40. Which of the following normally has an embedded system? A. Inventory control system.

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

Answer question 40 showing fully all the steps. Solution should be perfect(very correct), clear, brief and explicit enough!

D. A collection of objects which
must not be of the same data
type and processed separately
29.A light pen is an example of a (can): 35.What is the purpose of software
B. Positive
C. High
D. Off
A. Pointing device
B. Input-output device
C. Input device
D. Peripheral device
30.Which of the following is most
important in relation to privacy of
computer data?
A. Data integrity.
B. Data access control.
presentation tools?
A. To design good web pages for
an audience.
B. To design good software
packages for an audience.
C. To provide a good multi-media
experience to the audience.
D. To give a good delivery of
information to the audience.
36. Which of the following giyes correct
phase of program compilation
A. Syntax analysis and compilation
B. Lexical analysis and
interpretation.
C Syntax analysis and code
generation.
D. Code generation and
documentation.
37. Which of the following is NOT true of
recursivefunctions in program
development?
A. A recursive function always
calls itself directly.
B. A recursive function may call
itself indirectly.
C. Recursive function calls use
internal stack structures.
D. Recursive function calls use
C. System failure.
D. Physical security.
31.Which of the following is NOT a main
purpose of an operating system?
A. To mask hardware details from
users.
B. To provide a graphical user
interface.
C. To ease use of hardware
resources.
D. To share hardware resources
among many user
32. Linux operating systems are saldi
be:
A. Multi-user ipads.
B. Multi-user Microsoft Windows.
C. Multi-tasking iPods
D. Multi-user and multi-tasking
33.A multiplexer:
A. Separates a single stream of
signals into separate streams.
B Combines separate streams of 38. Establishing how a system may be
signals into a single stream
C. Maintains separate streams of
signals within a single stream.
D. Recombines single streams of
signals into ne separate
streams
more memory space than
equivalent iterative functions.
structured and built is known as:
A. System analysis.
B. System design.
C. System prototyping.
D. System implementation.
39. Which of the following is NOT
desirable in algorithms for parallel
tasks?
A. Concurrency.
B. Non-determinism.
C. Synchronization.
D. Deadlock.
34. A record data structure is;
A. A collection of objects of
possibly different data types
that are processed together.
B. A collection of objects of the
same data types.
C. A collection of objects which
must not be of the same data
буре.
40. Which of the following normally has an
embedded system?
A. Inventory control system.
Transcribed Image Text:D. A collection of objects which must not be of the same data type and processed separately 29.A light pen is an example of a (can): 35.What is the purpose of software B. Positive C. High D. Off A. Pointing device B. Input-output device C. Input device D. Peripheral device 30.Which of the following is most important in relation to privacy of computer data? A. Data integrity. B. Data access control. presentation tools? A. To design good web pages for an audience. B. To design good software packages for an audience. C. To provide a good multi-media experience to the audience. D. To give a good delivery of information to the audience. 36. Which of the following giyes correct phase of program compilation A. Syntax analysis and compilation B. Lexical analysis and interpretation. C Syntax analysis and code generation. D. Code generation and documentation. 37. Which of the following is NOT true of recursivefunctions in program development? A. A recursive function always calls itself directly. B. A recursive function may call itself indirectly. C. Recursive function calls use internal stack structures. D. Recursive function calls use C. System failure. D. Physical security. 31.Which of the following is NOT a main purpose of an operating system? A. To mask hardware details from users. B. To provide a graphical user interface. C. To ease use of hardware resources. D. To share hardware resources among many user 32. Linux operating systems are saldi be: A. Multi-user ipads. B. Multi-user Microsoft Windows. C. Multi-tasking iPods D. Multi-user and multi-tasking 33.A multiplexer: A. Separates a single stream of signals into separate streams. B Combines separate streams of 38. Establishing how a system may be signals into a single stream C. Maintains separate streams of signals within a single stream. D. Recombines single streams of signals into ne separate streams more memory space than equivalent iterative functions. structured and built is known as: A. System analysis. B. System design. C. System prototyping. D. System implementation. 39. Which of the following is NOT desirable in algorithms for parallel tasks? A. Concurrency. B. Non-determinism. C. Synchronization. D. Deadlock. 34. A record data structure is; A. A collection of objects of possibly different data types that are processed together. B. A collection of objects of the same data types. C. A collection of objects which must not be of the same data буре. 40. Which of the following normally has an embedded system? A. Inventory control system.
B. A stock control system.
C. A microwave oven.
D. A payroll system.
B. 1316
C. 800
D. 80
47. Which of the following is NOT a sort
algorithm?
A. Binary sort.
B. Bubble sort.
C. Insertion sort.
D. Quick sort.
48. Which logic gate does the following
truth table represent?
A
41. Which of the following is NOT a
mechanism that could be used in
detecting or preventing computer
crime?
A. Encapsulation.
B. Encryption.
C. Firewalls.
D. A payroll system.
is the name of a hypermedia
42.
file.
B Output
0.
1
A. Filename. FTP
B. Filename. URL
C. Filename. HTML
D. Filename. Pdf
43.A tuple in a database is:
A. A field.
B. A record.
C. An entity.
D. A relation.
44.In relational database management
system, what is a relation?
A. A set of attributes.
B. An object.
C. A table.
D. A field.
0.
1.
1.
A. AND
B. NAND
C. XOR
D. NOR
49. The machine instruction cycle is:
B. Fetch- execute - process.
C. Fetch - decode-execute.
D. Fetch - execute - decode.
50 Suppose you have the algorithmic
45. When data found in multiple lists is
updated only in some lists, this
statement:
WHILE (x > 0) DO "instruction"
ENDWHILE
If at the beginning variable x is
less than zero then:
A. "Instruction" will be done just
causes:
A. Data integrity.
B. Double entry
C. Data redundancy.
D Data inconsistency.
16.When using the extended ASCII
character set, how many bits will be
use in storing the word
TECHNOLOGY"?
once.
B. "Instruction" will never be done.
C. "Instruction" will be done
forever.
D. "Instruction" will be done exactly
x times.
96
Transcribed Image Text:B. A stock control system. C. A microwave oven. D. A payroll system. B. 1316 C. 800 D. 80 47. Which of the following is NOT a sort algorithm? A. Binary sort. B. Bubble sort. C. Insertion sort. D. Quick sort. 48. Which logic gate does the following truth table represent? A 41. Which of the following is NOT a mechanism that could be used in detecting or preventing computer crime? A. Encapsulation. B. Encryption. C. Firewalls. D. A payroll system. is the name of a hypermedia 42. file. B Output 0. 1 A. Filename. FTP B. Filename. URL C. Filename. HTML D. Filename. Pdf 43.A tuple in a database is: A. A field. B. A record. C. An entity. D. A relation. 44.In relational database management system, what is a relation? A. A set of attributes. B. An object. C. A table. D. A field. 0. 1. 1. A. AND B. NAND C. XOR D. NOR 49. The machine instruction cycle is: B. Fetch- execute - process. C. Fetch - decode-execute. D. Fetch - execute - decode. 50 Suppose you have the algorithmic 45. When data found in multiple lists is updated only in some lists, this statement: WHILE (x > 0) DO "instruction" ENDWHILE If at the beginning variable x is less than zero then: A. "Instruction" will be done just causes: A. Data integrity. B. Double entry C. Data redundancy. D Data inconsistency. 16.When using the extended ASCII character set, how many bits will be use in storing the word TECHNOLOGY"? once. B. "Instruction" will never be done. C. "Instruction" will be done forever. D. "Instruction" will be done exactly x times. 96
Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Development strategies
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education