Is a message that consist relavat meaning , implication , or input for decision and or  action.
(a) Data  
(b) Information  
(c) Knowledge  
(d) Intelligence

1 Answer

Answer :

(d) Intelligence

Related questions

Description : The agency which is tasked with collecting analysing and disseminating information related to dubious financial transactions is ________ A. Financial Intelligence Unit(FIU) B. Financial Action Task Force( ... Bureau(CEIB) D. Central Intelligence Bureau(CIB) E. Financial Stability Board(FSB)

Last Answer : A. Financial Intelligence Unit(FIU) Explanation: The Financial Intelligence Unit (FIU), an agency tasked with collecting, analysing and disseminating information related to ... appropriate, disseminate valuable financial information to intelligence/enforcement agencies and regulatory authorities.

Description : Which of the following groups consist of only Input devices? A. Mouse, Keyboard, Monitor B. Mouse, Keyboard, Printer C. Mouse, Keyboard, Plotter D. Mouse, Keyboard, Scanner

Last Answer : D. Mouse, Keyboard, Scanner

Description : What is the name of the computer program that contains the distilled knowledge of an expert? ⮚ Management information System ⮚ Expert system ⮚ Data base management system ⮚ Artificial intelligence

Last Answer : Expert system

Description : I really like this "claim" :) But I wonder what other people's opinion are to its implication...

Last Answer : The Anais Nin quote is: We don’t see things as they are, we see things as we are. I don’t think it implies as much as states fact. Folks perceive things according to what they know, what they believe, and what they’ve seen before.

Description : What does 'Word of no implication' mean ?

Last Answer : Word of no implication' means - word of mouth.

Description : What is the implication of the effects of smoking?

Last Answer : Need answer

Description : What is the implication of the title of arranging marriage in india by serena nanda?

Last Answer : Arranging a Marriage in India” by Serena Nanda analyze the cumulative impact of specific word choices on meaning and tone

Description : What is the implication of the Central Government granting "Special Status" to a State? (1) Substantially large percentage of the central assistance will be as grantsin-aid (2) The extent of loan as a ... account budgetary deficit will be bridged by the Central Government (4) Both (1) and (2) above

Last Answer : (4) Both (1) and (2) above Explanation: The Special category states category is meant for a specific category such as a hilly terrain and geographically difficult area where supply of public services is ... -special ones get 70 per cent of the resources as loan and remaining 30 per cent as grant.

Description : WHAT IS THE IMPLICATION OF DYNAMIC INSERT?

Last Answer : code combinations from any form/window. If this feature is disabled, then the user cannot input new account code combinations from any window/form.   Oracle applications use a particular form ... can enter new account code combinations only through this form if Dynamic Insertion is disabled. 

Description : DNA mRNA C Proposed by Protein A B The figure gives an important concept in the genetic implication of DNA. Fill the blanks A, B and C. (a) A-Maurice Wilkins, B-Transcription, C-Translation ... c) A-Erwin Chargaff, B-Translation, C-Replication (d) A-Francis Crick, B-Translation, C-Transcription

Last Answer : (d) A-Francis Crick, B-Translation, C-Transcription

Description : The diagram shows an important concept in the genetic implication of DNA. Fill in the blanks A to C. DNA mRNA Proposed by Protein C A B (a) A - Transcription, B -Translation, C - Francis Crick (b) ... , B - Replication, C - James Watson (d) A - Translation, B - Transcription, C - Ervin Chargaff

Last Answer : (a) A - Transcription, B -Translation, C - Francis Crick

Description : An implication of the continuity equation of conductors is given by a) J = σ E b) J = E/σ c) J = σ/E d) J = jwEσ

Last Answer : a) J = σ E

Description : The Coulomb law is an implication of which law? a) Ampere law b) Gauss law c) Biot Savart law d) Lenz law

Last Answer : b) Gauss law

Description : --------is the process of analyzing the environment for the identification of factors which have impact on or have implication for the business. A. Assessment B. Forecasting C. Scanning D. None of these

Last Answer : C. Scanning

Description : The relationship between premises and conclusion in a deductive argument is--. A) Cause-Effect B) Analytic-Synthetic C) A priori-A posterior D) Implication-Entailment. 

Last Answer : D) Implication-Entailment. 

Description : The following box denotes? a) Decision b) Input/Output c) Process d) Module

Last Answer : Answer: a Explanation: The answer is decision. Conditions are given in this box and then the result is checked accordingly if the condition is true or false.

Description : the consist of computer program that mimic the way the human brain process information. (a) Machine learning (b) Deep learning (c) Neural learning (d) All of this

Last Answer : (c) Neural learning

Description : Design phase consist of (A) Input received (B) Output received (C) Both (A) and (B) (D) None of the above

Last Answer : (C) Both (A) and (B)

Description : Design phase consist of (A)Input received (B)Output received (C)Both (A) and (B) (D)None of the above

Last Answer : (C)Both (A) and (B)

Description : A memory in CPU that holds program instructions, input data, intermediate results and the output information produced during processing is __________ A. System B. Primary Memory C. Secondary Memory D. None of the above

Last Answer : B. Primary Memory

Description : Any data and instruction entered in the memory of a computer is__________ A. Storage B. Output C. Input D. Information

Last Answer : C. Input

Description : Hardware includes a) all devices used to input data into a computer b) sets of instructions that a computer runs or executes c) the computer and all the devices connected to it that ... involved in processing information including the central processing unit, memory and storage e) None of these

Last Answer : c) the computer and all the devices connected to it that are used to input and output data

Description : When speaking of computer input and output, input refers to - 1) any data processing that occurs from new data input into the computer 2) data or information that has been entered into the computer 3) the transmission of data that has been input into the computer 4) Both (C) and (D) above.

Last Answer : 4) Both (C) and (D) above.

Description : When speaking of computer input and output, input refers to - 1 any data processing that occurs from new data input into the computer 2 data or information that has been entered into the computer 3 the transmission of data that has been input into the computer 4 Both (C) and (D) above.

Last Answer : 4 Both (C) and (D) above.

Description : ASCII stands for A) American Standard Code for Information Interchange B) American Scientific Code for International Interchange C) American Standard Code for Intelligence Interchange D) American Scientific Code for Information Interchange

Last Answer : Answer : A

Description : Criminal minded individuals who work for terrorist organizations and steal information of nations and other secret intelligence are _________ a) State sponsored hackers b) Blue Hat Hackers c) Cyber Terrorists d) Red Hat Hackers

Last Answer : c) Cyber Terrorists

Description : Criminal minded individuals who work for terrorist organizations and steal information of nations and other secret intelligence are _________ a) State sponsored hackers b) Blue Hat Hackers c) Cyber Terrorists d) Red Hat Hackers

Last Answer : c) Cyber Terrorists

Description : Artificial intelligence is A . It uses machine-learning techniques. Here program can learn From past experience and adapt themselves to new situations B. Computational procedure that takes some ... performs tasks that would require intelligence when performed by humans D . None of these

Last Answer : C. Science of making machines performs tasks that would require intelligence when performed by humans

Description : harrow consist of two gangs placed end to end. A) Single action disc harrow B) Double action disc harrow C) Triple action disc harrow D) None above

Last Answer : Single action disc harrow

Description : The statement the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer Hardware refers to (A) Information ... ICT) (C) Information and Data Technology (IDT) (D) Artificial Intelligence (AI)

Last Answer : (A) Information Technology (IT)

Description : An intuitive manager could best be described as one who: A)uses scientific problem solving B)eliminates uncertainty in decision making C)searches out facts and data systematically D)uses an orderly approach to gathering information E)uses personal knowledge and experience to make decisions

Last Answer : E)uses personal knowledge and experience to make decisions

Description : Fax is used for– (A) Sending telephonic message (B) Sending copies of documents (C) Exercising control (D) Decision making

Last Answer : Answer: Sending copies of documents

Description : Which among the following is correct: a) Traffic Analysis is the analysis of patterns of communication in order to learn secret information. b) Steganography is the study of hiding the very existence of a ... of the message itself like microdots or invisible ink. c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : The ________is a network layer Internet protocol that provides message packets to report errors and other information regarding IP packet processing back to the source: a) Internet Control Message ... Standard Flexible Message Protocol c) Internet Dynamic Chartered Message Protocol d) None of These

Last Answer : a) Internet Control Message Protocol

Description : Which among the following is correct: a) Traffic Analysis is the analysis of patterns of communication in order to learn secret information. b) Steganography is the study of hiding the very existence of a ... of the message itself like microdots or invisible ink. c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii, ... iv and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : IMAP stand for………… a. Internet message access protocol b. Internet mailing access protocol c. Information access protocol d. None of these

Last Answer : a. Internet message access protocol

Description : What is ‘Teletext’ ? (1) Flashing of telephone conversation on TV screen. (2) Printing the text of the message on the telex machine. (3) Connecting the local telephone with outstation telephones without STD codes. (4) Flashing of the text of news and information on the TV screen.

Last Answer : Flashing of the text of news and information on the TV screen. 

Description : MIS is designed to provide information needed for effective decision making by? A) Consumers B) Workers C) Foremen D) Managers

Last Answer : Answer : D

Description : What is the action of task environment in artificial intelligence? a) Problem b) Solution c) Agent d) Observation

Last Answer : a) Problem

Description : What action is necessary to impress intelligence on the pulse train in pulse modulation?

Last Answer : Some characteristic of the pulses has to be varied.

Description : The data unit in the TCP/IP layer called a ..... A) Message B) Segment C) Datagram D) Frame

Last Answer : D) Frame

Description : XMPP creates _________ identity. A. Device B. Email C. Message D. Data

Last Answer : A. Device

Description : When sending a text message, can you type numbers in the body of the message without changing the input format?

Last Answer : on my motorola phone I can just get to the numbers after I go through the letters on a given key (i.e. if I hit the #2 button, I can do A, B, C, then 2).

Description : What takes input as an object described by a set of attributes? a) Tree b) Graph c) Decision graph d) Decision tree

Last Answer : d) Decision tree

Description : Which technique can be used to achieve input and output coverage? It can be applied to human input, input via interfaces to a system, or interface parameters in integration testing. A. Error Guessing B. Boundary Value Analysis C. Decision Table testing D. Equivalence partitioning

Last Answer : D. Equivalence partitioning

Description : What takes input as an object described by a set of attributes? a) Tree b) Graph c) Decision graph d) Decision tree

Last Answer : d) Decision tree

Description : Which technique can be used to achieve input and output coverage? It can be applied to human input, input via interfaces to a system, or interface parameters in integration testing. a) Error Guessing b) Boundary Value Analysis c) Decision Table testing d) Equivalence partitioning

Last Answer : d) Equivalence partitioning

Description : When different combination of input requires different combination of actions,Which of the following technique is used in such situation? a) Boundary Value Analysis b) Equivalence Partition c) Decision Table d) Decision Coverage

Last Answer : Ans : c