1. A data file which is used for reference purposes by an application program is?





Write Comment

Type in
(Press Ctrl+g to toggle between English and the chosen language)

Comments

Tags
Show Similar Question And Answers
QA->Symbolic representation of folder,file or application are called:....
QA->When a file is finally disposed of the file with a copy of which is sent to record room:....
QA->What is the software deployed in Grama Panchayats for accounting purposes?....
QA->The extension jpeg in the name of a file indicates that it is a/an file.....
QA->A storage area used to store data to compensate for the difference in speed at which the different units can handle data is:....
MCQ-> Read the following passage carefully and answer the questions given below it. Certain words are given in bold to help you answer some of the questions.At the heart of what makes India a better regime than China is a healthy respect for the civil rights and liberties of its citizens. There are checks and balances in our government. But India’s new surveillance programme, the Central Monitoring system (CMS), resembles a dystopian society akin to George Orwell’s 1984.According to several news reports, the CMS gives the government, Indian security agencies and income tax (IT) officials the authority to listen to, and tape phone conversions, read emails and text messages, monitor Posts on Facebook, Twitter or Linkedin and track searches on Google of selected targets, without oversight by the courts or parliament. To call it sweeping is an understatement.Typically, Indian Security agencies need a court order for surveillance, or depend on Internet/telephone service providers for data, provided they supply a warrant. CMS allows the government to bypass the court.  Milind Deora, India’s Minister of State for Information Technology says the new system will actually improve citizens’ privacy because telecommunication agencies would no longer be directly involved in the surveillance; only government officials would have these details – missing the point that in a democracy, there has to be freedom from government surveillance. This is hardly comforting in a nation riddled with governmental corruption.India does not have a privacy law. CMS will operate under the Indian Telegraph Act (ITA). The ITA is a relic of the British Raj from 1885, and gives the government the freedom to monitor private conversations. News reports quote anonymous telecommunications ministry officials as saying that CMS has been introduced for security purposes, and “this is to protect you and your country”.That is irrational. For one, there are no ‘security purposes’ that prevent the government from having a rational debate on this programme and getting approval from our elected representatives before authorizing such wide-reaching surveillance. If the government is worried that a public debate in a paralysed parliament would half the programme’s progress, then it can convene a committee of individuals or an individual body such as CAG to oversee the programme. It can seek judicial approval from the Supreme Court, and have a judge sign off on surveillance requests without making these requests public.As of now, the top bureaucrat in the interior ministry and his/her state level deputies will have the power to approve surveillance requests. Even the recently revealed US surveillance Programme, had ‘behind the doors’ bipartisan surveillance approval. Furthermore, US investigation agencies such as the CIA and NSA are not the ruling party’s marionettes; in India, that the CBI is an arm of the government is a fait accompli. Even the Supreme Court recently lambasted the CBI and asked it to guarantee its independence from government influences after it was proved that it shared unreleased investigation reports with the government.There is no guarantee that this top bureaucrat will be judicious or not use this as a tool to pursue political and personal vendettas against opposition parties or open critics of the government. Security purposes hardly justify monitoring an individual’s social media usage. No terrorist announces plans to bomb a building on Facebook. Neither do Maoists espouse Twitter as their preferred form of communication.Presumably, security purposes could be defined as the government’s need to intercept terrorist plans. How does giving the IT department the same sweeping surveillance powers justify security purposes? The IT office already has expansive powers to conduct investigations, summon individuals or company executives, and raid premises to catch tax evaders. In a world where most financial details are discussed and transferred online, allowing the IT departments to snoop on these without any reasonable cause is akin to airport authorities strip searching everyone who boards a flight.What happened on 26/11 or what happens regularly in Naxal – affected areas is extremely sad and should ideally, never take place again. But targeting terrorists means targeting people who show such inclinations, or those who arouse suspicions, either by their travels or heir associations with militant or extremist groups. And in a country where a teenager has been arrested for posting an innocent comment questioning the need for a bandh on the death of a political leader, gives us reason to believe that this law is most likely to be misused, if not abused. Select the word which is MOST OPPOSITE in meaning to the word printed in bold, as used in the passage. AKIN....
MCQ-> Answer questions on the basis of information given in the following case. MBA entrance examination comprises two types of problems: formula - based problems and application - based problem. From the analysis of past data, Interesting School of Management (ISM) observes that students good at solving application - based problems are entrepreneurial in nature. Coaching institutes for MBA entrance exams train them to spot formula - based problems and answer them correctly, so as to obtain the required overall cut - off percentile. Thus students, in general, shy away from application - based problem and even those with entrepreneurial mind - set target formula - based problems. Half of a mark is deducted for every wrong answer.ISM wants more students with entrepreneurial mind - set in the next batch. To achieve this, ISM is considering following proposals: I. Preparing a question paper of two parts, Parts A and Part B of duration of one hour each. Part A and Part B would consist of formula - based problems and application - based problems, respectively. After taking away Part A, Part B would be distributed. The qualifying cut - off percentile would be calculated on the combined scores of two parts. II. Preparing a question paper comprising Part A and Part B. While Part A would comprise formula - based problems, Part B would comprise application - based problems, each having a separate qualifying cut - off percentile. III. Assigning one mark for formula - based problems and two marks for application based problems as an incentive for attempting application - based problems. IV. Allotting one mark for formula - based problems and three marks for application - based problem, without mentioning this is the question paper. Which of the following proposal (or combination of proposals) is likely to identify students with best entrepreneurial mind - set?....
MCQ->Which of the following statements are correct about the this reference? this reference can be modified in the instance member function of a class. Static functions of a class never receive the this reference. Instance member functions of a class always receive a this reference. this reference continues to exist even after control returns from an instance member function. While calling an instance member function we are not required to pass the this reference explicitly.....
MCQ->A data file which is used for reference purposes by an application program is?....
MCQ->You are the administrator of a Windows 2000 server computer. The server has a single hard disk with two partitions. An application that runs on your server creates a very large log file in the SystemrootYTemp folder. There is not enough free space on the system partition to accommodate the log file. The application does not provide a way to change the path to the log file. You want to run the application on your server. What should you do?....
Terms And Service:We do not guarantee the accuracy of available data ..We Provide Information On Public Data.. Please consult an expert before using this data for commercial or personal use
DMCA.com Protection Status Powered By:Omega Web Solutions
© 2002-2017 Omega Education PVT LTD...Privacy | Terms And Conditions