Which factor represents how well your system can adapt to increased demands?
a. Availability
b. Accessibility
c. Reliability
d. Scalability

1 Answer

Answer :

d. Scalability

Related questions

Description : Which factor ensures your IT systems are functioning correctly and providing accurate information? a. Availability b. Accessibility c. Reliability d. Scalability

Last Answer : c. Reliability

Description : Which factor determines who has the right to access different types of IT systems and information? a. Availability b. Accessibility c. Reliability d. Scalability

Last Answer : b. Accessibility

Description : Which factor determines when your IT system will be available for knowledge workers to access? a. Availability b. Accessibility c. Reliability d. None of the above

Last Answer : a. Availability

Description : .You can’t count on a cloud provider maintaining your _____ in the face of government actions. a) Scalability b) Reliability c) Privacy d) Availability

Last Answer : Privacy

Description : Which service encompasses all technologies used to transmit and process information on an across a network? a. Interoperability b. Scalability c. Benchmarking d. Web services

Last Answer : d. Web services

Description : Which concept suggests that different applications and computer systems should be able to communicate with one another? a. Integration b. Web services c. Scalability d. Interoperability

Last Answer : d. Interoperability

Description : The capability of a system to adapt the increased service load is called ___________ a) scalability b) tolerance c) capacity d) none of the mentioned

Last Answer : scalability

Description : Which factor represents a system's ability to change quickly? a. Flexibility b. Performance c. Capacity planning d. Benchmark

Last Answer : a. Flexibility

Description : Which factor determines when your IT system will be available for knowledge worker to access? a) Availability b) Accessibility c) Reliabilityd) None of the above

Last Answer : a) Availability

Description : Which term represents a count of the number of people who visit one site, click on an ad, and are taken to the site of the advertiser? a. Affiliate programs b. Click‐through c. Spam d. All of the above

Last Answer : b. Click‐through

Description : _______ feature allows you to optimize your system and capture all possible transactions. a) scalability b) reliability c) elasticity d) none of the mentioned

Last Answer : elasticity

Description : _______ feature allows you to optimize your system and capture all possible transactions. a) scalability b) reliability c) elasticity d) none of the mentioned

Last Answer : elasticity

Description : Which of the following statements accurately reflect the impact of technology? a. Technology has caused buyer power to increase b. Technology has lessened the entry barriers for many industries c. Technology has increased the threat of substitute products and services d. all of the above

Last Answer : d. all of the above

Description : What is a set of conditions used to measure how well a product or system functions? a. Flexibility b. Performance c. Capacity planning d. Benchmark

Last Answer : d. Benchmark

Description : Choose an internal quality from given below: a) scalability b) usability c) reusability d) reliability

Last Answer : c) reusability

Description : Which of the following statements about Google App Engine (GAE) is INCORRECT. A. It's a Platform as a Service (PaaS) model. B. Automatic Scalability is built in with GAE. As ... s applications. So, applications can take advantage of reliability, performance and security of Google's infrastructure.

Last Answer : You can decide on how many physical servers required for hosting your application.

Description : _______ enables batch processing, which greatly speeds up high-processing applications. A. Scalability B. Reliability C. Elasticity D. Utility

Last Answer : Scalability

Description : . _______ enables batch processing, which greatly speeds up high-processing applications. a) Scalability b) Reliability c) Elasticity d) Utility

Last Answer : Scalability

Description : Which is not the advantages of Cloud Computing? a) Security b) Work Without Internet c) Scalability d) Reliability

Last Answer : Work Without Internet

Description : _______ enables batch processing, which greatly speeds up high-processing applications. a) Scalability b) Reliability c) Elasticity d) Utility

Last Answer : Scalability

Description : Which statement is true about NameNode High Availability a) Solve Single point of failure b) For high scalability c) Reduce storage overhead to 50% d) None of the above

Last Answer : Solve Single point of failure

Description : Amazon.com is well‐known for which e‐commerce marketing technique? a. Banner ads b. Pop‐up ads c. Affiliate programs d. Viral marketing

Last Answer : c. Affiliate programs

Description : The ability of a carrier to move goods over a specific route or network is the measure of its A)accessibility. B)dependability. C)reliability. D)capability. E)load flexibility.

Last Answer : A)accessibility.

Description : Marketers must be able to count on their carriers to deliver goods on time and in an acceptable condition. Another name for this consistency of service is A)accessibility. B)capability. C)adaptability. D)reliability.

Last Answer : D)reliability.

Description : Which of the following refers to the degree to which a transportation mode can provide equipment and conditions appropriate for moving specific kinds of goods? A)Reliability. B)Capability C)Capacity D)Accessibility E)Frequency

Last Answer : B)Capability

Description : a. Availability of food b. Accessibility of food c. Availability and accessibility of food to all at all times. d. Availability, accessibility and affordability of food to all at all the times.What does food security mean?

Last Answer : d. Availability, accessibility and affordability of food to all at all the times.

Description : What is Food security means: (a) availability of food (b) accessibility of food (c) affordability of food (d) all the above

Last Answer : (d) all the above

Description : A common test in research demands much priority on (A) Reliability (B) Useability (C) Objectivity (D) All of the above

Last Answer : (D) All of the above

Description : Which one is the component of cybercash payment system a. CC user software b. CC merachant software c. CC Server Software d. All of the above

Last Answer : d. All of the above

Description : Which of the following is not a reason why digital cash has turned out to be extremely difficult? a. If your system crashes you lose your money b. There is only one standard c. Digital ... makes money laundering easy d. Digital cash travels across the vast Internet and is susceptible to begin stolen

Last Answer : b. There is only one standard

Description : What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software

Last Answer : b. Public key encryption

Description : Who protects system from external threats? a. firewall b. EDI c. ERP d. Script kiddies

Last Answer : a. firewall

Description : What sends work assignments through an e‐mail system? a. Database‐based enterprise information portal b. Messaging‐based enterprise information portal c. Database‐based workflow system d. Messaging‐based workflow system

Last Answer : d. Messaging‐based workflow system

Description : What defines all of the steps or business rules, from beginning to end, required for a process to run correctly? a. Workflow b. EIP c. Workflow system d. SLA

Last Answer : a. Workflow

Description : What automates business processes? a. Workflow b. ASP c. Workflow system d. EIP

Last Answer : c. Workflow system

Description : What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood? a. Disaster recovery plan b. Hot site c. Cold site d. Disaster recovery cost curve

Last Answer : a. Disaster recovery plan

Description : What is a model of a proposed product, service, or system? a. Prototyping b. Prototype c. Proof‐of‐concept prototype d. Selling prototype

Last Answer : b. Prototype

Description : Which of the following is the demerit of a 'constant voltage transmission system' ? (a) Increase of short-circuit current of the system (b) Availability of steady voltage at all loads at ... of carrying increased power for a given conductor size in case of long-distance heavy power transmission

Last Answer : (a) Increase of short-circuit current of the system

Description : Which of the following is the demerit of a 'constant voltage transmission system' ? (a) Increase of short-circuit current of the system (b) Availability of steady voltage at all loads at ... of carrying increased power for a given conductor size in case of long-distance heavy power transmission

Last Answer : (a) Increase of short-circuit current of the system

Description : What is the need for load balancing in cloud computing? a) Increased scalability b) Ability to handle sudden traffic spikes c) A and B both d) None of these

Last Answer : A and B both

Description : Define the following terms:- Reliability, Maximum demand, Reserve-generating capacity, Availability (operational).

Last Answer : Reliability: It is the capacity of the power system to serve all power demands without failure over long periods. Maximum Demand: It is maximum load demand required in a power station during a given ... percentage of the time a unit is available to produce power whether needed by the system or not.

Description : Compare and contrast reliability and availability?

Last Answer : Ans. Reliability:The probability of failure-free system operation over a specified time in a given environment for a given purpose is called reliability Availability:The probability that a system, at ... damage data, low reliability may not be a problem. Availability takes repair time into account.

Description : Non-conformance to software requirements is known as a) Software availability b) Software reliability c) Software failure d) None of the mentioned

Last Answer :  Ans : c

Description : A server crashes on the average once in 30 days, that is, the Mean Time Between Failures (MTBF) is 30 days. When this happens, it takes 12 hours to reboot it, that is, the Mean Time to Repair (MTTR) is 12 ... these reliability data values is approximately: (A) 96.3% (B) 97.3% (C) 98.3% (D) 99.3%

Last Answer : (C) 98.3%

Description : What price should I charge someone to design an e-commerce website?

Last Answer : answer:Heh, If I was using Joomla I'd be charging a lot, since I don't like Joomla ;^P In seriousness, it's hard to know how much to charge. I have run into this problem ... charged is for that specific set of requirements and that any additions not covered by the requirements will cost extra.

Description : The viruses spreads through‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Mails b. Pen drives and cds c. Websites d. All the above

Last Answer : d. All the above

Description : The virus that are attached with vb and java files are called a. Macro b. Trojan horse c. Script virus d. None of the above

Last Answer : c. Script virus

Description : The virus that are commonly found in word documents are called‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Macro b. Trojan horse c. Script virus d. None of the above

Last Answer : a. Macro

Description : During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Integrity b. Security c. Confidentiality d. All the above

Last Answer : d. All the above

Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above

Last Answer : b. Cryptography