Which of the following is not the part of ADT description?
A) Data
B) Operations
C) Both of the above
D) None of the above

1 Answer

Answer :

D) None of the above

Related questions

Description : Consider the following statements for priority queue: S1: It is a data structure in which the intrinsic ordering of the elements does determine the result of its basic operations. S2: The elements of a priority queue ... . (C) SI is incorrect and S2 is correct. (D) Both S1 and S2 are correct.

Last Answer : (D) Both S1 and S2 are correct.

Description : Which of the following statements are true with reference to the way of describing XML data ? (a) XML uses DTD to describe the data (b) XML uses XSL to describe the data (c) XML uses a description node to describe the data Codes : (A) (a) only (B) (b) only (C) (a) and (b) (D) (a) and (c)

Last Answer : Answer: D

Description : Which of the following provides the best description of an entity type? (A) A specific concrete object with a defined set of processes (e.g. Jatin with diabetes) (B) A value given to a ... template for a group of things with the same set of characteristics that may exist in the real world

Last Answer : Answer: D

Description : ………… is not the component of data structure. A) Operations B) Storage Structures C) Algorithms D) None of above

Last Answer : D) None of above

Description : Which of the following is true about the characteristics of abstract data types? i) It exports a type. ii) It exports a set of operations A) True, False B) False, True C) True, True D) False, False

Last Answer : C) True, True

Description : A context diagram A) Describes the context of a system B) is a DFD which gives an overview of the system C) is a detailed description of a system D) is not used in drawing a detailed DFD

Last Answer : B) is a DFD which gives an overview of the system

Description : DML is provided for (A) Description of logical structure of database. (B) Addition of new structures in the database system. (C) Manipulation & processing of database. (D) Definition of physical structure of database system.

Last Answer : C) Manipulation & processing of database.

Description : Is there a site that can tell the false rate of Bosch Security alarm and ADT security alarm?

Last Answer : Whether it is or not you should get to the bottom of it.

Description : How can I disable my home's ADT monitor?

Last Answer : Can you “pop” the cover off? If you get the faceplate off it might be obvious how to disable it. I’m good at breaking things. If you can post a pic it would be fab.

Description : ADT Burglar Alarms For House Security – A Brief Guide ?

Last Answer : House security is one of the first things you need to take care of when it comes to making contingency plans for the future. Good burglar alarms are a necessity nowadays, with rising crime rates. ... doing things right. For more details about ADT please log on to http://www.firsthomesecurity.co.uk

Description : How much does it cost to get an ADT security alarm?

Last Answer : For an ADT system, you can expect to pay around $99 for an install. The systems are usually "free". Monitoring is around $30 a month for both residential and commercial.

Description : Do I have to install my own ADT alarm?

Last Answer : With ADT, typically they'll be able to do the install for you. This is because they're monitored solutions, and they'll want to ensure they're properly set.

Description : Is the ADT home security company a reputable company for quick response ?

Last Answer : ADT is a reputable large national and international security company. Response time may vary in different areas. Look at reviews local to you to see if they will work for you.

Description : Acid dew point temperature (ADT) of a flue gas produced by the combustion of a fuel containing 1% sulphur may be about __________ °C. (A) 80 (B) 130 (C) 180 (D) 250

Last Answer : (B) 130

Description : What are the operations that can be performed on Files?

Last Answer : Ans: Following operations can be performed on files1. Creation of a file of a specific type. 2. Reading/processing a file. 3. Append/add information to a file. 4. Modify/edit data in a file. 5. Delete items in a file. 6. Update the file.

Description : Explain the basic operations of a computer. 

Last Answer :  Input Operation:  A computer works in the light of instructions (input) given to it.  Input is given by a user using keyboard or mouse.  The input is stored in memory for further processing. ... on the monitor or print it on paper. Results can also be saved on hard disk for future use. 

Description : State true or false. i) comparisons precede logical operations in java ii) assignment operations succeed increment operations iii) arithmetic operations succeed comparisons iv) x precede + A) i-true, ii-true, iii-false, ... false, ii-true, iii-false, iv-false D) i-true, ii-false, iii-false, iv-true

Last Answer : A) i-true, ii-true, iii-false, iv-true

Description : Which of the following operations can be performed by using FTP. i) Connect to a remote host ii) Select directory iii) Define the transfer mode iv) List file available A) i, and ii only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii and iv

Last Answer : C) ii, iii and iv only

Description : Consider the situation in which assignment operation is very costly. Which of the following sorting algorithm should be performed so that the number of assignment operations is minimized in general? a) Insertion sort b) Selection sort c) Heap sort d) None

Last Answer : b) Selection sort

Description : Which of the following statement(s) is(are) true? I. Two successive translations are additive. II. Two successive rotations are additive. III. Two successive scaling operations are multiplicative. (A) I and II (B) I and III (C) II and III (D) All the above.

Last Answer : (D) All the above.

Description : A byte addressable computer has a memory capacity of 2 m Kbytes and can perform 2 n operations. An instruction involving 3 operands and one operator needs a maximum of (A) 3m bits (B) m + n bits (C) 3m + n bits (D) 3m + n + 30 bits

Last Answer : (D) 3m + n + 30 bits

Description : Which of the following is true ? I. Implementation of self-join is possible in SQL with table alias. II. Outer-join operation is basic operation in relational algebra. III. Natural join and outer join operations are ... (B) II and III are correct. (C) Only III is correct. (D) Only I is correct.

Last Answer : (D) Only I is correct.

Description : To determine the efficiency of an algorithm the time factor is measured by: (A) Counting micro seconds (B) Counting number of key operations (C) Counting number of statements (D) Counting kilobytes of algorithm

Last Answer : (B) Counting number of key operations

Description : Loop unrolling is a code optimization technique: (A) that avoids tests at every iteration of the loop (B) that improves performance by decreasing the number of instructions in a basic block. ... loops with outer loops (D) that reorders operations to allow multiple computations to happen in parallel.

Last Answer : (A) that avoids tests at every iteration of the loop

Description : A scheduling Algorithm assigns priority proportional to the waiting time of a process. Every process starts with priority zero (lowest priority). The scheduler re-evaluates the process priority for every 'T' time ... (A) Priority scheduling (B) Round Robin Scheduling (C) Shortest Job First (D) FCFS

Last Answer : (B) Round Robin Scheduling

Description : Consider the following operations performed on a stack of size 5: Push(a); Pop(); Push(b); Push(c); Pop(); Push(d); Pop(); Pop(); Push(e); Which of the following statements is correct? (A) Underflow occurs (B) Stack operations are performed smoothly (C) Overflow occurs (D) None of the above

Last Answer : (B) Stack operations are performed smoothly

Description : compiler optimization, operator strength reduction uses mathematical identities to replace slow math operations with faster operations. Which of the following code replacements is an illustration of operator strength reduction? (A) Replace P + ... * P or Replace 3 + 4 by 7. (B) Replace P * 32 by P

Last Answer : (B) Replace P * 32 by P

Description : Which of the following logic operations is performed by the following given combinational circuit ?  (A) EXCLUSIVE-OR (B) EXCLUSIVE-NOR (C) NAND (D) NOR

Last Answer : (A) EXCLUSIVE-OR

Description : Which of the following is the most efficient to perform arithmetic operations on the numbers? (A) Sign-magnitude (B) 1’s complement (C) 2’s complement (D) 9’s complement

Last Answer : (C) 2’s complement

Description : Red-black trees are one of many Search tree schemes that are "balanced” in order to guarantee that basic dynamic-set operations take ............. time in the worst case. (1) O(1) (2) O(log n) (3) O(n) (4) O(n log n)

Last Answer : (2) O(log n) 

Description : The Unix Kernel maintains two key data structures related to processes, the process table and the user structure. Which of following information is not the part of user structure? (A) File descriptor table (B) System call state (C) Scheduling parameters (D) Kernel stack

Last Answer : (C) Scheduling parameters

Description : ………… enable us to hide, inside the object, both the data fields and the methods that act on that data. A) Encapsulation B) Polymorphism C) Inheritance D) Overloading

Last Answer : A) Encapsulation

Description : …………… is a way to bind the data and its associated functions together which allows the data and functions to be hidden. A) Structure B) Class C) Enum D) Both A and B

Last Answer : B) Class

Description : ………………. is responsible for all aspects of data processing, operation research, organization and method, system analysis and design investments. A) Management Services Director B) Data Processing Manager C) Computer Manager D) Both B and C

Last Answer : A) Management Services Director

Description : A data flow can A) Only a data store B) Only leave a data store C) Enter or leave a data Store D) Either enter or leave a data store but not both

Last Answer : C) Enter or leave a data Store

Description : A data flow can A) Only emanate from an external entity B) Only terminate in an external entity C) May emanate and terminate in an external entity D) May either emanate or terminate in an external entity but not both

Last Answer : C) May emanate and terminate in an external entity

Description : In FDDI, data normally travel on .................. A) The primary ring B) The Secondary ring C) Both rings D) Neither ring

Last Answer : A) The primary ring

Description : What is the data type of (1)? a) Tuple b) Integer c) List d) Both tuple and integer

Last Answer : b) Integer

Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.

Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.

Description : Superficially the term object-oriented , means that, we organize software as a (A) collection of continuous objects that incorporates both data structure and behaviour. (B) collection of ... and behaviour. (D) collection of objects that incorporates both discrete data structure and behaviour.

Last Answer : (C) collection of discrete objects that incorporates both data structure and behaviour.

Description : Given the following statements: (a) Strategic value of data mining is time stamping (b) Information collection is an expensive process in building an expert system. Which of the following options is correct ? (A) Both (a) and (b) ... true (C) (a) is true, (b) is false (D) (a) is false, (b) is true

Last Answer :  (B) Both (a) and (b) are true

Description : Consider the following two statements : (a) Data scrubling is a process to upgrade the quality of data, before it is moved into Data warehouse. (b) Data scrubling is a process of rejecting data from data warehouse to create ... true (C) Both (a) and (b) are false (D) Both (a) and (b) are true

Last Answer : (A) (a) is true, (b) is false

Description : Consider the following two statements: (a) Business intelligence and Data warehousing is used for forecasting and Data mining. (b) Business intelligence and Data warehousing is used for analysis of large volumes of sales data. Which one ... C) (a) is false, (b) is true (D) Both (a) and (b) are false

Last Answer : (B) Both (a) and (b) are true

Description : Which of the following statement(s) is/are TRUE with regard to software testing? I. Regression testing technique ensures that the software product runs correctly after the changes during maintenance. II. Equivalence partitioning is a ... (1) only I (2) only II (3) both I and II (4) neither I nor II

Last Answer : (1) only I 

Description : The part of a processor which contains hardware necessary to perform all the operations required by a computer: a) Data path b) Controller c) Registers d) Cache

Last Answer : Answer: a Explanation: A processor is a part of the computer which does all the data manipulation and decision making. A processor comprises of: A data path which contains the hardware necessary to ... the data path what needs to be done. The registers act as intermediate storage for the data

Description : What are the ways of storing data in Files?

Last Answer : Ans: There are two ways of storing data in files 1. Text Format- In text format data is stored as a line of character with each line terminated by a new line character ( \n'). Text files ... different on different machine. In text format , these problem do not arise,and hence it is more portable.

Description : Name the primitive data-types in java.

Last Answer : A: byte, short, int, long, float, double, char and boolean

Description : What is Data Abstraction? How is it implemented in Java?

Last Answer : A: Act of representing only essential features without including its background details is called Abstraction. Data Abstraction can also be defined as the process of hiding the implementation details and showing ... Java, it is implemented by the use of interfaces or by making the class abstract.

Description : Which command is used to sort the lines of data in a file in reverse order A. sort B. sh C. st D. sort -r E. None of the above

Last Answer : D. sort -r