Data by itself is not useful unless (a) it is massive (b) it is processed to obtain information -Technology

1 Answer

Answer :

(b) Data is unprocessed and raw facts. It is not useful unless it is processed to obtain information

Related questions

Description : Which of the following is valid statement? A) Data in itself is useless unless it is processed B) The data that is processed is called a program C) The data which is not yet processed is information D) Information is processed by computer to generate data.

Last Answer : Answer : A

Description : For taking decisions, data must be (a) very accurate (b) massive (c) processed correctly -Technology

Last Answer : (c) For taking decisions, data must be processed and manipulated correctly.

Description : data by itself is not useful unless -AI Class 9th

Last Answer : (b) Data is unprocessed and raw facts. It is not useful unless it is processed to obtain information

Description : The processed form of data is called information. Describe the further refinement of term information. -Technology

Last Answer : Information after being transformed into some conceptual framework, so that it can be manipulated and used cognitively, is called knowledge.

Description : “Information helps us in taking decisions”. What should be the characteristics of processed data in order to take meaningful decision? -Technology

Last Answer : For the decision to be meaningful, the processed data (or information) must have the following characteristics:1. Time Information should be available when required.2. Accuracy Information should be accurate.3. Completeness Information should be complete in every aspect.

Description : Question 5. Information is (a) data (b) processed data (c) manipulated input (d) computer output -Technology

Last Answer : (b) Information is the processed form of data.

Description : Processed data is called ……………….. A) Raw data B) Information C) Useful data D) Source

Last Answer : B) Information

Description : Is the total useful information processed or communicated over a specific amount of time A. Baud rate B. Bit rate C. Information theory D. Throughput

Last Answer : D. Throughput

Description : Serial access memories are useful in applications where A) Data consists of numbers B) Short access time is required C) Each stored word is processed differently D) Data naturally needs to flow in and out in serial form

Last Answer : Answer : D

Description : Serial access memories are useful in applications where a. Data consists of numbers b. Short access time is required c. Each stored word is processed differently d. Data naturally needs to flow in and out in a serial form

Last Answer : d. Data naturally needs to flow in and out in a serial form

Description : Serial access memories are useful in applications where (A) Data consists of numbers (B) Short access time is required. (C) Each stored word is processed differently. (D) None of these

Last Answer : (D) None of these Explanation: data naturally needs to flow in and out in serial form.

Description : A kiosk a) is data organised and presented in a manner that has additional value beyond t he value of the data itself b) combines microscopic electronic components on a single integrated circuit that ... and service d) describes a computer's type, processor, and operating system e) None of these

Last Answer : c) is a computer station that provides the public with specific and useful information and service

Description : ………… can be defined as data that has been processed into a form that is meaningful to the recipient and is of real or perceive value in current or prospective decisions. A) System B) Information C) Technology D) Service

Last Answer : B) Information

Description : Large amount of cheques are processed by using (a) OCR (b) MICR (c) OMR (d) All of the above -Technology

Last Answer : (b) Large amount of cheques are processed by the MICR (Magnetic Ink Character Recognition). It can read characters that are printed using a special magnetic ink. It is mostly used in banks.

Description : Image files uploaded and downloaded over the Internet can be processed with a compression application. -Technology

Last Answer : (c) Image files are compressed before transmitted over the Internet to reduce transmission time.

Description : How is the mineral ore bauxite processed to obtain aluminum?

Last Answer : Bauxite is refined to alumina (aluminum oxide) by heating whilemixed with sodium hydroxide, where the resultant soluble compoundsodium aluminate can be removed from the ore. The aluminumhydroxide can be ... at the cathode of a very large processingcell.This is called the Hall-Heroult process.

Description : _____ is processed by the computer into information 1) Number 2) Data 3) Picture 4) None of these

Last Answer : 2) Data

Description : …………… can be defined as data that has been processed into a form that is meaningful to the recipient and is of real or perceived value in current or prospective decisions. A) Information B) Data collection C) Internal data D) Sample data

Last Answer : A) Information

Description : External data can be useful because: A. It is the most expensive to obtain B. It is the cheapest to obtain C. It is most reliable D. It is the most current

Last Answer : B. It is the cheapest to obtain

Description : What would cause my iPhone4's sound to stop working unless it is on loud speaker or headphones?

Last Answer : Do you use the headphone jack and it stops working? It maybe the jack and you will need a new phone. Happened to me on another smartphone, new phone was only answer.

Description : A ……. is a software program that is designed to copy itself from one computer to another, without human intervention. -Technology

Last Answer : (c) A worm is a self-replicating software program. It does not require another program to host it.

Description : ……….. is a software program that is designed to copy itself from one computer to another. -Technology

Last Answer : Worm is a software program that is designed to copy itself from one computer to another.

Description : Unlike a computer virus, a ……….. can replicate itself automatically. -Technology

Last Answer : Unlike a computer virus, a wormcan replicate itself automatically.

Description : A virus is a harmful program, which one entering a computer, starts creating copies of itself. -Technology

Last Answer : True Virus is a malicious program that is designed to make a system sick, just like a real virus.

Description : It is used to start programs, obtain help, search for files and folders etc. (a) File menu (b) Edit menu (c) Format menu (d) Start button -Technology

Last Answer : (d) Start button is used to start program, obtain helps, search for files and folders etc and also displays the most commonly used programs in a particular context.

Description : What is MySQL used for? Abhay wants to start learning MySQL. From where can he obtain the MySQL software? -Technology

Last Answer : MySQL is a Relational Database Management System (RDBMS), used for adding, accessing and processing data in a database. Abhay can download the MySQL software setup from Internet.

Description : (1) Prachi has given the following command to obtain the highest marks Select max(marks) from student where group by class; -Technology

Last Answer : (1)d. Select class, max(marks) from student group by class;(2)b. Both (ii) and (iv)(3)b. select name,max(DOB) from student;

Description : Let's say we have a fairly massive blackhole near-by which is causing havoc with the solar system. Suppose we have the technology, can we destroy it using a stream of anti-particles (i.e. anti-matter)?

Last Answer : i personally have doubts because we would need the same mass in antiparticles as the black hole is heavy

Description : How helpful could NCR forms be while collecting massive data from countless sources?

Last Answer : Most of the time in our lives, we come across situations where we require the same handwritten documents for different people. It is not wise to write for each person separately as it would take a ... printing can be used to save time and deliver your message to multiple people in a single shot.

Description : A catalyst inhibitor (A) Lessens its selectivity (B) May be useful for suppressing undesirable side reactions (C) Is added in small quantity during the catalyst manufacture itself (D) All (A), (B) and (C

Last Answer : (D) All (A), (B) and (C

Description : computer is used to type documents, send E_mail and browse the Internet. It is very useful to us. (i) What are the basic parts of a computer? -Technology

Last Answer : (i) Hardware, software, data and information.(ii) Accuracy, speed, diligence and reliability.

Description : Software is not only the basic requirement of a computer system, it makes a computer more powerful and useful. -Technology

Last Answer : 1. Software is a set of programs that tells the computer to perform a task.2. Computer system divides software into two major categories:(a) System software(b) Application software

Description : Where can a comment be placed in an HTML document? How is it useful? -Technology

Last Answer : Comments are inserted in HTML code with the help of tag. To insert the text as a comment, type the text between tag, then that text will be ignored by the browser and invisible for the user.e.g.This is a book

Description : Kirti wants to add sound to slide transition. Which feature of Animations tab is useful for this purpose? -Technology

Last Answer : On the Animations tab in the Transition to This Slide group, click the arrow next to ‘Transition Sound’ to add sound to slide transition.

Description : How are Header and Footer useful? -Technology

Last Answer : Header and Footer are very useful for displaying the similar useful information on each slide. One can change the Header and Footer details at any time in the presentation.

Description : A …….. is a virus that is often disguised as a useful computer program. -Technology

Last Answer : (a) Trojan horse is a virus, i.e. often disguised as a useful computer program.

Description : The at first glance will appear to be useful software but will actually do damage once installed or run on your computer. -Technology

Last Answer : (c) The Trojans are unauthorized programs placed inside a legitimate application.

Description : Which of the following view is useful for representing the structure of a presentation? -Technology

Last Answer : (b) Outline view is useful for checking the flow or structure of a presentation

Description : For what purpose pie charts are useful? -Technology

Last Answer : Pie charts are useful for the following purposes:1. They convey approximate propositional relationship at a point in time.2. They compare part of a whole at a given point in time.3. Exploded portion of a pie chart emphasizes a small proportion of parts.

Description : What are your opinions on the World Health's Organization information regarding processed meats, sausage, hot dogs, etc. being as bad as smoking?

Last Answer : answer:It surprises me that people are making such a big deal out of it. (A) The science has been available for many years. I knew this as a kid. (B) Don't eat cured meats daily. No, not ... available cured meats. Also, I will continue to eat 8-10 servings of (mostly) vegetables and (some) fruit.

Description : Do you think it is possible to use hypnosis to create some kind of HUD in my vision that displays information gathered and processed by the subconsciousness while being conscious?

Last Answer : did your parents take away you video games? :P actually does sound kind of cool though.

Description : What Happens When Information is Added , Processed and Stored ?

Last Answer : Information technology is associated with the distribution , processing and storage of information.

Description : Site whre all the information are processed & controlled is

Last Answer : Site whre all the information are processed & controlled is

Description : Site whre all the information are processed & controlled is

Last Answer : Site whre all the information are processed & controlled is

Description : What is the information is commonly used in a word processed document?

Last Answer : that's simple it is lines and borders

Description : Which computer memory is used for storing programs and data currently being processed by the CPU? A) Mass memory B) Internal memory C) Non-volatile memory D) PROM

Last Answer : Answer : B

Description : In a punched card system, data is processed by a A) Keypunch machine, sorter and posting machine B) Accounting machine, posting machine, and billing machine C) Sorter, posting machine, and billing machine D) Accounting machine, keypunch machine and sorter

Last Answer : Answer : D

Description : ____________ is the raw material used as input and __________ is the processed data obtained as output of data processing. a) Data, Instructions b) Instructions, Program c) Data, Program d) Program, Code

Last Answer : Answer: a Explanation: Data can be assumed as a raw material which , in turns after processing gives the desired output in the form of instructions. Further, a set of ordered and meaningful instructions is known as a program