Which factor determines who has the right to access different types of IT systems and
information?
a. Availability
b. Accessibility
c. Reliability
d. Scalability

1 Answer

Answer :

b. Accessibility

Related questions

Description : Which factor ensures your IT systems are functioning correctly and providing accurate information? a. Availability b. Accessibility c. Reliability d. Scalability

Last Answer : c. Reliability

Description : Which factor determines when your IT system will be available for knowledge workers to access? a. Availability b. Accessibility c. Reliability d. None of the above

Last Answer : a. Availability

Description : Which factor represents how well your system can adapt to increased demands? a. Availability b. Accessibility c. Reliability d. Scalability

Last Answer : d. Scalability

Description : Which factor determines when your IT system will be available for knowledge worker to access? a) Availability b) Accessibility c) Reliabilityd) None of the above

Last Answer : a) Availability

Description : Which concept suggests that different applications and computer systems should be able to communicate with one another? a. Integration b. Web services c. Scalability d. Interoperability

Last Answer : d. Interoperability

Description : Which service encompasses all technologies used to transmit and process information on an across a network? a. Interoperability b. Scalability c. Benchmarking d. Web services

Last Answer : d. Web services

Description : .You can’t count on a cloud provider maintaining your _____ in the face of government actions. a) Scalability b) Reliability c) Privacy d) Availability

Last Answer : Privacy

Description : Which factor represents a system's ability to change quickly? a. Flexibility b. Performance c. Capacity planning d. Benchmark

Last Answer : a. Flexibility

Description : What determines the future IT infrastructure requirements for new equipment and additional network capacity? a. Flexibility b. Performance c. Capacity planning d. Benchmark

Last Answer : c. Capacity planning

Description : Who breaks into other people's computer systems and steals and destroys information? a. Hackers b. softwares c. Hacktivists d. Script kiddies

Last Answer : a. Hackers

Description : What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? a. Customer relationship management systems cards b. E‐government identity cards c. FEDI cards d. Smart cards

Last Answer : d. Smart cards

Description : Secure communication means a. Protect transmission of credit card number b. Guarantee privacy of customer c. Unauthorized access of payment details d. All the above

Last Answer : d. All the above

Description : Which of the following are ways to prove access rights? a. What you know, like a password b. What you have, like an ATM card c. What you look like d. All of the above

Last Answer : d. All of the above

Description : Which of the following is the primary characteristic of an intranet? a. People outside the organization can access it b. People inside the organization can't access it c. People outside the organization can't access it d. None of the above

Last Answer : c. People outside the organization can't access it

Description : What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)? a. Client/server network b. Intranet c. Extranet d. Thin client

Last Answer : b. Intranet

Description : Which is not a component of ERP? a. Legacy systems b. Bolt on applications c. Operational database d. Cybersoft

Last Answer : d. Cybersoft

Description : Choose an internal quality from given below: a) scalability b) usability c) reusability d) reliability

Last Answer : c) reusability

Description : _______ feature allows you to optimize your system and capture all possible transactions. a) scalability b) reliability c) elasticity d) none of the mentioned

Last Answer : elasticity

Description : Which of the following statements about Google App Engine (GAE) is INCORRECT. A. It's a Platform as a Service (PaaS) model. B. Automatic Scalability is built in with GAE. As ... s applications. So, applications can take advantage of reliability, performance and security of Google's infrastructure.

Last Answer : You can decide on how many physical servers required for hosting your application.

Description : _______ enables batch processing, which greatly speeds up high-processing applications. A. Scalability B. Reliability C. Elasticity D. Utility

Last Answer : Scalability

Description : . _______ enables batch processing, which greatly speeds up high-processing applications. a) Scalability b) Reliability c) Elasticity d) Utility

Last Answer : Scalability

Description : _______ feature allows you to optimize your system and capture all possible transactions. a) scalability b) reliability c) elasticity d) none of the mentioned

Last Answer : elasticity

Description : Which is not the advantages of Cloud Computing? a) Security b) Work Without Internet c) Scalability d) Reliability

Last Answer : Work Without Internet

Description : _______ enables batch processing, which greatly speeds up high-processing applications. a) Scalability b) Reliability c) Elasticity d) Utility

Last Answer : Scalability

Description : Which statement is true about NameNode High Availability a) Solve Single point of failure b) For high scalability c) Reduce storage overhead to 50% d) None of the above

Last Answer : Solve Single point of failure

Description : The ability of a carrier to move goods over a specific route or network is the measure of its A)accessibility. B)dependability. C)reliability. D)capability. E)load flexibility.

Last Answer : A)accessibility.

Description : Marketers must be able to count on their carriers to deliver goods on time and in an acceptable condition. Another name for this consistency of service is A)accessibility. B)capability. C)adaptability. D)reliability.

Last Answer : D)reliability.

Description : Which of the following refers to the degree to which a transportation mode can provide equipment and conditions appropriate for moving specific kinds of goods? A)Reliability. B)Capability C)Capacity D)Accessibility E)Frequency

Last Answer : B)Capability

Description : a. Availability of food b. Accessibility of food c. Availability and accessibility of food to all at all times. d. Availability, accessibility and affordability of food to all at all the times.What does food security mean?

Last Answer : d. Availability, accessibility and affordability of food to all at all the times.

Description : What is Food security means: (a) availability of food (b) accessibility of food (c) affordability of food (d) all the above

Last Answer : (d) all the above

Description : Companies can gather information about employees and potential employees from which of the following places? a. Job applications b. Credit reports c. Companies that track Web surfers d. All of the above

Last Answer : d. All of the above

Description : A technique used to gain personal information for the purpose of identity theft, often by e‐mail, is called? a. Phishing b. Carding c. Brand spoofing d. All of the above

Last Answer : d. All of the above

Description : Which of the following is not a common approach to phishing? a. Send an official-looking e-mail asking for confidential information b. Ask people to fill out and return a fake letter using postal mail ... open a submission form on a web page d. All of the above are uncommon approaches to phishing

Last Answer : b. Ask people to fill out and return a fake letter using postal mail

Description : Which of the following examines information passing through switches, hubs, or routers? a. Key logger b. Packet sniffer c. Log analysis tools d. Screen captures

Last Answer : b. Packet sniffer

Description : Which of the following is not a dimension of privacy? a. Need for personal space b. Need to feel in control of our possessions c. Need to feel in control of our personal information d. All of the above are dimensions of privacy

Last Answer : d. All of the above are dimensions of privacy

Description : Which is the most important component of IT? a. Information b. People c. Information technology d. Computers

Last Answer : b. People

Description : What is the process of making a copy of the information stored on a computer? a. Backup b. Anti‐virus c. Firewall d. Biometrics

Last Answer : a. Backup

Description : What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer's CPU and storage for some task you know ... about? a. Web log b. Clickstream c. Anonymous Web browsing service d. None of the above

Last Answer : d. None of the above

Description : What sends work assignments through an e‐mail system? a. Database‐based enterprise information portal b. Messaging‐based enterprise information portal c. Database‐based workflow system d. Messaging‐based workflow system

Last Answer : d. Messaging‐based workflow system

Description : What charts (1) the cost to your organization of the unavailability of information and technology and (2) the cost to your organization of recovering from a disaster over time? a. Disaster recovery plan b. Hot site c. Cold site d. Disaster recovery cost curve

Last Answer : d. Disaster recovery cost curve

Description : What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood? a. Disaster recovery plan b. Hot site c. Cold site d. Disaster recovery cost curve

Last Answer : a. Disaster recovery plan

Description : The practice of forging a return address on an e‐mail so that the recipient is fooled into revealing private information is termed? a. hacking b. cracking c. dumpster diving d. spoofing

Last Answer : d. spoofing

Description : Secure Sockets Layers does which of the following? a. creates a secure, private connection to a web server b. encrypts information c. sends information over the internet d. all of the above

Last Answer : d. all of the above

Description : What is the name for direct computer‐to‐computer transfer of transaction information contained in standard business documents? a. internet commerce b. e‐commerce c. transaction information transfer d. electronic data interchange

Last Answer : d. electronic data interchange

Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. pop up ad c. shopping cart d. encryption

Last Answer : a. digital wallet

Description : What scrambles the contents of a file so you can't read it without having the right decryption key? a. Encryption b. Intrusion‐detection software c. Security‐auditing software d. All of the above

Last Answer : a. Encryption

Description : What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents? a. Ethics b. Intellectual property c. Copyright d. Fair Use Doctrine

Last Answer : c. Copyright

Description : What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents? a. Ethics b. Intellectual property c. Copyright d. Fair Use Doctrine

Last Answer : c. Copyright

Description : Which, if any, of the following types of ads are people most willing to tolerate? a. pop‐under ad b. pop‐up ad c. banner ad d. none of the above

Last Answer : d. none of the above

Description : Which of the following is part of the four main types for e‐commerce? a. B2B b. B2C c. C2B d. All of the above

Last Answer : d. All of the above