ログイン

Mga MALI mo!
29問 • 1年前
  • Jamaica Rose Gilo
  • 通報

    問題一覧

  • 1

    Address threats and allows proactive risk management and mitigation

    Risk Identification

  • 2

    Actions taken to address identified risks and minimize their impact

    Risk Response Strategies

  • 3

    Tool used to document identified risks, their assessments and strategies for mitigating them

    Risk Register

  • 4

    Involves assessing costs of materials, labor, equipment and other resources

    Cost Estimation

  • 5

    Helps prevent future occurrences of identified risks

    Root Cause Analysis

  • 6

    Identifies underlying cause of risks to develop effective mitigation strategies

    Root Cause Analysis

  • 7

    Helps in planning and coordinating large projects by identifying the necessary tasks

    PERT

  • 8

    provides insights to user needs and perspectives

    Focus Groups

  • 9

    enable essential elements of a computer and related infrastructures to work together

    Industry Standards

  • 10

    MISRA for C/C++

    Code Quality Standards

  • 11

    By implementing these, you will be adopting the onlybinternationally-recognized agreed standards for software testing, providing high quality approach to testing of your organization

    ISO/IEC/IEEE 29119

  • 12

    Process of evaluating a system/application to ensure that it's secure from potential threats, vulnerabilities and risks that could lead to unauthorized access, data breaches or system malfunctions.

    Security Testing Quality Assurance

  • 13

    Ensures the code is reliable and meets requirements

    TDD

  • 14

    Provides framework for test documentation

    IEEE 829

  • 15

    provides an approach for writing and executing unit tests

    J Unit Test NG

  • 16

    Often performed manually/with automated tools

    Penetration Testing

  • 17

    Transferring data from a central repository to different data marts

    Data Propagation

  • 18

    Provides a clear understanding on how tasks are performed within an organization

    BPM

  • 19

    Allows businesses to gain valuable insights into their operations, customer behavior and market trends

    Data Warehouse

  • 20

    Ensures data in data warehouse is correct, complete and consistent

    Data Quality Management

  • 21

    Degines how data flows from various sources

    Data Warehouse Architecture

  • 22

    Consists of several key layers

    Data Warehouse Architecture

  • 23

    Ideal for real-time data access(users to query and analyze data on demand)

    Data Virtualization

  • 24

    Users can access and manipulate data as if it were stored in a single location

    Data Virtualization

  • 25

    For big data scenarios

    ELT

  • 26

    Useful for large volumes of data or when real time access is required

    Data Federation

  • 27

    Allows users to query and analyze data from multiple sources as if they were on a single database

    Data Federation

  • 28

    Regular audits and reviews or organizational processes

    Compliance Monitoring

  • 29

    Help ensure that the company meets legal and regulatory standards

    Compliance Monitoring

  • Networking 2 quiz1

    Networking 2 quiz1

    Jamaica Rose Gilo · 83問 · 1年前

    Networking 2 quiz1

    Networking 2 quiz1

    83問 • 1年前
    Jamaica Rose Gilo

    MIDTERM-IT 313

    MIDTERM-IT 313

    Jamaica Rose Gilo · 100問 · 1年前

    MIDTERM-IT 313

    MIDTERM-IT 313

    100問 • 1年前
    Jamaica Rose Gilo

    MIDTERM-IT 313

    MIDTERM-IT 313

    Jamaica Rose Gilo · 94問 · 1年前

    MIDTERM-IT 313

    MIDTERM-IT 313

    94問 • 1年前
    Jamaica Rose Gilo

    MIDTERM-IT 313

    MIDTERM-IT 313

    Jamaica Rose Gilo · 58問 · 1年前

    MIDTERM-IT 313

    MIDTERM-IT 313

    58問 • 1年前
    Jamaica Rose Gilo

    MIDTERM-APPDEV 3 CHAPTER 5

    MIDTERM-APPDEV 3 CHAPTER 5

    Jamaica Rose Gilo · 42問 · 1年前

    MIDTERM-APPDEV 3 CHAPTER 5

    MIDTERM-APPDEV 3 CHAPTER 5

    42問 • 1年前
    Jamaica Rose Gilo

    MIDTERM-APPDEV 3 CHAPTER 4

    MIDTERM-APPDEV 3 CHAPTER 4

    Jamaica Rose Gilo · 48問 · 1年前

    MIDTERM-APPDEV 3 CHAPTER 4

    MIDTERM-APPDEV 3 CHAPTER 4

    48問 • 1年前
    Jamaica Rose Gilo

    MIDTERM-ADVANCED DBM C3 L2

    MIDTERM-ADVANCED DBM C3 L2

    Jamaica Rose Gilo · 97問 · 1年前

    MIDTERM-ADVANCED DBM C3 L2

    MIDTERM-ADVANCED DBM C3 L2

    97問 • 1年前
    Jamaica Rose Gilo

    INFO. ASSURANCE &SECURITY

    INFO. ASSURANCE &SECURITY

    Jamaica Rose Gilo · 100問 · 1年前

    INFO. ASSURANCE &SECURITY

    INFO. ASSURANCE &SECURITY

    100問 • 1年前
    Jamaica Rose Gilo

    INFO. ASSURANCE & SECURITY

    INFO. ASSURANCE & SECURITY

    Jamaica Rose Gilo · 33問 · 1年前

    INFO. ASSURANCE & SECURITY

    INFO. ASSURANCE & SECURITY

    33問 • 1年前
    Jamaica Rose Gilo

    3 BRANCHES OF THE PHIL. GOVERNMENT

    3 BRANCHES OF THE PHIL. GOVERNMENT

    Jamaica Rose Gilo · 20問 · 11ヶ月前

    3 BRANCHES OF THE PHIL. GOVERNMENT

    3 BRANCHES OF THE PHIL. GOVERNMENT

    20問 • 11ヶ月前
    Jamaica Rose Gilo

    ENVIRONMENTAL MANAGEMENT AND PROTECTION

    ENVIRONMENTAL MANAGEMENT AND PROTECTION

    Jamaica Rose Gilo · 16問 · 11ヶ月前

    ENVIRONMENTAL MANAGEMENT AND PROTECTION

    ENVIRONMENTAL MANAGEMENT AND PROTECTION

    16問 • 11ヶ月前
    Jamaica Rose Gilo

    ARTICLE VI-1987 CONST.

    ARTICLE VI-1987 CONST.

    Jamaica Rose Gilo · 16問 · 11ヶ月前

    ARTICLE VI-1987 CONST.

    ARTICLE VI-1987 CONST.

    16問 • 11ヶ月前
    Jamaica Rose Gilo

    ARTICLE 1-NATIONAL TERRITORY

    ARTICLE 1-NATIONAL TERRITORY

    Jamaica Rose Gilo · 10問 · 11ヶ月前

    ARTICLE 1-NATIONAL TERRITORY

    ARTICLE 1-NATIONAL TERRITORY

    10問 • 11ヶ月前
    Jamaica Rose Gilo

    ARTICLE II-DECLARATION FOR PRINCIPLES AND STATE POLICIES

    ARTICLE II-DECLARATION FOR PRINCIPLES AND STATE POLICIES

    Jamaica Rose Gilo · 11問 · 11ヶ月前

    ARTICLE II-DECLARATION FOR PRINCIPLES AND STATE POLICIES

    ARTICLE II-DECLARATION FOR PRINCIPLES AND STATE POLICIES

    11問 • 11ヶ月前
    Jamaica Rose Gilo

    ARTICLE III

    ARTICLE III

    Jamaica Rose Gilo · 6問 · 11ヶ月前

    ARTICLE III

    ARTICLE III

    6問 • 11ヶ月前
    Jamaica Rose Gilo

    BILL OF RIGHTS

    BILL OF RIGHTS

    Jamaica Rose Gilo · 20問 · 11ヶ月前

    BILL OF RIGHTS

    BILL OF RIGHTS

    20問 • 11ヶ月前
    Jamaica Rose Gilo

    PEACE & HUMAN RIGHTS ISSUES AND CONCEPTS

    PEACE & HUMAN RIGHTS ISSUES AND CONCEPTS

    Jamaica Rose Gilo · 8問 · 11ヶ月前

    PEACE & HUMAN RIGHTS ISSUES AND CONCEPTS

    PEACE & HUMAN RIGHTS ISSUES AND CONCEPTS

    8問 • 11ヶ月前
    Jamaica Rose Gilo

    RA 6713

    RA 6713

    Jamaica Rose Gilo · 9問 · 11ヶ月前

    RA 6713

    RA 6713

    9問 • 11ヶ月前
    Jamaica Rose Gilo

    MATH PROBLEMS AND BASIC OPERATIONS

    MATH PROBLEMS AND BASIC OPERATIONS

    Jamaica Rose Gilo · 62問 · 11ヶ月前

    MATH PROBLEMS AND BASIC OPERATIONS

    MATH PROBLEMS AND BASIC OPERATIONS

    62問 • 11ヶ月前
    Jamaica Rose Gilo

    問題一覧

  • 1

    Address threats and allows proactive risk management and mitigation

    Risk Identification

  • 2

    Actions taken to address identified risks and minimize their impact

    Risk Response Strategies

  • 3

    Tool used to document identified risks, their assessments and strategies for mitigating them

    Risk Register

  • 4

    Involves assessing costs of materials, labor, equipment and other resources

    Cost Estimation

  • 5

    Helps prevent future occurrences of identified risks

    Root Cause Analysis

  • 6

    Identifies underlying cause of risks to develop effective mitigation strategies

    Root Cause Analysis

  • 7

    Helps in planning and coordinating large projects by identifying the necessary tasks

    PERT

  • 8

    provides insights to user needs and perspectives

    Focus Groups

  • 9

    enable essential elements of a computer and related infrastructures to work together

    Industry Standards

  • 10

    MISRA for C/C++

    Code Quality Standards

  • 11

    By implementing these, you will be adopting the onlybinternationally-recognized agreed standards for software testing, providing high quality approach to testing of your organization

    ISO/IEC/IEEE 29119

  • 12

    Process of evaluating a system/application to ensure that it's secure from potential threats, vulnerabilities and risks that could lead to unauthorized access, data breaches or system malfunctions.

    Security Testing Quality Assurance

  • 13

    Ensures the code is reliable and meets requirements

    TDD

  • 14

    Provides framework for test documentation

    IEEE 829

  • 15

    provides an approach for writing and executing unit tests

    J Unit Test NG

  • 16

    Often performed manually/with automated tools

    Penetration Testing

  • 17

    Transferring data from a central repository to different data marts

    Data Propagation

  • 18

    Provides a clear understanding on how tasks are performed within an organization

    BPM

  • 19

    Allows businesses to gain valuable insights into their operations, customer behavior and market trends

    Data Warehouse

  • 20

    Ensures data in data warehouse is correct, complete and consistent

    Data Quality Management

  • 21

    Degines how data flows from various sources

    Data Warehouse Architecture

  • 22

    Consists of several key layers

    Data Warehouse Architecture

  • 23

    Ideal for real-time data access(users to query and analyze data on demand)

    Data Virtualization

  • 24

    Users can access and manipulate data as if it were stored in a single location

    Data Virtualization

  • 25

    For big data scenarios

    ELT

  • 26

    Useful for large volumes of data or when real time access is required

    Data Federation

  • 27

    Allows users to query and analyze data from multiple sources as if they were on a single database

    Data Federation

  • 28

    Regular audits and reviews or organizational processes

    Compliance Monitoring

  • 29

    Help ensure that the company meets legal and regulatory standards

    Compliance Monitoring