Deck 11: Managing Internal Operations
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/85
Play
Full screen (f)
Deck 11: Managing Internal Operations
1
A business-driven IT architectural approach that supports integrating a business as linked, repeatable tasks or services, is a description of which architecture trend that are quickly becoming requirements for business?
A) Service Oriented Architectures
B) Virtualization
C) Grid Computing
D) Cloud Computing
A) Service Oriented Architectures
B) Virtualization
C) Grid Computing
D) Cloud Computing
A
Explanation: Service oriented architecture (SOA) is a business-driven IT architectural approach that supports integrating a business as linked, repeatable tasks or services.
Explanation: Service oriented architecture (SOA) is a business-driven IT architectural approach that supports integrating a business as linked, repeatable tasks or services.
2
What includes the plans for how an organization will build, deploy, use, and share its data, processes, and IT assets?
A) Enterprise architect
B) Data architecture
C) Enterprise architecture
D) Infrastructure architecture
A) Enterprise architect
B) Data architecture
C) Enterprise architecture
D) Infrastructure architecture
C
Explanation: This is the definition of enterprise architecture.
Explanation: This is the definition of enterprise architecture.
3
Recovery is defined as:
A) An exact copy of a system's information
B) The ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup
C) A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
D) A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time
A) An exact copy of a system's information
B) The ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup
C) A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
D) A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time
B
Explanation: This is the definition of recovery.
Explanation: This is the definition of recovery.
4
What is a backup?
A) An exact copy of a system's information
B) The ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup
C) A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
D) A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time
A) An exact copy of a system's information
B) The ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup
C) A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
D) A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
5
What is a capability of Grid computing?
A) Optimize computing and data resources
B) Pool computing and data resources them for large-capacity workloads
C) Share computing and data resources them across networks
D) All are benefits Grid Computing
A) Optimize computing and data resources
B) Pool computing and data resources them for large-capacity workloads
C) Share computing and data resources them across networks
D) All are benefits Grid Computing
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
6
What determines how applications integrate and relate to each other?
A) Application architecture
B) Data architecture
C) Enterprise architecture
D) Infrastructure architecture
A) Application architecture
B) Data architecture
C) Enterprise architecture
D) Infrastructure architecture
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
7
A form of client/server computing operating over the Internet where the term "cloud" is used as a metaphor for the term "Internet", is a description of which architecture trend that are quickly becoming requirements for business?
A) Service Oriented Architectures
B) Virtualization
C) Grid Computing
D) Cloud Computing
A) Service Oriented Architectures
B) Virtualization
C) Grid Computing
D) Cloud Computing
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
8
What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood?
A) Cold site
B) Hot site
C) Disaster recovery cost curve chart
D) Disaster recovery plan
A) Cold site
B) Hot site
C) Disaster recovery cost curve chart
D) Disaster recovery plan
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
9
What includes the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization's goals?
A) Application architecture
B) Data architecture
C) Enterprise architecture
D) Infrastructure architecture
A) Application architecture
B) Data architecture
C) Enterprise architecture
D) Infrastructure architecture
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following is not one of the three components of an enterprise architecture?
A) Application architecture
B) Data architecture
C) Services architecture
D) Infrastructure architecture
A) Application architecture
B) Data architecture
C) Services architecture
D) Infrastructure architecture
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
11
"A framework of dividing the resources of a computer into multiple execution environments", is a description of which architecture trend that are quickly becoming requirements for business?
A) Service Oriented Architectures
B) Virtualization
C) Grid Computing
D) Cloud Computing
A) Service Oriented Architectures
B) Virtualization
C) Grid Computing
D) Cloud Computing
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
12
What is a separate and fully equipped facility where the company can move immediately after a disaster and resume business?
A) Cold site
B) Hot site
C) Disaster recovery cost curve chart
D) Disaster recovery plan
A) Cold site
B) Hot site
C) Disaster recovery cost curve chart
D) Disaster recovery plan
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
13
What is fault tolerance?
A) An exact copy of a system's information
B) The ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup
C) A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
D) A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time
A) An exact copy of a system's information
B) The ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup
C) A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
D) A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
14
What refers to how well a system can adapt to increased demands?
A) Scalability
B) Capacity planning
C) Reliability
D) Availability
A) Scalability
B) Capacity planning
C) Reliability
D) Availability
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is not a component of an data architecture?
A) Backup and recovery
B) Disaster recovery
C) Web services
D) Information security
A) Backup and recovery
B) Disaster recovery
C) Web services
D) Information security
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
16
Which architecture identifies where and how important data, like customer records, are maintained and secured?
A) Enterprise architect
B) Data architecture
C) Enterprise architecture
D) Infrastructure architecture
A) Enterprise architect
B) Data architecture
C) Enterprise architecture
D) Infrastructure architecture
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
17
What is failover?
A) An exact copy of a system's information
B) The ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup
C) A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
D) A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time
A) An exact copy of a system's information
B) The ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup
C) A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
D) A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
18
What is a benefit of Grid computing?
A) Improving productivity and collaboration of virtual organizations.
B) Allowing widely dispersed departments and businesses to create virtual organizations to share data.
C) Providing instantaneous access to massive computing and data resources.
D) All of the above
A) Improving productivity and collaboration of virtual organizations.
B) Allowing widely dispersed departments and businesses to create virtual organizations to share data.
C) Providing instantaneous access to massive computing and data resources.
D) All of the above
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
19
"An aggregation of geographically dispersed computing, storage, and network resources, coordinated to deliver improved performance, higher quality of service, better utilization, and easier access to data", is a description of which architecture trend that are quickly becoming requirements for business?
A) Service Oriented Architectures
B) Virtualization
C) Grid Computing
D) Cloud Computing
A) Service Oriented Architectures
B) Virtualization
C) Grid Computing
D) Cloud Computing
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
20
What is recovery?
A) The ability to get a system up and running in the event of a system crash
B) The ability to get a system up and running in the event of a system failure
C) Restoring the information backup
D) All of the above
A) The ability to get a system up and running in the event of a system crash
B) The ability to get a system up and running in the event of a system failure
C) Restoring the information backup
D) All of the above
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
21
What measures how quickly a system performs a certain process or transaction in terms of efficiency IT metrics of both speed and throughput?
A) Reliability
B) Availability
C) Flexibility
D) Performance
A) Reliability
B) Availability
C) Flexibility
D) Performance
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following is not a component of an application architecture?
A) Services
B) Open system
C) Events
D) Capacity planning
A) Services
B) Open system
C) Events
D) Capacity planning
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
23
What are Web services?
A) Contains a repertoire of Web-based data and procedural resources that use shared protocols and standards permitting different applications to share data and services
B) The capability of two or more computer systems to share data and resources, even though they are made by different manufacturers
C) A broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them
D) A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
A) Contains a repertoire of Web-based data and procedural resources that use shared protocols and standards permitting different applications to share data and services
B) The capability of two or more computer systems to share data and resources, even though they are made by different manufacturers
C) A broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them
D) A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following is not a primary business goal of enterprise architectures?
A) Reduce costs/improve productivity
B) Improve customer satisfaction
C) Generate goals
D) Create competitive advantages
A) Reduce costs/improve productivity
B) Improve customer satisfaction
C) Generate goals
D) Create competitive advantages
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
25
What type of backup strategy would you recommend to an organization that deals with small amounts of non-critical information?
A) Hourly
B) Daily
C) Weekly
D) All of the above
A) Hourly
B) Daily
C) Weekly
D) All of the above
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
26
What is the primary difference between the different types of backup/recovery media?
A) Speed
B) Cost
C) Expense
D) All of the above
A) Speed
B) Cost
C) Expense
D) All of the above
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
27
A widely held but difficult-to-achieve standard of availability for a system or product is known as __________.
A) five 8s
B) three 9s
C) four 9s
D) five 9s
A) five 8s
B) three 9s
C) four 9s
D) five 9s
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
28
Availability is typically measured relative to __________.
A) 100 percent operational
B) never failing
C) all of the above
D) none of the above
A) 100 percent operational
B) never failing
C) all of the above
D) none of the above
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
29
What is an open system?
A) Contains a repertoire of Web-based data and procedural resources that use shared protocols and standards permitting different applications to share data and services
B) The capability of two or more computer systems to share data and resources, even though they are made by different manufacturers
C) A broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them
D) Any program whose source code is made available for use or modification as users or other developers see fit.
A) Contains a repertoire of Web-based data and procedural resources that use shared protocols and standards permitting different applications to share data and services
B) The capability of two or more computer systems to share data and resources, even though they are made by different manufacturers
C) A broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them
D) Any program whose source code is made available for use or modification as users or other developers see fit.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
30
What does the disaster recovery cost curve chart?
A) The cost to the organization of the unavailability of information
B) The cost to the organization of recovering from a disaster over time
C) The cost to the organization of the unavailability of technology
D) All of the above
A) The cost to the organization of the unavailability of information
B) The cost to the organization of recovering from a disaster over time
C) The cost to the organization of the unavailability of technology
D) All of the above
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following is not a characteristic of a solid infrastructure architecture?
A) Flexibility
B) Scalability
C) Integrity
D) Performance
A) Flexibility
B) Scalability
C) Integrity
D) Performance
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
32
What type of backup strategy would you recommend to an organization that deals with large volumes of critical information?
A) Hourly
B) Daily
C) Weekly
D) Monthly
A) Hourly
B) Daily
C) Weekly
D) Monthly
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
33
What addresses when systems can be accessed by employees, customers, and partners?
A) Scalability
B) Capacity planning
C) Reliability
D) Availability
A) Scalability
B) Capacity planning
C) Reliability
D) Availability
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
34
What is a separate facility that does not have any computer equipment, but is a place where employees can move after the disaster.
A) Disaster recovery plan
B) Disaster recovery cost curve
C) Hot site
D) Cold site
A) Disaster recovery plan
B) Disaster recovery cost curve
C) Hot site
D) Cold site
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
35
What ensures all systems are functioning correctly and providing accurate information?
A) Reliability
B) Availability
C) Flexibility
D) Performance
A) Reliability
B) Availability
C) Flexibility
D) Performance
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
36
What is interoperability?
A) Contains a repertoire of Web-based data and procedural resources that use shared protocols and standards permitting different applications to share data and services
B) The capability of two or more computer systems to share data and resources, even though they are made by different manufacturers
C) A broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them
D) A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
A) Contains a repertoire of Web-based data and procedural resources that use shared protocols and standards permitting different applications to share data and services
B) The capability of two or more computer systems to share data and resources, even though they are made by different manufacturers
C) A broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them
D) A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
37
What addresses the timeframes when systems can be accessed by employees, customers, and partners?
A) Reliability
B) Availability
C) Flexibility
D) Performance
A) Reliability
B) Availability
C) Flexibility
D) Performance
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
38
What is an open system?
A) Contains a repertoire of Web-based data and procedural resources that use shared protocols and standards permitting different applications to share data and services
B) The capability of two or more computer systems to share data and resources, even though they are made by different manufacturers
C) A broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them
D) A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
A) Contains a repertoire of Web-based data and procedural resources that use shared protocols and standards permitting different applications to share data and services
B) The capability of two or more computer systems to share data and resources, even though they are made by different manufacturers
C) A broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them
D) A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following is a type of backup/recovery media?
A) DVD
B) Tape
C) Disk
D) All of the above
A) DVD
B) Tape
C) Disk
D) All of the above
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
40
What determines the future IT infrastructure requirements for new equipment and additional network capacity?
A) Scalability
B) Capacity planning
C) Reliability
D) Availability
A) Scalability
B) Capacity planning
C) Reliability
D) Availability
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
41
The primary characteristics of a solid infrastructure include flexibility, scalability, reliability, availability, and performance.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
42
What are the top international telecommunications issues that are technology and country-oriented?
A) Managing network infrastructure across countries
B) Managing international integration of technologies
C) Dealing with international tariff structures
D) All of the above.
A) Managing network infrastructure across countries
B) Managing international integration of technologies
C) Dealing with international tariff structures
D) All of the above.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
43
Storm computing is a form of client/server computing operating over the Internet where the term "cloud" is used as a metaphor for the term "Internet."
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
44
Which one of the following is not a network issue related to international telecommunications?
A) Handling international politics
B) Improving operational efficiency of networks
C) Dealing with different networks
D) Controlling data communication security
A) Handling international politics
B) Improving operational efficiency of networks
C) Dealing with different networks
D) Controlling data communication security
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
45
Many corporate executives are hesitant to take advantage of cloud computing because of the lack of control over their company's data and information.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
46
Web services are based on ________ language for documents containing structured information?
A) Formula Translation
B) Extensible Markup
C) Common Business Oriented
D) Java
A) Formula Translation
B) Extensible Markup
C) Common Business Oriented
D) Java
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
47
What are the regulatory issues concerning international telecommunications?
A) Dealing with trans-border data flow restrictions
B) Managing international telecommunication regulations
C) Handling international politics
D) All of the above.
A) Dealing with trans-border data flow restrictions
B) Managing international telecommunication regulations
C) Handling international politics
D) All of the above.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
48
What are the technical concepts of SOA?
A) Services as business tasks
B) Interoperability, the capability of two or more computer systems to share data and resources
C) Loose coupling, the capability of services to be joined together on demand to create composite services or disassembled just as easily into their functional components,
D) All of the above.
A) Services as business tasks
B) Interoperability, the capability of two or more computer systems to share data and resources
C) Loose coupling, the capability of services to be joined together on demand to create composite services or disassembled just as easily into their functional components,
D) All of the above.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
49
What are the top international telecommunications issues that are network related?
A) Improving operational efficiency of networks
B) Dealing with different networks
C) Controlling data communication security
D) All of the above.
A) Improving operational efficiency of networks
B) Dealing with different networks
C) Controlling data communication security
D) All of the above.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
50
Virtualization is a framework of dividing the resources of a computer into multiple execution environments.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
51
Loose coupling is the capability of services to be joined together on demand to create composite services, or disassembled just as easily into their functional components.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
52
Which one of the following is not a regulatory issue concerning international telecommunications?
A) Dealing with trans-border data flow restrictions
B) Improving operational efficiency of networks
C) Managing international telecommunication regulations
D) Handling international politics
A) Dealing with trans-border data flow restrictions
B) Improving operational efficiency of networks
C) Managing international telecommunication regulations
D) Handling international politics
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
53
Infrastructure architecture identifies where and how important data, like customer records, is maintained and secured.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
54
One of the advantages of the cloud computing approach is the loss of control over the applications that are used.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
55
Fault tolerance is a computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service.Fault tolerance can be provided with software, or embedded in hardware, or provided by some combination
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
56
What is loose coupling?
A) Contains a repertoire of Web-based data and procedural resources that use shared protocols and standards permitting different applications to share data and services
B) The capability of services to be joined together on demand to create composite services, or disassembled just as easily into their functional components.
C) A broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them
D) The capability of two or more computer systems to share data and resources, even though they are made by different manufacturers
A) Contains a repertoire of Web-based data and procedural resources that use shared protocols and standards permitting different applications to share data and services
B) The capability of services to be joined together on demand to create composite services, or disassembled just as easily into their functional components.
C) A broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them
D) The capability of two or more computer systems to share data and resources, even though they are made by different manufacturers
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
57
Cloud computing offsets the need for organizations to purchase software and software licenses for applications.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
58
Web services are the capability of two or more computer systems to share data and resources, even though they are made by different manufacturers.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
59
Organizations should not choose a backup and recovery strategy that is in line with its business goals
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
60
Technically, Web services are based on Extensible Markup Language (XML), a markup language for documents containing structured information.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
61
Describe how an organization can implement a solid data architecture.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
62
One of the ____________________ of the cloud computing approach is the loss of control over the applications that are used.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
63
Many corporate executives are hesitant to take ______________ of cloud computing because of the lack of control over their company's data and information
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
64
__________________ is a framework of dividing the resources of a computer into multiple execution environments.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
65
A(n) ______________ site is a separate and fully equipped facility where the company can move immediately after a disaster and resume business.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
66
____________________ is a form of client/server computing operating over the Internet where the term "cloud" is used as a metaphor for the term "Internet."
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
67
_________ ensured all systems are functioning correctly and providing accurate information.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
68
____________ architecture determines how applications integrate and relate to each other.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
69
Managing ___________ access to information is a critical piece of the data architecture.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
70
A(n) ______________ site is a separate facility that does not have any computer equipment, but is a place where employees can move after the disaster.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
71
___________ architectures include the plans for how an organization will build, deploy, use, and share its data, processes, and IT assets.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
72
____________ is a backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
73
______ is the capability of services to be joined together on demand to create composite services, or disassembled just as easily into their functional components.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
74
Compare Web services and open systems.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
75
Explain the three components of an enterprise architecture.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
76
Technically, Web services are based on _______ language for documents containing structured information.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
77
Organizations should choose a _________________ and recovery strategy that is in line with its business goals
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
78
____________ refers to how well a system can adapt to increased demands.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
79
______________ offsets the need for organizations to purchase software and software licenses for applications.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
80
List and describe the five qualities of an infrastructure architecture.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck