Study sets, textbooks, questions
Upgrade to remove ads
Chapter 4: Information Technology Infrastructure; IT Infrastructure and Emerging Technology
Terms in this set (62)
Information technology infrastructure
Shared technology resources that provide platform for the firm's specific information systems application; Includes investment in hardware, software, and services like consulting, and training; Provides the foundation for serving customers, working with vendors, and managing internal firm business proccesses
Represents the first era of IT infrastructure; Came onto its own thanks to the introduction of the IBM 360 series; The IBM 360 was the first commercial computer with a powerful operating system that could provide time sharing, multitasking, and virtual memory in a more advanced model; Powerful enough to support thousands of online remote terminals connected to the centralized mainframe using proprietary protocols and proprietary data lines; This era was a period of highly centralized computing under the control of professional programmers and systems operators (usually in a corporate data centers), with most elements of infrastructure provided by a single vendors, the manufacturer of hardware and software
Produced by the Digital Equipment Corporation (DEC) in 1965; Cheaper than the IBM mainframe and make decentralized computing possible which customized to the specific needs of individual departments or business units rather than time sharing on a single huge mainframe; In recent years, it has evolved into a midrange computer or midrange server and is part of a network.
Windows operating system software on a computer with an Intel microprocessor and it has become the standard desktop computer when it was introduced in 1981; At first, it uses the DOS operating system, a text-based command language, and later the Microsoft Windows operating system; Its dominance as a computing platform is receding as Iphone and Android devices sales increase; Came to be in the Personal computer era which started in 1981
Client server computing
Desktops are laptops computers (clients) are networked to powerful server computers that provide the client computers with a variety of services and capabilities; the 3rd era of IT infrastructure that started in 1983; Its simplest form consists of a client computer networked to a server computer, with a processing split between the two types of machines (two-tiered client/server architecture); Enables businesses to distribute computing work across a series of smaller, inexpensive machines that cost much less than centralized mainframe systems. The result is an explosion in computer power and applications throughout the firm
Desktops or laptops computers that are networks to a powerful server computers; User point of entry
Where clients computers are networked to; Typically processes and stores shared datas, serves up Webpage, or manages network activities; Refers to both the software application and the physical computer on which the network software runs; Could be a mainframe but are more likely to be a more powerful version of personal computer, based on the inexpensive chips and often using multiple processors in a single computer box
Multitiered client/server architecture
Used by most businesses; Complex and also known as N-tier client/server architecture; The work of the entire network is balanced over several different levels of servers, depending on the kind of service being requested
Will serve a web page to a client in response to a request for service; A server whose software is responsible for locating and managing stored Web pages
If the client request access to a corporate system, the request is passed through here; A serve whose software handles all application operations between a user and an organization's back-end business systems; May reside on the same computer as the Web server or on its own dedicated computer.
Enterprise Computing era
4th era of IT Infrastructure; Started from 1992; Links different pieces of computer software hardware and smaller networks into an enterprise-wide network so that information can flow freely across the organization and between the firm and other organizations; Can link different types of computer hardware, including mainframes, servers, PCs, and mobile devices, and it includes public infrastructures such as the telephone systems, the Internet, and public network services; Requires software to link disparate applications and enable data to flow freely among different parts of the business.
Cloud and Mobile Computing
5th era of IT infrastructure that started in 2000; Came to be the growing bandwidth power of the Internet has pushed the client/server model on step further.
Refers to a model of computing that provides access to a shared pool of computing resources (computers, storage, applications,and services) over a network, often the Internet; These resources can access on an as-needed basis from any connected device or location; A model of computing in which computer processing, storage, software, and other services are provided as a pool of virtualized resources over a network, primarily the internet
Named after Gordon Moore; 3 variations:
1) The power of microprocessors doubles every 18 months.
2) Computing power doubles every 18 months.
3) The price of computing falls by half every 18 months
Uses individual atoms and molecules to create computer chips and other devices that are thousands of times smaller than current technologies permit
Recommended textbook explanations
Introduction to Algorithms
Charles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen
Introduction to the Theory of Computation
Problem Solving with C++
Starting Out with Python
Sets with similar terms
Chapter 5 - IT Infrastructure and Emerging Technol…
Chapter 5 - IT Infrastructure and Emerging Technol…
CIS - Ch. 5
ITM Chapter 5
Other sets by this creator
A system with two dual-core processors has four processors available for scheduling. A CPU-intensive application is running on this system. All input is performed at program start-up, when a single file must be opened. Similarly, all output is performed just before the program terminates, when the program results must be written to a single file. Between startup and termination, the program is entirely CPU-bound. Your task is to improve the performance of this application by multithreading it. The application runs on a system that uses the one-to-one threading model (each user thread maps to a kernel thread). · How many threads will you create to perform the input and output? Explain. · How many threads will you create for the CPU-intensive portion of the application? Explain.
Create a class named MyTriangle that contains the following two methods: /** Return true if the sum of any two sides is * greater than the third side. */ public static boolean isValid(double side1, double side2, double side3) /** Return the area of the triangle. */ public static double area( double side1, double side2, double side3) Write a test program that reads three sides for a triangle and computes the area if the input is valid. Otherwise, it displays that the input is invalid. The formula for computing the area of a triangle is given in Programming Exercise 2.19.
The Fibonacci sequence starts 1, 1, 2, 3, 5, 8 ... Each number in the sequence (after the first two) is the sum of the previous two. Write a program that computes and outputs the nth Fibonacci number, where n is a value entered by the user.
Describe the differences among short-term, medium-term, and long-term scheduling.
Other Quizlet sets
CSE 3430 Final Exam
hematology 1 final exam
propriété électronique des molécules
MICB 201 Self Assessment Questions
What process is used to place one message inside another message for transfer from the source to the destination?
Which protocol allows for retrieving contents of the Internet page from a web server?
What is the term that is used to describe a computer system that could store literary documents, link them according to logical relationships, and allow readers to comment and annotate what they read?
An XML-based data format used to exchange authentication information between a client and a service.