The characteristics of well designed system are  
a) Practical b) Effective c) Secure d) Reliable e) Flexible f) Economical A) a, b, c and d
B) a, c, d and e
C) a, b, c, d and e
D) a, b, c, d, e and f

1 Answer

Answer :

D) a, b, c, d, e and f

Related questions

Description : Which is the most practical and economical method for removal of suspended solid matter from polluted water? (A) Sedimentation (B) Skimming off (C) Chlorination (D) Biological oxidation

Last Answer : (A) Sedimentation

Description : The key considerations involved in the feasibility analysis is include i) Economical ii) Technical iii) Behavioral iv) Personal A) i, ii, iv B) i, ii, iii C) ii, iii, iv D) All of the above

Last Answer : B) i, ii, iii

Description : What advantage is there for an enterprise to adopt a virtual private cloud model? A. Reduce costs by adopting a flexible pricing model for the entire operation. B. Reduce infrastructure ... such as security and performance since the entire infrastructure will be managed within the IT department.

Last Answer : Manage sensitive data in a compliant and secure manner and benefit from flexible pricing models for select services or infrastructure.

Description : Manual order processing A)allows the integration of order processing and production planning. B)is flexible in special situations. C)is practical for a large volume of orders. D)is the most widely used form of order processing.

Last Answer : D)is the most widely used form of order processing.

Description : In what way is a file more flexible than a String?

Last Answer : Ans: A file is stored permanently in a storage device.It is easy to access a file whenever required. On the other hand, a string is stored temporarily in RAM, and the contents of a string will be erased automatically when the power is switched off or when the program execution is terminated.

Description : Which one of the following is not a software myth? (A) Once we write the program and get it to work, our job is done. (B) Project requirements continually change, but ... not understand how to control software projects internally, it will invariably struggle when it outsources software projects.

Last Answer : (D) If an organization does not understand how to control software projects internally, it will invariably struggle when it outsources software projects.

Description : new to area which trash pick up company is the most economical and reliable in tucson /oro valley az?

Last Answer : Information about trash pick up companies in Tuscon can be viewed at http://www.superpages.com/yellowpages/C-Trash+Removal/S-AZ/T-Tucson/

Description : A ………………. is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection. A) VNP B) VPN C) VSN D) VSPN

Last Answer : B) VPN

Description : A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as ……………… A) Chock point B) meeting point C) firewall point D) secure point

Last Answer : A) Chock point

Description : channel is said to be of most economical cross-section, if (A) It gives maximum discharge for a given cross-sectional area and bed slope (B) It has minimum wetted perimeter (C) It involves lesser excavation for the designed amount of discharge (D) All of the above

Last Answer : Answer: Option D

Description : By an external entity we mean a A) Unit outside the system being designed which can be controlled by an analyst. B) Unit outside the system whose behavior is independent of the system being designed C) A unit external to the system being designed D) A unit which is not part of a DFD

Last Answer : C) A unit external to the system being designed

Description : Has anyone heard of PushPay? Is it secure and reliable enough?

Last Answer : answer:Yes, I have used them. Yes, they seem safe (my transaction went through without hassle). However, I generally use Popmoney, because Popmoney seems more versatile and you can send money to anyone, not just businesses.

Description : What's the best way to secure reliable transportation around New Delhi for a month?

Last Answer : Hire a car and driver. There is no comparison.

Description : WhoPlease tell me the most reliable,anonymous and secure hosting?

Last Answer : there is a great service, anonymous, verified and secure. The link is in my profile in the biography. Remove the spaces and go through it, you will be given a 25% discount. 100% not spam, competent support, they will explain and show everything, personally our network of corporations uses it !!!

Description : How to choose a reliable and practical gas analyzer?

Last Answer : When working in a number of cases, it becomes necessary to clarify the qualitative and general quantitative composition of various gas mixtures. In such situations, it is necessary to use special ... choosing such a technique, you can be sure of its ultimate reliability, accuracy and durability.

Description : To pump water from a water reservoir 3 m deep and maximum water level at 135 m, a pump is  installed to lift water up to R.L. 175 m at a constant rate of 36,00,000 litres per hour. If the length  of the ... the water horse power of the pump is  (A) 400  (B) 450  (C) 500 (D) 600

Last Answer : (D) 600

Description : In order to secure power following Vladimir Lenin and acutes death Joseph Stalin instituted policies designed to?

Last Answer : What is the answer ?

Description : Looking for a economical and effective trade show or exhibit organizer?

Last Answer : Trade shows are NOT cheap. Good ones can cost thousands of dollars. Try viral or web information. Youtube or low cost public relations maybe better. What was your business plan for expenses the first year?

Description : . …………………….. is a form of virus explicitly designed to hide itself from detection by antivirus software. A) Stealth virus B) Polymorphic Virus C) Parasitic Virus D) Macro Virus

Last Answer : A) Stealth virus

Description : The …………………………. Is a collection of protocols designed by Internet Engineering Task Force(IETF) to provide security for a packet at the Network level. A) IPsec B) Netsec C) Packetsec D) Protocolsec

Last Answer : A) IPsec

Description : ............... model is designed to bring prices down by increasing the number of customers who buy a particular product at once. (A) Economic Order Quantity (B) Inventory (C) Data Mining (D) Demand-Sensitive Pricing

Last Answer : (D) Demand-Sensitive Pricing

Description : Which of the following statement(s) with regard to an abstract class in JAVA is/are TRUE? I. An abstract class is one that is not used to create objects. II. An abstract class is designed only to act as a base class ... by other classes. (1) Only l (2) Only II (3) Neither I nor II (4) Both l and II

Last Answer : Both l and II

Description : Consider a system with seven processes A through G and six resources R through W. Resource ownership is as follows: process A holds R and wants T process B holds nothing but wants T process C holds nothing but wants S process D holds U ... No (B) Yes, A, B, C (C) Yes, D, E, G (D) Yes, A, B, F

Last Answer : (C) Yes, D, E, G

Description : Component F in the illustrated device is for _________. EL-0033 A. short circut protection B. latching the trip unit closed after resetting the breaker C. overload protection D. providing a flexible connection between the input terminal G and the tripping unit E

Last Answer : Answer: C

Description : Which of the following provides the best description of an entity type? (A) A specific concrete object with a defined set of processes (e.g. Jatin with diabetes) (B) A value given to a ... template for a group of things with the same set of characteristics that may exist in the real world

Last Answer : Answer: D

Description : Which of the following commands is used to display the directory attributes rather than its contents? A. ls -l -d B. ls -l C. ls -x D. ls -F E. None of the above

Last Answer : A. ls -l -d

Description : What is the output of the following? x = "abcdef" i = "i" while i in x: print(i, end=" ") a) no output b) i i i i i i … c) a b c d e f

Last Answer : a) no output

Description : What is the output of the following? x = "abcdef" while i in x: print(i, end=" ") a) a b c d e f b) abcdef c) i i i i i i … d) error

Last Answer : d) error

Description : The reverse polish notation equivalent to the infix expression ((A + B) * C + D)/(E + F + G) (A) A B + C * D + EF + G + / (B) A B + C D * + E F + G + / (C) A B + C * D + E F G + +/ (D) A B + C * D + E + F G + /

Last Answer : (A) A B + C * D + EF + G + /

Description : Convert the following infix expression into its equivalent post fix expression (A + B^ D) / (E – F) + G (A) ABD^ + EF – / G+ (B) ABD + ^EF – / G+ (C) ABD + ^EF / – G+ (D) ABD^ + EF / – G+

Last Answer : (A + B^ D) / (E – F) + G

Description : Given the symbols A, B, C, D, E, F, G and H with the probabilities 1/30, 1/30, 1/30, 2/30, 3/30, 5/30, 5/30 and 12/30 respectively. The average Huffman code size in bits per symbol is: (A) 67/30 (B) 70/34 (C) 76/30 (D) 78/30

Last Answer : (C) 76/30

Description : In the following graph, discovery time stamps and finishing time stamps of Depth First Search (DFS) are shown as x/y where x is discovery time stamp and y is finishing time stamp.  It shows which of the following depth first forest? (A ... {a,b,e} {f,g} {c,d} {h} (D) {a,b,c,d} {e,f,g} {h}

Last Answer : Answer: A

Description : A relation R={A,B,C,D,E,F,G} is given with following set of functional dependencies: F={AD→E, BE→F, B→C, AF→G} Which of the following is a candidate key? (A) A (B) AB (C) ABC (D) ABD

Last Answer : Answer: D

Description : Let R be the rectangular window against which the lines are to be clipped using 2D Sutherland-Cohen line clipping algorithm. The rectangular window has lower left-hand corner at (-5,1) and upper righthand corner at (3,7). ... s) is/are candidate for clipping? (A) AB (B) CD (C) EF (D) AB and CD

Last Answer : (D) AB and CD

Description : The seven elements A, B, C, D, E, F and G are pushed onto a stack in reverse order, i.e., starting from G. The stack is popped five times and each element is inserted into a queue. Two elements are deleted from the queue and pushed ... The popped item is ................... (1) A (2) B (3) F (4) G

Last Answer : Answer: 2

Description : California Bearing Ratio method of designing flexible pavements is more accurate as it involves (A) Characteristics of soils (B) Traffic intensities (C) Character of the road making materials (D) None of these

Last Answer : Answer: Option C

Description : Advantages of system flowcharts …………………. A) Effective communication B) Effective analysis C) Queasier group or relationships D) All A, B, C

Last Answer : D) All A, B, C

Description : In a paging system, it takes 30 ns to search translation Look-aside Buffer (TLB) and 90 ns to access the main memory. If the TLB hit ratio is 70%, the effective memory access time is: (1) 48 ns (2) 147 ns (3) 120 ns (4) 84 ns

Last Answer : Answer: 2

Description : Is domain backordering an effective way to secure a domain when it expires?

Last Answer : It will be just as effective for you to check back several times a day yourself, as to use a service. they have no ‘inside’ that you don’t have. Pretend you want tickets to a popular concert, and just keep trying.

Description : An ordinal scale is used to rank order people, objects, or characteristics. a. True b. False

Last Answer : a. True

Description : Which of the following characteristics of constructor are true. i) They should be declared in the public section. ii) They are invoked automatically when the objects are created. iii) They do not have return type and void also. ... and v C) Only i, iii, iv and v D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : Which of the following is/ are the characteristics of friend function. A) It is not in the scope of the class to which it has been declared as friend. B) It can invoke like a normal function without the help of any object. C) Usually, it has the objects as arguments. D) All of the above.

Last Answer : D) All of the above.

Description : Which of the following is / are the Characteristics of information? A) Accuracy and Relevance B) Form of information and Timeliness C) Completeness and Purpose D) All A, B & C

Last Answer : B) Form of information and Timeliness

Description : Which of the following is true about the characteristics of abstract data types? i) It exports a type. ii) It exports a set of operations A) True, False B) False, True C) True, True D) False, False

Last Answer : C) True, True

Description : An actor in an animation is a small program invoked ............... per frame to determine the characteristics of some object in the animation. (A) once (B) twice (C) 30 times (D) 60 times

Last Answer : (A) once

Description : Which of the following is not one of three software product aspects addressed by McCall's software quality factors? (1) Ability to undergo change. (2) Adaptability to new environments. (3) Operational characteristics (4) Production costs and scheduling

Last Answer : Answer: 4

Description : In a queue, the initial values of front pointer f rare pointer r should be ….. and …….. respectively. A) 0 and 1 B) 0 and -1 C) -1 and 0 D) 1 and 0

Last Answer : B) 0 and -1

Description : ………………. First proposed the process of normalization. A) Edgar. W B) Edgar F. Codd C) Edward Stephen D) Edward Codd

Last Answer : B) Edgar F. Codd

Description : The age of Discontinuity‘ (1969) has been authored by A. John Drydon B. Cyril Debydeen C. Peter F. Drucker D. None of these

Last Answer : C. Peter F. Drucker