Data cannot flow between two data stores because
A) it is not allowed in DFD
B) a data store is a passive repository of data
C) data can get corrupted
D) they will get merged

1 Answer

Answer :

D) they will get merged

Related questions

Description : Data store in a DFD represents. A) a sequential file B) a disk store C) a repository of data

Last Answer : C) a repository of data

Description : A rectangle in a DFD represents A) a process B) a data store C) an external entity D) an input unit

Last Answer : C) an external entity

Description : DFD stands for A) Data Flow Document B) Data File Diagram C) Data Flow Diagram D) Non of the above

Last Answer : C) Data Flow Diagram

Description : External Entities may be a A) Source of input data only B) Source of input data or destination of results C) Destination of results only D) Repository of data

Last Answer : B) Source of input data or destination of results

Description : Repository of information gathered from multiple sources, storing under unified scheme at a single site is called as (A) Data mining (B) Meta data (C) Data warehousing (D) Database

Last Answer : (C) Data warehousing

Description : A DFD is normally leveled as A) It is a good idea in design B) It is recommended by many experts C) it is easy to do it D) It is easier to read and understand a number of smaller DFDs than one large DFD

Last Answer : D) It is easier to read and understand a number of smaller DFDs than one large DFD

Description : A context diagram is used A) as the first step in developing a detailed DFD of a system B) in systems analysis of very complex systems C) as an aid to system design D) as an aid to programmer

Last Answer : A) as the first step in developing a detailed DFD of a system

Description : A context diagram A) Describes the context of a system B) is a DFD which gives an overview of the system C) is a detailed description of a system D) is not used in drawing a detailed DFD

Last Answer : B) is a DFD which gives an overview of the system

Description : By an external entity we mean a A) Unit outside the system being designed which can be controlled by an analyst. B) Unit outside the system whose behavior is independent of the system being designed C) A unit external to the system being designed D) A unit which is not part of a DFD

Last Answer : C) A unit external to the system being designed

Description : In a DFD external entities are represented by a A) Rectangle B) Ellipse C) Diamond shaped box D) Circle

Last Answer : A) Rectangle

Description : A data cannot flow between a store and i) a store ii) a process iii) an external entity A) i and iii B) i and ii C) ii and iii D) ii

Last Answer : A) i and iii

Description : A ________receivesa signal and,before it becomes too weak or corrupted, regenerates the original bit pattern. It thensends the refreshed signal. A) passive hub B) repeater C) bridge D) router

Last Answer : repeater

Description : In .............., the bodies of the two loops are merged together to form a single loop provided that they do not make any references to each other. (A) Loop unrolling (B) Strength reduction (C) Loop concatenation (D) Loop jamming

Last Answer : (D) Loop jamming

Description : Which of the following protocols is used by email server to maintain a central repository that can be accessed from any machine? (A) POP3 (B) IMAP (C) SMTP (D) DMSP

Last Answer : (B) IMAP

Description : To expand the number of its retail outlets in Ireland, the Dress Barn merged with a small chain of women's apparel stores in the West of Ireland. This type of integration is called: A)vertical. B)retail. C)horizontal. D)backward. E)forward.

Last Answer : C)horizontal

Description : In mapping of ERD to DFD a) entities in ERD should correspond to an existing entity/store in DFD b) entity in DFD is converted to attributes of an entity in ERD c) relations in ERD has 1 to 1 correspondence to processes in DFD d) relationships in ERD has 1 to 1 correspondence to flows in DFD

Last Answer : a) entities in ERD should correspond to an existing entity/store in DFD

Description : A data flow can A) Only a data store B) Only leave a data store C) Enter or leave a data Store D) Either enter or leave a data store but not both

Last Answer : C) Enter or leave a data Store

Description : How should I try to repair corrupted data?

Last Answer : answer:Thank you for the warning—- I have been leery of letting “Windows check for errors” and have always refused. I will continue to do so. What I have done with damaged files is try on different extensions and use “open with” and sometimes I come up lucky and save a bit here and there.

Description : Hamzah needs to email a large file to a classmate. Why might he need to use file compression to do so? A. Email services often only let you send compressed data files. B. Compressed files are ... . D. Email services often have maximum file sizes that prevent you sending files that are too large.

Last Answer : D. Email services often have maximum file sizes that prevent you sending files that are too large.

Description : MS-SQL stores data in a ........................ file format. A) .DAT B) .MDB C) .MSSQL D) .OBJ

Last Answer : A) .DAT

Description : A Network Schema (A) restricts to one to many relationship (B) permits many to many relationship (C) stores Data in a Database (D) stores Data in a Relation

Last Answer : (B) permits many to many relationship

Description : An attacker sits between customer and Banker, and captures the information from the customer and retransmits to the banker by altering the information. This attack is called as .............. (A) Masquerade Attack (B) Replay Attack (C) Passive Attack (D) Denial of Service Attack

Last Answer : (B) Replay Attack

Description : With regard to a word processing software, the process of combining static information in a publication together with variable information in a data source to create one merged publication is calle d( A) Electronic mail (B) Data sourcing (C) Mail merge (D) Spam mail

Last Answer : (C) Mail merge 

Description : Draw and explain Level 1 DFD for railway reservation system.

Last Answer : The passenger can initiate either Reservation process or Enquiry process; If a user opts for Reservation process then the system shall proceed with ticket generation process and same needs to ... enquiry module then appropriate request shall be entertain and result to be displayed to the user.

Description : In Unix operating system, special files are used to : (A) buffer data received in its input from where a process reads (B) provide a mechanism to map physical device to file names (C ... pointers associated with i-nodes (D) store information entered by a user application program or utility program

Last Answer : (B) provide a mechanism to map physical device to file names 

Description : Which of the following statements concerning Object-Oriented databases is FALSE? (A) Objects in an object-oriented database contain not only data but also methods for processing the data. (B ... Object-oriented databases store more types of data than relational databases and access that data faster.

Last Answer : (C) Object-oriented databases are more adapt at handling structures (analytical) data than relational databases.

Description : ………….. gives defining the flow of the data through and organization or a company or series of tasks that may or may not represent computerized processing. A) System process B) System flowchart C) System design D) Structured System

Last Answer : B) System flowchart

Description : The data Flow Diagram is the basic component of …………… system A) Conceptual B) Logical C) Physical

Last Answer : A) Conceptual

Description : A data flow can A) Only emanate from an external entity B) Only terminate in an external entity C) May emanate and terminate in an external entity D) May either emanate or terminate in an external entity but not both

Last Answer : C) May emanate and terminate in an external entity

Description : HELP! Why have literally ALL my MS Office documents become "corrupted" today?

Last Answer : answer:1. Calm down. 2. Reboot. 3. Re-evaluate. Whenever I get a problem like that such that everything is going wrong, then it's time to reboot first. Another thing to look at is ... newer versions of the software, or containing macros (for example) with library references that you don't have.

Description : When a document is corrupted?

Last Answer : I’m sorry. I don’t suppose you have it backed up on any other device, such as a flash drive?

Description : Is there any good software to recover a corrupted hard drive?

Last Answer : Try Recuva, that might work, or boot into a PArted MAgic CD

Description : How to fix corrupted FireFTP account information?

Last Answer : The password being asked is probably for FireFTP to connect to your server. Servers do require password authentication for security purposes. In the past, you had probably entered a password and instructed your ... on your profile. . . and you need Firefox installed on new machine to use FireFTP.

Description : After turning on the phone, I get a warning that the internal storage is damaged and is not available now. Unfortunately, I will not get further. I have two options, restart the phone or restore the factory data ... the phone or to throw it straight out the window? :)) Thank you for the advice .. :)

Last Answer : Need Answer

Description : How do you recover a corrupted file in Microsoft Excel?

Last Answer : When Microsoft Excel detects a corrupted workbook upon opening,it automatically starts File Recovery mode and attempts to repairthe workbook. If File Recovery mode doesn't start, try using thismanual ... able to recover your data, pick ExtractData to extract values and formulas from the workbook.

Description : How do you fix corrupted bios asus?

Last Answer : What is the answer ?

Description : Inthe _________ protocol weavoid unnecessary transmissionby sending only frames that are corrupted. A) Stop-and-Wait ARQ B) Go-Back-N ARQ C) Selective-Repeat ARQ D) none of the above

Last Answer : Selective-Repeat ARQ

Description : In Go-Back-N window, when the timer of the packet times out, several packets have to be resent even some may have arrived safe. Whereas in Selective Repeat window, the sender resends ___________ A ... lost B. Only those packets which are lost or corrupted C. Packet from starting D. All the packets

Last Answer : B. Only those packets which are lost or corrupted

Description : What parameter will you use to force the starting of your database with a corrupted resetlog?

Last Answer : ALLOW_RESETLOGS_CORRUPTION

Description : Negative feedback amplifier has a signal corrupted by noise as its input. The amplifier will   (A) Amplify the noise as much as the signal (B) Reduce the noise (C) Increase the noise (D) Not effect the noise

Last Answer : Negative feedback amplifier has a signal corrupted by noise as its input. The amplifier will Reduce the noise

Description : Which of the following is allowed in a C Arithmetic Instruction? A) [ ] B) { } C) ( ) D) None of the above

Last Answer : C) ( )

Description : Consider an undirected graph G where self-loops are not allowed. The vertex set of G is {(i, j) | 1 ≤ i ≤ 12, 1 ≤ j ≤ 12}. There is an edge between (a, b) and (c, d) if |a – c| ≤ 1 or |b–d| ≤ 1. The number of edges in this graph is (A) 726 (B) 796 (C) 506 (D) 616

Last Answer : (D) 616

Description : SQL server stores index information in the ………… system table A) systindexes B) systemindexes C) sysind D) sysindexes

Last Answer : D) sysindexes

Description : The Unix command: $ vi file1 file2 (A) Edits file1 and stores the contents of file1 in file2 (B) Both files i.e. file1 and file2 can be edited using ex' command to travel between files (C) Both ... using the mv' command to move between the files (D) Edits file1 first, saves it and the edits file2

Last Answer : (B) Both files i.e. file1 and file2 can be edited using ‘ex’ command to travel between files

Description : What is the function of following UNIX command? WC - lb& (A) It runs the word count program to count the number of lines in its input, a, writing the result to b, as a foreground process. (B) It runs ... (D) It copies the l ' numbers of lines of program from file, a, and stores in file b.

Last Answer : (B) It runs the word count program to count the number of lines in its input, a, writing the result to b, but does it in the background.

Description : The Register that stores all interrupt requests is: (A) Interrupt mask register (B) Interrupt service register (C) Interrupt request register (D) Status register

Last Answer : (C) Interrupt request register