Description : Which one of the following best describes project success criteria? a. Actively seeking some senior management support. b. Measures by which the success of the project is judged. c. Achievement of milestones. d. A motivated project team.
Last Answer : b. Measures by which the success of the project is judged.
Description : Boehm suggests an approach that addresses project objectives, milestones and schedules, responsibilities, management and technical approaches and required resources, This principle is called as . a. W3HH principle b. WHO principle c. W5HH principle d. None of the above.
Last Answer : c. W5HH principle
Description : Each project phase is marked by completion of one or more: 1. Tasks. 2. Milestones 3. Deliverables 4. Life cycles
Last Answer : 3. Deliverables
Description : (1)Milestones established by the customer must be adhered to by: 1. Project manager 2. Functional managers 3. The customer 4. Both a and b
Last Answer : 4. Both a and b
Description : Which one from the following is highly associated activity of project planning? (A) Keep track of the project progress. (B) Compare actual and planned progress and costs (C) Identify the activities, milestones and deliverables produced by a project (D) Both (B) and (C)
Last Answer : (C) Identify the activities, milestones and deliverables produced by a project
Description : Which one of the following statements is true? a. Independent reviews and quality audits form part of quality assurance to ensure the project manager delivers on time and to budget. ... Quality planning enables the project manager to manage the trade-off between customer expectations and budget
Last Answer : c. Quality control verifies that the project deliverables conform to specification, are fit for purpose and meet stakeholder expectations.
Description : CV = $70,000; AC = 90,000; Budget = $200,000. What percent of the project is complete? Select one: a. 80% b. 53% c. 45% d. 35% e. 75% Answer - a. 80% 39. As a project manager, John ... paid off the project. d. John's boss is happy. e. John and his team are promoted and get salary increases.
Last Answer : c. John’s client has paid off the project.
Description : Which one of the following statements is true? a. Independent reviews and quality audits form part of quality assurance to ensure the project manager delivers on time and to budget. ... planning enables the project manager to manage the trade-off between customer expectations and budget.
Description : A set of information that defines the status of resources allocated to a process is a. Process control b. ALU c. Register Unit d. Process description
Last Answer : Process description
Description : The …………………... option tells netstat to display the status of all configured network interfaces. A. -n B. -i C. either a or b D. neither a nor b
Last Answer : B. -i
Description : Which of the following is present in both an HTTP request line and a status line? A. HTTP version number B. URL C. Method D. None of the above
Last Answer : A. HTTP version number
Description : Information hiding is to hide from user, details ? that are relevant to him that are not relevant to him that may be maliciously handled by him that are confidential
Last Answer : that may be maliciously handled by him
Description : Which statement is true regarding the user exec and privileged exec mode? A. They both require the enable password B. User exec is a subset of the privileged exec C. The '?' only works in Privileged exec D. They are identica
Last Answer : User exec is a subset of the privileged exec
Description : User programmable terminals that combine VDT hardware with built-in microprocessor is a. Kips b. PC c. Mainframe d. Intelligent terminals
Last Answer : Intelligent terminals
Description : Which statement is valid about computer program? a. It is understood by a computer b. It is understood by programmer c. It is understood user d. Both of above
Last Answer : Both of above
Description : Report generatorsare usedto A. store data input bya user B. retrieve information from files C. answer queries D. both (b)and (c) E. None of the above
Last Answer : both (b)and (c)
Description : An unauthorized user is a network _______ issue. A) Performance B) Reliability C) Security D) All the above
Last Answer : Security
Description : A machine that connects to two or more electronic mail systems and transfers mail messagesamong them is known as A. Gateways B. mail gateway C. bridges D. User Agent E. None of the above
Last Answer : mail gateway
Description : Which of the following layer protocols are responsible for user and theapplicationprogrammesupport such aspasswords, resource sharing, file transfer and network management? A. Layer 7 protocols B. Layer 6 protocols C. Layer 5 protocols D. Layer 4 protocols E. None of the above
Last Answer : Layer 7 protocols
Description : A front-end processor is A. a user computer system B. a processor in a large-scale computer that executes operatingsystem instructions C. a minicomputer that relieves main-frame computersat a ... centre of communications control functions D. preliminary processor ofbatch jobs. E. None of the above
Last Answer : a minicomputer that relieves main-frame computersat a computer centre of communications control functions
Description : Which layers of the OSI determines the interface often system with the user? A) Network B) Application C) Data link D) Session
Last Answer : B) Application
Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet
Last Answer : C) NFS
Description : Which one of the following statements is NOT correct about HTTP cookies? a. A cookies is a piece of code that has the potential to compromise the security of an Internet user b. A cookie gains entry ... and time d. Cookies can be used to track the browsing pattern of a user at a particular site
Last Answer : a. A cookies is a piece of code that has the potential to compromise the security of an Internet user
Description : Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host? a.HTTP b.FTP c.Telnet d.TCP
Last Answer : c.Telnet
Description : Which layer provides the services to user? a.application layer b.session layer c.presentation layer d.physical layer
Last Answer : a.application layer
Description : Which of the following layers of the OSI model is responsible for user interaction? a.Layer 4 b.Layer 5 c.Layer 6 d.Layer 7
Last Answer : d.Layer 7
Description : Which phase/s of POP3 allow/s an user agent to retrieve the messages as well as to mark the messages for deletion purpose? a. Authorization Phase b. Transaction Phase c. Update Phase d. All of the above
Last Answer : b. Transaction Phase
Description : Which among the below specified illustrations belongs to the category of GUI based user agents? a. mail b. pine c. Outlook & Netscape d. All of the above
Last Answer : c. Outlook & Netscape
Description : In OSI model, which of the following layer transforms information from machine format into that understandable by user a. application b. session c. presentation d. physical
Last Answer : c. presentation
Description : Which of the following is NOT true about User Datagram Protocol in transport layer? a. Works well in unidirectional communication, suitable for broadcast information. b. It does three way ... File System d. The lack of retransmission delays makes it suitable for real-time applications
Last Answer : b. It does three way handshake before sending datagrams
Description : A layer-4 firewall (a device that can look at all protocol headers up to the transport layer) CANNOT a. block entire HTTP traffic during 9:00PM and 5 :0OAM b. block all ICMP traffic c. stop ... address d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM
Last Answer : d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM
Description : Which one of the following is a version of UDP with congestion control? a. datagram congestion control protocol b. stream control transmission protocol c. structured stream transport d. user congestion control protocol
Last Answer : a. datagram congestion control protocol
Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received in the same order as sent order d. it sends data very quickly
Last Answer : a. all UDP packets are treated independently by transport layer
Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received ... order d. it sends data very quickly Answer: Option(a) 4. Transmission control protocol ____
Description : Bit stuffing refers to a. inserting a 0 in user stream to differentiate it with a flag b. inserting a 0 in flag stream to avoid ambiguity c. appending a nipple to the flag sequence d. appending a nipple to the use data stream
Last Answer : a. inserting a 0 in user stream to differentiate it with a flag
Description : Which layer provides interface between network support layers and user support layers? a. session layer b. data link layer c. transport layer d. network layer
Last Answer : c. transport layer
Description : State weather the following statement is true or false for Exception Reporting 1). If the user runs into trouble, this trouble can be reported to the peer using a S-U-EXCEPTION-REPORT. request primitive. 2). Exception ... . false C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true
Last Answer : A. 1. True, 2. true, 3. true
Description : State weather the following statement is true or false for ISDN - Integrated Services Digital Network ISDN is an effort to standardize subscriber services, provide user/network interfaces 2). the goal of ISDN is to form a Local ... C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false
Last Answer : A. 1. True, 2. false, 3. true
Description : Which among the below specified illustrations belongs to the category of GUI based user agents? A. mail B. pine C. Outlook D. All of the above
Last Answer : C. Outlook
Description : User datagram protocol is called connectionless because _____________ A. all UDP packets are treated independently by transport layer B. it sends data as a stream of related packets C. it is received in the same order as sent order D. it sends data very quickly
Last Answer : A. all UDP packets are treated independently by transport layer
Description : Radio channels are attractive medium because __________ a) Can penetrate walls b) Connectivity can be given to mobile user c) Can carry signals for long distance d) All of the mentioned
Last Answer : d) All of the mentioned
Description : User datagram protocol is called connectionless because _____________ a) all UDP packets are treated independently by transport layer b) it sends data as a stream of related packets c) it is received in the same order as sent order d) it sends data very quickly
Last Answer : all UDP packets are treated independently by transport layer
Description : What is the difference between a user agent (UA) and a mail transfer agent (MTA)?
Last Answer : The UA prepares the message, creates the envelope, and puts the message in the envelope. The MTA transfers the mail across the Internet.
Description : _________ service helps user in knowing their Aadhaar Seeding status with their bank account. A. WAP B. QSAM C. NUUP D. Both (A) and (B) E. Both (B) and (C)
Last Answer : B. QSAM Explanation: QSAM (Query Service on Aadhaar Mapper) – This service helps user in knowing their Aadhaar Seeding status with their bank account
Description : When companies market products on the basis of what the product's attributes will do for a given segment of consumers, they are using a powerful form of behavioral segmentation known as: A. ... segmentation. B. benefit segmentation. C. user status segmentation. D. usage rate segmentation.
Last Answer : B. benefit segmentation.
Description : When did Fluther get started? Any major milestones and game changers since the beginning?
Last Answer : Welcome to Fluther. I believe it started in 2007. I've been here since the end of 2009. It was a large-ish site. What set it apart was the rule requiring high writing standards. Also, we ... us their questions, and the community will do its best to try to get accurate information. Enjoy yourself.
Description : Do you have any particular milestones that made you feel like an adult?
Last Answer : When I got married the first time. Ha Ha what a laugh. I got divorced 7 years later and have been regressing ever since :p
Description : Some adults are said to have a mind of a child, but what about the rest of the population? What milestones should the rest of the age groups have to belong to a certain mental age?
Last Answer : answer:Good question Well it really is simplified into personality trait, one with the mind of a child is mentally immature whereas a mature individual or normal person is more settled in ... is more conditioned to respond to the responsibilities and events involved at that certain stage in life