_____ includes monitoring a system for signs of trouble, logging all system failures, diagnosing the problem, and applying corrective action.
A. Benchmark testing
B. Throughput management
C. Responsive testing
D. Fault management
Answer: D
Computer Science & Information Technology
You might also like to view...
Java uses the ____ for String escape sequences.
A. asterisk character (*) B. backslash character (\) C. ampersand character (&) D. forward slash character (/)
Computer Science & Information Technology
Which of the following is not one of the “Five A’s” of information security?
A) Availability B) Assurance C) Authorization D) Authentication
Computer Science & Information Technology
The code that is used to represent glyphs or syllables or whole words is:
A) block sequence. B) Unicode. C) mnemonic code. D) significant-digit.
Computer Science & Information Technology
The Screenshot button is located in the ________ group on the INSERT tab
A) Charts B) Illustrations C) Symbols D) Tables
Computer Science & Information Technology