5.1) Backup and recovery plan, disaster recovery plan, business continuity planning
are all elements of a(n) ________ MIS infrastructure.
a) virtualized
b) information
c) agile
d) sustainable
Give this one a try later!
, b) information
5.1) Which characteristics support a sustainable MIS infrastructure?
a) Storage, network, and server virtualization
b) Accessibility, availability, maintainability, portability, reliability, scalability, usability
c) Backup and recovery plan, disaster recovery plan, business continuity planning
d) Grid computing, cloud computing, and virtualization
Give this one a try later!
d) Grid computing, cloud computing, and virtualization
7.2) How do TCP and IP differ?
a) IP verifies the correct delivery of data in case it is corrupted, where TCP verifies the
data are sent to the correct IP address.
b) TCP verifies the information is reliable, and IP verifies that the data is sent.
c) IP verifies connectivity, and TCP verifies the rate at which the data is sent.
d) TCP verifies the correct delivery of data in case it is corrupted, where IP verifies the
data are sent to the correct IP address.
Give this one a try later!
d) TCP verifies the correct delivery of data in case it is corrupted, where IP
verifies the data are sent to the correct IP address.
5.2) In what way is Cloud computing services changing the way people work?
a) The way people use information
b) The way people access information
c) The way people deliver information
d) All of these choices
, Give this one a try later!
d) All of these choices
6.1) The practice of gathering data and ensuring that it is uniform, accurate, consistent,
and complete.
a) Master Information Control
b) Master Data Management
c) Priamary Data Management
d) Primary Inforomation Control
Give this one a try later!
b) Master Data Management
7.2) Your company wants to ensure that their information is secure. They insist that
when out of the office you only access company systems in a secure and encrypted
manner over the Internet. What is the method they want you to use?
a) Through a VPN
b) Through an IP protocol
c) Using TCP
d) Through a firewall
e) Using a user ID and password
Give this one a try later!
a) Through a VPN
are all elements of a(n) ________ MIS infrastructure.
a) virtualized
b) information
c) agile
d) sustainable
Give this one a try later!
, b) information
5.1) Which characteristics support a sustainable MIS infrastructure?
a) Storage, network, and server virtualization
b) Accessibility, availability, maintainability, portability, reliability, scalability, usability
c) Backup and recovery plan, disaster recovery plan, business continuity planning
d) Grid computing, cloud computing, and virtualization
Give this one a try later!
d) Grid computing, cloud computing, and virtualization
7.2) How do TCP and IP differ?
a) IP verifies the correct delivery of data in case it is corrupted, where TCP verifies the
data are sent to the correct IP address.
b) TCP verifies the information is reliable, and IP verifies that the data is sent.
c) IP verifies connectivity, and TCP verifies the rate at which the data is sent.
d) TCP verifies the correct delivery of data in case it is corrupted, where IP verifies the
data are sent to the correct IP address.
Give this one a try later!
d) TCP verifies the correct delivery of data in case it is corrupted, where IP
verifies the data are sent to the correct IP address.
5.2) In what way is Cloud computing services changing the way people work?
a) The way people use information
b) The way people access information
c) The way people deliver information
d) All of these choices
, Give this one a try later!
d) All of these choices
6.1) The practice of gathering data and ensuring that it is uniform, accurate, consistent,
and complete.
a) Master Information Control
b) Master Data Management
c) Priamary Data Management
d) Primary Inforomation Control
Give this one a try later!
b) Master Data Management
7.2) Your company wants to ensure that their information is secure. They insist that
when out of the office you only access company systems in a secure and encrypted
manner over the Internet. What is the method they want you to use?
a) Through a VPN
b) Through an IP protocol
c) Using TCP
d) Through a firewall
e) Using a user ID and password
Give this one a try later!
a) Through a VPN