Which of the following is true about cloud computing? |
The elastic leasing of pooled computer resources over the Internet is called the cloud |
Which of the following is a reason for the term elastic being used to define the cloud? |
Computing resources can be increased or decreased dynamically in cloud-based hosting |
An organization that hires cloud services ___________ |
can limit the response time of its web pages |
Which of the following is true of Web services? |
They are SOA-designed programs that comply with Web service standards |
Which of the following statements is true about cloud services? |
Financial institutions are not likely to hire cloud services from a vendor |
Which of the following is true about cloud-based and in-house hosting? |
Cloud-based hosting reduces the visibility of the security being used to protect data |
Which of the following statements is true about the increase in popularity of cloud hosting? |
Virtualization allows instantaneous creation of new virtual machines |
Phobas Inc. offers an online service which stores notes made by customers on the cloud. When a customer enters notes on one device, it gets updated in all the devices he/she owns. Which of the following cloud-based offerings is being provided to the customers? |
software as a service (SaaS) |
An online service allows users to integrate their phonebook with their social media profiles and stores it on the cloud. The phonebook is updated with pictures of contacts when they are uploaded on social media sites. Which of the following cloud-based offerings is being provided to the users? |
software as a service (SaaS) |
The cloud-based service that provides the hardware and allows customers to load an operating system of their choice is known as ________. |
infrastructure as a service (IaaS) |
A ________ is a system of hardware and software that stores user data in many different geographical locations and makes that data available on demand. |
content delivery network |
Which of the following is a disadvantage of a content delivery network? |
It is better suited to store and deliver content that seldom changes. |
Which of the following statements is true of content delivery networks (CDNs)? |
They reduce users’ access costs by delivering data faster. |
An internal information system built using Web services ________. |
is a cloud-based technology if it offers elasticity |
Which of the following is a reason why an internal information system (private internet) that uses Web services is not considered a cloud? |
The number of servers is fixed in a private internet and is not made elastic. |
Which of the following services provides hardware, an operating system, and a database management system (DBMS) on a cloud-based offering? |
platform as a service (PaaS) |
Sireus Corp. is availing a cloud-based service. It plans to install a software package that will offer cloud services to its users. If it would like to avoid installing an operating system on the server, which of the following services should it choose? |
platform as a service (PaaS) |
If an organization opts for software as a service (SaaS), it will have to ________. |
transfer data and develop procedures |
Which of the following statements is true of private clouds? |
Idle servers in a private cloud cannot re-allocated to other organizations. |
Which of the following is a characteristic of a private cloud? |
Most organizations avoid having multiple database servers in a private cloud. |
Which of the following statements is true of a virtual private cloud (VPC)? |
A VPC can be built on public cloud infrastructure. |
Which of the following is a difference between a virtual private network (VPN) and a virtual private cloud (VPC)? |
A VPC provides the advantages of cloud storage, but a VPN by itself cannot provide these advantages. |
Which of the following is an advantage of using a private cloud over a virtual private cloud (VPC)? |
Unlike a VPC, a private cloud does not require permission from regulating bodies to host sensitive data. |
What is a VPN (virtual private network)? |
It uses the Internet to create secure point-to-point connections. |
Which of the following is true of a VPN (virtual private network)? |
A VPN communication is secure even though it is transmitted over the public Internet. |
Which of the following is a characteristic of a virtual private network (VPN)? |
It sends encrypted messages over the public Internet. |
Which of the following is likely to be a consequence of cloud computing in the future? |
The cost of obtaining elastic resources will decrease. |
A system uses cameras and motion-sensing equipment to issue tickets for traffic violations. This system is an example of ________. |
telelaw enforcement |
Using https instead of http ________. |
allows a packet sniffer to see only the site visited and nothing further |
The process of creating and maintaining information systems is called ________. |
systems development |
When compared to program development, systems development is ________. |
broader in scope |
Which of the following is true of systems development? |
It requires business knowledge and an understanding of group dynamics. |
Which of the following is true of information systems? |
They can be adapted to fit business needs. |
Which of the following is true with regards to bigger and longer projects? |
the changes in requirements increases |
According to Brooks’ Law, adding more people to a late project ________. |
makes the project later |
According to Brooks’ Law, which of the following is a likely consequence of adding more people to late projects? |
The costs of training new people can overwhelm the benefits of their contribution. |
The ________ approach is the classical process used to develop information systems |
systems development life cycle (SDLC |
Which of the following is the first phase of the systems development life cycle process? |
system definition |
Developers in the ________ phase of the systems development life cycle use management’s statement of the system needs in order to begin developing a new information system. |
system definition |
In which of the following phases of the systems development life cycle do developers identify the particular features and functions of a new system? |
requirement analysis |
The first step in defining a new information system is to ________. |
define the goals and scope of the project |
Which of the following steps in the systems definition process aims to eliminate obviously nonsensible projects? |
assessing the project feasibility |
________ feasibility concerns whether the new information system fits within a company’s customs, culture, charter, or legal requirements. |
Organizational |
During requirements definition, a development team’s composition would be typically heavy with ________. |
systems analysts |
Which of the following statements is true of the composition of a development team over the different phases of the systems development life cycle? |
During integrated testing and conversion, the team will be augmented with business users. |
The primary purpose of the requirements analysis phase is to ________. |
determine and document the specific features and functions of the new system |
Which is the most important phase in the systems development process? |
determining the system’s requirements |
During the requirements analysis phase of the systems development life cycle, the development team will create a(n) ________ if the new system involves a new database or substantial changes to an existing database. |
data model |
Which of the following is a typical concern for developers while using prototypes? |
developing a uniform funding solution for the system |
The easiest and cheapest time to alter the information system is in the ________ phase of the systems development life cycle. |
requirements analysis |
While designing ________, a development team must produce design documentation for writing computer code. |
custom-developed programs |
Which of the following personnel design the procedures for a business information system? |
systems analysts |
Normal processing procedures for operations personnel involve procedures ________. |
for starting, stopping, and operating the system |
During the ________ phase of the systems development life cycle process, developers construct, install, and test the components of the information system |
implementation |
A comprehensive test plan should ________. |
cause every line of program code to be executed |
________ testing is the process of allowing future system users to try out the new system on their own. |
Beta |
Which of the following personnel on a development team have the final say on whether a system is ready for use? |
users |
System ________ refers to the process of changing the business activity from an old information system to a new system. |
conversion |
In a ________ installation, an organization implements an entire system on a limited portion of the business. |
pilot |
In a ________ installation, the new system runs alongside the old one until it has been tested and is fully operational. |
parallel |
Olive Inc., a chain of retail outlets, is converting its existing billing systems to a more robust online tool. In this process, the organization runs both the old and the new systems to compare their performances. In this case, the company is implementing the new system using ________ |
parallel |
Which of the following is the most expensive style of system conversion? |
parallel installation |
Which of the following styles of system conversion shuts off the old system and starts the new system? |
plunge installation |
Which of the following statements is true with regard to system maintenance? |
All commercial software products are shipped with known failures. |
Software developers group fixes for high priority failures into a ________ that can be applied to all copies of a given product. |
patch |
Software vendors usually bundle fixes of low-priority problems into ________. |
service packs |
Which of the following is a major concern for developers in a systems development life cycle process? |
performing repetitive tasks of a completed phase |
Projects that spend much time ________ are sometimes said to be in analysis paralysis. |
documenting requirements |
________ is another, more common title given to the director of computer services |
CIO |
Which of the following staff functions is at the top most of a typical senior-level reporting relationship? |
Chief Operating Officer |
The IS department’s principal manager is the ________. |
CIO |
In organizations where primary information systems support only accounting and finance activities, a reporting arrangement wherein the CIO reports to the ________ is practical. |
CFO |
In organizations that operate significant nonaccounting information systems, such as manufacturers, a reporting arrangement wherein the CIO reports to the ________ is more common and effective. |
CEO |
An organization that wishes to leverage the power of social media and elastic cloud opportunities to help accomplish its goals and objectives should ideally turn to the ________ group within its IT department for information. |
technology |
The CTO heads the ________ group in the IS department. |
technology |
The ________ group investigates new information systems and determines how the organization can benefit from them. |
technology |
The ________ group manages the computing infrastructure, including individual computers, in-house server farms, networks, and communications media. |
operations |
The ________ group within the IS department manages the process of creating new information systems as well as maintaining existing information systems. |
development |
Which of the following sentences is true for the development group of an IS department? |
The size and structure of the group depends on whether programs are developed in-house or outsourced. |
If a company’s IS-related programs are not developed in-house, then the development group of the IS department will be staffed primarily by ________. |
systems analysts |
The development group in a company’s IS department is staffed primarily by programmers, test engineers, technical writers, and other development personnel. Based on this information, which of the following is likely to be true? |
The company develops programs in-house. |
The ________ group’s purpose is to protect information assets by establishing standards and management practices and policies. |
data administration |
Which of the following is a responsibility of a systems analyst? |
determining system requirements |
A ________ designs and writes computer codes. |
programmer |
A ________ monitors, maintains, fixes, and tunes computer networks |
network administrator |
A ________ performs a wide range of activities such as programming, testing, database design, communications and networks, project management, and so on, and is required to have an entrepreneurial attitude. |
consultant |
Which of the following would be a responsibility of a small-scale project manager? |
initiate, plan, manage, monitor, and close down projects |
Information systems must be aligned with an organization’s ________ to help it accomplish its goals and objectives. |
competitive strategy |
Which of the following is true of the alignment between information systems and organizational strategies? |
Information systems must evolve with the changes made in organization strategies |
A(n) ________ committee is a group of senior managers from the major business functions that works with the CIO to set the IS priorities and decide among major IS projects and alternatives |
steering |
________ is the process of hiring another organization to perform a service. |
outsourcing |
Which of the following is an advantage of outsourcing information systems? |
It can be an easy way to gain expertise otherwise not known. |
Which of the following is a risk of outsourcing information systems? |
Vendors can gain access to critical knowledge of the outsourcing company |
________ refers to the leasing of hardware with pre-installed operating systems |
Platform as a Service |
In ________, hardware and both operating system and application software are leased |
SaaS |
Which of the following is a right of a user of information systems? |
contributing to requirements for new system features and functions |
Which of the following is a responsibility of an information systems user? |
following security and backup procedures |
As a user of IS, an employee has a responsibility to avoid ________. |
unauthorized hardware modifications |
MIS Exam II
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price