Upgrade to remove ads
Only ₩37,125/year
- Science
- Computer Science
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Infrastructures: Sustainable Technologies
Terms in this set (67)
accessibility
Refers to the varying levels that define what a user can access, view, or perform when operating a system.
administrator access
Unrestricted access to the entire system.
agile MIS infrastructure
Includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization's goals.
availability
Refers to the time frames when the system is operational.
backup
An exact copy of a system's information.
business continuity plan (BCP)
Details how a company recovers and restores critical business operations and systems after a disaster or extended disruption.
capacity planning
Determines future environmental infrastructure requirements to ensure high-quality system performance.
client
A computer designed to request information from a server.
cloud computing
Refers to the use of resources and applications hosted remotely on the Internet.
cold site
A separate facility that does not have any computer equipment but is a place where employees can move after a disaster.
corporate social responsibility
Companies' acknowledged responsibility to society.
data center
A facility used to house management information systems and associated components, such as telecommunications and storage systems.
disaster recovery cost curve
Charts the cost to the company of the unavailability of information and technology and the cost to the company of recovering from a disaster over time.
disaster recovery plan
A detailed process for recovering information or a system in the even of a catastrophic disaster.
emergency notification service
An infrastructure built for notifying people in the event of an emergency.
enterprise architect
A person grounded in technology, fluent in business, and able to provide the important bridge between MIS and the business.
ewaste
Refers to discarded, obsolete, or broken electronic devices.
failback
Occurs when the primary machine recovers and resumes operations, taking over from the secondary server.
failover
A specific type of fault tolerance, occurs when a redundant storage server offers and exact replica of the real-time data, and if the primary server crashes the users are automatically directed to the secondary server or backup server.
fault tolerance
A general concept that a system has the ability to respond to unexpected failures or system crashes as the backup system immediately and automatically takes over with no loss of service.
grid computing
A collection of computers, often geographically dispersed, that are coordinated to solve a problem.
hardware
Consists of the physical devices associated with a computer system.
high availability
Occurs when a system is continuously operational at all times.
hot site
A serpate and fully equipped facility where the company can move immediately after a disaster and resume business.
information MIS infrastructure
Identifies where and how important information, such as customer records, is maintained and secured.
infrastructure as a service (IaaS)
A service that delvers hardware networking capabilities, including the use of servers, networking, and storage over the cloud using a pay-per-use revenure model.
maintainability (or flexibility)
Refers to how quickly a system can transform to support environmental changes.
MIS infrastructure
Includes the plans for how a firm will build, deploy, use, and share its data, processes, and MIS assets.
Moore's Law
Refers to the computer chip performance per dollar doubling every 18 months.
performance
Measures how quickly a system performs a process or transaction.
platform as a service (PaaS)
Supports the deployment of entire systems including hardware, networking, and applications using a pay-per-use revenue model.
portability
Refers to the ability of an application to operate on different devices or software platforms, such as different operating systems.
recovery
The ability to get a system up and running in the event of a system crash or failure that includes restoring the information backup.
reliability (or accuracy)
Ensures a system is functioning correctly and providing accurate information.
scalability
Describes how well a system can scale up or adapt to the increased demands of growth.
server
A computer dedicated to providing information in response to requests.
smart grid
Delivers electricity using two-way digital technology.
software
The set of instructions the hardware executes to carry out specific tasks.
software as a service (SaaS)
Delivers applications over the cloud using a pay-per-use revenue model.
sustainable MIS disposal
Refers to the safe disposal of MIS assets at the end of their life cycle.
sustainable MIS infrastructure
Identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption.
sustainable (or "green") MIS
Describes thye production, management, use, and disposal of technology in a way that minimizes damage to the environment.
unavailable
When a system is not operating or cannot be used.
usability
The degree to which a system is easy to learn and efficient and satisfying to use.
utility computing
Offers a pay-per-use revenue model similar to a metered service such as gas or electricity.
virtualization
Created multiple "virtual" machines on a single computing device.
warm site
A separate facility with computer equipment that requres installation and configuration.
What are the seven characteristics of an agile MIS infrastructure?
accessibility, availability, maintainability, portability, reliability, scalability, and usability
Three primary side effects of businesses' expanded use of technology:
Increased electronic waste, Increased energy consumption, and Increased carbon emissions.
Dynamic Scaling
Autoscaling, either up or down, of MIS infrastructure based on needed requirements
Business Impact Analysis
identifies all critical business functions and the effect that a specific disaster may have upon them; primarily used to ensure a company has made the right decisions about the order of recovery priorities and strategies
Cloud Bursting
when a company uses its own computing infrastructure for normal usage and accesses the cloud when it needs to scale for peak load requirements, ensuring a sudden spike in usage does not result in poor performance or system crashes
Cloud Fabric
the software that makes possible the benefits of cloud computing, such as multi-tenancy; the primary reason cloud computing promotes the seven abilities- allowing a business to make its data and applications accessible, available, maintainable, portable, reliable, scalable and usable
Cloud Fabric Controller
an individual who monitors and provisions cloud resources, similar to a server administrator at an individual company; they provision resources, balance loads, manage servers, update systems and ensure all environments are available and operating correctly
Community Cloud
cloud that serves a specific community with common business models, security requirements and compliance considerations; these are emerging in highly regulated industries as financial services and pharmaceutical companies
Hybrid Cloud
cloud that includes two or more private, public or community clouds, but each cloud remains separate and is only linked by technology and that enabes data and application portability
Incident
unplanned interruption of service
Incident record
contains all the details of an incident
incident management
the process responsible for managing how incidents are identifies and corrected
multi-tenancy
a single instance of a system serves multiple customers; multiple tenants can access the same system; the service provider only has to update its system
Network
a communications system created by linking two or more devices and establishing a standard methodology in which they can communicate
Private Cloud
cloud that only serves one customer or organization and can be located on the customer's premises or off the customer's premises; the optimal solution for an organization like the gov. that has needs high privacy
Public Cloud
promotes massive global and industrywide applications offered to the general public; customers are never required to provision, manage, upgrade or replace hardware or software; pricing is utility style and customers pay only for the resources they use
Serviceability
how quickly a third party can change a system to ensure it meets user needs and the terms or any contracts, including agreed levels of reliability, maintainability or avaliability
Single Tenancy
each customer or tenant must purchase and maintain an individual system; the service provider has to update its system in every company where the software was running
Technology Recovery Strategies
focuses specifically on prioritizing the order for restoring hardware, software and data across the organization that best meets business recovery requirements; details the order of importance for recovering hardware, software, data centers and networking (one not working will shut everything down)
Web Accessibility Initiatives (WAI)
help make the web accessible to people with disabilities (cognitive, auditory, neurological, physical, speech and visual) to allow them to participate equally
Recommended textbook solutionsEngineering Electromagnetics
8th EditionJohn Buck, William Hayt
483 solutions
Introduction to the Theory of Computation
3rd EditionMichael Sipser
389 solutions
Computer Organization and Design MIPS Edition: The Hardware/Software Interface
5th EditionDavid A. Patterson, John L. Hennessy
220 solutions
Introduction to Algorithms
3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen
720 solutions
Sets with similar termsMIS Chapter 5 Terms
73 terms
meganhively
MIS 180 chapter 5
47 terms
blake1872
INFO 210 Ch. 5
49 terms
jondavidcarroll
MIS 311 CH 5 Vocab
70 terms
katcro101
Other sets by this creatorISYS 210- Chapter 9
33 terms
danariddle
ISYS 210- Chapter 8
28 terms
danariddle
PSYCH 107- Chapter 9
47 terms
danariddle
ISYS 210- Appendix C
25 terms
danariddle
Verified questionsCOMPUTER SCIENCE
True/False. All classes are derived from the Object class.
Verified answer
COMPUTER SCIENCE
Consider a system that generates 10 million audit records per day Assume that, on average, there are 10 attacks per day on this system and each attack is reflected in 20 records. If the intrusion-detection system has a true-alarm rate of 0.6 and a false-alarm rate of 0.0005, what percentage of alarms generated by the system correspond to real intrusions?
Verified answer
COMPUTER SCIENCE
Describe a program that would use the ArrayList class instead of arrays. Describe a program that would use arrays instead of the ArrayList class. Explain your choices.
Verified answer
COMPUTER SCIENCE
What are the three major activities of an operating system with regard to memory management?
Verified answer
Other Quizlet setsCPP Exam for the LERN Conference
92 terms
annaclayadams
Anatomy Final
200 terms
Kaitlyn_MarstersPLUS
AP Global | Chapter 28: Geography, Events, & People
27 terms
MyaCrate181
化工专业英语课文翻译
15 terms
MJ0830
Related questionsQUESTION
Bar coding and checkout scanner technology have created a wealth of consumer buying information that can be used to target customers with precision. This process is an example of:
5 answers
QUESTION
2. The Web site displayed when a user clicks on an ad is called the:
3 answers
QUESTION
Which software below has similar features to Skype?
15 answers
QUESTION
It is a network of networks that consists of millions of private, public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, wireless, and optical networking technologies.
2 answers