Description : Which factor ensures your IT systems are functioning correctly and providing accurate information? a. Availability b. Accessibility c. Reliability d. Scalability
Last Answer : c. Reliability
Description : Which factor determines when your IT system will be available for knowledge workers to access? a. Availability b. Accessibility c. Reliability d. None of the above
Last Answer : a. Availability
Description : Which factor represents how well your system can adapt to increased demands? a. Availability b. Accessibility c. Reliability d. Scalability
Last Answer : d. Scalability
Description : Which factor determines when your IT system will be available for knowledge worker to access? a) Availability b) Accessibility c) Reliabilityd) None of the above
Last Answer : a) Availability
Description : Which concept suggests that different applications and computer systems should be able to communicate with one another? a. Integration b. Web services c. Scalability d. Interoperability
Last Answer : d. Interoperability
Description : Which service encompasses all technologies used to transmit and process information on an across a network? a. Interoperability b. Scalability c. Benchmarking d. Web services
Last Answer : d. Web services
Description : .You can’t count on a cloud provider maintaining your _____ in the face of government actions. a) Scalability b) Reliability c) Privacy d) Availability
Last Answer : Privacy
Description : Which factor represents a system's ability to change quickly? a. Flexibility b. Performance c. Capacity planning d. Benchmark
Last Answer : a. Flexibility
Description : What determines the future IT infrastructure requirements for new equipment and additional network capacity? a. Flexibility b. Performance c. Capacity planning d. Benchmark
Last Answer : c. Capacity planning
Description : Who breaks into other people's computer systems and steals and destroys information? a. Hackers b. softwares c. Hacktivists d. Script kiddies
Last Answer : a. Hackers
Description : What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? a. Customer relationship management systems cards b. E‐government identity cards c. FEDI cards d. Smart cards
Last Answer : d. Smart cards
Description : Secure communication means a. Protect transmission of credit card number b. Guarantee privacy of customer c. Unauthorized access of payment details d. All the above
Last Answer : d. All the above
Description : Which of the following are ways to prove access rights? a. What you know, like a password b. What you have, like an ATM card c. What you look like d. All of the above
Last Answer : d. All of the above
Description : Which of the following is the primary characteristic of an intranet? a. People outside the organization can access it b. People inside the organization can't access it c. People outside the organization can't access it d. None of the above
Last Answer : c. People outside the organization can't access it
Description : What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)? a. Client/server network b. Intranet c. Extranet d. Thin client
Last Answer : b. Intranet
Description : Which is not a component of ERP? a. Legacy systems b. Bolt on applications c. Operational database d. Cybersoft
Last Answer : d. Cybersoft
Description : Choose an internal quality from given below: a) scalability b) usability c) reusability d) reliability
Last Answer : c) reusability
Description : _______ feature allows you to optimize your system and capture all possible transactions. a) scalability b) reliability c) elasticity d) none of the mentioned
Last Answer : elasticity
Description : Which of the following statements about Google App Engine (GAE) is INCORRECT. A. It's a Platform as a Service (PaaS) model. B. Automatic Scalability is built in with GAE. As ... s applications. So, applications can take advantage of reliability, performance and security of Google's infrastructure.
Last Answer : You can decide on how many physical servers required for hosting your application.
Description : _______ enables batch processing, which greatly speeds up high-processing applications. A. Scalability B. Reliability C. Elasticity D. Utility
Last Answer : Scalability
Description : . _______ enables batch processing, which greatly speeds up high-processing applications. a) Scalability b) Reliability c) Elasticity d) Utility
Description : Which is not the advantages of Cloud Computing? a) Security b) Work Without Internet c) Scalability d) Reliability
Last Answer : Work Without Internet
Description : _______ enables batch processing, which greatly speeds up high-processing applications. a) Scalability b) Reliability c) Elasticity d) Utility
Description : Which statement is true about NameNode High Availability a) Solve Single point of failure b) For high scalability c) Reduce storage overhead to 50% d) None of the above
Last Answer : Solve Single point of failure
Description : The ability of a carrier to move goods over a specific route or network is the measure of its A)accessibility. B)dependability. C)reliability. D)capability. E)load flexibility.
Last Answer : A)accessibility.
Description : Marketers must be able to count on their carriers to deliver goods on time and in an acceptable condition. Another name for this consistency of service is A)accessibility. B)capability. C)adaptability. D)reliability.
Last Answer : D)reliability.
Description : Which of the following refers to the degree to which a transportation mode can provide equipment and conditions appropriate for moving specific kinds of goods? A)Reliability. B)Capability C)Capacity D)Accessibility E)Frequency
Last Answer : B)Capability
Description : a. Availability of food b. Accessibility of food c. Availability and accessibility of food to all at all times. d. Availability, accessibility and affordability of food to all at all the times.What does food security mean?
Last Answer : d. Availability, accessibility and affordability of food to all at all the times.
Description : What is Food security means: (a) availability of food (b) accessibility of food (c) affordability of food (d) all the above
Last Answer : (d) all the above
Description : Companies can gather information about employees and potential employees from which of the following places? a. Job applications b. Credit reports c. Companies that track Web surfers d. All of the above
Description : A technique used to gain personal information for the purpose of identity theft, often by e‐mail, is called? a. Phishing b. Carding c. Brand spoofing d. All of the above
Description : Which of the following is not a common approach to phishing? a. Send an official-looking e-mail asking for confidential information b. Ask people to fill out and return a fake letter using postal mail ... open a submission form on a web page d. All of the above are uncommon approaches to phishing
Last Answer : b. Ask people to fill out and return a fake letter using postal mail
Description : Which of the following examines information passing through switches, hubs, or routers? a. Key logger b. Packet sniffer c. Log analysis tools d. Screen captures
Last Answer : b. Packet sniffer
Description : Which of the following is not a dimension of privacy? a. Need for personal space b. Need to feel in control of our possessions c. Need to feel in control of our personal information d. All of the above are dimensions of privacy
Last Answer : d. All of the above are dimensions of privacy
Description : Which is the most important component of IT? a. Information b. People c. Information technology d. Computers
Last Answer : b. People
Description : What is the process of making a copy of the information stored on a computer? a. Backup b. Anti‐virus c. Firewall d. Biometrics
Last Answer : a. Backup
Description : What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer's CPU and storage for some task you know ... about? a. Web log b. Clickstream c. Anonymous Web browsing service d. None of the above
Last Answer : d. None of the above
Description : What sends work assignments through an e‐mail system? a. Database‐based enterprise information portal b. Messaging‐based enterprise information portal c. Database‐based workflow system d. Messaging‐based workflow system
Last Answer : d. Messaging‐based workflow system
Description : What charts (1) the cost to your organization of the unavailability of information and technology and (2) the cost to your organization of recovering from a disaster over time? a. Disaster recovery plan b. Hot site c. Cold site d. Disaster recovery cost curve
Last Answer : d. Disaster recovery cost curve
Description : What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood? a. Disaster recovery plan b. Hot site c. Cold site d. Disaster recovery cost curve
Last Answer : a. Disaster recovery plan
Description : The practice of forging a return address on an e‐mail so that the recipient is fooled into revealing private information is termed? a. hacking b. cracking c. dumpster diving d. spoofing
Last Answer : d. spoofing
Description : Secure Sockets Layers does which of the following? a. creates a secure, private connection to a web server b. encrypts information c. sends information over the internet d. all of the above
Last Answer : d. all of the above
Description : What is the name for direct computer‐to‐computer transfer of transaction information contained in standard business documents? a. internet commerce b. e‐commerce c. transaction information transfer d. electronic data interchange
Last Answer : d. electronic data interchange
Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. pop up ad c. shopping cart d. encryption
Last Answer : a. digital wallet
Description : What scrambles the contents of a file so you can't read it without having the right decryption key? a. Encryption b. Intrusion‐detection software c. Security‐auditing software d. All of the above
Last Answer : a. Encryption
Description : What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents? a. Ethics b. Intellectual property c. Copyright d. Fair Use Doctrine
Last Answer : c. Copyright
Description : Which, if any, of the following types of ads are people most willing to tolerate? a. pop‐under ad b. pop‐up ad c. banner ad d. none of the above
Last Answer : d. none of the above
Description : Which of the following is part of the four main types for e‐commerce? a. B2B b. B2C c. C2B d. All of the above