Match the following: point each) 1. Facebook entities with similar characteristi
ID: 3842562 • Letter: M
Question
Match the following: point each) 1. Facebook entities with similar characteristics 1. Server farm L5 2. HTTP meeting screens 3. view other's computer Virtual 3. Configuration control 4. mining technique to determine sales lt 4. Meta data 5. Collection of thousands of servers 9 5. Worm 6. Process of transforming clear for ible text secure communication text to 22 6. Data model 7. Microsoft SharePoint 47. Data Mart 8. Shutting of old system and bring up the new system L8. Phishing 9. virus that propagates using 209 Digital subscriber Line DsL) internet 10. India 3 10. Webinar 11.. User Generated Content (UGC) 11. Technique used for obtaining unauthorized data employing pretexting via email.Explanation / Answer
1 -- 5
Server Farm defines a large group of networked computer servers typically used by organizations for the remote storage, processing, or distribution of large amounts of data.
2-- 15
HTTP means HyperText Transfer Protocol. HTTP is the underlying protocol used by the World Wide Web and this protocol defines how messages are formatted and transmitted, and what actions Web servers and browsers(Mozilla fifefox) should take in response to various commands.
3-- 13
Configuration control is an important function of the configuration management discipline. Its purpose is to ensure that all changes to a complex system are performed with the knowledge and consent of management.
4-- 16
Meta Data means Data about Data..(a set of data that describes and gives information about other data.)
5-- 9
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.
6-- 22
Data models define how data is connected to each other and how they are processed and stored inside the system.The option is an example for Data model.
7-- 14
The data mart is a subset of the data warehouse and is usually oriented to a specific business line or team. Whereas data warehouses have an enterprise-wide depth, the information in data marts pertains to a single department. Here European region is data mart and Boeings company's aircraft sales is the ware house.
8-- 11
Phishing defines that the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
9-- 20
digital subscriber line which is defined as the way a computer connects to the Internet at high speeds using telephone lines.
10-- 3
webinar is a presentation, lecture, workshop or seminar that is transmitted over the Web using video conferencing software.
11-- 18
User-generated content (UGC), alternatively known as user-created content (UCC), is any form of content created by users of a system or service and made available publicly on that system.
12-- 25
The WBS may be displayed horizontally in outline form, or vertically as a tree structure (like an organization chart).
13-- 19
Source code is the fundamental component of a computer program that is created by a programmer. It can be read and easily understood by a human being.
14-- 7
15-- 1
Facebook is the prominent Social Media Application
16-- 21
Crowd sourcing is obtaining (information or input into a particular task or project) by enlisting the services of a large number of people, either paid or unpaid, typically via the Internet.
17--24
virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms, storage devices, and computer network resources. Example Apple Laptop hosting both Apple Os and Windows OS.
18-- 2
Cluster analysis or clustering is the task of grouping a set of objects in such a way that objects in the same group (called a cluster) are more similar (in some sense or another) to each other than to those in other groups (clusters).
19-- 6
Encryption is the process of converting information or data into a code, especially to prevent unauthorized access.
20-- 23
The database tier is the base of a web database application. It is the computer that run DBMS whic process the requests ro retrieve/ store data.
21-- 4
Market Basket Analysis is a modelling technique based upon the theory that if you buy a certain group of items, you are more (or less) likely to buy another group of items.
22-- 17
Sppofing is a fraudulent or malicious practice in which communication is sent from an unknown source disguised as a source known to the receiver.
23-- 8
Plunge Installation Refers to an installation process by which the old system is turned off and the new system is turn on.
24-- 12
A CTO(Chief Technology Officer) is the highest technology executive position within a company and leads the technology or engineering department.
25-- 10
According to Forbes report India is the one of Most Outsourcing countries
All your answers are correct.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.