Plug-In B04 Mis Infrastructures nan Exam Questions - Test Bank | Business Driven Tech 8e by Paige Baltzan by Paige Baltzan. DOCX document preview.

Plug-In B04 Mis Infrastructures nan Exam Questions

Business Driven Technology, 8e (Baltzan)

Plug-In B04 MIS Infrastructures

1) MIS infrastructure is a communications system created by linking two or more devices and establishing a standard methodology for communication.

2) Every company, regardless of size, relies on some form of MIS infrastructure, whether it is a few personal computers networked together or many interconnected around the world.

3) Hardware consists of the physical devices associated with a computer system, where software is the set of instructions the hardware executes to carry out specific tasks.

4) Software is the set of instructions the hardware executes to carry out specific tasks.

5) Software consists of the physical devices associated with a computer system.

6) Hardware is the set of instructions the hardware executes to carry out specific tasks.

7) A network is a communications system created by linking two or more devices and establishing a standard methodology in which they can communicate.

8) A client is a computer designed to request information from a server.

9) A server is a computer dedicated to providing information in response to requests.

10) A server is a computer designed to request information from a client.

11) A client is a computer dedicated to providing information in response to requests.

12) A good way to understand the client-server relationship is when someone uses a web browser (this would be the client) to access a website (this would be a server that would respond with the web page being requested by the client).

13) There are three primary areas where enterprise architects focus when maintaining a firm's MIS infrastructure including information MIS infrastructure, agile MIS infrastructure, and sustainable MIS infrastructures.

14) If you want to support business operations you will focus on building a strong information MIS infrastructure, which identifies where and how important information, such as customer records, is maintained and secured.

15) If you want to support organization change you will focus on building a strong information MIS infrastructure, which identifies where and how important information, such as customer records, is maintained and secured.

16) If you want to support the environment you will focus on building a strong sustainable MIS infrastructure, which identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption.

17) Software is a computer designed to request information from a server.

18) Hardware is a computer dedicated to providing information in response to requests.

19) An enterprise architect is a person grounded in technology, fluent in business, and able to provide the important bridge between MIS and the business.

20) The ability to get a system up and running in the event of a system crash or failure that includes restoring the company information is called a failover.

21) Failback occurs when the primary machine recovers and resumes operations, taking over from the secondary server.

22) Fault tolerance is an exact copy of a system's information.

23) The three primary areas of support provided by information infrastructure are backup and recovery, disaster recovery plan, and the business continuity plan.

24) Failover backs up an exact copy of a system's information.

25) A backup is an exact copy of a system's information.

26) Recovery is the ability to get a system up and running in the event of a system crash or failure that includes restoring the information backup.

27) Failover is a specific type of fault tolerance that occurs when a redundant storage server offers an exact replica of the real-time data, and if the primary server crashes, the users are automatically directed to the secondary server or backup server. This is a high-speed and high-cost method of backup and recovery.

28) Failover occurs when the primary machine recovers and resumes operations, taking over from the secondary server.

29) Failback is a specific type of fault tolerance that occurs when a redundant storage server offers an exact replica of the real-time data, and if the primary server crashes, the users are automatically directed to the secondary server or backup server.

30) Disasters such as power outages, fires, floods, hurricanes, and even malicious activities such as hackers and viruses strike companies every day. Disasters can have effects on disrupting communications, damaging physical infrastructures, halting transportation, and blocking utilities.

31) A hot site is a separate and fully equipped facility where the company can move immediately after a disaster and resume business.

32) A cold site is a separate facility that does not have any computer equipment but is a place where employees can move after a disaster.

33) A warm site is a separate facility with computer equipment that requires installation and configuration.

34) A warm site is a separate and fully equipped facility where the company can move immediately after a disaster and resume business.

35) A warm site is a separate facility that does not have any computer equipment but is a place where employees can move after a disaster.

36) A cold site is a separate facility with computer equipment that requires installation and configuration.

37) An emergency is a sudden, unexpected event requiring immediate action due to potential threat to health and safety, the environment, or property.

38) Emergency preparedness ensures a company is ready to respond to an emergency in an organized, timely, and effective manner.

39) Business impact analysis details how a company recovers and restores critical business operations and systems after a disaster or extended disruption.

40) A business impact analysis identifies all critical business functions and the effect that a specific disaster may have upon them.

41) A business continuity planning identifies all critical business functions and the effect that a specific disaster may have upon them.

42) A business impact analysis occurs when the ability of a company to operate is impaired because of a hardware, software, or data outage.

43) A cold site can destroy large amounts of vital data, often causing incidents, unplanned interruption of a service.

44) An emergency contains all of the details of an incident.

45) Incident management is the process responsible for managing how incidents are identified and corrected.

46) Technology recovery strategies focus specifically on prioritizing the order for restoring hardware, software, and data across the organization that best meets business recovery requirements.

47) Accessibility refers to the varying levels that define what a user can access, view, or perform when operating a system.

48) Top-level MIS employees require administrator access, or unrestricted access to the entire system. Administrator access can perform functions such as resetting passwords, deleting accounts, and shutting down entire systems.

49) High availability occurs when a system is continuously operational at all times.

50) Availability refers to the time frames when the system is operational.

51) A system is called unavailable when it is not operating and cannot be used.

52) Portability refers to the ability of an application to operate on different devices or software platforms, such as different operating systems.

53) Scalability describes how well a system can scale up, or adapt to the increased demands of growth. If a company grows faster than anticipated, it might experience a variety of problems, from running out of storage space to taking more time to complete transactions. Anticipating expected, and unexpected, growth is key to building scalable systems that can support that development.

54) Reliability means the system functions correctly and provides accurate information.

55) Usability is the degree to which a system is easy to learn and efficient and satisfying to use.

56) Maintainability means the system quickly transforms to support environmental changes.

57) Performance measures how quickly a system performs a process or transaction.

58) Capacity planning determines future environmental infrastructure requirements to ensure high-quality system performance.

59) Vulnerability is a system weakness that can be exploited by a threat.

60) Serviceability is how quickly a third-party or vendor can change a system to ensure it meets user needs and the terms of any contracts including agreed levels of reliability, maintainability or availability.

61) Capacity represents the maximum throughput a system can deliver, for example the capacity of a hard drive represents the size or volume.

62) Web accessibility means that people with disabilities including visual, auditory, physical, speech, cognitive, and neurological disabilities can use the Web.

63) The Web accessibility initiative (WAI) brings together people from industry, disability organizations, government, and research labs from around the world to develop guidelines and resources to help make the Web accessible to people with disabilities including auditory, cognitive, neurological, physical, speech, and visual disabilities.

64) Availability refers to the varying levels that define what a user can access, view, or perform when operating a system.

65) Unavailability occurs when a system is continuously operational at all times.

66) Accessibility refers to the time frames when the system is operational.

67) A system is called available when it is not operating and cannot be used.

68) Scalability refers to the ability of an application to operate on different devices or software platforms, such as different operating systems.

69) Portability describes how well a system can scale up, or adapt to the increased demands of growth.

70) Maintainability means the system functions correctly and provides accurate information.

71) Web accessibility is the degree to which a system is easy to learn and efficient and satisfying to use.

72) Serviceability means the system quickly transforms to support environmental changes.

73) Scalability measures how quickly a system performs a process or transaction.

74) Maintainability determines future environmental infrastructure requirements to ensure high-quality system performance.

75) Reliability is a system weakness that can be exploited by a threat.

76) Usability is how quickly a third party or vendor can change a system to ensure it meets user needs and the terms of any contracts including agreed levels of reliability, maintainability or availability.

77) Flexibility represents the maximum throughput a system can deliver, for example the flexibility of a hard drive represents the size or volume.

78) Availability means that people with disabilities including visual, auditory, physical, speech, cognitive, and neurological disabilities can use the web.

79) Administrator access initiative brings together people from industry, disability organizations, government, and research labs from around the world to develop guidelines and resources to help make the web accessible to people with disabilities including auditory, cognitive, neurological, physical, speech, and visual disabilities.

80) What is an information MIS infrastructure?

A) Identifies where and how important information, such as customer records, is maintained and secured

B) Includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization's goals

C) Infrastructure identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption

D) Includes the plans for how a firm will build, deploy, use, and share its data, processes, and MIS assets

81) What is an agile MIS infrastructure?

A) Identifies where and how important information, such as customer records, is maintained and secured

B) Includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization's goals

C) Infrastructure identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption

D) Includes the plans for how a firm will build, deploy, use, and share its data, processes, and MIS assets

82) What is a sustainable MIS infrastructure?

A) Identifies where and how important information, such as customer records, is maintained and secured

B) Includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization's goals

C) Infrastructure identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption

D) Includes the plans for how a firm will build, deploy, use, and share its data, processes, and MIS assets

83) What is an MIS infrastructure?

A) Identifies where and how important information, such as customer records, is maintained and secured

B) Includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization's goals

C) Infrastructure identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption

D) Includes the plans for how a firm will build, deploy, use, and share its data, processes, and MIS assets

84) Who is a person who is grounded in technology, fluent in business, and able to provide the important bridge between MIS and the business?

A) MIS infrastructure manager

B) MIS specialist

C) Enterprise architect

D) Enterprise manager

85) Which of the following is a benefit of a solid MIS infrastructure?

A) Reduces costs

B) Improves productivity

C) Optimizes business operations

D) All of these

86) What is the difference between hardware and software?

A) Hardware is the physical devices associated with a computer system, whereas software is the instructions the hardware executes to carry out tasks

B) They are both specific forms of clients

C) Hardware executes the instructions to carry out tasks, whereas software is the physical devices associated with a computer system

D) They are both specific forms of servers

87) What consists of the physical devices associated with a computer system?

A) Hardware

B) Software

C) Client

D) Server

88) What is the set of instructions the hardware executes to carry out specific tasks?

A) Hardware

B) Software

C) Client

D) Server

89) What is a communications system created by linking two or more devices and establishing a standard methodology in which they can communicate?

A) Network

B) Software

C) Client

D) Server

90) What is a computer designed to request information from a server?

A) Hardware

B) Software

C) Client

D) Server

91) What is a computer dedicated to providing information in response to requests?

A) Hardware

B) Software

C) Client

D) Server

92) What is hardware?

A) Consists of the physical devices associated with a computer system.

B) The set of instructions the hardware executes to carry out specific tasks.

C) A computer designed to request information from a server.

D) A computer dedicated to providing information in response to requests.

93) What is software?

A) Consists of the physical devices associated with a computer system.

B) The set of instructions the hardware executes to carry out specific tasks.

C) A computer designed to request information from a server.

D) A computer dedicated to providing information in response to requests.

94) What is a network?

A) Consists of the physical devices associated with a computer system.

B) The set of instructions the hardware executes to carry out specific tasks.

C) A computer designed to request information from a server.

D) A communications system created by linking two or more devices and establishing a standard methodology in which they can communicate.

95) What is a client?

A) Consists of the physical devices associated with a computer system.

B) The set of instructions the hardware executes to carry out specific tasks.

C) A computer designed to request information from a server.

D) A computer dedicated to providing information in response to requests.

96) What is a server?

A) Consists of the physical devices associated with a computer system.

B) The set of instructions the hardware executes to carry out specific tasks.

C) A computer designed to request information from a server.

D) A computer dedicated to providing information in response to requests.

97) An MIS infrastructure is ________.

A) dynamic and static

B) dynamic and continually changing

C) a client and a server

D) hardware and software

98) John works for Internal Computer Specialists, which focuses on helping small business owners resolve MIS infrastructure issues. John's tasks include cleaning and replacing motherboards, cables, and internal components such as DVDs and hard drives. What does John's role at Internal Computer Specialists focus on fixing?

A) Hardware

B) Clients

C) Backup

D) Recovery

99) Jessica started her own online company, which specializes in selling items for bachelorette parties, wedding parties, and baby showers. Due to the fact that she only operates online, her MIS infrastructure needs to be fast, efficient, and accurate ensuring the best possible experience for her customers. Which of the below is a critical component in Jessica's MIS infrastructure?

A) Hardware and software

B) Client

C) Server

D) All of these

100) What are the three business functions an MIS infrastructure supports?

A) Supports operations, change, and the environment or sustainability

B) Supports operations, customers, and ewaste

C) Supports operations, clients, and servers

D) Supports information, change, and business continuity planning

101) Which of the following include the three components of an MIS infrastructure?

A) Information MIS, aggregated MIS, and sustainable MIS infrastructures

B) Information MIS, operational MIS, and changing MIS infrastructures

C) Information MIS, agile MIS, and sustainable MIS infrastructures

D) Varies depending on the industry

102) Which characteristics support an agile MIS infrastructure?

A) Accessibility, availability, maintainability, portability, reliability, scalability, usability

B) Backup and recovery plan, disaster recovery plan, business continuity planning

C) Grid computing, cloud computing, and virtualization

D) Storage, network, and server virtualization

103) Which characteristics support a sustainable MIS infrastructure?

A) Accessibility, availability, maintainability, portability, reliability, scalability, usability

B) Backup and recovery plan, disaster recovery plan, business continuity planning

C) Grid computing, cloud computing, and virtualization

D) Storage, network, and server virtualization

104) Which characteristics support an information MIS infrastructure?

A) Accessibility, availability, maintainability, portability, reliability, scalability, usability

B) Backup and recovery plan, disaster recovery plan, business continuity planning

C) Grid computing, cloud computing, and virtualization

D) Storage, network, and server virtualization

105) Grid computing, cloud computing, and virtualization are all elements of a ________ MIS infrastructure.

A) agile

B) sustainable

C) information

D) virtualized

106) Accessibility, availability, maintainability, portability, reliability, scalability, usability are all elements of a(n) ________ MIS infrastructure.

A) agile

B) sustainable

C) information

D) virtualized

107) Backup and recovery plan, disaster recovery plan, business continuity planning are all elements of a(n) ________ MIS infrastructure.

A) agile

B) sustainable

C) information

D) virtualized

108) Which of the below represents the primary elements in an information MIS infrastructure?

A) Backup, recovery, disaster recovery, and business continuity planning

B) Backup, accessibility, and usability

C) Backup, cloud computing, and virtualization

D) Grid computing, cloud computing, and virtualization

109) The ________ MIS infrastructure identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption.

A) sustainable

B) information

C) virtualized

D) agile

110) The ________ MIS infrastructure identifies where and how important information, such as customer records, is maintained and secured.

A) sustainable

B) information

C) virtualized

D) agile

111) The ________ MIS infrastructure includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation.

A) information

B) virtualized

C) agile

D) sustainable

112) Francis works in the human resources division of a large oil and gas company in Texas. Francis' tasks include maintaining payroll and vacation records, employment histories, and benefit information along with ensuring the security of all sensitive employee information. Which MIS infrastructure is most important to Francis?

A) Information MIS infrastructure

B) Agile MIS infrastructure

C) Sustainable MIS infrastructure

D) Virtualized MIS infrastructure

113) The information MIS infrastructure supports the day-to-day business operations and plans for ________.

A) security breaches and theft

B) floods and earthquakes

C) malicious internet attacks

D) All of these

114) Each year businesses lose time and money because of system crashes and failures. Which of the following offers the best way to protect a system from crashes and failures?

A) Backup and recovery plans

B) Fault tolerance

C) Failover

D) All of these

115) Which of the following describes the difference between a backup plan and a recovery plan?

A) Recovery is an exact copy of a system's information, whereas backup is the ability to get a system up and running in the event of a system crash or failure

B) Backup is mandatory, whereas recovery is optional

C) Backup is an exact copy of a system's information, whereas recovery is the ability to get a system up and running in the event of a system crash or failure

D) Recovery is mandatory, whereas backup is optional

116) What occurs when a redundant storage server offers an exact replica of the real-time data, and if the primary server crashes, the users are automatically directed to a secondary server?

A) Failover

B) Disaster recovery cost curve

C) Reliability

D) Maintainability

117) What occurs when a primary machine recovers and resumes operations, taking over from a secondary server?

A) Failback

B) Disrupting communications

C) Warm site

D) Hot site

118) What has the ability to recover information or systems in the event of catastrophic disasters?

A) Recovery

B) Disaster recovery

C) Backup

D) Failback

119) Shawn works at the local electrical company in Nampa, ID, which provides electricity to the entire city of Boise. This area is prone to floods, high winds, and tornados. As the lead enterprise architect on the night shift, Shawn has been asked to suggest ways the company can protect its information MIS infrastructure. Shawn notices that the company does not have the ability for its systems to respond to unexpected failures or crashes and there is not a backup system that can automatically take over without a loss of serve to Boise residents. What should Shawn recommend his company implement?

A) Accessibility

B) Moore's law

C) Antivirus software

D) Fault tolerance

120) What creates a way for a company to recover and restore partially or completely interrupted critical functions within a predetermined time after a disaster or extended disruption?

A) Disaster recovery plan

B) Disaster recovery cost curve

C) Business continuity planning

D) Emergency notification system

121) What is the ability to get a system up and running in the event of a system crash or failure that includes restoring the information backup?

A) Failure tolerance

B) Recovery

C) Reliability

D) Capacity planning

122) Which of the below offers a low-speed and low-cost backup method?

A) DVD

B) Thumb drive

C) External hard drive

D) All of these

123) What question below would a company need to answer when first establishing a backup and recovery plan?

A) What types of storage mechanism will meet the needs of the company?

B) How often does the company need to backup its information?

C) What types of recovery systems does the company infrastructure need?

D) All of these

124) Which of the following is an effect a company could experience because of a disaster such as a fire, flood, or hurricane?

A) Disrupting communications

B) Damaging physical infrastructures

C) Halting transportation

D) All of these

125) To combat disasters a company can create a ________ that would detail the process for recovering information or a system in the event of a catastrophic disaster.

A) disaster recovery plan

B) database lookup initiative

C) management recovery plan

D) tornado threat plan

126) Within the sites that support disaster recovery, ________ is a separate facility that does not have any computer equipment but is a place where employees can move after a disaster.

A) hot site

B) cold site

C) warm site

D) disaster site

127) Within the sites that support disaster recovery, ________ is a separate and fully equipped facility where the company can move immediately after a disaster and resume business.

A) hot site

B) cold site

C) warm site

D) disaster site

128) Within the sites that support disaster recovery, ________ is a separate facility with computer equipment that requires installation and configuration.

A) hot site

B) cold site

C) warm site

D) disaster site

129) What is a hot site?

A) A separate and fully equipped facility where the company can move immediately after a disaster and resume business.

B) A separate facility that does not have any computer equipment but is a place where employees can move after a disaster.

C) A separate facility with computer equipment that requires installation and configuration.

D) A detailed process for recovering information or a system in the event of a catastrophic disaster.

130) What is a cold site?

A) A separate and fully equipped facility where the company can move immediately after a disaster and resume business.

B) A separate facility that does not have any computer equipment but is a place where employees can move after a disaster.

C) A separate facility with computer equipment that requires installation and configuration.

D) A detailed process for recovering information or a system in the event of a catastrophic disaster.

131) What is a warm site?

A) A separate and fully equipped facility where the company can move immediately after a disaster and resume business.

B) A separate facility that does not have any computer equipment but is a place where employees can move after a disaster.

C) A separate facility with computer equipment that requires installation and configuration.

D) A detailed process for recovering information or a system in the event of a catastrophic disaster.

132) What is a disaster recovery plan?

A) A separate and fully equipped facility where the company can move immediately after a disaster and resume business.

B) A separate facility that does not have any computer equipment but is a place where employees can move after a disaster.

C) A separate facility with computer equipment that requires installation and configuration.

D) A detailed process for recovering information or a system in the event of a catastrophic disaster.

133) A disaster recovery plan contains a ________ that outlines the costs to support the plan.

A) disaster organizational cost analysis

B) disaster recovery improvements

C) disaster financial costs

D) disaster recovery cost curve

134) What charts the cost to the company of the unavailability of information and technology and the cost to the company of recovering from a disaster over time?

A) Disaster organizational cost analysis

B) Disaster recovery improvements

C) Disaster financial costs

D) Disaster recovery cost curve

135) The optimal disaster recovery plan in terms of cost and time is where on the disaster recovery cost curve?

A) Where the two cost effects intersect

B) When the cost to the company of unavailability of information and technology is high

C) When the cost to the company of recovering from a disaster over time is high

D) When the two cost effects are furthest apart

136) What is a more comprehensive and all-encompassing plan that details how a company recovers and restores critical business operations and systems after a disaster or extended disruption?

A) Business continuity planning

B) Database management plan

C) Disaster recovery plan

D) Emergency recovery plan

137) What does a business continuity plan typically include?

A) How frequently the system backup is performed

B) Which systems and business processes are critical and the maximum amount of time the company can continue to operate without functioning systems

C) How quickly the system recovery needs to be performed

D) Where a hot site is located

138) What is an infrastructure built for notifying people in the event of an emergency?

A) Business operational plan

B) Business continuity plan

C) Emergency notification service

D) Emergency continuity plan

139) What are the different options where an emergency notification service can be deployed?

A) Through the firm's own infrastructure

B) By an outside service provider on company premises

C) By an outside service provider hosted remotely

D) All of these

140) Which of the following is an example of an emergency notification system?

A) Radio stations' occasional tests of the national alert system

B) Wireless alerts for promotional discounts

C) Text messages from your local grocery store

D) All of these

141) What is a sudden, unexpected event requiring immediate action due to potential threat to health and safety, the environment, or property?

A) Emergency

B) Emergency preparedness

C) Business Impact analysis

D) Technology failure

142) What ensures a company is ready to respond to an emergency in an organized, timely, and effective manner?

A) Emergency

B) Emergency preparedness

C) Business Impact analysis

D) Technology failure

143) What identifies all critical business functions and the effect that a specific disaster may have upon them?

A) Emergency

B) Emergency preparedness

C) Business impact analysis

D) Technology failure

144) What occurs when the ability of a company to operate is impaired because of a hardware, software, or data outage?

A) Emergency

B) Emergency preparedness

C) Business Impact analysis

D) Technology failure

145) What contains all of the details of an incident?

A) Technology failure

B) Incident record

C) Incident management

D) Technology recovery strategy

146) What occurs when the ability of a company to operate is impaired because of a hardware, software, or data outage?

A) Technology failure

B) Incident record

C) Incident management

D) Technology recovery strategy

147) What is the process responsible for managing how incidents are identified and corrected?

A) Technology failure

B) Incident record

C) Incident management

D) Technology recovery strategy

148) What focuses specifically on prioritizing the order for restoring hardware, software, and data across the organization that best meets business recovery requirements?

A) Technology failure

B) Incident record

C) Incident management

D) Technology recovery strategy

149) What are the seven characteristics of an agile MIS infrastructure?

A) Accessibility, availability, maintainability, portability, reliability, scalability, and usability

B) Accessibility, affordability, mobility, portability, reliability, scalability, and usability

C) Accessibility, availability, mobility, penetrability, responsibility, sensibility, and usability

D) Accessibility, affordability, functionality, changeability, constancy, sources, and understanding

150) Which term refers to the varying levels that define what a user can access, view, or perform when operating a system?

A) Availability

B) Accessibility

C) Usability

D) Responsibility

151) Enterprise architects require ________ access so they can perform such functions as resetting passwords or deleting accounts.

A) functional

B) infrastructure

C) restricted

D) administrator

152) Which term refers to the time frames when the system is operational?

A) Administrator access

B) Accessibility

C) Availability

D) Portability

153) What is the difference between unavailable and high availability?

A) High availability is when the system is not operating and can't be used, where unavailable is when a system is continuously operating at all times

B) Unavailable only refers to clients, where high availability refers to servers

C) Unavailable is when the system is not operating and can't be used, where high availability is when a system is continuously operating at all times

D) High availability only refers to clients, where unavailable refers to servers

154) What is a widely held but difficult to achieve standard of availability for a system?

A) "Five 9s" availability

B) "1%" minimum availability

C) The "five's accessibility" code

D) "Five 10s" availability

155) Which of the following agile MIS infrastructure characteristics refers to how quickly a system can transform to support environmental changes?

A) Maintainability

B) Scalability

C) Capacity planning

D) Portability

156) Which of the following agile MIS infrastructure characteristics refers to the ability of an application to operate on different devices or software platforms, such as different operating systems?

A) Reliability

B) Portability

C) Maintainability

D) Usability

157) What does reliability ensure?

A) The system has the ability to operate in many different operating systems

B) The system is easy to learn and efficient and satisfying to use

C) The system is functioning correctly and providing accurate information

D) The time frames when the system is operational

158) Why is estimating future growth a challenge for most companies?

A) Growth can occur because the company acquires new markets

B) Growth can occur because the company acquires new customers

C) Growth can occur because the company acquires new products

D) All of these

159) Which of the following describes how well a system can scale up, or adapt to the increased demands or growth?

A) Flexibility

B) Scalability

C) Reliability

D) Affordability

160) When building a scalable system that can support new company developments what are the key factors to consider?

A) Anticipating expected and unexpected growth

B) Organizing and deploying additional resources

C) Understanding competitor products and services

D) Analyzing the accessibility and availability of competitor systems

161) What measures how quickly a system performs a process or transaction?

A) Portability

B) Capacity planning

C) Performance

D) Sustainability

162) What determines future environmental infrastructure requirements that ensure high-quality system performance?

A) Capacity system

B) Capacity planning

C) Capacity function

D) Performance indicators

163) What is the primary reason a company has a failover system?

A) To use different systems continuously at the same time

B) To allow employees to work virtually

C) To take down the primary system for maintenance, while the secondary system activates to ensure continuous operations

D) All of these

164) What is usability?

A) The system is easy to learn and efficient and satisfying to use

B) The system functions correctly and provides accurate information

C) The system allows varying levels of access

D) The system quickly transforms to support environmental changes

165) What refers to how well a system can adapt to increased demands?

A) Scalability

B) Capacity planning

C) Reliability

D) Availability

166) Apple understood the importance of usability when it designed its ________.

A) PowerPoint software

B) antivirus software

C) fault tolerance system

D) iPod and iTunes system

167) What represents the maximum throughput a system can deliver, for example the capacity of a hard drive represents the size or volume?

A) Capacity

B) Web accessibility

C) Web accessibility initiative

D) Vulnerability

168) What means that people with disabilities including visual, auditory, physical, speech, cognitive, and neurological disabilities can use the web?

A) Capacity

B) Web accessibility

C) Web accessibility initiative

D) Vulnerability

169) What brings together people from industry, disability organizations, government, and research labs from around the world to develop guidelines and resources to help make the web accessible to people with disabilities including auditory, cognitive, neurological, physical, speech, and visual disabilities?

A) Capacity

B) Web accessibility

C) Web accessibility initiative

D) Vulnerability

170) What is a system weakness that can be exploited by a threat?

A) Capacity

B) Web accessibility

C) Web accessibility initiative

D) Vulnerability

171) Which of the following terms represents how quickly a third party or vendor can change a system to ensure it meets user needs and the terms of any contracts including agreed levels of reliability, maintainability or availability?

A) Capacity

B) Web accessibility

C) Serviceability

D) Vulnerability

172) What is administrator access?

A) Performs functions such as resetting passwords, deleting accounts, and shutting down entire systems.

B) Refers to the varying levels that define what a user can access, view, or perform when operating a system.

C) Refers to the time frames when the system is operational.

D) Refers to how quickly a system can transform to support environmental changes.

173) What is accessibility?

A) Performs functions such as resetting passwords, deleting accounts, and shutting down entire systems.

B) Refers to the varying levels that define what a user can access, view, or perform when operating a system.

C) Refers to the time frames when the system is operational.

D) Refers to how quickly a system can transform to support environmental changes.

174) What is availability?

A) Performs functions such as resetting passwords, deleting accounts, and shutting down entire systems.

B) Refers to the varying levels that define what a user can access, view, or perform when operating a system.

C) Refers to the time frames when the system is operational.

D) Refers to how quickly a system can transform to support environmental changes.

175) What is maintainability?

A) Performs functions such as resetting passwords, deleting accounts, and shutting down entire systems.

B) Refers to the varying levels that define what a user can access, view, or perform when operating a system.

C) Refers to how quickly a system can transform to support environmental changes.

D) Ensures that a system is functioning correctly and providing accurate information.

176) What is reliability?

A) Performs functions such as resetting passwords, deleting accounts, and shutting down entire systems.

B) Refers to the varying levels that define what a user can access, view, or perform when operating a system.

C) Refers to how quickly a system can transform to support environmental changes.

D) Ensures that a system is functioning correctly and providing accurate information.

177) What is unavailable?

A) A system that is not operating and cannot be used.

B) Refers to the ability of an application to operate on different devices or software platforms, such as different operating systems.

C) Measures how quickly a system performs a process or transaction.

D) The degree to which a system is easy to learn and efficient and satisfying to use.

178) What is portability?

A) A system that is not operating and cannot be used.

B) Refers to the ability of an application to operate on different devices or software platforms, such as different operating systems.

C) Measures how quickly a system performs a process or transaction.

D) The degree to which a system is easy to learn and efficient and satisfying to use.

179) What is performance?

A) A system that is not operating and cannot be used.

B) Refers to the ability of an application to operate on different devices or software platforms, such as different operating systems.

C) Measures how quickly a system completes a process or transaction.

D) The degree to which a system is easy to learn and efficient and satisfying to use.

180) What is usability?

A) A system that is not operating and cannot be used.

B) Refers to the ability of an application to operate on different devices or software platforms, such as different operating systems.

C) The degree to which a system is easy to learn and efficient and satisfying to use.

D) Describes how well a system can scale up, or adapt to the increased demands of growth.

181) What is scalability?

A) A system that is not operating and cannot be used.

B) Refers to the ability of an application to operate on different devices or software platforms, such as different operating systems.

C) The degree to which a system is easy to learn and efficient and satisfying to use.

D) Describes how well a system can scale up, or adapt to the increased demands of growth.

182) Explain MIS infrastructure and its three primary types.

183) Identify the three primary areas associated with an information MIS infrastructure.

184) Describe the characteristics of an agile MIS infrastructure.

Document Information

Document Type:
DOCX
Chapter Number:
All in one
Created Date:
Aug 21, 2025
Chapter Name:
Plug-In B04 Mis Infrastructures
Author:
Paige Baltzan

Connected Book

Test Bank | Business Driven Tech 8e by Paige Baltzan

By Paige Baltzan

Test Bank General
View Product →

$24.99

100% satisfaction guarantee

Buy Full Test Bank

Benefits

Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party