A software program that infers and manipulates existing knowledge in order to generate new knowledge is known as: (A) Data Dictionary (B) Reference Mechanism (C) Inference Engine (D) Control Strategy

1 Answer

Answer :

(C) Inference Engine

Related questions

Description : The PC productivity tool that manipulates data organized in rows and coloumn is called a a) spreadhsheet b) word processing document c) presentation mechanism d) database record manager e) None of these

Last Answer : a) spreadhsheet

Description : Data Integrity control uses ................ (A) Upper and lower limits on numeric data. (B) Passwords to prohibit unauthorised access to files. (C) Data dictionary to keep the data (D) Data dictionary to find last access of data

Last Answer : (B) Passwords to prohibit unauthorised access to files.

Description : ……. is an electronic device that manipulates information or data according to the set of instructions called program. -Technology

Last Answer : Computeris an electronic device that manipulates information or data according to the set of instructions called program.

Description : In Unix operating system, special files are used to : (A) buffer data received in its input from where a process reads (B) provide a mechanism to map physical device to file names (C ... pointers associated with i-nodes (D) store information entered by a user application program or utility program

Last Answer : (B) provide a mechanism to map physical device to file names 

Description : The jdb is used to A) Create a jar archive B) Debug a java program C) Create C header file D) Generate java documentation

Last Answer : B) Debug a java program

Description : Adaptive maintenance is a maintenance which ............. (A) Correct errors that were not discovered till testing phase. (B) is carried out to port the existing software to a new environment. (C) improves the system performance. (D) both (B) and (C)

Last Answer : (B) is carried out to port the existing software to a new environment.

Description : DDS stands for ………………… A) Data Data Systems B) Data Digital System C) Data Dictionary Systems D) Digital Data Service

Last Answer : C) Data Dictionary Systems

Description : Data which improves the performance and accessibility of the database are called: (A) Indexes (B) User Data (C) Application Metadata (D) Data Dictionary

Last Answer : (A) Indexes

Description : From the given data below: a b b a a b b a a b which one of the following is not a word in the dictionary created by LZ-coding (the initial words are a, b)? (1) a b (2) b b (3) b a (4) b a a b 

Last Answer : (4) b a a b 

Description : The basic inference mechanism in semantic network in which knowledge is represented as Frames is to follow the links between the nodes. a) True b) False

Last Answer : a) True

Description : Raju and Rashmi observe elongated creatures in their school. Raju infers that to be a garden lizard where as Rashmi infers that to be a salamander. Help them overcome their confusion.

Last Answer : If the creature has a smooth and moist skin then it is an amphibian as in salamander. If the creature has dry scales then it is reptile as in garden lizard.

Description : What is the name of the way the computer manipulates the data in the data ?

Last Answer : Processing is the process by which a computer manipulates data into data.

Description : Which processor has a single instruction multiple data stream organization that manipulates the common instruction by means of multiple functional units. a. Attached array processor b. SIMD array processor c. Both d. None

Last Answer : b. SIMD array processor

Description : Consider a program that consists of 8 pages (from 0 to 7) and we have 4 page frames in the physical memory for the pages. The page reference string is :  1 2 3 2 5 6 3 4 6 3 7 3 1 5 3 6 3 4 2 4 3 4 5 ... to fill available page frames with pages): (A) 9 and 6 (B) 10 and 7 (C) 9 and 7 (D) 10 and 6

Last Answer : (B) 10 and 7

Description : The basic inference mechanism in semantic network is to follow the links between the nodes. a) True b) False

Last Answer : a) True

Description : Which one of the following is not a software myth? (A) Once we write the program and get it to work, our job is done. (B) Project requirements continually change, but ... not understand how to control software projects internally, it will invariably struggle when it outsources software projects.

Last Answer : (D) If an organization does not understand how to control software projects internally, it will invariably struggle when it outsources software projects.

Description : In which testing strategy requirements established during requirements analysis are validated against developed software? (A) Validation testing (B) Integration testing (C) Regression testing (D) System testing

Last Answer : (A) Validation testing

Description : Which of the following statement(s) is/are TRUE with regard to software testing? I. Regression testing technique ensures that the software product runs correctly after the changes during maintenance. II. Equivalence partitioning is a ... (1) only I (2) only II (3) both I and II (4) neither I nor II

Last Answer : (1) only I 

Description : Research is conducted to I. Generate new knowledge II. Not to develop a theory III. Obtain research degree IV. Reinterpret existing knowledge Which of the above are correct? (A) I, III & II (B) III, II & IV (C) II, I & III (D) I, III & IV

Last Answer : (D) I, III & IV

Description : Which is also called single inference rule? a) Reference b) Resolution c) Reform d) None of the mentioned

Last Answer : b) Resolution

Description : A manufacturing industry plans to improve its energy performance under PAT through  implementation of an energy conservation scheme. After implementation, calculate the  Plant Energy Performance (PEP) with 2015-16 as the ... 34,000 T,   Reference year (2015-16 ) Energy consumption - 27,200 MWh.

Last Answer : Production factor (PF) = 28750/34000 = 0.846 …………………….1 mark Ref year equivalent energy (RYEE) = Ref Year Energy Use (RYEU) x PF   = 27,200 x 0.846= 23011MWh

Description : .Single inference rule also called… a. Resolution b. Reference c.Reference d.None of these

Last Answer : a. Resolution

Description : A child is a back -bencher and is unable to watch the black-board clearly, therefore he stands, see and sit repeatedly. It disturbs the nearby classmates, what inference will you draw with reference to the ... defective eyes C) The black-board may has shining effect of light D) None of the above

Last Answer : A) The child has poor eye-sight 

Description : Which of the following statement(s) is/are correct with reference to curve generation? I. Hermite curves are generated using the concepts of interpolation. II. Bezier curves are generated using the concepts of approximation. III. The ... (B) II and III only (C) I and II only (D) I, II and III only

Last Answer : (D) I, II and III only

Description : What is the output of the following code? a={1:"A",2:"B",3:"C"} print(a.setdefault(3)) a) {1: ‘A’, 2: ‘B’, 3: ‘C’} b) C c) {1: 3, 2: 3, 3: 3} d) No method called setdefault() exists for dictionary

Last Answer : b) C

Description : Which of the following is not a declaration of the dictionary? a) {1: ‘A’, 2: ‘B’} b) dict([[1,”A”],[2,”B”]]) c) {1,”A”,2”B”} d) { }

Last Answer : c) {1,”A”,2”B”}

Description : Suppose d = {“john”:40, “peter”:45}. To obtain the number of entries in dictionary which command do we use? a) d.size() b) len(d) c) size(d) d) d.len()

Last Answer : b) len(d)

Description : Which of the following statements create a dictionary? a) d = {} b) d = {“john”:40, “peter”:45} c) d = {40:”john”, 45:”peter”} d) All of the mentioned

Last Answer : d) All of the mentioned

Description : Which of the following are the principles tasks of the linker? I. Resolve external references among separately compiled program units. II. Translate assembly language to machine code. III. Relocate code and data relative to the beginning of ... (A) I and II (B) I and III (C) II and III (D) I and IV

Last Answer : (B) I and III

Description : Which layer of OSI reference model is responsible for decomposition of messages and generation of sequence numbers to ensure correct re-composition from end to end of the network? (A) Physical (B) Data-link (C) Transport (D) Application

Last Answer : (C) Transport 

Description : Which layers of the OSI reference model are host-to-host layers ? (A) Transport, Session, Presentation, Application (B) Network, Transport, Session, Presentation (C) Data-link, Network, Transport, Session (D) Physical, Data-link, Network, Transport

Last Answer : (A) Transport, Session, Presentation, Application

Description : Which of the following statements are true with reference to the way of describing XML data ? (a) XML uses DTD to describe the data (b) XML uses XSL to describe the data (c) XML uses a description node to describe the data Codes : (A) (a) only (B) (b) only (C) (a) and (b) (D) (a) and (c)

Last Answer : Answer: D

Description : Which of the following, is a component of an expert system? a) inference engine b) knowledge base c) user interface d) all of the mentioned

Last Answer : d) all of the mentioned

Description : …………. Is the process of creating new classes, called derived classes from existing classes called base class. A) Inheritance B) Encapsulation C) Polymorphism D) Overloading

Last Answer : A) Inheritance

Description : What are the ways someone manipulates you, yet you allow it because you find it amusing if not just totally love it?

Last Answer : answer:Yeah. There's a person, whose company I enjoy, who gets a real kick out of pushing my buttons on various issues. Often, I know he's trying to get me irritated and I'll respond ... he knows that I'm getting similar amusement from playing along. Is that the sort of manipulation you mean?

Description : ______ research occurs when the researcher manipulates the independent variable. a. causal-comparative research b. experimental research c. ethnography d. correlational research

Last Answer : b. experimental research

Description : There are primarily two modes for an inference engine: forward chaining and backward chaining. a) True b) False

Last Answer : a) True

Description : ……….. includes review of the existing procedures and information flow. A) Feasibility Study B) Feasibility report C) System Design D) System analysis

Last Answer : A) Feasibility Study

Description : Generalised conclusion on the basis of a sample is technically known as: (A) Data analysis and interpretation (B) Parameter inference (C) Statistical inference (D) All of the above

Last Answer : (C) Statistical inference

Description : ………… is a good example of deterministic system. A) Life cycle B) Computer Program C) Software Program D) None of the above

Last Answer : B) Computer Program

Description : Software testing is (A) the process of establishing that errors are not present. (B) the process of establishing confidence that a program does what it is supposed to do. (C) the process of ... as per specifications. (D) the process of executing a program with the intent of finding errors. 

Last Answer : (D) the process of executing a program with the intent of finding errors.

Description : The software ................. of a program or a computing system is the structure or structures of the system, which comprise software components, the externally visible properties of those components, and the relationships among them. (A) Design (B) Architecture (C) Process (D) Requirement

Last Answer : (B) Architecture

Description : Which of the following is not typically a benefit of dynamic linking? I. Reduction in overall program execution time. II. Reduction in overall space consumption in memory. III. Reduction in overall space consumption on disk. IV. ... updates. (A) I and IV (B) I only (C) II and III (D) IV only

Last Answer : (B) I only 

Description : What is true of isonicotinic acid hydrazide (INH): A. An active transport mechanism concentrates INH inside sensitive mycobacteria B. Sensitive mycobacteria generate an active metabolite of INH through a catalaseperoxidase enzyme C. The most common mechanism of INH resistance is mutation i

Last Answer : D. Both 'A' and 'B' are correct

Description : Which of the following concepts means adding new concepts to a program as it runs? (A) Data hiding (B) Dynamic loading (C) Dynamic typing (D) Dynamic binding

Last Answer : (B) Dynamic loading

Description : Which of the following is not a mechanism that DHCP supports for IP address allocation? A) Automatic allocation B) Static allocation C) Dynamic allocation D) Manual allocation

Last Answer : B) Static allocation

Description : Which of the following is not a mechanism that DHCP supports for IP address allocation? A) Automatic allocation B) Static allocation C) Dynamic allocation D) Manual allocation

Last Answer : A) Automatic allocation

Description : What kind of mechanism is to be taken into account for converting a weak entity set into strong entity set in entity-relationship diagram ? (A) Generalization (B) Aggregation (C) Specialization (D) Adding suitable attributes

Last Answer : (D) Adding suitable attributes

Description : What are the plant conditions existing in the 'engine speed control' diagram shown in the illustration? EL-0096 A. The Bridge is in control in the 'auto. maneuver' mode. B. The Engine Room is in control in ... in the 'auto. split' mode. D. The Engine Room is in control in the 'auto. maneuver' mode.

Last Answer : Answer: D