Which of the following is an advantage of mounting an application on the
web?
a) The possibility of 24 hour access for users
b) Creating a system that can be extended globally
c) Standardizing the design of the interface
d) All of The Above
e) None of The Above

1 Answer

Answer :

d) All of The Above

Related questions

Description : They normally interact with the system via user interface provided by the application software. a) Programmers b) Developers c) Users d) Testers

Last Answer : Answer: c Explanation: Users interact with the system via user interface that is given by the application software. An application software is a set of instructions designed to serve a particular purpose This set of Computer Fundamentals online test focuses on “Machine Languages”

Description : What is the overall term for creating editing, formatting, storing, retrieving and printing a text document? a) Word processing b) Spreadsheet design c) Web design d) Database management e) None of these

Last Answer : a) Word processing

Description : Application software A. is designed to help programmers B. is used to control the operating System C. performs specific task for computer users D. is used for making design only

Last Answer : C. performs specific task for computer users

Description : The following three golden rules: (i) Place the user in control (ii) Reduce the user’s memory load (iii) Make the interface consistent are for (A) User satisfaction (B) Good interface design (C) Saving system’s resources (D) None of these

Last Answer : (B) Good interface design 

Description : Automatic repeat request error management mechanism is provided by ________ a. logical link control sublayer b. media access control sublayer c. network interface control sublayer d. application access control sublayer

Last Answer : a. logical link control sublayer

Description : Automatic repeat request error management mechanism is provided by ________ A. logical link control sublayer B. media access control sublayer C. network interface control sublayer D. application access control sublayer

Last Answer : A. logical link control sublayer

Description : For standardizing NaOH solution, which of the following is used as a primary standard ?

Last Answer : For standardizing NaOH solution, which of the following is used as a primary standard ? A. Sodium ... Ammonium Sulfate C. Oxalic acid D. dil. HCl

Description : What is the full form of ASTM? a. American Society for Testing and Materials b. American Standards for Textile Matters c. Association for standardizing testing methods d. Association of Standard Textile Manufacturers

Last Answer : a. American Society for Testing and Materials

Description : The type of instruments used mainly for standardizing instruments in laboratories is (a) Indicating instrument (b) Integrating instrument (c) Absolute instrument (d) Recording instrument  

Last Answer : Ans:Option C

Last Answer : The use of absolute instruments is merely confined within laboratories as standardizing instruments.

Description : Data structure suitable for the application is discussed in ? data design architectural design procedural design interface design

Last Answer : data design

Description : A(n) _____ allows you to access your e-mail from anywhere. a) forum b) webmail interface c) message board d) weblog e) None of these

Last Answer : b) webmail interface

Description : What is System Analysis? A) The design of the screen the user will see and use to enter or display data B) System analysis defines the format and type of data the program will use C) System Analysis involves creating formal model of the problem to be solved D) None of the above

Last Answer : Answer : C

Description : An interface that provides I/O transfer of data directly to and form the memory unit and peripheral is termed as________ A. DDA B. Serial interface C. Direct Memory Access (DMA) D. None of the Above

Last Answer : C. Direct Memory Access (DMA)

Description : Which of the following statements is true  The web designer shouldn’t just be concerned about the looks but also about user interface  Usability is very important in web design  Both A & B  None of the above

Last Answer :  Both A & B

Description : Which layers of the OSI determines the interface often system with the user? A) Network B) Application C) Data link D) Session

Last Answer : B) Application

Description : A hardened firewall host on an intranet (i) has a proxy application gateway program running on it (ii)Allows specified internet users to access specified services in the intranet (iii) Initiates all internet activities requested by clients ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : c. i, ii, iii, iv 

Description : Proxy application gateway (i) acts on behalf of all intranet users wanting to access interne securely (ii)monitors all accesses to internet and allows access to only specified IP addresses (iii) disallows use of certain protocols with ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : b. i, ii, iii 

Description : How does the theory of comparative advantage relate to production possibility curves?

Last Answer : What homework is this for?

Description : .Free trade is based on the principle of (a) Comparative advantage (b) Comparative scale © Economies of advantage (d) Production possibility advantage

Last Answer : (a) Comparative advantage

Description : The process of creating all the visual aspects of the elements such as buttons and links is a) Web design b) Digital development c) Visual medium d) Above all are true

Last Answer : a) Web design

Description : Where can I find a good how-to guide to designing a phone interface for an existing web application?

Last Answer : This might help, or it might not. I used iui to make a iPhone version of a lyrics website I have. It was pretty simple. I didn't bother with making a mobile version for anything besides the iPhone ... there. I would just suggest keeping it as simple as possible. edit: I pretty much ripped off this.

Description : http://www.lidovky.cz/detem-vstup-zakazan-0qz-/zpravy-domov.aspx?c=A160329_105956_ln_domov_sij

Last Answer : My opinion is that each owner has the right to determine for himself who is allowed into his business and who is not. And frankly, kids under the age of 6 don't really belong in a restaurant. This is not discrimination.

Description : USA Chemicals' president is very excited about the possibility of the firm's British subsidiary having access to all of the EU. He realises that it will be some time before this area truly becomes ... one of the following factors? A)Available advertising media B)Culture C)Law D)Technology

Last Answer : B)Culture

Description : Distributed processing involves a) solving computer component problems from a different computer b) solving computing problems by breaking them into smaller parts that are separately processed by different ... ) allowing users to access network resources away from the office e) None of these

Last Answer : b) solving computing problems by breaking them into smaller parts that are separately processed by different computers

Description : _______ allows users to access accounts and pay bills (1) Distance Learning (2) Online Banking (3) E-Commerce (4) Multimedia

Last Answer : E-Commerce 

Description : A ____ is a namespace for organizing classes and interfaces in a logical manner. Placing your code into ______makes large software projects easier to manage. This section explains why this is useful and ... provided by the Java Platform: a) Inheritance b) Object c) Package d) None of These

Last Answer : c) Package

Description : The term API refers to (1) Application Program Interface (2) Application Program Interaction (3) Applied Program Interaction (4) Application Process Interface

Last Answer : Application Program Interface

Description : You want to understand if users use their mobile phone to access your site. Which of the following approach is preferable? A. Ask "Are you using a mobile phone to access our site?" ... report Audience/Mobile/Overview D. This cannot be known because people use multiple devices to browse the Web

Last Answer : C. Look at the report Audience/Mobile/Overview

Description : Which statement is true about a cloud computing environment? A. It cannot be used to host location based applications. B. It enables users to access systems regardless of their location. C. It introduces ... D. It can improve a web server response time by having servers closer to the end user.

Last Answer : It enables users to access systems regardless of their location.

Description : Which of the following are the functions of operating system? i) recovering from errors ii) facilitating input/output iii) facilitating parallel operation iv) sharing hardware among users v) implementing user interface A) i, ii, ... only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : Which of the following is not true for a magnetic disk? A) It is expensive relative to magnetic tape B) It provides only sequential access to stored data C) Users can easily update records by writing over the old data D) All of above

Last Answer : Answer : B

Description : To access a mainframe or supercomputer ,users often use a- 1) Terminal 2) Node 3) Desktop 4) Handheld

Last Answer : 1) Terminal

Description : The principle of time sharing is 1) large numbers of users direct access to the computer for problem solving 2) large number of user for file sharing 3) both of above 4) none

Last Answer : large numbers of users direct access to the computer for problem solving

Description : The principle of time sharing is 1) large numbers of users direct access to the computer for problem solving 2) large number of user for file sharing 3) both of above 4) none

Last Answer : 1) large numbers of users direct access to the computer for problem solving

Description : The principle of time sharing is 1 large numbers of users direct access to the computer for problem solving 2 large number of user for file sharing 3 both of above 4 none

Last Answer : 1 large numbers of users direct access to the computer for problem solving

Description : This type of software works with end users, application software and computer hardware to handle the majority of technical details. A. Communications software B. Application software C. Utility software D. System software

Last Answer : D. System software

Description : What's the possibility of apple releasing an AOL instant messenger application for like iPhone like you see on the T-Mobile Sidekick?

Last Answer : answer:Have you tried meebo? I don’t know how it works with iPhone, but I use it all the time for online ims. www.meebo.com

Description : The software that allows users to surf the Internet is called a/an _____: a) Search Engine b) Internet Service Provider c) Multimedia Application d) Browser e) Internet Surfing Provider

Last Answer : d) Browser

Description : In order to use cable for browsing web you will need: a) A cable modem b) Network Interface Card (NIC) c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : What is the advantage of an extended stay hotel over an apartment rental?

Last Answer : When deciding between an extended stay hotel and an apartment rental, there are a few key differences to consider. First, with an extended stay hotel you do not have to sign a lease or any other ... Extended stay hotels generally do not require credit checks and do not require you to pay a lease f

Description : Globally approved form of unit system is?

Last Answer : SI system

Description : One advantage of dial-up-internet access is ___ 1) It utilises broadband technology 2) It utilizes existing telephone service 3) It uses a router for security 4) Modem speeds are very fast 5) None of these

Last Answer : Answer :2

Description : Which of the following doesn't define the correct roles and responsibilities of content marketing strategy? a. A strategy that tries to appeal and recall its target audience. b. A ... more focused on creating and distributing valuable as well as relevant content to its users/audiences.

Last Answer : c. Yet another name of social media marketing.

Description : Point out the wrong statement : A. Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through ... A process virtual machine instantiates when a command begins a process D. All of the above

Last Answer : Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through that host VM

Description : Point out the wrong statement : A. Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through ... A process virtual machine instantiates when a command begins a process D. All of the above

Last Answer : Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through that host VM

Description : Point out the wrong statement. a) Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware ... A process virtual machine instantiates when a command begins a process d) All of the mentioned

Last Answer : Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through that host VM

Description : The x.25 standard specifies a a. technique for start-stop data b. technique for dial access c. DTE/DCE interface d. data bit rate e. none of above

Last Answer : DTE/DCE interface

Description : CAD stands for: a) Computer And Development b) Computer Aided Design c) Computer Access Design d) Computer Access Development e) None of These

Last Answer : b) Computer Aided Design

Description : What are the two types of access lists that can be configured on a Cisco router? * Standard * Extended * Filtering * Packet

Last Answer : Correct answer: A & B The access lists are standard and extended. Standard access lists for IP check the source address of packets that could be routed. Extended access lists can check the source and destination packet plus check for specific protocols, port numbers, etc