What is a separate facility that does not have any computer equipment but is a place where the
knowledge workers can move after the disaster?
a. Disaster recovery plan
b. Hot site
c. Cold site
d. Disaster recovery cost curve

1 Answer

Answer :

c. Cold site

Related questions

Description : What is a separate and fully equipped facility where the company can move immediately after the disaster and resume business? a. Disaster recovery plan b. Hot site c. Cold site d. Disaster recovery cost curve

Last Answer : b. Hot site

Description : What charts (1) the cost to your organization of the unavailability of information and technology and (2) the cost to your organization of recovering from a disaster over time? a. Disaster recovery plan b. Hot site c. Cold site d. Disaster recovery cost curve

Last Answer : d. Disaster recovery cost curve

Description : What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood? a. Disaster recovery plan b. Hot site c. Cold site d. Disaster recovery cost curve

Last Answer : a. Disaster recovery plan

Description : Which process can prevent data from lose due to computer problems or human errors? a. backup b. recovery c. benchmarking d. data cleansing

Last Answer : a. backup

Description : Which factor determines when your IT system will be available for knowledge workers to access? a. Availability b. Accessibility c. Reliability d. None of the above

Last Answer : a. Availability

Description : Which process is used to reinstall data from a copy when the original data has been lost? a. backup b. recovery c. benchmarking d. data cleansing

Last Answer : b. recovery

Description : What determines the future IT infrastructure requirements for new equipment and additional network capacity? a. Flexibility b. Performance c. Capacity planning d. Benchmark

Last Answer : c. Capacity planning

Description : What floods a Web site with so many requests for service that it slows down or crashes? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : c. Denial‐of‐service attack

Description : What is an arrangement made between e‐commerce sites that direct users from one site to the other? a. Spam b. Viral marketing c. Affiliate programs d. None of the above

Last Answer : c. Affiliate programs

Description : Cookies are used to do which of the following? a. Store your ID and password for subsequent logons to the site b. Store contents of electronic shopping carts c. To track web activity d. All of the above and more

Last Answer : d. All of the above and more

Description : What is the percentage of customers who visit a Web site and actually buy something called? a. Affiliate programs b. Click‐through c. Spam d. Conversion rate

Last Answer : d. Conversion rate

Description : Which term represents a count of the number of people who visit one site, click on an ad, and are taken to the site of the advertiser? a. Affiliate programs b. Click‐through c. Spam d. All of the above

Last Answer : b. Click‐through

Description : . ___________refers to the non-functional requirements such as reliability, security, disaster recovery, etc. A. Service Development B. Plan Development C. Quality of service D. Technical Service

Last Answer : . Quality of service

Description : What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : b. Worm

Description : Which of the following qualifies as best DR (Disaster Recovery) site? a) DR site in the same campus b) DR site in the same city c) DR site in the same country d) DR site in a different country

Last Answer : DR site in a different country

Description : . Which of the following qualifies as best DR (Disaster Recovery) site? a) DR site in the same campus b) DR site in the same city c) DR site in the same countryd) DR site in a different country

Last Answer : DR site in a different country

Description : When you purchase copyrighted software, what actually are you paying for? a. The cost of the CDs, manuals, and development of the software b. The cost of the CDs, manuals, and a share of the cost of the software development c. A share of the cost of software development d. All of the above

Last Answer : d. All of the above

Description : Which will harm computer resources a. Worm b. Virus c. Trojan horse d. All the above

Last Answer : d. All the above

Description : ‐‐‐‐‐‐‐‐‐‐‐‐‐‐ is an act that poses danger to computer assets. a. Threat b. Danger c. Error d. None of the above

Last Answer : a. Threat

Description : What is a technology‐enabled microchip implanted into the human body? a. Wearable computer b. GPS c. Implant chip d. None of the above

Last Answer : c. Implant chip

Description : What is a fully‐equipped computer that you wear as a piece of clothing or attached to a piece of clothing similar to the way you would carry your cell phone on your belt? a. Wearable computer b. GPS c. Implant chip d. None of the above

Last Answer : a. Wearable computer

Description : What is a program, when installed on a computer, records every keystroke and mouse click? a. Key logger software b. Hardware key logger c. Cookie d. Adware

Last Answer : a. Key logger software

Description : E‐mail messages may be stored on which of the following computers? a. Sender's computer b. Sender's server c. Recipient's server d. All of the above

Last Answer : d. All of the above

Description : What checks out your computer or network for potential weaknesses? a. Encryption b. Public key encryption c. Security‐auditing software d. None of the above

Last Answer : c. Security‐auditing software

Description : What software detects and removes or quarantines computer viruses? a. Backup b. Anti‐virus c. Firewall d. Biometrics

Last Answer : b. Anti‐virus

Description : What is the process of making a copy of the information stored on a computer? a. Backup b. Anti‐virus c. Firewall d. Biometrics

Last Answer : a. Backup

Description : What harnesses far‐flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : d. None of the above

Description : What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer's CPU and storage for some task you know ... about? a. Web log b. Clickstream c. Anonymous Web browsing service d. None of the above

Last Answer : d. None of the above

Description : Who breaks into other people's computer systems and steals and destroys information? a. Hackers b. softwares c. Hacktivists d. Script kiddies

Last Answer : a. Hackers

Description : Which concept suggests that different applications and computer systems should be able to communicate with one another? a. Integration b. Web services c. Scalability d. Interoperability

Last Answer : d. Interoperability

Description : Which will not harm computer resources a. firewall b. Virus c. Trojan horse d. None of the above

Last Answer : a. firewall

Description : What is the name for direct computer‐to‐computer transfer of transaction information contained in standard business documents? a. internet commerce b. e‐commerce c. transaction information transfer d. electronic data interchange

Last Answer : d. electronic data interchange

Description : Which of the following an accurate statement about internet phone calls? a. They are possible but not yet free b. They are not possible c. They are currently standard practice d. None of the above is an accurate statement about internet phone calls

Last Answer : a. They are possible but not yet free

Description : Materials used in the normal operation of a business but not related to primary business operations are called what? a. Supplies b. Direct materials c. Indirect materials d. Daily stuff

Last Answer : c. Indirect materials

Description : What are materials that are necessary for running a modern corporation, but do not relate to the company's primary business activities? a. Direct materials b. Indirect materials c. EDI d. None of the above

Last Answer : b. Indirect materials

Description : What price should I charge someone to design an e-commerce website?

Last Answer : answer:Heh, If I was using Joomla I'd be charging a lot, since I don't like Joomla ;^P In seriousness, it's hard to know how much to charge. I have run into this problem ... charged is for that specific set of requirements and that any additions not covered by the requirements will cost extra.

Description : The viruses spreads through‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Mails b. Pen drives and cds c. Websites d. All the above

Last Answer : d. All the above

Description : The virus that are attached with vb and java files are called a. Macro b. Trojan horse c. Script virus d. None of the above

Last Answer : c. Script virus

Description : The virus that are commonly found in word documents are called‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Macro b. Trojan horse c. Script virus d. None of the above

Last Answer : a. Macro

Description : During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Integrity b. Security c. Confidentiality d. All the above

Last Answer : d. All the above

Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above

Last Answer : b. Cryptography

Description : Which one is not a layer of E‐commerce infrastructure a. Physical layer b. Product layer c. Service layer d. None

Last Answer : d. None

Description : Which type deals with auction? a. B2B b. B2C c. C2B d. C2C

Last Answer : d. C2C

Description : Cyber slacking consists of what activities? a. Visiting “inappropriate” web sites b. Visiting news sites c. Chatting online with others about non‐work topics d. All of the above

Last Answer : d. All of the above

Description : What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents? a. Ethics b. Intellectual property c. Copyright d. Fair Use Doctrine

Last Answer : c. Copyright

Description : Public key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Private key b. Symmetric c. Asymmetric d. None

Last Answer : c. Asymmetric

Description : Private Key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Public key b. Symmetric c. Asymmetric d. None

Last Answer : b. Symmetric

Description : Which one is not a threat for E‐commerce a. Trojan horse b. Viruses c. Worm d. None

Last Answer : d. None

Description : OTP stands for a. On Time Password b. On Time processing c. One time processor d. None

Last Answer : a. On Time Password

Description : which one is not an E‐payment method used in India a. Debit card b. Credit card c. e‐cheque d. none

Last Answer : d. none