Description : With …………………. A page is written out to secondary memory only when it has been selected for replacement. A) pre-cleaning B) demand cleaning C) required cleaning D) fast cleaning
Last Answer : B) demand cleaning
Description : Repository of information gathered from multiple sources, storing under unified scheme at a single site is called as (A) Data mining (B) Meta data (C) Data warehousing (D) Database
Last Answer : (C) Data warehousing
Description : ............... model is designed to bring prices down by increasing the number of customers who buy a particular product at once. (A) Economic Order Quantity (B) Inventory (C) Data Mining (D) Demand-Sensitive Pricing
Last Answer : (D) Demand-Sensitive Pricing
Description : Given the following statements: (a) Strategic value of data mining is time stamping (b) Information collection is an expensive process in building an expert system. Which of the following options is correct ? (A) Both (a) and (b) ... true (C) (a) is true, (b) is false (D) (a) is false, (b) is true
Last Answer : (B) Both (a) and (b) are true
Description : Consider the following two statements: (a) Business intelligence and Data warehousing is used for forecasting and Data mining. (b) Business intelligence and Data warehousing is used for analysis of large volumes of sales data. Which one ... C) (a) is false, (b) is true (D) Both (a) and (b) are false
Description : In Data mining, .............. is a method of incremental conceptual clustering. (A) STRING (B) COBWEB (C) CORBA (D) OLAD
Last Answer : (B) COBWEB
Description : In Data mining, classification rules are extracted from .............. (A) Data (B) Information (C) Decision Tree (D) Database
Last Answer : (C) Decision Tree
Description : ................. is subject oriented, integrated, time variant, non-volatile collection of data in support of management decisions. (A) Data mining (B) Web mining (C) Data warehouse (D) Database Management System
Last Answer : (C) Data warehouse
Description : A t-error correcting q-nary linear code must satisfy: Where M is the number of code words and X is (1) qn (2) qt (3) q-n (4) q-t
Last Answer : (1) qn
Description : Which of the following protocols is an application layer protocol that establishes, manages and terminates multimedia sessions? (A) Session Maintenance Protocol (B) Real - time Streaming Protocol (C) Real - time Transport Control Protocol (D) Session Initiation Protocol
Last Answer : (D) Session Initiation Protocol
Description : Consider the formula in image processing RD = 1 - (1/CR) Where CR = n1/n2 CR is called as compression ratio n1 and n2 denotes the number of information carrying units in two datasets that represent ... . (A) Data Compression (B) Data Redundancy (C) Data Relation (D) Data Representation
Last Answer : (B) Data Redundancy
Description : Which of the following task/tasks Artificial Intelligence could not do yet? a) Understand natural language robustly b) Web mining c) Construction of plans in real time dynamic systems d) All of the mentioned
Last Answer : d) All of the mentioned
Description : ………………. is responsible for all aspects of data processing, operation research, organization and method, system analysis and design investments. A) Management Services Director B) Data Processing Manager C) Computer Manager D) Both B and C
Last Answer : A) Management Services Director
Description : ………….. gives defining the flow of the data through and organization or a company or series of tasks that may or may not represent computerized processing. A) System process B) System flowchart C) System design D) Structured System
Last Answer : B) System flowchart
Description : . Costs for a computer based information system include the salaries of the system analysts and computer programmers. costs for a computer based information system include the ... ) Development, Development B) Development, Operating C) Operating, Development C) Operating, Operating
Last Answer : B) Development, Operating
Description : Which are the following is / are the level(s) of documentation? A) Documentation for management B) Documentation for user C) Documentation for data processing department D) All of the above
Last Answer : D) All of the above
Description : Which of the following is characteristic of an MIS? (A) Provides guidance in identifying problems, finding and evaluating alternative solutions, and selecting or comparing alternatives. (B) Draws on ... Has as its goal the efficiency of data movement and processing and interfacing different TPS.
Last Answer : (B) Draws on diverse yet predictable data resources to aggregate and summarize data.
Description : Which of the following statements concerning Object-Oriented databases is FALSE? (A) Objects in an object-oriented database contain not only data but also methods for processing the data. (B ... Object-oriented databases store more types of data than relational databases and access that data faster.
Last Answer : (C) Object-oriented databases are more adapt at handling structures (analytical) data than relational databases.
Description : Industries producing complete articles for direct consumption & also processing industries is called as_______________. A. Manufacturing industries. B. Feeder Industries. C. Service Industries. D. Mining or Quarrying.
Last Answer : A. Manufacturing industries.
Description : The main task carried out in the …………… is to remove repeating attributes to separate tables. A) First Normal Form B) Second Normal Form C) Third Normal Form D) Fourth Normal Form
Last Answer : D) Fourth Normal Form
Description : The …………………………. Is a collection of protocols designed by Internet Engineering Task Force(IETF) to provide security for a packet at the Network level. A) IPsec B) Netsec C) Packetsec D) Protocolsec
Last Answer : A) IPsec
Description : To place a sound into a word document, following feature of windows is used: (A) Clip board (B) Task switching (C) C Win App (D) OLE
Last Answer : (D) OLE
Description : You have to sort a list L, consisting of a sorted list followed by a few ‘random’ elements. Which of the following sorting method would be most suitable for such a task ? (A) Bubble sort (B) Selection sort (C) Quick sort (D) Insertion sort
Last Answer : (D) Insertion sort
Description : Consider the two class classification task that consists of the following points: Class C1: [1 1.5] [1 -1.5] Class C2: [-2 2.5] [-2 -2.5] The decision boundary between the two classes using single perceptron is given by: (A) x1+x2+1.5=0 (B) x1+x2-1.5=0 (C) x1+1.5=0 (D) x1-1.5=0
Last Answer : (C) x1+1.5=0
Description : Which of the following statements is incorrect for Parallel Virtual Machine (PVM)? (A) The PVM Communication model provides asynchronous blocking send, asynchronous blocking receive and non-blocking receive function. ... of such messages. (D) In PVM Model, the message order is not preserved.
Last Answer : (D) In PVM Model, the message order is not preserved.
Description : Which of the following is the process of the pre-processing stage? a.Remove support b.Checking 3D CAD data c.De-powdering loose material d.Dip in a binder to strengthen the part
Last Answer : b.Checking 3D CAD data
Description : In Java variables, if first increment of the variable takes place and then the assignment occurs. This operation is also called ............................. . A) pre increment B) post increment C) incrementation D) pre incrementation
Last Answer : A) pre increment
Description : The translator which performs macro calls expansion is called : (A) Macro processor (B) Micro pre-processor (C) Macro pre-processor (D) Dynamic linker
Last Answer : (C) Macro pre-processor
Description : List some of the most used File Processing functions in C?
Last Answer : Ans: Most used file processing functions in C are- fopen()-used to open a file and set the file pointer to the beginning or end of a File. fclose()-used to close an active File. getc()-used ... used to write data to a File. rewind()-used to move the file pointer to the beginning of a File.
Description : ____________is the delivery of on-demand computing services, from applications to storage and processing power, typically over the internet and on a pay-as-you-go basis. a) Cloud computing b) Cloud Infrastructure c) Distributed system d) None of these
Last Answer : Cloud computing
Description : State weather the following statement is true or false for EJB. 1. EJB exists in the middle-tier 2. EJB specifies an execution environment 3. EJB supports transaction processing A) 1-true, 2. true, 3. true B) 1- ... false, 3. true C) 1- false, 2- false, 3- false D) 1-true, 2-true, 3-false
Last Answer : A) 1-true, 2. true, 3. true
Description : The two central themes of modern operating system are ............... A) Multiprogramming and Distributed processing B) Multiprogramming and Central Processing C) Single Programming and Distributed processing D) None of above
Last Answer : A) Multiprogramming and Distributed processing
Description : .......... is a special type of programming language used to provide instructions to the monitor simple batch processing schema. A) Job control language (JCL) B) Processing control language (PCL) C) Batch control language (BCL)
Last Answer : A) Job control language (JCL)
Description : Use the new system as the same time as the old system to compare the results. This is known as … A) Procedure Writing B) Simultaneous processing C) Parallel Operation D) File Conversion
Last Answer : C) Parallel Operation
Description : DML is provided for (A) Description of logical structure of database. (B) Addition of new structures in the database system. (C) Manipulation & processing of database. (D) Definition of physical structure of database system.
Last Answer : C) Manipulation & processing of database.
Description : Semi-join strategies are techniques for query processing in distributed database system. Which of the following is a semi-join technique? (A) Only the joining attributes are sent from one site to ... the attributes are sent from one site to another and then only the required rows are returned.
Last Answer : (C) Only the joining attributes are sent from one site to another and then only the required rows are returned.
Description : If S1 is total number of modules defined in the program architecture, S3 is the number of modules whose correct function depends on prior processing then the number of modules not dependent on prior processing is: (A) 1 + S3/S1 (B) 1 - S3/S1 (C) 1 + S1/S3 (D) 1 - S1/S3
Last Answer : (B) 1 - S3/S1
Description : What is the output of the following program ? (Assume that the appropriate pre-processor directives are included and there is no syntax error) main() { char S[ ] = "ABCDEFGH"; printf ("%C",* (& ... Base address of S is 1000 */ } (A) ABCDEFGH1000 (B) CDEFGH1000 (C) DDEFGHH1000 (D) DEFGH1000
Last Answer : (D) DEFGH1000
Description : Consider the following statements: (a) Depth - first search is used to traverse a rooted tree. (b) Pre - order, Post-order and Inorder are used to list the vertices of an ordered rooted tree. (c) Huffman's algorithm is used to find an optimal ... (d) (C) (a) , (b) and (c) (D) (a), (b) , (c) and (d)
Last Answer : (D) (a), (b) , (c) and (d)
Description : In an operating system, indivisibility of operation means : (A) Operation is interruptable (B) Race - condition may occur (C) Processor can not be pre-empted (D) All of the above
Last Answer : (C) Processor can not be pre-empted
Description : The word processing task associated with changing the appearance of a document is A) Editing B) Writing C) Formatting D) All of above
Last Answer : Answer : C
Description : Natural Language generation is the main task of Natural language processing. a) True b) False
Last Answer : a) True
Description : The word processing task associated with changing the appearance of a document is a. Editing b. Writing c. Formatting d. All of above
Last Answer : Formatting
Description : What do you call the word processing task associated with changing the appearance of a document: a) Formatting b) Editing c) Rewording d) None of The Above
Last Answer : a) Formatting
Last Answer : c. Formatting
Description : ThThe order -processing task that involves verifying product availability, checking prices and customer credit ratings, and filling orders is A)warehousing. B)order handling. C)information processing. D)materials handling.
Last Answer : B)order handling
Description : Using which method in transport layer data integrity can be ensured? a. Checksum b. Repetition codes c. Cyclic redundancy checks d. Error correcting codes
Last Answer : a. Checksum
Description : We have some gorgeous May showers happening and, right now, a wonderful thunderstorm. What do you like to do when it's storming?
Last Answer : I am hearing that rain and thunder as I type. I also have candles lit. The supper dishes are done, and my kids and I are just settling in to watch a movie.
Description : How soon after the storming of the Bastille did its demolition begin?
Last Answer : According to wikipedia, the demolition was complete by November, 1789. Here’s the full article.
Description : following the storming of the bastille the national constituent assembly?
Last Answer : abolished the feudal system and many aristocratic privilegesapex