For any information system to serve its purpose, the information must be( )when it is needed.A.integralB.available C.irreplaceable D.confidential

For any information system to serve its purpose, the information must be( )when it is needed.

A.integral
B.available
C.irreplaceable
D.confidential

参考解析

解析:任何信息系统为了达到其目的,当需要时信息都必须具备可用性。A.完整的B.可用的C.不可替代的D.可信的

相关考题:

Most system development methodologies also provide (71), whose purpose is to contain the various pieces of relevant information-feasibility assessments, schedules, needs analysis, and so forth-in a single place so that they can be presented to project clients and other related parties.A.statement of workB.project planningC.baseline planD.information system planning

A(n) ______ is a destructive program that fills a computer system with self-replicating information,clogging the system so that its operations are slowed or stopped.A.wormB.macroC.CIHD.Trojan

During OSPF adjacency formation, in which state is a router when it is sending LSA header information to its neighbor?() A.AB.BC.CD.D

For any information system to serve its purpose,the information must be ( ) when it is needed.A.integralB.availableC.irreplaceableD.confidential

For anyinformation system to serve its purpose ,the ihformation must be( )when it s needed.A.integralB.availab1eC.irreplaceableD.confidential

CSFB(电路域回落)终端回落阶段必须读取的GSM系统广播消息包括哪些? A.System Information 1B.System Information 2C.System Information 3D.System Information 13

哪些系统消息具有bis和ter结构() A.System Information Type2B.System Information Type3C.System Information Type4D.System Information Type5

下面系统消息中,在通话状态发送的有()。 A.SYSTEM INFORMATION TYPE1B.SYSTEM INFORMATION TYPE2C.SYSTEM INFORMATION TYPE3D.SYSTEM INFORMATION TYPE4E.SYSTEM INFORMATION TYPE5F.SYSTEM INFORMATION TYPE6

For anyinformation system to serve its purpose ,the ihformation must be( )when it ìs needed.A.integralB.availab1eC.irreplaceable D.confidential

The term computer describes a device made up of a combination of electronic components.By itself, a computer has no ( ) and is referred to as hardware, which means simply the physical equipment. The hardware can't be used until it is connected to other elements, all of which constitute the six parts of a computer-based information system,hardware,software,data/information, people, procedures and communications. A system is defined as a collection of related components that ( ) to perform a task in order to accomplish a goal. Any organization that uses information technology will have a computer-based information system to provide managers (and various categories of employees with the appropriate kind of information to help them make decisions. Systems analysis and design is to ascertain how a system works and then take steps to make it ( ) Often, a system approach is used to define, describe, and solve a problem or to meet a(an)( ) From time to time, organizations need to (5 ) their information systems, in, response to new marketing' opportunities, modified government regulations, the introduction .of new technology, merger with another company, or other developments. When change is needed, the time is ripe for applying the principles of systems analysis and design.(5)应选( )。 A. modifyB. replaceC. ChangeD. transfer

The term computer describes a device made up of a combination of electronic components.By itself, a computer has no ( ) and is referred to as hardware, which means simply the physical equipment. The hardware can't be used until it is connected to other elements, all of which constitute the six parts of a computer-based information system,hardware,software,data/information, people, procedures and communications.A system is defined as a collection of related components that (请作答此空) to perform a task in order to accomplish a goal. Any organization that uses information technology will have a computer-based information system to provide managers (and various categories of employees with the appropriate kind of information to help them make decisions.Systems analysis and design is to ascertain how a system works and then take steps to make it ( ) Often, a system approach is used to define, describe, and solve a problem or to meet a(an)( )From time to time, organizations need to ( )their information systems, in, responseto new marketing' opportunities, modified government regulations, the introduction .of new technology, merger with another company, or other developments. When change is needed, the time is ripe for applying the principles of systems analysis and design.A.interactB.workC.connectD.change

A requirement is simply a statement of what the system must do or what characteristics it needs to have. Requirements written from the perspective of user and focus on user needs are called __(71)__. Requirements written from the developer's perspective and describe how the system will be implemented are called __(72)__. Requirements evolve from detailed statemens of business capabilities that a system should have to detailed statements of the technical way in whick the capabilities will be implemented in the new system. Requirements can be either functional or nofunctional in nature. For example, during the analysis phase of travel vehicles sales system, the system that must have the ability to search for available inventory is __(73)__. The requirement that the system should be able to work on any Web browser belongs to __(74)__. That customer personal information is protected in compliance with the Data Protection Act is a requirement of __(75)__.(75)应选?A..information requirementsB.system performanceC.secrity anD.controlD.cultural anD.political

A requirement is simply a statement of what the system must do or what characteristics it needs to have. Requirements written from the perspective of user and focus on user needs are called __(71)__. Requirements written from the developer's perspective and describe how the system will be implemented are called __(72)__. Requirements evolve from detailed statemens of business capabilities that a system should have to detailed statements of the technical way in whick the capabilities will be implemented in the new system. Requirements can be either functional or nofunctional in nature. For example, during the analysis phase of travel vehicles sales system, the system that must have the ability to search for available inventory is __(73)__. The requirement that the system should be able to work on any Web browser belongs to __(74)__. That customer personal information is protected in compliance with the Data Protection Act is a requirement of __(75)__.(74)应选?A.functional requirementsB.technical requirementsC.operational requirementsD.information requirements

下面系统消息中,在通话状态发送的有()。A、SYSTEM INFORMATION TYPE1B、SYSTEM INFORMATION TYPE2C、SYSTEM INFORMATION TYPE3D、SYSTEM INFORMATION TYPE4E、SYSTEM INFORMATION TYPE5F、SYSTEM INFORMATION TYPE6

下列哪个消息是在移动台空闲模式下收到()A、SYSTEM INFORMATION5B、SYSTEM INFORMATION5TERC、SYSTEM INFORMATION6D、SYSTEM INFORMATION2TER

CSFB(电路域回落)终端回落阶段必须读取的GSM系统广播消息包括哪些?A、System Information 1B、System Information 2C、System Information 3D、System Information 13

In terms of information literacy, an information literate student is able to()A、determine the nature and extent of the information needed and access needed information effectively and efficiently.B、evaluate information and its sources critically and incorporate selected information into his or her knowledge base and value system.C、use information effectively to accomplish a specific purpose individually or as a member of a group.D、understand many of the economic,legal,and social issues surrounding the use of information and access and use information ethically and legally.

Which install method should be used to recycle an LPAR without retaining any information from its original configuration?()  A、MigrationB、PreservationC、New and Complete OverwriteD、Alternate disk installation

A System p adminstrator must recover user information from a system that will not successfully boot. Which of the following install methods will accomplish this ()A、PreservationB、MigrationC、New and complete overwriteD、Repair

During OSPF adjacency formation, what state is a router in when it is sending LSA header information to its neighbor?  ()A、 InitB、 2WayC、 ExStartD、 Exchange

单选题The purpose of Google’s investments is to _____.Ahelp poor peopleBdevelop new technologyCexpand its own businessDincrease the power of information

单选题You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()AEncrypt customer information when it is stored and when it is being transmittedBRequire encrypted connections to the public Web site, which is hosted on the Web server on the perimeter networkCEncrypt all marketing information on file servers and client computersDRequire encrypted connections to all file servers

单选题What is the purpose of Mr. Patil’s email?ATo thank the newspaper for its coverageBTo request that information be correctedCTo introduce his company to the newspaperDTo question the safety of a construction project

多选题What are the two benefits of graceful restart?()AGraceful restart allows session information recovery without disruption to the network.BA node can perform a graceful restart to help a neighbor recover its state. The label bindings are kepton state information, which helps the failed node recover faster and does notaffect the current for wardtraffic.CGraceful restart allows a node to recover state from its neighbor when there is no RP or before thedevice undergoes SSO.DGraceful restart does not allow session information recovery.EDuring a graceful restart, the router removes any stale prefixes after a timer for stale entries expires

问答题Practice 8  The ABC Railway Company has greatly improved its public hotline service. Simply dial 3929-3499 to get information about all the services of the company. The telephone information system is working to serve you 24 hours all year round. The customer service staff(员工) are also ready to provide you with the information you need. Their service hours are from Monday to Sunday, 7:00 am to 9:00 pm.

问答题Practice 3  Information and communications are central to modern society and organizations. One approach to understand the working environment is to consider an organization as a communications system. An organization that has open lines of communication with valid, honest information going up, down, and throughout the organization will be much more effective and a much better place to work than the organization that attempts to restrict the flow of information or distort and deceive. When leadership attempts to keep workers in the dark, workers tend to become distrustful. This undermines their cooperation.  It is easy to understand the value and importance of open, honest communications and valid information. Yet, few organizations are able to function in this manner. In the long run, poor communication will undermine the entire organization. Restricting communication and distorting information are symptoms of short-range thinking. We must avoid these stupid, short-sighted traps and constantly strive for and open communications system with objective information.

单选题What does the DSC control unit do if the GMDSS radio operator fails to insert updated information when initiating a DSC distress alert?()AIt will abort the transmission and set off an audible alarm that must be manually resetBIt will initiate the DSC distress alert but,as no information will be transmitted,rescue personnel will not be able to identify the vessel,its position or its situationCIt will initiate the DSC distress alert and default information will automatically be transmittedDIt will initiate the DSC distress alert,but any station receiving it will have to establish contact with the distressed vessel to determine its identity,position and situation