1. During the _____portion of the Information Processing Cycle the computer acquires data from some source






Write Comment

Type in
(Press Ctrl+g to toggle between English and the chosen language)

Comments

Show Similar Question And Answers
QA->The processing of accessing data stored in a tape is similar to manipulating data on a?....
QA->A distributed network configuration in which all data/information pass through a central computer is :....
QA->Power to authorize to monitor and collect traffic data or information through any computer resource for Cyber Security....
QA->A computer with a 32 bit wide data bus implements its memory using 8 K x 8 static RAM chips. The smallest memory that this computer can have is:....
QA->Computer processing speed is measured in terms....
MCQ->During the _____portion of the Information Processing Cycle the computer acquires data from some source....
MCQ-> The membrane-bound nucleus is the most prominent feature of the eukaryotic cell. Schleiden and Schwann, when setting forth the cell doctrine in the 1830s, considered that it had a central role in growth and development. Their belief has been fully supported even though they had only vague notions as to what that role might be, and how the role was to be expressed in some cellular action. The membraneless nuclear area of the prokaryotic cell, with its tangle of fine threads, is now known to play a similar role.Some cells, like the sieve tubes of vascular plants and the red blood cells of mammals, do not possess nuclei during the greater part of their existence, although they had nuclei when in a less differentiated state. Such cells can no longer divide and their life span is limited Other cells are regularly multinucleate. Some, like the cells of striated muscles or the latex vessels of higher plants, become so through cell fusion. Some, like the unicellular protozoan paramecium, are normally binucleate, one of the nuclei serving as a source of hereditary information for the next generation, the other governing the day-to-day metabolic activities of the cell. Still other organisms, such as some fungi, are multinucleate because cross walls, dividing the mycelium into specific cells, are absent or irregularly present. The uninucleate situation, however, is typical for the vast majority of cells, and it would appear that this is the most efficient and most economical manner of partitioning living substance into manageable units. This point of view is given credence not only by the prevalence of uninucleate cells, but because for each kind of cell there is a ratio maintained between the volume of the nucleus and that of the cytoplasm. If we think of the nucleus as the control centre of the cell, this would suggest that for a given kind of cell performing a given kind of work, one nucleus can ‘take care of’ a specific volume of cytoplasm and keep it in functioning order. In terms of material and energy, this must mean providing the kind of information needed to keep flow of materials and energy moving at the correct rate and in the proper channels. With the multitude of enzymes in the cell, materials and energy can of course be channelled in a multitude of ways; it is the function of some information molecules to make channels of use more preferred than others at any given time. How this regulatory control is exercised is not entirely clear.The nucleus is generally a rounded body. In plant cells, however, where the centre of the cell is often occupied by a large vacuole, the nucleus may be pushed against the cell wall, causing it to assume a lens shape. In some white blood cells, such as polymorphonucleated leukocytes, and in cells of the spinning gland of some insects and spiders, the nucleus is very much lobed The reason for this is not clear, but it may relate to the fact that for a given volume of nucleus, a lobate form provides a much greater surface area for nuclear-cytoplasmic exchanges, possibly affecting both the rate and the amount of metabolic reactions. The nucleus, whatever its shape, is segregated from the cytoplasm by a double membrane, the nuclear envelope, with the two membranes separated from each other by a perinuclear space of varying width. The envelope is absent only during the time of cell division, and then just for a brief period The outer membrane is often continuous with the membranes of the endoplasmic reticulum, a possible retention of an earlier relationship, since the envelope, at least in part, is formed at the end cell division by coalescing fragments of the endoplasmic reticulum. The cytoplasmic side of the nucleus is frequently coated with ribosomes, another fact that stresses the similarity and relation of the nuclear envelope to the endoplasmic reticulum. The inner membrane seems to posses a crystalline layer where it abuts the nucleoplasm, but its function remains to be determined.Everything that passes between the cytoplasm and the nucleus in the eukaryotic cell must transverse the nuclear envelope. This includes some fairly large molecules as well as bodies such as ribosomes, which measure about 25 mm in diameter. Some passageway is, therefore, obviously necessary since there is no indication of dissolution of the nuclear envelope in order to make such movement possible. The nuclear pores appear to be reasonable candidates for such passageways. In plant cells these are irregularly, rather sparsely distributed over the surface of the nucleus, but in the amphibian oocyte, for example, the pores are numerous, regularly arranged, and octagonal and are formed by the fusion of the outer and inner membrane.Which of the following kinds of cells never have a nuclei?
 ....
MCQ-> Read the following passage carefully and answer the questions given below it. Certain words/phrases have been printed in ‘’bold’’ to help you locate them while answering some of the questions.As increasing dependence on information systems develops, the need for such system to be reliable and secure also becomes more essential. As growing numbers of ordinary citizens use computer networks for banking, shopping, etc., network security in potentially a ‘’massive’’ problem. Over the last few years, the need for computer and information security system has become increasingly evident, as web sites are being defaced with greater frequency, more and more denial-of-service attacks are being reported, credit card information is being stolen, there is increased sophistication of hacking tools that are openly available to the public on the Internet, and there is increasing damage being caused by viruses and worms to critical information system resources.At the organizational level, institutional mechanism have to be designed in order to review policies, practices, measures and procedures to review e-security regularly and assess whether these are appropriate to their environment. It would be helpful if organizations share information about threats and vulnerabilities, and implement procedures of rapid and effective cooperation to prevent, detect and respond to security incidents. As new threats and vulnerabilities are continuously discovered there is a strong need for co-operation among organizations and, if necessary, we could also consider cross-border information sharing. We need to understand threats and dangers that could be ‘’vulnerable’’ to and the steps that need to be taken to ‘’mitigate’’ these vulnerabilities. We need to understand access control systems and methodology, telecommunications and network security, and security management practise. We should be well versed in the area of application and systems development security, cryptography, operations security and physical security.The banking sector is ‘’poised’’ for more challenges in the near future. Customers of banks can now look forward to a large array of new offerings by banks, from an ‘’era’’ of mere competition, banks are now cooperating among themselves so that the synergistic benefits are shared among all the players. This would result in the information of shared payment networks (a few shared ATM networks have already been commissioned by banks), offering payment services beyond the existing time zones. The Reserve Bank is also facilitating new projects such as the Multi Application Smart Card Project which, when implemented, would facilitate transfer of funds using electronic means and in a safe and secure manner across the length and breadth of the country, with reduced dependence on paper currency. The opportunities of e-banking or e-power is general need to be harnessed so that banking is available to all customers in such a manner that they would feel most convenient, and if required, without having to visit a branch of a bank. All these will have to be accompanied with a high level of comfort, which again boils down to the issue of e-security.One of the biggest advantages accruing to banks in the future would be the benefits that arise from the introduction of Real Time Gross Settlement (RTGS). Funds management by treasuries of banks would be helped greatly by RTGS. With almost 70 banks having joined the RTGS system, more large value funds transfer are taking place through this system. The implementation of Core Banking solutions by the banks is closely related to RTGS too. Core Banking will make anywhere banking a reality for customers of each bank. while RTGS bridges the need for inter-bank funds movement. Thus, the days of depositing a cheque for collection and a long wait for its realization would soon be a thing of the past for those customers who would opt for electronic movement of funds, using the RTGS system, where the settlement would be on an almost ‘’instantaneous’’ basis. Core Banking is already in vogue in many private sector and foreign banks; while its implementation is at different stages amongst the public sector banks.IT would also facilitate better and more scientific decision-making within banks. Information system now provide decision-makers in banks with a great deal of information which, along with historical data and trend analysis, help in the building up of efficient Management Information Systems. This, in turn, would help in better Asset Liability Management (ALM) which, today’s world of hairline margins is a key requirement for the success of banks in their operational activities. Another benefit which e-banking could provide for relates to Customer Relationship Management (CRM). CRM helps in stratification of customers and evaluating customer needs on a holistic basis which could be paving the way for competitive edge for banks and complete customer care for customer of banks.The content of the passage ‘’mainly’’ emphasizes----
 ....
MCQ-> Read the following passage carefully and answer’ the questions. Certain words/phrases are given in bold to help you locate them while answering some of the questions.Since its creation in the 17th century, insurers have amassed policies in each class of risk they cover. Thanks to technology, insurers now have access to more and more information about the risks that individuals run. Car insurers have begun to set premiums based on how actual drivers behave, with “telematic” tracking devices to show how often they speed or slam, on the brakes. Analysts at Morgan Stanley, a bank, predict that damage to insured homes will fall by 4060% if smart sensors are installed to monitor, say, frayed electrical wiring. Some health insurers provide digital fitness bands to track policyholders’ vital signs— and give discounts if they lead a healthier life. But the data can °lily go so far. Even the safest driver can be hit by a falling tree; people in connected homes still fall off ladders, but the potential gains from smart insurance are  large. First, giving people better insights into how they are managing risk should help them change their behaviour for the better. Progressive, an American car insurer, tells customers who use its trackers where they tend to drive unsafely; they crash less often as a result. Second, pricing will become keener for consumers. The insurance industry made $338 billion in profits last year. More accurate risk assessment should result in lower premiums for many policyholders. Third, insurers should be able to spot fraud more easily, by using data to verify claims.But two worries stand out. One is a fear that insurers will go from being companies you hope never to deal with to ones that watch your every move. The other, thornier problem is that insurers will cherry pick the good risks, leaving some people without a safety net or to be taken care of by the state. Forgone privacy is the price the insured pay for receiving personalised pricing. Many people are indeed willing to share their data, but individuals should always have to opt in to do so. Some worry that this safeguard may not be enough; the financial costs of not sharing data may be so great that people have no real choice over whether to sign up. The second concern is the worry that more precise underwriting will create a class of uninsurable people, selected out of insurers’ businesses because they are too high a risk. For some types of cover, that would be a reasonable outcome. People who choose to drive like maniacs should have a hard time getting insurance. By the same token, it makes sense to offer rewards, in the form of discounts to premiums, to customers who behave well. Incentivising people to eat better, exercise regularly, drink in moderation and avoid smoking would reap huge health dividends. Where things get harder is with risks that individuals can not control. There are few things that people have less choice about than their genes. One option is to distort the market by requiring insurers to be blind to genetic data. In 2011, for example, Europe banned insurers from using gender to calculate annuities. Now that a man’s shorter lifespans are no longer taken into account that has led to lower payments. Until the interplay between nature and nurture is better understood, it is right to be cautious. Insurers should be able to take note of customers’ behaviour, but not exploit information from genetic testing. However, as data analysis and the understanding of genetics improve, that line will only become harder to hold.Which of the following can be said about the insurance industry ?
 ....
MCQ-> In a modern computer, electronic and magnetic storage technologies play complementary roles. Electronic memory chips are fast but volatile (their contents are lost when the computer is unplugged). Magnetic tapes and hard disks are slower, but have the advantage that they are non-volatile, so that they can be used to store software and documents even when the power is off.In laboratories around the world, however, researchers are hoping to achieve the best of both worlds. They are trying to build magnetic memory chips that could be used in place of today’s electronics. These magnetic memories would be nonvolatile; but they would also he faster, would consume less power, and would be able to stand up to hazardous environments more easily. Such chips would have obvious applications in storage cards for digital cameras and music- players; they would enable handheld and laptop computers to boot up more quickly and to operate for longer; they would allow desktop computers to run faster; they would doubtless have military and space-faring advantages too. But although the theory behind them looks solid, there are tricky practical problems and need to be overcome.Two different approaches, based on different magnetic phenomena, are being pursued. The first, being investigated by Gary Prinz and his colleagues at the Naval Research Laboratory (NRL) in Washington, D.c), exploits the fact that the electrical resistance of some materials changes in the presence of magnetic field— a phenomenon known as magneto- resistance. For some multi-layered materials this effect is particularly powerful and is, accordingly, called “giant” magneto-resistance (GMR). Since 1997, the exploitation of GMR has made cheap multi-gigabyte hard disks commonplace. The magnetic orientations of the magnetised spots on the surface of a spinning disk are detected by measuring the changes they induce in the resistance of a tiny sensor. This technique is so sensitive that it means the spots can be made smaller and packed closer together than was previously possible, thus increasing the capacity and reducing the size and cost of a disk drive. Dr. Prinz and his colleagues are now exploiting the same phenomenon on the surface of memory chips, rather spinning disks. In a conventional memory chip, each binary digit (bit) of data is represented using a capacitor-reservoir of electrical charge that is either empty or fill -to represent a zero or a one. In the NRL’s magnetic design, by contrast, each bit is stored in a magnetic element in the form of a vertical pillar of magnetisable material. A matrix of wires passing above and below the elements allows each to be magnetised, either clockwise or anti-clockwise, to represent zero or one. Another set of wires allows current to pass through any particular element. By measuring an element’s resistance you can determine its magnetic orientation, and hence whether it is storing a zero or a one. Since the elements retain their magnetic orientation even when the power is off, the result is non-volatile memory. Unlike the elements of an electronic memory, a magnetic memory’s elements are not easily disrupted by radiation. And compared with electronic memories, whose capacitors need constant topping up, magnetic memories are simpler and consume less power. The NRL researchers plan to commercialise their device through a company called Non-V olatile Electronics, which recently began work on the necessary processing and fabrication techniques. But it will be some years before the first chips roll off the production line.Most attention in the field in focused on an alternative approach based on magnetic tunnel-junctions (MTJs), which are being investigated by researchers at chipmakers such as IBM, Motorola, Siemens and Hewlett-Packard. IBM’s research team, led by Stuart Parkin, has already created a 500-element working prototype that operates at 20 times the speed of conventional memory chips and consumes 1% of the power. Each element consists of a sandwich of two layers of magnetisable material separated by a barrier of aluminium oxide just four or five atoms thick. The polarisation of lower magnetisable layer is fixed in one direction, but that of the upper layer can be set (again, by passing a current through a matrix of control wires) either to the left or to the right, to store a zero or a one. The polarisations of the two layers are then either the same or opposite directions.Although the aluminum-oxide barrier is an electrical insulator, it is so thin that electrons are able to jump across it via a quantum-mechanical effect called tunnelling. It turns out that such tunnelling is easier when the two magnetic layers are polarised in the same direction than when they are polarised in opposite directions. So, by measuring the current that flows through the sandwich, it is possible to determine the alignment of the topmost layer, and hence whether it is storing a zero or a one.To build a full-scale memory chip based on MTJs is, however, no easy matter. According to Paulo Freitas, an expert on chip manufacturing at the Technical University of Lisbon, magnetic memory elements will have to become far smaller and more reliable than current prototypes if they are to compete with electronic memory. At the same time, they will have to be sensitive enough to respond when the appropriate wires in the control matrix are switched on, but not so sensitive that they respond when a neighbouring elements is changed. Despite these difficulties, the general consensus is that MTJs are the more promising ideas. Dr. Parkin says his group evaluated the GMR approach and decided not to pursue it, despite the fact that IBM pioneered GMR in hard disks. Dr. Prinz, however, contends that his plan will eventually offer higher storage densities and lower production costs.Not content with shaking up the multi-billion-dollar market for computer memory, some researchers have even more ambitious plans for magnetic computing. In a paper published last month in Science, Russell Cowburn and Mark Well and of Cambridge University outlined research that could form the basis of a magnetic microprocessor — a chip capable of manipulating (rather than merely storing) information magnetically. In place of conducting wires, a magnetic processor would have rows of magnetic dots, each of which could be polarised in one of two directions. Individual bits of information would travel down the rows as magnetic pulses, changing the orientation of the dots as they went. Dr. Cowbum and Dr. Welland have demonstrated how a logic gate (the basic element of a microprocessor) could work in such a scheme. In their experiment, they fed a signal in at one end of the chain of dots and used a second signal to control whether it propagated along the chain.It is, admittedly, a long way from a single logic gate to a full microprocessor, but this was true also when the transistor was first invented. Dr. Cowburn, who is now searching for backers to help commercialise the technology, says he believes it will be at least ten years before the first magnetic microprocessor is constructed. But other researchers in the field agree that such a chip, is the next logical step. Dr. Prinz says that once magnetic memory is sorted out “the target is to go after the logic circuits.” Whether all-magnetic computers will ever be able to compete with other contenders that are jostling to knock electronics off its perch — such as optical, biological and quantum computing — remains to be seen. Dr. Cowburn suggests that the future lies with hybrid machines that use different technologies. But computing with magnetism evidently has an attraction all its own.In developing magnetic memory chips to replace the electronic ones, two alternative research paths are being pursued. These are approaches based on:
 ....
Terms And Service:We do not guarantee the accuracy of available data ..We Provide Information On Public Data.. Please consult an expert before using this data for commercial or personal use
DMCA.com Protection Status Powered By:Omega Web Solutions
© 2002-2017 Omega Education PVT LTD...Privacy | Terms And Conditions