In a Database Managemnt System (DBMS), the content and the location of the data is defined by the ____. (1) Multi Dimensional data (2) Sequence data (3) Meta data (4) Sub data

1 Answer

Answer :

Meta data

Related questions

Description : There arecertain packages that allow people to define data items, place these items in particular records, combine therecords into designated files and then manipulate and retrieve the storeddata. What arethey ... (DBMS) C. Batch processingsystem D. Data communication package E. None of the above

Last Answer : Database management system (DBMS)

Description : The DBMS utility, ...................... allows to reconstruct the correct state of database from the backup and history of transactions. A) Backup B) Recovery C) Monitoring D) Data loading

Last Answer : B) Recovery

Description : DBMS provides the facility of accessing data from a database through (A) DDL (B) DML (C) DBA (D) Schema 

Last Answer : (B) DML

Description : Repository of information gathered from multiple sources, storing under unified scheme at a single site is called as (A) Data mining (B) Meta data (C) Data warehousing (D) Database

Last Answer : (C) Data warehousing

Description : What is DBMS or Database Management System ?

Last Answer : DataBase Management System is the full form of DBMS . DBMS is a set of programs required for accessing , storing , controlling and managing interconnected information called database management systems.

Description : Explain Database Management. What are the features of DBMS? -Technology

Last Answer : It refers to the software that is responsible for storing, maintaining and utilising a database. It enables a user to define, create and maintain the database and provide controlled access on it. A ... Data security e.g. MS-Access, Corel Paradox, Lotus Approach, MySQL, OpenOffice.org Base etc.

Description : DBMS is a program that controls the creation, maintenance and use of database. Here, DBMS referred to -Technology

Last Answer : (c) Here, DBMS stands for Database Management System.

Description : Centralizing the integrity checking directly under the DBMS ………….. Duplication and ensures the consistency and validity of the database. A) Increases B) Skips C) Does not reduce D) Reduces

Last Answer : D) Reduces

Description : DBMS is a collection of ………….. that enables user to create and maintain a database. A) Keys B) Translators C) Program D) Language Activity

Last Answer : C) Program

Description : In order to use a DBMS, it is important to understand A. the physical schema B. all sub-schemas that thesystem supports C. one subschema D. both (a)and (b) E. None of the above

Last Answer : one subschema

Description : DBMS stands for: a) Data Base Management Software b) Data Base Management System c) Diode Base Management System d) None of These

Last Answer : b) Data Base Management System

Description : DBMS stands for: a) Dynamic Bureau of Management System b) Document Base Management System c) Data Base Management System d) None of These

Last Answer : c) Data Base Management System

Description : The ____ level contains constituents at the third level which are knowledge based system, heuristic search, automatic theorem proving, multi-agent system. A. Cognition level B. Gross level C. Functional level D. All of above

Last Answer : B. Gross level

Description : What is the Meaning of multi dimensional?

Last Answer : What is the answer ?

Description : Vector A. It do not need the control of the human operator during their execution B. An arrow in a multi-dimensional space. It is a quantity usually characterized by an ordered set of scalars C. The validation of a theory on the basis of a finite number of examples D. None of these

Last Answer : B. An arrow in a multi-dimensional space. It is a quantity usually characterized by an ordered set of scalars

Description : Define: (i) Two dimensional array (ii) Multi-dimensional array

Last Answer : (i) Two dimensional array Two dimensional array is a collection of similar type of data elements arranged in the form of rows & columns. E.g. Array can be declared as int arr[3][3]; In this there can be 9 ... (3d) array. For example, float y[2][4][3]; Here, The array y can hold 24 elements.

Description : Which of the following pairs have different expressive power? (1) Single-tape-turing machine and multi-dimensional turing machine. (2) Multi-tape turing machine and multi-dimensional ... non-deterministic pushdown automata. (4) Deterministic finite automata and Non-deterministic finite automata.

Last Answer : Deterministic push down automata and non-deterministic pushdown automata.

Description : MIRV stands for (1) Multi-directional Independently Reoriented Vehicle (2) Multipurpose Integrally-targeted Revolutionary Vehicle (3) Multiple Independently-targetable Re-entry Vehicle (4) Multi-dimensional Independent Reentry Vehicle

Last Answer : Multiple Independently-targetable Re-entry Vehicle

Description : Physical security is concerned with protecting computer hardware from human tampering and natural disasters and _____security is concerned with protecting software from unauthorized tampering or damage: a) Data b) Cyber c) Internet d) Meta Physical e) Publicity

Last Answer : b) Cyber

Description : Ellipse of stress is used to find a. Resultant stress on any plane in a bi-axial stress system b. Resultant stress on any plane in a general two dimensional system c. Maximum shear stress d. Location of planes of maximum shear stress

Last Answer : a. Resultant stress on any plane in a bi-axial stress system

Description : Is it true or false that a relational database typically consists of related two dimensional tables?

Last Answer : Need answer

Description : Which of the following will happen when data is entered into a memory location? A) It will add to the content of the location B) It will change the address of the memory location C) It will erase the previous content D) It will not be fruitful if there is already some data at the location

Last Answer : Answer : C

Description : The use of antibiotics can be based on either the clinical course of a patient without the benefit of well-defined microbiologic data (empiric therapy), or targeted at ... which polymicrobial infection is identified, specifically-directed treatment for the predominant organism is satisfactory

Last Answer : Answer: c The use of empiric therapy without the benefit of well-defined microbiologic data is appropriate when there is sufficient clinical evidence to support the diagnosis such that it would ... components of the infection if the body site is such that these microorganisms may be present

Description : For SEO site content should have?  A. Title tags  B.Meta Descriptions  C.Both Title tags & Meta Descriptions  D.None of the above

Last Answer : C.Both Title tags & Meta Descriptions

Description : For SEO site content should have? A. meta descriptions B. title tags C. Both A and B D. None of the above

Last Answer : C. Both A and B

Description : A three dimensional array in C' is declared as int A[x][y][z]. Here, the address of an item at the location A[p][q][r] can be computed as follows (where w is the word length of an integer): (A) &A[0][0][0]+w(y*z*q+z*p+r) (B) &A ... *q+r) (C) &A[0][0][0]+w(x*y*p+z*q+r) (D) &A[0][0][0]+w(x*y*q+z*p+r)

Last Answer : Answer: B

Description : Two dimensional motion is not always projectile motion . in two -dimensional motion that is not projectile motion , ____ is not accelerating the objective?

Last Answer : Gravity

Description : In database, all the data are stored at a ……………. location. -Technology

Last Answer : In database, all the data are stored at acentralizedlocation.

Description : In distributed databases, location transparency allows for database users, programmers and administrators to treat the data as if it is at one location. A SQL query with location transparency needs to specify: (A) Inheritances (B) Fragments (C) Locations (D) Local formats 

Last Answer : (B) Fragments

Description : The software that is used to create text-based documents are referred to as ______ a) DBMS b) Suites c) Spreadsheets d) Word processors e) None of these

Last Answer : d) Word processors

Description : Identify the DBMS among the following. (1) MS-Access (2) MS-Power Point (3) PL/SQL (4) MS-Excel

Last Answer : PL/SQL

Description : In a rule-based system procedural domain knowledge is in the form of A : Production rules B : Rule interpreters C : Meta-rules D : control rules

Last Answer : A : Production rules

Description : In a rule-based system procedural domain knowledge is in the form of A : Production rules B : Rule interpreters C : Meta-rules D : control rules

Last Answer : A : Production rules

Description : In a rule-based system procedural domain knowledge is in the form of A : Production rules B : Rule interpreters C : Meta-rules D : control rules

Last Answer : A : Production rules

Description : Which of the following is an edge-storage or content-delivery system that caches data in different physical locations? a) Amazon Relational Database Service b) Amazon SimpleDB c) Amazon Cloudfront d) Amazon Associates Web Services

Last Answer : Amazon Cloudfront

Description : Which of the following is not the responsibility of the utilities component of DBMS software? A. creating the physical and logicaldesigns B. removingflaggedrecords for deletion C. creatingand maintaining the data dictionary D. monitoring performance E. None of the above

Last Answer : creating the physical and logicaldesigns

Description : It is better to use files than a DBMS when there are (A) Stringent real-time requirements. (B) Multiple users wish to access the data. (C) Complex relationships among data. (D) All of the above.

Last Answer : (B) Multiple users wish to access the data.

Description : _______searches through raw data on a hard drive without using a file system. A. Data mining B. Data carving C. Meta data D. Data Spoofing.

Last Answer : B. Data carving 

Description : ____ is defined as the set of technologies that can construct physical solid models from CAD data a.Rapid Production b.Rapid prototyping c.Lean Manufacturing d.Artificial intelligence

Last Answer : b.Rapid prototyping

Description : The speed of a multi-speed, squirrel-cage, induction motor operating in a fixed frequency system can be changed by _____________. A. reconnecting stator windings for different numbers of poles B. ... sequence of the applied voltage D. reconnecting the stator so that no poles have the same polarity

Last Answer : Answer: A

Description : The process of growing two or more crops simultaneously on same piece of land with definite row pattern is called as a. Inter cropping b. Mixed cropping c. Multi Storyed system d. Sequence cropping

Last Answer : c. Multi Storyed system

Description : The ____ level contains constituents at the third level which are knowledge based system, heuristic search, automatic theorem proving, multi-agent system. A. Cognition level B. Gross level C. Functional level D. All of above

Last Answer : B. Gross level 

Description : One functional sub-unit of multi-enzyme complex for de novo synthesis of fatty acids contains (A) One —SH group (B) Two —SH groups (C) Three —SH groups (D) Four —SH groups FATS AND FATTY ACID METABOLISM 87

Last Answer : Answer : B

Description : A digital multi meter is an example of an embedded system for A. Data communication B. Monitoring C. Control D. All of these

Last Answer : B. Monitoring

Description : Can/should the NSA telephone meta data be used for good purposes?

Last Answer : There’s a huge potential to use it for good. The irony is I can just picture the NSA arguing they collected the info to keep us safe, why should they allow citizens to use it to prove wrongdoing.

Description : How to describe my meta data for WP blog?

Last Answer : Meta Tags were created early on to provide concise information about a website. Meta tags list information about the web page, such as the author, keywords, description, type of document, copyright, and other core information.

Description : How do you add a copyright to the meta data of a batch of images in Adobe Bridge?

Last Answer : This is using windows, but I’m pretty sure it’ll work on a mac, too. Highlight all of the pics, right click and choose “File info.” In that dialog box you can set the copyright and add your name or any other info.

Description : The network that involves backward links from output to the input and hidden layers is called as ____. a) Self organizing maps b) Perceptrons c) Recurrent neural network d) Multi layered perceptron

Last Answer : c) Recurrent neural network

Description : Which is a method of decomposing a sequential process into sub operations: a. Pipeline b. CISC c. RISC d. Database

Last Answer : a. Pipeline