Description : An unauthorized user is a network _______ issue. A) Performance B) Reliability C) Security D) All the above
Last Answer : Security
Description : In_________, the frequencyof the carrier signal is varied to representdata. Both peak amplitudeand phase remain constant. A) ASK B) PSK C) FSK D) QAM
Last Answer : FSK
Description : The Nyquist theorem specifies the minimum samplingrate to be_______. A) equal to the lowest frequency of asignal B) equal to the highest frequency ofa signal C) twice thebandwidth of a signal D) twice thehighest frequencyof a signal
Last Answer : twice thehighest frequencyof a signal
Description : Most important advantage of an IC is its a. Easy replacement in case of circuit failure b. Extremely high reliability c. Reduced cost d. Lower power consumption
Last Answer : Extremely high reliability
Description : . ___________refers to the non-functional requirements such as reliability, security, disaster recovery, etc. A. Service Development B. Plan Development C. Quality of service D. Technical Service
Last Answer : . Quality of service
Description : What is needed to make probabilistic systems feasible in the world? a) Reliability b) Crucial robustness c) Feasibility d) None of the mentioned
Last Answer : b) Crucial robustness
Description : Which of the following is NOT concept of measurement theory? a. Directness of measurement b. Reliability c. Feasibility d. Measurement error
Last Answer : C
Description : Which of the following is a type of testing ? Recovery Testing Security Testing Stress Testing All of above
Last Answer : All of above
Description : ____________ is a collection of one or more files that correct flaws in the performance, reliability or security of a specific software product. A. Software Update B. Software Piracy C. Software patch D. None of the above
Last Answer : C. Software patch
Description : Which of the following statements about Google App Engine (GAE) is INCORRECT. A. It's a Platform as a Service (PaaS) model. B. Automatic Scalability is built in with GAE. As ... s applications. So, applications can take advantage of reliability, performance and security of Google's infrastructure.
Last Answer : You can decide on how many physical servers required for hosting your application.
Description : A typical objective of an operational audit is for the auditor to a. Determine whether the financial statements fairly present the entity's operations. b. Evaluate the feasibility of ... recommendation for improving performance. d. Report on the entity's relative success in maximizing profits
Last Answer : Make recommendation for improving performance
Description : Which of the following statements is correct for the use of packet switching? A. the subdivision of information into individuallyaddressed packets in conjunction with alternativerouting arrangementenabled the transmission path ... capacity could be achieved. D. All of theabove E. None of the above
Last Answer : All of theabove
Description : Which of the following is/ are the drawbacks of Ring Topology? A) Failure of one computer, can affect the whole network B) Adding or removing the computers disturbs the network activity. C) If the central hub fails, the whole network fails to operate. D) Both of A and B
Last Answer : D) Both of A and B
Description : A network consists of eight NT servers. You are planning to move servers to different segments of yournetwork, what utility should be used at eachserver to determine which server generates the most traffic? A. NBTSTAT B. NETSTAT.EXE C. Performance Monitor D. Network Monitor E. ARP.EXE
Last Answer : Network Monitor
Description : The performance of data communications network depends on .............. A) Number of users B) The hardware and software C) The transmission D) All of the above
Last Answer : D) All of the above
Description : What is one advantage of setting up a DMZ(Demilitarized Zone) with two firewalls? a. You can control where traffic goes in the three networks b. You can do stateful packet filtering c. You can do load balancing d. Improve network performance
Last Answer : a. You can control where traffic goes in the three networks
Description : Geographic distribution of data across a cloud provider'’ network is a problem for many enterprises because it: A. Breaks compliance regulations B. Adds latency C. Raises security concerns D. Makes data recovery harder
Last Answer : Breaks compliance regulations
Description : Geographic distribution of data across a cloud provider’s network is a problem for many enterprises because it: A. Breaks compliance regulations B. Adds latency C. Raises security concerns D. Makes data recovery harder
Description : VLANs can_________. A) reduce network traffic B) provide anextra measure of security C) either (a)or (b) D) both (a) and (b)
Last Answer : both (a) and (b)
Description : Intranetsand extranets can use their network fire walls andother security features to establish secureInternet links within an enterpriseor with its trading partners. Select the best fit for answer: A. Network Server B. Virtual Private Network C. Networkoperating system D. OS
Last Answer : Virtual Private Network
Description : Security based connection is provided by which layer? a. Network layer b. Session layer c. Application layer d. Transport layer
Last Answer : d. Transport layer
Description : PGP is one of the protocols used to provide security at the ……….. It is designed to create authenticated and confidential ………. A. application layer, e-mails. B. Network layer, packets C. application layer, packets D. network layer , e-mails
Last Answer : A. application layer, e-mails
Description : Which of the following is not a product matrix ? Size Reliability Productivity Functionality
Last Answer : Productivity
Description : In computer networks _________ is a characteristic that a flow needs where Lack of it means losing a packet or acknowledgment, which entails retransmission. A. Reliability B. Delay C. Jitter D. Bandwidth
Last Answer : A. Reliability
Description : As the resources are reserved between two communicating end systems in circuit switching, ___________ is achieved. a) authentication b) guaranteed constant rate c) reliability d) store and forward
Last Answer : b) guaranteed constant rate
Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These
Last Answer : a) Hacking
Description : Which of the following statements accurately describes test-retest reliability? a. Measure of consistency of test scores over time b. Measure of consistency of scores obtained from two equivalent halves of ... concept d. Measure of degree of agreement between two or more scorers, judges, or raters
Last Answer : a. Measure of consistency of test scores over time
Description : Exit Criteria may consist of :- i. Thoroughness measures , such as coverage of code, functionality or risk ii. Estimates of Defect density or reliability measures. iii. Residual risk such as defects not fixed or ... correct and i,ii,iii are incorrect d) iii and iv are correct and i,ii are incorrect
Last Answer : b) i,ii,iii is correct and iv is incorrect
Description : In the Rough Cut buying stage, “reliability” is expressed in terms of: a. Mean Time Between Failure. b. how long the product will last. c. years. d. months. e. Mean Time Before Failure.
Last Answer : a. Mean Time Between Failure.
Description : Which one of the following statements is incorrect ? (A) Pareto analysis is a statistical method used for analyzing causes, and is one of the primary tools for quality management. (B) Reliability of ... (D) In white-box testing, the test cases are decided from the specifications or the requirements.
Last Answer : (D) In white-box testing, the test cases are decided from the specifications or the requirements.
Description : Which of the following statement(s) is/are true concerning the outcome in patients with acute renal failure? a. Mortality for ischemic acute tubular necrosis without other organ failure is ... is unlikely d. There is no difference in survival between oliguric and nonoliguric renal failure
Last Answer : Answer: a, b, c Survival of patients with acute renal failure is a function of the successful treatment of the primary disease from which the renal failure was derived. The mortality ... is unlikely. Nonoliguric renal failure is usually limited in its extent and is almost always reversible
Description : Most important advantage of an IC is its A) Easy replacement in case of circuit failure B) Extremely high reliability C) Reduced cost D) Lower power consumption
Last Answer : Answer : B
Description : A computer has very low failure rate because it uses electronic components. It produces very consistent results. This is highlighted by which of the feature of computer? A) Accuracy B) Reliability C) Versatility D) Automatic
Description : A CPA establishes quality control policies and procedures for deciding whether to accept a new client or continue to perform services for a current client. The primary purpose ... resulting from failure to detect irregularities in client financial statements association with clients whose
Last Answer : To minimize the likelihood of association with clients whose management lacks integrity
Description : Most important advantage of an IC is its a. Easy replacement in case of circuit failure b. Extremely high reliability c. Reduced cost d. Low powers consumption
Last Answer : b. Extremely high reliability
Description : As the reliability increases, failure intensity (A) decreases (B) increases (C) no effect (D) none of the above
Last Answer : (A) decreases
Description : Non-conformance to software requirements is known as a) Software availability b) Software reliability c) Software failure d) None of the mentioned
Last Answer : Ans : c
Description : The Perceptual Map is a. a marketing tool used to compare products against customer perceptions. b. a marketing tool used to compare performance against size. c. a marketing tool used to compare ... used to compare age against position. e. a marketing tool used to compare time against motion.
Last Answer : a. a marketing tool used to compare products against customer perceptions. b. a marketing tool used to compare performance against size.
Description : The synchronous modems are more costly than the asynchronous modems because a. they produce large volume of data b. they contain clock recovery circuits c. they transmit the data with stop and start bits d. they operate with a larger bandwidth e. none of above
Last Answer : they contain clock recovery circuits
Description : The synchronous modems are more costly than the asynchronous modemsbecause A. they produce largevolumeof data B. they contain clock recovery circuits C. they transmit thedata with stop and start bits. D. they operate witha largerbandwidth E. None of the above
Description : In OSI model, session layer is responsible for a. Recovery b. Check pointing c. Both a and b d. None of the above
Last Answer : c. Both a and b
Description : Comments on the 2010 VW tuoareg diesel suv, problems, performance, reliability etc.?
Last Answer : I would recommend looking at some Volkswagon forums. I’m not huge into the community or even follow what goes on with their vehicles.
Description : This characteristic often draws the line between what is feasible and what is impossible. a) Performance b) System Evaluation c) Modularity d) Reliability
Last Answer : Answer: a Explanation: Algorithms help us to understand scalability. Performance often draws the line between what is feasible and what is impossible
Description : Which of the following statements is correct? a. Sufficiency refers to the quality of evidence, while appropriateness refers to the quantity of evidence. b. The reliability of evidence is ... are honest and have integrity relieves the auditor of the need to maintain professional scepticism.
Last Answer : The performance of consulting services for audit clients does not, in and of itself, impair the auditor’s independence
Description : Which of the following is not an assurance engagement? a. Risk Assessment Service b. Information System Reliability Service c. Business Performance Measurement d. Management Consulting Service
Last Answer : Management Consulting Service
Description : Customers go through a two-stage buying process: The Rough Cut and the Fine Cut. In the Rough Cut, buyers focus on four product characteristics. Which one of the following is NOT one of these four product characteristics? a. Performance b. Age c. Size d. Reliability e. Price
Last Answer : b. Age
Description : What two factors are considered in both the rough cut and fine cut of the customer buying process? a. Price and Reliability b. Price and Age c. Age and Performance d. Reliability and age
Last Answer : a. Price and Reliability