Options: the intensity of light emitted by them changes with time, the distance of the stars from the earth changes with time, the refractive index of the different layers of the earth's atmosphere changes continuously, consequently the position of the image of a start changes with time, the light from the star is scattered by the dust particles and air molecules in the earth's atmosphere
A _____ provides a set of integrated computer tools that allow a decision maker to interact directly with computers in order to retrieve information useful for semistructured and unstructured decisions,
Options: (A)The software and hardware system architectures that provide explicit support for tolerance, which includes software redundancy and faulttolerance controller that detects problems and supports fault recovery (B) It is an initial step for requirements engineering process, includes the outline description of system, its use in an organization and recommending the system feasibility. (C) Trustworthiness with which a system or component can be modified for use in applications or environments other than those for which it was specifically designed. (D) None of these 20
9.In multi processor scheduling, independent parallelism indicates
Options: (A)There is synchronization among processes at gross level. (B) There is no explicit synchronization among processes. (C) A parallel processing or multi tasking is done within a single application. (D) None of these. 13
Options: (A)It do not need the control of the human operator during their execution. (B) An arrow in a multi-dimensional space. It is a quantity usually characterized by an ordered set of scalars. (C) The validation of a theory on the basis of a finite number of examples. (D) None of these 9
A microprocessor integrates the arithmetic logic and control circuitry of a computer into one chip. The first microprocessor was built by a group of engineers at the Intel Corpn. Can you tell who headed this group?
Options: Victor Poor, Stan Mazor, Marcian E. (Ted) Hoff, Seymour Cray
Options: (A)a prepared application that takes advantage of a known weakness. (B) a tool used to quickly check computers on a network for known weaknesses. (C) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. (D) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
Options: (A)Is a low percentages of number of records added or deleted from a file (B) If high, reduces processing efficiency for sequential and non sequential files (C) Is a measure of the percentage of existing records updated during a run (D) Refers to how closely the files fit into the allocated 3
Options: acts of gallantry in the presence of enemy, gallantry by children, outstanding contribution to literature, the most conspicuous bravery or self sacrifice on land, air or sea but not in the presence of the enemy