What are the four different lenses a business must use to look at an enterprise architecture plan?
1. Business, data, applications, and technology architecture
2. Business, processes, applications, and hardware
3. Enterprises, processes, applications, and hardware
4. Enterprise, data, applications, and software infrastructure
Nội dung chính
- What has the ability to recover information or systems in the event of catastrophic disasters quizlet?
- What is maintainability quizlet?
- What is the detailed process for recovering information or a system in the event of a catastrophic disaster?
- What is clean computing quizlet?
Introduction to Algorithms
3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen
720 solutions
Engineering Electromagnetics
8th EditionJohn Buck, William Hayt
483 solutions
Computer Organization and Design MIPS Edition: The Hardware/Software Interface
5th EditionDavid A. Patterson, John L. Hennessy
220 solutions
Fundamentals of Database Systems
6th EditionRamez Elmasri, Shamkant B. Navathe
596 solutions
- Science
- Computer Science
- Computer Security and Reliability
Flashcards
Learn
Test
Match
Flashcards
Learn
Test
Match
Terms in this set (15)
What is the primary difference between the different types of backup/recovery media?
Speed
Cost
All of these
Expense
All of these
What type of backup strategy would you recommend to an organization that deals with large volumes of critical information?
Weekly
Hourly
All of these
Monthly
Hourly
What does the disaster recovery cost curve chart(s)?
The cost to the organization of the unavailability of technology
The cost to the organization of recovering from a disaster over time
All of these
The cost to the organization of the unavailability of information
All of these
What addresses the time frames when systems can be accessed by employees, customers, and partners?
Flexibility
Reliability
Availability
Performance
Availability
Which of the following is a type of backup/recovery media?
DVD
All of these
Disk
Tape
All of these
What is a backup?
A backup operational mode in which the functions of a computer component (such as a processor, server, network, or
database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time
The ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup
An exact copy of a system's information
A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
An exact copy of a system's information
What is recovery?
The ability to get a system up and running in the event of a system crash
The ability to get a system up and running in the event of a system failure
All of these
Restoring the information backup
All of these
What measures how quickly a system performs a certain process or transaction in terms of efficiency IT metrics of both speed and throughput?
Flexibility
Performance
Availability
Reliability
Performance
What is recovery?
A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
The ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup
A backup operational mode in which the functions of a computer component
(such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time
An exact copy of a system's information
The ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup
What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood?
Disaster recovery plan
Hot site
Disaster recovery cost curve chart
Cold site
Disaster recovery plan
What includes the plans for how an organization will build, deploy, use, and share its data, processes, and MIS assets?
Information architecture
MIS infrastructure
Enterprise architect
Infrastructure architecture
MIS infrastructure
What refers to how well a system can adapt to increased demands of growth?
Reliability
Capacity planning
Scalability
Availability
Scalability
What is a separate facility that does not have any computer equipment, but is a place where employees can move after a disaster?
Hot site
Disaster recovery plan
Cold site
Disaster recovery cost curve
Cold site
What is failover?
An exact copy of a
system's information
A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time
The ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup
A computer system designed that in the event a component fails, a backup
component or procedure can immediately take its place with no loss of service
A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time
What is fault tolerance?
A computer system designed that in the event a component fails, a backup component or
procedure can immediately take its place with no loss of service
An exact copy of a system's information
A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time
The ability to get a system up and running in the event of a system crash or failure and includes restoring the information
backup
A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
Recommended textbook solutionsEngineering Electromagnetics
8th EditionJohn Buck, William Hayt
483 solutions
Operating System Concepts
9th EditionAbraham Silberschatz, Greg Gagne, Peter B. Galvin
489 solutions
Operating System Concepts
8th EditionAbraham Silberschatz, Greg Gagne, Peter B. Galvin
309 solutions
C++ Programming
8th EditionD. S. Malik
486 solutions
Sets with similar termsChapter 5 MIS Final
32 terms
tessa_rosenberger
MIS Chapter 5 Vocab
44 terms
bmart2269
MIS 180
20 terms
campay15
info chapter 5
50 terms
sarahholmes
Sets found in the same folderINFO 210 ch. 8 erp
19 terms
chemedina
Test 2 (Chapter 2)
38 terms
meb1310
LearnSmart CH 6.2
63 terms
courtneylhicks
MIS Ch. 4 Practice
81 terms
i940807
Other sets by this creatorIS 290 EXAM#4 BP12
15 terms
THOMPSONLY
IS 290 EXAM#4 BP11
15 terms
THOMPSONLY
IS 290 EXAM#4 BP09
11 terms
THOMPSONLY
IS 290 EXAM#4 CHAPTER 20
14 terms
THOMPSONLY
Verified questionsCOMPUTER SCIENCE
True/False: In data processing, a collection of information about a person or thing is called a file.
Verified answer
COMPUTER SCIENCE
Show that $\overline{E Q_{\mathrm{TM}}}$ is recognizable by a Turing machine with an oracle for $A_{\mathrm{T} M}$.
Verified answer
COMPUTER SCIENCE
Making an instance of one class a member of another class is called _______.
Verified answer
COMPUTER SCIENCE
What language(s) must be used to display a bare-minimum web page?
Verified answer
Other Quizlet setsRepresentative Ascending Tracts (1/28)
17 terms
maxwell_22
Drugs affecting the endocrine system
100 terms
madison_skelton
Chapter 23: Written Communication
34 terms
bodanna1
CTR Practice Exam
100 terms
erinrobertse
Related questionsQUESTION
What mathematical problem forms the basis of most modern cryptographic algorithms?
15 answers
QUESTION
Which distribution most frequently describes the arrival rate in queuing theory?
15 answers
QUESTION
HMAC - Hash Message Authentication Code
15 answers
QUESTION
What algorithms are approved by the DSS for use in a digital signature infrastructure?
3 answers
What has the ability to recover information or systems in the event of catastrophic disasters quizlet?
*Within the area of support provided by information infrastructure, the disaster recovery area has the ability to recover information or systems in the event of a catastrophic disaster.
What is maintainability quizlet?
maintainability refers to how quickly a system can transform to support environmental changes. portability refers to the ability of an application to operate on different devices or software platforms, such as different operation systems.
What is the detailed process for recovering information or a system in the event of a catastrophic disaster?
Disaster recovery plan is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood. A disaster recovery plan (DRP) is a documented, structured approach with instructions for responding to unplanned incidents.
What is clean computing quizlet?
Clean Computing. a subset of sustainable MIS, refers to the environmentally responsible use, manufacture, and disposal of technology products and computer equipment.