77
78.1k

280+ E-Business Solved MCQs

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Bachelor of Science in Information Technology TY (BSc IT) , Bachelor of Science in Information Technology (BSc IT) .

Chapters

More MCQs
251.

What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood?

A. disaster recovery plan
B. hot site
C. cold site
D. disaster recovery cost curve
Answer» A. disaster recovery plan
252.

What is a separate facility that does not have any computer equipment but is a place where the knowledge workers can move after the disaster?

A. disaster recovery plan
B. hot site
C. cold site
D. disaster recovery cost curve
Answer» C. cold site
253.

What is a separate and fully equipped facility where the company can move immediately after the disaster and resume business?

A. disaster recovery plan
B. hot site
C. cold site
D. disaster recovery cost curve
Answer» B. hot site
254.

What charts (1) the cost to your organization of the unavailability of information and technology and (2) the cost to your organization of recovering from a disaster over time?

A. disaster recovery plan
B. hot site
C. cold site
D. disaster recovery cost curve
Answer» D. disaster recovery cost curve
255.

Which factor determines when your IT system will be available for knowledge workers to access?

A. availability
B. accessibility
C. reliability
D. none of the above
Answer» A. availability
256.

Which factor determines who has the right to access different types of IT systems and information?

A. availability
B. accessibility
C. reliability
D. scalability
Answer» B. accessibility
257.

Which factor ensures your IT systems are functioning correctly and providing accurate information?

A. availability
B. accessibility
C. reliability
D. scalability
Answer» C. reliability
258.

Which factor represents how well your system can adapt to increased demands?

A. availability
B. accessibility
C. reliability
D. scalability
Answer» D. scalability
259.

Which factor represents a system's ability to change quickly?

A. flexibility
B. performance
C. capacity planning
D. benchmark
Answer» A. flexibility
260.

What is a set of conditions used to measure how well a product or system functions?

A. flexibility
B. performance
C. capacity planning
D. benchmark
Answer» D. benchmark
261.

What determines the future IT infrastructure requirements for new equipment and additional network capacity?

A. flexibility
B. performance
C. capacity planning
D. benchmark
Answer» C. capacity planning
262.

What automates business processes?

A. workflow
B. asp
C. workflow system
D. eip
Answer» C. workflow system
263.

What defines all of the steps or business rules, from beginning to end, required for a process to run correctly?

A. workflow
B. eip
C. workflow system
D. sla
Answer» A. workflow
264.

What sends work assignments through an e-mail system?

A. database-based enterprise information portal
B. messaging-based enterprise information portal
C. database-based workflow system
D. messaging-based workflow system
Answer» D. messaging-based workflow system
265.

Which will not harm computer resources

A. firewall
B. virus
C. trojan horse
D. none of the above
Answer» A. firewall
266.

Which is not a function of ERP?

A. warehousing
B. sales
C. scheduling
D. none of the above
Answer» D. none of the above
267.

Which is a function of ERP?

A. warehousing
B. sales
C. scheduling
D. all of the above
Answer» D. all of the above
268.

Which of the following is the primary characteristic of an intranet?

A. people outside the organization can access it
B. people inside the organization can\t access it
C. people outside the organization can\t access it
D. none of the above
Answer» C. people outside the organization can\t access it
269.

Which concept suggests that different applications and computer systems should be able to communicate with one another?

A. integration
B. web services
C. scalability
D. interoperability
Answer» D. interoperability
270.

Which service encompasses all technologies used to transmit and process information on an across a network?

A. interoperability
B. scalability
C. benchmarking
D. web services
Answer» D. web services
271.

Which process can prevent data from lose due to computer problems or human errors?

A. backup
B. recovery
C. benchmarking
D. data cleansing
Answer» A. backup
272.

Which process is used to reinstall data from a copy when the original data has been lost?

A. backup
B. recovery
C. benchmarking
D. data cleansing
Answer» B. recovery
273.

What describes a process of continuously measuring results and comparing those results to optimal performance so that actual performance may be improved?

A. performance
B. capacity planning
C. benchmarking
D. data cleansing
Answer» C. benchmarking
274.

Who protects system from external threats?

A. firewall
B. edi
C. erp
D. script kiddies
Answer» A. firewall
275.

Who breaks into other people's computer systems and steals and destroys information?

A. hackers
B. softwares
C. hacktivists
D. script kiddies
Answer» A. hackers
276.

What is software that comes hidden in free downloadable software and tracks your online
movements, mines the information stored on your computer, or uses your computer's CPU and
storage for some task you know nothing about?

A. web log
B. clickstream
C. anonymous web browsing service
D. none of the above
Answer» D. none of the above
277.

ERP stands for

A. enterprise resolution planning
B. enterprise reverse planning
C. enterprise resource planning
D. none of the above
Answer» C. enterprise resource planning
278.

Which is not a component of ERP?

A. legacy systems
B. bolt on applications
C. operational database
D. cybersoft
Answer» D. cybersoft
279.

Which is not a function of ERP?

A. human resource management
B. financial
C. warehousing
D. none of the above
Answer» D. none of the above
280.

What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e-mail and other Internet traffic?

A. computer virus
B. worm
C. denial-of-service attack
D. none of the above
Answer» B. worm
281.

What floods a Web site with so many requests for service that it slows down or crashes?

A. computer virus
B. worm
C. denial-of-service attack
D. none of the above
Answer» C. denial-of-service attack
282.

What harnesses far-flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage?

A. computer virus
B. worm
C. denial-of-service attack
D. none of the above
Answer» D. none of the above
283.

What consists of the identification of risks or threats, the implementation of security measures, and the monitoring of those measures for effectiveness?

A. risk management
B. risk assessment
C. security
D. none of the above
Answer» A. risk management
284.

What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets?

A. risk management
B. risk assessment
C. security
D. none of the above
Answer» B. risk assessment
285.

What is the process of making a copy of the information stored on a computer?

A. backup
B. anti-virus
C. firewall
D. biometrics
Answer» A. backup

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.