Tuesday, 2 February 2021

CS609-System Programming Quiz MCQs Lecture 23-45 Finalterm Objective Questions | SUPERSTARWEBTECH

CS609-System Programming Quiz MCQS #Objective #Questions #FinalTerm

1. The data structure that is maintained by the DOS in the boot block of each drive is known as:
  • FCB
  • DPB
  • BPB
  • RDB
2. In partition table, if LBA = 0 then it means
  • Logical drive
  • Extended partition
  • MBR
  • None
3. There is/are ___ DMA controller's masking register(s).
  • 1
  • 2
  • 3
  • 4
4. The ___ signals are used by various devices to request a DMA operation
  • ACK
  • Hold
  • DREQ
  • Dorder
5. The value ___ of partition table signature indicate that the code part contains valid executable code.
  • AA22
  • AA33
  • AA44
  • AA55
6. The last partition table within the chain contains ___ entry/entries about the logical drive
7. ___ is an absolute address relative to the start of physical drive
  • LBA
  • LSN
  • CHS
  • None
8. An extended partition can have one or more ___ partitions
9. Blocks can be termed as ___
10. A single DMA can transfer ___ bit operand to and from memory in one bus cycle
  • 4
  • 8
  • 12
  • 16
11. When we talk about FAT based file system, in user data area first cluster number is ___
  • 0
  • 1
  • 2
  • None
12. Cluster number can also be referred as block number
13. What will be the value of DL register when we are accessing C drive using undocumented service 21H/32H?
  • 0
  • 1
  • 2
  • 3
14. When we mark a file as deleted by placing 0xE5 then the chain of clusters in FAT is also replaced by ___
  • E5
  • 1
  • 0
  • N
15. For supporting long file names. ___ fragments can be supported
  • 12
  • 20
  • 26
  • 32
16. Drive parameter block is derived from ___
  • FCB
  • FAT
  • BPB
  • CPB
17. ___ is the first logical sector of NTFS partition
18. In NFTS, Fat and root directory is replaced by:
  • FCB
  • MFT
  • Hidden blocks
  • Boot sector
19. File can be ___ views as collection of clusters or blocks
  • Physically
  • Logically
  • Both physically and logically
  • None
20. What will be the value of the word located at 1Fh in DPB when number of free clusters on drive is not known?
21. Each addressable unit has a unique combination of sec#, head#, track# as its ___ address.
22. BIOS services understand ___
  • LBA
  • LSN
  • Cluster #
  • None
23. The first cluster number of a file can be found in ___
  • BPB
  • DPB
  • FCB
  • None
24. The size of FSInfo block is:
25. In NTFS first ___ entries are reserved
  • 4
  • 6
  • 16
  • 32
26. In memory map of first 1MB of RAM, the first ___ is called conventional RAM
27. In memory map of first 1 MB of RAM, the higher ___ is called system memory
28. The ___ of boot block constitutes of BPB
29. Extended BIOS function make use of ___ address
  • LBA
  • CHS
  • LSN
  • None
30. LBA address can be used in place of CHS address
31. In FAT12, the maximum range of clusters is ___
32. NTFS volume can be accessed directly in DOS
33. Service 21H/52H service returns the address of DOS internal data structures in ES:BX ___ behind the address returned lies the far address of the first MCB in memory
34. 80386 can have ___ control registers
  • 2
  • 5
  • 3
  • 4
35. The partition table uses the extended ___ service
  • 13h
  • 14h
  • 15h
  • 16h
36. The entry point of execution in EXE File can be
  • Start of the first execution
  • Start of the last execution
  • Anywhere in the Program
  • Can be in the middle of the program
37. Using the ___ entry and the FAT contents we can access the contents of file
38. Control information in files is maintained using 
  • BPB
  • DPB
  • FCB
  • FPB
39. What will happen if NTFS volume is accessed in DOS?
40. LSN of FSInfo block is available at 
  • BPB
  • FAT
  • Root Directory
  • None
41. DOS device drivers do not understand the ___ data structures
  • FAT12
  • FAT16
  • FAT32
  • NTFS
42. A ___ is a collection of contiguous block
43. Practically ___ entries are there in FAT32
  • 2^26
  • 2^28
  • 2^30
  • 2^32
44. BPB stands for ___
45. Maximum possible entries in FAT12 are ___
  • 1024
  • 4096
  • 2048
  • 65536
46. Disadvantage of FAT32 is ___
  • Large disk size can be managed in FAT32
  • Cluster size is reduced
  • Internal fragmentation is reduced
  • Very large table
47. Jump code part contains ___ bytes in boot block
  • 3
  • 5
  • 8
  • 11
48. Operating system name contains ___ bytes in boot block
  • 3
  • 5
  • 8
  • 11
49. File can be ___ views as organization of data
50. ___ is used to read a block against its LSN
51. To access the block within cluster using BIOS services the cluster number should be converted into ___
  • CHS
  • LBA
  • LSN
  • None
52. The directory structure of DOS is like ___
  • Array
  • Tree
  • Linked list 
  • None
53. When LSN is equal to zero (0) it means ___
54. In FAT32, lower ___ bits are used 
  • 26
  • 28
  • 30
  • 32
55. ___ is relative address with respect to the start of Logical Drive
  • LBA
  • LSN
  • CHS
  • None
56. The practical limit of blocks per cluster is ___
57. In DOS we have limit of ___
58. Highest capacity physical capacity of the disk according to the IDE interface is ___
59. In Protected Mode, the segment registers are used as ___
60. To access drive parameter block we use undocumented service ___
61. Boot block consists of ___ bytes
  • 64
  • 128
  • 256
  • 512
62. The DMA requests to acquire buses through the ___ signal
63. In FAT12, to calculate the address or offset from index, we need to multiply it with ___
  • 1/2
  • 3/2
  • 5/7
  • 7/2
64. ___ registers can be used to show that the channel is single transfer, block transfer or demand transfer mode
65. Cluster size is reduced in ___
66. In FAT32 ___ root directory entries are there
67. If a file is having more than one cluster then it will be managed by ___
68. Internal fragmentation is reduced in ___
69. To store a cluster in FAT32 ___ is/are needed
70. If a file size is 12K and the size of the cluster is 4K then ___ clusters are used for files.
  • 2
  • 3
  • 4
  • 5
71. We can access the contents of File by using the root directory entry and ___
72. FAT based file system can store file name in ___ form
73. We can access blocks for FAT using ___
  • BPB
  • DPB
  • FCB
  • Both BPB and DPB
74. If we know the cluster number, we can access the blocks within the cluster using BIOS services directly
75. ___ is an internal data structure of DOS and resides in main memory
  • BPB
  • DPB
  • CPB
  • None

Thursday, 21 January 2021

CS614-Data Warehousing Quiz MCQs Lecture 23-45 Finalterm Objective Questions | SUPERSTARWEBTECH

CS614-Data Warehousing Quiz MCQS #Objective #Questions #FinalTerm

1. Which of the following is NOT one of the variants of Nested-loop join?
2. ___ lists each term in the collection only once and then shows a list of all the documents that contain the given term
3. The optimizer uses a hash join to join two tables if they are joined using a equijoin and 
4. In nested-loop join case, if there are 'M' rows in outer table 'N' rows in inner table, time complexity is 
  • O (M log N)
  • O (log MN)
  • O (MN)
  • O (M + N)
5. Goal driven approach of data warehouse development was result of ___ work
6. In ___ phase of a fundamental data warehouse life cycle model, a working model of data warehouse is deployed for a selective set of users
7. One of the drawbacks of waterfall model is that:
8. Implementation of a data warehouse requires ___ activities
  • Highly integrated
  • Loosely integrated
  • Tightly decoupled
  • None
9. The ___ phase of fundamental data warehouse life cycle model includes data warehouse daily maintenance activities
  • Deployment
  • Operation
  • Enhancement
  • Maintenance
10. As per Bill Inmon, a data warehouse, in contrast with classical application is 
  • Data driven
  • Resource driven
  • Requirement driven
  • Time sensitive
11. Which of the following activity executes parallel with all other activities in Kimball's DWH development approach?
12. Which of the following activity/activities is/are part of project planning phase in Kimball's DWH development approach?
  • Obtain resources
  • Establish the preliminary scope and justification
  • Assess organization's readiness for a data warehouse initiative
  • All of the given
13. Improper documentation results the problem(s) like:
  • Maintenance issue
  • New developers unable to configure already existing code
  • Lot of time required for enhancing the code
  • All of the given
14. Which of the following is NOT one of the possible pitfalls in DWH Life Cycle & Development?
  • Not having multiple servers
  • Low priority for OLAP Cube Construction
  • Improper documentation
  • None
15. The Kimball's iterative data warehouse development approach drew on decades of experience to develop the ___
16. For a smooth DWH implementation we must be a technologist
17. During the application specification activity, we also must give consideration to the organization of the applications
18. The most recent attack is the ___ attack on the cotton crop during 2003-04, resulting in a loss of nearly 0.5 million bales
19. We must try to find the one access tool that will handle all the needs of their users
20. As opposed to the outcome of classification, estimation deal with ___ value outcome
21. To identify the ___ required we need to perform data profiling
22. ___ in agriculture extension is that pest population beyond which the benefit of spraying outweighs its cost
23. People that design and build the data warehouse must be capable of working across the organization at all levels
24. The ___ is only a small part in realizing the true business value buried within the mountain of data collected and stored within organizations business systems and operational databases
25. Data Transformation Service (DTS) provide a set of ___ that lets you extract, transform, and consolidate data from disparate sources into single or multiple destinations supported by DTS connectivity
  • Tools
  • Documentations
  • Guidelines
  • Graphs
26. The goal of ___ is to look at as few blocks as possible to find the matching records
27. A dense index, if fits into memory, costs only ___ disk I/O access to locate a record by given key
  • One
  • Two
  • log n
  • n
28. The key idea behind ___ is to take a big task and break it into subtasks that can be processed concurrently on a stream of data inputs in multiple, overlapping stages of execution
29. Non uniform distribution, when data is distributed across the processors, is called ___
  • Skew in partition
  • Pipeline distribution
  • Distributed distribution
  • Uncontrolled distribution
30. Th goal of ideal parallel execution is to completely parallelize those parts of a computation that are not constrained by data dependencies. The smaller the portion of the program that must be executed ___ the greater the scalability of the computation
31. Data mining is a/an ___ approach, where browsing through data using data mining techniques may reveal something that might be of interest to the user as information that was unknown previously
32. Data mining evolve as a mechanism to cater the limitations of ___ systems to deal massive data sets with high dimensionality, new data types, multiple heterogeneous data resources etc.
33. ___ is the technique in which existing heterogeneous segments are reshuffled, relocated into homogeneous segments.
34. To measure or quantify the similarity or dissimilarity, different techniques are available. Which of the following option represent the name of available techniques?
35. For a given data set, to get a global view in un-supervised learning we use
36. In DWH project, it is assured that ___ environment is similar to the production environment
37. For a DWH project, the key requirement are ___ and product experience
38. Pipeline parallelism focuses on increasing throughput of task execution, NOT on ___ sub-task execution time
39. Many data warehouse project teams waste enormous amounts of time searching in vain for a ___
  • Silver bullet
  • Golden bullet
  • Suitable hardware
  • Compatible product
40. Focusing on data warehouse delivery only often end up ___
41. Pakistan is one of the five major ___ countries in the world
42. ___ is a process which involves gathering of information about column through execution of certain queries with intention to identify erroneous records
  • Data profiling
  • Data Anomaly Detection
  • Record Duplicate Detection
  • None
43. ___ contributes to an under-utilization of valuable and expensive historical data, and inevitably results in a limited capability to provide decision support and analysis
44. DTS allows us to connect through any data source or destination that is supported by ___
45. Execution can be completed successfully or it may be stopped due to some error. In case of successful completion of execution all the transactions will be ___
46. If some errors occurs, execution will be terminated abnormally and all transactions will be rolled back. In this case when we will access the database we will find it in the state that was before the ___
47. To judge effectiveness we perform data profiling twice
48. ___ if fits into memory, costs only one disk I/O access to locate a record by given key
49. The purpose of the House of Quality technique is to reduce ___ types of risk
50. NUMA stands for ___
51. There are many variants of the traditional nested-loop join. If the index is built as part of the query plan and subsequently dropped, it is called
52. Investing years in architecture and forgetting the primary purpose of solving business problems, results in inefficient application. This is the example of ___ mistake
  • Extreme Technology Design
  • Extreme Architecture Design
  • None
53. Classification consists of examining the properties of a newly presented observation and assigning it to a predefined ___
  • Object
  • Container
  • Subject
  • Class
54. During business hours, most ___ systems should probably not use parallel execution
  • OLAP
  • DSS
  • Data Mining
  • OLTP
55. In contrast to statistics, data mining is ___ driven
56. The goal of ideal parallel execution is to completely parallelize those parts of a computation that are not constrained by data dependencies. The ___ the portion of the program that must be executed sequentially, the greater the scalability of the computation.
57. If every key in the data file is represented in the index file then index is 
  • Dense index ✔
  • Sparse index
  • Inverted index
  • None
58. An optimized structure which is built primarily for retrieval, with update being only a secondary consideration is 
59. ___, if too big an does not fit into memory, will be expensive when used to find a record by given key
60. Which of the following is not an activity of Data Quality Analysis Project?
61. Data mining uses ___ algorithms to discover patterns and regularities in data
62. In contrast to data mining, statistics is ___ driven
63. There are many variants of the traditional nested-loop join. When the entire table is scanned it is called
64. Which of the following is not a technique of Data Mining?
65. There are many variants of the traditional nested-loop join, if there is an index is exploited, then it is called ___

Monday, 18 January 2021

MGT610-Buisness Ethics Quiz MCQs Lecture 23-45 Finalterm Objective Questions | SUPERSTARWEBTECH

MGT610-Buisness Ethics Quiz MCQS #Objective #Questions #FinalTerm

1. The antitrust view is based on a number of assumptions. Who has summarized the basic propositions this traditional view is based on?
2. Which of the following view argues that prices nd profits in highly concentrated industries are higher than they should be?
3. Water pollution comes from all except?
4. Fossil fuels include all except?
  • Oil
  • Coal
  • Wind
  • Natural gas
5. Which of the following is TRUE regarding acid rain?
6. Which of the following statement is TRUE?
7. Which of the following refers to the saving or rationing of natural resources for later use?
8. Which of the following views claims that the power of oligopolies is not as large as it appears?
9. How much pounds of plutonium waste has been produced by each nuclear reactor every year?
  • 255
  • 260
  • 265
  • 275
10. Resource depletion may be in any form except?
11. Which of the following is signed by the buyer and seller that details the terms of a purchase?
12. Who argued that misrepresentation in the making of a contract cannot be universalized?
  • Rawls
  • Kant
  • Adam Smith
  • None
13. Who should bear the costs of pollution control?
14. Relationship between a business firm and consumer essentially be?
15. Group of thinkers, sees the key form of hierarchy connected to the destruction of the environment as the domination of women by men is known as?
16. Internalizing external costs is also consistent with which form of justice?
17. Saving of finite and depletable resources of the world is known as?
18. All of the following are the reasons due to which our probability judgements may go wrong except
19. Which of the following makes freedom of choice impossible?
20. Which of the following includes the costs that the firm does not pay the costs of pollution and medical care that result from the manufacture of the commodities?

Thursday, 7 January 2021

CS619 Final Project Phase 1 Gathering and Analysis Requirements | How to make SRS? | System Requirements Specifications (SRS) | SSWT

 Dear Students!

In this post you will learn How to make SRS document? for your final project CS619. As we know that the students of BSCS/BSSE/BSIT in 7th/8th Semester and MIT/MSCS in 3rd/4th Semester have to select CS619 Project. This project is a must to get Degree. It carries 6 credit hours. So, here we will guide you about the first step of CS619 Project i.e. Gathering and Analysis Requirements.

PHASE-1 Gathering and Analysis Requirements

In this phase you are required to make SRS Document.

What is SRS?

SRS stands for Software Requirements Specification. It is a detailed document that tells about how the system is expected to perform. In this document, following topics are covered:
  • Scope of the Project
  • Software Requirements
    •   Functional requirements
    •   Non-Functional requirements
  • Use Case Diagram
  • Usage Scenarios
  • Adopted Methodology
  • Work Plan
Now let's discuss them one by one in detail.

    Scope of the Project

    What is scope?

    The scope of the project defines the necessary information required to start a project. It basically answers to the following questions:
    • What are the needs?
    • What is your goal?
    • How the system will fulfill the user needs?
    • Why user should use this system?

    For example:

    Here is an example of scope of the project: An online departmental store.
    👉 Click here to download the project file: Cash and Carry online Departmental Store

    "Cash & Carry is an Online Departmental Store where people will be offered with a wide range of both grocery and non-grocery items to buy online. It offers items to residents located anywhere in Pakistan. This store is being developed to help users to explore their daily, weekly or monthly required items. The payment gateway methods are easypaisa or cash on Delivery.

    In this project, our goal is to facilitate the users to buy grocery and non-grocery items at the ease of their home. The users will interact with our store through Website. Cash & Carry Online Store System is built in the form of Web Application which includes User registration/login system, search system, information flow charts, administration module, payment gateways etc. When the user makes a transaction and purchases an item from this store, he/she will receive items at his/her doorstep along with an invoice.

    Moreover, this system acts as power up approach for people. And also, time saving. As some people like working women/men and old age persons might not be able to go out due to some reasons like tiredness, illness or time constraint. So, Cash & Carry Online Departmental Store plays a significant Role in the life of people whether it’s a man, a woman, a student, or an elderly."

    💡 Tip: Don't need to add history and philosophy. Just write the specific content only in your own words. 

    Software Requirements

    Here you will write the functional and non-functional requirements in detail.

    Functional Requirements:

    The functional requirements state: “What a system must do?”. Their emphasis is on the user requirements. They fulfill the users desired tasks. These must be put into the system by the developers to meet users’ requirements. 

    For example:

    This example is related to the above mentioned sample project.

    The user interface will be simple enough to navigate easily. It will contain only two broad main categories Grocery and Non-grocery items on the home page with other tools like search, add to cart, login/signup buttons, FAQ and information flow charts links etc. 

    The customers can register themselves into our system and then login to place order. Registration is mandatory to buy and pay for the items. 

    💡 Tip: You should write all the required functionalities of your project. There may be more than these like: Search, Order Track, Save Selection etc.

    Non-Functional Requirements:

    The non-functional requirements describe: “How a system should behave?”. They specify characteristics of the system.

    For example:

    This example is related to the above mentioned sample project.

    The usability is a key factor to facilitate the user. The system must provide a user-friendly environment to its customers. To interact with the user, system should give a proper list of categories for the user to search their required items.

    To ensure that the user’s information is safe, the system should protect the user’s data. It must refrain the hackers to unauthorized access. The system must use specific standards to secure it from malware attacks and unauthorized access.

    💡 Tip: You should write all the required non-functionalities of your project. There may be more than these like: Accuracy, Reliability, Performance etc.

    Use Case Diagram

    What is Use Case?

    A Unified Modeling Language which represents the interaction between the user and the system. It shows the relationship that exists between the system and the user. The user/actor is involved in different use cases like: login, registration, search, add to cart etc. 

    For example:

    Here is an example Use case diagram of the departmental store 

    Click here to learn more on: How to make Use Case Diagram? 

    Usage Scenarios

    What are usage scenarios?

    They describe the events/actions that occur when the user interacts with the system. They show the real world example that how the people or users interact with the system, What actions do they perform?, What are the conditions?, What will be the exceptions if the action does not meet the desired conditions?

    So here in this section you are required to write the usage scenarios of all cases in the table format which explains:
    • Use Case title
    • Use Case Id
    • Actions Description
    • Alternative Path
    • Pre-conditions
    • Author
    • Exceptions
    • Post-conditions
    You are supposed to provide usage scenario for each use case present in your use case diagram. So basically it explains each use case in detail.

    For example:

    Here is a sample of Usage Scenario from the Online Departmental Store Project.

    Use Case Title


    Use Case Id

    UC 1.1


    A registration Page will open

    Description: A user can register themselves by providing his/her information like: Name, Username, Email, Phone Number, Address, and Password.

    Alternative Path: The user must register to place an order and add items to cart.

    Pre-conditions: The system should provide a proper form for user to fill their required information.



    Unregistered User

    If the user leaves any field empty or inputs wrong email/phone number or the inserted password does not match the requirements then user registration will not take place.

    Post Conditions: A success message should be displayed on successful registration.

    🖉 Note: This is only one scenario from the use case diagram. You have to write scenarios for each use case present in the Use case Diagram.

    Adopted Methodology

    Here you will write in detail about which Software Development Lifecycle SDLC Model you adopted for this project. In short you will write about Waterfall Model and Spiral Model with diagrams. And then you will write VU Process Model which is a combination of Waterfall Model and Spiral Model proposed by Virtual University of Pakistan.

    Waterfall Model

    What is waterfall model?

    Waterfall model is a SDLC approach used to make a linear system sequentially. It was the very first process model. This model divides the software development life cycle into different steps or phases. Each phase has its responsibilities and different objectives. This model is unidirectional. Each phase is dependent on the deliverables of the previous phase. The consequences of one phase are the inputs for the next phase. The main advantage of this model is that it is easy to understand and use. It is best for small projects when requirements are known. But there is high amount of risk of waterfall model and it is not suitable for the projects that have changing requirements.

    Spiral Model

    What is Spiral Model?

    The spiral model is a SDLC risk-driven method. It combines the iterative models with elements of Waterfall model. The model works well for large projects. In this model each next stage is link to the previous so commutation flow can go in both directions and if changes come then they can easily be adjusted. This guarantees that there is no conflict with the previous requirements.

    VU Process Model

    What is VU Process Model?

    VU process model is called hybrid approach of website development. It is the combination of both waterfall and spiral model. This model is easy to understand. It is proposed by Virtual University of Pakistan. This model will maximize the quality of the website and reduce the risk because waterfall avoid overlapping which makes it easy to understand and spiral uses for critical projects. We need both functionalities for our project so that’s why we use VU process model because it’s a combination of both spiral and waterfall process Models.

    Work Plan

    Here you will provide Gantt chart of your final project. 

    What is Gantt Chart?

    It is a type of horizontal bar chart which tells the timeline of the project. It shows the starting and finishing time of your project phases. See below to get an idea.

    For example:

    We hope you understood these concept clearly. Feel free to ask any question. 

    You can contact us on:

    Thursday, 31 December 2020

    CS614-Data Warehousing Quiz MCQs Lecture 1-22 Midterm Objective Questions | SUPERSTARWEBTECH

    CS614-Data Warehousing Quiz MCQS #Objective #Questions #MidTerm

    1. Data warehouse stores ___
    2. The ___ dimension represents data correctness
    3. Which of the following is not a Data Quality Validation Technique?
    • Referential Integrity
    • Using Data Quality Rules
    • Data Histograming
    • Indexes
    4. Which of the following is an example of Non-Additive Facts?
    5. Which is the most complex type of transformation in the following?
    6. Serious ___ involves decomposing and reassembling the data
    7. ___ is the degree of utility and value the data has to support the enterprise processes that enable accomplishing enterprise objectives
    8. In a decision support system ease of use is achieved by:
    9. Assume a company with a multi-million row customer table i.e. n rows. Checking for Referential Integrity (RI), using a smart technique with some kind of tree data structure would require ___ time
    10. Which of the following is NOT an example of a typical grain?
    11. Most DWH implementations today do not use ___ enforced by the database, but as TQM methods improve overall data quality and database optimizers
    12. Suppose in system A, the possible values of "Gender" attribute were "Male" & "Female", however in data warehouse, the values stored were "M" for male and "F" for female. The above scenario is an example of:
    13. Development of data warehouse is hard because data sources are usually ___
    14. A/an ___ is a collection of random transactional codes, flags and/or text attributes that are unrelated to any particular dimension
    • Junk dimension
    • Slowly changing dimension
    • Multi-valued dimension
    • Simple dimensions
    15. ROLAP provides access to information via a relational database using
    16. The typical availability of OLTP system is 24/7, while that of data warehouse is ___
    • 6/12
    • 7/12
    • 1/24
    • Twice a week
    17. In ___ nested-loop join of quadratic time complexity does not hurt the performance
    18. If actual data structure does not conform to documented formats then it is called:
    19. Which of the following is not a CUBE operation?
    20. The data has to be checked, cleansed and transformed into a ___ format to allow easy and fast access
    • unified
    • predicted
    • qualified
    • proactive
    21. Which is not a/an characteristics of data quality?
    22. The extent to which data is in appropriate languages, symbols, and units, and the definitions are clear is known as ___
    23. In case of multiple sources for the same data element, we need to prioritize the source systems per element bases, the process is called
    • Ranking
    • Prioritization
    • Element Selection
    • Measurement Selection
    24. In OLTP environments, the size of tables is relatively ___
    • Large
    • Fixed
    • Moderate
    • Small
    25. Change Data Capture (CDC) can be challenging task because
    26. ___ is the extent to which data is regarded as true and credible
    27. The relation R will be in 2nd Normal Form if 
    28. ___ is the degree to which data accurately reflects the real-world object that the data represents
    29. Web scrapping is a process of applying ___ techniques to the web
    30. In which class of aggregates AVERAGE function can be placed?
    31. Which of the following is not an "Orr's Law of Data Quality"?
    32. The ___ operator proves useful in more complex metrics applicable to the dimensions of timeliness and accessibility
    • Max
    • Min
    • Min or Max
    • None
    33. Which is not a/an Data Quality Validation Technique?
    34. Assume a company with a multi-million row customer table i.e. n rows. Checking for Referential Integrity (RI) using a naïve approach would take ___ time.
    • O(n)
    • O(1)
    • O(log n)
    • None
    35. ___ breaks a table into multiple tables based upon common column values
    36. Companies collect and record their own operational data, but at the same time they also use reference data obtained from ___ sources such as codes, prices etc.
    37. Ad-hoc access means to run such queries which are known already
    38. Relational databases allow you to navigate the data in ____ that is appropriate using the primary, foreign key structure within the data model.
    39. DSS queries do not involve a primary key
    • True ✔
    • False
    40. The need to synchronize data upon update is called
    41. Taken jointly, the extract programs or naturally evolving systems formed a spider web, also known as 
    42. Node of a B-Tree is stored in memory block and traversing a B-tree involves ___ page faults
    43. Which statement is true for De-Normalization?
    44. De-normalization normally speeds up
    45. In horizontal splitting, we split a relation into multiple tables on the basis of 
    46. For good decision making, data should be integrated across the organization to cross the LoB (Line of Business). This is to give the total view of organization from:
    47. A data warehouse may include
    • Legacy systems
    • Only internal data sources
    • Privacy restrictions
    • Small data mart
    48. Multidimensional databases typically use proprietary ___ format to store pre-summarized cube structures
    • File
    • Application
    • Aggregate
    • Database
    49. All data is ___ of something real
    • I An abstraction
    • II A representation
    Which of the following option is true?
    • I only
    • II only
    • Both I and II
    • None