1/59
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
"_____ describes a module for which the software developer does not care how the processing is performed, but instead, knows that the code will produce predictable results when provided valid inputs."
A black box
"The term _____ describes major components that comprise a system, their relationships, and the information the components exchange."
software architecture
SOA is an acronym that stands for _____.
services-oriented architecture
_____ describes the degree of dependence between a calling program and a web service.
Coupling
The process of taking an application to the cloud is known as:
cloud migration.
"To reduce risk, companies may ask a cloud-solution provider to place their site's source code in a:"
source-code escrow.
"When an on-site application encounters increased user demand, an application can expand into the cloud through a process called:"
cloud bursting.
_____occurs when a provider does not support data export or when a provider's service is unavailable through others.
Vendor lock-in
"_____ occurs when a vendor makes it difficult for a company to switch to another provider, even if the vendor has failed to fulfill the service-level agreement (SLA)."
Vendor lock-in
The _____ defines the resources the solution will need to operate satisfactorily.
capacity plan
"Within a mobile environment, a _____ is an HTML-based solution that adjusts its output for mobile device screen sizes."
Web responsive app
A(n) _____ is an environment that consists of living and nonliving things with which one interacts.
ecosystem
"The _____ consists of apps and webpages that originate from sites within the cloud from which users download, or with which they interact via a mobile device."
mobile cloud
"_____ is a subset of corporate governance that includes the policies, procedures, and controls that relate to IT use and deployment, performance, return on investment, and risk mitigation."
IT governance
"_____ combines the processes, policies, laws, and controls that affect how a company operates."
Corporate governance
_____ comprises the plans a company executes to achieve business goals.
A business strategy
_____ was developed at Carnegie Mellon University to help businesses measure and improve their current capabilities.
Capability Maturity Model (CMM)
"_____ is the study of the production, distribution, and consumption of goods and services."
Economics
_____ states the number of transistors that can be placed on an integrated circuit doubles every two years.
Moore's law
"The _____ is a measure of the financial gain (or return) on an investment, such as a new piece of equipment."
return on investment
"_____ are large expenditures, normally for a plant, property, or large equipment."
Capital expenses
_____ describes the cost savings that a company may experience (up to a point) by expanding.
Economies of scale
"_____ specify what a system does; that is, the specific tasks the system will perform."
Functional requirements
The _____ is also known as the 80/20.
Pareto principle
"Using _____, you can scale out an application by rewriting the application to support multiple CPUs (servers) and possibly multiple databases."
horizontal scaling
"Using _____, you can scale up an application by moving the application to faster computer resources, such as a faster server or disk drive."
vertical scaling
_____ software facilitates the exchange of data between solutions.
Middleware
A _____ is a place where system traffic slows because of lack of resources.
bottleneck
A _____ defines the resources your application will need at a specific time.
capacity plan
_____ describes environmentally friendly IT operations.
Green computing
"A _____ occurs when adding additional resources does not improve performance. At that point, you should stop scaling."
point of diminishing returns
"_____ are often called quality requirements and include common factors such as performance, reliability, maintainability, and so forth."
Nonfunctional requirements
A _____ utilizes data from the global positioning system (GPS) capabilities built into mobile devices to integrate an individual's location into the processing it performs.
location-aware application
_____ is a term used to describe the set of tools and websites that allow users to publish content to the web without the direct use of HTML.
Web 2.0
A _____ cloud is normally owned by a specific entity (company) for its own use or by customers.
private
Users typically access software as a service (SaaS) solutions using a:
web browser.
_____ defines the ability of a site or application to use additional resources on demand.
Scalability
_____ is the name of the Google's platform as a service (PaaS) solution.
Google App Engine
A _____ is a collection of services joined to create an overall solution.
mashup
_____ solutions provide a collection of hardware and software resources that developers can use to build and deploy applications within the cloud.
Platform as a service (PaaS)
"Many software as a service (SaaS) solutions are _____, which means that behind the scenes customers may share computing resources."
multitenant
_____ is an application development methodology with which developers create solutions by integrating one or more web services.
Service-oriented architecture (SOA)
MFA is an acronym for:
multifactor authentication.
"To handle high-traffic web requests, sites use a technique known as _____ to share the requests across multiple servers."
load balancing
"To reduce user-identification management costs, companies are now moving to _____ solutions."
identification as a service (IDaaS)
_____ describes the technologies and protocols that combine to enable a user to bring security credentials across different security domains (different servers running potentially different operating systems).
Federated identity management (FIDM)
"A(n) _____ solution makes all of the computing hardware resources available, and the customers, in turn, are responsible for installing and managing the systems, which they can normally do, for the most part, over the Internet."
infrastructure as a service (IaaS)
Which of the following is not a disadvantage of cloud-based storage?
Reliability
"_____ is an open-source project, the goal of which is to support reliable, scalable distributed computing."
Apache Hadoop
Which of the following is not an advantage of cloud-based database systems?
Performance
_____ is the process of two or more people working together to achieve a result (a goal).
Collaboration
Which of the following is not an advantage of wikis for shared content?
"Because any member can edit the content, errant content can occur."
Which of the following is not an advantage of virtual memory?
Using virtual memory is faster than using physical random access memory (RAM).
Which of the following is not an advantage of blade servers?
The use of blade servers is mandated by the Green Computing Initiative.
_____ uses hardware and software to create the illusion that two or more entities are present when there is only one physical entity in existence.
Virtualization
"A _____ is a hacker attack on a site, the goal of which is to consume system resources so that the resources cannot be used by the site's users."
denial-of-service attack
The term _____ is used when a cloud-based storage device overwrites (wipes) a file's contents when a file is deleted.
data wiping
Assume a device manufacturer tests 100 devices. The first device fails at 100 hours. The last device fails at 200 hours. What is the device mean time between failure (MTBF)?
"10,000 hours"
"_____ describes the policies, procedures, and actions taken by an organization to ensure the availability of critical business functions to employees, customers, and other key stakeholders."
Business continuity
A(n) _____ provides users with a few minutes of battery backup power so the users can save their work and shut down their systems in an orderly way.
uninterruptible power supply (UPS)