…………… can be defined as data that has been processed into a form that is meaningful to the  recipient and is of real or perceived value in current or prospective decisions. A) Information
B) Data collection
C) Internal data
D) Sample data

1 Answer

Answer :

A) Information

Related questions

Description : ………… can be defined as data that has been processed into a form that is meaningful to the recipient and is of real or perceive value in current or prospective decisions. A) System B) Information C) Technology D) Service

Last Answer : B) Information

Description : “Information helps us in taking decisions”. What should be the characteristics of processed data in order to take meaningful decision? -Technology

Last Answer : For the decision to be meaningful, the processed data (or information) must have the following characteristics:1. Time Information should be available when required.2. Accuracy Information should be accurate.3. Completeness Information should be complete in every aspect.

Description : ................. is subject oriented, integrated, time variant, non-volatile collection of data in support of management decisions. (A) Data mining (B) Web mining (C) Data warehouse (D) Database Management System

Last Answer : (C) Data warehouse

Description : The Prototyping model of software development is: (1) a reasonable approach when requirements are well-defined. (2) a useful approach when a customer cannot define requirements clearly. (3) the ... projects with large development teams. (4) a risky model that rarely produces a meaningful product.

Last Answer : 1

Description : ……………. Can be defined as the permanent blocking of a set of processed that either complete for system resources or communicate with each other. A) Deadlock B) Permanent lock C) Starvation D) Mutual exclusion

Last Answer : A) Deadlock

Description : Processed data is called ……………….. A) Raw data B) Information C) Useful data D) Source

Last Answer : B) Information

Description : Given the following statements: (a) Strategic value of data mining is time stamping (b) Information collection is an expensive process in building an expert system. Which of the following options is correct ? (A) Both (a) and (b) ... true (C) (a) is true, (b) is false (D) (a) is false, (b) is true

Last Answer :  (B) Both (a) and (b) are true

Description : Which of the following provides the best description of an entity type? (A) A specific concrete object with a defined set of processes (e.g. Jatin with diabetes) (B) A value given to a ... template for a group of things with the same set of characteristics that may exist in the real world

Last Answer : Answer: D

Description : Serial access memories are useful in applications where (A) Data consists of numbers (B) Short access time is required. (C) Each stored word is processed differently. (D) None of these

Last Answer : (D) None of these Explanation: data naturally needs to flow in and out in serial form.

Description : For taking decisions, data must be (a) very accurate (b) massive (c) processed correctly -Technology

Last Answer : (c) For taking decisions, data must be processed and manipulated correctly.

Description : Which one of the following statements is correct? (A) The function of an information system is to improve one s ability to make decisions (B) The information system is the chain of operations ... , analysed data, its stored information is suitability used in making decisions (D) All the above

Last Answer : Answer: Option D

Description : A thread is usually defined as a light weight process because an Operating System (OS) maintains smaller data structure for a thread than for a process. In relation to this, which of the following ... separate stack for each thread. (D) OS does not maintain virtual memory state for each thread.

Last Answer : (B) OS maintains only CPU registers for each thread.

Description : For a weak entity set to be meaningful, it must be associated with another entity set in combination with some of their attribute values, is called as : (A) Neighbour Set (B) Strong Entity Set (C) Owner entity set (D) Weak Set

Last Answer : (C) Owner entity set 

Description : ……………… is a tabular method for describing the logic of the decisions to be taken. A) Decision tables B) Decision tree C) Decision Method D) Decision Data

Last Answer : A) Decision tables

Description : The subject matter of an assurance engagement may include I. Historical or prospective financial information II. Internal controls III. Compliance with regulation a. I and II only b. I and III only c. II and III only d. I, II, and II

Last Answer : I, II, and II

Description : The Software Maturity Index (SMI) is defined as SMI = [Mf - (Fa + Fc + Fd)] / Mf Where Mf = the number of modules in the current release. Fa = the number of modules in the current release that have ... (A) SMI approaches 1 (B) SMI approaches 0 (C) SMI approaches -1 (D) None of the above

Last Answer : (A) SMI approaches 1 

Description : The retrieval of information from the computer is defined as 1) collection of data 2) data retrieval operations 3) output 4) data output collection

Last Answer : 3) output

Description : In RDBMS, Data is presented as a collection of ............ A) Table B) Attributes C) Relations D) Entities

Last Answer : C) Relations

Description : Images tend to be very large collection of data. The size of memory required for a 1024 by 1024 image in which the colour of each pixel is represented by a n-bit number, (in an 8 bit machines) is (A) n × 8 MB (B) n / 8 MB (C) (1024 × 1024) / 8 MB (D) 1024 MB

Last Answer : (B) n / 8 MB

Description : Superficially the term object-oriented , means that, we organize software as a (A) collection of continuous objects that incorporates both data structure and behaviour. (B) collection of ... and behaviour. (D) collection of objects that incorporates both discrete data structure and behaviour.

Last Answer : (C) collection of discrete objects that incorporates both data structure and behaviour.

Description : Which computer memory is used for storing programs and data currently being processed by the CPU? A) Mass memory B) Internal memory C) Non-volatile memory D) PROM

Last Answer : Answer : B

Description : Which computer memory is used for storing programs and data currently being processed by the CPU? a) Mass memory b) Internal memory c) Non-volatile memory d) PROM e) None of these

Last Answer : b) Internal memory

Description : Which computer memory is used for storing programs and data currently being processed by the CPU? a. Mass memory b. Internal memory c. Non-volatile memory d. PROM

Last Answer : b. Internal memory

Description : Which computer memory is used for storing programs and data currently being processed by the CPU? a. Mass memory b. Internal memory c. Non-volatile memory d. PROM

Last Answer : b. Internal memory

Description : The data collection for national income estimation is conducted in India by— (1) The Finance Ministry of the Government of India (2) The RBI (3) The NSSO (National Sample Survey Organization (4) None of these

Last Answer : (3) The NSSO (National Sample Survey Organization Explanation: The National Sample Survey Office (NSSO) in India is a unique setup to carry out surveys on socioeconomic, demographic, agricultural ... of India for collection of statistical data in the areas which are vital for developmental planning.

Description : Which sequence of research steps is logical in the list given below? (A) Problem formulation, Analysis, Development of Research design, Hypothesis making, Collection of data, Arriving ... sample and data collection tools Formulation of hypothesis, Collection and interpretation of research evidence

Last Answer : (C) Problem formulation, Hypothesis making, Development of a Research design, Collection of a Data; Data analysis and formulation of generalizations and conclusions. 

Description : In qualitative research paradigm, which of the following features may be considered critical? (A) Data collection with standardised research tools. (B) Sampling design with probability sample techniques ... evidences. (D) Data gathering to take with top-down systematic evidences.

Last Answer : (C) Data collection with bottom-up empirical evidences.

Description : Which of the following sources of data is not based on primary data collection? (A) Census of India (B) National Sample Survey (C) Statistical Abstracts of India (D) National Family Health Survey

Last Answer : (C) Statistical Abstracts of India

Description : The data collection for national income estimation is conducted in India by— (1) The Finance Ministry of the Government of India (2) The RBI (3) The NSSO (National Sample Survey Organi-sation) (4) None of these

Last Answer : The NSSO (National Sample Survey Organi-sation)

Description : Data input is A) an abstract class defined in java.io B) a class we can use to read primitive data types C) an interface that defines methods to open files. D) an interface that defines methods to read primitive data types.

Last Answer : D) an interface that defines methods to read primitive data types.

Description : Data input is A) an abstract class defined in java.io B) a class we can use to read primitive data types C) an interface that defines methods to open files. D) an interface that defines methods to read primitive data types.

Last Answer : D) an interface that defines methods to read primitive data types.

Description : State true or false for Java Program. i) Data members of an interface are by default final ii) An abstract class has implementations of all methods defined inside it. A) i-false, ii-false B) i-false, ii-true C) i-true, ii-false D) i-true, ii-true

Last Answer : C) i-true, ii-false

Description : A structure brings together a group of A) items of the same data type B) related data items and variables C) integers with user defined names D) floating points with user defined names

Last Answer : B) related data items and variables

Description : …………… can be defined as most recent and perhaps the most comprehensive technique for solving computer problems. A) System Analysis B) System Data C) System Procedure D) System Record

Last Answer : A) System Analysis

Description : 8. Who defined Operations Research as an aid for the executive in marketing his decisions by providing him with the quantitative information based on the scientific method of analysis? a. C. Kitte b. H.M. Wagner c. E.L. Arnoff d. None of the above

Last Answer : a. C. Kitte

Description : Information can be categorized into ……………. 1. Environmental information 2. Competitive information 3. Government information 4. Internal information A) 1, 2 & 3 B) 1, 2 & 4 C) 2, 3 & 4

Last Answer : B) 1, 2 & 4

Description : A Boolean operator Ө is defined as follows: 1Ө1=1, 1Ө0=0, 0Ө1=0 and 0Ө0=1 What will be the truth value of the expression (xӨy)Өz = xӨ(yӨz)? (A) Always false (B) Always true (C) Sometimes true (D) True when x, y, z are all true

Last Answer : (B) Always true

Description : Compute the value of adding the following two fuzzy integers: A = {(0.3,1), (0.6,2), (1,3), (0.7,4), (0.2,5)} B = {(0.5,11), (1,12), (0.5,13)} Where fuzzy addition is defined as μA+B(z) = maxx+y=z (min(μA(x), μB( ... ,18)} (D) {(0.3,12), (0.5,13), (0.6,14), (1,15), (0.7,16), (0.5,17), (0.2,18)}

Last Answer : (D) {(0.3,12), (0.5,13), (0.6,14), (1,15), (0.7,16), (0.5,17), (0.2,18)} 

Description : A recursive function h, is defined as follows: h(m)=k, if m=0  = 1, if m=1 = 2h(m-1) + 4h(m-2), if m≥2 If the value of h(4) is 88 then the value of k is: (1) 0 (2) 1 (3) 2 (4) -1

Last Answer : (3) 2 

Description : If h is chosen from a universal collection of hash functions and is used to hash n keys into a table of size m, where n ≤ m, the expected number of collisions involving a particular key K is (A) less than 1 (B) less than lg n (C) greater than 1 (D) greater than lg n

Last Answer : (A) less than 1

Description : If h is chosen from a universal collection of hash functions and is used to hash n keys into a table of size m, where n≤m, the expected number of collisions involving a particular key x is less than ................... (1) 1 (2) 1/n (3) 1/m (4) n/m

Last Answer : Answer: 1

Description : _____ is processed by the computer into information 1) Number 2) Data 3) Picture 4) None of these

Last Answer : 2) Data

Description : Which of the following factors would most likely cause a CPA to decide not to accept a new audit engagement? a. The CPA's lack of understanding of the prospective client's internal auditor's ... . d. Management's refusal to permit the CPA to perform substantive tests before the year-end.

Last Answer : Management’s disregard of its responsibility to maintain an adequate internal control environment

Description : The subject matter of an assurance engagement can take the following forms except a. The entity’s internal control. b. Historical or prospective financial statements. c. Evaluation of a capital investment proposal. d. Performance of an entity that could indicate efficiency and effectiveness

Last Answer : Evaluation of a capital investment proposal.

Description : The processed form of data is called information. Describe the further refinement of term information. -Technology

Last Answer : Information after being transformed into some conceptual framework, so that it can be manipulated and used cognitively, is called knowledge.

Description : A steady state within the body is termed a) Homeostasis. When a change occurs that causes a body function to deviate from its stable range, processes are initiated to restore and maintain ... that is perceived as challenging, threatening, or damaging to the person's dynamic balance or equilibrium.

Last Answer : a) Homeostasis. When a change occurs that causes a body function to deviate from its stable range, processes are initiated to restore and maintain the steady state or homeostasis.

Description : Linda and George are caught up in the fitness craze and are looking for a health club to join. This purchase is likely to be affected by __________ involvement. A)low B)internal C)enduring D)evoked E)perceived

Last Answer : C)enduring

Description : Point out the wrong statement. a) A MapReduce job usually splits the input data-set into independent chunks which are processed by the map tasks in a completely parallel manner b) The ... implement the Mapper and Reducer interfaces toprovide the map and reduce methods d) None of the mentioned

Last Answer : None of the mentioned

Description : Interrupt which arises from illegal or erroneous use of an instruction or data is (A) Software interrupt (B) Internal interrupt (C) External interrupt (D) All of the above

Last Answer : (B) Internal interrupt