A programmer is writing a system that is intended to be able to store  large amounts of personal data. As the programmer develops the data system, which of the following is LEAST likely to impact the programmer’s choices in  designing the structure of the system?
A. Maintaining privacy of the information stored in the data set. B. Scalability of the system.
C. Structuring the metadata of the information for analysis.
D. The frequency of a particular item occurring in a data set.

1 Answer

Answer :

D. The frequency of a particular item occurring in a data set.

Related questions

Description : Data that describes other data. For example, a digital image may include metadata that describe the size of the image, number of colors, or resolution. A. Metadata B. Emdata C. Tridata D. Perameter

Last Answer : D. Perameter

Description : Which of these statements highlights a valid privacy concern when working with large data sets? I. Data from multiple sources could be linked together to discover someone's identity. II. For access to location-based services, a ... . I and II only B. I only C. I and III only D. I, II and III

Last Answer : B. I only

Description : Which term refers for modifying a computer in a way which was not originally intended to view Information? A. Metadata B. Live analysis C. Hacking D. Bit Copy

Last Answer : C. Hacking

Description : Which term refers for modifying a computer in a way which was not originally intended to view Information? A. Metadata B. Live analysis C. Hacking D. Bit Copy

Last Answer : C. Hacking 

Description : .You can’t count on a cloud provider maintaining your _____ in the face of government actions. a) Scalability b) Reliability c) Privacy d) Availability

Last Answer : Privacy

Description : In dictionary techniques for data compaction, which approach of building dictionary is used for the prior knowledge of probability of the frequently occurring patterns? a. Static Dictionary b. Adaptive Dictionary c. both a and b d. None of the above

Last Answer : a. Static Dictionary

Description : Hamzah needs to email a large file to a classmate. Why might he need to use file compression to do so? A. Email services often only let you send compressed data files. B. Compressed files are ... . D. Email services often have maximum file sizes that prevent you sending files that are too large.

Last Answer : D. Email services often have maximum file sizes that prevent you sending files that are too large.

Description : A particular way of coding information for storage in a computer file A. Raster graphic B. Vector graphic C. File format D. Layer

Last Answer : A. Raster graphic

Description : A sport/event organization that wants to obtain information about the population in a certain geographic location might use A. Government sources B. Primary Databases C. Personal Questionaires D. telephone surveys

Last Answer : B. Primary Databases

Description : Which of the following is a secondary source of sport/event information: A. Accounting records B. Demographic reports C. Computerized surveys D. Personal interviews

Last Answer : B. Demographic reports

Description : The techniques for reducing the storage requirement of computer files and directory structure are known by which name ? a) Data compression b) Data storage place c) Data form d) Data transfer

Last Answer : a) Data compression

Description : The process of representing a large—possibly infinite—set of values with a much smaller set is called______________. A. Linear function Quantization B. PDF. C. CDF D. Quantization

Last Answer : D. Quantization

Description : Which of the following statements about Google App Engine (GAE) is INCORRECT. A. It's a Platform as a Service (PaaS) model. B. Automatic Scalability is built in with GAE. As ... s applications. So, applications can take advantage of reliability, performance and security of Google's infrastructure.

Last Answer : You can decide on how many physical servers required for hosting your application.

Description : The amount of detail stored for an Image. A. Resolution B. PPI C. Print Resolution

Last Answer : A. Resolution

Description : The design of the _____has a significant impact on the amount of compression. a. Cluster b. Quantizer c. Codebook d. Both (b) and (a)

Last Answer : b. Quantizer

Description : A Privacy Impact Assessment (PIA) is an analysis of how information is handled?

Last Answer : All of the above

Description : Which best describes Lossless Compression? A. No information is lost but file size is increased B. There is no loss in information at all after compression C. Files which have the exact same data after compression D. Compression that involves an algorithm

Last Answer : B. There is no loss in information at all after compression

Description : To convert multimedia information coming from hardware devices into computer data can be compared with which process ? a) Coding b) Decoding c) (a) and (b) both d) None of these

Last Answer : a) Coding

Description : From the following, which option shows an issue faced with multimedia contents ? a) Converting multimedia information coming from hardware devices into computer data b) converting the computer data back into audio/ ... for playing on the hardware device c) a and b both d) None of these

Last Answer : c) a and b both

Description : Which technique identify and eliminate less important information to conserve space ? a) Data compression b) Data repetition c) Data extension d) Data conservation

Last Answer : a) Data compression

Description : When jobs are grouped together based on a particular type of customer, this is known as….. (a) Job structuring ; (b) Formalization ; (c) Centralization ; (d) Departmentalization

Last Answer : (d) Departmentalization 

Description : A software project was estimated at 352 Function Points (FP). A four person team will be assigned to this project consisting of an architect, two programmers, and a tester. The salary of the architect is Rs.80,000 per month, the ... ) Rs.28,16,000 (2) Rs.20,90,000 (3) Rs.26,95,000 (4) Rs.27,50,000

Last Answer : (4) Rs.27,50,000 

Description : Selective retention occurs when? a) we process, store, and retrieve information that we have already selected, organized, and interpreted b) we make choices to experience particular stimuli c ... choices to avoid particular stimuli d) we focus on specific stimuli while ignoring other stimuli

Last Answer : a) we process, store, and retrieve information that we have already selected, organized, and interpreted

Description : __________ shape is used to make codebook in structure vector quantization. a. Square b. Rectangle c. Circle d. Hexagon

Last Answer : d. Hexagon

Description : A point where a wave crosses its resting line A. Node B. Frequency C. Transversal D. Trough

Last Answer : B. Frequency

Description : A wave in which the wave’s medium is compressed in the same direction as the movement of the wave A. Transversal wave B. Transverse wave C. Frequency wave D. compression wave

Last Answer : C. Frequency wave

Description : Speed in a given direction A. Wavelength B. Frequency C. Velocity D. Waves per second

Last Answer : A. Wavelength

Description : A back-and-forth pattern of motion that transfers energy A. Wave B. Pulse C. Reflection D. Frequency

Last Answer : D. Frequency

Description : A rate of something that repeats over and over. A. Pulse B. Wave C. Velocity D. Frequency

Last Answer : C. Velocity

Description : Huffman trees use the _______________ of each character to work out their encoding. A. Frequency B. Order in ASCII C. Number value

Last Answer : A. Frequency

Description : Huffman trees use the _______________ of each character to work out their encoding. A. Frequency B. Order in ASCII C. Number value

Last Answer : A. Frequency

Description : Probability model is based on a. Probability b. Physics c. Frequency d. None

Last Answer : c. Frequency

Description : Huffman trees use the _______________ of each character to work out their encoding. a. Frequency b. Order in ASCII c. Number value d. Both (a) and (b)

Last Answer : a. Frequency

Description : Which of the following factors most likely would heighten an auditor's concern about the risk of fraudulent financial reporting? a. Large amounts of liquid assets that are easily ... of accounting principles. d. An overly complex organizational structure involving unusual lines of authority.

Last Answer : An overly complex organizational structure involving unusual lines of authority.

Description : Extended Huffman method is used due to a. Large alphabet b. Skewed probability c. Equal probability d. Both (a) and(b)

Last Answer : b. Skewed probability

Description : A Huffman encoder takes a set of characters with fixed length and produces a set of characters of A. fixed length B. constant length C. random length D. variable length

Last Answer : D. variable length

Description : Set of L-dimensional blocks called the _______of the vector quantizer. a. Group b. Codebook c. Coding d. Index

Last Answer : b. Codebook

Description : The process of representing Infinite set of values with a much smaller set is called a. Mapping b. clustering c. Quantization d. Sampling

Last Answer : c. Quantization

Description : How much time do programmers typically spend maintaining software?

Last Answer : Programmers typically spend a week or two on software maintenance, however that number could be drastically variable between companies, and employers.

Description : To divide information among cells A. Wrap B. Split C. Lock D. Column

Last Answer : B. Split

Description : Entropy of a source is a. Self information of the source b. Average self information c. Average number of bits d. Both (a) and (b)

Last Answer : b. Average self information

Description : Information ignored the human eye is the a. A. coding redundancy b. B. spatial redundancy c. C. temporal redundancy d. D. irrelevant info

Last Answer : d. D. irrelevant info

Description : Information per source is called a. A. sampling b. B. quantization c. C. entropy d. D. normalization

Last Answer : c. C. entropy

Description : Source of information depending on finite no of outputs is called a. A. markov b. B. finite memory source c. C. zero source d. D. Both A and B

Last Answer : d. D. Both A and B

Description : To change the font size in order to display more text or other data A. Border B. Shading C. Shrink to fit D. Printing area

Last Answer : A. Border

Description : Data compression which guarantees that all original data can be restored exactly A. Lossless compression B. Lossy compression C. File compression D. Raster compression

Last Answer : B. Lossy compression

Description : How does lossy compression reduce the size of files? A. Through removing redundancies by grouping repeated data together. B. By removing some precision in data that humans would have difficulty to ... the amount of storage needed. D. By replacing blocks of data with more compact representations.

Last Answer : D. By replacing blocks of data with more compact representations.

Description : What type of compression actually deletes data and cannot be decompressed? A. File Compression B. Lossless Compression C. Lossy Compression D. Archive Compression

Last Answer : D. Archive Compression