Description : Given the following statements: (a) To implement Abstract Data Type, a programming language require a syntactic unit to encapsulate type definition. (b) To implement ADT, a programming language requires some primitive operations that are ... (b) and (c) are false. (D) (a), (b) and (c) are true.
Last Answer : (D) (a), (b) and (c) are true.
Description : Consider the following statements for priority queue: S1: It is a data structure in which the intrinsic ordering of the elements does determine the result of its basic operations. S2: The elements of a priority queue ... . (C) SI is incorrect and S2 is correct. (D) Both S1 and S2 are correct.
Last Answer : (D) Both S1 and S2 are correct.
Description : Which of the following statements are true with reference to the way of describing XML data ? (a) XML uses DTD to describe the data (b) XML uses XSL to describe the data (c) XML uses a description node to describe the data Codes : (A) (a) only (B) (b) only (C) (a) and (b) (D) (a) and (c)
Last Answer : Answer: D
Description : Which of the following provides the best description of an entity type? (A) A specific concrete object with a defined set of processes (e.g. Jatin with diabetes) (B) A value given to a ... template for a group of things with the same set of characteristics that may exist in the real world
Description : ………… is not the component of data structure. A) Operations B) Storage Structures C) Algorithms D) None of above
Last Answer : D) None of above
Description : Which of the following is true about the characteristics of abstract data types? i) It exports a type. ii) It exports a set of operations A) True, False B) False, True C) True, True D) False, False
Last Answer : C) True, True
Description : A context diagram A) Describes the context of a system B) is a DFD which gives an overview of the system C) is a detailed description of a system D) is not used in drawing a detailed DFD
Last Answer : B) is a DFD which gives an overview of the system
Description : DML is provided for (A) Description of logical structure of database. (B) Addition of new structures in the database system. (C) Manipulation & processing of database. (D) Definition of physical structure of database system.
Last Answer : C) Manipulation & processing of database.
Description : Is there a site that can tell the false rate of Bosch Security alarm and ADT security alarm?
Last Answer : Whether it is or not you should get to the bottom of it.
Description : How can I disable my home's ADT monitor?
Last Answer : Can you “pop” the cover off? If you get the faceplate off it might be obvious how to disable it. I’m good at breaking things. If you can post a pic it would be fab.
Description : ADT Burglar Alarms For House Security – A Brief Guide ?
Last Answer : House security is one of the first things you need to take care of when it comes to making contingency plans for the future. Good burglar alarms are a necessity nowadays, with rising crime rates. ... doing things right. For more details about ADT please log on to http://www.firsthomesecurity.co.uk
Description : How much does it cost to get an ADT security alarm?
Last Answer : For an ADT system, you can expect to pay around $99 for an install. The systems are usually "free". Monitoring is around $30 a month for both residential and commercial.
Description : Do I have to install my own ADT alarm?
Last Answer : With ADT, typically they'll be able to do the install for you. This is because they're monitored solutions, and they'll want to ensure they're properly set.
Description : Is the ADT home security company a reputable company for quick response ?
Last Answer : ADT is a reputable large national and international security company. Response time may vary in different areas. Look at reviews local to you to see if they will work for you.
Description : Acid dew point temperature (ADT) of a flue gas produced by the combustion of a fuel containing 1% sulphur may be about __________ °C. (A) 80 (B) 130 (C) 180 (D) 250
Last Answer : (B) 130
Description : What are the operations that can be performed on Files?
Last Answer : Ans: Following operations can be performed on files1. Creation of a file of a specific type. 2. Reading/processing a file. 3. Append/add information to a file. 4. Modify/edit data in a file. 5. Delete items in a file. 6. Update the file.
Description : Explain the basic operations of a computer.
Last Answer : Input Operation: A computer works in the light of instructions (input) given to it. Input is given by a user using keyboard or mouse. The input is stored in memory for further processing. ... on the monitor or print it on paper. Results can also be saved on hard disk for future use.
Description : State true or false. i) comparisons precede logical operations in java ii) assignment operations succeed increment operations iii) arithmetic operations succeed comparisons iv) x precede + A) i-true, ii-true, iii-false, ... false, ii-true, iii-false, iv-false D) i-true, ii-false, iii-false, iv-true
Last Answer : A) i-true, ii-true, iii-false, iv-true
Description : Which of the following operations can be performed by using FTP. i) Connect to a remote host ii) Select directory iii) Define the transfer mode iv) List file available A) i, and ii only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii and iv
Last Answer : C) ii, iii and iv only
Description : Consider the situation in which assignment operation is very costly. Which of the following sorting algorithm should be performed so that the number of assignment operations is minimized in general? a) Insertion sort b) Selection sort c) Heap sort d) None
Last Answer : b) Selection sort
Description : Which of the following statement(s) is(are) true? I. Two successive translations are additive. II. Two successive rotations are additive. III. Two successive scaling operations are multiplicative. (A) I and II (B) I and III (C) II and III (D) All the above.
Last Answer : (D) All the above.
Description : A byte addressable computer has a memory capacity of 2 m Kbytes and can perform 2 n operations. An instruction involving 3 operands and one operator needs a maximum of (A) 3m bits (B) m + n bits (C) 3m + n bits (D) 3m + n + 30 bits
Last Answer : (D) 3m + n + 30 bits
Description : Which of the following is true ? I. Implementation of self-join is possible in SQL with table alias. II. Outer-join operation is basic operation in relational algebra. III. Natural join and outer join operations are ... (B) II and III are correct. (C) Only III is correct. (D) Only I is correct.
Last Answer : (D) Only I is correct.
Description : To determine the efficiency of an algorithm the time factor is measured by: (A) Counting micro seconds (B) Counting number of key operations (C) Counting number of statements (D) Counting kilobytes of algorithm
Last Answer : (B) Counting number of key operations
Description : Loop unrolling is a code optimization technique: (A) that avoids tests at every iteration of the loop (B) that improves performance by decreasing the number of instructions in a basic block. ... loops with outer loops (D) that reorders operations to allow multiple computations to happen in parallel.
Last Answer : (A) that avoids tests at every iteration of the loop
Description : A scheduling Algorithm assigns priority proportional to the waiting time of a process. Every process starts with priority zero (lowest priority). The scheduler re-evaluates the process priority for every 'T' time ... (A) Priority scheduling (B) Round Robin Scheduling (C) Shortest Job First (D) FCFS
Last Answer : (B) Round Robin Scheduling
Description : Consider the following operations performed on a stack of size 5: Push(a); Pop(); Push(b); Push(c); Pop(); Push(d); Pop(); Pop(); Push(e); Which of the following statements is correct? (A) Underflow occurs (B) Stack operations are performed smoothly (C) Overflow occurs (D) None of the above
Last Answer : (B) Stack operations are performed smoothly
Description : compiler optimization, operator strength reduction uses mathematical identities to replace slow math operations with faster operations. Which of the following code replacements is an illustration of operator strength reduction? (A) Replace P + ... * P or Replace 3 + 4 by 7. (B) Replace P * 32 by P
Last Answer : (B) Replace P * 32 by P
Description : Which of the following logic operations is performed by the following given combinational circuit ? (A) EXCLUSIVE-OR (B) EXCLUSIVE-NOR (C) NAND (D) NOR
Last Answer : (A) EXCLUSIVE-OR
Description : Which of the following is the most efficient to perform arithmetic operations on the numbers? (A) Sign-magnitude (B) 1’s complement (C) 2’s complement (D) 9’s complement
Last Answer : (C) 2’s complement
Description : Red-black trees are one of many Search tree schemes that are "balanced” in order to guarantee that basic dynamic-set operations take ............. time in the worst case. (1) O(1) (2) O(log n) (3) O(n) (4) O(n log n)
Last Answer : (2) O(log n)
Description : The Unix Kernel maintains two key data structures related to processes, the process table and the user structure. Which of following information is not the part of user structure? (A) File descriptor table (B) System call state (C) Scheduling parameters (D) Kernel stack
Last Answer : (C) Scheduling parameters
Description : ………… enable us to hide, inside the object, both the data fields and the methods that act on that data. A) Encapsulation B) Polymorphism C) Inheritance D) Overloading
Last Answer : A) Encapsulation
Description : …………… is a way to bind the data and its associated functions together which allows the data and functions to be hidden. A) Structure B) Class C) Enum D) Both A and B
Last Answer : B) Class
Description : ………………. is responsible for all aspects of data processing, operation research, organization and method, system analysis and design investments. A) Management Services Director B) Data Processing Manager C) Computer Manager D) Both B and C
Last Answer : A) Management Services Director
Description : A data flow can A) Only a data store B) Only leave a data store C) Enter or leave a data Store D) Either enter or leave a data store but not both
Last Answer : C) Enter or leave a data Store
Description : A data flow can A) Only emanate from an external entity B) Only terminate in an external entity C) May emanate and terminate in an external entity D) May either emanate or terminate in an external entity but not both
Last Answer : C) May emanate and terminate in an external entity
Description : In FDDI, data normally travel on .................. A) The primary ring B) The Secondary ring C) Both rings D) Neither ring
Last Answer : A) The primary ring
Description : What is the data type of (1)? a) Tuple b) Integer c) List d) Both tuple and integer
Last Answer : b) Integer
Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.
Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.
Description : Superficially the term object-oriented , means that, we organize software as a (A) collection of continuous objects that incorporates both data structure and behaviour. (B) collection of ... and behaviour. (D) collection of objects that incorporates both discrete data structure and behaviour.
Last Answer : (C) collection of discrete objects that incorporates both data structure and behaviour.
Description : Given the following statements: (a) Strategic value of data mining is time stamping (b) Information collection is an expensive process in building an expert system. Which of the following options is correct ? (A) Both (a) and (b) ... true (C) (a) is true, (b) is false (D) (a) is false, (b) is true
Last Answer : (B) Both (a) and (b) are true
Description : Consider the following two statements : (a) Data scrubling is a process to upgrade the quality of data, before it is moved into Data warehouse. (b) Data scrubling is a process of rejecting data from data warehouse to create ... true (C) Both (a) and (b) are false (D) Both (a) and (b) are true
Last Answer : (A) (a) is true, (b) is false
Description : Consider the following two statements: (a) Business intelligence and Data warehousing is used for forecasting and Data mining. (b) Business intelligence and Data warehousing is used for analysis of large volumes of sales data. Which one ... C) (a) is false, (b) is true (D) Both (a) and (b) are false
Description : Which of the following statement(s) is/are TRUE with regard to software testing? I. Regression testing technique ensures that the software product runs correctly after the changes during maintenance. II. Equivalence partitioning is a ... (1) only I (2) only II (3) both I and II (4) neither I nor II
Last Answer : (1) only I
Description : The part of a processor which contains hardware necessary to perform all the operations required by a computer: a) Data path b) Controller c) Registers d) Cache
Last Answer : Answer: a Explanation: A processor is a part of the computer which does all the data manipulation and decision making. A processor comprises of: A data path which contains the hardware necessary to ... the data path what needs to be done. The registers act as intermediate storage for the data
Description : What are the ways of storing data in Files?
Last Answer : Ans: There are two ways of storing data in files 1. Text Format- In text format data is stored as a line of character with each line terminated by a new line character ( \n'). Text files ... different on different machine. In text format , these problem do not arise,and hence it is more portable.
Description : Name the primitive data-types in java.
Last Answer : A: byte, short, int, long, float, double, char and boolean
Description : What is Data Abstraction? How is it implemented in Java?
Last Answer : A: Act of representing only essential features without including its background details is called Abstraction. Data Abstraction can also be defined as the process of hiding the implementation details and showing ... Java, it is implemented by the use of interfaces or by making the class abstract.
Description : Which command is used to sort the lines of data in a file in reverse order A. sort B. sh C. st D. sort -r E. None of the above
Last Answer : D. sort -r