Filters
Question type

Study Flashcards

Failback is a specific type of fault tolerance,occurs when a redundant storage server offers an exact replica of the real-time data,and if the primary server crashes,the users are automatically directed to the secondary server or backup server.

A) True
B) False

Correct Answer

verifed

verified

What role is grounded in technology,fluent in business,and able to provide the important bridge between MIS and the business?


A) MIS Infrastructure manager
B) MIS specialist
C) Enterprise architect
D) Enterprise manager

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is the amount of energy consumed by business processes and systems?


A) Ewaste
B) Energy consumption
C) Carbon emissions
D) Sustainable MIS

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

A cold site is a separate facility that does not have any computer equipment but is a place where employees can move after a disaster.

A) True
B) False

Correct Answer

verifed

verified

A business continuity planning identifies all critical business functions and the effect that a specific disaster may have upon them.

A) True
B) False

Correct Answer

verifed

verified

What is disaster recovery as a service?


A) Combines multiple network storage devices so they appear to be a single storage device
B) Combines networks by splitting the available bandwidth into independent channels that can be assigned in real time to a specific device
C) Combines the physical resources,such as servers,processors,and operating systems,from the applications
D) Offers backup services that use cloud resources to protect applications and data from disruption caused by disaster

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

What ensures a company is ready to respond to an emergency in an organized,timely,and effective manner?


A) Emergence
B) Emergency preparedness
C) Business Impact analysis
D) Technology failure

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

What is clean computing?


A) A subset of sustainable MIS,refers to the environmentally responsible use,manufacture,and disposal of technology products and computer equipment
B) Built using environment friendly materials and designed to save energy
C) Reuses or refurbishes ewaste and creates a new product
D) A companies' acknowledged responsibility to society

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the below represents the primary elements in an information MIS infrastructure?


A) Backup,recovery,disaster recovery,and business continuity planning
B) Backup,accessibility,and usability
C) Backup,cloud computing,and virtualization
D) Grid computing,cloud computing,and virtualization

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

Reliability is a system weakness that can be exploited by a threat.

A) True
B) False

Correct Answer

verifed

verified

What is the ability to get a system up and running in the event of a system crash or failure that includes restoring the information backup?


A) Failure tolerance
B) Recovery
C) Reliability
D) Capacity planning

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

If you want to support organization change you will focus on building a strong information MIS infrastructure,which identifies where and how important information,such as customer records,is maintained and secured.

A) True
B) False

Correct Answer

verifed

verified

Cloud computing stores,manages,and processes data and applications over the Internet rather than on a personal computer or server.

A) True
B) False

Correct Answer

verifed

verified

An MIS infrastructure is ___________.


A) dynamic and static
B) dynamic and continually changing
C) a client and a server
D) hardware and software

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

A system is called unavailable when it is not operating and can't be used.

A) True
B) False

Correct Answer

verifed

verified

A backup is an exact copy of a system's information.

A) True
B) False

Correct Answer

verifed

verified

Vulnerability is a system weakness that can be exploited by a threat.

A) True
B) False

Correct Answer

verifed

verified

A disaster recovery plan contains a _____________ that outlines the costs to support the plan.


A) disaster organizational cost analysis
B) disaster recovery improvements
C) disaster financial costs
D) disaster recovery cost curve

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

Web accessibility means that people with disabilities including visual,auditory,physical,speech,cognitive,and neurological disabilities can use the Web.

A) True
B) False

Correct Answer

verifed

verified

What consists of the physical devices associated with a computer system?


A) Hardware
B) Software
C) Client
D) Server

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Showing 141 - 160 of 308

Related Exams

Show Answer