Give any three uses of computers in a school library.

1 Answer

Answer :

 Access to information and primary information sources.

 Network accessibility on Intranet and Internet.

 User-friendly interface.

 Advanced search and retrieval.

 Multiple access / Universal accessibility.

 Integration with other digital libraries. 


Related questions

Description : In windows 2000 operating system all the processor-dependent code is isolated in a dynamic link library called (A) NTFS file system (B) Hardware abstraction layer (C) Microkernel (D) Process Manager

Last Answer : (B) Hardware abstraction layer

Description : WOW32 is a: (A) Win 32 API library for creating processes and threads. (B) Special kind of file system to the NT name space. (C) Kernel - mode objects accessible through Win32 API (D) Special execution environment used to run 16 bit Windows applications on 32 - bit machines.

Last Answer : (D) Special execution environment used to run 16 bit Windows applications on 32 - bit machines.

Description : One of the disadvantages of user level threads compared to Kernel level threads is (1) If a user level thread of a process executes a system call, all threads in that process are ... privileges. (4) The library procedures invoked for thread management in user level threads are local procedures.

Last Answer : If a user level thread of a process executes a system call, all threads in that process are blocked.

Description : Computers can have instruction formats with (A) only two address and three address instructions (B) only one address and two address instructions (C) only one address, two address and three address instructions (D) zero address, one address, two address and three address instructions

Last Answer : (D) zero address, one address, two address and three address instructions 

Description : Describe the five generations of computers. 

Last Answer :  First Generation Computers (1940-1956):  They used vacuum tube technology.  Vacuum tubes produce lot of heat and needs to be cooled with A.C.  Their examples were ENIAC, UNIVAC-I, IBM ...  They will be based on Artificial Intelligence.  Their examples will be robots and expert systems. 

Description : Differentiate between analog and digital computers

Last Answer :  Analog computer:  Analog computers represent and process data by measuring quantities such as voltage and current to solve a problem.  They work on supply of continuous signals as input. ... memory capacity.  They are being used in business, education, health, supermarkets & banking. 

Description : Compare 1st and 3rd generation computers.  

Last Answer :  First Generation Computers (1940-1956):  They used vacuum tube technology.  Vacuum tubes produce lot of heat and needs to be cooled with A.C.  Their examples were ENIAC, UNIVAC-I, ... Their examples were Burroughs 6700, IBM System / 360, System 3 and Control Data Corporations 3300 and 6600.

Description : A simple cabling method, known as the ……………… topology allows about 30 computers on a maximum cable length of about 600 feet. A) Ring B) Bus C) Star D) Mesh

Last Answer : B) Bus

Description : Which of the following is/ are the drawbacks of Ring Topology? A) Failure of one computer, can affect the whole network B) Adding or removing the computers disturbs the network activity. C) If the central hub fails, the whole network fails to operate. D) Both of A and B

Last Answer : D) Both of A and B

Description : IPv4 and IPv6 are addresses used to identify computers on the internet. Find the correct statement out of the following: (A) Number of bits required for IPv4 address is more than number of bits required for ... of bits required for IPv6 address. (D) Number of bits required for IPv4 address is 64. 

Last Answer : (C) Number of bits required for IPv4 address is less than number of bits required for IPv6 address.

Description : In a fully-connected mesh network with 10 computers, total .............. number of cables are required and ................ number of ports are required for each device. (A) 40, 9 (B) 45, 10 (C) 45, 9 (D) 50, 10

Last Answer : (C) 45, 9

Description : Software Engineering is an engineering discipline that is concerned with: (1) how computer systems work. (2) theories and methods that underlie computers and software systems. (3) all ... (4) all aspects of computer-based systems development, including hardware, software and process engineering.

Last Answer : Answer: 3

Description : Which sentence uses negatives correctly A Nobody hardly never sees them here. B Cameron, don't bother with the next chapter yet. C She said she wasn't never babysitting them again. D Doesn't the library have no prints of famous paintings?

Last Answer : it is A Nobody hardly never sees them here.

Description : A ……………… is a program that secretly takes over another Internet-attached computer and then uses that computer to launch attacks. A) Worm B) Zombie C) Virus D) Trap doors

Last Answer : B) Zombie

Description : Match the following mechanisms for interrupting the execution of a process and their uses. i) Interrupt a) Call to an operating system function ii) Trap b) Reaction to an asynchronous external event iii) Supervisor Call c) Handling of a error ... -a, iii-b C) i-b, ii-c, iii-a D) i-a, ii-c, iii-b

Last Answer : C) i-b, ii-c, iii-a

Description : Ethernet system uses which of the following technology. A) Bus B) Ring C) Star D) Tree

Last Answer : A) Bus

Description : Merge sort uses a) Divide-and-conquer b) Backtracking c) Heuristic approach d) Greedy approach

Last Answer : a) Divide-and-conquer

Description : The versions of windows operating system like windows XP and window Vista uses following file system: (A) FAT-16 (B) FAT-32 (C) NTFS (NT File System) (D) All of the above

Last Answer : (D) All of the above

Description : Binary symmetric channel uses (A) Half duplex protocol (B) Full duplex protocol (C) Bit oriented protocol (D) None of the above

Last Answer : (A) Half duplex protocol

Description : Bresenham line drawing algorithm is attractive because it uses (A) Real arithmetic only (B) Integer arithmetic only (C) Floating point arithmetic (D) Real and integer arithmetic

Last Answer : (B) Integer arithmetic only

Description : A client-server system uses a satellite network, with the satellite at a height of 40,000 kms. What is the best-case delay in response to a request? (Note that the speed of light in air is 3,00,000 km/second). (A) 133.33 m sec (B) 266.67 m sec (C) 400.00 m sec (D) 533.33 m sec

Last Answer : (D) 533.33 m sec Explanation: The request has to go up and down, and the response has to go up and down. The total path length traversed is thus 160.000 km. The speed of light in air and vacuum is 300,000 km/sec, so the propagation delay alone is 160,000/300,000 sec or about 533 msec. 

Description : Linux operating system uses (A) Affinity Scheduling (B) Fair Preemptive Scheduling (C) Hand Shaking (D) Highest Penalty Ratio Next

Last Answer : (B) Fair Preemptive Scheduling Explanation: Linux uses two process-scheduling algorithms: 1. A time-sharing algorithm for fair preemptive scheduling between multiple processes 2. A real-time algorithm for tasks where absolute priorities are more important than fairness

Description : Given the following statements : S1 : SLR uses follow information to guide reductions. In case of LR and LALR parsers, the look-aheads are associated with the items and they make use of the left context available to ... (C) S1 is correct and S2 is not correct. (D) S1 is correct and S2 is correct.

Last Answer : (D) S1 is correct and S2 is correct.

Description : Data Integrity control uses ................ (A) Upper and lower limits on numeric data. (B) Passwords to prohibit unauthorised access to files. (C) Data dictionary to keep the data (D) Data dictionary to find last access of data

Last Answer : (B) Passwords to prohibit unauthorised access to files.

Description : Which of the following statements are true with reference to the way of describing XML data ? (a) XML uses DTD to describe the data (b) XML uses XSL to describe the data (c) XML uses a description node to describe the data Codes : (A) (a) only (B) (b) only (C) (a) and (b) (D) (a) and (c)

Last Answer : Answer: D

Description : ................. uses electronic means to transfer funds directly from one account to another rather than by cheque or cash? (A) M-Banking (B) E-Banking (C) O-Banking (D) C-Banking

Last Answer : (B) E-Banking

Description : Optical fiber uses reflection to guide light through a channel, in which angle of incidence is ................. the critical angle. (A) equal to (B) less than (C) greater than (D) less than or equal to

Last Answer : (C) greater than

Description : compiler optimization, operator strength reduction uses mathematical identities to replace slow math operations with faster operations. Which of the following code replacements is an illustration of operator strength reduction? (A) Replace P + ... * P or Replace 3 + 4 by 7. (B) Replace P * 32 by P

Last Answer : (B) Replace P * 32 by P

Description : In a fast Ethernet cabling, 100 Base-TX uses ........... cable and maximum segment size is ............ (A) twisted pair, 100 metres (B) twisted pair, 200 metres (C) fibre optics, 1000 metres (D) fibre optics, 2000 metres

Last Answer : (A) twisted pair, 100 metres

Description : Which of the following neural networks uses supervised learning? (A) Multilayer perceptron (B) Self organizing feature map (C) Hopfield network (1) (A) only (2) (B) only (3) (A) and (B) only (4) (A) and (C) only

Last Answer : (1) (A) only

Description : Station A uses 32 byte packets to transmit messages to station B using sliding window protocol. The round trip delay between A and B is 40 milli seconds and the bottleneck bandwidth on the path between A and B is 64 kbps. The optimal window size of A is (1) 20 (2) 10 (3) 30 (4) 40

Last Answer : (2) 10

Description : Give the number of principal vanishing point(s) along with their direction for the standard perspective transformation: (A) Only one in the direction K (B) Two in the directions I and J (C) Three in the directions I, J and K (D) Only two in the directions J and K 

Last Answer : (A) Only one in the direction K

Description : Show that the relation R in the set A of all the books in a library of a school given by R = {(x, y): x and -Maths 9th

Last Answer : Given: A = {All books in a library of a school} R = {(x, y): x and y have the same number of pages} Reflexivity: (x, x) ∈ R ⇒ R is reflexive on A Symmetric: Since books x and y have the same number of pages ... and (y, z) ∈ R ⇒ (x, z) ∈ R ⇒ R is transitive on A. Hence, R is an equivalence relation.

Description : Where can I find school library software online without having to purchase the CD?

Last Answer : Resourcemate.com offers downloadable library software without having to use a CD. This product is known to have a great catoluging system.

Description : Recreational Reading should be Options: A) Reserved For The School Library Period. B) Assigned As Homework. C) A Responsibility Of The Home Not The School D) An Integral Part Of Language Art Curriculum.

Last Answer : D) An Integral Part Of Language Art Curriculum. 

Description : If you have been given the additional responsibility of the school library, you think that Options: A) You are the exclusive reader as you are the exclusive worker there B) It is the right of ... the resources of library D) It is the right of all the teachers to make appropriate use of library

Last Answer : A) You are the exclusive reader as you are the exclusive worker there 

Description : Could You Please Give Advice About This Fight I Had in the Library?

Last Answer : You might have switched to another table, if possible. I know you shouldn’t HAVE to, but if the staff in the libe won’t do dick, there’s not much else that could have been done. Not sure what kinda advice you’re lookin for, I mean those people you mention were veritable ass scabs.

Description : TCP/IP ................. layer corresponds to the OSI models to three layers. A) Application B) Presentation C) Session D) Transport

Last Answer : A) Application

Description : Which of the communication modes support two way traffic but in only once direction of a time? A) Simplex B) Half-duplex C) Three - quarter's duplex D) Full duplex

Last Answer : B) Half-duplex

Description : Architecture of the database can be viewed as (A) two levels. (B) four levels. (C) three levels. (D) one level.

Last Answer : (C) three levels

Description : Arrays in C language can have ................. with reference to memory representation. (A) n-subscripts (B) two-subscripts (C) only one subscript (D) three subscripts only

Last Answer : (C) only one subscript 

Description : The following three golden rules: (i) Place the user in control (ii) Reduce the user’s memory load (iii) Make the interface consistent are for (A) User satisfaction (B) Good interface design (C) Saving system’s resources (D) None of these

Last Answer : (B) Good interface design 

Description : In hierarchical routing with 4800 routers, what region and cluster sizes should be chosen to minimize the size of the routing table for a three layer hierarchy? (A) 10 clusters, 24 regions and 20 routers (B ... (C) 16 clusters, 12 regions and 25 routers (D) 15 clusters, 16 regions and 20 routers

Last Answer : (D) 15 clusters, 16 regions and 20 routers Rooters minimum, then regions minimum, then clusters minimum.

Description : Given below are three basic rules: I. Squash and Stretch II. Slow-in and Slow-out III. To stage the action properly These rules are applied in case of (A) Rendering (B) Morphing (C) Animation (D) All the above

Last Answer : (C) Animation

Description : Which of the following is not true with respect to a trackball and/or spaceball ? I. A trackball is a two dimensional positioning device while as a spaceball provides six degrees of freedom II. Unlike the trackball a spaceball does ... of freedom. (A) I & II (B) II & III (C) II only (D) III only

Last Answer : (D) III only

Description : The control string in C++ consists of three important classifications of characters (A) Escape sequence characters, Format specifiers and Whitespace characters (B) Special characters, White-space ... and Non-white space characters (D) Special characters, White-space characters and Format specifiers

Last Answer : (C) Format specifiers, White-space characters and Non-white space characters

Description : Which of the following color models are defined with three primary colors ? (A) RGB and HSV color models (B) CMY and HSV color models (C) HSV and HLS color models (D) RGB and CMY color models

Last Answer : (D) RGB and CMY color models

Description : Consider the following three SQL queries (Assume the data in the people table) : (a) Select Name from people where Age>21; (b) Select Name from people where Height>180; (c) Select Name from people where (Age>21) or (Height ... number of rows returned by the SQL query (c) ? (A) 3 (B) 7 (C) 10 (D) 21

Last Answer : (C) 10

Description : Consider a system with twelve magnetic tape drives and three processes P1, P2 and P3. Process P1 requires maximum ten tape drives, process P2 may need as many as four tape drives and P3 may need upto nine ... , system is in: (A) safe state (B) unsafe state (C) deadlocked state (D) starvation state

Last Answer : Answer: B