1. is the automatic retrieval of information by a website on a schedule from another website.






Write Comment

Type in
(Press Ctrl+g to toggle between English and the chosen language)

Comments

Show Similar Question And Answers
QA->India hasrecently signed bank information sharing deal with which country for theimplementation of Automatic Exchange of Information (AEOI)?....
QA->By hacking web server taking control on another person’s website called as web _____ :....
QA->By hacking web server taking control on another persons website called as web ..............
QA->India’s first automatic Telephone Exchange is started at?....
QA->When " At Mumbai and Chennai, two automatic postal edition Centres were started." started in india ?....
MCQ-> Read the following information and the accompanying graphs to answer the questions that follow. www.jay.com spent $ 5,57,000 during last 12 months for online display advertisements, also called impressions, on five websites (Website A, Website B, Website C, Website D and Website E). In this arrangement, www.jay.com is the Destination Site, and the five websites are referred to as the Ad Sites. The allocation of online display advertising expenditure is shown in Graph A. The online display advertisements helped www.jay.com to get visitors on its site. Online visitors, visiting the Ad Sites, are served display advertisements of www.jay.com and on clicking they land on the Destination Site (Graph B). Once on the Destination Site, some of the visitors complete the purchase process(Graph C) Quality traffic = $$\frac{\text{No. of site visitors who start purchase on destination site}}{\text{No. of visitors who click the online display advertisement}}$$ Leakage in online buying = 1 − $$\frac{\text {Complete buying on the destination website}}{\text{Start buying on the destination website}}$$Efficiency of online display advertising expenditure on an Ad Site = $$\frac{\text{No. of visitors from the Ad Site who complete the purchase process}}{\text{Amount spent on the Ad Site}}$$ Which of following Ad Sites provide facility of least cost per advertisement?
 ....
MCQ->is the automatic retrieval of information by a website on a schedule from another website.....
MCQ-> Read the following passage carefully and answer the questions given below it. Certain words/phrases have been printed in ‘’bold’’ to help you locate them while answering some of the questions.As increasing dependence on information systems develops, the need for such system to be reliable and secure also becomes more essential. As growing numbers of ordinary citizens use computer networks for banking, shopping, etc., network security in potentially a ‘’massive’’ problem. Over the last few years, the need for computer and information security system has become increasingly evident, as web sites are being defaced with greater frequency, more and more denial-of-service attacks are being reported, credit card information is being stolen, there is increased sophistication of hacking tools that are openly available to the public on the Internet, and there is increasing damage being caused by viruses and worms to critical information system resources.At the organizational level, institutional mechanism have to be designed in order to review policies, practices, measures and procedures to review e-security regularly and assess whether these are appropriate to their environment. It would be helpful if organizations share information about threats and vulnerabilities, and implement procedures of rapid and effective cooperation to prevent, detect and respond to security incidents. As new threats and vulnerabilities are continuously discovered there is a strong need for co-operation among organizations and, if necessary, we could also consider cross-border information sharing. We need to understand threats and dangers that could be ‘’vulnerable’’ to and the steps that need to be taken to ‘’mitigate’’ these vulnerabilities. We need to understand access control systems and methodology, telecommunications and network security, and security management practise. We should be well versed in the area of application and systems development security, cryptography, operations security and physical security.The banking sector is ‘’poised’’ for more challenges in the near future. Customers of banks can now look forward to a large array of new offerings by banks, from an ‘’era’’ of mere competition, banks are now cooperating among themselves so that the synergistic benefits are shared among all the players. This would result in the information of shared payment networks (a few shared ATM networks have already been commissioned by banks), offering payment services beyond the existing time zones. The Reserve Bank is also facilitating new projects such as the Multi Application Smart Card Project which, when implemented, would facilitate transfer of funds using electronic means and in a safe and secure manner across the length and breadth of the country, with reduced dependence on paper currency. The opportunities of e-banking or e-power is general need to be harnessed so that banking is available to all customers in such a manner that they would feel most convenient, and if required, without having to visit a branch of a bank. All these will have to be accompanied with a high level of comfort, which again boils down to the issue of e-security.One of the biggest advantages accruing to banks in the future would be the benefits that arise from the introduction of Real Time Gross Settlement (RTGS). Funds management by treasuries of banks would be helped greatly by RTGS. With almost 70 banks having joined the RTGS system, more large value funds transfer are taking place through this system. The implementation of Core Banking solutions by the banks is closely related to RTGS too. Core Banking will make anywhere banking a reality for customers of each bank. while RTGS bridges the need for inter-bank funds movement. Thus, the days of depositing a cheque for collection and a long wait for its realization would soon be a thing of the past for those customers who would opt for electronic movement of funds, using the RTGS system, where the settlement would be on an almost ‘’instantaneous’’ basis. Core Banking is already in vogue in many private sector and foreign banks; while its implementation is at different stages amongst the public sector banks.IT would also facilitate better and more scientific decision-making within banks. Information system now provide decision-makers in banks with a great deal of information which, along with historical data and trend analysis, help in the building up of efficient Management Information Systems. This, in turn, would help in better Asset Liability Management (ALM) which, today’s world of hairline margins is a key requirement for the success of banks in their operational activities. Another benefit which e-banking could provide for relates to Customer Relationship Management (CRM). CRM helps in stratification of customers and evaluating customer needs on a holistic basis which could be paving the way for competitive edge for banks and complete customer care for customer of banks.The content of the passage ‘’mainly’’ emphasizes----
 ....
MCQ-> on the basis of the information given in the following case. Teknik Group of industries had businesses in different sectors ranging from manufacturing, construction, fish farming and hotels. These different businesses operated as semi-independent units managed by the unit level managers. Teknik’s management had an internal consultancy group called as Business Advisory Group (known internally as BAG). The 15 experts in BAG were hired personally by Mr. Teknikwala, the owner of Teknik, who wanted this core group of experts to help his organization grow fast without facing the typical growth hurdles. Most of them were specialists in fields like law, information technology, human resource management, and operations management. Almost all of them had experience spanning decades in the industry. Whenever any of the units faced any significant all units and it represented an extra work for those who were involved. This coordination was required to understand the different work processes and the users’ requirements. This coordination activity was being extensively managed by the old timers as they were familiar with internal processes and people in the different units. An external consultant was also hired for customization and implementation After two months, BAG teams had to fortnightly present their progress to Ms. Teknikwali’s team. In the last meeting Ms. Teknikwali was dissatisfied. She explained her thinking that since ERP impacted every aspect of the business, the roll out had to be done faster. She wanted Mr. Shiv to get the implementation completed ahead of schedule. In the meeting she asked Mr. Shiv to get the people in IT team to be more productive. Not willing to disagree, Mr. Shiv committed to a roll-out schedule of complete ERP system in 6 months instead of earlier decided 14 months. Next day, Mr. Shiv presented the revised project milestone to BAG members. He told them that in order to meet the deadline, the members were expected to work on week-ends till the completion of the project. Along with that, they were also expected to maintain their earlier standards of delivery time and quality for the normal trouble-shooting and internal advisory work. Mr. Shiv also pointed out that anyone whose performance did not meet the expectations would be subjected to formal disciplinary action. The meeting ended without any member commenting on Shiv’s ideas, although Mr. Shiv heard a lot of mumbling in the corridor. Over the week, Shiv noticed that the members seemed to avoid him and he had to make extra effort to get ideas from them. After a fortnight Shiv reviewed the attendance register and found the Mr. Lal, an old time member, had not come during the week-ends and certain decisions were held up due to lack of inputs from Mr. Lal. Mr. Shiv issued a written reprimand to Mr. Lal. He was speechless on receiving the reprimand but kept silent. It has been three days since that incident. Some of the senior members had put in request for transfer to other business units. It was rumoured that four problems, the unit level managers would put up a request for help to BAG. The problems ranged from installation of internal MIS systems, to financial advice related to leasing of equipment, to handling of employee grievances. Over a period of 20 years, Teknik’s revenues grew from 100 crore 10,000 crore with guidance of BAG and due to Mr. Tekinwala’s vision. Given its reputation in the industry, many people wanted to start their careers in BAG. Often young MBAs fresh out of business schools would apply. However their applications used to be rejected by Mr. Teknikwala, who had a preference for people with extensive industry experience. Things changed after the unfortunate demise of Mr. Teknikwala. His daughter Miss. Teknikwali took up the family business. She was an MBA from one of the premier business schools, and was working in a different company when Mr. Tekinwala passed away. She preferred that BAG developed new ideas and therefore inducted freshly graduated MBAs from premier business schools. She personally supervised the recruitment and selection process. Now the entire group constituted of 50 specialists, out of which 35 were the old time members. She also changed the reporting relationships in the BAG group with some of the older members being made to report to the new members. In IT team, Mr. Shiv, a newly recruited MBA, was made in-charge. For the older members it was a shock. However, as most of them were on the verge of retirement, and it would be challenging to search for new jobs while competing with younger professionals, they decided to play along. After one month, all business units were caught up in the ERP fever. This was an idea pushed by Ms. Teknikwali who the need the need to replace the old legacy systems with latest ERP system integrating all the units of Teknik. This was heavily influenced by her experience in the previous where an ERP system was already up and running. Therefore she was not aware of the difference between installing an ERP system and working on an already installed one. The ERP mplementation in Teknik Group required extensive coordination with senior level managers of senior legal experts had agreed to an offer from a law firm. Other senior members would sporadically come in late to work, citing health reasons. Almost all senior members now wanted a weekly work-routine to be prepared and given to them in advance so that they could deliver as per the schedule. This insistence on written communication was a problem as urgent problems or ad-hoc requests could not be foreseen and included. Also normal services to other business units were being unattended to, and there were complaints coming from the unit heads.Which of the following could have been a better response of Mr. Shiv to Ms. Teknikwali’s request to re-schedule the ERP implementation?....
MCQ-> Some psychologists and sociologists believe that psychopathy can be an asset in business and politics and that, as a result, psychopathic traits are overrepresented among successful people. This would be a puzzle if it were so. If our moral feelings evolved through natural selection, then it shouldn‘t be the case that one would flourish without them. And, in fact, the successful psychopath is probably the exception. Psychopaths have certain deficits. Some of these are subtle. The psychologist Abigail Marsh and her colleagues find that psychopaths are markedly insensitive to the expression of fear. Normal people recognize fear and treat it as a distress cue, but 13 psychopaths have problems seeing it, let alone responding to it appropriately. Other deficits run deeper. The overall lack of moral sentiments—and specifically, the lack of regard for others—might turn out to be the psychopath‘s downfall. We non-psychopaths are constantly assessing one another, looking for kindness and shame and the like, using this information to decide whom to trust, whom to affiliate with. The psychopath has to pretend to be one of us. But this is difficult. It‘s hard to force yourself to comply with moral rules just through a rational appreciation of what you are expected to do. If you feel like strangling the cat, it‘s a struggle to hold back just because you know that it is frowned upon. Without a normal allotment of shame and guilt, psychopaths succumb to bad impulses, doing terrible things out of malice, greed, and simple boredom. And sooner or later, they get caught. While psychopaths can be successful in the short term, they tend to fail in the long term and often end up in prison or worse. Let‘s take a closer look at what separates psychopaths from the rest of us. There are many symptoms of psychopathy, including pathological lying and lack of remorse or guilt, but the core deficit is indifference toward the suffering of other people. Psychopaths lack compassion. To understand how compassion works for all of us non-psychopaths, it‘s important to distinguish it from empathy. Now, some contemporary researchers use the terms interchangeably, but there is a big difference between caring about a person (compassion) and putting yourself in the person‘s shoes (empathy).I am too much of an adaptationist to think that a capacity as rich as empathy exists as a freak biological accident. It most likely has a function, and the most plausible candidate here is that it motivates us to care about others. Empathy exists to motivate compassion and altruism. Still, the link between empathy (in the sense of mirroring another‘s feelings) and compassion (in the sense of feeling and acting kindly toward another) is more nuanced than many people believe. First, although empathy can be automatic and unconscious—a crying person can affect your mood, even if you‘re not aware that this is happening and would rather it didn‘t—we often choose whether to empathize with another person. So when empathy is present, it may be the product of a moral choice, not the cause of it. Empathy is also influenced by what one thinks of the other person. Second, empathy is not needed to motivate compassion. As the psychologist Steven Pinker points out, “If a child has been frightened by a barking dog and is howling in terror, my sympathetic response is not to howl in terror with her, but to comfort and protect her” Third, just as you can have compassion without empathy, you can have empathy without compassion. You might feel the person‘s pain and wish to stop feeling it—but choose to solve the problem by distancing yourself from that person instead of alleviating his or her suffering. Even otherwise good people sometimes turn away when faced with depictions of pain and suffering in faraway lands, or when passing a homeless person on a city street.The core deficit of Psychopaths affects their long term success because,
 ....
Terms And Service:We do not guarantee the accuracy of available data ..We Provide Information On Public Data.. Please consult an expert before using this data for commercial or personal use
DMCA.com Protection Status Powered By:Omega Web Solutions
© 2002-2017 Omega Education PVT LTD...Privacy | Terms And Conditions