Name the software used to control redundancy from a collection of large amount of data. -Technology

1 Answer

Answer :

A database is a collection of integrated data stored together with controlled redundancy to serve one or more applications in an optimal fashion.

Related questions

Description : .Software is a collection of computer (i) ……. and related data that provide the -Technology

Last Answer : (i) programs(ii) instructions(iii) entity(iv) computer(v) procedures(vi) documentation(vii) processing

Description : A Solution to overcome the challenge to support a large number of application service consumers from around the world, cloud infrastructure providers (i.e., IaaS providers) have established data ... ) Global exchange of cloud resources b) Resource provisioning c) Cloud security d) Resource sharing

Last Answer : Global exchange of cloud resources

Description : Facilities offered by databases are (a) The ability to store a large amount of data in a structured format, -Technology

Last Answer : (a) Databases have the ability to store a large amount of data in structured format, easy update, sort query, production of reports.

Description : Database is the collection of logically non_related data. -Technology

Last Answer : False A database is the collection of integrated and logically related data.

Description : In a frame transmission, CRC stands for (A) Code Renewable Check (B) Cyclic Redundancy Check (C) Control and Refresh Code (D) Cyclic Refreshing of CPU

Last Answer : (B) Cyclic Redundancy Check

Description : Error detection ata data link level is achieved by A. bit stuffing B. cyclic redundancy codes C. Hamming codes D. equalization

Last Answer : cyclic redundancy codes

Description : Using which method in transport layer data integrity can be ensured? a. Checksum b. Repetition codes c. Cyclic redundancy checks d. Error correcting codes

Last Answer : a. Checksum

Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ a. piggybacking b. cyclic redundancy check c. fletcher’s checksum d. parity check

Last Answer : a. piggybacking

Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ A. piggybacking B. cyclic redundancy check C. fletcher’s checksum D. parity check

Last Answer : A. piggybacking

Description : The difference between the original and reconstructed data, which we will refer to as the ______in the reconstructed data. a. Redundancy b. Compression c. loss d. Distortion

Last Answer : d. Distortion

Description : Identify the criteria for designing database from the point of view of user A) No redundancy B) No inapplicable attributes C) Uniformity in naming & definitions of the data items D) All of the above

Last Answer : D) All of the above

Description : The one guideline to be followed while designing the database is A) A database design may be ambiguous. B) Unrelated data should be in the same table so that updating the data will be easy. C) It should avoid/reduce the redundancy. D) An entity should not have attributes.

Last Answer : C) It should avoid/reduce the redundancy.

Description : Using which layer in transport layer data integrity can be assured? A. Checksum B. Repetition codes C. Cyclic redundancy checks D. Error correction codes

Last Answer : A. Checksum 

Description : Consider the formula in image processing RD = 1 - (1/CR) Where CR = n1/n2 CR is called as compression ratio n1 and n2 denotes the number of information carrying units in two datasets that represent ... . (A) Data Compression (B) Data Redundancy (C) Data Relation (D) Data Representation

Last Answer : (B) Data Redundancy

Description : Database applications were built directly on top of file system to overcome the following drawbacks of using file-systems (a) Data redundancy and inconsistency (b) Difficulty in accessing Data (c) Data isolation (d) Integrity problems (A) (a) (B) ... d) (C) (a), (b) and (c) (D) (a), (b), (c) and (d)

Last Answer : (D) (a), (b), (c) and (d) 

Description : Relational database schema normalization is NOT for: (A) reducing the number of joins required to satisfy a query. (B) eliminating uncontrolled redundancy of data stored in the database. (C) ... could otherwise occur with inserts and deletes. (D) ensuring that functional dependencies are enforced. 

Last Answer : reducing the number of joins required to satisfy a query.

Description : Define (i) Data Abstraction, (ii) Data Redundancy.

Last Answer : Data abstraction is defined as  *Suppression of details of data organization and storage  *Highlighting of the essential features for an improved understanding of data  *The characteristic that allow ... of data abstraction. This level describes the user interaction with database system. 

Description : Large amount of cheques are processed by using (a) OCR (b) MICR (c) OMR (d) All of the above -Technology

Last Answer : (b) Large amount of cheques are processed by the MICR (Magnetic Ink Character Recognition). It can read characters that are printed using a special magnetic ink. It is mostly used in banks.

Description : …… memory is used to store large amount of information permanently. (a) RAM (b) ROM (c) Secondary (d) Primary -Technology

Last Answer : (c) Secondary memory is used to store large amount of information permanently.

Description : Internet uses generate large amount of personal information, information thefts and information technology piracy. -Technology

Last Answer : TrueInternet uses generate large amount of personal information, information thefts and information technology piracy.

Description : ………….. is a collection of related information. -Technology

Last Answer : Databaseis a collection of related information.

Description : ……………. are the collection of various information. -Technology

Last Answer : Files are the collection of various information.

Description : A worksheet is a ………………. (a) collection of workbooks -Technology

Last Answer : (c) A worksheet is a combination of rows and columns.

Description : ………… refers to the amount of data that a signal or a circuit can carry. -Technology

Last Answer : Bandwidthrefers to the amount of data that a signal or a circuit can carry.

Description : Which software takes control of computer system on startup? (a) Compiler (b) Operating system (c) Application software (d) All of these -Technology

Last Answer : (b) Operating system takes control of computer system on startup.

Description : _________ is a generic term for organized collection of computer data and instructions. A. firmware B. Software C. hardware D. None of the above

Last Answer : B. Software

Description : Superficially the term object-oriented , means that, we organize software as a (A) collection of continuous objects that incorporates both data structure and behaviour. (B) collection of ... and behaviour. (D) collection of objects that incorporates both discrete data structure and behaviour.

Last Answer : (C) collection of discrete objects that incorporates both data structure and behaviour.

Description : Images tend to be very large collection of data. The size of memory required for a 1024 by 1024 image in which the colour of each pixel is represented by a n-bit number, (in an 8 bit machines) is (A) n × 8 MB (B) n / 8 MB (C) (1024 × 1024) / 8 MB (D) 1024 MB

Last Answer : (B) n / 8 MB

Description : Explain the main role of data backup software. -Technology

Last Answer : Backup software is used to make a copy of all the information stored on a disk and restore it when needed.An ideal data backup software provides functionalities beyond simple copying of data files. This software often supports user needs to specifying what is to be backed up and when.

Description : Which of the following storage device can be used for storing large backup data? (a) Floppy disks (b) Hard disk (c) Magnetic tapes (d) None of these -Technology

Last Answer : "B) Hard Disk.

Description : In the human body, why is there redundancy with some organs, but not others?

Last Answer : Well, ignoring the complexity it would take to have two hearts working in unison and not mess up the flow of blood….. quite frankly, we don’t know why not. It’s just the way we evolved.

Description : How to maximize file server redundancy?

Last Answer : answer:Not to be a stick in the mud, but that's what IT consulting companies do... Questions to ask yourself: What level of uptime are they looking for? 99.9% is easy, 99.99% is ... g., does each employee carry two blackberries in case one breaks? Multiple internet connections for the corp. office?

Description : What is Static Routing Redundancy ?

Last Answer : Static Route : Static Route is a routing protocol where you have to manually define each routing route in the router's routing table. If there is any change in the network for any reason, then that data ... a result, the bandwidth will be less expensive and the network will be more secure

Description : What is the opposite of redundancy ?

Last Answer : The opposite of redundancy is abbreviated

Last Answer : Excess means excess.

Description : Is the cyclic redundancy check better than hamming code?

Last Answer : It depends on what you are doing.The cyclic redundancy check will only detect an error, while thehamming code can also correct many types of errors. However toperform this correction the extra ... channels, disk sectors).Normally hamming code is done on individual bytes or words ofcomputer memory.

Description : Which of the following is not a way of minimizing if not eliminating noise? A. Use redundancy B. Increase transmitted power C. Reduce signaling rate D. Increase channel bandwidth

Last Answer : D. Increase channel bandwidth

Description : The divisor in a cyclic code is normally called the _________. A) degree B) generator C) redundancy D) none of the above

Last Answer : generator

Description : . In cyclic redundancy checking, the divisor is _______the CRC. A) The same size as B) one bit less than C) one bit more than D) none of the above

Last Answer : one bit more than

Description : _____ provides redundancy toensure synchronization and inherent errordetection. A) Block coding B) Line coding C) Scrambling D) None of the above

Last Answer : Block coding

Description : Database management systems are intended to: A. eliminatedata redundancy B. establishrelationships among records in different files C. manage file access D. maintaindata integrity E. All of theabove

Last Answer : All of theabove

Description : CRC stands for __________ a. cyclic redundancy check b. code repeat check c. code redundancy check d. cyclic repeat check

Last Answer : a. cyclic redundancy check

Description : CRC stands for __________ A. cyclic redundancy check B. code repeat check C. code redundancy check D. cyclic repeat check

Last Answer : A. cyclic redundancy check

Description : Point out the wrong statement. a) AWS S3 essentially lets you create your own cloud storage b) AWS created Availability Zones within regions, which are sets of systems that are isolated from ... adds redundancy to its IaaS systems by allowing EC2 virtual machine instances d) None of the mentioned

Last Answer : None of the mentioned

Description : Redundancy has to be implemented at the _________ architectural level for effective results in cloud computing. a) lower b) higher c) middle d) all of the mentioned

Last Answer : higher

Description : In a single stage network: (A) There is no redundancy (B) There is redundancy (C) Alternative cross points are available (D) Alternative paths are available

Last Answer : (B) There is redundancy

Description : Information ignored the human eye is the a. A. coding redundancy b. B. spatial redundancy c. C. temporal redundancy d. D. irrelevant info

Last Answer : d. D. irrelevant info

Description : What is redundancy in messages? (a) Information that recipient has already receive (b) Extra information to persuade the receiver to accept and act upon the message (c) Parts of the message that have no meaning and could be eliminated (d) Message that have no purpose and need not be retained

Last Answer : (b) Extra information to persuade the receiver to accept and act upon the message 

Description : The redundancy in images stems from: (A) pixel decorrelation (B) pixel correlation (C) pixel quantization (D) image size

Last Answer : (B) pixel correlation