ITC583 Final Usable

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/59

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

60 Terms

1
New cards

"_____ describes a module for which the software developer does not care how the processing is performed, but instead, knows that the code will produce predictable results when provided valid inputs."

A black box

2
New cards

"The term _____ describes major components that comprise a system, their relationships, and the information the components exchange."

software architecture

3
New cards

SOA is an acronym that stands for _____.

services-oriented architecture

4
New cards

_____ describes the degree of dependence between a calling program and a web service.

Coupling

5
New cards

The process of taking an application to the cloud is known as:

cloud migration.

6
New cards

"To reduce risk, companies may ask a cloud-solution provider to place their site's source code in a:"

source-code escrow.

7
New cards

"When an on-site application encounters increased user demand, an application can expand into the cloud through a process called:"

cloud bursting.

8
New cards

_____occurs when a provider does not support data export or when a provider's service is unavailable through others.

Vendor lock-in

9
New cards

"_____ occurs when a vendor makes it difficult for a company to switch to another provider, even if the vendor has failed to fulfill the service-level agreement (SLA)."

Vendor lock-in

10
New cards

The _____ defines the resources the solution will need to operate satisfactorily.

capacity plan

11
New cards

"Within a mobile environment, a _____ is an HTML-based solution that adjusts its output for mobile device screen sizes."

Web responsive app

12
New cards

A(n) _____ is an environment that consists of living and nonliving things with which one interacts.

ecosystem

13
New cards

"The _____ consists of apps and webpages that originate from sites within the cloud from which users download, or with which they interact via a mobile device."

mobile cloud

14
New cards

"_____ is a subset of corporate governance that includes the policies, procedures, and controls that relate to IT use and deployment, performance, return on investment, and risk mitigation."

IT governance

15
New cards

"_____ combines the processes, policies, laws, and controls that affect how a company operates."

Corporate governance

16
New cards

_____ comprises the plans a company executes to achieve business goals.

A business strategy

17
New cards

_____ was developed at Carnegie Mellon University to help businesses measure and improve their current capabilities.

Capability Maturity Model (CMM)

18
New cards

"_____ is the study of the production, distribution, and consumption of goods and services."

Economics

19
New cards

_____ states the number of transistors that can be placed on an integrated circuit doubles every two years.

Moore's law

20
New cards

"The _____ is a measure of the financial gain (or return) on an investment, such as a new piece of equipment."

return on investment

21
New cards

"_____ are large expenditures, normally for a plant, property, or large equipment."

Capital expenses

22
New cards

_____ describes the cost savings that a company may experience (up to a point) by expanding.

Economies of scale

23
New cards

"_____ specify what a system does; that is, the specific tasks the system will perform."

Functional requirements

24
New cards

The _____ is also known as the 80/20.

Pareto principle

25
New cards

"Using _____, you can scale out an application by rewriting the application to support multiple CPUs (servers) and possibly multiple databases."

horizontal scaling

26
New cards

"Using _____, you can scale up an application by moving the application to faster computer resources, such as a faster server or disk drive."

vertical scaling

27
New cards

_____ software facilitates the exchange of data between solutions.

Middleware

28
New cards

A _____ is a place where system traffic slows because of lack of resources.

bottleneck

29
New cards

A _____ defines the resources your application will need at a specific time.

capacity plan

30
New cards

_____ describes environmentally friendly IT operations.

Green computing

31
New cards

"A _____ occurs when adding additional resources does not improve performance. At that point, you should stop scaling."

point of diminishing returns

32
New cards

"_____ are often called quality requirements and include common factors such as performance, reliability, maintainability, and so forth."

Nonfunctional requirements

33
New cards

A _____ utilizes data from the global positioning system (GPS) capabilities built into mobile devices to integrate an individual's location into the processing it performs.

location-aware application

34
New cards

_____ is a term used to describe the set of tools and websites that allow users to publish content to the web without the direct use of HTML.

Web 2.0

35
New cards

A _____ cloud is normally owned by a specific entity (company) for its own use or by customers.

private

36
New cards

Users typically access software as a service (SaaS) solutions using a:

web browser.

37
New cards

_____ defines the ability of a site or application to use additional resources on demand.

Scalability

38
New cards

_____ is the name of the Google's platform as a service (PaaS) solution.

Google App Engine

39
New cards

A _____ is a collection of services joined to create an overall solution.

mashup

40
New cards

_____ solutions provide a collection of hardware and software resources that developers can use to build and deploy applications within the cloud.

Platform as a service (PaaS)

41
New cards

"Many software as a service (SaaS) solutions are _____, which means that behind the scenes customers may share computing resources."

multitenant

42
New cards

_____ is an application development methodology with which developers create solutions by integrating one or more web services.

Service-oriented architecture (SOA)

43
New cards

MFA is an acronym for:

multifactor authentication.

44
New cards

"To handle high-traffic web requests, sites use a technique known as _____ to share the requests across multiple servers."

load balancing

45
New cards

"To reduce user-identification management costs, companies are now moving to _____ solutions."

identification as a service (IDaaS)

46
New cards

_____ describes the technologies and protocols that combine to enable a user to bring security credentials across different security domains (different servers running potentially different operating systems).

Federated identity management (FIDM)

47
New cards

"A(n) _____ solution makes all of the computing hardware resources available, and the customers, in turn, are responsible for installing and managing the systems, which they can normally do, for the most part, over the Internet."

infrastructure as a service (IaaS)

48
New cards

Which of the following is not a disadvantage of cloud-based storage?

Reliability

49
New cards

"_____ is an open-source project, the goal of which is to support reliable, scalable distributed computing."

Apache Hadoop

50
New cards

Which of the following is not an advantage of cloud-based database systems?

Performance

51
New cards

_____ is the process of two or more people working together to achieve a result (a goal).

Collaboration

52
New cards

Which of the following is not an advantage of wikis for shared content?

"Because any member can edit the content, errant content can occur."

53
New cards

Which of the following is not an advantage of virtual memory?

Using virtual memory is faster than using physical random access memory (RAM).

54
New cards

Which of the following is not an advantage of blade servers?

The use of blade servers is mandated by the Green Computing Initiative.

55
New cards

_____ uses hardware and software to create the illusion that two or more entities are present when there is only one physical entity in existence.

Virtualization

56
New cards

"A _____ is a hacker attack on a site, the goal of which is to consume system resources so that the resources cannot be used by the site's users."

denial-of-service attack

57
New cards

The term _____ is used when a cloud-based storage device overwrites (wipes) a file's contents when a file is deleted.

data wiping

58
New cards

Assume a device manufacturer tests 100 devices. The first device fails at 100 hours. The last device fails at 200 hours. What is the device mean time between failure (MTBF)?

"10,000 hours"

59
New cards

"_____ describes the policies, procedures, and actions taken by an organization to ensure the availability of critical business functions to employees, customers, and other key stakeholders."

Business continuity

60
New cards

A(n) _____ provides users with a few minutes of battery backup power so the users can save their work and shut down their systems in an orderly way.

uninterruptible power supply (UPS)