logo

CuriousTab

CuriousTab

Discussion


Home Computer Science System Analysis and Design See What Others Are Saying!
  • Question
  • The two classifications of inputs are


  • Options
  • A. energies and maintenance
  • B. maintenance and waste
  • C. maintenance and signal
  • D. products and waste
  • E. None of the above

  • Correct Answer
  • maintenance and signal 


  • More questions

    • 1. Claude Shannon described the operation of electronic switching circuits with a system of mathematical logic called:

    • Options
    • A. LISP
    • B. XLISP
    • C. Boolean algebra
    • D. neural networking
    • E. None of the above
    • Discuss
    • 2. An example of a medium-speed, switched communications service is

    • Options
    • A. Series 1000
    • B. Dataphone 50
    • C. DDD
    • D. All of the above
    • E. None of the above
    • Discuss
    • 3. A system design is said to be functionally modular if

    • Options
    • A. the system is able to handle all the function of the application
    • B. each module performs a specific function and can be developed relatively independently by programmers
    • C. the system makes extensive use of function. keys for maximum user assistance
    • D. the system is developed using structured programming through COBOL or PASCAL
    • E. None of the above
    • Discuss
    • 4. Bridges offer performance improvements when used in diverse or scattered workgroups, where the majority of access occurs outside of the local segment

    • Options
    • A. True
    • B. False
    • Discuss
    • 5. A _____ is responsible for the design and control of a company's data base

    • Options
    • A. DBA
    • B. DBM
    • C. DPMA
    • D. EDP auditor
    • E. None of the above
    • Discuss
    • 6. An audit trail

    • Options
    • A. is used to make back-up copies
    • B. is the recorded history of operations performed on a file
    • C. can be used to restore lost information
    • D. All of the above
    • E. None of the above
    • Discuss
    • 7. What command is used with file named 'letter' to remove the executable permission from the user and assign read permission to the group and others?

    • Options
    • A. chmod go + x, u - x letter
    • B. chmod g - x, uo + r letter
    • C. chmod go + r, u + x letter
    • D. chmod u - x, go + r letter
    • E. None of the above
    • Discuss
    • 8. The speed at which the monitor accepts data is called:

    • Options
    • A. bandwidth
    • B. response time
    • C. interlacing
    • D. scanning
    • E. None of the above
    • Discuss
    • 9. The higher versions of the operating systems are so written that programs designed for earlier versions can still be run. What is it called?

    • Options
    • A. Upgradability
    • B. Upward mobility
    • C. Universality
    • D. Upward compatibility
    • E. None of the above
    • Discuss
    • 10. Which of the following rules out the use of GO TO?

    • Options
    • A. Flowchart
    • B. HIPO-DIAGRAMS
    • C. Nassi-Shneiderman diagram
    • D. All of the above
    • E. None of the above
    • Discuss


    Comments

    There are no comments.

Enter a new Comment