× Didn't find what you were looking for? Ask a question
Top Posters
Since Sunday
o
6
5
G
3
c
3
q
3
m
3
j
3
s
2
b
2
j
2
u
2
j
2
New Topic  
lalalala1 lalalala1
wrote...
Posts: 460
Rep: 3 0
6 years ago
Which of the following is not an example of a next-generation enterprise application?
 
  A) Openbravo
  B) Social CRM
  C) SAP Business Suite
  D) Salesforce.com
  E) i2 Technologies

Q. 2

Specific security challenges that threaten clients in a client/server environment include:
 
  A) tapping, sniffing, message alteration, and radiation.
  B) hacking, vandalism, and denial of service attacks.
  C) theft, copying, alteration of data, and hardware or software failure.
  D) unauthorized access, errors, and spyware.
  E) vandalism, message alteration, and errors.

Q. 3

The representation of data in a graphical format is called data mining.
 
  Indicate whether the statement is true or false

Q. 4

Look and feel copyright infringement lawsuits are concerned with:
 
  A) the distinction between tangible and intangible ideas.
  B) the distinction between an idea and its expression.
  C) using the graphical elements of another product.
  D) using the creative elements of another product.
  E) violation of a monopoly on the ideas behind a product.

Q. 5

Genetic algorithms:
 
  A) represent knowledge as groups of characteristics.
  B) are software programs that work in the background to carry out specific, repetitive tasks.
  C) develop solutions to particular problems using techniques such as mutation, crossover, and selection.
  D) learn patterns from large quantities of data by sifting through data.
  E) have a large number of sensing and processing nodes that continuously interact with each other.

Q. 6

Specific security challenges that threaten the communications lines in a client/server environment include:
 
  A) tapping, sniffing, message alteration, and radiation.
  B) hacking, vandalism, and denial of service attacks.
  C) theft, copying, alteration of data, and hardware or software failure.
  D) unauthorized access, errors, and spyware.
  E) errors, vandalism, and malware.
Read 88 times
2 Replies

Related Topics

Replies
wrote...
6 years ago
Ans. to #1

E

Ans. to #2

D

Ans. to #3

FALSE

Ans. to #4

B

Ans. to #5

C

Ans. to #6

A
lalalala1 Author
wrote...
6 years ago
Great answers, all of them were right
New Topic      
Explore
Post your homework questions and get free online help from our incredible volunteers
  1026 People Browsing
Related Images
  
 357
  
 206
  
 62
Your Opinion