Description : Thetwo most common digital services are ________ service and______. A) switched/56; switched/64 B) switched/56; DDS C) DDS; swiched 64 D) leased; out-of-band
Last Answer : switched/56; DDS
Description : An example of digital, rather than analog, communication is a. DDD b. DDS c. WATS d. DDT
Last Answer : DDS
Description : Data Integrity control uses ................ (A) Upper and lower limits on numeric data. (B) Passwords to prohibit unauthorised access to files. (C) Data dictionary to keep the data (D) Data dictionary to find last access of data
Last Answer : (B) Passwords to prohibit unauthorised access to files.
Description : Data which improves the performance and accessibility of the database are called: (A) Indexes (B) User Data (C) Application Metadata (D) Data Dictionary
Last Answer : (A) Indexes
Description : A software program that infers and manipulates existing knowledge in order to generate new knowledge is known as: (A) Data Dictionary (B) Reference Mechanism (C) Inference Engine (D) Control Strategy
Last Answer : (C) Inference Engine
Description : From the given data below: a b b a a b b a a b which one of the following is not a word in the dictionary created by LZ-coding (the initial words are a, b)? (1) a b (2) b b (3) b a (4) b a a b
Last Answer : (4) b a a b
Description : ____ is a data-centric middleware standard for device-to-device and machine-to-machine communication. A. Data Distribution Serviced (DDS) B. Advance Message Queuing Protocol (AMQP) C. Extensible Messaging and Presence Protocol (XMPP) D. Message Queue Telemetry Transport (MQTT)
Last Answer : A. Data Distribution Serviced (DDS)
Description : What is the output of the following code? a={1:"A",2:"B",3:"C"} print(a.setdefault(3)) a) {1: ‘A’, 2: ‘B’, 3: ‘C’} b) C c) {1: 3, 2: 3, 3: 3} d) No method called setdefault() exists for dictionary
Last Answer : b) C
Description : Which of the following is not a declaration of the dictionary? a) {1: ‘A’, 2: ‘B’} b) dict([[1,”A”],[2,”B”]]) c) {1,”A”,2”B”} d) { }
Last Answer : c) {1,”A”,2”B”}
Description : Suppose d = {“john”:40, “peter”:45}. To obtain the number of entries in dictionary which command do we use? a) d.size() b) len(d) c) size(d) d) d.len()
Last Answer : b) len(d)
Description : Which of the following statements create a dictionary? a) d = {} b) d = {“john”:40, “peter”:45} c) d = {40:”john”, 45:”peter”} d) All of the mentioned
Last Answer : d) All of the mentioned
Description : Database applications were built directly on top of file system to overcome the following drawbacks of using file-systems (a) Data redundancy and inconsistency (b) Difficulty in accessing Data (c) Data isolation (d) Integrity problems (A) (a) (B) ... d) (C) (a), (b) and (c) (D) (a), (b), (c) and (d)
Last Answer : (D) (a), (b), (c) and (d)
Description : DCL stands for A) Data Control Language B) Data Console Language C) Data Console Level D) Data Control Level
Last Answer : C) Data Console Level
Description : DFD stands for A) Data Flow Document B) Data File Diagram C) Data Flow Diagram D) Non of the above
Last Answer : C) Data Flow Diagram
Description : FDDI stands for A) Fiber Distributed Data Interface B) Fiber Data Distributed Interface C) Fiber Dual Distributed Interface D) Fiber Distributed Data Interface
Last Answer : A) Fiber Distributed Data Interface
Description : What is the full form of DDS ?
Last Answer : Doctor Of Dental Surgery.
Description : Can you help me get in touch with Ricardo Carreon DDS in Nuevo Progreso Mexico?
Last Answer : Need answer
Description : Forward chaining systems are ............. where as backward chaining systems are ................ (A) Data driven, Data driven (B) Goal driven, Data driven (C) Data driven, Goal driven (D) Goal driven, Goal driven
Last Answer : (C) Data driven, Goal driven
Description : In a digital transmission, the receiver clock is 0.1 percent faster than the sender clock. How many extra bits per second does the receiver receive if the data rate is 1 Mbps ? (A) 10 bps (B) 100 bps (C) 1000 bps (D) 10000 bps
Last Answer : (C) 1000 bps
Description : DLC stands for A) System Development Life Cycle B) Structure Design Life Cycle C) System Design Life Cycle D) Structure development Life Cycle
Last Answer : A) System Development Life Cycle
Description : ………… can be defined as data that has been processed into a form that is meaningful to the recipient and is of real or perceive value in current or prospective decisions. A) System B) Information C) Technology D) Service
Last Answer : B) Information
Description : State whether true of false. i) A worm mails a copy of itself to other systems. ii) A worm executes a copy of itself on another system. A) True, False B) False, True C) True, True D) False, False
Last Answer : C) True, True
Description : A context diagram is used A) as the first step in developing a detailed DFD of a system B) in systems analysis of very complex systems C) as an aid to system design D) as an aid to programmer
Last Answer : A) as the first step in developing a detailed DFD of a system
Description : The reasons leading to popularity of client-server systems are: A) More powerful workstations on LANs B) Needed for graphical user interfaces of end users. C) Remove computing load for presentation services from the system managing a shared database resource. D) All
Last Answer : D) All
Description : As compared to rental and leasing methods to acquire computer systems for a Management Information System (MIS), purchase method has following advantage : (A) It has high level of flexibility (B) It doesn’t require cash up-front (C) It is a business investment (D) Little risk of obsolescence
Last Answer : (C) It is a business investment
Description : MDP stands for A) Master Development Plan B) Master Design Program C) Mandatory Database Program D) Master Database Plan
Last Answer : A) Master Development Plan
Description : 4NF stands for .. A) Fourth Normal File B) Fourth Normal Form C) Fourth Normal Fraction D) Fourth Negative File
Last Answer : B) Fourth Normal Form
Description : HSAM stands for ………. A) Hierarchic Sequential Access Method B) Hierarchic Standard Access Method C) Hierarchic Sequential and Method D) Hierarchic Standard and Method
Last Answer : A) Hierarchic Sequential Access Method
Description : FTP stands for A) File transfer protocol B) File transmission protocol C) Form transfer protocol D) Form transmission protocol
Last Answer : A) File transfer protocol
Description : PEG stands for ............... A) Joint Photo Experts Group B) Joint Photogenic Experts Group C) Joint Photographic Experts Group D) Joint Photoelectric Experts Group
Last Answer : C) Joint Photographic Experts Group
Description : SMTP stands for A) Simple Mail Transfer Protocol B) Simple Mail Transport Protocol C) Sample Mail Transfer Protocol D) Sample Mail Transport Protocol
Last Answer : A) Simple Mail Transfer Protocol
Description : HTML stands for A) Hypertext Mass up language B) Hypertext Markup language C) Hypertext Move up language D) Hypertext Mark of language
Last Answer : B) Hypertext Markup language
Description : FTP stands for A) Folder Transfer Protocol B) File Transfer Process C) File Transfer Protocol D) File Text Protocol
Last Answer : C) File Transfer Protocol
Description : CAI stands for ................ A) Computer Aided Instruction B) Computer Aided information C) Cost Added Information D) Computer Aided Infrastructure
Last Answer : B) Computer Aided information
Description : COCOMO stands for (A) COmposite COst MOdel (B) COnstructive COst MOdel (C) COnstructive COmposite MOdel (D) COmprehensive COnstruction MOdel
Last Answer : (B) COnstructive COst MOdel Explanation: The Constructive Cost Model (COCOMO) is an algorithmic software cost estimation model.
Description : Specialization Lattice stands for (A) An entity type can participate as a subclass in only one specialization. (B) An entity type can participate as a subclass in more than one specialization. ... can participate in one specialization. (D) An entity type that can participate in one generalization.
Last Answer : (B) An entity type can participate as a subclass in more than one specialization.
Description : Differentiate between systems software and application software.
Last Answer : System Software: It is a collection of programs which makes the use of computer easy and efficient. Highly experienced computer programmers develop system software ... software includes productivity software, business software, entertainment software and education software.
Description : The following three golden rules: (i) Place the user in control (ii) Reduce the user’s memory load (iii) Make the interface consistent are for (A) User satisfaction (B) Good interface design (C) Saving system’s resources (D) None of these
Last Answer : (B) Good interface design
Description : C++ actually supports the following two complete dynamic allocation systems: (A) One defined by C++ and the other not defined by C. (B) One defined by C and one specific to C++. (C) Both are specific to C++ (D) Both of them are improvements of C.
Last Answer : (B) One defined by C and one specific to C++.
Description : Beam-penetration and shadow-mask are the two basic techniques for producing color displays with a CRT. Which of the following is not true ? I. The beam-penetration is used with random scan monitors. II. Shadow-mask is used ... -penetration method. (A) I and II (B) II and III (C) III only (D) IV only
Last Answer : (C) III only
Description : Reasoning strategies used in expert systems include ............... (A) Forward chaining, backward chaining and problem reduction (B) Forward chaining, backward chaining and boundary ... chaining, backward chaining and back propagation (D) Backward chaining, problem reduction and boundary mutation
Last Answer : (A) Forward chaining, backward chaining and problem reduction
Description : Names of some of the Operating Systems are given below: (a) MS-DOS (b) XENIX (c) OS/2 In the above list, following operating systems didn’t provide multiuser facility. (1) (a) only (2) (a) and (b) only (3) (b) and (C) only (4) (a), (b) and (c)
Last Answer : Answer: Marks to all
Description : Software Engineering is an engineering discipline that is concerned with: (1) how computer systems work. (2) theories and methods that underlie computers and software systems. (3) all ... (4) all aspects of computer-based systems development, including hardware, software and process engineering.
Last Answer : Answer: 3
Description : Distributed operating systems consist of: (1) Loosely coupled O.S. software on a loosely coupled hardware (2) Loosely coupled O.S. software on a tightly coupled hardware (3) Tightly coupled O.S. software on a loosely coupled hardware (4) Tightly coupled O.S. software on a tightly coupled hardware
Description : EDODRAM stands for _________ A. Extended Digital Output Dynamic RAM B. Extended Dynamic Output Digital RAM C. Extended Data Output Digital RAM D. Extended Data Output Dynamic RAM
Last Answer : D. Extended Data Output Dynamic RAM
Description : FDDI stands for: a. Fiber Digital Data Interface b. Fiber Distributed Data Interface c. Fiber Distribution Delay Interface d. Frequency-Division Data Interface
Last Answer : b. Fiber Distributed Data Interface
Description : IDIP stands for a. Integrated Digital Investigation Process b. Integrated Data Investigation Process c. Integrated Digital Investigator Process d. Independent Digital Investigation Process
Last Answer : a. Integrated Digital Investigation Process
Description : IDIP stands for (A) Integrated Digital Investigation Process. (B) Integrated Data Investigator Process. (C) Integrated Digital Investigator Process. (D)Independent Digital Investigator Process. Ans: A
Last Answer : (A) Integrated Digital Investigation Process.
Description : IDIP stands for A. Integrated Digital Investigation Process. B. Integrated Data Investigator Process. C. Integrated Digital Investigator Process. D. Independent Digital Investigator Process.
Last Answer : A. Integrated Digital Investigation Process.