Names, numbers and other information needed to solve a problem are
called:
a) Program
b) Data
c) Controls
d) None of The Above

1 Answer

Answer :

b) Data

Related questions

Description : The ______is a sequence of instructions that tells the computer how to process the data: a) program b) data c) controls d) None of The Above

Last Answer : a) program

Description : In the preparation of an audit program, which of the following items is not essential? a. Assessment of inherent risk b. The preparation of a budget identifying the costs of resources needed c. A review of material from prior audits d. An understanding of controls established by management

Last Answer : The preparation of a budget identifying the costs of resources needed

Description : The.... controls a client computer's resources. 1) Application program 2) Instruction set 3) Operating System 4) Server application

Last Answer : 4) Server application

Description : The.... controls a client computer's resources. 1 Application program 2 Instruction set 3 Operating System 4 Server application

Last Answer : 4 Server application

Description : In Unix operating system, special files are used to : (A) buffer data received in its input from where a process reads (B) provide a mechanism to map physical device to file names (C ... pointers associated with i-nodes (D) store information entered by a user application program or utility program

Last Answer : (B) provide a mechanism to map physical device to file names 

Description : The goal is for the software to use what is it is was learned in one area to solve problem in other area. (a) Machine learning (b) Deep learning (c) Neural network (d) All of above

Last Answer : (b) Deep learning

Description : The proper definition of a modern digital computer is A) An electronic automated machine that can solve problems involving words and numbers B) A more sophistic and modified electronic pocket calculator C) Any machine that can perform mathematical operations D) A machine that works on binary code

Last Answer : Answer : A

Description : Information needed to develop, use or maintain computer hardware and software and to permit access and retrieval of data is known as: a) Software b) Documentation c) Operation of Hardware d) None of These

Last Answer : b) Documentation

Description : Programming that actually controls the path of signals or data within computer is called________ A. Assembly language Programming B. Machine language Programming C. Micro Programming D. None of the Above

Last Answer : C. Micro Programming

Description : Which of the following is correct about Star Topology: a) Data on a star network passes through the hub, swithc or concentrator before continuing to its destination. b) The hub, switch or concentrator manages and ... connecting all of the systems to a central node. d) All of Above e) None of These

Last Answer : d) All of Above

Description : Why are controls not needed in arthropods experiment described in study guide?

Last Answer : Feel Free to Answer

Description : A Project control system: 1. Monitors and controls the project's schedule, costs, scope, budgets etc  2. Is a mechanism which reacts to the current project status in order to endure ... 4. Is a system for controlling and executing project documentation in an uniform and timely  manner

Last Answer : 1. Monitors and controls the project's schedule, costs, scope, budgets etc

Description : Who controls domain names worldwide ?

Last Answer : Domain names have many parts. So the subdomains are controlled by the main domain (Top Level Domain - Top Level Domain) . The top level domains are controlled by Internet Corporation for Assigned Names and Numbers (ICANN).

Description : What is System Analysis? A) The design of the screen the user will see and use to enter or display data B) System analysis defines the format and type of data the program will use C) System Analysis involves creating formal model of the problem to be solved D) None of the above

Last Answer : Answer : C

Description : A computer can solve more than one kind of problem. This is related to which of the following characteristics? A) Accuracy B) Reliability C) Versatility D) Automatic

Last Answer : Answer : C

Description : ___________________ is designed to solve a specific problem or to do a specific task. a) Application Software b) System Software c) Utility Software d) User

Last Answer : Answer: a Explanation: An application software is specific to solving a specific problem. System software is designed for controlling the operations of a computer system

Description : What are the possibilities of information and communication technology to solve the problem of unemployment in Bangladesh ?

Last Answer : The number of information technology users around the world is increasing day by day. Today, the use of information technology has created an unprecedented opportunity in the daily workplace ... and communication technology is creating a new possibility to overcome the problem of unemployment.

Description : Can't get rid of acne problem at all , details inside ? Bron problem for almost two years. The skin has become black due to the brown spots. I have taken various treatments at different times to solve this problem ... I waited for the answer. Note: I am 16 years old, thank you in advance ,,,,,,,,,

Last Answer : : You can use Assure facewash for your problem . And the price of facewash is not known. However, it seems to be between 250 to 300 rupees.

Description : A student helps a teacher to solve the problem while the teacher was delivering the lecture. He was (a) An emphatic listener (b) An evaluative listener (c) A realistic listener (d) An information listener

Last Answer : (b) An evaluative listener

Description : Which of the following is valid statement? A) Data in itself is useless unless it is processed B) The data that is processed is called a program C) The data which is not yet processed is information D) Information is processed by computer to generate data.

Last Answer : Answer : A

Description : Choose the correct layer numbers and names of the OSI model below. a. Layer 3 - Network Layer, Layer 2 - Data Link Layer, Layer 1 - Physical Layer b. Layer 7 - Application Layer, Layer 6 - Presentation Layer c. Layer 5 - Session Layer, Layer 4 - Transport Layer d. All given options

Last Answer : d. All given options

Description : A memory in CPU that holds program instructions, input data, intermediate results and the output information produced during processing is __________ A. System B. Primary Memory C. Secondary Memory D. None of the above

Last Answer : B. Primary Memory

Description : The main job of CPU is to - 1) carry out program instructions 2) Store data/information for future use 3) Process data and information 4) Both (A) and (C)

Last Answer : 4) Both (A) and (C)

Description : The main job of CPU is to - 1 carry out program instructions 2 Store data/information for future use 3 Process data and information 4 Both (A) and (C)

Last Answer : 4 Both (A) and (C)

Description : What is the name of the computer program that contains the distilled knowledge of an expert? ⮚ Management information System ⮚ Expert system ⮚ Data base management system ⮚ Artificial intelligence

Last Answer : Expert system

Description : A specific editor has 200 K of program text, 15 K of initial stack, 50 K of initialized data, and 70 K of bootstrap code. If five editors are started simultaneously, how much physical memory is needed if shared text is used ? (A) 1135 K (B) 335 K (C) 1065 K (D) 320 K

Last Answer : (B) 335 K

Description : Fill in the blanks. Digital Forensics is a series of steps to _________ and _________ electronic data through ________ method. a. Solve, analyses, Intelligent b. Uncover, analyses, scientific c. Uncover, analyses, electronic d. Solve, analyses, electronic

Last Answer : b. Uncover, analyses, scientific

Description : Write a program to declare a class 'staff' having data members as name and department. Accept this data for 10 staffs and display names of staff that are in 'CO' department.

Last Answer : #include<iostream.h> #include<conio.h> #include<string.h> class staff {  char name[10], dept[10];  public:  void accept() { cout<<"Enter Name and Department:\t"; cin>> ... i=0;i<=10;i++) { s[i].display(); } getch(); }

Description : The control unit controls other units by generating control and _______ A. Command Signals B. Timing signals C. Transfer signals D. None of the Above

Last Answer : B. Timing signals

Description : The first electronic general purpose digital computer built by Eckert and Mauchly called ENIAC did not work on the stored program concept. How many numbers could it store in its internal memory? A) 100 B) 20 C) 40 D) 80

Last Answer : Answer : B

Description : What kind of education and career path is needed in order to solve "cold cases" for a living?

Last Answer : i know that you can have a investigative desk job and not be a police office my cousin has a degree in genetic engineering, she has a cubicle job as a gene analyst and she helps track criminals

Description : What are the problems that vertebrates needed to solve to adapt to the terrestrial environment since they came from the aquatic habitat? How does evolution solved those problems?

Last Answer : The main problems vertebrates coming from water needed to solve to adapt to the terrestrial environment were the following: the problem to avoid dehydration; the problem of elimination of wastes in ... body support problem: further development of muscular and bony structures, like limbs and claws.

Description : DBMS is a program that controls the creation, maintenance and use of database. Here, DBMS referred to -Technology

Last Answer : (c) Here, DBMS stands for Database Management System.

Description : An auditor should design the written audit program so that a. All material transactions will be selected for substantive testing. b. Substantive tests prior to the balance sheet date ... controls or tests of transactions. d. The audit procedures selected will achieve specific audit objectives

Last Answer : The audit procedures selected will achieve specific audit objectives

Description : An auditor should design a written audit program so that: a. All material transactions will be selected for substantive testing. b. Substantive tests prior to the balance sheet date will be minimized ... . d. Each account balance will be tested under either tests of controls or tests of transactions

Last Answer : The audit procedures selected will achieve specific audit objectives

Description : When more information is needed about the problem and the tentative hypothesis needs to be made3 more specific, marketers usually conduct ____research : 1. descriptive studies 2. casual investigations 3. exploratory studies 4. statistical studies 5. syndicated research

Last Answer : exploratory studies

Description : When more information is needed about the problem and the tentative hypothesis needs to be made more specific, marketers usually conduct ---------- research: A)descriptive studies B)casual investigations C)exploratory studies D)statistical studies E)syndicated research

Last Answer : C)exploratory studies

Description : Which among the following is wrong characteristic of "Phishing": a) Fakers, by offering special rewards or money prize etc asked for personal information such as passwords, credit card information, social ... purpose is theft or misuse the acquired material c) Both of Above d) None of These

Last Answer : d) None of These

Description : Which among the following is wrong characteristic of "Phishing": a) Fakers, by offering special rewards or money prize etc asked for personal information such as passwords, credit card information, social ... purpose is theft or misuse the acquired material c) Both of Above d) None of These

Last Answer : d) None of These

Description : MIS is designed to provide information needed for effective decision making by? A) Consumers B) Workers C) Foremen D) Managers

Last Answer : Answer : D

Description : The principle of time sharing is 1) large numbers of users direct access to the computer for problem solving 2) large number of user for file sharing 3) both of above 4) none

Last Answer : large numbers of users direct access to the computer for problem solving

Description : The principle of time sharing is 1) large numbers of users direct access to the computer for problem solving 2) large number of user for file sharing 3) both of above 4) none

Last Answer : 1) large numbers of users direct access to the computer for problem solving

Description : The principle of time sharing is 1 large numbers of users direct access to the computer for problem solving 2 large number of user for file sharing 3 both of above 4 none

Last Answer : 1 large numbers of users direct access to the computer for problem solving

Description : 8. Nslookup can be used to gather information regarding which of the following? A. Host names and IP addresses B. Whois information C. DNS server locations D. Name server types and operating systems

Last Answer : A. Host names and IP addresses

Description : Latency time is A) Time to spin the needed data under head B) Time to spin the needed data under track C) Time to spin data under sector D) All of above

Last Answer : Answer : A

Description : How to solve networking problem -- one wireless and one wired pc to talk to each other on a network?

Last Answer : answer:A permissions problem? Something odd about the driver on the XP side? Try downloading a free program from Cisco called Network Magic. It helps people set up small home networks just like the one you are describing. Edit: Are the drives explicitly shared?

Description : Will a Kindle(or other eBook reader) solve my problem?

Last Answer : I have the Kindle for iPhone application. It doesn't show a specific page number (largely because the pages' on the Kindle don't correspond to the pages on a physical book, because you can change the ... you tap the screen, it will show you a slider that indicates how far you are from the end.

Description : If you have the habit of book-lifting from library, how would you solve this typical problem behaviour? Options: A) Gradually you will leave this habit because you know that it is very painful experience to ... C) You will try to purchase it D) You will try to get it from other students

Last Answer : A) Gradually you will leave this habit because you know that it is very painful experience to the individual who is in dire need of it

Description : A program designed to destroy data on your computer which can travel to "infect" other computers is called as: a) Operational Risks b) Torpedo c) Infector d) Virus

Last Answer : d) Virus

Description : Solve for `x, 8x + 4 le 20` in the set of natural numbers

Last Answer : Solve for `x, 8x + 4 le 20` in the set of natural numbers