Test Bank Chapter 5 Infrastructures Sustainable Technologies - M Information Systems 5th Edition | Test Bank with Answer Key by Paige Baltzan by Paige Baltzan. DOCX document preview.

Test Bank Chapter 5 Infrastructures Sustainable Technologies

M: Information Systems, 5e (Baltzan)

Chapter 5 Infrastructures: Sustainable Technologies

1) MIS infrastructure is a communications system created by linking two or more devices and establishing a standard methodology for communication.

2) Every company, regardless of size, relies on some form of MIS infrastructure, whether it is a few personal computers networked together or many interconnected around the world.

3) Hardware consists of the physical devices associated with a computer system, where software is the set of instructions the hardware executes to carry out specific tasks.

4) Software is the set of instructions the hardware executes to carry out specific tasks.

5) Software consists of the physical devices associated with a computer system, where software is the set of instructions the hardware executes to carry out specific tasks.

6) Hardware is the set of instructions the hardware executes to carry out specific tasks.

7) A network is a communications system created by linking two or more devices and establishing a standard methodology in which they can communicate.

8) A client is a computer designed to request information from a server.

9) A server is a computer dedicated to providing information in response to requests.

10) A server is a computer designed to request information from a server.

11) A client is a computer dedicated to providing information in response to requests.

12) A good way to understand the client server relationship is when someone uses a web browser (this would be the client) to access a website (this would be a server that would respond with the web page being requested by the client).

13) There are three primary areas where enterprise architects focus when maintaining a firm's MIS infrastructure including information MIS infrastructure, agile MIS infrastructure, and sustainable MIS infrastructures.

14) If you want to support business operations you will focus on building a strong information MIS infrastructure, which identifies where and how important information, such as customer records, is maintained and secured.

15) If you want to support organization change you will focus on building a strong information MIS infrastructure, which identifies where and how important information, such as customer records, is maintained and secured.

16) If you want to support the environment you will focus on building a strong sustainable MIS infrastructure, which identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption.

17) Software is a computer designed to request information from a server.

18) Hardware is a computer dedicated to providing information in response to requests.

19) An enterprise architect is a person grounded in technology, fluent in business, and able to provide the important bridge between MIS and the business.

20) The ability to get a system up and running in the event of a system crash or failure that includes restoring the company information is called a failover.

21) Failback occurs when the primary machine recovers and resumes operations, taking over from the secondary server.

22) Fault tolerance is an exact copy of a system's information.

23) The three primary areas of support provided by information infrastructure are backup and recovery, disaster recovery plan, and the business continuity plan.

24) Failover backs up an exact copy of a system's information.

25) A backup is an exact copy of a system's information.

26) Recovery is the ability to get a system up and running in the event of a system crash or failure that includes restoring the information backup.

27) Failover is a specific type of fault tolerance, occurs when a redundant storage server offers an exact replica of the real-time data, and if the primary server crashes, the users are automatically directed to the secondary server or backup server. This is a high-speed and high-cost method of backup and recovery.

28) Failover occurs when the primary machine recovers and resumes operations, taking over from the secondary server.

29) Failback is a specific type of fault tolerance, occurs when a redundant storage server offers an exact replica of the real-time data, and if the primary server crashes, the users are automatically directed to the secondary server or backup server.

30) Disasters such as power outages, fires, floods, hurricanes, and even malicious activities such as hackers and viruses strike companies every day. Disasters can have effects on disrupting communications, damaging physical infrastructures, halting transportation, and blocking utilities.

31) A hot site is a separate and fully equipped facility where the company can move immediately after a disaster and resume business.

32) A cold site is a separate facility that does not have any computer equipment but is a place where employees can move after a disaster.

33) A warm site is a separate facility with computer equipment that requires installation and configuration.

34) A warm site is a separate and fully equipped facility where the company can move immediately after a disaster and resume business.

35) A warm site is a separate facility that does not have any computer equipment but is a place where employees can move after a disaster.

36) A cold site is a separate facility with computer equipment that requires installation and configuration.

37) An emergency is a sudden, unexpected event requiring immediate action due to potential threats to health and safety, the environment, or property.

38) Emergency preparedness ensures a company is ready to respond to an emergency in an organized, timely, and effective manner.

39) Business impact analysis details how a company recovers and restores critical business operations and systems after a disaster or extended disruption.

40) A business impact analysis identifies all critical business functions and the effect that a specific disaster may have upon them.

41) A business continuity planning identifies all critical business functions and the effect that a specific disaster may have upon them.

42) A business impact analysis occurs when the ability of a company to operate is impaired because of a hardware, software, or data outage.

43) A cold site can destroy large amounts of vital data, often causing incidents, unplanned interruption of a service.

44) An emergency contains all of the details of an incident.

45) Incident management is the process responsible for managing how incidents are identified and corrected.

46) Technology recovery strategies focus specifically on prioritizing the order for restoring hardware, software, and data across the organization that best meets business recovery requirements.

47) Accessibility refers to the varying levels that define what a user can access, view, or perform when operating a system.

48) Top-level MIS employees require administrator access, or unrestricted access to the entire system. Administrator access can perform functions such as resetting passwords, deleting accounts, and shutting down entire systems.

49) High availability occurs when a system is continuously operational at all times.

50) Availability refers to the time frames when the system is operational.

51) A system is called unavailable when it is not operating and cannot be used.

52) Portability refers to the ability of an application to operate on different devices or software platforms, such as different operating systems.

53) Scalability describes how well a system can scale up, or adapt to the increased demands of growth. If a company grows faster than anticipated, it might experience a variety of problems, from running out of storage space to taking more time to complete transactions. Anticipating expected, and unexpected, growth is key to building scalable systems that can support that development.

54) Reliability means the system functions correctly and provides accurate information.

55) Usability is the degree to which a system is easy to learn and efficient and satisfying to use.

56) Maintainability means the system quickly transforms to support environmental changes.

57) Performance measures how quickly a system performs a process or transaction.

58) Capacity planning determines future environmental infrastructure requirements to ensure high-quality system performance.

59) Vulnerability is a system weakness that can be exploited by a threat.

60) Serviceability is how quickly a third-party or vendor can change a system to ensure it meets user needs and the terms of any contracts including agreed levels of reliability, maintainability or availability.

61) Capacity represents the maximum throughput a system can deliver, for example the capacity of a hard drive represents the size or volume.

62) Web accessibility means that people with disabilities including visual, auditory, physical, speech, cognitive, and neurological disabilities can use the Web.

63) The Web accessibility initiative (WAI) brings together people from industry, disability organizations, government, and research labs from around the world to develop guidelines and resources to help make the Web accessible to people with disabilities including auditory, cognitive, neurological, physical, speech, and visual disabilities.

64) Availability refers to the varying levels that define what a user can access, view, or perform when operating a system.

65) Unavailability occurs when a system is continuously operational at all times.

66) Accessibility refers to the time frames when the system is operational.

67) A system is called available when it is not operating and cannot be used.

68) Scalability refers to the ability of an application to operate on different devices or software platforms, such as different operating systems.

69) Portability describes how well a system can scale up, or adapt to the increased demands of growth.

70) Maintainability means the system functions correctly and provides accurate information.

71) Web accessibility is the degree to which a system is easy to learn and efficient and satisfying to use.

72) Serviceability means the system quickly transforms to support environmental changes.

73) Scalability measures how quickly a system performs a process or transaction.

74) Maintainability determines future environmental infrastructure requirements to ensure high-quality system performance.

75) Reliability is a system weakness that can be exploited by a threat.

76) Usability is how quickly a third-party or vendor can change a system to ensure it meets user needs and the terms of any contracts including agreed levels of reliability, maintainability, or availability.

77) Flexibility represents the maximum throughput a system can deliver, for example the capacity of a hard drive represents the size or volume.

78) Availability means that people with disabilities including visual, auditory, physical, speech, cognitive, and neurological disabilities can use the Web.

79) Administrator access initiative brings together people from industry, disability organizations, government, and research labs from around the world to develop guidelines and resources to help make the Web accessible to people with disabilities including auditory, cognitive, neurological, physical, speech, and visual disabilities.

80) Gordon Moore, co-founder of Intel, observed in 1965 that continued advances in technological innovation made it possible to reduce the size of a computer chip while doubling its capacity every two years.

81) Tim Burners-Lee, co-founder of Intel, observed in 1965 that continued advances in technological innovation made it possible to reduce the size of a computer chip while doubling its capacity every two years.

82) Unsustainable, or green, MIS describes the production, management, use, and disposal of technology in a way that maximizes damage to the environment.

83) Sustainable, or green, MIS describes the production, management, use, and disposal of technology in a way that minimizes damage to the environment.

84) Ewaste is discarded electronics and is growing with the growth of innovation, for example, a personal computer has a life expectancy of only three to five years and a cell phone is less than two years.

85) Upcycle refers to discarded electronics and is growing with the growth of innovation, for example, a personal computer has a life expectancy of only three to five years and a cell phone is less than two years.

86) Large increases in technology use, by both consumers and businesses, have greatly amplified energy consumption.

87) Sustainable MIS disposal refers to the safe disposal of MIS assets at the end of their life cycle.

88) Unsustainable MIS disposal refers to the safe disposal of MIS assets at the end of their life cycle.

89) Clean computing is a subset of sustainable MIS, refers to the environmentally responsible use, manufacture, and disposal of technology products and computer equipment.

90) A green personal computer (green PC) is built using environment friendly materials and designed to save energy.

91) An upcycle reuses or refurbishes ewaste and creates a new product.

92) Corporate social responsibility is a subset of sustainable MIS, refers to the environmentally responsible use, manufacture, and disposal of technology products and computer equipment.

93) A black personal computer (black PC) is built using environment friendly materials and designed to save energy.

94) Ewaste reuses or refurbishes ewaste and creates a new product.

95) Corporate social responsibility is a companies' acknowledged responsibility to society.

96) Energy consumption is the amount of energy consumed by business processes and systems.

97) Carbon emissions include the carbon dioxide and carbon monoxide in the atmosphere, produced by business processes and systems.

98) Carbon emission is the amount of energy consumed by business processes and systems.

99) Energy consumption includes the carbon dioxide and carbon monoxide in the atmosphere, produced by business processes and systems.

100) A sustainable MIS infrastructure identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption.

101) A smart grid delivers electricity using two-way digital technology and is meant to solve the problem of outdated electrical grids.

102) Grid computing is a collection of computers, often geographically dispersed, that are coordinated to solve a common problem.

103) Cloud computing delivers electricity using two-way digital technology and is meant to solve the problem of outdated electrical grids.

104) Virtualization is a collection of computers, often geographically dispersed, that are coordinated to solve a common problem.

105) Virtualization creates multiple virtual machines on a single computing device. A good analogy is a computer printer. In the past you had to purchase a fax machine, copy machine, answering machine, and computer printer separately. This was expensive, required enough energy to run four machines, and created additional amounts of ewaste.

106) Storage virtualization combines multiple network storage devices so they appear to be a single storage device.

107) Network virtualization combines networks by splitting the available bandwidth into independent channels that can be assigned in real time to a specific device.

108) Server virtualization combines the physical resources, such as servers, processors, and operating systems, from the applications.

109) Disaster recovery as a service (DRaaS) offers backup services that use cloud resources to protect applications and data from disruption caused by disaster.

110) Network virtualization combines multiple network storage devices so they appear to be a single storage device.

111) Server virtualization combines networks by splitting the available bandwidth into independent channels that can be assigned in real time to a specific device.

112) Storage virtualization combines the physical resources, such as servers, processors, and operating systems, from the applications.

113) Virtualization offers backup services that use cloud resources to protect applications and data from disruption caused by disaster.

114) A data center is a facility used to house management information systems and associated components, such as telecommunications and storage systems.

115) Cloud computing stores, manages, and processes data and applications over the Internet rather than on a personal computer or server.

116) Dynamic scaling means the MIS infrastructure can be automatically scaled up or down based on needed requirements.

117) Single-tenancy in the cloud means that a single instance of a system serves multiple customers. In the cloud, each customer is called a tenant and multiple tenants can access the same system.

118) Multi-tenancy occurs when each customer or tenant must purchase and maintain an individual system.

119) Multi-tenancy in the cloud means that a single instance of a system serves multiple customers. In the cloud, each customer is called a tenant and multiple tenants can access the same system.

120) Single-tenancy occurs when each customer or tenant must purchase and maintain an individual system.

121) Cloud fabric is the software that makes the benefits of cloud computing possible, such as multi-tenancy.

122) Cloud fabric controller is an individual that monitors and provisions cloud resources similar to a server administrator at an individual company.

123) Cloud computing offers a pay-per-use revenue model similar to a metered service such as gas or electricity.

124) Utility computing offers a pay-per-use revenue model similar to a metered service such as gas or electricity.

125) Public cloud promotes massive, global, industry-wide applications offered to the general public. In a public cloud customers are never required to provision, manage, upgrade, or replace hardware or software.

126) Private cloud serves only one customer or organization and can be located on the customers' premises or off the customer's premises.

127) Community cloud serves a specific community with common business models, security requirements, and compliance considerations.

128) Hybrid cloud includes two or more private, public, or community clouds, but each cloud remains separate and is only linked by technology that enables data and application portability.

129) Hybrid cloud serves a specific community with common business models, security requirements, and compliance considerations.

130) Community cloud includes two or more private, public, or community clouds, but each cloud remains separate and is only linked by technology that enables data and application portability.

131) Cloud bursting is when a company uses its own computing infrastructure for normal usage and access the cloud when it needs to scale for high/peak load requirements ensuring a sudden spike in usage does not result in poor performance or system crashes.

132) What is an information MIS infrastructure?

A) identifies where and how important information, such as customer records, is maintained and secured

B) includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization's goals

C) infrastructure identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption

D) includes the plans for how a firm will build, deploy, use, and share its data, processes, and MIS assets

133) What is an agile MIS infrastructure?

A) identifies where and how important information, such as customer records, is maintained and secured

B) includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization's goals

C) infrastructure identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption

D) includes the plans for how a firm will build, deploy, use, and share its data, processes, and MIS assets

134) What is a sustainable MIS infrastructure?

A) identifies where and how important information, such as customer records, is maintained and secured

B) includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization's goals

C) infrastructure identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption

D) includes the plans for how a firm will build, deploy, use, and share its data, processes, and MIS assets

135) What is an MIS infrastructure?

A) identifies where and how important information, such as customer records, is maintained and secured

B) includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization's goals

C) infrastructure identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption

D) includes the plans for how a firm will build, deploy, use, and share its data, processes, and MIS assets

136) Who is a person who is grounded in technology, fluent in business, and able to provide the important bridge between MIS and the business?

A) MIS infrastructure manager

B) MIS specialist

C) enterprise architect

D) enterprise manager

137) Which of the following is a benefit of a solid MIS infrastructure?

A) reduces costs

B) improves productivity

C) optimizes business operations

D) all of these

138) What is the difference between hardware and software?

A) Hardware is the physical devices associated with a computer system, where software is the instructions the hardware executes to carry out tasks.

B) They are both specific forms of clients.

C) Hardware executes the instructions to carry out tasks, where software is the physical devices associated with a computer system.

D) They are both specific forms of servers.

139) What consists of the physical devices associated with a computer system?

A) hardware

B) software

C) client

D) server

140) What is the set of instructions the hardware executes to carry out specific tasks?

A) hardware

B) software

C) client

D) server

141) What is a communications system created by linking two or more devices, and establishing a standard methodology in which they can communicate?

A) network

B) software

C) client

D) server

142) What is a computer designed to request information from a server?

A) hardware

B) software

C) client

D) server

143) What is a computer dedicated to providing information in response to requests?

A) hardware

B) software

C) client

D) server

144) What is hardware?

A) consists of the physical devices associated with a computer system

B) the set of instructions the hardware executes to carry out specific tasks

C) a computer designed to request information from a server

D) a computer dedicated to providing information in response to requests

145) What is software?

A) consists of the physical devices associated with a computer system

B) the set of instructions the hardware executes to carry out specific tasks

C) a computer designed to request information from a server

D) a computer dedicated to providing information in response to requests

146) What is a network?

A) consists of the physical devices associated with a computer system

B) the set of instructions the hardware executes to carry out specific tasks

C) a computer designed to request information from a server

D) a communications system created by linking two or more devices and establishing a standard methodology in which they can communicate

147) What is a client?

A) consists of the physical devices associated with a computer system

B) the set of instructions the hardware executes to carry out specific tasks

C) a computer designed to request information from a server

D) a computer dedicated to providing information in response to requests

148) What is a server?

A) consists of the physical devices associated with a computer system

B) the set of instructions the hardware executes to carry out specific tasks

C) a computer designed to request information from a server

D) a computer dedicated to providing information in response to requests

149) An MIS infrastructure is

A) dynamic and static.

B) dynamic and continually changing.

C) a client and a server.

D) hardware and software.

150) John works for Internal Computer Specialists, which focuses on helping small business owners resolve MIS infrastructure issues. John's tasks include cleaning and replacing motherboards, cables, and internal components such as DVDs and hard drives. What does John's role at Internal Computer Specialists focus on fixing?

A) hardware

B) clients

C) backup

D) recovery

151) Jessica started her own online company, which specializes in selling items for bachelorette parties, wedding parties, and baby showers. Due to the fact that she operates only online, her MIS infrastructure needs to be fast, efficient, and accurate ensuring the best possible experience for her customers. Which of the below is a critical component in Jessica's MIS infrastructure?

A) hardware and software

B) client

C) server

D) all of these

152) What are the three business functions an MIS infrastructure supports?

A) supports operations, change, and the environment or sustainability

B) supports operations, customers, and ewaste

C) supports operations, clients, and servers

D) supports information, change, and business continuity planning

153) Which of the following include the three components of an MIS infrastructure?

A) information MIS, aggregated MIS, and sustainable MIS infrastructures

B) information MIS, operational MIS, and changing MIS infrastructures

C) information MIS, agile MIS, and sustainable MIS infrastructures

D) varies depending on the industry

154) Which characteristics support an agile MIS infrastructure?

A) accessibility, availability, maintainability, portability, reliability, scalability, usability

B) backup and recovery plan, disaster recovery plan, business continuity planning

C) grid computing, cloud computing, and virtualization

D) storage, network, and server virtualization

155) Which characteristics support a sustainable MIS infrastructure?

A) accessibility, availability, maintainability, portability, reliability, scalability, usability

B) backup and recovery plan, disaster recovery plan, business continuity planning

C) grid computing, cloud computing, and virtualization

D) storage, network, and server virtualization

156) Which characteristics support an information MIS infrastructure?

A) accessibility, availability, maintainability, portability, reliability, scalability, usability

B) backup and recovery plan, disaster recovery plan, business continuity planning

C) grid computing, cloud computing, and virtualization

D) storage, network, and server virtualization

157) Grid computing, cloud computing, and virtualization are all elements of a(n) ________ MIS infrastructure.

A) agile

B) sustainable

C) information

D) virtualized

158) Accessibility, availability, maintainability, portability, reliability, scalability, usability are all elements of a(n) ________ MIS infrastructure.

A) agile

B) sustainable

C) information

D) virtualized

159) Backup and recovery plan, disaster recovery plan, business continuity planning are all elements of a(n) ________ MIS infrastructure.

A) agile

B) sustainable

C) information

D) virtualized

160) Which of the below represents the primary elements in an information MIS infrastructure?

A) backup, recovery, disaster recovery, and business continuity planning

B) backup, accessibility, and usability

C) backup, cloud computing, and virtualization

D) grid computing, cloud computing, and virtualization

161) The ________ MIS infrastructure identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption.

A) sustainable

B) information

C) virtualized

D) agile

162) The ________ MIS infrastructure identifies where and how important information, such as customer records, is maintained and secured.

A) sustainable

B) information

C) virtualized

D) agile

163) The ________ MIS infrastructure includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation.

A) information

B) virtualized

C) agile

D) sustainable

164) Francis works in the human resources division of a large oil and gas company in Texas. Francis' tasks include maintaining payroll and vacation records, employment histories, and benefit information along with ensuring the security of all sensitive employee information. Which MIS infrastructure is most important to Francis?

A) information MIS infrastructure

B) agile MIS infrastructure

C) sustainable MIS infrastructure

D) virtualized MIS infrastructure

165) The information MIS infrastructure supports the day-to-day business operations and plans for

A) security breaches and theft.

B) floods and earthquakes.

C) malicious Internet attacks.

D) all of these.

166) Each year businesses lose time and money because of system crashes and failures. Which of the following offers the best way to protect a system from crashes and failures?

A) backup and recovery plans

B) fault tolerance

C) failover

D) all of these

167) Which of the following describes the difference between a backup plan and a recovery plan?

A) Recovery is an exact copy of a system's information, where backup is the ability to get a system up and running in the event of a system crash or failure.

B) Backup is mandatory, where recovery is optional.

C) Backup is an exact copy of a system's information, where recovery is the ability to get a system up and running in the event of a system crash or failure.

D) Recovery is mandatory, where backup is optional.

168) What occurs when a redundant storage server offers an exact replica of the real-time data, and if the primary server crashes, the users are automatically directed to a secondary server?

A) failover

B) disaster recovery cost curve

C) reliability

D) maintainability

169) What occurs when a primary machine recovers and resumes operations, taking over from a secondary server?

A) failback

B) disrupting communications

C) warm site

D) hot site

170) What has the ability to recover information or systems in the event of catastrophic disasters?

A) recovery

B) disaster recovery

C) backup

D) failback

171) Shawn works at the local electrical company in Nampa, ID, which provides electricity to the entire city of Boise. This area is prone to floods, high winds, and tornados. As the lead enterprise architect on the night shift, Shawn has been asked to suggest ways the company can protect its information MIS infrastructure. Shawn notices that the company does not have the ability for its systems to respond to unexpected failures or crashes and there is not a backup system that can automatically take over without a loss of serve to Boise residents. What should Shawn recommend his company implement?

A) accessibility

B) Moore's law

C) antivirus software

D) fault tolerance

172) What creates a way for a company to recover and restore partially or completely interrupted critical functions within a predetermined time after a disaster or extended disruption?

A) disaster recovery plan

B) disaster recovery cost curve

C) business continuity planning

D) emergency notification system

173) What is the ability to get a system up and running in the event of a system crash or failure that includes restoring the information backup?

A) failure tolerance

B) recovery

C) reliability

D) capacity planning

174) Which of the below offers a low-speed and low-cost backup method?

A) DVD

B) thumb drive

C) external hard drive

D) all of these

175) What question below would a company need to answer when first establishing a backup and recovery plan?

A) What types of storage mechanism will meet the needs of the company?

B) How often does the company need to backup its information?

C) What types of recovery systems does the company infrastructure need?

D) All of these

176) Which of the following is an effect a company could experience because of a disaster such as a fire, flood, or hurricane?

A) disrupting communications

B) damaging physical infrastructures

C) halting transportation

D) all of these

177) To combat disasters a company can create a ________ that would detail the process for recovering information or a system in the event of a catastrophic disaster.

A) disaster recovery plan

B) database lookup initiative

C) management recovery plan

D) tornado threat plan

178) Within the sites that support disaster recovery, ________ is a separate facility that does not have any computer equipment but is a place where employees can move after a disaster.

A) hot site

B) cold site

C) warm site

D) disaster site

179) Within the sites that support disaster recovery, ________ is a separate and fully equipped facility where the company can move immediately after a disaster and resume business.

A) hot site

B) cold site

C) warm site

D) disaster site

180) Within the sites that support disaster recovery, ________ is a separate facility with computer equipment that requires installation and configuration.

A) hot site

B) cold site

C) warm site

D) disaster site

181) What is a hot site?

A) a separate and fully equipped facility where the company can move immediately after a disaster and resume business

B) a separate facility that does not have any computer equipment but is a place where employees can move after a disaster

C) a separate facility with computer equipment that requires installation and configuration

D) a detailed process for recovering information or a system in the event of a catastrophic disaster

182) What is a cold site?

A) a separate and fully equipped facility where the company can move immediately after a disaster and resume business

B) a separate facility that does not have any computer equipment but is a place where employees can move after a disaster

C) a separate facility with computer equipment that requires installation and configuration

D) a detailed process for recovering information or a system in the event of a catastrophic disaster

183) What is a warm site?

A) a separate and fully equipped facility where the company can move immediately after a disaster and resume business

B) a separate facility that does not have any computer equipment but is a place where employees can move after a disaster

C) a separate facility with computer equipment that requires installation and configuration

D) a detailed process for recovering information or a system in the event of a catastrophic disaster

184) What is a disaster recovery plan?

A) a separate and fully equipped facility where the company can move immediately after a disaster and resume business

B) a separate facility that does not have any computer equipment but is a place where employees can move after a disaster

C) a separate facility with computer equipment that requires installation and configuration

D) a detailed process for recovering information or a system in the event of a catastrophic disaster

185) A disaster recovery plan contains a ________ that outlines the costs to support the plan.

A) disaster organizational cost analysis

B) disaster recovery improvements

C) disaster financial costs

D) disaster recovery cost curve

186) What charts the cost to the company of the unavailability of information and technology and the cost to the company of recovering from a disaster over time?

A) disaster organizational cost analysis

B) disaster recovery improvements

C) disaster financial costs

D) disaster recovery cost curve

187) The optimal disaster recovery plan in terms of cost and time is where on the disaster recovery cost curve?

A) where the two cost effects intersect

B) when the cost to the company of unavailability of information and technology is high

C) when the cost to the company of recovering from a disaster over time is high

D) when the two cost effects are furthest apart

188) What is a more comprehensive and all-encompassing plan that details how a company recovers and restores critical business operations and systems after a disaster or extended disruption?

A) business continuity planning

B) database management plan

C) disaster recovery plan

D) emergency recovery plan

189) What does a business continuity plan typically include?

A) how frequently the system backup is performed

B) which systems and business processes are critical and the maximum amount of time the company can continue to operate without functioning systems

C) how quickly the system recovery needs to be performed

D) where a hot site is located

190) What is an infrastructure built for notifying people in the event of an emergency?

A) business operational plan

B) business continuity plan

C) emergency notification service

D) emergency continuity plan

191) What are the different options where an emergency notification service can be deployed?

A) through the firm's own infrastructure

B) by an outside service provider on company premises

C) by an outside service provider hosted remotely

D) all of these

192) Which of the following is an example of an emergency notification system?

A) radio stations' occasional tests of the national alert system

B) wireless alerts for promotional discounts

C) text messages from your local grocery store

D) all of these

193) What is a sudden, unexpected event requiring immediate action due to potential threats to health and safety, the environment, or property?

A) emergency

B) emergency preparedness

C) business Impact analysis

D) technology failure

194) What ensures a company is ready to respond to an emergency in an organized, timely, and effective manner?

A) emergency

B) emergency preparedness

C) business Impact analysis

D) technology failure

195) What identifies all critical business functions and the effect that a specific disaster may have upon them?

A) emergency

B) emergency preparedness

C) business Impact analysis

D) technology failure

196) What occurs when the ability of a company to operate is impaired because of a hardware, software, or data outage?

A) emergency

B) emergency preparedness

C) business Impact analysis

D) technology failure

197) What contains all of the details of an incident?

A) technology failure

B) incident record

C) incident management

D) technology recovery strategy

198) What occurs when the ability of a company to operate is impaired because of a hardware, software, or data outage?

A) technology failure

B) incident record

C) incident management

D) technology recovery strategy

199) What is the process responsible for managing how incidents are identified and corrected?

A) technology failure

B) incident record

C) incident management

D) technology recovery strategy

200) What focuses specifically on prioritizing the order for restoring hardware, software, and data across the organization that best meets business recovery requirements?

A) technology failure

B) incident record

C) incident management

D) technology recovery strategy

201) What are the seven characteristics of an agile MIS infrastructure?

A) accessibility, availability, maintainability, portability, reliability, scalability, and usability

B) accessibility, affordability, mobility, portability, reliability, scalability, and usability

C) accessibility, availability, mobility, penetrability, responsibility, sensibility, and usability

D) accessibility, affordability, functionality, changeability, constancy, sources, and understanding

202) Which term refers to the varying levels that define what a user can access, view, or perform when operating a system?

A) availability

B) accessibility

C) usability

D) responsibility

203) Enterprise architects require ________ so they can perform such functions as resetting passwords or deleting accounts.

A) functional access

B) infrastructure access

C) restricted access

D) administrator access

204) Which term refers to the time frames when the system is operational?

A) administrator access

B) accessibility

C) availability

D) portability

205) What is the difference between unavailable and high availability?

A) High availability is when the system is not operating and can't be used, where unavailable is when a system is continuously operating at all times.

B) Unavailable refers only to clients, where high availability refers to servers.

C) Unavailable is when the system is not operating and can't be used, where high availability is when a system is continuously operating at all times.

D) High availability refers only to clients, where unavailable refers to servers.

206) What is a widely held but difficult to achieve standard of availability for a system?

A) "five 9s" availability

B) "1%" minimum availability

C) the "five's accessibility" code

D) "five 10s" availability

207) Which of the following agile MIS infrastructure characteristics refers to how quickly a system can transform to support environmental changes?

A) maintainability

B) scalability

C) capacity planning

D) portability

208) Which of the following agile MIS infrastructure characteristics refers to the ability of an application to operate on different devices or software platforms, such as different operating systems?

A) reliability

B) portability

C) maintainability

D) usability

209) What does reliability ensure?

A) The system has the ability to operate in many different operating systems.

B) The system is easy to learn and efficient and satisfying to use.

C) The system is functioning correctly and providing accurate information.

D) The time frames when the system is operational.

210) Why is estimating future growth a challenge for most companies?

A) Growth can occur because the company acquires new markets.

B) Growth can occur because the company acquires new customers.

C) Growth can occur because the company acquires new products.

D) All of these.

211) Which of the following describes how well a system can scale up, or adapt to the increased demands or growth?

A) flexibility

B) scalability

C) reliability

D) affordability

212) When building a scalable system that can support new company developments what are the key factors to consider?

A) anticipating expected and unexpected growth

B) organizing and deploying additional resources

C) understanding competitor products and services

D) analyzing the accessibility and availability of competitor systems

213) What measures how quickly a system performs a process or transaction?

A) portability

B) capacity planning

C) performance

D) sustainability

214) What determines future environmental infrastructure requirements that ensure high-quality system performance?

A) capacity system

B) capacity planning

C) capacity function

D) performance indicators

215) What is the primary reason a company has a failover system?

A) to use different systems continuously at the same time

B) to allow employees to work virtually

C) to take down the primary system for maintenance, while the secondary system activates to ensure continuous operations

D) all of these

216) What is usability?

A) The system is easy to learn and efficient and satisfying to use.

B) The system functions correctly and provides accurate information.

C) The system allows varying levels of access.

D) The system quickly transforms to support environmental changes.

217) What refers to how well a system can adapt to increased demands?

A) scalability

B) capacity planning

C) reliability

D) availability

218) Apple understood the importance of usability when it designed its

A) PowerPoint software.

B) antivirus software.

C) fault tolerance system.

D) iPod and iTunes system.

219) What represents the maximum throughput a system can deliver, for example the capacity of a hard drive represents the size or volume?

A) capacity

B) Web accessibility

C) Web accessibility initiative

D) vulnerability

220) What means that people with disabilities including visual, auditory, physical, speech, cognitive, and neurological disabilities can use the Web?

A) capacity

B) Web accessibility

C) Web accessibility initiative

D) vulnerability

221) What brings together people from industry, disability organizations, government, and research labs from around the world to develop guidelines and resources to help make the Web accessible to people with disabilities including auditory, cognitive, neurological, physical, speech, and visual disabilities?

A) capacity

B) Web accessibility

C) Web accessibility initiative

D) vulnerability

222) What is a system weakness that can be exploited by a threat?

A) capacity

B) Web accessibility

C) Web accessibility initiative

D) vulnerability

223) Which of the following terms represents how quickly a third-party or vendor can change a system to ensure it meets user needs and the terms of any contracts including agreed levels of reliability, maintainability, or availability?

A) capacity

B) web accessibility

C) serviceability

D) vulnerability

224) What is administrator access?

A) performs functions such as resetting passwords, deleting accounts, and shutting down entire systems

B) refers to the varying levels that define what a user can access, view, or perform when operating a system

C) refers to the time frames when the system is operational

D) refers to how quickly a system can transform to support environmental changes

225) What is accessibility?

A) performs functions such as resetting passwords, deleting accounts, and shutting down entire systems

B) refers to the varying levels that define what a user can access, view, or perform when operating a system

C) refers to the time frames when the system is operational

D) refers to how quickly a system can transform to support environmental changes

226) What is availability?

A) performs functions such as resetting passwords, deleting accounts, and shutting down entire systems

B) refers to the varying levels that define what a user can access, view, or perform when operating a system

C) refers to the time frames when the system is operational

D) refers to how quickly a system can transform to support environmental changes

227) What is maintainability?

A) performs functions such as resetting passwords, deleting accounts, and shutting down entire systems

B) refers to the varying levels that define what a user can access, view, or perform when operating a system

C) refers to how quickly a system can transform to support environmental changes

D) ensures that a system is functioning correctly and providing accurate information

228) What is reliability?

A) performs functions such as resetting passwords, deleting accounts, and shutting down entire systems

B) refers to the varying levels that define what a user can access, view, or perform when operating a system

C) refers to how quickly a system can transform to support environmental changes

D) ensures that a system is functioning correctly and providing accurate information

229) What is unavailable?

A) a system that is not operating and cannot be used

B) refers to the ability of an application to operate on different devices or software platforms, such as different operating systems

C) measures how quickly a system performs a process or transaction

D) the degree to which a system is easy to learn and efficient and satisfying to use

230) What is portability?

A) a system that is not operating and cannot be used

B) refers to the ability of an application to operate on different devices or software platforms, such as different operating systems

C) measures how quickly a system performs a process or transaction

D) the degree to which a system is easy to learn and efficient and satisfying to use

231) What is performance?

A) a system that is not operating and cannot be used

B) refers to the ability of an application to operate on different devices or software platforms, such as different operating systems

C) measures how quickly a system performs a process or transaction

D) the degree to which a system is easy to learn and efficient and satisfying to use

232) What is usability?

A) a system that is not operating and cannot be used

B) refers to the ability of an application to operate on different devices or software platforms, such as different operating systems

C) the degree to which a system is easy to learn and efficient and satisfying to use

D) describes how well a system can scale up, or adapt to the increased demands of growth

233) What is scalability?

A) a system that is not operating and cannot be used

B) refers to the ability of an application to operate on different devices or software platforms, such as different operating systems

C) the degree to which a system is easy to learn and efficient and satisfying to use

D) describes how well a system can scale up, or adapt to the increased demands of growth

234) Gordon Moore, the co-founder of Intel, established which MIS law?

A) Intel's law

B) Gordon's law

C) Moore's law

D) Lee's law

235) Which of the following reflects Moore's law?

A) the computer chip performance per dollar doubles every 18 months

B) a company's ability to acquire small amounts of MIS equipment for cheaper cost

C) a company's ability to acquire small amounts of capital for spending on innovative ideas every two years

D) the computer chip performance per dollar doubles every 6 months

236) What describes the production, management, use, and disposal of technology in a way that minimizes damage to the environment?

A) environmental MIS

B) holistic MIS

C) the green designation for technology

D) sustainability or green MIS

237) Sustainable MIS is a critical part of ________ within a company.

A) company Standard for the green initiative

B) corporate social responsibility

C) social expectations

D) society concerns

238) Corporate social responsibility is a company's acknowledged responsibility to

A) shareholders.

B) employees.

C) society.

D) governments.

239) What is a company's acknowledged responsibility to society?

A) corporate social responsibility

B) employees social responsibility

C) society social responsibility

D) government social responsibility

240) Miranda White likes taking old computer parts and remaking them into products like earrings and clocks. Which of the following represents what Miranda is doing?

A) upcycle

B) recycle

C) ewaste

D) sustainable MIS

241) What is clean computing?

A) a subset of sustainable MIS, refers to the environmentally responsible use, manufacture, and disposal of technology products and computer equipment

B) built using environment friendly materials and designed to save energy

C) reuses or refurbishes ewaste and creates a new product

D) a companies' acknowledged responsibility to society

242) What is a green personal computer?

A) a subset of sustainable MIS, refers to the environmentally responsible use, manufacture, and disposal of technology products and computer equipment

B) built using environment friendly materials and designed to save energy

C) reuses or refurbishes ewaste and creates a new product

D) a companies' acknowledged responsibility to society

243) What is upcycle?

A) a subset of sustainable MIS, refers to the environmentally responsible use, manufacture, and disposal of technology products and computer equipment

B) built using environment friendly materials and designed to save energy

C) reuses or refurbishes ewaste and creates a new product

D) stores, manages, and processes data and applications over the Internet rather than on a personal computer or server

244) What is corporate social responsibility?

A) a subset of sustainable MIS, refers to the environmentally responsible use, manufacture, and disposal of technology products and computer equipment

B) a company's acknowledged responsibility to society

C) reuses or refurbishes ewaste and creates a new product

D) stores, manages, and processes data and applications over the Internet rather than on a personal computer or server

245) What is cloud computing?

A) built using environment friendly materials and designed to save energy

B) reuses or refurbishes ewaste and creates a new product

C) a company's acknowledged responsibility to society

D) stores, manages, and processes data and applications over the Internet rather than on a personal computer or server

246) What is a subset of sustainable MIS, refers to the environmentally responsible use, manufacture, and disposal of technology products and computer equipment?

A) clean computing

B) green personal computer

C) upcycle

D) corporate social responsibility

247) What is built using environment friendly materials and designed to save energy?

A) clean computing

B) green personal computer

C) upcycle

D) corporate social responsibility

248) What reuses or refurbishes ewaste and creates a new product?

A) clean computing

B) green personal computer

C) upcycle

D) corporate social responsibility

249) What is a company's acknowledged responsibility to society?

A) cloud computing

B) clean computer

C) upcycle

D) corporate social responsibility

250) What stores, manages, and processes data and applications over the Internet rather than on a personal computer or server?

A) clean computing

B) cloud computing

C) upcycle

D) corporate social responsibility

251) The increased demand in technology devices has caused an increase in discarded devices, a phenomenon known as

A) ewaste.

B) grid computing.

C) ergonomic code.

D) electronic sustainability.

252) Which of the below is not contributing to ewaste?

A) VCR

B) automobile

C) microwave

D) computer

253) What are the three pressures driving sustainable MIS infrastructures?

A) decreases in electronic waste, energy waste, and carbon emissions

B) increases in ewaste, energy waste, and dynamic scaling

C) increases in electronic waste, energy waste, and carbon emissions

D) decreases in ewaste, energy waste, and carbon footprints

254) What is the safe disposal of MIS assets at the end of their life cycle called?

A) sustainable MIS disposal

B) sustainable device disposal

C) sustainable software disposal

D) sustainable enterprise disposal

255) What are the ramifications of improper electronic recycling, when analyzing the example of a single desktop computer?

A) One computer contains more than 700 chemicals that can be toxic to the environment.

B) Computers in landfills can leak these toxic chemicals into our land, water, and air.

C) Computers contain high levels of mercury, lead, and cadmium—harmful toxins.

D) All of these.

256) The sustainable infrastructure pressure of increased energy consumption poses new and growing pressure. The energy consumed by a computer is estimated to produce as much as 10% of the amount of carbon dioxide produced by a

A) house.

B) school.

C) car.

D) cell phone.

257) Cheap electricity is great for keeping business energy costs down, but this mean that we have to rely more on ________ for power.

A) cars

B) coal

C) gasoline

D) all of these

258) What refers to discarded, obsolete, or broken electronic devices?

A) ewaste

B) energy consumption

C) carbon emissions

D) sustainable MIS

259) What is the amount of energy consumed by business processes and systems?

A) ewaste

B) energy consumption

C) carbon emissions

D) sustainable MIS

260) What includes the carbon dioxide and carbon monoxide in the atmosphere, produced by business processes and systems?

A) ewaste

B) energy consumption

C) carbon emissions

D) sustainable MIS

261) What refers to the safe disposal of MIS assets at the end of their life cycle?

A) ewaste

B) energy consumption

C) carbon emissions

D) sustainable MIS

262) Which of the following sustainable infrastructure components is a collection of computers, often geographically dispersed, that are coordinated to solve a common problem?

A) cloud computing

B) grid computing

C) virtualized computing

D) database computing

263) With grid computing a problem is broken into pieces and distributed to many machines, allowing ________ processing than could occur with a single system.

A) moderate

B) slower

C) faster

D) cleaner

264) What is storage virtualization?

A) combines multiple network storage devices so they appear to be a single storage device

B) combines networks by splitting the available bandwidth into independent channels that can be assigned in real time to a specific device

C) combines the physical resources, such as servers, processors, and operating systems, from the applications

D) offers backup services that use cloud resources to protect applications and data from disruption caused by disaster

265) What is network virtualization?

A) combines multiple network storage devices so they appear to be a single storage device

B) combines networks by splitting the available bandwidth into independent channels that can be assigned in real time to a specific device

C) combines the physical resources, such as servers, processors, and operating systems, from the applications

D) offers backup services that use cloud resources to protect applications and data from disruption caused by disaster

266) What is server virtualization?

A) combines multiple network storage devices so they appear to be a single storage device

B) combines networks by splitting the available bandwidth into independent channels that can be assigned in real time to a specific device

C) combines the physical resources, such as servers, processors, and operating systems, from the applications

D) offers backup services that use cloud resources to protect applications and data from disruption caused by disaster

267) What is disaster recovery as a service?

A) combines multiple network storage devices so they appear to be a single storage device

B) combines networks by splitting the available bandwidth into independent channels that can be assigned in real time to a specific device

C) combines the physical resources, such as servers, processors, and operating systems, from the applications

D) offers backup services that use cloud resources to protect applications and data from disruption caused by disaster

268) What combines multiple network storage devices so they appear to be a single storage device?

A) server virtualization

B) network virtualization

C) disaster recovery as a service

D) storage virtualization

269) What combines networks by splitting the available bandwidth into independent channels that can be assigned in real time to a specific device?

A) server virtualization

B) network virtualization

C) disaster recovery as a service

D) storage virtualization

270) What combines the physical resources, such as servers, processors, and operating systems, from the applications?

A) server virtualization

B) network virtualization

C) disaster recovery as a service

D) storage virtualization

271) What offers backup services that use cloud resources to protect applications and data from disruption caused by disaster?

A) server virtualization

B) network virtualization

C) disaster recovery as a service

D) storage virtualization

272) Grid computing takes advantage of the available 75% of unused processing power of a computer and links thousands of individual computers around the world creating a(n) ________ that can process intensive tasks.

A) personal computer

B) employee client

C) company server

D) virtual supercomputer

273) Which of the following delivers electricity using two-way digital technology?

A) a smart grid

B) a systematic grid

C) a collective grid

D) an interactive grid

274) DreamWorks Animation Company used which sustainable infrastructure component to complete many of its films including Shrek, Madagascar, and Antz?

A) agile computing

B) grid computing

C) cloud computing

D) server computing

275) What is cloud computing services changing?

A) the way people access information

B) the way people deliver information

C) the way people use information

D) all of these

276) What offers a pay-per-use revenue model similar to a metered service such as gas or electricity?

A) grid computing

B) smart phones

C) utility computing

D) computing services

277) Where would you categorize a cloud computing benefit that allows a customer to store fewer applications on a client computer, which frees up the memory allowing for increases in performance?

A) Internet features

B) increased costs

C) increased performance

D) increased software updates

278) What is a challenge for cloud computing that could cause employee performance to decrease?

A) limited Internet features

B) required Internet connectivity

C) decreased dynamic scaling

D) decreased job stability

279) What service delivers hardware networking capabilities, including the use of servers, networking, and storage over the cloud using a pay-per-use revenue model?

A) infrastructure as a service (IaaS)

B) disaster recovery as a service (DRaaS)

C) software as a service (SaaS)

D) platform as a service (PaaS)

280) What is dynamic scaling?

A) the ability for the system to cut back on expenses when needed

B) the infrastructure that is fixed and there are no surprises

C) the MIS infrastructure can be automatically scaled up or down based on needed requirements

D) the flexibility to charge more or less depending on the market

281) What are the three cloud computing service delivery models?

A) independent as a service, supportive as a service, partnering as a service

B) infrastructure as a service, software as a service, platform as a service

C) innovation as a service, server as a service, platform as a service

D) intuit as a service, storage as a service, programming as a service

282) Which cloud computing model offers applications on a pay-per-use basis?

A) infrastructure as a service

B) platform as a service

C) software as a service

D) information as a service

283) What is a platform as a service (PaaS)?

A) Set up and storage systems including servers, and database management model.

B) Innovate and develop new programs for business on an ongoing basis.

C) Salesforce.com is an example of PaaS.

D) Supports the deployment of entire systems including hardware, networking, and applications using pay-per-use revenue model.

284) What enables computers to run multiple operating systems and multiple software applications at the same time, and creates multiple "virtual" machines all on a single computing device?

A) virtualization

B) innovation

C) availability

D) viral computing

285) What is a facility used to house management information systems and associated components, such as telecommunications and storage systems?

A) call center

B) data center

C) delivery base

D) central center

286) What in the cloud means that a single instance of a system serves multiple customers?

A) multi-tenancy

B) single-tenancy

C) cloud fabric

D) cloud fabric controller

287) What occurs when each customer or tenant must purchase and maintain an individual system?

A) multi-tenancy

B) single-tenancy

C) cloud fabric

D) cloud fabric controller

288) What is the software that makes the benefits of cloud computing possible, such as multi-tenancy?

A) multi-tenancy

B) single-tenancy

C) cloud fabric

D) cloud fabric controller

289) What offers a pay-per-use revenue model similar to a metered service such as gas or electricity?

A) community cloud

B) private cloud

C) utility computing

D) public cloud

290) What promotes massive, global, industry-wide applications offered to the general public?

A) community cloud

B) private cloud

C) utility computing

D) public cloud

291) What serves only one customer or organization and can be located on the customers' premises or off the customer's premises?

A) community cloud

B) private cloud

C) utility computing

D) public cloud

292) What serves a specific community with common business models, security requirements, and compliance considerations?

A) community cloud

B) private cloud

C) utility computing

D) hybrid cloud

293) What includes two or more private, public, or community clouds, but each cloud remains separate and is only linked by technology that enables data and application portability?

A) community cloud

B) private cloud

C) utility computing

D) hybrid cloud

294) What occurs when a company uses its own computing infrastructure for normal usage and accesses the cloud when it needs to scale for high/peak load requirements ensuring a sudden spike in usage does not result in poor performance or system crashes?

A) community cloud

B) private cloud

C) cloud bursting

D) hybrid cloud

295) What offers backup services that use cloud resources to protect applications and data from disruption caused by disaster?

A) disaster recovery as a service (DRaaS)

B) data as a service (DaaS)

C) software as a service (SaaS)

D) big data as a service (BDaaS)

296) What offers a pay-per-use revenue model similar to a metered service such as gas or electricity?

A) disaster recovery as a service (DRaaS)

B) data as a service (DaaS)

C) software as a service (SaaS)

D) utility computing

297) What facilitates the accessibility of business-critical data in a timely, secure, and affordable manner?

A) disaster recovery as a service (DRaaS)

B) data as a service (DaaS)

C) software as a service (SaaS)

D) big data as a service (BDaaS)

298) What delivers applications over the cloud using a pay-per-use revenue model?

A) disaster recovery as a service (DRaaS)

B) data as a service (DaaS)

C) software as a service (SaaS)

D) big data as a service (BDaaS)

299) What offers a cloud-based big data service to help organizations analyze massive amounts of data to solve business dilemmas?

A) disaster recovery as a service (DRaaS)

B) data as a service (DaaS)

C) software as a service (SaaS)

D) big data as a service (BDaaS)

300) What is disaster recovery as a service (DRaaS)?

A) offers backup services that use cloud resources to protect applications and data from disruption caused by disaster

B) delivers applications over the cloud using a pay-per-use revenue model

C) facilitates the accessibility of business-critical data in a timely, secure, and affordable manner

D) offers a cloud-based Big Data service to help organizations analyze massive amounts of data to solve business dilemmas

301) What is data as a service (DaaS)?

A) offers backup services that use cloud resources to protect applications and data from disruption caused by disaster

B) delivers applications over the cloud using a pay-per-use revenue model

C) facilitates the accessibility of business-critical data in a timely, secure, and affordable manner

D) offers a cloud-based Big Data service to help organizations analyze massive amounts of data to solve business dilemmas

302) What is software as a service (SaaS)?

A) offers backup services that use cloud resources to protect applications and data from disruption caused by disaster

B) delivers applications over the cloud using a pay-per-use revenue model

C) facilitates the accessibility of business-critical data in a timely, secure, and affordable manner

D) offers a cloud-based Big Data service to help organizations analyze massive amounts of data to solve business dilemmas

303) What is big data as a service (BDaaS)?

A) offers backup services that use cloud resources to protect applications and data from disruption caused by disaster

B) delivers applications over the cloud using a pay-per-use revenue model

C) facilitates the accessibility of business-critical data in a timely, secure, and affordable manner

D) offers a cloud-based big data service to help organizations analyze massive amounts of data to solve business dilemmas

304) Explain MIS infrastructure and its three primary types.

305) Identify the three primary areas associated with an information MIS infrastructure.

306) Describe the characteristics of an agile MIS infrastructure.

307) Identify the environmental impacts associated with MIS.

308) Explain the three components of a sustainable MIS infrastructure along with their business benefits.

Document Information

Document Type:
DOCX
Chapter Number:
5
Created Date:
Aug 21, 2025
Chapter Name:
Chapter 5 Infrastructures Sustainable Technologies
Author:
Paige Baltzan

Connected Book

M Information Systems 5th Edition | Test Bank with Answer Key by Paige Baltzan

By Paige Baltzan

Test Bank General
View Product →

$24.99

100% satisfaction guarantee

Buy Full Test Bank

Benefits

Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party