………… system consists of programs, data files and documentation
A) Conceptual
B) Logical
C) Physical
D) None of the above

1 Answer

Answer :

C) Physical

Related questions

Description : The data Flow Diagram is the basic component of …………… system A) Conceptual B) Logical C) Physical

Last Answer : A) Conceptual

Description : A ……………… system in no more than idea. A) Conceptual B) Logical C) Physical D) None

Last Answer : A) Conceptual

Description : A …………. System is no more than idea A) Conceptual B) Logical C) Physical D) All of the above

Last Answer : A) Conceptual

Description : Manager's salary details are to be hidden from Employee Table. This Technique is called as (A) Conceptual level Datahiding (B) Physical level Datahiding (C) External level Datahiding (D) Logical level Datahiding

Last Answer : (C) External level Datahiding

Description : A memory management system has 64 pages with 512 bytes page size. Physical memory consists of 32 page frames. Number of bits required in logical and physical address are respectively: (1) 14 and 15 (2) 14 and 29 (3) 15 and 14 (4) 16 and 32

Last Answer : (3) 15 and 14

Description : The view of total database content is (A) Conceptual view. (B) Internal view. (C) External view. (D) Physical View.

Last Answer : (A) Conceptual view.

Description : Set of programs which consists of full documentation. a) Software Package b) System Software c) Utility Software d) File package

Last Answer : Answer: a Explanation: It is called a software package. A software is nothing but a collection of programs. A software package can solve a specific problem or perform a specific type of job

Description : In Data mining, .............. is a method of incremental conceptual clustering. (A) STRING (B) COBWEB (C) CORBA (D) OLAD

Last Answer : (B) COBWEB

Description : Software consists of (A) Set of instructions + operating procedures (B) Programs + documentation + operating procedures (C) Programs + hardware manuals (D) Set of programs

Last Answer : (B) Programs + documentation + operating procedures

Description : In Unix operating system, special files are used to : (A) buffer data received in its input from where a process reads (B) provide a mechanism to map physical device to file names (C ... pointers associated with i-nodes (D) store information entered by a user application program or utility program

Last Answer : (B) provide a mechanism to map physical device to file names 

Description : The different types of tables maintained by the operating system are ............. A) memory, logical , I/O file B) memory, I/O, file, physical C) memory, I/O, file, process D) memory, logical, I/O, physical

Last Answer : C) memory, I/O, file, process

Description : DML is provided for (A) Description of logical structure of database. (B) Addition of new structures in the database system. (C) Manipulation & processing of database. (D) Definition of physical structure of database system.

Last Answer : C) Manipulation & processing of database.

Description : Which are the following is / are the level(s) of documentation? A) Documentation for management B) Documentation for user C) Documentation for data processing department D) All of the above

Last Answer : D) All of the above

Description : The conceptual model is (A) dependent on hardware. (B) dependent on software. (C) dependent on both hardware and software . (D) independent of both hardware and software.

Last Answer : (D) independent of both hardware and software.

Description : Which of the following is a knowledge representation technique used to represent knowledge about stereotype situation? (A) Semantic network (B) Frames (C) Scripts (D) Conceptual Dependency

Last Answer : (C) Scripts 

Description : Find the false statement: (A) The relationship construct known as the weak relationship type was defined by Dey, Storey & Barron (1999). (B) A weak relationship occurs when two ... Ternary, Quaternary and Quintary relationships are shown through a series of application scenario's and vignette's

Last Answer : (C) Conceptual model is not accurate representation of "Universe of interest".

Description : The four levels of Cloud Federation include a) Conceptual level, Logical level, Operational level, Infrastructural level b) Conceptual level, Service level, Operational level, Infrastructural ... level, Infrastructural level d) Security level, Logical level, Operational level, Infrastructural leve

Last Answer : Conceptual level, Logical level, Operational level, Infrastructural level

Description : .The __________ addresses the technical challenges involved in enabling heterogeneous cloud computing systems to interoperate seamlessly a) Logical and Operational Level b) Infrastructure Level c) None of the above d) Conceptual Level

Last Answer : Infrastructure Level

Description : Which of the following addresses is used to deliver a message to the correct application program running on a host? (A) Port (B) IP (C) Logical (D) Physical

Last Answer : (A) Port 

Description : Statement of scope and objectives, opportunities and performance criteria …………. A) Problem definition B) System analysis C) System Design D) Documentation

Last Answer : A) Problem definition

Description : ………………….. means coordinated effort, to communicate the information of the system written form. A) System documentation B) Resource required C) Development schedule D) User Document

Last Answer : A) System documentation

Description : The decision-making model consists of four styles: directive, analytic, behavioral and _______________. (a) Conceptual ; (b) Intuitive ; (c) Group interaction ; (d) Laggard

Last Answer : (a) Conceptual ;

Description : Consider a program that consists of 8 pages (from 0 to 7) and we have 4 page frames in the physical memory for the pages. The page reference string is :  1 2 3 2 5 6 3 4 6 3 7 3 1 5 3 6 3 4 2 4 3 4 5 ... to fill available page frames with pages): (A) 9 and 6 (B) 10 and 7 (C) 9 and 7 (D) 10 and 6

Last Answer : (B) 10 and 7

Description : A logical schema A) is the entire database B) is a standard way of organizing information into accessible parts. C) Describes how data is actually stored on disk. D) All of the above

Last Answer : B) is a standard way of organizing information into accessible parts.

Description : The third type of comment is used by a tool called .................. for automatic generation of documentation. A) Java commenting B) Java generator C) Java doc D) Java loc

Last Answer : C) Java doc

Description : The jdb is used to A) Create a jar archive B) Debug a java program C) Create C header file D) Generate java documentation

Last Answer : B) Debug a java program

Description : To create vehicle of information to provide evidence in the development process and to monitor the process. This is one of the objectives of A) Analysis B) Design C) Development D) Documentation

Last Answer : D) Documentation

Description : Which one of the following is not a step of requirement engineering ? (A) Requirement elicitation (B) Requirement analysts (C) Requirement design (D) Requirement documentation

Last Answer : (C) Requirement design

Description : Which of the following information about the UNIX file system is not correct? (A) Super block contains the number of i-nodes, the number of disk blocks, and the start of the list of free disk blocks. (B ... Each i-node is 256-bytes long. (D) All the files and directories are stored in data blocks. 

Last Answer : (C) Each i-node is 256-bytes long.

Description : In _______phase investigator transfers the relevant data from a venue out of physical or administrative control of the investigator to a controlled location F. Preservation phase G. Survey phase H. Documentation phase I. Reconstruction phase J. Presentation phase

Last Answer : G. Survey phase 

Description : In _______phase investigator transfers the relevant data from a venue out of physical or administrative control of the investigator to a controlled location A. Preservation phase B. Survey phase C. Documentation phase D. Reconstruction phase E. Presentation phase

Last Answer : B. Survey phase 

Description : Serial access memories are useful in applications where (A) Data consists of numbers (B) Short access time is required. (C) Each stored word is processed differently. (D) None of these

Last Answer : (D) None of these Explanation: data naturally needs to flow in and out in serial form.

Description : Listing of the date and time events, programs , equipment, test, malfunctions and corrections in communication system. A. File B. Documentation C. Reporting D. Log

Last Answer : D. Log

Description : What are the ways of storing data in Files?

Last Answer : Ans: There are two ways of storing data in files 1. Text Format- In text format data is stored as a line of character with each line terminated by a new line character ( \n'). Text files ... different on different machine. In text format , these problem do not arise,and hence it is more portable.

Description : Data input is A) an abstract class defined in java.io B) a class we can use to read primitive data types C) an interface that defines methods to open files. D) an interface that defines methods to read primitive data types.

Last Answer : D) an interface that defines methods to read primitive data types.

Description : Data input is A) an abstract class defined in java.io B) a class we can use to read primitive data types C) an interface that defines methods to open files. D) an interface that defines methods to read primitive data types.

Last Answer : D) an interface that defines methods to read primitive data types.

Description : It is better to use files than a DBMS when there are (A) Stringent real-time requirements. (B) Multiple users wish to access the data. (C) Complex relationships among data. (D) All of the above.

Last Answer : (B) Multiple users wish to access the data.

Description : Data Integrity control uses ................ (A) Upper and lower limits on numeric data. (B) Passwords to prohibit unauthorised access to files. (C) Data dictionary to keep the data (D) Data dictionary to find last access of data

Last Answer : (B) Passwords to prohibit unauthorised access to files.

Description : The review of unaudited financial statements consists of: a. Inquiry of management and analytical procedures. b. Inquiry of management and documentation of internal controls. c. Analytical ... and compliance with laws and regulations. d. Internal control evaluation and management representation.

Last Answer : Inquiry of management and analytical procedures

Description : A stored collection of information is: a) Documentation b) Database c) Files d) None of These

Last Answer : b) Database

Description : Computer software includes_______and their associated documentation: a) Computer Programs b) Libraries c) Both of the Above d) None of These

Last Answer : c) Both of the Above

Description : What error will be generated if a space is given between the logical AND operator (&&)? Will it be a compile-time or a run-time error?

Last Answer : Example: if(5>2 & & 6

Description : State true or false. i) comparisons precede logical operations in java ii) assignment operations succeed increment operations iii) arithmetic operations succeed comparisons iv) x precede + A) i-true, ii-true, iii-false, ... false, ii-true, iii-false, iv-false D) i-true, ii-false, iii-false, iv-true

Last Answer : A) i-true, ii-true, iii-false, iv-true

Description : .................. is a facility that allows programmers to address memory from a logical point of view, without regard to the main memory, physically available. A) Visual memory B) Real memory C) Virtual memory D) Secondary memory

Last Answer : C) Virtual memory

Description : Which of the following is not a logical database structure? A) Chain B) Network C) Tree D) Relational

Last Answer : A) Chain

Description : Which of the following is the logical topology? A) Bus B) Tree C) Star D) Both A and B

Last Answer : C) Star

Description : Which of the following statements is true? (1) The sentence S is a logical consequence of S1,..., Sn if and only if S1˄S2˄........˄Sn→S is satisfiable. (2) The sentence S is a logical consequence of ... S is a logical consequence of S1,..., Sn if and only if S1˄S2˄........˄Sn˄S is inconsistent.

Last Answer : The sentence S is a logical consequence of S1,..., Sn if and only if S1˄S2˄........˄Sn→S is valid.

Description : Design Phase consists of ……………………. 1. Identity the functions to be performed 2. Design the input/output and file design 3. Defining basic parameters for system design A) 1 & 2 B) 2 & 3 C) 1 & 3 D) 1, 2 & 3

Last Answer : D) 1, 2 & 3