MIS Exam II

Your page rank:

Total word count: 2151
Pages: 8

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

Which of the following is true about cloud computing?

The elastic leasing of pooled computer resources over the Internet is called the cloud

Which of the following is a reason for the term elastic being used to define the cloud?

Computing resources can be increased or decreased dynamically in cloud-based hosting

An organization that hires cloud services ___________

can limit the response time of its web pages

Which of the following is true of Web services?

They are SOA-designed programs that comply with Web service standards

Which of the following statements is true about cloud services?

Financial institutions are not likely to hire cloud services from a vendor

Which of the following is true about cloud-based and in-house hosting?

Cloud-based hosting reduces the visibility of the security being used to protect data

Which of the following statements is true about the increase in popularity of cloud hosting?

Virtualization allows instantaneous creation of new virtual machines

Phobas Inc. offers an online service which stores notes made by customers on the cloud. When a customer enters notes on one device, it gets updated in all the devices he/she owns. Which of the following cloud-based offerings is being provided to the customers?

software as a service (SaaS)

An online service allows users to integrate their phonebook with their social media profiles and stores it on the cloud. The phonebook is updated with pictures of contacts when they are uploaded on social media sites. Which of the following cloud-based offerings is being provided to the users?

software as a service (SaaS)

The cloud-based service that provides the hardware and allows customers to load an operating system of their choice is known as ________.

infrastructure as a service (IaaS)

A ________ is a system of hardware and software that stores user data in many different geographical locations and makes that data available on demand.

content delivery network

Which of the following is a disadvantage of a content delivery network?

It is better suited to store and deliver content that seldom changes.

Which of the following statements is true of content delivery networks (CDNs)?

They reduce users’ access costs by delivering data faster.

An internal information system built using Web services ________.

is a cloud-based technology if it offers elasticity

Which of the following is a reason why an internal information system (private internet) that uses Web services is not considered a cloud?

The number of servers is fixed in a private internet and is not made elastic.

Which of the following services provides hardware, an operating system, and a database management system (DBMS) on a cloud-based offering?

platform as a service (PaaS)

Sireus Corp. is availing a cloud-based service. It plans to install a software package that will offer cloud services to its users. If it would like to avoid installing an operating system on the server, which of the following services should it choose?

platform as a service (PaaS)

If an organization opts for software as a service (SaaS), it will have to ________.

transfer data and develop procedures

Which of the following statements is true of private clouds?

Idle servers in a private cloud cannot re-allocated to other organizations.

Which of the following is a characteristic of a private cloud?

Most organizations avoid having multiple database servers in a private cloud.

Which of the following statements is true of a virtual private cloud (VPC)?

A VPC can be built on public cloud infrastructure.

Which of the following is a difference between a virtual private network (VPN) and a virtual private cloud (VPC)?

A VPC provides the advantages of cloud storage, but a VPN by itself cannot provide these advantages.

Which of the following is an advantage of using a private cloud over a virtual private cloud (VPC)?

Unlike a VPC, a private cloud does not require permission from regulating bodies to host sensitive data.

What is a VPN (virtual private network)?

It uses the Internet to create secure point-to-point connections.

Which of the following is true of a VPN (virtual private network)?

A VPN communication is secure even though it is transmitted over the public Internet.

Which of the following is a characteristic of a virtual private network (VPN)?

It sends encrypted messages over the public Internet.

Which of the following is likely to be a consequence of cloud computing in the future?

The cost of obtaining elastic resources will decrease.

A system uses cameras and motion-sensing equipment to issue tickets for traffic violations. This system is an example of ________.

telelaw enforcement

Using https instead of http ________.

allows a packet sniffer to see only the site visited and nothing further

The process of creating and maintaining information systems is called ________.

systems development

When compared to program development, systems development is ________.

broader in scope

Which of the following is true of systems development?

It requires business knowledge and an understanding of group dynamics.

Which of the following is true of information systems?

They can be adapted to fit business needs.

Which of the following is true with regards to bigger and longer projects?

the changes in requirements increases

According to Brooks’ Law, adding more people to a late project ________.

makes the project later

According to Brooks’ Law, which of the following is a likely consequence of adding more people to late projects?

The costs of training new people can overwhelm the benefits of their contribution.

The ________ approach is the classical process used to develop information systems

systems development life cycle (SDLC

Which of the following is the first phase of the systems development life cycle process?

system definition

Developers in the ________ phase of the systems development life cycle use management’s statement of the system needs in order to begin developing a new information system.

system definition

In which of the following phases of the systems development life cycle do developers identify the particular features and functions of a new system?

requirement analysis

The first step in defining a new information system is to ________.

define the goals and scope of the project

Which of the following steps in the systems definition process aims to eliminate obviously nonsensible projects?

assessing the project feasibility

________ feasibility concerns whether the new information system fits within a company’s customs, culture, charter, or legal requirements.

Organizational

During requirements definition, a development team’s composition would be typically heavy with ________.

systems analysts

Which of the following statements is true of the composition of a development team over the different phases of the systems development life cycle?

During integrated testing and conversion, the team will be augmented with business users.

The primary purpose of the requirements analysis phase is to ________.

determine and document the specific features and functions of the new system

Which is the most important phase in the systems development process?

determining the system’s requirements

During the requirements analysis phase of the systems development life cycle, the development team will create a(n) ________ if the new system involves a new database or substantial changes to an existing database.

data model

Which of the following is a typical concern for developers while using prototypes?

developing a uniform funding solution for the system

The easiest and cheapest time to alter the information system is in the ________ phase of the systems development life cycle.

requirements analysis

While designing ________, a development team must produce design documentation for writing computer code.

custom-developed programs

Which of the following personnel design the procedures for a business information system?

systems analysts

Normal processing procedures for operations personnel involve procedures ________.

for starting, stopping, and operating the system

During the ________ phase of the systems development life cycle process, developers construct, install, and test the components of the information system

implementation

A comprehensive test plan should ________.

cause every line of program code to be executed

________ testing is the process of allowing future system users to try out the new system on their own.

Beta

Which of the following personnel on a development team have the final say on whether a system is ready for use?

users

System ________ refers to the process of changing the business activity from an old information system to a new system.

conversion

In a ________ installation, an organization implements an entire system on a limited portion of the business.

pilot

In a ________ installation, the new system runs alongside the old one until it has been tested and is fully operational.

parallel

Olive Inc., a chain of retail outlets, is converting its existing billing systems to a more robust online tool. In this process, the organization runs both the old and the new systems to compare their performances. In this case, the company is implementing the new system using ________

parallel

Which of the following is the most expensive style of system conversion?

parallel installation

Which of the following styles of system conversion shuts off the old system and starts the new system?

plunge installation

Which of the following statements is true with regard to system maintenance?

All commercial software products are shipped with known failures.

Software developers group fixes for high priority failures into a ________ that can be applied to all copies of a given product.

patch

Software vendors usually bundle fixes of low-priority problems into ________.

service packs

Which of the following is a major concern for developers in a systems development life cycle process?

performing repetitive tasks of a completed phase

Projects that spend much time ________ are sometimes said to be in analysis paralysis.

documenting requirements

________ is another, more common title given to the director of computer services

CIO

Which of the following staff functions is at the top most of a typical senior-level reporting relationship?

Chief Operating Officer

The IS department’s principal manager is the ________.

CIO

In organizations where primary information systems support only accounting and finance activities, a reporting arrangement wherein the CIO reports to the ________ is practical.

CFO

In organizations that operate significant nonaccounting information systems, such as manufacturers, a reporting arrangement wherein the CIO reports to the ________ is more common and effective.

CEO

An organization that wishes to leverage the power of social media and elastic cloud opportunities to help accomplish its goals and objectives should ideally turn to the ________ group within its IT department for information.

technology

The CTO heads the ________ group in the IS department.

technology

The ________ group investigates new information systems and determines how the organization can benefit from them.

technology

The ________ group manages the computing infrastructure, including individual computers, in-house server farms, networks, and communications media.

operations

The ________ group within the IS department manages the process of creating new information systems as well as maintaining existing information systems.

development

Which of the following sentences is true for the development group of an IS department?

The size and structure of the group depends on whether programs are developed in-house or outsourced.

If a company’s IS-related programs are not developed in-house, then the development group of the IS department will be staffed primarily by ________.

systems analysts

The development group in a company’s IS department is staffed primarily by programmers, test engineers, technical writers, and other development personnel. Based on this information, which of the following is likely to be true?

The company develops programs in-house.

The ________ group’s purpose is to protect information assets by establishing standards and management practices and policies.

data administration

Which of the following is a responsibility of a systems analyst?

determining system requirements

A ________ designs and writes computer codes.

programmer

A ________ monitors, maintains, fixes, and tunes computer networks

network administrator

A ________ performs a wide range of activities such as programming, testing, database design, communications and networks, project management, and so on, and is required to have an entrepreneurial attitude.

consultant

Which of the following would be a responsibility of a small-scale project manager?

initiate, plan, manage, monitor, and close down projects

Information systems must be aligned with an organization’s ________ to help it accomplish its goals and objectives.

competitive strategy

Which of the following is true of the alignment between information systems and organizational strategies?

Information systems must evolve with the changes made in organization strategies

A(n) ________ committee is a group of senior managers from the major business functions that works with the CIO to set the IS priorities and decide among major IS projects and alternatives

steering

________ is the process of hiring another organization to perform a service.

outsourcing

Which of the following is an advantage of outsourcing information systems?

It can be an easy way to gain expertise otherwise not known.

Which of the following is a risk of outsourcing information systems?

Vendors can gain access to critical knowledge of the outsourcing company

________ refers to the leasing of hardware with pre-installed operating systems

Platform as a Service

In ________, hardware and both operating system and application software are leased

SaaS

Which of the following is a right of a user of information systems?

contributing to requirements for new system features and functions

Which of the following is a responsibility of an information systems user?

following security and backup procedures

As a user of IS, an employee has a responsibility to avoid ________.

unauthorized hardware modifications

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending