What describes a process of continuously measuring results and comparing those results to
optimal performance so that actual performance may be improved?
a. Performance
b. Capacity planning
c. Benchmarking
d. Data cleansing

1 Answer

Answer :

c. Benchmarking

Related questions

Description : Which process is used to reinstall data from a copy when the original data has been lost? a. backup b. recovery c. benchmarking d. data cleansing

Last Answer : b. recovery

Description : Which process can prevent data from lose due to computer problems or human errors? a. backup b. recovery c. benchmarking d. data cleansing

Last Answer : a. backup

Description : What determines the future IT infrastructure requirements for new equipment and additional network capacity? a. Flexibility b. Performance c. Capacity planning d. Benchmark

Last Answer : c. Capacity planning

Description : What is a set of conditions used to measure how well a product or system functions? a. Flexibility b. Performance c. Capacity planning d. Benchmark

Last Answer : d. Benchmark

Description : Which factor represents a system's ability to change quickly? a. Flexibility b. Performance c. Capacity planning d. Benchmark

Last Answer : a. Flexibility

Description : Which service encompasses all technologies used to transmit and process information on an across a network? a. Interoperability b. Scalability c. Benchmarking d. Web services

Last Answer : d. Web services

Description : Which process is used to reinstall data from a copy when the original data has been lost? a) Backup b) Recovery c) Benchmarking d) Data cleansing

Last Answer : b) Recovery

Description : Skimming tanks are A. Used to remove the grease and oil B. Those from which sludge is skimmed out C. Tanks provided with self- cleansing screens D. Improved version of grit chambers

Last Answer : ANS: A

Description : ERP stands for a. Enterprise resolution planning b. Enterprise reverse planning c. Enterprise resource planning d. None of the above

Last Answer : c. Enterprise resource planning

Description : Which of the following describes e‐commerce? a. Doing business electronically b. Doing business c. Sale of goods d. All of the above

Last Answer : a. Doing business electronically

Description : The marketing control process consists of A)establishing goals, market scanning, and market share analysis. B)establishing standards, evaluating performance, and reducing the differences ... objectives, implementing strategies, and reducing the differences between desired and actual performance.

Last Answer : B)establishing standards, evaluating performance, and reducing the differences between desired and actual performance.

Description : What consists of the identification of risks or threats, the implementation of security measures, and the monitoring of those measures for effectiveness? a. Risk management b. Risk assessment c. Security d. None of the above

Last Answer : a. Risk management

Description : Evaluating marketing performance by comparing it to established standards is part of : 1. Marketing planning 2. Organizing marketing activities 3. Coordinating marketing activities 4. Marketing Control 5. None of these

Last Answer : Marketing Control

Description : Evaluating marketing performance by comparing it to established standards is part of: A)marketing planning B)organising marketing activities C)coordinating marketing activities D)marketing control

Last Answer : D)marketing control

Description : _________________________ looks at financial and non-financial factors to evaluate strrategic performance? A. Business Process Re-engineering B. Balanced Scorecard C. Benchmarking D. Blue Ocean Thinking

Last Answer : Balanced Scorecard

Description : Strategic management can be defined as: a) a process of setting written long-term profit plans for the organization. b) a process of measuring performance of the organization. c) a process of operational planning. d) a process of setting long-term direction for the organization

Last Answer : a process of setting long-term direction for the organization

Description : E‐mail messages may be stored on which of the following computers? a. Sender's computer b. Sender's server c. Recipient's server d. All of the above

Last Answer : d. All of the above

Description : Which of the smart card uses a sim like structure for reading and writing data a) Contact smart card b) Contactless smart card c) Proximity smart card d) Both B and C

Last Answer : a) Contact smart card

Description : The smart card which use antenna for reading and writing data a) Contact smart card b) Contactless smart card c) Proximity smart card d) Both B and C

Last Answer : d) Both B and C

Description : When a transaction is processed online, how can the merchant verify the customer's identity? a. use secure sockets layers b. use secure electronic transactions c. use electronic data interchange d. use financial electronic data interchange

Last Answer : b. use secure electronic transactions

Description : Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to ... the _____ key. a. encryption, decryption b. private, public c. encryption, public d. public, private

Last Answer : d. public, private

Description : Which of the following is used in B2B to pay for purchases? a. e‐commerce b. financial electronic data interchange c. electronic data exchange d. electronic checks

Last Answer : b. financial electronic data interchange

Description : What is the name for direct computer‐to‐computer transfer of transaction information contained in standard business documents? a. internet commerce b. e‐commerce c. transaction information transfer d. electronic data interchange

Last Answer : d. electronic data interchange

Description : What is the process of making a copy of the information stored on a computer? a. Backup b. Anti‐virus c. Firewall d. Biometrics

Last Answer : a. Backup

Description : What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets? a. Risk management b. Risk assessment c. Security d. None of the above

Last Answer : b. Risk assessment

Description : What defines all of the steps or business rules, from beginning to end, required for a process to run correctly? a. Workflow b. EIP c. Workflow system d. SLA

Last Answer : a. Workflow

Description : What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood? a. Disaster recovery plan b. Hot site c. Cold site d. Disaster recovery cost curve

Last Answer : a. Disaster recovery plan

Description : What is the process in which a buyer posts its interest in buying a certain quantity of items, and sellers compete for the business by submitting successively lower bids until there is only one seller left? a. B2B marketplace b. Intranet c. Reverse auction d. Internet

Last Answer : c. Reverse auction

Description : Which of the following IS NOT one of the advantages associated with a robotics implementation program? a) Low costs for hardware and software b) Robots work continuously around the clock c) Quality of manufactured goods can be improved d) Reduced company cost for worker fringe benefits

Last Answer : a) Low costs for hardware and software

Description : Which of the following is NOT one of the advantages associated with a robotics implementation program? A : Low costs for hardware and software B : Robots work continuously around the clock C : Quality of manufactured goods can be improved D : Reduced company cost for worker fringe benefits

Last Answer : A : Low costs for hardware and software

Description : Which of the following is NOT one of the advantages associated with a robotics implementation program? A : Low costs for hardware and software B : Robots work continuously around the clock C : Quality of manufactured goods can be improved D : Reduced company cost for worker fringe benefits

Last Answer : A : Low costs for hardware and software

Description : Which of the following is NOT one of the advantages associated with a robotics implementation program? A : Low costs for hardware and software B : Robots work continuously around the clock C : Quality of manufactured goods can be improved D : Reduced company cost for worker fringe benefits

Last Answer : A : Low costs for hardware and software

Description : Which of the following is NOT one of the advantages associated with a robotics implementation program? A : Low costs for hardware and software B : Robots work continuously around the clock C : Quality of manufactured goods can be improved D : Reduced company cost for worker fringe benefits

Last Answer : A : Low costs for hardware and software

Description : Which of the following is NOT one of the advantages associated with a robotics implementation program? A : Low costs for hardware and softwareB : Robots work continuously around the clock C : Quality of manufactured goods can be improved D : Reduced company cost for worker fringe benefits

Last Answer : A : Low costs for hardware and software

Description : What scrambles the contents of a file so you can't read it without having the right decryption key? a. Encryption b. Intrusion‐detection software c. Security‐auditing software d. All of the above

Last Answer : a. Encryption

Description : What floods a Web site with so many requests for service that it slows down or crashes? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : c. Denial‐of‐service attack

Description : The practice of forging a return address on an e‐mail so that the recipient is fooled into revealing private information is termed? a. hacking b. cracking c. dumpster diving d. spoofing

Last Answer : d. spoofing

Description :  A project with total budget cost of 30 crores is scheduled to be completed in 80 weeks. A periodic review was carried out at end of 60 weeks and results are as given:  Budgeted cost of work performed (EV) = 17 ... crores What is the cost performance index?  A.0.895  B.0.81  C.0.90  D.1.12

Last Answer : A.0.895

Description : Principle of similitude forms the basis of (A) Comparing two identical equipments (B) Designing models so that the result can be converted to prototypes (C) Comparing similarity between design and actual equipment (D) Hydraulic designs

Last Answer : Answer: Option B

Description : Asking the patient questions to determine if the person understands the health teaching provided would be included during which step of the nursing process? a) Evaluation Evaluation includes observing ... ) Implementation Implementation is the step during which the teaching plan is put into action.

Last Answer : a) Evaluation Evaluation includes observing the person, asking questions, and comparing the patient’s behavioral responses with the expected outcomes.

Description : What price should I charge someone to design an e-commerce website?

Last Answer : answer:Heh, If I was using Joomla I'd be charging a lot, since I don't like Joomla ;^P In seriousness, it's hard to know how much to charge. I have run into this problem ... charged is for that specific set of requirements and that any additions not covered by the requirements will cost extra.

Description : The viruses spreads through‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Mails b. Pen drives and cds c. Websites d. All the above

Last Answer : d. All the above

Description : The virus that are attached with vb and java files are called a. Macro b. Trojan horse c. Script virus d. None of the above

Last Answer : c. Script virus

Description : The virus that are commonly found in word documents are called‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Macro b. Trojan horse c. Script virus d. None of the above

Last Answer : a. Macro

Description : During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Integrity b. Security c. Confidentiality d. All the above

Last Answer : d. All the above

Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above

Last Answer : b. Cryptography

Description : Which will harm computer resources a. Worm b. Virus c. Trojan horse d. All the above

Last Answer : d. All the above

Description : Which one is not a layer of E‐commerce infrastructure a. Physical layer b. Product layer c. Service layer d. None

Last Answer : d. None

Description : Which type deals with auction? a. B2B b. B2C c. C2B d. C2C

Last Answer : d. C2C