Data can be transferred in which form? -Technology

1 Answer

Answer :

Data can be transferred in the form of units such as characters, words, bytes, blocks or records from one component to another.

Related questions

Description : Data in network layer is transferred in the form of ____________ A. Layers B. Packets C. Bytes D. Bits

Last Answer : B. Packets 

Description : Assetion: In recombinant DNA technology, human genes are often transferred into bacteria (prokaryotes) or yeast (eukaryote) Reason : Both bacteria and

Last Answer : Assetion: In recombinant DNA technology, human genes are often transferred into bacteria (prokaryotes) or ... . If both assertion and reason are false

Description : Can data from OpenOfficeCalc be transferred to Microsoft Excel ?

Last Answer : Need Answer

Description : The register which holds the address of the location to or from which data are to be transferred is known as_______ A. Instruction Register B. Control register C. Memory Address Register D. None of the Above

Last Answer : C. Memory Address Register

Description : Determine from the following the basic mode of transmission system in the public data network in which data are transferred from the source to the network and from the network to the destination in the frame format. A. Voice mode B. Asynchronous mode C. Synchronous mode D. Packet mode

Last Answer : D. Packet mode

Description : Which are benefit of input/output interrupt: a. It is an external analogy to exceptions b. The processor initiates and perform all I/O operation c. The data is transferred into the memory through interrupt handler d. = Alllof these

Last Answer : d. = Alllof these

Description : Which is not true for primary storage: a) Information must be transferred to primary storage b) It is relatively more expensive c) It allows very fast access to data d) It is part of processor e) None of The Above

Last Answer : d) It is part of processor

Description : Network bottlenecks occur when ______ data sets must be transferred. a) large b) small c) big d) all of the mentioned

Last Answer : large

Description : Point out the correct statement: 1) Different types of cloud computing service models provide different levels of security services 2) Adapting your on-premises systems to a cloud model requires that you determine what ... are correct B. only 1 is correct C. 2 and 3 are correct D. none are correct

Last Answer : 1,2,3 are correct

Description : Point out the correct statement: 1) Different types of cloud computing service models provide different levels of security services 2) Adapting your on-premises systems to a cloud model requires that you determine what ... are correct B. only 1 is correct C. 2 and 3 are correct D. none are correct

Last Answer : 1,2,3 are correct

Description : Point out the correct statement. a) Different types of cloud computing service models provide different levels of security services b) Adapting your on-premises systems to a cloud model requires that ... be transferred and stored in an encrypted format for security purpose d) All of the mentioned

Last Answer : Data should be transferred and stored in an encrypted format for security purpose d) All of the mentioned

Description : Whenever data is transferred between devices, it involves the exchange of prearranged signals; what is this process called?

Last Answer : Handshaking.

Description : When the RET instruction at the end of subroutine is executed, a. the information where the stack is iniatialized is transferred to the stack pointer b. the memory address of the RET instruction is ... two data bytes stored in the top two locations of the stack are transferred to the stack pointer

Last Answer : c. two data bytes stored in the top two locations of the stack are transferred to the program counter

Description : The information on the data bus is transferred to the ______register: a. MOC b. MDR c. VAM d. CPU

Last Answer : b. MDR

Description : Hamzah needs to email a large file to a classmate. Why might he need to use file compression to do so? A. Email services often only let you send compressed data files. B. Compressed files are ... . D. Email services often have maximum file sizes that prevent you sending files that are too large.

Last Answer : D. Email services often have maximum file sizes that prevent you sending files that are too large.

Description : Data is stored in RDBMS in the form of (a) table (b) query -Technology

Last Answer : (a) Relational Database Management System stores data in the form of relation. As we know, relations are known as table.

Description : Which of the following best describes a form? (a) Form enables people to enter or view data in a database easily -Technology

Last Answer : (a) The form enables people to enter or view data in a database easily.

Description : The processed form of data is called information. Describe the further refinement of term information. -Technology

Last Answer : Information after being transformed into some conceptual framework, so that it can be manipulated and used cognitively, is called knowledge.

Description : The raw facts and unorganised form of data is called information. -Technology

Last Answer : FalseOrganised form of data is called information.

Description : Aayush wants to send highly sensitive form data such as username and password -Technology

Last Answer : POST METHODAppends form-data inside the body of the HTTP request (data is not shown in URL)Form submissions with POST cannot be bookmarked

Description : ………… refers to the amount of data that a signal or a circuit can carry. -Technology

Last Answer : Bandwidthrefers to the amount of data that a signal or a circuit can carry.

Description : Which of the following storage device can be used for storing large backup data? (a) Floppy disks (b) Hard disk (c) Magnetic tapes (d) None of these -Technology

Last Answer : "B) Hard Disk.

Description : Pen drive is also known as (a) Flash drive (b) Data stick (c) Thumb drive (d) All of the above -Technology

Last Answer : (d) A USB flash drive, data stick, thumb drive or pen drive is a portable drive that connects to a computer’s USB port.

Description : ……. is an electronic device that manipulates information or data according to the set of instructions called program. -Technology

Last Answer : Computeris an electronic device that manipulates information or data according to the set of instructions called program.

Description : ………. printers are based on electrophotography technology to print the data. -Technology

Last Answer : Laser printers are based on electrophotography technology to print the data.

Description : ………… memory is a special memory used for speeding up the transfer of data and instructions in CPU. -Technology

Last Answer : Cache memory is a special memory used for speeding up the transfer of data and instructions in CPU.

Description : A ……… is a thumb sized gadget that can be used to read, write or erase data as many times. -Technology

Last Answer : .A pen driveis a thumb sized gadget that can be used to read, write or erase data as many times.

Description : …….. is the meaningful content that is extracted from the data after processing. -Technology

Last Answer : Information is the meaningful content that is extracted from the data after processing.

Description : In CPU, control unit performs the actual processing on the data. -Technology

Last Answer : FalseIn CPU, control unit does not perform am actual processing instead it controls and guides the operations like a supervisor.

Description : In Random Access Memory if current will be interrupted, data will not lost. -Technology

Last Answer : FalseRandom Access Memory (RAM) is a volatile memory, if current is interrupted, data will lost.

Description : The data on a. CD_ROM is written at the time of its manufacture. -Technology

Last Answer : FalseCD-ROM is a blank storage device which can be written when user wants.

Description : Mary has a prepaid Internet plan. She has a data limit of 14 GB. -Technology

Last Answer : The correct answer is:(d) 10000

Description : Name the software used to control redundancy from a collection of large amount of data. -Technology

Last Answer : A database is a collection of integrated data stored together with controlled redundancy to serve one or more applications in an optimal fashion.

Description : Explain the main role of data backup software. -Technology

Last Answer : Backup software is used to make a copy of all the information stored on a disk and restore it when needed.An ideal data backup software provides functionalities beyond simple copying of data files. This software often supports user needs to specifying what is to be backed up and when.

Description : .Software is a collection of computer (i) ……. and related data that provide the -Technology

Last Answer : (i) programs(ii) instructions(iii) entity(iv) computer(v) procedures(vi) documentation(vii) processing

Description : A table named School (containing data of students of the whole school) is created -Technology

Last Answer : AdmissionNo should be set as the primary key because admission numbers are unique for each and every student of the school, which is not possible in the case with RollNo and Name.

Description : Disk Cleaner helps to free (a) data (b) recycle bin (c) spaces (d) None of these -Technology

Last Answer : (c) Disk Cleaner helps to free spaces. So that, the free spaces can be utilised to store another file or folder.

Description : The director of a company uses a database to store data about job title. This is a part of the database given below: -Technology

Last Answer : 1. 62. 63. Secretary4. Finance department and their Payroll Numbers are A621 and M502.

Description : Facilities offered by databases are (a) The ability to store a large amount of data in a structured format, -Technology

Last Answer : (a) Databases have the ability to store a large amount of data in structured format, easy update, sort query, production of reports.

Description : Encrypted data is referred as cipher text. -Technology

Last Answer : TrueEncrypted data is presented in coded form. So, it is known as cipher text.

Description : Out of the following, which one is the most appropriate data field in context of employee table, if only one of these is required? -Technology

Last Answer : (b) Date of birth is the most appropriate data field in the context of the employee table.

Description : Computer based record keeping system is known as (a) Data Manipulation System -Technology

Last Answer : (d) DBMS is a collection of programs that enable the user to create and maintain the database. Also, it is a computer-based record keeping system.

Description : RDBMS provides relational operators to manipulate the data. Here, RDBMS refers to (a) Record Database Management System -Technology

Last Answer : (b) RDBMS stands for Relational Database Management System, which provides the operator to manipulate the data stored in the database table.

Description : Duplication of data is known as (a) data security (b) data incomplete -Technology

Last Answer : (c) Data redundancy means duplication of data. It eliminates replication of data item into different files from a large database.

Description : In database, all the data are stored at a ……………. location. -Technology

Last Answer : In database, all the data are stored at acentralizedlocation.

Description : ………….. is the smallest part of a table in which one data item can be kept. -Technology

Last Answer : Fieldis the smallest part of a table in which one data item can be kept.

Description : A set of related data item is called as ……………. -Technology

Last Answer : A set of related data item is called as record.

Description : Database is the collection of logically non_related data. -Technology

Last Answer : False A database is the collection of integrated and logically related data.

Description : A report allows you to represent data retrieved from one or more tables so that, it can be analysed and printed if required. -Technology

Last Answer : True When you want to print those records which are fetched from your database then, reports are more useful for this purpose.

Description : If a piece of data (field value) is stored in two places in the database, then storage space -Technology

Last Answer : False If a piece of data is stored in two places in the database, then storage space is wasted and changing the data in one spot will cause data inconsistency.