adplus-dvertising
frame-decoration

Question

A system is called ..................... when the inputs, process and the outputs are known with certainty.

a.

Probablistics

b.

Deterministic

c.

Open

d.

Close

Posted under IT Fundamentals

Answer: (b).Deterministic

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. A system is called ..................... when the inputs, process and the outputs are known with certainty.

Similar Questions

Discover Related MCQs

Q. Which of the following steps is/are the implementation plans involved in MIS?

i) Preparing organizational plans
ii) Planning of work flow
iii) Training of personnel
iv) Development of software
v) Acquiring computer hardware

Q. Which of the following is included in the Office automation systems?

i) Word processing
ii) Electronic mail
iii) Voice mail
iv) Electronic calendaring
v) Audio conferencing

Q. In a typical ................ network, application processing is shared between clients and one more servers.

Q. The .................... is defined as a set of activities performed across the organization creating as output of value to the customer.

Q. Which of the following is a computer based system that stores and manipulates data that are viewed from a geographical point or reference?

Q. Which of the following is a program that models the pattern recognition capabilities of the human brain.

Q. ........................... is the process of defining the current problem, determining why a new system is needed, identifying the objectives of the proposed system.

Q. Which of the following are the main software components of DSS?

i) database management system (DBMS)
ii) model management system
iii) support tools
iv) internet

Q. What is unicode?

Q. In IT Act 2000, which section deals with the punishment of cyber terrorism?

Q. Which section of IT Act deals with Cyber Terrorism?

Q. Which is the national nodal agency for responding to computer security incidents as and when they occur?

Q. What is E-mail Spoofing?

Q. International Computer Security Day :

Q. Which of the following statement(s) is/are TRUE?

S1: The decimal number 11 is larger than the hexadecimal number 11.
S2: In the binary number 1110.101, the fractional part has the decimal value as 0.625.

Q. The planned use of networked information and communication technology for the delivery of training is called

Q. Identify the correct pair from the following :

Q. Satellite communication works through

Q. Which of the following statements regarding the features of Information and Communication Technology (ICT) is/are true?

I. ICT are the main instruments for the creation of computer networks and the applications based on them.
II. ICT support the spread of information and knowledge, separating the content from the place where it belongs physically.
III. The digital and virtual nature of most of ICT products allow the expenditure for them to be maximized.

Q. If the binary equivalent of the decimal number 48 is 110000, then the binary equivalent of the decimal number 51 is given by