Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Washington State University MIS 250 Chapter 3: Managing the Information Systems Infrastructure and Services 1)_are used to enter information into a computer using devices such as a keyboard and mouse on your personal computer, a biometric fingerprint reader to authenticate a person entering a secure laboratory, or RFID scanners to track valuable inventory in a warehouse

Washington State University MIS 250 Chapter 3: Managing the Information Systems Infrastructure and Services 1)_are used to enter information into a computer using devices such as a keyboard and mouse on your personal computer, a biometric fingerprint reader to authenticate a person entering a secure laboratory, or RFID scanners to track valuable inventory in a warehouse

Business

Washington State University

MIS 250

Chapter 3: Managing the Information Systems Infrastructure and Services

1)_are used to enter information into a computer using devices such as a keyboard and mouse on your personal computer, a biometric fingerprint reader to authenticate a person entering a secure laboratory, or RFID scanners to track valuable inventory in a warehouse.

A)           Processing technologies

B)            Storage technologies XC) Input technologies

D)           Computational technologies

E)            Output technologies

 

2)            Which of the following statements is true about processing technologies?

A)           They are used to enter information into a computer.

B)            They deliver information in a usable format.

C)            They define the procedures that different computers follow when they transmit and receive data.

XD) They transform inputs into outputs.

E) They move data storage away from a centralized location to the"edges" of a network.

 

3)                           deliver information to you in a usable format. XA) Output technologies

B)            Computational technologies

C)            Storage technologies

D)           Input technologies

E)            Processing technologies

 

4)            A(n)       is also referred to as the computer's brain.

A)           random-access memory

B)            operating system

C)            read-only memory

D)           application software XE) microprocessor

 

5)            The        is responsible for performing all the operations of the computer.

A)           random-access memory

B)            central processing unit

C)            read-only memory

D)           application software XE) operating system

 

6)            Any input your computer receives is digitized and then is processed by the CPU. Which of the following explains the meaning of the word "digitized" in the preceding sentence?

A)           stored in random-access memory

B)            encrypted in the operating system

C)            stored in a hard drive

XD) translated into binary code

E) converted into application software

 

7)            The primary storage is also known as      . XA) volatile memory

B)            permanent memory

C)            nonvolatile memory

D)           protocols

E)            long-term memory

 

8)            Which of the following statements is true about secondary storage?

A)           The instructions and work stored in secondary storage are lost when the computer is shut off. XB) It retains the data when the power to the computer is shut off.

C)            It is a temporary storage place for data that is currently being processed.

D)           It is considerably faster than primary storage.

E)            The work stored in secondary storage is lost when new data is placed.

 

9)            The CPU interacts with  for permanently storing data.

A)           primary storage

B)            volatile memory

C)            random-access memory

D)           output technologies XE) secondary storage

 

10)                         is the collection of programs that control the basic operations of computer hardware.

A)           Application software

B)            Transitory software XC) Systems software

D)           Open source software

E)            Peripheral software

 

11)          The operating system of a computer is an example of a(n)           software. XA) systems

B)            open source

C)            transitory

D)           peripheral

E)            application

 

12)          Operating systems are often written in , a very low level computer programming language that allows the computer to operate quickly and efficiently.

A)           structured query language

B)            hyper text markup language

C)            assembly language

D)           extensible markup language

E)            practical extraction and report language

 

13)          Which of the following tasks is performed by the systems software?

A)           writing a business letter

 

B)            managing a stock portfolio

C)            coordination of suppliers, product or service production, and distribution XD) printing documents

E) manipulating a series of forecasts

 

14)          Which of the following tasks is performed by the application software?

A)           printing documents

XB) writing a business letter

C)            presenting information via a monitor

D)           updating the system clock

E)            saving data to a disk

 

15)          The customer relationship management system and personal productivity software are examples of     .

XA) application software

B)            peripheral software

C)            systems software

D)           transitory software

E)            open source software

 

16)          Which of the following statements is true about open source software?

A)           These programs are used by a few professional users.

B)            These programs do not include systems software.

C)            They are back-up software used when a system is converting from systems to application software.

D)           These programs do not include application software.

XE) These programs' source code is freely available for use and/or modification.

 

17)          A             is the most expensive and most powerful kind of computer, which is used primarily to assist in solving massive scientific problems.

XA) supercomputer

B)            workstation

C)            mainframe

D)           server

E)            microcomputer

 

18)          A             is used primarily as the main, central computing system for major corporations.

A)           microcomputer

B)            supercomputer

C)            server

XD) mainframe

E) workstation

 

19)          A             is any computer on a network that makes access to files, printing, communications, and other services available to users of the network.

A)           workstation

 

XB) server

C)            microcomputer

D)           supercomputer

E)            mainframe

 

20)          Designed for medical, engineering, or animation and graphics design uses,          are optimized for visualization and rendering of three-dimensional models.

A)           mainframes

B)            supercomputers XC) workstations

D)           servers

E)            microcomputers

 

21)          A             is used for personal computing and small business computing.

A)           workstation XB) microcomputer

C)            mainframe

D)           server

E)            supercomputer

 

22)          Which of the following statements is true about servers?

XA) They are used to provide services to users within large organizations or to Web users.

B)            They are primarily used as the main, central computing system for major corporations.

C)            They are used primarily to assist in solving massive scientific problems.

D)           They are optimized for visualization and rendering of three-dimensional models.

E)            They are used for personal computing and small business computing.

 

23)                         define the procedures that different computers follow when they transmit and receive data.

A)           Consoles

B)            Ports

XC) Protocols

D)           Hosts

E)            Domains

 

24)                         is the transmission capacity of a computer or communications channel.

A)           Latency

B)            Throughput XC) Bandwidth

D)           Jitter

E)            Codec

 

25)          Bandwidth is measured in            .

A)           moles per second

B)            joules per second

C)            parts per million

 

XD) bits per second

E) relays per second

 

26)          A             is any computer on the network, or any software application that uses only the services provided by the server.

A)           peer XB) client

C)            host

D)           console

E)            port

 

27)          A             is any computer that requests and provides services.

A)           console

B)            client XC) peer

D)           host

E)            port

 

28)          In            networks, servers and clients have defined roles. XA) server-centric

B)            peer-to-peer

C)            peer-centric

D)           client-centric

E)            server-to-peer

 

29)                         networks enable any computer or device on the network to provide and request services. All members of the network have equivalent capabilities and responsibilities.

A)           Server-centric

B)            Server-to-peer C) Client-to-peer XD) Peer-to-peer

E) Client-centric

 

30)          The Internet relies on    technology to deliver data and information across networks.

A)           circuit-switching

B)            frame-relay

XC) packet-switching

D)           packet-sniffing

E)            store-and-forward

 

31)                         is based on the concept of turn taking and enables millions of users to send large and small chunks of data across the Internet concurrently.

XA) Packet switching

B)            Store-and-forward

C)            Frame-relay

D)           Circuit-switching

 

E)            Packet-sniffing

 

32)          Which of the following is mandatory for packet switching to work?

A)           Each packet being sent across a network must go through a supercomputer. XB) Each packet being sent across a network must be labeled with a header.

C)            Each packet being sent across a network must be thoroughly scanned.

D)           Each packet being sent across a network must be broken down into sub-packets.

E)            Each packet being sent across a network must pass through a mainframe computer.

 

33)          Which of the following statements is true about packet-switching systems?

A)           For this system to work, each packet being sent across a network must be verified.

B)            In this system, each computer attached to a network has the same network address.

C)            Packet switching is used when only one computer needs to use the network.

D)           These systems adapt instantly to changes in network traffic.

XE) Wide Area Networks and the Internet do not use these technologies.

 

34)          Which of the following occurs if only one computer needs to use the network in a packet- switching system?

XA) Data is sent continuously.

B)            The system waits for another computer to send data.

C)            Data is verified by the central server.

D)           Data blocks the network traffic and slows the system.

E)            Data is sent through the packet-switching technology.

 

35)          Internet protocol or the protocol used by the Internet is called the          . XA) Transmission Control Protocol (TCP)

B)            Dynamic Host Configuration Protocol (DHCP)

C)            Address Resolution Protocol (ARP)

D)           Trivial File Transfer Protocol (TFTP)

E)            TOC protocol

 

36)          A             is a device used to connect two or more individual networks.

A)           port

B)            console XC) router

D)           jitter

E)            codec

 

37)          Datagram routing and delivery are possible because every computer and router connected to the Internet is assigned an        .

A)           IP packet

B)            IP console

C)            IP router XD) IP address

E) IP port

 

38)          Prior to the invention of the Web, content posted on the Internet could be accessed through the Internet tool Gopher. The Web took Gopher one step further by introducing       .

A)           animation XB) hypertext

C)            simulation

D)           file sharing

E)            instant chat

 

39)          The standard method of specifying the format of Web pages is called     .

A)           Structured Query Language (SQL)

B)            Practical Extraction and Report Language (PERL)

C)            Extensible Markup Language (XML)

D)           Assembly Language (AL)

XE) Hypertext Markup Language (HTML)

 

40)          Web servers process user requests for pages using the . XA) Hypertext Transfer Protocol

B)            TOC protocol

C)            Address Resolution Protocol

D)           Dynamic Host Configuration Protocol

E)            Trivial File Transfer Protocol

 

41)          Which of the following statements is true about the Information Infrastructure Act?

A)           It allowed the use of the Web by education institutions such as universities.

B)            It allotted certain governmental agencies with the power to pick-and-scan any document on the Web for security reasons.

XC) It opened the Web for commercial purposes.

D)           It permitted the controlled use of pornography over the Internet.

E)            It allowed the use of peer-to-peer networks on the Web.

 

42)          Which of the following is true about the graphical Web browser Mosaic?

A)           It provided users with references or links to other documents.

B)            It initiated file sharing on the Web.

XC) It is the basis of popular browsers such as Internet Explorer and Mozilla Firefox.

D)           It made the tracking of IP addresses possible.

E)            It allowed users to open and use more than one Web page simultaneously.

 

43)          Which of the following statements is true about a uniform resource locator?

A)           It is used to locate specific information in a Web page. XB) It is used to identify and locate a particular Web page.

C)            It is a protocol that helps Web servers store Web pages.

D)           It is a standard method for specifying the format of Web pages.

E)            It is a software application used to display the features of a Web page.

 

44)          The suffix ".org" is reserved for .

A)           governmental entities

 

B)            commercial organizations

C)            network organizations

D)           educational institutions XE) nonprofit organizations

 

45)          Which of the following is likely to have the suffix ".com" after the domain name in its URL?

A)           UNICEF

B)            the Federal Reserve XC) Microsoft

D)           the World Wide Fund for Nature

E)            Massachusetts Institute of Technology

 

46)          Which of the following is likely to have the suffix ".org" after the domain name in its URL? XA) the Red Cross Society

B)            Starbucks

C)            the Federal Bureau of Investigation

D)           McDonalds

E)            Harvard Business School

 

47)          Which of the following is likely to have the suffix ".edu" after the domain name in its URL?

A)           Yahoo!

B)            UNICEF

C)            the Federal Reserve

XD) Harvard Business School

E) America Online

 

48)          In a URL, the      is the particular Web server or group of Web servers (if it is a larger Web site) that will respond to the Web request.

XA) domain name

B)            host name

C)            client name

D)           top-level domain name

E)            port name

 

49)          Which of the following is the host name in the URL "labs.google.co.in/jack carver?" XA) labs

B)            google

C)            co

D)           in

E)            jack carver

 

50)          Which of the following statements is true about an IP address?

A)           The format of an IP address is a 64-bit numeric address.

B)            It is written as eight numbers separated by periods.

C)            Each number separated by periods can have any number between 0 to 999. XD) It can be used to navigate to particular Web addresses.

 

E) It is written as one number with a period at the end of the number

 

51)          The prediction that the number of transistors on a chip would double about every two years is known as                .

A)           Megan's law

B)            Ashby's law

C)            Murphy's law

D)           Metcalfe's law XE) Moore's law

 

52)          The first CPU had 2,200 transistors, whereas the newest models have broken the 2-billion- transistor mark. Take for example, the Intel Core i7 Extreme CPU which can complete hundreds of millions of operations every second. Which of the following is the most similar to this scenario?

A)           Advanced "cloud" applications can be used for grid computing, edge computing, and IP convergence.

B)            Apple has seen its sales volumes skyrocket by being able to come up with products that leverage existing technology.

XC) New generation digital cameras have a higher number and size of pixels than older digital camera models.

D)           The value of social networking sites increases as the number of users and membership increase.

E)            The greater the number of contributors to an open source software, the greater the "hidden costs" of running it.

 

53)          Which of the following occurred in the 1964-1990s generation of computing?

A)           The mainframe era began.

XB) The personal computer era began and interpersonal computing began.

C)            The mainframe era ended and the personal computer era began.

D)           The interpersonal computing era ended and the Internetworking era began.

E)            The Internetworking era ended.

 

54)          Which of the following occurred in the 1990s-2000 generation of computing?

A)           The mainframe era began.

XB) The personal computer era ended and interpersonal computing began.

C)            The mainframe era ended and the personal computer era began.

D)           The interpersonal computing era ended and the Internetworking era began.

E)            Internetworking era ended.

 

55)          Manufacturers of hardware and software often apply the concept of planned obsolescence, meaning that                .

A)           the companies have already decided when to launch their next product

B)            the product is designed in such a way as to extend its life span XC) the product is designed to last only for a certain life span

D)           the product is designed to avoid obsolescence

E)            the companies do not enter markets which have the risk of product obsolescence

 

 

56)          Data centers managed by a third party that rents out space to multiple organizational customers are known as            .

XA) collocation facilities

B)            multi bay stations

C)            serial port facilities

D)           data ease facilities

E)            datahub stations

 

57)          Under the           model, organizations "rent" resources such as processing, data storage, or networking from an external provider on an as-needed basis and pay only for the services used.

A)           cluster computing

B)            grid computing

C)            distributed computing XD) utility computing

E) parallel computing

 

58)          Utility computing offers tremendous benefits in terms of             for companies operating in the digital world.

A)           reliability

B)            usability

C)            portability

D)           extensibility XE) scalability

 

59)          The ability to adapt to increases or decreases in demand for processing or data storage is known as         .

A)           extensibility

B)            portability

C)            reliability XD) scalability

E) usability

 

60)          Using     , multiple machines located at different locations and each with its own applications can be configured to run on one single computer, enabling the IT service providers to better utilize their resources.

A)           indemnification

B)            gentrification

C)            demutualization

D)           ramification XE) virtualization

 

61)          Which of the following statements is true about the software as a service model?

A)           The customer has no knowledge or control over the underlying infrastructure and has only limited ability to control or configure application-specific settings.

 

B)            The customer has to manage the licenses for the operating systems being used.

C)            The customer can run his or her own applications that are typically designed using tools provided by the service provider.

XD) The customer is provided with the basic capabilities of processing, storage, and networking.

E) The user has control over the applications but has limited or no control over the underlying infrastructure.

 

62)          Which of the following statements is true about the platform as a service model?

A)           The customer is provided with the basic capabilities of processing, storage, and networking.

B)            The customer has no knowledge or control over the underlying infrastructure and has only limited ability to control or configure application-specific settings.

XC) The customer can run his or her own applications that are typically designed using tools provided by the service provider.

D)           The customer uses an application provided via a cloud infrastructure.

E)            The customer has to manage the licenses for the operating systems being used.

 

63)          Which of the following statements is true about the infrastructure as a service model? XA) The customer has to manage the licenses for the operating systems being used.

B)            The customer has no knowledge or control over the underlying infrastructure and has only limited ability to control or configure application-specific settings.

C)            The customer can run his or her own applications that are typically designed using tools provided by the service provider.

D)           The customer uses an application provided via a cloud infrastructure.

E)            The user has control over the applications but has limited or no control over the underlying infrastructure.

 

64)          Which of the following statements is true about a public cloud?

A)           It gives the organization a high degree of customizability over their data and applications. XB) It can be used by any interested party on a pay-per-use basis.

C)            It is internal to an organization.

D)           It does not free an organization from the issues associated with managing the cloud infrastructure.

E)            It gives the organization a high degree of control over their data and applications.

 

65)          EasyQuery is a knowledge management company that is contemplating a partnership with Kasko, a cloud service provider. The management of EasyQuery is particularly concerned about Kasko's viability and will start a partnership only when it is sure that Kasko meets this criteria. Assume that viability is the only criteria that a cloud service provider needs to meet. If EasyQuery enters into a partnership with Kasko, it means that             .

A)           Kasko can meet EasyQuery's current and future business needs XB) Kasko has long-term sustainability

C)            Kasko offers other services that EasyQuery would require in the future

D)           Kasko will protect the privacy of customers

E)            Kasko will provide sufficient bandwidth to access large amounts of data

 

66)                         is used to solve large-scale computing problems.

 

A)           Trusted computing

B)            Edge computing

C)            IP convergence XD) Grid computing

E) Distributed computing

 

67)                         is used to increase Web application performance.

A)           Trusted computing

B)            Distributed computing XC) Edge computing

D)           IP convergence

E)            Green computing

 

68)                         is used to transmit voice and video communication over the Internet.

A)           Edge computing XB) IP convergence

C)            Distributed computing

D)           Green computing

E)            Trusted computing

 

69)          ImmuneEarth, a research and development company, has a motto to "eradicate all diseases." It has numerous departments that research the cure of various diseases. One of its largest departments include the AIDS department where more than 500 scientists are researching the cure for AIDS. ImmuneEarth has numerous computers that have been grouped into a cohesive system for this purpose. Recently, one of its computers was updated because it had low performance which had slowed the entire system. Which of the following is ImmuneEarth using to research the cure for AIDS?

XA) grid computing

B)            cloud computing

C)            trusted computing

D)           edge computing

E)            IP convergence

 

70)          Which of the following differentiates grid computing from cloud computing?

A)           Grid computing uses a large number of computers.

B)            Grid computing is a natural evolution of the widespread adoption of virtualization and utility computing.

XC) Grid computing is applied to a single large problem.

D)           Grid computing involves over-the-Internet provision of dynamically scalable and often virtualized resources.

E)            Grid computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources.

 

71)          In grid computing, the slowest computer creates a bottleneck and slows down the entire grid. A              can help overcome these problems.

A)           trusted grid

 

B)            edged grid

C)            clustered grid XD) dedicated grid

E) parallel grid

 

72)                         has allowed enterprises to make use of new forms of communication and collaboration, as well as traditional forms of communication, at much lower costs.

A)           Grid computing

B)            Green computing XC) IP convergence

D)           Edge computing

E)            Trusted computing

 

Option 1

Low Cost Option
Download this past answer in few clicks

13.83 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE

Related Questions