Which factor ensures your IT systems are functioning correctly and providing accurate
information?
a. Availability
b. Accessibility
c. Reliability
d. Scalability

1 Answer

Answer :

c. Reliability

Related questions

Description : Which factor determines who has the right to access different types of IT systems and information? a. Availability b. Accessibility c. Reliability d. Scalability

Last Answer : b. Accessibility

Description : Which factor represents how well your system can adapt to increased demands? a. Availability b. Accessibility c. Reliability d. Scalability

Last Answer : d. Scalability

Description : Which factor determines when your IT system will be available for knowledge workers to access? a. Availability b. Accessibility c. Reliability d. None of the above

Last Answer : a. Availability

Description : Which concept suggests that different applications and computer systems should be able to communicate with one another? a. Integration b. Web services c. Scalability d. Interoperability

Last Answer : d. Interoperability

Description : Which service encompasses all technologies used to transmit and process information on an across a network? a. Interoperability b. Scalability c. Benchmarking d. Web services

Last Answer : d. Web services

Description : .You can’t count on a cloud provider maintaining your _____ in the face of government actions. a) Scalability b) Reliability c) Privacy d) Availability

Last Answer : Privacy

Description : Which factor represents a system's ability to change quickly? a. Flexibility b. Performance c. Capacity planning d. Benchmark

Last Answer : a. Flexibility

Description : What is the name given to an interactive business providing a centralized market where many buyers and suppliers can come together for e‐commerce or commerce‐related activities? a. Direct marketplace b. B2B c. B2C d. Electronic marketplace

Last Answer : d. Electronic marketplace

Description : Who breaks into other people's computer systems and steals and destroys information? a. Hackers b. softwares c. Hacktivists d. Script kiddies

Last Answer : a. Hackers

Description : What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? a. Customer relationship management systems cards b. E‐government identity cards c. FEDI cards d. Smart cards

Last Answer : d. Smart cards

Description : Which of the following an accurate statement about internet phone calls? a. They are possible but not yet free b. They are not possible c. They are currently standard practice d. None of the above is an accurate statement about internet phone calls

Last Answer : a. They are possible but not yet free

Description : Which factor determines when your IT system will be available for knowledge worker to access? a) Availability b) Accessibility c) Reliabilityd) None of the above

Last Answer : a) Availability

Description : What defines all of the steps or business rules, from beginning to end, required for a process to run correctly? a. Workflow b. EIP c. Workflow system d. SLA

Last Answer : a. Workflow

Description : Which is not a component of ERP? a. Legacy systems b. Bolt on applications c. Operational database d. Cybersoft

Last Answer : d. Cybersoft

Description : Choose an internal quality from given below: a) scalability b) usability c) reusability d) reliability

Last Answer : c) reusability

Description : _______ feature allows you to optimize your system and capture all possible transactions. a) scalability b) reliability c) elasticity d) none of the mentioned

Last Answer : elasticity

Description : Which of the following statements about Google App Engine (GAE) is INCORRECT. A. It's a Platform as a Service (PaaS) model. B. Automatic Scalability is built in with GAE. As ... s applications. So, applications can take advantage of reliability, performance and security of Google's infrastructure.

Last Answer : You can decide on how many physical servers required for hosting your application.

Description : _______ enables batch processing, which greatly speeds up high-processing applications. A. Scalability B. Reliability C. Elasticity D. Utility

Last Answer : Scalability

Description : . _______ enables batch processing, which greatly speeds up high-processing applications. a) Scalability b) Reliability c) Elasticity d) Utility

Last Answer : Scalability

Description : _______ feature allows you to optimize your system and capture all possible transactions. a) scalability b) reliability c) elasticity d) none of the mentioned

Last Answer : elasticity

Description : Which is not the advantages of Cloud Computing? a) Security b) Work Without Internet c) Scalability d) Reliability

Last Answer : Work Without Internet

Description : _______ enables batch processing, which greatly speeds up high-processing applications. a) Scalability b) Reliability c) Elasticity d) Utility

Last Answer : Scalability

Description : Which statement is true about NameNode High Availability a) Solve Single point of failure b) For high scalability c) Reduce storage overhead to 50% d) None of the above

Last Answer : Solve Single point of failure

Description : The ability of a carrier to move goods over a specific route or network is the measure of its A)accessibility. B)dependability. C)reliability. D)capability. E)load flexibility.

Last Answer : A)accessibility.

Description : Marketers must be able to count on their carriers to deliver goods on time and in an acceptable condition. Another name for this consistency of service is A)accessibility. B)capability. C)adaptability. D)reliability.

Last Answer : D)reliability.

Description : Which of the following refers to the degree to which a transportation mode can provide equipment and conditions appropriate for moving specific kinds of goods? A)Reliability. B)Capability C)Capacity D)Accessibility E)Frequency

Last Answer : B)Capability

Description : a. Availability of food b. Accessibility of food c. Availability and accessibility of food to all at all times. d. Availability, accessibility and affordability of food to all at all the times.What does food security mean?

Last Answer : d. Availability, accessibility and affordability of food to all at all the times.

Description : What is Food security means: (a) availability of food (b) accessibility of food (c) affordability of food (d) all the above

Last Answer : (d) all the above

Description : When a teacher ensures that students complete an exercise in mathematics and makes sure instructions are clear and specific. The teacher ensures the ........ aspect of assessment Options: A) A Validity B) Practicality C) Reliability D) Wash-back effect

Last Answer : A) A Validity 

Description : Which of the following statement is correct? Options: A) Reliability ensures validity B) Validity ensures reliability C) Reliability and validity are independent of each other D) Reliability does not depend on objectivity

Last Answer : C) Reliability and validity are independent of each other 

Description : Which of the following statement is correct ? (A) Reliability ensures validity (B) Validity ensures reliability (C) Reliability and validity are independent of each other (D) Reliability does not depend on objectivity

Last Answer : Answer: B  These two terms, reliability and validity, are often used interchangeably when they are not related to statistics. When critical readers of statistics use these terms, however, they refer to different ... step on it) but will not be valid, since it is not reading your actual weight. 

Description : Which of the following crop geometry ensures uniform solar radiation availability to crop?

Last Answer : Ans.Square

Description : f there are two identical products, one that has 100% accessibility and one that has 0% accessibility, a. the one with 0% accessibility will not sell at all because consumers can't find ... product with 100% accessibility will outsell the other 3 to 1 providing all other attributes are identical.

Last Answer : b. the product with 100% accessibility will outsell the other 2 to 1 providing all other attributes are identical.

Description : Companies can gather information about employees and potential employees from which of the following places? a. Job applications b. Credit reports c. Companies that track Web surfers d. All of the above

Last Answer : d. All of the above

Description : A technique used to gain personal information for the purpose of identity theft, often by e‐mail, is called? a. Phishing b. Carding c. Brand spoofing d. All of the above

Last Answer : d. All of the above

Description : Which of the following is not a common approach to phishing? a. Send an official-looking e-mail asking for confidential information b. Ask people to fill out and return a fake letter using postal mail ... open a submission form on a web page d. All of the above are uncommon approaches to phishing

Last Answer : b. Ask people to fill out and return a fake letter using postal mail

Description : Which of the following examines information passing through switches, hubs, or routers? a. Key logger b. Packet sniffer c. Log analysis tools d. Screen captures

Last Answer : b. Packet sniffer

Description : Which of the following is not a dimension of privacy? a. Need for personal space b. Need to feel in control of our possessions c. Need to feel in control of our personal information d. All of the above are dimensions of privacy

Last Answer : d. All of the above are dimensions of privacy

Description : Which is the most important component of IT? a. Information b. People c. Information technology d. Computers

Last Answer : b. People

Description : What is the process of making a copy of the information stored on a computer? a. Backup b. Anti‐virus c. Firewall d. Biometrics

Last Answer : a. Backup

Description : What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer's CPU and storage for some task you know ... about? a. Web log b. Clickstream c. Anonymous Web browsing service d. None of the above

Last Answer : d. None of the above

Description : What sends work assignments through an e‐mail system? a. Database‐based enterprise information portal b. Messaging‐based enterprise information portal c. Database‐based workflow system d. Messaging‐based workflow system

Last Answer : d. Messaging‐based workflow system

Description : What charts (1) the cost to your organization of the unavailability of information and technology and (2) the cost to your organization of recovering from a disaster over time? a. Disaster recovery plan b. Hot site c. Cold site d. Disaster recovery cost curve

Last Answer : d. Disaster recovery cost curve

Description : What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood? a. Disaster recovery plan b. Hot site c. Cold site d. Disaster recovery cost curve

Last Answer : a. Disaster recovery plan

Description : The practice of forging a return address on an e‐mail so that the recipient is fooled into revealing private information is termed? a. hacking b. cracking c. dumpster diving d. spoofing

Last Answer : d. spoofing

Description : Secure Sockets Layers does which of the following? a. creates a secure, private connection to a web server b. encrypts information c. sends information over the internet d. all of the above

Last Answer : d. all of the above

Description : What is the name for direct computer‐to‐computer transfer of transaction information contained in standard business documents? a. internet commerce b. e‐commerce c. transaction information transfer d. electronic data interchange

Last Answer : d. electronic data interchange

Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. pop up ad c. shopping cart d. encryption

Last Answer : a. digital wallet

Description : Which of the following statement(s) is/are TRUE with regard to software testing? I. Regression testing technique ensures that the software product runs correctly after the changes during maintenance. II. Equivalence partitioning is a ... (1) only I (2) only II (3) both I and II (4) neither I nor II

Last Answer : (1) only I 

Description : Define the following terms:- Reliability, Maximum demand, Reserve-generating capacity, Availability (operational).

Last Answer : Reliability: It is the capacity of the power system to serve all power demands without failure over long periods. Maximum Demand: It is maximum load demand required in a power station during a given ... percentage of the time a unit is available to produce power whether needed by the system or not.