For an online transaction processing system, transactions
per second is a measure of:
A. throughput.
B. response time.
C. turnaround time.
D. uptime.
Answer / guest
Answer: A
"Throughput measures how much work is done by a system over
a period of time
it measures productivity of the system. In an online
transaction processing system, transactions per second is a
throughput index. Response time is defined as the length of
time that elapsed between submission of an input and receipt
of the first character of output in an online system.
Turnaround time is the length of time that elapsed between
submission of a job and receipt of a completed output. It is
a measure of timeliness in a batch system. The percentage of
time that the system is available for processing is called
uptime or a reliability index
thus, this is not the correct answer."
Is This Answer Correct ? | 6 Yes | 0 No |
An offsite information processing facility having electrical wiring, air conditioning and flooring, but no computer or communications equipment is a: A. cold site. B. warm site. C. dial-up site. D. duplicate processing facility.
Electronic signatures can prevent messages from being: A. suppressed. B. repudiated. C. disclosed. D. copied.
Which of the following is a strength of the program evaluation review technique (PERT) over other techniques? PERT: A. considers different scenarios for planning and control projects. B. allows the user to input program and system parameters. C. tests system maintenance processes accurately. D. estimates costs of system projects.
52. Which of the following tests confirm that the new system can operate in its target environment?
Which of the following is the MOST effective technique for providing security during data transmission? A. Communication log B. Systems software log C. Encryption D. Standard protocol
Which of the following would contribute MOST to an effective business continuity plan (BCP)? The BCP: A. document was circulated to all interested parties. B. planning involved all user departments. C. was approved by senior management. D. was audited by an external IS auditor.
The impact of EDI on internal controls will be: A. that fewer opportunities for review and authorization will exist. B. an inherent authentication. C. a proper distribution of EDI transactions while in the possession of third parties. D. that IPF management will have increased responsibilities over data center controls.
Which of the following controls will detect MOST effectively the presence of bursts of errors in network transmissions? A. Parity check B. Echo check C. Block sum check D. Cyclic redundancy check
An organization's disaster recovery plan should address early recovery of: A. all information systems processes. B. all financial processing applications. C. only those applications designated by the IS manager. D. processing in priority order, as defined by business management.
The use of residual biometric information to gain unauthorized access is an example of which of the following attacks? A. Replay B. Brute force C. Cryptographic D. Mimic
An IS auditor reviews an organization chart PRIMARILY for: A. an understanding of workflows. B. investigating various communication channels. C. understanding the responsibilities and authority of individuals. D. investigating the network connected to different employees.
What type of transmission requires modems? A. Encrypted B. Digital C. Analog D. Modulated