The principle of time sharing is
1) large numbers of users direct access to the computer for problem solving
2) large number of user for file sharing
3) both of above
4) none

1 Answer

Answer :

large numbers of users direct access to the computer for problem solving

Related questions

Description : The principle of time sharing is 1) large numbers of users direct access to the computer for problem solving 2) large number of user for file sharing 3) both of above 4) none

Last Answer : 1) large numbers of users direct access to the computer for problem solving

Description : The principle of time sharing is 1 large numbers of users direct access to the computer for problem solving 2 large number of user for file sharing 3 both of above 4 none

Last Answer : 1 large numbers of users direct access to the computer for problem solving

Description : Distributed processing involves a) solving computer component problems from a different computer b) solving computing problems by breaking them into smaller parts that are separately processed by different ... ) allowing users to access network resources away from the office e) None of these

Last Answer : b) solving computing problems by breaking them into smaller parts that are separately processed by different computers

Description : Pickup wrong definition 1) Off line - is a system peripheral equipment not controlled by CPU 2) Online - is system in which peripheral equipment is in direct contact with CPU 3) PL/I is the ... /Index 4) Program or routine is a set sequence of instructions given to computer for problem solving

Last Answer : 3) PL/I is the acronym Peripheral Listing /Index

Description : A System in which a transaction access and updates a file quickly enough to affect the original decision making is called 1) Real time system 2) time sharing system 3) both of above 4) None of above

Last Answer : 1) Real time system

Description : A System in which a transaction access and updates a file quickly enough to affect the original decision making is called 1 Real time system 2 time sharing system 3 both of above 4 None of above

Last Answer : 1 Real time system

Description : A computer checks the _____ of user names and passwords for 9 a match before granting access. 1) Website 2) Network 3) Backup file 4) Data base 5) None of these

Last Answer : Answer :4

Description : __________ is a content distribution protocol enables efficient software distribution and peer-to-peer sharing of very large files by enabling users to serve as network redistribution points. A. Freeware B. BitTorrent C. CorelDraw D. None of the above.

Last Answer : B. BitTorrent

Description : Which of the following are the functions of operating system? i) recovering from errors ii) facilitating input/output iii) facilitating parallel operation iv) sharing hardware among users v) implementing user interface A) i, ii, ... only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : In time sharing system, the user carried a conversation with the central system called 1) interacting computer 2) conversation computing 3) Both of above 4) None of above

Last Answer : 3) Both of above

Description : In time sharing system, the user carried a conversation with the central system called 1) interacting computer 2) conversation computing 3) Both of above 4) None of above

Last Answer : 3) Both of above

Description : In time sharing system, the user carried a conversation with the central system called 1 interacting computer 2 conversation computing 3 Both of above 4 None of above

Last Answer : 3 Both of above

Description : McGrath and Watson have defined research as Options: A) User of exploratory method B) A intellectual exploration C) Use of scientific method for analysis D) Problem-solving 

Last Answer : A) User of exploratory method

Description : Which of the following layer protocols are responsible for user and theapplicationprogrammesupport such aspasswords, resource sharing, file transfer and network management? A. Layer 7 protocols B. Layer 6 protocols C. Layer 5 protocols D. Layer 4 protocols E. None of the above

Last Answer : Layer 7 protocols

Description : Which of the following is / are not direct method to solve intergroup conflicts (a) Problem solving ; (b) Domination by the management ; (c) Removing key figures in conflict (d) Persuasion

Last Answer : (d) Persuasion

Description : The ability to find an individual item in a file immediately _____ is used. 1) File allocation table 2) Directory 3) Sequential access 4) Direct access 4 5) None of these

Last Answer : Answer :1

Description : The ability to find an individual item in a file immediately _____ is used: a) file allocation table b) directory c) sequential access d) direct access e) None of The Above

Last Answer : a) file allocation table

Description : The Method of file organisation in which data records in a file are arranged in a specified order according to a key field is known as the1 Direct access method 2) Queuing method 3) Predetermined method 4) Sequential method

Last Answer : 4) Sequential method

Description : Direct access of file is also known as (1) random access (2) relative access (3) file access (4) sequential access

Last Answer : random access

Description : Which statement is true about a cloud computing environment? A. It cannot be used to host location based applications. B. It enables users to access systems regardless of their location. C. It introduces ... D. It can improve a web server response time by having servers closer to the end user.

Last Answer : It enables users to access systems regardless of their location.

Description : The need for assurance services arises because: a. There is a potential bias in providing information. b. Economic transactions are less complex than they were a decade ago. c. There is a consonance ... . d. Most users today have access to the system that generates the financial statements they use

Last Answer : There is a potential bias in providing information

Description : If you have implemented a network where hosts are assigned specific roles such as for file sharing and printing. Other hosts access those resources but do not host services of their own. what type of?

Last Answer : What is the answer ?

Description : What is the benefit of the Networking? A. File Sharing B. Easier access to Resources C. Easier Backups D. All of the Above

Last Answer : D. All of the Above

Description : Why is it unethical to share copyrighted files with your friends: a) It is not unethical because it is legal b) It is unethical because the files are being given for free c) Sharing copyrighted files ... because the files are being given for free e) It is not unethical - anyone can access a computer

Last Answer : c) Sharing copyrighted files without permission breaks copyright laws

Description : ...... is a procedure that requires users to enter an identification code and a matchingpassword. 1) Paging 2) Logging on 3) Time-Sharing 4) Multitasking

Last Answer : 2) Logging on

Description : Allocation of a resources in a time dependent fashion to several program simultaneously called 1) multi tasking 2) multi user 3) time sharing 4) None

Last Answer : 3) time sharing

Description : Allocation of a resources in a time dependent fashion to several program simultaneously called 1 multi tasking 2 multi user 3 time sharing 4 None

Last Answer : 3 time sharing

Description : The ‘IBM-DOS’ is a (1) Single user operating system (2) Multiuser operating system (3) Batch operating system (4) Time-sharing operating system

Last Answer : Single user operating system

Description : To read a file in HDFS, a user sends an _______ request to the NameNode toget the location of file blocks. a) access b) open c) authentication d) create

Last Answer : open

Description : The user generally applies _________ to access mainframe or super computer? (A) node (B) terminal (C) desktop (D) None of the Above

Last Answer : (B) terminal

Description : Direct X is a ______ 1) Computer Part 2) Software that drives Graphic hardware 3) A User Interface 4) None of these

Last Answer : 2) Software that drives Graphic hardware

Description : They normally interact with the system via user interface provided by the application software. a) Programmers b) Developers c) Users d) Testers

Last Answer : Answer: c Explanation: Users interact with the system via user interface that is given by the application software. An application software is a set of instructions designed to serve a particular purpose This set of Computer Fundamentals online test focuses on “Machine Languages”

Description : Internet refers to: a) A large Network of Networks b) A communication system for different states of India c) A communication system provided for large number of computer users. d) None of These

Last Answer : a) A large Network of Networks

Description : Which of these statements highlights a valid privacy concern when working with large data sets? I. Data from multiple sources could be linked together to discover someone's identity. II. For access to location-based services, a ... . I and II only B. I only C. I and III only D. I, II and III

Last Answer : B. I only

Description : Prior to the invention of time-sharing, the prevalent method of computer access was ____________ a) batch processing b) telecommunication c) remote access d) all of the mentioned

Last Answer : a) batch processing

Description : Magnetic disks are the most popular medium for A) Direct access B) Sequential access C) Both of above D) None of above

Last Answer : Answer : C

Description : Which access method is used to access cassette tape? A) Direct B) Sequential C) Both of the above D) None of the above

Last Answer : Answer : B

Description : Magnetic disks are the most popular medium for A) Direct access B) Sequential access C) Both of above D) None of above

Last Answer : Answer : D

Description : The component of an ICAI (Intelligent Computer Assisted Instruction) presenting information to the student is the? a) Student model b) Problem solving expertise c) Tutoring module d) All of the mentioned

Last Answer : c) Tutoring module

Description : The CAI (Computer-Assisted Instruction) technique based on programmed instruction is __________ a) frame-based CAI b) generative CAI c) problem-solving CAI d) intelligent CAI

Last Answer : a) frame-based CAI

Description : In programming, how many steps are involved in solving a problem on a computer?

Last Answer : Four.

Description : Which of the following is not true for a magnetic disk? A) It is expensive relative to magnetic tape B) It provides only sequential access to stored data C) Users can easily update records by writing over the old data D) All of above

Last Answer : Answer : B

Description : Which of the following is an advantage of mounting an application on the web? a) The possibility of 24 hour access for users b) Creating a system that can be extended globally c) Standardizing the design of the interface d) All of The Above e) None of The Above

Last Answer : d) All of The Above

Description : To access a mainframe or supercomputer ,users often use a- 1) Terminal 2) Node 3) Desktop 4) Handheld

Last Answer : 1) Terminal

Description : _______ allows users to access accounts and pay bills (1) Distance Learning (2) Online Banking (3) E-Commerce (4) Multimedia

Last Answer : E-Commerce 

Description : Accessibility w.r.t understanding site user requirement should include  Number of visually impaired People  Number of users of less Popular Browsers  Both A & B  None of the Above

Last Answer : Both A & B

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : ______ is the art of exploiting the human elements to gain access to the authorized user. A. Social Engineering. B. IT Engineering. C. Ethical Hacking. D. None of the above.

Last Answer : A. Social Engineering.

Description : The Hungarian method for solving an assignment problem can also be used to solve: a. A transportation problem b. A travelling salesman problem c. A linear programming problem d. Both a and b

Last Answer : b. A travelling salesman problem