On-demand self-service -Ubiquitous network access -Location-independent resource pooling -Rapid elasticity -Pay for what you use

The role and importance of memory (RAM)

When the system is powered on, a computer can load data (OS, applications, and othe rinformation) into a special area called "main memory." The processor can quickly access and work with data in this special area, increasing performance. The more memory a computer has, the more information can be loaded and accessed at a given time. On systems with inadequate amounts of RAM, the operating system will have to "swap" information out to slower mediums, typically a hard drive

Difference between LAN and WAN networks

A WAN differs from a LAN because it is not restricted by geographic location. As opposed to a LAN which connects local devices to each other, a WAN connects LANs to each other, usually across multiple locations as well as individual devices that connect from a remote distance.

Performance characteristics of CPUs

- Modern CPUs also contain multiple "cores" which function like discrete processors. A CPU with more cores can process more instructions in parallel, which leads to higher performance. - Another factor that impacts CPU performance is the clock speed, which refers to the number of instruction cycles that the processor can complete each second. Clock speeds are measured in gigahertz (GHz) which corresponds to billions of cycles per second. Higher clock speeds (and transistor density) require additional power and generate more heat.

Which of the following are core concepts in the BACCM?

1) Change: Change is an act of transformation within an organization in response to a need. The need can be internal or necessitated by an external event such as a disruption in the market. The aim of the change is to improve the performance of an enterprise through deliberate actions controlled through business analysis activities. 2) Need: Need is a problem or opportunity to be addressed by the business analyst. Needs can cause changes by motivating stakeholders to act. Changes can also cause needs by eroding or enhancing the value delivered by existing solutions or creating the need for new solutions. 3) Solution: A specific way of satisfying one or more needs in a context. A solution satisfies a need by resolving a problem faced by stakeholders or enabling stakeholders to take advantage of an opportunity. 4) Stakeholder: A group or individual with a relationship to the change, the need, or the solution. Stakeholders are grouped based on their relationship to the needs, changes, and solutions. 5) Value: The worth, importance, or usefulness of something to a stakeholder within a context. Value can be tangible or intangible. Examples of tangible values are potential or realized returns, gains, and improvements. Intangible value often has a significant motivational component, such as a company's reputation or employee morale. 6) Context: The circumstances that influence, are influenced by, and provide understanding of the change. A change always occurs within an environment. A context is a wide-ranging term that can include everything from an organization's culture, mission, and demographics to government policies, competitors, products and sales. In order to successfully implement the change, the business analyst must carefully define and analyse the context within which the change is being implemented.

How to communicate IT strategy with business stakeholders

1. She keeps it brief. Execs are busy people, and they listen fast. Do not waste their time. Get right to the point. She also keeps it at a high level, avoiding any attempts to get into the weeds. 2. She talks about IT in business terms. "avoiding cost" "improving service" "increasing revenue" 3. She makes it clear that the business is in the driver's seat "IT serves the business" "I need your guidance" "You will set the priorities" •Shows organizational leaders that you support the overall mission and objectives of the entire organization. •Demonstrates alignment with the overall business strategy

The functions of the layers in the TCP/IP network model

Application Layer: The application layer of the Internet suite essentially combines the functions of the top two layers -- Presentation and Application -- of the OSI reference model. We distinguish two categories of application layer protocols: user protocols that provide service directly to users, and support protocols that provide common system functions Transport Layer: •The transport layer provides end-to-end communication services for applications. •There are two primary transport layer protocols at present: •Transmission Control Protocol (TCP) •User Datagram Protocol (UDP) •TCP is a reliable connection-oriented transport service that provides end-to-end reliability, resequencing, and flow control. •Registered mail •UDP is a connectionless ("datagram") transport service. •Bulk mail Internet Layer: All Internet transport protocols use the Internet Protocol (IP) to carry data from source host to destination host Link layer: To communicate on its directly-connected network, a host must implement the communication protocol used to interface to that network. We call this a link layer or media-access layer protocol

Techniques for elicitation

Brainstorming sessions allow stakeholders to share their own ideas and solutions. BABOK notes that this is especially useful when we have no clear winner yet. As such, there are no bad ideas and everything gets captured for later analysis. Focus groups are intended for stakeholders that are less creative or imaginative. They will typically require the BA or facilitator to prompt the group for input. •Understand how the project meets business needs •Fully grasp what the project is expected to accomplish from the business perspective •Ensure that you are interacting with the right people •Review the list of stakeholders •Start with RACI information •Expand to other subject matter experts Examples: •Observation •Prototyping •Requirements workshops •Surveys and questionaires •Brainstorming •Document analysis •Focus group •Interface analysis •Interviews

Purpose and role of compute, memory, and storage

CPU: Modern CPUs have multiple "cores" which are essentially individual processors that share other resources. More processors means more execution paths and therefore higher performance. But there is a limit and a point of diminishing returns. Memory: When the system is powered on, a computer can load data (OS, applications, and other information) into a special area called "main memory." The processor can quickly access and work with data in this special area, increasing performance. The more memory a computer has, the more information can be loaded and accessed at a given time. On systems with inadequate amounts of RAM, the operating system will have to "swap" information out to slower mediums, typically a hard drive. Storage: Computers need a persistent storage mechanism to keep applications and data when the system is powered off. On a traditional PC this involves a traditional hard drive or an SSD. On mobile devices, they will always use flash memory (like SSD) because of space and power limitations. Check 4-1 slides for visuals and more info

Common frameworks for ITSM

ITIL, COBIT, etc ITIL is used at some of the largest and most recognizable companies in the world. But it is flexible and can be adapted for use in virtually any organization. Key to the this is the basic fact that ITIL is a framework, or a collection of best practices. Organizations can pick and choose which parts make the most sense for them.

Address types used in networking

In a typical LAN environment, devices connect to the network by a network adapter (wired or wireless) which has a unique Media Access Control (MAC) address. This hard-coded 48-bit unique address allows devices to send data back and forth from one adapter to another either directly or via a switch, which acts as a hub or bridge between devices on a local network. MAC address example: 2B-15-7E-AF-E4-2C For wireless devices, the Wireless Access Point (WAP) acts as an additional bridge to the physical network, and is often connected to a physical switch. The family of technologies that provides this basic connectivity between network devices is Ethernet. Internet Layer: The internet layer enables the transmission of data across multiple networks. Each host or device has an IP address, which is easily changed, but must be unique on a WAN. The original address scheme, known as IPv4 (version four) uses a 32-bit address and therefore had a limit of just over four billion (232) addresses. To accommodate the explosive growth of devices on the Internet, IPv6 (version six) was created and is now in widespread use throughout the world. IPv6 uses a 128-bit address, theoretically allowing 2128 addresses! IP address examples: IPv4: 192.168.1.2 IPv6: FEC1:4A2B::1f3F Data is sent from one host to another across a WAN via a process known as routing. The device that connects two or more segments in a WAN is known as a router. Routers work together to build a "map" of the WAN and will route traffic efficiently from one host to another on the network. Large WANs (like the Internet) consist of thousands of routers. Hosts use the Domain Name System (DNS) to translate human-readable names (e.g. google.com) into IP addresses to enable routing. Example: google.com --> 216.58.192.164 Transport Layer: The transport layer creates channels for application-specific data exchange. Applications often use a specific well-known port number, for example 443 for encrypted HTTP traffic. Application Layer: The application layer provides protocols that allow application specific data exchange. Examples include the Hypertext Transport Protocol (HTTP), the File Transfer Protocol (FTP), the Dynamic Host Configuration Protocol (DHCP), and the Simple Mail Transfer Protocol (SMTP).

The purpose and value of a Graphical Processing Unit (GPU)

Originally designed for graphics, their ability to perform large volumes of matrix and vector math calculations makes them well suited for tasks like blockchain (used in cryptocurrencies like Bitcoin) as well as machine learning, a popular form of AI that powers things like image scanning The GPU is a specialized type of processor that has emerged in recent years. Rendering graphics involves large amounts of mathematical calculations, so GPUs have been engineered to efficiently process these calculations in parallel. CPUs can generally process a single calculation faster, but because of the parallel processing capabilities of GPUs they will dramatically outperform CPUs when calculating similar mathematical problems. GPUs are optimized for throughput.

Service Value System

Purpose: Our goal is to create value by provisioning and managing services. This is a high-level view of the system that we will use to achieve that goal. Components: •Service value chain •Practices •Guiding principles •Governance Continual Improvement Opportunity and demand trigger activities Value is always the focus Guiding principles define culture and behavior in an organization Continual improvement maintains focus on customer needs and expectations Governance ensures control Practices provide the resources to perform work and accomplish objectives Service value chain is the set of activities that ultimately deliver valuable products or services

Typical virtualization use cases

Server consolidation: -Convert underutilized physical servers to VMs -Significant cost savings (equipment, space, power) -Reduce space, power, and cooling (as much as 80%) Data center management -Server portability and live migration a key enabler -Automate resource scheduling and optimization across a pool of physical server -Optimize for performance and/or power consumption -Allocate resources for new applications rapidly -Add/remove servers without application downtime Virtualized Desktops -Centralize management of desktop VM images -Automate deployment and patching of desktop VMs -Run desktop VMs on servers or on client machines Development and test environments -Developers: test multiple OS versions, distributed application configurations simultaneously -Model distributed hardware for multi-tier applications -Application and OS flexibility (run any application or operating system) Fast, automated recovery -Automated failover and restart within a cluster -Disaster recovery across sites -VM portability enables this to work reliably across potentially different hardware configurations

Service Value Chain

Service value chain is the set of activities that ultimately deliver valuable products or services

What are the advantages of SSD?

Solid State Drives (SSD) are a more recent type of drive based on the same types of flash memory used in USB or "thumb" drives. Because they have no moving parts, they have several advantages over HDD: Faster More reliable Use less power Generate less heat

How virtualization works and the benefits that it provides

Solution: Using a "single" physical machine to provide many "virtual machines" (VMs) The physical server runs a special operating system that features a component known as a "hypervisor" Allows that OS to host additional OS instances Physical resources (compute, memory, storage) are shared Servers, desktops, or simply apps can all be virtualized Virtual Machines can be moved from one physical machine to another - without downtime This is the foundation of cloud computing and much of IT today

The difference between strategic goals and tactical objectives

Strategic: •High level, often expressed in more general language •Easily understood by any executive or business user •Rarely involves dates or similar details •External audiences Tactical: •More detailed •Includes references to specific technologies •Often includes very specific dates •Internal audiences

Strategic inputs to IS strategy

The potential impact of new systems on business performance depends not only on what the business wishes to do but what others are already doing. It is the combination of external pressures and internal capabilities that needs to be balanced to ensure proper alignment of systems and business strategies. The analysis process described here is an adequate guide to achieving viable information systems strategies, provided that agreement is reached as to 190 8 Exploring Business Strategy terminology and process, so that everyone is working on the same basis. Issues and problems will arise, and as the process is exercised, it can be refined to include places where problems can be "parked" pending proper resolution, and where decisions can be recorded so that their significance is not lost.

Cloud Defining characteristics

The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. §"An approach to computing that's about Internet scale and connecting to a variety of devices and endpoints." §"Treating hardware and software resources as a utility." §"A way to save a ton of money by only paying for what you need." §"A way to scale huge when you need something done fast." -On-demand self-service -Ubiquitous network access -Location-independent resource pooling -Rapid elasticity -Pay for what you use

What are the key terms in the definition of a requirement, and what does each mean?

The purpose of the business analysis practice is to analyse a business or some element of it, define its associated needs, and recommend solutions to address these needs and/or solve a business problem, which must facilitate value creation for stakeholders. Business analysis enables an organization to communicate its needs in a meaningful way, express the rationale for change, and design and describe solutions that enable value creation in alignment with the organization's objectives.

Cost and performance of various persistent storage formats

Traditional Hard Disk Drives (HDD) use small spinning disks or "platters" with a magnetic coating. The drives contain a magnetic head that reads and write data to the disk. They are relatively inexpensive and they provide a large amount of storage capacity for the cost. Because they have several moving parts, there are some downsides to consider: Require more power Generate more heat Slower than SSD Vulnerable to failures Solid State Drives (SSD) are a more recent type of drive based on the same types of flash memory used in USB or "thumb" drives. Because they have no moving parts, they have several advantages over HDD: Faster More reliable Use less power Generate less heat

Hypervisors

enables virtualization, software installed on top of hardware, acts as a platform for virtualization to perform on types: Bare metal, hosted,

Common use cases

§A large enterprise quickly deploys new internal applications to its distributed workforce. §An e-commerce website accommodates sudden demand for a "hot" product caused by a viral buzz. §A pharmaceutical research firm executes large-scale simulations using computing power provided by cloud vendors. §A media company serves unlimited video, music, and other media to their worldwide customer base.

What are typical activities in requirements management

•Identify and define objectives •Why is the system being created or technology deployed? •Verify requirements against the objectives •Provides critical insight into validity •Apply scenarios against the requirements •What if a user does..? •Perform a consistency review •Weed out ambiguity by extra eyes to review requirements Agile/Waterfall

How ITSM makes IT better in an organization

•Improving business performance through better IT delivery •Processes that enable us to design, create, deliver, support, and manage IT services -ITSM helps to maintain the focus (strategy) in the right place. -The notion of a "lifecycle" is embedded in ITSM

Deployment models

•Private Cloud (also known as internal cloud): •This deployment model of cloud computing is implemented on a cloud-based secure environment and access is restricted to authorized users only. •Utilizing this model provides organizations the opportunity to control their data and establish their own security measures. •Public Cloud: •Cloud services are delivered over a network (Internet) and are open for public usage. •Community Cloud: •This deployment method represents a cloud computing model somewhere between public and private. •Setup is mutually shared between organizations with shared interest (such as banks or trading firms) and access is restricted to these organizations. •Private Access •Hybrid: •A combination of all of the above, comprising multiple servers dedicated to either private or public access.

Five key areas of ITILv3

•Service Strategy -Ensures that the cost of delivery is consistent with the value delivered to the customer. •Service Design - Ensures that new and changed services are designed effectively to meet customer expectations. •Service Transition -Allows services to be built, tested and moved into production to enable the business customer to achieve the desired value •Service Operation -Delivers the service on an ongoing basis, overseeing the daily overall health of the service •Continual Service Delivery (CSI) -Offers a mechanism for the IT organization to measure and improve the service levels


Related study sets

Injury Care and Prevention Final

View Set

Biology Chapter 27- Evolution of Life

View Set

Pharm Chapter 46: Antineoplastic Drugs Part 2

View Set

Chapter 7 Femur and Pelvic Girdle ****, Pediatric Positioning Chapter 16 self test, Bontrager Chapter 16, Ch 14: Urinary System & Venipuncture self test only, bontrager ch. 14, Chapter 13 Lower Gastrointestinal System: Self Test, Lower GI System - Ch...

View Set