Deck 16: Technology Guide 3 : Fundamentals of Relational Database Operations

ملء الشاشة (f)
exit full mode
سؤال
Public clouds are ______________________.

A)accessed through an extranet
B)accessed through an intranet
C)accessed through the internet
D)stretched across different businesses in an industry
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
_____________________ computing makes scalability easier.

A)Grid
B)Mainframe
C)Mobile
D)Utility
سؤال
Users began bringing their own PCs to work in the ______ to improve their _________.

A)1960s; productivity
B)1960s; profitability
C)1970s; productivity
D)1970s; profitability
سؤال
Which of the following is the correct order of the evolution of the modern IT infrastructure, from latest to earliest?

A)Cloud and mobile computing, enterprise computing, LANs (client/server computing), stand-alone PCs, mainframe and dumb terminals, stand-alone mainframes
B)Cloud and mobile computing, stand-alone PCs, enterprise computing, LANs (client/server computing), mainframe and dumb terminals, stand-alone mainframes
C)Stand-alone mainframes, mainframe and dumb terminal, LANs (client/server computing), enterprise computing, stand-alone PCs, cloud and mobile computing
D)Stand-alone mainframes, mainframe and dumb terminal, stand-alone PCs, LANs (client/server computing), enterprise computing, cloud and mobile computing
سؤال
Which of the following is NOT a characteristic of cloud computing?

A)Grid and utility computing
B)Pooling computing resources
C)Server centralization on the internet
D)Utilizing broad network access
سؤال
Users first started bringing their PCs to work to improve their productivity in the 1970s; this is similar to the __________ phenomenon today.

A)AI
B)BYOD
C)ERP
D)RFID
سؤال
This stage in the evolution of the modern IT infrastructure was characterized by remote job entry.

A)Enterprise computing
B)LANs (client/server computing)
C)Mainframe and dumb terminals
D)Stand-alone mainframe
سؤال
Google Drive is an example of a ___________ cloud.

A)Hybrid
B)Private
C)Public
D)Vertical
سؤال
____________ clouds are the least expensive.

A)Hybrid
B)Private
C)Public
D)Vertical
سؤال
This stage in the evolution of the modern IT infrastructure was characterized by IT personnel being the only one with access.

A)Enterprise computing
B)LANs (client/server computing)
C)Mainframe and dumb terminals
D)Stand-alone mainframe
سؤال
This stage in the evolution of the modern IT infrastructure represented the original BYOD phenomenon.

A)Cloud and mobile computing
B)Enterprise computing
C)LANs (client/server computing)
D)Stand-alone PCs
سؤال
A ________________ cloud is also called a corporate cloud.

A)Hybrid
B)Private
C)Public
D)Vertical
سؤال
This stage in the evolution of the modern IT infrastructure was characterized by connecting personal PCs to work systems.

A)Cloud and mobile computing
B)Enterprise computing
C)LANs (client/server computing)
D)Stand-alone PCs
سؤال
________________ clouds are proprietary data centers that integrate servers, storage, networks, data, and applications.

A)Hybrid
B)Private
C)Public
D)Vertical
سؤال
Enterprise computing was introduced in the _____________________.

A)1950s
B)1960s
C)1970s
D)1990s
سؤال
Systems like ERP, CRM, and SCM were introduced in the _________ stage in the evolution of the modern IT infrastructure.

A)Enterprise computing
B)LANs (client/server computing)
C)Mainframe and dumb terminals
D)Stand-alone mainframe
سؤال
______________________ is NOT a benefit of virtualization.

A)Lower fixed costs
B)Lower variable costs
C)Redundancy
D)Scalability
سؤال
Cloud computing _____________________, which means a customer can access needed computing resources automatically.

A)encompasses the characteristics of grid computing
B)encompasses the characteristics of utility computing
C)provides on-demand self-service
D)utilizes broad network access
سؤال
SaaS is a type of __________ computing.

A)Grid
B)Mainframe
C)Mobile
D)Utility
سؤال
This stage in the evolution of the modern IT infrastructure was characterized by sharing pools of resources over a network, usually the internet.

A)Cloud computing
B)Enterprise computing
C)LANs (client/server computing)
D)Mainframe and dumb terminals
سؤال
Cloud computing delivers computing services ___________ on-premise computing.

A)at the same time as
B)can't compete with
C)faster than
D)slower than
سؤال
Which of the following is a benefit of cloud computing?

A)Privacy
B)Productivity
C)Reliability
D)Security
سؤال
_____________________________ is a service that delivers hardware networking capabilities, including the use of servers, networking, and storage over the cloud using a pay-per-use revenue model.

A)DaaS
B)IaaS
C)PaaS
D)SaaS
سؤال
Cloud computing can enable companies to collect massive amounts of data and then use sophisticated algorithms to make sense of that data to create better products and services.This characterizes which of the following benefits of cloud computing?

A)Customizing products and services
B)Expanding the scope of business operations
C)Mining insights from data
D)Responding quickly to market changes
سؤال
With _________, the customer manages applications and data while the vendor manages the operating system, servers, virtualization, storage, and networking.

A)DaaS
B)IaaS
C)PaaS
D)SaaS
سؤال
With _______________, the user has no control of software beyond user configuration.

A)IaaS
B)OaaS
C)PaaS
D)SaaS
سؤال
IaaS, PaaS, and SaaS shift IT from a(n)_________________ expense, which means IT is ____________ cost.

A)capital to an operating; fixed rather than variable
B)capital to an operating; variable rather than fixed
C)operating to a capital; fixed rather than variable
D)operating to a capital; variable rather than fixed
سؤال
Cloud computing can enable companies to shift from capital expenses to operational expenses.This characterizes which of the following benefits of cloud computing?

A)Expanding the scope of business operations
B)Making individuals more productive
C)Mining insights from data
D)Reducing costs
سؤال
_____________________ allows customers to both run existing applications and to develop and test new applications.

A)DaaS
B)IaaS
C)PaaS
D)SaaS
سؤال
Vertical clouds are similar to ___________.

A)extranets
B)intranets
C)internets
D)suppliernets
سؤال
If your IT department doesn't want to move to cloud computing because they don't want to learn how to manage and maintain a new system, this reflects the following cloud computing concern:

A)Legacy IT systems
B)Privacy
C)Reliability
D)Security
سؤال
Which of the following is NOT a reason cloud computing has a positive impact on employees?

A)It allows employees to use whatever device they want.
B)It gives them access to organizational information no matter where they are.
C)It helps them save money since they can do everything on a single device.
D)It increases their overall productivity.
سؤال
With ____________, the customer manages applications, data, and the operating system while the vendor manages the servers, virtualization, storage, and networking.

A)DaaS
B)IaaS
C)PaaS
D)SaaS
سؤال
Unlike private clouds, public clouds have a problem with ________.

A)Legacy IT systems
B)Privacy
C)Reliability
D)Security
سؤال
With _________, the vendor manages the applications and data.

A)IaaS
B)OaaS
C)PaaS
D)SaaS
سؤال
With ____________, the customer manages the operating system.

A)DaaS
B)IaaS
C)PaaS
D)SaaS
سؤال
When a site like Google Docs becomes unavailable for any period of time, this fuels the cloud computing concern of ________.

A)Legacy IT systems
B)Privacy
C)Reliability
D)Security
سؤال
Scalability benefits organizations by ______________.

A)creating a competitive advantage
B)improving organizational flexibility
C)positively impacting employees
D)saving money
سؤال
______________ clouds are the most secure because they can be placed behind an organization's firewall.

A)Hybrid
B)Private
C)Public
D)Vertical
سؤال
Moving legacy systems to the cloud is difficult. Which of the following does NOT explain this phenomenon?

A)Complexity
B)Money spent
C)Security
D)User resistance
سؤال
Safe harbors address the concerns associated with __________.

A)Criminal use of cloud computing
B)Legacy IT systems
C)Reliability of cloud computing services
D)The regulatory and legal environment
سؤال
_________ is a registry for searching web services.

A)SOAP
B)XML
C)UDDI
D)WSDL
سؤال
Least privilege is a concept associated with ___________________.

A)Legacy IT systems
B)Privacy
C)Reliability
D)Security
سؤال
Which of the following is NOT a web service protocol?

A)EDI
B)SOAP
C)XML
D)UDDI
سؤال
______________________________________________________ is a technology that uses software-based partitions to create multiple virtual servers on a single physical server.
سؤال
Anonymity on the internet enhances the problems associated with _______.

A)Criminal use of cloud computing
B)Legacy IT systems
C)Reliability of cloud computing services
D)The regulatory and legal environment
سؤال
A collection of web services constitutes a ___________.

A)self-service architecture
B)service-oriented architecture
C)service-level package
D)Software-as-a-Service package
سؤال
Utility computing service providers charge a flat rate for the computer services they provide.
سؤال
_______ describes how data should look on a web site; ______ describes data being exchanged between business partners.

A)EDI; HTML
B)EDI; XML
C)HTML; XML
D)XML; HTML
سؤال
__________ is used to create the XML document that describes the tasks performed by the various web services.

A)HTML
B)SOAP
C)UDDI
D)WSDL
سؤال
Private clouds are access through an intranet.
سؤال
__________ is a set of rules that define how messages can be exchanged among different network systems and applications through the use of XML.

A)HTML
B)SOAP
C)UDDI
D)WSDL
سؤال
DaaS is a type of SaaS.
سؤال
We are currently in the _____________________________________ stage in the evolution of the modern IT infrastructure.
سؤال
Cloud computing allows organizations to shift from capital expenses to operational expenses.
سؤال
HTML and XML are both used to design web pages.
سؤال
The US-China Safe Harbor is a streamlined process for US companies to comply with the Chinese directive on the protection of personal data.
سؤال
The stand-alone mainframe is synonymous with legacy systems.
سؤال
Web services are applications delivered over ______________ that MIS professionals can select and combine through almost any device.

A)an extranet
B)an intranet
C)the internet
D)the telephone
سؤال
PCI compliance addresses reliability issues in cloud computing.
سؤال
______________________________ clouds are shared, easily accessible, multicustomer IT infrastructures that are available nonexclusively to any entity in the general public (individuals, groups, and/or organizations).
سؤال
Cloud computing poses a major threat to ___________________________ because the providers control, and thus lawfully or unlawfully monitor, the data and communication stored between the user and the host company.
سؤال
List, describe, and provide an example of the six cloud computing characteristics. What are the business benefits of each of these characteristics?
سؤال
The different stages in the evolution of the modern IT infrastructure can be cumulative. Provide an example of how a modern organization could utilize each type of technology.
سؤال
List and describe the three main cloud computing service models, including what the customer and vendor manages for each one. If you were running your own business and wanted to use these models, how would you determine which one is best for the business?
سؤال
List and describe the four types of clouds. How could an organization like Walmart utilize each of these cloud types?
سؤال
IT _______________________________ expenses tend to be more expensive than
routine IT __________________________ expenses.
سؤال
In the _____________________________________-as-a-service model, customers rent servers, operating systems, storage, a database, software development technologies, and network capacity over the internet.
سؤال
Do you think the benefits of cloud computing outweigh the risks? Why or why not? Under what circumstances would you be willing to use cloud computing?
سؤال
___________________________ markup language is used to design the "look and feel" of a web page.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/70
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 16: Technology Guide 3 : Fundamentals of Relational Database Operations
1
Public clouds are ______________________.

A)accessed through an extranet
B)accessed through an intranet
C)accessed through the internet
D)stretched across different businesses in an industry
C
2
_____________________ computing makes scalability easier.

A)Grid
B)Mainframe
C)Mobile
D)Utility
A
3
Users began bringing their own PCs to work in the ______ to improve their _________.

A)1960s; productivity
B)1960s; profitability
C)1970s; productivity
D)1970s; profitability
C
4
Which of the following is the correct order of the evolution of the modern IT infrastructure, from latest to earliest?

A)Cloud and mobile computing, enterprise computing, LANs (client/server computing), stand-alone PCs, mainframe and dumb terminals, stand-alone mainframes
B)Cloud and mobile computing, stand-alone PCs, enterprise computing, LANs (client/server computing), mainframe and dumb terminals, stand-alone mainframes
C)Stand-alone mainframes, mainframe and dumb terminal, LANs (client/server computing), enterprise computing, stand-alone PCs, cloud and mobile computing
D)Stand-alone mainframes, mainframe and dumb terminal, stand-alone PCs, LANs (client/server computing), enterprise computing, cloud and mobile computing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following is NOT a characteristic of cloud computing?

A)Grid and utility computing
B)Pooling computing resources
C)Server centralization on the internet
D)Utilizing broad network access
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
6
Users first started bringing their PCs to work to improve their productivity in the 1970s; this is similar to the __________ phenomenon today.

A)AI
B)BYOD
C)ERP
D)RFID
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
7
This stage in the evolution of the modern IT infrastructure was characterized by remote job entry.

A)Enterprise computing
B)LANs (client/server computing)
C)Mainframe and dumb terminals
D)Stand-alone mainframe
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
8
Google Drive is an example of a ___________ cloud.

A)Hybrid
B)Private
C)Public
D)Vertical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
9
____________ clouds are the least expensive.

A)Hybrid
B)Private
C)Public
D)Vertical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
10
This stage in the evolution of the modern IT infrastructure was characterized by IT personnel being the only one with access.

A)Enterprise computing
B)LANs (client/server computing)
C)Mainframe and dumb terminals
D)Stand-alone mainframe
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
11
This stage in the evolution of the modern IT infrastructure represented the original BYOD phenomenon.

A)Cloud and mobile computing
B)Enterprise computing
C)LANs (client/server computing)
D)Stand-alone PCs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
12
A ________________ cloud is also called a corporate cloud.

A)Hybrid
B)Private
C)Public
D)Vertical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
13
This stage in the evolution of the modern IT infrastructure was characterized by connecting personal PCs to work systems.

A)Cloud and mobile computing
B)Enterprise computing
C)LANs (client/server computing)
D)Stand-alone PCs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
14
________________ clouds are proprietary data centers that integrate servers, storage, networks, data, and applications.

A)Hybrid
B)Private
C)Public
D)Vertical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
15
Enterprise computing was introduced in the _____________________.

A)1950s
B)1960s
C)1970s
D)1990s
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
16
Systems like ERP, CRM, and SCM were introduced in the _________ stage in the evolution of the modern IT infrastructure.

A)Enterprise computing
B)LANs (client/server computing)
C)Mainframe and dumb terminals
D)Stand-alone mainframe
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
17
______________________ is NOT a benefit of virtualization.

A)Lower fixed costs
B)Lower variable costs
C)Redundancy
D)Scalability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
18
Cloud computing _____________________, which means a customer can access needed computing resources automatically.

A)encompasses the characteristics of grid computing
B)encompasses the characteristics of utility computing
C)provides on-demand self-service
D)utilizes broad network access
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
19
SaaS is a type of __________ computing.

A)Grid
B)Mainframe
C)Mobile
D)Utility
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
20
This stage in the evolution of the modern IT infrastructure was characterized by sharing pools of resources over a network, usually the internet.

A)Cloud computing
B)Enterprise computing
C)LANs (client/server computing)
D)Mainframe and dumb terminals
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
21
Cloud computing delivers computing services ___________ on-premise computing.

A)at the same time as
B)can't compete with
C)faster than
D)slower than
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
22
Which of the following is a benefit of cloud computing?

A)Privacy
B)Productivity
C)Reliability
D)Security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
23
_____________________________ is a service that delivers hardware networking capabilities, including the use of servers, networking, and storage over the cloud using a pay-per-use revenue model.

A)DaaS
B)IaaS
C)PaaS
D)SaaS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
24
Cloud computing can enable companies to collect massive amounts of data and then use sophisticated algorithms to make sense of that data to create better products and services.This characterizes which of the following benefits of cloud computing?

A)Customizing products and services
B)Expanding the scope of business operations
C)Mining insights from data
D)Responding quickly to market changes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
25
With _________, the customer manages applications and data while the vendor manages the operating system, servers, virtualization, storage, and networking.

A)DaaS
B)IaaS
C)PaaS
D)SaaS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
26
With _______________, the user has no control of software beyond user configuration.

A)IaaS
B)OaaS
C)PaaS
D)SaaS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
27
IaaS, PaaS, and SaaS shift IT from a(n)_________________ expense, which means IT is ____________ cost.

A)capital to an operating; fixed rather than variable
B)capital to an operating; variable rather than fixed
C)operating to a capital; fixed rather than variable
D)operating to a capital; variable rather than fixed
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
28
Cloud computing can enable companies to shift from capital expenses to operational expenses.This characterizes which of the following benefits of cloud computing?

A)Expanding the scope of business operations
B)Making individuals more productive
C)Mining insights from data
D)Reducing costs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
29
_____________________ allows customers to both run existing applications and to develop and test new applications.

A)DaaS
B)IaaS
C)PaaS
D)SaaS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
30
Vertical clouds are similar to ___________.

A)extranets
B)intranets
C)internets
D)suppliernets
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
31
If your IT department doesn't want to move to cloud computing because they don't want to learn how to manage and maintain a new system, this reflects the following cloud computing concern:

A)Legacy IT systems
B)Privacy
C)Reliability
D)Security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
32
Which of the following is NOT a reason cloud computing has a positive impact on employees?

A)It allows employees to use whatever device they want.
B)It gives them access to organizational information no matter where they are.
C)It helps them save money since they can do everything on a single device.
D)It increases their overall productivity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
33
With ____________, the customer manages applications, data, and the operating system while the vendor manages the servers, virtualization, storage, and networking.

A)DaaS
B)IaaS
C)PaaS
D)SaaS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
34
Unlike private clouds, public clouds have a problem with ________.

A)Legacy IT systems
B)Privacy
C)Reliability
D)Security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
35
With _________, the vendor manages the applications and data.

A)IaaS
B)OaaS
C)PaaS
D)SaaS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
36
With ____________, the customer manages the operating system.

A)DaaS
B)IaaS
C)PaaS
D)SaaS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
37
When a site like Google Docs becomes unavailable for any period of time, this fuels the cloud computing concern of ________.

A)Legacy IT systems
B)Privacy
C)Reliability
D)Security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
38
Scalability benefits organizations by ______________.

A)creating a competitive advantage
B)improving organizational flexibility
C)positively impacting employees
D)saving money
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
39
______________ clouds are the most secure because they can be placed behind an organization's firewall.

A)Hybrid
B)Private
C)Public
D)Vertical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
40
Moving legacy systems to the cloud is difficult. Which of the following does NOT explain this phenomenon?

A)Complexity
B)Money spent
C)Security
D)User resistance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
41
Safe harbors address the concerns associated with __________.

A)Criminal use of cloud computing
B)Legacy IT systems
C)Reliability of cloud computing services
D)The regulatory and legal environment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
42
_________ is a registry for searching web services.

A)SOAP
B)XML
C)UDDI
D)WSDL
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
43
Least privilege is a concept associated with ___________________.

A)Legacy IT systems
B)Privacy
C)Reliability
D)Security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
44
Which of the following is NOT a web service protocol?

A)EDI
B)SOAP
C)XML
D)UDDI
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
45
______________________________________________________ is a technology that uses software-based partitions to create multiple virtual servers on a single physical server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
46
Anonymity on the internet enhances the problems associated with _______.

A)Criminal use of cloud computing
B)Legacy IT systems
C)Reliability of cloud computing services
D)The regulatory and legal environment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
47
A collection of web services constitutes a ___________.

A)self-service architecture
B)service-oriented architecture
C)service-level package
D)Software-as-a-Service package
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
48
Utility computing service providers charge a flat rate for the computer services they provide.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
49
_______ describes how data should look on a web site; ______ describes data being exchanged between business partners.

A)EDI; HTML
B)EDI; XML
C)HTML; XML
D)XML; HTML
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
50
__________ is used to create the XML document that describes the tasks performed by the various web services.

A)HTML
B)SOAP
C)UDDI
D)WSDL
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
51
Private clouds are access through an intranet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
52
__________ is a set of rules that define how messages can be exchanged among different network systems and applications through the use of XML.

A)HTML
B)SOAP
C)UDDI
D)WSDL
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
53
DaaS is a type of SaaS.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
54
We are currently in the _____________________________________ stage in the evolution of the modern IT infrastructure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
55
Cloud computing allows organizations to shift from capital expenses to operational expenses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
56
HTML and XML are both used to design web pages.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
57
The US-China Safe Harbor is a streamlined process for US companies to comply with the Chinese directive on the protection of personal data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
58
The stand-alone mainframe is synonymous with legacy systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
59
Web services are applications delivered over ______________ that MIS professionals can select and combine through almost any device.

A)an extranet
B)an intranet
C)the internet
D)the telephone
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
60
PCI compliance addresses reliability issues in cloud computing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
61
______________________________ clouds are shared, easily accessible, multicustomer IT infrastructures that are available nonexclusively to any entity in the general public (individuals, groups, and/or organizations).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
62
Cloud computing poses a major threat to ___________________________ because the providers control, and thus lawfully or unlawfully monitor, the data and communication stored between the user and the host company.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
63
List, describe, and provide an example of the six cloud computing characteristics. What are the business benefits of each of these characteristics?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
64
The different stages in the evolution of the modern IT infrastructure can be cumulative. Provide an example of how a modern organization could utilize each type of technology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
65
List and describe the three main cloud computing service models, including what the customer and vendor manages for each one. If you were running your own business and wanted to use these models, how would you determine which one is best for the business?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
66
List and describe the four types of clouds. How could an organization like Walmart utilize each of these cloud types?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
67
IT _______________________________ expenses tend to be more expensive than
routine IT __________________________ expenses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
68
In the _____________________________________-as-a-service model, customers rent servers, operating systems, storage, a database, software development technologies, and network capacity over the internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
69
Do you think the benefits of cloud computing outweigh the risks? Why or why not? Under what circumstances would you be willing to use cloud computing?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
70
___________________________ markup language is used to design the "look and feel" of a web page.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 70 في هذه المجموعة.