QUESTION 6 What technology are many organizations implementing to streamline sup
ID: 3841589 • Letter: Q
Question
QUESTION 6
What technology are many organizations implementing to streamline supply chain management?
RFPC
Biometrics
RFID
Haptic interface
QUESTION 7
The systems development life cycle is an unstructured approach for developing information systems.
True
False
QUESTION 8
Intrusion-detection software looks for people on the network who should not be there or who are acting suspiciously.
True
False
QUESTION 9
The primary goal of the design phase is to?
build a technical blueprint of how the system should work
convince users to utilize an existing system
build a logical blueprint of how the system works
create a logical user interface
QUESTION 10
Biometrics is the use of your physiological characteristics such as your fingerprint, the blood vessels in the iris of your eye, the sound of your voice, or perhaps even your breath to provide identification.
True
False
RFPC
Biometrics
RFID
Haptic interface
Explanation / Answer
ques:6 What technology are many organizations implementing to streamline supply chain management?
ANS- RFID----- RFID means Radio Frequency Idenification. It is a very popular and efficient technoogies used by many popular organisatons for better supply chain manangement. Every organisaton faces the issues of Inventory or goods tracking and live monitoring. By using RFID we can easily monitor our orders and product. RFID is a kind of chip which is placed on every product so that their live monitoring can be made easier. In addition, it allows for more consistent tracking, have maximum control and visibility over their products at all times. Since RFID chips provide computerized product management, they can eliminate the potential for errors, simplify the supply chain, and reduce operating costs.
ques:7 The systems development life cycle is an unstructured approach for developing information
ANS: FALSE: Systems Develpment Life Cycle (SDLC) is an organised and structured way of developing information systems. It consists of a number of phases. During SDLC we go phase by phase and build our system and we also remove the flaws in thw go. SDLC begins with Planning phase, then we go for Feasilbility Analysis, then designing, then develpment then testing. If testing gives clearance then we deploy the system.
Ques8: Intrusion-detection software looks for people on the network who should not be there or who are acting suspiciously.
ANS: TRUE Intrusion Detections systems or IDS are software or devices we used to secure our network or computers safe from malicious activities. IDS collect information about all unwanted traffic using SIEM(security information and event management) . IDS are avalable in many form in the market. To protect our network we can use NIDS i.e Nework Intrusion Detection systems. Firewalls are like NIDS. second type of IDS we used are HIDS. host based IDS. the antivirus sofwares we useed are come in this category.
ques:9 The primary goal of the design phase is to?
ANS build a logical blueprint of how the system works ------ In design phase we create a blueprint of working and functioning of system. here we define the relation between different parts of the system.
Ques:10:Biometrics is the use of your physiological characteristics such as your fingerprint, the blood vessels in the iris of your eye, the sound of your voice, or perhaps even your breath to provide identification.
ANS: TRUE yes because the fingerprint ,sound of owns voice, breathe thiese all are unique for everyone. Biometic uses this concept to uniquely identify any person.There are very less chance of bypassing the Bometric security systems. These are most secure form of Identification mechanisms.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.