5 years ago in Operating System

When data changes in multiple lists & all lists are not updated, this causes;

[A] data redundancy
[B] information overload
[C] duplicate data
[D] data inconsistency
Next Question

Overall Stats

Attempted 541
Correct 109
Incorrect 172
Viewed 260


luna - 2 years ago

The answer must be D.

Malak Zubair - 2 years ago

Data inconsistency is the correct answer. i wonder how many of the other questions have wrong answer?

Muzzammil Khawaja - 2 years ago

D: Data Inconsistency is the right option..

Shanthi Nambiar C - 2 years ago

answer is Data inconsistency

chikku jacob - 2 years ago

data inconsistency is correct answer....data redundancy means duplication of data.. please correct it

Manu Ratheesh - 4 years ago

data inconsistency....it is not data redundancy

SAHEED MOHAMMED P - 5 years ago

yes. correct answer is data inconsistency,

anuja - 5 years ago

data inconsistency

Tsega Asresa Mengistu
Tsega Asresa Mengistu - 3 days ago

Tsega Asresa Mengistu from Dessie, Ethiopia is saying duplicate data is correct answer

Fahim Waris
Fahim Waris - 1 week ago

Fahim Waris from Lahore, Pakistan is saying data inconsistency is correct answer

Deep - 1 month ago

Deep from Kolkata, India is saying data redundancy is correct answer

Arpita Dhote
Arpita Dhote - 1 month ago

Arpita Dhote from Pune, India is saying data inconsistency is correct answer

Saqib Ali
Saqib Ali - 3 months ago

Saqib Ali from Karachi, Pakistan is saying duplicate data is correct answer

Related Questions

Which of the following refers to the associative memory?

  • [A] the address of the data is generated by the CPU
  • [B] the address of the data is supplied by the users
  • [C] there is no need for an address i.e. the data is used as an address
  • [D] the data are accessed sequentially
  • [E] None of the above

Linux is a(n) ----operating system.

  • [A] open source
  • [B] mac
  • [C] windows

Which of the following is the process by which a user's privileges ascertained ?

  • [A] Access Control
  • [B] Authorization
  • [C] Authentication
  • [D] None

Which of the following approaches do not require knowledge of the system state?

  • [A] Deadlock detection
  • [B] Deadlock dAvoidence
  • [C] Deadlock Prevension
  • [D] None