Frequencyof failure and network recovery time after a failure are measures of the_______of a network.
A)
Performance
B)
Reliability
C)
Security
D)
Feasibility

1 Answer

Answer :

Reliability

Related questions

Description : An unauthorized user is a network _______ issue. A) Performance B) Reliability C) Security D) All the above

Last Answer : Security

Description : In_________, the frequencyof the carrier signal is varied to representdata. Both peak amplitudeand phase remain constant. A) ASK B) PSK C) FSK D) QAM

Last Answer : FSK

Description : The Nyquist theorem specifies the minimum samplingrate to be_______. A) equal to the lowest frequency of asignal B) equal to the highest frequency ofa signal C) twice thebandwidth of a signal D) twice thehighest frequencyof a signal

Last Answer : twice thehighest frequencyof a signal

Description : Most important advantage of an IC is its a. Easy replacement in case of circuit failure b. Extremely high reliability c. Reduced cost d. Lower power consumption

Last Answer : Extremely high reliability

Description : . ___________refers to the non-functional requirements such as reliability, security, disaster recovery, etc. A. Service Development B. Plan Development C. Quality of service D. Technical Service

Last Answer : . Quality of service

Description : What is needed to make probabilistic systems feasible in the world? a) Reliability b) Crucial robustness c) Feasibility d) None of the mentioned

Last Answer : b) Crucial robustness

Description : Which of the following is NOT concept of measurement theory? a. Directness of measurement b. Reliability c. Feasibility d. Measurement error

Last Answer : C

Description : Which of the following is a type of testing ? Recovery Testing Security Testing Stress Testing All of above

Last Answer : All of above

Description : ____________ is a collection of one or more files that correct flaws in the performance, reliability or security of a specific software product. A. Software Update B. Software Piracy C. Software patch D. None of the above

Last Answer : C. Software patch

Description : Which of the following statements about Google App Engine (GAE) is INCORRECT. A. It's a Platform as a Service (PaaS) model. B. Automatic Scalability is built in with GAE. As ... s applications. So, applications can take advantage of reliability, performance and security of Google's infrastructure.

Last Answer : You can decide on how many physical servers required for hosting your application.

Description : A typical objective of an operational audit is for the auditor to a. Determine whether the financial statements fairly present the entity's operations. b. Evaluate the feasibility of ... recommendation for improving performance. d. Report on the entity's relative success in maximizing profits

Last Answer : Make recommendation for improving performance

Description : Which of the following is/ are the drawbacks of Ring Topology? A) Failure of one computer, can affect the whole network B) Adding or removing the computers disturbs the network activity. C) If the central hub fails, the whole network fails to operate. D) Both of A and B

Last Answer : D) Both of A and B

Description : A network consists of eight NT servers. You are planning to move servers to different segments of yournetwork, what utility should be used at eachserver to determine which server generates the most traffic? A. NBTSTAT B. NETSTAT.EXE C. Performance Monitor D. Network Monitor E. ARP.EXE

Last Answer : Network Monitor

Description : The performance of data communications network depends on .............. A) Number of users B) The hardware and software C) The transmission D) All of the above

Last Answer : D) All of the above

Description : What is one advantage of setting up a DMZ(Demilitarized Zone) with two firewalls? a. You can control where traffic goes in the three networks b. You can do stateful packet filtering c. You can do load balancing d. Improve network performance

Last Answer : a. You can control where traffic goes in the three networks

Description : Geographic distribution of data across a cloud provider'’ network is a problem for many enterprises because it: A. Breaks compliance regulations B. Adds latency C. Raises security concerns D. Makes data recovery harder

Last Answer : Breaks compliance regulations

Description : Geographic distribution of data across a cloud provider’s network is a problem for many enterprises because it: A. Breaks compliance regulations B. Adds latency C. Raises security concerns D. Makes data recovery harder

Last Answer : Breaks compliance regulations

Description : VLANs can_________. A) reduce network traffic B) provide anextra measure of security C) either (a)or (b) D) both (a) and (b)

Last Answer : both (a) and (b)

Description : Intranetsand extranets can use their network fire walls andother security features to establish secureInternet links within an enterpriseor with its trading partners. Select the best fit for answer: A. Network Server B. Virtual Private Network C. Networkoperating system D. OS

Last Answer : Virtual Private Network

Description : Security based connection is provided by which layer? a. Network layer b. Session layer c. Application layer d. Transport layer

Last Answer : d. Transport layer

Description : PGP is one of the protocols used to provide security at the ……….. It is designed to create authenticated and confidential ………. A. application layer, e-mails. B. Network layer, packets C. application layer, packets D. network layer , e-mails

Last Answer : A. application layer, e-mails

Description : Which of the following is not a product matrix ? Size Reliability Productivity Functionality

Last Answer : Productivity

Description : In computer networks _________ is a characteristic that a flow needs where Lack of it means losing a packet or acknowledgment, which entails retransmission. A. Reliability B. Delay C. Jitter D. Bandwidth

Last Answer : A. Reliability

Description : As the resources are reserved between two communicating end systems in circuit switching, ___________ is achieved. a) authentication b) guaranteed constant rate c) reliability d) store and forward

Last Answer : b) guaranteed constant rate

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : Which of the following statements accurately describes test-retest reliability? a. Measure of consistency of test scores over time b. Measure of consistency of scores obtained from two equivalent halves of ... concept d. Measure of degree of agreement between two or more scorers, judges, or raters

Last Answer : a. Measure of consistency of test scores over time

Description : Exit Criteria may consist of :- i. Thoroughness measures , such as coverage of code, functionality or risk ii. Estimates of Defect density or reliability measures. iii. Residual risk such as defects not fixed or ... correct and i,ii,iii are incorrect d) iii and iv are correct and i,ii are incorrect

Last Answer : b) i,ii,iii is correct and iv is incorrect

Description : In the Rough Cut buying stage, “reliability” is expressed in terms of: a. Mean Time Between Failure. b. how long the product will last. c. years. d. months. e. Mean Time Before Failure.

Last Answer : a. Mean Time Between Failure.

Description : Which one of the following statements is incorrect ? (A) Pareto analysis is a statistical method used for analyzing causes, and is one of the primary tools for quality management. (B) Reliability of ... (D) In white-box testing, the test cases are decided from the specifications or the requirements.

Last Answer : (D) In white-box testing, the test cases are decided from the specifications or the requirements.

Description : Which of the following statement(s) is/are true concerning the outcome in patients with acute renal failure? a. Mortality for ischemic acute tubular necrosis without other organ failure is ... is unlikely d. There is no difference in survival between oliguric and nonoliguric renal failure

Last Answer : Answer: a, b, c Survival of patients with acute renal failure is a function of the successful treatment of the primary disease from which the renal failure was derived. The mortality ... is unlikely. Nonoliguric renal failure is usually limited in its extent and is almost always reversible

Description : Most important advantage of an IC is its A) Easy replacement in case of circuit failure B) Extremely high reliability C) Reduced cost D) Lower power consumption

Last Answer : Answer : B

Description : A computer has very low failure rate because it uses electronic components. It produces very consistent results. This is highlighted by which of the feature of computer? A) Accuracy B) Reliability C) Versatility D) Automatic

Last Answer : Answer : B

Description : A CPA establishes quality control policies and procedures for deciding whether to accept a new client or continue to perform services for a current client. The primary purpose ... resulting from failure to detect irregularities in client financial statements association with clients whose

Last Answer : To minimize the likelihood of association with clients whose management lacks integrity

Description : Most important advantage of an IC is its a. Easy replacement in case of circuit failure b. Extremely high reliability c. Reduced cost d. Low powers consumption

Last Answer : b. Extremely high reliability

Description : Most important advantage of an IC is its a. Easy replacement in case of circuit failure b. Extremely high reliability c. Reduced cost d. Lower power consumption

Last Answer : b. Extremely high reliability

Description : Most important advantage of an IC is its a. Easy replacement in case of circuit failure b. Extremely high reliability c. Reduced cost d. Low powers consumption

Last Answer : b. Extremely high reliability

Description : As the reliability increases, failure intensity (A) decreases (B) increases (C) no effect (D) none of the above

Last Answer : (A) decreases

Description : Non-conformance to software requirements is known as a) Software availability b) Software reliability c) Software failure d) None of the mentioned

Last Answer :  Ans : c

Description : The Perceptual Map is a. a marketing tool used to compare products against customer perceptions. b. a marketing tool used to compare performance against size. c. a marketing tool used to compare ... used to compare age against position. e. a marketing tool used to compare time against motion.

Last Answer : a. a marketing tool used to compare products against customer perceptions. b. a marketing tool used to compare performance against size.

Description : The synchronous modems are more costly than the asynchronous modems because a. they produce large volume of data b. they contain clock recovery circuits c. they transmit the data with stop and start bits d. they operate with a larger bandwidth e. none of above

Last Answer : they contain clock recovery circuits

Description : The synchronous modems are more costly than the asynchronous modemsbecause A. they produce largevolumeof data B. they contain clock recovery circuits C. they transmit thedata with stop and start bits. D. they operate witha largerbandwidth E. None of the above

Last Answer : they contain clock recovery circuits

Description : In OSI model, session layer is responsible for a. Recovery b. Check pointing c. Both a and b d. None of the above

Last Answer : c. Both a and b

Description : Comments on the 2010 VW tuoareg diesel suv, problems, performance, reliability etc.?

Last Answer : I would recommend looking at some Volkswagon forums. I’m not huge into the community or even follow what goes on with their vehicles.

Description : This characteristic often draws the line between what is feasible and what is impossible. a) Performance b) System Evaluation c) Modularity d) Reliability

Last Answer : Answer: a Explanation: Algorithms help us to understand scalability. Performance often draws the line between what is feasible and what is impossible

Description : Which of the following statements is correct? a. Sufficiency refers to the quality of evidence, while appropriateness refers to the quantity of evidence. b. The reliability of evidence is ... are honest and have integrity relieves the auditor of the need to maintain professional scepticism.

Last Answer : The performance of consulting services for audit clients does not, in and of itself, impair the auditor’s independence

Description : Which of the following is not an assurance engagement? a. Risk Assessment Service b. Information System Reliability Service c. Business Performance Measurement d. Management Consulting Service

Last Answer : Management Consulting Service

Description : Customers go through a two-stage buying process: The Rough Cut and the Fine Cut. In the Rough Cut, buyers focus on four product characteristics. Which one of the following is NOT one of these four product characteristics? a. Performance b. Age c. Size d. Reliability e. Price

Last Answer : b. Age

Description : What two factors are considered in both the rough cut and fine cut of the customer buying process? a. Price and Reliability b. Price and Age c. Age and Performance d. Reliability and age

Last Answer : a. Price and Reliability