Errors in computer results could be due to
1) encoding of data
2) transmission of data
3) manipulation of data
4) all of the above

1 Answer

Answer :

4) all of the above

Related questions

Description : Explain errors occurred due to manipulation and sighting in plane tabling.

Last Answer : i) The board not being horizontal- This error affects chiefly the measurement of vertical angles. ii) The table not being accurately centered. The plotted position of the occupied station not ... and correct any displacement. v) The defective sighting- The object not being correctly sighted.

Description : Encoding or scrambling data for transmission across a network is khown as a)Protection b) Detection c) Encryption d) Decryption

Last Answer : c) Encryption

Description : Encoding or scrambling data for transmission across a network is known as: (A) Decryption (B) Protection (C) Detection (D) Encryption

Last Answer : (D) Encryption

Description : A modern electronic computer is a machine that is meant for A) Doing quick mathematical calculations B) Input, storage, manipulation and outputting of data C) Electronic data processing D) Performing repetitive tasks accurately

Last Answer : Answer : B

Description : Digital forensic is all of them except: a. Extraction of computer data b. Preservation of computer data c. Interpretation of computer data d. Manipulation of computer data

Last Answer : b. Preservation of computer data

Description : Digital forensics is all of them except: a. Extraction of computer data. b. Preservation of computer data. c. Interpretation of computer data. d. Manipulation of computer data.

Last Answer : d. Manipulation of computer data.

Description : Digital forensics is all of them except: (A) Extraction of computer data. (B) Preservation of computer data. (C) Interpretation of computer data. (D) Manipulation of computer data.

Last Answer : (D) Manipulation of computer data.

Description : Digital forensics is all of them except: A. Extraction of computer data. B. Preservation of computer data. C. Interpretation of computer data. D. Manipulation of computer data.

Last Answer : D. Manipulation of computer data.

Description : Write the name of layers that perform the following functions in OSI : I. Data Encryption II. Error Correction III. File Transfer IV. Data Encoding

Last Answer : 1. Data Encryption-Presentation Layer 2. Error Correction-Data link layer and Transport layer 3. File Transfer-Application layer 4. Data Encoding-Presentation layer

Description : Majority of the errors blamed on computers are actually due to (1) programming errors (2) hardware failure (3) defects in media (4) data entry errors

Last Answer : data entry errors

Description : Transmission of printed material over telephone lines. A. Video text B. Facsimile C. Encoding D. Xerox copy

Last Answer : B. Facsimile

Description : In ATM, the _____ layer defines thetransmission medium,bit transmission,encoding, and electrical-to-optical transformation. A) physical B) ATM layer C) AAL D) none of the above

Last Answer : physical

Description : Rate of change of a signal on a transmission medium after encoding and modulation have occurred

Last Answer : baud rate

Description : The process of putting one's thoughts (meaning) into signs (symbols) is called A)decoding. B)noise. C)interference. D)transmission. E)encoding.

Last Answer : E)encoding.

Description : If some information is available on paper but you want to transferred it to the hard disc of the computer for further manipulation, which device you will use: a) Photoshop b) Scanner c) Printer d) None of These

Last Answer : b) Scanner

Description : Computer based record keeping system is known as (a) Data Manipulation System -Technology

Last Answer : (d) DBMS is a collection of programs that enable the user to create and maintain the database. Also, it is a computer-based record keeping system.

Description : In data transfer manipulation designing as instruction set for a system isa complex_ a. Art b. System Cc. Computer d. None of these

Last Answer : a. Art

Description : A modern electronic computer is a machine that is meant for a. Doing quick mathematical calculations b. Input, storage, manipulation and outputting of data c. Electronic data processing d. Performing repetitive tasks accuratel

Last Answer : Input, storage, manipulation and outputting of data

Description : A modern electronic computer is a machine that is meant for a. Doing quick mathematical calculations b. Input, storage, manipulation and outputting of data c. Electronic data processing d. Performing repetitive tasks accurately

Last Answer : b. Input, storage, manipulation and outputting of data

Description : Computer forensics do not involve_____activity. A. Preservation of computer data. B. Exraction of computer data. C. Manipulation of computer data. D. Interpretation of computer data.

Last Answer : C. Manipulation of computer data. 

Description : Digital forensics is all of them except: A. Extraction of computer data. B. Preservation of computer data. C. Interpretation of computer data. D. Manipulation of computer data.

Last Answer : D. Manipulation of computer data. 

Description : Which process can prevent data from lose due to computer problems or human errors? a. backup b. recovery c. benchmarking d. data cleansing

Last Answer : a. backup

Description : The basic role of promotion is A)information. B)manipulation. C)communication. D)interpretation.

Last Answer : C)communication.

Description : Manipulation of DNA in genetic engineering became possible due to the discovery of (a) restriction endonuclease (b) DNA ligase (c) transcriptase (d) primase

Last Answer : (a) restriction endonuclease

Description : A selectivity achieved due to manipulation of time of application is called a).Biochemical b). Chronological c). Chemical d). Physical

Last Answer : b). Chronological

Description : How many types of basically Data manipulation: 1 2 3 ap 4

Last Answer : 3

Description : Which is data manipulation types are. a. Arithmetic instruction b. Shift instruction c. Logical and bit manipulation instructions d. All of these

Last Answer : d. All of these

Description : In which instruction are used to perform Boolean operation on non-numerical data: a. Logical and bit manipulation b. Shift manipulation c. Circular manipulation d. None of these

Last Answer : a. Logical and bit manipulation

Description : Which application-level protocol plays a crucial role in carrying out the data definition and manipulation in addition to X-500 features? a. TCP b. LDAP c. FTP d. None of the above

Last Answer : b. LDAP

Description : What is DML (Data Manipulation Language)?

Last Answer : This language that enable user to access or manipulate data as organised by appropriate data model. ∙ Procedural DML or Low level: DML requires a user to specify what data are needed and how to ... : DML requires a user to specify what data are needed without specifying how to get those data.

Description : The primary advantage of key-to-tape data entry system is A) A large percentage of editing can be performed at the time of data entry B) Key verification is easily performed C) The tape is reusable D) Keying errors can be detected as they occur.

Last Answer : Answer : C

Description : The ASCII encoding of binary data is called a. base 64 encoding b. base 32 encoding c. base 16 encoding d. base 8 encoding

Last Answer : a. base 64 encoding

Description : What method for encoding digital data enables you to store more data in less space by limiting the distance between pulses on a hard disk?

Last Answer : Run length-limited (RLL) encoding.

Description : Older, single-sided, single-density floppy disk drives would probably use what method for encoding digital data onto the floppy disk?

Last Answer : Frequency-modulation encoding.

Description : What are the three most popular methods for encoding digital data onto magnetic disks?

Last Answer : a. Frequency modulation (FM). b. Modified frequency modulation (MFM). c. Run length limited (RLL).

Description : Which digital data encoding method helps overcome a tape recorder’s low-frequency response problems by recording two logic levels for each incoming data bit?

Last Answer : Bi-phase level encoding.

Description : Which method of digital data encoding does NOT return the tape to neutral between pulses but, instead, saturates the tape positively or negatively as the incoming data changes between zero and one?

Last Answer : Non-return-to-zero (NRZ) encoding.

Description : Which digital data encoding method records a digital one as a positive pulse and a digital (zero) as a negative pulse and returns the tape to neutral between pulses?

Last Answer : Return-to-zero (RZ) encoding.

Description : Which digital data tape encoding method presets the magnetic tape to all zeros and then records digital ones onto the tape?

Last Answer : Return-to-bias (RB) encoding.

Description : Which of the eight methods for encoding digital data onto magnetic tape is most widely used because it’s accurate, simple, and reliable?

Last Answer : Non-return-to-zero (NRZ) encoding.

Description : Variation of biphase that is used for encoding SMPTE time code data and for recording on video tapes

Last Answer : Biphase – M

Description : When is Run Length Encoding used? A. When we want to compress patterns of data B. When we want to decompress patterns of data C. When we want to encode running videos

Last Answer : A. When we want to compress patterns of data

Description : When is Run Length Encoding used? A. When we want to compress patterns of data B. When we want to decompress patterns of data C. When we want to encode running videos

Last Answer : A. When we want to compress patterns of data

Description : Huffman coding is an encoding algorithm used for A. lossless data compression B. files greater than 1 Mbit C. broadband systems D. lossy data compression

Last Answer : A. lossless data compression

Description : What process is done by the data compression while encoding the data ? a) Identifying repetition in the data b) Reducing repetition in the data c) Eliminating repetition in the data d) All of these

Last Answer : d) All of these

Description : Huffman coding is an encoding algorithm used for a. lossless data compression b. files greater than 1 Mbit c. broadband systems d. lossy data compression

Last Answer : a. lossless data compression

Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame

Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size