Thursday 26 January 2017

TEST BANK OF SYSTEMS ARCHITECTURE 7TH EDITION BY BURD





IF You Want To Purchase A+ Work Then Click The Link Below  , Instant Download





If You Face Any Problem E- Mail Us At  whisperhills@gmail.com


Chapter 14 System Administration

1.IS resource acquisition and deployment should occur only in the context of a well-defined strategic plan for the organization as a whole.


2. An IS strategic plan tends to lead, rather than follow, the strategic plans of other units in the organization.


3. Typical operating expenditures include buildings, land, equipment, and research and development costs.


4. Computer and software purchases are capital expenditures, even though the expected useful lifetime of computer hardware and software has decreased in recent years because of rapid technological change.


5. Standardization tends to encourage innovation and produce solutions that are optimal for most users.


6. Infrastructure management tends to concentrate on providing short-term services at minimal cost.


7. The costs of technology are usually high for developers and early adopters but then decrease slowly after introduction.


8. ​Computer performance is measured in terms of application tasks that can be performed in a given time frame.


9. Monitors can operate continuously or intermittently.


10. Accurate data is the most important requirement for good configuration decisions.


11. Operating systems now cooperate with one another to perform authentication and authorization.


12. Signatures are the basis for determining users’ authorization to access resources the OS manages.


13. Application firewalls improve security by shielding internal servers and resources from direct access by outside users.


14. Most computer equipment is designed to operate reliably over a range of voltage levels.


15. Surge protectors can be purchased as separate devices or integrated into other power-conditioning devices.


16. Surge protection is normally an add-on to a UPS.


17. ​Some UPSs, particularly those with long delivery times, are designed to work with a computer’s OS.


18. The normal fire protection mechanisms incorporated in buildings are inadequate for rooms housing computer hardware.


19. Electrical fires often generate heat and smoke as quickly as conventional fires do.


20. Fire detection is a special problem in computer facilities.


21. ​The main responsibility of ____ is to ensure efficient and reliable delivery of information services.


22. In all cases, strategic plans must address the basic question “____?”


23. The resources devoted to most organizational activities can be classified into two categories: ____.


24. ____ are assets or resources expected to provide benefits beyond the current fiscal year.


25. Typical ____ include salaries, rent, lease payments, supplies, and equipment maintenance.


26. The term ____ describes the way in which an organization uses resources to give it a major edge over its competitors.






27. The first step in stating hardware and software requirements is to state the application tasks to be performed and their____.


28. A(n) ____ is a formal document sent to vendors that states requirements and solicits proposals to meet these requirements.


29. The ____ composes the majority of an RFP.


30. The starting point for determining hardware requirements is the ____ that will run on the hardware platform.


31. The ____ represents units of work application software performs in terms of its demand for low-level hardware services.


32. A ____ is a measure of computer system performance while executing one or more processing tasks.


33. ____ are programs or hardware devices that detect and report processing or I/O activity.


34. A ____ is a program typically embedded in OS service routines that detects and reports processing activity or requests.


35. A ____ describes the resource or service utilization of an application program during execution.


36. System administrators can use the ____ utility to monitor hardware and software resource use in real time.

37. ____ is the process of determining or verifying the identity of a user or process owner.


38. ____ is the process of determining whether an authenticated user or process has enough rights to access a resource.


39. In accounting, ____ is the process of examining records to determine whether generally accepted accounting principles were applied correctly in preparing financial reports.


40. In computers, a ____ is a program or program fragment that infects a computer by installing itself permanently, usually in a hard-to-find location.


41. A ____ is stored in a stand-alone executable program, is usually sent as an e-mail attachment and runs automatically when the attachment is opened.


42. ____ can perform many malicious acts, including damaging or destroying important files, opening backdoors for potential hackers, and sending sensitive information to others.


43. Antivirus software uses data files, sometimes called “____,” containing information about known viruses.


44. The simplest firewall type is a(n) ____ firewall, which examines each packet and matches header content to a list of allowed or denied packet types.


45. A(n) ____ is a server that handles service requests from external users of applications.


46. A(n) ____ tracks the progress of complex client/server interactions.


47. ____ can be seen in the home when air conditioners, refrigerators, and electric dryers are started and cause a momentary dimming of lights.


48. A(n) longer-term power sag that is often caused by the power provider is known as a ____.


49. A(n) ____ is a device that provides power to attached devices in the event of external power failure.


50. In general, the humidity level of a room containing computer equipment should be near ____%.


51. ​A(n) ____________________ is defined as a set of long-range goals and a plan to attain these goals.

52. ____________________ expenditures provide benefits only in the current fiscal year.

53. Capital resources are referred to as ____________________.

54. Providing infrastructure-based services to a wide variety of users requires adopting service ____________________.

55. The term ____________________ refers to execution speed.

56. An RFP is generally considered a(n) ____________________ offer.

57. A vendor’s response to an RFP is a(n) ____________________ of the offer.

58. Requirements in an RFP should be categorized by ____________________ and listed completely.

59. Information systems are a combination of hardware, system software, and ____________________ software.

60. The ____________________ model describes a computer’s capability to deliver resources to application software.

61. A(n) ____________________ monitor is a device attached directly to the communication link between two hardware devices, often used to monitor the use of communication channels, disk drives, and network traffic.

62. A(n) ____________________ monitors a specific performance or resource utilization aspect of an object.

63. ____________________ authentication methods are sometimes used instead of password-based authentication.

64. Until recently, applying patches and upgrades was a(n) ____________________ process.

65. In computer security, a(n) ____________________ is a hardware device, software, or a combination of hardware and software that prevents unauthorized users in one network from accessing resources on another network.

66. A(n) ____________________ detects incoming power surges and diverts them to ground in nanoseconds.

67. Protection against power loss requires a(n) ____________________ power source.

68. Excessive heat can cause intermittent or total failure of electrical circuits, so all computer equipment needs some means of heat ____________________.

69. Hardware must also be protected against ____________________ resulting from excessive humidity.

70. Low humidity levels increase the buildup of ____________________ electricity, which increases the likelihood of circuit damage caused by inadvertent static discharges.

71. ​List the three broad categories in which a typical information system (IS) administrator’s tasks may be grouped.

72. ​What, at a minimum, should goals for a strategic plan include?

73. List three common capabilities of antivirus software.

74. Why is a raised floor often used in a room with multiple computer hardware cabinets?

75. Discuss why disaster planning is important and what measures are normally taken.

For The Students Who Need Grade ‘A’ In Their Studies

Hi, hope you are having a great day…
We are a group of 24 writers having profound expertise in Business and Computer Science subjects. We can help you score A grade in your Accounting, Marketing, Finance, Economics, Management, Mathematics, Statistics, Information System, System Modeling, C++, Java Programming, Network Administration, Enterprise Administration, Database, Web Design, Networking, Internetworking, Data warehouse etc…
We can also provide help with Psychology, Nursing, Health, History, English Literature, Political Science, Ethics, Humanity etc classes.
We can help with essays, term papers, research papers, dissertation, Ilabs, mymatlab, Wileplus, quizzes, exams, discussion questions etc.
You can expect:
We understand each student has different requirement and we tend to treat each student according to his/her satisfaction.
We will provide original assignments, plagiarism free and to custom requirement.
We will always meet deadlines.
Our support will be 24/27, even in holidays.
Our pricing will be fair.
We will do free revisions if you want to make changes in provided work.
Email us for more information, query and quote.

WHISPERHILLS@GMAIL.COM



No comments:

Post a Comment