The conceptual model is
(A) dependent on hardware.
(B) dependent on software.
(C) dependent on both hardware and software .
(D) independent of both hardware and software.

1 Answer

Answer :

(D) independent of both hardware and software.

Related questions

Description : Find the false statement: (A) The relationship construct known as the weak relationship type was defined by Dey, Storey & Barron (1999). (B) A weak relationship occurs when two ... Ternary, Quaternary and Quintary relationships are shown through a series of application scenario's and vignette's

Last Answer : (C) Conceptual model is not accurate representation of "Universe of interest".

Description : In windows 2000 operating system all the processor-dependent code is isolated in a dynamic link library called (A) NTFS file system (B) Hardware abstraction layer (C) Microkernel (D) Process Manager

Last Answer : (B) Hardware abstraction layer

Description : A ……………… system in no more than idea. A) Conceptual B) Logical C) Physical D) None

Last Answer : A) Conceptual

Description : The data Flow Diagram is the basic component of …………… system A) Conceptual B) Logical C) Physical

Last Answer : A) Conceptual

Description : ………… system consists of programs, data files and documentation A) Conceptual B) Logical C) Physical D) None of the above

Last Answer : C) Physical

Description : A …………. System is no more than idea A) Conceptual B) Logical C) Physical D) All of the above

Last Answer : A) Conceptual

Description : The view of total database content is (A) Conceptual view. (B) Internal view. (C) External view. (D) Physical View.

Last Answer : (A) Conceptual view.

Description : Which of the following is a knowledge representation technique used to represent knowledge about stereotype situation? (A) Semantic network (B) Frames (C) Scripts (D) Conceptual Dependency

Last Answer : (C) Scripts 

Description : Manager's salary details are to be hidden from Employee Table. This Technique is called as (A) Conceptual level Datahiding (B) Physical level Datahiding (C) External level Datahiding (D) Logical level Datahiding

Last Answer : (C) External level Datahiding

Description : In Data mining, .............. is a method of incremental conceptual clustering. (A) STRING (B) COBWEB (C) CORBA (D) OLAD

Last Answer : (B) COBWEB

Description : Which of the following is not valid with reference to Message Passing Interface (MPI)? (A) MPI can run on any hardware platform (B) The programming model is a distributed memory model. (C) All ... implicit. (D) MPI - Comm - Size returns the total number of MPI processes in specified communication.

Last Answer : (C) All parallelism is implicit.

Description : Which one of the following set of attributes should not be encompassed by effective software metrics ? (A) Simple and computable (B) Consistent and objective (C) Consistent in the use of units and dimensions (D) Programming language dependent

Last Answer : (D) Programming language dependent

Description : The performance of data communications network depends on .............. A) Number of users B) The hardware and software C) The transmission D) All of the above

Last Answer : D) All of the above

Description : The distributed system is a collection of (P) and communication is achieved in distributed system by (Q) , where (P) and (Q) are : (A) Loosely coupled hardware on tightly ... message passing ,respectively. (D) Loosely coupled software on tightly coupled hardware and file sharing, respectively.

Last Answer : (C) Tightly coupled software on loosely coupled hardware and message passing ,respectively. 

Description : Which of the following is false regarding the evaluation of computer programming languages? (A) Application oriented features (B) Efficiency and Readability (C) Software development (D) Hardware maintenance cost

Last Answer : (D) Hardware maintenance cost

Description : Software Engineering is an engineering discipline that is concerned with: (1) how computer systems work. (2) theories and methods that underlie computers and software systems. (3) all ... (4) all aspects of computer-based systems development, including hardware, software and process engineering.

Last Answer : Answer: 3

Description : Distributed operating systems consist of: (1) Loosely coupled O.S. software on a loosely coupled hardware (2) Loosely coupled O.S. software on a tightly coupled hardware (3) Tightly coupled O.S. software on a loosely coupled hardware (4) Tightly coupled O.S. software on a tightly coupled hardware

Last Answer : Answer: 3

Description : The decision-making model consists of four styles: directive, analytic, behavioral and _______________. (a) Conceptual ; (b) Intuitive ; (c) Group interaction ; (d) Laggard

Last Answer : (a) Conceptual ;

Description : Java servlets are an efficient and powerful solution for creating ………….. for the web. A) Dynamic content B) Static content C) Hardware D) Both a and b

Last Answer : A) Dynamic content

Description : A _________ is a cloud computing service that is both hardware and software. a) service b)platform c) model d) all of the mentioned

Last Answer : platform

Description : ............... is a process model that removes defects before they can precipitate serious hazards. (A) Incremental model (B) Spiral model (C) Cleanroom software engineering (D) Agile model

Last Answer : (C) Cleanroom software engineering

Description : Which of the following is not a software process model? (A) Prototyping (B) Iterative (C) Timeboxing (D) Glassboxing

Last Answer : (D) Glassboxing

Description : The ................ model is preferred for software development when the requirements are not clear. (A) Rapid Application Development (B) Rational Unified Process (C) Evolutionary Model (D) WaterfallModel

Last Answer : (C) Evolutionary Model

Description : The quick design of a software that is visible to end users leads to ............ (A) iterative model (B) prototype model (C) spiral model (D) waterfall model 

Last Answer : (B) prototype model

Description : The Prototyping model of software development is: (1) a reasonable approach when requirements are well-defined. (2) a useful approach when a customer cannot define requirements clearly. (3) the ... projects with large development teams. (4) a risky model that rarely produces a meaningful product.

Last Answer : 1

Description : If an attribute of a composite key is dependent on an attribute of the other composite key, a normalization called ................ is needed. A) DKNF B) BCNF C) Fourth D) Third

Last Answer : B) BCNF

Description : A .................. normal form normalization will be needed where all attributes in a relation tuple are not functionally dependent only on the key attribute. A) First B) Second C) Third D) Fourth

Last Answer : C) Third

Description : A ………………. Does not have a distinguishing attribute if its own and mostly are dependent entities, which are part of some another entity. A) Weak entity B) Strong entity C) Non attributes entity D) Dependent entity

Last Answer : A) Weak entity

Description : FAN IN of a component A is defined as (A) Number of components that can call or pass control to component A. (B) Number of components that are called by component A. (C) Number of components related to component A. (D) Number of components dependent on component A.

Last Answer : (A) Number of components that can call or pass control to component A.

Description : The Relation Vendor Order (V_no, V_ord_no, V_name, Qty_sup, unit_price) is in 2NF because : (A) Non key attribute V_name is dependent on V_no which is part of composite key (B) ... Qty_sup is dependent on primary_key unit price (D) key attribute V_ord_no is dependent on primary_key unit price

Last Answer : (A) Non key attribute V_name is dependent on V_no which is part of composite key

Description : If S1 is total number of modules defined in the program architecture, S3 is the number of modules whose correct function depends on prior processing then the number of modules not dependent on prior processing is: (A) 1 + S3/S1 (B) 1 - S3/S1 (C) 1 + S1/S3 (D) 1 - S1/S3

Last Answer : (B) 1 - S3/S1

Description : One of the disadvantages of user level threads compared to Kernel level threads is (1) If a user level thread of a process executes a system call, all threads in that process are ... privileges. (4) The library procedures invoked for thread management in user level threads are local procedures.

Last Answer : If a user level thread of a process executes a system call, all threads in that process are blocked.

Description : Write short note on the followings.  Hardware Engineer:

Last Answer :  Hardware Engineer:  He is a person who design and manufacture computer hardware.  He also do repairing and maintenance of computers.  He has deep knowledge of computers, processors, circuit ... images and videos using various software.  He can edit, split and combine images and videos. 

Description : The compiled java program can run on any ..................... plateform having Java Virtual Machine (JVM) installed on it. A) program B) java C) hardware D) non java

Last Answer : C) hardware

Description : Which of the following are the functions of operating system? i) recovering from errors ii) facilitating input/output iii) facilitating parallel operation iv) sharing hardware among users v) implementing user interface A) i, ii, ... only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : Which of the following is/are the functions of operating system? i) Sharing hardware among users. ii) Allowing users to share data among themselves. iii) Recovering from errors. iv) Preventing users from interfering with one another. ... only C) i, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : Which of the following 8085 microprocessor hardware interrupt has the lowest priority? (A) RST 6.5 (B) RST 7.5 (C) TRAP (D) INTR 

Last Answer : Answer: D

Description : 8085 microprocessor has ............. hardware interrupts. (A) 2 (B) 3 (C) 4 (D) 5

Last Answer : (D) 5

Description : Which of the following functional cloud computing hardware/software stack is the Cloud Reference Model? a) CAS b) CSA c) SAC d) All of the mentioned

Last Answer : CSA

Description : State whether the following statement is true. i) A macro virus is platform independent. ii) Macro viruses infect documents, not executable portions of code. A) i-only B) ii-only C) Both i and ii D) Non i and ii

Last Answer : D) Non i and ii

Description : The target hardware address on an Ethernet is _______ in an ARP request. A) 0x000000000000 B) 0.0.0.0 C) variable D) class dependent

Last Answer : 0x000000000000

Description : Glucose enters the cells by (A) insulin independent transport (B) insulin dependent transport (C) enzyme mediated transport (D) Both (A) and (B)

Last Answer : D

Description : What is the consequence between a node and its predecessors while creating bayesian network? a) Functionally dependent b) Dependant c) Conditionally independent d) Both Conditionally dependant & Dependant

Last Answer : c) Conditionally independent

Description : What is the consequence between a node and its predecessors while creating Bayesian network? a) Conditionally dependent b) Dependent c) Conditionally independent d) Both a & b

Last Answer : c) Conditionally independent

Description : An extraneous variable that systematically varies with the independent variable and also influences the dependent variable is known as a _______________. a. Confounding variable b. Third variable c. Second variable d. Both a and b are correct

Last Answer : d. Both a and b are correct

Description : For a specific job the minimum wages are a) dependent on the gender of the employee b) dependent on the work nature and the gender both c) independent of the gender if the work is same d) 10% higher for males as compared to females 

Last Answer : c) independent of the gender if the work is same

Description : Java programs are A) Faster than others B) Platform independent C) Not reusable D) Not scalable

Last Answer : B) Platform independent

Description : Which of the following is independent malicious program that need not any host program? A) Trap doors B) Trojan horse C) Virus D) Worm

Last Answer : D) Worm

Description : State whether true or false. i) Multithreading is useful for application that perform a number of essentially independent tasks that do not be serialized. ii) An example of multithreading is a database server that listens for ... B) i-True, ii-True C) i-False, ii-True D) i-False, ii-False

Last Answer : B) i-True, ii-True

Description : By an external entity we mean a A) Unit outside the system being designed which can be controlled by an analyst. B) Unit outside the system whose behavior is independent of the system being designed C) A unit external to the system being designed D) A unit which is not part of a DFD

Last Answer : C) A unit external to the system being designed