Which of the Following is not true of immediate processing:
a) It is often used in real time applications
b) It can be used in an airline reservation system
c) It can occur with either sequential or direct access files
d) None of The Above

1 Answer

Answer :

c) It can occur with either sequential or direct access files

Related questions

Description : The two basic types of record access methods are: A) Sequential and random B) Sequential and indexed C) Direct and immediate D) Online and real time

Last Answer : Answer : A

Description : The two basic types of record-access methods are a. Sequential and random b. Sequential and indexed c. Direct and immediate d. On-line and real time

Last Answer : Sequential and random

Description : The two basic types of record-access methods are a. Sequential and random b. Sequential and indexed c. Direct and immediate d. On-line and real time

Last Answer : a. Sequential and random

Description : The ability to find an individual item in a file immediately _____ is used. 1) File allocation table 2) Directory 3) Sequential access 4) Direct access 4 5) None of these

Last Answer : Answer :1

Description : Magnetic disks are the most popular medium for A) Direct access B) Sequential access C) Both of above D) None of above

Last Answer : Answer : C

Description : Which access method is used to access cassette tape? A) Direct B) Sequential C) Both of the above D) None of the above

Last Answer : Answer : B

Description : Magnetic disks are the most popular medium for A) Direct access B) Sequential access C) Both of above D) None of above

Last Answer : Answer : D

Description : The ability to find an individual item in a file immediately _____ is used: a) file allocation table b) directory c) sequential access d) direct access e) None of The Above

Last Answer : a) file allocation table

Description : Hard Disks and Diskettes are: a) Direct Access Storage Devices b) Sequential Access Storage Devices c) Rarely used Microcomputers d) None of The Above

Last Answer : a) Direct Access Storage Devices

Description : Magnetic disk a medium known as 1) Serial access 2) Direct access 3) Sequential access 4) Sequential and rotational access

Last Answer : 2) Direct access

Description : The Method of file organisation in which data records in a file are arranged in a specified order according to a key field is known as the1 Direct access method 2) Queuing method 3) Predetermined method 4) Sequential method

Last Answer : 4) Sequential method

Description : Separate Read/Write heads are required in which of these memory access schemes. 1) Random Access 2) Sequential Access 3) Direct Access 4) None of these

Last Answer : 4) None of these

Description : Separate Read/Write heads are required in which of these memory access schemes. 1 Random Access 2 Sequential Access 3 Direct Access 4 None of these

Last Answer : 4 None of these

Description : Direct access of file is also known as (1) random access (2) relative access (3) file access (4) sequential access

Last Answer : random access

Description : Distributed processing involves a) solving computer component problems from a different computer b) solving computing problems by breaking them into smaller parts that are separately processed by different ... ) allowing users to access network resources away from the office e) None of these

Last Answer : b) solving computing problems by breaking them into smaller parts that are separately processed by different computers

Description : Which system is a typical example of the readers and writers problem: a. Airline reservation system b. Airport reservation system c. Both d. None of these

Last Answer : a. Airline reservation system

Description : Magnetic disks are the most popular medium for a. Direct access b. Sequential access c. Both of above d. None of above

Last Answer : Both of above

Description : Magnetic disks are the most popular medium for a. Direct access b. Sequential access c. Both of above d. None of above

Last Answer : c. Both of above

Description : Describe sequential and direct access method.

Last Answer : Sequential access: Information from the file is processed in order i.e. one record after another. It is commonly used access mode. For example, editors and compilers access files in sequence. A read ... prevent the user from accessing portions of the file system that may not be part of his file.

Description : Which of the following is not true for a magnetic disk? A) It is expensive relative to magnetic tape B) It provides only sequential access to stored data C) Users can easily update records by writing over the old data D) All of above

Last Answer : Answer : B

Description : An application suitable for sequential processing is A) Processing of grades B) Payroll processing C) Both a and b D) All of above

Last Answer : Answer : C

Description : Batch processing is also known as 1) serial 2) sequential 3) off line processing 4) all of above

Last Answer : 4) all of above

Description : Batch processing is also known as 1 serial 2 sequential 3 off line processing 4 all of above

Last Answer : 4 all of above

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : In post-indexing the contents of the address field are used to access a memory location containing a___ address: Immediate addressing Direct addressing Register addressing ao | None of these

Last Answer : Direct addressing

Description : Which of the followign is not a benefit of direct marketing ? 1. customer relationship building 2. immediate response 3. convenience 4. assists client prospecting 5. greater product access and selection

Last Answer : assists client prospecting

Description : Memories in which any location can be reached in a fixed amount of time after specifying its address is called ________ A. Sequential Access Memory B. Random Access Memory C. Quick Access Memory D. Mass storage

Last Answer : B. Random Access Memory

Description : ________ is the ability of a device to ‘jump’ directly to the requested data A. Sequential access B. Random access C. Quick access D. None of the Above

Last Answer : B. Random access

Description : The simultaneous execution of two or more instructions is called- 1) Sequential Access 2) Reduced Instruction set computing 3) Multiprocessing 4) None of these

Last Answer : 3) Multiprocessing

Description : Sequential step hackers use are: _ _ _ _. A. Maintaining Access. B. Reconnaissance C. Scanning. D. Gaining Access.

Last Answer : A. Maintaining Access.

Description : Storage that retains its data after the power is tuned off is referred to as 1) volatile storage 2) non-volatile storage 3) sequential storage 4) direct storage 5) None of these

Last Answer : Answer :2

Description : Which of the following is not true for a magnetic disk? a. It is expensive relative to magnetic tape b. It provides only sequential access to stored data c. Users can easily update records by writing over the old data d. All of above

Last Answer : It provides only sequential access to stored data

Description : Which of the following is not true for a magnetic disk? a. It is expensive relative to magnetic tape b. It provides only sequential access to stored data c. Users can easily update records by writing over the old data d. All of above

Last Answer : b. It provides only sequential access to stored data

Description : An application suitable for sequential processing is a. Processing of grades b. Payroll processing c. Both a and b d. All of above

Last Answer : Both a and b

Description : An application suitable for sequential processing is a. Processing of grades b. Payroll processing c. Both a and b d. All of above

Last Answer : c. Both a and b

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : In which addressing mode the operand is given explicitly in the instruction? A. Absolute B. Immediate C. Indirect D. Direct

Last Answer : B. Immediate

Description : Transmission protocol, PRMA stands for _________ a) Pocket reservation multiple access b) Packet register multiple access c) Pocket register multiple access d) Packet reservation multiple access

Last Answer : d) Packet reservation multiple access

Description : A storage device whe3re the access time is depended upon the location of the data is a. Random access b. Serial access c. Sequential access d. Transaction access

Last Answer : Serial access

Description : A storage device whe3re the access time is depended upon the location of the data is a. Random access b. Serial access c. Sequential access d. Transaction access

Last Answer : b. Serial access

Description : A storage device whe3re the access time is depended upon the location of the data is a. Random access b. Serial access c. Sequential access d. Transaction access

Last Answer : b. Serial access

Description : The persistent suppression of bacterial growth that may occur following limited exposure to some antimicrobial drugs is called (a) Time-dependent killing (b) The post antibiotic effect (c) Clinical synergy (d) Concentration – dependent killing (e) Sequential blockade

Last Answer : Ans: B

Description : In the ………………… mode any record in the file can be accessed at random A) Sequential access B) Random access C) Standard access D) Source access

Last Answer : B) Random access

Description : HSAM stands for ………. A) Hierarchic Sequential Access Method B) Hierarchic Standard Access Method C) Hierarchic Sequential and Method D) Hierarchic Standard and Method

Last Answer : A) Hierarchic Sequential Access Method

Description : Why is direct accessing of data a big advantage over the sequential accessing of data?

Last Answer : It gives us fast, immediate access to specific data without having to examine each and every record from the beginning.

Description : ____ software creates a mirror image of the entire hard disk, including the operating system, applications, files and data. a) Operating system b) Backup software c) Utility programs d) Driver imaging e) None of these

Last Answer : b) Backup software

Description : It is better to use files than a DBMS when there are (A) Stringent real-time requirements. (B) Multiple users wish to access the data. (C) Complex relationships among data. (D) All of the above.

Last Answer : (B) Multiple users wish to access the data.

Description : In DLP Projector, DLP stands for________ A. Direct Light Processing B. Direct Low Processing C. Digital Low Processing D. Digital Light Processing

Last Answer : D. Digital Light Processing