What is a model of a proposed product, service, or system?
a. Prototyping
b. Prototype
c. Proof‐of‐concept prototype
d. Selling prototype

1 Answer

Answer :

b. Prototype

Related questions

Description : What is a model of a proposed product, service, or system? a. Prototyping b. Prototype c Selling prototype d. None of the above

Last Answer : d. None of the above

Description : Which one is not a layer of E‐commerce infrastructure a. Physical layer b. Product layer c. Service layer d. None

Last Answer : d. None

Description : A product or service that customers have come to expect from an industry, which must be offered by new entrants if they wish to compete and survive, is known as a(n)? a. Switching costs b. Loyalty programs c. Entry barriers d. Affiliate programs

Last Answer : c. Entry barriers

Description : Which concept suggests that different applications and computer systems should be able to communicate with one another? a. Integration b. Web services c. Scalability d. Interoperability

Last Answer : d. Interoperability

Description : What is a set of conditions used to measure how well a product or system functions? a. Flexibility b. Performance c. Capacity planning d. Benchmark

Last Answer : d. Benchmark

Description : Which of the following applies to the implementation of an idea? a. Copyright b. Intellectual property c. Patent d. Denial‐of‐service attack

Last Answer : c. Patent

Description : What harnesses far‐flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : d. None of the above

Description : What floods a Web site with so many requests for service that it slows down or crashes? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : c. Denial‐of‐service attack

Description : What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : b. Worm

Description : What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer's CPU and storage for some task you know ... about? a. Web log b. Clickstream c. Anonymous Web browsing service d. None of the above

Last Answer : d. None of the above

Description : Which service encompasses all technologies used to transmit and process information on an across a network? a. Interoperability b. Scalability c. Benchmarking d. Web services

Last Answer : d. Web services

Description : The Prototyping model of software development is: (1) a reasonable approach when requirements are well-defined. (2) a useful approach when a customer cannot define requirements clearly. (3) the ... projects with large development teams. (4) a risky model that rarely produces a meaningful product.

Last Answer : 1

Description : A computer model of a part design on a CAD system is called which of the following? a.Computer Prototype b.Geometric Prototype c.Solid Prototype d.Virtual Prototype

Last Answer : d.Virtual Prototype

Description : Which one is the component of cybercash payment system a. CC user software b. CC merachant software c. CC Server Software d. All of the above

Last Answer : d. All of the above

Description : Which of the following is not a reason why digital cash has turned out to be extremely difficult? a. If your system crashes you lose your money b. There is only one standard c. Digital ... makes money laundering easy d. Digital cash travels across the vast Internet and is susceptible to begin stolen

Last Answer : b. There is only one standard

Description : What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software

Last Answer : b. Public key encryption

Description : Who protects system from external threats? a. firewall b. EDI c. ERP d. Script kiddies

Last Answer : a. firewall

Description : What sends work assignments through an e‐mail system? a. Database‐based enterprise information portal b. Messaging‐based enterprise information portal c. Database‐based workflow system d. Messaging‐based workflow system

Last Answer : d. Messaging‐based workflow system

Description : What defines all of the steps or business rules, from beginning to end, required for a process to run correctly? a. Workflow b. EIP c. Workflow system d. SLA

Last Answer : a. Workflow

Description : What automates business processes? a. Workflow b. ASP c. Workflow system d. EIP

Last Answer : c. Workflow system

Description : Which factor represents how well your system can adapt to increased demands? a. Availability b. Accessibility c. Reliability d. Scalability

Last Answer : d. Scalability

Description : Which factor determines when your IT system will be available for knowledge workers to access? a. Availability b. Accessibility c. Reliability d. None of the above

Last Answer : a. Availability

Description : What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood? a. Disaster recovery plan b. Hot site c. Cold site d. Disaster recovery cost curve

Last Answer : a. Disaster recovery plan

Description : Choose the correct sequence to generate prototype a.3D CAD data - CAD solid model - STL file - RP prototype b.CAD solid model - 3D CAD data - RP prototype - STL file c.STL file - 3D CAD data - CAD solid model - RP prototype d.3D CAD data - STL file - CAD solid model - RP prototype

Last Answer : a.3D CAD data - CAD solid model - STL file - RP prototype

Description : What is the advantage of using prototype software development model instead of waterfall model? Also explain the effect of defining a prototype on the overall cost of the software project?

Last Answer : Ans:The waterfall model: This is the classic SDLC model, with a linear and sequential method that has goals for each development phase. The waterfall model simplifies task scheduling, because ... acceptable prototype is finally achieved from which the complete system or product can now be developed.

Description : Dynamic similarity between the model and prototype signifies similarities of a) Motion b) Force c) Length d) None of the above

Last Answer : b) Force

Description : Kinematic similarity between the model and prototype signifies similarities of a) Motion b) Force c) Length d) None of the above

Last Answer : a) Motion

Description : Geometric similarity between the model and prototype signifies similarities of a) Motion b) Force c) Length d) None of the above

Last Answer : c) Length

Description : The quick design of a software that is visible to end users leads to ............ (A) iterative model (B) prototype model (C) spiral model (D) waterfall model 

Last Answer : (B) prototype model

Description : What price should I charge someone to design an e-commerce website?

Last Answer : answer:Heh, If I was using Joomla I'd be charging a lot, since I don't like Joomla ;^P In seriousness, it's hard to know how much to charge. I have run into this problem ... charged is for that specific set of requirements and that any additions not covered by the requirements will cost extra.

Description : The viruses spreads through‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Mails b. Pen drives and cds c. Websites d. All the above

Last Answer : d. All the above

Description : The virus that are attached with vb and java files are called a. Macro b. Trojan horse c. Script virus d. None of the above

Last Answer : c. Script virus

Description : The virus that are commonly found in word documents are called‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Macro b. Trojan horse c. Script virus d. None of the above

Last Answer : a. Macro

Description : During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Integrity b. Security c. Confidentiality d. All the above

Last Answer : d. All the above

Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above

Last Answer : b. Cryptography

Description : Which will harm computer resources a. Worm b. Virus c. Trojan horse d. All the above

Last Answer : d. All the above

Description : Which type deals with auction? a. B2B b. B2C c. C2B d. C2C

Last Answer : d. C2C

Description : What is an arrangement made between e‐commerce sites that direct users from one site to the other? a. Spam b. Viral marketing c. Affiliate programs d. None of the above

Last Answer : c. Affiliate programs

Description : Cyber slacking consists of what activities? a. Visiting “inappropriate” web sites b. Visiting news sites c. Chatting online with others about non‐work topics d. All of the above

Last Answer : d. All of the above

Description : What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents? a. Ethics b. Intellectual property c. Copyright d. Fair Use Doctrine

Last Answer : c. Copyright

Description : Public key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Private key b. Symmetric c. Asymmetric d. None

Last Answer : c. Asymmetric

Description : Private Key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Public key b. Symmetric c. Asymmetric d. None

Last Answer : b. Symmetric

Description : Which one is not a threat for E‐commerce a. Trojan horse b. Viruses c. Worm d. None

Last Answer : d. None

Description : OTP stands for a. On Time Password b. On Time processing c. One time processor d. None

Last Answer : a. On Time Password

Description : which one is not an E‐payment method used in India a. Debit card b. Credit card c. e‐cheque d. none

Last Answer : d. none

Description : Which one is an online payment mode? a. Cash on delivery b. Cash before delivery c. Demand drafts d. e‐cheque

Last Answer : d. e‐cheque

Description : Which one is not an online payment mode? a. Cash on delivery b. Debit card c. Credit card d. e‐cheque

Last Answer : a. Cash on delivery

Description : Which one is an offline payment mode? a. Cash on delivery b. Cash before delivery c. Credit card d. Both a and b

Last Answer : d. Both a and b

Description : Which one is not an offline payment mode? a. Cash on delivery b. Cash before delivery c. Demand drafts d. e‐cheque

Last Answer : d. e‐cheque

Description : Secure communication means a. Protect transmission of credit card number b. Guarantee privacy of customer c. Unauthorized access of payment details d. All the above

Last Answer : d. All the above