Self Studies
Selfstudy
Selfstudy

Computers in Accounting Test - 10

Result Self Studies

Computers in Accounting Test - 10
  • Score

    -

    out of -
  • Rank

    -

    out of -
TIME Taken - -
Self Studies

SHARING IS CARING

If our Website helped you a little, then kindly spread our voice using Social Networks. Spread our word to your readers, friends, teachers, students & all those close ones who deserve to know what you know now.

Self Studies Self Studies
Weekly Quiz Competition
  • Question 1
    1 / -0
    Coding and tesying can be done in a _______________.
    Solution

    Coding and tesying can be done in a Top-down manner.

    In practice, they can be seen as a style of thinking, teaching, or leadership. A top-down approach (also known as stepwise design and in some cases used as a synonym of decomposition) is essentially the breaking down of a system to gain insight into its compositional sub-systems in a reverse engineering fashion.

    A top-down approach (also known as stepwise design and in some cases used as a synonym of decomposition) is essentially the breaking down of a system to gain insight into its compositional sub-systems in a reverse engineering fashion. ... Top down approach starts with the big picture.

    There are two general processes involved in sensation and perception. Bottom-up processing refers to processing sensory information as it is coming in. ... Top-down processing, on the other hand, refers to perception that is driven by cognition.

  • Question 2
    1 / -0
    _____________ refers to the ability of computers to perform a variety of tasks: simple as well as complex.
  • Question 3
    1 / -0
    The physical components of a computer system is?
    Solution

    The physical components of a computer system is Hardware

    Computer hardware is the collection of physical parts of a computer system. This includes the computer case, monitor, keyboard, and mouse. It also includes all the parts inside the computer case, such as the hard disk drive, motherboard, video card, and many others.

    Computer hardware includes the physical parts or components of a computer, such as the central processing unit, monitor, keyboard, computer data storage, graphic card, sound card, speakers and motherboard.

    There are five main hardware components in a computer system: Input, Processing, Storage, Output and Communication devices. Are devices used for entering data or instructions to the central processing unit.

  • Question 4
    1 / -0
    To find the IP address of the host when domain name is known the ___________ can be used.
    Solution

    To find the IP address of the host when domain name is known the Inverse domain can be used.

    Suppose we have a function whose inverse is . Then the domain of the inverse function is the range of and the range of the inverse function is the domain of . Illustrating Draw an invertible function on the graph. As you draw, the domain and range of your function will be shown on the x- and y-axes.

    The range of the original function is all the y-values you'll pass on the graph; in this case, the straight line goes on for ever in either direction, so the range is also "all real numbers". To find the domain and range of the inverse, just swap the domain and range from the original function.

    Querying DNS. Click the Windows Start button, then "All Programs" and "Accessories." Right-click on "Command Prompt" and choose "Run as Administrator." Type "nslookup %ipaddress%" in the black box that appears on the screen, substituting %ipaddress% with the IP address for which you want to find the hostname.

    Updated: 04/26/2017 by Computer Hope. Alternatively referred to as a namespace, a domain namespace is a name service provided by the Internet for Transmission Control Protocol networks/Internet Protocol (TCP/IP). DNS is broken up into domains, a logical organization of computers that exist in a larger network.

    Domain Name Servers (DNS) are the Internet's equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses. This is necessary because, although domain names are easy for people to remember, computers or machines, access websites based on IP addresses.

  • Question 5
    1 / -0
    Which of the following are components of computer?
  • Question 6
    1 / -0
    In fibre optics, the signal source is ____________ waves.
    Solution

    In fibre optics, the signal source is Light waves.

    The light in a fiber-optic cable travels through the core (hallway) by constantly bouncing from the cladding (mirror-lined walls), a principle called total internal reflection. Because the cladding does not absorb any light from the core, the light wave can travel great distances.

    Light Source. In fiber optics, a source of light (laser, LED, etc.) is used to emit electromagnetic radiation in order to perform a specific task, whether detecting faults, breaks and microbends, characterizing link-loss or certifying LAN/WANs.

    Total internal reflection. When light traveling in an optically dense medium hits a boundary at a steep angle (larger than the critical angle for the boundary), the light is completely reflected. This is called total internal reflection. This effect is used in optical fibers to confine light in the core.

    And there are significant water bands in the infrared. Plastic optical fiber (POF) is made from materials that have lower absorption at shorter wavelengths, so red light at 650 nm is commonly used with POF, but at 850 nm attenuation is still acceptable so short wavelength glass fiber transmitters may be used.

  • Question 7
    1 / -0
    To minimize the chance of collision ___________ method was developed. 
    Solution

    To minimize the chance of collision CSMA method was developed.

    CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is a protocol for carrier transmission in 802.11 networks. Unlike CSMA/CD (Carrier Sense Multiple Access/Collision Detect) which deals with transmissions after a collision has occurred, CSMA/CA acts to prevent collisions before they happen.

    Carrier Sense Multiple Access (CSMA) is a network protocol that listens to or senses network signals on the carrier/medium before transmitting any data. CSMA is implemented in Ethernet networks with more than one computer or network device attached to it. CSMA is part of the Media Access Control (MAC) protocol.

    For this reason, CSMA/CD works well for wired networks, however, in wireless networks, there is no way for the sender to detect collisions the same way CSMA/CD does since the sender is only able to transmit and receive packets on the medium but is not able to sense data traversing that medium.

  • Question 8
    1 / -0
    Following are the categories of the automated system ______________.
    Solution

    Decision support system are the categories of the automated system.

    DSSs include knowledge-based systems. A properly designed DSS is an interactive software-based system intended to help decision makers compile useful information from a combination of raw data, documents, and personal knowledge, or business models to identify and solve problems and make decisions.

    A typical Decision support systems has four components: data management, model management, knowledge management and user interface management. ... The data management component, therefore, consists of both the Decision Support System information and the Decision Support System database management system.

    DSS Characteristics : Facilitation : DSS facilitate and support specific decision- making activities and/or decision processes. Interaction : DSS are computer-based systems designed for interactive use by decision makers or staff users who control the sequence of interaction and the operations performed. Ancillary

    First, computers and information technology can help people make important decisions. Second, computerized DSS assist and support managers and keep them connected to the decision-making loop. The overriding goal is improving decision-making effectiveness and efficiency, not automating decisions.

  • Question 9
    1 / -0
    __________ refers to the degree of exactness with which computations are made and operations are performed. 
  • Question 10
    1 / -0
    The maximum length of time that traffic is generated at the peak rate is called the ________________.
    Solution

    The maximum length of time that traffic is generated at the peak rate is called the Maximum burst size.

    The answer is to use the maximum burst size (MBS) as illustrated by the following case study. The maximum burst size is the maximum number of bytes a router can absorb without dropping a packet.

    Burst Size. The number of phages produced per infected bacterium or on average across of a population of phage infections. The concept of burst size in a literal sense is limited to describing lytic infections, where "burst" refers to the lysis event.

    The burst size is the actual amount of “burstable” data that is allowed to be transmitted at the peak bandwidth rate in kilobytes. Think of the burst bonus as a network traffic savings account. And the burst size is the maximum number of bytes that can go into that account.

Self Studies
User
Question Analysis
  • Correct -

  • Wrong -

  • Skipped -

My Perfomance
  • Score

    -

    out of -
  • Rank

    -

    out of -
Re-Attempt Weekly Quiz Competition
Self Studies Get latest Exam Updates
& Study Material Alerts!
No, Thanks
Self Studies
Click on Allow to receive notifications
Allow Notification
Self Studies
Self Studies Self Studies
To enable notifications follow this 2 steps:
  • First Click on Secure Icon Self Studies
  • Second click on the toggle icon
Allow Notification
Get latest Exam Updates & FREE Study Material Alerts!
Self Studies ×
Open Now