_____ includes monitoring a system for signs of trouble, logging all system failures, diagnosing the problem, and applying corrective action.

A. Benchmark testing
B. Throughput management
C. Responsive testing
D. Fault management


Answer: D

Computer Science & Information Technology

You might also like to view...

Java uses the ____ for String escape sequences.

A. asterisk character (*) B. backslash character (\) C. ampersand character (&) D. forward slash character (/)

Computer Science & Information Technology

Which of the following is not one of the “Five A’s” of information security?

A) Availability B) Assurance C) Authorization D) Authentication

Computer Science & Information Technology

The code that is used to represent glyphs or syllables or whole words is:

A) block sequence. B) Unicode. C) mnemonic code. D) significant-digit.

Computer Science & Information Technology

The Screenshot button is located in the ________ group on the INSERT tab

A) Charts B) Illustrations C) Symbols D) Tables

Computer Science & Information Technology