Advertisement Upgrade to remove ads

Multiple Choice (IT Infrastructure)

Software that organizes, manages, and processes business data concerned with inventory,customers, and vendors is called:

a. system software.
b. application software.
c. data management software.
d. network software.

c. data management software.

Software that manages the resources of the computer is called:

a. system software.
b. application software.
c. data management software.
d. network software.

a. system software.

Your text defines a legacy system as:

a. traditional mainframe-based business information systems.
b. electronic spreadsheets used on a PC.
c. computerized account inquiry system for access by customers.
d. systems found on services.

a. traditional mainframe-based business information systems.

Software used to apply the computer to a specific task for an end user is called:

a. system software.
b. application software.
c. data management software.
d. network software.

b. application software.

Legacy systems are still used because:

a. they can only be run on the older mainframe computers.
b. they are too expensive to redesign.
c. many integrate well using new Web services technologies.
d. they contain valuable data that would be lost during redesign.

b. they are too expensive to redesign.

In which of the following computer categories will you find the highest FLOPS performance?

a. Server computer
b. Mainframe computer
c. Supercomputer
d. Distributed computing grid

d. Distributed computing grid

A microcomputer is a:

a. minicomputer.
b. workstation.
c. personal computer.
d. handheld device.

c. personal computer.

What would be a reason for using a workstation over a personal computer?

a. When you need more powerful computational abilities
b. When you need to access a network
c. When you need to serve applications and data to client computers
d. When you need to share resources

a. When you need more powerful computational abilities

Which of the following is a midrange computer typically found in a university or
research lab setting?

a. Mainframe
b. Server
c. Minicomputer
d. Supercomputer

c. Minicomputer

Which of the following types of computer are used for weather forecasting?

a. Mainframe
b. Server
c. Minicomputer
d. Supercomputer

d. Supercomputer

Connecting geographically remote computers in a single network to create a "virtual supercomputer" is called:

a. co-location.
b. edge computing.
c. grid computing.
d. utility computing.

c. grid computing.

The use of multiple computers linked by a communications network for processing is called:

a. grid computing.
b. distributed computing.
c. client/server networking.
d. multi-tiered networking.

b. distributed computing.

In a multi-tiered network:

a. the work of the entire network is centralized.
b. the work of the entire network is balanced over several levels of servers.
c. processing is split between clients and servers
d. processing is handled by multiple, geographically remote clients

b. the work of the entire network is balanced over several levels of servers.

A client computer networked to a server computer, with processing split between the two types of machines, is called a:

a. service-oriented architecture.
b. on-demand architecture.
c. multi-tiered client/server architecture.
d. two-tiered client/server architecture.

d. two-tiered client/server architecture.

The business case for using grid computing involves all of the following EXCEPT:

a. cost savings.
b. breakeven point.
c. speed of computation.
d. agility.

b. breakeven point.

The process of transferring applications from large computers to smaller ones is called:

a. downsizing.
b. down streaming.
c. distributed processing.
d. centralized processing.

a. downsizing.

The primary storage technologies are:

a. storage networks, magnetic tape, magnetic disk, and optical disk.
b. hard drives, magnetic tape, magnetic disk, and optical disk.
c. storage networks, magnetic disks, hard disks, and optical disks.
d. hard drives, removable drives, storage networks, and magnetic tape.

a. storage networks, magnetic tape, magnetic disk, and optical disk.

An example of magnetic disk storage is:

a. CD-ROM.
b. DVD.
c. USB Flash drive.
d. magnetic tape.

c. USB Flash drive.

A SAN is a:

a. server area network.
b. storage area network.
c. scalable architecture network.
d. service-oriented architecture network.

b. storage area network.

Which of the following is a device that collects data directly from the environment for input into a computer system?

a. Sensor
b. Touch screen
c. Audio input
d. Trackball

a. Sensor

Which of the following storage technology stores data sequentially?

a. CD-ROM
b. RAID
c. Magnetic disks
d. Magnetic tape

d. Magnetic tape

A high-speed network dedicated to storage that connects different kinds of storage devices, such as tape libraries and disk arrays so they can be shared by multiple servers best describes:

a. SSN.
b. ASP.
c. LAN.
d. SAN.

d. SAN.

What type of device gathers data and converts them into electronic form for use by the computer?

a. Output device
b. Input device
c. Optical storage
d. Magnetic storage

b. Input device

In batch processing:

a. transactions are processed immediately in batches.
b. transactions are accumulated in batches until it is time to process them.
c. transactions are processed by arrays of multiple, less expensive servers.
d. transactions are processed by arrays of multiple, less expensive workstations.

b. transactions are accumulated in batches until it is time to process them.

Batch systems typically use:

a. tape storage.
b. optical storage.
c. SANs.
d. networked storage.

a. tape storage.

An example of technology convergence is:

a. virus protection software that runs and updates itself automatically.
b. software programmed to run on any hardware platform.
c. cell phones taking on the functions of handheld computers.
d. programming languages that allow non-programmers to create custom applications.

c. cell phones taking on the functions of handheld computers.

An example of autonomic computing is:

a. virus protection software that runs and updates itself automatically.
b. software programmed to run on any hardware platform.
c. cell phones taking on the functions of handheld computers.
d. programming languages that allow non-programmers to create custom applications.

a. virus protection software that runs and updates itself automatically.

An industry-wide effort to develop systems that can configure, optimize, tune, and heal themselves when broken, and protect themselves from outside intruders and selfdestruction is called:

a. grid computing.
b. utility computing.
c. edge computing.
d. autonomic computing.

d. autonomic computing.

The components of edge computing are:

a. local client, ISP servers, corporate enterprise servers.
b. local client, corporate Web servers, corporate enterprise servers.
c. ISP servers, corporate Web servers, corporate enterprise servers.
d. ISP servers, corporate enterprise servers, Web servers.

a. local client, ISP servers, corporate enterprise servers.

A computer language translation program:

a. performs common tasks such as copying.
b. coordinates requests between the operating system and applications.
c. allows platform-independent applications to run on any hardware.
d. converts programming language into machine language.

d. converts programming language into machine language.

A utility program:

a. performs common tasks such as copying.
b. coordinates requests between the operating system and applications.
c. allows platform-independent applications to run on any hardware.
d. converts programming language into machine language.

a. performs common tasks such as copying.

An interface that uses icons, bars, boxes, and buttons to perform tasks is called a:

a. graphic utility interface.
b. graphic user interface.
d. object-oriented interface.
e. operating system.

b. graphic user interface.

Which is the most recent Windows operating system?

a. Windows 2007
b. Windows Vista
c. Windows CE
d. Windows XP

b. Windows Vista

The interactive, multi-user, operating system developed by Bell Laboratories to help scientific researchers share data is:

a. Unix.
b. Linux.
c. Mac OS.
d. COBOL.

a. Unix.

The major driver for the adoption of Linux for most corporations would be:

a. cost.
b. reliability.
c. resilience.
d. integration.

a. cost.

The most important programming languages for business have been:

a. Pascal, C, C++, COBOL.
b. C++, COBOL, Visual Basic, Java.
c. C, C++, COBOL, Visual Basic.
d. C, C++, Visual Basic, Java.

c. C, C++, COBOL, Visual Basic.

Linux is:

a. primarily concerned with the tasks of end users.
b. designed for specific machines and specific microprocessors.
c. an example of open-source software.
d. especially useful for processing numeric data.

c. an example of open-source software.

A report generator is an example of:

a. procedural language.
b. first-generation language.
c. graphics language.
d. fourth-generation language.

d. fourth-generation language.

Two categories of fourth-generation languages are:

a. Graphics language, application software package.
b. Mac OSX Tiger, Windows Vista.
c. Java, C++.
d. SOAP, WSDL.

a. Graphics language, application software package.

Languages that enable a user to make requests using conversational commands resembling human speech are called:

a. query languages.
b. natural languages.
c. fourth-generation languages.
d. nonprocedural languages.

b. natural languages.

Which type of software provides more control over text and graphic placement in the layout of a page than word processing software?

a. Desktop publishing software
b. Spreadsheet software
c. Graphics software
d. Presentation software

a. Desktop publishing software

An integrated software package:

a. includes capabilities for presentation graphics as well as text-editing and
spreadsheets.
b. provides functions to support the collaborative activities of workgroups, including
software for group writing, information-sharing, and electronic meetings.
c. includes full-featured versions of application software bundled as a unit.
d. combines the functions of important PC software packages.

4. combines the functions of important PC software packages.

Running a Java program on a computer:

a. requires a Java Virtual Machine to be installed on the computer.
b. requires a Java Virtual Machine to be installed on the server hosting the Java applet.
c. requires a miniature program to be downloaded to the user's computer.
d. does not require any specialized software, as Java is platform-independent.

a. requires a Java Virtual Machine to be installed on the computer.

HTML is a:

a. hybrid language providing more flexibility than the popular language in current use.
b. language that delivers only the software functionality needed for a specific task.
c. page description language for creating Web pages and other hypermedia documents.
d. language that combines data and program code.

c. page description language for creating Web pages and other hypermedia documents.

Software that enables multiple systems to exchange data through a single software hub is called:

a. SOAP.
b. WSDL.
c. EAI.
d. XML.

c. EAI.

Software that functions as a translation layer between two disparate applications so they can work together is called:

a. enterprise software.
b. integration software.
c. distributed software.
d. middleware.

d. middleware.

Software that connects two disparate applications, allowing them to communicate with each other and to exchange data best describes:

a. enterprise software.
b. integration software.
c. distributed software.
d. middleware.

d. middleware.

What is the foundation technology for Web services?

a. XML
b. HTML
c. SOAP
d. UDDI

a. XML

A set of self-contained services that communicate with each other to create a working software application is called:

a. web services.
b. enterprise integration.
c. SOA.
d. SOAP.

c. SOA.

Software applications that combine different online software applications are called:

a. integrated software.
b. fistributed software.
c. mashups.
d. grid computing.

c. mashups.

This model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology implementations:

a. total cost of ownership.
b. return on investment.
c. breakeven point.
d. cost benefit analysis.

a. total cost of ownership.

When a firm contracts custom software development to an outside firm, it is commonly referred to as:

a. outsourcing.
b. scaling.
c. service-oriented architecture.
d. application integration.

a. outsourcing.

Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down?

a. Modifiability
b. Scalability
c. Expandability
d. Disintermediation

b. Scalability

This type of computing refers to firms off-loading peak request for computing power to remote, large-scale data processing centers:

a. on-demand.
b. grid.
c. edge.
d. autonomic.

a. on-demand.

When a firm purchases computing power from a central computing service and pays only for the amount of computing power it uses, this is commonly referred to as:

a. grid computing.
b. utility computing.
c. edge computing.
d. autonomic computing.

b. utility computing.

An application service provider:

a. supplies online access over networks to storage devices and storage area network technology.
b. manages combinations of applications, networks, systems, storage, and security as
well as providing Web site and systems performance monitoring to subscribers over
the Internet.
c. uses centrally managed facilities to host and manage access to package applications
delivered over networks on a subscription basis.
d. provides only usage-based pricing during a specified time period.

c. uses centrally managed facilities to host and manage access to package applications

JP Morgan's handing over of a significant portion of its IT infrastructure to IBM is an
example of:

a. edge computing.
b. outsourcing.
c. downsizing.
d. scalability.

b. outsourcing.

After reading the text, JP Morgan's deal with IBM was an example of using technology to gain which of the four basic categories of competitive advantage?

a. Demand control
b. Economy of scale
c. Barrier to entry restricting supply
d. Process efficiency

d. Process efficiency

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set