Upgrade to remove ads Show Only ₩37,125/year
Infrastructures: Sustainable Technologies Terms in this set (67)accessibility Refers to the varying levels that define what a user can access, view, or perform when operating a system. administrator access Unrestricted access to the entire system. agile MIS infrastructure Includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization's goals. availability Refers to the time frames when the system is operational. backup An exact copy of a system's information. business continuity plan (BCP) Details how a company recovers and restores critical business operations and systems after a disaster or extended disruption. capacity planning Determines future environmental infrastructure requirements to ensure high-quality system performance. client A computer designed to request information from a server. cloud computing Refers to the use of resources and applications hosted remotely on the Internet. cold site A separate facility that does not have any computer equipment but is a place where employees can move after a disaster. corporate social responsibility Companies' acknowledged responsibility to society. data center A facility used to house management information systems and associated components, such as telecommunications and storage systems. disaster recovery cost curve Charts the cost to the company of the unavailability of information and technology and the cost to the company of recovering from a disaster over time. disaster recovery plan A detailed process for recovering information or a system in the even of a catastrophic disaster. emergency notification service An infrastructure built for notifying people in the event of an emergency. enterprise architect A person grounded in technology, fluent in business, and able to provide the important bridge between MIS and the business. ewaste Refers to discarded, obsolete, or broken electronic devices. failback Occurs when the primary machine recovers and resumes operations, taking over from the secondary server. failover A specific type of fault tolerance, occurs when a redundant storage server offers and exact replica of the real-time data, and if the primary server crashes the users are automatically directed to the secondary server or backup server. fault tolerance A general concept that a system has the ability to respond to unexpected failures or system crashes as the backup system immediately and automatically takes over with no loss of service. grid computing A collection of computers, often geographically dispersed, that are coordinated to solve a problem. hardware Consists of the physical devices associated with a computer system. high availability Occurs when a system is continuously operational at all times. hot site A serpate and fully equipped facility where the company can move immediately after a disaster and resume business. information MIS infrastructure Identifies where and how important information, such as customer records, is maintained and secured. infrastructure as a service (IaaS) A service that delvers hardware networking capabilities, including the use of servers, networking, and storage over the cloud using a pay-per-use revenure model. maintainability (or flexibility) Refers to how quickly a system can transform to support environmental changes. MIS infrastructure Includes the plans for how a firm will build, deploy, use, and share its data, processes, and MIS assets. Moore's Law Refers to the computer chip performance per dollar doubling every 18 months. performance Measures how quickly a system performs a process or transaction. platform as a service (PaaS) Supports the deployment of entire systems including hardware, networking, and applications using a pay-per-use revenue model. portability Refers to the ability of an application to operate on different devices or software platforms, such as different operating systems. recovery The ability to get a system up and running in the event of a system crash or failure that includes restoring the information backup. reliability (or accuracy) Ensures a system is functioning correctly and providing accurate information. scalability Describes how well a system can scale up or adapt to the increased demands of growth. server A computer dedicated to providing information in response to requests. smart grid Delivers electricity using two-way digital technology. software The set of instructions the hardware executes to carry out specific tasks. software as a service (SaaS) Delivers applications over the cloud using a pay-per-use revenue model. sustainable MIS disposal Refers to the safe disposal of MIS assets at the end of their life cycle. sustainable MIS infrastructure Identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption. sustainable (or "green") MIS Describes thye production, management, use, and disposal of technology in a way that minimizes damage to the environment. unavailable When a system is not operating or cannot be used. usability The degree to which a system is easy to learn and efficient and satisfying to use. utility computing Offers a pay-per-use revenue model similar to a metered service such as gas or electricity. virtualization Created multiple "virtual" machines on a single computing device. warm site A separate facility with computer equipment that requres installation and configuration. What are the seven characteristics of an agile MIS infrastructure? accessibility, availability, maintainability, portability, reliability, scalability, and usability Three primary side effects of businesses' expanded use of technology: Increased electronic waste, Increased energy consumption, and Increased carbon emissions. Dynamic Scaling Autoscaling, either up or down, of MIS infrastructure based on needed requirements Business Impact Analysis identifies all critical business functions and the effect that a specific disaster may have upon them; primarily used to ensure a company has made the right decisions about the order of recovery priorities and strategies Cloud Bursting when a company uses its own computing infrastructure for normal usage and accesses the cloud when it needs to scale for peak load requirements, ensuring a sudden spike in usage does not result in poor performance or system crashes Cloud Fabric the software that makes possible the benefits of cloud computing, such as multi-tenancy; the primary reason cloud computing promotes the seven abilities- allowing a business to make its data and applications accessible, available, maintainable, portable, reliable, scalable and usable Cloud Fabric Controller an individual who monitors and provisions cloud resources, similar to a server administrator at an individual company; they provision resources, balance loads, manage servers, update systems and ensure all environments are available and operating correctly Community Cloud cloud that serves a specific community with common business models, security requirements and compliance considerations; these are emerging in highly regulated industries as financial services and pharmaceutical companies Hybrid Cloud cloud that includes two or more private, public or community clouds, but each cloud remains separate and is only linked by technology and that enabes data and application portability Incident unplanned interruption of service Incident record contains all the details of an incident incident management the process responsible for managing how incidents are identifies and corrected multi-tenancy a single instance of a system serves multiple customers; multiple tenants can access the same system; the service provider only has to update its system Network a communications system created by linking two or more devices and establishing a standard methodology in which they can communicate Private Cloud cloud that only serves one customer or organization and can be located on the customer's premises or off the customer's premises; the optimal solution for an organization like the gov. that has needs high privacy Public Cloud promotes massive global and industrywide applications offered to the general public; customers are never required to provision, manage, upgrade or replace hardware or software; pricing is utility style and customers pay only for the resources they use Serviceability how quickly a third party can change a system to ensure it meets user needs and the terms or any contracts, including agreed levels of reliability, maintainability or avaliability Single Tenancy each customer or tenant must purchase and maintain an individual system; the service provider has to update its system in every company where the software was running Technology Recovery Strategies focuses specifically on prioritizing the order for restoring hardware, software and data across the organization that best meets business recovery requirements; details the order of importance for recovering hardware, software, data centers and networking (one not working will shut everything down) Web Accessibility Initiatives (WAI)
help make the web accessible to people with disabilities (cognitive, auditory, neurological, physical, speech and visual) to allow them to participate equally Recommended textbook solutionsEngineering Electromagnetics8th EditionJohn Buck, William Hayt 483 solutions Introduction to the Theory of Computation3rd EditionMichael Sipser 389 solutions
Computer Organization and Design MIPS Edition: The Hardware/Software Interface5th EditionDavid A. Patterson, John L. Hennessy 220 solutions
Introduction to Algorithms3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen 720 solutions Sets with similar termsMIS Chapter 5 Terms73 terms meganhively MIS 180 chapter 547 terms blake1872 INFO 210 Ch. 549 terms jondavidcarroll MIS 311 CH 5 Vocab70 terms katcro101 Other sets by this creatorISYS 210- Chapter 933 terms danariddle ISYS 210- Chapter 828 terms danariddle PSYCH 107- Chapter 947 terms danariddle ISYS 210- Appendix C25 terms danariddle Verified questionsCOMPUTER SCIENCE True/False. All classes are derived from the Object class. Verified answer COMPUTER SCIENCE Consider a system that generates 10 million audit records per day Assume that, on average, there are 10 attacks per day on this system and each attack is reflected in 20 records. If the intrusion-detection system has a true-alarm rate of 0.6 and a false-alarm rate of 0.0005, what percentage of alarms generated by the system correspond to real intrusions? Verified answer COMPUTER SCIENCE Describe a program that would use the ArrayList class instead of arrays. Describe a program that would use arrays instead of the ArrayList class. Explain your choices. Verified answer
COMPUTER SCIENCE What are the three major activities of an operating system with regard to memory management? Verified answer Other Quizlet setsCPP Exam for the LERN Conference92 terms annaclayadams Anatomy Final200 terms Kaitlyn_MarstersPLUS AP Global | Chapter 28: Geography, Events, & People27 terms MyaCrate181 化工专业英语课文翻译15 terms MJ0830 Related questionsQUESTION Bar coding and checkout scanner technology have created a wealth of consumer buying information that can be used to target customers with precision. This process is an example of: 5 answers QUESTION 2. The Web site displayed when a user clicks on an ad is called the: 3 answers QUESTION Which software below has similar features to Skype? 15 answers QUESTION It is a network of networks that consists of millions of private, public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, wireless, and optical networking technologies. 2 answers What is a separate facility?Separate Facility means space within a Shared Space that is (or, as the context requires, is reasonably capable of) being managed as a single operational unit.
What is a separate and fully equipped facility?Hot site is a separate and fully equipped facility where the company can move immediately after the disaster and resume business. A hot site is a commercial disaster recovery service that allows a business to continue computer and network operations in the event of a computer or equipment disaster.
Is a separate facility with computer equipment that requires installation and configuration?What is a warm site? A separate facility with computer equipment that requires installation and configuration. What is a cold site? A separate facility that does not have any computer equipment but is a place where employees can move after a disaster.
|